|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2013 | Vol. 52 No.2 |
Title: |
THE EFFECTS OF QUALITY FACTORS OF WEB-BASED INFORMATION SYSTEM ON THE EMPLOYEE
CONTEXTUAL PERFORMANCE |
Author: |
KAMAL M. H. ALHENDAWI, AHMAD SUHAIMI BAHARUDIN |
Abstract: |
Assessing the effectiveness of Web-based Information System (WBIS) is
increasingly needed as it has a significant contribution to organizations,
particularly on the employee performance. This study is one of the fewest in the
field of WBIS assessment in which the effectiveness of WBIS is assessed in terms
of contextual performance. It aims at evaluating the impact of quality factors
of WBIS: system quality, information quality and service quality on the
employee’s contextual performance. The study is conducted in Palestine, Gaza.
The data of the pilot study is collected from 51 of WBIS users. Concerning the
statistical inferential and analytical tests, correlation and regression
analysis are used to analyze the data and obtain the results. The findings
indicate that there are strong correlations between study factors. However, it
is found that system quality is not significantly related to contextual
performance. Also, the findings indicate there are significant relationships
between information quality, service quality and contextual performance at
significance level less than 0.05. Consequently, the proposed model would
contribute to literature gap and empirical studies in the field of IS
effectiveness assessment. |
Keywords: |
Web-based Information System (WBIS), IS Effectiveness, Information quality,
Service quality, System quality. |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMPROVING WEB SERVER PERFORMANCE USING TWO-TIERED WEB CACHING |
Author: |
FAIRUZ S. MAHAD, WAN M.N. WAN-KADIR |
Abstract: |
The purpose of this study is to improve the web server performance. Bottlenecks
such as network traffic overload and congested web server has still yet to be
solved due to the increasing of internet usage. Caching is one of the popular
and efficient solutions to reduce network latency. However, there is a need to
study the current caching technique and further optimize the result. Therefore,
this study proposed a Two-Tiered Caching System (2TCS). The 2TCS adapts a
selective caching system concept which contains two tiers in its caching
architecture. The 2TCS is used to further increase the probability of achieving
a cache hit on top of utilizing the normal caching system. The proposed
technique utilizes SQUID as its web cache server and also Mozilla Firefox’s
default caching system at the client side. A performance comparison of a normal
caching system against the implementation of the 2TCS is made using the IBM
Rational Performance Tester to prove the result. |
Keywords: |
Web cache, Two-tiered caching, Web Server Performance, Software Engineering |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
KM SYSTEM IN THE CONSTRUCTION FIELD: INVESTIGATING NEW KNOWLEDGE RESOURCES |
Author: |
ZAYED KHALIFAAUTHOR, MOD.YUSOFF JAMALIDDIN, HAFIZAH HUSAIN |
Abstract: |
Managing knowledge in the construction field is an ongoing research topic.
Although many methods have been proposed for managing knowledge in the
construction field, the following issues remain unclear: what knowledge
resources are, what the optimal knowledge representation is, and what knowledge
sharing means. In this paper, a novel approach for managing knowledge in the
construction field is proposed. Our contributions in this paper include the
definition of new knowledge resources by acquiring and representing immature
knowledge, and acquiring and representing external knowledge (i.e., knowledge
not related to the company or the engineer himself). Our proposed approach has
been validated through an online system, which is currently used by one of the
largest construction companies in Libya. |
Keywords: |
KM System, Knowledge Objects, Construction Industries, Knowledge Resources |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
LP-NORM SVM BASED ON REWEIGHED MINIMIZATION WITH POSITIVE DAMPED ITEM |
Author: |
HUANG HAILONG, LIU JIANWEI, LIU ZEYU , ZUO XIN |
Abstract: |
A new kind of reweighed Lp-norm SVM, which solves simultaneously two major
problems pattern classification and feature selection, based on positive damped
item is proposed. The proposed algorithms attempts to select important features
among the originally given plausible features, while maintaining the minimum
error rate. The resulting value of variable p is not only related to the
classification error rate but also connected to the degree of importance of
feature. A convergence proof of this reweighed procedure is included and an
efficient stopping criterion is employed. Different sets of experiments are
conducted on the classification and feature selection tasks, and results
compared with L2-norm SVM, and L1-norm SVM show that, our Lp-norm SVM algorithm
is superior to these algorithm on both artificial datasets and real-world
problems of analyzing DNA microarray data. |
Keywords: |
Reweighed Minimization, P Norm, Feature Selection, Prediction Error Rate |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
PNN BASED DRIVER DROWSINESS LEVEL CLASSIFICATION USING EEG |
Author: |
MOUSA K. WALI, M.MURUGAPPAN, R. BADLISHAH AHMMAD |
Abstract: |
In this work, we classify the driver drowsiness level (awake, drowsy, high
drowsy and sleep stage1) based on different wavelets and probabilistic neural
network classifier using wireless EEG signals. Deriving the amplitude spectrum
of four different frequency bands delta, theta, alpha, and beta of EEG signals.
