• Tidak ada hasil yang ditemukan

Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation.

N/A
N/A
Protected

Academic year: 2017

Membagikan "Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation."

Copied!
14
0
0

Teks penuh

(1)

IJCSI

IJCSI

International Journal of

Computer Science Issues

Volume 10, Issue 2, No 2, March 2013

ISSN (Online): 1694-0784

ISSN (Print): 1694-0814

© IJCSI PUBLICATION

www.IJCSI.org

(2)

IJCSI proceedings are currently indexed by:

©

IJCSI PUBLICATION 2013

(3)

TABLE OF CONTENTS

1. A New IPFM Based Model For Artifitial Generating Of HRV With Random Input

Gholamreza Attarodi, Nader Jafarnia Dabanloo, Zahra Abbasvandi and Nazanin Hemmati

1-5

2. Hybrid Swarm Intelligence Technique for CBIR Systems

Anil Kumar Mishra, Madhabananda Das and T.C.Panda

6-11

3. Efficient Algorithm for Near Duplicate Documents Detection

Gaudence Uwamahoro and

12-18

4. Influence of Project Duration constraint on efforts in Constructive Cost Model and

optimizing the efforts to obtain accuracy

Brajesh Kumar Singh and A. K. Misra

19-25

5. Awareness-Usability Issues in IT-initiatives for difficult geographies

Kamal Kumar Ghanshala and Durgesh Pant

26-30

6. Cross Layer Optimized Transmission for an Energy Efficient Wireless Image Sensor

Network

Alice Abraham and Narendra Kumar G

31-38

7. Energy Aware Adaptive Image Transmission Scheme with Data Authentication in Wireless

Sensor Networks

Alice Abraham and Narendra Kumar G

39-46

8. A Comparison Between Present and Future Models Of Software Engineering

Harikrishnan Natarajan, Ram Kumar Somasundaram and Kalpana Lakshmi

47-50

9. Combining Web SCADA Software and Matlab-Simulink for Studying Wind-PV-Battery

Power Systems

Aryuanto Soetedjo, Abraham Lomi2, Yusuf Ismail Nakhoda3 and Yohan Pramono Tosadu

51-57

10. Larg Band Ridged Waveguide Polarizer as Feed for Telecommunications Satellites

Antennas

Bousalah Fayza

58-62

11. Categorizing ancient documents

Nizar Zaghden, Rémy Mullot and Mohamed Adel Alimi

63-72

12. Suggested method for Estimating Maximum Capacity of images for different intensities

Thekra Abbas, Zou Beiji and Ongalo P.N.Fedha

73-82

13. Sliding Mode ANFIS-Based MIMO Fuzzy Neural Network Control for Robotic Systems

Yi-Jen Mon

83-86

14. Conceptual Understanding of Computer Program Execution: Application to C++

Sabah Al-Fedaghi

91-101

15. Anti-surge Control Technologies of LargeCsized Chinese Gas Compression Pump

Liu Xiaoyang

102-107

16. Optimization and Application of initial Value of Non-equidistant New Information

GM(1,1) Model

Youxin Luo

(4)

