cover
Contact Name
Husni Teja Sukmana
Contact Email
husni@bright-journal.org
Phone
+62895422720524
Journal Mail Official
jads@bright-journal.org
Editorial Address
Gedung FST UIN Jakarta, Jl. Lkr. Kampus UIN, Cemp. Putih, Kec. Ciputat Tim., Kota Tangerang Selatan, Banten 15412
Location
Kota adm. jakarta pusat,
Dki jakarta
INDONESIA
Journal of Applied Data Sciences
Published by Bright Publisher
ISSN : -     EISSN : 27236471     DOI : doi.org/10.47738/jads
One of the current hot topics in science is data: how can datasets be used in scientific and scholarly research in a more reliable, citable and accountable way? Data is of paramount importance to scientific progress, yet most research data remains private. Enhancing the transparency of the processes applied to collect, treat and analyze data will help to render scientific research results reproducible and thus more accountable. The datasets itself should also be accessible to other researchers, so that research publications, dataset descriptions, and the actual datasets can be linked. The journal Data provides a forum to publish methodical papers on processes applied to data collection, treatment and analysis, as well as for data descriptors publishing descriptions of a linked dataset.
Articles 463 Documents
Research on the Technology of Computer Network Security Protection Peng, Yue
Journal of Applied Data Sciences Vol 4, No 1: JANUARY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i1.80

Abstract

The continuous deepening of the number and importance of sensitive and key info stored in computer network system has brought severe challenges to the computer cyber security protection tech. It is urgent to upgrade the cyber security protection, so that it can serve and match the healthy development of computer network. Based on this, this paper first analyses the concept and connotation of computer cyber security, then studies the main content of computer cyber security protection tech, and finally gives the computer cyber security protection measures.
Solar Maximum Power Point Tracking Algorithm Based on Wavelet Neural Network He, Weiling
Journal of Applied Data Sciences Vol 4, No 1: JANUARY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i1.74

Abstract

With the development of human civilization, the shortage of resources and environmental pollution are increasing. Renewable energy is the only way to solve the problem of harmonious coexistence between human civilization and environment. More and more of them have come into our lives to reduce the burden of the earth and benefit mankind. Nowadays, due to the increasing gap of traditional power supply, solar energy has become a mainstream renewable energy, more and more applications, to provide us with green energy and improve our lives. The research on the application of solar energy system is of great academic value. This paper mainly studies the solar maximum power point tracking (MPPT) algorithm based on wavelet neural network (WNN). This paper analyzes several common maximum power tracking control methods, describes the structure design of WNN maximum power tracking control algorithm, and describes the structure and working principle of photovoltaic cells. In this paper, the output power of MPPT mode is analyzed and compared by simulating the use of solar photovoltaic system. In the meantime, the output voltage of solar charging panel in the charging process is studied. The experimental results show that the output power of the power supply in MPPT mode is kept at 0.2, and the output power of the solar panel is improved at every moment with the change of the external environment. At 9 o'clock, the output voltage of the solar panel is 3.6, and at 11 o'clock, the output voltage is 4.11.
Market Basket Analysis Using FP-Growth Algorithm to Design Marketing Strategy by Determining Consumer Purchasing Patterns Saputra, Jeffri Prayitno Bangkit; Rahayu, Silvia Anggun; Hariguna, Taqwa
Journal of Applied Data Sciences Vol 4, No 1: JANUARY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i1.83

Abstract

The development and competition that exists in the business world today leads every manager or company to be more dexterous in making marketing strategies to increase sales. Various things are done to keep up with existing market competition, such as analyzing customer purchase transaction data to serve as a policy determination and decision-making system in making marketing strategies. In determining marketing strategies, it can be done by taking transaction data to see existing purchase or transaction patterns. Market Basket Analysis is part of a data mining method that uses the FP-Growth algorithm technique to find out associated products. This research uses data taken from sales transaction data archives as much as 150 sales transaction data and 26 product data. In this study, it is determined that the minimum support value is 50% and the minimum confidence is ≥ 0.75 From the test results, 9 products have superior support values and meet the minimum value. From the test results, a rule with a confidence value of 0.870 was obtained: D → W (if consumers buy Wardah Lightening Gentle Wash, then buy Azarine Sunscreen SPF50), and 0.808: A → E → O (if consumers buy Emina Face Wash, then buy Azarine Night Moisturizer and Himalaya Neem Mask).
Design and Realization of Computer Image Intelligent Recognition System Xu, Guibing
Journal of Applied Data Sciences Vol 4, No 2: MAY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i2.76

Abstract

The application of intelligent image recognition technology in life is more and more extensive, especially in the field of computer and multimedia, the research of machine vision system is becoming more and more mature, and the demand of human society for information processing is constantly increasing.This article first analyzes the basic knowledge of digital images based on computer technology, including basic knowledge of digital images, basic knowledge of image filtering and image recognition algorithms. Secondly, this paper studies the design and implementation of computer image intelligent recognition system.
Optimization of Decision Support System in Investment Risk Management with Firefly Algorithm Sopandi, Ajang
Journal of Applied Data Sciences Vol 4, No 2: MAY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i2.95