Comparing the results of PNN based on spectral centroid, and power spectral
density features extracted by different wavelets (db4, db8, sym8, and coif5)
from the amplitude spectrum of the said bands. As results of this study
indicates that the best average accuracy achieved of 61.16% based on power
spectral density feature extracted by db4 wavelet. |
Keywords: |
Discrete Wavelet Transform, EEG, Fast Fourier Transform, probabilistic neural
network |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
UNDERWATER IMAGE ENHANCEMENT USING ADAPTIVE FILTERING FOR ENHANCED SIFT-BASED
IMAGE MATCHING |
Author: |
PULUNG NURTANTIO ANDONO, I KETUT EDDY PURNAMA, MOCHAMAD HARIADI |
Abstract: |
Success of scale-invariant feature transform (SIFT) image registration is
limited when attempted on camera footage taken under water. This is, largely due
to the poor image quality inherent to imaging in aquatic environments. In this
research we aim to overcome this shortcoming using a new method of
pre-processing of true-color imagery taken under water based on the Contrast
Limited Adaptive Histogram image Equalization (CLAHE) algorithm. CLAHE assumes
that the distribution function of the pixel intensity values of an
underwater-recorded image is dominated by Rayleigh scattering, and that the
noise can be removed as a function hereof. Results showed that after applying
the CLAHE image enhancement method registration success of SIFT increased by 41%
compared to reference method (a straightforward contrast stretching
enhancement). From the ANOVA results follows that the null hypothesis can be
rejected and concluded that there is a significant difference among SIFT without
enhancement, SIFT with contrast stretching and SIFT with CLAHE-Rayleigh at 5%
level of significance (ANOVA, F=23.41, df=2, p-value=7.34e-09). The finding
concludes that CLAHE-Rayleigh is better compared to contrast stretching. As a
follow-up study, CLAHE-Rayleigh should be compared with other image enhancement
techniques (or a combination of techniques ‘hybrids’) to assess their relative
impact on the success of SIFT-based image matching of underwater photography. |
Keywords: |
CLAHE, Image Enhancement, Image Registration, Underwater Image Processing, SIFT. |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
RELATIONSHIP BETWEEN SOCIAL INFLUENCE AND VIDEO CONFERENCING USE: THE MODERATING
AND DIRECT EFFECT OF CULTURAL FACTORS IN JORDAN |
Author: |
AYMAN N. ALKHALDI, ZAWIYAH M. YUSOF |
Abstract: |
User’s perceptions and beliefs are known for their role in technology
acceptance. Studies examining the effect of cultural values along with social
influence in technology acceptance are rare. They focus on various types of
technologies, contexts, and types of users yielding inconsistent and
contradictory findings. No studies have been undertaken to research
video-conferencing usage, particularly in Jordan. This study seeks to develop a
conceptual model for examining the moderating and direct effect of both
individualisms versus collectivisms and power distance cultural dimensions on
the relationship between social influence and video conferencing usage in
Jordan. The survey method adopts questionnaires as a technique to collect
quantitative data. The collected data was analysed using SPSS. The findings show
that social influence has a significant direct role on increasing
video-conferencing usage. Furthermore, individualisms versus collectivisms were
found to increase the video-conferencing use, whilst power distance was found to
decrease it. However, they do not moderate the effect of social influence on
video-conferencing use. This paper has important implications on both
theoretical and practical portions of video-conferencing usage in manufacturing
firms in Jordan. |
Keywords: |
Social Influence, Hofstede’s Cultural Dimensions, Video-conferencing, Technology
Acceptance Model (TAM), Jordan |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN OVERVIEW ON WORMHOLE ATTACK DETECTION IN AD-HOC NETWORKS |
Author: |
MOJTABA GHANAATPISHEH SANAEI, BABAK EMAMI ABARGHOUEI, HADI ZAMANI, MIRANDA
DABIRANZOHOURI |
Abstract: |
