Jurnal Informatika Jurnal Pengembangan IT最新文献

筛选
英文 中文
Data Mining berbasis Nearest Neighbor dan Seleksi Fitur untuk Deteksi Kanker Payudara 基于Nearest的环境数据挖掘和为乳腺癌检测提供的特性选择
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-05-28 DOI: 10.30591/jpit.v8i2.4994
Yohanes Setiawan
{"title":"Data Mining berbasis Nearest Neighbor dan Seleksi Fitur untuk Deteksi Kanker Payudara","authors":"Yohanes Setiawan","doi":"10.30591/jpit.v8i2.4994","DOIUrl":"https://doi.org/10.30591/jpit.v8i2.4994","url":null,"abstract":"Detecting breast cancer in early stage is not straightforward. This happens because biopsy test requires time to determine whether the type is benign or malignant. Data mining algorithm has been widely used to automate diagnosis of a disease. One of popular algorithms is nearest neighbor based because of its simplicity and low computation. However, too many features can cause low accuracy in nearest neighbor based models. In this research, nearest neighbor based with feature selection is developed to detect breast cancer. Conventional k-Nearest Neighbor (KNN) and Multi Local Means k-Harmonic Nearest Neighbor have been chosen as nearest neighbor based models to experiment. The feature selection method used in this study is filter based, namely Correlation based, Information Gain, and ReliefF. The experimental result shows that the highest recall metric of MLM-KHNN and Information Gain is 94% with 5 features. In brief, MLM-KHNN algorithm with Information Gain can increase the recall of the prediction of breast cancer compared with the conventional K-NN algorithm and have been deployed into website using Streamlit such that the model can be used to detect breast cancer from chosen Wisconsin dataset features.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135895767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perangkingan Pegawai Untuk Menentukan Penerima Bonus Akhir Tahun Menggunakan Teknik ELECTRE Pada BPR Rasyid 在 BPR Rasyid 使用 ELECTRE 技术对员工进行排名,以确定年终奖金获得者
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-05-25 DOI: 10.30591/jpit.v8i2.4882
Tb Ai Munandar
{"title":"Perangkingan Pegawai Untuk Menentukan Penerima Bonus Akhir Tahun Menggunakan Teknik ELECTRE Pada BPR Rasyid","authors":"Tb Ai Munandar","doi":"10.30591/jpit.v8i2.4882","DOIUrl":"https://doi.org/10.30591/jpit.v8i2.4882","url":null,"abstract":"Employee rankings can be done for various needs, one of which relates to year-end bonuses. So far, the awarding of year-end bonuses to research objects has only relied on one criterion, namely targets and achievements. In fact, there are many other indicators that can be assessed, such as attendance, discipline, communication style, cooperation, and initiative. This study aims to provide an alternative computation-based employee ranking method with multi-attribute decision making (MADM). The Elimination and Choice Translation of Reality (ELECTRE) technique is used in research to rank employee data based on their attribute values. The results of the study show that, of the ten employees assessed, four alternatives (employees) are recommended to be selected based on the results of a comparison of the dominant aggregate values. In this study, it can also be seen that alternative 6 (Alt-6) is the strongest alternative to be recommended for selection. Because alternative 6 (Alt-6) is not only better than alternatives 1, 4, 8, 9, and 10, but also better than alternative 3 (Alt-3) and alternative 4 (Alt-4). The order of the second, third, and fourth alternatives, respectively, are alternatives 5, 7, and 8. The recommendations of these four employees can be used as decision-making material for policymakers, given the need to award year-end bonuses.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS) 使用四节点星际文件系统(IPFS)的网络共享系统设计与分析
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-05-20 DOI: 10.30591/jpit.v8i2.5141
Tony Haryanto, Kalamullah Ramli
