|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
October 2017 | Vol. 95
No.20 |
Title: |
INFORMATION TECHNOLOGY GOVERNANCE USING COBIT 4.0 DOMAIN DELIVERY SUPPORT
AND MONITORING EVALUATION |
Author: |
AHMAD ISHAQ, MUKHNERI MUKHTAR, MOCHAMAD WAHYUDI, KARLENA INDRIANI |
Abstract: |
Information Technology (IT) has rounded into a technology which hardly assist
even determine level of performance a company. For the agenda of increasing
performance, Bina Sarana Informatika (BSI) has been supported by information
technology. Constructively IT (Information Technology), Business process or job
activity process happened in university can be put across and efficient. But
other side, the purpose of business, applying of IT needs cost money high
investment at risk to big enough failure. Therefore required a mechanism Arrange
IT Management (IT Governance) which totally and structural from starting
planning untill the observation. This research is to give a model proposal
arrange IT Management for Bina Sarana Informatika (BSI) by relating COBIT
(Control Objective for Information and Related Technology) Version of 4.0. This
research is focused on two main domain COBIT, that is Delivery Support (DS) and
Monitoring Evaluation (ME) and this research is continuation from other
researcher that is Evi, Rahmawati, the researcher who focuses on domain DS and
ME. Methodologies are done through analysis whereas from vision identification,
mission and purpose of organization and also mission and vision from part of
Biro Teknologi Informasi (BTI). Here in after identifying by management
awareness to IT asset function which have him (it in supporting the of reaching
company mission and vision through questioner. From both the data hence is
determinable of maturity goals (expected maturity level) appropriate for Bina
Sarana Informatika (BSI). Then continued by doing assessment of current maturity
level through questioner and interview to related and relevant responder of
management of titanium. The expected data and current maturity levels of each IT
process are analyzed to look at the gap, and then determined gradually; Steps
that must be taken to overcome the gap. |
Keywords: |
Arrange IT Management, COBIT Process, TI, Maturity |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
COMPUTING THE DISTANCE AMONG BUSINESS DOMAINS USING SEMANTIC SIMILARITY MEASURES |
Author: |
ELHAM ABD AL LATIF AL BADAWI , AHMAD KAYED, SIDDIQ AHMED BABIKIR |
Abstract: |
Cloud service providers maintain multiple-tenant databases in the cloud
computing environment. They reduce the cost by sharing computing and storage
resources. Mixing tenants databases violates security protocols. Databases
should be segregated to provide security, confidentiality, reliability, and
availability. The competitors of different business domains will sit aside,
according to the logical distance of their business domain. The farthest
distance will be given to closest business domains. To compute the logical
distance among business domains a good measure should be defined. There are
several types of similarity measures that could be used to measure the
similarity among concepts. This paper evaluates several measures to determine
the best one that is suitable to be used in our segregation technique. We
evaluated the applicability of using five different semantic similarity
measures. These measures are path-length measure, Wu & Palmers measure, Leacock
& Chodorow measure, Resnik measure and Lin measure. Taxonomy for business
domains has been built to use these measures. This taxonomy mimics the WordNet
taxonomy. Several experiments have been conducted to define the best measure
among these measures. This paper finds that the shortest path is the best
measure to compute the logical distance among businesses. |
Keywords: |
Cloud Computing, Semantic Similarity Measuare, Path Length Measure, Information
Content Measure, Taxonomy. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
A METHOD OF CONSTRUCTING A STRUCTURED DATABASE OF THE TYPICAL OBJECTS OF
PROTECTION ON THE BASIS OF CLUSTER ANALYSIS |
Author: |
DENIS YURIEVICH MINKIN, YURI IVANOVICH SINESHCHUK, SERGEY NIKOLAEVICH TEREKHIN,
KONSTANTIN SERGEEVICH YUSHEROV |
Abstract: |
The article discusses the possibility of constructing a structured database of
the typical objects of protection. These are the objects, the occurrence of an
emergency situation or fire on which leads to substantial material damage or
harm to the health or loss of life of people. This problem is solved on the
example of developing the methods of selection of typical objects using the
cluster analysis procedures for testing the algorithms of extinguishing possible
fires on the protected territory in the area of the fire department operation.
The authors analyze the objects of protection on the example of one of the
districts of the city of St. Petersburg; typical objects are selected, and the
justification of these choices is provided. |
Keywords: |
Cluster Analysis, Characteristic Of The Object, Data Segmentation, Applied
Social Research, Software For The Statistical Research. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
ANALYSIS AND REDUCTION OF TIME SHIFT BETWEEN SENDING AND RECEIVING ON DATA
ACQUISITION USING SMS GATEWAY SYSTEM |
Author: |
WARSITO, GURUM A. PAUZI, AMIR SUPRIYANTO, BERLI L. PUTRA, LAZUARDI UMAR, SW.
SUCIYATI |
Abstract: |
This paper presents the data acquisition system of water level measurements
using short message service (SMS) gateway at frequency of Global System for
Mobile communication (GSM) ranging from 900 MHz to 907.5 MHz. We use the HC-SR04
ultrasonic transducer with a frequency of 40 kHz and a measurement range up to 5
m for water level detection. The output of the water level measurement are shown
in LCD monitor, stored in microSD, and transferred to mobile phone by SMS
gateway system. The data transmission using SMS gateway is realized using two
models, namely the scheduled and requested transmission. The analysis of the
data transmission using SMS gateway shows the time shift due to the transmission
process for about 25 seconds. The modem processing time called the time-shift
occurs due to the processing, transmition, and receiving data into information.