An ad-hoc network is a group of wireless mobile nodes that shapes a temporary
network without any infrastructure and centralized management. Each mobile node
functions not only as base station but also as router forwarding packets for
other mobile nodes in the network. One of the dangerous attacks in an Ad-hoc
network is named wormhole attack which two or more destructive nodes record the
packets at one point, and transmits them by a wired or wireless to another point
in the network. Wormhole attack is so strong and detection of this attack is
hard. Also, the wormhole attack may cause another type of attacks like Sinkhole
or Select forwarding. Using a cryptographic technique is not enough to prevent
wormhole attack. In this paper we are going to review some methods in wormhole
detection and investigate the weaknesses and strengths of the methods. |
Keywords: |
Wormhole Attack detection, Wireless Ad-hoc Networks, prevention of wormhole
attack, Mobile Ad-Hoc Network |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
A CLOUD COMPUTING METHODOLOGY FOR INDUSTRIAL AUTOMATION AND MANUFACTURING
EXECUTION SYSTEM |
Author: |
M.GIRIRAJ, S.MUTHU |
Abstract: |
In this paper we investigated guaranteeing the assembly process information flow
in real time, enterprise wide, from assembly station sensors directly to the
company policy maker’s offices, is the true solution for improving productivity
competence, reducing bottlenecks movements, optimization of supply chain
network, identify missing operations in the floor process and more over reducing
losses and greater profits than ever. In fact, the ideal production lies in the
real machine or assembly capabilities of working non-stop at maximum speed,
lacking downtimes or inactivity and assembled goods reject threats. Assembly
lines will be prone to stand-still and will produce defective pieces if the
machines are unable to working to their full capability or demands made of them.
This is often the case of misinformed factory management on real time factory
floor performances. Even though equipped with original equipment manufacturer
indicator knowledge about their systems, they still can’t get that efficiency so
needed to improve yield. Transformation is necessary to ride the expected tide
of change in the current manufacturing environment, particularly in the
information technology and automation landscape. Multinational company’s strives
to reduce computing costs, to improve plant floor visibility and to achieve more
efficient energy and surroundings use of their IT hardware and software
investments. Cloud computing infrastructure accelerates and promotes these
objectives by providing unparalleled flexible and dynamic IT resource
collection, Virtualization, floor visibility and high accessibility. This paper
establishes the value of realizing cloud connect and usage state of affairs in
the cloud manufacturing environment, especially in automotive assembly stations
which typically have large numbers of mixed applications, various hardware and
huge data amount generated from sensors and devices in real-time and event-based
exploration and assembly operations. The purpose of this paper is to behavior an
Information Technology automotive assembly environment Systems analysis in the
case of MNC’s. To validate this objective, the article has been divided into two
parts: monitoring vision and control and case study with the help of the
manufacturing execution assembly system. The purpose of the theory part of the
study is to first introduce the concept of Cloud connect in the respective field
of manufacturing execution assembly system, and then chat about the substance of
Service management in information technology. |
Keywords: |
Cloud computing, Cloud manufacturing execution system, monitoring vision and
control, Shop floor data collection, Programmable logic controller. |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
TOPOLOGY CONTROL ALGORITHM FOR BETTER SENSING COVERAGE WITH CONNECTIVITY IN
WIRELESS SENSOR NETWORKS |
Author: |
A.KARTHIKEYAN, T.SHANKAR, V.SRIVIDHYA, SIVA CHARAN REDDY.V, SANDEEP KOMMINENI |
Abstract: |
