|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2017 | Vol. 95 No.6 |
Title: |
FINGER PHOTOPLETHYSMOGRAPH AS A MONITORING DEVICE FOR LIPID PROFILE IN MEN WITH
CARDIOVASCULAR RISK |
Author: |
RAIFANA ROSA MOHD SATTAR, KALAIVANI CHELLAPPAN, NORSUHANA OMAR, NORANITA MEGAT M
N, AMILIA A |
Abstract: |
Photoplethysmogram is a non-invasive optical technique that is widely used to
measure the variation of blood volume by using infra-red light. It is a
potential technique for early screening of atherosclerosis and lipid profiling.
An intervention program of 12 weeks was done in monitoring the changes in lipid
profile in the blood vessel and the morphological changes in the PPG signal. A
total of 35 young men aged 20 to 40 years old were selected and the subjects
were leading a sedentary lifestyle with less than 5000 steps of walking per day
and having two or more CV risk factors. The subjects recruited were divided into
two groups that were Group P (n=19) and Group C (n=16). Parameters that were
recorded along the intervention were vascular age and fitness index (PPGF) from
PPG, lipid profiling, pulse wave velocity (PWV), body mass index (BMI), waist
circumference (WC), systolic blood pressure (SBP) and diastolic blood pressure (DBP).
A first derivative of PPG was done in determining the crest time (CT). The data
were recorded at three different stages, baseline, 6th week and 12th week. The
morphological analysis clearly differentiates the subjects with different
combination of lipid profiles. Results show that there is a significant
improvement on PPGF and CT at the first 6 weeks whereas on the lipid profiling
of TG, HDL and LDL shows consistent improvement throughout the 12 weeks
intervention. The intervention for health maintenance has potential in adopting
walking as an exercise and PPG device as a health measurement tools. The
identified morphological classification will need further analysis and automated
classification to establish a non-invasive low cost optical based screening
method for lipid profiling in future. |
Keywords: |
Photoplethysmogram, pedometer-based walking, Lipid Profile, Cardiovascular Risk,
Young Men |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
A HYBRID MITIGATION TECHNIQUE FOR CACHE ASSISTED SIDE CHANNEL ATTACK IN CLOUD
COMPUTING |
Author: |
ADI MAHESWARA REDDY G, K VENKATA RAO, JVR MURTHY |
Abstract: |
Cloud computing has attained extensive approval for administrations in addition
to individuals by presentation computation, storage and software aided
amenities. Since, the Cloud services become further prevalent, approaches in the
current past has revealed liabilities exclusive to such systems. Different from
mainstream computing, the framework assisting Cloud permits communally
suspecting individuals to instantaneously access an essential cache consequently
encouraging a threat of data leakage through virtual machines through side
channels. Therefore, numerous mitigation techniques has been developed by
scholars for various side channel attacks. In this paper, author chiefly focuses
on cache aided side channel attacks and a novel hybrid mitigation approach is
suggested that amalgamated both the sequential mitigation approach and parallel
mitigation approach. This technique is mainly employed when the cache is
accessed through single core and through multiple core. The experimental results
for the proposed approach is carried out using SPEC 2006 specifications and has
been shown that the efficiency and usefulness of the cache memory is more in the
proposed approach compared to the existing sequential and parallel schemes. |
Keywords: |
Cloud Computing, Cache Aided Side Channel Attack, Virtual Machines, Cache Wait,
Cache Partitioning |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
EMPLOYING SEMANTIC KNOWLEDGE ON EVENT TRIGGER CLUSTERING |
Author: |
ADE ROMADHONY, DWI H WIDYANTORO, AYU PURWARIANTI |
Abstract: |
Formerly, most of information extraction systems require the predefined template
in order to extract the structured information. Extracting information without
predefined template leads to the needs of extracting the template. We propose an
approach on event template extraction by clustering the event trigger using
semantic similarity information from WordNet synset gloss. We demonstrate in the
experiment that the semantic information from WordNet synset gloss improves the
event trigger clusters quality. The evaluation result shows that the clusters
from WordNet synset gloss achieve the top performance on 8 out of 16 event
types, outperform the other approaches. The other approaches that we compared on
evaluation including: using co-occurrence information only, using relation
similarity from UMBC system, and the combination of co-occurrence and relation
