|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2016 | Vol. 89 No.1 |
Title: |
COBIT BENCHMARKING OF SYSTEM DEVELOPMENT GOVERNANCE FOR A GOVERNMENT AGENCY IN
MALAYSIA |
Author: |
Z.A. HAMID, H. SULAIMAN |
Abstract: |
The lack of initiative of in-house system development governance has resulted to
several issues in the working procedures of the Public Service Department of
Malaysia (PSD) and mutual understanding among Business and IT People. The
understanding of stakeholders, especially Business-IT people, plays an important
role and is responsible for carrying out inter-related values for the success of
any developed Information Systems (IS) applications. The lack of understanding
on the importance to achieve PSDs business goals by IT people and failure to
have applications finished on time, may lead to another enhancement or
rectification of the application that causes further time and resource
consumption. Likewise, the Business peoples assumption of IS development also
lacks understanding on the technical complexities. The impact of improper
management of in-house development process may hinder critical application
deadline, systems malfunctioning, unsatisfied users and further damage to PSDs
quality reputation. The COBIT benchmarking results of system development
governance for a Malaysian government agency is presented in this paper through
a survey. The survey was carried out among the staff members of the PSD who are
internally involved with the system development process. Three (3) sets of
questionnaires were distributed to the targeted group of 10 business personnel,
10 IT management personnel and 10 IT technical personnel. The set of questions
were derived from COBIT 4.1 Process Maturity Assessment Tool, which was
developed by ISACA. It is a simple diagnostic tool based on the COBIT maturity
model as defined in COBIT 4.1. The tool can be used to drive awareness and
obtain buy-in with regard to the need to address IT governance. Results obtained
from the tool can provide an effective and efficient way to determine IT process
improvement opportunities to focus on future prioritization mechanism based on
PSDs business and IT goals, as well as the identification of important input
for strategic and tactical action plans. The results indicate the alignment of
business goals to IT goals, as determined by the responses obtained from PSDs
staff. Additionally, the tool highlights that PSD only involved 25 IT processes
out of the overall 34 COBIT IT processes. A spider-web chart illustrates the
current maturity assessment result of each IT-related process in PSD. Results
will provide a benchmark for PSD to evaluate their current maturity level of IT
processes and the necessary strategies that can be taken to improve the maturity
level of each IT processes involved in the organisation, based on their
strategic goals and organisational needs. |
Keywords: |
IT Governance (ITG), COBIT 4.1, IT Process Maturity Assessment Tool, In-house
System Development, the Government of Malaysia |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
FEMTO CELL WITH DETERMINISTIC INTERLEAVER |
Author: |
A.MARY JULIET, S.JAYASHRI |
Abstract: |
This manuscript intends to tell you about a downlink transmission scheme for
femto cell networks grouping OFDM-IDMA. We assign macro users and femto users to
a separate sub carrier groups for transmission to eliminate cross tier
interferences. We use IDMA with deterministic interleaver, basically to mitigate
the co-tier interferences within the same group of users. The system model and
deterministic interleaver is explained clearly, the performance of the proposed
scheme in terms of spectral efficiency and bit error rate (BER) is explained
elaborately. Having analyzed the theoretical aspects and simulations
demonstrates that with the combination of femto cell and grouping ,the proposed
schemes levels better performance compared with usual OFDM-IDMA system and at
the same time a lower complexity is exhibited than the later. |
Keywords: |
Deterministic Interleaver, femto cell, OFDM , IDMA, interference |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
OIL PALM AGE CLASSIFICATION ON SATELLITE IMAGERY USING FRACTAL-BASED COMBINATION |
Author: |
SOFFIANA AGUSTIN, PUTRI AISYIYAH RAKHMA DEVI, DENI SUTAJI, NUNIEK FAHRIANI |
Abstract: |
Palm oil tree is one of the sources of vegetable oil and it has become the
worlds biggest need of vegetable oil comparing to other plant. The use of
satellite imagery to manage the plantation is very helpful for the stakeholders
in supervising the development. To find out the age of oil palm trees from the
satellite imagery is done by using the extraction of fractal based texture
features. This study purpose an feature extraction methods to recognize the age
of palm oil tree on the imagery of panchromatic icons using algorithm of
segmentation-based fractal texture analysis (SFTA) which is combined with local
features and local binary pattern (LBP). The classification will be done by
using multi-layer perception method into four classes, which are the age of
adult, young, old palm, and the ones which are not palm. Extraction feature is
done in fractal-based using SFTA algorithm, giving accurate result of 72.5 %.
The combination of feature extraction using SFTA with the local features give
accuracy of 74.5 % and the combination of SFTA and LBP gives the accuracy of 76
%. |
Keywords: |
Classification, Oil Palm Age, Ikonos-Panchromatic, Segmentation Based Ffractal
Fexture Analysis (SFTA), Local Features, Local Binary Pattern (LBP) |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
FACEBOOK USAGE IN PROMOTING THE ACADEMIA EXPERTISE |
Author: |
NOR INTAN SANIAH SULAIMAN, SAADIAH GHAZALI , NERDA ZURA ZABIDI, MOHD FAIZAL
OMAR, ROSE ALINDA ALIAS |
Abstract: |
This paper means to contemplate online social media usage on knowledge sharing
among academia. In the past, numerous researches have been done to investigate
how people in general make utilization of this innovation. However there are
still restricted studies on how this technological advancement affects the
scholarly world. Moreover, in Malaysia most research done in studying the effect
of social media is focused on students rather than from academia perspective.
