|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
May 2021 | Vol. 99
No.09 |
Title: |
APPLICATION THE FUZZY TOPSIS AND FUZZY ELECTRE IN THE SERIOUS GAMES EVALUATION
TOOL |
Author: |
KAMAL OMARI, SAID HARCHI, LYNDA OUCHAOUKA, ZINEB RACHIK, MOHAMED MOUSSETAD,
LAHOUCINE LABRIJI |
Abstract: |
The evaluation of serious games is generally a complicated process because there
is usually more than one dimension to be evaluated. In our Serious Games
evaluation tool, we have four dimensions in each one we have a several
well-defined evaluation criteria's. So we intend to use a fuzzy
multi-criteria decision-making method (FMCDM) which has been integrated in order
to validate the selection of the different alternatives and the weighting of the
multiple criteria involved in our tool. However, even if all methods have the
capacity to take into account the imprecision and uncertainty of human
judgments, each method has its advantages and disadvantages depending on the
context in which it is used. This makes it very difficult to choose one method
over another. Moreover, there is no consensus in the scientific community on any
particular method. In this paper, we present the use of the fuzzy TOPSIS and
fuzzy ELECTRE methods for ranking the evaluation dimensions / alternatives used
in our Serious Games evaluation model in which the fuzzy AHP method was used.
These three chosen methods, which adapt perfectly to our context, given its
discrete aspect, represent respectively the three categories of FMADM (fuzzy
multi-attribute decision-making methods): fuzzy pairwise comparison methods,
fuzzy distance based methods and fuzzy outranking methods. The results
obtained from the application of these fuzzy methods converge towards the same
ranking of dimensions / alternatives. |
Keywords: |
Serious Game, FMADM, fuzzy AHP, fuzzy TOPSIS, fuzzy ELECTRE. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
CURRENT ISSUES AND METHODS OF EVENT PROCESSING IN SYSTEMS WITH EVENT-DRIVEN
ARCHITECTURE |
Author: |
VALERII VLADIMIROVICH PETROV, ANNA VICTOROVNA GENNADINIK, ELENA YUREVNA
AVKSENTIEVA, KONSTANTIN VLADIMIROVICH BRYUKHANOV |
Abstract: |
Systems and methods of event processing are used in many large-scale research
projects of European Organization for Nuclear Research, major IT and financial
corporations, IoT and many other companies for development of event-driven
architectures. Scenarios of application of methods and systems of event
processing are numerous, they become more and more popular every year, but part
of the mentioned systems is limited due to common event processing issues.
Therefore, the issues occurring upon event processing have been studied. This
work analyzes the notions of event processing, event processing methods, history
of the subject field, urgent issues of event processing methods. In addition,
the approaches to their solution are proposed, differences in event processing
methods are exemplified, drawbacks of the methods are highlighted. This work
analyzes the following problems, which can occur while designing event
processing system: processing of out-of-sequence events; occurrence of
duplicates; collision upon event processing; distributed fault-tolerant
architecture; multi-threaded event processing; adaptive circuits of load
balancing; monitoring of event processing application. Each aforementioned
problem is briefly described. Several compromise solutions are discussed and
tested with the usage of the test bench; it’s aimed at smoothing of consequences
of the application of the existing approaches. Some of the methods could lead to
the performance degradation. For research purposes were initiated Fuzzy testing
for tracking the potential failures and recoveries. |
Keywords: |
Event Processing, Complex Event Processing, Stream Event Processing, Event
Tracing |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
AN EVOLVING APPROACH TO DATA STREAMS CLUSTERING BASED ON CHEBYCHEV WITH FALSE
MERGING |
Author: |
MUSTAFA TAREQ , ELANKOVAN A. SUNDARARAJAN |
Abstract: |
Data stream clustering is not a recent subject in data analysis and statistics.
