首页 > 最新文献

Journal of Information Technology Education-Innovations in Practice最新文献

英文 中文
Path Smoothing With Support Vector Regression 路径平滑与支持向量回归
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3856
Donni Richasdy, Saiful Akbar
One of moving object problems is the incomplete data that acquired by Geo-tracking technology. This phenomenon can be found in aircraft ground-based tracking with data loss come near to 5 minutes. It needs path smoothing process to complete the data. One solution of path smoothing is using physics of motion, while this research performs path smoothing process using machine learning algorithm that is Support Vector Regression (SVR). This study will optimize the SVR configuration parameters such as kernel, common, gamma, epsilon and degree. Support Vector Regression will predict value of the data lost from aircraft tracking data. We use combination of mean absolute error (MAE) and mean absolute percentage error (MAPE) to get more accuracy. MAE will explain the average value of error that occurs, while MAPE will explain the error percentage to the data. In the experiment, the best error value MAE 0.52 and MAPE 2.07, which means error data ± 0.52, this is equal to 2.07% of the overall data value. Keywords: Moving Object, Path Smoothing, Support Vector Regression, MAE
运动目标的一个问题是地理跟踪技术获取的数据不完整。这种现象可以在飞机地面跟踪中发现,数据丢失时间接近5分钟。需要对数据进行路径平滑处理。路径平滑的一种解决方案是使用运动物理,而本研究使用机器学习算法支持向量回归(SVR)进行路径平滑处理。本研究将优化SVR配置参数,如kernel, common, gamma, epsilon和degree。支持向量回归将对飞机跟踪数据的数据丢失值进行预测。我们使用平均绝对误差(MAE)和平均绝对百分比误差(MAPE)的组合来获得更高的精度。MAE将解释发生的误差的平均值,而MAPE将解释数据的误差百分比。在实验中,最佳误差值MAE为0.52,MAPE为2.07,即误差数据±0.52,这相当于整体数据值的2.07%。关键词:运动目标,路径平滑,支持向量回归,MAE
{"title":"Path Smoothing With Support Vector Regression","authors":"Donni Richasdy, Saiful Akbar","doi":"10.31289/jite.v4i1.3856","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3856","url":null,"abstract":"One of moving object problems is the incomplete data that acquired by Geo-tracking technology. This phenomenon can be found in aircraft ground-based tracking with data loss come near to 5 minutes. It needs path smoothing process to complete the data. One solution of path smoothing is using physics of motion, while this research performs path smoothing process using machine learning algorithm that is Support Vector Regression (SVR). This study will optimize the SVR configuration parameters such as kernel, common, gamma, epsilon and degree. Support Vector Regression will predict value of the data lost from aircraft tracking data. We use combination of mean absolute error (MAE) and mean absolute percentage error (MAPE) to get more accuracy. MAE will explain the average value of error that occurs, while MAPE will explain the error percentage to the data. In the experiment, the best error value MAE 0.52 and MAPE 2.07, which means error data ± 0.52, this is equal to 2.07% of the overall data value. Keywords: Moving Object, Path Smoothing, Support Vector Regression, MAE","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"23 1","pages":"142-150"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74935214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Apriori Algorithm Method in Sales Analysis of Mountain Bag Brands in Post Stores 1 Apriori算法在邮政商店山包品牌销售分析中的应用
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.2980
A. Salim, Mochammad Nizar
Nowadays, climbing mountains has become a lifestyle for young people. Outdoor industries that produce clothing, bags and sports shoes participate in developing and following the desires of the market. Each company in producing its products has a special brand. Shop Pos 1 is one of the shops that sell various climbing equipment commonly used by climbers to climb mountains. In addition, Pos 1 stores also find it difficult to get updated information about the level of sales per period. Therefore, we need a decision support systems and methods that can be used to determine business strategies that can provide efficient and effective information, namely data mining using a priori technology association methods. The author chooses mountain bag products only as research material by selecting brands, completing Avtech, Consina, Co-tracks, Cozmed, Eiger, Forester, Rei, Loss. In analyzing the data, the writer uses a priori algorithm calculation by testing the hypothesis of two variables between the value of support and the value of trust. After that, a priori algorithm is calculated using Tanagra. Based on analysis conducted by the author, the operator most preferred by climbers is Avtech, Consina, Cozmed. From these results, it can be used by Pos 1 to prepare brand inventory of mountain bag products that are widely bought by buyers and increase brand inventory. Keywords: Bag Brand, Data Mining, apriori algorithm.
