|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
May 2021 | Vol. 99
No.10 |
Title: |
FACTORS AFFECTING THE INTENTION TO USE MOBILE APPLICATION ONLINE TRAVEL AGENCY |
Author: |
WIZA TEGUH, VIANY UTAMI TJHIN |
Abstract: |
E-commerce has become a new shopping trend in the last few years. A type of
e-commerce selling and buying objects in travel services is known as an online
travel agency (OTA). OTA's presence is intended to make it easier for customers
and travel suppliers to do transactions regarding travel services. It is widely
predicted that the OTA ecosystem will continue to grow, seeing the increasingly
massive internet use trend and the increasing use of smartphones. Even so, this
does not mean that OTA companies are not experiencing challenges. It is proven
that some companies cannot survive and eventually out of business. It happened
because the company is unable to meet the needs and desires of its buyers. This
research aims to analyze the factors that influence the intention to use the OTA
mobile application using PLS-SEM. The research model was built based on a
combination of TAM, UTAUT, ISS model, and perceived risk. The research results
on 261 samples showed that the intention of using the OTA mobile application was
influenced positively and significantly by perceived usefulness and hedonic
motivation. This study's other constructs include social influence, information
quality, system quality, service quality, perceived risk, and habit. However,
they do not significantly positively affect the intention to use the OTA mobile
application. |
Keywords: |
Intention to Use, Online Travel Agency, Mobile Application, SEM-PLS, Online
Tourism |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
ABNORMAL EVENT DETECTION IN INDOOR ENVIRONMENT BASED ON ACOUSTIC SIGNAL
PROCESSING |
Author: |
RUSTAM ABDRAKHMANOV, ABDIMUKHAN TOLEP, ZHAZIRA KOZHAMKULOVA, NURLAN NARBEKOV,
NURBAI DOSSANOV, BAKYTGUL YESKARAYEVA |
Abstract: |
Alert the public about emergencies is to bring to public alerts and emergency
information on dangers arising from the threat or occurrence of emergency
situations of natural and technogenic character, as well as the conduct of
hostilities or owing to these actions, the rules of behavior of the population
and the need for protection activities. The aim of the work is to develop a
method for detecting the sounds of critical situations in the sound stream. In
this paper, the term "critical situation" is understood as an event, the
characteristic sound signs of which can speak of acoustic artifacts (a shot, a
scream, a glass strike, an explosion, a siren, etc.). The developed method
allows you to classify events into two groups: normal (for example, street
noise) and critical situations (for example, an explosion, a scream, a shot). To
determine events, machine learning is used, namely the Support Vector Machine
method, which solves classification and regression problems by constructing a
nonlinear plane separating the solutions. SVM has a fairly wide application in
data classification and shows good results in event detection problems. As part
of the work, the minimum set of features for the machine learning model was
determined, small training and test samples were formed, and a method was
developed that classifies normal and abnormal events. |
Keywords: |
Audio Event, Impulsive Sounds, Signal Processing, Machine Learning, Acoustic
Signals, Signal Processing |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
ENHANCED THE DFIG SYSTEM BEHAVIOR UNDER SYMMETRICAL SAG VOLTAGE |
Author: |
TARIQ RIOUCH, RACHID EL-BACHTIRI |
Abstract: |
This paper proposes a novel scheme to improve the low voltage ride-through
(LVRT) capability of the doubly-fed induction generator (DFIG) based wind power
(WT). The main problems of DFIG are; its sensitivity to voltage sag in side and
the sudden variation in wind speed on the other side, these problems causes the
fluctuations in the output power, overcurrent in rotor winding and overshoot in
the dc bus voltage. A Hybrid Energy Storage System (HESS) connected in parallel
with the rotor side converter of the DFIG, and an adequate control of the HESS
are suggested to enhance the DFIG behavior. The simulations is conducting in
MATLAB/Simpower system environment, The results show that the proposed scheme
can not only enhanced the DFIG behavior under fault, but also smooth the power
injected in grid under normal operation with the sudden variation of the wind
speed. |
Keywords: |
Wind power generation; doubly fed induction generator (DFIG); Hybrid
Energy Storage System (HESS); Voltage sag; Power fluctuation |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
A NOVEL SYMMETRIC HYBRID CRYPTOGRAPHY TECHNIQUE USING LINEAR BLOCK CIPHER (LBC)
AND SIMPLE SYMMETRIC KEY |
Author: |
PRAKASH KUPPUSWAMY, SAEED Q AL-KHALIDI AL-MALIKI |
Abstract: |
Data encryption technique is the art of cryptology protecting valuable
information or data by transforming it into an unreadable scrambled text.
Cryptography algorithm is a mathematical technique used to preventing or
safeguard messages from unsolicited access. In the current digital environment,
public, private financial institution’s data transactions conducts through open
network channel only. Therefore, it is significant to implement cryptography
techniques on those financial data to secure valuable things. In many sectors
exploiting private algorithms such as DES, AES and public algorithms such as
RSA, Diffie-hellman been using in various applications. Public key or Asymmetric
key encryption technique has connection with many performance issues such as
energy consumption, memory wastage and computational problems etc.,
Correspondingly, symmetric key algorithm also has a problem of non-repudiation,
false modification etc., to overcome the above issues and enhance the
confidentiality to make it stronger, hybrid cryptography techniques offered
better solution. In short, the hybrid technique uses the combination of two or
more encryption algorithms. The proposed hybrid algorithm is combination of
enhanced hill cipher algorithm using modulo 37 and using simple positive and
negative integer numbers. Many hybrid algorithm follows different logic to
provide more security, we proposed here, simple and open design,
straightforwardness, computational speed, more privacy. and security compared to
existing hybrid encryption schemes. |
Keywords: |
Symmetric Key, Asymmetric Key, Hybrid Encryption, Block cipher, RSA, DES, AES
etc., |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
EVALUATION OF THE SUCCESS OF THE REKON.ID MOBILE ATTENDANCE APPLICATION USING
THE DELONE AND MCLEAN APPROACH |
Author: |
RAHMAT IVAN AZIZ, EMIL ROBERT KABURUAN |
Abstract: |
This study discusses the evaluation process on the use of the Rekon.id
application at the company PT Solusi Konvergen. The Rekon.id application is an
application made by companies to record every activity carried out by employees
and help employees to carry out administrative processes every day. However, at
the time of its application, the Rekon.id application experienced a decrease in
users every month. So, with these problems, companies must evaluate the use of
the application. This study conducted an evaluation process for the success of
the Rekon.id application using the DeLone and McLean model which consisted of
system quality, information quality, service quality, usage, user satisfaction,
and net benefits. This study uses 235 samples of Rekon.id application users to
test and perform quantitative analysis in the evaluation process of using the
Rekon.id application. The results of the 10 hypothesis test conducted show that
the variables that have a positive relationship are information quality on user
satisfaction, system quality on user satisfaction, service quality on use, and
user satisfaction with net benefits. |
Keywords: |
Evaluation Information System, Information System, Mobile Attendance, DeLone and
McLean Approach. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
EduDIS CONSTRUCTION TECHNOLOGY BASED ON Z39.50 PROTOCOL |
Author: |
S.K.SERIKBAYEVA, D.A.TUSSUPOV, M.A.SAMBETBAYEVA, A.S. YERIMBETOVA, TASZHUREKOVA
ZH.K., BORANKULOVA G.S. |
Abstract: |
The most effective way to solve the problems of organizing access to distributed
information resources is to organize information about them in information
systems that are open in the form of electronic libraries. We formulated the
basic principles of EduDIS implementation based on the use of the ideas of the
electronic library. The article is about the implementation of an information
system that provides unified access to distributed resources. The paper
considers general issues of organizing access to distributed information
resources, as well as the main components of such a system. The main aspects of
joint use of Z39.50 protocols for access to distributed information resources
are disclosed. In our paper, we provided a functional overview of the protocol
itself and the history of standards, described some of the European initiatives
that use it, and addressed various questions related to its future use and
adoption. Z39.50 is an important building block of future distributed
information systems. Moreover, in this paper, we discuss the description of the
search for terms in the thesaurus and the algorithm for constructing a tree of
terms based on abstract access to the thesaurus, organized in accordance with
the Zthes profile of the Z39.50 protocol. |
Keywords: |
Distributed information systems, EduDIS, Z39.50, thesaurus, Zthes, RPN. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
STEGO IMAGE CORRUPTION DETECTION AND SECRET TEXT RECOVERY IN STEGANOGRAPHY
COMMUNICATION |
Author: |
JAGAN RAJ J, C. KAVITHA, K. SAKTHIVEL |
Abstract: |
In this proposed work, an effort has been made to use multiple image files for
steganography encoding alongside with the potential of secret text recovery in
the event of any image corruption during the stego image transit. Proposed
algorithm is effective on the safety factors of secret image, since the embedded
checksum will validate for any unauthorized users or intruders, who plan to
corrupt the image in any aspect. If any of the stego image underwent any
steganalysis or Man in the Middle attack, then this proposed algorithm can
effectively identify the potential corruption. The proposed multi cover image
steganography model enables the receiver to send the secret text in more secured
way and has the ability to detect the corruption in secret message. This
solution is not only detecting the possible cover image corruptions but it also
withstands one stego image corruption and has the capability to recover the
original secret text even after one stego image corruption during the
transmission of the secret message. This proposed work will increase the
security of secret text that are being sent using steganography methods. |
Keywords: |
Image Steganography, Multi-Image Steganography, Data Corruption Detection |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
A DESIGN OF A NEW HASH FUNCTION BASED ON CELLULAR AUTOMATA |
Author: |
YOUSSEF SBAYTRI, SAIIDA LAZAAR |
Abstract: |
Cryptographic hash functions play an important role in information security.
They are used in several cryptographic applications to verify the integrity and
authenticity of data. The hash functions are also the basis of blockchain
technology. Many hash function constructions are inspired by boolean functions.
The proposed hash function algorithm in this paper is based on Elementary
Cellular Automata (ECA) and 2- dimensional Cellular Automata (2DCA), which are
another type of boolean functions that have excellent cryptographic properties.
This algorithm has a sponge construction as such as SHA-3. The strict avalanche
criterion (SAC) and NIST statistical tests suite (STS) were used to measure the
security of this algorithm. The obtained results demonstrate that the proposed
algorithm exhibit high sensitivity to input changes. |
Keywords: |
Cryptographic hash function, Blockchain, Sponge construction, Cellular Automata,
Elementary Cellular Automata, Boolean function, NIST statistical tests suite,
Avalanche Effect. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
TRIP PLANNING ALGORITHM FOR GTFS DATA WITH NOSQL STRUCTURE TO IMPROVE THE
PERFORMANCE |
Author: |
MUSTAFA ALZAIDI, ANIKO VAGNER |
Abstract: |
Nowadays, GTFS (General Transit Feed Specification) data is used by many
transport agencies as a standard format for publishing their data. Trip planning
applications where a user can plan a trip between two locations are widely used.
