100% found this document useful (3 votes)
15 views

Software Engineering Perspectives and Application in Intelligent Systems Proceedings of the 5th Computer Science On line Conference 2016 CSOC2016 Vol 2 1st Edition Radek Silhavy - Instantly access the complete ebook with just one click

The document provides information about various eBooks related to software engineering and intelligent systems, including proceedings from multiple Computer Science Online Conferences. It highlights the availability of these eBooks for instant download at textbookfull.com and emphasizes the significance of the research presented in these proceedings. The series aims to disseminate recent advancements in intelligent systems and computing across various disciplines.

Uploaded by

smejdatugra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
15 views

Software Engineering Perspectives and Application in Intelligent Systems Proceedings of the 5th Computer Science On line Conference 2016 CSOC2016 Vol 2 1st Edition Radek Silhavy - Instantly access the complete ebook with just one click

The document provides information about various eBooks related to software engineering and intelligent systems, including proceedings from multiple Computer Science Online Conferences. It highlights the availability of these eBooks for instant download at textbookfull.com and emphasizes the significance of the research presented in these proceedings. The series aims to disseminate recent advancements in intelligent systems and computing across various disciplines.

Uploaded by

smejdatugra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Explore the full ebook collection and download it now at textbookfull.

com

Software Engineering Perspectives and Application


in Intelligent Systems Proceedings of the 5th
Computer Science On line Conference 2016 CSOC2016
Vol 2 1st Edition Radek Silhavy
https://textbookfull.com/product/software-engineering-
perspectives-and-application-in-intelligent-systems-
proceedings-of-the-5th-computer-science-on-line-
conference-2016-csoc2016-vol-2-1st-edition-radek-silhavy/

OR CLICK HERE

DOWLOAD EBOOK

Browse and Get More Ebook Downloads Instantly at https://textbookfull.com


Click here to visit textbookfull.com and download textbook now
Your digital treasures (PDF, ePub, MOBI) await
Download instantly and pick your perfect format...

Read anywhere, anytime, on any device!

Software Engineering Trends and Techniques in Intelligent


Systems Proceedings of the 6th Computer Science On line
Conference 2017 CSOC2017 Vol 3 1st Edition Radek Silhavy
https://textbookfull.com/product/software-engineering-trends-and-
techniques-in-intelligent-systems-proceedings-of-the-6th-computer-
science-on-line-conference-2017-csoc2017-vol-3-1st-edition-radek-
silhavy/
textbookfull.com

Intelligent Algorithms in Software Engineering:


Proceedings of the 9th Computer Science On-line Conference
2020, Volume 1 Radek Silhavy
https://textbookfull.com/product/intelligent-algorithms-in-software-
engineering-proceedings-of-the-9th-computer-science-on-line-
conference-2020-volume-1-radek-silhavy/
textbookfull.com

Artificial Intelligence Methods in Intelligent Algorithms


Proceedings of 8th Computer Science On line Conference
2019 Vol 2 Radek Silhavy
https://textbookfull.com/product/artificial-intelligence-methods-in-
intelligent-algorithms-proceedings-of-8th-computer-science-on-line-
conference-2019-vol-2-radek-silhavy/
textbookfull.com

Software Engineering Perspectives in Intelligent Systems:


Proceedings of 4th Computational Methods in Systems and
Software 2020, Vol.2 Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-in-
intelligent-systems-proceedings-of-4th-computational-methods-in-
systems-and-software-2020-vol-2-radek-silhavy/
textbookfull.com
Software Engineering Perspectives in Intelligent Systems:
Proceedings of 4th Computational Methods in Systems and
Software 2020, Vol.1 Radek Silhavy
https://textbookfull.com/product/software-engineering-perspectives-in-
intelligent-systems-proceedings-of-4th-computational-methods-in-
systems-and-software-2020-vol-1-radek-silhavy/
textbookfull.com

Artificial Intelligence and Bioinspired Computational


Methods Proceedings of the 9th Computer Science On line
Conference 2020 Vol 2 Radek Silhavy
https://textbookfull.com/product/artificial-intelligence-and-
bioinspired-computational-methods-proceedings-of-the-9th-computer-
science-on-line-conference-2020-vol-2-radek-silhavy/
textbookfull.com

Applied Informatics and Cybernetics in Intelligent Systems


Proceedings of the 9th Computer Science On line Conference
2020 Volume 3 Radek Silhavy
https://textbookfull.com/product/applied-informatics-and-cybernetics-
in-intelligent-systems-proceedings-of-the-9th-computer-science-on-
line-conference-2020-volume-3-radek-silhavy/
textbookfull.com

Software Engineering and Algorithms in Intelligent Systems


Radek Silhavy

https://textbookfull.com/product/software-engineering-and-algorithms-
in-intelligent-systems-radek-silhavy/

textbookfull.com

Computational Statistics and Mathematical Modeling Methods


in Intelligent Systems Proceedings of 3rd Computational
Methods in Systems and Software 2019 Vol 2 Radek Silhavy
https://textbookfull.com/product/computational-statistics-and-
mathematical-modeling-methods-in-intelligent-systems-proceedings-
of-3rd-computational-methods-in-systems-and-software-2019-vol-2-radek-
silhavy/
textbookfull.com
Advances in Intelligent Systems and Computing 465
Radek Silhavy
Roman Senkerik
Zuzana Kominkova Oplatkova
Petr Silhavy
Zdenka Prokopova Editors

Software
Engineering
Perspectives and
Application in
Intelligent Systems
Proceedings of the 5th Computer
Science On-line Conference 2016
(CSOC2016), Vol 2
Advances in Intelligent Systems and Computing

Volume 465

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: [email protected]
About this Series
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually
all disciplines such as engineering, natural sciences, computer and information science, ICT,
economics, business, e-commerce, environment, healthcare, life science are covered. The list
of topics spans all the areas of modern intelligent systems and computing.
The publications within “Advances in Intelligent Systems and Computing” are primarily
textbooks and proceedings of important conferences, symposia and congresses. They cover
significant recent developments in the field, both of a foundational and applicable character.
An important characteristic feature of the series is the short publication time and world-wide
distribution. This permits a rapid and broad dissemination of research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australia
e-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: [email protected]

