cover
Contact Name
Much Aziz Muslim
Contact Email
a212muslim@yahoo.com
Phone
+628164243462
Journal Mail Official
shmpublisher@gmail.com
Editorial Address
J. Karanglo No. 64 Semarang
Location
Unknown,
Unknown
INDONESIA
Journal of Soft Computing Exploration
Published by shm publisher
ISSN : 27467686     EISSN : 27460991     DOI : -
Core Subject : Science,
Journal of Soft Computing Exploration is a journal that publishes manuscripts of scientific research papers related to soft computing. The scope of research can be from the theory and scientific applications as well as the novelty of related knowledge insights. Soft Computing: Artificial Intelligence Applied Algebra Neuro Computing Fuzzy Logic Rough Sets Probabilistic Techniques Machine Learning Metaheuristics And Many Other Soft-Computing Approaches Area Of Applications: Data Mining Text Mining Pattern Recognition Image Processing Medical Science Mechanical Engineering Electronic And Electrical Engineering Supply Chain Management, Resource Management, Strategic Planning Scheduling Transportation Operational Research Robotics
Articles 19 Documents
Accuracy of classification poisonous or edible of mushroom using naïve bayes and k-nearest neighbors Hamonangan, Roni; Saputro, Meidika Bagus; Atmaja, Cecep Bagus Surya Dinata Karta
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mushrooms are plants that are widely consumed by the general public, but not all mushrooms can be consumed directly, because the types of mushrooms are feasible and it is still too difficult to distinguish, then there are several ways to identify fungi, namely by means of morphology. The morphology referred to in this paper is the morphology of fungi which includes color, habitat, class, and others. We got the morphology of this mushroom from a datasets we get from UCI Machine Learning with the 23 atribut that we use in the program. In determining the classification of this fungus we use the Naive Bayes algorithm which produces an accuracy of around 90,2% which we then improve again so that it reaches 100% accuracy using the K-Nearest Neighbors algorithm. Furthermore, in this case to prove accuracy that we had before, we use calculation accuracy with confusion matrix to show it the accuracy of classification poisonous or edible mushroom.
Comparation analysis of naïve bayes and decision tree C4.5 for caesarean section prediction Suciningsih, I Gusti Ayu; Hidayat, Muhammad Arif; Hapsari, Renita Arianti
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of technology can be used to facilitate many matters. One of them is childbirth in the medical fields. Maternal mortality rate (MMR) is the number of maternal deaths during pregnancy to postpartum caused by pregnancy, childbirth or its management. There are several methods of labors that can be done. The determination of the labor is based on many factors and must be in accordance with the conditions of pregnant patient. Caesarean birth is the last alternative in labor, due to high risk factors. The objective of this research is to predicte and analyse caesarean section using C4.5 and Naïve Bayes classifier models. For experimentation the dataset is collected from UCI Machine Learning Repository and the main attributes represented in this dataset are age, delivery number, delivery time, blood of pressure, and heart problem. The accuracy using C4.5 by 80 training cases is 45% And the accuracy using Naïve Bayes is 50%.
Three stages algorithm for finding optimal solution of balanced triangular fuzzy transportation problems Muhammad Sam'an
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the literature, the fuzzy optimal solution of balanced triangular fuzzy transportation problem is negative fuzzy number. This is contrary to the constraints that must be non-negative. Therefore, the three stages algorithm is proposed to overcome this problem. The proposed algorithm consist of segregated method with segregating triangular fuzzy parameters into three crisp parameters. This method avoids the ranking technique. Next, total difference method is used to get initial basic feasible solution (IBFS) value based on segregating triangular fuzzy parameters. While, modified distribution algorithm is used to determine optimal solution based on IBFS velue. In order to illustrate the proposed algorithm is given the numerical example and based on the result comparison, the proposed algorithm equality to the two existing algorithms and better then the one existing algorithm. The proposed algorithm can solve in the fuzzy decision-making problems and can also be extended to an unbalanced fuzzy transportation problem.
Irrigation management of agricultural reservoir with correlation feature selection based binary particle swarm optimization Ifriza, Yahya Nur; Sam'an, Muhammad
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The requirement for the applied innovation to farming water system is especially required for supplies, as rural water system focuses. Supplies as one of horticulture water system asset focus that are regularly constraints identified with the conveyance of repository water stream, this brought about lopsided dissemination of rural water system and the term of control of agrarian water system that streams from water system asset focuses. At the point when ranchers need to change the water system way, it will take a long effort to make another water system way. From these troubles to convey rural water systems simpler, it is important to plan a specialist framework to decide rural water system choices. A few researchers focused on improved quality of plant. There have been limited studies concerned with irrigation management Therefore, this research intends to design The objectives of this research are optimization irrigation management of agricultural reservoirs with CFS-BPSO. The consequences of this investigation demonstrate that the exactness of the utilization of the SVM calculation is 62.32%, while after utilizing the CFS calculation precision of 84.12% is acquired and exactness of ten SVM calculations by applying a blend of CFS highlight choice. also, BPSO 91.84%.
