|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
February 2021 | Vol. 99
No.04 |
Title: |
QUALITY EVALUATION MEASURES OF GENETIC ALGORITHM AND INTEGER LINEAR PROGRAMMING
FOR MINIMUM DOMINATING SET PROBLEM |
Author: |
ADEL A. ALOFAIRI, RASHAD ISMAIL, EMAD MABROUK, FISAL SAEED, IBRAHIM E. ELSEMMAN |
Abstract: |
In network science, controlling the elements of complex networks with a few
numbers of nodes has recently become a significant subject of research and a
major challenge. Nowadays, the minimum dominating set (MDS) represents an
important modern network topic in this context. During the last decade, many
methods have been developed to solve the MDS problem and generate different
solutions for the same graph. In this paper, we evaluated the performance of two
approaches to solve the minimum dominating set problem: the first one is based
on the genetic algorithm, called a hybrid of a genetic algorithm (HGA-MDS), and
the second approach is based on the integer linear programming (ILP-MDS). We
proposed three measures to evaluate the quality of the obtained solution, which
are the domination number, the nodes degree, and the betweenness centrality. We
utilized a number of publically available benchmark test and real-world graph
data sets. The experimental results have shown that the ILP-MDS outperforms
HGA-MDS in calculating the domination number, the optimal solution, and in
handling the big data graphs. The results also showed the close performance of
two methods in calculating the average of both nodes degree and betweenness
centrality for the obtained best dominating set. |
Keywords: |
Minimum dominating set; Domination number; Genetic algorithm; Integer linear
programming; Betweenness centrality; Nodes degree. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
AUTOMATA THEORY: A GAMIFICATION APPROACH |
Author: |
SEUN EBIESUWA, TAYO OMOLARA, ADEKUNLE A. YINKA, OHWO ONOME BLAISE, ADESINA ADIO |
Abstract: |
Automata Theory, a theoretical branch of computer science, helps “to understand
how machines compute functions and solve problems. An automaton is any machine
that uses a specific, repeatable process to convert information into different
forms. Gamification is an example of an automaton. The goal of gamification is
the implementation of game mechanics in real-world contexts for non-gaming
purposes, to foster human motivation and performance in regard to a given
activity. This can be used for the automation” of mundane tasks. Customization
and tailoring of interests, “content curation, life management, using all of
these options, information can be gathered quickly and delivered effectively to”
users. Based on this, a theoretical understanding of automata theory in
gamification application was presented. The game mechanics configuration, when
deliberately varied, in regards to the effect of fulfilling their basic
functionalities can potentially improve user engagement, productivity, flow,
learning, crowdsourcing, recruitment and evaluation, exercise, traffic
violation, and so on. |
Keywords: |
Gamification, Game Mechanics, Automata Theory, Automaton, Automation, Social
Networking |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
ALGORITHM TO FIND TOURISM PLACE SHORTEST ROUTE: A SYSTEMATIC LITERATURE REVIEW |
Author: |
EVARISTUS DIDIK MADYATMADJA, HENDRO NINDITO, R. A. BHASKORO, ALBERT VERASIUS
DIAN SANO, CORINTHIAS P. M. SIANIPAR |
Abstract: |
Algorithm is very useful to find shortest route. Peoples need a map to find
route from current location to destination location. For finding the shortest
route, it needs a GPS for digital maps. Algorithm is very important for finding
tourism place shortest route because peoples can know about the shortest route
from their current location to tourism place location. Many people want to know
about the shortest route to go to their tourism place destination. With this
algorithm it can ease people to find tourism place, increase the number of
tourism visits and gain profit for tourism place and accommodation business.
There are some factors that influence for choose the best algorithm for find
shortest route are cost, time, distance, values, nodes, parameters, vertex, and
edges. It must find the best algorithm to find shortest route when we build an
application about tourism place so that the shortest route can be found by maps
accurately. Algorithm to find shortest route must have accuracy and tremendous
usefulness. The aims of this paper are reviews algorithms that used to find
shortest route, algorithm process runs, the used of algorithm, a factor that
influence used algorithm to find shortest route especially tourism place. This
paper will give benefits to ministry of tourism to understanding about algorithm
to find tourism place shortest route and they could build an apps that can ease
peoples for find shortest route to their tourism place. The content of this
paper are algorithms definition, algorithm usability and algorithms run process. |
Keywords: |
Algorithm, Shortest Path, Shortest Route, Systematic Literature Review |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
ON-CHIP LASER PROBE FABRICATION FOR TRACE AND CROSS TRIGGERED SCANNING (T&CTS)
IN OPTICAL MICROSCOPY |
Author: |
N. Z. AZEEMI, NAJAM-US-SAQUIB, IFTIKHAR AHMED |
Abstract: |
Unlike Chemical Force Microscopy (CFM), non-invasive instrumentation provides
nondestructive, reliable and precise control in industrial process regulation,
where a chemical compound or material surface are always a point-of-care.