The Wireless Sensor Network (WSN) consisting of a large number of sensors are
effective for gathering data in a variety of environments. Since the sensors
operate on battery of limited power, it is a challenging aim to design an energy
efficient routing protocol, which can minimize the energy and thereby extend the
lifetime of the network. However, in the context of Wireless Sensor Networks
routing, Connected Dominating Set (CDS) principle has emerged as the most
popular method for energy efficient topology control (TC) in WSNs. A virtual
backbone is formed in a CDS-based topology control technique, which allows
communication between any arbitrary pair of nodes in the network. In this paper,
we present a CDS based topology control algorithm, TC1, which forms an energy
efficient virtual backbone. In our simulations, we compare the performance of
TC1 with three prominent CDS-based algorithms namely energy-efficient CDS (EECDS),
CDS Rule K, A3 and A3 Lite algorithms. The results demonstrate that TC1 performs
better in terms of Residual Energy and other selected metrics. Moreover, the TC1
not only achieves better connectivity under topology maintenance but also
provides better sensing coverage when compared with other algorithms. |
Keywords: |
Wireless Sensor Network (WSN), Connected Dominating Set (CDS), Topology Control
(TC). |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
KERNEL LEVEL HARDWARE BASED SINGLE CHIP COMPUTER AND DEVICE CONTROL |
Author: |
DR.M.P.CHITRA, DR.N.R.SHANKER, B.PREETHI, M.SANU MURUGAN, M.SOUNDARYA |
Abstract: |
In this paper the implementation of a kernel level hardware based single chip
computer and device control has been proposed. The dc motor control based on the
concept of PWM using the 8bit microcontrollers-Arduino has been analysed. The
Arduino have no operating system and the toolkits such as Arduino IDE, Eclipse
is used. The programming language that the Arduino supports is C++. The speed of
Arduino is low about 16MHz and the RAM space is only 2 Kbytes. The Arduino have
no USB ports. The drawbacks of the 8bit microcontroller are overcome by using
the 32bit microcontroller, Raspberry Pi which uses the Linux kernel-based
operating systems. In the Raspberry Pi the toolkits such as Scratch box, QEMU,
Open Embedded is used. The programming language used in Raspberry Pi is Python
language. Unlike Arduino the programming language in Raspberry Pi is not
restricted only to C or C++, any language which can be compiled by ARMv6 can be
used. The AM space is about 256 MB and it has two USB ports. The Raspberry Pi
has audio input via USB.The speed of Raspberry Pi is increased to about 700 MHz |
Keywords: |
Arduino, Broadcom BCM2835, Debian, Linux, Raspbian Distro, RTAI, RTLinux-THIN |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE IMPACT OF ERP SYSTEM ON USER PERFORMANCE |
Author: |
BEJJAR MOHAMED ALI, BOUJELBENE YOUNES |
Abstract: |
ERP systems play an important supportive role in most sectors of the economy.
This study was developed to answer the question related to the impact of ERP
systems on user performance in Tunisian companies. This article proposes a model
combining the Task Technology Fit (TTF), the Technology Acceptance Model (TAM)
and Delone & McLean model to evaluate the user performance of ERP system. The
model was tested using survey data collected from 269 users of the ERP system.
The results of structural equation analyzes supported the proposed model and
highlighted the important role of perceived ease of use and perceived usefulness
in mediating effects between TTF, system quality and information quality and
performance users.
The results show that TTF, system quality and information quality directly
influences the user performance of ERP and indirectly through perceived
usefulness and perceived ease of use of ERP. |
Keywords: |
ERP, System quality, Information quality, User performance |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE APPLICATION OF ANT COLONY OPTIMIZATION ALGORITHM IN TOUR ROUTE PLANNING |
Author: |
HAN-CHEN HUANG |
Abstract: |
Traditional tour route planning mostly depends on the planner’s experience.
