Preparation of courses at every university is done by hand. This method has limitations that often cause collisions schedule. In lectures and lab scheduling frequent collision against the faculty member teaching schedule, collisions on the class schedule and student, college collision course with lab time, the allocation of the use of the rooms were not optimal. Heuristic method of genetic algorithm based on the mechanism of natural selection; it is a process of biological evolution. Genetic algorithms are used to obtain optimal schedule that consists of the initialization process of the population, fitness evaluation, selection, crossover, and mutation. Data used include the teaching of data, the data subjects, the room data and time data retrieved from the database of the Faculty of Computer Science, Universitas Pembangunan Panca Budi. The data in advance through the stages of the process of genetic algorithms to get optimal results The results of this study in the form of a schedule of courses has been optimized so that no error occurred and gaps.
A genetic algorithm for a university weekly courses timetabling problemMotasem Smadi
ย
This document presents a genetic algorithm for solving a university weekly course timetabling problem. The timetabling problem involves allocating courses, teachers, rooms and time slots while satisfying constraints. The authors propose a sector-based genetic algorithm that represents timetables as chromosomes. Preliminary experimental results show the algorithm is promising for generating timetables that satisfy constraints. The algorithm uses genetic operators like crossover and mutation to evolve timetable solutions over multiple generations.
Parallel Genetic Algorithms for University Scheduling ProblemIJECEIAES
ย
University scheduling timetabling problem, falls into NP hard problems. Re-searchers have tried with many techniques to ๏ฌnd the most suitable and fastest way for solving the problem. With the emergence of multi-core systems, the parallel implementation was considered for ๏ฌnding the solution. Our approaches attempt to combine several techniques in two algorithms: coarse grained algorithm and multi thread tournament algorithm. The results obtained from two algorithms are compared, using an algorithm evaluation function. Considering execution time, the coarse grained algorithm performed twice better than the multi thread algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
ย
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about studentโs academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
โK- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
This study tested the effectiveness of algo-heuristic models in improving elementary school teacher education students' academic achievement in statistics. It involved 3 phases: 1) small group testing by instructional design and statistical learning experts, 2) large group testing by course lecturers, and 3) testing the effectiveness on students. The evaluation consisted of expert testing the theoretical quality, testing with a small group of lecturers, and large group pre-experimental testing to determine the effectiveness of the algo-heuristic model in improving student learning. The results showed a statistically significant increase in post-test scores compared to pre-test, indicating the algo-heuristic learning was effective in improving student learning of statistics.
This document summarizes a study on the modality principle's impact on test performance and perceived cognitive load among undergraduate students enrolled in an information systems course in Brazil. The study compared an audio group (AG) that received course content via audio to a text group (TG) that received the same content in text format. It was hypothesized that the AG would outperform the TG on retention and transfer tests and spend less time, but the results found no significant differences between groups. A significant difference was found between accounting and business administration students' performance, but not time spent. The researchers concluded the modality principle was not supported and that instructional designers should provide multiple delivery options to accommodate different learners.
Effect of Data Size on Feature Set Using Classification in Health Domaindbpublications
ย
In health domain, the major critical issue is prediction of disease in early stage. Prediction of disease is mainly based on the experience of physician so many machine learning approach contribute their work in the prediction of disease. In existing approaches, either prediction or feature selection has been concentrated. The aim of this paper is to present the effect of data size and set of features in the prediction of disease in health domain using Naรฏve Bayes. This shows how each attribute or combination of attribute behaves on different size of dataset.
A genetic algorithm for a university weekly courses timetabling problemMotasem Smadi
ย
This document presents a genetic algorithm for solving a university weekly course timetabling problem. The timetabling problem involves allocating courses, teachers, rooms and time slots while satisfying constraints. The authors propose a sector-based genetic algorithm that represents timetables as chromosomes. Preliminary experimental results show the algorithm is promising for generating timetables that satisfy constraints. The algorithm uses genetic operators like crossover and mutation to evolve timetable solutions over multiple generations.
Parallel Genetic Algorithms for University Scheduling ProblemIJECEIAES
ย
University scheduling timetabling problem, falls into NP hard problems. Re-searchers have tried with many techniques to ๏ฌnd the most suitable and fastest way for solving the problem. With the emergence of multi-core systems, the parallel implementation was considered for ๏ฌnding the solution. Our approaches attempt to combine several techniques in two algorithms: coarse grained algorithm and multi thread tournament algorithm. The results obtained from two algorithms are compared, using an algorithm evaluation function. Considering execution time, the coarse grained algorithm performed twice better than the multi thread algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
ย
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about studentโs academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
โK- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
This study tested the effectiveness of algo-heuristic models in improving elementary school teacher education students' academic achievement in statistics. It involved 3 phases: 1) small group testing by instructional design and statistical learning experts, 2) large group testing by course lecturers, and 3) testing the effectiveness on students. The evaluation consisted of expert testing the theoretical quality, testing with a small group of lecturers, and large group pre-experimental testing to determine the effectiveness of the algo-heuristic model in improving student learning. The results showed a statistically significant increase in post-test scores compared to pre-test, indicating the algo-heuristic learning was effective in improving student learning of statistics.
This document summarizes a study on the modality principle's impact on test performance and perceived cognitive load among undergraduate students enrolled in an information systems course in Brazil. The study compared an audio group (AG) that received course content via audio to a text group (TG) that received the same content in text format. It was hypothesized that the AG would outperform the TG on retention and transfer tests and spend less time, but the results found no significant differences between groups. A significant difference was found between accounting and business administration students' performance, but not time spent. The researchers concluded the modality principle was not supported and that instructional designers should provide multiple delivery options to accommodate different learners.
Effect of Data Size on Feature Set Using Classification in Health Domaindbpublications
ย
In health domain, the major critical issue is prediction of disease in early stage. Prediction of disease is mainly based on the experience of physician so many machine learning approach contribute their work in the prediction of disease. In existing approaches, either prediction or feature selection has been concentrated. The aim of this paper is to present the effect of data size and set of features in the prediction of disease in health domain using Naรฏve Bayes. This shows how each attribute or combination of attribute behaves on different size of dataset.
In preparing the schedule of course not an easy job. There are several aspects that influence in the preparation of schedules of courses that professors, students, courses, lecture rooms, and a time slot. Each of these aspects has a state that can be a problem and a conflict in scheduling courses. For example, the problems facing aspect lecturers are lecturers conflict is a lecturer teaches courses scheduled at two different locations at a time. Or from the aspect of students, the problem is the number of classes per generation. In addition to these problems, there are many more potential problems that can arise from each of these aspects. A decision support system needed a model settlement of the problems encountered. To be able to determine the right model can be done by identifying problems and analyze environmental problems and identify variables that are involved in decision making. In scheduling the course, the problem is a complex problem that is solved by routine or repetitive. The complexity of the problem can be seen from every aspect in the preparation schedule of courses that are interconnected with other aspects. Then, the scheduling is done every semester by environmental circumstances different issues each semester. So that the right model for this system is a heuristic programming model.
A CRITICAL REVIEW ON THE OPTIMIZATION METHODS IN SOLVING EXAM TIMETABLING AND...IAEME Publication
ย
This document provides a critical review of various optimization methods that have been used to solve exam timetabling and scheduling problems. It discusses several approaches that have been applied, including sequential construction algorithms, iterative improvement methods like genetic algorithms and simulated annealing, and various heuristics based on graph coloring techniques. The review examines how different ordering and assignment strategies can impact the feasibility and quality of generated timetables. It provides an overview of the general framework for exam timetabling as a two-phase process involving initial construction and subsequent improvement.