This paper will introduce an algorithm to found all possible trip plans between
any two locations using GTFS data. The algorithm uses both stop and route level
search to found the possible transition to be made. We introduce a technique
that reduces the server overhead by defining and implementing a Redis NoSQL data
structure to store all possible search results. Trip planning request at the
server will be served by querying the Redis structure instead of run the
algorithm with each request. We experiment, measure, and list the server
performance using this technique with two different GTFS data sets and compare
performance with and without using it. |
Keywords: |
GTFS, Trip Planning, Redis, NoSQL, Smart City. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
OPTICAL AMPLIFIERS FOR REACH EXTENSION OF PASSIVE OPTICAL NETWORK FOR RURAL
SETTLEMENTS |
Author: |
A.TUSSUPOV, N.I.LISTOPAD, A.T.TOKHMETOV |
Abstract: |
This article is devoted to reach extended PON and optical amplifier technologies
to extend physical limitation of PON from 20km to 60 km. with analysis of
optical amplifiers, like EDFA, Raman, SOA amplifier, quantum-well and
quantum-dot semiconductor optical amplifier for reach extension and the
corresponding requirements of PON. |
Keywords: |
FTTH, PON, OA, PON, SOA, EDFA, QD-SOA. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
DEEP LEARNING-BASED CANCER CLASSIFICATION FOR MICROARRAY DATA: A SYSTEMATIC
REVIEW |
Author: |
NASHAT ALREFAI, OTHMAN IBRAHIM |
Abstract: |
Deep neural networks are robust techniques and recently used extensively for
building cancer classification models from different types of data. Nowadays,
microarray gene expression datasets consider an essential source of data that is
used in cancer classifications. However, due to the small size of samples
compared to the high dimensionality of microarray data, many machine learning
techniques have failed to distinguish the most relevant and informatics genes.
Therefore, deep learning is demand due to its ability to automatically
discovering the complex relationship between features with significant accuracy
and high performance. The current study aims to reveal the state-of-the-art
of deep neural network architectures and how it can utilize from microarray
data. Therefore, several deep neural network architectures were built such as
CNN, DNN, RNN, DBN, DBM and DAE to be compatible with the different learning
processes (supervised, unsupervised and semi-supervised). As a result, CNN
considers the most common neural network architecture used in the medical field
due to its robustness and high performance in cancer classification. Results
indicate that choosing suitable architecture of the deep neural network and its
hyper-parameters is one of the most difficulties facing the researcher in
designing models for cancer prediction and classification because there is no
particular rule to ensure high prediction accuracy. |
Keywords: |
Deep Learning; Cancer Classification; Convolutional Neural Network; Transfer
Learning; Microarray. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
RESEARCH AND MODELING OF THE PROCESS OF SULFUR PRODUCTION IN THE CLAUS REACTOR
USING THE METHOD OF ARTIFICIAL NEURAL NETWORKS |
Author: |
ZH.YE. SHANGITOVA , B.B. ORAZBAYEV , L.T. KURMANGAZIYEVA , T.T. OSPANOVA , R.U.
TULEUOVA5 |
Abstract: |
The Claus sulfur recovery process is the most important in natural gas
desulfurization technology. Taking into account the large-tonnage facilities, it
is urgent to solve the problem of effective management, which will allow
obtaining a significant economic effect. When studying catalytic reactions and
processes, mathematical modeling methods are most often used, which allow
describing changes in the states of the system under study. An alternative
approach to modeling chemical-technological processes can be the use of
artificial neural networks, which make it possible to take into account the
features of the processes under study as much as possible. The article is
devoted to the study of the chemical-technological process of sulfur production
in the Claus reactor by the method of artificial neural networks (ANN). This
article describes the relevance of neural networks using in
chemical-technological systems. Similar works on the research topic are
presented. The analysis of the sulfur production unit as an object of management
has been carried out. The main parameters influencing the process of sulfur
production have been identified and investigated. The results of the study of
sulfur production process using fuzzy logic are presented. Backpropagation
algorithm is described. Based on the input data of a mathematical model with a
multiple regression structure and real data from the Claus reactor, the
Backpropagation Algorithm of multilayer neural networks in Python has been
