|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2016 | Vol. 90 No.2 |
Title: |
CURRENT TRENDS OF COMMUNICATION SYSTEMS IN MEDICAL MONITORING SERVICES: THE CASE
OF WSNS OPERATING SYSTEM DESIGN |
Author: |
MOHAMMED JAMAL AL-MANSOR, KOK BENG GAN |
Abstract: |
Wireless communication services are now in use right across the world and in
particular in the health sector. The need for quality healthcare means that
different individuals have to cooperate through sharing of information and
discussion of patient management. This has led to increased need for quality
information and communication technologies that support such cooperation.
Unfortunately, a lot of interest and investment in information technology has
largely focused on communication systems with very little focus on systems that
apply to medical field. Even adoption of such simple technology as wireless
sensor technology has not taken root in the medical field. This paper therefore
presents studies and reviews of different networks in relation to the OS design
of WSNs for monitoring. |
Keywords: |
Wireless Communication. WSN, OS Design, Zigbee |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
APPLICATION OF INFORMATION-ANALYTICAL SYSTEMS IN MANAGEMENT |
Author: |
SERGEY VLADIMIROVICH SHAYTURA, MARINA GEORGIEVNA STEPANOVA, ALEKSEY SERGEEVICH
SHAYTURA, KONSTANTIN VASILIEVICH ORDOV, NIKITA ALEKSANDROVICH GALKIN |
Abstract: |
The article describes the application of information-analytical systems in the
enterprise management. Examples of application of information-analytical systems
are given. In the first example, an information-analytical system allows making
an optimal choice concerning the enterprise restructuring. In the second
example, an information-analytical system solves the problem of optimal
estimation of the cost of manufacturing a launcher rocket. In the paper, a
methodology of building such systems is presented. The content of the basic
blocks of the system is described. The mathematical apparatus for calculating
the complexity is presented. The system can be used by the specialists of
economic-planning and engineering-technological services and the services
involved in the organization and management of labor. |
Keywords: |
Information, Intelligent Analysis, Big Data, Geodata, Artificial Intelligence,
Methods Of Enterprise Management, Analytical Information System, Automated
Control System. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
WEIGHTING CUSTOMERS DATA FOR MORE ACCURATE SHORT-TERM LOAD FORECAST |
Author: |
SYLVIA JANE A. SUMARAUW, SUBANAR, EDI WINARKO, RETANTYO WARDOYO |
Abstract: |
Disruption of the electricity supply service to the customers or the overload
primary energy usage is often caused by load forecast fault. This fault,
especially the short-term load forecast (STLF), occurs by unpredictable factors.
One of these factors is weather effect in a load centre.The application of the
load forecast model in the electrical system with the use of energy trend on the
demand site, influenced by fluctuations of the weather, requires weather data
from the affected electrical system areas. However, weather stations in
Indonesia are limited and do not represent the electrical system areas. Although
STLF research used many methods has been widely conducted in many countries,
Indonesia, especially PLN (national electrical company, the only electricity
provider in Indonesia) has not undertaken it. Moreover, the studies that clearly
explain the coverage areas of the electrical system and how to obtain the
weather data have not yet been conducted. This paper discusses a method in
obtaining the weather data through weather observation sites represented the
load centres in the coverage areas of electrical system. The result shows that
the application of the method improved the forecasting performance. |
Keywords: |
Short-Term Load Forecast (STLF), Load Forecasting, Weighting Customers, STLF
Weather Sensitive, STLF Trends |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
EXPONENTIAL DECAY FUNCTION APPROXIMATION BY THIELE CONTINUED FRACTION AND SPLINE |
Author: |
HASSANE ALLOUCHE, KHALID TIGMA |
Abstract: |
We provide a technique for the approximation of a function with an exponential
decay rate, using Thiele interpolating continued fraction coupled with spline.
This new method benefits from computational advantages of rational approximation
while avoiding alteration caused by pole appearance. We then provide an
application of this technique in the approximation of the packet loss
probability function used as a quality of service parameter in communication
networks. |
Keywords: |
Rational Approximation, Thiele Continued Interpolating Fraction, Pole
Appearance, Cubic Spline, Packet/Cell Loss Probability, Quality Of Service,
Communication Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
AN EFFICIENT FAST HEVC ENCODING TECHNIQUE |
Author: |
AHMAD A. MAZHAR |
Abstract: |
HEVC video coding standard uses a structure of flexible Coding Unit (CU) quad
tree. This flexibility increases the coding efficiency and allows the standard
to achieve better rate-distortion performance compared to its prior H.264/MPEG-4
AVC. The improvement of coding efficiency came at the cost of high encoding
complexity. This paper presents a fast algorithm to reduce the encoding
complexity by an early termination decision with reference frame selection.
