|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
June 2020 | Vol. 98
No.12 |
Title: |
THE VIRTUAL PROPERTY AS COLLATERAL FOR A LOAN: A COMPARISON BETWEEN
INDONESIA AND UNITED STATES |
Author: |
ULANI YUNUS, ABDUL SALAM, RAISSA RICHKA JONAH |
Abstract: |
The Virtual property meets a set of criteria for it to be considered an
object of property under property law which are rivalrousness, persistence,
interconnectivity, valuable, available, and defendable from interference by the
other parties. As the meaning of property is extended to include the virtual
property, it should be treated with the same legal status as real-world
property. Therefore, it is reasonable that the virtual property as an object of
property can be used as collateral for a loan because it does not only give the
rights to peaceful enjoyment but also provides security interest. Under Article
9 Uniform Commercial Code, eSnowshoes, a United States-based company, uses its
domain name and storefront in a virtual world called Second Life to secure
financing. By comparing Indonesian legal framework to the United States legal
framework for the virtual property and security law, this article discusses the
possibility for the virtual property to be used as collateral for a loan in
Indonesian legal system. In this digital era, granting users property rights on
the virtual property will promote economic growth. However, some developers are
still enforcing Terms of Service and End-User License Agreement that restrict
users from owning virtual property they have made in the virtual world. The
clarity of the ownership of the virtual property is needed as only eligible
subjects capable to use their property as collateral for a loan. Also, it must
be clear what type of property that the virtual property belongs to. While the
United States enacts Article 9 Uniform Commercial Code for personal property and
fixture, the Indonesian legal system recognizes pledge and fiduciary as a
security interest for the movable property. Acknowledging the virtual property
as the movable intangible property is the most practical way to do for it to be
able to be used as collateral for a loan under Law No. 42 of 1999 on Fiduciary
because the perfection for it does not need to meet inbezitstelling principle.
However, the usage of the virtual property as collateral for a loan is needed to
be discussed further by the economic and financing experts on how to assess its
value. The method used in this research is descriptive analysis, carried out
through expert interviews, regulation, literature studies and normative
juridical. |
Keywords: |
Virtual Property, Indonesia, United States, Collateral for a Loan |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
METHODOLOGY FORMING FOR THE APPROACHES TO THE CYBER SECURITY OF
INFORMATION SYSTEMS MANAGEMENT |
Author: |
ADRANOVA A., YONA L., KRYVORUCHKO O., DESIATKO A., PALAHUTA K., BLOZVA A.,
GUSEV B. |
Abstract: |
This paper establishes the analogy of displaying an information security
management system (ISMS) for information systems (IS) as a queuing system (QS).
It became possible through the identification of structural and functional
analogies between ISMS and QS. As a result of such analogy, it became possible
to model the ISMS as a QS, and subsequently formulate the initial requirements
for the ISMS IS. It was defined that the ISMS can be interpreted as a
single-phase QS with possible losses. Model for determination of the QS
parameters was developed. Due to structural, substantive and functional
analogies, newly created models allow one to form range of quantitative ISMS
characteristics for IS. This allows one to ensure the effectiveness of the ISMS
design process, taking into account the prospects of increasing complexity and
the number of destructive effects on IP by attackers. Computational experiments,
carried out using a specially designed software application, confirmed the
reliability of the main theoretical provisions and practical developments. |
Keywords: |
Information Security Management System, ISMS, Queuing System, QS,
Information Protection, Information System, Design Characteristics |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
BLUEPRINT ENTERPRISE ARCHITECTURE IN DISTRIBUTION COMPANY USING TOGAF |
Author: |
EVARISTUS DIDIK MADYATMADJA, JOHANES FERNANDES ANDRY, AGUSTINUS CHANDRA |
Abstract: |
Current technological developments have become an important role in
helping people, especially in activities in the company. The development of this
technology has helped many companies in improving the performance and business
processes of the main and supporting companies. Information technology in
companies is needed to support their business processes. This distribution
company is currently not assisted by information technology in carrying out its
business activities, therefore some of the company's business processes such as
scheduling the delivery of goods that are not well organized due to customer
demand, data collection of goods in and out of warehouses that are not recorded,
and others. This makes the company requires the development of information
technology in helping the company's business processes. Enterprise architecture
can help companies in designing the development of information systems in the
company. Enterprise architecture has several frameworks that can be used in the
design of information systems such as the TOGAF, Zachman Framework, and others.
TOGAF framework will be used in this research as a modelling in designing the
process of developing enterprise information systems. The results of this study
will be in the form of proposed TOGAF method models that have been adapted to
business processes and business needs of the company to help improve the
company's business processes. |
Keywords: |
Enterprise Architecture, TOGAF, System Information |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
MIXED INTEGER LINEAR PROGRAMMING MODEL FOR INTEGRATED FISH SUPPLY CHAIN
PLANNING |
Author: |
NURDIN, M ZARLIS, TULUS, SYAHRIL EFENDI |
Abstract: |
The Province of Aceh has many types of fish resources that become superior
commodities, because most of Aceh's territory is located on the coastline which
is the waters of an exclusive economic zone. There are several regencies and
cities in Aceh province that are far from the coastline, thus experiencing a
shortage of fish supply, therefore planning and management of fish supply chains
is needed to anticipate uncertainty in fish supply for areas far from the coast.
In the production planning strategy scenario, the mathematical programming model
plays a very important role in balancing supply chain planning in decision
making, so this research was conducted with an optimization approach using the
Mixed Integer Linear Programming (MILP) method. The stages carried out in this
study began data collection and literature review, determining parameters and
decision variables, formulating the objective functions and constraints of the
model, designing the model, implementing the model, testing and simulating the
model. Model testing and simulations are carried out using the lindo program.
The purpose of this research is to make a Mixed Integer Linear Programming
optimization model for integrated fish supply chain planning, this model can
help to solve the problem of fish supply shortages in certain areas, so that
consumer demand for fish resources can be done quickly. The model of this
research can also minimize the operational costs of the fish supply chain from
suppliers to consumers. The results of this study are also expected to help
decision makers and stakeholders related to the planning and management of fish
resources in the province of Aceh. |
Keywords: |
Supply Chain, Optimization, Planning, Integrated, Fish |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
THE SAUDI MONARCHY @KINGSALMAN LEADERSHIP ON VIRTUAL SPACE |
Author: |
HANEEN MOHAMMAD SHOAIB |
Abstract: |
The purpose of this study is to understand how social media facilitate
leadership development on virtual space through Twitter. It addresses the impact
of virtual space in the re-conceptualization of the Saudi online monarchy
identity. This paper explores different facets of the Saudi Arabian leadership
reflected in its Monarchy-online identity that is manifested through virtual
space on Twitter. The research design builds on a dramaturgical approach and
virtual ethnography to analyze the official Twitter account @KingSalman of King
Salman bin Abdul-Aziz Al Saud and how social media affected the Monarchy-online
identity in comparison with front stage and backstage script. The research
incorporates multidisciplinary perspective to understand the role of virtual
space on the construction of identity from the perspective of culture, religion,
gender and international relations. The findings depict that virtual space
provide opportunity to Saudi Monarchy’s King Salman in order to have easy access
to general public and support in formation of leadership identity. This paper
contributes in a way to compare virtual and face-to-face leadership identity,
contribution of virtual space in constructing leadership and the ethical
consequences of identity-disclosure in Saudi Arabia through Twitter. |
Keywords: |
King Salman, Saudi Arabia, Monarchy-Online, Virtual Space, Dramaturgical
Approach |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
ENTERPRISE RESOURCE PLANNING (ERP) ADAPTATION IN MALAYSIA AGRICULTURAL
SME: ISSUES AND TRENDS |
Author: |
SYAIMAK ABDUL SHUKOR , AIDA SHEIKHI , AMNI HUSNA MOHD NASHIR |
Abstract: |
Small and Medium Enterprises (SMEs) are rapidly growing in various
industries in Malaysia. As part of their survival strategy, they need to be
competent, efficient, inventive and malleable in completing meek tasks while
focusing on carrying the other multifarious activities. In order to be relevant
in the current rivalry of Industry 4.0, any industry needs to be updated with
the current technology. Enterprise resource planning (ERP) is the cohesive
management of business processes, in real-time and facilitated by various
technologies. There are few types of ERP available for companies, in-house which
is designed for the business or off-the-shelf that companies obtain the license
and use and on the cloud which is eventually off the shelf but with more
personalization. Each has its advantages and disadvantages. The main objective
of this research to evaluate the recent condition of the ERP adaptation in
Malaysia Agriculture Sector. Furthermore, it will also recommend an appropriate
approach in ERP adaptation particularly in this SME sector. This paper start
with the overview of ERP adaptation in Malaysia SME especially the agriculture
sector. Unfortunately, the Agriculture Sector was an overlooked industry by
business IT service provider companies and many features were not compatible
with their standard operating procedure (SOP) which made the consideration of
ERP even riskier. The concept of ERP customization, the recent eminence of ERP
in Malaysia SME and its implementation are discussed. The challenges and issues
in adapting ERP in SMEs in Malaysia are also deliberated. Lastly, a suitable
approach of ERP adaptation in the agricultural SME industry are proposed and
concluded. |
Keywords: |
ERP, Customized ERP, ERP Adaptation, Agricultural SME, Malaysia SME |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
APPLICATION OF LOAD BALANCING ALGORITHMS TO IMPROVE THE QUALITY OF SERVICE
DELIVERY USING MODIFICATIONS OF THE LEAST CONNECTIONS ALGORITHM |
Author: |
SERIK JOLDASBAYEV, GULNAR. BALAKAYEVA, ORYNBASAR JOLDASBAYEV |
Abstract: |
To develop solutions to the problems of providing high-speed Internet,
that is, a high-quality service, up to a certain point, there is the possibility
of improving quality by increasing the hardware resources of the system, but, as
practice shows, quantity does not always mean quality, and the effectiveness of
the service delivery system takes into account the advantageous positioning of
resources with algorithmic load balancing on servers with maximum benefit, both
for the user and for the party providing services . This article provides the
results of research and analysis of balancing algorithms, implementation methods
for load balancing on servers and improving the quality of service delivery.
