|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
February 2020 | Vol. 98
No.03 |
Title: |
CBT SYSTEM (COMPUTER BASED TRAINING) OF THE AIRCRAFT A-37B, USED IN THE EARTH
COURSE OF THE COMBAT AIR COMMAND NO. 3 (CACOM-3) OF THE COLOMBIAN AIR FORCE
(FAC) |
Author: |
MORALES-ORTEGA ROBERTO, ARIZACOLPAS, PAOLA, PINERES-MELO, MARLON, CAICEDO-ORTIZ,
JOSE, AYALA-MANTILLA, CRISTIAN, PELUFFO-MARTINEZ, GABRIEL, MENDOZA-PALECHOR,
FABIO, COMBITA-NINO HAROLD, DIAZ-MARTINEZ, JORGE |
Abstract: |
This article shows the implementation of an integrated and updated education
system in the Combat Air Command No.3 as a school of the A-37B team, to give
theoretical and virtual practice instruction optimizing strategic processes,
increasing productivity, reducing operational and administrative costs in order
to promote the commitment and development of human capital to crewmembers of the
A-37B team; At the same time, promote technological development and innovation
in the personnel that make up the Unit. In this work, the importance of the
use of ICT in the educational field and the great contribution it presents in
the Colombian Armed Forces is made known. |
Keywords: |
Design, Production, Software Engineering, CBT, Virtualization, Colombian Air
Force (FAC), Combat Aircraft A-37B, Combat Command No. 3 (CACOM-3) |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
THE NEED FOR POLYMORPHIC ENCRYPTION ALGORITHMS: A REVIEW PAPER |
Author: |
ABDELRAHMAN ALTIGANI, SHAFAATUNNUR HASAN, BAZARA BARRY |
Abstract: |
Current symmetric ciphers including the Advanced Encryption Standard (AES) are
deterministic and open. Using standard ciphers is necessary for
interoperability. However, it gives the potential opponent significant leverage,
as it facilitates all the knowledge and time he needs to design effective
attacks. In this review paper, we highlight prominent contributions in the field
of symmetric encryption. Furthermore, we shed light on some contributions that
aim at mitigating potential threats when using standard symmetric ciphers.
Furthermore, we highlight the need for more practical contributions in the
direction of polymorphic or multi-shape ciphers. |
Keywords: |
Cryptography, Polymorphic Cipher, Advanced Encryption Standard, Symmetric
Encryption Algorithms, Multi-Shape Cipher. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF GEOMETRIC SIMILARITY PRESERVING EMBEDDING-BASED
HASHING FOR BIG DATA IN CLOUD COMPUTING |
Author: |
ABUBAKAR USMAN OTHMAN, BOUKARI SOULEY, ABDULSALAM YAU GITAL, HAUWA ABUBAKAR |
Abstract: |
Approximate nearest neighbour (ANN) search has been favourable for large-scale
information retrieval in the recent past, and many hashing techniques for ANN
have been proposed for retrieval of data in a large database, given a query.
Hashing based indexing techniques are being mostly favoured for similarity
search from huge database because of its efficiency in retrieval accuracy and
low memory requirements. The long code length of randomised hashing based
indexing techniques gives good precision but required more computational cost
and high memory cost. DSH uses K-means algorithm to partition n data points into
k groups for quantisation of data. This paper addresses the problem of long hash
codes, computational cost, long convergent time and high memory requirements to
achieve efficient similarity searching. Experiment was setup and Geo-SPEBH was
evaluated on SIFT 1B based on MAP, precision-recall metrics and Geo-SPEBH
outperformed the state-of-the-art techniques. |
Keywords: |
Hashing, Similarity Preserving, Binary Codes, Indexing, Bid Data, Cloud
Computing. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
BUILDING MILLENNIAL DIGITAL CUSTOMERS E-LOYALTY TOWARD ONLINE RETAILER |
Author: |
WANDA WANDOKO, IGNATIUS ENDA PANGGATI, LAILA MEILIYANDRIE INDAH WARDANI |
Abstract: |
This study investigates the antecedents of millennial digital customers
e-loyalty on online retailer in Indonesia context. This study proposes and
examine e-trust, retailer quality, information quality, and coupon proneness as
antecedent variable that potentially impact e-loyalty. This study proposes the
role of coupon proneness in e-trust and e-loyalty as novelty. Data collected
from 423 respondents of millennial digital costumers in Indonesia. The data
collected through questionnaire. The data demonstrate that information quality
and coupon proneness have impact on e-loyalty. The data also reveals that
retailer quality and coupon proneness have impact on e-trust. This study
contributed to the costumer trust theory and customer loyalty theory in
e-commerce. Academic and managerial implications are further discussed. |
Keywords: |
e-Loyalty, e-Trust, Coupon Proneness, Information Quality, Retailer
Quality |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
E-GOVERNMENT TRUST MODEL (EGOV-TRUST) THAT ENHANCES THE USAGE OF E-GOVERNMENT
SERVICES AMONG USERS IN IRAQ |
Author: |
BAN QASIM AL NIDAWY , SAFIAH SIDEK , SAMER ALI AL-SHAMI, ABDELRAFE ELZAMLY |
Abstract: |
The widespread usage of ICTs has led to the inevitable evolution of services
provided by the government to the emergence of e-government. The success of the
e-government requires the usage of these electronic services by citizens.
