Heuristic Programming in Scheduling Problem Using A* Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: In preparing the schedule of course not an easy job. There are several aspects that influence in the preparation of schedules of courses that professors, students, courses, lecture rooms, and a time slot. Each of these aspects has a state that can be a problem and a conflict in scheduling courses. For example, the problems facing aspect lecturers are lecturers conflict is a lecturer teaches courses scheduled at two different locations at a time. Or from the aspect of students, the problem is the number of classes per generation. In addition to these problems, there are many more potential problems that can arise from each of these aspects. A decision support system needed a model settlement of the problems encountered. To be able to determine the right model can be done by identifying problems and analyze environmental problems and identify variables that are involved in decision making. In scheduling the course, the problem is a complex problem that is solved by routine or repetitive. The complexity of the problem can be seen from every aspect in the preparation schedule of courses that are interconnected with other aspects. Then, the scheduling is done every semester by environmental circumstances different issues each semester. So that the right model for this system is a heuristic programming model.
Authors and Affiliations
Zulham Sitorus , Andysah Putera Utama Siahaan
MANCAFChat - An Application to Evaluate MANCAF Framework
Abstract: The collaborative application uses the MANET to exchange the information between the available nodes. The development of such kind of application takes too much time to implement the network communication servi...
Image Steganography and Global Terrorism
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims t...
Biometric Fingerprint Combination to Improve AnonymityProtection
Abstract: Fingerprint techniques are widely used in authentication systems, therefore its privacy protectionbecomes an important issue. Securing a stored fingerprint template is very important because once fingerpr...
Teneur: A LINUX based offline content management system
Abstract: This technical section provides a brief synopsis about our offline content management system. The main purpose of this system is to manage the resources such as text files, images in a more synchronized m...
Cyber Security in the Era of Networking: A Review
Abstract: Cyber security is an intricate issue, affecting many application domains and straddling many disciplines and fields. Securing the critical infrastructures entails protecting not only the physical systems but, j...