Implementation of Data Mining with Naive Bayes Algorithm for Eligibility Classification of Basic Food Aid Recipients

Authors

  • Yamato Shino University of Miyazaki
  • Yusuf Durachman Syarif Hidayatullah State Islamic University Jakarta
  • Nana Sutisna Buddhi Dharma University

DOI:

https://doi.org/10.34306/ijcitsm.v2i2.114

Keywords:

Naive Bayes, Confusion Matrix, Data Mining, Algorithm.

Abstract

One of the primary issues that the government of a nation concentrates on is poverty. The provision of precise and focused data on poverty is a crucial component of the Poverty Reduction Strategy. One technique for classifying data is Naïve Bayes. The aid manager will subsequently use the categorization findings to inform judgments about categorizing and determining who should get basic food assistance. Predictions for those who get basic food assistance fall into two categories: eligible and ineligible. Sample data from the hamlet of XYZ used as the basis for the forecast. In this study, a web-based application is used to construct and assess the Naïve Bayes method. The accuracy for 135 training data, 40 test data, and seven characteristics employed generates 86 percent accuracy, 85 percent recall, and 88 percent precision according to the assessment findings using the confusion matrix.

References

E. Dolan and R. Widayanti, “Implementation Of Authentication Systems On Hotspot Network Users To Improve Computer Network Security,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 88–94, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.93.

M. R. Anwar, R. Panjaitan, and R. Supriati, “Implementation Of Database Auditing By Synchronization DBMS,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 197–205, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/53

A. Williams and C. S. Bangun, “Artificial Intelligence System Framework in Improving The Competence of Indonesian Human Resources,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 82–87, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.91.

M. R. Anwar and S. Purnama, “Boarding House Search Information System Database Design”, IJCITSM, vol. 2, no. 1, pp. 70–81, Mar. 2022.

M. R. Anwar and S. Purnama, “Boarding House Search Information System Database Design,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 70–81, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.89.

A. Dudhat and T. Mariyanti, “Indoor Wireless Network Coverage Area Optimization,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 55–69, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.86.

A. Dudhat and T. Mariyanti, “Indoor Wireless Network Coverage Area Optimization”, IJCITSM, vol. 2, no. 1, pp. 55–69, Mar. 2022.

W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation Of E-Business Information System In Indonesia : Prospects And Challenges,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 180–188, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/49

D. Immaniar, N. Azizah, D. Supriyanti, N. Septiani, and M. Hardini, “PoTS: Proof of Tunnel Signature for Certificate Based on Blockchain Technology,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 101–114, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/28

N. . Azizah, V. Hartajaya, and S. Riady, “Comparison Of Replication Strategies On Distributed Database Systems”, IJCITSM, vol. 2, no. 1, pp. 20–29, Jan. 2022.

A. Williams and C. S. Bangun, “Artificial Intelligence System Framework in Improving The Competence of Indonesian Human Resources”, IJCITSM, vol. 2, no. 1, pp. 82–87, Mar. 2022.

T. Ayuninggati, N. Lutfiani, and S. Millah, “CRM-Based E-Business Design (Customer Relationship Management) Case Study : Shoe Washing Service Company S-Neat-Kers,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 216–225, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/58

D. Apriani, M. Aan, and W. E. Saputra, “Data Visualization Using Google Data Studio”, IJCITSM, vol. 2, no. 1, pp. 11–19, Jan. 2022.

I. Y. Ruhiawati, A. P. Candra, and S. N. Sari, “Design and Build a Multimedia System for Indonesian Religious Activities Based on Android,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 233–239, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/64

P. Edastama, A. Dudhat, and G. Maulani, “Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 206–215, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/55

B. Rawat and S. Purnama, “MySQL Database Management System (DBMS) On FTP Site LAPAN Bandung,” International Journal of Cyber and IT Service Management, vol. 1, no. 2, pp. 173–179, 2021.

D. . Rustiana, J. D. . Pratama, T. . Mudabbir, M. A. . Fahmi, and . G. A. . Rofei, “Adoption Computerized Certificate Transparency And Confidentiality”, IJCITSM, vol. 2, no. 1, pp. 1–10, Jan. 2022.

E. Dolan and R. Widayanti, “Implementation Of Authentication Systems On Hotspot Network Users To Improve Computer Network Security”, IJCITSM, vol. 2, no. 1, pp. 88–94, Mar. 2022.

Downloads

Published

2022-09-21

How to Cite

Shino, Y., Durachman, Y., & Sutisna, N. (2022). Implementation of Data Mining with Naive Bayes Algorithm for Eligibility Classification of Basic Food Aid Recipients. International Journal of Cyber ​​and IT Service Management (IJCITSM), 2(2), 154–162. https://doi.org/10.34306/ijcitsm.v2i2.114

Issue

Section

Articles