similarity. |
Keywords: |
WordNet, Semantic Knowledge, Synset Gloss, Event Trigger, Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
ANALYSING THE SCORE MATCHING OF DNA SEQUENCING USING AN EXPERT SYSTEM OF NEURO-FUZZY |
Author: |
SAFA A. HAMEED, RAED I. HAMED |
Abstract: |
The proposed approach in obtaining the matching score of the DNA sequence
alignment is presented, the Neuro-Fuzzy technique is the method which are
implemented in this paper, it's utilized the set of biological data of the DNA
sequence performing with Global and Local algorithms in order to optimize the
optimal alignment, we use the pairwise DNA sequence alignment to measure the
score of the similarity, which depends on the scoring matrix to guarantee the
confidence measure score of the pairwise sequence alignment, the ANFIS model is
suitable for predicting the matching score through the training and testing in
Neural network and the inference fuzzy system in fuzzy logic, that achieves the
result in high performance implementation. |
Keywords: |
Sequence Alignment; Dynamic Programming; Matching Mechanism; Neuro-Fuzzy |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
DEVELOPMENT OF A SUPPORT SYSTEM FOR MANAGING THE CYBER PROTECTION OF AN
INFORMATION OBJECT |
Author: |
LAKHNO V.A., KRAVCHUK P. U, MEKHED D.B., MOHYLNYI H.A, DONCHENKO V.U |
Abstract: |
The architecture of the information object security management system and the
intelligent decision support subsystem regarding cyber security operational
management is offered particularly in conditions of uncertainty, inconsistency
and lack of knowledge about the object security status. The information object
cyber security operational management system and the formation of the protection
methods rational sets model which is based on a morphological approach is
developed. This model allows us to generate different variants of protection
sets that are compliant with a computer system taking into account morphological
matrices for each security perimeter prepared with the intelligent decision
support system (IDSS). It will find an optimal variant of the information
security perimeter sets using an object function that maximizes the correlation
of a consolidated figure of "information security" to consolidated figure
"costs". A program set for IDSS in circuits of organizational-technical and
operational management of the information object security system is developed.
It is proven that using the developed IDSS allows us to reduce the cost of
developing an information security system and to shorten the time for informing
some responsible individual about information security incidents. |
Keywords: |
Information Safety; Information Security Management; Decision Support System;
Morphological Approach |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
DETERMINANTS OF ADOPTION OF CLOUD COMPUTING SERVICES BY SMALL, MEDIUM AND LARGE
COMPANIES |
Author: |
PEDRO R. PALOS SÁNCHEZ, FRANCISCO J. ARENAS MÁRQUEZ, MARIANO AGUAYO CAMACHO |
Abstract: |
Manufacturing sector organizations have seen an improvement in their
competitiveness due to the digital economy. However, there must be a steady
migration from an organization with a restricted use of Information Technology,
to one in which Information Technology is commonly used for all of the different
activities of the company. Based on this migration, organizations of all types
can generate increases in productivity and competitiveness. This in turn
contributes to advances in progress and welfare by creating more opportunities.
This study proposes to advance knowledge about the implementation of cloud
technology so that an organization can become more competitive. The current
technology available for improving competitiveness in all areas of a company by
exploiting data, providing services and for the use of resources, is cloud
computing. This novel technology will be investigated and the findings will be
used to describe the state of this technology in our country at the moment. It
will also show how the complexity of these systems and the attitudes of the
organizations and people involved, depending on the size of the organization and
its management style, influence the adoption of cloud computing systems. |
Keywords: |
Cloud Computing, Adoption, Technological Complexity, Attitude Towards The
System. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
THE ArcVIEW AND GeoDa APPLICATION IN OPTIMIZATION OF SPATIAL REGRESSION ESTIMATE |
Author: |
SCOLASTIKA MARIANI, WARDONO, MASRUKAN , FATKHUROKHMAN FAUZI |
Abstract: |
ArcView is a geographic information system software product produced by and
GeoDa is a software tool developed to implement techniques for exploratory
spatial data to the analysis (ESDA) on a lattice of data (points and polygons).