HIGH SCHOOL TIMETABLING USING TABU SEARCH AND PARTIAL FEASIBILITY PRESERVING ...P singh
ย
The high school timetabling is a combinatorial optimization problem. It is proved to be NP-hard and has several hard and soft constraints. A given set of events, class-teacher meetings and resources are assigned to the limited space and time under hard constraints which are strictly followed and soft constraints which are satisfied as far as possible. The feasibility of timetable is determined by hard constraints and the soft constraints determine its quality. Difficult combinatorial optimization problems are frequently solved using Genetic Algorithm (GA). We propose Partial Feasibility Preserving Genetic Algorithm (PFP-GA) combined with tabu search to solve hdtt4, โhard timetablingโ problem a test data set in OR-Library. The solution to this problem is zero clashes and maintaining teacherโs workload on each class in given venue. The modified GA procedures are written for intelligent operators and repair. The PFP-GA in association with Tabu Search (TS) converges faster and gives solution within a few seconds. The results are compared to that of using different methodologies on same data set.
The document discusses using a genetic algorithm to solve the complex problem of university course scheduling. It describes the problem which involves assigning courses, professors, classrooms and time slots while satisfying various hard and soft constraints. A phased approach is proposed which first assigns professors to subjects, then labs to courses, followed by assigning lectures to time slots and labs/tutorials to days and time slots. The genetic algorithm representation and fitness function are defined based on the scheduling problem. The approach is demonstrated on the course scheduling problem at Christ University and is able to generate a timetable that satisfies the hard constraints, though some soft constraints remain unsatisfied.
A scoring rubric for automatic short answer grading systemTELKOMNIKA JOURNAL
ย
During the past decades, researches about automatic grading have become an interesting issue. These studies focuses on how to make machines are able to help human on assessing studentsโ learning outcomes. Automatic grading enables teachers to assess student's answers with more objective, consistent, and faster. Especially for essay model, it has two different types, i.e. long essay and short answer. Almost of the previous researches merely developed automatic essay grading (AEG) instead of automatic short answer grading (ASAG). This study aims to assess the sentence similarity of short answer to the questions and answers in Indonesian without any language semantic's tool. This research uses pre-processing steps consisting of case folding, tokenization, stemming, and stopword removal. The proposed approach is a scoring rubric obtained by measuring the similarity of sentences using the string-based similarity methods and the keyword matching process. The dataset used in this study consists of 7 questions, 34 alternative reference answers and 224 studentโs answers. The experiment results show that the proposed approach is able to achieve a correlation value between 0.65419 up to 0.66383 at Pearson's correlation, with Mean Absolute Error (ํํดํธ) value about 0.94994 until 1.24295. The proposed approach also leverages the correlation value and decreases the error value in each method.
This document describes a new approach that combines the analytical hierarchy process (AHP) and genetic algorithm (GA) to solve the timetable problem in schools. AHP is used to rank teachers based on criteria and assign a score to each teacher. GA is then used to generate timetable schedules that aim to satisfy teacher preferences, with the fitness function considering teacher scores from AHP. The approach was tested on a simple example of scheduling classes and teachers across days and time slots. By incorporating teacher rankings and preferences, the AHP/GA approach aims to produce timetables that satisfy teachers more than existing manual or automated methods.
CONCATENATED DECISION PATHS CLASSIFICATION FOR TIME SERIES SHAPELETSijcisjournal
ย
Time-series classification is widely used approach for classification. Recent development known as timeseries shapelets, based on local patterns from the time-series, shows potential as highly predictive and accurate method for data mining. On the other hand, the slow training time remains an acute problem of this method. In recent years there was a significant improvement of training time performance, reducing the training time in several orders of magnitude. Reducing the training time degrade the accuracy in general. This work applies combined classifiers to achieve high accuracies, maintaining low training times- in the range from several second to several minutes- for datasets from the popular UCR database. The goal is achieved by training small 2,3-nodes decision trees and combining their decisions in pattern that uniquely identifies incoming time-series.
Concatenated decision paths classification for time series shapeletsijics
ย
Time-series classification is widely used approach for classification. Recent development known as timeseries
shapelets, based on local patterns from the time-series, shows potential as highly predictive and
accurate method for data mining. On the other hand, the slow training time remains an acute problem of
this method. In recent years there was a significant improvement of training time performance, reducing
the training time in several orders of magnitude. Reducing the training time degrade the accuracy in
general. This work applies combined classifiers to achieve high accuracies, maintaining low training
times- in the range from several second to several minutes- for datasets from the popular UCR database.
The goal is achieved by training small 2,3-nodes decision trees and combining their decisions in pattern
that uniquely identifies incoming time-series.
This document discusses techniques for generating academic timetables and student schedules using data mining. It reviews existing approaches such as graph coloring, constraint programming, integer programming, and clustering. The authors propose using FP-tree clustering on student course registrations to initially group students, then applying a color mapping algorithm to further optimize clusters and generate timetables and schedules that satisfy hard constraints and consider soft constraints. They test their approach on real data from the University of Bahrain.
Teaching learning based optimization techniqueSmriti Mehta
ย
Kind Attn. Engg. students, don't turn a blind eye to this one, it may do wonders to you.It is a unique NATURE INSPIRED technique free from Algo Specific Parameters, unlike others , gives accurate results and is the easiest method of optimisation known to me so far.
Courses timetabling based on hill climbing algorithm IJECEIAES
ย
In addition to its monotonous nature and excessive time requirements, the manual school timetable scheduling often leads to more than one class being assigned to the same instructor, or more than one instructor being assigned to the same classroom during the same slot time, or even leads to exercise in intentional partialities in favor of a particular group of instructors. In this paper, an automated school timetable scheduling is presented to help overcome the traditional conflicts inherent in the manual scheduling approach. In this approach, hill climbing algorithms have been modified to transact hard and soft constraints. Soft constraints are not easy to be satisfied typically, but hard constraints are obligated. The implementation of this technique has been successfully experimented in different schools with various kinds of side constraints. Results show that the initial solution can be improved by 72% towards the optimal solution within the first 5 seconds and by 50% from the second iteration while the optimal solution will be achieved after 15 iterations ensuring that more than 50% of scientific courses will take place in the early slots time while more than 50% of non-scientific courses will take place during the later time's slots.
Timetable Generator Using Genetic AlgorithmIRJET Journal
ย
This document discusses using a genetic algorithm to generate a university timetable. It begins with an abstract that introduces the topic and objectives. It then provides background on genetic algorithms and their use for timetable generation. The document reviews related literature on using genetic algorithms and scheduling constraints. It proposes developing a university timetable generator using a genetic algorithm with adaptive and elite traits. The methodology section outlines the genetic algorithm process, including input data, parameter settings, fitness evaluation, and constraint checking to generate an optimal timetable solution. The overall aim is to create an artificial intelligence system that can automatically generate timetables while minimizing errors.
1) The document outlines the development of a time table scheduling system using a genetic algorithm approach. It includes the team members and their roles, problem description, requirement gathering, system design process, and implementation using genetic algorithms.