implemented. Based on the results of the program, the output values and errors
dependences graphs have been built. As a result of the study, sufficient
convergence of the results of modeling using mathematical models is shown on ANN
and real production data. |
Keywords: |
Backpropagation Algorithm, Multi-layer Neural Networks, Python, Sulfur,
Artificial Neural Networks |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
DEVELOPMENT OF BUSINESS PROCESS DESIGN METHODS |
Author: |
BOLSHIBAYEVA A.K. , USKENBAYEVA R.K. , KUANDYKOV A.A., RAKHMETULAYEVA S.B. ,
ASTAUBAYEVA G.N. |
Abstract: |
In all economic and production-technological areas (or processes), business
processes are the main objects that unite everything that is related to the
achievement of the goal. There are many models of business processes that do
not sufficiently reflect the features of the business process and the needs of a
person in the business process. In other words, all kinds of model are
functionally incomplete. Business process analysis is becoming extremely
important for manufacturing and logistics systems as it plays a vital role in
the successful improvement of business processes. The goal of process analysis
is to unlock new knowledge to solve problems and optimize processes to create
core competencies. A large amount of research and development has been carried
out to optimize the performance of business processes in this complex and
dynamic environment. Several methodologies, techniques and tools have been
developed to analyze and optimize business processes in the field of production
and logistics. Therefore, more and more new approaches to the description of
business processes appear. In this work , we offered universally th business
process model, which is called the base. Since, all other views of business
processes are derived from the basic business process representation by the
model. |
Keywords: |
Business Process, Design Methods, Modeling, Knowledge Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
CTGAN VS TGAN? WHICH ONE IS MORE SUITABLE FOR GENERATING SYNTHETIC EEG DATA |
Author: |
MIN JONG CHEON, DONG HEE LEE, JI WOONG PARK, HYE JIN CHOI, JUN SEUCK LEE, OOK
LEE |
Abstract: |
BCI has been an alternative method of communication between a user and a system,
and EEG is a representative non-invasive neuroimaging technique in BCI research.
However, gathering a large dataset of EEG is difficult due to insufficient
conditions. Therefore, a data augmentation is required for the data and a
generative adversarial network is a representative model for the augmentation.
As the EEG data is a CSV format, we decided to utilize CTGAN and TGAN for
creating synthetic data. Our research was conducted through 3 steps. First of
all, we compared two datasets from each model through data visualization.
Secondly, we conducted a statical method for calculating similarity score.
Lastly, we used both data as input data of the machine learning algorithms.
Through the first step and second step, we found that the data from CTGAN has
higher similarity than TGAN. However, in the last step, the result showed that
the result such as accuracy, precision, recall, f1 score showed no significant
difference between the two datasets. Furthermore, compared to the original
dataset, none of the synthetic datasets showed higher scores. Therefore, we
concluded that further research is needed to find out a better method for data
augmentation so that the synthetic data could be utilized for the input data of
machine learning or deep learning algorithms. |
Keywords: |
Deep Learning, GAN, EEG, BCI, Data Augmentation, Artificial Intelligence |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
VOLTAGE STABILITY ANALYSIS USING CONTINUATION POWER FLOW UNDER CONTINGENCY |
Author: |
MADHAVI GUDAVALLI, HARIKA VEMULAPALLI, KUMAR CHERUKUPALLI |
Abstract: |
This paper presents the knowledge of a continuation power flow (CPF) analysis to
be used in a voltage stability analysis (VSA) to regulate the power in huge
systems. Prominent feature of the continuation power flow is that it remains
well-conditioned at and around the critical point. As significance, divergence
due to ill conditioning is not encountered at the critical point, even when
solitary meticulousness computation is used. It begins with a few basic values
of the process and leads to a critical stage. The quiescent attribute of this
approach is that it ruins fit at the anticipated stage, even though a particular
estimation is used. In this paper system voltage, active power losses, reactive
power losses and voltage stability are analyzed using a continuation power flow
algorithm with and without contingency under load changing condition. |
Keywords: |
Continuation Power Flow, Contingency, Corrector, Critical Point, Predictor,
