Bhakti Yudho Suprapto
Sriwijaya University
PhysicsEngineeringLift (data mining)Recurrent neural networkMel-frequency cepstrumArtificial intelligenceBackpropagationControl systemNavigation systemSpeech recognitionInverse controlAltitude controlComputer sciencePID controllerArtificial neural networkFeature extractionFuzzy logicControl theoryReal-time computingControl theoryRobotProcess (computing)
62Publications
4H-index
45Citations
Publications 69
Newest
A car is a necessity and a means of transportation that makes it easier for us to travel. Many types and products of cars have been developed now, one of which is electric cars, because fossil fuels have started to deplete. Automatic control systems such as steering and speed control are complex tasks that serve as fundamental to all automatic systems in autonomous cars. So that a fuzzy logic method was developed with input from the Ultrasonic Maxbotix sensor to detect objects with the farthest ...
#1Armin SofijanH-Index: 1
#2Zainuddin NawawiH-Index: 8
Last. Bhakti Yudho SupraptoH-Index: 4
view all 5 authors...
The effect of increasing solar cell temperature due to excessive solar radiation exceeds the limit causes a decrease in the efficiency of the PV panel. Experimental research has been developed to study the effect of a cooling technique with a passive cooling method which has free convection heat transfer to photovoltaic using perforated aluminum plates. The result of this research is an increase in the efficiency of PV panels using perforated aluminum plates by 10.02%.
The rapid development of deep learning improves the detection and classification of attacks on intrusion detection systems. However, the unbalanced data issue increases the complexity of the architecture model. This study proposes a novel deep learning model to overcome the problem of classifying multi-class attacks. The deep learning model consists of two stages. The pre-tuning stage uses automatic feature extraction with a deep autoencoder. The second stage is fine-tuning using deep neural net...
Source
The area of the waters on this earth is more than the land area, it is also as in Indonesia. It can be utilized for various purposes, for an example is underwater exploration using underwater robots. It can be implemented in Underwater Vehicle . The AUV control system on underwater requires a controller to be able to move properly. PID controller is a controller that has a simple structure and yield great performance. This research was conducted to control the movement of surge, heave, and yaw o...
Last. Zainuddin Nawawi (Sriwijaya University)H-Index: 8
view all 4 authors...
Source
#1Bhakti Yudho Suprapto (Sriwijaya University)H-Index: 4
#2A. Wahyudin (Sriwijaya University)
Last. Suci Dwijayanti (Sriwijaya University)H-Index: 3
view all 4 authors...
The challenge with using the Unmanned Aerial Vehicle (UAV) is when the UAV makes a landing. This problem can be overcome by developing a landing vision through helipad detection. This helipad detection can make it easier for UAVs to land accurately and precisely by detecting the helipad using a camera. Furthermore, image processing technology is used on the image produced by the camera. You Only Look Once (YOLO) is an image processing algorithm developed to detect objects in real-time, and it is...
Source
In terms of movement, mobile robots are equipped with various navigation techniques. One of the navigation techniques used is facial pattern recognition. But Mobile robot hardware usually uses embedded platforms which have limited resources. In this study, a new navigation technique is proposed by combining a face detection system with a ram-based artificial neural network. This technique will divide the face detection area into five frame areas, namely top, bottom, right, left, and neutral. In ...
Source
#1Yesi Novaria Kunang (Sriwijaya University)H-Index: 5
#2Siti Nurmaini (Sriwijaya University)H-Index: 12
Last. Bhakti Yudho SupraptoH-Index: 4
view all 4 authors...
Abstract A network intrusion detection system (NIDS) is a solution that mitigates the threat of attacks on a network. The success of a NIDS depends on the success of its algorithm and the performance of its method in recognizing attacks. We propose a deep learning intrusion detection system (IDS) using a pretraining approach with deep autoencoder (PTDAE) combined with a deep neural network (DNN). Models were developed using hyperparameter optimization procedures. This research provides an altern...
Source
#1Caroline CarolineH-Index: 1
Last. Bhakti Yudho SupraptoH-Index: 4
view all 6 authors...
Source
In daily life, the deaf use sign language to communicate with others. However, the non-deaf experience difficulties in understanding this communication. To overcome this, sign recognition via human-machine interaction can be utilized. In Indonesia, the deaf use a specific language, referred to as Indonesia Sign Language (BISINDO). However, only a few studies have examined this language. Thus, this study proposes a deep learning approach, namely, a new convolutional neural network (CNN) to recogn...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.