The development of information technology should be ordered to improve the services including job fair information system
services. This work aimed to develop of web-based job fair information system. The methods used in this work consists of collecting
data method, and software development method. Collecting data method using observations, interview, and literature study. Software
development method using waterfall model comprising the steps of requirements, specfification and design, implementation, testing,
deployment, and maintenance. The results of this work is software web-based information system provided a job information,
registration, and test schedule information.
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits the possibility of database integration with other systems. We describes a generalized approach comprising a loosely couples system and integrate with other system. It deals with the setting up the environment for implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits
the possibility of database integration with other systems. We describes a generalized approach comprising a
loosely couples system and integrate with other system. It deals with the setting up the environment for
implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Student Administration System is primarily a paper based method to manage of student information or student profile detail. Nowadays, most people are not interested paper based application. So, find more efficient solution to reduce paper waste, and staff workload. Administration System is the most suitable solution for people who want to request without paper and view for their request. Decision support system is used for easily making decisions by administrators. Administration System is accessible from anywhere and works with a secure login. The system is fully secure and protected from accessing without authorization. With a user friendly interface requests and approvals can be completed quickly and accurately. Administration System is an automatic system that allows users to apply for management of their data with easily. Ma Hnin Yu Myaing | Ma Naing "Student Administration System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26388.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26388/student-administration-system/ma-hnin-yu-myaing
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits the possibility of database integration with other systems. We describes a generalized approach comprising a loosely couples system and integrate with other system. It deals with the setting up the environment for implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
SOA-A GENERIC APPROACH FOR INTEGRATING LOOSELY COUPLED SYSTEMS WITH OTHER SYS...ijwscjournal
Various organizations generate data in various domains which is queried and analyzed by users. This limits
the possibility of database integration with other systems. We describes a generalized approach comprising a
loosely couples system and integrate with other system. It deals with the setting up the environment for
implementing the system. User Interface screen shows how the user will interact with the system and the data
entry forms required to gather data for the system.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Student Administration System is primarily a paper based method to manage of student information or student profile detail. Nowadays, most people are not interested paper based application. So, find more efficient solution to reduce paper waste, and staff workload. Administration System is the most suitable solution for people who want to request without paper and view for their request. Decision support system is used for easily making decisions by administrators. Administration System is accessible from anywhere and works with a secure login. The system is fully secure and protected from accessing without authorization. With a user friendly interface requests and approvals can be completed quickly and accurately. Administration System is an automatic system that allows users to apply for management of their data with easily. Ma Hnin Yu Myaing | Ma Naing "Student Administration System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26388.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26388/student-administration-system/ma-hnin-yu-myaing
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
AUTO-CDD: automatic cleaning dirty data using machine learning techniquesTELKOMNIKA JOURNAL
Cleaning the dirty data has become very critical significance for many years, especially in
medical sectors. This is the reason behind widening research in this sector. To initiate the research, a
comparison between currently used functions of handling missing values and Auto-CDD is presented.
The developed system will guarantee to overcome processing unwanted outcomes in data Analytical
process; second, it will improve overall data processing. Our motivation is to create an intelligent tool that
will automatically predict the missing data. Starting with feature selection using Random Forest Gini Index
values. Then by using three Machine Learning Paradigm trained model was developed and evaluated by
two datasets from UCI (i.e. Diabetics and Student Performance). Evaluated outcomes of accuracy proved
Random Forest Classifier and Logistic Regression gives constant accuracy at around 90%. Finally,
it concludes that this process will help to get clean data for further analytical process.
This paper discusses an automated approach to database change management throughout the companies’ development workflow. By using automated tools, companies can avoid common issues related to manual database deployments. This work was motivated by analyzing usual problems within organizations, mostly originated from manual interventions that may result in systems disruptions and production incidents. In addition to practices of continuous integration and continuous delivery, the current paper describes a case study in which a suggested pipeline is implemented in order to reduce the deployment times and decrease incidents due to ineffective data controlling.