Several challenges have been identified that limit the usage of e-government. In
this context, many researchers argued that trust is one of the most important
determiners of the usage of e-government among users. An investigation of trust
in relation to the use of e-government among users is still lacking, especially
in Iraq. The purpose of this research proposal is to propose a research work
that provides a nuanced understanding of the constructs of trust that influence
the usage of e-government among users. For this purpose, the factors that
contribute to trust analyzed using an integration of two theories UTAUT2 and
TOE, the integration of UTAUT2 and TOE is known as I-TOE. This study adopted a
survey method, in which questionnaires were analyzed from 694 respondents
derived from a stratified random sampling method. Four main hypotheses have been
tested and CB-SEM and PLS-SEM have been used for testing and validating the
measurement and structure of the EGOV-TRUST model. The study found that there
has been a positive relationship between the individual, technological,
organizational, environmental dimensions of trust and these factors have
positive effects on the use of e-government. It can be concluded that the
EGOV-TRUST model has the potential to enhance the usage of e-government among
its users. This research contributes to the knowledge of adopting e-government,
focusing on deconstructing the element of trust that enhances the usage of
e-government. The model can be used as guidelines for governments, especially
the developing countries for enhancing the usage of e-government among users. |
Keywords: |
Usage of e-government, Trust of e-government, Trust, UTAUT2, I-TOE. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
A PEER-ASSISTED SYSTEM INFORMATION ACQUISITION USING FAST SCANNING ALGORITHM IN
HETEROGENEOUS NETWORK |
Author: |
FAZIDA ADLAN, NOR FADZILAH ABDULLAH, NASHARUDDIN ZAINAL, MAHAMOD ISMAIL |
Abstract: |
Femtocells have become an integral part of mobile heterogeneous network which is
now being widely utilized as solution of coverage and bandwidth limitation.
Coverage area could be expanded, and enormous volumes of traffic can be relieved
from macrocell. Coexistence of numerous femtocells in macrocell coverage area
certainly need a robust mechanism to integrate in such scenario. In this paper,
simulation of peer-assisted fast scanning handover has been done to assist
inbound CSG femtocell users. To enhance the handover procedure, a fast scanning
done by evaluating some parameters, network conditions and used intra-frequency
measurement scenario with the help of collocated users. The results show that
the proposed method able to mitigate the unnecessary handover and lowered the
system interruption time better than that of existing method approximately 85%. |
Keywords: |
Evaluation, Execution, Handover, Heterogeneous, LTE, LTE-A, Peer-Assisted,
Signaling |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
AN IMPROVED CAPTCHA BASED INTRUSION DETECTION SYSTEM BASED ON REDIRECTOR MODEL |
Author: |
HAUWA ABUBAKAR, BOUKARI SOULEY, ABDULSALAM YAU GITAL |
Abstract: |
This study deals with an Improved Completely Automated Turning test to tell
Computers and Humans Apart (CAPTCHA)-Based Intrusion Detection System Based on
Redirector Model. In advanced technological world today, internet usage is
inevitable but there are certain Network security challenges such as intelligent
spywares that are capable of breaking and bypassing the CAPTCHA. This study aims
at designing CAPTCHA-based IDS so as to identify the intelligent spywares that
are capable of breaking CAPTCHAs in Intrusion Prevention System (IPS).
Therefore, the study tries to design IDS with intelligent redirector using
CAPTCHA- Trap of detecting Intrusion by intelligent spywares. The work is set to
design an email website which was integrated with the new CAPTCHA based IDS
system and host it online. A dummy honeypot system was designed in which the IP
addresses of the software intruders that intruded into the system were captured.
