|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
January 2020 | Vol. 98
No.01 |
Title: |
MODEL OF CYBERSECURITY MEANS FINANCING WITH THE PROCEDURE OF ADDITIONAL DATA
OBTAINING BY THE PROTECTION SIDE |
Author: |
LAKHNO V., MALYUKOV V., YEREKESHEVA M., KYDYRALINA L., SARSIMBAYEVA S.,
ZHUMADILOVA M., BURIACHOK V., SABYRBAYEVA G. |
Abstract: |
The article describes the model of cybersecurity means financing strategies of
the information object with incomplete information about the financial resources
of the attacking side. The proposed model is the core of the module of the
developed decision support system in the problems of choosing rational investing
variants for information protection and cybersecurity of various information
objects. The model allows to find financial solutions using the tools of the
theory of multistep games with several terminal surfaces. The authors proposed
an approach that allows information security management to make a preliminary
assessment of strategies for financing the effective cybersecurity systems. The
model is distinguished by the assumption that the protection side does not have
complete information, both about the financing strategies of the attacking side,
and about its financial resources state aimed at overcoming cybersecurity lines
of the information object. At the same time, the protection side has the
opportunity to obtain additional information by the part of its financial
resources. This makes it possible for the protection side to obtain a positive
result for itself in the case when it can not be received without this
procedure. The solution was found using a mathematical apparatus of a nonlinear
multistep quality game with several terminal surfaces with alternate moves. In
order to verify the adequacy of the model there was implemented a multivariate
computational experiment. The results of this experiment are described in the
article. |
Keywords: |
Cybersecurity, Information Protection, Informatization Object, Theory Of Games,
The Choice Of Financing Strategy, Procedure Of Additional Data Obtaining,
Decision Support System. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
CONTRIBUTION TO THE DESIGN OF NEW APPROACHES FOR ENERGY MANAGEMENT IN WIRELESS
SENSOR NETWORKS |
Author: |
RAYRI YASSINE, HATIM KHARRAZ AROUSSI, ABDELAZIZ MOULOUDI |
Abstract: |
The Wireless sensor is a micro device that allows measuring a physical quantity
from the environment and transforming it autonomous into a digital value that
can be processing. The collection, processing and transmission of data are the
main factors of the dissipation of the energy for the wireless sensors, since
these Battery-powered sensors is limited in energy, and it is usually impossible
to recharge or replace it, knowing that sensors are generally distributed in
places which are difficult to reach. Indeed, the lifetime of the network is one
of the major constraints facing in WSN. Therefore, the energy consumption of the
sensors plays an important role in the network lifetime. Among scientific
research developed to improve the lifetime of wireless sensors network is the
integration of a new techniques of routing protocols existing. In this paper, we
will solve two major energy problems. The first concerns the equitable
distribution of energy on all the nodes of the network in order to eliminate the
energy holes. The second is the minimization of energy consumption to maximize
or extend the life of the network. To achieve these objectives, we propose
firstly the EDE (Equitable Distribution Energy) protocol based on clustering.
This guarantees an equitable distribution of energy across the entire sensor
network. In the second phase, we propose a new protocol named EDEE, which is an
improvement of the EDE protocol, to minimize the energy consumption of the
nodes. At the end, the EEDE (Energy and Equitable Distribution Energy) protocol
would thus be a complete and efficient protocol in terms of energy. |
Keywords: |
Wireless Sensor, Clustering, Energy hole, Equitable distribution energy, Energy
dissipation |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
A ClOUDLET BASED SECURITY AND TRUST MODEL FOR E-GOVERNMENT WEB SERVICES |
Author: |
BASSAM AL-SHARGABI ,SHADI AL-JAWARNEH , AND SOFYAN M.A. HAYAJNEH |
Abstract: |
Nowadays, Cloud Computing and Web services are the main backbone of e-government
applications because of its interoperability and accessibility nature. Web
services that are maintained in Cloud brought much attention in research and
industry in terms of securing the communicated Web services. Thus, securing and
trusting between the communicated Web services has been gradually becoming more
challenging for Web services consumers, administrators, and Web service
providers especially the e-government services. Thus, In this paper, a Cloudlet
based security trust model was proposed to guarantee a proper and secure
communication between Web services through exploiting the cloud computing
infrastructure . In addition, the proposed model is tackling the issues arises
when Web service consumers are communicating with any of the e-governmental Web
services through a trusted Cloud-based third party that is controlled by any
governmental agency. Moreover, the Cloudlet is also used to measure the
trustworthiness and conformance with the published policy by the provider of Web
services through feedback from the Web service consumer. . The experimental
result of the proposed model shows an outstanding performance regarding
different size of SoAP messages using triple DES and RSA as standard encryption
algorithms. |
Keywords: |