{"title":"Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS)","authors":"Tony Haryanto, Kalamullah Ramli","doi":"10.30591/jpit.v8i2.5141","DOIUrl":"https://doi.org/10.30591/jpit.v8i2.5141","url":null,"abstract":"Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a threat to distributed denial-of-service (DDoS) attacks which can result in system failure and cause single point of failure as well as man-in-the-middle (MITM) attacks which can result in modification of information and theft of exchanged information. This threat results in a lack of user confidence in the confidentiality, integrity, and availability of information. This study proposes the design of a secure cybersecurity information sharing (CyberShare) system using a private interplanetary file system (IPFS) network as a decentralized information storage. Unlike centralized storage which only has a single-node, CyberShare systems use four-node IPFS interconnected with swarm keys as authentication keys. This system allows users to store and share information from the sender to the recipient of information, avoiding dependence on a central server and reducing server load. The results of the analysis show that the proposed CyberShare system can guarantee the confidentiality, integrity, and availability of cyber security information. CyberShare systems can enhance the security of the information exchanged so that organizations can safely share and utilize cybersecurity information.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135543488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SISTEM INFORMASI MONITORING KOMODITAS HARGA PANGAN BERBASIS WEB DAB ANDROID 基于WEB DAB的ANDROID食品价格信息监测系统
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-03-23 DOI: 10.37639/jti.v13i3.339
Syuryadi Syuryadi, Nurani Nurani
{"title":"SISTEM INFORMASI MONITORING KOMODITAS HARGA PANGAN BERBASIS WEB DAB ANDROID","authors":"Syuryadi Syuryadi, Nurani Nurani","doi":"10.37639/jti.v13i3.339","DOIUrl":"https://doi.org/10.37639/jti.v13i3.339","url":null,"abstract":"Dengan perkembangan zaman dan teknologi yang begitu pesat, banyak manusia yang tidak dapat dipisahkan dari teknologi. Hal ini menyebabkan banyaknya instansi pemerintah yang memanfaatkan teknologi khususnya di bidang Information Technology (IT) dalam menjalankan rancang bangun aplikasi sistem informasi monitoring komoditas pangan dengan menggunakan web dan android client. Dinas Pertanian Kabupaten Gowa Provinsi Sulawesi Selatan merupakan sebuah Dinas yang bertugas untuk mengatur dan mengawasi jalannya arus komoditas pangan di Kab. Gowa. Pengembangan sistem yang digunakan yaitu implementasi pembuatan aplikasi sistem informasi monitoring komoditas pangan dengan menggunakan bahasa pemograman HTML,PHP, dan MySQL sebagai pengolah basis data dan memprediksikan harga pangan menggunakan metode naïve bayes. Dalam perancangan sistem menggunakan UML (usecase, class diagram, sequence diagram dan activity diagram. Pengumpulan data baik secara offline dan online dilakukan juga untuk memperkaya data sekunder dan primer. Dalam proses pembuatan aplikasi menggunakan framework codeigniter (html,css dan php). Ketika program tidak berjalan maka dilakukan audit pada pembuatan aplikasi dan pengumpulan datanya.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77132132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI ALGORITMA SMART PADA SELEKSI PENERIMAAN SISWA BARU SMA NEGERI 13 AMBON 智能算法在AMBON 13国高中新学生入学选择上的应用
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-03-15 DOI: 10.37639/jti.v13i3.336
Figur Muhammad, M. Amar, M. Agus
{"title":"IMPLEMENTASI ALGORITMA SMART PADA SELEKSI PENERIMAAN SISWA BARU SMA NEGERI 13 AMBON","authors":"Figur Muhammad, M. Amar, M. Agus","doi":"10.37639/jti.v13i3.336","DOIUrl":"https://doi.org/10.37639/jti.v13i3.336","url":null,"abstract":"Penerimaan siswa baru merupakan salah satu proses yang ada di instansi pendidikan seperti sekolah yang berguna untuk menyaring calon siswa yang terpilih sesuai kriteria yang ditentukan oleh sekolah tersebut untuk menjadi siswa didiknya. Pada umumnya proses penerimaan siswa baru dilakukan melalui tahapan pendaftaran, tes seleksi, dan pengumuman penerimaan siswa. Penelitian ini menggunakan metode SMART (Simple Multi Attribute Rating Technique), karena metode ini mampu menyelesaikan masalah dengan multikriteria. Sistem ini dibangun menggunakan aplikasi visual basic dan MySql. Berdasarkan hasilpenelitian yang dilakukan, Nilai akhir Algoritma SMART (Simple Multi Atribute Rating Tachnique) adalah 1/2 dari nilai rating yang digunakan pada umumnya","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84972227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analisis Crowdsourcing Dari Media Sosial Untuk Sumber Data Alternatif Kajian Bentang Lahan 众包分析社交媒体,为景观研究提供替代数据源
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-01-31 DOI: 10.30591/jpit.v8i1.5112
