Skip to main content

Showing 1–5 of 5 results for author: Pranolo, A

Searching in archive cs. Search in all archives.
.
  1. Comparative Analysis of Image Enhancement Techniques for Brain Tumor Segmentation: Contrast, Histogram, and Hybrid Approaches

    Authors: Shoffan Saifullah, Andri Pranolo, Rafał Dreżewski

    Abstract: This study systematically investigates the impact of image enhancement techniques on Convolutional Neural Network (CNN)-based Brain Tumor Segmentation, focusing on Histogram Equalization (HE), Contrast Limited Adaptive Histogram Equalization (CLAHE), and their hybrid variations. Employing the U-Net architecture on a dataset of 3064 Brain MRI images, the research delves into preprocessing steps, in… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: 9 Pages, & Figures, 2 Tables, International Conference on Computer Science Electronics and Information (ICCSEI 2023)

    ACM Class: I.4.3; I.4.6

    Journal ref: E3S Web Conf. E3S Web Conf., Volume 501, 2024

  2. arXiv:2309.16257  [pdf

    cs.CV cs.AI eess.IV

    Nondestructive chicken egg fertility detection using CNN-transfer learning algorithms

    Authors: Shoffan Saifullah, Rafal Drezewski, Anton Yudhana, Andri Pranolo, Wilis Kaswijanti, Andiko Putro Suryotomo, Seno Aji Putra, Alin Khaliduzzaman, Anton Satria Prabuwono, Nathalie Japkowicz

    Abstract: This study explored the application of CNN-Transfer Learning for nondestructive chicken egg fertility detection for precision poultry hatchery practices. Four models, VGG16, ResNet50, InceptionNet, and MobileNet, were trained and evaluated on a dataset (200 single egg images) using augmented images (rotation, flip, scale, translation, and reflection). Although the training results demonstrated tha… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 18 pages, 9 figures, 1 table, journal article published

    MSC Class: CS-Class: 68T07; 68T45; 68U10; ICT-Class: 94A08 ACM Class: I.2; I.4; I.5

    Journal ref: Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI), Vol 9, No 3 (2023)

  3. Optimized Three Deep Learning Models Based-PSO Hyperparameters for Bei**g PM2.5 Prediction

    Authors: Andri Pranolo, Yingchi Mao, Aji Prasetya Wibawa, Agung Bella Putra Utama, Felix Andika Dwiyanto

    Abstract: Deep learning is a machine learning approach that produces excellent performance in various applications, including natural language processing, image identification, and forecasting. Deep learning network performance depends on the hyperparameter settings. This research attempts to optimize the deep learning architecture of Long short term memory (LSTM), Convolutional neural network (CNN), and Mu… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: Volume 5 (1): 53-66

    Journal ref: Knowledge Engineering and Data Science, 2022, Vol 5 No 1, pp: 53-66

  4. Parallel mathematical models of dynamic objects

    Authors: Roman Voliansky, Andri Pranolo

    Abstract: The paper deals with the develo** of the methodological backgrounds for the modeling and simulation of complex dynamical objects. Such backgrounds allow us to perform coordinate transformation and formulate the algorithm of its usage for transforming the serial mathematical model into parallel ones. This algorithm is based on partial fraction decomposition of the transfer function of a dynamic o… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Journal ref: International Journal of Advances in Intelligent Informatics, 4(2), 120-131 (2019)

  5. Digital Signature Security in Data Communication

    Authors: Robbi Rahim, Andri Pranolo, Ronal Hadi, Rasyidah, Heri Nurdiyanto, Darmawan Napitupulu, Ansari Saleh Ahmar, Leon Andretti Abdillah, Dahlan Abdullah

    Abstract: Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution wher… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

    Comments: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesia