|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
December 2020 | Vol. 98
No.23 |
Title: |
USING PLAYABILITY HEURISTICS TO EVALUATE PLAYER EXPERIENCE IN EDUCATIONAL VIDEO
GAMES |
Author: |
AMER IBRAHIM, MAHMOUD MAHFURI, NAHIL ABDALLAH, HAMZAH ALKHAZALEH, TAWFIK ZEKI |
Abstract: |
Educational video games (EVG) provide a rich platform to improve the Player
Experience (PX), and constitute some of the main edutainment applications
currently in the market. However, the evaluation of video games as educational
tools is very difficult due to their dual nature (fun and education). In some
cases, PX (as an usability measure) is a very important aspect of the EVGs and
is a good measure of the level of fun and education presented to players.
Educational Playability (playability in EVG) attributes are a suitable and
effective tool to analyze and measure the experience obtained by a player during
a game. To this end, it is necessary to evaluate the playability to determine
the degree of improvement in PX. Playability evaluation through different
methods is one of the major topics of PX in video games. In this paper, we
present a new approach to evaluate the PX by using the educational playability. |
Keywords: |
Heuristics, Player Experience PX, Playability, Educational Video Game EVG. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
PREDICTING THE COVID-19 SPREAD, RECOVERIES AND MORTALITIES RATES IN SAUDI ARABIA
USING ANN |
Author: |
MOHAMMED A. ALSUWAIKET |
Abstract: |
The worldwide pandemic of the COVID-19 has become the main national security
issue for almost all nations. The advancement of accurate prediction models
provides insights into the spread of this infectious disease. In fact, the high
uncertainty and low size of data have caused some epidemiological models that
show low accuracy for long-term prediction. Although the related works include
many attempts to deal with this issue, the robustness abilities of current
models need to be enhanced. In this paper, to achieve the main contribution, a
prediction model using Artificial Neural Networks (ANNs) approach is developed
based on the COVID-19 data from March 2, 2020 to August 5, 2020 to predict
COVID-19 spread rate, recoveries rate, and mortalities rate in Saudi Arabia
using Python programming language for the implementation stage and code has been
developed to achieve the final results. The evaluation in this paper has
conducted through calculating the values for Correlation Coefficient (CC), Mean
Absolute Error (MAE), and Mean Square Error (MSE). However, the results are
promising by achieving low MAE with average value 0.05 and MSE with average
value 0.02, and high Correlation Coefficient for all targets’ rates with average
value 0.97. Paper further recommends that real novelty in spread prediction can
be realized through using other machine learning models with different types of
COVID-19 data. |
Keywords: |
COVID-19, Neural Networks, Artificial Intelligence, Coronavirus, Pandemic. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
FACE VERIFICATION USING CONVOLUTIONAL NEURAL NETWORK WITH PARTIAL TRIPLET LOSS
ON FACE WEARING GLASSES |
Author: |
MUHAMMAD IKHSAN , RADEN SUMIHARTO , WAHYONO |
Abstract: |
The role of face verification in the field of security and law enforcement has
become an important part of daily life. However, the challenges involved in face
verification still have an impact of inaccuracy on several factors that affect
verification performance. One of them is the use of camouflage causing facial
occlusion, such as wearing glasses. This research was conducted to find out the
effect of wearing glasses on method performance. Therefore, CNN algorithm with
siamese architecture is used to extract features from the face and propose to
use the partial triplet loss function to partially minimize the optimization
problem on the network. In experiment, our proposed approach achieves the lowest
loss of 0.953 in training data, the highest accuracy of 68% for verification on
face wearing glasses with partitioning and 73% accuracy for verification on face
without wearing glasses with partitioning, both in verification data. These
results are better than combination of CNN and transfer learning which only
achieves 55%. Thus, it can be concluded that our proposed method could handle
partial occlusion due to face wearing glasses. |
Keywords: |
Face Verification, Occlusion, Partial Image, Siamese, Triplet Loss |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
NEW WEIGHTING SYSTEM FOR E-READINESS INDICATORS BASED ON INDICATOR IMPORTANCE
MEASUREMENT BY THE RANDOM FOREST ALGORITHM |
Author: |
RABII LAMRIQ, ABDELAZIZ DOUKKALI, NAJIB BELKHAYAT |
Abstract: |
Weighting the indicators was always a difficult step in building the composite
indicators. In the e-readiness assessment approaches, where there are several
indicators of different categories, the weighting methods used are not effective
enough to assess the importance and the real priority of the indicators. In this
article, we have presented two contributions: the first consists in combining
subjective weighting with objective weighting to build a complete and optimal
weighting system. the second contribution aims to propose a new statistical
method based on the random forest algorithm to measure the importance of
indicators and calculate objective weighting. A case study on the Internet
Inclusive Index of 2019 is illustrated to assess the effect of the new weighting
system on the scores and ranking of 100 countries. |
Keywords: |