2) A genetic algorithm is proposed to solve the NP-complete timetable scheduling problem due to its ability to converge towards optimal solutions. The methodology involves representing candidate solutions as chromosomes that undergo processes like selection, crossover and mutation.
3) Future work includes adding more features like error handling, testing, and a graphical user interface to improve the system for commercial use in other scheduling domains like hospitals, industries, and schools.
Word Problems are designed to help students to learn the application of mathematical concepts, algebraic identities and formulae in the real world. Variables are assigned the values of โreal-worldโ entities and a logical approach in solving them is established. They help the students to bridge the gap between theoretical knowledge and the real world application of it by giving them hypothetical situations about the same. Probability is a measure or estimation of how likely it is that a particular event will happen. Probability concepts need to be properly understood before attempting to solve any problem related to it. In view of this a survey was conducted. Students from various schools and coaching classes were approached for the same. The study shows that majority of the students experience difficulties in identifying and understanding what exactly the word problem signifies and what approach it demands. Also, the process of learning Probability needs to be specialized given the different understanding levels of each and every student in contrast to the generalized education techniques that are being used in traditional classrooms. Keeping in mind these issues, Word Problem Solver for Probability is implemented, which caters to the learning needs of each and every student individually by providing a step-by-step solution to all problems from the Probability domain.
COMBINED CLASSIFIERS FOR TIME SERIES SHAPELETScscpconf
ย
This summary provides the key details about a research paper on time series shapelet classification in 3 sentences:
The paper proposes a new method for time series shapelet classification that trains multiple small decision trees on subsets of the classes and combines their decisions into a unique pattern to classify time series. Experimental results on 24 datasets show the proposed method achieves higher accuracy than the state-of-the-art method in most cases, while maintaining training time in the range of seconds to minutes. The method represents each time series as a decision path string that is compared to classify new time series with high accuracy and improved training efficiency over existing shapelet methods.
COMBINED CLASSIFIERS FOR TIME SERIES SHAPELETScsandit
ย
Time-series classification is widely used approach for classification. Recent development known as time-series shapelets, based on local patterns from the time-series, shows potential as highly predictive and accurate method for data mining. On the other hand, the slow training time
remains an acute problem of this method. In recent years there was a significant improvement of training time performance, reducing the training time in several orders of magnitude. This work tries to maintain low training time- in the range from several second to several minutes for
datasets from the popular UCR database, achieving accuracies up to 20% higher than the fastest known up to date method. The goal is achieved by training small 2,3-nodes decision trees and combining their decisions in pattern that uniquely identifies incoming time-series
This document provides information about the CSC 448/548 - Machine Learning course offered at South Dakota School of Mines and Technology in Fall 2007. It outlines the instructor details, class schedule, catalog description, textbook, topics to be covered, course goals and outcomes, grading criteria, attendance policy, and other policies. The course will introduce students to machine learning algorithms and have them implement assignments using the Weka machine learning tool to apply what they learn to datasets. Evaluation will be based on homework, exams, class activities, and a final project involving implementing and comparing machine learning algorithms on a dataset.
Dynamic Question Answer Generator An Enhanced Approach to Question Generationijtsrd
ย
Teachers and educational institutions seek new questions with different difficulty levels for setting up tests for their students. Also, students long for distinct and new questions to practice for their tests as redundant questions are found everywhere. However, setting up new questions every time is a tedious task for teachers. To overcome this conundrum, we have concocted an artificially intelligent system which generates questions and answers for the mathematical topic รขโฌโQuadratic equations. The system uses i Randomization technique for generating unique questions each time and ii First order logic and Automated deduction to produce solution for the generated question. The goal was achieved and the system works efficiently. It is robust, reliable and helpful for teachers, students and other organizations for retrieving Quadratic equations questions, hassle free. Rahul Bhatia | Vishakha Gautam | Yash Kumar | Ankush Garg ""Dynamic Question Answer Generator: An Enhanced Approach to Question Generation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23730.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/23730/dynamic-question-answer-generator-an-enhanced-approach-to-question-generation/rahul-bhatia
A hybrid constructive algorithm incorporating teaching-learning based optimiz...IJECEIAES
ย
The document describes a hybrid algorithm that combines a modified multiple operations using statistical tests (MMOST) constructive algorithm with an improved teaching-learning based optimization (ITLBO) algorithm for neural network training. The hybrid algorithm simultaneously optimizes the neural network structure and weights. The MMOST algorithm constructs different network structures, while the ITLBO algorithm finds the optimal weights for each structure. The hybrid algorithm, called MCO-ITLBO, is tested on classification and time series prediction problems and is shown to outperform other algorithms in terms of error rates and network complexity. Experimental results demonstrate that the MCO-ITLBO algorithm provides better performance than algorithms using only constructive or training methods.
Academic scheduling problem made easy through optimizationAlexander Decker
ย
The document describes developing an automated exam invigilation timetabling system using genetic algorithms to optimize scheduling of limited resources. It discusses challenges with manual scheduling like clashes and underutilization. The genetic algorithm approach is described as well-suited to solve scheduling problems by optimizing resource allocation. An overview of the system developed includes inputting course and staff details, generating a timetable that maximizes resource use while minimizing clashes, and managing the scheduled data.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
More Related Content
Similar to Scheduling Courses Using Genetic Algorithms
In preparing the schedule of course not an easy job. There are several aspects that influence in the preparation of schedules of courses that professors, students, courses, lecture rooms, and a time slot. Each of these aspects has a state that can be a problem and a conflict in scheduling courses. For example, the problems facing aspect lecturers are lecturers conflict is a lecturer teaches courses scheduled at two different locations at a time. Or from the aspect of students, the problem is the number of classes per generation. In addition to these problems, there are many more potential problems that can arise from each of these aspects. A decision support system needed a model settlement of the problems encountered. To be able to determine the right model can be done by identifying problems and analyze environmental problems and identify variables that are involved in decision making. In scheduling the course, the problem is a complex problem that is solved by routine or repetitive. The complexity of the problem can be seen from every aspect in the preparation schedule of courses that are interconnected with other aspects. Then, the scheduling is done every semester by environmental circumstances different issues each semester. So that the right model for this system is a heuristic programming model.
A CRITICAL REVIEW ON THE OPTIMIZATION METHODS IN SOLVING EXAM TIMETABLING AND...IAEME Publication
ย
This document provides a critical review of various optimization methods that have been used to solve exam timetabling and scheduling problems. It discusses several approaches that have been applied, including sequential construction algorithms, iterative improvement methods like genetic algorithms and simulated annealing, and various heuristics based on graph coloring techniques. The review examines how different ordering and assignment strategies can impact the feasibility and quality of generated timetables. It provides an overview of the general framework for exam timetabling as a two-phase process involving initial construction and subsequent improvement.
HIGH SCHOOL TIMETABLING USING TABU SEARCH AND PARTIAL FEASIBILITY PRESERVING ...P singh
ย
The high school timetabling is a combinatorial optimization problem. It is proved to be NP-hard and has several hard and soft constraints. A given set of events, class-teacher meetings and resources are assigned to the limited space and time under hard constraints which are strictly followed and soft constraints which are satisfied as far as possible. The feasibility of timetable is determined by hard constraints and the soft constraints determine its quality. Difficult combinatorial optimization problems are frequently solved using Genetic Algorithm (GA). We propose Partial Feasibility Preserving Genetic Algorithm (PFP-GA) combined with tabu search to solve hdtt4, โhard timetablingโ problem a test data set in OR-Library. The solution to this problem is zero clashes and maintaining teacherโs workload on each class in given venue. The modified GA procedures are written for intelligent operators and repair. The PFP-GA in association with Tabu Search (TS) converges faster and gives solution within a few seconds. The results are compared to that of using different methodologies on same data set.