To reduce this time-shift, we designed the commands in the program by creating
and transmitting to a single information model. The average time reduction of
time-shift decreases to about 4.15 seconds for 30 mobile phone number. The
overall analysis of data acquisition system shows good results and efficient. |
Keywords: |
Data Acquisition, Water Level, Real Time, On Line, Sms Gateway |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
DETERMINATION OF EFFECTIVENESS OF EVALUATION RESULTS ON SCHOOL CULTURE AND
CHARACTER OF JUNIOR HIGH SCHOOL STUDENTS USING CHARACTER ASSESSMENT INSTRUMENTS
WITH THE LOCAL WISDOM OF BALI BASED ON MOBILE PHONE |
Author: |
IDA BAGUS PUTU ARNYANA, I WAYAN SADIA, I KETUT SUMA, DEWA GEDE HENDRA DIVAYANA |
Abstract: |
The aim of this study was to determine the effectiveness of the evaluation
results on schools culture and characters students of junior high school using
instruments of character assessment with Bali local wisdom based on mobile
phone.This study was started with the development of mobile phone-based
character assessment instruments with local wisdoms by adopting the research
model and development of Tigarajan. Assessment instruments that had fulfilled
the validity and reliability requirements were then tested for effectiveness
with a one-shot case study, involving three classes of SMP Negeri 1 Singaraja.
The data about schools cultures were collected through self-assessment
instrument, which was filled by 44 teachers of science and 28 people (one class)
at SMP Negeri 1 Singaraja who were involved as a sample. While the data about
the character of students were measured by using instrument self-assessment
character by involving 28 students of class VII, 28 students of class VIII, and
30 students of class IX at SMP Negeri 1 Singaraja. The measurement of the
character of the students was done after they had learned the science of
character education by inserting the local wisdom of Bali. The results of the
research showed that 1) The mobile phone-based character assessment instruments
had fulfilled the valid and reliable requirement to be used to measure the
character of the school’s cultures and the character of Junior High School
students; 2) In general, the level of schools culture effectiveness in SMP
Negeri 1 Singaraja were in good category, although negative behaviors were found
but they were rare; 3) The two dimensions of the students character; the
spirituality and the responsibility with the level of effectiveness were in very
good category, while the attitude of hard work, caution, and cooperation with
the level of effectiveness were in a good category; and 4) The two aspects of
students character that were discipline and honesty with the level of
effectiveness were still in a low category or with a qualification that was
beginning to appear. |
Keywords: |
Effectiveness, Evaluation, Assessment of Character Education, Mobile Phone,
Schools Cultures, Students Character |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
RESEARCH OF THE EFFECTIVENESS OF SQL ENGINES WORKING IN HDFS |
Author: |
ANDREY KOLYCHEV, KONSTANTIN ZAYTSEV |
Abstract: |
The rapid data growth at the beginning of the XXI century gave impetus to the
development of big data technologies. A distributed platform Hadoop became a key
element of big data technologies. Initially, it was difficult using Hadoop for
tabular data processing, on which many modern industrial information systems are
built. Therefore, a variety of SQL tools for Hadoop began to appear, which gave
rise to the problem of choosing a specific solution. The aim of this work is to
identify the most efficient SQL tools for tabular data processing in a
distributed Hadoop system. For this purpose a comparative analysis of six most
popular tools: Apache Hive, Cloudera Impala, Spark SQL, Presto, Apache Drill,
Apache HAWQ has been done. The result of the study was the choice of the most
effective means from the standpoint of completeness of the list of functions
performed, tool performance and the level of SQL standards support. After
summarizing of the results of a study, which has been done on all selected space
coordinates comparison, Presto was the most effective tool. |
Keywords: |
Hadoop, SQL-Like Syntax, SQL Engine, Software Functionality, Performance,
Support For The Standard SQL Language, SQL Tools, Apache HIVE, Cloudera IMPALA,
SPARK SQL, Presto, Apache DRILL, Apache HAWQ. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
PROGNOSIS CANCER PREDICTION MODEL USING DEEP BELIEF NETWORK APPROACH |
Author: |
FAKHIRAH D. GHAISANI, ITO WASITO, MOH. FATURRAHMAN, RATNA MUFIDAH |
Abstract: |
Cancer is one of main non-communicable disease. Analysis of cancer prognosis is
necessary to determine the proper treatment for each patient. However, cancer
data analysis is challenging because multiple risk factors may influence the
prognosis of cancer, including genes and clinical condition of patients. This
study aims to develop prediction model for cancer prognosis using clinical and
gene expression (microarray) data. In this research, Principal Component
Analysis (PCA) is applied to microarray data to reduce its dimension, then two
Deep Belief Network (DBN) models for both clinical and microarray data are
trained separately. Probabilities obtained from Clinical DBN model and
Microarray DBN model are integrated using softmax nodes on Bayesian Network
structure. Based on various experiments, the best DBN-BN integration model
obtains prediction accuracy 73.3535% for overall survival prediction and
71.3434% for disease-free survival prediction. |
Keywords: |
Cancer, Prognosis, Principal Component Analysis, Dimensionality Reduction, Deep
Belief Network, Bayesian Network, Data Integration, Data Harmonization,
Microarray, Gene Expression |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
THE ROLE OF MULTIMEDIA DESIGN ELEMENTS IN COMPUTER ACCESSIBILITY FOR VISUALLY
IMPAIRED: A COMPLETE REVIEW |
Author: |
MANORANJITHAM MUNIANDY, SUZIAH SULAIMAN |
Abstract: |
Designing an accessible computer application for the visually impaired has
gained popularity among the researchers over the years. Many researches focus on
creative usage of multimedia design elements in extending computer accessibility
for users with these special needs. Multimedia design elements plays an
important role in the design of any application, be it a mobile application,
stand alone computer application, online web applications and many more. A
designer acquires knowledge of designing through established standard guidelines
and past literatures related to accessibility to produce user-disable friendly
computer applications. Despite the constant effort from the designers, visually
impaired users are still struggling to access and to use computer applications.