However, with the rapid deployment of the Internet of Things (IoT), this field
faces new practical challenges that researchers intend to solve. These
challenges can be summarized under four main categories: high-dimensionality,
fast speed of data flow, real-time constraints, and evolving nature. Although
numerous density-based algorithms have recently been established for data stream
clustering, these algorithms are not without their problems. The quality of
these existing clustering algorithms is dramatically reduced when the distance
function is used. Another problem is false merging which happens when two or
more clusters overlap on top of each other. This paper introduces a new online
approach, which is called “Clustering of Evolving data streams based on
Chebychev distance with false Merging” (CEC-Merge). The primary goal of this
method is to improve the efficiency of the clusters. CEC-Merge is completely
online and contains two major steps. The initial step generates a Core
Micro-Clusters (CMCs) and the second step merge these CMCs to constructs
Macro-clusters. The Chebychev distance function is applied to measure the
distance from the new point with the existing CMCs centre. CEC-Merge uses two
important parameters to avoid false merging such as “minimum links” and “time
intervals”. The proposed technique was validated using various consistency
measurements on real and artificial evolving data streams and compared with
well-known methods. The CEC-Merge provides an effective solution for improving
the efficiency of the cluster. |
Keywords: |
Clustering, Evolving data stream, Chebychev, Core Micro-Cluster, Density
based-clustering. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
DIGITAL TRANSFORMATION IN FLOW PLANNING: THE CASE OF CONTAINER TERMINALS AT A
SMART PORT |
Author: |
MANAR KASSOU, SALMANE BOUREKKADI2, OUAIL EL IMRANI, ABDELHAMID BOULAKSILI,
SOUMAYA AHAROUAY, ASMAE OURDI, HASSAN CHIKRI, SAMIRA KHOULJI |
Abstract: |
Faced with a constantly changing environment, and an international economic
context characterized by fierce competition, the digitalization of businesses,
and especially medium-sized businesses, has become a sine qua non condition for
dealing with this. This article attempts to study digital transformation in
correlation with flow planning and its impact on the improvement of
international trade in order to address the case of container terminals at the
Tanger Med smart port. We have tried to study in detail the various logistics
flow planning tools and discussed the case of container terminals in the port of
Tangier Med. The action variables discussed in this article are on the factors
impacting terminal traffic to Container terminals. The different logistics
flows, the planning of logistics flows, the logistics planning tools, the
structure of the port of Tanger Med, the evolution of the containerized fleet
within the container terminals of the port allow, among other things, the
objectives achieved of the paper, This will allow the introduction of very
advanced IT solutions in the nearest future within smart ports by aligning with
the blockchain. |
Keywords: |
Information systems, Digital transformation, Information technology
implementation, Planning Flow, Blockchain International trade, intelligent
system, Smart Port. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
COMPARATIVE ANALYSIS OF UNIVERSAL METHODS NO REFERENCE QUALITY ASSESSMENT OF
DIGITAL IMAGES |
Author: |
ELMIRA ELDAROVA, VALERY STAROVOITOV, KAZIZAT ISKAKOV |
Abstract: |
The main purpose of this article is to conduct a comparative study of two
well-known no-reference image quality assessment algorithms BRISQUE and NIQE in
order to analyze the relationship between subjective and quantitative
assessments of image quality. As experimental data, we used images with
artificially created distortions and mean expert assessments of their quality
from the public databases TID2013, CISQ and LIVE. Image quality scores were
calculated using the NIQE, BRISQUE functions and their average. The correlation
coefficients of Pearson, Spearman and Kendall were analyzed between expert
visual assessments and quantitative scores of the image quality, as well as
between the values of three compared indicators. For the experiments, the Matlab
system and values of its functions niqe and brisque normalized to the range [0,
1] were used. The computation time of niqe is slightly less. The investigated
functions poorly estimate the contrast of images, but the additive Gaussian
noise, Gaussian blur and loss in compression by the JPEG2000 algorithm are
better. The BRISQUE measure shows slightly better results when evaluating images
with additive Gaussian noise, while NIQE for blurred by Gaussian. The average of