More information about this series at http://www.springer.com/series/11156


Radek Silhavy ⋅ Roman Senkerik
Zuzana Kominkova Oplatkova
Petr Silhavy ⋅ Zdenka Prokopova
Editors

Software Engineering
Perspectives and Application
in Intelligent Systems
Proceedings of the 5th Computer Science
On-line Conference 2016 (CSOC2016), Vol 2

123
Editors
Radek Silhavy Petr Silhavy
Faculty of Applied Informatics Faculty of Applied Informatics
Tomas Bata University in Zlín Tomas Bata University in Zlín
Zlín Zlín
Czech Republic Czech Republic

Roman Senkerik Zdenka Prokopova


Faculty of Applied Informatics Faculty of Applied Informatics
Tomas Bata University in Zlín Tomas Bata University in Zlín
Zlín Zlín
Czech Republic Czech Republic

Zuzana Kominkova Oplatkova


Faculty of Applied Informatics
Tomas Bata University in Zlín
Zlín
Czech Republic

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-319-33620-6 ISBN 978-3-319-33622-0 (eBook)
DOI 10.1007/978-3-319-33622-0

Library of Congress Control Number: 2016937380

© Springer International Publishing Switzerland 2016


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made.

Printed on acid-free paper

This Springer imprint is published by Springer Nature


The registered company is Springer International Publishing AG Switzerland
Preface

This book constitutes the refereed proceedings of the Software Engineering


Perspectives and Application in Intelligent Systems Section of the 5th Computer
Science On-line Conference 2016 (CSOC 2016), held in April 2015.
The volume Software Engineering Perspectives and Application in Intelligent
Systems brings 42 of the accepted papers. Each of them presents new approaches
and methods to real-world problems and exploratory research that describes novel
approaches in the field of cybernetics and automation control theory.
Particular emphasis is laid on modern trends in the selected fields of interest.
New algorithms or methods in a variety of fields are also presented.
CSOC 2016 has received (all sections) 254 submissions, 136 of them were
accepted for publication. More than 60 % of all accepted submissions were received
from Europe, 20 % from Asia, 16 % from America and 4 % from Africa.
Researchers from 32 countries participated in CSOC 2016.
CSOC 2016 intends to provide an international forum for the discussion of the
latest high-quality research results in all areas related to computer science. The
addressed topics are theoretical aspects and applications of computer science,
artificial intelligence, cybernetics, automation control theory and software
engineering.
Computer Science On-line Conference is held online and broad usage of modern
communication technology improves the traditional concept of scientific confer-
ences. It brings equal opportunity to participate to all researchers around the world.
The editors believe that readers will find the proceedings interesting and useful
for their own research work.

March 2016 Radek Silhavy


Roman Senkerik
Zuzana Kominkova Oplatkova
Petr Silhavy
Zdenka Prokopova

v
Program Committee

Program Committee Chairs


Zdenka Prokopova, Ph.D., Associate Professor, Tomas Bata University in Zlín,
Faculty of Applied Informatics, email: [email protected]
Zuzana Kominkova Oplatkova, Ph.D., Associate Professor, Tomas Bata University
in Zlín, Faculty of Applied Informatics, email: [email protected]
Roman Senkerik, Ph.D., Associate Professor, Tomas Bata University in Zlín,
Faculty of Applied Informatics, email: [email protected]
Petr Silhavy, Ph.D., Senior Lecturer, Tomas Bata University in Zlín, Faculty of
Applied Informatics, email: [email protected]
Radek Silhavy, Ph.D., Senior Lecturer, Tomas Bata University in Zlín, Faculty of
Applied Informatics, email: [email protected]
Roman Prokop, Ph.D., Professor, Tomas Bata University in Zlín, Faculty of
Applied Informatics, email: [email protected]

Program Committee Chairs for Special Sections


Intelligent Information Technology, System Monitoring and Proactive
Management of Complex Objects
Prof. Viacheslav Zelentsov, Doctor of Engineering Sciences, Chief Researcher of
St. Petersburg Institute for Informatics and Automation of Russian Academy of
Sciences (SPIIRAS)

vii
viii Program Committee

Program Committee Members


Boguslaw Cyganek, Ph.D., D.Sc., Department of Computer Science, University of
Science and Technology, Kraków, Poland
Krzysztof Okarma, Ph.D., D.Sc., Faculty of Electrical Engineering, West
Pomeranian University of Technology, Szczecin, Poland
Monika Bakosova, Ph.D., Associate Professor, Institute of Information
Engineering, Automation and Mathematics, Slovak University of Technology,
Bratislava, Slovak Republic
Pavel Vaclavek, Ph.D., Associate Professor, Faculty of Electrical Engineering and
Communication, Brno University of Technology, Brno, Czech Republic
Miroslaw Ochodek, Ph.D., Faculty of Computing, Poznań University of
Technology, Poznań, Poland
Olga Brovkina, Ph.D., Global Change Research Centre Academy of Science of the
Czech Republic, Brno, Czech Republic
Elarbi Badidi, Ph.D., College of Information Technology, United Arab Emirates
University, Al Ain, United Arab Emirates
Luis Alberto Morales Rosales, Head of the Master Program in Computer Science,
Superior Technological Institute of Misantla, Mexico
Mariana Lobato Baes, M.Sc., Research-Professor, Superior Technological of
Libres, Mexico
Abdessattar Chaâri, Professor, Laboratory of Sciences and Techniques of Automatic
Control and Computer engineering, University of Sfax, Tunisian Republic
Gopal Sakarkar, Shri. Ramdeobaba College of Engineering and Management,
Republic of India
V.V. Krishna Maddinala, Assistant Professor, GD Rungta College of Engineering
and Technology, Republic of India
Anand N. Khobragade, Scientist, Maharashtra Remote Sensing Applications
Centre, Republic of India
Abdallah Handoura, Assistant Professor, Computer and Communication Labora-
tory, Telecom Bretagne, France