如今,爬山已成为年轻人的一种生活方式。生产服装、箱包和运动鞋的户外行业参与开发和跟随市场的需求。每个公司在生产自己的产品时都有一个特殊的品牌。Pos 1店是销售登山者登山常用的各种登山装备的商店之一。此外,Pos 1商店也发现很难获得每期销售水平的最新信息。因此,我们需要一种决策支持系统和方法,可以用来确定业务策略,可以提供高效和有效的信息,即使用先验技术的数据挖掘关联方法。笔者选取的登山包产品仅作为研究材料,通过品牌的选择,完成了Avtech, Consina, Co-tracks, Cozmed, Eiger, Forester, Rei, Loss。在分析数据时,笔者通过检验支持值与信任值之间两个变量的假设,采用先验算法进行计算。然后,使用Tanagra计算先验算法。根据笔者的分析,登山者最喜欢的运营商是Avtech、Consina、Cozmed。从这些结果中,Pos 1可以利用它来编制买家广泛购买的山包产品的品牌库存,增加品牌库存。关键词:箱包品牌,数据挖掘,先验算法
{"title":"Application of Apriori Algorithm Method in Sales Analysis of Mountain Bag Brands in Post Stores 1","authors":"A. Salim, Mochammad Nizar","doi":"10.31289/jite.v4i1.2980","DOIUrl":"https://doi.org/10.31289/jite.v4i1.2980","url":null,"abstract":"Nowadays, climbing mountains has become a lifestyle for young people. Outdoor industries that produce clothing, bags and sports shoes participate in developing and following the desires of the market. Each company in producing its products has a special brand. Shop Pos 1 is one of the shops that sell various climbing equipment commonly used by climbers to climb mountains. In addition, Pos 1 stores also find it difficult to get updated information about the level of sales per period. Therefore, we need a decision support systems and methods that can be used to determine business strategies that can provide efficient and effective information, namely data mining using a priori technology association methods. The author chooses mountain bag products only as research material by selecting brands, completing Avtech, Consina, Co-tracks, Cozmed, Eiger, Forester, Rei, Loss. In analyzing the data, the writer uses a priori algorithm calculation by testing the hypothesis of two variables between the value of support and the value of trust. After that, a priori algorithm is calculated using Tanagra. Based on analysis conducted by the author, the operator most preferred by climbers is Avtech, Consina, Cozmed. From these results, it can be used by Pos 1 to prepare brand inventory of mountain bag products that are widely bought by buyers and increase brand inventory. Keywords: Bag Brand, Data Mining, apriori algorithm.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"15 1","pages":"1-10"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90679324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet-Based Flood Detection System (Iot) and Telegram Messenger Using Mcu Node and Water Level Sensor 基于单片机节点和水位传感器的互联网洪水检测系统(Iot)和Telegram Messenger
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3892
N. Nanda, Rizalul Akram, Liza Fitria
During the rainy season, several regions in Indonesia experienced floods even to the capital of Indonesia also flooded. Some of the causes are the high intensity of continuous rain, clogged or non-smooth drainage, high tides to accommodate the flow of water from rivers, other causes such as forest destruction, shallow and full of garbage and other causes. Every flood disaster comes, often harming the residents who experience it. The late anticipation from the community and the absence of an early warning system or information that indicates that there will be a flood so that the community is not prepared to face floods that cause a lot of losses. Therefore it is necessary to have a detection system to provide early warning if floods will occur, this is very important to prevent material losses from flooded residents. From this problem the researchers designed an internet-based flood detection System of Things (IoT). This tool can later be controlled via a smartphone remotely and can send messages Telegram messenger to citizens if the detector detects a flood will occur. Keywords: Flooding, Smartphone, Telegram messenger, Internet of Thing (IoT).