Stability Index, L- Index, Jacobian, Tangent Vector |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
FLOOD CONGESTION SIMULATION AND PREDICTION USING IOT WIRELESS NETWORKS ON
DYNAMIC STREETS ROUTES |
Author: |
MONEEF M JAZZAR |
Abstract: |
Floods are among the natural hazards that are the most common as well as
devastating. The worrying numerous flood-related fatalities and economic losses
incurred yearly globally call for enhanced flood prediction. Remarkably, the
previous decade has presented great chances with a series of studious events
investigating how wireless data from the internet of things (IoT) networks can
enhance flood prediction. This paper backs by emphasizing the key approaches of
flood congestion prediction and IoT sensor-based techniques for real-time flood
observatory, flood prototyping, mapping, and prompt flood prediction systems
comprising the water level estimation. With the exponential increment of data
available and computational capability, simulation techniques for uncertainty
approximation of flood prediction is presented. We present the development of
IoT Flood Simulator system that process individual nodes as well as multiple
nodes datasets of multiple-sources of roads conjunctions collected via IoT
wireless sensor networks. The system also locates the predicted flood and shows
warnings on real map of the study area. |
Keywords: |
Wireless sensor networks, Floods prediction, Dynamic streets routes, IoT
Technology, Simulation. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
A NEW HYBRID MULTI-FOCUS IMAGE-FUSION USING DMWT WITH FFT TRANSFORMS |
Author: |
ADNAN HADI MAHDI AL-HELALI , JAMAL S. ZRAQOU , WISSAM.ALKHADOUR , ABDULLA
AL-NUEMI |
Abstract: |
A new technique of image fusion combining multi-focus images is proposed. It
employs Discrete Multi-Wavelet Transform (DMWT) together with Fast Fourier
Transform (FFT). Two source images are decomposed by FFT and DMWT first, then,
treated by three different fusion rules, namely maximum selection rule, gradient
rule, and absolute maximum selection rule for merging coefficients low and
high-frequency sub-bands. This technique is experimentally implemented and
tested on the often-used grayscale images, then the obtained results are
compared with other multi-focus techniques, such as the Simple Pixels Averaging
(SPA), the Principal Component Analysis (PCA), and wavelet transform (WLT). It
was found that the proposed method has outperformed the formers in terms of
image fusion. The comparison included the various metrics, such as correlation
(CORR), MI, EN, QE, QAB/F, SD, root mean square error (RMSE), AG, and SF. Hence,
based on objective and subjective evaluations, the proposed technique is
promising for fusion multi-focus images. |
Keywords: |
DMWT, Image Processing, Image-fusion, Multi-focus, WLT, FFT. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
INTERPLAY BETWEEN COGNITIVE STYLES AND GENDER OF TWO HYBRID LEARNING TO LEARNING
ACHIEVEMENTS |
Author: |
ANTHONY ANGGRAWAN, CHE KU NURAINI, MAYADI, CHRISTOFER SATRIA |
Abstract: |
Hybrid learning is an education model that blends F2F (face-to-face) and online
lessons. Each learning model can determine individual students to succeed or
fail. The mixing combination in mixed learning affects the pedagogical results.
The problem is how the pedagogical results are due to students' cognitive
styles, gender, and the mixed level of hybrid learning. So that the questions
are: how effective is the hybrid learning with a mixture of 60% F2F and 40%
online; how the interplay results between cognitive styles and genders affect
learning achievements; and what are the distinctions in learning achievement of
this hybrid learning with a mixture of 60% F2F lesson and 40% online lesson
compared to prior hybrid learning with a blend of 40% F2F lesson and 60% online
lesson. This research objective compares the interplay results between the
cognitive styles and the gender of the two-hybrid learning. The research method
is experimental. The research discloses that: hybrid learning with a mixture of
60% F2F and 40% online is a good study result; there are differences in learning
achievement between student cognitive styles and student gender; male students
with visual cognitive style are more successful in learning achievement. Hybrid
learning combined with online teaching materials 20% greater than F2F teaching
materials shows more successful learning outcomes. This research novelty is that
students' cognitive style and gender interact and have different effects on
hybrid learning achievement. The contribution of this research is that in
learning, it is necessary to pay attention to the learning model used and the
media to support students cognitive styles in achieving better effectiveness of
learning outcomes. |
Keywords: |