Experimental results for seven standard video sequences show that the proposed
algorithm can save up to 53.79% of the encoding time compared to the original
HM14. Different video sequences with different frame rates, quantization
parameters and resolutions were used in the experiments. The paper also
presented the effect of changing resolutions, frame rates and bit rates on
compression efficiency for both HM and the proposed algorithm. In comparison
with the original software, the proposed algorithm presents significant
improvement and time saving. In addition, the proposed algorithm outperformed
two of the best state of the art proposed methods. |
Keywords: |
Coding Unit, HEVC, Encoding Complexity, Rate Distortion, Early Termination. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
SUPPORTING DATA CONSISTENCY USING EFFICIENT INVALIDATION SCHEME IN MOBILE ADHOC
NETWORKS |
Author: |
THARANI VIMAL, DR.S.A.SAHAYA ARUL MARY |
Abstract: |
Caching frequently accessed data in mobile nodes is an effective technique to
improve the performance in Mobile Adhoc NETworks (MANETs). Cache invalidation
plays a vital role in maintaining the data consistency among source and cache
nodes. The conventional cache invalidation techniques are unsuitable for MANETs
due to frequent disconnections and resource constrained mobile nodes. This work
proposes the Data-update Pattern-aware Invalidation Prediction in caching (DPIP).
The proposed DPIP consists of Access Frequency aware Data Classification, Cache
Update Prediction based Dynamic Invalidation and Adaptive Query Searching in
MANET. Selecting the most popular data to replicate in multiple mobile nodes is
critical in caching. The DPIP divides the data into different classes according
to the frequency of data access and replicates the most popular data in multiple
locations. By applying the prediction at an update time of a particular data
using prior information, the DPIP adaptively adjusts the invalidation interval
to the cache nodes of particular data. It effectively balances the access delay
and cache consistency. The Adaptive Query Searching enables the cache node to
utilize the Query Directory nodes (QDs) and look for a cache node through
broadcasting the route discovery packets to QDs. Thus, the DPIP caching
successfully increases the data availability and improves the lifetime. Finally,
the proposed system is implemented on Destination-Sequenced Distance-Vector (DSDV)
routing. The simulation demonstrates a better performance of DPIP than the
existing caching system in terms of cache hit ratio, throughput, routing
overhead and access delay. |
Keywords: |
Mobile Adhoc Network, Cache Placement, Invalidation, Dynamic mobility and
Invalidation Prediction |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
KURTOSIS-BASED PROJECTION PURSUIT FOR SIGNAL SEPARATION OF TRADITIONAL MUSICAL
INSTRUMENTS |
Author: |
ATIK WINTARTI, YOYON K. SUPRAPTO, WIRAWAN |
Abstract: |
Signal separation is a substantial problem in digital signal processing. The
objective of signal separation from a musical composition is to decompose the
composition into signals of individual musical instruments. One method that can
be used is Projection Pursuit (PP) that similar with Independent Component
Analysis (ICA). PP can determine source signals by projecting the data to find
the most non-Gaussian distribution. In this paper we propose a method based on
kurtosis as a criteria to determine non-Gaussianity. We use Mean Square Error (MSE)
and Signal-to-Noise Ratio (SNR) to evaluate the accuracy of signal separation.
We conducted an experiment on a synthetic and real signal mixture of traditional
musical instruments i.e. Javanese Gamelan. The result showed that the minimum
value of MSE for separation signal using Kurtosis-based PP (K-PP) is 1.02 * 10-5
lower than FastICA and PP. Meanwhile, the maximum value of SNR with the proposed
method is 42.13 dB higher than the others. |
Keywords: |
Kurtosis, Projection Pursuit (PP), Independent Component Analysis (ICA),
Non-Gaussian, Separation |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
METADATA AS A SERVICE (METAAS) MODEL FOR CLOUD COMPUTING |
Author: |
AMIR MOHAMED TALIB, FAHAD OMAR ALOMARY, RUSLI ABDULLAH |
Abstract: |
Cloud computing has become the most attractive field in industry and research.
