APPLICATION OF DIGITAL CELLULAR RADIO FOR MOBILE LOCATION ESTIMATION IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 USING SIMILARITY DEGREES TO IMPROVE FUZZY MINING ASSOCIATION RULE BASED MODEL FOR ANALYZING IT ENTREPRENEURIAL TENDENCY ENDANG SUPRIYATI1*, MOHAMAD IQBAL2, TUTIK KHOTIMAH2 1Informatic Department, Universitas Muria Kudus, Central Java, Indonesia. 2Electrical Engineering Department, Universitas Muria Kudus, Central Java, Indonesia . *Corresponding author: endang.supriyati@umk.ac.id (Received: 27th February 2019; Accepted: 18th August 2019; Published on-line:2nd December 2019) ABSTRACT: Higher education has great potential in producing new startups in the IT (Information Technology) field. Many choices influence students to become IT- entrepreneurs. Association Rule can be used to obtain a model by analysing data so that it can be used to make a rule to the IT entrepreneurship-student model, but the association algorithm has disadvantages in handling large datasets. We propose reducing candidate itemsets using degrees of fuzzy similarity. The membership function in fuzzy sets can be used to measure the quality of rules obtained. The purpose of this study is to improve the algorithm by evaluating the similarity of candidate itemsets to get a good quality rule. This research method has 2 phases, namely (1) calculating the membership function with similarity itemset and (2) applying fuzzy mining association rule. Phase 1 has several steps, including: preparation of a transaction database, the taxonomy process, and identification of similar itemset. Phase 2 has several steps as well. The first is defining membership functions, and the last is a fuzzy mining fuzzy association rule. In this study, a questionnaire was distributed to 1225 students who were members of the IT entrepreneurship program. The results of this study were reduced into 823 itemsets and produced an IT entrepreneurship rule model. ABSTRAK: Pendidikan tinggi mempunyai potensi besar dalam menghasilkan permulaan baru dalam bidang IT. Banyak pilihan mempengaruhi pelajar bagi menjadi usahawan-IT. Kaedah Bersekutu boleh digunakan bagi mendapatkan model dengan menganalisa data supaya ianya dapat digunakan menjadi model kepada pelajar keusahawanan-IT, namun algoritma bersekutu mempunyai kelemahan dalam mengendalikan dataset yang besar. Kami mencadangkan pengurangan bilangan set item menggunakan tahapan persamaan kabur. Fungsi ahli dalam set kabur dapat digunakan bagi mengukur kualiti aturan yang diperoleh. Tujuan kajian ini adalah bagi meningkatkan algoritma dengan menilai persamaan set item calon bagi mendapatkan aturan kualiti yang baik. Kaedah penyelidikan ini mempunyai 2 peringkat, iaitu (1) mengira fungsi ahli dengan set item persamaan dan (2) menerapkan aturan perlombongan bersekutu kabur. Peringkat 1 mempunyai beberapa langkah, iaitu: urus niaga pangkalan data, proses taksonomi, identifikasi set item yang sama. Tahap 2 mempunyai beberapa langkah, iaitu: menentukan fungsi keahlian, dan akhirnya, aturan perlombongan bersekutu. Dalam kajian ini, soal selidik telah diedarkan kepada 1225 pelajar yang menjadi ahli program keusahawanan IT. Dapatan kajian menunjukkan pengurangan nombor dataset kepada 823 set item dan menghasilkan model aturan teknologi keusahawanan IT. KEYWORDS: fuzzy mining; association rule; similarity degrees; IT entrepreneurial 78 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 1. INTRODUCTION Data mining technology is widely used to analyse large amounts of data, including classification, clustering, and association. The association algorithm is a classic association algorithm and widely used. Classic association algorithms look for relationship patterns between one or more itemsets in the dataset. This algorithm is famous for finding high- frequency patterns. This frequent itemset pattern is used to compile associative rules [1]. Frequent itemsets play an important role in determining the pattern of associations. A frequent itemset is able to detect problems to determine patterns in the dataset [2]. The main key to the association algorithm is in the iteration stage in the database. Each iteration produces a frequency pattern to get the support value of each item. The association algorithm can reduce the number of candidates whose support must be calculated by removing unnecessary objects and attributes to get minimum attributes, and this algorithm has a better performance than the classic association algorithm [3]. Research on improvement of association algorithms has been carried out, all aimed at improving algorithm performance, i.e. to reduce the calculation time of candidate items by duplicating the frequent itemset to build the next candidate item [4]. Some paths are used to improve the association algorithm [5-8]: (1) Reduction of transactions, transactions that do not contain the itemset are often deleted from the itemset candidates, (2) hashing tables to calculate the occurrence of set items, (3) partitioning each itemset often must be in one partition. Fuzzy theory can be used to improve the association algorithm. The basic idea comes from dividing quantitative values into a crisp set that will weaken or overestimate the specified limit. Fuzzy sets can solve problems by allowing membership to be in different sets. Reference [9] applied the fuzzy association rule mining algorithm to find associated relationship information. Mining fuzzy rules may lead to the discovery of more general and important knowledge from the data [10-12]. The focus of this study is the reduction of data by measuring the similarity of items in the transaction. This measurement of similarity uses the average distance between items. Distance measurement for similarity is used for decision making based on certain criteria. Therefore the measure of similarity must be able to distinguish similarities from fuzzy sets so as not to overlap [13,14]. After the process of measuring similarity, is used to reduce the dataset. The contain members whose membership value is not less than value. The selection of will have an effect on the results. The selection of the appropriate is based on the previous experience of the decision maker and/or the case under study [15-17] Association algorithms are used to analyse data to obtain a model, but association algorithms have disadvantages in handling large datasets. We propose reducing candidate set items using degrees of fuzzy similarity. The focus of this study is the reduction of datasets by measuring the similarity of items based on distance in the dataset with Fuzzy similarity degrees. 2. METHOD There are 2 phases in this research, namely the phase of seeking membership functions, then the phase of the fuzzy mining association rule. The first phase consists of (1) transaction database, (2) taxonomy process, (3) identification of similarity items, the second phase consists of (4) defining membership functions (MFs), (5) Fuzzy mining and (5) fuzzy association rule. Figure 1 describes the research method. 79 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 Fig. 1: Research method. 2.1 Transaction Database In this process, the activities carried out include collecting and using historical data to find order, patterns, or relationships in the dataset. The dataset used in this study were 1225 itemsets. The dataset used for this research came from questionnaire survey data of students who took part in entrepreneurship programs at Muria Kudus University. Table 1: The dataset of participant ID Case T1 MD, AI, EB T2 MD, E T3 DG, EB, EL, EM --------------------------------------------------- --------------------------------------------------- --------------------------------------------------- T873 SE, D,WD,MD,DG,P,EB T874 AI,EB T875 WD,DG,P,EB In Table 1, the values T1, T2, T3, ..., T1225 are the IDs of students participating in the program, students are given a survey to choose the knowledge that will be used to pioneer into independent IT entrepreneurs. These choices are Mobile Development (MD), Software Engineering (SE), Database (D), Web Development (WD), Artificial Intelligence (AI), Robotics (R), Mechanics (M), Electric (E), e-marketing (EM), Graphics Design (DG), Photography (P), e-learning (EL), e-business (EB). 2.2 Taxonomy Process Relevant taxonomy items are usually predetermined and can be represented as tree hierarchies. Figure 2 is a picture of the IT entrepreneurship taxonomy. This taxonomy was built based on a combination of computer science taxonomy [18-21] and the concept of 80 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 entrepreneurship [22,23]. In this Taxonomy, engineering students can see the opportunity to use IT and engineering to be more innovative, be able to share knowledge, and utilize technology to develop their businesses. Fig. 2: Taxonomy of IT-Entrepreneurship. 