Web service; Security;Trust model; Cloudlet; E-government |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
LEAN DESIGN METHODOLOGY FOR LEAN PRODUCT USING UML MODELING |
Author: |
DAHMANI NOUREDDINE, BENHIDA KHALID, ELFEZAZI SAID |
Abstract: |
The design phase is one of the crucial and important steps in the development of
any product. All processes in the product life cycle are strongly determined by
the product design, the concept of lean design aims to maximize customer value
and minimize waste throughout the product life cycle by an optimized product
design. However, and considering the complicated aspect of the design activity,
a designer generating a holistic product design must take into consideration
several parameters and aspects. Therefore, this paper argues for formalizing the
product design methodology in a lean vision, throughout the modeling of
different aspects of the product design process while integrate the lean
principals, that can be exploited by company actors or software analysts. For
this purpose, we used the UML modeling standard who has become an effective tool
in information analysis in industrial design, we believe that such proactive
collaboration between tools can significantly reduce the effort and time
required for product design. |
Keywords: |
Lean design, Product design, UML modeling, Collaborative design. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
CARDIOVASCULAR DISEASE CLASSIFICATION BASED ON ECHOCARDIOGRAPHY AND
ELECTROCARDIOGRAM DATA USING THE DECISION TREE CLASSIFICATION APPROACH |
Author: |
TB AI MUNANDAR, SUMIATI, VIDILA ROSALINA |
Abstract: |
For a doctor, diagnosing a patient's heart disease is not easy. It takes the
ability and experience with high flying hours to be able to accurately diagnose
the type of patient's heart disease based on the existing factors in the
patient. Several studies have been carried out to develop tools to identify
types of heart disease in patients. However, most only focus on the results of
patient answers and lab results, the rest use only echocardiography data or
electrocardiogram results. This research was conducted to test how accurate the
results of the classification of heart disease by using two medical data, namely
echocardiography and electrocardiogram. Initial research was conducted by
comparing two classification methods, namely Naive Bayes and Decision Tree. The
results of the comparison of classification models show that the decision tree
approach has a better accuracy than Naive Bayes. Three treatments were applied
to the two medical data and analyzed using the decision tree approach. The first
treatment was to build a classification model for types of heart disease based
on echocardiography and electrocardiogram data, the second treatment only used
echocardiography data and the third treatment only used electrocardiogram data.
The results showed that the classification of types of heart disease in the
first treatment had a higher level of accuracy than the second and third
treatments. The accuracy level for the first, second and third treatment were
78.95%, 73.69% and 50%, respectively. This shows that in order to diagnose the
type of patient's heart disease, it is advisable to look at the records of both
the patient's medical data (echocardiography and electrocardiogram) to get an
accurate level of diagnosis results that can be accounted for. |
Keywords: |
Heart Disease, Echocardiography, Electrocardiogram, Classification, Decision
Tree |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
INSECT PESTS RECOGNITION BASED ON DEEP TRANSFER LEARNING MODELS |
Author: |
NOUR ELDEEN M. KHALIFA , MOHAMED LOEY , MOHAMED HAMED N. TAHA |
Abstract: |
Agriculture is one of the most important sources for human food throughout the
history of humankind. In many countries, agriculture is the foundation of its
economy, and more than 90% of its population deriving their livelihoods from it.
Insect pests are one of the main factors affecting agricultural crop production.
With the advances of computer algorithms and artificial intelligence, accurate
and speedy recognition of insect pests in early stages may help in avoiding
economic losses in short and long term. In this paper, an insect pest
recognition based on deep transfer learning models will be presented. The IP102
insect pest dataset was selected in this research. The IP102 dataset consists of
27500 images and contains 102 classes of insect pests, it is considered one the
biggest dataset for insect pest and was launched in 2020. Through the paper,
AlexNet, GoogleNet, and SqueezNet were the selected deep transfer learning
models. Those models were selected based on their small number of layers on
their architectures, which will reflect in reducing the complexity of the models
and the consumed memory and time. Data augmentation techniques were used to
render the models more robust and to overcome the overfitting problem by
increasing the dataset images up to 4 times than original images. The testing
accuracy and performance metrics, such as the precision, recall, and F1 score,
were calculated to prove the robustness of the selected models. The AlexNet
model achieved the highest testing accuracy at 89.33%. In addition, it has a
minimum number of layers, which decreases the training time and computational
complexity. Moreover, the choice of data augmentation techniques played an
important role in achieving better results. Finally, A comparison results were
carried out at the end of the research with related work which used the same
dataset IP102. The presented work achieved a superior result than the related
work in terms of testing accuracy, precision, recall, and F1 score. |
Keywords: |