Combination Weighting, Objective Weighting, Subjective Weighting, E-Readiness,
Variables Importance |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
STUDY OF BEHAVIORAL INTENTIONS AMONG CHINESE AND SOUTH KOREAN M-COMMERCE
CONSUMERS |
Author: |
MAHMOOD A. AWAN |
Abstract: |
The usage of mobile phones and Internet around the world has grown nowadays,
this is causing a continuous increase in adoption of M-commerce. Users’
intention of M-commerce can be considered through theoretical and practical
understanding of factors which are m-commerce ubiquity, habits and others
related to cultures and demography. Firstly, the availability of mobile phones
and internet can support using M-commerce of consumers. This research uses
ubiquity as a multidimensional construct and measure it through Immediacy,
Portability, Continuity, Search-ability across China and South Korea. Current
study attempts to fill out the research gap by considering to consumer behaviors
in using M-ecommerce across China and South Korea through evaluating some more
key factors that drive M-commerce such as perceived usefulness and perceived
ease of use. Our findings indicate both similarities and differences among
consumers in different markets which are different in stages of M-commerce
readiness. Regarding the developing country, China has different factors that
impact M-commerce usage, are mostly assumptions about contextual
characteristics, included technology readiness stage, customer characteristics
and so on. For example, the effect of ubiquity on intention to use M-commerce is
remarkably greater for customers in China compared with those who are in South
Korea. Since in China, the technology is developing so that there are different
types of accessibility in this country for Internet and usage of M-commerce.
Basing on our result, we suggest some ideas for international marketing
strategies. Our results reveal that depending on the stage of M-commerce
readiness, users in China and South Korea assign greater importance to different
factors. This implicated that a simple standardization strategy will not work
well. In South Korea, we should focus on building habit by highlighting
M-commerce benefits. M-retailers in China should be aware of the likelihood as
how to use M-commerce rather than using it habitually. |
Keywords: |
Developed Versus Developing Markets, Mobile Commerce, Readiness, Ubiquity,
China, South Korea |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
MODELLING OF PROCESS INFORMATION DISSEMINATION AND ITS IMPACT DYNAMICS TO MASS
CONSCIOUSNESS |
Author: |
ANATOLII FEDOTOV, VLADIMIR BARAKНNIN, ASLANBEK MURZAKHMETOV, IGOR MILYUK |
Abstract: |
The paper deals the problem of modelling information dissemination in the
community and its impact on the mass consciousness. At the same time, the
quality of information in the paper implies such categories as innovation, idea
and opinion. To study the dynamics of information dissemination in society has
been proposed system with a dynamic modelling approach, which allows to take
into account a number of significant factors influencing the processes of
information dissemination in society and the impact of this information on the
mass consciousness. The proposed model reflects such factors as the probability
of interest, interpersonal contact, media exposure, the likelihood of
communication on the topic of information, the probability of forgetting, the
number of contacts, an indicator of mass character and regularity of the media
promoting a certain idea. The proposed simulation system with a dynamic model
allows simulating various scenarios for the development of information
dissemination processes in a community, identifying relationships between
factors influencing the dynamics of information effects on mass consciousness,
and under given initial conditions its practical implementation possible in the
Anylogic simulation package. This paper contains the results of the application
of original descriptions of human behavior models and scenarios at various
levels of communication. Comparisons with other this kind systems have shown the
advantages of the approach proposed by the authors. As a result of the conducted
experiments, dependencies were revealed between the rate of acceptance of
information by new members of the community and the frequency of contacts of
persons who already perceived the information. The results of the work can be
used in sociological, biological, economic, and socio-psychological studies of
mass communication to predict various scenarios and control mass consciousness,
for example, the process of promoting goods and services in a competitive market
environment. |
Keywords: |
Diffusion Of Innovations, Information Dissemination, Public Opinion, Mass
Consciousness, Interpersonal Communication. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
BLOCKCHAIN FOR BANKING SYSTEMS: OPPORTUNITIES AND CHALLENGES |
Author: |
AREEJ AL SHORMAN, KHAIR EDDIN SABRI, MOHAMMAD A. M. ABUSHARIAH, MOHAMMAD QAIMARI |
Abstract: |
Blockchain is a promising technology for both academic studies and practical
industrial applications. It enables decentralized public ledgers to hold
immutable data securely and ensures that the data cannot be altered. Digital
identities, social media, supply chain management, luxury goods, and financial
assets are among the domains that have widely benefited from this technology. In
the literature, we found only a few review papers that target the banking
domain, instead of a complete overview of the blockchain-based financial sector.
