|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2016 | Vol. 88 No.2 |
Title: |
INTEGRATING HEALTH BEHAVIOURAL CHANGE THEORIES IN THE DESIGN OF PREDIABETES
SELF-CARE APPLICATIONS: A SYSTEMATIC LITERATURE REVIEW |
Author: |
SUTHASHINI SUBRAMANIAM, JASPALJEET SINGH DHILLON, MOHD. SHARIFUDDIN AHMAD,
CAMERON TEOH, LEONG JOYCE WS |
Abstract: |
Type 2 diabetes is a lifelong metabolic disorder caused by high levels of
glucose in the blood which can result in serious health conditions such as neuro-,
nephro-, retino- and cardio-pathy. Enormous on-going research efforts and
interventions are focussed on diabetes management but less on prediabetes which
is associated with the prevention of or progression to Type 2 diabetes. Health
behavioural change theories are important contributors to the effectiveness of
interventions. However, they are rarely integrated systematically in the design
of self-care applications for empowerment. In this paper, a Systematic
Literature Review (SLR) is presented to evaluate the effectiveness of existing
health behavioural change theories in managing prediabetes and to determine the
effectiveness of self-care applications that incorporates these theories in
their design. A total of four hundred and thirty-six papers were found in this
regard. After careful study and the removal of duplicate papers and studies
exclusion, 14 papers which met the inclusion criteria were selected for the
review. On the whole, the review shows favorable impact of the integration of
health behavioural change theories on prediabetics to better manage their
prediabetes in changing behaviours, reducing blood glucose level, promoting
healthier lifestyle habits, better body weight management and adoption of
self-care behaviours. The commonly used theories were then identified to be
incorporated into novel web and mobile self-care applications. This review will
help application developers to integrate health behavioural change theories in
designing impactful prediabetes self-care interventions. The results of this SLR
show two clear gaps in this research field: 1) a lack of studies focussing on
the integration of health behavioural change theories in prediabetes management
and 2) a lack of studies contributing to the design of self-care applications
for prediabetes. On a broader perspective, the review reveals that prediabetes
self-care applications designed using health behavioural change theories have
great potential in enabling prediabetics to take control of their health in
preventing Type 2 diabetes. |
Keywords: |
Prediabetes, Health Behavioural Change Theories, Effectiveness, Self-care
Applications, Self-care, Diabetes Prevention |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
INFORMATION SECURITY CULTURE IN HEALTHCARE INFORMATICS: A PRELIMINARY
INVESTIGATION |
Author: |
NOOR HAFIZAH HASSAN, ZURAINI ISMAIL |
Abstract: |
Information security culture becomes an enabler towards an effective security
practice. Human factors are recognised as one of the factors in addressing the
issue of information security in healthcare informatics. Inculcating information
security culture among healthcare practitioners is identified to be one of the
solutions for a better security practice. Thus, identifying the issues and
factors that influence information security culture are important. A preliminary
investigation involving six healthcare professionals and academics have been
carried out for better understanding on the critical factors that may influence
the information security culture. In-depth interview method is chosen in this
study. Thematic coding was conducted to characterise the themes and asses the
factor that found to be influential. Results from the in-depth interviews with
healthcare expertise showed that four main themes may influence the degree to
which information security may be cultivated. Security behaviour, security
value, security awareness, and enforcement of security policy are the themes
addressed by the key informants as the influential factors inculcating
information security culture. This study also found that various level of
healthcare professional exhibited different outcomes in information security
culture. Findings from this study may provide guidance to the healthcare
organisation to ensure their employee inculcate information security culture in
holistic manner. |
Keywords: |
Information Security Culture, Healthcare Informatics, Organizational Culture,
Information Security, Healthcare |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
COMPARATIVE STUDY OF SEARCH ENGINES IN CONTEXT OF FEATURES AND SEMANTICS |
Author: |
SANJIB KUMAR SAHU , D.P.MAHAPATRA , R.C.BALABANTARAY |
Abstract: |
Web surfing for various purposes has become a habit of humans. Fact states that,
after email, surfing/searching is the most popular act now days. Information
quality linked through these searches is quite irregular. There are fair chances
that these retrieved results can be irreverent and belongs to an unreliable
source. Widely used search engines like Google, Yahoo, Bing and Ask are the most
famous ones. Even though their job is the same i.e. to act as search engines and
have Features related to searching, but the ways of execution is different.
