|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2016 | Vol. 85 No.1 |
Title: |
ICTS AND ECONOMIC GROWTH IN AFRICAN COUNTRIES |
Author: |
BASHIR S. GALADANCI |
Abstract: |
It is well established that Information and Communications Technologies (ICTs)
are strong drivers for economic growth. While many studies have shown the strong
correlation between ICT and economic development in a number of developed and
developing countries, little research has been done on African countries in
general and Nigeria in particular. This paper is aimed at identifying the
relationship between ICT and economic growth in order to provide the way forward
for Nigeria to use ICT for economic development. An analysis of the actual
relationship between ICT and economic growth is made which identifies the
necessary as well as sufficient factors that provide the catalyst to turn ICTs
into drivers for economic growth. This is used to explain why the use of ICTs in
many African countries does not result in the desired economic growth. A broad
discussion is provided on the use of ICTs as a service sector as well as an
economic sector. It is obvious that while both sectors can lead to economic
growth, developing countries that use ICT as an economic sector are likely to do
much better in generating wealth and providing job opportunities. A broad survey
is made of the use of ICTs in Africa with particular emphasis to the experiences
of a few countries namely Botswana, Mauritius, Egypt and South Africa. An
attempt is then made to bring out the true relationship between ICTs and
economic growth by analyzing the theoretical models on the major factors that
drive ICTs in bringing about economic growth and emphasizing the way forward for
countries that have not exploited ICTs as engines for economic growth. |
Keywords: |
ICTs, Economic Growth, Business Process Outsourcing, IT Parks, African Countries |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
SUCCESS FACTORS FOR KNOWLEDGE SHARING AMONG TVET INSTRUCTORS |
Author: |
HANIMASTURA HASHIM, HAIRULLIZA MOHAMAD JUDI, TENGKU SITI MERIAM TENGKU WOOK |
Abstract: |
Technical Vocational Education and Training (TVET) institutions are responsible
for providing Human Resources particularly skilled and knowledgeable workers. In
order to improve the quality of graduates in the technical field, the knowledge
of TVET institution instructors should be strengthened from time-to-time.
Knowledge sharing among TVET instructors can help them update their current
knowledge. Information Technology enables TVET instructors to search for and
share new knowledge more efficiently and quickly. They will also be able access
a wider range of information. However, these knowledge-sharing activities often
result in failure because most people prefer to seek knowledge rather than be
its contributors. Therefore, this study is conducted to identify factors that
influence knowledge-sharing activities among TVET instructors. A Qualitative
method involving a semi-structured interview was conducted for this study. The
Snowball Sampling method was chosen with four instructors and two experts as the
respondents. Data analysis was performed using content analysis. This study
identified the factors affecting knowledge-sharing activities via two main
approaches: the non-technical approach, which consists of organizational,
individual, content, and cooperation factors and the technical approach, which
consists of just one factor i.e. technology. The factors identified are expected
to help TVET institutions develop a knowledge-sharing repository that will
encourage the sharing of knowledge among their instructors. |
Keywords: |
Vocational and Technical Education, Knowledge Management, Empirical Assessment |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
E-LEARNING DEVELOPMENT AND ASSESSMENT REPORT: CASE STUDY I-FOLIO |
Author: |
HAYDER SAAD, SAIF ULDUN MOSTFA, RANA ABDUL KARIM, ESRAA SAAD ABDULMAJED, RANA
JABBAR ABD ALI |
Abstract: |
E-learning application is on demand nowadays. It provides learner a place to
gain the knowledge in anywhere and anytime. In Universiti Kebangsaan Malaysia, a
multi-functional educational tool called I-Folio application has been developed
and adapted in their learning and teaching process. Through the application,
