Henoch Juli Christanto

ORCID: 0000-0003-0276-295X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology in Education and Learning
  • Data Mining and Machine Learning Applications
  • Edcuational Technology Systems
  • SMEs Development and Digital Marketing
  • Multimedia Learning Systems
  • Advanced Neural Network Applications
  • Educational Methods and Impacts
  • Technology Adoption and User Behaviour
  • Hand Gesture Recognition Systems
  • Digital Marketing and Social Media
  • Human Pose and Action Recognition
  • Face recognition and analysis
  • Spam and Phishing Detection
  • Information Retrieval and Data Mining
  • Sentiment Analysis and Opinion Mining
  • Smart Agriculture and AI
  • COVID-19 Prevention and Impact
  • Educational Methods and Media Use
  • Varied Academic Research Topics
  • Network Security and Intrusion Detection
  • Infection Control and Ventilation
  • Web Applications and Data Management
  • AI and HR Technologies
  • Education and Military Integration
  • Text and Document Classification Technologies

Atma Jaya Catholic University of Indonesia
2022-2024

Satya Wacana Christian University
2020

Hand detection is a key step in the pre-processing stage of many computer vision tasks because human hands are involved activity. Some examples such hand posture estimation, gesture recognition, activity analysis, and other as these. Human have wide range motion change their appearance lot different ways. This makes it hard to identify some crowded place, can move In this investigation, we provide concise analysis CNN-based object recognition algorithms, more specifically, Yolov7 Yolov7x...

10.3390/bdcc7010053 article EN cc-by Big Data and Cognitive Computing 2023-03-22

Road markings and signs provide vehicles pedestrians with essential information that assists them to follow the traffic regulations. surface include pedestrian crossings, directional arrows, zebra speed limit signs, other similar text, so on, which are usually painted directly onto road surface. fulfill a variety of important functions, such as alerting drivers potentially hazardous section, directing traffic, prohibiting certain actions, slowing down. This research paper provides summary...

10.3390/bdcc6040149 article EN cc-by Big Data and Cognitive Computing 2022-12-07

The World Health Organization (WHO) has publicized a global public health emergency due to the COVID-19 coronavirus pandemic. Wearing mask in can provide protection against spread of disease. Tremendous progress been made object detection recent times, thanks large part deep learning models, which have shown encouraging results when it comes recognizing objects images. Recent technological developments this possible. is one way prevent transmission from others. Our study employs You Only...

10.1109/iccae56788.2023.10111427 article EN 2023-03-03

Researchers in the fields of machine learning and artificial intelligence have recently begun to focus their attention on object recognition. One biggest obstacles image recognition through computer vision is detection identification similar items. Identifying musical instruments can be approached as a classification problem, where goal train model classify based features shape. Cellos, clarinets, erhus, guitars, saxophones, trumpets, French horns, harps, recorders, bassoons, violins were...

10.3390/bdcc7020094 article EN cc-by Big Data and Cognitive Computing 2023-05-10

Universities play an essential role in encouraging digital literacy as a form of support to accelerate transformation Indonesia. One the strategic steps acceleration is carry out organizational change academic scope. innovative ideas facilitate thesis registration process, selection supervisors, and consultation existence integrated accountable control system. This research proposes idea analyze design Information System for Thesis Consultation Process known SIBIMA using Software Life Cycle...

10.51519/journalisi.v5i1.443 article EN cc-by Journal of Information Systems and Informatics 2023-03-06

The human hand is involved in many computer vision tasks, such as posture estimation, movement identification, activity analysis, and other similar which detection an important preprocessing step. It still difficult to correctly recognize some hands a cluttered environment because of the complex display variations agile fact that they have wide range motion. In this study, we provide brief assessment CNN-based object identification algorithms, specifically Densenet Yolo V2, V2 CSP, CSP SPP,...

10.3390/bdcc6030085 article EN cc-by Big Data and Cognitive Computing 2022-08-09

The DNA virus responsible for monkeypox, transmitted from animals to humans, exhibits two distinct genetic lineages in central and eastern Africa. Beyond the zoonotic transmission involving direct contact with infected animals’ bodily fluids blood, spread of monkeypox can also occur through skin lesions respiratory secretions among humans. Both chickenpox involve be secretions, but they are caused by different viruses. key difference is that an orthopox-virus, while varicella-zoster virus....