There were spatial diversity between the regions on the human development index
(HDI) variable. This research would look for the best spatial regression model
for the HDI in Central Java, Indonesia. Testing spatial effects were done by
looking at the value Moran`s I, there were five variables with positive
autocorrelation, and a negative autocorrelation variable is unemployment. The
next test with the test Lagrange Multiplier (LM), only Lagrange Multiplier
(error) which is included in the admission criteria, then the regression model
used is the Spatial Error Model (SEM). In this study used two kinds of weighting
matrix, i.e. rock contiguity and queen contiguity. The next step research was
comparing the value of R-Square and the value of Akaike Info Criterion (AIC) and
then obtained best regression model i.e.Spatial Error Model (SEM) with weighting
rock contiguity with the value of R-Square is 99.8119 % and the smallest Akaike
Info Criterion (AIC) was 4.6362. The spatial regression equation was : HDI=4.5565+0.4176
LE+0.8445 HPS+1.4262 ALS+0.0011 PCS with HDI : human development index, LE :
life expectancy, HPS : hope and period school, ALS : average length of school,
PCS : per capita spending.. |
Keywords: |
Arcview, Geoda, Optimization, Spatial Regression Estimate |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
CONTEXTUAL VARIABILITY MANAGEMENT OF IOT APPLICATION WITH XML-BASED FEATURE
MODELLING |
Author: |
ASAD ABBAS, ISMA FARAH SIDDIQUI, SCOTT UK-JIN LEE |
Abstract: |
Internet of Things (IoT) can be used anywhere, anytime and with any device. IoT
devices are used broadly in recent industry such as health care, transport,
education and communication channels. IoT applications make enable the use of
IoT systems in different environment such as heat sensor functionality varies
for indoor and outdoor, water sensors in automobile for screen viper movement
(auto working during rain and stop if there is no raining), heartbeat sensors
for old and young patients. Moreover, IoT devices are same but the operating
functionality is different according to environment and end users perspective.
Therefore, this kind of variability management is very important for reusability
of resources in multiple environments. However, variability management is
difficult task due to the dependency of resources, relationships between them
and compatibility issues. Feature Modeling of Software Product Line (SPL) is
extensively used to manage the variability management for family of software
that share common resources and varies in different points. In this paper we
have proposed simple and effective approach for variability management of IoT-based
applications by using feature modeling. We have proposed XML-based feature
modeling for IoT-based applications for variability management and increase the
reusability of existing resources. Our approach defines the complete package
from domain modeling to application development by using XML-schema and XSLT
files to select and deselect the features for final application development. Our
final architecture of IoT-based feature model shows the complete relationships
and include exclude associations between them without any constraint violations. |
Keywords: |
Internet of Things (IoT), IoT-based applications, Software Product Line, Feature
Modeling, XML-based modeling |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
SEGMENTATION OF LUNG MALIGNANT CANCER TISSUES USING PCA AND ACART METHOD IN MR
IMAGES FOR HUGE DATA SET |
Author: |
P. THAMILSELVAN, DR. J. G. R. SATHIASEELAN |
Abstract: |
Image mining is one of the main research areas in the field of computer science.
In this procedure, lung malignancy is a standout amongst the most destructive
infection in the human body. It is the second most risky sickness in the world.
In this work, we assessed the execution of Advanced Classification & Regression
Tree (ACART) strategy to distinguish lung diseases that were ignored or confused
with a lung MRI images for human at expanding hazard. The ACART order technique
is one of the humblest technique in theoretically and it is a top strategy in
image mining. Identification and classification systems are about expanding
enthusiasm to medical experts who wish to recognize effortlessly. Advanced
Classification & Regression Tree (ACART) examination is a nonparametric decision
tree system that can productively segment populaces into significant subgroups.