Semantic based search engines work on the semantics of the query. The WWW (World
Wide Web) is the live proof of all the changes it has gone through within its
short span of time, it has seen that search engines in past were recognized were
either keyword based or dependent on traditional database. Researchers have been
already working on various algorithms to provide better results. This paper
concludes that semantic based search engines have more advantages over keyword
based search engines in terms of accuracy of getting result. This paper also
compares the retrieval effectiveness in terms of accuracy in searching of
Google, Bing, Yahoo and Ask search engines for evaluating effectiveness of all
four search engines. This paper contains survey work, which discusses a
comparative study of different types of search engines in context of semantic
web surfing. The present study compares the entire four search Engines mentioned
above with respect to some recent queries and their results to show that how the
search engines are evolving day by day. |
Keywords: |
Information Retrieval (IR), Search Engine, Precision, Search Engine Evaluation,
Semantic Network. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
IT GOVERNANCE FROM PRACTITIONERS’ PERSPECTIVE: SHARING THE EXPERIENCE OF A
MALAYSIAN UNIVERSITY |
Author: |
BINYAMIN. A. AJAYI AND HUSNAYATI HUSSIN |
Abstract: |
The pervasive use of technology has led to organisations becoming more dependent
on IT, hence the need for IT governance (ITG). ITG is viewed as IT behaviour
deliberately designed and adopted by enterprises to enable them to achieve
continuous organisation performance. Studies on how organisations achieve
performance from ITG are relatively evolving. Thus frameworks on how
universities govern their IT, if they exist, are scarce. This study attempts to
explore how HEIs in Malaysia govern their IT to achieve performance based on
empirical investigation of practitioners of a public university. Semi-structured
interviews were conducted on three key university informants, namely, the Chief
Information Officer; the IT Director and a management user, a Dean of functional
unit. Interview's data were transcribed and thematic process of coding and theme
generation was applied for analysis purposes. Based on this qualitative
approach. The themes so generated were categorised under three capabilities of
structure, process, and relations. Viewed from absorptive capacity of
organisational learning theory, the findings show that when structures and
processes are in place, the relationship between the IT and functional unit side
of an organisation reflects the desired behaviour. The essence of such
relationship is to attain effective IT governance, which will eventually lead to
better organisation’s performance. |
Keywords: |
IT Governance, ITG and university, Absorptive Capacity, ITG in Malaysia |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
PROTOTYPE DESIGN USING INTERNET OF THINGS FOR MOTION DETECTION IN SECURITY ROOMS |
Author: |
J.L.DIVYA SHIVANI, RANJAN K.SENAPATI |
Abstract: |
Surveillancetechnique provides the capability of collecting exact and meaningful
data and choosing appropriate decisions to optimize safety and security. In
present surveillance technique, videos or images from any portable cameras or
CCTV cameras are sent to a control centre, where actually all these huge amount
of data is saved in database servers. Operators have to maintain and monitor
these images or videos [1]. Mobile image surveillance represents a new paradigm
that encompasses video acquisition on one side, and on the other side,
especially at the same time image viewing and addresses both computer-based and
mobile-based surveillance. [3] It is based on JPEG 2000 still image compression
format. It is attractive because it supports flexible and progressive access to
each individual image of the pre-stored content. It supports still image
creation on the basis of motion detection technique which enables efficient
utilization of resources.[3]It provides the software motion which enables the
Pi’s camera to detect motion and save the image as well as view live streaming
from the camera. A python script, then directs the Pi to send email
notifications every time when motion is detected. With these components, we
designed a cost effective and efficient security camera system. The paper is
concluded with concise summary and the future of surveillance systems for public
safety. |
Keywords: |
Raspberry Pi B+, Motion Detecting, Email, Notifications, Gsm, Python. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
PARTIAL GRAPH HEURISTIC WITH HILL CLIMBING FOR EXAMINATION TIMETABLING PROBLEM |
Author: |
ASHIS KUMAR MANDAL, M N M KAHAR |
Abstract: |
Generating an examination timetable for an institution is a challenging and
time-consuming task due to its inherent complexity and lots of constraints
associated with scheduling the exams. In fact, it is a combinatorial
optimization problem that requires heuristic searches to converge the solution
into an optimized area. This paper presents combining the partial graph
heuristic with hill climbing search (PGH-HC) to solve the examination
timetabling problem. The approach first orders the exams using graph heuristics,
and partially selected exams, which are generated based on predefined constant
called exam assignment value (EAV), are assigned to timeslots and / or rooms.