The document discusses using a genetic algorithm to solve the complex problem of university course scheduling. It describes the problem which involves assigning courses, professors, classrooms and time slots while satisfying various hard and soft constraints. A phased approach is proposed which first assigns professors to subjects, then labs to courses, followed by assigning lectures to time slots and labs/tutorials to days and time slots. The genetic algorithm representation and fitness function are defined based on the scheduling problem. The approach is demonstrated on the course scheduling problem at Christ University and is able to generate a timetable that satisfies the hard constraints, though some soft constraints remain unsatisfied.
A scoring rubric for automatic short answer grading systemTELKOMNIKA JOURNAL
ย
During the past decades, researches about automatic grading have become an interesting issue. These studies focuses on how to make machines are able to help human on assessing studentsโ learning outcomes. Automatic grading enables teachers to assess student's answers with more objective, consistent, and faster. Especially for essay model, it has two different types, i.e. long essay and short answer. Almost of the previous researches merely developed automatic essay grading (AEG) instead of automatic short answer grading (ASAG). This study aims to assess the sentence similarity of short answer to the questions and answers in Indonesian without any language semantic's tool. This research uses pre-processing steps consisting of case folding, tokenization, stemming, and stopword removal. The proposed approach is a scoring rubric obtained by measuring the similarity of sentences using the string-based similarity methods and the keyword matching process. The dataset used in this study consists of 7 questions, 34 alternative reference answers and 224 studentโs answers. The experiment results show that the proposed approach is able to achieve a correlation value between 0.65419 up to 0.66383 at Pearson's correlation, with Mean Absolute Error (ํํดํธ) value about 0.94994 until 1.24295. The proposed approach also leverages the correlation value and decreases the error value in each method.
This document describes a new approach that combines the analytical hierarchy process (AHP) and genetic algorithm (GA) to solve the timetable problem in schools. AHP is used to rank teachers based on criteria and assign a score to each teacher. GA is then used to generate timetable schedules that aim to satisfy teacher preferences, with the fitness function considering teacher scores from AHP. The approach was tested on a simple example of scheduling classes and teachers across days and time slots. By incorporating teacher rankings and preferences, the AHP/GA approach aims to produce timetables that satisfy teachers more than existing manual or automated methods.
CONCATENATED DECISION PATHS CLASSIFICATION FOR TIME SERIES SHAPELETSijcisjournal
ย
Time-series classification is widely used approach for classification. Recent development known as timeseries shapelets, based on local patterns from the time-series, shows potential as highly predictive and accurate method for data mining. On the other hand, the slow training time remains an acute problem of this method. In recent years there was a significant improvement of training time performance, reducing the training time in several orders of magnitude. Reducing the training time degrade the accuracy in general. This work applies combined classifiers to achieve high accuracies, maintaining low training times- in the range from several second to several minutes- for datasets from the popular UCR database. The goal is achieved by training small 2,3-nodes decision trees and combining their decisions in pattern that uniquely identifies incoming time-series.
Concatenated decision paths classification for time series shapeletsijics
ย
Time-series classification is widely used approach for classification. Recent development known as timeseries
shapelets, based on local patterns from the time-series, shows potential as highly predictive and
accurate method for data mining. On the other hand, the slow training time remains an acute problem of
this method. In recent years there was a significant improvement of training time performance, reducing
the training time in several orders of magnitude. Reducing the training time degrade the accuracy in
general. This work applies combined classifiers to achieve high accuracies, maintaining low training
times- in the range from several second to several minutes- for datasets from the popular UCR database.
The goal is achieved by training small 2,3-nodes decision trees and combining their decisions in pattern
that uniquely identifies incoming time-series.
This document discusses techniques for generating academic timetables and student schedules using data mining. It reviews existing approaches such as graph coloring, constraint programming, integer programming, and clustering. The authors propose using FP-tree clustering on student course registrations to initially group students, then applying a color mapping algorithm to further optimize clusters and generate timetables and schedules that satisfy hard constraints and consider soft constraints. They test their approach on real data from the University of Bahrain.
Teaching learning based optimization techniqueSmriti Mehta
ย
Kind Attn. Engg. students, don't turn a blind eye to this one, it may do wonders to you.It is a unique NATURE INSPIRED technique free from Algo Specific Parameters, unlike others , gives accurate results and is the easiest method of optimisation known to me so far.
Courses timetabling based on hill climbing algorithm IJECEIAES
ย
In addition to its monotonous nature and excessive time requirements, the manual school timetable scheduling often leads to more than one class being assigned to the same instructor, or more than one instructor being assigned to the same classroom during the same slot time, or even leads to exercise in intentional partialities in favor of a particular group of instructors. In this paper, an automated school timetable scheduling is presented to help overcome the traditional conflicts inherent in the manual scheduling approach. In this approach, hill climbing algorithms have been modified to transact hard and soft constraints. Soft constraints are not easy to be satisfied typically, but hard constraints are obligated. The implementation of this technique has been successfully experimented in different schools with various kinds of side constraints. Results show that the initial solution can be improved by 72% towards the optimal solution within the first 5 seconds and by 50% from the second iteration while the optimal solution will be achieved after 15 iterations ensuring that more than 50% of scientific courses will take place in the early slots time while more than 50% of non-scientific courses will take place during the later time's slots.
Timetable Generator Using Genetic AlgorithmIRJET Journal
ย
This document discusses using a genetic algorithm to generate a university timetable. It begins with an abstract that introduces the topic and objectives. It then provides background on genetic algorithms and their use for timetable generation. The document reviews related literature on using genetic algorithms and scheduling constraints. It proposes developing a university timetable generator using a genetic algorithm with adaptive and elite traits. The methodology section outlines the genetic algorithm process, including input data, parameter settings, fitness evaluation, and constraint checking to generate an optimal timetable solution. The overall aim is to create an artificial intelligence system that can automatically generate timetables while minimizing errors.
1) The document outlines the development of a time table scheduling system using a genetic algorithm approach. It includes the team members and their roles, problem description, requirement gathering, system design process, and implementation using genetic algorithms.
2) A genetic algorithm is proposed to solve the NP-complete timetable scheduling problem due to its ability to converge towards optimal solutions. The methodology involves representing candidate solutions as chromosomes that undergo processes like selection, crossover and mutation.
3) Future work includes adding more features like error handling, testing, and a graphical user interface to improve the system for commercial use in other scheduling domains like hospitals, industries, and schools.
Word Problems are designed to help students to learn the application of mathematical concepts, algebraic identities and formulae in the real world. Variables are assigned the values of โreal-worldโ entities and a logical approach in solving them is established. They help the students to bridge the gap between theoretical knowledge and the real world application of it by giving them hypothetical situations about the same. Probability is a measure or estimation of how likely it is that a particular event will happen. Probability concepts need to be properly understood before attempting to solve any problem related to it. In view of this a survey was conducted. Students from various schools and coaching classes were approached for the same. The study shows that majority of the students experience difficulties in identifying and understanding what exactly the word problem signifies and what approach it demands. Also, the process of learning Probability needs to be specialized given the different understanding levels of each and every student in contrast to the generalized education techniques that are being used in traditional classrooms. Keeping in mind these issues, Word Problem Solver for Probability is implemented, which caters to the learning needs of each and every student individually by providing a step-by-step solution to all problems from the Probability domain.
