|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2015 | Vol. 82 No.2 |
Title: |
ENRICHMENT AND POPULATION OF AN EDUCATIONAL ONTOLOGY FROM A CORPUS OF
MATHEMATICAL ANALYSIS |
Author: |
IMANE LMATI, HABIB BENLAHMAR, NACEUR ACHTAICH |
Abstract: |
The automatic populating of ontologies from pedagogical textbooks is very hard
treatment. Several scientific studies are looking to implement solutions based
on linguistic tools to automatically or semi-automatically enrich the ontology
by the natural language of mathematical text. But there are still difficulties
for the extraction of the meaning of mathematical expressions and their
relationships. We present in this paper a methodology for populating of
Math-Bridge ontology from the mathematical content of analysis, whose goal is
the automatic generation of mathematical exercises from ontology populated. The
idea is to use lexical and syntactic patterns for extraction and decomposition
of instance attributes into linguistic propositions. A syntactic and semantic
comparison of attributes allows extracting semantic relations using WordNet
ontology for the textual part and Abstract Syntax Tree AST for the logic part. A
first implementation for textual part was developed in JAVA, Framework Jena, and
SARQL engine for displaying ontology. We envisage in the further research to
develop the second part of the prototype (Logical part). |
Keywords: |
Ontology, Population, Semantic Web resources, Information Extraction,
Enrichment. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
SECURE DATA IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION |
Author: |
YASMINA BENSITEL, RAHAL ROMADI |
Abstract: |
The emergence of cloud computing and cyber-physical systems made of security in
processing data a major challenge. In order to ensure privacy and
confidentiality of the data being manipulated, the use of cryptography is widely
used today. In 2009, C. Gentry proposed the first fully homomorphic
cryptosystem, to perform calculations on data previously encrypted without
having to decrypt. This progress has allowed the opening of many industrial and
research perspectives. However, despite recent progress, many limitations remain
today on the lack of performance of these systems and their strong memory
requirements. In this paper we focus on cloud computing along with its various
security and privacy issues, we describe the role of homomorphic encryption
scheme for ensuring data privacy and compare its types based on different
characteristics. |
Keywords: |
Cloud computing, Homomorphic encryption, Data privacy, Confidentiality, Security |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
DEVELOPMENT OF THE METHODS AND TECHNOLOGIES FOR THE INFORMATION SYSTEM DESIGNING
AND IMPLEMENTATION |
Author: |
BORANBAYEV S.N., NURBEKOV A.B |
Abstract: |
The article is devoted to the development of methods and technologies for the
designing and development of the information systems. The implementation of the
developed methods and technologies forinformationsystem designing and creation
will enable to regulate the modeling process and collect in the course of its
implementation formalized information to plan the stages of the designing, to
provide functionalcompleteness and logical integrity of their results. |
Keywords: |
Model Method, Designing, Information System, Technology, Network |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
DIVERSITY ENHANCEMENT IN COMMUNITY RECOMMENDATION USING TENSOR DECOMPOSITION AND
CO-CLUSTERING |
Author: |
MORTEZA RASHIDI KOOCHI, AB. RAZAK CHE HUSSIN, HALINA M. DAHLAN, SAREH RASHIDI
KOOCHI |
Abstract: |
The major aim of Recommender System is to provide appropriate items for user,
based on his preferences and intuitively be assessed with accuracy based metrics
like precision and recall. Though, diversity of recommended lists is a new
emerging debate in RS evaluation. This work tries to improve diversity of
community recommendation, using membership as main and tag collection as
complementary resource. With exploiting Tensor Decomposition and using Latent
Semantic Analysis, communities can be represented in latent topics, based on
different modes including member-users and tag-collections. As the main
contribution, this work applies diversification on recommended list in different
modes, based on intuitive idea that, communities can be differ from different
points of view such as membership, or tag collections. Experimental results
accomplished on a Flicker dataset show the meaningful improvement in aggregate
diversity (for the system) with less accuracy-loss comparing to current methods;
moreover it also shows improvements in intra-list diversity (for single user)
which is neglected in previous works. As a result, clustering the communities
with similar users, or tags, gives the opportunity to diversify the recommended
lists to cover more diverse communities with different member users, or
different tag content, and this multi-mode diversity lead to better list for
user and better coverage for system. |
Keywords: |
Recommender System, Community Recommendation, Diversity, Coverage, Tensor
Decomposition, Co-clustering |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
OPTIMIZING SENSITIVITY AND SPECIFICITY OF ENSEMBLE CLASSIFIERS FOR DIABETIC
PATIENTS |
Author: |
MOKHAIRI MAKHTAR , MOHD KHALID AWANG, M NORDIN A RAHMAN, SYED ABDULLAH FADZLI,
MUMTAZIMAH MOHAMAD |
Abstract: |
Predicting the right class for a certain disease in the medical-related field is
very critical. The effects of misclassification of the class could be very risky
because it may lead to the mistreatment of the patient. The most important
classification performance measurements in medical fields are sensitivity,
specificity and accuracy. This research aims to focus on the relationship
between these three measurements. Misjudgements in classifying a person to a
particular disease will prevent him/her from getting the correct treatment.