17. Improvement and Application of Initial Value of Non-equidistant GM(1,1) Model

Youxin Luo

113-118

18. Non-equidistant GRM(1,1) Generated by Accumulated Generating Operation of

Reciprocal Number and its Application

Youxin Luo, and

119-123

19. Based on RFID Products Information Tracing Anti-counterfeiting Strategy Design and

Application

Jiao Yabing

124-129

20. Person Name Recognition for Uyghur Using Conditional Random Fields

Muhtar Arkin, Abdurahim Mahmut and Askar Hamdulla

130-136

21. Supply Chain Coordination Research under a Fuzzy Decision Environment

Shengju Sang

137-142

22. The Echelon Pattern and Its Key Technologies of Urban Circle Solid Waste Disposal

Xuhui Li, Gangyan Li, Guowen Sun, Huiping Shi and Baoan Yang

143-149

23. A Fitting Approach to Mend Defective Urban Traffic Flow Information Based on SARBF

Neural Networks

Ning Chen, Weibing Weng and Xing Xu

150-155

24. Predicting the Severity of Breast Masses with Data Mining Methods

Sahar A. Mokhtar and Alaa M. Elsayad

160-168

25. Fusion of Physical Extraction Parameter Model Optical and SAR Data for Flood

Detection

Wawan Setiawan and Wiweka

169-176

26. A Search Algorithm Oriented to XML Keywords

Xingyuan Li

177-183

27. Application of equivalent permeability in numerical simulation of horizontal wells in

bottom water reservoirs

Li-Feng Li, Bing-Bing Wang and Xiang-An Yue

184-189

28. An Improved Cost-Efficient Thinning Algorithm for Digital Image

Liang Jia and Zhenjie Hou

190-197

29. Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing

Lilian Sing\'oei and Jiayang Wang

198-203

30. The Implementation of Univariate and Bivariate B-Spline Interpolation Method in

Continuous

Dian Pratiwi

204-210

31. Design of a Radioactive Source Sampler Based on CPAC

Bin Yang and Zhenyu Wang

211-216

32. Android-based Java Programming for Mobile Phone LED Control

Yi-Jen Mon

217-222

33. Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation

(5)

34. Application of optimal control theory to an SEIR model with immigration of infectives

Elhia Mohamed

230-236

35. Profit-Aware DVFS Enabled Resource Management of IaaS Cloud

Shahzad Ali

237-247

36. Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single

Camera

Yi-Jen Mon

248-250

37. Post-processing of Engineering Analysis Results for Visualization in VR System

Stoyan Maleshkov and Dimo Chotrov

258-263

38. Parallel and distributed closed regular pattern mining in large databases

M.Sreedevi and L S S Reddy

264-269

39. Dynamic Forensics Model based on Ontology and Context Information

Baoxian Jia and Weiqiang Yang

270-272

40. Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition

Zulpiya Kahar, Mayire Ibrayim and Askar Hamdulla

273-278

41. Modified TCP Protocol for Wireless Sensor Networks

Hesham Abusaimeh and Mohammad Shkoukani

279-285

42. Differential Evolution with (u+T)-Selection Technique

Miao-Miao Liu, Pan Huo and Wen-Yin Gong

286-293

43. ANFIS Transient Control for Double Inverted Pendulum System

Yi-Jen Mon

294-297

44. Dynamic Analysis for Video Based Smoke Detection

Chen Junzhou, You Yong and Peng Qiang

298-304

45. Design and Simulation of Gate Driver Circuit Using Pulse Transformer

Daizhuang Wang, Haifeng Dai and Zechang Sun

305-310

46. Studied and Their Application of Vibration Control Technologies

Ying Sun, Yuesheng Gu and Hegen Xiong

311-318

47. An Ensemble Monte Carlo Model to Calculate Photocurrent of MSM Photodetector

Mohammad Soroosh and Yasser Amiri

319-324

48. Evaluation of a Proposed Intelligent Transportation Framework using Computer

Network Concepts: A Case Study for Hajj-Pilgrim Traffic Monitoring and Control

Omar Tayan and Abdullah Al-Binali

325-330

49. A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area

Networks

Mohammed Mana, Mohamed Feham and Boucif Amar Bensaber

331-337

50. Simulation of Efficient Real-time Scheduling and Power Optimization

Rym Cheour, Urunuela Richard, Yvon Trinquet and Mohamed Abid

338-346

51. Web Usage Mining: Data Preprocessing and Multi Level analysis on Moodle

(6)

52. Performance Comparison of MIMO Systemsover AWGN and Rician Channels using

OSTBC3 with Zero Forcing Receivers

Navjot Kaur and Lavish Kansal

355-364

53. A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in

Wireless Sensor Networks

Haixia Zhao, Yaowei Li, Jincheng Shen, Mingchuan Zhang, Ruijuan Zheng and Qingtao Wu

