Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : International Journal Software Engineering and Computer Science (IJSECS)

The Application of Artificial Intelligence for Anomaly Detection in Big Data Systems for Decision-Making Cut Susan Octiva; Dikky Suryadi; Loso Judijanto; Mitranikasih Laia; Dedy Irwan
International Journal Software Engineering and Computer Science (IJSECS) Vol. 4 No. 3 (2024): DECEMBER 2024
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v4i3.3358

Abstract

The development of big data technology has generated huge volumes of diverse data, creating challenges in detecting anomalies that could potentially affect decision-making. This research aims to examine the application of artificial intelligence (AI) in detecting anomalies in big data systems to support faster, more accurate and effective decision-making. The approach used includes the integration of machine learning algorithms, such as classification-based detection, clustering, and deep learning, in identifying abnormal patterns in large datasets. The research method involves real-time dataset-based simulations by measuring the performance of AI models using accuracy, precision, recall, and F1-score metrics. The results show that the application of AI can significantly improve the anomaly detection capability compared to conventional methods, with an average accuracy of 92%.
Analysis of Household Electricity Consumption Patterns Using K-Nearest Neighbor (KNN) Method Cut Susan Octiva; Sultan Hady; Dedy Irwan; T. Irfan Fajri; Novrini Hasti
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 1 (2025): APRIL 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i1.3877

Abstract

The increasing demand for electricity in the household sector poses significant challenges to energy efficiency initiatives and environmental conservation efforts. Examining electricity usage patterns offers a pathway to uncover key determinants that influence consumption levels while formulating more effective strategies for energy management. This study attempts to evaluate electricity consumption patterns in the household sector using the K-Nearest Neighbor (KNN) algorithm. This approach is used to categorize consumption data based on attribute similarities among household units. The findings are expected to encourage more rational electricity usage practices, thereby reducing energy inefficiencies and strengthening efforts to conserve natural resources. Furthermore, the analysis aims to provide actionable insights for households to adopt sustainable habits and for policymakers to design targeted interventions that address peak demand periods and promote the use of energy-efficient technologies. By identifying specific behavioral and technological factors that contribute to high consumption, the results can serve as a basis for tailored programs aimed at minimizing waste and promoting long-term environmental management.
Integrating Zero Trust Architecture with Blockchain Technology to Maintain Data Security in the Cloud T. Irfan Fajri; Handry Eldo; Cut Susan Octiva; Dikky Suryadi; Muhammad Lukman Hakim
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 3 (2025): DECEMBER 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i3.5481

Abstract

Data security concerns have increasingly become a challenge to cloud computing services due to rising incidents of cyberattacks, identity theft, and data manipulation. The perimeter-based security model is ineffective because of vulnerabilities in authentication and access control, thus necessitating an adaptive layered approach. This paper presents attempts to merge Zero Trust Architecture (ZTA) with Blockchain technology as one possible way to ensure confidentiality, integrity, and availability of data in cloud environments. Research methodology comprises a detailed review of related literature, system architecture analysis, and simulation of the conceptual merger using encryption protocols and smart contracts. Results revealed that ZTA significantly reduces the opportunities for unauthorized access through multi-layered verification and least privilege principles while Blockchain provides a decentralized transparent immutable method for recording transactions on data. The hybrid will enhance security substantially against breaches from external attackers and insiders with an already established verifiable audit trail. This paper concludes that such a merger could create a stronger model—one that is more measurable—and sustainable for securing today's cloud infrastructure.