lecturers and students are connected all the time, regardless where they are. In
order to fulfill the requirements of lecturers and students, i-Folio is built
under a well-organized process model, Waterfall model. The modules are
constructed based on structure principle while user-friendly interface are
designed according to user experiences. A bottom-up testing strategy with
various test cases has been implemented to verify and validate all the functions
in I-Folio application. With this functional educational instrument, learning
and teaching process in the university has become more effective and efficient. |
Keywords: |
E learning, I-Folio, Educational tool, Process model, Waterfall |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
IMAGE SEGMENTATION USING HIDDEN MARKOV TREE METHODS IN RECOGNIZING MOTIF OF
BATIK |
Author: |
MURINTO, EKO ARIBOWO |
Abstract: |
Batik is one of the inherited high-valued artwork. Batik is a way of making
clothes using fabric coloring technique. This technique uses ‘malam’ to avoid
staining unintended parts of the fabric. The term ‘Batik’ can also be referred
to a cloth that is made with coloring technique, possesses certain motifs as
well as special characteristic. Batik’s motif pattern recognition requires
initial image processing step called as image segmentation. The purpose of image
segmentation is to divide the image into several regions based on feature
similarity including grayscale level, texture, color, and motion. In this
research multiscale segmentation methods, HMTSeg, is used to recognize the
pattern of batik’s motif. Images of Batik that have been used in this work are
images of Batik originated from Jambi region, Pekalongan region, and Yogyakarta
region. Batik’s motif pattern recognition steps include image pre-processing,
image segmentation, and pattern recognition using Euclidean distance based
method. Result shows that this method gained 80% of accuracy in recognizing
batik’s motif. In conclusion, HMTSeg is a good segmentation method to recognize
pattern of batik based on the texture. |
Keywords: |
Batik Image, Hidden Markov Tree (HMTSeg), Image Segmentation, Pattern
Recognition, Texture |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
OBSERVATION OF VIBRATION RESPONSE OF TYMPANIC MEMBRANE USING FINITE ELEMENT
METHOD |
Author: |
MUHAMMAD RAFIQUL ISLAM, KOK BENG GAN, UMAT CILA |
Abstract: |
The middle ear plays an essential role in sound perception: it conducts
air-borne sound energy from the external environment into liquid waves inside
the inner ear via ossicular vibrations. However, the middle ear is often the
site of infections, congenital disorders and other pathologies, which can lead
to conductive hearing loss. Tympanometry is an acoustic method to evaluate
middle ear function by measuring TM’s mobility and responses. However, current
clinical results are inadequate due to our insufficient knowledge of the complex
mechanics of the auditory system. This is a need to understand the TM vibration
responses to the sound pressure level at certain frequencies. Such responses
will find useful information such as displacement to develop a screening tool
for middle ear diagnosis. Computational models have been introduced to analyze
this phenomenon, where the tympanic membrane (TM) is key component in the
auditory system. In this study, a finite element (FE) model has been proposed
for TM. The geometry was reconstructed using magnetic resonance imaging (MRI)
data. The material model was developed from previously published data. The model
was employed to analyze the vibration of the TM under the sound load of pure
tone. The vibration was observed for the sound load of 90dB SPL at three
specific frequencies (226Hz, 678Hz and 1000Hz). |
Keywords: |
Five Keywords are Required Separated By Commas (Capitalize Each Work Italic) |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
AN EXPLORATORY STUDY OF THE PROFILE OF THE SAUDI USER OF SOCIAL MEDIA |
Author: |
DIMITRIOS XANTHIDIS, ALI SAAD ALALI |
Abstract: |
The use of social networks is entering the era of maturity. The large technology
vendors are all the more interested in getting involved in the Social Media game
unable to afford being left out of these compact and huge potential markets.
