GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    LPPM Universitas Nusa Mandiri ; 2018
    In:  Jurnal Pilar Nusa Mandiri Vol. 14, No. 2 ( 2018-09-15), p. 195-
    In: Jurnal Pilar Nusa Mandiri, LPPM Universitas Nusa Mandiri, Vol. 14, No. 2 ( 2018-09-15), p. 195-
    Abstract: Mal XYZ berdiri sejak tahun 2013 di daerah pesisir Jakarta dengan menawarkan kelebihan yang tidak dimiliki mal lain yaitu letaknya yang berhadapan langsung dengan laut atau teluk Jakarta. Tenant-tenant yang berminat membuka gerai atau toko di Mal XYZ juga diseleksi sesuai kebutuhan pengunjung. Penerapan Algoritma Apriori diharapkan dapat membantu dalam memberikan informasi yang berguna untuk peningkatan jumlah pengunjung dan penjualan produk-produk dari tenant-tenant yang ada di Mal XYZ. Implementasi data mining menggunakan Algoritma Apriori dapat membantu pihak management dalam pengambilan keputusan penerimaan calon tenant atau penempatan lokasi tenant di mal. Pada penelitian ini, algoritma apriori berhasil diterapkan dalam pencarian pola belanja pengunjung mal. Hasil yang di peroleh dengan algoritma apriori salah satunya pola kombinasi yang paling tinggi confidence-nya adalah pola jika belanja di tenant kategori General maka akan belanja di tenant kategori Food And Beverage dengan confidence sebesar 50%.
    Type of Medium: Online Resource
    ISSN: 2527-6514 , 1978-1946
    URL: Issue
    Language: Unknown
    Publisher: LPPM Universitas Nusa Mandiri
    Publication Date: 2018
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Kresnamedia Publisher ; 2022
    In:  Jurnal Riset Informatika Vol. 5, No. 1 ( 2022-12-14), p. 593-598
    In: Jurnal Riset Informatika, Kresnamedia Publisher, Vol. 5, No. 1 ( 2022-12-14), p. 593-598
    Abstract: The company produces sales data every day. Over time, the data increases, and the amount becomes very large. The data is only stored without understanding the benefits that exist from these data due to limitations in proper knowledge in analyzing the data, especially transaction data. Sale. To overcome these problems, a study focused on reprocessing sales transaction data in 2018 with a data mining technique approach using the Knowledge Discovery in Database (KDD) concept using the association method and apriori algorithm and a supporting application, namely RapidMiner. This study aims to help companies find customer buying habits or patterns based on 2018 sales transaction data. The results of this study produce 316 association rules where the best rules are generated on record 309 with PRO 889 & PRO 868 PRO 869 rules.
    Type of Medium: Online Resource
    ISSN: 2656-1735 , 2656-1743
    URL: Issue
    Language: Unknown
    Publisher: Kresnamedia Publisher
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    In: Journal of Physics: Conference Series, IOP Publishing, Vol. 1471, No. 1 ( 2020-02-01), p. 012019-
    Abstract: Nowadays, computer networks are widely used to exchange valuable and confidential data information between servers to computers or cellular devices. Access to user control and use of software or hardware as a firewall often experience security problems. Unauthorized access to information through computer networks continues to occur and tends to increase. This study examines the attack detection mechanism by using three data mining algorithms based on particle swarm optimization (PSO), namely PSO-K Nearest Neighbor, PSO-Random Forest, and PSO-Decision Tree in the Canadian Institute for Cybersecurity Dataset (CICIDS2017). The initial experiment showed that the approach using the PSO-RF method was able to produce the highest accuracy of attack detection. Accuracy values generated using the PSO-RF algorithm with a combination of the number of trees and maximal depth = 20 in the CICIDS2017 dataset are intact higher than other proposed algorithms. The highest accuracy of attack detection in the CICIDS2017 dataset is intact, which is 99.76%. In the CICIDS2017 dataset 50% Benign and 50% Attack it turns out that the PSO-RF algorithm with a combination of the number of trees and maximal depth = 20 also gets the highest accuracy value of 99.67%.
    Type of Medium: Online Resource
    ISSN: 1742-6588 , 1742-6596
    Language: Unknown
    Publisher: IOP Publishing
    Publication Date: 2020
    detail.hit.zdb_id: 2166409-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Kresnamedia Publisher ; 2022
    In:  Jurnal Riset Informatika Vol. 4, No. 1 ( 2022-03-07), p. 127-132
    In: Jurnal Riset Informatika, Kresnamedia Publisher, Vol. 4, No. 1 ( 2022-03-07), p. 127-132
    Abstract: Security in computer networks can be vulnerable, this is because we have weaknesses in making security policies, weak computer system configurations, or software bugs. Intrusion detection is a mechanism for securing computer networks by detecting, preventing, and blocking illegal attempts to access confidential information. The IDS mechanism is designed to protect the system and reduce the impact of damage from any attack on a computer network for violating computer security policies including availability, confidentiality, and integrity. Data mining techniques have been used to obtain useful knowledge from the use of IDS datasets. Some IDS datasets that are commonly used are Full KDD, Corrected KDD99, NSL-KDD, 10% KDD, UNSW-NB15, Caida, ADFA Windows, and UNM have been used to get the accuracy rate using the k-Nearest Neighbors algorithm (k-NN). The latest IDS dataset provided by the Canadian Institute of Cybersecurity contains most of the latest attack scenarios named the CICIDS2017 dataset. A preliminary experiment shows that the approach using the k-NN method on the CICIDS2017 dataset successfully produces the highest average value of intrusion detection accuracy than other IDS datasets.
    Type of Medium: Online Resource
    ISSN: 2656-1735 , 2656-1743
    URL: Issue
    Language: Unknown
    Publisher: Kresnamedia Publisher
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    In: Journal of Physics: Conference Series, IOP Publishing, Vol. 1471, No. 1 ( 2020-02-01), p. 012020-
    Abstract: This study aims to develop a tool that can be used to detect obstacles for blind people. This tool also uses the HC-SR04 ultrasonic sensor. The method used in the manufacture of blind assistive prototypes in the form of sticks using Arduino and Ultrasonic Sensors for blind people with the method obtained by hardware design techniques used consists of ATMEGA328 as the main controller, Ultrasonic sensor HS-SRF04 as detecting objects and LM2596 Regulator modules used for lowering the DC voltage level, this study has produced a prototype design stick for blind people using sensor technology to help alert and move blind people who are able to detect objects at a minimum distance of 7 centimeters with output in the form of sound and vibration. The resulting stick has a frame consisting of 0.5-inch PVC material consisting of two parts, the stick rod and the sensor unit.
    Type of Medium: Online Resource
    ISSN: 1742-6588 , 1742-6596
    Language: Unknown
    Publisher: IOP Publishing
    Publication Date: 2020
    detail.hit.zdb_id: 2166409-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...