Improved logistics service quality for goods quality delivery services of companies using analytical hierarchy process Riliandini, Popy; Dianti, Erika Noor; Hidayah, Sayidah Rohmatul; Pertiwi, Dwika Ananda Agustina
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Logistics plays a role in the smooth transaction between companies because it is a facilitator of buying and selling goods and services to fulfill the supply orders of consumer companies. This study aims to analyze how the impact of improved Logistic Service Quality (LSQ) for quality of goods delivery services by using LSQ dimensions from previous research. Sample data is obtained through the dissemination of questionnaires which are then processed quantitatively with convergent validity and reliability tests. Data processing with a sample count of 61 respondents. The results of this study show that there is the main dimension of logistic service quality in improving the quality of service, namely ordering condition, time, and information quality. Each comparison factor is tested for consistency using the Analytical Hierarchy Process (AHP), each of the main criteria has a consistency value of less than 0.1 so that the main criteria tested have a consistent comparison matrix and can be the basis of decision making for companies in choosing alternative criteria priorities.
A combination of TDM and KSAM to determine initial feasible solution of transportation problems Muhammad Sam'an; Ifriza, Yahya Nur
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In case of the Transportation Problem (TP), it was found that TP had equal the smallest so that the existing methods will be generated two or more IFS values. The newly developed algorithm is generated through a combination of Total Difference Method (TDM) and Karagul-Sahin Approximation Method (KSAM) algorithm, is capable to determine the initial feasible solution of TP. Based on the numerical illustration of TP example to evaluate the performance of the new proposed algorithm. The computational performances have been compared to the existing methods (TDM1 and KSAM) and the results shown this algorithm achieved better performance than the existing methods for TP example.
The forecasting of palm oil based on fuzzy time series-two factor Wulandari, Ratri; Surarso, Bayu; Irawanto, Bambang; Farikhin, Farikhin
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Palm oil is a vegetable oil obtained from the mesocarp fruit of the palm tree, generally, from the species, Elaeis guineensis, and slightly from the species Elaeis oleifera and Attalea maripa. Palm oil is naturally red due to its high alpha and beta-carotenoid content. Palm kernel oil is different from palm kernel oil produced from the same fruit core. Planning for palm oil production is necessary because it greatly affects to the level of the country’s economy. Forecasting can reduce uncertainty in planning. Forecasting used in the palm oil problem is two-factor forecasting using the Kumar method with uama factors in the form of palm oil production and supporting factors in the form of land area. The forecasting is evaluated using AFER and MSE, from the acquisition of AFER value of 1.212% <10%, then the forecasting has very good criteria.
Recommendation of Yogyakarta tourism based on simple additive weighting under fuzziness Utomo, Eko Yunanto
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

For tourists who do not understand the situation or the desired tourist attraction, they can choose tour and travel services. Tour and travel provides a choice of tour packages with various variations. Determining the right tour and travel package and agency can benefit tourists, both in terms of financial and vacation quality. The data used in this study were obtained from several Tour and Travel agents. There are several variables used, namely the price of the package, the number of participants, and the number of facilities obtained. The method used in this study combines the Triangular Fuzzy Number (TFN) and the Simple Additive Weighting (SAW) method. The purpose of this study is to help tourists determine the most profitable or best packages. The results of this study obtained the best 2 packages recommended for tourists to choose.
Analysis of twitter sentiment in COVID-19 era using fuzzy logic method Efrilianda, Devi Ajeng; Dianti, Erika Noor; Khoirunnisa, Oktaria Gina
Journal of Soft Computing Exploration Vol. 2 No. 1 (2021): March 2021
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The sentiment is an assessment of attitudes towards certain events or things. Collecting opinion is known as a sentiment from existing data. This technique can also help analyze the opinions given by people in assessing certain objects. The best available source for gathering sentiment is the internet. In the era of the Covid-19 pandemic, many people access social media, especially Twitter to give their opinion on certain objects. Twitter is known as the social media that is accessed by users to post their opinions online. By using soft computing, especially fuzzy logic, it is possible to design, create and build bots that can analyze user opinions on Twitter. This model is used for data sentiment analysis on Twitter.
Data Security System of Text Messaging Based on Android Mobile Devices Using Advanced Encrytion Standard Dynamic S-BOX Akhmad Sahal Mabruri; Alamsyah
Journal of Soft Computing Exploration Vol. 1 No. 1 (2020): September 2020
Publisher : Surya Hijau Manfaat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Most of the recent technologies are turning to mobile platforms, Android becames one of the most widely used OS. Eventhough it has complete features, even it's not safe enough such like Chat Messenger. The security of messages distribution is a challenge to increase of vulnerable distribution of information through the network today. Therefore, a data security or cryptographic algorithm is needed to secure the messages so that it cannot be read by irresponsible people. National Institute of Standard and Technology (NIST) established the Advanced Encrytion Standard (AES) cryptographic algorithm as a standard encryption algorithm that is safe and can be used globally. AES algorithm is included in block cipher cryptography that uses substitution boxes (S-BOX) in its operations, so that algorithmically can make input and output unrelated. So, it can provide more varied output in the process, we need a dynamic S-BOX. In this research, dynamic S-BOX generalized using XOR operations from affine transformations with 8-bit binary element matrices arranged and randomly to produce as many as 256 S-Boxes. The application of dynamic AES with S-BOX algorithm on Android-based messenger chat application is built using the Java programming language and database hierarchy for data storage. The implementation results showed that the algorithm was running well and could encrypt the text of the message to ciphertext and decrypt the ciphertext to the original message. This research can be used as a reference so that further researchers can merge the AES algorithm with other algorithms to improve the security of encryption in text files, documents, images, videos or other types of files.

Page 1 of 2 | Total Record : 19