365-372

54. A Superlinearly feasible SQP algorithm for Constrained Optimization

Zhijun Luo

373-379

55. Performance Analysis of ST,SF and STF IN MIMO-OFDM Technique

M.Vijaya Laxmi and S.Narayana Reddy

380-384

56. Deployment of Palm Recognition Approach using Image Processing Technique

Jugal Kishore Patel and Sanjay Kumar Dubey

385-390

57. A Linear Active Disturbance Rejection Control applied for DFIG based Wind Energy

Conversion System

Ali Boukhriss, Tamou Nasser and Ahmed Essadki

391-399

58. The Gray images of linear codes over the ring F3+vF3+v2F3

Yazhou Xiong, Shujie Yun, Jingyuan Xing and Xiaofang Xu

400-405

59. Multi-Objective Particle Swarm Optimization for Facility Location Problem in Wireless

Mesh Networks

Tarik Mountassir, Bouchaib Nassereddine, Abdelkrim Haqiq and Samir Bennani

406-413

60. Failure Detection and Recovery in Hierarchical Network Using FTN Approach

Bhagvan Krishna Gupta, Ankit Mundra and Nitin Rakesh

414-421

61. Handwritten Word Recognition Using MLP based Classifier: A Holistic Approach

Ankush Acharyya, Sandip Rakshit, Ram Sarkar, Subhadip Basu and Mita Nasipuri

422-427

62. Proposal to Enhance AntNet Routing Algorithm by Exploiting Association Rules as

Analysis Tool

Soukaena Hassan Hashem

428-437

63. Intelligent Online Education Transformation System

Rashmi Chahar, Anubhav Agarwal, Vipul Malhotra, Rahul Jain and Ashish Chandiok

438-444

64. A Taxonomy of Enterprise ArchitectureFramework for Indonesian SMEs

Ambar Yoganingrum, Dana Indra Sensuse and Aniati Murni

445-452

65. Design an electronic system for computer communication between hospital departments

(card desk)

Samaneh Haji Mohammad Bagher, Ali Amini, Javad Aryatabar and Hossein Akhavan

Zanjani

453-456

66. Vehicle logo classification using support vector machine Ensemble

Wesal Abdallah and Li Hong

458-462

67. OpenMP performance analysis for many-core platforms with non-uniform memory

access

Pablo González De Aledo Marugán, Javier González-Bayón, Pablo Sánchez and Juan Casal

(7)

68. Hybrid Framework for Robust Multimodal Face Recognition

Mostafa Mohamed Mohie El-Din, Mohamed Yousri El Nahas and Hassan Ahmed Hassan

Elshenbary

471-476

69. Recognition of leaf based on its tip and base using Centroid Contour Gradient

Mei Fern Bong, Ghazali Bin Sulong and Mohd Shafry Bin Mohd Rahim

477-482

70. Texture Based MRI Image Retrieval Using Curvelet With Statistical Similarity Matching

K.Rajakumar and S.Muttan

483-487

71. Improved Mobile WiMax Image Privacy Using Novel Encryption Techniques

Mohamed Abdel-Azim Mohamed, Fayez Wanis Zaki and Awny Mohsen El-Mohandes

488-495

72. Modeling Unstructured Document Using N-gram Consecutive and WordNet Dictionary

Abdul Halim Omar

496-504

73. General Approach for Energy Conservation in Wireless Sensor Networks

Alami Chaibrasou and Ahmed Mouhsen

505-508

74. A Visual and Interactive Learning Tool for CPU Scheduling Algorithms

Sukanya Suranauwarat

509-518

75. Secure and Effective P2P Reputation System using Trust Management and Self Certified

Cryptographic Exchanges

Srikanth Mavuri and K B Madhuri

519-525

76. Singularly perturbed Quasilinear Boundary Value Problems With Interior Shock Layer

Behavior

Ghoul Rafia and Ni Yu-Dong

526-530

77. Evaluation of Regional Benchmark Impact in EDM

(8)

Fuzzy Logic Method for Evaluation of Difficulty Level of

Exam and Student Graduation

Rusmiari1, Darma-Putra 2 and Arya-Sasmita3

1 Department of Information Technology, Udayana University Bali, 80119, Indonesia

2

Department of Information Technology, Udayana University Bali, 80119, Indonesia

3 Department of Information Technology, Udayana University

Bali, 80119, Indonesia

Abstract

Application of fuzzy logic in processing student evaluation, are expected to represent the mechanisms of human thought processes capable of resolving the problem of evaluation of students, which can be monitored by the teacher directly. With a system of evaluation of student test results by using fuzzy logic will be able to support the needs of teachers as well as those related to monitor student progress so that it can support the success of students. In the Fuzzy Logic method for each criterion are defined into 4 fuzzy set, low, medium, high and very high. item about the difficulty level, the level of difficulty of exams and graduation rates of students and participants ranked the Fuzzy Logic method is the output of the system. Fuzzy Logic will consider both the value of the criteria used, if the difficulty level is very difficult problems and low student scores in a fuzzy set criterion is high, then the student is graduating. This means more equitable Fuzzy Logic in reaching a decision and determine graduation.

