|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
April 2021 | Vol. 99
No.07 |
Title: |
PRELIMINARY INSIGHTS INTO CYBERSLACKING IMPACT ON GRADUATE STUDENTS ACADEMIC
PERFORMANCE: A CASE STUDY OF A BUSINESS SCHOOL IN GHANA |
Author: |
ACHEAMPONG OWUSU, EDITH MAWULI AFI BLEBOO, IVY HAWAH TAANA |
Abstract: |
The main objective of the study was to examine the impact of cyberslacking on
graduate students’ academic performance at a Business School in Ghana. The study
was descriptive and was purely quantitative. The target population of this study
comprised all graduate students at the School. Out of the entire population,
three hundred (300) students were sampled for the study through convenience
sampling. Questionnaires were used as the data collection tool. Findings from
the analysis indicate that Cyberslacking correlates with students’ academic
performance. Students who are addicted to cyberslacking have difficulties in
paying attention in class in comparison to those who do not cyberslack. The
study, therefore, concludes that though cyberslacking has a negative effect on
the attention of graduate students in the lecture room, it could not find a
significant relationship between cyberslacking and academic performance. It is
however recommended that instructors should integrate technology procedures in
their curricula, explain their motivations, and enforce them. Also, the
management of universities should ensure graduate students are mindful of their
multitasking limits and cyberslacking’s negative effect on learning. Although
cyberslacking negatively influences attention and even student learning, several
college students underrate this concern because they overrate their capacity to
multitask. |
Keywords: |
Cyberslacking, Graduate Students, Academic Performance, Business School, Ghana |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
HILL-CLIMBING POWERED GATED RECURRENT UNIT NETWORK TO PREDICT STOCK TRADING
SIGNALS USING MEAN AVERAGE CONVERGENCE DIVERGENCE INDICATOR |
Author: |
ARJUN SINGH SAUD, SUBARNA SHAKYA, ASHISH GHOSH |
Abstract: |
This paper proposed a hill-climbing powered gated recurrent unit (HC-GRU)
network to predict stock trading signals using the mean average convergence
divergence (MACD) indicator. The proposed model was compared with the Buy/Hold
Strategy, a benchmark strategy, and the traditional MACD indicator based trading
strategy. All three models were evaluated in terms of the annualized rate of
return, sharp ratio, and the number of profit/loss trades executed by the
strategies. The experiments were conducted on twenty randomly selected stocks
from the Bombay Stock Exchange, Nepal Stock Exchange, New York Stock Exchange,
and the Shanghai Stock Exchange. From the experimental results, we observed that
the HC-GRU outperformed the other two models in terms of all three measures. ARR
obtained from HC-GRU strategy was 22.44% to 62.76% higher than the ARR obtained
from the traditional MACD indicator based trading strategy and it was 14.69% to
71.72% higher than the Buy/Hold strategy. On the other side, 66.67% to 100%
trades made by the HC-GRU strategy were profit trades but only 27.78% to 62.5%
trades executed by the traditional MACD indicator based trading strategy were
profit trades. From this observation, we concluded that the proposed HC-GRU
approach is a superior strategy for automated stock trading whereas the
traditional MACD indicator based strategy is not suitable for automated stock
trading. |
Keywords: |
Stock Trading, Trading Signals, Gated Recurrent Unit, Hill Climbing, Mean
Average Convergence Divergence |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
NEW FAST MODULAR MULTIPLICATION ALGORITHM APPLIED TO RING-LWE SCHEME |
Author: |
FIRST AUTHOR El HASSANE LAAJI, , ABDELMALEK AZIZI, TAOUFIK SERRAJ |
Abstract: |
The post-quantum cryptosystem schemes based on Ring-LWE (Ring Learning With
Error) problem are among important candidates submitted to the NIST post-quantum
cryptosystem standardization project. The majority of them use one or more
algorithms for speeding-up the polynomials multiplication in the cryptographic
process, like the Number Theoretic Transform algorithm (NTT), the Montgomery
algorithm, the Karasuba algorithm, etc. We contribute herein, by creating a new
Fast Modular Multiplication algorithm (FMMA), which is a variant of the
Montgomery algorithm, and we created an improved post-quantum key exchange
release based on Ring-LWE problem called "RingLWE_FMMA", by using our FMMA
algorithm combined with the NTT algorithm. Our algorithm is tailored specially
for the Fermat prime numbers and all the numbers of the form q = 2^k + 1. In
this work, we considered the post-quantum key exchange "NewHope" based on