2.3 Similarity Identification The Euclidean distance formula (1) is used to measure the distance between items. Euclidean Distance is the most common use of distance. Euclidean distance examines the root of square differences between coordinates of a pair objects. If ) and ) then the distance is given by: . (1) Finding distance between several points can be reached by the average formula (2). If distance and sample then the distance is given by (2) For example, to calculate the similarity item in Table 2, T1 is measured against cases MD, AI, and EB. The measurement of the distance of MD to AI, MD to EB, AI to the EB is carried out using the Euclidean formula. The third result of the distance is then calculated on average. 2.4 Fuzzy Membership Function Once the similarity between elements is known, the next step is to calculate the degree of fuzzy membership in similarity. A fuzzy set is a set containing elements that have varying degrees of membership in the set. Fuzziness is characterized by its membership function. The membership function is a curve that describes the mapping from input to membership level between 0 and 1. Through the membership function that has been compiled, the input values become fuzzy information that is useful later for fuzzy processing. The membership function , is the usual fuzzy set A defined as: (3) where [0,1] shows real value intervals from 0 to 1. While notations are the elements of fuzzy set A, notation is the value of the degree of membership in A. A is usually represented as follows: (4) The membership function used is a triangle curve and a linear curve. Membership in fuzzy sets has different curve shapes [24]. Fuzzy sets can also be defined by assigning a continuous function to describe the membership either analytically or graphically. Some commonly used membership functions are shown in Fig. 3. 81 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 Fig. 3: The membership function of distance similarity. The triangular membership function in Fig. 4 be expressed as: (5) In the linear curve, the fuzzy set consists of 2 states, namely linear up and linear down. For the linear down, the straight line starts from the value of the domain with the highest degree of membership on the left side, then moves down to the value of the domain that has a lower degree of membership with the membership function: (6) In linear rise, the increase in the set starts at the domain value that has zero membership degree [0] moves to the right towards the value of the domain that has a higher degree of membership with the membership function: (7) 2.5 Fuzzy Mining Mining is a technique for extracting process models from an execution log. Fuzzy mining can be applied to very large and unstructured logs. [24,25] In this stage, data on fuzzy distance similarity is collected. In Table 2, the similarity item represents near, middle, and far similarity. 2.6 Fuzzy Association Rule Fuzzy logic is used as data mining which involves calculations based on predictions and clustering. Fuzzy logic data mining algorithms are not only able to analyse data but also to develop accurate results that are easy to implement. Threshold value is a domain threshold value based on the membership value for each domain, where α-cut has 2 conditions: weak α-cut can be expressed as: , strong can be stated as: μ (x) <α. In this paper the Fuzzy Association Rule algorithm is: 82 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 1. The main candidates are generated based on similarity 2. Fuzzy operations are carried out to obtain fuzzy mining 3. Reduction of candidates with 4. Fuzzy rules are built using fuzzy support and confidence. Fuzzy set operations are used to combine and modify fuzzy sets. The value of membership as a result of the operation of two sets is often known as fire strength or . Several fuzzy operations [26] are used in this study to get associative linguistic rules, namely: (i) Intersection of two fuzzy sets A and B are denoted A∩B, the membership function is as follows: (8) (ii) Union two fuzzy sets A and B are denoted A B, the membership function is as follows: (9) Table 2: Fuzzy mining of itemsets ID Case Distance Similarity Near Middle Far T1 MD, AI, EB 6.30 0.00 0.90 0.10 T2 MD, E 2.24 1.00 0 0 T3 DG, EB, EL, EM 3.82 0.73 0.27 0 ----------------------------------------------------------------------------------------- --------------------------------------------------------------------------------- -------- --------------------------------------------------------------------------------------- -- T48 