Interplay, Cognitive style, Gender, Hybrid learning, Learning achievement |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
A STRATEGIC FORECASTING APPROACH TO IMPROVE FUTURE INTER-URBAN MOBILITY POLICIES |
Author: |
MOHAMED EL HADRAOUI, FOUZIA GHAITI |
Abstract: |
Infrastructure has always played a vital role in the development of economies,
and in this case, transport infrastructure. The latter constitute the support
vector for intra- and inter-region mobility. Transport and mobility are becoming
increasingly important in the sustainable management of land and are at the
heart of the current debate. The modes of transport compete for the search for
original and innovative solutions to stand out, increase their attractiveness
and their competitiveness, and thus acquire an image that evokes development,
modernity and respect for the environment. Given the various crises that the
world has experienced and continue to experience, such as the 2008 financial
crisis and the COVID-19 coronavirus pandemic, financial resources are becoming
increasingly scarce. For that reason, solutions must be sought for a rational
and judicious use of space as well as transport via a good control of mobility
within the territory. Contrary to the various works carried out before, this
paper is an attempt to create a tool to help strategic decision for national
interurban mobility through the application, and for the first time in Morocco,
of a dynamic modeling approach. It is about using a four-step modeling method,
mounted on the TransCAD software, GIS-package with specific transportation
analysis tools, supported with a certain flexibility in the configuration. Our
contribution consists in investigating whether the proposed approach could
succeed in the Moroccan context and contribute to the application of a dynamic
modeling method, which links interurban mobility, all modes of transport, to the
socio-economic parameters. That is using a Moroccan detailed, which is made up
of the travel diary in 2016, enriched with many individual and domestic
functions and data from the last General Population and Housing Census of
2014.This will give decision-makers better visibility on interurban mobility in
Morocco. |
Keywords: |
Four-Step Modeling, Inter-urban Mobility, Mode Choice Prediction, Utility
Function, Gravity Model, Multinomial Logit Model, and Linear Regression |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
POWER SYSTEM SECURITY EVALUATION USING COMPOSITE LOGIC CRITERIA |
Author: |
PADMANABHA RAJU CHINDA, RAGALEELA DALAPATI RAO |
Abstract: |
An important problem in a big integrated power system is an evaluation of the
power system security. Machine safety may be categorized based on key roles in
control centers, such as the management of the system, the review of
contingency, and the assessment of protection. Contingency analysis is the core
factor of the threat evaluation. Every contingency cannot trigger the same
degree of seriousness in real-time. The concept of severity and performance
indexes seems to satisfy this desire to exclude non-violation cases and pick
only crucial cases, known as a contingency analysis. Protection improvement
includes an optimum flow of power, which is guaranteed by preventative control
steps and correcting measures that ensure that the system operates as normal, in
the presence of contingencies. Controllable measures to minimize special
objective functions including fuel costs, mixed logical parameters, and weighted
multi-objective indexes according to operating power system constraints are
recommended in the Evolutionary Particular Swarm Optimization Method, which is
combined with Interior Point Method. This paper presents IEEE 30 & 39 Bus
Security Evaluation simulation findings. We are looking at soft computing
strategies to evaluate power system safety. |
Keywords: |
Power system security, Contingency analysis, Static security assessment,
composite logic criteria, IPM-EPSO. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
USER SATISFACTION INDEX OF E-HAILING SERVICES BASED ON CO-CREATION VALUE |
Author: |
RUZZAKIAH JENAL, HAZURA MOHAMED, SITI AISHAH HANAWI, NUR ATHIRAH NABILA MOHD
IDROS |
Abstract: |
E-hailing is a service that allows users to book a journey online and provides a
platform for users to interact with e-hailing companies. The interaction between
users as service recipients and e-hailing companies as service providers creates
a co-creation value concept. However, studies on user satisfaction with
e-hailing services have received less attention. Therefore, a study conducts to
measure the satisfaction index of e-hailing services based on the co-creation
value. The study uses the co-creation value model, the DART model, as the basis
for improving e-hailing services through user satisfaction. The DART model,
which consists of four factors, namely dialogue, access, risk assessment, and