Metadata as a Service (MetaaS) is an emerging technique that could help the
cloud users, and cloud service providers (CSPs) according their needs. The
increasing of the speed of searching and acquiring against the number of the
data services in cloud computing that has leads the researchers to think about
implementing a new technique. MetaaS model uses to serve as a backbone for
providing and searching for data storage in cloud computing. MetaaS model
consists of three main layers as Metadata component, cloud users and CSPs. The
Metadata components consists of six main components as Metadata Entity (ME),
Metadata File Information (MFI), Metadata Catalog Service (MCS), Metadata
Management Engine (MME), Metadata Capturing (MC) and Metadata Analysis (MA). In
this paper, an approach for enabling searching, storing, accessing, retrieving,
and capturing the data from Cloud Data Storage (CDS) based on MetaaS model is
presented. Taking the production of CDS service as example, this paper gives
formal analysis of system running and compares with other related work. The
results show that the model presents good reference on the construction of cloud
computing applications and services according to the cloud services
functionalities and MetaaS components. |
Keywords: |
Cloud Computing, Cloud Data Storage, Cloud Service Provider, Metadata and
Metadata as a Service |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
SOCIAL LEARNING APPROACH IN DESIGNING PERSUASIVE E-COMMERCE RECOMMENDER SYSTEM
MODEL |
Author: |
NUR SYADHILA CHE LAH, AB RAZAK CHE HUSSIN, NOR ZAIRAH AB RAHIM, ABDELSALAM
H.BUSALIM |
Abstract: |
Intention to purchase in existing online business practice is learned through
observation of information display by online seller. The emergent growth of
persuasive technologies currently holds a great potential in driving a positive
influence towards consumer purchase behavior. But to date, there is still
limited research on implementing persuasion concept into the recommender system
context. Drawing upon the principle design of persuasive system, the main
purpose of this study is to explore social learning advantages in creating
persuasive features for E-Commerce recommender system. Based on Social Cognitive
Theory, the influence of personal and environmental factors will be examined in
measuring consumer purchase intention. In addition, dimensions of social
learning environment are represented by observational learning theory and
cognitive learning theory. From those reviews, this study assumed that social
learning environment can be created based on attentiveness, retentiveness,
motivational, knowledge awareness and interest evaluation cues of consumer
learning factors. Furthermore, the persuasive environment of recommender system
is assumed to have positive influence towards individual characteristics such as
self-efficacy behavior, perceived task complexity and confused by over choice.
Findings from those reviews have contributed to the development of a research
model in visualizing social learning environment that can be used to develop a
persuasive recommender system in E-Commerce and hence measures the impact
towards consumer purchase intention. |
Keywords: |
Recommender Systems, E-Commerce, Social Cognitive Theory, Social Learning,
Persuasive Systems, Purchase Intention. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
MODEL-DRIVEN DECISION SUPPORT SYSTEM FOR ESTIMATING NUMBER OF AMBULANCES
REQUIRED DURING EARTHQUAKE DISASTER RELIEF OPERATION |
Author: |
EBRAHIM ESMAILI, HALINA MOHAMED DAHLAN, MOHAMMAD ISHAK DESA |
Abstract: |
Most of human life has been encountered danger due to natural disasters
nowadays. One of these natural disasters that endanger human lives and which
causes lot of damages is earthquake. A proper emergency response after an
earthquake happening is important and has high priority in earthquake emergency
management to reduce number of damages. Decision making for critical resources
in the phase of response, is one of the main concerns for managers. Ambulance,
as one of the critical resource that can help to reduce earthquake losses and
costs, needs to be planned. Confusion in the number of victims in the early
stages of earthquake, access complexity to the required data of different
organizations by the pressing time, complicated nature of estimation, diversity
of models and limitation of time for decision making are the main problems
associated with estimating ambulances during earthquake disaster which makes
estimation too difficult. In addition, there is a call for research in
determining the number of required ambulances during earthquake emergency
management, due to high error in estimating the number of ambulances in the
current methods, which leads to unnecessary expenses and thereby helping to
ensure that disaster sites are not overcrowded with emergency workers impeding
each other's effectiveness. Such complexity suggests the introduction of
Decision Support System (DSS). More accurate estimation of the number of
required ambulances using a decision support system can help managers to speed
up the process of decision making and thus reducing error and costs. Since the
number of ambulances needed during a disaster is directly proportional to the
number of victims requiring hospital treatment and in order to reach the first
objective of this study, factors determining the number of human casualties in
earthquake disaster i.e. population, modified Mercalli, age, time, building
occupancy and gender are selected as the most relevant factors which have high
probability in creating human casualties. The collected data from various
relevant sources is used in proposing the model of this research. After testing
different approaches, Fuzzy rule-based approach is being used, after defining
the rules for each aforementioned factors and optimization is conducted in order
to minimize the error for estimating the number of human casualties. Finally, by
using de Boer formula and obtained number of human casualties, the number of
required ambulances is estimated accurately. The results indicate that the error
is decreased by more than 50% in the proposed method. A prototype of
Model-Driven Decision Support System was developed based on the proposed model
that can be used to aid emergency response planners for their decision making
process prior to take any action during earthquake emergency management. |
Keywords: |
Model-Driven Decision Support System, Earthquake Disaster Relief Operation,
Fuzzy System, Human Casualties, Ambulance Estimation |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
TOWARDS A CULTURALLY-ENHANCED SERIOUS GAME MODEL |
Author: |
MAZEYANTI M ARIFFIN, WAN FATIMAH WAN AHMAD, SUZIAH SULAIMAN |
Abstract: |
Current research shows that computer games were integral to the life of young
learners across the globe. Hence, educators were looking at opportunities to use
computer games in teaching and learning in order to address the needs of young
learners. Meanwhile, learning needs and expectations were varied depending on
the culture of a particular individual. Researches show that there were
compelling connections between culture and learning, however studies in this
area is still lacking. Thus, to address this limitation, four existing serious
game models and frameworks were investigated. The outcome of this work is a
serious game design model for culturally-enhanced serious game called GADEM.