Estimation of Functional Size of a Data Warehouse System using COSMIC FSM Methodidescitation
It is not easy to measure the functional size of
Data Warehouse System. Data Warehouse system is not
traditional system and it can be easily measured using FSM
(Functional Size Measurement) Method. In this paper we have
shown with the help of a case study to measure the functional
size of the Data Warehouse System using COSMIC
FSMmethod. We will explore the use of COSMIC in sizing
Data Warehouse Systems.
System Development Life Cycle
Data, Function, Network, People, Time, Motivation What constitutes the “enterprise”?
Key enterprise architecture terms Enterprise Architecture Terms
How do you achieve perfect alignment?
Importance of alignment
Lack of Alignment
Nature of Complexity
Architectural Principles
Extract Business Process Performance using Data MiningIJERA Editor
This paper aimed to analyze the performance of the business process using process mining. The performance is very important especially in large systems .the process of repairing devices was used as case study and the Fuzzy Miner Algorithm used to analyze the process model performance
AN OVERVIEW OF EXISTING FRAMEWORKS FOR INTEGRATING FRAGMENTED INFORMATION SYS...ijistjournal
Literatures show that there are several structured integration frameworks which emerged with the aim of facilitating pplication integration. But weakness and strength of these frameworks are not known. This
paper aimed at reviewing these frameworks with the focus on identifying their weakness and strength. Toaccomplish this, recommended comparison factors were identified and used to compare these frameworks.Findings shows that most of these structure frameworks are custom based on their motives. They focus onintegrating applications from different sectors within an organization for the purpose of eliminating communication inefficiencies. There is no framework which guides pplication’s integrators on goals of integrations, outcomes of integration, outputs of integration and skills which will be required for
types of applications expected to be integrated. The study recommended further study on integration
framework especial on designing unstructured framework which will support and guide application’s
integrators with consideration on consumer’s surrounding environment.
O N N Fernando, G N Wikramanayake (1998) "Web Based Agriculture Information System" In: Conference, Exhibition and Business Directory of 1st International Information Technology Conference, p. 36. Infotel Lanka Society, Colombo, Sri Lanka: IITC Oct 7-8
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
AUTO-CDD: automatic cleaning dirty data using machine learning techniquesTELKOMNIKA JOURNAL
Cleaning the dirty data has become very critical significance for many years, especially in
medical sectors. This is the reason behind widening research in this sector. To initiate the research, a
comparison between currently used functions of handling missing values and Auto-CDD is presented.
The developed system will guarantee to overcome processing unwanted outcomes in data Analytical
process; second, it will improve overall data processing. Our motivation is to create an intelligent tool that
will automatically predict the missing data. Starting with feature selection using Random Forest Gini Index
values. Then by using three Machine Learning Paradigm trained model was developed and evaluated by
two datasets from UCI (i.e. Diabetics and Student Performance). Evaluated outcomes of accuracy proved
Random Forest Classifier and Logistic Regression gives constant accuracy at around 90%. Finally,
it concludes that this process will help to get clean data for further analytical process.
This paper discusses an automated approach to database change management throughout the companies’ development workflow. By using automated tools, companies can avoid common issues related to manual database deployments. This work was motivated by analyzing usual problems within organizations, mostly originated from manual interventions that may result in systems disruptions and production incidents. In addition to practices of continuous integration and continuous delivery, the current paper describes a case study in which a suggested pipeline is implemented in order to reduce the deployment times and decrease incidents due to ineffective data controlling.
Estimation of Functional Size of a Data Warehouse System using COSMIC FSM Methodidescitation
It is not easy to measure the functional size of
Data Warehouse System. Data Warehouse system is not
traditional system and it can be easily measured using FSM
(Functional Size Measurement) Method. In this paper we have
shown with the help of a case study to measure the functional
size of the Data Warehouse System using COSMIC
FSMmethod. We will explore the use of COSMIC in sizing
Data Warehouse Systems.
System Development Life Cycle
Data, Function, Network, People, Time, Motivation What constitutes the “enterprise”?