Nanomaterial dynamics intrinsically exhibit higher order of visual scanning
complexities, associate wholly or partially to the poor scanning
instrumentations. Additionally, growing trends in analytical instrumentation
towards smart Lab-On-a-Chip (IoT sensing nodes) has shifted the emphasis on
sensitivity as well as robustness tailoring Product Specific Environment (PSE).
This work presents a hybrid laser actuated scanning mechanism, rastered back and
forth 3-D imaging technique enabling Microscopy to its widest application in
biological and material sciences and hence rose challenge of predicting large
missing or incorrect data obtained during experiments. Our Confocal Self
Calibrated Interferometry based fabricated Laser Sensor demonstrate its efficacy
in non-invasive scanning microscopy to achieve high resolution 3D topographical
view, eventually an add-on to analytical model of micro-organisms and
nanomaterial. The laser leakage at tip is controlled by PI controllers based on
two channel tube adjustments and successively in laser reflector lens, Photo
Multiplier Tube (PMT), and Data Acquisition Unit (DAU). We exploit the dead time
transfer function characteristics to simplify our model which is an inherent
feature of Scanning Luminance Microscopes (SLM) and Scanning Electron
Microscopes (SEM). We expose our results for error propagation across various
grid patterns over a 1mm2 section, plotting the intensity of a key band or bands
over the grid. We observe that the spatio-temporal measurements can be preserved
modelling the ergodicity of information flow along the SLM instrumentation. |
Keywords: |
Data Acquisition Unit, Scanning Luminance Microscopes, Ergodicty, Smart
Instrumentation, Laser Sensor |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
MOBILE DATA COLLECTION TECHNOLOGY AS IMPETUS FOR THE USE OF QUALITY OF CARE
(QOC) ASSESSMENT IN NON-FOR-PROFIT FACILITIES |
Author: |
PAULIN TRA , HABIB KHAN TAREEN |
Abstract: |
The increasingly popularization of mobile Technology has contributed in bringing
important innovations in businesses regardless the sector. It is in such context
that considerable number of professionals recommended to public health
organisations operating mainly in low-and-middle-income countries to enhance
their Health Information System by integrating Open Data Kit (ODK), a free
android open source application with a set of tools. With the knowledge that
Quality of Care (QoC) does not operate efficiently in low-and-middle-income
countries, this paper discussed how a mobile-based application developed by
using XForm and designed on ODK system affected positively the perception of
health workers toward QoC assessment. More specifically, the mobile-based QoC
assessment tool was significantly found better than the paperwork tool because
of its ability to: (1) automatically handle average calculation and scoring; (2)
reduce paperwork and ease the availability of the QoC assessment tool anywhere
including remote sites; (3) increase data accuracy and availability to support
immediate feedback and decisions making; (4) allow very low cost implementation
of the QoC assessment initiative. Building then on these findings, the developed
IT artefact optimistically has promoted an innovative approach that was able to
focus on decentralizing and taking QoC practices up to service delivery points
existing at the lowest level including remote sites. |
Keywords: |
Health Information Systems, Quality of Care (QoC), Open Data Kit (ODK), DHIS2,
XForm, Developing countries, Net Promoter Score (NPS) |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
PERMUTATION FLOW SHOP SCHEDULING PROBLEM WITH MAKESPAN CRITERION: LITERATURE
REVIEW |
Author: |
ABDEL NASSER H. ZAIED, MAHMOUD M. ISMAIL, SHIMAA S. MOHAMED |
Abstract: |
With the evolution of the industry, the production process becomes a large-scale
problem that made scheduling jobs process as a combinatorial optimization
problem. The most important and most common scheduling problem was the flow-shop
scheduling problem and was considered an NP-hard problem. There are different
variants of flow-shop scheduling problems such as permutation, non-permutation,
no-idle, no-wait, and hybrid flow shop scheduling problems. Permutation
Flow-shop Scheduling problem (PFSP) is the most important variant of flow-shop
problem, where its objective was to find the optimal or near to optimal sequence
of n jobs on m machines with some criterion under some conditions. In this
paper, it will be reviewed the PFSP with makespan criteria (completion time) and
its mathematical model. Also, most of methods that used for solving PFSP will be
reviewed and discussed in this paper, where each algorithm has different
methodology for solving PFSP. There are three categories used for solving PFSP
as traditional algorithms, heuristic algorithms, and meta-heuristic algorithms.