在雨季,印度尼西亚的几个地区经历了洪水,甚至到印度尼西亚的首都也被洪水淹没。一些原因是高强度的连续降雨,堵塞或不畅通的排水系统,涨潮以容纳河流的水流,其他原因如森林破坏,浅层和充满垃圾等原因。每次洪水来袭,往往会伤害到经历洪水的居民。社区的预测较晚,缺乏早期预警系统或信息,表明将会有洪水,因此社区没有准备好面对造成大量损失的洪水。因此,有必要建立一个检测系统,在洪水发生时提供早期预警,这对防止被洪水淹没的居民的物质损失非常重要。针对这一问题,研究人员设计了一种基于互联网的物联网洪水检测系统。这个工具可以通过智能手机远程控制,如果探测器探测到洪水即将发生,它可以向市民发送消息。关键词:洪水,智能手机,电报信使,物联网
{"title":"Internet-Based Flood Detection System (Iot) and Telegram Messenger Using Mcu Node and Water Level Sensor","authors":"N. Nanda, Rizalul Akram, Liza Fitria","doi":"10.31289/jite.v4i1.3892","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3892","url":null,"abstract":"During the rainy season, several regions in Indonesia experienced floods even to the capital of Indonesia also flooded. Some of the causes are the high intensity of continuous rain, clogged or non-smooth drainage, high tides to accommodate the flow of water from rivers, other causes such as forest destruction, shallow and full of garbage and other causes. Every flood disaster comes, often harming the residents who experience it. The late anticipation from the community and the absence of an early warning system or information that indicates that there will be a flood so that the community is not prepared to face floods that cause a lot of losses. Therefore it is necessary to have a detection system to provide early warning if floods will occur, this is very important to prevent material losses from flooded residents. From this problem the researchers designed an internet-based flood detection System of Things (IoT). This tool can later be controlled via a smartphone remotely and can send messages Telegram messenger to citizens if the detector detects a flood will occur. Keywords: Flooding, Smartphone, Telegram messenger, Internet of Thing (IoT).","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"97 1","pages":"230-235"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85900967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face Identification on Login Security Using Algorithm Combination of Viola-Jones and Cosine Similarity 基于维奥拉-琼斯和余弦相似度组合算法的登录安全人脸识别
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3885
F. Azmi, A. Saleh, N. Dharshinni
Data security by using an alphanumeric combination password is no longer used, so it needs to be added security that is difficult to be manipulated by certain people. One type of security is the type of biometrics technology using face recognition which has different characteristics by combining the Viola-Jones algorithm to detect facial features, GLCM (Gray Level Co-occurrence Matrix) for extracting the texture characteristics of an image, and Cosine Similarity for the measurement of the proximity of the data (image matching). The image will be detected using the Viola-Jones algorithm to get face, eyes, nose, and mouth. The image detection results will be calculated the value of the texture characteristics with the GLCM (Gray Level Cooccurrence Matrix) algorithm. Image matching using cosine similarity will determine or match the data stored in the database with new image input until identification results are obtained. The results obtained in this study get the level of accuracy of the identification of the three algorithms by 77.20% with the amount of data that was correctly identified as many as 386 out of 500 images. Keywords: Security, face recognition, Viola-Jones, Cosine Similarity.
使用字母数字组合密码的数据安全已不再使用,因此需要增加难以被某些人操纵的安全性。一种安全类型是使用面部识别的生物识别技术,该技术通过结合Viola-Jones算法来检测面部特征,GLCM(灰度共生矩阵)用于提取图像的纹理特征,余弦相似度用于测量数据的接近度(图像匹配),具有不同的特征。图像将使用Viola-Jones算法来检测,以获得面部,眼睛,鼻子和嘴巴。利用灰度共生矩阵(GLCM)算法计算图像检测结果的纹理特征值。使用余弦相似度进行图像匹配,将数据库中存储的数据与新的图像输入进行确定或匹配,直至获得识别结果。本研究的结果使三种算法的识别准确率达到77.20%,500张图像中正确识别的数据量高达386张。关键词:安全,人脸识别,Viola-Jones,余弦相似度。
{"title":"Face Identification on Login Security Using Algorithm Combination of Viola-Jones and Cosine Similarity","authors":"F. Azmi, A. Saleh, N. Dharshinni","doi":"10.31289/jite.v4i1.3885","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3885","url":null,"abstract":"Data security by using an alphanumeric combination password is no longer used, so it needs to be added security that is difficult to be manipulated by certain people. One type of security is the type of biometrics technology using face recognition which has different characteristics by combining the Viola-Jones algorithm to detect facial features, GLCM (Gray Level Co-occurrence Matrix) for extracting the texture characteristics of an image, and Cosine Similarity for the measurement of the proximity of the data (image matching). The image will be detected using the Viola-Jones algorithm to get face, eyes, nose, and mouth. The image detection results will be calculated the value of the texture characteristics with the GLCM (Gray Level Cooccurrence Matrix) algorithm. Image matching using cosine similarity will determine or match the data stored in the database with new image input until identification results are obtained. The results obtained in this study get the level of accuracy of the identification of the three algorithms by 77.20% with the amount of data that was correctly identified as many as 386 out of 500 images. Keywords: Security, face recognition, Viola-Jones, Cosine Similarity.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"33 1","pages":"203-211"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90329097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Face Recognition Algorithm: Dlib and OpenCV 人脸识别算法分析:Dlib和OpenCV