These reviews are limited in reports and articles. Accordingly, the main aim of
this study is to present an overview of blockchain-based banking services and
discuss the challenges of applying blockchain technologies in the banking domain
to give a clear understanding to professionals and researchers in this domain. |
Keywords: |
Blockchain, Ethereum, Cryptocurrencies, Bank Services, Centralized System,
Decentralized System |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
THE INTEGRATED TECHNOLOGY DESIGN TO GUIDE THE BLIND PERSON TO NAVIGATE SAFELY |
Author: |
HUTHAIFA A. AL_ISSA, MOHAMMAD QAWAQZEH, SAJA ABU-ZAIDEH, SHAMSUL ANUAR SHAMSUDIN |
Abstract: |
It is very hard and dangerous for a visually impaired person to get out alone
from home and to navigate around places without any help, he cannot go out
without a companion who can count on him and trusting him. This led us to think
deeply to solve this problem and make the life easier for blind and help them to
move freely and go ahead like any ordinary people by using Internet of Things
(IoT). This integrated technology tool will help the blind in their movement
without any fear from colliding and fall through giving the blind person alerts
when the sensors detect any danger reason like a wall or stairs. So disable
society, and community empowerment is our ultimate goal. |
Keywords: |
Arduino, Gsm300, Speaker, LDR, Ultrasonic Sensor, Water Sensor, GPS. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
NEW EFFICIENT AND ROBUST NTRU POST-QUANTUM KEY EXCHANGE RELEASE NTRU-ROBUST |
Author: |
El HASSANE LAAJI, ABDELMALEK AZIZI |
Abstract: |
Since 2016, the National Institute for Standards and Technology (NIST) launched
a post-quantum standardization project. Now the competition reaches its third
round, and NIST inviting the cryptographic community to participate by improving
and analyzing the finalist candidates. On our side, we contribute by creating an
improved release of NTRU Lattice-Based post-quantum key exchange (KEM) scheme,
called “NTRUrobust”; with parameters set that meet the category 5 security level
defined by the NIST. NTRUrobust used our own Fast Modular Multiplication
algorithm (FMMA) and the Number Theoretic Transform algorithm (NTT) together for
speeding-up the polynomials multiplication in the cryptographic process. We
obtain drastic results; our release is faster by factor up to 93 times than
NTRUphs821 release proposed by the NTRU team. NTRUrobust warrants strong
security level, perfect correctness, and great flexibility for eventual future
extensions. |
Keywords: |
Post Quantum cryptography, Modular Multiplication, NTRU, NTT, KEM. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
A REVIEW OF NAMED ENTITY RECOGNITION AND CLASSIFICATION ON UNSTRUCTURED MALAY
DATA |
Author: |
ROSMAYATI MOHEMAD, NAZRATUL NAZIAH MOHD MUHAIT, NOOR MAIZURA MOHAMAD NOOR,
ZULAIHA ALI OTHMAN |
Abstract: |
In recent years, due to the emergence of various social network platforms, a
massive amount of data is continuously generated and shared. The majority of the
data is unstructured, which contains information that might be crucial and
valuable if analyzed. Effective use of these unstructured data is a tedious and
labor-intensive task. Information extraction is one of the on-going research
areas to extract potentially useful information out of voluminous data. Several
different techniques and methods for information extraction have been proposed
to understand the content and context of any available unstructured data at the
low-level structure. However, there are limited studies conducted to investigate
the challenges of Named Entity Recognition and Classification (NERC) on
unstructured Malay data, which is known as one of the main subtasks in
information extraction. Therefore, this paper addresses a comprehensive review
of the existing NERC techniques for processing unstructured Malay data along
with its limitations and challenges. The contributions of this paper are
twofold. The primary contribution is it presents the overview of prior studies
on NERC techniques of unstructured Malay data. Second, it scrutinizes the
limitations and challenges of theses existing techniques due to the voluminous,
dimensionality, and heterogeneity of unstructured Malay data. The findings show