For this study, Facebook is chosen as one of online social networking tool for
knowledge sharing. Firstly, this study is begun with the exploration of factors
that motivate the academia to share their insight through online networking.
From the literature review analysis, ability to communicate with colleagues is
the most cited reason showing the adoption of social media tools by academia. To
understand more on how the Malaysian academia utilizes Facebook as a medium of
knowledge sharing, a content analysis on a Facebook page is done. Content
analysis is used to study the frequency of post as well as topics discussed
among the academia. The findings reveal that there are four main topics
regularly shared by the academia which are are information and current news,
motivational quote, personal advice from life experience and program promoted. |
Keywords: |
Knowledge Sharing, Facebook, Content Analysis, Academia Expertise |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
A FAULT TOLERANTAND RELIABILITY MECHANISM FOR WEB SERVICES BY CHANGE MANAGEMENT
AND BROKER |
Author: |
B. MURUGANANTHAM, Dr. K. VIVEKANANDAN |
Abstract: |
Businesses provide various services that are not offered through one Web
Services to users. Component Web Service supply several complex function through
a composition of different Web services. Failure of composite services is more
vulnerable rather from atomic services. Failure of single Component Services
rather unavailable in the implementation of combined Web Services it shows fail
of all services. Nowadays World Wide Web consist of a vast quantity of Web
Services and many are designed for support mainly kind of business function.
Currently, single web services do not support the business enterprises as their
necessity is colossal in an environment. Services or Business Source are unable
to give the response to the requester. And in that condition entire composite
services require to running finally. Thus,the necessity of organization make
certain failed services efficiently and rapidly exchanged as well as running
procedure is not disturb. For this kind of query to attend modify management
problem in LCSs a system is recommended known as Evolution of Long-term Composed
Services. Cooperation in mid of autonomous web services and Long-term Composed
Services jointly offered value added service. And it results in the
long-standing assurances to users. |
Keywords: |
Web Service, Change Management, Broker, Ev-LCS, Reliability |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
MEASURING USABILITY AND CHILDREN'S ENJOYMENT OF VIRTUAL TOY IN AN IMAGINATIVE
PLAY SETTING: A PRELIMINARY STUDY |
Author: |
KHAIRUNNISA MISPA, EVI INDRIASARI MANSOR, AZRINA KAMARUDDIN, JOANNE HINDS |
Abstract: |
This paper recounts a preliminary evaluation of childrens imaginative play
whilst interacting with a virtual toy. Children aged 5-8 years old played with a
virtual toy with a friend and their enjoyment and satisfaction of playing with
the toy were evaluated. The complexity of social pretend play and the
involvement of communicative strategies were taken into consideration to assist
the inquiry of identifying the ability of the virtual toy to support childrens
imaginative play. Our analysis demonstrated that children who managed to play
imaginatively applied the social pretend play complexity and communicative
strategies during the play session. The virtual toy supported childrens
imaginative play, hence these findings can help to stimulate future research and
the design of virtual toys to support play for remotely separated children. |
Keywords: |
Children, children's enjoyment, communicative strategies, imaginative play,
social pretend play, usability, virtual toy |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
FACE, IRIS, AND FINGERPRINT MULTIMODAL IDENTIFICATION SYSTEM BASED ON LOCAL
BINARY PATTERN WITH VARIANCE HISTOGRAM AND COMBINED LEARNING VECTOR QUANTIZATION |
Author: |
MAHMOUD. Y. SHAMS, AHMAD. S. TOLBA, SHAHENDA. H. SARHAN |
Abstract: |
Believing of the importance of biometrics in this research, we have presented a
fused system that depends upon multimodal biometric system traits face, iris,
and fingerprint, achieving higher performance than the unimodal biometrics. The
proposed system used Local Binary Pattern with Variance histogram (LBPV) for
extracting the preprocessed features. Canny edge detection and Hough Circular
Transform (HCT) were used in the preprocessing stage while, the Combined
Learning Vector Quantization classifier (CLVQ) was used for matching and
classification. Reduced feature dimensions are obtained using LBPV histograms
which are the input patterns for CLVQ producing the classes as its outputs. The
fusion process was performed at the decision level based on majority voting
algorithm of the output classes resulting from CLVQ classifier. The experimental
results indicated that the fusion of face, iris, and fingerprint has achieved
higher genuine acceptance recognition rate (GAR) 99.50% with minimum elapsed
time 24 sec. The evaluation process was performed using large scale subjects
claiming to enter the system proving the superiority of the proposed system over
the state of art. |
Keywords: |
Face, Iris, Fingerprint, Combined Learning Vector Quantization, Local Binary
Pattern Variance, SDUMLA-HMT, Genuine Acceptance Rate, and majority voting. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
ICT AS A TRANSFORMATIVE DRIVER FOR SOCIO-ECONOMIC DEVELOPMENT |
Author: |
ZULKHAIRI MD DAHALIN |
Abstract: |
This paper presents findings from an ICT transformation lab implemented by one
of the state in Malaysia with the aim to demonstrate the important role of ICT
as a driver to hasten the socio-economic development of the state. The lab was
deemed necessary and timely considering the low ICT adoption and below the
national average internet penetration experienced by the state, which make it
even more challenging to deploy ICT as an effective tool for the development of
the state. The one-month lab gathered experts from the ICT and telecommunication
industry as well as related government agencies at the state and federal levels
to identify potential ICT projects that can contribute to the development of the
state. Numerous techniques for data gathering such as focus group discussions,
brainstorming, technology impact analysis, critical success factor analysis,
presentations and mappings were carried out. Analysis was based on the National
Strategic Framework for Bridging the Digital Divide and mapped against a
strategic importance matrix that identifies potential projects classified
according to three categories: quick-wins, mid-term duration, and long-term.