Next, the hill climbing search is employed to improve the partially scheduled
exams. The above process continues until all exams have been scheduled. The
overall aim here is to devise a straightforward approach which employs tuning of
fewer parameters in solving the exam timetabling problem. Two benchmark
examination timetabling datasets, Toronto un-capacitated datasets and ITC2007
capacitated datasets are considered for measuring the efficiency of the proposed
method. We analyse the PGH-HC with different EAV, graph heuristics and
termination criteria on these benchmark datasets. Experimental results reveal
that, in general, PGH-HC with relatively a smaller EAV and a higher number of
iterations (i.e. longer termination durations) is found to produce better
quality solutions for all problem instances. Besides, the proposed approach is
able to generate better quality solutions for all problem instances compared to
traditional graph heuristic with hill climbing search (TGH-HC) and produce
competitive results while comparing with the state-of-the-art approaches. |
Keywords: |
Combinatorial optimization problem, graph heuristics, hill climbing, scheduling,
Timetabling |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
ROBUST STABILITY OF SPACECRAFT TRAFFIC CONTROL SYSTEM USING LYAPUNOV FUNCTIONS |
Author: |
BEISENBI MAMYRBEK, SHUKIROVA ALIYA, USKENBAYEVA GULZHAN, YERMEKBAYEVA JANAR |
Abstract: |
A new approach to the construction of Lyapunov functions as vector functions is
developed based on a geometrical interpretation of the second method of Lyapunov.
The negative of the gradient is determined from the components of the time
derivative of the state vector (i.e., the right-hand side of the state
equation). The region of stability of a closed-loop linear, stationary system
with uncertain parameters is governed by inequalities in the matrix elements of
the closed-loop system. |
Keywords: |
Control systems, Robust stability, Spacecraft, Traffic control, Lyapunov’s
direct method, Modelling. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
PAGING VS. SCROLLING: NAVIGATION STYLES FOR SELF-TRIAGE OF EPIDEMIC DISEASES |
Author: |
NATRAH ABDULLAH, MUTHUKKARUPPAN ANNAMALAI, MUHAMMAD KHAIRUL AMRY ABD RANI |
Abstract: |
The use of mobile devices is intriguing a study about paging presentation for an
application of self-triage of epidemic diseases. It is important in order to
develop a mobile application without sacrificing user experiences on the
application. Thus, an experiment is conducted in order to identify navigation
style that mostly prefer for self-triage mobile application. All participants
completed similar tasks using the prototype that has been developed. They are
required to complete four consecutive sessions where each of the sessions used
different types of questions with two navigation styles, paging and scrolling.
There are three types of questions used in this prototype, which were identified
from the analysis of self-triage guidelines of epidemic diseases for signs and
symptoms. The result of this study concluded that majority of the participants
preferred paging instead of scrolling. Besides, the results also shows more than
half of the total participants preferred paging instead of scrolling for
questions Type I, II and combination of Type I, II and III questions while
majority of them preferred scrolling style for question Type III. However, the
finding on task completion time shows that participants spent more time on
paging for questions Type I and II while scrolling for questions Type III and
combination. In conclusion, for self-triage mobile application, both paging and
scrolling could be applied depending on the types of questions which have been
identified from the existing guidelines for epidemic diseases. The limitation of
this study is the number of participants was quite small, where involved only 30
peoples. Besides, sampling method used is not a proper sampling method for
experiment, which is convenient sampling. Other than that, the developed
prototype only implements the basic user interface design features. Lastly, the
results obtained from this study could not reflect the whole population. |
Keywords: |
Navigation Styles, Self-Triage, Experimental Study, Epidemic Diseases, Mobile
Application |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
SECURITY, PRIVACY, ACCESSIBILITY AND AVAILABILITY ISSUES ADDRESSED WHEN
DEVELOPING WEBSTIES IN THE GCC |
Author: |
DIMITRIOS XANTHIDIS, GEORGE VIOLETTAS |
Abstract: |
This study on the evaluation of the Web sites of companies in the GCC (Gulf
Council Countries) and attempts to answer the question of whether security and
privacy but, also, accessibility and availability issues are addressed by the
developers locally. A total number of 129 web sites from companies in Bahrain,
Kuwait, Saudi Arabia, Qatar and United Arab Emirates were evaluated based on the
WSEI (Web Site Evaluation Index) were applied during the evaluation. The results
of the evaluation are not encouraging at all showing that security and privacy
issues are not a priority when developing the web sites and accessibility and
availability are not among their serious concern either. |
Keywords: |
Websites, Evaluation, Security, Privacy, Accessibility, Availability, GCC |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
DESINING BIMATRIX GAME THOERY BASED NASH EQUILIBRIUM FOR INFORMATION SECURITY
BASED ON RISK ANALYSIS IN CLOUD |
Author: |
V.VISWANATHAN, Dr.S.P.SHANTHARAJAH, Dr.P.NAVANEETHAM |
Abstract: |
With the mushroom growth of Cloud Service Providers (CSPs) offering services of
similar functionality, makes a challenge for cloud users to choose an
appropriate service provider from cloud marketplace. This unique paradigm brings
about new risk related issues in Cloud Computing (CC) environment. This is
because it is indispensable from a customer’s aspect to establish trust with a
CSP with high risk of outsourced data to be misused. Though trustworthiness and
competence to estimate risk of interaction and risk for customer’s privacy were
addressed in many research works, the way through which the risk of outsourced
data/ file can be minimized in the presence of malicious service providers pose
challenging issues. The challenging issue of handling risk in cloud environment
is addressed in this work through Risk Evaluation using Nash Equilibrium-based
Bi-Matrix Decision (RE-NEBMD) model. RE-NEBMD model studies the problem of
ensuring security where the possible risk of outsourced data is brought to an
absolute minimum in Cloud Computing in the presence of malicious CSPs. Nash
Equilibrium-based Trust Evaluation model performs trust evaluation model on CSPs
for outsourced data based on strategy and utility function. Next, risk
evaluation is measured using Bi-Matrix Decision model on the evaluated trust and
risk is measured accordingly. Extensive analytical and experimental results are
presented which show minimized cost during risk analysis, computation overhead
and improving true positive rate or detected threats of our proposed model. |
Keywords: |
Cloud Service Providers, Cloud Computing, Nash Equilibrium, Bi-Matrix, Decision
Model. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
POWER CONSUMPTION OPTIMIZATION ANALYSIS BASED ON BERKELEY-MAC PROTOCOL USING
TAGUCHI AND ANOVA METHODS FOR WSN |
Author: |
ALAA KAMAL, M.N. MOHD. WARIP, MOHAMED ELSHAIKH, R.BADLISHAH |
Abstract: |
Wireless sensor network (WSN) consists of sensor nodes is used to gather
information about a physical object or process. On WSN, the sensor nodes deploy
in a large region with the harsh environment and limited capacity power. Due to
the adhered reason, the energy consumption it is a main critical factor
affecting the operational lifetime of individual nodes and the entire network.