Budi Fajar Supriyanto
{"title":"Analisis Crowdsourcing Dari Media Sosial Untuk Sumber Data Alternatif Kajian Bentang Lahan","authors":"Budi Fajar Supriyanto","doi":"10.30591/jpit.v8i1.5112","DOIUrl":"https://doi.org/10.30591/jpit.v8i1.5112","url":null,"abstract":"Peningkatan jumlah pengguna media sosial dari waktu ke waktu memberikan potensi baru dalam akuisisi data crowdsourcing. Proses akuisisi data tidak lagi membutuhkan banyak biaya dan waktu, karena crowdsourcing dapat digali dengan mudah bahkan tanpa biaya. Kajian ini mengangkat permasalahan apakah data crowdsourcing dari media sosial dapat dijadikan data alternatif dalam kajian geo-informatika. Proses akuisisi data dilakukan dari unggahan pengguna di media sosial. Unggahan menyertakan titik lokasi dan teks pada keterangan. Data yang diperoleh kemudian diolah untuk mengetahui titik lanskap dan kecenderungan penggunaan bahasa. Penggunaan bahasa dianalisis dengan metode RQDA dan diperoleh hasil 5,37% berbicara tentang bentang alam. Sedangkan titik lokasi media sosial dibandingkan dengan data DEMNAS memiliki skor akurasi 437,8 yang divalidasi dengan metode RMSE dan tidak direpresentasikan mendekati 1,0. Disarankan bahwa data media sosial masih jauh untuk dapat menjadi alternatif sumber data lanskap.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135441650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISIS PERFORMANSI SUPPLY CHAIN PADA PRODUK SEPATU FLAT SHOES MENGGUNAKAN MODEL SCOR 根据SCOR模型,平鞋产品上的表演链分析
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-01-30 DOI: 10.30591/jpit.v8i1.4766
M Yoka Fathoni, M Nishom, Dega Surono Wibowo
{"title":"ANALISIS PERFORMANSI SUPPLY CHAIN PADA PRODUK SEPATU FLAT SHOES MENGGUNAKAN MODEL SCOR","authors":"M Yoka Fathoni, M Nishom, Dega Surono Wibowo","doi":"10.30591/jpit.v8i1.4766","DOIUrl":"https://doi.org/10.30591/jpit.v8i1.4766","url":null,"abstract":"The performance measure of a service cannot be in form and does not result in ownership. Service itself is a form of activity carried out by one or more people, and also is agility (intangible and affected by previous sales). So the services purchased by customers cannot be counted, measured or stored to determine the quality of their services. One of the shoe sales industries is Toko XYZ, this shoe store is one of the largest brands in the archipelago. The prices offered on the national and international market are quite cheap. In order to improve a strategy so that many consumers visit XYZ shoe stores, and for XYZ it is possible to achieve the expected targets with integrated marketing. Data collection in this study consists of 2 steps, namely preparation, this stage is carried out before conducting research such as looking for references on the internet, theoretical foundations that support research such as SCOR model theory and journals. Furthermore, with the contents of the questionnaire compiled to represent the dimensions of service performance quality. The conclusion of the study is that the statement attributes expected by the customer through the SCOR Model method are positive.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135600017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentimen Analisis Pandangan Masyarakat Terhadap Vaksinasi Covid 19 Menggunakan K-Nearest Neighbors 利用 K 最近邻法对公众对 Covid 19 疫苗接种的看法进行情感分析
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-01-27 DOI: 10.30591/jpit.v8i1.4759
Dyah Apriliani, Ardi Susanto, Muhammad Fikri Hidayattullah, Ginanjar Wiro Sasmito
{"title":"Sentimen Analisis Pandangan Masyarakat Terhadap Vaksinasi Covid 19 Menggunakan K-Nearest Neighbors","authors":"Dyah Apriliani, Ardi Susanto, Muhammad Fikri Hidayattullah, Ginanjar Wiro Sasmito","doi":"10.30591/jpit.v8i1.4759","DOIUrl":"https://doi.org/10.30591/jpit.v8i1.4759","url":null,"abstract":"Abstrak - Pandemi covid 19 yang terjadi sangat meresahkan masyarakat. Banyak masyarakat yang terpapar maupun kehilangan keluarga mereka karena virus ini. Untuk mencegah semakin menyebarnya virus covid 19, pemerintah menyelenggarakan program vaksinasi. Program vaksinasi yang dilakukan menuai pro dan kontra dari masyarakat. Berdasarkan permasalahan tersebut, maka dalam penelitian ini akan melakukan proses klasifikasi pandangan masyarakat terhadap vaksinasi Covid 19. Data penelitian yang digunakan diambil dari twitter sebanyak 2241 data. Data akan diklasifikasikan menjadi 2 kelas yaitu positif dan negatif. Proses klasifikasi akan dilakukan dengan menggunakan metode K-Nearest Neighbors (KNN). Tahapan pertama yang dilakukan adalah pengambilan data dari twitter, pelabelan data, preprocesing data di phyton, pembobotan TF-IDF, pembuatan model, pengujian model dan evaluasi model. Dari penelitian ini didapatkan akurasi terbaik sebesar 79,25% dengan menggunakan parameter K-Fold 10 dan KNN 5.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135839384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded Wids Kismet Sebagai Perangkat Deteksi Serangan Data Link Layer Wi-Fi Access Point 嵌入式 Kismet Wids 作为 Wi-Fi 接入点数据链路层攻击检测设备