Keywords: Fuzzy Logic, student evaluation, Inference engine.

1.

Introduction

Fuzzy logic has the advantage of modeling the qualitative aspects of human knowledge, and decision making as done by human beings by applying the rule base. Modern information management systems enable the recording and the management of data using sophisticated data models and a rich set of management tools [1]. Application of fuzzy logic in the processing of student test evaluation, expected to represent the mechanism of human thinking processes to solve problems of student exams. With a system of evaluation of students exam results by using fuzzy logic will be able to support the needs of teachers as well as those related tomonitor student progress so as to support its students success.

Fuzzy set theory was proposed in 1965 by Zadeh to help computers reason with uncertain and ambiguous information. Zadeh proposed fuzzy technology as a

means to model the uncertainty of natural language [1],[2]. He reasoned that many difficult problems can be expressed much more easily in terms of linguistic variables. Linguistic variables are words and attributes which are used to describe certain aspects of the real world. One important feature of linguistic variables is the notion of their utility as an expression of data compression. Zadeh describes this as compression granulation. He argues that this is important because it is more general than use of discrete values. This point means that an agent using linguistic variables may be able to deal with more continuous and robust descriptions of reality and problem spaces. Our approach is to design a fuzzy rule base system to control training process.

Fuzzy logic is powerful problem solving methodology with a myriad of applications in embedded control and information processing. Fuzzy provides a remarkably simple way to draw definite conclusions from vague, ambiguous or imprecise information. In a sense, fuzzy logic resembles human decision making with its ability to work from approximate data and find precise solutions.

Unlike classical logic which requires a deep understanding of a system, exact equations, and precise numeric values, fuzzy logic incorporates an alternative way of thinking, which allows modeling complex systems using a higher level of abstraction originating from our knowledge and experience. Fuzzy logic allows expressing this knowledge with subjective concepts such as very hot, bright red, and a long time which are mapped into exact numeric ranges [3].

Fuzzy logic has the advantage of modeling the qualitative aspects of human knowledge, as well as decisions made by humans by applying the rules of the rule base or bases. Application of fuzzy logic in processing student evaluation, are expected to represent the mechanisms of human thought processes

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 223

(9)

capable of resolving the problem of evaluation of students, which can be monitored by the teacher directly.

With a system of evaluation of student test results by using fuzzy logic will be able to support the needs of teachers as well as those related to monitor student progress so that it can support the success of students. Modern management information system allows in terms of recording and management of data using sophisticated data models and advanced management. In the context of the education system, the information usually includes details about the learning materials, tasks associated with student assignments, exams, and other notes. With the expert system is expected to reduce underarm accuracy of information and simplify the access to information systems, in terms of fuzzy modeling. Fuzzy rule-based system can be considered as a good reference for evaluating the test and quality assurance of an organization for students.

2.

Methodology

This system is designed for evaluating and teaching the students so that the resulting control system will reliably and safely achieve high performance operation. A block diagram of this research is shown in Fig.1. Basically in fuzzy control system, there are four major stages to accomplish the control process: [1],[4]

x Fuzzy input and output variables & their fuzzy value

x Fuzzy rule base

x Fuzzy inference engine

x Fuzzification and defuzzification modules

Input : Value of student exam

Fuzzy Logic method

Fuzzification

Output :

difficulty of exams and student Graduation

Rules Base

Implications Functions and Inferences Rule

Defuzzification

Fig. 1 General Overview System

2.1 Difficulty level exam

About the level of difficulty is an opportunity to answer correctly a question at a certain skill level, usually expressed in the form of an index. Difficulty level of the index is generally expressed as a proportion of the size range from 0.00 to 1.00. The greater the difficulty level of the index obtained from the calculation, then the easier about it. The formula to calculate the level of difficulty (TK) is as follows:

