
Eko Hari RachmawantoUniversitas Dian Nuswantoro Semarang · Faculty Informatic Engineering
Eko Hari Rachmawanto
Master of Science
About
171
Publications
79,029
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,827
Citations
Introduction
Skills and Expertise
Publications
Publications (171)
Handwriting recognition in Javanese script is not widely developed with deep learning (DL). Previous DL and machine learning (ML) research is generally limited to basic characters (Carakan) only. This study proposes a deep learning model using a custom-built convolutional neural network to improve recognition accuracy performance and reduce computa...
License plate recognition plays a central role in a variety of application contexts, including traffic management, automated parking, and law enforcement. Among the various approaches available, the Optical Character Recognition (OCR) technique has proven its effectiveness in recognizing characters in license plate images. This study describes an a...
The banana (Musa paradical), is an excellent fruit produced nationally and high in vitamins. In Indonesia, banana production is at a higher level than other fruit products. However, one of them is the issue with bananas' post-harvest, which arises when they are produced in huge quantities on a large scale or by an industry that sorts bananas. So fa...
Although numerous studies have been conducted on handwritten recognition, there is little and non-optimal research on Javanese script recognition due to its limitation to basic characters. Therefore, this research proposes the design of a handwritten Javanese Script recognition method based on twelve layers deep convolutional neural network (DCNN),...
Image quality can be increased to achieve the best imperceptibility without losing its robustness which is one of the benefits of using optimal schema as the process of embedding secret messages originating from PSO. The proposed technology uses improved SLT transient localization as an improved version of discrete wavelet transform (DWT). In addit...
Noni fruit is included in exported food commodities in Indonesia. The size of noni fruit, based on human vision, generally has varied shapes with distinctive textures and various patterns, so that the process of filtering fruit based on color and shape can be done in large quantities. In this study, K-Nearest Neighbor (KNN) has been implemented as...
Accurate file recovery of the corrupted or fragmented file is a very important task when missing the file system, since file recovery procedure involves methods, techniques, and tools that analyze and classify the contents of each data cluster including JPG file or non-JPG file. For classification problems, convolutional neural networks and high-de...
Salah satu jenis huruf dasar yang digunakan dalam Bahasa Jepang ialah Hiragana. Dalam penulisan Hiragana memiliki aturan guratan dasar atau berbentuk garis – garis dan coretan melengkung (kyokusenteki), penulisan dari garis atas ke bawah atau dari kiri ke kanan. Aturan tersebut harus diikuti dan diperhatikan. Diusulkan penggunaan Metode Convolution...
Kriptografi merupakan salah satu bidang studi yang bermanfaat untuk menerapkan keamanan pada data yang dapat berupa file, gambar, ataupun text. Dengan perkembangan sistem operasi Android saat ini, media penyampaian pesan lewat text juga ikut berkembang pesat dengan munculnya berbagai aplikasi pengiriman pesan, seperti WhatsApp, Telegram ataupun Lin...
Penggunaan masker mengakibatkan wajah seseorang sulit dikenali oleh sistem keamanan pada saat penggunaan fitur Face Recognition. Deteksi penggunaan masker akan berguna bagi satgas Covid-19 yang memantau masyarakat untuk selalu patuh dalam aturan penggunaan masker. Dalam penelitian ini, deteksi penggunaan masker pada wajah menggunakan Metode Princip...
Noni fruit is a fruit that is quite famous for its properties as a medicine that can cure diseases. The level of maturity of the noni fruit also affects the effectiveness of the fruit as a medicine. With the current technological developments, research on the classification of noni fruit maturity was carried out. It is intended that the selection o...
Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that a...
The corona virus (2019-nCoV), commonly known as COVID-19 has been officially designated as a global pandemic by the WHO. Twitter, is one of the social media used by many people and is popular among internet users in expressing opinions. One of the problems related to Covid-19 and causing a stir is the procurement of the Covid-19 vaccine. The procur...
A tourist target is anything that attracts a visitor or tourist to come to visit a place or area. Tourism goods play an important role in a country or region, becoming a source of national foreign exchange, increasing human resources, and improving the economy of surrounding communities. The problem posed in this study is how to implement a decisio...