Thus, the accuracy in classifying such medical data should be at the highest.
Nevertheless, the most significant measurement is to have the highest
sensitivity, because this will show that the classifier correctly classifies the
patient who had a positive symptom of a particular disease. By using a single
classifier, it is impossible to get the highest sensitivity. Thus, this paper
proposed an ensemble method that aimed to increase the sensitivity as well as to
improve the accuracy of the classification. The proposed method optimises the
three performance measures by giving weights that composed of the proposed
objective function. The results showed that the ensemble method is significant
to achieve the highest accuracy of 76% with 84% sensitivity and 63% specificity
for diabetic dataset from UCI medical data repositories. |
Keywords: |
Ensemble Classifiers, Classification Model, Medical Dataset |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
SIMULATION OF MEDICAL DATA COMPRESSION AND TRANSMISSION THROUGH WLANS |
Author: |
MUSTAFA ALMAHDI ALGAET, ZUL AZRI BIN MUHAMAD NOH, ABD SAMAD BIN HASAN BASARI,
ABDUL SAMAD SHIBGHATULLAH, ALI AHMAD MILAD, AOUACHE MUSTAPHA |
Abstract: |
Therefore, the main objective of this study is to develop a new simulation
application for medical data compression and transmission based Wi-Fi IEEE
802.11 with high robust in term of image quality endurance to noise caused by
transmission signal. The development of two main modules, namely, Wi-Fi
transmission and medical data compression modules is required to achieve this
objective. The focus of the study is to find a new method of medical data
compression that has good ability to transmit the medical data even though any
noise occurs during data transmission. The Wi-Fi transmission module was
developed based on IEEE 802.11b protocol in 1 Mbsp data size transmission. The
medical data compression modules were developed based on shared dictionary data
between sender and receiver part. The shared dictionary was computed by
Independent component analysis (ICA) using each type of medical data. In this
study, tree type of data was used to generate shared dictionary: natural image,
ultrasound image and fundus image. The performance evaluation includes two parts
for the measurement of the error during simulation. First, the performance
results related to the transmitted and received data similarity that represented
by an error bit. The second performance results are regarded as the similarity
between original image before and after transmitted that computed using a peak
signal noise ratio (PSNR). The developed compression shows promising results
with a capability of restoring image with PSNR 30 dB using medical image. In
conclusion, this research has achieved its stated goal of developing a
simulation application for medical data compression and transmission based Wi-Fi
IEEE 802.11b. |
Keywords: |
DCT, SPIHT, PCS, ICA, MEDATA-SIM, Medical Image Compression |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
A NOVEL FUZZY BASED BACKGROUND SUBTRACTION FOR DYNAMIC SCENES |
Author: |
V. KAMATCHI SUNDARI, M. MANIKANDAN |
Abstract: |
Detection of moving objects in video streams is the initial relevant step of
knowledge in several computer vision applications. Background Subtraction is
widely used as the basis for moving object extraction and tracking in video
sequences. For this, most of previous strategies rely on the idea that the
background is static over short period of time. On the other hand, video
sequences with dynamic background such as waving leaves, rippling water are not
easy to process and it leads to poor extraction of foreground objects. In this
paper, a completely unique thin Background Subtraction algorithmic program for
scenes with dynamic background is planned to solve this drawback, which uses
fuzzy color histogram in which Fuzzy C Means Clustering (FCM) module is based on
correlation method and this can also be applied to medical image applications.