Results of the lab identified 26 ICT projects, 15 of which were seen to have the
potential to become transformative drivers with impact for socio-economic
development of the state. |
Keywords: |
Diffusion, Adoption, Value-Creation, Digital Divide, Quick Wins |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
REAL TIME SCHEDULING FOR DYNAMIC PROCESS EXECUTION USING ROUND ROBIN SWITCHING |
Author: |
R AKHILESH REDDY, G SIVA NAGESWARA RAO |
Abstract: |
Scheduling in operating systems is allocate certain amount of CPU time with use
of different processes. Task scheduling is also one of the key process in
running of different processors in with in life time. Round Robin (RR) is a
popular scheduling algorithm allows to utilize the CPU short time for individual
task scheduling events in real time process execution. The advancement of RR
scheduling performs fine tuning for time slice which do not stipulated time to
allocate them in events proceedings based on CPU scheduling. RR also maintains
turnaround time, waiting time and response time with processing frequency of
context switches. In this paper we improve the performance of RR with integer
programming to refine in arrival time analysis in process scheduling with
proceedings of all the requirement CPU processes. Every process has reasonable
response and arrival time analysis in allocation of scheduling in process
allocation. A method the usage of integer programming has been proposed to
resolve equations that determine Changeable Time Quantum (CTQ) value that is
neither too massive nor too small such that each system has reasonable response
time and the throughput of the system is not decreased because of unnecessarily
context switches. |
Keywords: |
Arrival Time, Burst Time, Time Slice, Turnaround Time, Number of Switches, CPU
Scheduling, Residual Time, Cyclic Queue |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
GRAPH BASED WORKLOAD DRIVEN PARTITIONING SYSTEM FOR NOSQL DATABASE |
Author: |
SHIVANJALI KANASE, SWATI AHIRRAO |
Abstract: |
Cloud computing is the rising technology, which deploys the scalable web
applications and provides the storage solutions to the individuals and
enterprises. The massively scalable NoSQL data store exhibits the highly
desirable scalability and availability by using various partitioning methods, to
handle the exponentially growing demands of the users. The data stores are
partitioned horizontally and distributed across the geographically dispersed
data centers to balance the load. However, if the partitions are not formed
properly, it may result in expensive distributed transactions. There are number
of existing partitioning techniques available like Hash and Range partitioning,
but they are not effectively applied to the workload consisting of fairly small
transactions, that touch fewer records and which also do not considers the
n-to-n relationship between them. In this paper, Graph-based Workload Driven
Partitioning System for NoSQL Database using OLTP workload is proposed to
improve the scalability minimizing the distributed transaction. This system
works in two phases: 1) generates the graph from transaction workload such as
the database tuples are represented as nodes and number of tuples accessed in
same transaction are connected by edges. Then graph partitioning technique is
applied to find min-cut balanced partition. 2) Uses the decision tree
classifier, which gives a range predicate partitioning identical to the
partitions, formed by the graph partitioning algorithm. The TPC-C schema is
implemented by utilizing Apache CouchDB NoSQL data store, in order to assess the
proposed system. The experimental end result indicates that the graph-based
schemes significantly improves the response time and latency. |
Keywords: |
Graph Partitioning Methods, OLTP Workload, Scalability, Distributed
Transactions, NoSQL Database, Decision Tree Classifier, Lookup Table. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
INNOVATION TRAITS FOR BUSINESS INTELLIGENCE SUCCESSFUL DEPLOYMENT |
Author: |
AZIZAH AHMAD, RAHAYU AHMAD, KAMARUL FAIZAL HASHIM |
Abstract: |
Business Intelligence (BI) is an innovative technology that facilitates
analytics of big data. Deploying BI is a complex undertaking, expensive in
nature, and time-consuming task as these software applications are
high-risk/high-return projects. Improper implementation may lead to failure and
in turn leave organizations into data rich and information poor. This study
examines BI from the lens of innovation in which the traits of the innovation
tool itself influence its successful deployment in organizations. Rooted from
Diffusion of Innovation Theory (DOI), a model was developed and validated by
decision makers and executives that involve in various levels of BI deployments
in telecommunication industry. The primary data collected through quantitative
method were analyzed via structural equation modelling technique. Findings of
the study suggest that DOI offers valuable insights into characteristics of BI
that influence its successful adoption. In line with the literature on DOI of
other type of information systems success, BI characteristics namely relative
advantage, complexity, compatibility, and observability are also found to be
determinants in ensuring BI success. This study contributes significantly to the