10.3390/computation12020033 article EN cc-by Computation 2024-02-10

The research addresses the challenges faced by PT KAI (Kereta Api Indonesia) Persero in adapting to digital revolution, particularly context of online ticket purchasing and train service reservations.It focuses on need for PT.KAI improve efficiency customer satisfaction response complaints about conventional purchase methods.It will employs Technology Acceptance Model (TAM) understand user acceptance with Access application.The sample size is quantified 150 valid questionnaires analyzes...

10.18280/isi.290112 article EN cc-by Ingénierie des systèmes d information 2024-02-27

In the realm of agriculture, crop yields fundamental cereals such as rice, wheat, maize, soybeans, and sugarcane are adversely impacted by insect pest invasions, leading to significant reductions in agricultural output. Traditional manual identification these pests is labor-intensive time-consuming, underscoring necessity for an automated early detection classification system. Recent advancements machine learning, particularly deep have provided robust methodologies a diverse array...

10.56578/ataiml020402 article EN cc-by Acadlore Transactions on AI and Machine Learning 2023-11-13

In the era of digitalization, KAI finally transformed train ticket booking transactions by launching Access application. By applying optimal strategy Game Theory, will be able to compete with marketplaces such as Traveloka represent itself community a credible company. Theory was chosen analyze existing competition find optimum strategy. Because both applications sell same product, seen from services provided using usability HCI. The 5 strategies are Learnability, Efficiency, Memorability,...

10.51519/journalisi.v4i3.300 article EN cc-by Journal of Information Systems and Informatics 2022-09-01

Sentiment analysis (SA), also known as opinion mining, is a natural language processing (NLP) technique used to determine the sentiment or emotional tone behind piece of text. It involves analyzing text identify whether it expresses positive, negative, neutral sentiment. SA can be applied various types data such social media posts, customer reviews, news articles, and more. This experiment based on Internet Movie Database (IMDB) dataset, which comprises movie reviews positive negative labels...

10.1142/s2196888823500100 article EN cc-by Vietnam Journal of Computer Science 2023-07-21

The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power Lossy Networks (RPL), such as wormhole attack. In this study, authors have used trust concept called PCC-RPL (Parental Change Control RPL) over communicating nodes networks which prevents unsolicited parent changes by utilizing concept. aim study is make RPL protocol more secure using a Subjective Logic Framework-based...

10.3390/info14090478 article EN cc-by Information 2023-08-29

The development of the times in field technology allows information to be obtained quickly and easily. We often encounter exchange world work, one business entities that is very dependent on cooperatives. In traditional cooperatives, use services requires users come directly physical location cooperative. process recording user data transaction history also still done manually, namely by writing it a book, so takes long time. cooperative system created web-based application with Laravel...

10.25170/jurnalelektro.v16i2.5139 article EN Jurnal Elektro 2024-01-15

The research addresses the growing need for efficient management of marine tourism activities in Indonesia, explicitly diving, snorkeling, and fishing. With rapid expansion tourism, there is a pressing innovative solutions to streamline information dissemination enhance tourist experiences. This study proposes development database system utilizing Rapid Application Development (RAD) methodology cater diverse needs tourists engaging activities. approach comprises requirement planning, user...

10.51519/journalisi.v6i1.645 article EN cc-by Journal of Information Systems and Informatics 2024-03-23

The biggest challenge for architecture designers is the time required design process. Especially landscape architects who have different work limits from in general. In contrast to general, are assisted producing plans by building standards, requirements, and space programs that adapt type of project being undertaken. At same time, some jobs demand high-productivity animation presentation a short time. long process involved designing often makes it difficult produce optimal work. This study...

10.1155/2023/9443704 article EN Scientific Programming 2023-08-08

The ongoing COVID-19 pandemic has significantly affected global public health, necessitating protective measures such as wearing face masks to reduce the spread of disease.Recent advances in deep learning-based object detection have shown promise accurately recognizing objects within images and videos.In this study, state-of-the-art You Only Look Once (YOLO) V5 model was employed classify individuals based on their mask-wearing status into three categories: none, poor, adequate.YOLO is known...

