Monday, November 20, 2017
   
Text Size
Login

Journal of Information and Communication Technology (JICT) Vol. 13, 2014

A RULE-BASED APPROACH FOR DISCOVERING EFFECTIVESOFTWARE TEAM COMPOSITION
¹Abdul Rehman Gilal, ²Mazni Omar & ³Kamal Imran Sharif
¹ Sukkur Institute of Business Administration, Pakistan
²School of Computing, Universiti Utara Malaysia, Malaysia
³School of Technology Management & Logistic,
Universiti Utara Malaysia, Malaysia
a-rehman@iba-suk.edu.my; mazni@uum.edu.my; kamalimran@uum.edu.my
 
ABSTRACT FULL TEXT
Human aspects in software engineering play a key role in composing effective team members. However, to date there is no general consensus on the effective personality types and diversity based on software team roles. Thus, this paper aims to discover the effective personality types and diversity based on two software team roles – team leader and programmer by using a rule-based approach. The rule-based approach by employing the rough set technique was used to discover patterns of the data selected. In this study, four main steps were involved to discover the patterns – reduct generation rules, rules generation, rules fi ltering, and rules evaluation. The results show that the rules generated achieved acceptable prediction accuracy with more than 70 per cent accuracy. In addition, the ROC value achieved 0.65, which indicates the rule-based model is valid and useful. The results reveal that the extrovert personality type is dominant for both software team roles and a homogeneous or heterogeneous team plays an equal role to determine an effective team. This study provides useful rules for decision makers to understand and get insight into selecting effective team members that lead to producing high quality software.
 
Keywords: Software team composition, personality types, diversity, team roles, rule-based.
 

 
STATISTICALLY CONTROLLED ROBUST TRUST COMPUTING MECHANISM FOR CLOUD COMPUTING
¹Mohamed Firdhous, ²Osman Ghazali & ³Suhaidi Hassan
¹Faculty of Information Technology, University of Moratuwa, Sri Lanka
² , ³School of Computing, Universiti Utara Malaysia, Malaysia
firdhous@uom.ik; osman@uum.edu.my; suhaidi@uum.edu.my
 
ABSTRACT FULL TEXT
Quality of service plays an important role in making distributed systems. Users prefer service providers who meet the commitments specifi ed in the Service Level Agreements to these who violate them. Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are accessed and paid for. Users can access cloud services including hardware, development platform and applications and pay only for the usage similar to the other utilities. Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specifi ed in the Service Level Agreements. Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions. Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported. This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresisbased algorithm. Hence the proposed mechanism can protect the trust scores from changes due to momentary fl uctuations in system performances. The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.
 
Keywords: Trust management, system performance, system fl uctuations.
 

 
A GENERALIZED E-LEARNING USAGE BEHAVIOUR MODEL BY DATA MINING TECHNIQUE
¹Songsakda Chayanukro, ²Massudi Mahmuddin & ³Husniza Husni
¹Suan Dusit Rajabhat University, Thailand
², ³School of Computing, Universiti Utara Malaysia, Malaysia
songsakda@gmail.com; ady@uum.edu.my; husniza@uum.edu.my
 
ABSTRACT FULL TEXT
Current study on e-Learning user’s behaviour model obtained the specific models. In many cases, the e-Learning user’s behaviour model for open source e-Learning system such as Moodle, which can predict learning outcome or learning performance is still defi cient and cannot generally apply in many institutions due to the fact that the majority of prediction models were developed particularly for certain institutions. This study proposes to produce a general model that can make a prediction of learning outcome inspired by Skinner’s theory, which explains the relationship between learner, achievement, and learner reinforcement. This study proposes similar patterns in e-Learning user’s behaviour models of different institutions by the data-mining technique based on the learning environment theory. Therefore, this research is conducted in three main phases; include data preparation from weblog of different institutions with the same e-Learning system, data extraction by the accurate classifi er model fi nding process and model verification for generating a verification pattern. The research outcome will be a similar pattern that could be used as a direction for creating a more appropriate e-Learning users’ behaviour model and could be used broadly in other higher institutions.
 
Keywords: e-Learning, user behaviour, data mining.
 

 
BUSINESS INTELLIGENCE MODELLING FOR GRADUATE ENTREPRENEUR PROGRAMME
¹Muhamad Shahbani Abu Bakar & ²Azman Ta’a
¹ , ²School of Computing, Universiti Utara Malaysia, Malaysia
shahbani@uum.edu.my; azman@uum.edu.my
 
ABSTRACT FULL TEXT
Business Intelligence (BI), which is the process of collecting, analysing, and transforming data using Data Warehouse (DW) is seen as one of the growing approaches to provide meaningful information for the Malaysian Ministry of Higher Education (MOHE). MOHE is responsible for managing various activities to encourage graduate entrepreneurs to venture into businesses and ensure that the country has many successful entrepreneurs. Therefore, systematic and accurate information needs to be available for planning, implementing, and monitoring entrepreneurs’ performances. This paper proposes the modelling and designing of the graduate entrepreneur profi le system – Intelligent Profi le Analysis Graduate Entrepreneur (iPAGE) using the BI approach. Two main methodologies were used, namely the Requirements Centric Operational Data Store (ReCODS) and the Rapid Application Development (RAD) to model and design this system. The iPAGE was validated and evaluated by users, entrepreneurs’ personnel and DW experts. Indeed, the approach will be used to benchmark the development of an entrepreneurial information system in the future.
 
Keywords: Graduate entrepreneur, business intelligence, data warehouse, operational data store, rapid application development.
 