SE, D 2.45 1.00 0.00 0.00 T49 E, R, AI 2.49 1.00 0.00 0.00 T50 WD, MD, AI 4.41 0.53 0.47 0.00 The minimum criterion is used to find the intersection of these sets and take the minimum membership value. However, different decision agents may have different perceptions for the fuzzy operation. The min operation is used for near and middle similarity, and does not use far similar values which are of course not very similar. It is determined that α–cut is 0.3, hence only ID with a value of α –cut ≥ 0.3 in the near set will be processed into the Association algorithm. -cut determination decision, based on the author's decision. If the -cut is large or too small, the data entering the association algorithm becomes large or too small, and there is increased probability that the results do not represent optimal results. The near and middle sets are chosen because the level of proximity is stronger than the other. Table 3 contains the results of the intersection operation on the fuzzy set. 83 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 Table 3: Intersection fuzzy set ID Case Distance Similarity Near Middle Far Near ∩ Middle T1 MD, AI, EB 6.30 0.00 0.90 0.10 0.00 T2 MD, E 2.24 1.00 0.00 0.00 0.00 T3 DG, EB, EL, EM 3.82 0.73 0.27 0.00 0.27 ------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------- T48 SE, D 2.45 1.00 0.00 0.00 0.00 T49 E, R, AI 2.49 1.00 0.00 0.00 0.00 T50 WD, MD, AI 4.41 0.53 0.47 0.00 0.47 3. RESULTS 3.1 Processing Data The object of the study was 1225 engineering faculty students consisting of 560 women and 665 men, aged 19-22 years. Students are required to give a value between 1-9 on the questionnaire items used in entrepreneurship. Students are asked to write material that is mastered and provide an assessment of their interests, level of difficulty, and material needs on the market. Questionnaire results were then averaged. The students have participated in an entrepreneurship program held by the university for 1 year. The questionnaire results are averaged as shown in Table 4. Table 4: Results in the average value of questionnaire Attribute Difficulty Interest Market Mobile Develpoment (MD) 9 9 7 Sofware Engineering (SE) 7 9 8 Database (D) 5 8 9 Web Development (WD) 7 8 8 Artificial Inteligent (AI) 9 4 5 Robotic (R ) 9 4 5 Mechanic (M) 8 8 7 Electric ( E ) 8 7 7 e-marketing (EM) 3 9 9 Design Graphics (DG) 3 4 7 Photography (P) 2 4 5 e-learning (EL) 4 6 6 e-business (EB) 4 9 9 3.2 Similarities by Calculating Distance In this step, each data is calculated by the Euclidean distance formula. Table 5 describes the results of calculating the similarity of distance between data. 84 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 Table 5: Results of calculation of the similarity of distance between data ID Case Distance Similarity T1 MD, AI, EB 6.30 T2 MD, E 2.24 T5 MD - T8 MD, EM 6.00 T10 AI, EB 8.12 T12 SE, D, WD, EB 2.26 T13 SE, D, WD, MD, DG, EM, P, EB 1.87 T16 DG, AI, EB 8.60 T18 MD, P 7.40 T25 SE, WD, AI, EB 8.40 T26 R, AI, M, E 2.94 T31 DG, P 2.24 3.3 Degree of Membership From the calculation of distance similarity, the value of membership is sought with fuzzy theory. Distance variables are divided into three sets, namely near, middle, and far. Table 6 is the result of calculating fuzzy values, representing the itemset similarity. Table 6: Results of calculation of fuzzy values ID Case Distance Similarity Near Middle Far T1 MD, AI, EB 6.30 0.00 0.90 0.10 T2 MD, E 2.24 1.00 0 0.00 T3 DG, EB, EL, EM 3.82 0.73 0.27 0.00 T4 MD, EM, EB 4.13 0.62 0.38 0.00 T5 MD - 0.00 0 0.00 T6 SE, D, WD, AI, P 4.51 0.50 0.50 0.00 T7 WD, MD, DG, P, EB 5.83 0.06 0.94 0.00 T8 MD, EM 6.00 0.00 1.00 0.00 T9 SE, D, WD, MD, DG, P, EB 5.21 0.26 0.74 0.00 T10 AI, EB 8.12 0.00 0.29 0.71 T11 AI, E 3.74 0.75 0.25 0.00 T12 SE, D, WD, EB 2.26 1.00 0.00 0.00 3.4 Fuzzy Mining Process After the process of calculating the degree of membership from the distance of similarity. the next process performs an intersection operation such as step 2.6. Distance is represented in terms of near, middle and far. In this case the intersection operation is near and middle. Far term is not used, because the distance between items is far apart. Table 7 is 85 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 the result of fuzzy operations on Fuzzy Mining. Fuzzy intersection operations are used to find the minimum value between itemset membership degrees. Table 