The energy consumption in medium access control (MAC) for wireless sensor
network (WSN) affected by many reasons collision, overhearing, Idle Listening,
Control Overhead. The optimizing power consumption is a challenge to prolong
lifetime network. In the literature, there are many efforts paid to design and
improve the protocols for MAC layer to conserve power consumption. However, few
efforts are paid for optimizing the existing protocols. This paper focus in
Berkeley – MAC protocol optimizing power consumption and network performance by
Taguchi method. Taguchi method is a statistical method to optimize the process
and improve the quality. Moreover, Taguchi methods used to optimize the energy
consumption for B-MAC. Simulation experiments are carried out on the discrete
event simulator OMNET++ for the purposes of this research paper. The obtained
results show the effect of the B-MAC parameters protocols toward the energy
consumption. |
Keywords: |
Berkeley MAC Protocol, Optimization, Power Consumption, Taguchi Method, WSN |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
A BRIEF ON BIG DATA: LESSONS FROM 10 YEARS OF EXPERIENCE |
Author: |
DIMITRIOS XANTHIDIS, PAVLOS NIKOLAIDIS, OURANIA KOUTZAMPASOPOULOU |
Abstract: |
In this review study, one of the most important technological trend, i.e. big
data, is explained together with some of the main terminology relative to the
field emerging from it. Some of the challenges and opportunities that it brings
along are described and a list of new research sub-fields is also suggested as
well as recommendations for the universities to embrace the new technologies and
incorporate them in their curriculum in an effort to properly train the experts
of the new big data era. |
Keywords: |
Big Data, 6 Vs, Sources of Data, Data needs, Challenges, Opportunities, New
fields in IT |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
ACTION BASED FEATURES OF HUMAN ACTIVITY RECOGNITION SYSTEM |
Author: |
AHMED KAWTHER HUSSEIN, PUTEH SAAD, RUZELITA NGADIRAN, YAZAN ALJEROUDI, MUHAMMAD
SAMER SALLAM |
Abstract: |
Human actions are uncountable and diverse in nature; each action has its own
characteristics and nature. Moreover, actions are sometimes different and
sometimes very similar. Thus, it is rather challenging to implement a system
that is capable of recognizing all human actions. However, the problem of
recognition can be made simpler if the system of recognition is built gradually.
Firstly, a set of required actions must be selected and then each action must be
studied and analyzed to determine the most distinctive features that remain
similar if different subjects perform the same action. The concept of
action-based features is proposed and validated in this article. The system
still has the ability to be extended to recognize more actions, simply by
including contextual features of any added action. Experimental results have
shown an outperforming performance with 100% accuracy based on the evaluation of
UTKinect Action Data Set. |
Keywords: |
Pattern recognition, Feature extraction, Elm, Neural network |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
RAPID IDENTIFICATION OF OUTSTANDING REAL ESTATE INVESTMENT TRUSTS WITH OUTLIER
DETECTION ALGORITHMS |
Author: |
KENG-HOONG NG, KOK-CHIN KHOR |
Abstract: |
Finding outstanding stocks is always the primary goal of an investor. This is
because outstanding stocks tend to outperform others in investment return.
