|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
April 2020 | Vol. 98
No.07 |
Title: |
INFORMATION SUPPORT OF UNMANNED AIR VEHICLE BY USING THE SPECIALIZED AUTOMATIC
CONTROL SYSTEM |
Author: |
SERIK ISMAILOV, ABDUSHUKUR SARIBAYEV, ACHMEDBEK MUSABEKOV, SERIK DOSYBEKOV,
MADINA SARYBAY |
Abstract: |
In the process of obtaining a theoretical model and developing an automatic
control system for an atmospheric satellite in the form of an unmanned air
vehicle (AS UAV), methods of mathematical and simulation modeling, software
tools and environments for modeling, developing on-board monitoring and control
systems and for performing engineering calculations were used in the
constructing and designing of UAVs. In the process of developing an automated
control system for AS UAVs received the following developments: compiled a
program code and a prototype autopilot; composed program code and prototype of
the control system for the power plant, servos and camera; compiled program code
and prototype of the power management subsystem; developed the structure and
composition of the automated AS; developed the structure and composition of
information support; developed virtual on-board instruments. Main design and
technical - operational indicators: reduced measurement errors on-board devices,
created by the influence of internal electromagnetic fields from electronic
equipment. Applying area: main areas of application of unmanned systems in the
form of AS UAVs will be border and law enforcement, anti-terrorism measures,
detection of emergency situations and liquidation of their consequences,
environmental monitoring and protection of natural resources, monitoring of
industrial facilities, transport and energy infrastructure, as well as
agricultural land. Development of the system of control, management and
information support of AS UAVs will allow the country to create and manufacture
domestic integrated, mobile navigation and control stations of UAVs for various
purposes. Use of UAVs as an aerial platform has great prospects when shooting
small area objects and linear objects. |
Keywords: |
Air Vehicle, Atmospheric Satellite, Unmanned Air Vehicle, Electromotor Glider,
Automatic Control System, Information system, Automated Workplace, Glider,
Aerodynamics, Theoretical Model, Mathematical Model, On-Board Devices, Autopilot |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
ANALYSIS OF IMPLEMENTATION CONTAINER-BASED MICROSERVICES ARCHITECTURES WITHIN
THE OPEN SOURCE SOFTWARE DEVELOPER COMMUNITY (CASE : OPENDAYLIGHT DEVOPS
COMMUNITY) |
Author: |
AHMAD NURUL FAJAR , RAHMAD ADE PUTRA |
Abstract: |
In the research, we aim to be able to examine the success factors of the
implementation of microservices container-based architecture in the scope of
Open source project called as Opendaylight community. These factors which have
major influences to the implementations of microservices containers are source
code commit, merge source code, installed dependency, connection latency to
master node, construction time. The results of test tests on published data for
implementing microservices architecture show that using a regression model can
find the level of influence of variables that exist during the implementation
process as well as solve the issue. The factors that most influence the level of
success of the implementation according to the trials carried out are merge
source code, installed dependency, connection latency and construction time |
Keywords: |
Microservices Artitecture, Opendaylight, Container |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
AN INVESTIGATOR DIGITAL FORENSICS FREQUENCIES PARTICLE SWARM OPTIMIZATION FOR
DETECTION AND CLASSIFICATION OF APT ATTACK IN FOG COMPUTING ENVIRONMENT
(IDF-FPSO) |
Author: |
AHMAD K. Al HWAITAT , SAHER MANASEER , RIZIK M. H. Al-SAYYED ,MOHAMMED AMIN
ALMAIAH , OMAR ALMOMANI |
Abstract: |
The hough there are several approaches to detect the malware attacks in cloud,
the detection techniques could not be applied in FOG based environment. This is
because of its possession of distinct features. As FOG computing has been
evolving, it is mandatory to develop detection and mitigation schemes of malware
attacks. Thus, in this research, an approach for investigation of digital
forensics has been developed, where it classifies and detects the APT attack
named Shamoon attack from different attack types in FOG environment. Digital
Forensics has been recently gaining focus in solving or investing the
cybercrimes. Several researches have been developed in this field where they
have analyzed several security challenges. Previous technologies, to measure
these attacks are completely based on methodology of pattern matching. If an
attack is newly occurred, then the detection rate is very low and false negative
will be very high. Thus the challenges are highly increased as the data volume
increases, and the technology used by attacker is continually developed. As