Major reason to this scenario is not the fault of a designer but the gap in
current state of art is to be criticized. A clear reflection on current state of
art was not portrayed all this while leaving uncertainty among the designers in
utilizing effectively the design elements in designing an application. Thus,
this paper serves as a complete review in analyzing the findings of past
literatures as well as established accessibility guidelines relating to visually
impaired computer users. About 80 published articles were used to generate this
paper. An analysis on the latest literatures has revealed that there exist lists
of mandatory and optional elements in considering a design. These finding
identifies the gap in current state of art and creates opportunity for future
work. |
Keywords: |
Multimedia Design Elements, Computer Accessibility, Visually Impaired, User
Interface Design |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
SOCIAL MEDIA USE, COLLABORATIVE LEARNING AND STUDENTS' ACADEMIC PERFORMANCE: A
SYSTEMATIC LITERATURE REVIEW OF THEORETICAL MODELS |
Author: |
WALEED MUGAHED AL-RAHMI, NORMA ALIAS, MOHD SHAHIZAN OTHMAN, IBRAHIM ABDULRAB
AHMED, AKRAM M. ZEKI, ALI ALI SAGED |
Abstract: |
This research provided a systematic literature review of theoretical models on
interaction and collaborations regarding Information system (IS) and Information
Technology (IT). This paper conducted an review of studies dedicated to (IS &
IT) on the basis of certain dimensions namely, research theories, review of
constructivist theories, definitions of constructivism, social constructivism,
theoretical of constructivism, active collaborative learning theory, technology
acceptance model (TAM), theory of reasoned action, technology acceptance model
and Its extensions, and finally research models and frameworks. The discussion
of this research obtained revealed that the interest on the topic has shown an
increasing trend over recent years that it has ultimately become a well-known
topic for academic research in the future via theories use. From review of
theoretical models and related theories we recommend to use constructivism,
active collaborative learning theory with (TAM) to measurement performance and
satisfaction with social media use as the mediator. However, to boost and
enhance the IT continuance intention, it is important that future studies apply
considerable use of theoretical and methodological approaches like the
qualitative methods to examine the IT continuance intention. |
Keywords: |
Social Media, Collaborative Learning, Students Academic Performance,
Theoretical Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
EVALUATION OF POWER DISTRIBUTION NETWORK SYSTEM BY USING SELF-ORGANIZING MAP
(SOM) AS THE BEST PRACTICE FOR BUSES CHARACTERISTIC CLASSIFICATION |
Author: |
M.F. SULAIMA, M.H. JALI, Z.H. BOHARI , M.F. BAHAROM, N. BAHARIN |
Abstract: |
The Artificial Neural Network is a technique that modeled from the ways of human
brain acts. The unsupervised training is a self-learning process which is
performing a classification without outside teaching help. The Self-Organizing
Map is an algorithm that consists process of generated neurons to organize by
themselves. This paper proposes a way of analysis of the Self-Organizing Map
(SOM) applied to the classification of the standard IEEE 33-bus and 69-bus
distribution data. The distribution bus data were classified based on four main
features: active power (MW), reactive power (MVAr), apparent power (MVA), and
power factor (pf). These features are the input for SOM classification. The
analysis of SOM result has shown the capability of this algorithm as a
classification method in order to classify the distribution bus data. |
Keywords: |
Self-Organizing Maps (SOM), IEEE 33-bus Distribution Data, IEEE 69-bus
Distribution Data |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
HEARING AIDS BASED ON SMARTPHONE BY IMPLEMENTING TYMPANIC MEMBRANE AND BASILIAR
MEMBRANE COMPRESSION |
Author: |
RULLY SOELAIMAN, ARIANTO WIBOWO |
Abstract: |
Hearing Impairment is one of the health problems usually caused by age or
exposure to loud sound continuously. Based on World Health Organization, around
360 million people worldwide suffer from hearing loss and 32 million of these
are children. Failure of the sound signal to reach the brain is the main cause
of hearing loss. Hearing impaired often cannot hear soft sound, cannot hear in
noise, and cannot hear sound in certain frequency. One of the solution is to
wear hearing aids on the impaired ear. However, hearing aids are pretty
expensive and some people cannot afford it. Without hearing aids, hearing
impaired wont be able to understand daily conversation clearly, thus reduce the
individuals ability to communicate with others and their hearing organ will
continue to deteriorate. Unaddressed hearing loss also have effect on academic
performance of children. Hearing Aids based on smartphone is an inexpensive
solution for hearing impairments. Hearing impaired can download the applications
in their smartphone so they can use the smartphone as the hearing aids. The
application will mimics how ear works by implementing tympanic membrane and
basiliar membrane compression. This paper intend to build a hearing aids
application on smartphone using algorithm designed to mimic how the human ear
works. Application will receive sound input from the microphone and output sound
with better quality to the earphone of the hearing impaired. The system have
been tested to hearing impaired with different environment (quiet and crowded
environment), and they can listen to 79.3% of the given sound. With this
satisfying result, we hope that this application will help hearing impaired to
hear conversation clearly without the need to buy hearing aids. |
Keywords: |
Hearing, Hearing Impairment, Hearing Aids, Smartphone, Disability |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
IT-ENABLED ORGANIZATIONAL AGILITY - PROPOSITION OF A NEW FRAMEWORK |
Author: |
MOHAMED AMINE MARHRAOUI, ABDELLAH EL MANOUAR |
Abstract: |
The environment of companies is nowadays changing continuously. This rapid
evolution is related to several aspects: economic, political, technological,
regulatory, social and ecological. In order to gain competitive advantage, firms
should be able to adapt so as to identify opportunities quickly, launch
innovative products and comply with local and international regulations.