Key enterprise architecture terms Enterprise Architecture Terms
How do you achieve perfect alignment?
Importance of alignment
Lack of Alignment
Nature of Complexity
Architectural Principles
Extract Business Process Performance using Data MiningIJERA Editor
This paper aimed to analyze the performance of the business process using process mining. The performance is very important especially in large systems .the process of repairing devices was used as case study and the Fuzzy Miner Algorithm used to analyze the process model performance
AN OVERVIEW OF EXISTING FRAMEWORKS FOR INTEGRATING FRAGMENTED INFORMATION SYS...ijistjournal
Literatures show that there are several structured integration frameworks which emerged with the aim of facilitating pplication integration. But weakness and strength of these frameworks are not known. This
paper aimed at reviewing these frameworks with the focus on identifying their weakness and strength. Toaccomplish this, recommended comparison factors were identified and used to compare these frameworks.Findings shows that most of these structure frameworks are custom based on their motives. They focus onintegrating applications from different sectors within an organization for the purpose of eliminating communication inefficiencies. There is no framework which guides pplication’s integrators on goals of integrations, outcomes of integration, outputs of integration and skills which will be required for
types of applications expected to be integrated. The study recommended further study on integration
framework especial on designing unstructured framework which will support and guide application’s
integrators with consideration on consumer’s surrounding environment.
O N N Fernando, G N Wikramanayake (1998) "Web Based Agriculture Information System" In: Conference, Exhibition and Business Directory of 1st International Information Technology Conference, p. 36. Infotel Lanka Society, Colombo, Sri Lanka: IITC Oct 7-8
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
At the present time to getting a good job is very intricate task for any job seekers. The same problem also a company can face to acquire intelligent and qualified employees. Therefore, to minimize the problem, there are many management systems were applied and out of them, computer based management system is one of an appropriate elucidation for this problem. In the computer management system, software are made for jobseekers to find their suitable companies and as well as made for companies for finding their suitable employees. However, the available software in the market are not intelligent based, and to make privacy, security and robustness, the software should made with the application of expert system. In this proposed study, an attempt has been made for finding the solution for job seekers and the companies with the application of expert systems.
Developing Sales Information System Application using Prototyping ModelEditor IJCATR
This research aimed to develop the system that be able to manage the sales transaction, so the transaction services will be
more quickly and efficiently. The system has developed using prototyping model, which have steps including: 1) communication and
initial data collection, 2) quick design, 3) formation of prototyping, 4) evaluation of prototyping, 5) repairing prototyping, and 6) the
final step is producing devices properly so it can used by user. The prototyping model intended to adjust the system in accordance with
its use later, made in stages so that the problems that arise will be immediately addressed. The results of this research is a software
which have consumer transaction services including the purchasing services, sale, inventory management, and report for management
needed purpose. Based on questionnaires given to 18 respondents obtained information on the evaluation system built, among others:
1) 88% strongly agree and 11% agree, the application can increase effectiveness and efficiently the organizations/enterprises; 2) 33%
strongly agree, 62 agree, and 5% not agree, the application can meet the needs of organization/enterprise
Developing Sales Information System Application using Prototyping ModelEditor IJCATR
This research aimed to develop the system that be able to manage the sales transaction, so the transaction services will be more quickly and efficiently. The system has developed using prototyping model, which have steps including: 1) communication and initial data collection, 2) quick design, 3) formation of prototyping, 4) evaluation of prototyping, 5) repairing prototyping, and 6) the final step is producing devices properly so it can used by user. The prototyping model intended to adjust the system in accordance with its use later, made in stages so that the problems that arise will be immediately addressed. The results of this research is a software which have consumer transaction services including the purchasing services, sale, inventory management, and report for management needed purpose. Based on questionnaires given to 18 respondents obtained information on the evaluation system built, among others: 1) 88% strongly agree and 11% agree, the application can increase effectiveness and efficiently the organizations/enterprises; 2) 33% strongly agree, 62 agree, and 5% not agree, the application can meet the needs of organization/enterprise.