Technical Program Committee Members


Ivo Bukovsky
Miroslaw Ochodek
Bronislav Chramcov
Eric Afful Dazie
Program Committee ix

Michal Bliznak
Donald Davendra
Radim Farana
Zuzana Kominkova Oplatkova
Martin Kotyrba
Erik Kral
David Malanik
Michal Pluhacek
Zdenka Prokopova
Martin Sysel
Roman Senkerik
Petr Silhavy
Radek Silhavy
Jiri Vojtesek
Eva Volna
Janez Brest
Ales Zamuda
Roman Prokop
Boguslaw Cyganek
Krzysztof Okarma
Monika Bakosova
Pavel Vaclavek
Olga Brovkina
Elarbi Badidi

Organizing Committee Chair


Radek Silhavy, Ph.D., Tomas Bata University in Zlín, Faculty of Applied
Informatics, e-mail: [email protected]

Conference Organizer (Production)


OpenPublish.eu s.r.o.
Web: http://www.openpublish.eu
e-mail: [email protected]

Conference Website, Call for Papers


http://www.openpublish.eu
Contents

The Effect of Nutrition Education System for Elementary School


Students in Nutrition Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Yi-Horng Lai
MATP: A Multi-agent Model for the University
Timetabling Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Houssem Eddine Nouri and Olfa Belkahla Driss
Optimized Clustering with Statistical-Based Local Model
for Replica Management in DDM over Grid . . . . . . . . . . . . . . . . . . . . 23
M. Shahina Parveen and G. Narsimha
The MOBIKEY Keystroke Dynamics Password Database:
Benchmark Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Margit Antal and Lehel Nemes
Joint Algorithm for Traffic Normalization and Energy-Efficiency
in Cellular Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
P.T. Sowmya Naik and K.N. Narasimha Murthy
Architecture and Software Implementation of a Quantum
Computer Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Victor Potapov, Sergei Gushansky, Vyacheslav Guzik
and Maxim Polenov
MEEM: A Novel Middleware for Energy Efficiency
in Mobile Adhoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
P.G. Sunitha Hiremath and C.V. Guru Rao
A 3D Visualization Design and Realization of Otrokovice
in the Nineteen-thirties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Pavel Pokorný and Markéta Mazáčová

xi
xii Contents

Cost Effective Framework for Complex and Heterogeneous Data


Integration in Warehouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
P. Amuthabala and M. Mohanapriya
Uplink Channel Performance and Implementation of Software
for Image Communication in 4G Network . . . . . . . . . . . . . . . . . . . . . 105
N.R. Deepak and S. Balaji
A Brief Analysis of Reported Problems in the Use of Function
Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Andreia Silva, Plácido Pinheiro and Adriano Albuquerque
Task Allocation in Distributed Software Development Aided
by Verbal Decision Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Marum Simão Filho, Plácido Rogério Pinheiro
and Adriano Bessa Albuquerque
Application of Evolutionary Algorithm in Supply Chain
Management for Internet Marketing . . . . . . . . . . . . . . . . . . . . . . . . . 139
Sayed Sayeed Ahmad, Manuj Darbari and Harsh Purohit
Intelligent Mechanism for Cloud Federation and Requirements
Changes Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Nassima Bouchareb, Nacer Eddine Zarour and Samir Aknine
Comparison of the Intrusion Detection System Rules in Relation
with the SCADA Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Jan Vávra and Martin Hromada
An Optimization Scheduler in the Intranet Grid . . . . . . . . . . . . . . . . . 171
Petr Lukasik and Martin Sysel
A Hybrid Clustering Metric-Based Algorithm for Wireless
Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Bo Dong and Xue Wang
On Robust Computation of Tensor Classifiers
Based on the Higher-Order Singular Value Decomposition . . . . . . . . . 193
Bogusław Cyganek and Michał Woźniak
Model Checking Mutual Exclusion Algorithms Using UPPAAL . . . . . . . 203
Franco Cicirelli, Libero Nigro and Paolo F. Sciammarella
Software Usability Evaluation Based on the User Pinpoint Activity
Heat Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Nikita Danilov, Tatiana Shulga, Natalya Frolova, Nina Melnikova,
Nataliia Vagarina and Elena Pchelintseva
Contents xiii

Inflated Power Iteration Clustering Algorithm to Optimize


Convergence Using Lagrangian Constraint . . . . . . . . . . . . . . . . . . . . . 227
Jayalatchumy Dhanapal and Thambidurai Perumal
Virtualization of Operating System Using Type-2 Hypervisor . . . . . . . 239
Jiri Vojtesek and Martin Pipis
A New Game-Theoretical Approach in Network Routing:
Algorithms and Their Performance Analysis in OMNeT++ . . . . . . . . 249
Serap Ergün and Tuncay Aydoğan
Using Analytical Programming for Software Effort Estimation . . . . . . 261
Tomas Urbanek, Zdenka Prokopova, Radek Silhavy and Ales Kuncar
Intra-frame Prediction Mode Decision for Efficient Compression
and Signal Quality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
N.S. Pradeep Kumar and H.N. Suresh
Multidimensional Design of OLAP System for Context-Aware
Analysis in the Ambient Intelligence Environment. . . . . . . . . . . . . . . . 283
Jan Tyrychtr, Martin Pelikán, Hana Štiková and Ivan Vrana
A Process for Creating the Elicitation Guide of Non-functional
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Andreia Silva, Plácido Pinheiro, Adriano Albuquerque
and Jônatas Barroso
A Data-Centric Algorithm for Identifying Use Cases . . . . . . . . . . . . . . 303
Erki Eessaar
Algorithm to Balance Compression and Signal Quality
Using Novel Compressive Sensing in Medical Images . . . . . . . . . . . . . 317
M. Lakshminarayana and Mrinal Sarvagya
Application of Virtualization Technology for Implementing
Smart House Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Maxim Polenov, Andrey Kostyuk, Evgenia Muntyan,
Vyacheslav Guzik and Vladislav Lukyanov
Utilization of Motion Animation for Analysis of Basic Self-defense
Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Dora Lapkova, Lukas Kralik, Zuzana Oplatkova Kominkova
and Milan Adamek
EMG Analysis for Basic Self-defense Techniques . . . . . . . . . . . . . . . . 353
Dora Lapkova, Lukas Kralik and Milan Adamek
Proposal of the Web Application for Selection of Suitable
Job Applicants Using Expert System . . . . . . . . . . . . . . . . . . . . . . . . . 363
Bogdan Walek, Ondrej Pektor and Radim Farana
xiv Contents