Abstract

This research focuses on optimizing the decision support system in investment risk management using Firefly Algorithm. The data used in this research is obtained from the Kaggle repository. The research aims to compare the performance of Firefly Algorithm with other optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, and Simulated Annealing. This research applies Firefly Algorithm and other optimization algorithms individually to the investment risk management system to analyze and compare their performance. The results show that Firefly Algorithm outperforms other optimization algorithms in terms of finding optimal solutions and minimizing investment risk. Firefly Algorithm can effectively identify the best investment options to avoid risks, which can bring significant benefits to investors and companies. The findings of this study show that Firefly Algorithm can be a useful tool in the investment risk management system. The application of Firefly Algorithm in the investment risk management decision-making process can improve decision-making and help investors avoid risks and maximize their profits. The novelty of this research is the application of the Firefly algorithm to optimize the decision support system in investment risk management. It aims to identify the best option in avoiding investment risk and maximizing profit. In addition, this research also compares the performance of the Firefly algorithm with other algorithms such as Genetic Algorithm, Particle Swarm Optimization, and Simulated Annealing in solving optimization problems in the investment field.
Application of Adaptive UKF Algorithm in Multi-target Tracking and Positioning System Liu, Guofang; Wang, Xiong
Journal of Applied Data Sciences Vol 4, No 2: MAY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i2.81

Abstract

Adaptive filtering algorithm (FIR) is a design method of adaptive variable target tracking system based on probability density distribution model. The algorithm realizes the target movement in the global range by estimating the parameters of different regions in the image, which improves the real-time performance and effectiveness.
Research on Deep Learning-Based Algorithm and Model for Personalized Recommendation of Resources Liu, Yu’e
Journal of Applied Data Sciences Vol 4, No 2: MAY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i2.85

Abstract

Resource recommendation system is a new type of management system, which uses personalized information to solve business needs such as customer consultation and product recommendation, and provides users with high quality services and achieves accurate marketing, so nowadays resource recommendation system has a pivotal role in modern resource management. In this paper, I study the algorithm and model of resource personalized recommendation based on deep learning, taking human resource recommendation as an example.
Research on New Virtualization Security Protection Management System Based on Cloud Platform Li, Zhihong; Liu, Guangxu; Dang, Yijie; Shang, Zhijie; Lin, Nan
Journal of Applied Data Sciences Vol 4, No 2: MAY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i2.89

Abstract

As an emerging product under the condition of informatization, the utilization of cloud platform in many industries has brought fundamental changes to the production and business model in related fields. The cloud platform provides rich and diverse utilization services to terminals through multi-dimensional integration of different IT resources. With the in-depth utilization of cloud platform, the security problems it faces are becoming more and more prominent. The traditional network security protection means have been difficult to effectively adapt to and deal with the security threats under the new situation of cloud platform utilization. As a prominent part of building cloud platform, the construction level of virtualization security protection system will have an intuitive impact on the security of cloud platform. At present, the virtualization security protection management system under cloud platform is facing direct threats from virtual machine deployment, virtual machine communication and virtual machine migration. Based on this, this paper studies the virtualization security protection management system of cloud platform from the perspective of virtualization security tech, so as to ameliorate the stability, reliability and security of cloud platform.
Software Defect Fault Intelligent Location and Identification Method Based on Data Mining Wang, Fang; Park, Sungho; Suwanasri, Cattareeya
Journal of Applied Data Sciences Vol 4, No 2: MAY 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i2.92

Abstract

With the advancement of the times, computer technology is also constantly improving, and people's requirements for software functions are also constantly improving, and as software functions become more and more complex, developers are technically limited and teamwork is not tacitly coordinated. And so on, so in the software development process, some errors and problems will inevitably lead to software defects. The purpose of this paper is to study the intelligent location and identification methods of software defects based on data mining. This article first studies the domestic and foreign software defect fault intelligent location technology, analyzes the shortcomings of traditional software defect detection and fault detection, then introduces data mining technology in detail, and finally conducts in-depth research on software defect prediction technology. Through in-depth research on several technologies, it reduces the accidents of software equipment and delays its service life. According to the experiments in this article, the software defect location proposed in this article uses two methods to compare. The first error set is used as a unit to measure the subsequent error set software error location cost. The first error set 1F contains 19 A manually injected error program, and the average positioning cost obtained is 3.75%.
Online Measuring Feature for Batik Size Prediction using Mobile Device: A Potential Application for a Novelty Technology Wiradinata, Trianggoro; Saputri, Theresia Ratih Dewi; Sutanto, Richard Evan; Soekamto, Yosua Setyawan
Journal of Applied Data Sciences Vol 4, No 3: SEPTEMBER 2023
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v4i3.121

Abstract

The garment industry, particularly the batik sector, has experienced significant growth in Indonesia, coinciding with a rise in the number of online consumers who purchase batik products through e-Marketplaces. The observed upward trend in growth has seemingly presented certain obstacles, particularly in relation to product alignment and product information dissemination. Typically, batik entrepreneurs originate from micro, small, and medium enterprises (MSMEs) that have not adhered to global norms. Consequently, the sizes of batik products offered for sale sometimes exhibit inconsistencies. The issue of size discrepancies poses challenges for online consumers seeking to purchase batik products through e-commerce platforms. An effective approach to address this issue involves employing a smartphone camera to anticipate body proportions, specifically the length and width of those engaged in online shopping. Subsequently, by the utilization of machine learning techniques, the optimal batik size can be determined. The UKURIN feature was created as a response to a specific requirement. However, it is essential to establish a methodology for investigating the elements that impact the intention to use this feature. This will enable developers to prioritize their feature development strategies more effectively. A total of 179 participants completed an online questionnaire, and subsequent analysis was conducted utilizing the Extended Technology Acceptance Model framework. The findings indicate that Perceived Usefulness emerged as the most influential factor. Consequently, when designing and developing the novelty feature of UKURIN, it is imperative for designers and application developers to prioritize the benefits aspect.

Page 6 of 47 | Total Record : 463