that most of the previous studies using a machine learning-based approach
produce a satisfactory result rather than a rule-based approach. Furthermore,
the challenges in terms of the different morphological of Malay language
compared to resource-rich languages such as English, limitation of Malay corpus
and annotated Malay text, and Malay text ambiguities could influence the
performance of Malay NERC system efficiency, which should be carefully
considered during the design of the systems. |
Keywords: |
Information Extraction, Malay Language, Named Entity Recognition and
Classification, Unstructured Data |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
IMPROVING ARABIC QUESTION ANSWERING SYSTEM BY MERGING ANER TECHNIQUE, UPDATED
QUESTION CLASSIFICATION TECHNIQUE AND STOP WORDS TECHNIQUE |
Author: |
BELAL ABUATA, IYAD ALAZZAM, FADI ALKHAZALEH |
Abstract: |
Question answering systems are basically of three types: open domain, closed
domain and restricted domain. In this paper we build a question answering system
that tries to take users' questions, and provide them the answer in Arabic
language. The proposed system is called AMAU (Arabic question answering system
by merging Aner technique, updated question classification technique and stop
words technique). AMAU focuses on question processing and document processing.
After building the AMAU system, it was evaluated based on precision, recall and
f-measure by ANER QA and ANER data set. The AMAU system is also compared with
Arabic NER system using precision, recall and f-measure. The evaluation results
show a better performance by AMAU. AMAU produced an average precision of up to
80% compared to Arabic NER system that produced an average precision of up to
63%. The proposed system performed best when stemming and stop words were used
and resulted in the highest values of Recall, Precision and F-measure compared
to NER system. |
Keywords: |
Information retrieval, Question Answering, Hybrid Approach |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
PREDICTING EXTRUSION PROCESS PARAMETERS IN NIGERIA CABLE INDUSTRY FOR
POLYETHYLENE CABLE INSULATION USING ARTIFICIAL NEURAL NETWORK |
Author: |
Dr. ADEMOLA ABDULKAREEM, AYOKUNLE ADESANYA, Dr. ADESINA LAMBE MUTALUB, Dr.
AYOKUNLE AWELEWA |
Abstract: |
In order to obtain quality cable products in the thermoplastic extrusion
process, it is important that during the polymer extrusion process, a melt that
is homogenous in both temperature and composition is delivered. To achieve this,
it is important to control, monitor, identify and select the important
parameters during the extrusion process which directly impacts the product
output. Some of these parameters include the melt pressure, temperature, line
speed, screw speed, amongst others. In developing countries, however, these
parameters are often selected on a trial and error basis which often leads to
waste of material and the production of poor quality cables. This paper focuses
on a technique which can be used to predict realistic extrusion process
parameters for medium to high voltage cable insulations using artificial neural
network. Real life datasets for the extrusion of Polyethylene (PE) thermoplastic
were obtained and a three-layered feed-forward neural network as developed in
the MATLAB environment. The neural network model developed can predict the
manufacturing extrusion process parameters for different grades of PE
thermoplastic which is used for medium to high voltage electrical cable
insulation. A regression value of 0.99569 was obtained and a mean square error
of 2.98052×〖10〗^(-6) was achieved. |
Keywords: |
Insulation Cables, Extrusion Process, Polyethylene, Cable Industries, ANN,
Machine Learning |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
OVERVIEW OF CHAMELEON MECHANISM IN B-MAC PROTOCOL FOR WSN |
Author: |
ALAA K. Y.DAFHALLA, NADA.M.O SID AHMED, MOHAMED ELSHAIKH, HIBA.M.ISAM |
Abstract: |
Wireless Sensor Networks (WSN) is gaining the interest of researchers due to
numerous applications. WSN consists of sensor nodes connected with wireless
technology to form a network. The sensor devices powered by the battery and
collect the data from the environment and send to a base station. In the
wireless sensor network, the topology changes frequently due to sensor nodes.