existing literature that will assist future BI researchers especially in terms
of information system success. Practically, the model serves as guidelines for
BI implementers to invest on the relevant skills and resources for fulfilling
the requirements of BI successful deployment. |
Keywords: |
Business Intelligence, Innovation Traits, Diffusion Of Innovation (DOI),
Successful Deployment, Quantitative Method |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
MODEL-BASED ARCHITECTING AND MODEL DRIVEN APPROACHES IN E-LEARNING SYSTEM
DEVELOPMENT PROCESS: REVIEW OF LMSGENERATOR |
Author: |
RACHID DEHBI |
Abstract: |
For many years, various approaches in system design and implementation
differentiate between the specification of the system and its implementation on
a particular platform. People in software industry have been using models for a
precise description of systems at the appropriate abstraction level without
unnecessary details. Model-Based Architecting and Model-Driven (MD) approaches
in system development process increase the importance and power of models by
shifting the focus from programming to modeling activities. Models may be used
as primary artifacts in constructing software, which means that software
components are generated from models. Software development tools need to
automate as many as possible tasks of model construction and transformation
requiring the smallest amount of human interaction and why not the total
automation of development processes in software engineering.
This article focuses on the model-based architecture and software engineering
approaches needed for the automation in the software engineering development
process. And as an illustrative example it represents the architecture and the
functional core of LMSGENERATOR, a software factory for business components and
platforms for distance learning. |
Keywords: |
Model-Based Architecting, model driven engineering (MDE), model driven
Architecture (MDA), component-based approach, Learning Management System (LMS). |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
A FRAMEWORK OF KNOWLEDGE PERSONALIZATION IN MOBILE LEARNING |
Author: |
SHEE YING TOH , NORRIS SYED ABDULLAH , SURAYA MISKON1, AZIZAH ABDUL RAHMAN ,
HADINA HABIL |
Abstract: |
Mobile devices usage has grown significantly in the last decade. With the advent
of mobile technology, mobile devices have transformed people lifestyle including
learning style. Mobile learning uses mobile technologies to carry out learning
process. Typically, mobile learning involved individual learning with less or
without teachers supervision and guidance. This means that the learners need to
manage their knowledge on their own. However, not all learners have similar
learning ability and behaviour. The ways they manage their knowledge are
different. Hence, offering knowledge personalization to learners is needed to
ease the knowledge management in mobile learning context of the learners.
Motivated by the lack of research on knowledge personalisation in mobile
learning domain, this paper proposes a framework of the knowledge
personalization in mobile learning. The framework was developed based on
literature analysis conducted on existing personalization research in e-learning
domain or other similar domain. The resulted framework consists of three main
elements, namely context, content, and learner. This framework can be used as
guidance by mobile application developer to produce application that is tailored
to learners needs. |
Keywords: |
Personalization, Mobile Learning, Knowledge Management, Framework Development,
Systematic Literature Review |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
BARRIERS TO THE UPTAKE OF E-PROCUREMENT IN THE NIGERIAN BUILDING INDUSTRY |
Author: |
EGIDARIO B. ADUWO, EZIYI O. IBEM; OBIOHA UWAKONYE, PATIENCE TUNJI-OLAYENI,
EMMANUEL K. AYO-VUAGHAN |
Abstract: |
Although the uptake of e-Procurement technologies and processes by businesses
and organizations has been very impressive in the developed countries, the same
cannot be said in many developing countries where the uptake of e-Procurement is
rather slow and low. This study investigated the barriers to the uptake of
e-Procurement using data derived from a questionnaire survey of 213 consulting
firms, contractors, client organizations and government establishments in the
Nigerian building industry (NBI). The data were analyzed using descriptive
statistics, factor and multiple regression analyses. The result shows that the
two factors with the most significant adverse effect on the uptake of
e-Procurement were the high investment cost, and lack of technical expertise
required in setting up e-procurement technologies and processes. Difference
between how the researchers and practitioners understood the barriers to the
uptake of e-Procurement was observed. Technical, infrastructure, political,
social, and cultural issues; the lack of evidence of the benefits of
e-Procurement in the building industry; and lack of top management support were
the three strongest predictors of low uptake of e-Procurement by the
organizations surveyed. The study suggests that to ensure a critical mass uptake
of e-Procurement and maximization of its benefits in the procurement of building