there is a lack in detection technology and the deployment boards, and the low
efficient models in FOG computing makes the challenge a difficult one. Thus a
proposed scheme has been introduced where Frequency Particle Swarm Optimization
(FPSO) has been utilized in investigating digital forensics Particle Swarm
Optimization in order to detect and to classify the APT attack (Shamoon attack)
in FOG environment. This approach uses four phases. In feature extraction, best
set of features are extracted. Using FPSO (Frequencies PSO), best weighed
features are predicted. These weighed features are clustered using K-means
clustering and classified using k-nearest neighbors ( KNN) classifier. The
performance of this approach is then evaluated using confusion matrix and
results are provided. Finally, the proposed KNN-FPSO classifier is compared with
other existing classifiers and the results are recorded. |
Keywords: |
Digital Forensics, Shamoon Attack, FOG Computing,APT Attacks, Cyber Security,
Machine Learning, Information Security |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
ANALYIS ON FACTORS INFLUENCING CUSTOMER EXPERIENCE OF E-COMMERCE USERS IN
INDONESIA THROUGH THE APPLICATION OF CHATBOT TECHNOLOGY |
Author: |
SFENRIANTO, VIVENSIUS |
Abstract: |
Currently ChatBot technology is widely used by e-Commerce to help customers make
transactions easier. This research aims to find out factors that are affecting
customer experience the e-Commerce, which has applied ChatBot, as a technology
feature to help customer do transactions in e-Commerce. The research has a total
sample of 385 respondents, who active transactions during the last three years
(2016-2019) in e-Commerces have implemented ChatBot technology in Indonesia.
Analysis method used in this research is referencing to IS Success Model
developed by DeLone and McLean. The resulth of this research is the correlation
between Information Quality, System Quality, Service Quality, e-Trust,
e-Satisfaction, and e-Loyalty are to be found positively affecting Customer
Experience of customers who use e-Commerce with ChatBot in it for their
transactions. |
Keywords: |
E-Commerce, ChatBot, Customer Experience, IS Success Model, Technology
Acceptance Model. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
AN EFFICIENT ANOMALY INTRUSION DETECTION METHOD WITH EVOLUTIONARY KERNEL NEURAL
NETWORK RANDOM WEIGHTS |
Author: |
SAMIRA SARVARI, NOR FAZLIDA MOHD SANI, ZURINA MOHD HANAPI, MOHD TAUFIK ABDULLAH |
Abstract: |
Internet security requirements are increasing due to the growth of internet
usage. One of the most efficient approaches used to secure the usage of the
internet from internal and external intruders is Intrusion Detection System
(IDS). Considering that using a combination of ANN and EA can produce an
advanced technique to develop an efficient anomaly detection approach for IDS,
several types of research have used ENN algorithms to detect the attacks. To
enhance the efficiency of anomaly-based detection in terms of accuracy of
classification, in this paper, the evolutionary kernel neural network random
weight is proposed. This model is applied to the NSL-KDD dataset, an improvement
of the KDD Cup'99. The proposed method achieved 99.24% accuracy which shows that
the novel algorithm suggested is more superior to existing ones as it provides
the optimal overall efficiency. |
Keywords: |
Intrusion detection systems (IDSs), Multilayer perceptron (MLP), Multiverse
optimizer (MVO), NSL-KDD Dataset |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG
COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE |
Author: |
AHMAD K. Al HWAITAT, SAHER MANASEER, RIZIK M. H. Al-SAYYED ,MOHAMMED AMIN
ALMAIAH, OMAR ALMOMANI |
Abstract: |
Cyber related crimes are increasing nowadays. Thus digital forensics has been
employed in solving cybercrimes. Several researches have been done where they
have analysed cyber related attacks, malware types, etc. Researches based on
studying and analysing Advanced Persistent Threats (APTs), especially Shamoon
attack. This research has been done in order to study and analyse the attacking
behaviour of Shamoon malware in fog computing using FPSO (Frequency Particles
Swarm Optimization) based on Travelling Salesman approach (TSP). In this
proposed system, fog nodes are initiated where the nodes delivers three types of
data namely industrial, medical and educational data. Secondly Shamoon attack is
created followed by distance matrix evaluation. As the Shamoon attack focuses on
attacking industrial data, the attack distribution movement focuses mainly on
industrial data. After the evaluation, priorities of the particles should be
assigned randomly. Once FPSO parameters are initialized, objective function of
every particle is evaluated. The FPSO mechanism implements the working procedure
of TSP. Under the FPSO mechanism, swap and insertion operations are performed.
In order to find the best shortest path, nearest neighbouring algorithm is used,
which follows evaluation of fitness function. After evaluation, local best lbest
and global best gbest solutions are obtained. Finally, appropriate positions and
velocities are updated. From the resultant optimum path, the distribution of
Shamoon attack movement can be analysed. The performance of this proposed system
has been evaluated by estimating the fitness value, best cost. The attack
distribution of Shamoon data has been observed. Then finally a threat
intelligence scheme is proposed for the investigating and analysis behaviour and
spread of Shamoon attacks in edges of Fog computing. |
Keywords: |
Fog Computing, Shamoon Attack, FPSO,TSP, Fitness Estimation ,Digital Forensic,
Investigation of Cyber Crimes. Cyber Security. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
NEUROMARKETING APPROACH: AN OVERVIEW AND FUTURE RESEARCH DIRECTIONS |
Author: |
AHMED H. ALSHARIF, NOR ZAFIR MD. SALLEH, ROHAIZAT BIN BAHARUN, MEHDI SAFAEI |
Abstract: |
Neuromarketing is the embryonic field of marketing science. Despite being
controversial, it remains the most promising field to study genuine consumers’
responses in front of the marketing stimuli such as sound, brand and so forth.
Therefore, neuromarketing aims to study the relevant part in the human termed as
'brain' which is swayed by marketing stimuli. Undoubtedly, the researchers and
academia can record and measured the brain activity through using the
state-of-the-art neuroimaging techniques such as functional magnetic resonance
imaging (fMRI), the electroencephalography (EEG), and other neuromarketing
methods. Therefore, the academia and industry are relied on neuromarketing due
to the widely acknowledged fact that the majority of our emotions and thinking
takes place beyond the level of our awareness, thereby, the consumer purchase
decisions are made in the subconscious mind which impact on their daily
deliberations. This study reviews and discusses the most important techniques of
neuromarketing (e.g., fMRI and EEG) to understand the consumer’s brain
responses. The findings of this study refer to that neuromarketing is pregnant
with valuable information toward consumer decision-making. |
Keywords: |
Neuromarketing, Consumer Neuroscience, Neuromarketing Technique, fMRI, EEG |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
EVALUATION OF USING SMS BANKING USING MODIFICATION OF UTAUT MODEL: CASE STUDY OF
BANK XYZ |
Author: |
FEBRY PJ SIBUEA, TOGAR ALAM NAPITUPULU |
Abstract: |
SMS banking is one of the e-banking services implemented by banks in enhancing
competitive advantage in order to harmonize services that are better tailored to
the needs of customers in line with developments in information technology and
lifestyles to attract and increase the number of customers. One of the banks
that provide sms banking services to customers in enhancing the competitive
advantage of organizations and businesses on the road is Bank XYZ. The SMS +
Banking service provided by Bank XYZ is an Electronic Banking service that
enables customers to obtain banking information and conduct banking transactions
via Cellular Phones (sending the sms banking format or dial ussd number) and is
available in the form of a mobile application in which utilizes the sms, ussd
and package channels data for conducting transactions. At present the users of
Bank XYZ e-banking services continue to grow, including Internet banking users
with a total of 358,814 users per February 2019 with transactions in 2019
totaling 7 million transactions. while for users of SMS + banking services,
there are 732,771 per February 2019 with 900 thousand transactions. Furthermore,
based on the difference in total transactions it is felt necessary to evaluate
the use of the SMS banking application. The method used in this research is to
conduct a literature study that is the author collects data on several models
that can be used to determine acceptance of a technology or application and
comparison of theories and models of technology acceptance, the appropriate
model is the UTAUT model to find out the factors that influence the use and
technology acceptance. Data collection methods in this study used a
questionnaire. The results of this study found that the factors that have a
direct and significant influence on usage behavior are Facilitating Conditions
and Behavioral Conditions. While the factors that directly and significantly
affect behavioral intentions are Effort Expectancy. |
Keywords: |
SMS Banking, UTAUT, Facilitating Conditions, Behavioral Conditions, Effort
Expectancy |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
SOFTWARE ARCHITECTURE USING A DECOUPLING, LAYERED AND WEB RESTFUL SERVICES
APPROACH |
Author: |
SALAS-PARTIDA RUBEN, RODRIGUEZ-AVILA EDUARDO, RAMIREZ-ARELLANO ALDO,
ACOSTA-GONZAGA ELIZABETH |
Abstract: |
The development of information systems has forced the software industry to
create architectures, techniques, and tools for building applications more
efficiently. This work shows the design of information systems using code
decoupling, layered development, and RESTful services. Two information systems
were developed, one using coupled methods and the other using decoupled methods.
To test both methods, two experiments were performed for each system, one using
a reduced data model for accessing four database tables, and the other
experiment allowing only the execution of basic mathematical operations. The
results show that a decoupled architecture offers advantages in response time,
network traffic, and user concurrency, compared to those built without these
techniques. This work is limited to the Java programming language and the
specification Java Enterprise Edition. |
Keywords: |
Software Architecture, Coupling Software, Decoupling Software, Web Restful
Services, Software Metrics. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
AGILE ANALYTICS: ADOPTION FRAMEWORK FOR BUSINESS INTELLIGENCE IN HIGHER
EDUCATION |
Author: |
SALAKI REYNALDO JOSHUA, TINI MOGEA |
Abstract: |
Agile analytics is a strategy that focuses on improving DW and BI that
characterizes program developers on how they should own the characteristics of
DW. In Higher Education, data is an important asset. The unmanaged data
available in the database is only transactional because it has to be transferred
to a data warehouse. In Higher Education Data Warehouse is a method in data
processing, data processing must provide the final results that can be evaluated
and provide recommendations. The value of suitable methods or structures is
needed to reduce the risk of technological failure in the data warehouse growth
environment. The goal of this study is to develop an adoption framework by
applying the concept of agile analytics. The System Development process included
Manado State University as a research case study by performing business process
analysis, and even recognizing issues and problems in the design of DW and BI.
Adoption Framework testing is conducted at the end of the project construction
to see the level of acceptance, and the architecture and framework feedback. |
Keywords: |
Agile Analytics, Data Warehouse, Business Intelligence, Higher Education,
Adoption Framework |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
A SCRUM-BASED SOFTWARE QUALITY MODEL TO RAISE MATURITY OF SOFTWARE IN SME(S) |
Author: |
SARAH K. AMER, NAGWA BADR, AHMED HAMAD |
Abstract: |
Software process improvement (SPI), and by extension Software Quality Assurance
(SQA), is the approach to understand the software development process lifecycle
and implement necessary changes to the processes to achieve a high-quality,
maintainable product. Small software enterprises face enormous challenges to
gain a competitive advantage in the software industry, especially with the
presence of large conglomerates. Much of these small-to-medium enterprises
(SMEs) adopt agile models such as Scrum to quickly react to clients’ demands.
However, agile methodologies lack direct addressing of maturity in process,
project and product that larger enterprises are capable of. It is important for
the software engineering community to aid in enabling SMEs to have process
maturity without compromising agility. In this paper, we use the Capability
Maturity Model Integration (CMMI) – a world-renowned software quality assurance
methodology, to address some shortcomings in the Scrum model. Specific practices
are selected out of eighteen process areas based on both literature research and
field study from the second and third levels of maturity to address missing
elements. The proposed model prototype keeps Scrum intact while allowing small
enterprises to produce high-quality software without compromising agility or
going over budget, thus reducing the ‘low-quality’ stigma attached to small
software developers around the world. |
Keywords: |
Capability Maturity Model Integration, CMMI, Agile Software Development Model,
Scrum, Software Process Improvement |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
ANALYTIC HIERARCHY PROCESS (AHP) FRAMEWORK FOR RANKING CLOUD DATABASES |
Author: |
FATIMA ALZAHRA MOTASIM, ADIL YOUSIF |
Abstract: |
With the emergence of cloud computing, many organizations started to offer cloud
services to various costumer on the basis of their functional and
non-functional demand. Cloud databases promise high performance, high
availability and elastic scalability. In addition, consistency, efficiency cost
and reliability multi tenancy are critical features of cloud databases.