The aforementioned behavior emphasis the impact of the MAC protocol mechanism in
the performances of WSN. In recent years, the analysis of WSN MAC protocols and
their impact on the performances of the network with different network scenarios
has significantly developed a precise understanding of the requirements and
goals for designing a MAC protocol. In the literature, many MAC protocol
mechanisms are proposed to deal with WSN requirements. Nonetheless, proposed MAC
mechanisms in the literature considered a single network scenario in WSN.
However, the sensor nodes face some problems like the failure, addition, energy
depletion, and movement which leads to different scenarios. The adhered behavior
of WSN nodes results in a need for a MAC mechanism that addresses the
requirement of more than one network scenarios. This paper, proposes a chameleon
mechanism for MAC protocol to tackle topology changes in WSN. The proposed
mechanism defines the performances of a MAC protocol in different network
scenarios as a single and multiple objectives optimization problems. Further, a
simulation implementation of the two methods above are presented. The discrete
event simulator OMNET++5 and the INET3.5 modules are used for the simulation
purposes in this work for their advantages in simulating wireless sensor network
protocols and networks. The obtained results show that chameleon mechanism B-MAC
reduce the power consumption of WSN for hybrid scenario. |
Keywords: |
B-MAC, Differential Evolution Algorithm, Power Consumption, Taguchi Method, WSN |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
IMPROVED MOTH FLAME OPTIMIZATION BASED ON HARRIS HAWKS FOR GENESSELECTION |
Author: |
RUBA ABU KHURMA, IBRAHIM ALJARAH, AND AHMAD SHARIEH |
Abstract: |
Microarray technology is a major shift in the medical and diagnostic fields.
Gene expression data are coded by a large number of genes and a limited number
of patient’s samples. This causes a challenging problem for the gene selection
(GS) methods to specify the most relevant and reliable genes for cancer
diagnosis. Recently, meta-heuristic (MH) algorithms have made an evident
contribution in handling the gene expression data. A great expansion has been
achieved in developing robust and efficient cancer diagnostic systems. In this
chapter, a hybrid MH-MH wrapper, called IMFOHHO is proposed for the GS problem.
The proposed approach is based on hybridizing the Moth Flame Optimization (MFO)
algorithms and Harris Hawks Optimization (HHO) to improve the exploration and
the exploitation phases. The main purpose is to integrate the excellent features
of both algorithms in one model and overcome their limitations when experienced
in the gene search space. Combining two swarm systems in one model can achieve
strong exploration for the gene space and ensure the diversity of solutions. The
performance of the proposed method has been evaluated using ten gene expression
data sets. The comparative study demonstrates that the IMFOHHO model enhances
the classification performance without increasing the computational complexity. |
Keywords: |
Genes selection (GS), Microarray, Harris Hawks Optimization (HHO), Moth Flame
Optimization (MFO), Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
KEY DEPENDENT DYNAMIC S-BOXES BASED ON 3D CELLULAR AUTOMATA FOR BLOCK CIPHER |
Author: |
SHARIFAH MD YASIN, AYMAN MAJID HAMID, NUR IZURA UDZIR, 4SHERZOD TURAEV, MUHAMMAD
REZAL KAMEL ARIFFIN |
Abstract: |
Substitution boxes (S-Boxes) are critical components of numerous block ciphers
deployed for nonlinear transformation in the cipher process where the
nonlinearity provides important protection against linear and differential
cryptanalysis. Classical S-Boxes are represented by predefine fixed table
structures which are either use for Data Encryption Standard (DES) or Advanced
Encryption Standard (AES). Based on cryptanalysis, it does not offer sufficient
cipher protections. The S-boxes used in encryption process could be chosen to be
key-dependent. For secure communication, we need a better design of S-boxes to
be used for encryption and decryption. In this paper we proposed key dependent
dynamic 3D cellular automata (CA) S-Boxes for block ciphers. Our work is based
on the design of AES S-Boxes which are originally in 2D presentation. The
conceptual framework of the 3D CA S-Boxes is to convert and apply the 3D CA rule
to static AES S-Boxes. The methodology is to do conversion from the AES S-Boxes
into 3D array of (8x8x4) S-boxes, and then applies the 3D CA Von Neumann rules
to them. After a 3D array is obtained from the AES S-Box, the 3D CA is applied
based on the round key. The 3D array S-Box are then converted back to the 2D
array S-Box and finally it is improved to meet the requirements of good S-Boxes.