Organizational agility, a key dynamic capability of the firm, allows it to sense
environmental change and respond adequately. In this work, we present a new
conceptual framework highlighting agilitys enablers and their direct/indirect
effect on firms performance. Based on a systematic literature review, we
identified the main agilitys enablers groups (IT, process, knowledge
management, innovation, organization structure, human resources), and the
characteristics of an agile enterprise (speed, flexibility, awareness,
responsiveness, integration and competency). In addition, we focus in our
proposed IT framework, on the impact of IT besides the complementary effects of
the other agilitys enablers, on fostering organizational agility and thereby on
enhancing firm performance. |
Keywords: |
Organizational agility, Sensing, Responding, Information technology, Firm
performance |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
A RE-CONSTRUCTIVE ALGORITHM TO IMPROVE IMAGE RECOVERY IN COMPRESSED SENSING |
Author: |
R.JAYA LAKSHMI, DR.G.V.SUBBA RAO |
Abstract: |
In this paper, we study the Compressed Sensing (CS) image recovery problem. The
traditional method divides the image into blocks and treats each block as an
independent sub-CS recovery task. This often results in losing global structure
of an image. In order to improve the CS recovery result, we propose a nonlocal
estimation step after the initial CS recovery for de-noising purpose. The
nonlocal estimation is based on the well-known nonlocal means (NL) filtering
that takes advantage of self-similarity in images. We formulate the nonlocal
estimation as the low-rank matrix approximation problem where the low-rank
matrix is formed by the nonlocal similarity patches. An efficient algorithm,
Extended NonLocal Douglas-Rachford (E-NDLR), based on Douglas-Rachford splitting
is developed to solve this low-rank optimization problem constrained by the CS
measurements. Experimental results demonstrate that the proposed E-NDLR
algorithm achieves significant performance improvements over the
state-of-the-art in CS image recovery. |
Keywords: |
Image Recovery, Algorithm, Reconstruction, Compressed Sensing, NDLR |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
SECURE DATA SHARING MODEL FOR PRESERVING PRIVACY |
Author: |
SANAA SARAHNEH, RADWAN TAHBOUB |
Abstract: |
Data sharing is the process of interchanging, analyzing, retrieving and
integrating data. Although data sharing facilitates the way that data can be
exchanged, security concerns arise as a challenge for conducting data sharing.
Many policies include confidentiality, integrity, availability and privacy must
be taken into consideration. In this research, preserving privacy subject will
be considered. This research will propose a new privacy preserving data sharing
model that combines compression techniques such as Huffman coding and different
encryption algorithms in order to provide privacy in data sharing to facilitate
data sharing in different areas. Performance parameters, such as processing and
transfer time, and the enhancement for the expected model are also considered.
Experiments results over 10 different files sizes show that the proposed model
provide privacy to shared files also it reduces large files size since the
proposed model uses Huffman coding and it is 87% faster on speed of 1MB/sec and
on speed of 16MB/sec it is 38% faster than existing models. |
Keywords: |
Security, Data Sharing, Privacy, cryptography, compression. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
EMPIRICAL STUDY ON BANDWIDTH OPTIMIZATION FOR KERNEL PCA IN THE K-MEANS
CLUSTERING OF NON-LINEARLY SEPARABLE DATA |
Author: |
CORI PITOY, SUBANAR, ABDURAKHMAN |
Abstract: |
K-Means is a method of non-hierarchical data clustering, which partitions
observations into k clusters so that observations with the same characteristics
are grouped into the same cluster, while observations with different
characteristics are grouped into other cluster. The advantages of this method
are easy to apply, simple, and efficient, and its success has been proven
empirically. The problem is when the data is non-linearly separable. Overcoming
the problem of non-linearly separable data can be done through a data extraction
and dimension reduction using Kernel Principal Component Analysis (KPCA). The
results of KPCA transformation were affected by the kernel type and the size of
bandwidth parameters (), as a smoothing parameter. Calculation of K-Means
clustering of Iris dataset, using 2 Principal Component (PC), Euclid distance
and Gaussian kernel showed that the external validity (entropy) and internal
validity (Sum Square Within) are better than the result of standard K-Means
algorithm. |
Keywords: |
K-Means Clustering, KPCA Bandwidth, Validity, Entropy, Non-Linear Separable
Dataset |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
SIMULATING THE IMMUNE INSPIRED ENERGY CHARGING MECHANISM FOR SWARM ROBOTIC
SYSTEMS |
Author: |
MOHAMMED AL HAEK , AMELIA RITAHANI ISMAIL |
Abstract: |
Fault tolerance or the property that enables a system to continue its operation
properly in the event of partial failure is one of the most desired criteria in
swarm robotic systems. There is a possibility that a continuous failure of the
member(s) of the swarm, will reflect on the overall performance of the systems.