works, services and materials in Nigeria, there is a need for concerted effort
by all stakeholders in the industry to eliminate the barriers identified in this
research. |
Keywords: |
E-Procurement, Barriers, Building Industry, Questionnaire Survey, Nigeria |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
HBASE BULK LOADING JOB SCHEDULER FOR MULTI USER ACCESSIBILITY |
Author: |
S. LIKHITHA, D.RAJESWARA RAO |
Abstract: |
While the utilization of Map Reduce methods, (for example, Hadoop) for broad
data research has been normally known and investigated, we have of late seen an
impact in the quantity of strategies made for thinking data giving. These more
recent techniques deal with cloud OLTP programs, though they typically do not
support ACID dealings. HBase is an open-source distributed NoSQL store that is
commonly used by many Internet businesses to manage their big information
processing programs (e.g. Face book or MySpace manages an incredible number of
information each day with HBase). Optimizations that can improve the efficiency
of HBase are of vital passions for big information programs that use HBase or
Big Table like key-value shops. In this document we research the problems
natural in mis-configuration of HBase groups, such as circumstances where the
HBase standard options can lead to inadequate efficiency. We create HConfig, a
semi automated settings administrator for improving HBase system efficiency from
several measurements. Due to the space restriction, this document will
concentrate on how to improve the efficiency of HBase information loading
machine using HConfig. Through this research we believe that the significance of
source flexible and amount of work aware auto-configuration management and the
design concepts of HConfig. Our trial results show effective group map
decreasing in information research in database integration. |
Keywords: |
Measurement, Performance, Bulk Loading; Optimization; Big Data, HBase
Configuration |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
AN EFFECTIVE RESEARCH SUPERVISION MANAGEMENT VIA A MULTI-AGENT SYSTEM |
Author: |
OMAR ABDULLATIF JASSIM, MOAMIN A. MAHMOUD, MOHD SHARIFUDDIN AHMAD |
Abstract: |
One of the challenges in research development is supervision management and its
related activities. Inexperienced supervisors may have difficulties in
recommending the appropriate research activities for their students and the
students may not have the skills in research. Consequently, the main aim of this
study is to develop a supervision management framework that incorporates a
multi-agent system for managing research development. In developing the
framework, the most important development stages are analyzed from the
literature of research development process. The proposed framework consists of
three phases which are Research Development Activities, Performance and
Completion Measurement, and Tracking Activities. The components of the framework
are discussed as possible implementation for a general application of research
supervision management. The proposed framework is validated by 22 experts from
Malaysian, Singaporean, and Jordanian universities. The validation results show
that the proposed framework is useful to manage the supervision activities of
research development. |
Keywords: |
Task Management; Supervision Management; Research Development Activities;
Intelligent Software Agents |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
BUSINESS INTELLIGENCE READINESS FACTORS FOR HIGHER EDUCATION INSTITUTION |
Author: |
NOORADILLA ABU HASAN, SURAYA MISKON, NORASNITA AHMAD, NAZMONA MAT ALI, HASLINA
HASHIM, NORRIS SYED ABDULLAH, ROSE ALINDA ALIAS, MOHD AIZAINI MAAROF |
Abstract: |
Higher Education Institution (HEI) have embarked on the new style of
decision-making with the aim to enhance the speed and reliability of
decision-making capabilities. One of the hardest challenges in implementing
Business Intelligence (BI) is the organizations readiness towards adopting and
implementing BI systems. Currently, few published studies have examined BI
readiness in HEI environment. Seeing this challenge, this study aims to
contribute in determining the BI readiness factors in HEI specifically in the
deployment strategies. Through inductive attention to BI in HEI environment,
three broad factors have been identified: a) Organizational - that concerning on
business strategies, process and structure, b) Technology - involves the BI
system and knowledge for managing including the sources and c) Social - the
culture within organization that may influence decision-making and its
processes. This paper also makes recommendations for future research. |
Keywords: |
Business Intelligence Readiness, Technology Readiness, Business Intelligence in
University, Readiness Factors |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
ASSESSING THE CURRENT STATE OF THE STOCK MARKET UNDER UNCERTAINTY |
Author: |
SIHAM ABDULMALIK MOHAMMED ALMASANI, VALERY IVANOVICH FINAEV, WADEEA AHMED ABDO
QAID, ALEXANDER VLADIMIROVICH TYCHINSKY |
Abstract: |
The article is devoted to development methods and models for the study and
evaluation the current state of the stock market. For example, the stock market
in the Russian Federation. In the stock market, it is very difficult to find the