This study concentrated on meta-heuristic algorithms in solving PFSP, due to its
efficiency in solving many applications. From this study, it has been proved
that meta-heuristic algorithms are playing a vital role in solving permutation
flow-shop scheduling problem and it has attracted the attention of researchers
in the past few years. |
Keywords: |
Flow-shop scheduling, Permutation Flow-shop Problem, Makespan, Meta-heuristic
Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
THE INFLUENCE OF COMPUTER TECHNOLOGY ON THE DEVELOPMENT OF INTERACTIVE TEACHING
METHODS FOR STUDENTS |
Author: |
VOLODYMYR SADIVNYCHYI, IRYNA ZHYLENKO, OLENA BONDARENKO, VLADYSLAV
NIZHEHORODTSEV, NATALIIA PROKOPENKO, INNA KUCHERENKO |
Abstract: |
The article examines the influence of modern computer technologies on the
development of interactive methods of teaching students in the higher education
system. The main tasks that interactive methods solve in teaching students are
considered and as one of the solution tools - the introduction of modern
computer technologies into the educational environment. The main opportunities
that computer technologies provide to the educational process are analysed. A
form of collective design using cloud technologies was developed and tested,
namely, from a large number of them, after analysis, a choice was made in favour
of Google Drive. The authors analysed the results after a survey of students
participating in the experiment and made conclusions about the advisability of
introducing computer technologies into the educational process, which have a
powerful stimulating effect on the development of interactive methods of
teaching students. |
Keywords: |
computer technology, Google Drive, interactive teaching methods, Internet,
student |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
NEW GENERATION OF SOCIAL MEDIA MARKETING: CASE STUDY FEMALEDAILYNETWORK YOUTUBE
CHANNEL |
Author: |
JESSICA APRILLIA, ULANI YUNUS |
Abstract: |
As an information management system, YouTube transforms marketing into
structured content that serves as an archive and database to build social media
marketing consistently for brands. In order to increase the greatest traffic
through audience engagement, YouTube channels are used as a place to promote
itself as a brand. There is even a tendency to present employees on YouTube as a
business strategy. In the goal of building a brand through a YouTube channel,
video content will certainly show an identity both as an independent video
talent and as an organization. As the external face of the company, the company
employees are seen by consumers and define the “who” a corporation is by showing
personality traits that have been defined by the company, which are known as
corporate brand personality. This qualitative study aimed to determine the
marketing of beauty products constructed in beauty YouTube channel, to know the
corporate brand personality constructed in beauty YouTube channel, and to find
out the corporate brand personality constructed in the marketing of beauty
products on the YouTube channel. The results show that the videos are displayed
according to the personality of YouTubers and how they represent themselves
through their video contents. On the other hand, corporate brand personality
strengthens the personal branding of individuals in the company. Personality
created by employees needs to be implemented from inside to outside the
organization. Meanwhile, the construction of corporate brand personality in
marketing beauty products on the YouTube channel can be seen in how video
talents communicate verbally as a self-presentation of a part of the company,
but also capable of nonverbal self-impression management. Although the
implementation of the corporate brand personality dimension on YouTube channels
is not free from risks, this step is worth to be taken. |
Keywords: |
Beauty Marketing, Corporate Branding, Corporate Brand Personality, Social Media
Marketing, YouTube |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
APPLICATION OF BAYESIAN NETWORKS IN THE DECISION SUPPORT SYSTEM DURING THE
ANALYSIS OF CYBER THREATS |
Author: |
AKHMETOV B.S., LAKHNO V.A. , YDYRYSHBAYEVA M.B., YAGALIYEVA B.E., BAIGANOVA
A.V., AKHANOVA M.B., TASHIMOVA A.K. |
Abstract: |
The article based on the analysis of methods for constructing models of the
attacker and cybernetic threats for information objects (OBI), the effectiveness
of using the Bayesian network device in intelligent decision support systems for
situations with poorly structured data on the types of threats to the OBI.