This model was extended from Four Dimensional Framework (FDF) and used
pedagogical, Intercultural Communication and Social Construction of Technology
(SCOT) as basis of extension. The target users of GADEM were both serious game
designers and developers in order to guide them to design an effective serious
game for learners |
Keywords: |
serious game, culturally-enhanced serious game, GADEM, serious game design model |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
A SYSTEMATIC REVIEW ON DATA SECURITY AND PATIENT PRIVACY ISSUES IN ELECTRONIC
MEDICAL RECORDS |
Author: |
AMJAD MAHFUTH, JASPALJEET SINGH DHILLON, SULFEEZA MOHD DRUS |
Abstract: |
The adoption of Electronic Medical Records (EMR) in healthcare organizations has
numerous benefits to physicians, patients, and healthcare services. However,
unresolved security and privacy concerns pertaining to patient information cause
relatively low adoption of EMR by health institutions. Safeguarding large amount
of sensitive health data at different locations and forms proves to be a major
challenge of EMR. In this paper, a Systematic Literature Review (SLR) is
presented to
(1) identify the security and privacy concerns in the adoption of EMR by health
organizations and (2) to analyze the existing solutions in addressing the
identified concerns. A total of 393 papers were found in this regard. After
careful study and the removal of duplicate papers and screening of studies, 15
papers which met the inclusion criteria were selected for the review. This
review will help researchers to be aware of the privacy and security concerns of
EMR and the existing solutions. The review revealed that the security and
privacy issues related to EMR are inadequately addressed. This study indicates
that the technical and financial supports are insufficient to overcome the
security issues of EMR, and thus, the success factors and security culture
should be investigated. Developing countries meet many challenges in adopting
EMR, especially due to the lack of security policy and background
infrastructure. Hence, novel solutions such as best practice guidelines with
respect to security and privacy are necessary to aid successfully adoption EMR. |
Keywords: |
Electronic medical record, security policy, privacy, systematic review. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
BALANCED SCORECARD : PERFORMANCE MEASUREMENT FOR E-GOVERNMENT |
Author: |
TATIK MASLIHATIN |
Abstract: |
The country and cities in the world started to implement e-government.
Implementing E-Government should be measure. Because E-Gov aims to give services
to citizen effectively. This research conduct to describe implemented
e-government in Ministry religion province South Sulawesi, Indonesia. The survey
result shows that the implementation of e -government at the ministry of
religion for the customer perspective has on average 3.23 , Financial get mean
3.23 , Internal processes get mean 3.40 and Growth and Learning get mean 3.15.
This research suggest to create the strategy, determine the objective until the
step how to build the strategy map. The objective that needed for this
organization are Provide convenience in service, Provide required information
society, Improve intimacy with consumer, Reducing costs, Optimalize resource,
Simplifying procedures, Improving productivity, Sharing information , more
responds and Improving e-literacy. Of course, importantly how the organization
to execute the strategy map. |
Keywords: |
E-Government, Balanced Scorecard, Indicators, Performance Measurement,
Perspective |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
THE MODERATING EFFECT OF USER INVOLVEMENT ON USER SATISFACTION ENABLERS OF HUMAN
RESOURCE MANAGEMENT SYSTEM |
Author: |
MAZLAN MOHD SAPPRI, AHMAD SUHAIMI BAHARUDIN |
Abstract: |
This study aims to discuss the moderating variables namely user involvement (UI)
in the information system user satisfaction -individual benefits relationship.
The purpose of this study to overcome the shortcomings in understanding
information system (IS) user satisfaction among public sector employees. The
totals of 250 public sector operational employees of Human Resource Management
Information System (HRMIS) in Kedah, Malaysia were used as sample for this
study. Based on analysis and findings gathered through structural equation
modeling (SEM), it can be concluded that UI had slightly moderate the
relationship between user satisfaction and individual benefit. The results
indicated strong support for UI in Malaysian public sector context, and also
hinted strong and positive influenced proven in the previous studies for UI
constructs. This study also will open new opportunities for those who want to
further investigate information system success in Malaysian context. |
Keywords: |
DeLone and McLean, Information System, User Involvement, SEM-PLS, User
Satisfaction |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
QUEUING MODEL APPROACH FOR ENHANCING QOS OF WEB SERVICES |
Author: |
Ms. SUNDHARAM. R., Mrs. LAKSHMI. M |
Abstract: |
In the distributed and parallel computing system, the availability of web
service is increased by replicating the web services over physically distributed
servers. For the large scale applications single server cannot fulfill the
request of services, it leads to slow down the response time which is merely
equivalent to unavailable service. In order to increase the availability of web
service and minimize the response time, we have proposed Framework for Enhancing
the Availability of Web Services. It uses Poisson distribution and queuing model
to predict the future arrival rates and future response time respectively.