models to measure the securities prices changes, therefore the assessment
problem the state of the stock market and forecast of its development are
usually solved under conditions of incomplete information. This article presents
the basic assessments such as indexes, the current volume of transactions, the
volatility, capitalization of the stock market and oil prices. We explained the
purpose of them and suggested states for the stock market: stable, transition,
growth, unstable and stagnation. These proposed states of the stock market as
the most corresponding to the real state of market. In this article we used
model to assess the state of the stock market. This model allows us to classify
the possible states of the stock market on the basis of measuring the assessment
as mentioned above. Depending on the basic sets of the values of assessment the
expert gives the linguistic variables, their term-sets and membership functions
of fuzzy sets. The experts give set of the standard situations of the stock
market. The model contains in its structure rules for assessing the current
state of the stock market. The situations assessment model compares between the
actual situations with the standard situations and gives inference about the
state of the stock market at current time. To perform the research we designed
program in an environment Matlab and gave an example of assessing the current
state of the stock market. |
Keywords: |
The Stock Market, Assessing, Incomplete Information, Fuzzy Logic,
Decision-Making. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
SCALABLE TRANSACTIONS USING MONGODB CLOUD DATA STORE |
Author: |
LALITA CHAPLE, DR. SWATI AHIRRAO |
Abstract: |
Cloud computing exists as a rising technology that provides the functionality of
available and highly scalable web applications at extremely low cost. Building a
scalable, available and consistent cloud data store is the challenge now a
days. Scalability is improved by using primary technique that is data
partitioning. Classical, Partitioning strategies are not able to track the
patterns of the web applications. This paper implements workload-driven approach
rest on data access patterns in MongoDB for improving scalability. As observed
from results it generates less number of distributed transactions. Similarly,
implementation and validation of scalable workload-driven partitioning scheme
are accomplished via experimentation over cloud data store (MongoDB). An
experimental outcome of the partitioning strategy is managed by utilizing the
industry benchmark TPC-C. |
Keywords: |
Scalability, Oltp, Data Partitioning, Partitioning Scheme, Workload-Driven |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
DYNAMIC ACCESS CONTROL POLICIES IN SECURE OUR SOURCED DATA IN CLOUD STOTAGE |
Author: |
S.SAMPATH, MR.B.TIRAPATHI REDDY |
Abstract: |
Cloud computing has emerged as maximum influential parameter in actual time IT
enterprise in recent 12 Months configuration for with appropriate occasions in
allotted computing. Out sourced backup data in Third birthday celebration cloud
storage is a successful service to reduce statistics management costs and
security concerns of integrity records of cloud statistics garage. Historically
layout FADE (policy primarily based document assured Deletion), is a practical
deployable of cloud garage machine in covered cloud facts. FADE is built upon
trendy cryptographic techniques with outsourced facts in cloud storage system.
FADE be afflicted by inflexibility in get entry to manipulate of out sourced
data. As a way to recognize scalable and flexible with find grained get
admission to manage in cloud computing. So on this paper we advise to develop
Hierarchical attribute based Encryption (HASBE) by using extending cypertext
guidelines with hierarchical shape of users. We enforce our software in each
green and flexible in handling get entry to control in out sourced records in
cloud computing with complete applications and experiments. Our experimental
results display efficient get entry to control in consumer revocation and grant
permission in real time evaluation of processing cloud packages. |
Keywords: |
Cloud computing, Attribute Based Encryption, Policy based file assured deletion,
Prototype Implementation |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
INVESTIGATIONS ON TASK AND ROLE ASSIGNMENT PROTOCOLS IN WIRELESS SENSOR NETWORK |
Author: |
TITUS. I, SALAJA SILAS, ELIJAH BLESSING RAJSINGH |
Abstract: |
Wireless sensor networks (WSN) have gradually evolved along the years in terms
of hardware, protocols and standards. The multifunctional sensor nodes (MSN)
have improved in terms of power, communication range, memory and battery
capacity. Wide range of WSN applications such as environment monitoring, health
monitoring, military applications, video surveillance, natural disaster
detection, seismic sensing, etc., are based on multifunctional sensor nodes. The
multifunctional sensor nodes are capable of performing similar tasks or roles
with different quality of service parameters. The assignment of roles and task
to the suitable sensor nodes would ensure the increase in performance and
longevity of the network. This paper investigates the various existing task and
role assignment algorithms and also highlights the various research challenges.