With quick advancement of investigative databases and web data databases are turning out to be exceptionally colossal in size and complex in nature. These databases hold extensive and heterogeneous information, with huge number of relations and qualities. So it is exceptionally hard to outline an arrangement of static inquiry structures to answer different specially appointed database inquirieson these cutting edge databases. Along these lines there is need of such framework which create Query Forms powerfully as indicated by the clients need at run time. The proposed framework Dynamic Query Form i.e.DQF framework going to give an answer by the inquiry interface in extensive and complex databases. In proposed framework, the center idea is to catch client intrigues all through client associations and to adjust the inquiry sort iteratively. Each cycle comprises of 2 sorts of client collaborations: Query Form Enrichment and Query Execution. In Query Form Enrichment DQF would prescribe a positioned rundown of question structure part to client so he/she can choose sought structure segments into current inquiry structure. In Query Execution client fills current inquiry shape and submit question, DQF going to show result and take input from client on gave question results. A client would have office to fill the inquiry frame and submit questions to see the inquiry result at every cycle. So that a question structure could be progressively refined till the client fulfills with the inquiry results.
Online course register system project report.pdfKamal Acharya
Student course registration process in colleges involve filling registration forms manually, getting it signed by respective subject teachers, and then getting the documents acknowledged from the concerned Advisors, College Deans and Accounts Officers respectively. Finally the registration forms are submitted in the Administrative Branch. As is evident, this process is very laborious and time consuming. An Online Student Course Registration System has been developed to simplify the current manual procedure. This system has been developed using PHP and MySQL. The front-end is designed using PHP with excerpts of code written using and back-end is designed and managed through MySQL. This system software is more secured, user-friendly and less time-consuming. Basically, systems are implemented for facilitating complex manual processes and that is exactly what we are trying to achieve. System is implemented as per user requirement such as a manufacturing concern may install a plant for easing out manual processes. We have sought help from computer programming for automation of manual registration system. With the introduction of computers, every aspect of our lives has been revolutionized. When used judiciously, computers can help us save time, secure our personal information, access the required information whenever and wherever required. Keeping all these positive points in mind, we have developed an Online Student Course Registration System for easily managing the semester registration process for the student in an institution. Ours is an advisory based system. In state agricultural universities the course allocation is advisory based and more complicated. The courses are assigned according to the skill set and industry requirements. Hence, in current scenario, automated system is required for course registration of students.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Development of Web-based Job Fair Information System
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 481 - 484, 2015, ISSN:- 2319–8656
www.ijcat.com 481
Development of Web-based Job Fair Information System
Andri Pranolo
Informatics Department
Universitas Ahmad Dahlan
Yogyakarta, Indonesia
Yayan Agung Saputro
Informatics Department
Universitas Teknologi
Yogyakarta, Indonesia
Yana Hendriana
Informatics Department
Universitas Ahmad Dahlan,
Yogyakarta, Indonesia
Richki Hardi
Informatics Department
STITEK Bontang,
Bontang, Indonesia
Abstract: The development of information technology should be ordered to improve the services including job fair information system
services. This work aimed to develop of web-based job fair information system. The methods used in this work consists of collecting
data method, and software development method. Collecting data method using observations, interview, and literature study. Software
development method using waterfall model comprising the steps of requirements, specfification and design, implementation, testing,
deployment, and maintenance. The results of this work is software web-based information system provided a job information,
registration, and test schedule information.
Keywords: Web-based; job fair; information system; waterfall model; software
1. INTRODUCTION
Utilization of information technology (IT) in various fields to
support the easy and productivity of work at this time is very
fast growing. IT utilization has also been used by various
organizations or institutions to recruit prospective employees,
so that the job information more quickly spread and the
registration process has become more effective and efficient.
This research was conducted in a Vocational School in
Indonesia, namely SMKN 1 Salam Magelang. As well as to
access a job fair information and registration systems,
applicants should be came to school, it can be causing the
applicants often miss information about job vacancies.
Therefore, this work aimed to develop of web-based job fair
information system.