Experimental results give substantiating proof that the proposed technique is
effective for Background Subtraction to track the moving object in Dynamic
texture scenes. |
Keywords: |
Background Subtraction (BS), Clustering-based feature, Fuzzy C Means Clustering
(FCM), Fuzzy Color Histogram (FCH), Image Segmentation, Pixel Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
ANALYSIS OF CLOUD SERVICES INTEGRATION WITH ENTERPRISE INFORMATION SYSTEMS |
Author: |
TEYKHRIB ANTON PAVLOVICH, TEYKHRIB GENRIKH IVANOVICH |
Abstract: |
This paper reviews problem and different solutions designed for integration of
cloud services with enterprise information systems. Paper gives special
attention to cloud communication service and describes different types of
enterprise information systems. As result, this paper determines mashups as a
best solution for such kind of integration. |
Keywords: |
Cloud Integration, Enterprise Integration Solutions, Integration Problems, Cloud
And Enterprise Integration |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
ORGANIZATIONAL CULTURE AND ITS IMPACT ON THE QUALITY OF ACCOUNTING INFORMATION
SYSTEMS |
Author: |
NELSI WISNA |
Abstract: |
This paper examines the impact of organizational culture on the quality of
accounting information systems. The conceptual model using a sample of employees
of the accounting department at several colleges in Bandung. Overall, the
results support the hypothesis that organizational culture affects the quality
of accounting information systems. The results showed that the role of
organizational culture in improving the quality of accounting information system
is an important factor. |
Keywords: |
Culture, Organizational Culture, Information System, Accounting Information
System |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
LAN-BASED APPLICATION OF FILE MANAGEMENT IN THE COMPUTER LABORATORY OF SCHOOL OF
APPLIED SCIENCE |
Author: |
TEDI GUNAWAN, REZA BUDIAWAN |
Abstract: |
Computer laboratory is important infrastructure in supporting the process of
teaching and learning activities at the School of Applied Science of Telkom
University. Lecturers use computer laboratory as an infrastructure in achieving
competence for programming courses that requires practicum by using computer.
The obstacle found in the practicum is an interruption in the internet network.
Lecturers cannot upload the files of learning materials and the results of
students’ competence test. Based on these reasons, an application is built that
can distribute files without the internet network. The application is built by
using the Visual Basic programming language. This research uses the prototype
model of software development. This model is suitable for use as developer and
user can interact during the process of system development, so that the process
of application development is faster and according to the user’s needs. The
features of this application include the files distribution from the server
computer to the client computer, the files retrieval from the client computer to
the server computer, and the inclusion of notifications of files distribution
and retrieval activities. The results showed that this application can
facilitate the practicum activities, which supports the competencies achievement
of programming courses in the computer laboratory of School of Applied Science
of Telkom University. |
Keywords: |
Applications, LAN, File Distribution, Server, Client |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
ROUTING ANALYSIS ON PRESENCE OF FLASH FLOODS IN THE CITY OF BARRANQUILLA |
Author: |
WIGHTMAN PEDRO, DE LA HOZ ALEXIS, MENDOZA FABIO |
Abstract: |
This paper describes the behavior of different routing algorithms under
simulated flash floods conditions in the city of Barranquilla. It was motivated
by the human and economic losses in industry produced by the flash flood
phenomena during heavy rain in the city, a situation that goes back to the early
years of urban planning, but unfortunately so far, it hasn’t been resolved due
high economic costs. This research is related to the design of an autonomous
alert system based on precipitation levels using mobile applications and fixed
signaling through the streets that has been under development for several years
between the Universidad de la Costa and the Sena Barranquilla that could reduce
threats for civil population and reduce the statistics of people killed or
injured by the strong flows of water that goes through the city when rain
appears. |
Keywords: |
Routing, Dijsktra, Flash Floods, PGRouting, Qgis, Barranquilla |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
FEATURE SELECTION, LEARNING METRICS AND DIMENSION REDUCTION IN TRAINING AND
CLASSIFICATION PROCESSES IN INTRUSION DETECTION SYSTEMS |
Author: |
FABIO MENDOZA PALECHOR, ALEXIS DE LA HOZ MANOTAS, EMIRO DE LA HOZ FRANCO, PAOLA
ARIZA COLPAS |
Abstract: |
This research presents an IDS prototype in Matlab that assess network traffic
connections contained in the NSL-KDD dataset, comparing feature selection
techniques available in FEAST toolbox, refining prior results applying dimension
reduction technique ISOMAP. The classification process used a supervised
learning technique called Support Vector Machines (SVM). The comparative
analysis related to detection rates by attack category are conclusive that
MRMR+PCA+SVM (selection, reduction and classification techniques) combined
obtained more promising results, just using 5 of 41 available features in the
dataset. The results obtained were: 85.42% normal traffic, 80.77% DoS, 90.41%
Probe, 91.78% U2R and 83.25% R2L. |
Keywords: |
System Intrusion Detection (IDS), Feature Selection Toolbox (FEAST), Isometric
Feature Mapping ISOMAP, Support Vector Machine (SVM), Principal Component
Analysis (PCA). |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
SECURE NEIGHBOR VERIFICATION PROTOCOL IN WIRELESS MESH NETWORKS |
Author: |
P SUBHASH, S RAMACHANDRAM |
Abstract: |
The main motivation of an attacker is to convince two far away nodes as neighbor
nodes using wormhole attack easily without the knowledge of cryptographic
primitives. Thus, it can significantly degrade the performance of Wireless Mesh
Networks (WMNs). Secure neighbor discovery is a fundamental requirement of
network nodes to ensure secure data communication. An adversary that bypass
neighbor discovery process of a legitimate node using wormhole attack can
disrupt the overlying protocols and applications. In this paper, we propose a
secure neighbor verification mechanism to thwart wormhole attack that can prevent
bogus links from being involved in the network operations. It employs node
ranking scheme to compute relative distance between neighbors and uses
connectivity information to check the genuinity of neighborhood creation. We
evaluate our mechanism using simulation to demonstrate the efficiency in the
presence of wormholes. |
Keywords: |
Secure Neighbor Verification;Wormhole Attack;Bogus Links;Relay Attacks;Wireless
Mesh Network;Ranking Mechanism;Connectivity Information. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
ANALYSIS OF CANONICAL CHARACTER SEGMENTATION TECHNIQUE FOR ANCIENT TELUGU TEXT
DOCUMENTS |
Author: |
N. VENKATA RAO, Dr. A.S.C.S.SASTRY, A.S.N.CHAKRAVARTHY, A.V.SRINIVASA RAO |
Abstract: |
Character Recognition in ancient document images remains a challenging task.