The obtained S-Boxes is called key dependent dynamic 3D CA S-Boxes having
interesting features with dynamic stretchy arrangement, which is functionally
understood by CA. Our proposed 3D CA S-boxes are better in comparison with the
AES S-Boxes with predefined fixed table structures. Experimental results shown
that the proposed 3D CA S-Boxes have secure characteristics like nonlinearity,
SAC, BIC and algebraic degree. The proposed S-Boxes can be implemented in any
block cipher for secure communication. |
Keywords: |
Secure Communication, Block Cipher, Cellular Automata, Dynamic S-Boxes, Key
Dependent |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
STATISTICAL COMPARISON BETWEEN EL-MLP AND EL-ANFIS, OPTIMIZED BY MEANS OF ANOVA,
FOR THE PD CONTROL OF A MOBILE ROBOT |
Author: |
DANTE GIOVANNI STERPIN, JESUS DAVID MARTÍNEZ VELANDIA, FERNANDO MARTINEZ SANTA |
Abstract: |
In this paper, two types of controller for a mobile robot with the
wall-following task are statistically compared. One of them is a Multi-Layer
Perceptron (MLP) while the other one is an Adaptive-Network-based Fuzzy
Inference System (ANFIS). Here, such controllers are named: EL-MLP and EL-ANFIS,
because they were trained by means of an analytical method known as Extreme
Learning Machine (ELM). They were structurally optimized with a statistical
method known as Analysis of Variance (ANOVA), and a t-Test between two
populations with the best exemplars of each type of controller, demonstrates
statistically that EL-ANFIS generalizes better than EL-MLP, due to its
validation error mean, and variance, are significantly lower. |
Keywords: |
Multi-Layer Perceptron (MLP), Adaptive-Network-based Fuzzy Inference System
(ANFIS), Extreme Learning Machine (ELM), Analysis of Variance (ANOVA),
Hypothesis test between two populations (t-Test), PD Control. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
DETERMINANTS OF M-COMMERCE USAGE IN JORDANIAN HOSPITALITY INDUSTRY |
Author: |
ALI M. AL-NAIMAT, MOHAMAD A. ALNUAIMI, AHMED MOHAMMED ABDULAAL, MOHAMMAD ZAYED
ALMUIET |
Abstract: |
This research explores the crucial usage determinants of mobile commerce in
Jordan's tourism and hospitality industry. A thorough analysis of the related
literature helps to develop a conceptual framework for better understanding the
use of m-commerce in the hospitality sector. On the data obtained from 168
Jordanian hospitality SMEs. Smart-PLS as an approach of structural equation
modeling was used to validate research framework. The research demonstrated that
the critical determinants of m-commerce usage are perceived ease to use,
perceived usefulness, system quality, and service quality. This research helps
to better understand m-commerce use in developing countries, particularly in
Jordan. Through offering evidence-based approaches and policies it will
encourage the growing of m-commerce in the hospitality field. |
Keywords: |
M-commerce, Determinants Factors, Hospitality, SMEs, Jordan |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
USING AUGMENTED REALITY TECHNOLOGY FOR VISUALIZATION OF EDUCATIONAL PHYSICAL
EXPERIMENTS |
Author: |
YEVGENIYA DAINEKO, MADINA IPALAKOVA, AIGERIM SEITNUR, DANA TSOY, NURZHAN
DUZBAYEV, ZHANSAYA BEKAULOVA |
Abstract: |
Augmented reality is a promising tool, which opens great opportunities for
visualization. In the article a brief description of the augmented reality
technology and an overview of some aspects of its application are given. The
possibilities of using the augmented reality technology in teaching physics are
described. An example of a developed application with the elements of augmented
reality to study the phenomena of optics is presented. A free implementation of
the library NyARToolkit and Unity 3D game engine were used for the project
development. The results of the survey, test and interview conducted among the
students before and after using the application clearly demonstrate its positive
influence on the education process. It is shown that the developed application
with augmented reality technology is effective and practically useful as an
educational tool, especially in studying natural sciences. |
Keywords: |
Augmented Reality, Education, Physical Experiments, NyARToolkit, Unity 3D |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
MACHINE LEARNING ALGORITHMS AND CLASSIFICATION OF TEXURES |
Author: |
G.TAUBAYEV, A.L.BYCHKOV, F.A.MURZIN, 3N.E.RUSSKIKH, E.I.RYABCHIKOVA,
S.S.KHAIRULIN, G.B.ABDIKERIMOVA |
Abstract: |
The aim of the research is to develop algorithms for analyzing images obtained
from various sources. The paper analyzes images of the ultrastructure of plant
cell walls, obtained by transmission electron microscopy of plant raw materials,
after various physicochemical and/or mechanochemical processing. The main focus
is on the development of classification methods based on machine learning
models. There were used learning traditional classifiers and learning deep
convolution neural networks. The question of the applicability of methods for
learning neural networks with many hidden layers, united under one term "deep
learning" is investigated. The optimal parameters of the classifiers were
selected automatically using the GridSearch function of the Sklearn software
package. The work was carried out for the Institute of Solid State Chemistry and
Mechanochemistry of the Siberian Branch of the Russian Academy of Sciences. The
study was supported by a grant from the Russian Science Foundation (project No.