Theory and research of recruitment show that objective
characteristics, subjective considerations, and critical contact
send the information of organization and opportunities to
prospective applicants [1]. Specially, in selection and
assessment decision making of human resources fields needed
certification [2], therefore in vocational high schools in
Indonesia also conducted tests competence for certification of
expertise.
The work has been done before, such as applying signaling
theory to the web-based recruitment domain and by testing a
mediated relationship implied therein [3]; Web-based job
management system simulated mechanism of user for HPC
job scheduler in windows HPC sever platform [4]; Web-based
framework for job-embedded technology-enhanced social
language learning [5]; basic information service of job post
resource based on web mining [6]; web-based job submission
mechanism for scientific cloud computing [7]; and job-
searcher for high school student based on deep web
technology [8]. In this paper will be discussed, how about the
development of web-based job fair information system using
model waterfall.
The rest of this paper is organized as follows. In Section 2,
described the method used in this work. In Section 3, results
and discussion. The conclusion is presented in Section 4.
2. METHOD
The methods used in this work consists of: 1) collecting data
method, and 2) software process development model.
Collecting data method using observations, interview, and
literature study. Software process development model using
waterfall comprising the steps of requirements, specification
and design, implementation, testing, deployment, and
maintenance [9]. In this work phase waterfall model
performed up to implementation and testing. Every phase
comes after a phase is completed and tasks can be divided
according to phases. The output of one phase becomes input
of next phase but could have the option to revisit phases in the
next cycle [10].
3. RESULTS AND DISCUSSION
3.1 Requirements
Information collected from data collection phase has been
carried out, the requirements needed for the system that will
be built must answer the following issues, such as:
1. A facility for job information. How a system may
provide job information that can be accessed by the
public.
2. A registration facilities. How a system may provide
registration facilities for applicants.
3. A schedule test information. How a system may provide
a schedule test information.
3.2 Specification and design
3.2.1 Systems Specification
Specification system and design phase were completed before
the implementation phase. This phase is important to produce
a system utilized as needed. The registration procedure on the
website applicants asked to fill out a form including full
name, school name, major, address, email, mobile phone, and
verification code, in order to get a username and password
used to system login. After the student login, next step is to
fill out form to complete the registration, and then submit a
document required. All information about latest job vacancies
are design to display in the first page of website, also
information about latest test schedule information will be
provided in the first page. For more information applicant
could be chosen by menu (Figure 1) that provided by system.
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 481 - 484, 2015, ISSN:- 2319–8656
www.ijcat.com 482
Figure 1. Job fair information system menu
The system built have three external entities including
members, administrators and head of officer. Privileges access
for each external entity, such as:
1. Prospective members registering as a new member by fill
out the data including name, school name, major, Address,
Email, mobile phone. Furthermore, prospective member
will be received an activation log through email, then
members could register to existing vacancies.
2. Administrators user could be manipulate (change, delete),
the data of enterprise, news, job vacancies, and member.
3. Head of officer receives print out the reports of member,
job vacancies, and member of job vacancies.
Figure 2. Data flow diagram job fair information system
Figure 2 shows that the general processes of job fair
information system, i.e. Administrators process, members
process, job vacancies process, and reports process. The
description of each process are as follows:
1. Administrators Process. Administrators could be
updating, deleting, inserting, and storing the data to all
table including admin table, member table, enterprise
table, job vacancy table, and category table.
2. Members Process. The prospective member could be
entry the data member stored in the member table.
3. Job vacancy Process. Through this process member
could be registering to the job vacancies stored in
Member Job Vacancies table, and view the information.
Administrators could be manipulating news and the data
of job vacancies.
4. Report Process. Head of officer could be accessing the
member reports, enterprise reports, and job vacancies
which retrieved from the data source such as, table of
member, job vacancies, member job vacancies,
enterprise, and category.