Technique of Selecting Multiversion Software System Structure


with Minimum Simultaneous Module Version Usage . . . . . . . . . . . . . . 375
Denis V. Gruzenkin, Roman Yu. Tsarev and Alexander N. Pupkov
Expressing Pre-, Post-conditions, Attributes and Business
Constraints in Artifact-Centric Business Processes Using Object
Role Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Quân Nguyen-Le and Lam-Son Lê
SPAM Detection: Naïve Bayesian Classification
and RPN Expression-Based LGP Approaches Compared . . . . . . . . . . 399
Clyde Meli and Zuzana Kominkova Oplatkova
An Agile Approach to Improve Process-Oriented Software
Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Adriana Herden, Pedro Porfirio Muniz Farias
and Adriano Bessa Albuquerque
Ad-Hoc Routing Protocols Comparison Using Open-Source
Simulation Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Tomas Sochor and Tomas Gatek
Discrete Event Simulation of Loading Unloading Operations
in a Specific Intermodal Transportation Context. . . . . . . . . . . . . . . . . 435
Ezzeddine Fatnassi and Jouhaina Chaouachi
Parallelization of Fuzzy Logic Analysis for Pattern Recognition . . . . . . 445
M. Hires, H. Habiballa and V. Novak
Performance Management Using Autonomous Control-Based
Distributed Coordination Approach in a Volunteer Grid
Computing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Saddaf Rubab, Mohd Fadzil Hassan, Ahmad Kamil Mahmood
and Syed Nasir Mehmood Shah
Intelligent Speech Interaction of Devices and Human Operators . . . . . 471
Maciej Majewski and Wojciech Kacalak
Erratum to: Expressing Pre-, Post-conditions, Attributes
and Business Constraints in Artifact-Centric Business Processes
Using Object Role Modeling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E1
Quân Nguyen-Le and Lam-Son Lê

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483


The Effect of Nutrition Education System
for Elementary School Students
in Nutrition Knowledge

Yi-Horng Lai

Abstract The purpose of this study is to introduce the graphic presentation food
safety and sanitation learning system with parent participation in element school’s
health and physical education curriculum. The students were divided into four
groups: control group, control group with parent participation, learning system
group, and learning system group with parent participation. There were three extra
variables in this study: learning system, parent participation, and gender. The
research data (three exams scores) was obtained before the course, in the middle of
the course, and at the end of the course. The results indicate that, first, the estimate
of slope of learning system is significantly correlated with parent participation;
second, male elementary school students and female elementary school students
were similar in the growth rate between each time points; third, the relationship
between the initial exam score and the following two exam scores were not sig-
nificant. Based on the results, it can be concluded that the use of learning system
and parent participation were helpful for elementary school students to acquire food
safety and sanitation knowledge in the health and physical education curriculum.

Keywords Computer-assisted instruction (CAI) ⋅ Parent participation ⋅ Nutrition



knowledge Latent growth model

1 Introduction

Schools play an important role in students’ health promotion and disease preven-
tion. Since elementary school students tend to form their health knowledge, atti-
tudes and behavior through school education, it is important for schools to deliver
effective health program. [1].

Y.-H. Lai (✉)


Department of Health Care Administration, Oriental Institute of Technology,
New Taipei City, Taiwan
e-mail: [email protected]

© Springer International Publishing Switzerland 2016 1


R. Silhavy et al. (eds.), Software Engineering Perspectives and Application
in Intelligent Systems, Advances in Intelligent Systems and Computing 465,
DOI 10.1007/978-3-319-33622-0_1
2 Y.-H. Lai

In 2000, Taiwan’s Ministry of Education implemented the Nine-Year Integrated


Course, and “Health and Sports” is one of the main fields of study. The integration
of information technology is a new learning tool for food safety and sanitation,
which is an important part of health education.
Computer tailored food safety and sanitation education may be more effective
than traditional food safety and sanitation education because messages are tailored
to individual behavior, needs and beliefs. Therefore, the messages are more capable
of targeting at individuals and may have stronger motivational effects. Computer
tailored food safety and sanitation education has been studied for different dietary
behaviours, in different target populations, and in different settings. In recent years,
studies [2−4] that assessed the effects of interactive technology in food safety and
sanitation education were based on the behavior change theory. Computer tailored
food safety and sanitation education is more likely to be read, remembered, and
experienced as it is more personally relevant compared to standard materials.
Furthermore, the computer tailored food safety and sanitation education also
appears to have a greater effect in motivating people to change their diet, their fat
intake in particular, although at present no definite conclusions can be drawn.
The purpose of this study is to explore the effects of the graphic presentation
food safety and sanitation education informatics network (Computer Assist
Instruction; CAI) with parent participation in elementary school’s health and
physical education curriculum.