COMBINED CLASSIFIERS FOR TIME SERIES SHAPELETScscpconf
ย
This summary provides the key details about a research paper on time series shapelet classification in 3 sentences:
The paper proposes a new method for time series shapelet classification that trains multiple small decision trees on subsets of the classes and combines their decisions into a unique pattern to classify time series. Experimental results on 24 datasets show the proposed method achieves higher accuracy than the state-of-the-art method in most cases, while maintaining training time in the range of seconds to minutes. The method represents each time series as a decision path string that is compared to classify new time series with high accuracy and improved training efficiency over existing shapelet methods.
COMBINED CLASSIFIERS FOR TIME SERIES SHAPELETScsandit
ย
Time-series classification is widely used approach for classification. Recent development known as time-series shapelets, based on local patterns from the time-series, shows potential as highly predictive and accurate method for data mining. On the other hand, the slow training time
remains an acute problem of this method. In recent years there was a significant improvement of training time performance, reducing the training time in several orders of magnitude. This work tries to maintain low training time- in the range from several second to several minutes for
datasets from the popular UCR database, achieving accuracies up to 20% higher than the fastest known up to date method. The goal is achieved by training small 2,3-nodes decision trees and combining their decisions in pattern that uniquely identifies incoming time-series
This document provides information about the CSC 448/548 - Machine Learning course offered at South Dakota School of Mines and Technology in Fall 2007. It outlines the instructor details, class schedule, catalog description, textbook, topics to be covered, course goals and outcomes, grading criteria, attendance policy, and other policies. The course will introduce students to machine learning algorithms and have them implement assignments using the Weka machine learning tool to apply what they learn to datasets. Evaluation will be based on homework, exams, class activities, and a final project involving implementing and comparing machine learning algorithms on a dataset.
Dynamic Question Answer Generator An Enhanced Approach to Question Generationijtsrd
ย
Teachers and educational institutions seek new questions with different difficulty levels for setting up tests for their students. Also, students long for distinct and new questions to practice for their tests as redundant questions are found everywhere. However, setting up new questions every time is a tedious task for teachers. To overcome this conundrum, we have concocted an artificially intelligent system which generates questions and answers for the mathematical topic รขโฌโQuadratic equations. The system uses i Randomization technique for generating unique questions each time and ii First order logic and Automated deduction to produce solution for the generated question. The goal was achieved and the system works efficiently. It is robust, reliable and helpful for teachers, students and other organizations for retrieving Quadratic equations questions, hassle free. Rahul Bhatia | Vishakha Gautam | Yash Kumar | Ankush Garg ""Dynamic Question Answer Generator: An Enhanced Approach to Question Generation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23730.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/23730/dynamic-question-answer-generator-an-enhanced-approach-to-question-generation/rahul-bhatia
A hybrid constructive algorithm incorporating teaching-learning based optimiz...IJECEIAES
ย
The document describes a hybrid algorithm that combines a modified multiple operations using statistical tests (MMOST) constructive algorithm with an improved teaching-learning based optimization (ITLBO) algorithm for neural network training. The hybrid algorithm simultaneously optimizes the neural network structure and weights. The MMOST algorithm constructs different network structures, while the ITLBO algorithm finds the optimal weights for each structure. The hybrid algorithm, called MCO-ITLBO, is tested on classification and time series prediction problems and is shown to outperform other algorithms in terms of error rates and network complexity. Experimental results demonstrate that the MCO-ITLBO algorithm provides better performance than algorithms using only constructive or training methods.
Academic scheduling problem made easy through optimizationAlexander Decker
ย
The document describes developing an automated exam invigilation timetabling system using genetic algorithms to optimize scheduling of limited resources. It discusses challenges with manual scheduling like clashes and underutilization. The genetic algorithm approach is described as well-suited to solve scheduling problems by optimizing resource allocation. An overview of the system developed includes inputting course and staff details, generating a timetable that maximizes resource use while minimizing clashes, and managing the scheduled data.
Similar to Scheduling Courses Using Genetic Algorithms (20)
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
The document discusses data compression using Elias Delta coding. It begins by introducing compression and its purpose of reducing file sizes. It then explains Elias Delta coding which is a lossless compression technique that encodes characters based on their frequency. The more common characters have fewer bits assigned while less common characters have more bits. It provides an example of how Elias Delta coding works by assigning bit sequences to numbers. The document then applies Elias Delta coding to compress a sample text, showing the original string, character set formation, bit lengths, and compressed output which achieved a smaller size than the original text.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
ย
(๐๐๐ ๐๐๐) (๐๐๐ฌ๐ฌ๐จ๐ง ๐)-๐๐ซ๐๐ฅ๐ข๐ฆ๐ฌ
๐๐ข๐ฌ๐๐ฎ๐ฌ๐ฌ ๐ญ๐ก๐ ๐๐๐ ๐๐ฎ๐ซ๐ซ๐ข๐๐ฎ๐ฅ๐ฎ๐ฆ ๐ข๐ง ๐ญ๐ก๐ ๐๐ก๐ข๐ฅ๐ข๐ฉ๐ฉ๐ข๐ง๐๐ฌ:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง ๐ญ๐ก๐ ๐๐๐ญ๐ฎ๐ซ๐ ๐๐ง๐ ๐๐๐จ๐ฉ๐ ๐จ๐ ๐๐ง ๐๐ง๐ญ๐ซ๐๐ฉ๐ซ๐๐ง๐๐ฎ๐ซ:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
ย
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
ย
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
ย
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
ย
Ivรกn Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the bodyโs response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
ย
Scheduling Courses Using Genetic Algorithms
1. International Journal of Computer Applications (0975 โ 8887)
Volume 153 โ No3, November 2016
20
Scheduling Courses using Genetic Algorithms
Andysah Putera Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing,
20122, Medan, Sumatera Utara,
Indonesia
ABSTRACT
Preparation of courses at every university is done by hand.
This method has limitations that often cause collisions
schedule. In lectures and lab scheduling frequent collision
against the faculty member teaching schedule, collisions on
the class schedule and student, college collision course with
lab time, the allocation of the use of the rooms were not
optimal. Heuristic method of genetic algorithm based on the
mechanism of natural selection; it is a process of biological
evolution. Genetic algorithms are used to obtain optimal
schedule that consists of the initialization process of the
population, fitness evaluation, selection, crossover, and
mutation. Data used include the teaching of data, the data
subjects, the room data and time data retrieved from the
database of the Faculty of Computer Science, Universitas
Pembangunan Panca Budi. The data in advance through the
stages of the process of genetic algorithms to get optimal
results The results of this study in the form of a schedule of
courses has been optimized so that no error occurred and gaps.
General Terms
Artificial Intelligence
Keywords
Genetic Algorithm, Scheduling
1. INTRODUCTION
The process of teaching and learning has become a routine
that is always carried out by the university to carry out the
day-to-day activities. In the process of teaching and learning
will involve courses that will be given to students who
participate in it [5]. The number of courses each semester
hobbled right in not a few. Also, there are compulsory courses,
and there are also elective courses. The preparation of this
course became a classic problem that until now has always
been a dilemma of faculty in particular to the faculty staff. In
setting the schedule of college faculty often encounter
obstacles, so that the result of the preparation always has a
discrepancy with hopes to achieve.
