22 research outputs found
Staff scheduling for a courier distribution centre using evolutionary algorithm
Staff scheduling is a combinatorics optimization problem and companies face this complex task on daily basis in constructing a schedule fitting all conditions. In a courier distribution center, staffs are assigned to work in processes of a continuous workflow. Staffs have varying work ability for each process. Instead of generating staff schedule instinctively, it is an advantage to optimize staff’s schedule by measuring the performance of each staff. An optimized schedule improves the operation’s efficiency and fully utilize staffs’ work ability, hence, minimizing the cost. This paper proposed evolutionary algorithm, namely genetic algorithm as the solution to courier center staff scheduling. Based on the result, the produced schedule can reduce up to 30% of the staff in schedule while not affecting operation workflow. The cut down on number of working staffs could amount to a substantial reduction of operation cost every month. The generated schedule is significantly customized and take less time to complete an operation. Although the proposed solution is specific to the use case of a courier distribution center, it is however, potentially a generalize model for the logistics industry, introducing a more effective staff scheduling system to cope with the industry’s ever-rising demands
BERT based named entity recognition for automated hadith narrator identification
Hadith serves as a second source of Islamic law for Muslims worldwide, especially in Indonesia, which has the world's most significant Muslim population of 228.68 million people. However, not all Hadith texts have been certified and approved for use, and several falsified Hadiths make it challenging to distinguish between authentic and fabricated Hadiths. In terms of Hadith science, determining the authenticity of a Hadith can be accomplished by examining its Sanad and Matn. Sanad is an essential aspect of the Hadith because it indicates the chain of the Narrator who transmits the Hadith. The research reported in this paper provides an advanced Natural Language Processing (NLP) technique for identifying and authenticating the Narrator of Hadith as a part of Sanad, utilizing Named Entity Recognition (NER) to address the necessity of authenticating the Hadith. The NER technique described in the research adds an extra feed-forward classifier to the last layer of the pre-trained BERT model. In the testing process using Cahya/bert-base-indonesian-1.5G, the proposed solution received an overall F1-score of 99.63 percent. On the Hadith Narrator Identification using other Hadith passages, the final examination yielded a 98.27 percent F1-score
Internet Of Things-Proactive Security Approach
The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do so as well. The solution uses an IPsec security on the end routers to ensure the data security on the public internet side of the connection. This simple solution allows using a simple Wi-Fi setup or even better to use the current Wi-Fi infrastructure which is available in almost every enterprise or home environment where the IoT is needed. A separate Wi-Fi network will be created for the IoT devices, so that, the current normal users experience will not change. The solution proved to be secure by evaluating the three security pillars: confidentiality, integrity and availability
The Role Of Access Control And Device Authentication In The Internet Of Things
The new generation of wireless sensor networks that is known as the internet of things enables the direct connection of physical objects to the internet using microcontrollers. In most cases, these microcontrollers have very limited computational resources. In this study, we investigate the access control solution for the IETF standard draft constrained application protocol using the datagram transport layer security protocol for transport security. We use the centralized approach to save access control information in the framework. Since, the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography
Knowledge Acquisition in GraPE (Grant Proposal Electronic Reviewing Assistant)
The review of grant proposals is an important task in every academic field, but there exist no
exact methodologies to help referees in doing this. The objective of this project is to build an
expert system to assist beginner referees in this process. The system will be based on ERA
(Electronic Referee Assistant), a knowledge-based advisor for Informatics research papers,
and named GraPE (Grant Proposal ERA). GraPE aims to provide guidance to beginner
referees to help them make better reviews and become better reviewers. As a fact, an expert
system’s problem solving strategy relies on its knowledge. The knowledge has to be well
defined, modelled, and represented in order to allow successful inference processes. This
paper will describe the process of knowledge acquisition in GraPE, from the identification of
knowledge sources to the knowledge modelling process
Person authentication using electroencephalogram (EEG) brainwaves signals
This chapter starts with the introduction to various types of authentication modalities, before discussing on the implementation of electroencephalogram (EEG) signals for person authentication task in more details. In general, the EEG signals are unique but highly uncertain, noisy, and difficult to analyze. Event-related potentials, such as visual-evoked potentials, are commonly used in the person authentication literature work. The occipital area of the brain anatomy shows good response to the visual stimulus. Hence, a set of eight selected EEG channels located at the occipital area were used for model training. Besides, feature extraction methods, i.e., the WPD, Hjorth parameter, coherence, cross-correlation, mutual information, and mean of amplitude have been proven to be good in extracting relevant information from the EEG signals. Nevertheless, different features demonstrate varied performance on distinct subjects. Thus, the Correlation-based Feature Selection method was used to select the significant features subset to enhance the authentication performance. Finally, the Fuzzy-Rough Nearest Neighbor classifier was proposed for authentication model building. The experimental results showed that the proposed solution is able to discriminate imposter from target subjects in the person authentication task