��=�

where:

TK = difficulty of item

p = number of examinees who answered the item correctly

n = number of examinees

Difficulty levels result using the above formula describes the level of difficulty about it. The difficulty level classification problem can be illustrated as follows:

Table 1: difficulty exam

great value Criteria

0,00 – 0,45 Difficult

0,46 – 0,75 Medium

0,76 – 1,00 Easy

(1)

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 224

(10)

Point about the difficulty level has two functions, namely usability for the educators and usability testing/teaching. Usefulness for educators include: the re-introduction of the concept of the learning, provide feedback to students about their learning, gain information about the curriculum emphasis, suspect items about the bias. While usability for process of testing and teaching, among others: introduction of the concepts needed to re taught, the signs the strengths and weaknesses of the school curriculum, and weave the test have data on accuracy [5].

2.2 Fuzzy Logic Method

This model comprises of four components fuzzy inference engine, fuzzy rules, fuzzifier, and a defuzzifier. The four steps processes are: [6]

Step 1 Fuzzification

Of the input parameters total dissipated energy and node centrality. Now to resolve the level to which the inputs are belonging to the appropriate fuzzy sets or rule the inputs are analyzed. This study used two phases are carried out to evaluate the exam average grade and evaluate students using the Fuzzy Logic.

a. Evaluating an online exam

We consider two fuzzy input variables as exam average grades (z1) and difficulty level of exam (y1) and the output will be the exam level (z1). Membership function of z1, y1 and z2 shold be as

follows (0 ≤ µ ≤ 1). [7]

1. Exam average grades (z1)

Written test assessment variable is divided into three parts: low, medium, high and very high.

Practice assessment

15 25 35 45

10 20 30 40 50 55 60 65 70 75

0

Low Medium High

80 85 90 95 100 Very High

Fig. 2 Fuzzy membership functions for exam average grade (z1)

Based on the picture looks fuzzy set membership degree one owned low value range of 0 to 40. Fuzzy Fuzzy region with the set being located in the range of 20 to 70. Fuzzy set Fuzzy regions with high lies in the range of 50 to 90. Fuzzy set Fuzzy regions with extremely high located in the range of 80 to 100. The formula of variable membership function on the exam average grade (z1) assessment as follows :

��(�) =

1 ; � 20 40−�

20 ; 20 � 40 0 ; � 40

��(�) =

0 ; � 20 ��� 70

�−20

20 ; 20 � 40 1; 40 � 50 70−�

20 ; 50 � 70

��(�) =

0 ; � 50 0�� 90

�−50

20 ; 50 � 70 1; 70 � 80 90−�

20 ; 80 � 90

���(�) =

0 ; � 80

�−80

10 ; 80 � 90 1 ; 90 � 100

2. Difficulty level of exam (y1)

Written test assessment variable is divided into three parts: low, medium, high and very high.

Practice assessment

15 25 35 45

10 20 30 40 50 55 60 65 70 75

0

Low Medium High

80 85 90 95 100 Very High

Fig. 3 Fuzzy membership functions for difficulty level of exam (y1)

The formula of variable membership function on the level of exam (y1) assessment as follows :

��(�) =

1 ; � 20 40−�

20 ; 20 � 40 0 ; � 40

��(�) =

0 ; � 20 ��� 70

�−20

20 ; 20 � 40 1; 40 � 50 70−�

20 ; 50 � 70

��(�) =

0 ; � 50 0�� 90

�−50

20 ; 50 � 70 1; 70 � 80 90−�

20 ; 80 � 90

���(�) =

0 ; � 80

�−80

10 ; 80 � 90 1 ; 90 � 100

(3) (4) (5) (2) (7) (8) (9) (6)

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 225

(11)

b. Evaluating students

We consider two fuzzy input variables as exam grade (x1) and difficulty level of exam (y1) and the output will be the student level (x2). Membership

function of x1, y1 and x2 should be as follows (0 ≤ μ≤ 

1).

1. Student grades (x1)

Written test assessment variable is divided into three parts: low, medium, high and very high.