At this time only rely on the strength of the faculty manual
calculations in the preparation of the schedule of courses, so
there is still an error occurred and irregularities in the final
product scheduled lectures per semester. Errors obtained such
a schedule mutually collisions for each faculty; space is not
optimal, the lecturer who was unable to attend because they
do not fit the schedule, students entering different classes at
the same time and so forth. While irregularities obtained as
the not uniform amount charged class faculty against faculty,
where there are lecturers who get the number of teaching
hours, and there is also a lot to get the number of hours of
teaching a little.
Genetic algorithms are one way to address the problem for the
preparation courses. These algorithms can produce optimal
schedules subjects [1][2][7]. Application of this method will
reduce the workload of faculty to students assembles all the
more so if the students owned by large numbers of faculty.
From the financial point of view, this method plays an
important role to save time and costs incurred to prepare a
report schedule faculty courses. A genetic algorithm is a
heuristic search algorithm based on the mechanism of natural
selection, better known by a process of biological evolution.
This algorithm can produce optimal results with a fast time
and has a very large solution space.
2. RELATED WORK
Genetic algorithms work in many cases of scheduling
problem [4][6][8]. Travelling salesmen problem is one of the
problems. It is done to find the solution of all the nodes that
pass and looking for the most optimal value or the shortest
path passes on the track. The genetic algorithm can find the
optimal solution in each generation were executed but the
result is not a correct answer to find the desired distance. This
research tried to combine the Knapsack and genetic
algorithms. Knapsack Problem is a combinatorial
optimization problem. For example, given a set of items by
weight and value, then do the selection of these items to put in
a bag with a limited capacity.
It can specify the desired weight in a container. Knapsack
itself has at least two parameters as determining whether the
fitness of a population approaching with a predetermined
solution. The parameters used in this study is the number of
nodes and weight range. The number of nodes is the number
of point coordinates that will pass while the weighted distance
is the distance between the accumulated number of nodes to
go back to the origin node. In this algorithm is expected to
achieve a solution that can generate fitness = 1 or at least
closer to that number [3].
3. PROPOSED WORK
3.1 Courses Design
As noted in the Introduction, case studies taken in this study is
the Faculty of Computer Science Universitas Pembangunan
Panca Budi. For a schedule can be made correctly, there are
some scheduling rules must be observed. The factors that
influence the preparation of the schedule to include are:
1. Lecturer
A professor can not teach several courses at the same time.
Also, sometimes a teacher can only teach at odd hours and
certain days only, so it is necessary to know the specific
schedules that can not be subject to another.
2. International Journal of Computer Applications (0975 โ 8887)
Volume 153 โ No3, November 2016
21
2. Space
Given the limited amount of space owned, it should be noted
the available space so as not to interfere with the course of the
lecture. The schedule should only occupy space there.
3. Time
Time is a time limit of lectures per subject, and there are
certain hours where the lecture is limited to certain hours such
as Friday schedule from 07.30 until 12.00 and resumed at
13.30.
4. Course
Given each course has a semester of courses that are taught,
the need for rules that restrict the scheduling of courses, so
that the courses were by the rules of scheduling.
3.2 Genetic Step
Model of Genetic Algorithm to be used for optimization is as
follows:
1. Selection
In the selection, an assessment of the value of fitness. As a
result, the fitness which has the best quality of chromosomes
have a chance in the next generation. Selection used is the
selection of the roulette wheel. In the implementation of this
selection to consider the number of the population so that the
population is not too much and take a long time, and the
population is also not too little will result in chromosomal
similarity.
2. Crossover
Crossover used was crossing one point with a permutation.
Selection of chromosomes is determined by probability.
Many genes are exchanged depends on the determination of
the initial parameters. In doing a crossover, each of the two
chromosomes will produce two new offspring as the best
genes.
3. Mutation
Mutation is performed after the crossover operation is
completed. This mutation technique is done by swapping
genes randomly. In this process to consider the mutation rate
and the degree of probability of a mutation. If the mutations
are likely the best chromosome loss. However, if too little
mutations, chromosome will long to find the optimal solution.
4. Determination of Fitness
Fitness determination is the provision of value that determines
whether a process is achieved genetic algorithms What does
this process is the process of making the schedule according
to chromosome was selected by processing by calculating
how close to the value of fitness.
3.3 Courses List
This sections shows the list of the disciplines offered by the
Faculty of Computer Science.
NO CODE SUBJECT CRD SEM.
1
MPK-370-101
Pendidikan Pancasila dan
Kewarganegaraan 2
I
2 MPK-370-102 Pendidikan Agama 2
3
MBB-370-103
Ilmu Sosial dan Budaya
Dasar 2
4 MPK-370-104 Bahasa Inggris I 2
5 MPB-370-105 Metafisika I 2
6 MKK-370-106 Matematika Diskrit 2
7
MKK-370-107
Pengantar Teknologi
Informasi 2
8
MKK-370-108
Praktek Pengantar
Teknologi Informasi 1
9 MKK-370-109 Algoritma & Pemrograman 2
10
MKK-370-110
Praktek Algoritma &
Pemrograman 1
11
MKB-370-111
Pengantar Manajemen
Umum 2
CREDIT = 20
12 MPK-370-201 Bahasa Inggris II 2
II
13 MPB-370-202 Metafisika II 2
14 MKK-370-203 Aljabar Linear & Matriks 2
15 MPK-370-204
Bahasa Indonesia (Tata
bahasa ilmiah) 2
16 MKK-370-205 Sistem Operasi 2
17 MKK-370-206
Praktek Sistem
operasi 1
18
MKK-370-207
Pemrograman Berorientasi
Objek I (.NET) 3
19 MKK-370-208
Praktek Pemrograman
Berorientasi Objek I
(.NET) 1
20 MKK-370-209 Statistik dan Probabilitas 2
21 MPB-370-210 Etika Profesi IT 3
CREDIT = 20
22 MPB-370-301 Metafisika III 2
III
23
MKB-370-302
Kewirausahaan Teknologi
Informasi 2
24
MKB-370-303
Pemrograman Berorientasi
Objek II (Java) 3
25
MKB-370-304
Praktek Pemrograman
Berorientasi Objek II
(Java) 1
26 MKK-370-305 Struktur Data 3
27 MKK-370-306 Praktek Struktur Data 1
28 MKK-370-307 Elektronika Dasar 3
29
MKK-370-308
Praktek Elektronika
Dasar 1
30 MKK-370-309 Sistem Basis Data 3
31 MKK-370-310 Komunikasi Data 3
CREDIT = 22
32
MPB-370-401
Troubleshooting dan
Maintenance 3
IV
33
MPB-370-402
Praktek
Troubleshooting dan
Maintenance 1
34 MKB-370-403 Komputer Grafik 3
35
MKB-370-404
Praktek Komputer
Grafik 1
36
MKK-370-405
Organisasi & Arsitektur
Komputer 2
37
MPK-370-406
Sistem Basis Data
Lanjutan 3
38
MPK-370-407
Praktek Sistem Basis
Data Lanjutan ((MySql /
SQL Server / Oracle) 1
39 MKK-370-408 Jaringan Komputer 3
3. International Journal of Computer Applications (0975 โ 8887)
Volume 153 โ No3, November 2016
22
40
MKK-370-409
Praktek Jaringan
Komputer 1
41 MPB-370-410 Metode Penelitian 2
CREDIT = 20
42 MKB-370-501 Rekayasa Perangkat Lunak 3
V
43 MKK-370-502 Pemrograman Internet 2
44
MKK-370-503
Praktek
Pemrograman Internet
(HTML 5, CSS, Java
Script/ Jquery) 1
45 MKB-370-504 Dasar Sistem Digital 2
46 MKB-370-505 Desain Berbasis Komputer 2
47
MKB-370-506
Jaringan Komputer Lanjut