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-01-26 DOI: 10.30591/jpit.v8i1.4551
Rizky Fachrurozy, Muhammad Yusuf Bambang Setiadji, Dimas Febriyan Priambodo
{"title":"Embedded Wids Kismet Sebagai Perangkat Deteksi Serangan Data Link Layer Wi-Fi Access Point","authors":"Rizky Fachrurozy, Muhammad Yusuf Bambang Setiadji, Dimas Febriyan Priambodo","doi":"10.30591/jpit.v8i1.4551","DOIUrl":"https://doi.org/10.30591/jpit.v8i1.4551","url":null,"abstract":"The rapid development of wireless network technology has an impact with a significant increase of users. Wi-Fi is one of the wireless technologies that is currently used widely by humans as a medium of transmission to exchange information. The increasing in the number of users is directly proportional to the increase the risk of crime occurring. In this case an attack on a Wi-Fi network aimed at taking certain advantage of the user or it’s victim was done by threatening aspects of information security. Wireless Intrusion Detection System (WIDS) is a tool used to detect intrusions that occur against wireless network technology, one of it is Wi-Fi into the form of logs. Kismet is one of the wids that is free and opensource with complete WiFi attack detection capability. The implementation of WIDS Kismet applied to Raspberry Pi 4 was shown as an alternative wids device that has a low cost for use in small Wi-Fi network environments such as home networks or small enterprise. The analysis is done by calculating the performance of accuracy, precision, recall, and f-measure values from the implementation results using confusion matrix method. The result of the calculation obtained by the highest value for each calculated performance with 99.83% accuracy, 97.96% precision, 100% recall, and 98.9% fmeasure. The calculation aims to provide information that can be utilized for users who want to do a similar implementation and use it to detect Wi-Fi networks.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135998159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deteksi Malware menggunakan Metode Stacking berbasis Ensemble 使用基于套装的组装方法检测恶意软件
Jurnal Informatika Jurnal Pengembangan IT Pub Date : 2023-01-26 DOI: 10.30591/jpit.v8i1.4606
Fauzi Adi Rafrastara, Catur Supriyanto, Cinantya Paramita, Yani Parti Astuti
{"title":"Deteksi Malware menggunakan Metode Stacking berbasis Ensemble","authors":"Fauzi Adi Rafrastara, Catur Supriyanto, Cinantya Paramita, Yani Parti Astuti","doi":"10.30591/jpit.v8i1.4606","DOIUrl":"https://doi.org/10.30591/jpit.v8i1.4606","url":null,"abstract":"Serangan malware kian hari kian memprihatinkan. Evolusi malware yang cepat dan semakin destruktif menimbulkan kekhawatiran bagi banyak pihak. Oleh karena itu, deteksi malware yang efektif sangat dibutuhkan. Data mining memainkan peran yang krusial dalam bidang ini, mengingat algoritma-algoritma yang ada pada data mining bisa dilatih hingga menghasilkan akurasi yang paling tinggi. Untuk mengklasifikasi suatu file, apakah tergolong malware atau tidak, dalam penelitian ini metode stacking digunakan karena dapat meningkatkan akurasi jika dibandingkan dengan algoritma-algoritma klasifikasi konvensional. Empat Algoritma dilibatkan dalam eksperimen yang dilakukan, yaitu: Neural Network, Random Forest, kNN, dan Logistic Regression. Tiga algoritma pertama digunakan sebagai classifier pada level 0, sementara itu Logistic Regression digunakan classifier pada level 1 (meta classifier). Dengan kombinasi 4 algoritma tersebut, akurasi yang diperoleh adalah sebesar 98.7%, dan akurasi tersebut merupakan yang paling tinggi jika dibandingkan dengan masing-masing algoritma jika dieksekusi secara individual.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135998161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信