In this paper, we proposed an immune-inspired energy charging mechanism, which
is inspired by the process of immune responses. The proposed energy charging
mechanism is presented, simulated and compared with another common energy
charging mechanism, which is the use of contact-less energy charging area. Based
on the experimental results, the proposed mechanism shows an improvement in
terms of performance time and aggregate energy of the swarm to perform its task. |
Keywords: |
Swarm robotics, Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
AN EXPANDED SQUARE PATTERN TECHNIQUE IN SWARM OF QUADCOPTERS FOR EXPLORATION
ALGORITHM |
Author: |
MUHAMMAD FUAD RIZA ZUHRI , AMELIA RITAHANI ISMAIL |
Abstract: |
The exploration algorithm is one of the most important roles in the searching
mechanism. In robotics field, the exploration algorithm deals with the
implementation of the robot to enlarge the information over a particular
environment. In other words, the implementation of exploration algorithm into a
robot is intended to survey the situation or condition of a specific area. A
variety of techniques has been developed, even the biological systems also
become an inspiration to be reckoned. In this paper, we proposed a swarm-based
exploration algorithm with expanded square pattern using a quadcopter to explore
an unknown area. In this algorithm, the expanded square pattern is conducted by
a series of distance around a fixed reference point. We simulate the swarm-based
exploration algorithm with expanded square pattern using a VREP simulator. The
existing exploration algorithms that have been identified are also simulated to
be compared with the proposed algorithm. In order to analysed and evaluate the
performance of all algorithms, the data of simulation is documented. Some
comparisons are conducted such as the performance of all algorithms, the
performance of a group of the quadcopter, the covered spaces and the cooperation
among groups. |
Keywords: |
Coordinated Exploration; Path Planning; Quadcopter; Swarm Robot |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
IMPLEMENTATION OF K-NEAREST NEIGHBOR ALGORITHM ANALYSIS IN PREDICTING REGULAR
HAJJ APPLICANT FAILURE |
Author: |
EVA PURNAMANINGTYAS, EMA UTAMI |
Abstract: |
Growth of number hajj applicant is always increasing so that it produces very
large dataset. Hajj office department on Local Religion Ministry Office Bantul
is the only official governments instance that serving hajj in Bantul Regency
trying to always provide the best service for people by providing accurate
information and data as quickly as possible. Business intelligence become one of
chosen solution to solve various need on providing and processing information
and data accurately, effectively, and up to date so that can produce good
report. One of key information is to predict hajj attendance that will fail so
that it can be useful for others hajj attendance which are on the waiting list
to prepare themself, this prediction is using k-nearest neighbor (KNN)
algorithm. Hajj and Umrah Department has various services accommodating hajj
applicants end-to-end including registrations and cancellations of each
applicants. Currently the applicants that cancel their applications is
unpredictable and only have very short notice period so that the applicants that
is in waiting list only have very limited time to prepare themself. Considering
this, system that can predict the number of cancelled applicants is very
important and highly needed to solve the problem. On this prediction,
preprocessing are used by giving weightage for each factors and then calculation
have been done by using KNN algorithm so that the output is the nearest distance
of the new case from the old case in the dataset, and after that that new case
can predict the result of the new case as the Nearest Neighbor's result.
Measurement of this algorithm is using cross validation. The highest accuracy in
this thesis is 96.2% by using value of k optimum=9. All cases will be classified
based on the data set (data training) in this KNN algorithm even though the
distance will not be 100% for each all cases. Setting up the weightage variable
and weightage of distance on each factors being done manually, this make the
values of those weightage vary based on user's assumptions. However those
weightage is highly affecting the end value of distance on each case in the
result. The determination of variable weights and the comparative weight of
manually assigned variable ratios allows different values according to the
user's perception, whereas the value of the variable weights and the weight of
the variable values greatly affects the proximity between one case and the
other. |
Keywords: |
Predict Hajj Attendance, Report, K-Nearest Neighbor, Cross Validation |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
AN HYBRID GRAVITATIONAL METHOD FOR SOLVING THE CELL FORMATION PROBLEM |
Author: |
MANAL ZETTAM |
Abstract: |
The Cellular Manufacturing System has emerged as a strategy capable of improving
the manufacturing cost and decreasing the lead time with no negative impacts on
the product quality. One of the fundamental problems of this strategy is known
as the Cell Formation Problem, which consists of defining cells including a
machine group and a product (part) family. In this paper, we consider the
Manufacturing Cell Formation Problem where the objective is to maximize the
Grouping Efficacy measure. We introduce a hybrid gravitational method (HGM)
combining a population based algorithm and a local search procedure. This hybrid
metaheuristic is a variant of the Discrete Gravitational Search Algorithm
(DGSA). It allows searching extensively the feasible domain of a problem during
the early iterations. It also includes a well-balanced mechanism for enhancing
exploration and exploitation strategies. Several modifications were necessary to
adapt the DGSA in order to maintain similar performance when dealing with the
CFP. The major ones consist in modifying the population of solutions and in
performing the exploration phase. The Path Relinking process used in DGSA to
modify the solution is replaced by a crossover strategy derived from concepts of
the Gravitational Search Algorithm (GSA). The performance of this hybrid variant
of the Gravitational Search Algorithm is evaluated using a set of 35 benchmarks
from the literature. The numerical results confirm that our hybrid metaheuristic
could be considered as one of the best algorithms. |
Keywords: |
Cell Formation Problem, Hybrid Gravitational Method, Gravitational Search
Algorithm, Tabu Search, Grouping Efficacy |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
UTILIZATION OF OPEN SOURCE TECHNOLOGY IN DETERMINING OF VALIDITY AND RELIABILITY
OF EVALUATION MODEL INSTRUMENTS BASED ON ANEKA VALUES IN ORDER TO EVALUATE THE
QUALITY OF COMPUTER LEARNING |
Author: |
DEWA GEDE HENDRA DIVAYANA, ANAK AGUNG GEDE AGUNG, BASO INTANG SAPPAILE,
WAKHINUDDIN SIMATUPANG, YULIATRI SASTRAWIJAYA, I MADE SUNDAYANA, GUSTI AYU DESSY
SUGIHARNI |
Abstract: |
The aims of this research was to obtain the instrument of evaluation model based
on ANEKA values that valid and reliable to used in evaluate the quality of
computer learning. The method used in this research is instrument development
method. Specific research on the making of this instrument is carried out within
1 month with some activities carried out, among others: definition of variables,
translation of variables into more detailed indicators, preparation of
instrument items, test of instruments, and analysis of instrument validity and
reliability. Research subjects involved in this study are: 1 expert evaluation
of education and 1 expert informatics engineering education that validating the
contents of the instrument. In addition, there are 4 experts and 26 students who
tested the validity and reliability of the instrument. The results of this
research is a new breakthrough utilization of open source technology that is
used for the calculation of validity and reliability of instruments, so obtained
the items of evaluation model instrument based on ANEKA values that valid and
very high reliability. |
Keywords: |
Evaluation Model, ANEKA, Instruments, Validity, Reliability, Open Source
Technology |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
SHAPE AND GEOMETRIC FEATURES-BASED SEMANTIC IMAGE RETRIEVAL USING MULTI-CLASS
SUPPORT VECTOR MACHINE |
Author: |
ZOHAIR MALKI |
Abstract: |
In this paper, a new approach to retrieve semantic images based on shape and
geometric features of image in conjunction with multi-class support vector
machine is proposed. Zernike moment as shape feature is to verify the invariance
of objects for silhouette image. In addition, a set of geometrical features is
to explore the objects shape using two features of rectangularity and
circularity. Then the extracted features are normalized and employed for
multi-class support vector machine either for learning or retrieving processes.