The work also implemented and evaluated the performance metrics which includes
Detection Rate (DR), Precision (PR), False Positive Rate (FPR), correctly and
incorrectly classified instances of the system against the Existing system. The
researchers use captured IP addresses as the datasets for the study. The work
employed Waikato Environment for Knowledge Analysis (WEKA) and Python to analyze
the experimental data. The findings of the study indicate a high percentage of
Detection Rate and a very low False Positive rate as compared to the existing
system. It is recommended that website users and webmasters should incorporate
the use of the Improved CAPTCHA-based IDS, IPS and Honeypot so as to block
intruders and collect information about them for necessary measures. |
Keywords: |
IDS, IPS, CAPTCHA, Detection Rate, Intelligent Spyware. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
AN EFFICIENT ROUTING METHOD IN SDN FOR SMART INTELLIGENT SYSTEMS |
Author: |
HO-JIN HEO, NAMGI KIM |
Abstract: |
There are lots of multimedia services such as YouTube and Netflix in the
Internet. The multimedia services through the Internet will continue to grow.
Most of these multimedia services generally stream a content to many users. In
these type services, the multicast transmission mode can efficiently deliver the
content to multiple subscribers. Especially in SDN (Software-Defined Network),
multicast mode can be easily adopted because the centralized controller sets up
all routes using multicast tree with global network information. However, the
construction of multicast tree is an NP (Non-deterministic Polynomial-time)
problem and is hard to make the optimal multicast tree in the real world.
Therefore, in this paper, we propose a heuristic way to generate a multicast
tree using DQN (Deep-Q-Network) which is a type of reinforcement learning in
machine learning field. Through the experiment, we show that the performance
ratio of the proposed algorithm is 1.21 with the topology of 10 nodes and it
generates the multicast tree better than the previous heuristic algorithms such
as TM (Takahashi and Matsuyama) algorithm. |
Keywords: |
DQN, Reinforcement Learning, Multicast, SDN |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
OBJECT DETECTION IN HIGH-RESOLUTION AERIAL IMAGES BASED ON IMAGE PYRAMID AND
PATCH DETECTION |
Author: |
HOANH NGUYEN |
Abstract: |
Recently, many approaches based on deep convolutional neural networks (CNNs) for
object detection have showed better performance compared with traditional
approaches. Since objects in high-resolution aerial images are usually very
small with complex backgrounds, the performance of deep CNN-based approaches on
object detection in high-resolution aerial images is still limited. In addition,
with the constraint of the amount of memory on graphics processing units (GPUs),
current state-of-the-art CNN architectures cannot directly process
high-resolution aerial images. This paper proposes an improved deep CNN-based
framework for object detection in high-resolution aerial images. To detect
objects at different scales, image pyramid with different sizes is generated
from single input image by down-sampling the original high-resolution input
image. Each image level in the image pyramid can be used to detect objects at a
different scale. For each image in the image pyramid, small patches with small
fixed-size are generated. Each patch is then fed to the detection network, which
is based on SSD framework with VGG-16 architecture as the base network, to
generate patch detection results. Patch detection results are then projected to
the image pyramid at the original scale to form image detection results.
Finally, Non-Maximum Suppression (NMS) algorithm is adopted after image
detection results to create final detection results. Experimental results on
public datasets with high-resolution aerial images show that the proposed
approach is very simple and efficient while achieving nearly as detection
accuracy as recent state-of-the-art methods. |
Keywords: |
Object Detection, Deep Learning, Image Pyramid, Aerial Image, Convolutional
Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
RANSOMWARE DETECTION BASED ON HARDWARE SENSOR INFORMATION |
Author: |
NUR HIDAYAH M. S, FAIZAL M. A, 1WARUSIA YASSIN, KAMIL KUROBONOV |
Abstract: |
Ransomware is a growing threat to the computer world that encrypts victims data
and asks for ransom for decryption key which causes financial loss and severe
disruption in the organization. Despite the threat and an extremely growing
number of cases of ransomware infection, various countermeasures have been
proposed since the first appearance of ransomware but there is still not enough
information on the approaches to detect it. Thus, this paper will perform
ransomware detection using the behavioral method on information retrieved from
computer sensors such as CPU, Main Memory and Disk Memory. The different
classification method such as Naive Bayes, J48 and KStar algorithm will be used
to detect the ransomware attack and the measured value in term of accuracy. |
Keywords: |
Ransomware, Malware Detection, Hardware Performance, Classification, Machine
Learning |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
STUDY OF DELONE-MCLEAN INFORMATION SYSTEM SUCCESS MODEL: THE RELATIONSHIP
BETWEEN SYSTEM QUALITY AND INFORMATION QUALITY |
Author: |
AZMI FITRIATI, NAELATI TUBASTUVI, BIMA CININTYA PRATAMA, SUBUH ANGGORO |
Abstract: |
Information has become a strategic need for the future success of the
organization. All organizations need information to make effective decisions.
