104 research outputs found

    Ubah suaian gred pencapaian pelajar dalam pemeringkatan sekolah menggunakan pendekatan VIKOR

    Get PDF
    Pemeringkatan merupakan satu proses penyusunan beberapa alternatif mengikut tertib keutamaan. Ianya berdasarkan kepada kriterium atau atribut yang ditentukan bagi setiap alternatif yang terlibat. Penilaian terhadap kriterium tersebut dilakukan dan kemudiannya suatu indeks komposit digubah bagi setiap alternatif untuk tujuan menyusun alternatif mengikut urutan keutamaan. Amalan ini dikenali sebagai pemutusan pelbagai kriterium (PPK). Terdapat beberapa pendekatan yang diamalkan dalam PPK, di antaranya dikenali sebagai VIKOR (Pengoptimuman Pelbagai Kriterium dan Penyelesaian Kompromi). Kajian ini bertujuan memerihalkan penggunaan VIKOR dalam pembinaan indeks komposit PPK bagi menyusun sekolah mengikut tahap pencapaian peperiksaan Sijil Peperiksaan Malaysia (SPM). Sekolah mewakili alternatif manakala kursus sebagai kriterium. Keputusan peperiksaan bagi sesuatu kursus diberi dalam bilangan pelajar mengikut gred. Setiap kursus ini dinilai berdasarkan sembilan skala gred, iaitu dari gred terbaik sehingga gred gagal sebagai gambaran tahap pencapaian setiap kursus yang kemudiannya diubah suai menggunakan skor merit

    Information Volume of Mass Function

    Get PDF
    Given a probability distribution, its corresponding information volume is Shannon entropy. However, how to determine the information volume of a given mass function is still an open issue. Based on Deng entropy, the information volume of mass function is presented in this paper. Given a mass function, the corresponding information volume is larger than its uncertainty measured by Deng entropy. In addition, when the cardinal of the frame of discernment is identical, both the total uncertainty case and the BPA distribution of the maximum Deng entropy have the same information volume. Some numerical examples are illustrated to show the efficiency of the proposed information volume of mass function

    Port choice by intra-regional container service operators : an application of decision-making techniques to liner services between Malaysian and other Asian ports

    Get PDF
    Intra-regional container service operators are challenged to design regular and reliable liner services connecting regional ports at the lowest cost and shortest transit time while considering customer demand. This paper focuses on the selection of ports of call in regular intra-regional container services, an under-researched part of the container shipping market. A combination of decision-making techniques (i.e. Analytical Hierarchy Process, fuzzy link-based and Evidential Reasoning) are presented to assist intra-regional container service operators in selecting ports of call. The proposed methodology is empirically applied to container services between Malaysian and other nearby Asian ports. While Port Klang is the main gateway to Malaysia, the results show that other Malaysian ports should play a more prominent role in accommodating intra-Asian container services. This research can assist maritime stakeholders in evaluating intra-regional port-to-port liner service configurations. Furthermore, the novel mix of decision-making techniques complements and enriches existing academic literature on port choice and liner service configuration

    Evidential Reasoning Approach to Behavioural Analysis of ICT Users’ Security Awareness

    Get PDF
    The role of ICT system’s user should be taken into consideration when developing different information security solutions because user, as its constitutive element, can significantly affect overall system security with his/her potentially risky behaviour depending on the level of user’s security awareness. In this paper authors propose risk assessment approach of ICT users’ behaviour based on the evidential reasoning technique. Performance testing was compared using combination of cluster analysis and discriminant analysis while empirical analysis was conducted on the total of 627 e-mail users grouped regarding gender, age, technical background knowledge and level of experience. Assessment methodology used in this paper has proven to be well suited for evaluation of users’ awareness and identification of their potentially risky behaviour. Results of empirical analysis showed that all groups of users got overall utility grade higher than the simulated "minimally enough aware" user, but less than “average awareness” grade. As users of all groups are highly critical towards collocutor, it can mean that users are quite aware about the importance of information security foundation, but also about lack of knowledge regarding different security issues. Another possible reason may be the users’ negligence toward security guidelines and protocols
    • …
    corecore