Agriculture, Insect Pest, Transfer Learning, Convolutional Neural Network, Image
Processing, Machine Learning |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
ENERGY OVERHEAD EVALUATION OF SECURITY TRUST MODELS FOR IOT APPLICATIONS |
Author: |
AMEER ALHASAN, LUKMAN AUDAH, AMJED ALABBAS |
Abstract: |
Internet of things networks (IoT) has emerged as promising technology for
handling small network based devices. However, its limited resources remain the
main concern in implementing this type of networks. Energy one of the main
factor of these resources where most of IoT devices depends on batteries. Energy
reduction efforts are continuous in different trends; protocol overhead is one
of the main topic in this direction. Most recently proposed trust-based security
approaches include high overhead in term of energy consumption; however, this
overhead is not investigated. In this paper, the energy overhead of recently
proposed trust model research is investigated. Three of the main trust models
for security purposed is investigated. Results show how protocol overhead can
directly affect the energy consumption. It mainly demonstrates that high number
of packets exchange in any algorithm can increase the energy overhead. Results
shows that low communication overhead algorithm has efficiently reduced the
power dissipation and enhance network lifetime |
Keywords: |
Internet Of Things (Iot) , Trust Model , Energy , Power Dissipation. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
AN EFFECTIVE AND SECURE DIGITAL IMAGE STEGANOGRAPHY SCHEME USING TWO
RANDOM FUNCTION AND CHAOTIC MAP |
Author: |
MOHANAD NAJM ABDULWAHED |
Abstract: |
Among the critical features of actions and strategies in the information and
communications technology period is securing information. The reliability of
information ought to be the main consideration in the discrete transfer of
information between two people. For the security of information, the approaches
entail steganography and cryptography. In cryptography, the discrete information
is changed into indiscernible information yet still the secret information is
recognizable, while steganography is about concealing the secret text to avoid
it being discerned. This paper presents a current secure image steganography
method called new stego key adaptive LSB (NSKA-LSB). The establishment of the
suggested method was built in four stages with an objective of a better
data-hiding algorithm in cover image identity using potentiality, image aspects,
and reliability. Attaining this involves preserving the Peak Signal-to-Noise
Ratio (PSNR) of the steganography method. The four-stage proceeded with pixel
determination assembly stage, then secret information assembly stage, embedding
stage and lastly extrication stage. The reliable image steganography method
suggested in this paper is established on a novel transformation of least
significant bit exchange technique, a fusion of two arbitrary functions, and a
chaotic map. The suggested method entails direct or inverse discrete bit
positioning of strengthening the invisibility and difficulty of the insertion
exercise. The reason for suggesting the hiding algorithm is to tackle
statistical and visual types of attacks. The investigations outcomes exhibit
that the formula gives the improved quality index, peak signal-to-noise ratio,
and payload employed for stego image examination. |
Keywords: |
Image steganography Bernoulli’s map, PSNR, SSIM, RLE |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
ENTROPY BASED DECISION MAKING METHOD IN MANAGING THE DEVELOPMENT OF A SOCIO-
INFORMATIONAL SYSTEM |
Author: |
V. KULIKOV, K. IKLASSOVA, A. KAZANBAYEVA |
Abstract: |
This article describes the informational and entropic approach to informational
flow analysis in management system of higher educational establishment. A review
of a range of theoretically suitable entropy versions has been presented as well
as the facts with calculations examples, oriented to the further application to
decision-making system in management of higher educational establishment
workflow processes. This study contains the new method for a system of support
of management decision making in prioritizing and choosing of the ways of
building university educational policy. Applicability of receiving of a new data
that can improve regional educational system by evaluation of structuring of
curriculums and educational programs. |
Keywords: |
Information; Entropy; Decision-Making; Management; Higher Education. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
A SYMMETRIC KEY BASED STEGANOGRAPHY CALCULATION FOR ANCHORED INFORMATION |
Author: |
YAHIA SABRI AL-HALABI |
Abstract: |
Advancement in technology have brought about several sophisticated devices,
using electronic media communication is more prone to attacks than communicating
over traditional channels. While the traditional communication systems were
insecure, it was rather more difficult to intercept communication without the
communicating parties without the realization of the owner of the information
being sent, due to either breaking of the seal to find out the content, or harm
to the courier carrier. The message is open to all, once inserted into the
shared network, or sent to the receiver from the sender, and moreover completely
insecure. The message being sent must also conform to network security
convention confidentiality, integrity, authentication and availability. In this
paper, we followed some objectives in which we hid the message or a secret data
into an image which acts as cover medium using LSB technique and how information
exchange can be carried out using symmetric key based steganography.