Practice assessment

15 25 35 45

10 20 30 40 50 55 60 65 70 75

0

Low Medium High

80 85 90 95 100 Very High

Fig. 4 Fuzzy membership functions for student grade (x1)

The formula of variable membership function on the level of exam (y1) assessment as follows :

��(�) =

1 ; � 20 40−�

20 ; 20 � 40 0 ; � 40

��(�) =

0 ; � 20 ��� 70

�−20

20 ; 20 � 40 1; 40 � 50 70−�

20 ; 50 � 70

��(�) =

0 ; � 50 0�� 90

�−50

20 ; 50 � 70 1; 70 � 80 90−�

20 ; 80 � 90

���(�) =

0 ; � 80

�−80

10 ; 80 � 90 1 ; 90 � 100

2. Difficulty level of exam (y1)

Written test assessment variable is divided into three parts: low, medium, high and very high.

Practice assessment

15 25 35 45

10 20 30 40 50 55 60 65 70 75

0

Low Medium High

80 85 90 95 100 Very High

Fig. 5 Fuzzy membership functions for difficulty level of exam (y1)

The formula of variable membership function on the level of exam (y1) assessment as follows :

��(�) =

1 ; � 20 40−�

20 ; 20 � 40 0 ; � 40

��(�) =

0 ; � 20 ��� 70

�−20

20 ; 20 � 40 1; 40 � 50 70−�

20 ; 50 � 70

��(�) =

0 ; � 50 0�� 90

�−50

20 ; 50 � 70 1; 70 � 80 90−�

20 ; 80 � 90

���(�) =

0 ; � 80

�−80

10 ; 80 � 90 1 ; 90 � 100

Step 2 Rule evaluation

Rules are qualitative statements apply if later into the form, so clearly understood. Rules of the difficulty level of the exam consists 16 rules. Fuzzy rule base for evaluating level of difficulty of the exam is designed as follows :

R1: If (z1) Low and (y1) Low Then (z2) Difficult

R2: If (z1) Low and (y1) Moderate Then (z2)

Difficult

R3: If (z1) Low and (y1) High Then (z2) Moderate

R4: If (z1) Low and (y1) Very High Then (z2)

Moderate

R5: If (z1) Moderate and (y1) Low Then (z2)

Difficult

R6: If (z1) Moderate and (y1) Moderate Then (z2)

Moderate

R7: If (z1) Moderate and (y1) High Then (z2) Easy

R8: If (z1) Moderate and (y1) VeryHigh Then (z2)

Easy

R9: If (z1) High and (y1) Low Then (z2) Moderate

R10: If (z1) High and (y1) Moderate Then (z2)

Moderate (11) (12) (13) (10) (15) (16) (17) (14)

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 226

(12)

R11: If (z1) High and (y1) High Then (z2) Easy

R12: If (z1) High and (y1) VeryHigh Then (z2) Very Easy

R13: If (z1) Very High and (y1) Low Then (z2)

Moderate

R14: If (z1) VeryHigh and (y1) Moderate Then (z2)

Easy

R15: If (z1) VeryHigh and (y1) High Then (z2) Very Easy

R16: If (z1) VeryHigh and (y1) VeryHigh Then (z2)

Very Easy

Fuzzy rule base for evaluating student is designed as follows:

R1: If x1 is Low And y1 is low Then x2 is pass R2: If x1 is low And y1 is medium Then x2 is pass R3: If x1 is low And y1 is high Then x2 is fail R4: If x1 is low And y1 is very high Then x2 is fail R5: If x1 is medium And y1 is low Then x2 is good R6: If x1 is medium And y1 is medium Then x2 is good

R7: If x1 is medium And y1 is high Then x2 is pass R8: If x1 is medium And y1 is very high Then x2 is fail

R9: If x1 is high And y1 is low Then x2 is exellent R10: If x1 is high And y1 is medium Then x2 is good R11 If x1 is high And y1 is high Then x2 is pass R12: If x1 is high And y1 is very high Then x2 is pass R13: If x1 is very high And y1 is low Then x2 is exellent