In this work, the upgraded ACART method has been executed to distinguish the
tumor and programmed order of benevolent and dangerous tissues in the colossal
measure of picture datasets. In this proposed framework, we have utilized two
phases, in first preprocessing stage, the Principal Component Analysis (PCA)
method has been utilized to enhance the nature of the image. In the second
stage, we improved ACART classifier has been utilized for distinguishing the
benign and malignant tissues. The image classification process of ACART method
is tested in huge amount of MRI image datasets. The technique for lung growth
forecast is only the separation of separation of various disease zone from
Magnetic Resonance (MR) pictures. This research gives a methodological process
of ACRT investigation for people new to the technique. The results of ACART
findings are validated with those methods obtained from best classification
accuracy. |
Keywords: |
Image Mining, Image Classification, Pre-Processing, Classification Rate, MR
Images, PCA, ACART And Segmentation |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
THE BACKSTEPPING METHOD FOR STABILIZING TIME FRACTIONAL ORDER PARTIAL
DIFFERENTIAL EQUATION |
Author: |
IBTISAM KAMIL HANAN, MUHAMMAD ZAINI AHMAD, FADHEL SUBHI FADHEL |
Abstract: |
In this article the nonlinear time fractional order partial differential
equation (NTFPDE) subject to a boundary controller at the boundary is
considered. The semi-discretized backstepping control technique is used for
stabilize the partial differential equation with fractional order To the author
best knowledge, this is the first time in the literature that the backstepping
method is being used for stabilizing NTFPDE. Illustrative example is given to
demonstrate the effectiveness of the proposed control scheme. Simulation results
show that the proposed design not only can stabilize the NTFPDE but performs
better than an integer order as well. |
Keywords: |
Backstepping Method, Fractional Lyapunov Function, Fractional Derivative,
Boundary Control, Fractional Eulers Method. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
SABE: EFFICIENT AND SCALABLE FILTERED ACCESS CONTROL IN DISTRIBUTED CLOUD DATA
STORAGE |
Author: |
NARESH VURUKONDA, B.THIRUMALA RAO |
Abstract: |
Distributed cloud data storage is an advanced and empirical concept in present
days for out sourcing of data in cloud. Distributed file storage requires users
trustable on their required data to service provider of the cloud. Because of
increasing security and protection concerns in out sourced data in clouds,
traditionally several approaches like Attribute Based Encryption (ABE) have been
proposed for gained access control in out sourced data in distributed cloud
environment. This schema follows symmetric key approaches to provide security in
cloud computing. Symmetric key approach is not suitable for support
authorization effectively because, it uses single key for encryption and
decryption. Presently authors focus on centralized approaches for proving
security using single key distribution center, shares attributes to all the
users. A new decentralized grained access control approach is required for
privacy on data storage that supports anonymous authentication. In this paper we
introduce to propose and develop an approach i.e. Scalable Attribute Based
Encryption (SABE) to achieve grained with flexible and scalable access control
in cloud computing for secure distributed cloud storage. Our proposed approach
is not only perform scalable due to its pyramid structure, it also share
effective and flexible access control in supporting on ABE, it also assigns for
user expiration time and revocation efficient than existing schemas. Our
experimental results show effective data share in distributed environment with
feasible data retrieval with access control for outsourced data in cloud
computing with reliable experimental evaluation. |
Keywords: |
Cloud Computing, Attribute Based Encryption Flexible, Access Control, and
Pyramid Structure |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
GREEN INFORMATION SYSTEMS DESIGN FRAMEWORK: A SYSTEMATIC LITERATURE REVIEW |
Author: |
SHIREEN MUHAMMAD, YUSMADI YAH JUSOH, JAMILAH DIN, ROZI NOR HAIZAN NOR |
Abstract: |
The research on information systems (IS) and environmental sustainability has
grown under the notion of green IS. Hence, it is important to comprehend the
concept of green IS and to ascertain existing frameworks for designing it. This
paper presents the definition and taxonomy of green IS, areas of green IS
research currently being addressed by IS academics and research directions for
future studies on green IS design framework. This paper follows systematic
literature review (SLR) procedures with snowballing approach as the main method.
Relevant articles were mainly selected by referring to the Association of
Information Systems (AIS) and thus, are relevant to the IS academic community.