 
ACCEPTANCE OF WEB-BASED TRAINING SYSTEM AMONG PUBLIC SECTOR EMPLOYEES
¹Huda Ibrahim & ²Thamer Ahmad AL-Rawashdeh
¹School of Computing, Universiti Utara Malaysia, Malaysia
²Faculty of Science and Information Technology,
Al-Zaytoonah University of Jordan, Jordan
huda753@uum.edu.my; thamer_com@yahoo.com
 
ABSTRACT FULL TEXT
Applying web-based training system is highly preferable in meeting time constraints, however, its success is subject to users’ acceptance. Previous studies highlight human challenge as the most important barrier in the implementation of an ICT-based training system. Users tend to show resistance in using new technology and online approaches. They favour the traditional way such as the face-to-face method of training. This paper presents the results of a study conducted to assess the acceptance of a web-based training by public sector employees. The study applied the Unifi ed Theory of Acceptance and Use Technology (UTAUT) with the focus on three system characteristics; system flexibility, system enjoyment, and system interactivity. A total of 290 employees from the Jordanian Public Sector participated in the study. The fi ndings revealed that system fl exibility and system enjoyment have direct effects while system interactivity has an indirect effect on the employees’ intention to use the web-based training system. In addition, system flexibility is proven to have the strongest relationship to users’ intention to use the web-based training system.
 
Keywords: Technology acceptance, web-based training system, public sector, UTAUT.
 

 
THE EVALUATION OF AN EMBEDDED SYSTEM KIT AS A C PROGRAMMING TEACHING TOOL
¹Azizah Suliman & ²Surizal Nazeri
¹, ²College of Information Technology, Universiti Tenaga Nasional, Malaysia
azizah@uniten.edu.my; surizal@uniten.edu.my
 
ABSTRACT FULL TEXT
This paper describes the methodology used in evaluating the effectiveness of an embedded system teaching tool for C programming. Teaching programming is one of the major problems among schools and universities. To overcome this problem, a teaching module and an embedded-system training kit for teaching programming to beginners were developed. The teaching module and kit were then tested on selected groups of school children. Focusing more on the testing phase of the research work, this paper gives a detailed account of the testing process and the evaluation method used. The result shows that the students are interested to learn programming using the embedded system.
 
Keywords: Teaching and learning programming, embedded system, C programming, teaching tools.
 

 
TECHNICAL CONSIDERATIONS IN DESIGNING HAPTIC APPLICATIONS: A CASE STUDY OF LAPAROSCOPY SURGERY SIMULATION WITH HAPTIC ELEMENTS
¹Norkhairani Abdul Rawi, ²Halimah Badioze Zaman & ³Azlina Ahmad
¹Faculty of Informatics, Universiti Sultan Zainal Abidin, Malaysia
², ³Faculty of Information Science and Technology, Universiti Kebangsaan
Malaysia, Malaysia
khairani@unisza.edu.my; hbz@ftsm.ukm.my; aa@ftsm.ukm.my
 
ABSTRACT FULL TEXT
Simulation has been widely used as a tool for training, especially in high risk areas such as in the aerospace, military and medical fi elds. Surgery is one of the sub areas that has been receiving much attention from researchers due to the ability of simulation to provide a real surgery setting and human organs with appropriate devices to increase the realism. Developing a surgical simulation is a technically complex process since it involves a few components that interact with each other. Thus this necessitates further considerations regarding the issues and challenges in order to produce an accurate and interactive application. Therefore there is a need for a technical solution framework to help a new and novice researcher in this area to get started. This paper discusses the important components of a surgical simulator, together with its issues and challenges. A proposed solution framework, together with the programming or application choices that are available for each of the components, is explained clearly as concluded from the discussion in the previous work. The class structure for the components is shown briefl y to give the new researcher an idea of it. It is hoped that this paper will serve as a foundation for new and novice researchers in haptic development specifi cally and visual informatics generally.
Keywords: Surgical simulation, haptic applications, technical framework, visual informatics.
 

 
OBJECT-BASED KNOWLEDGE REPRESENTATION OF FEMALE RELATED ISSUES FROM THE HOLY QURAN
Ku Ruhana Ku-Mahamud, Aniza Mohamed Din, Noraziah Che Pa, Faudziah Ahmad, Wan Hussain Wan Ishak, Farzana Kabir Ahmad and Roshidi Din
School of Computing, Universiti Utara Malaysia, Malaysia
ruhana@uum.edu.my; anizamd@uum.edu.my; aziah@uum.edu.my; fudz@uum.edu.my; hussain@uum.edu.my;farzana58@uum.edu.my;roshidi@uum.edu.my
 
ABSTRACT FULL TEXT
Focusing on the use of Semantic Network and Conceptual Graph (CG) representations, this paper presents an easy way in understanding concepts discussed in the Holy Quran. Quran is known as the main source of knowledge and has been a major source reference for all types of problems. However understanding the issues and the solution from the Quran is diffi cult due to lack of understanding of Quran literature. Meticulously, the Quran contains much important information related to female. However, this information are scattered and complexly linked. Technically, to extract and present the encapsulated knowledge on female matters in the Quran is a challenging task. Thus, this paper discusses on how to understand and represent the knowledge in an easy way. A total of 18 female terms are identifi ed. Through the terms, the name of surah, verses number and text from the verses are gathered. The texts are then analyzed and clustered into specifi c issues. Result of the analysis that consists of extracted knowledge on female issues is presented in a systematic structure using Semantic Network and CG. The strength and advantages of both approaches are compared, discussed and presented.
 
Keywords: Knowledge Representation, Semantic Network, Conceptual Graph, Quran Female Term, Female Issues

Universiti Utara Malaysia Press
 Universiti Utara Malaysia, 06010 UUM Sintok
Kedah Darul Aman, MALAYSIA
Phone: +604-928 4816, Fax : +604-928 4792

All Right Reserved. Copyright © 2010, Universiti Utara Malaysia Press