The retrieving process relies on three main tasks which namely Query Engine,
Matching Module and Ontology Manger, respectively. Query Engine is to build the
input text or image query using SPARQL language. The matching module extracts
the shape and geometric features of images objects and employ them to Ontology
Manger which in turn inserts them in ontology knowledge base. Benchmark mammals
have been conducted to empirically conclude the outcome of proposed approach.
Our experiment on text and image retrieval yields efficient results to
problematic phenomena than previously reported. |
Keywords: |
Zernike moment, Multi-class Support Vector Machine, Query Engine, SPARQL. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
AUTO-OPTIMIZATION IN SELF-ORGANIZING NETWORK (SON) FOR 4G LTE CELLULAR SYSTEMS |
Author: |
HUSSEIN A.AL OFEISHAT |
Abstract: |
In this paper, we propose to implement functions of self-organizing networks
(SON) for Auto-optimization related to load balancing for LTE mobile
radio-cellular systems through ns-3 simulation. The implementation is carried
out through two algorithms dynamically adjusting the parameters of the handover
(HO) based on the measurements of the received signal strength (RSRP). This
adjustment is made as a function both of the load of the congested cell and of
the neighboring cells less loaded and arranged to cooperate for a better
distribution of the load. The numerical results obtained by simulation for
the two load balancing algorithms implemented and a handover algorithm (already
implemented in ns-3) based on the A3 event highlight the advantages of load
balancing in terms overall throughput (across the network), loss rates, and
number of handovers. It also shows the necessary compromises between these
different metrics in order to achieve an efficient load balancing. |
Keywords: |
Self-Organizing Networks (SON), 4G Mobile Networks (LTE), Load Balancing (MLB),
Dynamic Adjustment, Handover. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
THE INFLUENCE OF HUMAN RESOURCES COMPETENCY AND THE USE OF INFORMATION
TECHNOLOGY ON THE QUALITY OF LOCAL GOVERNMENT FINANCIAL REPORT WITH REGIONAL
ACCOUNTING SYSTEM AS AN INTERVENING |
Author: |
ISKANDAR MUDA, DENI YUWILIA WARDANI , ERLINA , AZHAR MAKSUM , ADE FATMA LUBIS ,
RINA BUKIT, ERWIN ABUBAKAR |
Abstract: |
This study aims to find out the influence of human resources competency and the
use of information technology on the quality of local government financial
report with regional accounting system as an intervening variable to regional
works unit in Labuhanbatu Regency, Indonesia. The sampling technic in this study
is using saturated sampling. There were 108 questionnaires distributed for all
the staff members. The hypothesis was analyzed by using Structural Equation
Model (SEM) with the help of SmartPLS software 2.0 M3. The result of this study
is, partially, the human resources competency and the use of information
technology have positive and significant influence towards the Regional
Financial Accounting System (SAKD) in Labuhanbatu Regency, Indonesia.. The
Regional Financial Accounting System (SAKD) mediates the influence of the Human
Resources Competency and the use of information technology which do not have
positive and significant influence on the quality of local government financial
report of Labuhanbatu regency. This study recommends that there should be a
comprehensive training program to improve the human resources competency in
increasing the quality of local government financial report. Besides that, the
head management should support the implementation of The Regional Financial
Accounting System and Internal Control in order to improve the quality of local
government financial report to be more optimal. |
Keywords: |
The Quality of Local Government Financial Report, Information Technology and the
Regional Financial Accounting System, Regional Works Unit and Utilization. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
TYPE 2 FUZZY SLIDING MODE CONTROL (T2FSMC) CONTROLLER ON SOLAR PANEL PROTOTYPE
USING THE MOST REPRESENTATIVE PARAMETERS |
Author: |
MARDLIJAH, NOORMAN RINANTO, ANNISA RAHMITA S |
Abstract: |
Solar energy is one of alternative energy sources in Indonesia. It can be
converted to electrical energy by solar panel. There is a collector in the solar
panel for collecting solar energy. The collector can collect solar energy
maximally if the position is vertical to the sun. For keeping the collector
position is always vertical to the sun, we choose to construct T2FSMC controller
because it can control the angular velocity of collector and improve the ability
of overcoming the disturbance and uncertainty of solar panel prototype. The
controller can be implemented to the solar panel prototype. By using the most
representative parameters, we obtain that T2FSMC controller is suitable for the
solar panel prototype. |
Keywords: |
Solar Panel, T2FSMC Controller |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
IMPLEMENTATION OF LIGHTWEIGHT CRYPTOGRAPHIC PRIMITIVES |
Author: |
BARAA TAREQ HAMMAD, NORZIANA JAMIL, MOHD EZANEE RUSLI, MUHAMMAD REZA Z ABA,
ISMAIL T. AHMED |
Abstract: |
Lightweight cryptography is not a new branch in cryptography. It is a subject
specifically addressing the implementation of security mechanism in pervasive
computing that are characterized by smart but resource constrained devices.