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3865
S. Suwarno, Kevin Kevin
In face recognition there are two commonly used open-source libraries namely Dlib and OpenCV. Analysis of facial recognition algorithms is needed as reference for software developers who want to implement facial recognition features into an application program. From Dlib algorithm to be analyzed is CNN and HoG, from OpenCV algorithm is DNN and HAAR Cascades. These four algorithms are analyzed in terms of speed and accuracy. The same image dataset will be used to test, along with some actual images to get a more general analysis of how algorithm will appear in real life scenarios. The programming language used for face recognition algorithms is Python. The image dataset will come from LFW (Labeled Faces in the Wild), and AT&T, both of which are available and ready to be downloaded from the internet. Pictures of people around the UIB (Batam International University) is used for actual images dataset. HoG algorithm is fastest in speed test (0.011 seconds / image), but the accuracy rate is lower (FRR = 27.27%, FAR = 0%). DNN algorithm is the highest in level of accuracy (FRR = 11.69%, FAR = 2.6%) but the lowest speed (0.119 seconds / picture). There is no best algorithm, each algorithm has advantages and disadvantages. Keywords: Python, Face Recognition, Analysis, Speed, Accuracy.
在人脸识别中,有两个常用的开源库,即Dlib和OpenCV。对于想要在应用程序中实现人脸识别功能的软件开发人员来说,需要对人脸识别算法进行分析作为参考。从Dlib算法要分析的是CNN和HoG,从OpenCV算法要分析的是DNN和HAAR级联。从速度和精度两方面对这四种算法进行了分析。将使用相同的图像数据集进行测试,并使用一些实际图像来更全面地分析算法在现实生活场景中的表现。用于人脸识别算法的编程语言是Python。图像数据集将来自LFW(野外标记的面孔)和AT&T,两者都是可用的,可以从互联网上下载。巴淡国际大学周围的人的照片用于实际图像数据集。HoG算法在速度测试中速度最快(0.011秒/幅),但准确率较低(FRR = 27.27%, FAR = 0%)。DNN算法的准确率最高(FRR = 11.69%, FAR = 2.6%),但速度最低(0.119秒/张)。没有最好的算法,每种算法都有优点和缺点。关键词:Python,人脸识别,分析,速度,准确性。
{"title":"Analysis of Face Recognition Algorithm: Dlib and OpenCV","authors":"S. Suwarno, Kevin Kevin","doi":"10.31289/jite.v4i1.3865","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3865","url":null,"abstract":"In face recognition there are two commonly used open-source libraries namely Dlib and OpenCV. Analysis of facial recognition algorithms is needed as reference for software developers who want to implement facial recognition features into an application program. From Dlib algorithm to be analyzed is CNN and HoG, from OpenCV algorithm is DNN and HAAR Cascades. These four algorithms are analyzed in terms of speed and accuracy. The same image dataset will be used to test, along with some actual images to get a more general analysis of how algorithm will appear in real life scenarios. The programming language used for face recognition algorithms is Python. The image dataset will come from LFW (Labeled Faces in the Wild), and AT&T, both of which are available and ready to be downloaded from the internet. Pictures of people around the UIB (Batam International University) is used for actual images dataset. HoG algorithm is fastest in speed test (0.011 seconds / image), but the accuracy rate is lower (FRR = 27.27%, FAR = 0%). DNN algorithm is the highest in level of accuracy (FRR = 11.69%, FAR = 2.6%) but the lowest speed (0.119 seconds / picture). There is no best algorithm, each algorithm has advantages and disadvantages. Keywords: Python, Face Recognition, Analysis, Speed, Accuracy.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"4 1","pages":"173-184"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83003782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Detection of Attacks on Apache2 Web Server Using Genetic Algorithm Based On Jaro Winkler Algorithm 基于Jaro Winkler算法的遗传算法检测Apache2 Web服务器攻击
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3873
M. Maulana
Web server is software that provides data services in the form of HTTP (Hypertext Transfer Protocol) requests and responses in the form of HTML documents (Hypertext Markup Language) with the aim of managing data in the form of text files, images, videos and files. But in managing large amounts of data, good security monitoring is needed so that the data stored on the web server is not easily hacked. To protect the web server from hackers need an application to detect activities that are considered suspicious or possible hacking activities. By utilizing logs from a web server that is processed using the Jaro Winkler algorithm to see hacking attempts that produce a matrix and hacking activity reports to the admin. Thus the web server admin can see suspicious activity on the web server directly. Keywords: Web Server, Jaro Winkler Algorithm.