Based on predicted results, server availability factor (SAF) and attributes
value of Replication Matrix (RM), the decision is taken dynamically to replicate
the specific service on appropriate host before the response time violates the
SLA time. Hence the requested web service is made available to client service
continuously with increased availability. A simulated test environment has been
created to evaluate the performance of framework and test results are compared
with existing models. The comparisons indicate that our framework provides
greater performance. Thus, our framework maintains the response time of web
service within expected SLA response time even during peak load and it
significantly improves the availability of web service. |
Keywords: |
Web service, High-availability, Replication and Service Level Agreement. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
DIAGNOSIS SECURITY PROBLEMS IN CLOUD COMPUTING FOR BUSINESS CLOUD |
Author: |
MOHANAAD SHAKIR, ASMIDAR BIT ABUBAKAR, YOUNUS BIN YOUSOFF, ALI MAKKI SAGHER ,
HUSSAM AlKAYALI |
Abstract: |
Cloud computing is considered as one of the rapid growing technologies for it
has high flexibility in both usage and application; therefore, it has been used
widely by many organizations. Cloud computing features ease, fast accessibility
of the data and cost reduction for data storage. Consequently, a number of
organizations are using this technology. Since the cloud computing has been used
widely in various parts of the world by many originations, several security
problems in cloud computing exist. This study was carried out by distributing
questionnaires to different organizations in selected twelve (12) countries.
This paper aims to examine the security problems and to identify the
characteristics of such security problems, in addition this study will examine
the important issues in security cloud computing and will determine the frames
to improve security systems for cloud computing. The findings of this study,
firstly the organizations or institutions are very concerned in improving the
security of cloud computing through the application of the authority model and
dynamic classification of data model based on the multi-level security. Secondly
, they prefer to develop the multi-key cipher algorithm in order to manage the
encryption based on the level of security . |
Keywords: |
Information system security, Cloud computing, AES, Data classification . |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
THE COMBINATION OF IMPORTANCE PERFORMANCE ANALYSIS AND STRUCTURAL EQUATION MODEL
FOR MODELING PEDESTRIAN SATISFACTION IN MANADO |
Author: |
LUCIA LEFRANDT, HARNEN SULISTIO, ACHMAD WICAKSONO, LUDFI DJAKFAR, BAMBANG
WIDJANARKO OTOK |
Abstract: |
This research aims to know the model of customer satisfaction pedestrian
movement in pedestrian area path in Manado city. The Data used in this study was
taken by pedestrian traffic survey with simple random sampling method, whereas
the analysis techniques used is the amounts of Performance Analysis (IPA) and
Structural Equation Modeling (SEM). The results with IPA approach shows that the
high priority supported by Guarantee Indicator (I_KP1), Performance (I_KP3),
Power Hold (I_KP7), Comfort (I_KP9), Aesthetics (I_ATTF2), priority which
maintained supported by Reliability Indicator (I_KP6), Availability (I_KP10),
Reliability (I_KL1), Assurance Guarantee (I_KL3), Manifests itself (I_KL5),
Performance (I_AP1), Performance (I_ATTF1), Reliability (I_ATTF4), Comfort
(I_ATTF7), low priority on the Power Emergency Indicators (I_KP2), Aesthetics
(I_KP4), focus (I_KP5), Frequency (I_KP8), Oversight (I_KL2), Attention (I_KL4),
Focus (I_AP3), focus (I_ATTF3), Frequency (I_ATTF6), Availability (I_ATTF8), and
excessive is a Guarantee (I_AP2), Responsiveness (I_AP4), Power Hold (I_ATTF5).
The relationship model of satisfaction pedestrian in each quadrant with SEM
approach is the fit model. High priority satisfaction relationship model with
Guarantee Indicator (I_KP1), Performance (I_KP3), Power Hold (I_KP7), Comfort
(I_KP9) is influenced by the technical aspects of Transportation and Facilities
(X2) with Warranty indicator (I_KP1). The relationship model of satisfaction
maintained with Reliability indicator (I_KP6), Availability (I_KP10) is
influenced by the service quality with the indicator reliability (I_KL1),
Assurance Guarantee (I_KL3), manifests itself (I_KL5). The relationship model of
low satisfaction priority with power indicator Emergency (I_KP2), Aesthetics
(I_KP4), focus (I_KP5), Frequency (I_KP8) are influenced by management aspect
with indicator ease (I_AP3), Technical Aspects of Transportation and Facilities
(X2) with the ease indicator (I_ATTF3), Frequency (I_ATTF6), Availability
(I_ATTF8), and the service quality with Oversight Indicator (I_KL2), Attention
(I_KL4). |
Keywords: |
IPA, SEM, Sidewalks, Pedestrian Satisfaction, Service Quality, Management
Aspects, Technical Aspects. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
PROVIDING SECURITY TO PUBLISH / SUBSCRIBE SYSTEM USING STRONG NETWORK
CRYPTOGRAPHIC TECHNIQUES AND TWO TIER ENCRYPTION |
Author: |
AANCHAL RAI, MRS. MAYA SHELKE - BEMBDE |
Abstract: |
There are different types of distributed systems existing in this world which
needs the massive amount of information to be transferred between them and along
with it comes the need of secure communication between different parties.