Implemented a Bayesian network (BN) for the computational core of the DSS. The
network is designed to predict the development of cyber threats to the OBI and
it’s information and communication system (ICS). An example of the BN "Data
Modification in an information system" is considered. The Bayesian network
allows to operate on a set of random variables and determine the probability of
a cybernetic threat to the ICS under given conditions. To improve the efficiency
of attack prediction, the network parameters were trained with the EM algorithm
(Expectation-maximization algorithm) based on the available statistical data.
Alternative networks are also created based on network structure estimation with
three different algorithms. The effectiveness of the developed models was
checked using test samples that were not previously used in the BN training
process. The results obtained indicate the feasibility of using EM and PC
(Peter-Clark – PC algorithm) algorithms to obtain a high-quality result of
recognizing cybernetic threats for the ICS of informatization objects. |
Keywords: |
Decision Support System, Modeling And Forecasting, Cyber Threat, Bayesian
Networks |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
IMPACT OF COVID-19 PANDEMIC ON THE GLOBAL ECONOMY AND FUTURE PROSPECTS: A
SYSTEMATIC REVIEW OF GLOBAL REPORTS |
Author: |
ASKAR GARAD, GUNAWAN BUDIYANTO, ABDULLAH M. AL ANSI |
Abstract: |
Propose: This study aims to investigate the economic practices and fluctuations
due to the outbreak of the Covid-19 Pandemic in 2020 and future impacts in
international economies. Method: This study is based on the variable "Low
Probability - High Impact" that is studied by methods commonly used in future
studies, namely: heuristic approach, deterministic approach, probabilistic
approach. In addition, systematic and deductive reasoning method by analyzing
the reports received by some countries, institutions, international
organizations and research centers interested in this regard. Results: Reports
showed that the economic crisis caused by the Covid-19 pandemic have major
impacts on the global economy and significant changes will occur in the long
run. Where the epidemic differs economically because it continues to hit hard
the major economic countries and the countries most affected include the G7, in
addition to China. These countries represent 60% of global supply and demand
(GDP), 65% of global manufacturing, and 41% of global industrial exports. Future
implications: The COVID-19 will continue to spread even after the emergence of
treatment, because the treatment goes through many stages, including discovery
and testing, production and distribution, and this means that the virus will
keep pace with the global economy until 2021 and perhaps more. The world will
try to move to repair the economic damage caused by the COVID-19. Economic
reforms must be based on the current structures of globalization in order to
succeed. Developing countries must pay attention to the need to build regional
blocks based on sound foundations because they will be a protective shield for
them in the long term for the effects of all variables based on (low probability
- high impact). There will be a major change in international relations, and
this will appear in new organizational forms, services and economic, the social
role will be the solid force of these alliances. Originality/Value: This paper
helps the world prepare to accompany the COVID-19 virus with a minimum for the
next year 2021. Its effects will remain for many years, especially in developing
countries that the Vaccine will be delayed receive. Therefore, strict health and
economic precautions must be taken to mitigate the effects of the virus on its
citizens and economy. |
Keywords: |
Covid-19 Pandemic, Economic Practices, Economic fluctuations, Global Economy,
Future Economy, Impact Covid-19. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
EPILEPTIC SEIZURE DETECTION USING MULTIDISTANCE SIGNAL LEVEL DIFFERENCE FRACTAL
DIMENSION AND SUPPORT VECTOR MACHINE |
Author: |
DESRI KRISTINA SILALAHI, ACHMAD RIZAL, DIEN RAHMAWATI, BANDIYAH SRI APRILLIA |
Abstract: |
Electroencephalogram (EEG) signal is a biological signal produced from an
electrical activity from the brain. Abnormalities that occur in the pattern or
content of the EEG signal indicate a brain disorder or disease. One of the
disorders or diseases associated with brain function is epilepsy. Various
methods were developed by researchers to analyze abnormalities of EEG signals
using digital signal techniques. Many algorithms have been applied to achieve
high performance for the classification of EEG epilepsy. However, the complexity
and randomness of EEG signals is a challenge for researchers to apply the
appropriate algorithm. In this research, fractal analysis of EEG signals is
expected to be able to distinguish EEG signals in seizure, no seizure, and
normal conditions. The multiscale method used is a multi-distance signal level
difference (MSLD) and combined with the fractal dimension. Furthermore,
classification is done using Quadratic SVM through 5-fold cross-validation which
produces an accuracy of 99% on a scale of 1-10. |
Keywords: |
Classification, Epileptic Seizure, Fractal Dimension, Multi-Distance Signal
Level Difference, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
OPTIMIZING OF ITEM SELECTION IN COMPUTERIZED ADAPTIVE TESTING BASED ON
EFFICIENCY BALANCED INFORMATION |
Author: |
JANU ARLINWIBOWO, HERI RETNAWATI, SAMSUL HADI, BADRUN KARTOWAGIRAN, GULZHAINA K.