1.1 The Information Technology and Nutrition Education

Computer tailored food safety and sanitation education is an innovative and


promising tool to motivate people to make healthy dietary changes. It provides
respondents with individualized feedback about their dietary behaviors, motiva-
tions, attitudes, norms, and skills and mimics the process of person-to-person
dietary counselling. The available evidence indicates that computer tailored food
safety and sanitation education is more effective in motivating people to make
dietary changes than the traditional food safety and sanitation information, espe-
cially for reduction of dietary fat. The effectiveness of computer tailoring has been
attributed to the fact that individualized feedback commands greater attention, is
processed more intensively, contains less redundant information, and is appreciated
better than more general intervention materials. Interactive technology offers good
opportunities for the application of computer tailored food safety and sanitation
education, and some studies of web-based computer tailoring have shown
promising results. [5].
The results of Oenema, Brug, and Lechner’s study [6] indicated that interactive,
web-based computer-tailored food safety and sanitation education can lead to
changes in determinants of behaviour. Food safety and sanitation educators are
encouraged to explore the opportunities and challenges of these new technologies to
The Effect of Nutrition Education System for Elementary School … 3

enhance their work [7]. Brug, Steenhuis, Assema, and Vries’s study [2] pointed out
that computer-tailored food safety and sanitation information is a promising means
of stimulating people to change their diet toward dietary recommendations.
Bensley, Anderson, Brusk, Mercer, and Rivas’s study [8] claimed that Internet
food safety and sanitation education was a viable alternative to traditional food
safety and sanitation education for increasing fruit and vegetable consumption in
some women, infants, and children clients. Besides, food safety and sanitation
education through the telehealth service resulted in positive effects on the risk
factors for metabolic syndrome, nutrient intake, and dietary habits [3]. In Tyro-
volasa, Tountasb, Polychronopoulosa, and Panagiotakos’s study [4], active food
safety and sanitation policy and enhancement of food safety and sanitation services
within the public health care system can contribute to improved health and quality
of life among older populations. The food guidance system provides the basis for
the food guidance presented in the American Red Cross food safety and sanitation
course, “Better Eating for Better Health”, and in “Dietary Guidelines and Your
Diet”, which is a series of bulletins developed by USDA to help consumers use the
Dietary Guidelines [9].

1.2 The Parent Participation and Nutrition Education

Niemeiera, Hektnerb, and Enger’s study [10] mentioned that weigh-related health
interventions with parent participation could more effectively reduce body mass
indexes of child and adolescent participants. In addition, longer interventions that
include parent participation appear to have greater success. Suggestions for future
research and related interventions are provided. Parents who participated in the
intervention increased the scores on the nutrition knowledge test, and there also was
a significant association between degree of family involvement, higher grain
servings, and lower cholesterol intake [11].

2 Methods

The sample of this study was students of an elementary school in Taiwan. The
participants came from four classes, and they were assigned in four groups
respectively. The four groups were: control group, control group with parent par-
ticipation, learning system group, and learning system group with parent partici-
pation. The research framework is shown in Fig. 1.
The Latent Growth Model of this study is illustrated in Fig. 2. Learning system
group was the group (class) that applied the graphic presentation food safety and
sanitation education system in the four-week food safety and sanitation education.
4 Y.-H. Lai

Learning System

Parent Participation Nutrition Knowledge

Gender

Fig. 1 Research framework of this study

year 1 year 2 year 3

1
1 1 1 2
0

ICEPT SLOPE

Learning System Parent Participation Gender


(CAI) (PP)

Fig. 2 The latent growth model of the effect of nutrition education system for elementary school
students in nutrition knowledge

Learning system group with parent participation was the group (class) that
applied the graphic presentation food safety and sanitation education system in the
four-week food safety and sanitation education. Each parent was given a guide
book and had the access to the feedback system for this graphic presentation food
safety and sanitation education program. Students were required to do homework
with the graphic presentation food safety and sanitation education system with their
parents.
Control group was the group (class) that did the four-week food safety and
sanitation education by traditional teaching method. This group did not involve the
graphic presentation food safety and sanitation education system. Control group
The Effect of Nutrition Education System for Elementary School … 5

with parent participation was the group (class) that did the four-week food safety
and sanitation education by the traditional teaching method. Each parent was given
a guide book and the access to the feedback system. Students were required to do
food safety and sanitation education homework by the traditional method with their
parents.
The 3 exam scores (year1, year2, and year3) were obtained before the course, in
the middle of the course, and at the end of the course. The questions on the three
exams were based on the learning materials of the four-week food safety and
sanitation education of health and physical education curriculum [12].

2.1 Research Data

124 students of an elementary school participated in this study. The data of this
study was collected by Y.Y. Chu for the research: The Food Safety and Sanitation
Education Information System (Research Project ID is NSC93-2516-S-034-001).
This research was completed on July, 31, 2005. Data in this present study was
obtained from Survey Research Data Archive (SRDA) [12] (Table 1).
There were four groups in this study: control group (learning system = 0, parent
participation = 0), control group with parent participation (learning system = 0,
parent participation = 1), learning system group (learning system = 1, parent
participation = 0), and learning system group with parent participation (learning
system = 1, parent participation = 1). The 3 exam scores on nutrition knowledge
(year1, year2, and year3) were obtained at 3 time points before and after the
learning system was used.
There were three extra variables in this study: learning system, parent partici-
pation, and gender, and they were all binary variables. Learning System = 1 means
using the learning system; Learning System = 0 means not using the learning
system. Parent Participation = 1 means learning with parent participation, and
Parent Participation = 0 means learning without parent participation. Gender = 1
means male students, and Gender = 0 means female students.
There were a total of 59 female students (47.58 %) and 65 male students
(52.42 %). There were 17 male students and 14 female students in the control

Table 1 Data summarize of the research


Geographic Frequency %
Gender Female 59 47.58
Male 65 52.42
Group Control group 31 25.00
Control group with parent participation 31 25.00
Learning system group 31 25.00
Learning system group with parent participation 31 25.00
Total 124 100.00
6 Y.-H. Lai

group; there were 16 male students and 15 female students in the control group with
parent participation; there were 17 male students and 14 female students in the
learning system group; and there were 16 male students and 15 female students in
the learning system group with parent participation. Each group all had 31 students
(Table 1).

2.2 Data Analysis

The data was analysed with latent growth modelling by using the Mplus 7 software
and R 3.2.3. Latent growth modelling is a statistical technique used in the structural
equation modelling framework to estimate growth trajectory. It is a longitudinal
analysis technique to estimate growth over a period of time.
Latent Growth Model represents repeated measures of dependent variables as a
function of time and other measures. The relative standing of an individual at a
specific time point is modelled as a function of an underlying process, the parameter
values of which vary randomly across individuals. Latent Growth Curve Method-
ology can be used to investigate systematic change, or growth, and inter individual
variability in this change. A special topic of interest is the correlation among the
growth parameters, the so-called initial status and growth rate, as well as their
relation with time varying and time invariant covariates [13].