Penggunaannya yang kian massif dan banyakya data dan informasi yang tersebar di internet yang mungkin saja terdapat data yang bersifat rahasia, menjadikan data tersebut rawan untuk disalahgunakan dari tindakan illegal oleh pihak yang tidak bertanggung jawab. Faktor keamanan menjadi hal yang sangat penting agar data tersebut tetap aman dan terjamin...
Algoritma kriptografi merupakan sebuah seni matematis yang diimplementasikan untuk proses enkripsi dan dekripsi, medkanisme ini mengarah untuk mengenkripsi data asli menggunakan kombinasi berbeda dari kata, angka, atau ekspresi. Keamanan data terenkripsi sepenuhnya bergantung pada dua aspek penting, yaitu : kerahasiaan kunci dan kekuatan algoritma...
Image encryption is an interesting research topic, especially in medical images. This is due to the importance of security when storing and transmitting digital images. This study proposes an image encryption procedure that combines several methods such as chaotic-hash scrambling to perform the confusion process, join hash functions, block-based su...
Green Chili Quality Classification has been done manually through direct visual observation. However, manual classification is highly influenced by operator subjectivity so that under certain conditions, the classification process is inconsistent. The development of information technology allows identification of the quality level of green chilies...
Saat ini kehadiran COVID-19 berdampak disebagian besar sektor dibidang perekonomian secara signifikan. Berbagai perusahaan hampir terancam mulai bangkrut dan sangat terpaksa merumahkan para pekerjanya bahkan ada yang diberhentikan, kegiatan anak-anak sekolah ikut diliburkan, toko-toko penyedia bahan pokok dan tempat-tempat rekreasi dan Gedung perte...
Recent research in digital forensic attempts to classify image clusters into JPEG or non-JPEG clusters before recovering JPEG image files. This issue might improve the recovering JPEG image accuracy and reduce the processing time. In this work, three content-based feature extraction methods are used. The Rate of Change (RoC) is used for tracking re...
Orchid flower as ornamental plants with a variety of types where one type of orchid has various characteristics in the form of different shapes and colors. Here, we chosen support vector machine (SVM), Naïve Bayes, and k-nearest neighbor algorithm which generates text input. This system aims to assist the community in recognizing orchid plants base...
This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenèreand Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with...
Saat ini produk UMKM yang dihasilkan oleh kelompok usaha atau industry rumah tangga belum dikenal oleh calon pembeli atau pelanggan yang ada di luar daerahnya dikarenakan promosi yang dilakukan hanya dari cerita orang ke orang lain. Beberapa pelaku sudah menggunakan grup-grup di apalikasi chating, media sosial dan jejaring sosial akan tetapi hanya...
Saat ini pedesaan adalah salah satu sektor yang diperhatikan pemerintah dengan diberikan anggaran desa 10% dari APBN. Implementasi pemberian dana di desa Provinsi Jawa Tengah mencapai 1 Milyar tiap desa, hal ini akan menimbulkan kerawanan untuk diselewengkan sehingga membutuhkan transparansi salah satunya dengan memberikan informasi yang up to date...
Batik as one of Indonesia's cultural heritages has various types, motifs and colors. A batik may have almost the same motif with a different color or vice versa, therefore it requires a classification of batik motifs. In this study, a printed batik was used with various coastal batik motifs in Central Java. The algorithm for classification is selec...
Salah satu algoritma yang sering digunakan untuk melakukan deteksi pada wajah yaitu Viola-Jones. Metode ini merupakan gabungan dari 3 buah fitur yaitu integral image, adaboost dan cascade classifier. Masing-masing fitur mempunyai fungsi tersendiri dan saling melengkapi. Integral image digunakan dalam penentuan ada dan tidaknya gambar, adaboost untu...
This research proposes a method of classification of shallots based on quality using the Naïve Bayes Classifier. The Naïve Bayes classifier is a classifier based on statistics and simple probabilities that are widely used in many sophisticated learning methods today. Shallots are classified into three classes, namely good, medium, and poor quality....
There is a variety of important and personal information stored in an image that is often shared via the internet. Cryptography is one way to protect these image files, so that private information cannot be read by malicious third parties. The DNA and Chaos methods are one of the cryptographic methods that are widely proposed and combined. Some pre...