Web服务器是以HTTP(超文本传输协议)的形式提供数据服务的软件,以HTML文档(超文本标记语言)的形式进行请求和响应,目的是管理文本文件、图像、视频和文件等形式的数据。但是在管理大量数据时,需要良好的安全监控,这样存储在web服务器上的数据才不会被轻易入侵。为了保护web服务器免受黑客攻击,需要一个应用程序来检测被认为是可疑的或可能的黑客活动。通过利用使用Jaro Winkler算法处理的web服务器的日志来查看黑客尝试,并生成矩阵和黑客活动报告给管理员。因此,web服务器管理员可以直接看到web服务器上的可疑活动。关键词:Web服务器,Jaro Winkler算法
{"title":"Detection of Attacks on Apache2 Web Server Using Genetic Algorithm Based On Jaro Winkler Algorithm","authors":"M. Maulana","doi":"10.31289/jite.v4i1.3873","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3873","url":null,"abstract":"Web server is software that provides data services in the form of HTTP (Hypertext Transfer Protocol) requests and responses in the form of HTML documents (Hypertext Markup Language) with the aim of managing data in the form of text files, images, videos and files. But in managing large amounts of data, good security monitoring is needed so that the data stored on the web server is not easily hacked. To protect the web server from hackers need an application to detect activities that are considered suspicious or possible hacking activities. By utilizing logs from a web server that is processed using the Jaro Winkler algorithm to see hacking attempts that produce a matrix and hacking activity reports to the admin. Thus the web server admin can see suspicious activity on the web server directly. Keywords: Web Server, Jaro Winkler Algorithm.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"8 1","pages":"185-192"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84262018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm Implementation Of Interest Buy Apriori Data On Consumer Retail Sales In Industry 工业零售消费者兴趣购买先验数据的算法实现
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3775
Ahmad Fachrurozi, Mufid Junaedi, Jordy Lasmana Putra, W. Gata
This data processing has the aim to increase the company's turnover, because by being aware of how the interest in buying goods works, the company can buy products other than the main products that it buys. In increasing company revenue can be done using the Data Mining process, one of which uses a priori algorithm and association techniques. With this a priori algorithm found association technique which later can be used as a pattern of purchasing goods by consumers, this study uses a data repository of 958 data consisting of 45 transactions. From the results obtained goods with the name Paper Chain Kit 50's Christmas is a product that is often bought by consumers and it is known that the most frequent combination patterns are the Retro Spot Paper Chain Kit and the Paper Chain Kit 50's Christmas. So that with known buying patterns, the company manager can predict future market needs, and can calculate the stock of goods that must be reproduced, and goods whose stock must be reduced, and also with the results of the association the manager can manage the layout of the product to be better. Keywords: Apriori Algorithm, Sales Data, Retail.