transparency, is a determining factor in e-hailing service user satisfaction. A
survey of 251 users of e-hailing services conducts through an online
questionnaire survey, and data from the questionnaires were analyzed. The
e-hailing user satisfaction index results of 78.34% indicate that users are
satisfied with the e-hailing services provided. It hopes that this study can be
a guide for quality e-hailing services. |
Keywords: |
E-Services, Transportation Services, Service Quality, Satisfaction Index, User
Satisfaction Model, DART Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
A REVIEW OF CRYPTOGRAPHIC IMPACT IN CYBER-SECURITY ON SMART GRID: THREAT,
CHALLENGES AND COUNTERMEASURES |
Author: |
MD MEHEDI HASAN, NOOR AFIZA MOHD ARIFFIN, NOR FAZLIDA MOHD SANI |
Abstract: |
The continuous development of information communication technology assists the
traditional electricity grid to become a modern integrated platform. As
Internet-of-Thing’s technologies involve in smart grid features together with
delivery emerging services utility side to end user via unreliable channel. Due
to high dependency of communication system lead catastrophic security
vulnerabilities. In addition, loss data security or privacy along hampered core
security objectives confidentiality, integrity, availability and broken
connection between them. Therefore, significant number of researches worked
mitigates those types of threads by the use of cryptographic aspect. It is
fascinated to kept data secure and ensures the privacy between two parties
during transmission or any kind of data share in distribute manner. In this
paper, we present comprehensive survey on cryptographic impact in smart grid for
security objectives, requirement, and challenges. Particularly, produces
security threats, examined current research work countermeasure technique. We
aim to supply deeper understanding about role of cryptographic aspect in smart
grid to shed light and guide future research direction for cyber-security
protection against from malicious attacker in smart grid application. |
Keywords: |
Smart Grid, IoT, Cyber-Security, Threats, Authentication, Cryptography |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
METHODOLOGY ASSESSMENT FRAMEWORK (MAF) |
Author: |
EBRU DALBUDAK , KARIM EL GUEMHIOUI , AHMED LAKHSSASSI , REJEAN GRAVEL |
Abstract: |
Selecting the appropriate SDM for a project is one of the most important steps
to ensure the project success [1, 2]. There are so many SDMs in the market but
how do we choose the right one? How do we determine and measure the concept of
“fit” between the chosen SDM and the project? This research introduces a new
framework called Methodology Assessment Framework (MAF) which helps decision
makers assess a given project against the seven factors and determine the type
of SDM that would be best suited whether it be an agile, plan-driven methodology
or a hybrid of the two. This tool is based on seven decision factors, which are
outcomes, scope, CYNEFIN (complexity), constituents, agile principles, team
knowledge & experience, and organization capability & maturity. The paper
explains each of the seven factors that MAF uses along with their assessment
metrics to appraise a given project and based on the evaluation results,
suggests whether the project should be run using an agile or plan-driven
methodology. Next, it presents a cases study which demonstrates the application
of this new framework into an Electronic Design Automation (EDA) tool
development project, it identifies the agile/iterative methodology as the most
suited SDM for the project. |
Keywords: |
Systems Development Methodology, SDM, Methodology, Agile, Framework |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
Title: |
IDENTIFICATION OF THE FISH SURVIVAL RATE AND THE FISH TYPES TO LIVE IN LAKE TOBA
USING MACHINE LEARNING |
Author: |
ROMI FADILLAH RAHMAT, SARAH PURNAMAWATI, TIFANI ZATA LINI, RIDHO FARIHA, NABILA
DEANNA, INDRA AULIA, SHARFINA FAZA |
Abstract: |
Waste disposal in Lake Toba conducted by the local citizens has led to water
pollution and the decreasing number of freshwater fish. Therefore, the
identification of water content is mandatory to ensure the survival and
cultivation of the fish in Lake Toba. We conducted two studies using the same
data using machine learning methods of Long Short-Term Memory and Support Vector
Machine. These studies proved that both methods were reliable in the
identification process. The results of this research showed that the water
contents in Lake Toba are still good enough for the freshwater fish to live and
the types of fish that have to highest chance to survive in Lake Toba. |
Keywords: |
Identification, Freshwater Fish, Machine Learning, LSTM, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2021 -- Vol. 99. No. 10 -- 2021 |
Full
Text |
|
|
|