However, uncover this type of stocks from a stock pool requires extensive
financial knowledge and consistent efforts in analyzing the abundant amount of
financial data. Thus, it is impractical for an amateur investor. The objective
of this study is to rapidly identify outstanding stocks from the Real Estate
Investment Trust (REIT) sector. We adopted two outlier detection algorithms,
i.e. Interquartile Range (IQR) and Local Outlier Factor (LOF) to trace REIT
stocks that were deviated from the average performers. Subsequently, the
outstanding REIT stocks can be identified from the small amount of outliers. The
entire process is speedy and can be done on the fly. The identified outstanding
stocks were assessed based on their 1-year average total return as compared with
the non-outlier stocks. The preliminary result showed that their average total
return is better than its non-outlier peers. |
Keywords: |
Outlier Stocks, Local Outlier Factor, Interquartile Range, Real Estate
Investment Trusts, Financial Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
MATHEMATICAL MODELING OF VERTICAL MOVEMENT OF THE UPPER SHAFT IN CANE MILLS |
Author: |
MARIO JAVIER CABELLO ULLOA. JUAN JOSÉ CABELLO ERAS |
Abstract: |
This study introduces a mathematical model to describe the floating effects of
the top roll in sugarcane mills. The model is developed from experimental data
measured during the operation of a sugarcane mill. The measured data is fitted
using the top shaft rotation period of the mill and dividing on intervals to
individually fit each interval obtaining a function defined by parts. The
resulting model shows a correlation coefficient of R2 ≥ 0.97. This allow
including the floating effect in the study and design of other elements of
sugarcane mills. |
Keywords: |
Sugarcane Mill, Instant Floating, Dynamic Loads. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
AN INTEGRATIVE FRAMEWORK TO UNDERSTAND THE INFLUENCE OF MORALITY ON GREEN IS
ADOPTION: A THEORETICAL PERSPECTIVE |
Author: |
MOHAMMAD DALVI-ESFAHANI, AZIZAH ABDUL RAHMAN |
Abstract: |
The prevailing gap in the Green information systems (IS) research literature is
the absence of a theoretical framework to understand the influence of
environmental beliefs and attitudes on the adoption of Green IS initiatives. The
purpose of this study is to fill this gap by developing an integrated framework
by identifying and examining the factors that influence the proenvironmental
behaviors (PEBs) of managers to adopt Green IS initiatives. The framework is
firmly grounded using three theoretical frameworks: (1) upper echelon theory,
(2) refined theory of basic individual values, and (3) norm activation model.
The theoretical lenses of these three frameworks are utilized to assess the
influence of moral behavior on practicing of Green IS initiatives by the
managers of organizations. Theoretical and practical implications of the study
for the benefit of IS researchers and managers are discussed. Furthermore, the
empirical evaluation and assessment plan of propositions, together with the
future extensions of the study are presented. |
Keywords: |
Green IS, Upper echelon theory, Norm activation theory, proenvironmental,
Sustainability |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
3D QUANTITATIVE PREDICTION OF DINGJIASHAN DEPOSIT BASED ON MORPHOLOGICAL
ANALYSIS OF GEOLOGICAL INTERFACES |
Author: |
PAN YONG, PENG ZHENGLIN |
Abstract: |
Based on the studies of geological features and ore-controlling factors of
Dingjiashan lead-zinc deposit in Fujian, this study creates 3D modeling for
primary geological interfaces and geological body. A 3D morphological extraction
computer program is further developed based on 3D TIN data models of geological
interfaces, which allows us to analyze 3D morphological analyses regarding
stratigraphic interface of unconformity surface and extract corresponding 3D
morphological parameters. Through studying quantitative relations between
mineralized indexes of 3D space and 3D morphological parameters, we are able to
build linear regression prediction models for 3D unit grades and metal content.
Our model predicts 123917 tons of unit lead content and 520334 tons of zinc.