这种数据处理的目的是增加公司的营业额,因为通过了解购买商品的兴趣是如何运作的,公司可以购买除主要产品以外的产品。在增加公司收入方面可以使用数据挖掘过程来完成,其中使用了先验算法和关联技术。有了这种先验算法发现的关联技术,以后可以用作消费者购买商品的模式,本研究使用958个数据的数据存储库,包括45个交易。从所获得的结果来看,名称为Paper Chain Kit 50's Christmas的商品是消费者经常购买的产品,据了解,最常见的组合图案是Retro Spot Paper Chain Kit和Paper Chain Kit 50's Christmas。这样,根据已知的购买模式,公司经理可以预测未来的市场需求,可以计算出必须再生产的商品的库存,以及必须减少库存的商品的库存,并且根据关联的结果,经理可以更好地管理产品的布局。关键词:Apriori算法,销售数据,零售业。
{"title":"Algorithm Implementation Of Interest Buy Apriori Data On Consumer Retail Sales In Industry","authors":"Ahmad Fachrurozi, Mufid Junaedi, Jordy Lasmana Putra, W. Gata","doi":"10.31289/jite.v4i1.3775","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3775","url":null,"abstract":"This data processing has the aim to increase the company's turnover, because by being aware of how the interest in buying goods works, the company can buy products other than the main products that it buys. In increasing company revenue can be done using the Data Mining process, one of which uses a priori algorithm and association techniques. With this a priori algorithm found association technique which later can be used as a pattern of purchasing goods by consumers, this study uses a data repository of 958 data consisting of 45 transactions. From the results obtained goods with the name Paper Chain Kit 50's Christmas is a product that is often bought by consumers and it is known that the most frequent combination patterns are the Retro Spot Paper Chain Kit and the Paper Chain Kit 50's Christmas. So that with known buying patterns, the company manager can predict future market needs, and can calculate the stock of goods that must be reproduced, and goods whose stock must be reduced, and also with the results of the association the manager can manage the layout of the product to be better. Keywords: Apriori Algorithm, Sales Data, Retail.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"12 1","pages":"48-56"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85966711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Application of Mamdani Method for Predicting The Best Portable Computer Based on Hardware and Price Mamdani方法在基于硬件和价格的最佳便携式计算机预测中的应用
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-07-20 DOI: 10.31289/jite.v4i1.3770
Gelar Lailatul Qodar
A portable computer is a technology tool widely used among students and students. With a very helpful role as in typing needs, presentations, and math calculations. A variety of carry-on computers that many certainly make one difficult to determine a decent and good portable computer to use. In general, in the process of selecting a portable computer, there is no recognized standard to determine the recommended portable computer level. The purpose in this research is to produce predictive values that will be a reference in supporting decisions in determining a portable computer that complies with hardware component criteria and pricing. This study implemented FIS Mamdani models with the analysis stage of the formation of fuzzy sets, application of implications function, rule composition and defuzification. The result of this research is an output of predictive value based on hardware component inputs and prices that will assist the user in supporting decisions in determining the best carry-on computer and according to what they want. Keywords: Predictions, Fuzzy Inference System, Mamdani methods, portable computers, students.
便携式电脑是一种广泛应用于学生和学生之间的技术工具。在打字、演示和数学计算等方面起着很有帮助的作用。各种各样的随身电脑,许多人肯定很难确定一个体面的和好的便携式电脑使用。一般来说,在选择便携式电脑的过程中,并没有公认的标准来确定推荐的便携式电脑级别。在这项研究的目的是产生预测值,将是一个参考,在决定便携式计算机符合硬件组件标准和定价的支持决策。本研究从模糊集的形成、隐含函数的应用、规则的构成和去模糊化的分析阶段实现了FIS Mamdani模型。这项研究的结果是基于硬件组件输入和价格的预测值输出,这将帮助用户根据他们想要的东西来决定最好的随身携带电脑。关键词:预测,模糊推理系统,Mamdani方法,便携式计算机,学生。
{"title":"The Application of Mamdani Method for Predicting The Best Portable Computer Based on Hardware and Price","authors":"Gelar Lailatul Qodar","doi":"10.31289/jite.v4i1.3770","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3770","url":null,"abstract":"A portable computer is a technology tool widely used among students and students. With a very helpful role as in typing needs, presentations, and math calculations. A variety of carry-on computers that many certainly make one difficult to determine a decent and good portable computer to use. In general, in the process of selecting a portable computer, there is no recognized standard to determine the recommended portable computer level. The purpose in this research is to produce predictive values that will be a reference in supporting decisions in determining a portable computer that complies with hardware component criteria and pricing. This study implemented FIS Mamdani models with the analysis stage of the formation of fuzzy sets, application of implications function, rule composition and defuzification. The result of this research is an output of predictive value based on hardware component inputs and prices that will assist the user in supporting decisions in determining the best carry-on computer and according to what they want. Keywords: Predictions, Fuzzy Inference System, Mamdani methods, portable computers, students.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"59 1","pages":"33-47"},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88943004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model Classification Of Nominal Value And The Original Of IDR Money By Applying Evolutionary Neural Network 基于进化神经网络的IDR货币名义价值模型分类及初始化