Ring-LWE problem, as a study case, which uses the NTT algorithm combined with
the Montgomery algorithm. . After a benchmarking, we obtained a good result; our
RingLWE_FMMA release is faster than NewHope by a rate of up to 35%, and our FMMA
is faster than the Montgomery algorithm by a factor of up to (X2) two times. |
Keywords: |
Quantum cryptography, Modular Multiplication, Montgomery, Ring-LWE, NTT, KEM. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
A MODIFIED OF TAM AND TTF INTEGRATION TO ANALYZE THE EFFECT OF ERP
IMPLEMENTATION ON EMPLOYEE PERFORMANCE |
Author: |
R. WAHJOE WITJAKSONO, AGUS SIHABUDDIN, AZHARI AZHARI |
Abstract: |
Enterprise Resource Planning (ERP) solutions have been implemented in most
companies globally, including in Indonesia, because this system has a
significant impact on the efficiency, effectiveness of business processes, and
improved employee performance. State-owned enterprises in Indonesia have also
implemented ERP to enhance employee performance. This study aims to prove that
the ERP system can improve employee performance by identifying and testing the
most critical factors that influence ERP implementation on employee performance
in state-owned enterprises in the manufacturing sector in Indonesia. This study
uses a modified model that integrates the Technology Acceptance Model (TAM) and
the Task Technology Fit (TTF) model adapted to ERP implementation problems. The
integration of the two models is carried out because the two models cover two
different aspects; TAM focuses more on the technology used rather than the
technology's ability to support users in carrying out tasks focused on the TTF
model. The model was tested using data collected by distributing questionnaires
to ERP users in State-Owned Enterprises. Hypotheses were tested and analyzed
using the Partial Least Square(PLS) with the help of SmartPLS 3.0 software. This
research's contribution is that the integration model can combine the strengths
of the TAM and TTF models to see the performance of employees of State-Owned
Enterprises in Indonesia. The results showed that 8 (eight) hypotheses were
accepted, and 1 (one) hypothesis was rejected. Finally, these findings can help
encourage ERP implementation in other companies in the future because the
results of implementing ERP are proven to improve employee performance. |
Keywords: |
Technology Acceptance Model, Task Technology Fit, Implementation, Enterprise
Resource Planning, PLS |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
WEIGHTED ENSEMBLE BASED EXTRA TREE FOR PERMISSION ANALYSIS FOR ANDROID
APPLICATIONS CLASSIFICATION |
Author: |
HOWIDA ABUBAKER, AIDA ALI, SITI MARIYAM SHAMSUDDIN |
Abstract: |
Selecting optimal features for classification task is one of the essential
problems in machine learning field. Feature Selection is one of the most
extensively studied methods for dimensionality reduction. The feature selection
method preserves a subset of the existing features and discards the rest during
the (supervised or unsupervised) learning process. However, representing
features plays important role in obtaining the highly discriminant features that
contribute in enhancing the classifier performance. Therefore, the aim of this
paper is to propose a framework based on ensemble extra tree algorithm to assign
weight to features that have high influence in classifying android apps to
malware or non-malware with lower computational cost overhead. The presented
framework is evaluated by using different machine learning classifiers to
examine the permissions features of two datasets in terms of their
representation as binary vector or weight vector in enhancing the classification
performance. The experimental results show that the presented model based on
features weighting approach improved the classification performance. |
Keywords: |
Weighting Permission-based Analysis, Ensemble Extra Tree, Machine Learning,
Malware Android Classification |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
THE ROLE OF WHATSAPP APPLICATION IN ENCOURAGING STUDENTS’ SELF-EFFICACY OF USING
BLACKBOARD SYSTEM: AN EXPLORATIVE INTERVIEW STUDY |
Author: |
AYMAN N. ALKHALDI, MOUEZ ALI, SHAWKY MOHAMED MAHMOUD, ZEYAD A. ALREFAI |
Abstract: |
This study aims to examine how students' social media use can play a role in
encouraging their self-efficacy of using the blackboard system for learning
purposes, considering their experience of using the blackboard system. This
study argues that the mentioned positive role of social media in teaching and
learning emerged as a govern social media platform for students. This avoids the
negative effect of social media on them and provides a social media platform for