KASSYMOVA |
Abstract: |
Efficiency Balanced Information is an item selection method developed by Han
(2009) with the aim of this research is to solve problems of other methods that
have previously been widely applied in CAT. This study aims to explore the
effectiveness of using Efficiency Balanced Information for item selection. This
research will identify criteria that affect this method so that it is optimal
when used in the CAT to predict student abilities. This research is simulation
research with two simulation software, WinGen, and SimulCAT. Simulations are
conducted by involving several variables, namely the ability estimation method
(MLE, MAP, and EAP), item parameter estimation method (1PL, 2PL, and 3PL),
Efficiency Balanced Information as an item selection method, and stopping rule
based on SE which is 0.3. The simulation involves 150 items that characters have
been defined in WinGen and the researcher run in SumulCAT 30 replications. Based
on the results of the study it can be concluded (1) The most powerful item
estimation method is 2PL, (2) the ability to estimate capabilities with EAP and
MAP is relatively the same and the MLE indicates the ability interval that can
be estimated narrower, (3) efficiency of administered items with EAP and MAP is
relatively the same while MLE needs more items. |
Keywords: |
Efficiency Balanced Information, Item selection, CAT, Effectiveness, Ability
Estimation |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
SELECTIVE IMAGE COMPRESSION-ENCRYPTION ALGORITHM USING ADAPTIVE HUFFMAN CODING
AND AES |
Author: |
RUSHDI HAMAMREH, EMAD TABIB |
Abstract: |
The interest in data transmission is increasing in all types of multimedia such
as digital images, text, audio, and video. Digital images have special
characteristics such as data redundancy and strong correlation between adjacent
pixels, that make it difficult for traditional ciphers like IDEA, AES, DES, RSA
to deal with real-time digital image encryption as these ciphers require high
computational power, to overcome all these issues in digital images
transmission, and keep the model secure, we have proposed a selective image
encryption algorithm that combines Adaptive Huffman coding (AHC) and Advanced
Encryption Algorithm (AES) and proposed a selective bits model. As we know the
digital image is represented by a 2D matrix, and each pixel in the matrix
represented by 8 bits (1-Byte). To begin with, the plain-image matrix is divided
into N X N blocks; where N is a multiple of 4. Then we selected the leftmost
bits of the binary representation of the block pixels, then the selected bits
from each byte are re-converted to decimal, the values of the generated block
will be in the range of [0:1], [0:3], [0:7] for 1, 2, 3 bits selections
respectively. Then the resulted blocks are compressed by AHC, then encrypted by
AES algorithm. Also, we calculated the mean value of each block from the
non-selected bits above. Both the encrypted selected bits matrix and the
encrypted mean vector will be transmitted. The experimental result shows that
the proposed algorithm provides a competitive compression ratio, high image
quality (SSIM), high PSNR, in addition to the high-security; we measured the
pixel sensitivity of images (NPCR and UACI) and got values close to the optimal
values. |
Keywords: |
Image compression, lossy image compression, Selective Image Compression and
Encryption, Adaptive Huffman coding, Advanced Encryption Algorithm, |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
DEVELOPMENT OF AN AUTOMATION PROGRAM AND PID CONTROLLER COEFFICIENTS TESTING FOR
OPTIMAL CONTROLLING THE AIR HEATING/COOLING PROCESS IN MOBILE COMPLEXES |
Author: |