This paper synthesized the six elements for green IS design framework namely
context, goals, roles, design principles, functions and features. This provides
a foundation for the future green IS design framework. The evidence indicates
that there is absence of metrics in measuring green IS design, which is valuable
in assessing such systems. |
Keywords: |
Design, Framework, Green IS, Snowballing, Systematic Literature Review |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
MEASURING THE EFFECT OF SURVEY QUESTION TYPES IN KOREA ON THE RESPONDENTS'
EMOTIONAL REACTION ON IT PRODUCTS |
Author: |
SANGMIN LEE, JOO HYUN PARK, HAN YOUNG RYOO |
Abstract: |
The traditional IT product design focused on the most optimized physical
functions and economic feasibility. However, the trends are changing to adopt an
emotional design into research and development by measuring and analyzing the
human beings emotion. Many emotion design studies on IT products measure users
emotion through the survey questionnaire with emotion words. Therefore,
structuring and organizing survey question items are critical. The objective of
this study is to find an effect of different survey question types on emotion
evaluation of the websites, which can be referred to as an example of IT
products. In order to achieve the objective, this study measured the emotion
level of the website users by applying different question items with different
sentence lengths and expression types for the same website. This study found
that different question type has no significant effect on human emotion
evaluation. The findings from this study are a lot different from the research
reported in the literature outside the Korea. This implies that additional
research might be necessary by considering the cross-cultural factors into
question types when developing the survey questionnaire for Korean. |
Keywords: |
IT Product, Question Type, Users Emotion, Korean Survey, Measuring Emotion |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
ANALYTICAL MODEL OF THE THRESHOLD VOLTAGE VTH, SUBTHRESHOLD SWING AND DRAIN
INDUCED BARRIER LOWERING (DIBL) FOR A NEW DEVICE STRUCTURE OF CYLINDRICAL GATE
MOSFET |
Author: |
HIND JAAFAR, ABDELLAH AOUAJ, AHMED BOUZIANE |
Abstract: |
In this work, 2D analytical and numerical modeling of surface potential,
threshold voltage Vth and drain induced barrier lowering (DIBL) for a new
structure of surrounding gate MOSFET are presented. This new structure obtained
by combined dual material gate graded channel and dual oxide thickness shows
good immunity in the nanoscale regime versus short channel effects (SCE). The
characteristic of the new model are investigated in terms of surface potential,
threshold voltage and DIBL. The results of simulation show that the use of two
oxide thickness with the small thickness at the source side could significantly
reduce short channel effects such as threshold voltage, and DIBL. It is also
revealed that a lowering gate oxide thickness, a small silicon channel radius
are needed to improve device characteristic. Analytical models for all
parameters are validated using a rigorous numerical calculation and compared to
others devices engineering. |
Keywords: |
Dual Metal Gate (DMG), Dual Oxide Thickness (DOT), Graded Channel (GC), Drain
Induced Barrier Lowering (DIBL) |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK
USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK |
Author: |
ADE KURNIAWAN, IMAM RIADI, AHMAD LUTHFI |
Abstract: |
Internet has changed the world, today almost everyone connected to the Internet
indicated the percentage of penetration of internet users in the world is
increasing which caused the change in targeted cyberattacks to individual
targets. Reported eight of the top ten websites in the world are at a critical
point of vulnerability from attacks by injection methods such as Cross Site
Scripting and SQL Injection that can be used by certain parties to steal
information or for a particular purpose. In this paper the research conducted by
three key stages: first Attacking (Single Victim Attack: Information Gathering,
Live Webcams Screenshot, Keyloggers and Download Spoofer), second stage Analysis
(Digital Forensic: Live Forensic and Analysis Evidence) and third stage to
Prevent (Patching). Contribution of this study offers a method of protection
solutions to users in the browser application to be filtered, disable the plugin,
notifying, blocking, and reducing Cross Site Scripting attacks. |
Keywords: |
Live Forensic, Cross Site Scripting, OWASP, Xenotix |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
A NOVEL METHOD FOR EVALUATION OF NOSQL DATABASES: A CASE STUDY OF CASSANDRA AND
REDIS |
Author: |
HADI HASHEMI SHAHRAKI, TAGHI JAVDANI GANDOMANI, MINA ZIAEI NAFCHI |
Abstract: |
In today's complex world, due to the increasing use of web-based programs, smart
phones and social networks, production rate is increasing constantly as well as
volume of data. Also, companies try to provide their services with more features
in order to stay ahead of their competitors. That increases the production of