assisting and guiding students. A qualitative method approach was used, using
interviews conducted with 36 students. The semi-structured interviews were
analyzed following the thematic content analysis method. The interviews were
targeted at obtaining University of Ha'il students' opinions to confirm the
challenges facing them concerning the usage of the Blackboard system. The
findings show that most of the participants had positive beliefs toward the
implementation of WhatsApp with Blackboard. Especially those students with
little experience using the Blackboard system can improve their communication
experience. We recommend future studies, finding theories to integrate the uses
of social media in the education process. Next, researchers should also develop
how WhatsApp can improve learning using Blackboard, especially for students with
modest skills. |
Keywords: |
E-learning, Social Media, Self-efficacy, Blackboard |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
CULTURAL DIPLOMACY IN MODERN INTERNATIONAL RELATIONS: THE INFLUENCE OF
DIGITALIZATION |
Author: |
TATYANA GUMENYUK, MARYNA FROTVEIT, IHOR BONDAR1, YURII HORBAN, OLENA KARAKOZ |
Abstract: |
The digitalization of modern society makes its adjustments to absolutely all
business processes. Cultural diplomacy today plays an essential role in the
implementation of foreign policy. In practice, this can not only serve as a
useful tool for the realization of state interests abroad in the field of
cultural policy but can also contribute to the creation of favourable conditions
for the significant achievement of foreign policy goals of the state in other
areas (for example, the economic field). Cultural diplomacy can become a more
valuable tool for the state in the future and a more significant component of
public diplomacy implementation. It helps the government influence foreign
audiences in the long run as a good reserve to gain support for its policies.
There are several tools that the state uses to implement cultural diplomacy,
through which it maintains contact with foreign audiences and tries to teach its
social norms in other cultures. The development of information technology and
global digitalization, when cultural innovations become impossible without
information and info-communication support, pushes the process of cultural
diplomacy, automating the performance of functions and related operations. In
the article, the authors examined the definition of the term "cultural
diplomacy", analyzed the dynamics of its development and conceptual apparatus,
as well as the impact of digitalization on the processes of cultural diplomacy.
In their study, the authors revealed that digital technologies are becoming more
and more critical for diplomatic processes. Still, Ukraine is not yet using them
enough, as well as its huge potential of culture and art to form an attractive
image of the state. Therefore, the authors were offered a set of useful cultural
diplomacy tools for building and strengthening modern international relations. |
Keywords: |
cultural diplomacy, digitalization, information openness, international
relations, soft power |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
IMPLEMENTATION OF TEXT DATA SECURITY USING MODULAR MULTIPLICATION BASED BLOCK
CIPHER MODIFICATION |
Author: |
H KHAIR, MARISCHA ELVENY , A M H PARDEDE, S RAMADANI, ACHMAD FAUZI |
Abstract: |
One implementation of the use of Information and Communication Technology (ICT)
via the internet is sending text messages via email, social media, or other
means of communication. Nearly all messages sent privately over a private
network are secret messages that you don't want to share with other people, be
they text messages, voice messages, picture messages, and video messages. But in
reality, confidential information is often leaked so that confidential
information can be spread to various irresponsible parties. The efforts made by
these parties are aimed at misusing the data sent by destroying, intercepting,
changing the original message according to the wishes of other parties for their
own interests. This action can make confidential information or messages visible
to people who are not responsible. In overcoming this data security issue, steps
are needed to improve data security. One technique that can be used to secure
data is to use the Modular Multiplication based Block Chipper (MMB) algorithm,
which is a simple method that is not too complicated but is hidden so that the
message to be sent is safe. In this research, we propose an algorithm that
simplifies the use of MMB by directly multiplying each plaintext to the key, and
changing the constant C using RoL so that the binary in constant C is doubled.
The results of the implementation of this study concluded that the encryption of
the original message would be longer, and it would be more difficult for other
parties to crack. |
Keywords: |
Cryptography, MMB, Security, Text. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
FAKE NEWS DETECTION MODEL BASED ON CREDIBILITY MEASUREMENT FOR INDONESIAN ONLINE
NEWS |
Author: |
RAKHMAT ARIANTO, SPITS WARNARS HARCO LESLIE, YAYA HERYADI, EDI ABDURACHMAN |
Abstract: |
The spread of fake news is a problem faced by all active internet users,
especially in Indonesian society. Fake news can have an impact on readers'
misperceptions, causing harm to certain individuals or groups so that the
Indonesian government issued Law number 19 of 2016 which serves to protect
internet users from misinformation from fake news. The research that has been
done in detecting fake news in Indonesian is still very much dependent on the
results of detection from third parties and the Indonesian government in
determining whether a news title is included in fake news or not, but if no
similarity is found it will be considered as factual news so that this research
proposes a fake news detection model based on the level of credibility of online
news headlines. This model has 5 stages, namely: Scrapping Web, Document
Similarity, Online News Search, Online News Scoring, and Classification. This
research has also tested the use of the K-Means, Support Vector Machine with
various kernel, and Multilayer Perceptron methods to obtain optimal
classification. The results showed that at the Document Similarity stage an
optimal threshold value is needed at 0.6, while the Classification stage
determines that the most effective method on the data used is the Multilayer
Perceptron with the provisions of Hidden Layer 30,20,10 so that you get a mean
accuracy of 0.6 and accuracy maximum of 0.8. |
Keywords: |
Fake News Detection, Online News, Credibility, Text Mining, Classification |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF RANDOM ACCESS METHODS FOR WIRELESS SYSTEMS |
Author: |
SARA RIAHI , AZZEDDINE RIAHI |
Abstract: |
This paper falls within the scope of the ever increasing demand on the spectrum
of frequencies, as much for the wireless telephony as for the networks. This
demand will continue to grow and it is therefore increasingly important to find
new methods to improve the efficiency of use of the frequency spectrum. There is
a great deal of research being done to try to find solutions and new approaches.
The GSM mobile radio system is now known to the general public throughout the
European continent and is a world-wide reference point both in terms of concepts
and vocabulary. Although evolutionary, the GSM relies on a relatively rigid TDMA
multiplexing technique. The flow rates are limited. The GPRS, General Packet
Radio Service, will improve the achieved bit rates but the rise of multimedia
services requires more and more high bit rates, in the order of several hundred
kbps. |
Keywords: |
Access methods, OFDMA, CDMA, TDMA, FDMA, CSMA, ALOHA. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
DUAL DESIGNATED PATH ROUTING ALGORITHM FOR CONGESTION CONTROL IN HIGH-DENSITY
NETWORK |
Author: |
AMIERUL SYAZRUL AZMAN, SIVA KUMAR SUBRAMANIAM, MOHAMAD YUSRY LEE, FARAH SHAHNAZ
FEROZ |
Abstract: |
Wireless sensor networks (WSNs) offer promising and flexible solutions in a wide
range of industrial applications, particularly in the oil and gas downstream
pipeline. Such an application requires wide communication coverage due to the
large dissemination of pipelines in the downstream sector and to fit this
requirement, the nodes have to be arranged in a grid formation. Performance
evaluation has been carried out using reactive (e.g., AODV) and proactive (e.g.,
OLSR) routing protocol during the early of the study. Several issues have been
discovered as the network size increases, mainly due to the increased loads,
which occupy the queue and congest the network traffic. These issues include
packet loss, throughput degradation, energy wastage, and poor fair share of
network resources. The OEG reactive routing algorithm is proposed to lessen the
routing instabilities by reducing the control packets and promoting smoother
packets flow through the traffic division into odd-path and even-path with the
consideration of x and y-axis. The proposed routing algorithm was then compared
to AODV and OLSR routing algorithm in terms of network performance. The proposed
routing algorithm has shown notable improvements on the delivery ratio (28.4%
more), throughput (13.6 kbps more), fairness index (0.02 more), passive nodes'
presence (37.9% less), and energy consumption (0.76 J less) when solely compared
to AODV on the highest network density. |
Keywords: |
Routing Algorithm, Wireless Sensor Network, WSN, Oil and Gas, Grid, Pipeline |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
EVALUATION OF E-WALLET USAGE ON RETAIL BUSINESS IN INDONESIA |
Author: |
JAROT S. SUROSO, ILHAM AL FAJRI |
Abstract: |
E-wallets are now widely used as a substitute for physical money (paper money)
which can be used in offline and online transactions. This is also in line with
government policy regarding the National Non-Cash Movement (GNNT) which aims to
form a society that uses more non-cash instruments (Less Cash Society / LCS) in
transactions. Based on the monitoring of transactions with online business
platforms, currently e-wallets are automatically used, but for offline
transactions, especially in the retail business, it has not been seen that they
have made maximum use of e-wallets. Even though e-wallet service providers have
implemented many retail business owners in Indonesia. The fundamental thing that
determines the success of an applied system is the frequency of system use. This
study aims to find significant variables in the use of e-wallets in the retail
business in the UTAUT model and add four variables, namely perceived value,
perceived trust, perceived risk and promotional benefits. The research was
conducted in a quantitative way, distributing questionnaires online as many as
35 questions, and analyzing demographic data using IBM SPSS 25 and PLS-SEM
analysis with SmartPLS 3.2.8. The result, of the eight proposed hypotheses, four
hypotheses were declared insignificant and rejected because the path coefficient
and t-test values of these hypotheses were less than 0.1 and 1.96, while the
other three hypotheses were declared significant and accepted. |
Keywords: |
Evaluation, E-wallet, Retail Business, UTAUT Model, PLS-SEM, |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
CRM STRATEGY FOR E-COMMERCE BASED ON CUSTOMER PAYMENT TYPE |
Author: |
BUDHI SETYAWAN , SFENRIANTO , RENDY EKA PRATAM |
Abstract: |
An e-Commerce that uses CRM is a strategy to increase customer loyalty. Although
it is a widely used strategy, a CRM strategy that utilizes customer payment
types has not been implemented in serving e-Commerce needs. This study aims to
propose a strategy to support CRM e-commerce. The CRM strategy consists of three
main stages, namely: the first stage as the Payment Data Strategy, the second
stage as the RFM Strategy, and the third stage as the CRM Strategy. The payment
method of customer data on e-Commerce www.alfacart.com has been analyzed to
implement the strategy. This research has strong implications because it
produces 27 the type of payment as a basis for Customer Payment Segmentation,
and Customer Loyalty in providing support to CRM strategies in e-Commerce for
customer loyalty needs. |
Keywords: |
E-Commerce, CRM Strategy, Payment Type, CRM, Framework, Loyalty Customer. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
IDENTIFYING INFLUENTIAL SPREADERS IN COMPLEX NETWORKS BY WEIGHTED VOTE RANKING
AND HYBRID METHODS |
Author: |
RAAMAKIRTINAN S, JENILA LIVINGSTON L M |
Abstract: |
Identifying influential users in complex networks has become the need of the
hour in digital era and it has emerged as an important and interesting research
topic. There are many methods like centrality measure, page rank, k-shell etc.,
to rank influential users, but each has its own shortfalls. In this paper we
propose weighted vote ranking method and a hybrid ranking method as an extension
of weighted vote ranking Method. The spreading ability of a node in a network
mainly depend upon three key factors such as the support (vote) that it receives
from neighbor nodes, the relationship strength (weight) and the nodes position
in the network (coreness). So, to identify potential super spreaders we propose
weighted vote ranking (WVR) method with all these three metrics such as vote,
weight and coreness with a dynamic weight parameter control. Also, to improvise
further we extended this proposed method by combining with weighted mixed degree
decomposition (WMDD) method which has ability to consider removed and remaining
nodes in decomposition technique. This hybrid method is obtained by combining
these WVR and WMDD methods in 70:30 ratio which gives better results, compared
to other ratio combinations. To study the spreading dynamics, Susceptible
Infected Recovered (SIR) epidemic model is used. The average Kendall Tau of
proposed weighted vote ranking and hybrid methods across various networks taken
for experiment is 0.86 and 0.83 respectively whereas the highest average Tau
from other methods is 0.79 (1 is maximum Tau value). Also, when we compared the
average infection scale with other methods that is taken for experiment, we get
5.1%-14.5% higher infection scale for weighted vote ranking method and
8.8%-18.2% higher infection scale for hybrid method. Similar various other
experiments like varying number of seed nodes and infection probability also
show that proposed methods perform better when compared to recent other methods. |
Keywords: |
Complex Network, Influential Spreaders, Network Decomposition, Weighted Vote
Rank, Information diffusion |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
WHALE OPTIMIZATION ALGORITHM APPLIED TO THE 0/1 KNAPSACK PROBLEM |
Author: |
RAJA MASADEH |
Abstract: |
This study investigated the 0/1 knapsack problem. A new technique is suggested
to find the best solution that maximize the overall carried values without
exceeding the capacity of the knapsack using whale optimization algorithm and
clustering algorithm. The whale optimization algorithm is considered as one of
the most recent metaheuristic optimization algorithms that mimics the hunting
behavior of humpback whales. Moreover, it has an effective performance in
solving engineering optimization problems and continuous problems. The evaluated
performance is satisfying. The simulation results showed great compatibility
between experimental and theoretical results. |
Keywords: |
0/1 Knapsack Problem, Metaheuristic, Optimization, Whale Optimization Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
ISOLATION OF CORONARY ARTERIES BASED ON ACTIVE CONTOUR AND REGION GROWING MODELS
WITH AUTOMATED SEED SELECTION |
Author: |
SAMMER ZAI, MUHAMMAD AHSAN, MANSOOR AHMED CHANNA, ASAD ABBAS |
Abstract: |
Analysis and examination of huge volumetric data produced by CTA is a tedious
and time-consuming task for radiologists when it comes to many patients.
Therefore, computer-assisted diagnostic techniques are required to assist the
clinical experts for the tracking of coronary arteries in volumetric datasets of
heart in an automatic fashion. This paper aims to presents some of the most
commonly used segmentation algorithms along with their pros and cons and their
solution in the reported literature. This study specifically provides a study of
four different techniques that are meant to segment the coronary arteries from
volumetric datasets. The efficiency of all these methods has been validated on
real clinical CTA datasets. Additionally, statistical comparison of these method
is also provided with the help of performance measures including Precision,
Recall, Jaccard Index (JI), and F-measure. |
Keywords: |
coronary arteries segmentation, active contour, computed tomography angiography,
hessian-based vesselness. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
NETWORK INTRUSIONS CLASSIFICATION USING DATA MINING APPROACHES |
Author: |
SLAMET, IZZELDIN IBRAHIM MOHAMED |
Abstract: |
Intrusion Detection System has an important task in detecting threats or attacks
in the computer networks. Intrusion Detection System (IDS) is a network
protection device used to identify and check data packets in network traffic.
Snort is free software used to detect attacks and protect computer networks.
Snort can only detect misuse attacks, whereas to detect anomaly attacks using
Bayes Network, Naive Bayes, Random Tree, LMT and J-48 Classification Method. In
this paper, the experimental study uses the KDDCUP 99 dataset and the dataset
taken from Campus Network. The main objective of this research is to detect
deceptive packets that pass computer network traffic. The steps taken in this
study are data preparation, data cleaning, dataset classification, feature
extraction, rules snort for detecting, and detecting packet as an attack or
normal. The result of the proposed system is an accurate detection rate. |
Keywords: |
Classification, Intrusion, Snort, Anomaly, Misuse |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
Title: |
DEVELOPMENT OF A REAL TIME HUMAN FACE RECOGNITION SOFTWARE SYSTEM |
Author: |
ASKAR BORANBAYEV, SEILKHAN BORANBAYEV, MUKHAMEDZHAN AMIRTAEV, MALIK
BAIMUKHAMEDOV, ASKAR NURBEKOV |
Abstract: |
In this study, a system for real-time face recognition was built using the Open
Face tools of the Open CV library. The article describes the methodology for
creating the system and the results of its testing. The Open CV library has
various modules that perform many tasks. In this paper, Open CV modules were
used for face recognition in images and face identification in real time. In
addition, the HOG method was used to detect a person by the front of his face.
After performing the HOG method, 128 face measurements were obtained using the
image encoding method. A convolutional neural network was then used to identify
people's faces using the SVM linear classifier algorithm. |
Keywords: |
System, Recognition, Method, Algorithm, Neural Network. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2021 -- Vol. 99. No. 07 -- 2021 |
Full
Text |
|
|
|