16-13-10200). |
Keywords: |
Textural Images, Texture Features, Electronic Microscopy, Deep Learning, Random
Forest |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
ANALYSIS OF AD-HOC NETWORK ROUTING METRICS EFFICIENCY |
Author: |
TIGUIANE YÉLÉMOU, BOUREIMA ZERBO, MESMIN TOUNDÉ DANDJINOU, DODA AFOUSSATOU
ROLLANDE SANOU |
Abstract: |
In the current context of ubiquitous computing, the contribution of ad hoc
networks is strongly awaited. To enable these networks to play their full role,
research is being actively carried on improving their Quality of Service (QoS).
We focus on an improvement that considers link quality in route choice. In this
paper, we analyze effectiveness of usual metrics and QoS methods used to improve
routing in ad hoc network when considering the erroneous nature of radio links.
We are particularly interested in costs of estimating the quality of the links,
accuracy of measured value, relevance of the metric contribution in the choice
of better paths. We carry out a detailed study on the metrics Hop count,
Expected Transmission Count (ETX), Bit Error Rate (BER), number of Packet
Retransmissions (PR), Delay and their derivatives. To test the efficiency of
these metrics and compare their efficacy, we have implemented them into the
well-known Optimized Link State Routing protocol. Realistic simulation results
show that number of retransmissions-based metric outperforms traditional metrics
based on delay, BER or Expected Transmission Count. |
Keywords: |
Wireless Networks, Routing Metrics, Number Of Retransmissions-Based Metric, Qos
Routing Protocols Efficiency, Olsr Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
A REVIEW ON USING BLOCKCHAIN IN WIRELESS SENSOR NETWORKS |
Author: |
SHURUG ALSAEDY, SHOUQ ALRADDADI, ALI OWAIS |
Abstract: |
Wireless Sensor Networks are important parts of Internet of Things, which are
used to collect information from specific areas. A WSN is a self-organizing
network built by a large number of cheap, limited energy, weak computing and low
storage capacity sensor nodes. The blockchain technology is utilized to solve
the limitations of sensor nodes and enhances the performance of WSNs. This paper
reviews the most recent proposed approaches of employing blockchain in WSNs and
their research outcomes. Most of the previous studies focus on improving the
security, reliability, data storage, and node recovery and energy efficiency of
WSNs. This is the first paper that highlights this subject and discusses all the
related works. This review can be used as a basis for researchers who are
interested in employing blockchain technology in WSNs. |
Keywords: |
Wireless Sensor Networks; Blockchain; Internet of Things; Security; Reliability;
Energy Efficiency |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
SIGNATURE RECOGNITION BASED ON SUPPORT VECTOR MACHINE AND DEEP CONVOLUTIONAL
NEURAL NETWORKS FOR MULTI-REGION OF INTEREST |
Author: |
MAHMOUD Y. SHAMS, OMAR. M. ELZEKI, MOHAMED E. ELARABY, NOHA A. HIKAL |
Abstract: |
Human Signatures are still used in banks, organizations, and in many other
security issues. Currently, the need not to touch any physical components,
minerals, or devices has become a very important necessity, especially in the
spread of viruses that are transmitted and largely preserved in minerals. This
paper presents a new algorithm to identify and verify humans based on the
enrolled signatures. Some features may influence the shape, rotation, and
structure of the digital signature. All these features should be taken into
consideration as it may be varied randomly every time each person enrolled the
signature to the system. In this paper, we took three important Region of
Interest (RoI) named as Multi-Region of Interest (MRoI) by which most common
features of the entered signatures are taken into consideration. The MRoI are
equal splitted region that are convoluted to produce one template applied to
support vector machine (SVM) classifier. Every RoI of the signature are then
applied to local binary pattern (LBP) feature extractor, then it convoluted to
one template pattern to be classified using SVM. Furthermore, Deep Convolutional
Neural Networks (DCNN) is presented for both feature extraction and