information by the users too. In this case, it seems that moving from rational
databases to non-relational databases in a necessity. With regard to the various
of use cases and their requirements, also the primary features of NoSQL
databases, choosing the most appropriate NoSQL database can be big concern of
developers. The right selection of NoSQL databases will avoid to wasting time,
money, and energy. On this paper, we propose a general and structured method to
help developers, customers, and managers to evaluate NoSQL databases in the
right way and facilitate the process of decision making to select one of them. |
Keywords: |
Non-Relational Databases, Nosql Databases, Evaluation, Performance, Scalability |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
A USER FRIENDLY AND IMPROVED DESIGN FOR SECURE DELETION IN CLOUD STORAGE |
Author: |
BENTAJER AHMED, ENNAAMA FAOUZIA, HEDABOU MUSTAPHA, ELFEZAZI SAID |
Abstract: |
Assured file deletion is a major concern in cloud computing security. The
countermeasures proposed by Cloud Service Providers (CSPs) are not totally
satisfactory from the data owner's perspective. Because, CSP do not offer an
irrefutable proof of an assured file deletion. Other proposed approaches for
achieving assured deletion in cloud storage are based on the use of encryption
operations. File Assured Deletion (FADE) is most efficient amongst them. The
system is built upon cryptographic techniques to guarantee privacy and integrity
of outsourced files. This paper illustrates a secure yet user friendly update
for FADE. The proposed update, is easy to implement, require less computational
resources and ensure assured file deletion. Furthermore, we implemented a
prototype of our update to validate the model, and verify that it offers assured
deletion with a minimal trade-off of performance for large files upload and
download operations. |
Keywords: |
Cloud Computing, Secure Deletion, Confidentiality, Cloud Storage |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
MRWDP: MULTIPOINT RELAYS BASED WATCH DOG MONITORING AND PREVENTION FOR BLACKHOLE
ATTACK IN MOBILE ADHOC NETWORKs |
Author: |
OPINDER SINGH, Dr. JATINDER SINGH, Dr. RAVINDER SINGH |
Abstract: |
Mobile Adhoc Networks (MANETs) do not include any fundamental power and also
infrastructure less networks, so unprotected against black hole attacks. It
decreases the network performance by dropping the number of messages. Black hole
node always attracts the concentration of source nodes by guarantee them that it
has the minimum cost path towards destination nodes. Many techniques have been
proposed so far, in order to reduce the impact of the black hole attack by
detecting and preventing it. Among the existing techniques, Watchdog (WD)
technique has shown better performance in preventing the black hole attack. It
utilizes the local knowledge of the next hop node and eavesdrops it. If it gets
that spending time of the message is more than the given threshold, then it
characterize that node as black hole attacker. But this method has several
shortcomings that it does not track the link transmission errors, which may be
because of congestion in MANETs and also it not offers high mobility for maximum
number of nodes, which eventually decreases the performance. In order to handle
this issue, a new multipoint relays (MPRs) based WD monitoring and prevention
technique is proposed in this paper. The multipoint relays based WD monitoring
and prevention technique utilizes the dynamic threshold value to detect the
black hole attacker node by utilizing Clustering, WD and MRPs based optimistic
path for communicating the messages. Experimental results clearly indicates the
effectiveness of the proposed technique over others. Thus, it reduces the
overall message dropping, which improves the performance of the MANETs. |
Keywords: |
Black hole, MANETs, WD, Multipoint relays. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
ANALYSIS OF SOFT PLAQUE DETECTION METHODS IN CTA IMAGES |
Author: |
MUHAMMAD AHSAN, SAMMER ZAI, YOUNG SHIK MOON |
Abstract: |
Cardiovascular diseases are considered primary cause for increasing rate of
mortality. Automatic stenosis detection in CTA data is highly demanded by
clinicians to analyze the coronary related abnormalities timely. The detection
of vulnerable plaques in CTA is challenging because these plaques may exhibit
similar appearance to nearby blood and muscle tissues. Moreover, accuracy of
stenosis detection heavily depends upon the accuracy of delineation process of
coronary arteries. In this paper, we present a comparative study of four
different soft plaque detection methods along with their specific strengths and
limitations. We have created a table summarizing the comparison of four selected
methods against such criteria as imaging modality, segmentation method, level of
pre and post processing, user interaction, validation of results, usage of prior
knowledge, and effectiveness of segmentation and stenosis detection. The study
provides assistance in selecting an appropriate method for detecting vulnerable
coronary plaques, suitable for a given segmentation of coronary arteries. |
