cover
Contact Name
Aji Prasetya Wibawa
Contact Email
keds.journal@um.ac.id
Phone
+62818539333
Journal Mail Official
keds.journal@um.ac.id
Editorial Address
Universitas Negeri Malang Semarang St. No. 5, Malang, East Java, 65145, Indonesia
Location
Kota malang,
Jawa timur
INDONESIA
Knowledge Engineering and Data Science
ISSN : -     EISSN : 25974637     DOI : 10.17977/um018
KEDS, brings together researchers, industry practitioners, and potential users, to promote collaborations, exchange ideas and practices, discuss new opportunities, and investigate analytics frameworks on data-driven and knowledge base systems.
Articles 5 Documents
Search results for , issue "Vol 1, No 2 (2018)" : 5 Documents clear
Change Vulnerability Forecasting Using Deep Learning Algorithm for Southeast Asia Amelia Ritahani Ismail; Nur ‘Atikah Binti Mohd Ali; Junaida Sulaiman
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.496 KB) | DOI: 10.17977/um018v1i22018p74-78

Abstract

Climate change is expected to change people’s livelihood in significant ways. Several vulnerability factors and readiness factors used for measuring the prediction index of that particular country on how vulnerable of a country towards global change. Primary data was collected from University of Notre Dame Global Adaptation Index (ND-GAIN). The data has been trained for the forecasting purpose with support from the validated statistical analysis. The summary of the predicted index is visualized using machine learning tools. The results developed the correlation between vulnerability and readiness factors and shows the stability of the country towards climate change. The framework is applied to synthesize findings from Prediction index studies in South East Asia in dealing with vulnerability to climate change.
Signature Pattern Recognition using Kohonen Network Nadia Roosmalita Sari; Moh. Zoqi Sarwani; Yudha Alif Aulia; Wayan Firdaus Mahmudy
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (473.828 KB) | DOI: 10.17977/um018v1i22018p39-45

Abstract

A signature is a special form of handwriting that used for human identification process. The current identification process is extremely ineffective. People have to manually compare signatures with the previously stored data. This study proposed SOM Kohonen algorithm as the method of signature pattern recognition. This method has able to visualize high-dimensional data. The image processing method is used in this study in pre-processing data phase. The accuracy of SOM Kohonen was 70 %, indicated the method used was good enough for pattern recognition.
Digit Classification of Majapahit Relic Inscription using GLCM-SVM Tri Septianto; Endang Setyati; Joan Santoso
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1094.878 KB) | DOI: 10.17977/um018v1i22018p46-54

Abstract

A higher level of image processing usually contains some kind of classification or recognition. Digit classification is an important subfield in handwritten recognition. Handwritten digits are characterized by large variations so template matching, in general, is inefficient and low in accuracy. In this paper, we propose the classification of the digit of the year of a relic inscription in the Kingdom of Majapahit using Support Vector Machine (SVM). This method is able to cope with very large feature dimensions and without reducing existing features extraction. While the method used for feature extraction using the Gray-Level Co-Occurrence Matrix (GLCM), special for texture analysis. This experiment is divided into 10 classification class, namely: class 1, 2, 3, 4, 5, 6, 7, 8, 9, and class 0. Each class is tested with 10 data so that the whole data testing are 100 data number year. The use of GLCM and SVM methods have obtained an average of classification results about 77 %.
Energy Efficiency Metrics of University Data Centers Leonel Hernandez; Genett Jimenez; Piedad Marchena
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.951 KB) | DOI: 10.17977/um018v1i22018p64-73

Abstract

The data centers are fundamental pieces in the network and computing infrastructure, and evidently today more than ever they are relevant. Since they support the processing, analysis, assurance of the data generated in the network and by the applications in the cloud, which every day increases its volume thanks to technologies such as Internet of Things, Virtualization, and cloud computing, among others. Precisely the management of this large volume of information makes the data centers consume a lot of energy, generating great concern to owners and administrators. Green Data Centers offer a solution to this problem, reducing the impact produced by the data centers in the environment, through the monitoring and control of these. The metrics are the tools that allow us to measure in our case the energy efficiency of the data center and evaluate if it is friendly to the environment. These metrics will be applied to the data centers of the ITSA University Institution, Barranquilla and Soledad campus, and the analysis of these will be carried out. In previous research, the most common metric (PUE) was analyzed to measure the efficiency of the data centers, to verify if the University's data center is friendly to the environment. It is planned to extend this study by carrying out an analysis of several metrics to conclude which is the most efficient and which allows defining the guidelines to update or convert the data center in a friendly environment. 
Profiling and Identifying Individual Users by Their Command Line Usage and Writing Style Darusalam Darusalam; Helen Ashman
Knowledge Engineering and Data Science Vol 1, No 2 (2018)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (60.797 KB) | DOI: 10.17977/um018v1i22018p55-63

Abstract

Profiling and identifying individual users is an approach for intrusion detection in a computer system. User profiles are important in many applications since they record highly user-specific information - profiles are basically built to record information about users or for users to share experiences with each other. This research extends previous research on re-authenticating users with their user profiles. This research focuses on the potential to add psychometric user characteristics into the user model so as to be able to detect unauthorized users who may be masquerading as a genuine user. There are five participants involved in the investigation for formal language user identification. Additionally, we analyze the natural language of two famous writers, Jane Austen & William Shakespeare, in their written works to determine if the same principles can be applied to natural language use. This research used the n-gram analysis method for characterizing user’s style, and can potentially provide accurate user identification. As a result, n-gram analysis of a user's typed inputs offers another method for intrusion detection as it may be able to both positively and negatively identify users. The contribution of this research is to assess the use of a user’s writing styles in both formal language and natural language as a user profile characteristic that could enable intrusion detection where intruders masquerade as real users.

Page 1 of 1 | Total Record : 5