R14: If x1 is very high And y1 is medium Then x2 is exellent

R15: If x1 is very high And y1 is high Then x2 is good

R16: If x1 is very high And y1 is very high Then x2 is pass

Step 3 Implications Functions and Inferences Rule

Implications Functions

Minimum method used to combine any degree of membership of each if then rules are made and

expressed in a degree of truth (α). Examples of the use 

of minimum to rule 6, rule 7, rule 10, rule 11 can be written as follows:

R6: If (z1) Moderate and (y1) Moderate Then (z2)

Moderate

� − ��������1=��1 ∩ ��1

= min(��1[62],��1[62])

= min 0.4 ; 0.4

= 0.4

R7: If (z1) Moderate and (y1) High Then (z2) Easy � − ��������2=��1 �∩ ��1�

= min(��1[62],��1[62])

= min 0.4 ; 0.6

= 0.4

R10: If (z1) High and (y1) Moderate Then (z2)

Moderate

� − ��������2=��1 �∩ ��1�

= min(��1[62],��1[62])

= min 0.6 ; 0.4

= 0.4

R11: If (z1) High and (y1) High Then (z2) Easy � − ��������2=��1 ∩ ��1

= min(��1[62],��1[62])

= min 0.6 ; 0.6

= 0.6

The Inference Rules

The method of determining the maximum graduation of FIS is used to evaluate the results of the rules that have been made. Solution output fuzzy set is obtained by taking the maximum value of the rule is appropriate, then use it to modify the area and applying it to the output fuzzy.

Step 4 Deffuzification

Defuzzification is a process of converting output fuzzy variable into a unique number. Defuzzification process has the capability to reduce a fuzzy set into a crisp single-valued quality or into a crisp set; to convert a fuzzy matrix into a crisp matrix; or to convert a fuzzy number into a crisp number. [8]

In the process of using the Weighted Average, the calculations can be seen below:

��=∑ �(�) ∗(� )

∑(�(�))

� : Output score

�� : Weighted Average

�(�) : Membership function of fuzzy output area

The example of deffuzification WA

= 0.25∗75 + 0.25∗50 + 0.25∗50 + 0.75∗50 0.25 + 0.25 + 0.25 + 0.75 = 54.1666 = 54.17

3.

Axperiments and Results

We can classify the test in accordance with our expert system for the 4 levels:. Easy, Medium, Hard and very

(18)

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 227

(13)

hard [7] Then we use math test scores as an example, so that the results are as follows in figure 6 [6]:

Fig. 6 Results for difficulty level of each item of the test

After getting the value of the degree of difficulty of the test the next step dalah find difficulty value test. The authors grouped into 4 levels: very easy, easy, moderate and hard. The difficulty level exam using two criteria: the value of difficulty of questions and average student grade.

Fig. 7 Results for difficulty level exam

Step 1: an average grade and value kesulutan exams. Step 2: an overall degree of membership values of the average student and the difficulty level of the exam grade.

Step 3: a rule or fuzzy criteria.

Step 4: is the value defuzzyfikasi and fuzzy decision. From Figure 7 we can see that the value of the defuzzyfikasi is 63.88 so the level of difficulty of the test was EASY.

Fig. 8 Results for level student

The first column contains the name of the student, the student points and the value of the degree of difficulty of the selected subjects. In column 2 value will be processed to produce value students' graduation and degree completion. We classify student in to 4 levels: fail, pass, good

and excellent. [11] So according to "Bahasa Indonesia" Course the students level are as shown in figure 9.

Fig. 9 Results for student evaluation

1. CONCLUSION

Fuzzy logic is very good when used in evaluating student test making it easier for teachers to assess students according to the level of difficulty of the test. It is also regarded as a good reference for teachers to evaluate the level of the exam is the benefit of this evaluation.

2. REFERENCES

[1] E. Abd-Alazeem, Mohammed, and I. Barakat, Sherief.” Fuzzy Expert System For Evaluation Of Students And Online Exams” International Journal of Computer Science & Information Security.Vol.8.No.8.November 2010.

[2] Zadeh,  L.  A.  “Fuzzy  sets.  Information  and  Control”,  Vol. 8, pp. 338-353. 1965.

[3] Henry Nasution, "Design methodology of fuzzy logic control", Journal Teknos-2k, Universitas Bung Hatta, Vol.2, No.2, December (2002).