The investigations are carried out in terms of computational complexity,
robustness, communication complexity, network lifetime and energy consumed for
task and role assignment algorithms. |
Keywords: |
Task, Role, Task Assignment, Role Assignment, Multifunctional sensor node,
Wireless Sensor Network. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
MAKING MEANING FROM CHILDRENS DIARY DATA: THEMATIC ANALYSIS |
Author: |
NOOR HIDAYAH AZMI, FARIZA HANIS ABDUL RAZAK |
Abstract: |
Children today are different from children of the past. They move to a level
which surprised the earlier generations. They are emerging as an active user of
social networking sites (SNS) who influenced by different experiences that shape
their perceptions and behavior. Thus, their current social behavior is the
important aspects to be explored and investigate. Previous research was
conducted to gain insights about children’s behavior with SNS using probes
diary. In this paper, we were making meaning of the diary data by thematic
analysis, the most common qualitative technique in HCI. By using thematic
analysis, we categorized and coded the data and identified the major themes
among them. This analysis is supported by the ATLAS.ti software tool. The
results show the main themes such as personal information, goals, social
connection, social activities and social emotion. These themes were associated
with significant contribution to explore the behavioral variables of child SNS
behavior. |
Keywords: |
Probes, Diary, Thematic Analysis, Social Networking Sites (SNS) Behavior |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
DETECTION OF BLACKHOLE & GREYHOLE ATTACKS IN MANETs BASED ON ACKNOWLEDGEMENT
BASED APPROACH |
Author: |
Mr. K CHAITANYA, Dr. S VENKATESWARLU |
Abstract: |
A MANET is a choice of flexible locations that are gradually and randomly
organized in the interconnections between locations are prepared for modifying
on stable organization. Because of security disadvantages of the redirecting
techniques, Wi-Fi ad-hoc frameworks are unprotected to attacks of the risky
locations. Normally suggest AODV strategy for black hole recommendation in Wi-Fi
suggestion frameworks. However, because of the open framework and hardly to be
had battery-primarily based power, node misbehaviors may also are available. One
such redirecting bad behavior is that some self-centered nodes will take part in
the route finding and servicing techniques however reject to ahead information
packages. In this document, we suggest the 2ACK plan that provides as an add-on
strategy for redirecting techniques to identify redirecting bad behavior and to
minimize their adverse impact. The simulated results may achieve effective
efficiency in suggested schema. |
Keywords: |
Manets AODV Protocol, DSR Routing Protocol, 2ACK Scheme, Intrusion Detection
Systems. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
FUZZY ORIENTED RISK ASSESSMENT IN ENTERPRISE INFORMATION SYSTEMS |
Author: |
G.MANI BHARAT, Dr. M.SEETARAMA PRASAD |
Abstract: |
Records in corporation infrastructure is greater complex and face a troubles
with threat in employer property increasing workload performance in real time
packages. therefore evaluation of the process identity, and mitigation of
records protection in agency applications may obtain promising concept in facts
security. Traditionally Quantitative statistics protection analysis method
proposed for business enterprise packages in real time facts safety. Specific
technique identifies the chance-vulnerability pair liable for a threat and
computes a chance element similar to every protection property for each asset.
Because of this an assault on one asset can be propagated through the network
and threaten an organizations maximum valuable belongings. Linguistic terms are
used by the experts to represent assets values, dependencies and frequency and
asset degradation associated with feasible threats. Computations are based
totally on the trapezoidal fuzzy numbers associated with these linguistic terms. |
Keywords: |
Information Systems, Risk Analysis, Fuzzy Information Analysis, Enterprise
Information Security |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
COMPARATIVE STUDY OF IC, P&O AND FLC METHOD OF MPPT ALGORITHM FOR GRID CONNECTED
PV MODULE |
Author: |
M. LAMNADI, M. TRIHI, Badre BOSSOUFI, A.BOULEZHAR |
Abstract: |
The photovoltaic (PV) system is one of the renewable energies that attract the
attention of researchers in the recent decades. The PV generators exhibit
nonlinear I-V and P-V characteristics. The maximum power produced varies with
both irradiance and temperature.
Since the conversion efficiency of PV arrays is very low, it requires maximum
power point tracking (MPPT) control techniques. The purpose of this paper is to
study and compare three maximum power point tracking (MPPT) methods in a
photovoltaic simulation system using perturb and observe method, Incremental
conductance method and Fuzzy Logic Control method. MATLAB/Simulink used to
establish an Implementation of MPPT Algorithm for Grid Connected PV module.
This system is developed by combining the models established of solar PV module
&MPPT, DC-DC Boost converter, DC/AC converter. The system is simulated under
different irradiation (between 250 W/m2and 1000 W/m2). Simulation results show
that the photovoltaic simulation system can track the maximum power point
accurately. |
Keywords: |
Photovoltaic System, MPPT, Incremental Conductance Method, Perturb And Observe
Method, Fuzzy Logic Control Method (FLC) And Simulation Results |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
REALIZATION OF FRAME-BASED TECHNOLOGIES IN THE CONTEXT OF EDUCATION
INFORMATIZATION |
Author: |
KULGILDINOVA T.A. , UAISSOVA G.I. |
Abstract: |
The present paper focuses on the problem of using a frame-based theory in the
context of education informatization. The purpose of this research is to define
the role of frame technologies in the educational process and to describe their
characteristics. The importance of this paper is determined by the age of
information technologies, in particular, by the necessity to 'compress' the
teaching material in order to facilitate the interpretation of information by
learners. With the introduction of information technologies in education, there
is an opportunity to create most advanced learning techniques which improve the
assimilation of learning material and allow teachers to pay more attention to
the individual and personal growth of students and to direct their creative