However, whether tour route planning is appropriate or not has a considerable
impact on the time and cost of the tour. Good planning can save unnecessary
waiting time, avoid wasted operating costs, and contribute to the enhancement of
the quality of tourism. Therefore, this study applied the ant colony
optimization algorithm to build a tour route planning model. As the empirical
results have shown, the proposed tour route planning model can effectively and
rapidly complete route planning and achieve the objectives of optimum route and
minimum cost. |
Keywords: |
Ant Colony Optimization algorithm, Tour Route, Planning |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
SIMULATION AND OPTIMIZATION OF INTEROPERABILITY PLANNING |
Author: |
NORELISLAM EL HAMI, ABIR ELMIR, BADR ELMIR, RACHID ELLAIA, MHAMED ITMI, BOUCHAIB
BOUNABAT |
Abstract: |
Optimizing Resource allocation and effort dispatching of interoperability
enhancement is a key requirement to effectively setup, develop and evolve intra
and inter organizational collaboration. To ensure this objective of
effectiveness, this paper proposes initially an approach for representation of
interoperability evolution and planning. Interoperability degree is assessed
using a ratio metric taking into account all the significant aspects such as
potentiality, compatibility and operational performance. In a second stage, a
Modified Particle Swarm optimization (MPSO) algorithm is used as a heuristic
optimization method to find the best distribution of effort needed in
collaborative networks. |
Keywords: |
Interoperability planning, Effort dispatching, Simulation, Particle Swarm
optimization |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
REDUCING REPLICA OF USER QUERY CLUSTER- CONTENT AND SUB-HYPERLINKS IN THE SEARCH
ENGINE LOG BASED USER PROFILE |
Author: |
P.SRINIVASAN, K.BATRI |
Abstract: |
Most important visible component of the internet contains millions of web pages
waiting to present information on an amazing collection of topics. The search
engine has played an increasingly important role. Nowadays, the search engine
based string matching has inbuilt troubles like a low accuracy, inadequate
individual support, duplicates document and replica of hyperlinks in the user
profile and so on. This work introduced a method against previously proposed
personalized query clustering method by other authors. Experimental results show
that a profile captures and utilizes both user’s replica and non- replicated
cluster-content and links. The non replica of hyper, sub-hyperlinks and
cluster-content perform the best of among results. An important result from the
experiments is that profiles with replica of links can increase the separation
between similar and different queries. The separation provides a clear threshold
value for a LINGO clustering algorithm to terminate and improve the overall
quality of the resulting query clusters and hyper, sub-hyper links to improve
search engine performance through user profile. |
Keywords: |
search engine, user profile, replica, hyperlinks, sub-hyperlinks |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
ACCELERATING SIGNATURE-BASED BROADCAST AUTHENTICATION IN DECENTRALIZED WIRELESS
SENSOR NETWORKS |
Author: |
NOURAH AL-ANGARI, MZNAH AL-RODHAAN |
Abstract: |
Securing the broadcast in wireless sensor networks (WSNs) is crucial due to a
wide range of possible attacks in addition to the limited resources in sensor
node. Many public-key based solutions have been proposed to address the
authentication problem in WSN. Unfortunately the slow in signature verification
process cause many weaknesses related to the delay and power consumption.
Additionally, the dependency on the base station in the certifying the public
keys leads to one failure point and bottle neck problem. Also, the node near the
base station will take additional role to reroute the packets to the base
station which consume their limited power. In this paper we present a new idea
that utilizes the signature-based broadcast authentication to accelerate the
signature verification and minimize the base station dependency by allowing
sensors sign on other sensor public key. |
Keywords: |
Public key, Elliptic Curves Cryptography; wireless sensor networks; symmetric;
web of trust |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
TOWARD THE MATURITY OF SOFTWARE ENGINEERING: UNIVERSAL, FORMAL, AND MATHEMATICAL
DEFINITION FOR TYPE AND OBJECT AS TWO DISJOINT BASIC CONCEPTS |
Author: |
BERNARIDHO I HUTABARAT, KETUT E PURNAMA, MOCHAMAD HARIADI |
Abstract: |
Software engineering has not reached maturity level as classic engineering.
Theoretical foundation for software engineering lacks the precision and
universal agreement of terms. By contrast, classic engineering are founded on
the seven base dimensions that are precise and universally agreed.
This paper aims to bring software engineering into maturity, in terms of the
precision of terms by establishing and mathematically defining two basic
concepts: type and object. Just like the seven base dimensions in physics be
part of theoretical foundation for classic engineering, the two basic concepts
type and object are the theoretical foundation for software engineering.
This paper lists twelve problems with current definitions of type and object.
The proposed definition and concepts are linguistically tested and
mathematically formulated using thirty five formulas. Each concept – type,
object – is unique and has single interpretation. This paper shows that class is
a derived concept – not a basic concept – and that class can be defined on the
proposed disjoint basic concepts: type and object. |
Keywords: |
Type, Object, Conceptual Integrity, Basic Concept, Engineering |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
|
|