There are at least two main lightweight symmetric cryptographic primitives
namely lightweight block cipher and lightweight hash algorithm. Most of the
previous surveys were focusing on implementation of specific cryptographic
primitives. In this paper we present a comprehensive survey of all lightweight
symmetric cryptographic primitives, from hardware and software perspectives. The
survey covers analysis of these algorithms and a comparison between these
primitives in terms of throughput, number of cycle, comprehensive area, power,
and energy. We also provide a classification of the structure of lightweight
block cipher and lightweight hash function. These classifications are very
useful because the primitives have different and sometimes contrary
characteristics. Finally this comprehensive survey highlights some of the issues
related to security aspect of small key length in lightweight cryptographic
primitives. |
Keywords: |
Lightweight Cryptography, Symmetric Cryptography, Block Cipher, Hash Function. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
A STUDY TO IMPROVE THE SOFTWARE ESTIMATION USING DIFFERENTIAL EVOLUTION
ALGORITHM WITH ANALOGY |
Author: |
THAMARAI. I , DR. MURUGAVALLI. S |
Abstract: |
Software effort estimation is the process of calculating the effort required to
develop a software product based on the input parameters that are partial in
nature. Estimation requires information about project scope, resources
available, process requirements and many other factors associated with a
software product development. Inaccurate estimation leads to financial loss and
delay in the projects. Due to the intangible nature of software, most of the
software estimation process is not reliable. But there is a strong relationship
between effort estimation and success of project management activities. Hence
the aim of the research is to propose a new software estimation model that
combines the Analogy concept with Differential Evolution Algorithm that is more
efficient than the existing methods. Several methods for software effort
estimation are discussed in this paper including the widely used and metrics
used for evaluation. The use of Differential Evolution in the estimation is
dealt in detail. A new model for estimation using Differential Evolution
Algorithm called DEAPS is proposed and its advantages discussed. The proposed
model is checked with the popular data sets namely Desharnais datasets, Albrecht
dataset and COCOMO dataset. The results are compared with previous findings and
the results clearly show that the proposed method is better than the existing
methods. The proposed Model can be used to minimize the errors in the software
estimation which is a crucial step in the software development process. Hence
the financial loss and delay in the completion of project may be avoided |
Keywords: |
Software Effort Estimation Methods, Algorithmic and Non-Algorithmic Models,
Evolutionary Computational Methods, Differential Evolution Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
A NOVEL NETWORK CODING APPROACH: PACKETS CONFLICT BASED FOR MATRIX OPTIMIZATION |
Author: |
MOHAMMAD M. SHURMAN, MAMOUN F. AL-MISTARIHI, SHARHABEEL H. ALNABELSI, RAMI R.
BANI HANI |
Abstract: |
Network coding (NC) is a technique used to improve wireless networks throughput,
efficiency, and scalability. When employing this technique, wireless nodes
collect several packets and combine them together in one single transmission.
This technique is used to attain the maximum possible network flow with minimum
number of transmissions. COPE, OpNC and FENC are widely known approaches in
network coding that vary in complexity and optimality. COPE is the first
proposed approach for network coding that is considered as a complex approach
and may lead to a packet deadline termination; thus, transmitter should resend
packets, and therefore, the overall throughput decreases. OpNC employs the COPE
approach in order to find all possible codes for a set of packets, brute force
searching, hence it is an exhaustive approach where the optimal solution is not
always reachable. On the other hand, FENC utilizes division and conquers
technique, in order to find an optimal network coding of a set of native
packets, in which a repetitive algorithm is applied on the output queue more
than once, in order to increase the possibility of finding an optimal coding
solution. In this paper, we propose a novel technique which utilizes two
basic concepts of network coding: matrix optimization and the notion of conflict
between packets. This technique is called Conflict based Matrix Optimization
for Network Coding Enhancement (CMO-NCE), in which the opportunity of
recovering more packets within the transmitted encoded packets combination is
increased. Our proposed technique chooses better packets combination when
transmitting the encoded stream; consequently, more packets are recovered at
destination nodes. Simulation results show that the proposed technique is better
in terms of complexity and optimality than other existing techniques such as
COPE and OpNC. Also, it shows that the proposed CMO-NCE mechanism results are
close to FENC approach. However, CMO-NCEs time complexity is less than FENC and
it is linear, O(n), where n is number of wireless nodes, while FENCs time
complexity is not linear, O( ), where p is number of packets. |
Keywords: |
Network Coding, Packets Conflict, CMO-NCE, COPE, OpNC, FENC, Time Complexity |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
INSIDER RISK PROFILE MATRIX TO QUANTIFY RISK VALUE OF INSIDER THREAT PREDICTION
FRAMEWORK |
Author: |
ISZAIDA ISMAIL, ROHAYANTI HASSAN, MUHAMMAD RAZIB OTHMAN, ASRAFUL SYIFAA AHMAD,
NADA ELYA TAWFIQ |
Abstract: |
An insider threat refers to the threat arising from an individual inside an
organization that maliciously leverages his or her system privileges, and
closeness and proximity in a computerized environment to compromise valuable
information and inflict harm. This scenario is an example of system violation
that decreases the degree of system trustworthiness. Most cases of system
trustworthiness use a peer judgment formulation, which may involve bias
sentiments towards document sensitivity values. Moreover, audit trails of risky
document navigation paths are important as an alarm to indicate any violation.