Research in this direction is very relevant and in demand, the article provides
an analysis and description of static and dynamic solutions, the advantages and
disadvantages of algorithms. A modernization of the Least Connections algorithm
is proposed. |
Keywords: |
Improving The Quality Of Service Delivery, Qos, Load Balancing, Balancing
Algorithms. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
CYBER SECURITY BASED MACHINE LEARNING ALGORITHMS APPLIED TO INDUSTRY 4.0
APPLICATION CASE: DEVELOPMENT OF NETWORK INTRUSION DETECTION SYSTEM USING HYBRID
METHOD |
Author: |
SARA TAMY, HICHAM BELHADAOUI, NABILA RABBAH, MOUNIR RIFI |
Abstract: |
The implementation of industry 4.0 is a complex process that involves
several steps and management of a project involving all the company's resources:
production, supply chain, engineering, maintenance, human resources, information
systems and many others. faced of the risks weighing on companies, and even
more on their sensitive data, the need to create a cybersecurity strategy for
the Industry 4.0 is more essential than ever. It has been apparent for
several years that industrial systems are vulnerable to computer attacks. This
can be explained because they were not designed with security constraints,
particularly because of their physical isolation from Internet. However, they
now face a variety of attackers with different objectives and abilities. In this
paper, we present our strategy of cybersecurity, based on machine learning
algorithms, applied in the context of industry 4.0. For this purpose, Unified
Threat Management based on machine learning algorithms (ML-UTM) was used. to
touch all layers of pyramid of Computer Integrated Manufacturing we propose to
put an ML-UTM between layer 4 and 3, and an Industrial Unified Threat Management
based on machine learning algorithms (ML-IUTM) between layer 3 and 2, another
ML-IUTM between layer 2 and 1. Then we will cite the works based on the use of
filtering device between layers 1 and 0. This paper describes a machine
learning approach to build an efficient and accurate network intrusion detection
system, which is one of the features of UTM, using a hybrid method. Thus, we
have combined the different machine learning algorithms, namely Support vector
machine (SVM), One rule (OneR), K-nearest neighbor (K-NN) and Random forest (RF)
with Particle Swarm Optimization (PSO) method using a real data set (Gas
pipeline), and according to the results of our analysis, we have selected the
best optimized classifier. The experimental results have demonstrated the
reliability and efficiency of the proposed approach. The PSO method can provide
various advantages to K-NN and RF classifiers such as higher accuracy, lower MSE
and faster time to build model. After analyzing and comparing all these results
it was found that the NIDS based RF optimized by PSO give the best performances,
with accuracy of 99.30%, F-measure of 99,30% and MSE that has been reduced to
0,0034. |
Keywords: |
Unified Threat Management, Intrusion Detection System, Machine Learning,
Particle Swarm Optimization, industry 4.0 |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
A REVIEW OF TRAINING DATA SELECTION IN SOFTWARE DEFECT PREDICTION |
Author: |
BENYAMIN LANGGU SINAGA, SABRINA AHMAD, ZURAIDA ABAL ABAS |
Abstract: |
The publicly available dataset poses a challenge in selecting the suitable
data to train a defect prediction model to predict defect on other projects.