[4] Takagi,T. and Sugeon, "Fuzzy identification of System and Its Applications to Modeling and Control", vol. 15, no. 1, 116-132, 1985.

[5] Ana Anitasari , Entin Martiana Kusumaningtyas, S.Kom, M.Kom, Arna Fariza2 S.Kom, M.Kom,”Analisa Kualitas Materi Soal Ujian Akhir Semester di SMP Terpadu Ponorogo”,  Journal  Pens,  Institut  Teknologi  Sepuluh Nopember. 2012

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 228

(14)

[6] Ashutosh Kumar Singh, Sandeep Goutele, S.Verma and N. Purohit.” An Energy Efficient Approach for Clustering in WSN using Fuzzy Logic” International Journal of Computer Applications.Vol.44.No.18.April 2012.

[7] Arriaga, F. de, Alami, M. El., & Arriaga, A,"Evaluation of Fuzzy Intelligent Learning Systems".Spain, November 2005.

[8] H.Bevrani, "Defuzzification", University of Kurdistan Department of Electrical & Computer Eng, Spring Semester, 2009.

[9]  Ishiburchi, H., Nozaki, K., and Tanaka, H. “Distributed  Representation of Fuzzy Rules and Its Application to Pattern Classification.  Fuzzy  Sets  and  Systems”,  Vol.  52,pp. 21-32. 1992.

[10] GAO Xinbo (1) XIE Weixin(2)," Advances in theory and applications of fuzzy clustering", Institute of Electronic Engineering, China, 2000.

[11] Nykänen, "Inducing Fuzzy Models for or Student Classification". Educational Technology &Society, vol 2, pp 223-234, 2006.

Ni Made Rusmiari studied Information Technology in

Department of Information Technology Udayana University since August 2008, and now working her research for S.Ti. degree in Information Technology.

Dr. I Ketut Gede Darma Putra, S.Kom., MT received his

S.Kom degree in Informatics Engineering from Institut Teknologi Sepuluh Nopember University, his MT. degree in Electrical Engineering from Gajah Mada University and his Dr. degree in Electrical Engineering from Gajah Mada University. He is lecturer at Electrical Engineering Department (major in Computer System and Informatics) of Udayana University, lecturer at Information Technology Department of Udayana University.

I Gusti Made Arya Sasmita, ST., MT received his ST degree

in Electrical Engineering from Udayana University in 1997 and his MT. degree in Electrical Engineering from Gajah Mada University in 2003. He is lecturer at Electrical Engineering Department (major in Computer System and Informatics) of Udayana University, lecturer at Information Technology Department of Udayana University.

IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784

www.IJCSI.org 229

Gambar

Fig. 1 General Overview System
Fig. 3 Fuzzy membership functions for difficulty level of exam (y1)
Fig. 5 Fuzzy membership functions for difficulty level of exam (y1)
Fig. 6 Results for difficulty level of each item of the test

Referensi

Dokumen terkait

Dokumen kualifikasi perusahaan asli yang diupload atau dokumen yang dilegalisir oleh pihak yang berwenang dan menyerahkan 1 (satu) rangkap rekaman (foto copy).

Dalam penjatuhan pidana, hakim tidak hanya menegakkan bunyi ketentuan-ketentuan dalam Undang-Undang saja, melainkan juga berdasarkan pertimbangan yuridis dan

[r]

[r]

Kiki Novi Saraswati, A 210080148 Program Studi Pendidikan Akuntansi, Fakultas Keguruan dan Ilmu Pendidikan, Universitas Muhammadiyah Surakarta, 2013. Tujuan penelitian ini

Berdasarkan angka kejadian asma eksaserbasi akut yang selalu meningkat dan terapi tambahan yang akhir-akhir ini sering dipakai terutama curcumin, maka penelitian ini

Oleh karena itu, penelitian ini mencoba melakukan modifikasi formulasi medium MS dengan penambahan zat pengatur tumbuh (ZPT) golongan auksin dan sitokinin serta beberapa

daya secara realistik, meminimalkan resiko, mewujudkan kesejahteraan bagi warganya dan masyarakat luas. Menjadi kepala sekolah yang berjiwa wirausaha berarti menjadi