7: The result of fuzzy operations on Fuzzy Mining ID Case Distance Similarity Near Middle Far Near ∩ Middle T1 MD, AI, EB 6.30 0.00 0.90 0.10 0.00 T2 MD, E 2.24 1.00 0 0.00 0.00 T3 DG, EB, EL, EM 3.82 0.73 0.27 0.00 0.27 T4 MD, EM, EB 4.13 0.62 0.38 0.00 0.38 T5 MD - 0.00 0 0.00 0.00 T6 SE, D, WD, AI, P 4.51 0.50 0.50 0.00 0.50 T7 WD, MD, DG, P, EB 5.83 0.06 0.94 0.00 0.06 T8 MD, EM 6.00 0.00 1.00 0.00 0.00 T9 SE, D, WD, MD, DG, P, EB 5.21 0.26 0.74 0.00 0.26 T10 AI, EB 8.12 0.00 0.29 0.71 0.00 T11 AI, E 3.74 0.75 0.25 0.00 0.25 T12 SE, D, WD, EB 2.26 1.00 0.00 0.00 0.00 3.5 Fuzzy Association Rule Before running this algorithm, the minimum support parameter or the percentage of occurrence of a rule must be set first. Minimum confidence or percentage of occurrence of rules for the appearance of the antecedent must also be set. The value depends on the researcher. Rules are presented in antecedent consequent. 3.5.1 First Implementation In the first experiment, all of the 1225 itemsets were used, after several tests, the values of support = 0.5 and min confidence = 0.4 were obtained. The rules discovered where : Fig. 4: Results of the fuzzy mining association rule algorithm. In Fig. 4, three rules have an antecedent Software Engineering and consequent Robotic. They are associations (think correlation) not necessarily causally related, so be very careful about interpreting association rules. 86 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 3.5.2 Second Implementation This experiment determined a strong alpha α-cut ≥0.3, after several test, the value of min support was 0.6 and min confidence = 0.5. From the initial 1225 itemsets, it was reduced to 823 itemsets with an α-cut. In this study, we focused on reducing the number of items included in the a priori algorithm using α-cut. The rules discovered were: Fig. 5: Results of the fuzzy mining association rule algorithm. In Fig. 5 that algorithm presented 5 rules learned from the dataset. The number associated with the antecedent is absolute coverage in the dataset (in this case a number out of a possible total of 823). The number next to consequent is the absolute number of instance that matches the antecedent and the consequent. In this case, no rule has confidence (number of antecedent divided by number matching consequent) less than 0.96. 4. CONCLUSION Knowledge extraction in databases is a way of extracting knowledge in the form of rules. This rule expresses association relationships between various data, certain data items associated with other data items. In this study Euclidean distance is used to measure the proximity or similarity itemset. Fuzzy membership functions are used to obtain fuzzy mining. Fuzzy logic operation was performed to reduce the size of the dataset, with α-cut. The results of this study are the reduction of the number of dataset from 1225 itemsets to 823 itemsets and to produce an IT entrepreneurship rule model. ACKNOWLEDGEMENT This research received funding from Ministry of Research, Technology and Higher Education of the Republic of Indonesia, through Entrepreneurship Development Program in 2018. REFERENCES [1] Lin, X. (2014) Mr-apriori: Association rules algorithm based on mapreduce. In Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on., pp. 141-144. [2] Kumar KS, Chezian RM. (2012) A survey on association rule mining using apriori algorithm. International Journal of Computer Applications (IJCA), pp. 47-50. 87 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 [3] Patel B, Chaudhari VK, Karan RK, Rana YK. (2011) Optimization of association rule mining apriori algorithm using ACO. International Journal of Soft Computing and Engineering, Vol.1, No.1. pp 24-26. [4] Al-Maolegi M, Arkok B. (2014) An improved apriori algorithm for association rules. International Journal on Natural Language Computing (IJNLC) Vol.3, No.1. pp 21-29. [5] Kaur J, Madan N. (2015) Association rule mining: A survey. International Journal of Hybrid Information Technology, Vol.8, No.7. pp 239-242. [6] Kumar CP, Anjaiah P, Patil S, Lingappa E, Rakesh M. (2017) Mining Association Rules from No-SQL data bases using Map-Reduce Fuzzy Association Rule Mining Algorithm. International Journal of Applied Engineering Research, Vol.12, No.2. pp. 10472-10476. [7] Yuan, X. (2017). An improved Apriori algorithm for mining association rules. In AIP Conference Proceedings, pp 1-6. [8] Helm BL, Hahsler PDDM. (2007) Fuzzy Association Rules. Vienna