Selektivitas Pemilihan Komputer dengan Pendekatan Pohon Keputusan

Authors

  • S N M P Simamora Institut Digital Ekonomi LPKIA Bandung
  • A. Maarip IDE LPKIA

Keywords:

c4.5 algorithm, decision tree approach, selective

Abstract

The important role of a computer in work activities is solving cases that require fast and precise computing processes. However, the limitations of the required computer specifications must sometimes be taken into account according to the specified needs. Cases that are commonly found in terms of aspects of the availability of computer specifications are related to multimedia, and one that is quite prominent in the current 4G technology trend is e-sport activities, namely online games. The main requirement for running games is video-memory capacity, namely image requirements. The image is based on a dictionary-color data that can be saved, so for a display with fidelity characteristics it certainly requires a large video-memory capacity, so that when the game is running it doesn't get stuttering. A fairly simple method with a decision-tree approach by applying certain techniques or algorithms, in order to obtain the specifications of the computer; based on the component attributes it has (such as processor, main-memory, and video-memory), and the operating system (such as software) is whether it is compatible or vice versa. There are two operating systems involved in the testing process, namely: Windows 10 and Windows 11; the Windows family was chosen for the reason that the majority of users use it and is adapted to games that are commonly run on this variant of the operating system. The decision tree approach is based on the C4.5 algorithm. And in this research a series of tests have been carried out on a number of computers with various characteristics and specifications; with the field of objects tested being games, without specifically limiting whether they run on-line or off-line; but on this research used on-line . There were three sample games involved in the testing with the number of computers processor being selected using seven different specifications. The results show that from a number of computer specifications involved in testing the three game samples, some are compatible. And the results obtained showed that the machine learning model designed was optimal.

References

E. Yan-Tao, T., “Computational model of selective attention for machine vision based on adapted entropy,” 2015.

V. S. G. Mcgraw, R. Bonett, H. Figueroa, “Security Engineering for Machine Learning,” Comput. Mag. Artic., vol. 52, no. 8, 2019.

M. Melladia, D. E. Putra, and L. Muhelni, “Penerapan Data Mining Pemasaran Produk Menggunakan Metode Clustering,” J. Tek. Inf. dan Komput., vol. 5, no. 1, p. 160, 2022, doi: 10.37600/tekinkom.v5i1.458.

S. G. A. Müller, Introduction to Machine Learning with Python: A Guide for Data Scientists 1st Edition. O’Reilly Publisher.

D. Cote, “Using machine learning in communication networks,” J. Opt. Commun. Netw., vol. 10, no. 10, 2018.

Melladia, T. Informatika, U. Nahdlatul, U. Sumatera, F. Chaining, and Z. Plastik, “Aplikasi Sistem Pakar Mendeteksi Zat Berbahaya Pada Plastik Menggunakan Metode Backward Chaining,” pp. 19–28.

A. N. S. Z. Gustiana, “Combination of C 4.5 Algorithm and Profile Matching for Determining University Students Graduation,” 2021.

K. R. A. K. U.M. Ashwin Kumar, “Data Preparation by CFS: An Essential Approach for Decision Making Using C 4.5 for Medical Data Mining,” 2013.

M. X. W. Zhu, “A novel method for detecting disk filtration attacks via the various machine learning algorithms,” China Communications Magazine Article, 2020.

S.N.M.P. Simamora, “Model Pohon Relasi Untuk Mendeteksi Jalur Kedekatan Hubungan Antar-Entitas,” Koran Monitor. Edisi 16 Januari 2023, 2023. https://koranmonitor.com/uncategorized/model-pohon-relasi-untuk-mendeteksi-jalur-kedekatan-hubungan-antar-entitas/.

S.N.M.P. Simamora, Modul Belajar Praktis Algoritma dan Pemrograman. Yogyakarta: Penerbit Deepublish, 2016.

P. Aplikasi and E. B. Web, “Jurnal Tefsin,” vol. 1, no. 1, pp. 13–18, 2023.

S.N.M.P. Simamora, “Identifikasi Awal Kode Tanda Tangan Dengan Pendekatan Pemodelan Koordinat,” J. Nas. Komputasi dan Teknol. Inf., vol. 6, no. 1, pp. 122-138., 2023.

Melladia, “Algoritma Genetika Menentukan Jalur Jalan dengan Lintasan Terpendek ( Shortest Path ),” pp. 112–117.

Downloads

Published

2023-11-30

How to Cite

Simamora, S. N. M. P., & Maarip, A. (2023). Selektivitas Pemilihan Komputer dengan Pendekatan Pohon Keputusan. Jurnal TEFSIN ( Jurnal Teknik Informatika Dan Sistem Informasi), 1(2), 38–44. Retrieved from http://jurnal.unusumbar.ac.id:8090/ojs/index.php/jts/article/view/125