Keywords: |
Coronary Artery Segmentation, Stenosis, Soft Plaque, Computed Tomography
Angiography, Cardiovascular Disease |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
THE SYSTEM OF INVESTMENT DECISION MAKING THROUGHANALYSIS OF STOCK PORTFOLIO
PERFORMANCEBASED SINGLE INDEX MODEL (COMPARISON STUDY OF SHARIAH STOCKS AND
CONVENTIONAL STOCKS) |
Author: |
MULYANTO NUGROHO, SRIE HARTUTIE MOEHADITOYO, KHOIRUL ANAM |
Abstract: |
This research aimed : (1) to assess the effectiveness of the Single Index Model
as methods in the system of investment decisionsmaking through formation of
stock portfolios analysis; (2) to compare the performance of a portfolio of JII
sharia stocks and IDX30 conventional stocks; and (3) to determine the most
optimal stock portfolio that suitable as an investment instruments. The method
used to establish a stock portfolio is Single Index Model and Sharpe index,
Treynor index and Jensen index to measure the performance of their portfolios.
The population of this research is all the stocks listed in the JII indices and
the IDX30 indices year 2013-2015. While the sample are stocks that recorded in
the both indices consistently over the research period.Based on calculation of
the excess return to beta (ERB) value and the cut-off point (C *) obtained the
result that there are three (3) stocks of JII indices entered as member of
portfolio i.e. stock of Unilever Indonesia (UNVR), AKR Corporindo (AKRA) and
Indofood CBP Sukses Makmur (ICBP), and 3 (three) stocks of IDX30 indices, i.e.
Unilever Indonesia (UNVR), Bank Rakyat Indonesia (BBRI) and Bank Central Asia (BBCA).The
results of this research indicate that Single Index Model proved to be effective
for screening and selecting stocks to form the optimal portfolio, so that the
Single Index Model can be used as analysis tool in the System of Stock
Investment Decision Making. The result show that the sharia stocks JII portfolio
has a higher return rate and lower risk portfolio compare to conventional stock
IDX30. While the views of the performance index, JII Islamic stock index has a
value of Sharpe, Treynor index and Jensen index higher than conventional stock
IDX30. It can be concluded that the portfolio of Islamic stocks JII has better
performance than the conventional stock portfolio IDX30. |
Keywords: |
Single Index Model, Optimal Portfolio, Excess Return To Beta, Cut Off Point,
Return Portfolio, Portfolio Risk, Sharpe Index, Treynor Index, The Index Jensen |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
DEVELOPING DIAGNOSE TUBERCULOSIS DISEASES MODELS BY USING DATA MINING:
CLASSIFICATION AND CLUSTERING ALGORITHMS |
Author: |
HOZIFA MOHAMED, TARIG MOHAMED AHMED |
Abstract: |
Nowadays, Tuberculosis is considered as one of the largest cause of death from
infectious diseases worldwide. There is increasing evidence that the genetic
diversity of Mycobacterium tuberculosis bacteria may have important clinical
consequences. So, the combination of clinical genetic data, social and
demographic is crucial to understand the epidemiology of these infectious
diseases. To help the doctors to predict and diagnosis the tuberculosis disease,
this research proposed two models by using Data Mining. The two models could be
used as decision support tool in clinics to help in diagnosing Tuberculosis. To
develop the models, a tuberculosis dataset was collected from medical field from
Tropical area teaching hospital in Khartoum state Sudan, the size of this data
set is 265 patient records. The first model was built by using classification
algorithms. After conducting intensive experiments, three classification
algorithms had been selected Naïve Bayes, CN2 and Classification Tree. The
model was implemented using Orange application. The model had been validated and
according to the result, the classification Tree was selected as best algorithm
with accuracy 0.9358, Sensitivity0.9632 and Specificity 0.8933. The second model
was built by using clustering algorithm called K-means. Also, this model was
implemented by using Orange application. The result of the clustering model had
been discussed and evaluated. The two models could be used to cross-check the
diagnosis and predict the Tuberculosis diseases |
Keywords: |
Tuberculosis, Data Mining; Classification, Clustering. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
EMPLOYING THE THEORY OF DYNAMIC INFORMATION SYSTEMS WITH A VIEW TO PUTTING
TOGETHER A PROPER CONCEPTUAL AND CATEGORICAL FRAMEWORK IN THE AREA OF IMPORT
SUBSTITUTION |
Author: |
OKSANA VIKTOROVNA SHUMAKOVA, DMITRIY SERGEEVICH NARDIN |
Abstract: |
This study aims to analyze the category import substitution using specific
tools from the theory of dynamic systems that provide for an optimal balance in
terms of preserving content-related and conceptual specificity and mathematical
rigor within the context of the cognition of complex objects. The authors
analyze and classify existing approaches to defining the category import
substitution by reference to the content-related, conceptual, and functional
aspects that are reflected, in one way or another, in definitions employed.