EEG-Based Biometric Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
This paper proposes an Incremental Fuzzy-Rough Nearest Neighbour (IncFRNN) technique for biometric authentication modelling using feature extracted visual evoked. Only small training set is needed for model initialisation. The embedded heuristic update method adjusts the knowledge granules incrementally to maintain all representative electroencephalogram (EEG) signal patterns and eliminate those rarely used. It reshapes the personalized knowledge granules through insertion and deletion of a test object, based on similarity measures. A predefined window size can be used to reduce the overall processing time. This proposed algorithm was verified with test data from 37 healthy subjects. Signal pre-processing steps on segmentation, filtering and artefact rejection were carried out to improve the data quality before model building. The experimental paradigm was designed in three different conditions to evaluate the authentication performance of the IncFRNN technique against the benchmarked incremental K-Nearest Neighbour (KNN) technique. The performance was measured in terms of accuracy, area under the Receiver Operating Characteristic (ROC) curve (AUC) and Cohen's Kappa coefficient. The proposed IncFRNN technique is proven to be statistically better than the KNN technique in the controlled window size environment. Future work will focus on the use of dynamic data features to improve the robustness of the proposed model
Evaluation Process for GraPE (A Web-Based Expert System for Reviewing Grant Proposal)
A reviewing process of grant proposals is of paramount
importance and tiresome for a referee. It excessively
consumes time in reading and analysing the content.
However, there is no exact methodology to help and assist
referees in the evaluation process. The objective of this
vroject is to build a web-based expert system to assist
beginner referees in this process The system is based on
ERA (Electronic Referee Assistant), la knowledge-based
advisor for Informatics research papers, and named GraPE
(Grant Proposal ERA ). GraPE aims to provide guidance to
beginner referees to help them make a better review and
become better reviewers. This paper will describe GraPE
and the system evaluation that has been carried out in order
to confirm the hypothesis proposed in this project
Performance Comparison Of Collaborative-Filtering Approach With Implicit And Explicit Data
Challenge in developing a collaborative filtering (CF)-based recommendation system is the problem of cold-starting of items that causes the data to sparse and reduces the accuracy of the recommendations. Therefore, to produce high accuracy a match is needed between the types of data and the approach used. Two approaches in CF include user-based and item-based CFs, both of which can process two types of data; implicit and explicit data. This work aims to find a combination of approaches and data types that produce high accuracy. Cosine-similarity is used to measure the similarity between users and also between items. Mean Absolute Error is also measured to discover the accuracy of a recommendation. Testing of three groups of data based on sparseness results in the best accuracy in an explicit data-based approach that has the smallest MAE value. The result is that the average MAE value for user based (implicit data) is 0.1032, user based (explicit data) is 0.2320, item based (implicit data) is 0.3495, and item based (explicit data) is 0.0926. The best accuracy is in the item-based (explicit-data) approach which is the smallest average MAE value
Constructing the novelty of SME collaboration parameter in gamification based on silaturrahmi culture
Collaboration is one of the essential strategies to maintain Small Medium Enterprise (SME) in facing the global market. However, there has been no agreed formulation of a collaboration model as a benchmark in previous studies, including the parameters used to measure collaboration performance. Weak motivation to collaborate is also an actual problem faced by SMEs. On the one hand, culture is one of the roots of individual thought and behavior as an essential aspect that influences the behavior of SME actors in running their business. Therefore, a culture-based SME collaboration model is proposed in the gamification
platform to present a more adaptive model and increase collaboration motivation. This research is focused
on building novelty parameters to measure collaboration performance as the primary basis for realizing
collaboration gamification models. Based on the literature review, there are four principles of "silaturrahmi" culture that have similar characteristics with collaboration, including Relationship Building (X1), Reciprocal Sustainment (X2), Reciprocal Assistant (X3), and Active Support (X4). The test was started by collecting questionnaire data from 63 respondents who were the movers of SMEs. The theme of
the question is about the influence of the four principles of silaturrahmi on collaboration. Data analysis was
carried out using the linear regression method and all test requirements (validity, reliability, normality, linearity, heteroscedasticity) to measure the influence of the four principles of "silaturrahmi" (Variable X1, X2, X2, X4) on collaboration (Variable Y). The results show that four variables have met all test requirements for linear regression analysis, resulting in a significance value (sig.) t table, the value of the regression coefficient (B) is positive. It means that the four variables have a positive effect
on collaboration because all hypotheses are accepted. The four can be a parameter to measure collaboration
performance with the proportion of the role of each variable that can be considered from the R-Square value. Thus, these four parameters can be used as the primary basis for building a collaboration gamification model as a reference for measuring collaboration. To implement the four parameters, they were included in the collaborative gamification mechanics material