3.2.2 Database design
To create a database application used for the enterprise
application is a complex phase, which have the activities
involving database schema design, design of the programs
that access and update the data, and design of a security
scheme to control access to data [11]. In this work used two
model data to create a databases, such as entity relationship
data model, and relational data model. A data model is a
collection of conceptual tools for describing data, data
relationships, data semantics, and consistency constraints
[11].
3.2.2.1 Entity relationship data model
Figure 3. Entity relationship diagram
The E-R model is very useful in mapping the meanings and
interactions of real-world enterprises onto a conceptual
schema [11]. The ER model used three basics concepts,
involving entity sets, attributes, and relationship sets [11],
[12]. The entity set in this work has founded 8 entity sets
(Figure 3) involving admin entity, member entity, profile,
entity, enterprise entity, major entity, guest book entity, job
vacancy entity, and category entity. Three entity sets no have
a relationship sets, such as admin entity, profile entity, and
category entity.
Entity relationship model data could not be implemented to
database management system (DBMS), furthermore this
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 481 - 484, 2015, ISSN:- 2319–8656
www.ijcat.com 483
model data should be reduction to relational data model [12].
To reduction process of entity relationship model refer to
Silberschatz et. al. [11], [13].
3.2.2.2 Relational data model
Relational data model is a model data that uses collection of
tables to represent both data and the relationships among
those data [11]. If the previous phase using entity relationship
data model, then the relational data model created is the
reduction result from the data model entity relationship
created before. The reduction results showed the tables
created is 9 tables (Figure 4), because relationship between
member entity sets and job_vacancy sets resulting 1 new
table, namely member_job_vacancy table. Other entity sets
being a table (Figure 4).
Figure 4. Schema database diagram
3.3 Implementation and testing
System implementation is how to explain the implementation
of the requirements which has been set, such as software and
hardware used for the system could be running and work
optimally.
The first one in this section described software and hardware
that supporting the system. The system can run properly and
optimally if the system runs on recommended software
specification, involving: 1. Operating system Windows (XP,
Vista, and 2. Mozilla Firefox and Google Chrome browser. To
endorse the system running, it is necessary that adequate
hardware like processor and RAM used. The specification of
hardware is: 1) Processor Intel (minimum P4) 2) 512 MB
RAM.
3.3.1 GUI for member
Figure5. Shows the screen shot of hompage of job fair
information system. The menu designed in the horizontal
navigation, such as menu : Home, News, Profile, Major,
Enterprise, Job Vacancy, and guest books.
In part of home page (Figure 5) there is page for member
login, if member already have a username and password can
be login directly. But, if the member do not heve a username
and password should be register first.
Figure 5. Screen shot of home page
To be a member should be fill out registration form (Figure
6), including username, password, full name, school name,
major, address, email, and mobile phone.
Figure 6. Registration page
The example of coding shown in Figure 7. Line 7 to 27 are
syntax to show the form of register. On line 7, the command
action=”simpan_anggota.php” used for stored the data
to member table.
Figure 7. Syntax of registration page
Menu pages for public user, including: Home, News, Profile,
Major, Enterprise, Job vacancy, and Guest book.
3.3.2 GUI for Administrator
User administrator should be login first to access all menu to
manage the job fair information system (Figure 8).
Figure 8. Login form
The Administrators could be manipulating all data and
information in this system, including updating, deletion,
insertion, and stored new data to the database. The menu of
administrator as follows: news, job vacancy, member, profile,
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 481 - 484, 2015, ISSN:- 2319–8656
www.ijcat.com 484
major, enterprise, category, guest book, and application report
(Figure 9). The syntax of administrator menu shown in Figure
10.
Figure 9. Menu pages of administrator
Figure 10. Syntax menu pages of administrator
System test results on some browsers including Google
Chorme, Mozilla firefox, and Internet explorer and can be
viewed properly. However, need to be improved for
adaptability in which accessed or executed on mobile devices
such as smart phone and tablet. Recently web-based software
development for addaptibility to many devices is one of the
important factors. The system should be allowed software
developers to implement software such as for mobile devices
[14].