Publish subscribe system is the communication archetype for information
broadcasting in huge distributed system. Selling a product and merchandising it,
isn't a cup of tea for each manufactures, thus all manufactures are probing for
various third party product promoters like promotion agencies, dealers or third
party brokers. For a business to explore, brokers are playing a very crucial
role. However loyalty of the brokers cannot be assured. So to handle this
problem many broker less systems are been proposed for publish-subscribe system
in distributed pattern. However most of these systems have not completely
succeeded in achieving privacy of the data over the transactions. So proposed
system forwards an idea of preserving the confidentiality of information by key
generation for each publish/ subscribe transactions and the keys are randomly
generated based on the event details and subscriber data using reverse circle
cipher[10] and two tier encryption. |
Keywords: |
Cryptography, Publish-Subscribe, Broker-Less, Two-Tier Key, Gaussian
Distribution |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
OPTIMIZED ROUTE FORMATION TECHNIQUE (ORFT) FOR DYNAMIC MANETS |
Author: |
SNEHALATHA N, PAUL RODRIGUES |
Abstract: |
Ever since the evolution of MANETs there has been continuous development in the
research endeavors that improve the communication efficiency for the same.
Although there has been so much research till date, there are so many of the
MANET research issues still prevalent and hindering the smooth communication.
One such issue is ambiguity and haste during route formation that not only
reduces the success rate of the communication, but sometimes has a totally
negative effect on the rest of the system. To avoid the packet loss during route
formation and effective data delivery end-to-end, we propose a node Optimized
Route Formation Technique (ORFT) using a single probabilistic method and
individual node history of operations (Node Quality Factor - NQF). The ORFT
method uses a simultaneous node metric evaluation process and end-to-end route
evaluation process to find the best routes to destinations. Performance is
analyzed using the network simulator. |
Keywords: |
Multi hop, Energy, Delay, Packet Processing Rate, Node Qualifying Factor, MANETs. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
DEVELOPING A PREDICTED MODEL FOR DIABETES TYPE 2 TREATMENT PLANS BY USING DATA
MINING |
Author: |
TARIG MOHAMED AHMED |
Abstract: |
Diabetes is a chronic disease in which blood sugar levels are too high. It can
lead to very dangerous complication such as: heart disease and stroke, and even
to complications requiring amputation of one of the parties. In this paper a new
model was developed to classify diabetic type 2 treatment plans such as Insulin,
medication and diet. These treatment plans could help the diabetic to control
the blood glucose level. The model dataset was collected from JABER ABN ABU ALIZ
clinic center for diabetes in Sudan. It was about 318 medical records. After
conducting comprehensive experiments among data mining algorithms, J48 algorithm
was selected to develop the proposed model based on accuracy results. By using
WEKA application, the model was implemented. According to the results, the
accuracy of the model was 70.8% and all others measures of validation were
accepted. Also, the research mentioned that the duration of illness and the age
factors were played very important role in specifying an appropriate treatment
plans. |
Keywords: |
Diabetes type 2; data mining; classification; J48 algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
THE RELIABILITY OF HALAL PRODUCT TRANSPORTATION USING GPS TRACKING SYSTEM |
Author: |
MAIZATUL AKMA MOHAMAD, SHATTRI MANSOR, NOORDIN AHMAD, WAN AZIZUN WAN ADNAN,
ISLAM MUHAMMAD WALI |
Abstract: |
The rapid growth of Halal product market creates high demand for the logistic
system to ensure the reliability of product during the transportation process.