Information is an output of information system (IS). Consequently, the quality
of information depends on the IS implementation. The purpose of this study is to
evaluate the IS success model. A survey approach was used in this study. The
populations were Muhammadiyah higher education institutions and simple random
sampling for determined respondent. PLS-SEM was used as an analytical tool. The
data were collected using a questionnaire. This study models the relationship
between IS quality and information quality. We hypothesize that higher quality
information is generated from high-quality systems. The results have shown that
IS quality affected information quality. The use of high quality IS can produce
high-quality information. Therefore, to improve the quality of information, an
organization needs to improve IS quality. To make it can be done through
increased some dimensions, such as integration, flexibility, ease of use and
accessibility. Thus, the information quality can be measured by the relevant,
accurate, timely, and complete information. Later, the quality of information
has been influenced by the IS quality. This study contributes theoretically to
IS success models through the link of system quality to information quality. |
Keywords: |
Information System Success Model, Information Quality, System Quality,
Flexibility, Ease of Use |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
REAL-TIME LICENSE PLATE DETECTION BASED ON VEHICLE REGION AND TEXT DETECTION |
Author: |
HOANH NGUYEN |
Abstract: |
This paper presents a new approach for real-time license plate detection based
on vehicle and text regions. Firstly, vehicle regions are extracted by single
shot multibox detector (SSD) framework. Secondly, multi-channel maximally stable
extremal regions (MSER) algorithm is used to generate character candidates in
the vehicle regions. Using properties of vehicle regions, this paper filters out
false character candidates and then constructs license plate candidates with
remaining character candidates. Then, false license plate candidates are
eliminated by exploiting the correlation between dimension of vehicle and
license plate. Finally, remaining license plate candidates are passed to a
word/no-word classifier to keep the final license plate. To run in real time on
embedded systems, this paper chooses the MobileNets architecture for deep CNN
configurations. Experimental results on the public test dataset and new
collected dataset show that the proposed approach can apply to different types
of license plates with better performance than current state-of-the-art methods. |
Keywords: |
License Plate Detection, Convolutional Neural Network, Intelligent
Transportation Systems, Object Detection, Deep Learning |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
THE EFFECT OF INDONESIAN E-MARKETPLACE REPUTATION ON CUSTOMER TRUST IN ONLINE
SHOPPING |
Author: |
YOHANNES KURNIAWAN, SITI ELDA HIERERRA, HENDRY NICHOLAS, JORDAN SETIAWAN, FRENDY |
Abstract: |
E-Marketplace is growing rapidly in Indonesia, and what is the problem of
E-Marketplace, when is the level of customer confidence, both in marketplace
services and the quality of sellers. This study aims to determine The Effect of
Indonesian E-Marketplace Reputation on Customer Trust in Online Shopping. The
method used in this research is analyzing Indonesian E-Marketplace reputation
data by using the SmartPLS 3.0 application. The results of this research showed
the positive significant effect of group reference and e-marketplace reputation
on trust and the trust factor give positive significant effect to relationship
commitment of customer to the seller. The results of the study can be applied to
the E-Marketplace to enhance the reputation of E-Marketplace companies in
Indonesia. |
Keywords: |
E-Marketplace, Reference, Trust in Online Shopping, Online, Customers. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
Title: |
REPLICATION STRATEGIES BASED ON MARKOV CHAIN MONTE CARLO AND OPTIMIZATION ON
CLOUD APPLICATIONS |
Author: |
AWS ISMAIL ABU EID , WSW AWANG , MZARINA , AH Zakaria |
Abstract: |
This work positioned a dynamic replication strategy capable of meeting tenant
availability and performance criteria concomitantly. The Monte Carlo BAT
Optimization MCBO model is a strategy geared towards calculating the optimal
path to update distributed replicas on cloud sustaining high data availability.
In general, replica creation is prompted in two circumstances: a specific number
of replicas is not achieved or in case of unsatisfactory response time
objective. Following this, it is necessary for the replication process to be
successful in order to design the MCBO model for determine optimal path. Data
replication and query scheduling were combined for ensuring the replica
placement in a load-balancing manner while handling tenant budget. The
experimental outcomes revealed significant improvement for the availability and
performance following the use of the model. |
Keywords: |
Data Replication, Cloud Enviroment, Mcbo Model, Bat Algorithm, Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2020 -- Vol. 98. No. 03 -- 2020 |
Full
Text |
|
|
|