Although there are many ranking frameworks for cloud services, there is no
distinct framework of ranking cloud databases. There is a need for framework
for ranking cloud databases that automatically index cloud providers based on
user's needs. To handle this problem, this paper proposed a framework for
ranking cloud databases. To build this framework the research studied
attributes and sub-attributes that are important for database. Then the
research focuses on attributes and sub-attributes added by cloud databases. To
calculate the ranking of the proposed framework the Analytic Hierarchy Process
(AHP) model is employed. The advantage of AHP as it deals with any number of
attributes and sub-attributes. The proposed framework automatically index cloud
provider's databases based on user's needs. To evaluate the proposed framework
a matlab experiments were developed. The results of the experiments and the
evaluation process revealed that the proposed framework enhanced the ranking
process of cloud databases. |
Keywords: |
Cloud computing; Database; Quality of service; Ranking. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
COMPARATIVE ANALYSIS OF FEATURE EXTRACTION TECHNIQUES IN IRIS RECOGNITION SYSTEM |
Author: |
OLUSEYE ADELEKE , ADEOLU DUROSAWO, WASANA BOOSONG |
Abstract: |
Iris recognition is a biometric recognition technology that utilizes the pattern
recognition techniques based on the high-quality images of iris. As demands on
secure identification are hiking and as the human iris gives a pattern that is
phenomenal for identification, the utilization of the best feature extraction
technique could help iris recognition turn into another standard in security
framework. Feature extraction is the most important aspect of the iris
recognition system. The successful recognition rate and reduction of
classification time of two iris templates mostly depend on efficient feature
extraction technique. In this study a comparative analysis for iris recognition
using two feature extraction techniques, namely 2D Gabor Filter and Discrete
Cosine Transform (DCT) Algorithm was carried out. The intent is to ascertain the
better feature extraction technique of the two aforementioned for iris
recognition. The system was developed with the MatLab IDE with focus on
preprocessing, feature extraction and similarity distance measurement and
classification using Hamming distances. The analysis was conducted by using
publicly available dataset from the Chinese Academy of Sciences’ Institute of
Automation (CASIA). The experimental setup was developed with MatLab (R2016A).
The results of the comparison between the 2D Gabor Filter and DCT feature
extraction techniques showed that the 2D Gabor Filter approach is more efficient
for feature extraction technique for iris recognition than the DCT technique.
The contribution here is that the 2D Gabor Filter technique gives a more robust
feature extraction for iris recognition to be employed in security framework. |
Keywords: |
Iris, Feature extraction, Biometric, Gabor Filter, DCT |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
EVENT-BASED DYNAMIC BANKING NETWORK EXPLORATION FOR ECONOMIC ANOMALY DETECTION |
Author: |
ANDRY ALAMSYAH, DIAN PUTERI RAMADHANI, FARIDA TITIK KRISTANTI |
Abstract: |
The instability of financial system issues might trigger a bank failure, evoke
spillovers, and generate contagion effects which negatively impacted the
financial system, ultimately on the economy. This phenomenon is the result of
the highly interconnected banking transaction. The banking transactions network
is considered as a financial architecture backbone. The strong
interconnectedness between banks escalates contagion disruption spreading over
the banking network and trigger the entire system collapse. This far, the
financial instability is generally detected using macro approach mainly the
uncontrolled transaction deficits amount and unpaid foreign debt. This research
proposes financial instability detection in another point of view, through the
macro view where the banking network structure are explored globally and micro
view where focuses on the detailed network patterns called motif. Network
triadic motif patterns used as a denomination to detect financial instability.
The most related network triadic motif changes related to the instability period
are determined as detector. We explore the banking network behavior under
financial instability phenomenon along with the major religious event in
Indonesia, Eid al-Fitr. We discover one motif pattern as the financial
instability underlying detector. This research help to support the financial
system stability supervision. |
Keywords: |
Network Motifs, Triadic Motifs, Banking Transaction, Banking Transaction
Network, Financial Instability Detection. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
Title: |
A STRUCTURED FRAMEWORK FOR BUILDING RECOMMENDER SYSTEM |
Author: |
MOHAMED GRIDA , LAMIAA FAYED , MOHAMED HASSAN |
Abstract: |
With the increase of information on the internet, more and more electronic data
are appearing. Recommender systems were developed to help customers find related
items or personalize services. Several online companies apply recommender
systems to build up the relationship with users and enhance marketing and sales.
Researchers and managers approve that the recommender system offers great
opportunities in various domains. Thus, successful development of recommender
systems for real-world applications are significant. The most widely used
algorithms for recommender systems are categorized into the traditional
recommendation and deep-based recommendation algorithms and hybrid
recommendation approaches. There is a vital necessity to understand the
recommendation system development way. So, this paper presents a structured
framework that helps researchers and practical experts recognizing the
development phases of the recommender system. The proposed framework is
validated through a case study. Furthermore, this paper introduces a general
classification scheme for all current recommendation approaches. A summary of
historical past recommender system models provided in a way that facilitates
understanding their target. |
Keywords: |
Recommender System (RS), Deep Learning (DL), Structured Framework, Sparsity,
Cold Start, Scalability. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2020 -- Vol. 98. No. 07 -- 2020 |
Full
Text |
|
|
|