the normalized values of NIQE and BRISQUE is a good compromise. The results of
this work may be of interest for the practical implementations of digital image
analysis. |
Keywords: |
Image quality assessment, No-reference measure, Objective metrics, BRISQUE, NIQE |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
QPSJF: A NOVEL CLOUD COMPUTING TASK SCHEDULING POLICY BASED ON COMBINATION OF
SCHEDULING ELEMENTS |
Author: |
AMEERA JARADAT, AHMAD AL-OMARI |
Abstract: |
Cloud computing is considered one of the rapidly emerging computing
environments. It gives the user the ability to choose among the many computing
and storage services. Service providers provide the services to users. Users
prefer to select an appropriate datacenter for their requests to satisfy their
requirements. The need for efficient task scheduling in a cloud computing
environment to improve cloud performance motivated researchers to investigate
existing task scheduling algorithms and/or to improve existing ones and to
develop new ones. This article proposes a task scheduling approach named Queue
Priority Shortest Job First scheduling (QPSJF), which is effective in optimizing
execution time, waiting time, and response time. The proposed QPSJF algorithm
distributes the cloudlets over three designated queues according to their length
and priority. The efficiency of the proposed algorithm is supported through
simulation and comparative analysis. |
Keywords: |
Cloud computing; Task scheduling Algorithm; Virtual Machine; CloudSim; Shortest
Job First; Priority Queue. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
IMPLEMENTATION OF A BIOINSPIRED ROBOT (RIVER SALMON) FOR STABILITY CONTROL
TROUGH THE DORSAL FIN |
Author: |
FAUSTO CABRERA, MARIO ARELLANO, STEVEN GRANIZO, FABRICIO SANTACRUZ CLAUDIO ROSSI |
Abstract: |
This document shows the stages of design and implementation of a bio-inspired
robot in the morphology of an articulated river salmon. This robot imitates the
Subcaringiform displacement that the river salmon presents. The principal
analysis of the robot was the influence of the dorsal fin during the
displacement, the dorsal fin has 2 DOF, in the first stage, a test evaluating
the Pitch and Roll movements during the displacement of the robot was
determined, in the second stage, we use the movements of the dorsal fin with
tests in the same way as in the first stage and the results shown better
stability, in the future work a control system in closed loop will be designed
in order to obtain desired movements and positions. |
Keywords: |
Bioinspired fish, dorsal fin, subcaringiform, bioinspired robot, stability
control. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
DEEP LEARNING-BASED METHOD FOR PREDICTION OF SOFTWARE ENGINEERING PROJECT
TEAMWORK ASSESSMENT IN HIGHER EDUCATION |
Author: |
LAMYAA ZAED ALJUAID, MAR YAH SAID |
Abstract: |
One of the very recent applications of machine learning and deep learning is to
predict student’s performance for a specific task. Particularly in software
engineering projects in higher educational institutions, one of the major
challenges is how to improve the overall software team performance with the
ultimate goal of increasing software team productivity. This problem can be
termed as Software Engineering Teamwork Assessment and Prediction (SETAP). To
address this, we proposed a SETAP method that uses an effective
deep-learning-based method for assessment and early prediction of student
learning effectiveness in software engineering teamwork. Further, we identified
critical features by using feature importance, which affects the performance of
the student's team. For the experimental purpose, we used the freely available
dataset from the UCI data repository for student learning effectiveness in
software engineering teamwork. In the proposed work, we used Feed-forward deep
neural network classifier for this purpose. Deep neural networks can produce
high accuracy with complex data very quickly. This made them a perfect choice
for our work. To compare and evaluate the performance of the proposed prediction
method with others (RF, GLM, GBM), we used accuracy percentage, sensitivity, and
specificity as performance measuring benchmarks. Also, we evaluated the method
on our university datasets. Results proved that the proposed method performed
better than the above-mentioned state-of-the-art classifiers. |
Keywords: |
Teamwork Assessment, Software Engineering, Deep Learning, Stacking. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
DISTANCE LEARNING STRATEGIES USING TECHNOLOGY FOR ELEMENTARY SCHOOL STUDENTS IN
YOGYAKARTA DURING THE COVID-19 PANDEMIC |
Author: |
RADINO, HANIF CAHYO ADI KISTORO, NUR MUNAJAT, HIMAWAN PUTRANTA, AMELIASARI
TAURESIA KESUMA, LUMAURRIDLO |
Abstract: |
This research aims to explore the experiences of teachers in implementing
distance learning strategies for elementary school students. Participants in
this research were 6 teachers from public elementary schools in Yogyakarta who
ranked first. In-depth interview method as a data collection technique. Data
analysis using semantic reduction. The results of the research found that
distance learning in Yogyakarta public elementary schools used an inquiry
strategy or deepening of the material itself by students. Learning is carried
out by providing material and giving assignments. The media used is an
application on the internet that supports distance learning according to the
conditions and abilities of students in the form of group WhatsApp. Factors
affecting distance learning include teacher competence, student ability to
operate learning tools, different cognitive abilities of students, unfamiliarity
with distance learning, internet stability, adequate internet quota, and less
intensive parental assistance. |
Keywords: |
Covid-19 Pandemic, Distance Learning, Inquiry Learning, Phenomenology, WhatsApp |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
DEVELOPMENT OF A SYSTEM FOR POSITIONING THE WORK OF GATHERING CRANES ON
CONTAINER SPACES OF FREIGHT STATIONS |
Author: |
ONGDABEK RABAT , ELMIRA ZHATKANBAEVA1, ALINA SALMANOVA , SERGEI LEE , DINARA
AGABEKOVA, DANA ALIAKBARKYZY, NAZYM SAYDINBAEVA, GULNARA TAITIKENOVA, DAMIR
ABSAMETOV |
Abstract: |
The paper presents a system developed by the authors for positioning the work of
gantry cranes on container sites of freight stations. The preliminary design of
the device for reading information about the coordinates of the crane was
developed on the basis of the copyright certificate (No. 1796681 "Device for
reading information about the coordinates of the crane" dated 02.23.1993. Lee
S.V. et al. Bull. No. 7). The design of the reader is an integral part of the
control equipment of the crane positioning system. This project is part of an
automated container cargo management system. The article substantiates the
choice of the type of sensors and the principle of reading the coordinates of
the gantry crane. The proposed crane positioning system consists of addressable
elements and a system of reading elements. It implements the code principle for
reading container positions. Address elements are delta planks. In accordance
with the position code, metal screens are fixed on them, the size of which is
determined by the type of sensors selected and their characteristics. The
reading element system is a series of proximity sensors. The sensors are mounted
on a special pinch device, which provides the necessary clearance between the
sensors and code plates. The signal reception and processing unit remembers the
code of the positions coming from the sensors and stores information until the
next signal arrives. The position code is displayed on the on-board computer
screen of the crane operator. The developed crane positioning system improves
the accuracy of determining the position of the crane and simplifies information
processing equipment. The positioning system of the crane can significantly
increase the efficiency of cranes in handling containers and other cargo. In
addition, the fatigue of the crane driver is reduced and his labor productivity
is increased. Using the crane positioning system developed by the authors will
undoubtedly give a great economic effect. The efficiency of cranes for reloading
containers is provided by accelerating the search for containers loaded directly
into the car, improving the quality of accounting. All this ultimately provides
the ability to transport additional goods with an existing fleet of containers.
In conclusion, the paper gives an analysis of the selected design of a crane
positioning system. |
Keywords: |
Gantry Crane, Container, Positioning System, Overload Efficiency, Performance,
Address Elements, Proximity Sensor, Pinch Device. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
AUTOMATIC OFFENSIVE LANGUAGE DETECTION IN ONLINE USER GENERATED CONTENTS |
Author: |
AIGERIM TOKTAROVA, GULBAKHRAM BEISSENOVA, MARAT NURTAS, PERNEKUL KOZHABEKOVA,
ZHANAR AZHIBEKOVA, ZLIKHA MAKHANOVA, BIBIGUL TULEGENOVA, NAZIRA RAKHYMBEK,
ZHARASBEK BAISHEMIROV |
Abstract: |
Profanity on the pages of social networking networks is growing the number of
problems social networking has. Easy and automated steps are necessary to
control the amount of content that is generated on a daily basis. There is a
significant research question concerning language instruction rather than the
implementation methods. We are creating a dataset of internet users in
Kazakhstan where they use social networks and the media to share their opinions.
According to this report, it is the first time anybody has ever done a study
focused on complaints from multiple social networks. We have classified our
index in a variety of respects, one of which is to use derogatory terms.
Furthermore, our results will not only explore the roots of offensive language,
but will also present concepts that help in differentiating such types of
offensive language, such as offensive language and cyberbullying. We use machine
learning approaches to access the data sets we can use for the automated study
of offensive language on social media. The results show that recognizing
offensive language on social networks is a task that can be solved automatically
and produces excellent results. |
Keywords: |
Offensive language, Hate Speech, Machine Learning, Detection, Classification,
Natural Language Processing, Social Networks, Social Media. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
GOVERNMENT POLICY AND COVID-19: INSIGHT AND GENERAL PUBLIC ATTITUDE IN SOCIAL
MEDIA |
Author: |
LA MANI, IRMAWAN RAHYADI, MUHAMMAD ARAS |
Abstract: |
This study aims to understand public tendencies in response to the Covid-19
policy obtained from social media in Indonesia. This research used descriptive
quantitative methodology. It involved 580 respondents recruited using quota
sampling technique. Research data was collected by using a questionnaire which
was shared via social media platforms (Facebook, WhatsApp, and Instagram). Then,
the data was analyzed using frequency distribution, where the respondents’
answers were grouped into separated categories to show patterns. Generally,
public saw construction on Covid-19 as a virus which spreads rapidly, and a
virus that comes from Wuhan-China. Therefore, public cognitively perceived
Covid-19 as a scary virus causing acute diseases. There is also an element of
social cognition that has opened a potential space for public to disobey
government policies. In relation to affection, public looked down on people who
disobey the government policies on Covid-19. Thus, this fact made public
function as information channel, persuasion agent, and coercion to others
especially to their family members. While public showed knowledge, affection,
and behavior supporting government policies on Covid 19, many people disobeyed
the policies. The disobedience does not necessarily indicate that people are not
aware of the government policies on Covid-19. Yet, the main reason for the
disobedience is economic factors. If they stay home, they will lose their
income. |
Keywords: |
Attitude tendencies, public, policy, social media, Covid-19 |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
INNOVATIONATTITUDE CONTROL OF A HEXACOPTER PLATFORM BASED ON FRACTIONAL CONTROL
LAWS AND COMPARISON WITH THE PID AND LQR CONTROL METHODS |
Author: |
SAAD ENNIMA , SALMANE BOUREKKADI, ASMAE OURDI , ABDELLAH ELGHARAD |
Abstract: |
The objective of this research study based on numerical results is to validate
the feasibility and effectiveness of a new method for controlling Hexacopter
type UAVs, which belong to the family of multirotor established on laws
fractional control (FOC) and to establish a comparison between three types of
controllers used to control the attitude of a UAV under different conditions,
known as the Hexacopter platform, which is part of the multi-rotor UAV family.
The three types of controllers considered in this work are a conventional
linear-quadratic LQR controller, the proportional-integral-derivative PID method
and a controller based on fractional control laws. The control method asserts
advantages regarding of response time and stabilisation at the desired altitude
and attitude. This control is intended to be used to control and maintain the
desired trajectory during several manoeuvres while minimising energy
consumption. The system's performance and stability are analysed with several
tests, from simple hovering flight. This new solution applied to multi-rotor
UAVs will totally revolutionise this technology in terms of stability and solve
the problem for many industries. All the simulations discussed in this article
were performed in the MATLAB/Simulink environment. |
Keywords: |
UAV, Hexacopter, Fractional control, LQR, PID |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
IMPROVING REGRESSION TESTING QUERY REPLYING PROCEDURE USING SECURE OPTIMIZED
GRAPH WALK SCHEME |
Author: |
U.SIVAJI , Dr. P. SRINIVASA RAO |
Abstract: |
Day by day the creation of software and application is growing rapidly, so that
testing the software’s or codes for its faults are the key paradigm in digital
field. However, testing the software is not at all an easy role, the huge size
of data made execution difficulties. To overcome these issues, the current
article aimed to develop a novel Optimized Hash Graph walk Ant Lion Replica
(OHGW-ALR) to schedule the test cases based on priority manner. Moreover, while
arranging the test cases in priority based it minimize the usage of resource and
processing time. Moreover, the presence fitness process of Ant lion model in
graph walk scheme has improved the fault prediction performance. Finally, the
proficient rate of the developed replica is verified by comparing the key
metrics with other associated works. In that the developed OHGW-ALR has gained
better exact rate of fault predict. |
Keywords: |
Regression Test, Fault Detection, Flaw Mitigation, Test Case, Priority Based
Scheduling |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY FOR THE WORM WHOLE ATTACK EFFECT ON MANET |
Author: |
MAHA ABDELHAQ, RAED ALSAQOUR, FAY ALSUBAIE, GHADA ALESSA, LUJAIN ALGHAMDI, HANA
ALTUKHAIM, LAMA ALSHAMMARI, ALAA ALSALEEM |
Abstract: |
Mobile Ad hoc network (MANET) is a wireless network that has the ability to
reconfigure itself without any centralized infrastructure. This type of network
is not in a fixed composition and form, but instead, it forms itself and allows
for other nodes to join in automatically. Since it has a flexible and dynamic
nature, that makes it vulnerable to attacks which could be attached to the
network very easily. As a result, the attacker would later serve as a sender or
receiver for faked packets. One of the most dangerous attacks of this network is
wormhole attack. With wormhole attack, packets of data are transferred from one
node to another harmful node inside or outside the network. Therefore, we aim in
this paper to study the effect of a wormhole attack on two routing protocols,
namely Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR).
The comparison will be held in terms of two main network performance metrics:
throughput and end-to-end delay. Network Simulator-2 (NS-2) will be used to
conduct the simulation experiments in this paper and calculate the results. This
research gives a new contribution to the area of network attacks. It provides a
new Worm Hole Attack Model (WHAM), which will be applied to MANET routing using
NS-2 WHAM has been applied to the protocols mentioned above to test their
resistance and stability under the attack. |
Keywords: |
Mobile ad hoc network; Routing Protocols; AODV; DSR; Wormhole Attack |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
ANALYSIS OF ASYMMETRIC COPLANAR WAVEGUIDE WITH FINITE-EXTENT GROUND AND FINITE
GROUND BACKING |
Author: |
ASEM S. AL-ZOUBI |
Abstract: |
Quasi-static characteristics of the asymmetric coplanar waveguide (CPW) with
finite-extent ground and finite ground backing are studied using the conformal
mapping method (CMM); closed form expressions for the effective relative
permittivity and the characteristic impedance are derived. Various structures
can be analyzed from the original structure. The effect of various parameters
are studied using the expressions obtained. In addition, the structure is
analyzed using finite difference method (FDM). The results obtained using CMM
are compared to previous work, FDM and commercial software and have good
agreement. |
Keywords: |
Coplanar Waveguide, Asymmetric Coplanar Waveguide, Conformal Mapping Method,
Finite Difference Method , Finite-Extent Ground, Finite Ground Backing. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
MODEL, DATA INTEGRATION ALGORITHMS OF INFORMATION SYSTEMS BASED ON ONTOLOGY |
Author: |
RAISSA USKENBAYEVA, TOLGANAY CHINIBAYEVA |
Abstract: |
Today is difficult to imagine without integrated automated information systems
(IAIS) that support various business processes. Obtaining aggregated information
for the purpose of making management decisions depends on the effective
interaction of information systems (IS) included in the structure of the IAIS.
Business processes are often automated using software solutions of its own and
third-party developers, regardless of their interconnectedness, which is
especially true for universities. With constant changes in these business
processes, IAIS developers are forced to adjust programs and data models, which
leads to structural and semantic heterogeneity of information elements and,
accordingly, the need to re-develop software data converters. The use of such
solutions leads to complication and, consequently, a decrease in the reliability
of the IAIS. This article continues the series of publications [25-27],
which includes the problem of building integrated automated information systems
that support various business processes based on ontologies. The purpose of
the article is to develop a mathematical model, algorithm and software system
for integrating IS data based on the application of the ontological approach.
To achieve this goal, the following tasks were set. 1. Build a mathematical
model of data integration of information systems with heterogeneous ontological
specifications. 2. To develop a computational method for evaluating the
semantic proximity of concepts (elements) of heterogeneous ontologies. |
Keywords: |
Ontology description languages, data integration algorithms, genetic operator,
lexical proximity, heterogeneous information systems. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
FRAMEWORK TO SECURE THE OAUTH 2.0 AND JSON WEB TOKEN FOR REST API |
Author: |
EHAB RUSHDY, WALID KHEDR, NIHAL SALAH |
Abstract: |
The Open Authorization (OAuth 2.0) specification defines a delegation protocol
that is helpful for conveying authorization decisions (via a token) across a
network of web applications and APIs. OAuth 2.0 achieves this with the help of
valid tokens issued by an authorization server which enables access to protected
resources. For Achieving statelessness, access tokens in OAuth needs that
resource server request to authorization server to get the user details related
to the token and whether the token is valid or not for it each client request.
OAuth 2.0 allows safe transfer of bearer tokens, but doesn’t validate the
processing party. If a token endpoint is wrong then entire system security is in
danger. JSON Web Token (JWT) is an open standard that defines a compact and
self-contained way for transmitting data between various parties by encoding
them as JSON objects which can be digitally signed or encrypted. This research
proposes an approach that combines OAuth 2.0 with JWT in REST API to allow the
resource server to validate the OAuth access token locally and only needs an
interaction with the Authorization server to get a new OAuth access token. This
combination reduces the interaction with the Auth server that yields the
performance improvements. JWT has several options for using algorithms namely a
symmetric algorithm HS256 (HMAC with SHA-256) and an asymmetric algorithm RS256
(RSA Signature with SHA-256). Testing the most different cryptographic
algorithms used to construct JWT for signing token are done based on the speed
of generating tokens, the size of tokens, time data transfer tokens and security
of tokens against attacks. The experimental results show the use of The HS256
has good result compare to using RS256 for framework of evaluation the
performance of proposed algorithms in terms of generating tokens, the size of
tokens and time data transfer tokens. In order to prove that proposed scheme can
avoid phishing attacks especially user credentials by taking two-factor
authentication service which makes user can guarantee the authenticity of
client. |
Keywords: |
Authentication, Authorization, OAuth 2.0, JWT, Security |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
Title: |
UNIQUE APPROACH FOR CRICKET MATCH OUTCOME PREDICTION USING XGBOOST ALGORITHMS |
Author: |
NIMMI WEERADDANA , SAMINDA PREMARATNE |
Abstract: |
Context. Cricket is among the top five rated sports in the world based on a set
of ranking criteria. It is highly popular in Asia, Australia, the United
Kingdom, and many other countries. Several attempts have been made in prior
research to predict the cricket match outcomes based on the current status of
the match. Goal. Importance. Insights to a cricket match such as what is the
winning probability given the current status of the match? What could be the
predicted score at the end of the next over? Who is the best batsman to join the
game after a wicket? Who is the best bowler to break a partnership? When can
another wicket is likely to occur in the future? are important to many
stakeholders. These insights could be used by interested stakeholders such as
team leads, coaches, sports professionals, etc. Novelty. In this research, we
present a novel approach to predict the winning team (winning probability) and
score at the end of the next over using boosting algorithms. Results. Our
results yield 84.4 of accuracy for winning team classification and 1.41 of mean
squared error for the score prediction. Besides, our results outperform the
traditional data mining approaches. Scope. We limit our research only to the
Cricket matches between Sri Lanka and India to reduce the complexity of the
scope of the problem. Conclusion. We believe the research questions addressed
through this research paper are useful to real-time analysis and decision
making. |
Keywords: |
Data mining, XGBoost, Classification, Dummy variables, Regression |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2021 -- Vol. 99. No. 09 -- 2021 |
Full
Text |
|
|
|