(Router) 3
48
MKB-370-507
Praktek Jaringan
Komputer Lanjut (Router) 1
49 MKB-370-508 Simulasi dan Pemodelan 1
50
MKB-370-509
Sistem Pendukung
Keputusan 3
CREDIT = 18
51 MKK-370-601 Kecerdasan Buatan 3
VI
52
MKK-370-602
Praktek Kecerdasan
Buatan 1
53 MKK-370-603 Metode Numerik 2
54 MKB-370-604 Multimedia 2
55 MKB-370-605 Praktek Multimedia 1
56 MKB-370-606 Sistem Informasi Geografis 3
57
MKB-370-607
Praktek Sistem
Informasi Geografis 1
58 MBB-370-608 Kerja Praktek 2
59 MKB-370-609 Robotika 3
60 MKB-370-610 Praktek Robotik 1
CREDIT = 19
61 MKB-370-701 Interface 3
VII
62 MKB-370-702 Praktek Interface 1
63 MKK-370-703 Aplikasi Mobile (Android) 2
64 MKB-370-704 Image Processing 2
65 MKB-370-705 Keamanan Komputer 2
66
MKB-370-706
Proyek Teknologi
Informasi 2
67
MKK-370-707
Interaksi Manusia dan
Komputer 2
68 MKB-370-708 Embedded System 3
69
MKB-370-709
Praktek Embedded
System 1
70
MKB-370-710
Analisa Kerja Sistem
Komputer 2
CREDIT = 20
71 MKB-370-801 Kecakapan Antar Personal 2
VIII72 MBB-370-802 Seminar 2
73 MBB-370-803 Sidang 4
CREDIT = 8
4. RESULT AND DISCUSSION
This stage will report on the results of the scheduling of the
courses. It develops a software system is the evaluation stage.
Implementation and testing of this section will be done by the
design that has been described in previous chapters. To
determine whether a software implementation is successful or
not, required testing. Here are the results of the
implementation and testing of applications that have been
built.
4.1 Genetic Process
This section describes the steps of the process of finding an
optimal solution in the genetic algorithm. The process can be
seen in the section below:
Indv [1] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
Indv [2] --> D : 15 S : 0 K : 45 R : 55 J : 11
Error : 126
Indv [3] --> D : 11 S : 0 K : 33 R : 79 J : 17
Error : 140
Indv [4] --> D : 18 S : 0 K : 39 R : 72 J : 16
Error : 145
Indv [5] --> D : 26 S : 0 K : 39 R : 64 J : 6
Error : 135
Indv [6] --> D : 18 S : 0 K : 42 R : 71 J : 16
Error : 147
Indv [7] --> D : 14 S : 0 K : 44 R : 68 J : 11
Error : 137
Indv [8] --> D : 14 S : 0 K : 31 R : 65 J : 8
Error : 118
Indv [9] --> D : 22 S : 0 K : 47 R : 74 J : 12
Error : 155
Indv [10] --> D : 17 S : 0 K : 35 R : 72 J : 10
Error : 134
=================== End of Generation 1
===================
Indv [1] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [2] --> D : 2 S : 0 K : 20 R : 30 J : 0
Error : 52
Indv [3] --> D : 14 S : 0 K : 31 R : 65 J : 8
Error : 118
Indv [4] --> D : 26 S : 0 K : 39 R : 64 J : 6
Error : 135
Indv [5] --> D : 18 S : 0 K : 42 R : 71 J : 16
Error : 147
Indv [6] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
Indv [7] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
Indv [8] --> D : 22 S : 0 K : 47 R : 74 J : 12
Error : 155
Indv [9] --> D : 17 S : 0 K : 35 R : 72 J : 10
Error : 134
Indv [10] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
=================== End of Generation 2
===================
Indv [1] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [2] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [3] --> D : 26 S : 0 K : 39 R : 64 J : 6
Error : 135
Indv [4] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
4. International Journal of Computer Applications (0975 โ 8887)
Volume 153 โ No3, November 2016
23
Indv [5] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [6] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [7] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
Indv [8] --> D : 2 S : 0 K : 20 R : 30 J : 0
Error : 52
Indv [9] --> D : 17 S : 0 K : 35 R : 72 J : 10
Error : 134
Indv [10] --> D : 14 S : 0 K : 31 R : 65 J : 8
Error : 118
=================== End of Generation 3
===================
Indv [1] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [2] --> D : 2 S : 0 K : 25 R : 35 J : 1
Error : 63
Indv [3] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [4] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [5] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [6] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [7] --> D : 26 S : 0 K : 39 R : 64 J : 6
Error : 135
Indv [8] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [9] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
Indv [10] --> D : 13 S : 0 K : 40 R : 75 J : 8
Error : 136
=================== End of Generation 4
===================
Indv [1] --> D : 2 S : 0 K : 9 R : 19 J : 0
Error : 30
Indv [2] --> D : 1 S : 0 K : 13 R : 14 J : 0
Error : 28
Indv [3] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [4] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [5] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [6] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [7] --> D : 2 S : 0 K : 25 R : 35 J : 1
Error : 63
Indv [8] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [9] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [10] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
=================== End of Generation 5
===================
Indv [1] --> D : 1 S : 0 K : 10 R : 13 J : 1
Error : 25
Indv [2] --> D : 1 S : 0 K : 6 R : 13 J : 0
Error : 20
Indv [3] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [4] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [5] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [6] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [7] --> D : 6 S : 0 K : 27 R : 38 J : 0
Error : 71
Indv [8] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [9] --> D : 2 S : 0 K : 9 R : 19 J : 0
Error : 30
Indv [10] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
=================== End of Generation 6
===================
Indv [1] --> D : 1 S : 0 K : 9 R : 8 J : 0
Error : 18
Indv [2] --> D : 1 S : 0 K : 7 R : 10 J : 0
Error : 18
Indv [3] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [4] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [5] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [6] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [7] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [8] --> D : 1 S : 0 K : 10 R : 13 J : 1
Error : 25
Indv [9] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [10] --> D : 1 S : 0 K : 10 R : 13 J : 1
Error : 25
=================== End of Generation 7
===================
Indv [1] --> D : 0 S : 0 K : 3 R : 10 J : 0
Error : 13
Indv [2] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [3] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [4] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [5] --> D : 1 S : 0 K : 10 R : 13 J : 1
Error : 25
Indv [6] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [7] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [8] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [9] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [10] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
=================== End of Generation 8
===================
Indv [1] --> D : 1 S : 0 K : 5 R : 8 J : 0
Error : 14
Indv [2] --> D : 1 S : 0 K : 6 R : 9 J : 0
Error : 16
Indv [3] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [4] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [5] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [6] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
5. International Journal of Computer Applications (0975 โ 8887)
Volume 153 โ No3, November 2016
24
Indv [7] --> D : 4 S : 0 K : 20 R : 35 J : 0
Error : 59
Indv [8] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [9] --> D : 0 S : 0 K : 3 R : 10 J : 0
Error : 13
Indv [10] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
=================== End of Generation 9
===================
Indv [1] --> D : 0 S : 0 K : 6 R : 9 J : 1
Error : 16
Indv [2] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [3] --> D : 1 S : 0 K : 6 R : 9 J : 0
Error : 16
Indv [4] --> D : 1 S : 0 K : 12 R : 15 J : 0
