cover
Contact Name
Aji Prasetya Wibawa
Contact Email
aji.prasetya.ft@um.ac.id
Phone
+62818539333
Journal Mail Official
keds.journal@um.ac.id
Editorial Address
Gedung G4. Lantai 1 Jl. Semarang No.5, Malang
Location
Kota malang,
Jawa timur
INDONESIA
Knowledge Engineering and Data Science
ISSN : -     EISSN : 25974637     DOI : http://dx.doi.org/10.17977
Knowledge Engineering and Data Science (2597-4637), KEDS, brings together researchers, industry practitioners, and potential users, to promote collaborations, exchange ideas and practices, discuss new opportunities, and investigate analytics frameworks on data-driven and knowledge base systems.
Articles 81 Documents
Capital Letter Pattern Recognition in Text to Speech by Way of Perceptron Algorithm Novan Wijaya
Knowledge Engineering and Data Science Vol 1, No 1 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (538.302 KB) | DOI: 10.17977/um018v1i12018p26-32

Abstract

Computer vision is a data transformation retrieved or generated from webcam into another form in means of determining decision. All kinds of transformations are carried through to attain specific aims. One of the supporting techniques in implementing computer vision on a system is digital image processing as the objective of digital image processing is to transform digital-formatted picture so that it can be processed in computer. Computer vision and digital image processing can be implemented in a system of capital letter introduction and real-time handwriting reading on a whiteboard supported by artificial neural network mode “perceptron algorithm” used as a learning technique for the system to learn and recognize the letters. The way it works is captured in letter pattern using a webcam and generates a continuous image that is transformed into digital image form and processed using several techniques such as grayscale image, thresholding, and cropping image.
SQL Logic Error Detection by Using Start End Mid Algorithm Jevri Tri Ardiansah; Aji Prasetya Wibawa; Triyanna Widyaningtyas; Okazaki Yasuhisa
Knowledge Engineering and Data Science Vol 1, No 1 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (608.845 KB) | DOI: 10.17977/um018v1i12018p33-38

Abstract

Data base is an important part of a system and it stores data to be manipulated. A language called SQL (Structured Query Language) is used for manipulating those data to make needed information. There are two types of error which make SQL more difficult in practical implementation. They are syntax error and logic error. The difference between them is that syntax error can be detected by compiler so it is easy to learn by its warning. But compiler does not show error warning if logical error was occurred. It makes logic error is more difficult to understand than syntax error. To help data base's user to learn SQL in practical implementation, web based SQL compiler that be able to detect syntax and logic error is developed by using Start End Mid algorithm.
Network Traffic Time Series Performance Analysis Using Statistical Methods Purnawansyah Purnawansyah; Haviluddin Haviluddin; Rayner Alfred; Achmad Fanany Onnilita Gaffar
Knowledge Engineering and Data Science Vol 1, No 1 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.856 KB) | DOI: 10.17977/um018v1i12018p1-7

Abstract

This paper presents an approach for a network traffic characterization by using statistical techniques. These techniques are obtained using the decomposition, winter’s exponential smoothing and autoregressive integrated moving average (ARIMA). In this paper, decomposition and winter’s exponential smoothing techniques were used additive and multiplicative model. Then, ARIMA based-on Box-Jenkins methodology. The results of ARIMA (1,0,2) was shown the best model that can be used to the internet network traffic forecasting.  
Decision Support System Determination of Main Work Unit In WPP-711 Using Fuzzy TOPSIS Hozairi Hozairi; Yaser Krisnafi
Knowledge Engineering and Data Science Vol 1, No 1 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (636.672 KB) | DOI: 10.17977/um018v1i12018p8-19

Abstract

Decision-making to determine the working units for being prioritized to be developed in order to improve fishery monitoring in WPP-711 is imperative. The Ministry of Maritime Affairs and Fisheries should make no mismatch decision-making through long-term calculation and analysis. The problem of determining the priority of working units is a complex problem, thus it is required to find an appropriate method to avoid a missmatch decision. TOPSIS is a decision-making method capable of solving multi-criteria problems. TOPSIS working principle determines the alternative by considering the shortest distance from the positive ideal alternative and furthest from the ideal negative solution. To improve the performance of TOPSIS, this research is integrated with Fuzzy logic with the aim of giving the right numeric value preference. From the test of 11 alternatives of 6 criteria, the priority of development of fishery monitoring in FMA 711 is: Pontianak Working Unit= 0.917, Batam Working Unit = 0.791 Natuna Working Unit = 0.685 and Tanjung Pinang Working Unit = 0.607. Furthermore,  the ranking result will be used as the basis for determining the strategy in increasing the monitoring of WPP-711 to minimize State losses due to the illegal fishing within Indonesia’s WPP-711 Regions.
Market Basket Analysis to Identify Customer Behaviours by Way of Transaction Data Fachrul Kurniawan; Binti Umayah; Jihad Hammad; Supeno Mardi Susiki Nugroho; Mochammad Hariadi
Knowledge Engineering and Data Science Vol 1, No 1 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.654 KB) | DOI: 10.17977/um018v1i12018p20-25