Using a cross-project training dataset without a careful selection will degrade
the defect prediction performance. Consequently, training data selection is an
essential step to develop a defect prediction model. This paper aims to
synthesize the state-of-the-art for training data selection methods published
from 2009 to 2019. The existing approaches addressing the training data
selection issue fall into three groups, which are nearest neighbour,
cluster-based, and evolutionary method. According to the results in the
literature, the cluster-based method tends to outperform the nearest neighbour
method. On the other hand, the research on evolutionary techniques gives
promising results but is still scarce. Therefore, the review concludes that
there is still some open area for further investigation in training data
selection. We also present research direction within this area. |
Keywords: |
Software Defect Prediction, Training Data Selection, Nearest-Neighbor,
Cluster-based, Evolutionary-based |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
DETAILED PERFORMANCE EVALUATION OF ARANZ, ARAN AND AODV PROTOCOLS |
Author: |
LIANA K. QABAJEH, MOHAMMAD M. QABAJEH |
Abstract: |
Ad-Hoc networks are spontaneously formed when devices connect and communicate
with each other. One of the significant issues in mobile Ad-Hoc networks is
seeking an efficient and secure route from a specific source leading to an
anticipated destination. In managed-open environments there is a chance for
pre-deployment of some keys and certificates. ARANz protocol has been proposed
to be implemented in such environments and utilized the authentication
techniques of the original Authenticated Routing for Ad-Hoc Networks (ARAN).
ARANz seeks to enhance security, attain robustness and solve single point of
attack and failure problems by electing numerous certificate authority servers.
Furthermore, ARANz ensures improved scalability and performance through dividing
the network into zones and using restricted directional flooding. A detailed
and extensive simulated performance evaluation has been conducted to assess
ARANz and compare it with ARAN protocol and Ad-Hoc On-demand Distance Vector
(AODV). Results demonstrate that ARANz is able to discover secure routes
effectively within relatively large networks having large number of mobile
nodes, while attaining the minimum packet routing load. Results also show that
ARANz has superior performance regardless nodes density, local communications
percentage, zone size and failed nodes percentage. |
Keywords: |
Position-Based, Secure, Scalable, Routing Protocol, Mobile, Ad-Hoc Networks,
Managed-Open Environment, Location Service, Performance Evaluation, Aranz, ARAN
and AODV. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
THE RELATIVE IMPORTANCE OF THE CRITICAL SUCCESS FACTORS OF BUSINESS
INTELLIGENCE(BI) SYSTEMS IMPLEMENTATION IN JORDANIAN PHARMACEUTICAL COMPANIES |
Author: |
ZAID AHMAD ALABADDI , ARWA HISHAM RAHAHLEH , HAITHAM ALALI, MONIRA
ABDALLAH MUFLIH, SANAA NAWAF AL-NSOUR |
Abstract: |
The purpose of this paper is to investigate studies based on critical
success factors (CSFs) of Business Intelligence (BI) Systems implementations,
providing a systematic compilation of CSFs, and presenting a comprehensive
taxonomy of CSFs for BI system implementation. Keywords relating to this study
were defined and used to search journal databases to compile studies, referring
on references to CSFs for BI implementation systems. A total of 64 articles were
reviewed to achieve a depth of understanding of the various CSFs already
identified by other researchers and presenting a comprehensive taxonomy of CSFs
in the area of BI. Then surveying managers in Jordanian companies for the
production of human medicines for the relevancy and the importance of the
extracted factors. By analyzing all CFSs mentioned in the literature, the
taxonomy of BI CSFs implementation was formulated In the total of (21) CSFs were
identified. it provides a comprehensive bibliography of the articles published
and that can serve as a guide for future research. This paper is significant
because taxonomy helps us organize the knowledge And help the researchers to
make their search easier. The output of this paper will help future researchers
to increase the identification of related studies in the literature review phase
of their work. |
Keywords: |
Business Intelligence (BI) Systems, critical success factors (Csf). |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
INDIVIDUALITY REPRESENTATION USING MULTIMODAL BIOMETRICS WITH ASPECT
UNIETED MOMENT INVARIANT FOR IDENTICAL TWINS |
Author: |
BAYAN OMAR MOHAMMED , SITI ZAITON MOHD HASHIM |
Abstract: |
In essence, a biometric system comprises a pattern recognition system that
obtains a person’s biometric data from which a feature is set and then
extracted. Upon setting the feature, it is compared to the template set stored
in the database. Biometric identification systems need to not only have the
capacity to distinguish between individuals but to also be capable of
distinguishing individuals with nearly identical biometric signatures, such as
identical twins. Multimodal biometric systems are therefore currently more
popular because of their higher accuracy level in comparison to unimodal
biometric systems in the context of identical twins. Comparatively, these
systems require the extraction and selection of meaningful features. This paper
introduces a new method for a multimodal biometric system using the Aspect
United Moment Invariant for global feature extractions to detect identical
twins. An experimental data set comprised of 1600 images from 100 pairs of
identical twins collected from the Kurdistan region in Iraq is utilized. |
Keywords: |
Multi-Biometric, Identical Twin, Identification, Global Features, Aspect
United Moment Invariant (AUMI). |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
REVIEW OF PHYSICAL ACTIVITIES RECOGNITION FOR PATIENTS WITH SPINAL CORD
INJURIES |
Author: |
NORA ALHAMMAD , HMOOD Al-DOSSARI |
Abstract: |
Rehabilitation through physical activities is required to provide disabled
individuals with the ability to perform activities of daily life. It redevelops
motor skills which promote quality of life and increase level of self-care. To
evaluate therapy programs, a therapist is involved in the process to identify
whether the patient exercised the required activities through questionnaires and
interviews with the patient. However, such involvement is not only time
consuming and subjective in nature, but also might lead to inaccurate assessment
due to human error. To overcome such limitations and enhance the rehabilitation
process, these activities might be detected using activity recognition systems.