3 Results

The relationship between time points and the average of exam scores are shown in
Table 2.
As for the model fit information of this study, Chi-Square Test of model fit was
57.296 (df = 4), RMSEA was 0.328, and CFI was 0.626. The estimate of the effect
of learning system, parent participation, and gender were found in Table 3 and
Table 4. The intercepts of the estimate of use of learning system, parent partici-
pation, and gender were not different. The 4 groups (control group, control group
with parent participation, learning system group, and learning system group with
parent participation) in this study were similar at the initial time point.

Table 2 Data summarize of N Mean S.D. Low High


the scores in three time points
Time 1 124 11.63 1.07 9.00 14.00
Time 2 124 13.87 1.86 9.00 17.00
Time 3 124 13.80 1.91 10.00 17.00
The Effect of Nutrition Education System for Elementary School … 7

Table 3 Fixed and random Estimate S.E. P-value


parameter estimates for latent
growth curve of this study Intercept Mean 3.060 0.166 <0.001
Variance 0.134 0.208 0.519
Slope Mean 0.177 0.098 0.007
Variance 0.029 0.090 0.750

Table 4 The effect of Estimate S.E. P-value


learning system, parent
participation, and gender Intercept Learning system 0.183 0.169 0.279
Parent participation 0.136 0.168 0.419
Gender 0.010 0.162 0.953
Slope Learning system 0.429 0.100 <0.001
Parent participation 0.385 0.100 <0.001
Gender −0.060 0.096 0.534

The estimates of fixed and random parameter for latent growth curve of this
study were displayed in Table 3. It can be found that the estimate of intercept mean
and slope mean were 3.060 (p-value < 0.001) and 1.777 (p-value < 0.001). But the
estimate of relationship between intercept and slope was −0.004, P-Value was
0.972. The relationship between intercept and slope was not significant. It means
that the scores were higher than the previous time. Besides, no matter what the
initial score is, students could all perform better in the following exams.
Table 4 and Fig. 3 shows that the relationship between the estimate of slope of
learning system and parent participation was significant (P-value < 0.05). The
relationship between gender and slope was not significant. The estimate of slope of

Fig. 3 The result of latent growth model of the effect of nutrition education system for elementary
school students in nutrition knowledge
8 Y.-H. Lai

factor of learning system was 0.385, and the estimate of slope of factor of parent
participation was 0.429. The growth rate of each exam time was positively corre-
lated with the use of learning system and parent participation. The score of ele-
mentary school students that used food safety and sanitation education information
system was higher than those who did not use food safety and sanitation education
information system by 0.429 points in each growth time. The score of elementary
school students with participating parents was higher than those without partici-
pating parents by 0.385 points in each growth time. Male elementary school stu-
dents and female elementary school students were similar in slope (the growth rate
between each time).

4 Conclusions

In recent years, computer applications have emerged as a viable means of gathering


and disseminating food safety and sanitation information. Both stand-alone and
on-line applications are being used to provide information on in the food safety and
sanitation education for the public, paraprofessionals, and professionals. While the
use of on-line communication applications such as multimedia and electronic dis-
cussion groups are just emerging as important tools among food safety and sani-
tation educators, the exponential growth of the Internet and the World Wide Web
(WWW) are making these technologies more and more accessible. Food safety and
sanitation educators are encouraged to explore the opportunities and cope with
challenges of these new technologies to enhance their work.
The use of learning system was helpful for elementary school students to gain
more nutrition knowledge, and this result was consistent with Brug et al. [5],
Oenema et al. [6], Brug et al. [2], Park et al. [3], Tyrovolasa et al. [4]. Parent
participation was helpful for elementary school students to learn more nutrition
knowledge, and this result was the same as Niemeiera et al. [10] and Hopper et al.
[11]. Gender made no difference in the result of nutrition knowledge acquisition.
Besides, the initial score did not affect students’ subsequent performances.
Finally, the learning of nutrition knowledge will be cultivated by both of the
using of CAI (such as graphic presentation food safety and sanitation education
system) and parent participation. Teachers could enhance the result of health
education with computer learning system and parent support. CAI could be used as
assistant teaching materials of food safety and sanitation education. Students could
study with CAI on internet by themselves. CAI could reduce the time and expense
of resource actual-food practicing. Furthermore CAI can also improve learning
efficiency of school-children to achieve balance dietary behaviour.
It can be concluded that the acquisition of nutrition knowledge can be cultivated
by both CAI (such as graphic presentation food safety and sanitation education
system) and parent participation. Teachers can enhance the effectiveness of health
education with computer learning system and parent support. CAI can supplement
teaching materials of food safety, while parents’ involvement can help students to
The Effect of Nutrition Education System for Elementary School … 9

achieve better in the learning system. To sum up, this paper has found that the use
of CAI with parent participation can effectively improve the food safety and san-
itation education in elementary school.

Acknowledgments This study is based in part on data from the Survey Research Data Archive
(SRDA) provided by the Academia Sinica. The interpretation and conclusions contained herein do
not represent those of Survey Research Data Archive (SRDA) or Academia Sinica.