Abstract

Transaction data is a set of recording data result in connections with sales-purchase activities at a particular company. In these recent years, transaction data have been prevalently used as research objects in means of discovering new information. One of the possible attempts is to design an application that can be used to analyze the existing transaction data. That application has the quality of market basket analysis. In addition, the application is designed to be desktop-based whose components are able to process as well as re-log the existing transaction data. The used method in designing this application is by way of following the existing steps on data mining technique. The trial result showed that the development and the implementation of market basket analysis application through association rule method using apriori algorithm could work well. With the means of confidence value of 46.69% and support value of 1.78%, and the amount of the generated rule was 30 rules.
Change Vulnerability Forecasting Using Deep Learning Algorithm for Southeast Asia Amelia Ritahani Ismail; Nur ‘Atikah Binti Mohd Ali; Junaida Sulaiman
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.496 KB) | DOI: 10.17977/um018v1i22018p74-78

Abstract

Climate change is expected to change people’s livelihood in significant ways. Several vulnerability factors and readiness factors used for measuring the prediction index of that particular country on how vulnerable of a country towards global change. Primary data was collected from University of Notre Dame Global Adaptation Index (ND-GAIN). The data has been trained for the forecasting purpose with support from the validated statistical analysis. The summary of the predicted index is visualized using machine learning tools. The results developed the correlation between vulnerability and readiness factors and shows the stability of the country towards climate change. The framework is applied to synthesize findings from Prediction index studies in South East Asia in dealing with vulnerability to climate change.
Signature Pattern Recognition using Kohonen Network Nadia Roosmalita Sari; Moh. Zoqi Sarwani; Yudha Alif Aulia; Wayan Firdaus Mahmudy
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (473.828 KB) | DOI: 10.17977/um018v1i22018p39-45

Abstract

A signature is a special form of handwriting that used for human identification process. The current identification process is extremely ineffective. People have to manually compare signatures with the previously stored data. This study proposed SOM Kohonen algorithm as the method of signature pattern recognition. This method has able to visualize high-dimensional data. The image processing method is used in this study in pre-processing data phase. The accuracy of SOM Kohonen was 70 %, indicated the method used was good enough for pattern recognition.
Digit Classification of Majapahit Relic Inscription using GLCM-SVM Tri Septianto; Endang Setyati; Joan Santoso
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.878 KB) | DOI: 10.17977/um018v1i22018p46-54

Abstract

A higher level of image processing usually contains some kind of classification or recognition. Digit classification is an important subfield in handwritten recognition. Handwritten digits are characterized by large variations so template matching, in general, is inefficient and low in accuracy. In this paper, we propose the classification of the digit of the year of a relic inscription in the Kingdom of Majapahit using Support Vector Machine (SVM). This method is able to cope with very large feature dimensions and without reducing existing features extraction. While the method used for feature extraction using the Gray-Level Co-Occurrence Matrix (GLCM), special for texture analysis. This experiment is divided into 10 classification class, namely: class 1, 2, 3, 4, 5, 6, 7, 8, 9, and class 0. Each class is tested with 10 data so that the whole data testing are 100 data number year. The use of GLCM and SVM methods have obtained an average of classification results about 77 %.
Energy Efficiency Metrics of University Data Centers Leonel Hernandez; Genett Jimenez; Piedad Marchena
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.951 KB) | DOI: 10.17977/um018v1i22018p64-73

Abstract

The data centers are fundamental pieces in the network and computing infrastructure, and evidently today more than ever they are relevant. Since they support the processing, analysis, assurance of the data generated in the network and by the applications in the cloud, which every day increases its volume thanks to technologies such as Internet of Things, Virtualization, and cloud computing, among others. Precisely the management of this large volume of information makes the data centers consume a lot of energy, generating great concern to owners and administrators. Green Data Centers offer a solution to this problem, reducing the impact produced by the data centers in the environment, through the monitoring and control of these. The metrics are the tools that allow us to measure in our case the energy efficiency of the data center and evaluate if it is friendly to the environment. These metrics will be applied to the data centers of the ITSA University Institution, Barranquilla and Soledad campus, and the analysis of these will be carried out. In previous research, the most common metric (PUE) was analyzed to measure the efficiency of the data centers, to verify if the University's data center is friendly to the environment. It is planned to extend this study by carrying out an analysis of several metrics to conclude which is the most efficient and which allows defining the guidelines to update or convert the data center in a friendly environment. 
Selection of Marine Security Policy using Fuzzy-AHP TOPSIS Hybrid Approach Hozairi Hozairi; Buhari Buhari; Heru Lumaksono; Marcus Tukan
Knowledge Engineering and Data Science Vol 2, No 1 (2019)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1367.95 KB) | DOI: 10.17977/um018v2i12019p19-30

Abstract

The research was focused on the integration of Fuzzy set theory with Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) to choose the optimum maritime security policy to achieve Indonesia recognition as the world's maritime axis. The method used is AHP with fuzzy based enhancement. Here, the weight of each criterion is calculated to overcome the criticism of the scale of unbalanced rating, uncertainty, and inaccuracy in the pairwise of comparison process. The best recommendation for Indonesian maritime policies is multi task single agency which is greatly infuenced by several factors such as technology, regulations, infrastructure, economic, politic, and socio-culture.  The finding shows that the hybrid approach is able to produce the best recommendation for Indonesian maritime security policy.