However, due to contamination, pilferage and chance of breakage in the supply
chain, the reliability of the current status of halal product has been
questioned that leads to the initiative of developing a new tracking system to
monitor the movement of the product. Aiming at monitoring and reducing the
possibility of cross contamination that might occur during the transportation
process, the Halaltracer tracking system was developed using the combinations of
Global Positioning System (GPS) and geofence algorithm. The Halaltracer tracking
system is significantly contributing in terms of automatic detection on the
spatial activity taken during the halal products shipment process. Apart from
providing spatial information about the delivery session and the route taken,
the system also can detect the possibility of cross contamination by monitoring
in real time the stopping of vehicles using a ray casting algorithm applied to
the geofence technique used in the system. A functional prototype device with a
web based interface for reporting function was completely built and tested in
different kind of situation. The testing showed that the proposed model was
capable of presenting a report of tracking which compliant the requirement of
managing Halal product. In conclusion, these Halaltracer system will improve the
traceability of Halal product during transportation by focusing on the Halal
part thus, adding the credibility of consumer confidence in consuming the Halal
products. |
Keywords: |
Ray Casting Algorithm, Geofence, Halal Logistic, Global Positioning System,
Traceability |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
REDUCING SECURITY INCIDENTS IN A CANADIAN PHIPA REGULATED ENVIRONMENT WITH AN
EMPLOYEE-BASED RISK MANAGEMENT STRATEGY |
Author: |
EDUARDO DESOUZA, RAUL VALVERDE |
Abstract: |
The paper uses a case study research approach in defining how an employee based
risk management strategy such as employee information security training,
employee motivation, and quality assurance can be used to reduce security
incidents in a Canadian PHIPA regulated environment. During the research,
information security professionals and employees were asked direct questions
aimed at understanding the reasons why internal data breaches are recurrent, and
what are users perception and understanding of existing security policies,
processes, and their role in protecting information in their work environment.
By using a qualitative case study research design method, data was collect from
a small but targeted group of information security professionals and employees
within healthcare organization in Ontario. The gathered data was analyzed to
identify what are the main causes of security incidents, and what organizations,
in the healthcare field can do to better involve their employees for the
reduction of breaches and incidents. The recommendations made by this research
paper have the potential of influencing an organizations organizational culture
and employee behavior. The main goal of this paper was to develop an employee
based risk management strategy for enterprise level risk management focused on
positively influencing employee behaviour. |
Keywords: |
Risk Management, Incident Management, Risk Reduction, PHIPA, Training Programs,
Health Care Information Security |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
KNOWLEDGE MANAGEMENT BEST PRACTICE IN HIGHER LEARNING INSTITUTION: A SYSTEMATIC
LITERATURE REVIEW |
Author: |
HALIJAH ISMAIL, RUSLI ABDULLAH |
Abstract: |
This systematic literature review (SLR) aims to identify the Knowledge
Management (KM) Best Practice components in the KM Model proposal for Higher
Learning Institutions (HLI) environment. The KM Best Practice components
identified from this paper will be referring in the future study to verify the
effectiveness of the components to be the best practice for KM. A SLR of KM Best
Practice to identify and define the components of Best Practice from the KM
models was conducted recently. 179 articles included in the literature review
were extracted based on the exclusion criteria and only retained 71 related
reviews. The review of published papers of conference and journals’ articles
shows the components of Best Practice in KM are basically divided into two
aspects which is the soft aspect and the hard aspect. The literature evidence
the lacks of combination of these two aspects into an integrated model
decelerate KM Best Practice to fully throttle in the organization. The scenario
leads to the immaturity of the HLI towards the implementation of KM System. The
first steps of identifying the attributes to measure the components from the
models in the literature will led to the definition of the KM Best Practice
component for the higher learning environment as concluded in this Systematic
Literature Review. |
Keywords: |
Knowledge Management, Knowledge Management System, Knowledge Management Best
Practice, Higher Learning Institutions. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
CULTURAL DIMENSIONS OF MALAYSIAN TEENAGERS AND THEIR RELATIONSHIP WITH INTERFACE
DESIGN |
Author: |
ZURIDA ISHAK, AZIZAH JAAFAR |
Abstract: |
This study aimed to identify the relationship between cultural dimensions of
adolescents in Malaysia and their tendencies with interface design of computer
applications. Numerous studies have used Hofstedes cultural dimensions to
design user interfaces and tested their application in many countries. However,
test results in Asian countries such as China and Taiwan are not significant
because the cultural dimensions are unsuitable for these countries. Therefore,
this study will use the cultural dimensions of Malaysian society to test the
relationship with interface components tendency. Respondents of different races
and religions, with different family incomes, and from urban and rural areas are
selected from six secondary schools. Pearson correlation analysis with a
significance level of 0.05 is used to determine the relationship between
cultural dimensions, namely, harmony, relationship, hierarchy, collectivism,
shame, polychronic time, high-context communication, and religion, and the use
of interface components, namely, metaphor, mental model and navigation,
interaction, and appearance. Result shows that four cultural dimensions have a
significantly positive relationship with the interface components (hierarchy,
religion, polychronic time, and collectivism) with an r value of more than 0.1. |
Keywords: |
Interface design, Cultural Interface Design, Interface Components, Culture
Dimensions, Culture Interface Preferences |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
CHANNEL ESTIMATION USING EXTENDED KALMAN FILTER WITH SLICED MULTI MODULUS BLIND
EQUALIZATION ALGORITHM (SMMA) |
Author: |
SANJAY KUMAR KVS, DR. B. L. MALLESWARI |
Abstract: |
Multiple-Input Multiple-Output (MIMO) systems use multiple number of antennas on
the both sides of transmission and reception to achieve high spectral
efficiency. Channel impulse responses are regularly thought to be steady over a
block or packet. These blocks are assumed like stationary on channels. Though,
for communications in a high mobility and fading channel, the assumption will
cut down the system performance. Here we concentrate on channel estimation for a
MIMO system with Orthogonal Frequency Division Multiplexing (OFDM) transmission
technique. The system, estimates the channel matrix at the receiver with
Extended Kalman Filter (EKF). After the estimation, we employ low cost OFDM-MIMO
soft data detector. The soft outputs of soft data detection are fed back to
sliced multi-modulus algorithm (SMMA) for an improved channel estimation.