IGOR OLEGOVICH KOSSYAKOV, АNEL BARLYBEKOVNA SHINYKULOVA, ANDREY ALEKSANDROVICH
IVANOV, OMAROVA GULMIRA AMANGELDIEVNA, OMAROVA BOTAGOZ AMANGELDIEVNA,
ZHUSUPBEKOV SARSENBEK SEITBEKOVICH, BATYRKANOV ZHENISH ISAKUNOVICH |
Abstract: |
The article discusses the problems and features of the air conditioning systems
implementation for mobile complexes in Kazakhstan. The method of conducting an
experimental study for selecting the optimal coefficients of the PID controller
are presented. The selection of equipment for the experiment is carried out,
taking into account the features of the air conditioning systems use in the
sharply continental climate of Kazakhstan. The algorithm of automation operation
is also given, according to which a program will be created to control the
process of heating/cooling air in the mobile complex. The connection diagram of
the devices that will be used during the experiment is described. The general
principle of PID controller’s operation is considered. At the next stage, the
coefficients of the PID controller found by the methods of the amplitude
optimum, Ziegler-Nichols and Stogestad are calculated and taken from the
sources. According to the developed algorithm, in the OwenLogic application
created a program. At the final stage of the experiment, the coefficients found
by different methods are set in the PID controller and the output power
characteristics are removed. Later, they are compared. On the theoretical
knowledge basis, the best characteristic is selected, which will be optimal for
use in the air heating/cooling processes in the mobile complexes on the
Kazakhstan state. |
Keywords: |
Mobile Complexes, Automation Of Air Conditioning Systems, PID Controller, PID
Controller Coefficients, Automation Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
SURVEY ON KANSEI ENGINEERING METHODOLOGY IN E-COMMERCE DESIGN: PRINCIPLES,
METHODS AND APPLICATIONS |
Author: |
LIZAWATI ROSCLARITHA MAIDOM, ASLINA BAHARUM, DINNA N. MOHD NIZAM, FARHANA DIANA
DERIS, NOORSIDI AIZUDDIN MAT NOOR |
Abstract: |
Current trends in product production indicate that customer associations are
needed in terms of product design technology to determine their success in the
market. Various E-Commerce websites are now widely available to the public, and
the number continues to grow over time. Capturing users’ needs is the
fundamentals of a successful website design. However, website designers have
focused more on the development of function and usability, and less focus is
given to fulfill and address user-driven demands. The implicit needs in user
experience are difficult to quantify. Kansei Engineering is a technology that
can assimilate Kansei-based humans for the designation of product variables.
This paper examines the principles, methods, and applications to understand the
needs of users in E-Commerce and specifically explains the Kansei Engineering
framework. This framework offers an understanding of the implementation of
Kansei Engineering in finding implicit user needs and analyzing its relationship
to E-Commerce design specifications. The proper use of Kansei Engineering
implementation will benefit researchers and designers from the outline of the
design to produce E-Commerce websites. It shall be useful to be used as guidance
and improvements reference. This paper surveyed the Kansei Engineering
methodology principle and then explores their prior application as part of the
product design creative process with the perspective on the E-Commerce websites
on the significance of the study in emotional appeal in website design. This
paper will outline the Kansei Engineering methodology approach from various
angles applied to E-Commerce contributing to conversion and retention.