University of Economics and Business Administration. [9] Verma SK, Thakur RS. (2017) Fuzzy Association Rule Mining based Model to Predict Students' Performance. International Journal of Electrical & Computer Engineering. Vol.3, No.4. pp.2223-2231 [10] Moustafa A, Abuelnasr B, Abougabal MS. (2015) Efficient mining fuzzy association rules from ubiquitous data streams. Alexandria Engineering Journal, 54(2): 163-174. [11] Imran A, Vladimir K, Viktor L, Olga M. (2017) Fuzzy methods and algorithms in data mining and formation of digital plan-schemes in earth remote sensing. Procedia computer science, 120:120-125. [12] Johanyak ZC, Kovács S. (2005) Distance based similarity measures of fuzzy sets. Proceedings of SAMI,pp 1-12 [13] Liao H, Xu Z, Zeng XJ. (2014) Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making. Information Sciences, 271: 125-142. [14] Liu HW. (2005) New similarity measures between intuitionistic fuzzy sets and between elements. Mathematical and Computer Modelling, 42(1-2): 61-70. [15] Wong KW, Gedeon T, Tikk D. (2000) An improved multidimensional alpha-cut based fuzzy interpolation technique, International Conference on Artificial in Science and Technology, pp 1-6. [16] Mendel JM. (2017) Type-2 fuzzy sets. In Uncertain Rule-Based Fuzzy Systems. Springer, pp. 259-306. [17] Wrapper H, Meijer H. (1997) A taxonomy for computer science. Technical Report CSI- R9713 [18] Sujatha R, Bandaru R, Rao R (2011) Taxonomy construction techniques –issues and challenges. Indian Journal of Computer Science and Engineering,Vol.2, No.5. pp 661-671. [19] Ibrahim A. (2004) Fuzzy logic for embedded systems applications. Elsevier Science. [20] Salatino AA, Thanapalasingam T, Mannocci A, Osborne F, Motta E. (2018) The computer science ontology: a large-scale taxonomy of research areas. In International Semantic Web Conference, Springer, pp. 187-205. [21] Masapanta-Carrión S, Velázquez-Iturbide J Á. (2018) A Systematic Review of the Use of Bloom's Taxonomy in Computer Science Education. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education, pp. 441-446. [22] Dimapilis H. (2013) Are we ready for Technopreneurhip? A Study on selected local Entrepreneur within the city. Research Congress, De La Salle, Universty Manila, pp:1-7. [23] Amante AD, Ronquillo TA. (2017) Technopreneurship as an outcomes-based education tool applied in some engineering and computing science programme. Australasian Journal of Engineering Education, 22(1): 32-38 [24] Hong TP, Lee YC, Wu MT. (2014) An Effective Parallel Approach for Genetic-Fuzzy Data Mining. Expert Systems with Applications, 41(2): 655-662. [25] Michael H. (2005) Applied Fuzzy Aritmatic An Introdution With Engineering Applications. Springer. 88 IIUM Engineering Journal, Vol. 20, No. 2, 2019 Supriyati et al. https://doi.org/10.31436/iiumej.v20i2.1096 [26] Cho M, Song M, Yoo S. (2014) A Systematic Methodology for Outpatient Process Analysis Based on Process Mining. In Asia-Pacific Conference on Business Process Management, Springer, pp. 31-42. 89 << /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles false /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (None) /CalCMYKProfile (None) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.7 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize false /OPM 0 /ParseDSCComments false /ParseDSCCommentsForDocInfo false /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo false /PreserveFlatness true /PreserveHalftoneInfo true /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts false /TransferFunctionInfo /Remove /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 200 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages false /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 200 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 400 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description << /ARA /BGR /CHS /CHT /CZE /DAN /DEU /ESP /ETI /FRA /GRE /HEB /HRV /HUN /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 6.0 e versioni successive.) /JPN /KOR /LTH /LVI /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 6.0 en hoger.) /NOR /POL /PTB /RUM /RUS /SKY /SLV /SUO /SVE /TUR /UKR /ENU (Use these settings to create Adobe PDF documents suitable for reliable viewing and printing of business documents. Created PDF documents can be opened with Acrobat and Adobe Reader 6.0 and later.) >> >> setdistillerparams << /HWResolution [600 600] /PageSize [595.440 841.680] >> setpagedevice