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-01-20 DOI: 10.31289/jite.v3i2.3284
A. Al-Khowarizmi
Indonesian Rupiah (IDR) banknotes have unique characteristics that distinguish them from one another, both in the form of numbers, zeros and background images. This pattern of each type of banknote will be modeled in order to test the nominal value and authenticity of IDR, so as to be able to distinguish not only IDR banknotes but also other denominations. Evolutionary Neural Network is the development of the concept of evolution to get a neural network (NN) using genetic algorithms (GA). In this paper the application of evolutionary neural networks with less input is able to have a better success rate in object recognition, because the parameters for producing neural networks are far better
印尼盾(IDR)的纸币具有独特的特征,无论是数字、零还是背景图像,都能将它们区分开来。为了检验印尼盾纸币的面值和真伪,我们将对每一种纸币的这种图案进行建模,这样不仅可以区分印尼盾纸币,还可以区分其他面额的纸币。进化神经网络是进化概念的发展,利用遗传算法得到一种神经网络(NN)。在本文中,由于生成神经网络的参数要好得多,输入较少的进化神经网络在目标识别中的应用成功率更高
{"title":"Model Classification Of Nominal Value And The Original Of IDR Money By Applying Evolutionary Neural Network","authors":"A. Al-Khowarizmi","doi":"10.31289/jite.v3i2.3284","DOIUrl":"https://doi.org/10.31289/jite.v3i2.3284","url":null,"abstract":"Indonesian Rupiah (IDR) banknotes have unique characteristics that distinguish them from one another, both in the form of numbers, zeros and background images. This pattern of each type of banknote will be modeled in order to test the nominal value and authenticity of IDR, so as to be able to distinguish not only IDR banknotes but also other denominations. Evolutionary Neural Network is the development of the concept of evolution to get a neural network (NN) using genetic algorithms (GA). In this paper the application of evolutionary neural networks with less input is able to have a better success rate in object recognition, because the parameters for producing neural networks are far better","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"10 1","pages":"258-265"},"PeriodicalIF":1.2,"publicationDate":"2020-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88806652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The e-Business Community Model is Used to Improve Communication Between Businesses by Utilizing Union Principles 电子商务社区模式是利用联合原则来改善企业间的沟通
IF 1.2 Q3 EDUCATION & EDUCATIONAL RESEARCH Pub Date : 2020-01-20 DOI: 10.31289/jite.v3i2.3260
Fauzi Fauzi, A. Al-Khowarizmi, Muhathir Muhathir
Business is an interpersonal and organizational activity that involves the process of selling, purchasing both goods and services with the aim of making a profit. But to get a large profit, it takes many partners who have a high desire to move forward. Information technology provides services for business people so that media information is available as a sign of obstacles. In addition it is necessary to do modeling where the process of communication between businesses running on information technology has a different profit from the business being run. Thus the union has the principle of kinship and has the principle of profitability divided by the amount of contribution given so that the creation of a model in electronic business (e-business) in the hope of having a family principle that is able to provide special profits for businesses other than the profits that run on certain businesses.
商业是一种人际关系和组织活动,涉及以盈利为目的的销售、购买商品和服务的过程。但要想获得丰厚的利润,就需要很多有高度进取心的合作伙伴。信息技术为商业人士提供服务,使媒体信息成为可利用障碍的标志。此外,在运行信息技术的业务之间的通信过程与正在运行的业务具有不同的利润的情况下,有必要进行建模。因此,工会有亲缘关系原则和利润除以贡献金额的原则,以便创建电子商务模式,希望有一个家庭原则,能够为企业提供特殊利润,而不是在某些业务上运行的利润。
{"title":"The e-Business Community Model is Used to Improve Communication Between Businesses by Utilizing Union Principles","authors":"Fauzi Fauzi, A. Al-Khowarizmi, Muhathir Muhathir","doi":"10.31289/jite.v3i2.3260","DOIUrl":"https://doi.org/10.31289/jite.v3i2.3260","url":null,"abstract":"Business is an interpersonal and organizational activity that involves the process of selling, purchasing both goods and services with the aim of making a profit. But to get a large profit, it takes many partners who have a high desire to move forward. Information technology provides services for business people so that media information is available as a sign of obstacles. In addition it is necessary to do modeling where the process of communication between businesses running on information technology has a different profit from the business being run. Thus the union has the principle of kinship and has the principle of profitability divided by the amount of contribution given so that the creation of a model in electronic business (e-business) in the hope of having a family principle that is able to provide special profits for businesses other than the profits that run on certain businesses.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"22 1","pages":"252-257"},"PeriodicalIF":1.2,"publicationDate":"2020-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86424654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Journal of Information Technology Education-Innovations in Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1