classification stages to boost the results obtained for MRoI using SVM. We
present fully connected layer of DCNN for 128 person, Further, we implement the
proposed architecture using dropout softmax based on SVM. The proposed system is
designed to handle both Arabic and English handwritten signatures collected from
128 individuals and the accuracy achieved is 95%. |
Keywords: |
Signature Recognition, Deep Learning, Deep Convolutional Neural Network, Support
Vector Machine, Region Of Interest, Dropout, Softmax. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
SECURITY CHALLENGES IN 6LOWPAN PROTOCOL FOR INTERNET OF THINGS: A REVIEW |
Author: |
MARINA MAZNI MAZLAN, NURUL AZMA ZAKARIA, ZAHEERA ZAINAL ABIDIN |
Abstract: |
Internet of Things (IoT), is one of the Internet technology that has undergone
rapid evolution over the past numerous years. The IoT connects various ranges of
devices such as actuators, sensors and processes, which can assist in connecting
several applications through the Internet. 6LowPAN plays an important role in
the IoT world where the network type has its unique characteristics and
applications. 6LoWPAN is an open standard protocol for IPv6 in wireless
network.6LoWPAN is said to be the “mini” version of IPv6, which enables IP-based
connection between smart objects and devices. However, the 6LoWPAN protocol is
easily to be attacked due to its issues when trying to integrate into the
Internet and the limitations shown by the LoWPAN itself. In order to overcome
this issue, therefore a review study has been conducted to understand the
6LoWPAN packet formatting, methods to secure it, available tools or frameworks
and challenges for IoT since it has been widely used in the wireless networks.
It is expected from the review study that several approach or methods focusing
on 6LoWPAN network security. Based on the review process conducted, we found out
that main security challenges in 6LoWPAN network are still not yet to be tackled
and have a better solution despite of its new achievement in researches. |
Keywords: |
Internet of Things, 6LoWPAN, Security, IoT Security, Systematic Literature
Review |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
Title: |
IMPLEMENTATION OF INFORMATION SECURITY DEVICES IN EQUILIBRIUM CODES |
Author: |
I. E. LYUBUSHKINA, E. M. ZVEREV, A. V. SHARAMOK |
Abstract: |
This article discusses the issue of data leakage via side channels in terms of
development of radio masking. Formation of optimum masking for digital data
processing devices has been substantiated on the basis of available results of
electronic warfare theory. It is shown that the optimal masking interference
will be formed when processing information in the inverse representation. Two
methods of implementation of data processing devices in equilibrium codes have
been considered. The first method in addition to leakage via side channels
proposes duplication of data processing, which improves the reliability of data
processing. The second method provides less opportunities to control the
reliability of data processing but is more suitable for requirements of optimum
deception. In order to substantiate the possibility of practical use of the
proposed method, a mathematical model of computations in the inverse
representation for Magma cryptographic algorithm has been developed. As further
studies, it is planned to conduct experimental studies on the effectiveness of
countering known types of attacks through side channels. Application of the
considered methods is possible for development of trusted devices of
cryptographic data protection with a high level of security. The approach to the
problem of data protection against leakages through side channels considered in
the study, the theoretical substantiation of the optimal masking interference
and the developed mathematical model of the Magma cryptographic algorithm have
been proposed by the authors for the first time. |
Keywords: |
Side Channels, Encryption Devices, Model of Computation, Magma Algorithm,
Electronic Masking. |
Source: |
Journal of Theoretical and Applied Information Technology
15th December 2020 -- Vol. 98. No. 23 -- 2020 |
Full
Text |
|
|
|