According to spatial distributive characteristics of predicted results, two 3D
prospecting targets are determined, providing important decision-making
information for further prospecting. |
Keywords: |
TIN, Geological Interfaces, 3D Morphological Analysis, Quantitative Prediction,
Dingjiashan Deposit. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
THE IMPACT OF INTERNAL CONTROL EFFECTIVENESS TO THE QUALITY OF MANAGEMENT
ACCOUNTING INFORMATION SYSTEM : THE SURVEY ON STATE-OWNED ENTERPRISES (SOEs) |
Author: |
ILHAM HIDAYAH NAPITUPULU, SRI MAHYUNI, JOJOR LISBET SIBARANI |
Abstract: |
This study aims to examine the influence of internal control effectiveness to
the quality of management accounting information system (MAIS). The quality of
management accounting information system should consider the basic nature of the
information that is suitable to a particular organization. The methods used for
the transmission are data and information. To run well, a MAIS needs the
effective internal controls. This study was conducted in the State Owned
Enterprises (SOEs), the hypothesis testing used the Structural Equation Model (SEM)
approach with Partial Least Square (PLS) analysis tool. The study research found
that the internal controls effectiveness significantly influenced the quality of
MAIS. The study also found the results of applications control, especially in
controlling the process of becoming the most powerful dimension in shaping the
internal control in state-owned enterprises (SOEs). In the quality of MAIS, MAIS
flexibility dimension becomes the strongest part that shaped and MAIS
flexibility will facilitate the work completion. |
Keywords: |
Internal Control Effectiveness, Information Systems Management, the Quality of
Management Accounting Information Systems and Integration |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
VARIATIONAL ITERATION METHOD (VIM) FOR SOLVING PARTIAL INTEGRO-DIFFERENTIAL
EQUATIONS |
Author: |
AMINA KASSIM HUSSAIN, FADHEL SUBHI FADHEL, ZAINOR RIDZUAN YAHYA, NURSALASAWATI
RUSLI |
Abstract: |
In this paper, two objectives will be achieved, the first one is to state and
prove the existence of a unique solution of nonlinear partial integro-differential
equations by using Banach fixed point theorem. The second objective is to apply
He’s variational iteration method for solving nonlinear partial integro-differential
equations. This method is a very powerful method for solving a large amount of
problems. It provides a sequence of iterated solutions which is converge to the
exact solution of the problem. Also, in this work the derivation of the
iteration formula using He’s method have been presented and then prove the
converge of the obtained sequence of iterated approximate solutions to the exact
solution of the partial integro-differential equation. Finally, illustrative
examples were presented to show the efficient of the new method and the proposed
technique was programmed using Mathcade 15.0. |
Keywords: |
Variational Iteration Method, Nonlinear Partial integro-Differential Equation,
Banach Fixed Point Theorem, Contraction Mapping Principle. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
Title: |
PRIORITIZING IMPLEMENTATION FACTORS OF ELECTRONIC DOCUMENT MANAGEMENT SYSTEM (EDMS)
USING TOPSIS METHOD: A CASE STUDY IN IRAQI GOVERNMENT ORGANIZATIONS |
Author: |
HAIDER ABDULKADHIM, MAHADI BAHARI, HASLINA HASHIM, ARYATI BAKRI, WAIDAH ISMAIL |
Abstract: |
Taking into consideration a complexity of EDMS implementation process which
involves a combination of technological, organizational and users factors, this
study explores how EDMS implementation factors can be ranked through these
dimensions. This paper begins with an examination of the literature on EDMS
implementation studies where a conceptual framework has been derived. The study
then adopts the TOPSIS method as the analytical tool that tackles the issue in
prioritizing the most desirable factors influencing EDMS implementation project.
From the results, the top management support, budgetary, strategic planning,
staff training, awareness, resistance to change, IT implementation team, ICT
infrastructure, security and privacy/trust, and collaboration are the top-ten
important factors for Iraqi government organizations to implement EDMS
applications. This paper draws on the research results for implications of IT
managerial practice, and then suggests some empirical tactics in order to
enhance in managing the EDMS implementation process in government. |
Keywords: |
Electronic Document Management System (EDMS), EDMS Implementation,
Implementation Process, TOPSIS |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2016 -- Vol. 88. No. 2 -- 2016 |
Full
Text |
|
|
|