Error : 28
Indv [5] --> D : 2 S : 0 K : 10 R : 11 J : 0
Error : 23
Indv [6] --> D : 1 S : 0 K : 5 R : 8 J : 0
Error : 14
Indv [7] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [8] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [9] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [10] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
=================== End of Generation 10
===================
Indv [1] --> D : 0 S : 0 K : 8 R : 14 J : 0
Error : 22
Indv [2] --> D : 0 S : 0 K : 3 R : 5 J : 0
Error : 8
Indv [3] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [4] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [5] --> D : 1 S : 0 K : 6 R : 9 J : 0
Error : 16
Indv [6] --> D : 0 S : 0 K : 6 R : 9 J : 1
Error : 16
Indv [7] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [8] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [9] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [10] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
=================== End of Generation 11
===================
Indv [1] --> D : 0 S : 0 K : 1 R : 5 J : 0
Error : 6
Indv [2] --> D : 0 S : 0 K : 5 R : 2 J : 0
Error : 7
Indv [3] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [4] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [5] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [6] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [7] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [8] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [9] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [10] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
=================== End of Generation 12
===================
Indv [1] --> D : 0 S : 0 K : 0 R : 3 J : 0
Error : 3
Indv [2] --> D : 0 S : 0 K : 1 R : 1 J : 0
Error : 2
Indv [3] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [4] --> D : 1 S : 0 K : 5 R : 4 J : 0
Error : 10
Indv [5] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [6] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [7] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [8] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [9] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [10] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
=================== End of Generation 13
===================
Indv [1] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [2] --> D : 1 S : 0 K : 2 R : 3 J : 1
Error : 7
Indv [3] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [4] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [5] --> D : 0 S : 0 K : 1 R : 1 J : 0
Error : 2
Indv [6] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [7] --> D : 0 S : 0 K : 0 R : 3 J : 0
Error : 3
Indv [8] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [9] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [10] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
=================== End of Generation 14
===================
Indv [1] --> D : 0 S : 0 K : 0 R : 1 J : 0
Error : 1
Indv [2] --> D : 0 S : 0 K : 3 R : 2 J : 0
Error : 5
Indv [3] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [4] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [5] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [6] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [7] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
Indv [8] --> D : 0 S : 0 K : 1 R : 1 J : 0
Error : 2
6. International Journal of Computer Applications (0975 โ 8887)
Volume 153 โ No3, November 2016
25
Indv [9] --> D : 0 S : 0 K : 0 R : 3 J : 0
Error : 3
Indv [10] --> D : 0 S : 0 K : 2 R : 2 J : 0
Error : 4
=================== End of Generation 15
===================
Indv [1] --> D : 0 S : 0 K : 0 R : 0 J : 0
Error : 0
=================== End of Generation 16
===================
4.2 Result
In the first generation, a population of 1 to 10 population has
a value large error in which an error in each population is
above 100. At the next generations, the error value will
decrease gradually. If any value of the population still has an
error value of more than 1, then the population is not yet
optimal. The error value must be 0 to get the value Fitness = 1.
After 16 generations, the population is worth error = 0 as
shown below.
Indv [1] --> D : 0 S : 0 K : 0 R : 0 J : 0
Error : 0
=================== End of Generation 16
===================
5. CONCLUSION
Based on the analysis and testing conducted in the previous
chapter, it can be concluded the genetic algorithm is a good
algorithm in the process of optimization of scheduling
courses. Genetic algorithms are very influenced by the
random function, so it is not always the results obtained in the
process of scheduling lectures and lab work to get the most
optimal results. Selection of the genes in the process of
crossover and mutation, can not be randomized because of
differences in the range of each gene but directly elected.
Based on testing with genetic input parameter values are the
same or different, the scheduling process produces results and
generation of different iterations this is because of the random
function. Fingers and crossover and mutation probabilities
used is 100%, because of all the chromosomes crossover and
mutation. Genetic operators used in this study is Roulette
wheel selection, crossover a cutting point, because it is more
appropriate exchange mutation on chromosome representation
and generate initialization population at the time of the initial
population.
6. FUTURE SCOPE
The algorithm needs to be developed to gain more result. It
needs to collaborate to other division to make the scheduling
system more sophisticated.The Knapsack problem is the best
method to limit the output. By combining this method with
genetic algorithms, it makes the output better than before.
7. REFERENCES
[1] M. U. Siregar, โA New Approach to CPU Scheduling
Algorithm: Genetic Round Robin,โ International Journal
of Computer Applications, vol. 47, no. 19, pp. 18-25,
2012.
[2] Y. Li dan Y. Chen, โA Genetic Algorithm for Job-Shop
Scheduling,โ Journal of Software, vol. 5, no. 3, pp. 269-
273, 2010.
[3] A. P. U. Siahaan, โAdjustable Knapsack in Travelling
Salesman Problem,โ International Journal of Science &
Technoledge, vol. 4, no. 9, 2016.
[4] A. P. U. Siahaan, โComparison Analysis of CPU
Scheduling FCFS, SJF and Round Robin,โ International
Journal of Engineering Development and Research, vol.
4, no. 3, pp. 124-132, 20 November 2016.
[5] U. Aickelin dan K. A. Dowsland, โAn Indirect Genetic
Algorithm for a Nurse Scheduling Problem,โ Computers
& Operations Research, vol. 31, no. 5, pp. 761-778,
2004.
[6] M. Gupta dan S. Gupta, โOptimized Processor
Scheduling Algorithms using Genetic Algorithm
Approach,โ International Journal of Advanced Research
in Computer and Communication Engineering, vol. 2, no.
6, pp. 2415-2417, 2013.
[7] F. A. Omara dan M. M. Arafa, โGenetic Algorithms for
Task Scheduling Problem,โ Journal of Parallel and
Distributed Computing, vol. 70, no. 1, pp. 13-22, 2010.
[8] H. Z. Jia, A. Y. C. Nee, J. Y. H. Fuh dan Y. F. Zhang, โA
Modified Genetic Algorithm for Distributed Scheduling
Problems,โ Journal of Intelligent Manufacturing, vol. 14,
no. 3, p. 351, 2003.
8. AUTHOR PROFILE
Andysah Putera Utama Siahaan was born in Medan,
Indonesia, in 1980. He received the S.Kom. degree in
computer science from Universitas Pembangunan Panca Budi,
Medan, Indonesia, in 2010, and the M.Kom. in computer
science as well from the University of Sumatera Utara, Medan,
Indonesia, in 2012. In 2010, he joined the Department of
Engineering, Universitas Pembangunan Panca Budi, as a
Lecturer, and in 2012 became a researcher. He is applying for
his Ph.D. degree in 2016. He has written several international
journals. He is now active in writing papers and joining
conferences.
IJCATM : www.ijcaonline.org