This exploratory quantitative study aims to reveal those demographics facts
related with the usage of the social networks in Saudi Arabia that form the
profile of the local user. The findings show a general agreement with the main
conclusion of other public surveys in the country pointing to a heavy use of the
social networks, at more than 85%. They also suggest that the younger the
individual the more likely it is to get involved in the Social Media and in the
case of female individuals, though slightly less in population, but seemingly
more intense use of them. Education does not seem to affect the frequency of the
use as long as the individual are at least basically educated. Likewise income
and employment status only indirectly affect this use since they affect the
amount of free time one has to get involved with the social networks. Finally,
as expected, the more one is connected to the Internet the heavier the use of
the Social Media. |
Keywords: |
Saudi Arabia, Social Media, User Profile, Personal Attributes |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
STATIC STRUCTURE AND DYNAMIC VIEWS OF PURCHASES PROCESS AND MODELING IT IN
ITERATIVE METHOD BASED ON USE-CASE SCENARIOS |
Author: |
F. ALAGHBARI, N. AKNIN |
Abstract: |
Our research comes to supplement the previous researches that have represented
business process modeling languages. The representation performed in this paper
is focuses on two most widely used iterative method based on Use-Case scenarios
for purchase processes: static structure and dynamic views. To clarify how to
use this method we applied it in purchase process by some steps. Use-Cases
should be kept as simple as possible. Occasionally, however, we will encounter
irreducible complexity and will need to formulate complex Use-Cases. Rather than
trying to capture this complexity with lots of branching and alternative flows,
it is easier, and less error prone, to model the main flows through this
branching network as separate scenarios. The results presented in this paper as
some models in UML. In addition, these models that facilitates the analysis
phase of purchase process and make processes clear from perspective of analysts,
managers, employers and also users. On the other hand, the aim in this paper
will make the design phase easier and explained as a future work to complete the
design phase of the purchase operations in implementation and testing phases. |
Keywords: |
Static Structure, Dynamic Views, Scenarios, Use-Case Scenarios, purchase
Process, Use-Case Diagram. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
SOCIAL NETWORK: TOWARDS INCREASING FEEDBACKS AND WIDENING THE DIFFUSION OF
INFORMATION |
Author: |
MOHCINE KODAD, EL MILOUD JAARA |
Abstract: |
The purpose of this document is to highlight two strategies which increased
feedbacks and stimulated the diffusion of information in social networks.
Starting by an online survey, which assists searchers in understanding the
behavior of social network users, to define the problem. The information
received with this survey has been tested on validation by an analyze on the
most popular type of posting on social networks. The results of this study
provided two strategies as a solution for the problem of dissatisfaction among
users of social networks and to increase feedbacks and diffusion of information
on social network. One strategy is manual and is based on the type of
publication and the second strategy is automatically and takes the concept of
collaborative work in to account. |
Keywords: |
Social network, Feedbacks, Diffusion of information, Facebook, collaborative
work |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
APPLICATION OF LINEAR PURE BIRTH-DEATH PROCESSES FOR NETWORK-CENTRIC INFORMATION
SYSTEMS MODELING |
Author: |
YURI YURIEVICH GROMOV, IVAN GEORGIEVICH KARPOV, VALERIY EVGENEVICH DIDRIKH, YURI
VIKTOROVICH MININ, OLGA GENNADEVNA IVANOVA |
Abstract: |
The solutions of Kolmogorov’s equations for the probabilities of state for a
discrete-time Markov process with a linear function of birth-death intensities
were obtained. We also found expressions for the distribution laws of kth point
arrival in birth-death processes and their basic numerical characteristics. |
Keywords: |
Markov Stochastic Processes; Network-Centric Information System; Pure Birth
Process; Pure Death Process |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
COST EFFECTIVE APPROACH FOR SPATIAL MODELING |
Author: |
CAHYO CRYSDIAN |
Abstract: |
The paper presents an effort to standardize cost effective to support the
development of spatial modeling. It is motivated by the increasing role of both
cost effective and spatial modeling to contribute on society development
worldwide. Therefore the future of spatial modeling would focus on minimizing
cost and required time for model generation, in which cost effective become the
only reliable approach to achieve these objectives. Considering that spatial
modeling commonly consists of data acquisition, digitations process and model
development, hence the characteristic of cost effective to minimize any required
resources for system development is required to be presented in each stage. It
means the method being utilized in each stage must comply with the objective of
cost effective, thus method selection takes a vital role in the development
process. The work has presented various strategies consisting of different
methods being employed for model development in which each carries its own
benefits and flaws. Finally it is important to consider available resources to
meet with method selection in order to enable wise implementation of spatial
modeling. |
Keywords: |
Cost Effective, Spatial Modeling, Polygonal Modeling, Procedural Modeling,
Resource Consumption |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
AN APPROACH TOWARDS SECURE MULTIKEYWORD RETRIEVAL |
Author: |
MERCY PAUL SELVAN , DR. A. CHANDRASEKAR, K. KOUSALYA |
Abstract: |
Extracting information from the database has become tedious process. Because
redundant data will be extracted sometimes, so we are approaching a new method
to extract the data from database. Giving single word as an input, we may not
get relevant data, so multiple data can be given as input to extract the
relevant information from the database, so that efficiency will be higher when
compared to other methods. For security of data, we can encode the data on the
admin side. Observations are done while queries were given to retrieve the data.