Initial scanning process deforms the document image, while aging process of
document render it ancient which turns it to posses unwanted background noise.
Segmentation includes an essential process in OCR. Complex scripts like
derivatives of Brahmi, encounter various problems in the segmentation process. A
hybrid model that entails segmentation in noisy images followed by binarization
is proposed. In the first phase, segmentation technique for the ancient Telugu
document image into meaningful units is proposed. Horizontal profile pattern is
convolved with Gaussian kernel. The statistical properties of meaningful units
are explored through an extensive analysis of the geometrical patterns of
meaningful units. In the second phase, noisy documents are cleaned with the help
of Modified IGT algorithm and then segmented by using conventional profile
mechanism. The performance of the present hybrid technique is proved by the
results of higher efficiencies for the cleaned documents. The efficiency
analysis of segmentation carried out for the present hybrid technique reveals a
threshold number of Vowels (V), Consonants(C), CV core characters to exhibit
higher efficiencies. It also reflects upon the non-canonical features of any
other marks of the Telugu document. |
Keywords: |
Segmentation, Profile, Gaussian derivative kernel, Modified IGT, Error Rate |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
SENSORS AND SENSOR NETWORK APPLICATIONS |
Author: |
MOHAMMAD M. ALWAKEEL |
Abstract: |
This decade has been characterized by a tremendous interest in sensors and
sensor networks. The renewed interest was the outcome of the advances that
wireless cellular networks have scored such as massive MIMO cooperative
communications, the Internet of Things (IoT) where it is predicted that billions
of devices would be connected to the internet to communicate in some fashion,
and Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the
development of smart sensors. All these and more suggest that sensors will be at
the front and center of most technologies in the future. This paper presents a
review on sensors, their applications as well as their manufacturers whenever
relevant. The work presented can be used to inform any further developments in
the area of sensors as research gears up to meet the challenges of the emerging
technologies. |
Keywords: |
Sensors, Sensor Applications, Conversion Techniques, Sensor's Integration |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
Title: |
SENTIMENT ANALYSIS BASED ON APPRAISAL THEORY FOR MARKETING INTELLIGENCE IN
INDONESIA’S MOBILE PHONE MARKET |
Author: |
ANDRY ALAMSYAH, WIDITA RAHMAH, HERRY IRAWAN |
Abstract: |
The growth of internet has prompt online marketing intelligence activities.
Twitter becomes most popular social media in Indonesia and provides millions of
text data. People share their opinion and emotions by their tweets. This
phenomenon gives an opportunity to conduct a research for sentiment analysis. In
this research we use appraisal theory that can analyze the emotions on the
tweets according to basic descriptions on appraisal theory that include
attitude, graduation and engagement towards products. We apply this theory in
sentiment analysis using Bahasa Indonesia to determine and compare positive and
negative sentiment of popular smartphone products in Indonesia, which is Lumia
and Xperia. We perform calculation based on target and appraisal related, in the
sentences level and the tweets level. The results of this research can be used
as knowledge and consideration for business especially marketing intelligence
field. Based on the calculations, Lumia have more positive results than Xperia. |
Keywords: |
Sentiment Analysis, Appraisal theory, Marketing Intelligence, Twitter, Lumia and
Xperia |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2015 -- Vol. 82. No. 2 -- 2015 |
Full
Text |
|
|
|