References

1. Ubbes, V.A., Cottrell, R.R., Ausherman, J.A., Black, J.M., Wilson, P.C., Snider, J.:
professional preparation of elementary teachers in ohio: status of k-6 health education. J. Sch.
Health. 69(1), 17–21 (1999)
2. Brug, J., Steenhuis, I., Assema, P.V., Vries, H.D.: The impact of a computer-tailored nutrition
intervention. Prev. Med. 25, 236–242 (1996)
3. Park, S.Y., Yang, Y.J., Kim, Y.: Effects of Nutrition education using a ubiquitous healthcare
(u-health) service on metabolic syndrome in male workers. Korean J. Nutr. 44(3), 231–242
(2011)
4. Tyrovolasa, S., Tountasb, Y., Polychronopoulosa, E., Panagiotakos, D.: A parametric model
of the role of nutritional services within the health care system, in relation to cardiovascular
disease risk among older individuals. Int. J. Cardiol. 155(1), 110–114 (2012)
5. Brug, J., Oenema, A., Campbell, M.: Past, present, and future of computer-tailored nutrition
education. Am. J. Clin. Nutr. 77(4), 1028–1034 (2003)
6. Oenema, A., Brug, J., Lechner, L.: Web-based tailored nutrition education: results of a
randomized controlled trial. Health Educ. Res. 16(6), 647–660 (2001)
7. Kolasa, K.M., Miller, M.G.: New developments in nutrition education using computer
technology. J. Nutr. Educ. 28(1), 7–14 (1996)
8. Bensley, R.J., Anderson, J.V., Brusk, J.J., Mercer, N., Rivas, J.: Impact of internet vs
traditional special supplemental nutrition program for women, infants, and children nutrition
education on fruit and vegetable intake. J. Am. Diet. Assoc. 111(5), 749–755 (2011)
9. Cronin, F.J., Shaw, A.M., Krebs-Smith, S.M., Marsland, P.M., Light, L.: Developing a food
guidance system to implement the dietary guidelines. J. Nutr. Educ. 19(6), 281–302 (1987)
10. Niemeiera, B.S., Hektnerb, J.M., Enger, K.B.: Parent participation in weight-related health
interventions for children and adolescents: a systematic review and meta-analysis. Prev. Med.
55(1), 3–13 (2012)
11. Hopper, C.A., Munoz, K.D., Gruber, M.B., MacConnie, S., Schonfeldt, B.S., Shunk, T.: A
school-based cardiovascular exercise and nutrition program with parent participation: an
evaluation study. Child. Health Care. 25(3), 221–235 (1996)
12. Chu, Y.Y.: The graphic presentation nutrition education informatics network. The Survey
Research Data Archive. https://srda.sinica.edu.tw/search/gensciitem/1025 (2007). Accessed 18
July 2012
13. Preacher, K.J., Wichman, A.J., MacCallum, R.C., Briggs, N.E.: Latent growth curve
modeling. Struct. Equ. Model. Multi. J. 19(1), 152–155 (2012)
MATP: A Multi-agent Model
for the University Timetabling Problem

Houssem Eddine Nouri and Olfa Belkahla Driss

Abstract This paper proposes a multi-agent model for solving the university
course timetabling problem. It is composed of cooperating agents enabling highly
distributed processing of the problem and incorporating constraints that have not
been considered by previous works. The aim of our model is to provide a best
solution satisfying hard and soft constraints while reducing temporal complexity.
To analyze the efficiency of our model, we give experimental results based on real
instances of the Higher Business School of Tunis by analyzing the variation effect
of the lecture and teacher numbers on the messages number and the CPU execution
time, and the variation effect of the assignment priority score on the percentage of
teacher’s preferences satisfaction.

Keywords University course timetabling problem ⋅ Multi-agent system ⋅


Negotiation ⋅
Messaging exchange system

1 Introduction

The timetabling problem is an instance of the personal scheduling problems which


has become more diffused in our real life. It is well known as an NP-complete
problem. This problem is pervasive in all practical aspects of modern society. It
plays a very important role in many types of organizations such as hospitals,
transport companies, protection services and emergency and universities. In our
case, we focus more precisely on the problem of the university timetabling problem.

H.E. Nouri (✉) ⋅ O.B. Driss


Stratégies d’Optimisation et Informatique intelligentE,
Institut Supérieur de Gestion de Tunis, Université de Tunis,
41, Avenue de La Liberté, Cité Bouchoucha, Bardo, Tunis, Tunisia
e-mail: [email protected]
O.B. Driss
e-mail: [email protected]

© Springer International Publishing Switzerland 2016 11


R. Silhavy et al. (eds.), Software Engineering Perspectives and Application
in Intelligent Systems, Advances in Intelligent Systems and Computing 465,
DOI 10.1007/978-3-319-33622-0_2
12 H.E. Nouri and O.B. Driss

Burke and his colleagues [5] note in this regard that this problem can be divided
into two main categories: courses and exams. Different aspects separate these two
categories. For example, we try to group the courses, but we prefer to move away
exams from each other as possible. Or again, a course may take place at a given
time in one classroom, while many exams may take place at the same time in the
same classroom, or the same exam can be dispatched in many classrooms.
In this paper, we are interested to solve the university course timetabling
problem. It can be defined as a set of university courses which take place
throughout specific periods for five or six days in a week, directed by a limited
number of teachers and classrooms requiring a better management in order to
contain the large number of the registered students. Our aim is to get a best solution
for this problem satisfying several hard and soft constraints while minimizing the
temporal complexity.
This paper is organized as follows. In Sect. 2, we present how the university
course timetabling problem is solved by previous works as well as its hard and soft
constraints. We detail then in Sect. 3 our contribution based on multi-agent sys-
tems. Section 4 is devoted to the presentation of a real case study (instances of the
Higher Business School of Tunis) in order to test our model as well as a set of
scenarios evaluating its efficiency.

2 University Course Timetabling Problem

Many researchers are facing this problem from several points of view and with
different approaches using different paradigms of resolution. The first attempts of
resolution methods were based on the theory of graphs [6, 12], the integer linear
programming [8] and the techniques of constraint satisfaction problem [1, 13, 15].
However, these methods have not given a solution dealing with all instances and
constraints of this problem. That’s why, they have given a way to other types of
methods adapted to this type of problem, namely meta-heuristics such as the tabu
search [16], the simulated annealing [7] and the genetic algorithms [2]. This family
of approximate search has mechanisms that allow a good general investigation of
the search space. But generally, it is nondeterministic and gives no guarantee of
optimality. This has allowed the appearance of new approaches based on the
multi-agent systems [3, 10−11, 14], but they did not succeed to well adapt this
formalism to generate a solution satisfying all the problem constraints. That’s why,
and in this area we have proposed a new multi-agent model allowing to minimize
the time complexity, to introduce new details that have not been taken into account
by previous work and to attend a good satisfaction of the teachers preferences.
In order to get a best solution for this problem, we must take into account all the
constraints of the problem that should be satisfied. These constraints are often
classified into two categories, the first includes hard constraints and the second
category includes constraints often called soft constraints:
MATP: A Multi-agent Model for the University Timetabling Problem 13