Therefore, this study presents a combination of the trust criteria and document
sensitivity level of an insider to obtain a risk value, which will be used to
predict the occurrence of an insider threat. This study begins by investigating
the prominent attributes of insiders with a focus on their degree of experience
and skill in line with system trust. Subsequently, these prominent attributes
are used to construct an insider Trust Profile Matrix (TPM). From the TPM, the
trust value is calculated and combined with the sensitivity value of each
document to produce a Risk Matrix (RM). As a result, (i) risk value and (ii)
prediction rate and risky path are then calculated and analyzed using an Insider
Threat Prediction Framework as an alarm for violation occurrence. |
Keywords: |
Insider Threat, Insider Threat Prediction, Sensitivity Level, Trust Value, Risk
Value |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
ILLUSTRATION OF SEMI-SUPERVISED FEATURE SELECTION USING EFFECTIVE FRAMEWORKS |
Author: |
SUJATA GAWADE, DR.NAVEENKUMAR JAYKUMAR |
Abstract: |
Semi- supervised feature selection is a supervised feature jobs as well as
method that uses the unlabeled data for guiding that the small quantity of
labeled dataset with a huge quantity of unlabeled dataset. Semi-supervised
feature selection is drop between the unsupervised selection and supervised
selection. Feature selections have been playing an essential task in the
different studies as well as application area of machine learning. In this paper
we have explored a three-different level framework for semi-supervised feature
selection. Which are mainly feature selection methods center on discovering
relevant features for optimizing high-dimensional data. In this paper, we have
shown that the relevance need three essential frameworks which provide an
efficient feature selection in the semi-supervised context. In the constraint
selection framework they select pair wise constraints which can be extracted
from the labeled part of data. The Relevance analysis framework shows original
utilized realization which competently merges the direct of the restricted
geometrical construction of unlabeled data with a selected constraint from the
first framework. It allows us to verify the set of relevant features. For the
CSFSR and efficiency framework, is to find out and supply the redundant features
from the relevant ones which can be chosen from the second framework. It also
shows the comparison between third framework and prims algorithm for better
feature selection. Result of this proposed system is efficiency with statistical
and graphical view. |
Keywords: |
Feature selection, Dimensionality reduction, Semi supervised, Constraint,
Relevance, and Redundancy |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
ONTOLOGY-BASED MULTI-STAGE ADAPTATION TO IMPROVE INNOVATIVE FORM DESIGN |
Author: |
U. UNGKAWA, D. H. WIDYANTORO , B. HENDRADJAYA |
Abstract: |
The reuse of design artifacts is a very important paradigm since it can more
efficiently produce new high quality designs instead of designing from the
scratch. This paper discusses ontology-based adaptation applied in the XReformer
system, which implements the reuse of HTML form design with a case-based design
(CBD) approach. In a CBD system, adaptation plays a very important role and
becomes the most complicated stage. With a design-grammar and ontology-based
approach, this adaptation is expected to improve an innovative design or even
become a stepping-stone toward a creative design. In this paper, we propose a
multi-stage adaptation method consisting of composition, grouping, ordering and
laying out stages. The composition stage combines the required elements and the
grouping stage performed in order to assure the coherence of a group of
elements. The aim of ordering stage is to ensure that any element is in a proper
position relative to another element. The last stage arranges the elements in a
right position physically. The evaluation results have shown that this
adaptation is able to reuse and generate new (innovative) form designs. |
Keywords: |
Form-Based User Interface, Design Reuse, Form Ontology, Case-Based Reasoning. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
SUPERVISED CLASSIFICATION AND IMPROVED FILTERING METHOD FOR SHORELINE DETECTION |
Author: |
FARIZUWANA A. ZULKIFLE, ROHAYANTI HASSAN, RAZIB M. OTHMAN, AMIRA BIBO SALLOW |
Abstract: |
Shoreline monitoring is important to overcome the problems in the measurement of
the shoreline. Recently, many researchers have directed attention to methods of
predicting shoreline changes by the use of multispectral images. However, the
images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and
shoreline using multispectral satellite image is one of the challenges
encountered in the detection of shoreline. An efficient framework using the near
infrared histogram equalisation and improved filtering method is proposed to
enhance the detection of the shoreline in Tanjung Piai, Malaysia, by using
SPOT-5 images. Sub-pixel edge detection and the Wallis filter are used to
compute the edge location with the subpixel accuracy and reduce the noise. Then,
the image undergoes image classification process by using Support Vector
Machine. The proposed method performed more effectively and reliable in
preserving the missing line of the shoreline edge in the SPOT-5 images. |
Keywords: |
Shoreline Detection, SPOT-5, Sub-Pixel Edge Detection, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
Q - PUZZLE GAME FOR MEMORIZING THE RECITATION OF QURAN SURAH |
Author: |
HANI NURHAYATI , MUHAMMAD FAISAL , MUTAQIYUDDIN ROMADHONI |
Abstract: |
This study was aimed to support the memorizing of Quran surah by deploying the
q-puzzle game. The game is established from the sections of surah that have
already been erased intentionally. The surah are derived from the 30thjuz where
each surah has 3 different levels. The higher the level is, the more the
eliminated sections are. |
Keywords: |
Q - Puzzle Game, Level, Sections Of Surah |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
Title: |
A NONLINEAR HEURISTIC MODIFIER FOR CONSTRUCTING EXAMINATION TIMETABLE |
Author: |
SYARIZA ABDUL-RAHMAN, SHARIFAH SHUTHAIRAH SYED ABDULLAH, AIDA MAUZIAH BENJAMIN |
Abstract: |
This research focuses on solving an examination timetabling problem by
constructing solution using nonlinear heuristic modifier of Graph Coloring
Heuristics. Two graph coloring heuristics i.e. largest degree and saturation
degree were used within the nonlinear heuristic modifier to generate difficulty
value of each examination, where it was modified nonlinearly whenever an
examination cannot be scheduled in the previous iteration. Next, new ordering of
examinations was obtained based on the new difficulty values and each
examination was scheduled until a complete timetable is obtained. The nonlinear
heuristic modifier is proposed to set a difficulty value of an examination
within a nonlinear range, so that an effective estimation of examinations
difficulty could be obtained. The Toronto benchmark datasets were used in the
experiment where the aim is to obtain an examination schedule with minimum
penalty value. It is found that the proposed method is comparable with other
approaches, hence gives better examination ordering. |
Keywords: |
Examination Timetabling Problem; Nonlinear Heuristic Modifier; Graph Coloring
Heuristics; Toronto Benchmark Datasets |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2017 -- Vol. 95. No. 20 -- 2017 |
Full
Text |
|
|
|