The objective of this study is to review the literature on upper-limb activity
recognition using wearable sensors for able-bodied and disabled populations with
more emphasize on the latter. A total of 17 studies were included in the review.
The type of recognized activities, approach used to build the model, and the
number and health status of the participants were varied across the studies.
Although several researches recognize part of the activities used to
rehabilitate patients with spinal cord injuries, no one has completely covered
these activities. |
Keywords: |
Rehabilitation, Activity Recognition, Machine Learning, Spinal Cord
Injuries, Wearable Sensors |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
TOWARDS A DYNAMIC ANALYSIS OF LEGACY SYSTEMS FOR REVERSE-ENGINEERING
INTERACTION DIAGRAMS |
Author: |
EL MAHI BOUZIANE, CHAFIK BAIDADA, ABDESLAM JAKIMI |
Abstract: |
Recently, reverse engineering has become widely recognized as a valuable
process for extracting system abstractions and design information from existing
software. Reverse engineering for legacy systems is used to retrieve missing
design documentation from existing source code in an abstract model UML format
for studying both the static structure and dynamic behavior of the system and
for expanding the new features to the product. To help engineers to understand
the behavior of these systems, a dynamic analysis technic is used to recover the
UML sequence diagram of an object-oriented program. In this context, most
existing approaches in addition to not filter execution traces, don’t allow to
extract properties of control structure corresponding to combined fragments
operators such as loop, alt and opt. They can’t also detect the operator par
which is important in the case of multi-threading systems. In this paper, we
propose a novel approach based on Colored Petri Nets (CPNs). This approach
allows to generate UML2 sequence diagram with main combined fragment operators:
seq, loop, alt, opt and par. It consists of four steps: trace collection, trace
filtering, trace merging, and high level sequence diagram (HLSD) extraction.
CPNs are used to abstract execution traces in order to facilitate their
analysis. |
Keywords: |
Reverse Engineering, Legacy Systems, Sequence Diagram, Colored Petri Nets,
Dynamic Analysis, Execution Traces |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
Title: |
HOUSEBREAKING CRIME GAIT PATTERN CLASSIFICATION USING ARTIFICIAL NEURAL
NETWORK AND SUPPORT VECTOR MACHINE |
Author: |
HANA ABD RAZAK, ALI ABD ALMISREB, MOHAMMED AHMED MOHAMMED SALEH,
NOORITAWATI MD TAHIR |
Abstract: |
The rate of crime is worsen and has led to a growing number of studies on
human identification namely gait recognition. Hence, this study focused on the
normal and anomalous behavior at the gate of residential units based on gait
features extracted using Kinect sensor. Firstly, dataset of housebreaking crime
behavior and normal behavior at the gate is acquired and collected. Further,
orthogonal least squares (OLS) are utilized to extract and select the gait
features along with principal component analysis (PCA) as gait feature
optimization. Next, classification of gait features is done using artificial
neural network (ANN) and support vector machine (SVM). Result attained showed
that the recognition performance using ANN classifier was up to 99% but only 50%
for SVM classifier. Findings from this study showed that the most optimum
accuracy rate is at 99.78% using ANN with GDX as the learning algorithm in
classifying both normal and anomalous behavior at the residential gate units. |
Keywords: |
Anomalous Behavior, Kinect, Orthogonal Least Square (OLS), Principal
Component Analysis (PCA), Artificial Neural Network (ANN), Support Vector
Machine (SVM) |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2020 -- Vol. 98. No. 12 -- 2020 |
Full
Text |
|
|
|