Iteratively using EKF and SMMA overall performance has been achieved.
Convergence characteristics of EKF-SMMA is simulated using MATLAB and it is
shown that it gives better steady-state performance with regard to inter-symbol
interference (ISI) & Bit-error rate. It additionally demonstrates that the
researched calculation shows reduced steady-state misadjustment contrasted with
the best reported multi-modulus algorithm (MMA). |
Keywords: |
Multiple-Input Multiple-Output, Orthogonal Frequency Division Multiplexing,
Constant Modulus Algorithm, Multi-Modulus Algorithm, Sliced Multi-Modulus
Algorithm, Extended Kalman Filters. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
PROBABILISTIC ARABIC PART OF SPEECH TAGGER WITH UNKNOWN WORDS HANDLING |
Author: |
Mohammed Albared, Tareq Al-Moslmi, Nazlia Omar, Adel Al-Shabi, Fadl Mutaher
Ba-Alwi |
Abstract: |
Part Of Speech (POS) tagger is an essential preprocessing step in many natural
language applications. In this paper, we investigate the best configuration of
trigram Hidden Markov Model (HMM) Arabic POS tagger when small tagged corpus is
available. With small training data, unknown word POS guessing is the main
problem. This problem becomes more serious in languages which have huge size of
vocabulary and rich and complex morphology like Arabic. In order to handle this
problem in Arabic POS tagger, we have studied the effect of integrating a
lexicon based morphological analyzer to improve the performance of the tagger.
Moreover, in this work, several lexical models have been empirically defined,
implemented and evaluated. These models are based essentially on the internal
structure and the formation process of Arabic words. Furthermore, several
combinations of these models have been presented. The POS tagger has been
trained with a training corpus of 29300 words and it uses a tagset of 24
different POS tags. Our system achieves state-of-the-art overall accuracy in
Arabic part of speech tagging and outperforms other Arabic taggers in unknown
word POS tagging accuracy. |
Keywords: |
Part of Speech Tagger, Arabic Language, Unknown Word Guessing. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
EXPLORING FACTORS THAT INFLUENCE CUSTOMER ENGAGEMENT IN VALUE CO-CREATION IN
HIGHER EDUCATION INSTITUTIONS USING ONLINE PLATFORMS |
Author: |
NABIL HASAN, AZIZAH ABDUL RAHMAN |
Abstract: |
Higher Education Institutions (HEIs) can be described as a container that
encompasses strong knowledgeable minds and experienced individuals. It is one of
the service sectors comprised of a huge number of individuals who are attached
for life with Higher Education Institutions and possess resources of knowledge,
experience and competency. These valuable resources are considered to be sources
of innovative performance, best service quality and better community
transformation. By engaging such brilliant minds in value co-creation, either
with internal or external customers of these HEIs, it is believed that this
engagement will help HEIs to maintain better service quality, attain reputable
positions and contribute to enhance community transformation. However, the task
to engage large numbers of HEIs customers in co-creation of value is not easy to
be achieved without in-depth exploration of how to accomplish and sustain such
engagement. Special effort is taking place to engage the inner and outer HEIs
community in value co-creation process through online platforms. Yet, the level
of customers engagement still low and poor. The aim of this research is to
explore factors that impact HEIs customers to be engaged in any form of value
co-creation through the online platforms, and to introduce a holistic value
co-creation model that helps universities and other HEIs to engage customers in
value co-creation activities through any means of effective online platforms. A
qualitative method is adopted by interviewing ten HEIs experts from four
reputable Malaysian universities. Data are collected, analyzed and synthesized
with support of Nvivo10 software. Value co-creation conceptual model is
established and the results reveal that there are several factors that have an
impact on customer engagement in the value co-creation in HEIs. According to the
nature of value co-creation and the context of this research, factors are
summarized into three classifications: organizational factors that represent
HEIs provider aspects and these factors are the predominant among other aspects.
Then technological factors that represent the online platform characteristics
and the personal factors that represent customer aspects. |
Keywords: |
Value Co-Creation, Higher Education Institutions, Customer Engagement, Online
Platforms. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
|
|