10.18280/ria.370312 article EN cc-by Revue d intelligence artificielle 2023-06-30

The economic crisis triggered by the COVID-19 pandemic has made people unable to meet their basic daily needs. Social assistance, or social is a program offered government underprivileged communities support and improve welfare of disadvantaged people. It known that many aids implementations are not on target. Even judging from latest data, there still double recorded reach around 70% data. From existing problems, AYO BANSOS application was designed help implement aid programs more quickly....

10.51519/journalisi.v5i4.573 article EN cc-by Journal of Information Systems and Informatics 2023-11-29

Gereja Isa Almasih Jemaat Purwodadi dengan jumlah jemaat yang terus bertambah dan kegiatan ibadah beragam, menimbulkan tantangan bagi pengurus gereja dalam mengelola semua aspek administrasi penjadwalan efisien. Kebutuhan data ada juga semakin meningkat, sehingga menjadi susah untuk bisa dikelola secara konvensional. Sistem Informasi adalah solusi tepat membantu terkait ibadah, seperti jadwal kegiatan, pelayanan jemaat, manajemen keuangan, dokumentasi ibadah. Upaya penerapan sistem tersebut...

10.46576/rjpkm.v5i1.3707 article ID Reswara Jurnal Pengabdian Kepada Masyarakat 2024-01-31

The church is a community of believers in Jesus Christ who engage various religious activities. In managing these busy activities, the administration often faces risk human error. response to digitalization challenges, idea creating information system application emerged address issues, known as center application. purpose this assist smooth operation activities and simplify administrative processes involved each activity. results show that developed can be accessed by all members through...

10.35870/jtik.v8i1.1371 article EN Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 2024-01-01

E-learning UAJ is a system provided by Unika Atma Jaya to facilitate the learning process for both students and lecturers. However, this still rarely used, especially among engineering faculties. This forms basis conducting following analysis. The purpose of research measure level usability e-learning system. Usability analysis carried out using five components outlined Jakob Nielsen: Learnability, Efficiency, Memorability, Errors, Satisfaction. indicators within these are then compiled into...

10.51519/journalisi.v5i3.512 article EN cc-by Journal of Information Systems and Informatics 2023-08-29

<p>The prevalence of diabetes is currently increasing worldwide, including in Indonesia, due to the levels stress and lack physical activity that led obesity related complications such as hypertension. However, only about 25% patients are aware their condition. Therefore, this study aims find an algorithm can help predict with better accuracy using mellitus dataset obtained from Kaggle. To obtain information level diagnosis, data will be processed two methods, namely support vector...

10.32629/jai.v7i2.888 article EN Journal of Autonomous Intelligence 2023-12-13

The Current technological developments make PT. KAI (Kereta Api Indonesia) as a business entity that regulates and provides rail transportation services has been transformed into providing online ticket reservation services, one of which is through the Access application. But it needs to be realized marketplace trend also penetrated travel deals provide train reservations, Traveloka. This interesting phenomenon basis for conducting research see whether application owned by PT able compete...

10.21456/vol10iss2pp163-172 article EN JURNAL SISTEM INFORMASI BISNIS 2020-11-18

The feedback review column on the TripAdvisor website can process sentiment analysis by classifying positive and negative impressions of consumer using machine learning, namely text mining. This study analyzes for hotel products services in Labuan Bajo based data website. Meanwhile, algorithm used is Nave Bayes Classifier (NBC), Support Vector Machine (SVM), also SMOTE Upsampling k-Nearest Neighbor (k-NN) algorithm. classification result shows 702 reviews 2531 reviews. evaluation performance...

10.51519/journalisi.v4i4.294 article EN cc-by Journal of Information Systems and Informatics 2022-11-14

In the contemporary era, technological advancements have significantly impacted various aspects of human life, offering increased efficiency and convenience. Indonesia, aiming to enhance international competitiveness, recognizes importance integrating innovation across economic sectors. Despite its abundant natural resources, Indonesia's vital agricultural sector faces challenges, including limited adoption modern technology, resulting in suboptimal productivity. This study focuses on...

10.51519/journalisi.v5i4.581 article EN cc-by Journal of Information Systems and Informatics 2023-12-02
Coming Soon ...