Steganography (LSB substitution) and two techniques of JPEG steganography (Jsteg
and Steghide) taking secret information as a data file and as an image and to do
comparisons between them in terms of embedding capacity and quality of produced
stego-image and robustness to attacks. Also, video files are files that store
motion pictures and sounds like in real life. In today's world, the need for
automated processing of information in video file is increasing. Automated
processing of information has a wide range of application including office/home
surveillance cameras, traffic control, sports applications, remote object
detection, and others. In particular, detection and tracking of object movement
in video file plays an important role. This paper describes the methods of
detecting objects in video files. Today, this problem in the field of computer
vision is being studied worldwide. |
Keywords: |
Information, Security of Secret Data, Key Based Steganography, Encryption. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
WRITING STYLE AND WORD USAGE IN DETECTING DEPRESSION IN SOCIAL MEDIA: A REVIEW |
Author: |
NUR ZAREEN ZULKARNAIN, HALIZAH BASIRON, NORIDA ABDULLAH |
Abstract: |
In todays digital age, social media have become the most common channel for
individuals to express their opinions and feelings. As common as this, the
extensive usage of social media has also been associated with mental illnesses
such as anxiety, suicidality and depression. The digital traces the individuals
left provide insights into not just their daily life but also on their health
and mental state. This allows for various prediction and preliminary diagnosis
to be made. The advancement of research in the Natural Language Processing (NLP)
field has allowed researchers to understand individuals based on texts they
shared in their social media account. This paper reviews the techniques and
methods used in detecting depression from social media texts where emphasis are
being placed on the writing style and the word usage of the social media users.
Writing styles and choices of words have been seen as a possible indicator in
detecting depression from social media texts. Various methods and platforms have
been adopted to investigate the effectiveness of detecting depression based on
these two components. This paper discusses these methods and techniques as well
as the areas where improvements can be made. |
Keywords: |
Social Media; Depression Detection; Lexicon; Ontology; Text Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
TOWARDS CERTFICATELESS PUBLIC KEY INFRASTRUCTURE: A PRACTICAL ALTERNATIVE OF THE
TRADITIONAL PKI |
Author: |
EIHAB B.M. BASHIER, MOHAMMED A. HASSOUNA, TAOUFIK BEN JABEUR |
Abstract: |
Although the maturity and efficiency of the traditional PKI in managing the
public keys of the enterprise users, it still has two central and interrelated
challenges or limitations when the number of users get large: Scalability and
Key management. These two challenges are of great concern to the organization's
information security officials, who are working to manage public key
infrastructure, especially when the organization's growth rate becomes large.
The most two significant alternatives for the traditional PKI are:
Identity-based Cryptography and Certificateless Cryptography. The Identity-based
Cryptography (IBC) provides an easy way to manage the public keys of its users,
without need to any kind of certificate and its managing overhead, where the
identity of a user is its public key. The private key is provided by a trusted
Key Generation Centre (KGC) after an authentication process that the user must
follow. IBC has many security features, and there are many schemes in the
literature that are based on this new concept. It has one major problem: The Key
escrow, where all the private keys of the users are generated centrally by the
KGC. Certificateless Cryptography is another important alternative for the
traditional PKI. It provides solution to the key escrow problem encountered by
the IBC and raises many nice security features. This paper provides a robust
certificateless signature scheme, which is provably secure in the Random Oracle
Model (ROM). Then, it presents a Certificateless Hierarchal Encryption scheme,
which provides trust level 3, so, can solve many practical problems, based on
the Certificateless Cryptography as a public key infrastructure. |
Keywords: |
Certificateless cryptography, Public key infrastructure, Random Oracle Model,
Security services, Trust levels. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
Title: |
A DELPHI-BASED SECURITY RISK ASSESSMENT MODEL FOR CLOUD COMPUTING IN ENTERPRISES |
Author: |
AHMED YOUSSEF |
Abstract: |
Cloud computing (CC) reveals a remarkable potential to provide on-demand
services to a wide variety of enterprises over the Internet with greater
flexibility in a cost-effective manner. However, it presents an added level of
security and privacy risks because essential services are often outsourced to a
third party. Security risks are the most critical issue that hinders enterprises
from adopting CC since they may result in loss of satisfaction for many business
objectives. On the other hand, Cloud Service Providers (CSP) are struggling with
the cloud platform security issues since the cloud model has a very complex
architecture with many characteristics and different stakeholders’ security
requirements. Hence, there is an essential need for an in-depth assessment of
cloud related security risks. Traditional risk assessment methods do not fit CC
well due to its complex environment and the assumption by those methods that
assets are owned and fully controlled by the enterprise itself. In this paper,
we propose a Delphi-based Cloud Security Risk Assessment Model (DCSRAM) that
identifies, analyzes, and evaluates security risks affecting CC adoption in
enterprises. The proposed model supports a higher level of trust in cloud
technologies from the side of enterprises and a cost-effective and reliable
productivity from the side of CSP. The model has been tested for applicability
and usability through a use case scenario. |
Keywords: |
Cloud Computing; Risk Assessment; Information Security; Data Privacy; Delphi
Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2020 -- Vol. 98. No. 01 -- 2020 |
Full
Text |
|
|
|