development. Frames underlie the structure of e-books, tablet PCs and
smartphones, and they are necessary for self-education and the development of
the ability to work independently. It was found that the frame-based technique
used by the teacher skillfully directs students to text reproduction, text
formation and text perception, i.e. teaches to analyze the received educational
information. Frames allow to manipulate both declarative and procedural
knowledge. |
Keywords: |
Computerization, Informatization, Information Technologies, Frame, Slot |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
FORECASTING OF LEAD ACID BATTERY CAPACITY BASED ON LEVENBERG MARQUARDT NEURAL
NETWORK |
Author: |
B. S. KALOKO, M. UDIN, A. H. LOKA |
Abstract: |
One of the discussion in the research of electric vehicle is the energy source
or battery. Due to mature technology, environmental friendliness, and low cost,
the lead acid battery has been widely accepted in electric vehicle. It is
necessary to forecast battery capacity in electric car in order to know when the
time to recharge the battery or replace it. The Levenberg Marquardt algorithm is
chosen to adaptively optimize weights at each epoch so as to accommodate
time-varying system conditions. In a state of nominal current of 1.2 A, battery
discharge graph has 1.8617 Ah and 1.55 hours compared to simulation results 2 Ah
and 1.38 hours thus 10.96 % of error is obtained. When the load is 8 W, showed
1.5 Ah of battery capacity and 3.1 hours with small error 1.58 % compared to the
current load on the nominal load is equal to 20 W produced a greater error 27.27
% with 1.86 Ah and 0.8 hours. This means that the system made it would be better
if used under a nominal load of the above nominal load. But it needs to design
better system to maintain more accurate results of the battery capacity and the
time. |
Keywords: |
Capacity of battery, Lead Acid Battery, Artificial Neural Network (ANN),
Feedforward Backpropagation, Levenberg Marquardt |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
MINING EDUCATIONAL DATA TO ANALYZE TEACHING EFFECTIVENESS |
Author: |
ANWAR ALI YAHYA, ADDIN OSMAN, MOHAMED KHAIRI |
Abstract: |
Teaching effectiveness is a multidimensional construct in which teacher
questioning skill is one of its key indicators. This paper explores the
feasibility of applying data mining techniques to analyze teaching effectiveness
using a data set of teachers questions. More specifically, the performance of
nine data mining techniques is investigated for the classification of teachers
classroom questions into the six Blooms cognitive levels. To this end, a data
set has been collected, annotated with Bloom’s cognitive levels, transformed
into a suitable representation, and the data mining techniques have been
applied. The results confirm the feasibility of applying data mining techniques
to analyze teaching effectiveness. Moreover, the results show that the
performances of these techniques vary, depending on the sensitivity of each
technique to the curse of dimensionality problem. Most remarkably, Support
Vector Machine and Random Forest techniques show a striking performance, whereas Adabost and J48 show a sharp deterioration in their performances as the
dimensionality grows. |
Keywords: |
Data Mining, Teaching Effectiveness, Machine Learning, Curse of Dimensionality,
Learning Analytics |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
AUTOMATED DEFORM DETECTION ON AUTOMOTIVE BODY PANELS USING CLASSIFIERS BASED
SEGMENTATION |
Author: |
M. Z. B. EDRIS, M. S. I. M. ZIN, Z. ZAKARIA, M. S. JAWAD |
Abstract: |
Automatic deform detection on automotive body panel is challenging owing to its
localization on a large surface, variation in appearance, and their rare
occurrences. It is difficult to detect these deforms either by physics-based
models or by small-sample statistics using a single threshold. As a result, this
problem is focused to derive a set of good-quality deform detection from the
surface images. These detection should discriminate the various surface deforms
when fed to suitable machine learning algorithms. This research used first order
derivative such as gradient filtering and background illumination removal to
identify the deform area. An algorithm to segment the deform area has been
developed. It localizes deforms employing kernel classifiers, such as Artificial
Neural Network (ANN) and Support Vector Machine (SVM). The test result on
artificial car door with two types of deformations which is ding and dent |
Keywords: |
Deformation Detection, Segmentation, Gradient Filtering, Artificial Neural
Network, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
Title: |
EFFECTIVENESS STUDY ON MULTIMEDIA MOBILE APPLICATION FOR CHILDREN: MFOLKTALES |
Author: |
NORSHAHILA IBRAHIM, WAN FATIMAH WAN AHMAD, AFZA SHAFIE |
Abstract: |
Mobile application has been used widely among children as a supplement for
learning purposes. These handheld technologies such as smart phone and tablet
have been chosen as they are easy to carry anywhere and anytime and easy to get
as they are become cheaper nowadays. Following from that, a mobile application
called MFolktales have been designed and developed for children to promote Malay
folktales to the new generation as Malay folktales became extinct and almost
forgotten. This paper discusses the effectiveness testing for MFolktales
application to measure effectiveness level in students comprehension
performance after using the MFolktales mobile application. In the other hand,
the study also conducted to evaluate the hypotheses to summarize the
relationship between the samples that have been used in the testing. The testing
was conducted among 90 students aged 5 and 6 years old which then divided into
three groups which are control group (CG), experimental group 1 (EG1) and
experimental group 2 (EG2). CG and EG1 are control groups while EG2 is
experimental group. Result from the post-test show that, there is a significant
difference between the post-test means scores of the students in CG, EG1 and
EG2. Results also show that, there is a significant difference between the mean
scores for the students in CG, EG1 and EG2. Thus, MFolktales application can be
considered as effective. |
Keywords: |
Multimedia Mobile Application, Human Computer And Interaction, Quasi Experiment,
Education, Malay Folktales |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2016 -- Vol. 89. No. 1 -- 2016 |
Full
Text |
|
|
|