The information was retrieved, joined and sorted using a top - k algorithm. The
information are connected by a graph and status are reported. |
Keywords: |
Extract, data, graph, top-k, relevant,retrieval. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
A MODEL TO DETERMINE COST ESTIMATION FOR SOFTWARE DEVELOPMENT PROJECTS OF SMALL
AND MEDIUM SCALES USING USE CASE POINTS |
Author: |
SHOLIQ, ARIFIN PUJI WIDODO, TEGUH SUTANTO, APOL PRIBADI SUBRIADI |
Abstract: |
The purpose of this study was to develop a cost estimation model for software
development projects of small and medium scale. The model was derived from the
Use Case Points, which is usually used to estimate software development effort.
The development of our cost estimation model was based on the need for a
reference to the estimated costs for software development projects, particularly
software development projects of small–medium scale. The cost estimation was
used to estimate the allocation of resources spent on covering personnel
resources, money, and time to complete the project. The result of this study was
a cost estimation model for software development projects of small–medium scale
that had been tested with four software projects that had been completed.
Testing of the model was performed using data from four projects got level
deviations between the estimated cost and the actual cost amounted to 6.89%. |
Keywords: |
Use Case Points, Software Development Project, Cost Estimation Model, Effort
Estimation |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
AUTHORSHIP ATTRIBUTION OF TELUGU TEXTS BASED ON SYNTACTIC FEATURES AND MACHINE
LEARNING TECHNIQUES |
Author: |
N V GANAPATHI RAJU, Dr V VIJAY KUMAR, Dr O SRINIVASA RAO |
Abstract: |
The automatic recognition of an author of a document on the basis of linguistic
features of the text is known as authorship attribution and the present paper
performs this on one of the very popular and largely spoken languages of India
“Telugu”. The present paper strongly believes that each author has got his own
unique style of writing pattern, which is the signature of that author. The
author attribution is similar to text categorization based on stylistic
properties that deals with properties of the form of linguistic expression as
opposed to the content of a text. The present paper is based on “shallow”
features such as function words frequencies and part of speech (POS). The
present paper experimented with a corpus that consists editorial articles of
Telugu language by different journalists. The token and lexical based features
are not considered because all the documents are in a similar genre and roughly
constant over the different authors. The present paper focused on the use of
syntax-based (shallow) features of an author's style, and evaluated most
frequently used syntactic N-gram (unigram, bi-gram and tri-gram with and without
overlapping) POS tagging features after performing the preprocessing step. The
present paper also computed authorship attribution by considering Avyayas
(similar to stop words in English language) of Telugu language. Further the
present paper integrated the above two cases (POS tagging with Avyayas) in
finding authorship attribution. Modern supervised machine learning algorithms
are used by the present paper to explore large feature vectors to achieve high
attribution accuracy. We have achieved an average of above 85% attribution rate
on all classifiers with different feature vectors. |
Keywords: |
N-Gram, POS Tagging, Function Words, Shallow Features, Lexical; Stop Words |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
Title: |
PERMISSION BASED MALWARE ANALYSIS FOR ANDROID APPLICATIONS USING SELF-ORGANIZING
MAPS |
Author: |
AHMED BEN AYED |
Abstract: |
Android is an open source platform based on Linux kernel; it is one of the first
operating systems that use a permission mechanism to control access to
resources. The permission mechanism is fine gained and can control what a
particular process could and could not perform. Therefore, these permissions
should be monitored closely to make sure they are not assigned to the wrong
application. This study is not intended to create an anti-malware solution,
instead it uses the permissions to classify and categorize android applications.
This paper is offering a novel way of using the self-organizing map to study a
set of malware application and try to find a pattern of permission requests.
This pattern could be used to analyze the application and compare it against the
pattern identified earlier using the self-organizing map. |
Keywords: |
Android Permissions, Machine Learning, Self-Organizing Map, Android Security |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2016 -- Vol. 85. No. 1 -- 2016 |
Full
Text |
|
|
|