4. CONCLUSION
The conclusion of this work as follows:
1. The system built could be providing the information
about job vacancy, information about schedule test,
member registration facilities, list of enterprise, and list
of member registered to job vacancy.
2. The user of the system are public user, user member
registered in system, and user administrator. Head officer
received the print out of the report from the system.
3. The system need to improvement for adaptability in
which accessed or executed on mobile devices such as
smart phone and tablet.
5. ACKNOWLEDGMENTS
Our thanks to the anonymous reviewer for suggestion to
improve the quality of paper.
6. REFERENCES
[1] D. G. Allen, R. V Mahto, and R. F. Otondo, “Web-based
recruitment: effects of information, organizational brand, and
attitudes toward a Web site on applicant attraction.,” J. Appl.
Psychol., vol. 92, no. 6, p. 1696, 2007.
[2] H. Aguinis, S. E. Michaelis, and N. M. Jones, “Demand for
certified human resources professionals in internet-based job
announcements,” Int. J. Sel. Assess., vol. 13, no. 2, pp. 160–171,
2005.
[3] L. F. Thompson, P. W. Braddy, and K. L. Wuensch, “E-
recruitment and the benefits of organizational web appeal,”
Comput. Human Behav., vol. 24, no. 5, pp. 2384–2398, 2008.
[4] X. Wang, H. Wang, and Y. Wang, “A Web-Based Job
Management System Based on User Simulation Mechanism,” in
Multimedia and Information Technology (MMIT), 2010 Second
International Conference on, 2010, vol. 1, pp. 162–165.
[5] W. Winiwarter, “A Web-Based Framework for Job-Embedded
Technology-Enhanced Social Language Learning,” in Advanced
Learning Technologies (ICALT), 2012 IEEE 12th International
Conference on, 2012, pp. 110–112.
[6] Q. Kong, Y. Cai, and Q. Zhu, “The Case Study for the Basic
Information Service of Job Post Resource Based on Web
Mining,” in Computer Science Service System (CSSS), 2012
International Conference on, 2012, pp. 498–501.
[7] V. S. Arackal, A. Arora, D. Saxena, B. Arunachalam, and B. B.
Prahlada Rao, “Sciinterface:a Web-Based Job Submission
Mechanism for Scientific Cloud Computing,” in Cloud
Computing in Emerging Markets (CCEM), 2013 IEEE
International Conference on, 2013, pp. 1–6.
[8] H. Wen, P. Lin, S. Zhang, and H. Zhang, “HSS-JS: Job-searcher
for high school student based on Deep Web technology,” in
Communication Systems, Networks and Applications (ICCSNA),
2010 Second International Conference on, 2010, vol. 1, pp. 408–
411.
[9] C. Gao and G. Hembroff, “Implications of modified waterfall
model to the roles and education of health IT professionals,” in
Network Operations and Management Symposium (NOMS), 2012
IEEE, 2012, pp. 1368–1369.
[10]P. Trivedi and A. Sharma, “A comparative study between
iterative waterfall and incremental software development life
cycle model for optimizing the resources using computer
simulation,” in Information Management in the Knowledge
Economy (IMKE), 2013 2nd International Conference on, 2013,
pp. 188–194.
[11]A. Silberschatz, H. F. Korth, and S. Sudarshan, Database system
concepts, 6th ed. New York, USA: The McGraw-Hill
Companies, Inc, 2011.
[12]A. Pranolo and S. M. Widyastuti, “Desain Basis Data Sistem
Pakar untuk Identifikasi Penyakit pada Sengon (Falcataria
Moluccana),” 2013.
[13]F. In’amurrohman, A. Pranolo, A. Hermawan, and Y. Hendriana,
“A Relational Data Model of Natural Langange Processing on
Nahwu Learning,” Int. J. Comput. Trends Technol., vol. 24, no.
1, p. (accepted), 2015.
[14]H. Yanagisawa, “Extension of Web-Based Software
Development Environment,” in Advanced Information
Networking and Applications Workshops (WAINA), 2015 IEEE
29th International Conference on, 2015, pp. 463–466.