Using tools from the theory of dynamic information systems the authors put
together a definition of the category import substitution of their own. To
this end, the authors utilize a triadic method intended to reflect the category
in question in three first-level derived categories which characterize it most
completely. Each of the three first-level derived categories is decrypted using
second-level categories, and then all the derived categories are used to define
the base category import substitution. The subsequent raising of the
decryption level helps take a more deliberate approach to defining the category
import substitution. To this end, the authors also decrypt each of the
second-level derived categories, which results in that the overall number of
third level categories characterizing the base category comes to 27. Using all
the derivatives the authors manage to fine-tune and expand the definition of the
category import substitution and reflect in it certain aspects which
previously used to be left out of consideration by scholars exploring import
substitution. |
Keywords: |
Import Substitution, Category, Concept, Theory Of Dynamic Information Systems,
Triadic Method For Decrypting Categories |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
A SYMMETRIC CRYPTOSYSTEM BASED ON NONDETERMINISTIC FINITE AUTOMATA |
Author: |
GHASSAN KHALEEL, SHERZOD TURAEV, IMAD ALSHAIKHLI |
Abstract: |
This paper proposes a new symmetric cryptosystem based on nondeterministic
finite automata. It is shown that nondeterminism allows to reduce the dependency
of key automata on a large descriptional complexity and irreversibility of
automata. Moreover, it is proven that the introduced cryptosystem has higher
security and more efficient performance than its deterministic counterparts Dӧmӧsis cryptosystem and its modified version. |
Keywords: |
Cryptography, Stream Cipher, Nondeterministic Finite Automata, Dӧmӧsis
Cryptosystem |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
Title: |
THE FIRST MODULAR DATABASE OF INDONESIAN GENES-ASSOCIATED DISEASES INFORMATION |
Author: |
RIKA YULIWULANDARI, NOVA EKA DIANA, KINASIH PRAYUNI |
Abstract: |
This paper aims to develop a modular schema database for gene-associated
diseases incidence in Indonesia, which is called as Genomic Medicine Research
Group Database (GMRGDB). A modular architecture is beneficial to facilitate any
manipulation and addition of new genes-affiliated diseases in the future.
Currently, GMRGDB contains two categories, N-acetyltransferase 2 (NAT2) and
Human Leukocyte Antigen (HLA) databases. NAT2 database is a repository of NAT2
genes and anti-TB drugs association, while HLA database records diseases related
to Human Leukocyte Antigen. GMRGDB consists of patients’ information from
various ethnics in Indonesia, such as Javanese, Melayu, Betawi, Sundanese, and
Batak. Users can view a number of samples for each database, detailed
representation of Single Nucleotide Polymorphism (SNP), and also filter the data
for specified ethnic through GMRGDB browser. |
Keywords: |
Genes-Associated Disease, Modular Database, N-Acetyltransferase 2, Human
Leukocyte Antigen, Indonesian Ethnics |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2017 -- Vol. 95. No. 6 -- 2017 |
Full
Text |
|
|
|