Hard constraints: must be satisfied in any environment, because the violation of


these constraints may cause the generation of an unsatisfiable solution:
• Two lectures cannot be programmed in the same classroom and at the same
period of time,
• The lectures given by the same teacher cannot be programmed at the same
period of time,
• A classroom can be assigned only to one lecture at the same period of time,
• A group lecture cannot takes place at the same period with another that is not a
group lecture belonging to the same level of study,
• The number of students must be less than or equal to the capacity of the
assigned classroom.
Soft constraints: the violation of these constraints has no effect on the generation
of a satisfiable solution:
• The assignment of classrooms and periods of time must allow to satisfy at best
the preferences of teachers,
• The assignment of classrooms to the different lectures must allow to satisfy at
best some preferences.
In this work, we propose a multi-agent model based on cooperative agents, that
we have named MATP a Multi-Agent model for university Timetabling Problem,
enabling highly parallel and distributed processing of the problem. Our model
incorporates several constraints that have not been taken into account by previous
works.
Multi-Agent systems (M.A.S) are chosen because of their advantages in many
different domains by means of the cooperation between a society of agents. In fact,
each agent, concurrently and asynchronously, acquires information from its envi-
ronment and from other agents to reason on and to act consequently, see the studies
of [9].

3 Multi-agent Model for University Timetabling Problem

3.1 Agent Identification

We have equipped our multi-agent model MATP, see Fig. 1, with three classes of
agents. The first class is composed of agents that we have named TA, “Teacher
Agents”, divided into three categories of teachers: C1: Professor,
Associate-professor; C2: Assistant-professor, Assistant; C3: Contractual. The second
class is composed of agents that we called CA, “Classroom Agents”, divided into
three types of class-rooms (“Course”, “Tutorial Class”, ‘Practical Class”,) related to
the type of the lecture session. The third class contains three agents: two “Interface
Agents” that we called IA1 and IA2 and one “History Agent” that we named HA.
14 H.E. Nouri and O.B. Driss

Fig. 1 Multi-agent model for university timetabling problem

3.2 Global Steps of MATP

The steps of our model MATP proceed in three phases detailed below: initializa-
tion, negotiation and transmission of final results.
Initialization phase. In this phase, we present the role of the agent IA1 which
initializes the execution of the system agents. In fact, it allows the implementation
of all agents based on the initial parameters fixed at the start by the user.
Negotiation phase. This phase is the kernel of our model. It is based on a
messaging exchange system between the two agent’s classes TA and CA in order to
have in each case an agreement between them, respecting all the hard constraints of
this problem. The first class of agents TA starts the negotiation process by sending
all their allocation propositions (which were recovered from their preferences base)
to the CA agents in order to get a better reservation of the most suitable classrooms
and the most favorite time periods of the day.
The second class of agents CA will receive and analyze the TA agent’s pref-
erences. In fact, this class will ask the HA agent to verify the existence of dupli-
cation of time periods for a same TA agent in each reception of propositions. Thus,
it allows either to validate, or to give a new proposition in the case of conflict.
The CA may have 1 or n TA propositions asking the same period in the same day,
and generating conflicts between them, see Fig. 2. That’s why, we have added a
MATP: A Multi-agent Model for the University Timetabling Problem 15

Fig. 2 Interaction protocol diagram

new hypothesis in which a classroom can be replaced by another one having the
same characteristics, that we called the equivalence of classrooms (or vertical
search) for the three categories of teacher agents. So we used a Vertical assignment
priority Score VSi affected to each i category of teacher, where i ∈ {1, 2, 3}. This
score VSi is incremental from zero to a maximum value VSimax, where VSi ∈ [0,
VSimax].
VSimax is the maximum value given by the user for this score that may have a
TA agent with a category i where:
• Priority 1, VS1max (Rank of teacher): This score is given for each agent
belonging to the first category of teacher agents TA having a rank of “Professor”
or “Associate-professor”.
• Priority 2, VS2max (“Course”): This score is given for each agent belonging to
the second category of teacher agents TA and asking a lecture session with type
“course”.
16 H.E. Nouri and O.B. Driss

• Priority 3, VS3max (“TC” or “PC”): This score is given for each agent
belonging to the third category of teacher agents TA and asking a lecture session
with type “TC” (Tutorial Class) or “PC” (Practical Class).
Also, by integrating many types of criteria for acceptance of a reservation (ca-
pacity of students for each lecture session, the teacher’s category, type of classroom
to be reserved and type of lecture session), we will have a decrease in the per-
centage of appearance of conflicts between TA agents.
Transmission of final results. Whenever a TA agent receives all solutions in
response to its messages, it finishes its negotiation phase and transmits its final
results to IA1 agent generating the form of teacher’s timetable. Then the agent IA2
ends the process by generating the final timetable of the different classrooms.

3.3 Agent Behaviour

Interface agent behaviour. The behaviour of the IA1 is to initialize all the other
agents of our model. Then, it moves to an inactive state pending the reception of the
final TA agent messages to generate them in the form of a solution for the teacher
timetabling problem. For the IA2 behaviour, this latter has to generate a solution for
the classroom timetabling problem after the end of the negotiation process.
Teacher agent behaviour. A TA agent possesses a group of lectures (which can
be a course, TD or TP) that it seeks to assign them to classrooms in the most
favourite periods of the day. In fact, each TA begins its negotiation phase by
sending its proposals to CA agents requesting the most preferred classrooms and
teaching periods. Then, he receives a response message from CA:
• Verification of reservation request:

Classroom agents behaviour. A CA agent contains an array of periods to


search solutions for the requested periods. Thus, this type of agent is composed of a
set of rules for the negotiation management:
MATP: A Multi-agent Model for the University Timetabling Problem 17

Fig. 3 Vertical assignment search

• Verification of duplication part:

• Validation of proposition part (Figs 3 and 4):


Discovering Diverse Content Through
Random Scribd Documents
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like