Suggestions and advice on the most suitable approaches that can be implemented
to improve the E-Commerce quality are provided at the end of this survey. |
Keywords: |
Approach, Emotions, Cognitive, Usability, User Experience, Satisfaction |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
FACTORS INFLUENCING HUMAN CENTRIC MODEL FOR BETTER PASSENGER EXPERIENCES USING
SMART SECURITY SYSTEM IN DUBAI AIRPORT |
Author: |
GHALIB ABDULLAH ALMARRI, MASSILA KAMALRUDIN, HALIMATON HAKIMI, SAFIAH SIDEK |
Abstract: |
Due to the increase number of passengers, security infrastructure is crucial and
caused security process and services involved in every phases of passenger’s
travel life cycle and leads to long waiting lines at screening point. This has
led to unpleasant experience on the passenger at the airport. Thus, it is
necessary to design a security infrastructure that incorporates human
perspectives and needs. To do this, this study presents the analysis of factors
that influence the passenger experience in using smart security system at
airport through Human-Centric designed model. This paper reports a study that
investigates the relationship of seven human factors to passenger experience
using the smart security system at Dubai International Airport. A survey
involving 400 respondents at the airport was conducted. Stratified sampling was
used to determine the sample and the questionnaire was distributed via online
and face-to-face. Multiple regression analysis using SPSS was adopted to test
the seven hypothesis and validate the human-centric model. It was found that six
human factors, namely emotional/feeling, behavior, needs and requirements,
usability, trust and ergonomic were accepted, while one human factor, namely
cognitive was rejected. The results serve as a validation to propose a new
human-centric design model of smart security system at airport. Considering the
importance of security at the airport, it is expected that this model could be
used as guidance to design a smart airport security system that specifically
addresses human needs and behaviors. |
Keywords: |
Passenger Experience, Factors, Human Centric Model, Smart Security System,
Airport |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
FACIAL EMOTION RECOGNITION BASED ON DEEP LEARNING TECHNIQUE |
Author: |
ELFATIH ELMUBARAK MUSTAFA , GAFAR ZEN ALABDEEN SALH |
Abstract: |
We have created a Deep Learning network to identify the emotion of a person. It
is based on seven facial expressions. (angry, disgust, sadness, happy, nature,
fear, and surprise). We used extended Cohn–Kanade (CK+) database basis of
(10-fold cross-validation) to identify 6 facial expressions. The Deep Learning
Network scored a recognition average of 88.9%. As you can see in the confusion
matrix, the expressions happy and surprised achieved the best recognition rates
98.92 and 97.23 successively. We also used, in another experiment, the JAFFE
database basis of (LOOCV) and it scored a recognition average of 88%. As you can
see in the confusion matrix that the expressions of fear and surprise achieved
the best recognition rates 93.33 and 93.33, respectively. We compared the
performance of the proposed system to similar studies that followed the same
databases with the same sample and the same style. The system we used outscored
other systems in the other studies. We also compared in detail the percentage of
identification performance for each expression in isolation using the extended
Cohn–Kanade (CK+) database. We compared our study to other studies and we found
that our system did better. |
Keywords: |
Deep Learning ,Facial Emotion Recognition ,Leave-One-Out Cross-Validation
(LOOCV), 10-Fold Cross-Validation ,recognition rates , confusion matrix |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
Title: |
HYBRIDIZATION GRADIENT DESCENT SEARCH WITH ARTIFICIAL BEES COLONY ALGORITHM IN
GENERAL GLOBAL OPTIMIZATION PROBLEMS |
Author: |
GOH KHANG WEN, YOSZA BIN DASRIL, NAZARUDIN BUJANG, MAHATHIR MOHAMAD, MOH DANIL
HENDRY GAMAL, LONG CHIAU SOON |
Abstract: |
General gradient-based optimization techniques such as the steepest descent
method, Newton's method, and quasi-Newton method, often fail in globally solving
non-convex optimization problems (multi-modal functions). The main reason is
that once a local solution has been determined, these methods do not know how to
pass a hill to obtain another better local solution. Therefore, a new gradient
type method so-called ABCED Steepest Descent Method has been introduced in this
paper which does not have the weakness been mentioned above. The ABCED SD method
is a hybrid from a modified steepest descent method and the Artificial Bee
Colony (ABC) algorithm. ABCED SD method developed through the ABC framework by
replacing the exploitation search phase with modified steepest descent method,
therefore the global optimum solution is obtained by the modified steepest
descent algorithm. Reported numerical results shown that ABCED SD method able to
locate the global optimum solution for the benchmarked general global
optimization problems and the comparison results with the original Artificial
Bee Colony algorithm also shown that ABCED SD method able to obtain the global
optimum solution with less iterations. Besides that, ABCED SD method also does
not require any initial point and it will not only determine the local minimizer
as in the classical steepest descent method, but it manage to determine the
global minimizer of the general global optimization problems. |
Keywords: |
Multi-Modal Function, Non-Convex Optimization, Steepest Descent Method,
Artificial Bee Colony Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2021 -- Vol. 99. No. 04 -- 2021 |
Full
Text |
|
|
|