Beaufort and Vigenere are fast and strong substitution encryption methods against brute force attacks if they have good key quality. But both of these methods by default can not produce a good avalanche effect. Avalanche effect is a measuring tool that can determine the strength of encryption from differential attacks. This research proposes hybrid...
Pada makalah ini, telah dipaparkan mengenai cara pemebelajaran bagi anak usia dini. Terdpaat du acara pembelajaran dalam ranah visual, yaitu pembelajaran visual statis dan dinamis. Mitra pengabdian, dalam hal ini Guru TK PGRI 08 Purowyoso dan siswa anak usia 4-6 tahun sejumlah 45 orang, telah diobservasi dan terbukti bahwa hasil permbelajaran mengg...
One popular image security technique is image encryption. This research
proposes an image encryption technique that consists of three encryption
layers, i.e. bit-shift encryption, chaos-based encryption, and stream
encryption. The chaos algorithm used is Arnold's chaotic map, while
the stream cipher algorithm used is RC4. Each layer has different c...
Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's name. Based on that problem an attempt was made to provide an invisible watermark so as not to be easy to do the watermark removal process on the artwork, using a 2-level DWT and SVD combinat...
Imperceptibility is one of the most important aspects of the steganography method. Specifically, for steganography in images, embedded messages must not be felt by the human visual system. Humans have a higher sensitivity in color images compared to grayscale images, therefore the method that is still being tested on grayscale images needs to be re...
This research proposes a watermarking method that combines Integer Haar Wavelet Transform (IHWT) and Chinese Remainder Theorem (CRT) algorithms on RGB images that are converted to YCbCr color space. The goal is to get a watermarking method that is robust, imperceptible and secure. Robust because with IHWT done on component Y as a place to insert a...
Parijoto fruit is a typical fruit that grows around Mount Muria, Kudus Regency and
Mount Merapi in Yogyakarta, Indonesia. This fruit has many health benefits, especially for
pregnant women. This fruit production is not much because of its limited growth around Mount
Muria. So parijoto fruit is made into powder drink products and syrup, so that it c...
Color images have more information and more storage space than gray images. The process of computing color images is also more complex compared to gray images. Nevertheless, human vision is more sensitive to color images compared to gray images, so color image processing is so important. Image watermarking is a method of copyright protection by emb...
Perkembangan Information and Communication Technology (ICT) atau Teknologi Informasi dan Komunikasi (TIK) dalam beberapa dekade terakhir berjalan sangat cepat sejalan dengan perkembangan teknologi telekomunikasi, termasuk jaringan komputer. Berbagai kendala dialami guru dalam pembelajara di tingkat SD yang siswanya tergolong generasi Z yang sudah m...
Saat ini pemasaran dan penjualan hasil produk UMKM masih dilakukan dengan mengikuti berbagai macam pameran produk UMKM yang diadakan oleh pemerintah maupun perusahaan yang memberikan fasilitas pameran, melalui broadcast pesan dan menunggu pengunjung datang ke toko. Metode ini belum optimal dalam penyampaian informasi karena promosi yang dilakukan t...
Keamanan dari pengiriman informasi menjadi sebuah masalah penting yang perlu di tindak lanjuti, khususnya penyembunyian pesan dalam media tertentu. File MP3 adalah salah satu media yang sangat populer digunakan, namun ternyata jarang dimanfaatkan dalam steganografi. Algoritma Inverse Bit dapat meningkatkan MSE dan PSNR dari cover. LSB adalah algori...
Watermarking is a powerful technique to protect copyright from cyber-crime. This study proposes a random spread technique based on the Discrete Cosine Transform (DCT) to improve image watermarking performance. The use of the random spread technique is proven to be able to improve the output quality of the watermarked image, where the watermark imag...
Bank Pembangunan Daerah Jawa Tengah merupakan Bank milik Pemerintah Provinsi Jawa Tengah bersama-sama dengan Pemerintah Kota/Kabupaten Se-Jawa Tengah. Seiring dengan kemajuan teknologi pengarsipan di Bank Pembangunan Daerah Jawa Tengah memerlukan digitalisasi dalam hal pengarsipan data. Pengarsipan data adalah proses memindahkan data yang tidak akt...
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakne...