|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
May 2019 | Vol. 97 No.10 |
Title: |
BUSINESS PROCESS REENGINEERING TO IMPROVE PROCESS ALIGNMENT & INFORMATION SYSTEM
PLATFORM AT STAINLESS EQUIPMENT COMPANY |
Author: |
RIYAN LEANDROS, NILO LEGOWO |
Abstract: |
Stainless Equipment Company (SEC) is a part of Processing Global Company (PGC)
which the business process and the system were still local. Besides it had not
been aligned with the global, SEC is also demanded by competitive market.
Improvement project was raised and implemented to answer above situation and
condition. The project was based on Business Process Reengineering (BPR)
framework that involved three components (Process, People, Tools/ Technology)
plus new component as the ‘seat’ of Project Management that represents in some
teams: global process team, global information management team and site team.
These three components result Performance. The project was called as Improvement
of Process Alignment & Information System Platform (PrISP). This BPR is a huge
project that needs full commitment from all stakeholders. By having full
commitment assertively, big improvement would be happened. The improvement was
reflected from the result of post go-live and data collection (questionnaire and
interview) that is accepted by all the stakeholders with high self-development
interest for most of the employees but less interest in the performance. |
Keywords: |
BPR, Alignment, Global, Local, Information System Platform |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
COMPARATIVE WEB ACCESSIBILITY EVALUATION OF SAUDI GOVERNMENT WEBSITES FOR
COMPLIANCE WITH WCAG 1.0 AND WCAG 2.0 USING AUTOMATIC WEB ACCESSIBILITY TOOLS |
Author: |
MUHAMMAD AKRAM, ROSNAFISAH BT SULAIMAN |
Abstract: |
Web sites are an essential source of information in education, social life,
employment, government, commerce, e-shopping, healthcare etc. As the Saudi
government is continuously introducing many new e-services for his citizen and
residents, but still many disable peoples are not able to get full advantage
from these e-services due to poor web accessibility. According to the World
Health Organization (WHO) reports, more than one billion people live with
different kinds of disabilities all over the world. Saudi Arabia has 720,000
disabled people which are about 4% of the total Saudi population. Many
researchers documented that government official paid very little attention
towards the need for disabled people during the planning and implementation of
web projects. Therefore, it is essential that all citizens and resident of Saudi
Arabia must have equal opportunities to access and benefit from all e-government
recourses. The objective of this study is to evaluate and compare the web
accessibility of Saudi government websites by using automatic web accessibility
tools. Fifteen Saudi government websites were selected, and the homepage of each
website was evaluated for web accessibility and HTML and CSS validity. Results
generated by automatic accessibility tools exposes that most the government
websites have serious accessibility problems which hinder the disable users to
access the web contents completely. Furthermore, automated web accessibility
tools are not able to report some accessibility issues found by users because it
is difficult for accessibility analysis tools to understand the way web contents
interact with assistive technologies used by disabled users. However, findings
in this study demand to do extensive research by involving the disabled users,
web developers and accessibility experts in web accessibility evaluation process
to improve the website accessibility and overall quality of websites. |
Keywords: |
Web Accessibility, Disability, E-Government, Web Contents Accessibility
Guidelines, Accessibility Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
THE IMPLEMENTATION OF SYSTEM ENTERPRISE RISK MANAGEMENT USING FRAMEWORK ISO
31000 |
Author: |
GEDE WISNU ARTA SUYASA, NILO LEGOWO |
Abstract: |
Enterprise Risk Management is very important in a company because it can have a
very important impact on information systems in the company. The purpose of this
study is to analyze the risk of risk management information systems especially
on financial technology which is based on the level of risk that is happening
and also measure the level of maturity that has been applied whether it is in
line with the expected target of one of the state-owned banks. this research
uses ISO 31000 standard, observations, audit check lists, and interviews. In
this risk management information system analysis will focus on 7 domains. The
results of this study indicate that the level of risk faced by Bank XYZ is at
the highest risk level. so that Bank XYZ must take control to overcome these
risks. Information system maturity level at Bank XYZ has an average value of
3.00 which explains that it is still in the defined stage. While the target
expected by Bank XYZ is 4.00. The gap of 1.00 must be a concern, because the
level of risk arises due to the maturity level of the Bank XYZ system that has
not been fulfilled. |
Keywords: |
Information System Risk Management, Financial Technology, Enterprise Risk
Management, ISO 31000, Maturity Level. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
GENDER CLASSIFICATION FROM FACIAL IMAGES USING SUPPORT VECTOR MACHINE |
Author: |
IKA CANDRADEWI, BAMBANG NURCAHYO PRASTOWO, DJAENUDDIN LATHIEF |
Abstract: |
The face is a biometric feature of a person. This biometric feature encourages
researchers to model it. This unique features modeled and applied in many
objects. One of them is used to classified the gender of someone like done in
this research. There were four main step, consist of pre-processing using a
histogram of equalization, face detection using LBP Haar cascade classifier to
get face region, feature extraction, and classification. This extraction used to
obtain an unique information named features. The method to get the features
named Histogram of Gradient (HOG). After setting the parameters in extraction
method we will get many features named HOG features. Meanwhile, The last step is
classification using Support Vector Machine (SVM) classify gender form facial
images. SVM was chosen because it’s one of classification method that robust in
classify two group of data. The type of the kernel that used in this research is
the linear kernel. This kernel has an advantage in the robustness to classify
the big features. Implementation result show that the best achieved when HOG
parameters (cell size = 20x20 pixels, block size = 5x5 pixels, block stride =
5x5 pixels, bin = 5 or 7) and SVM parameters (C=1, epsilon = 1e-6 dan iteration
= 10.000). The accuracy of this proposed method is 92%. |
Keywords: |
Gender Classification, Support Vector Machine, Histogram of Oriented Gradient,
LBP_Haar Cascade Classified, Face Detection |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
AN EMPIRICAL STUDY OF SMARTPHONE GAME PERFORMANCE UTILIZING EVOLUTIONARY BIOLOGY
PERSPECTIVE |
Author: |
OOK LEE , JUNGWOON CHOI |
Abstract: |
Humans have evolved to walk upright since a million years ago. However, as an
industrial society entered, seating and working hours became abnormally high
only a few decades ago. This has caused the human body to be badly affected.
According to the preceding medical studies, the environment of sitting and
working for a long time negatively affected adult diseases. In modern society,
people are doing long-again tasks such as sitting in one place or standing up.
This has many side effects on the human body. This is because humans have
evolved in a moving direction. Reflecting this background, the study adds
evolutionary biological perspective to think about working in a walking
environment as well as standing desk working environment. It also expected
expansion of the mobile office environment where smartphones, a type of smart
work, are used directly in the field. To do so, it is going to carry out an
experiment that does work with Smartphones. The study could help build and
establish a mobile office environment, a type of smart work. In addition, a
working environment for walking around as well as using smartphones could be
developed. Furthermore, the work environment and the study environment of
students could change. |
Keywords: |
Evolutionary Biology, Mobile Office, Medical Study, Smart Work, Smartphone |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
THE EMPIRICAL STUDY OF ONLINE MUSEUM VISITOR BEHAVIOR ON SOCIAL MEDIA MARKETING
IMPLEMENTATION IN INDONESIA |
Author: |
ARTA MORO SUNDJAJA, BAHTIAR S. ABBAS, VINI MARIANI, YULIA MAGDALENA |
Abstract: |
Recently, museum management in Indonesia use social media for creating the
museum profiles and sharing information about the exhibitions, services, museum
activities, and collections. However, the research on the phenomenon of applying
social media marketing to museums has been investigated by international
researchers, but has never been done by researchers in Indonesia. This study has
a focus on testing whether the Museum Facebook Fan Page User Experience is a
mediator or moderator variable between user motivations and user expectations of
intention to use Facebook Museum Fan page and whether the online community
involvement moderates the relation between the Facebook Fan Page usage intention
to the visit museum intention. The research design is the quantitative approach.
Data was collected using a questionnaire distributed to followers of the museum
Facebook Fan Page in Indonesia. The researchers was randomly select the museum
Facebook Fan Page and online cultural community Facebook groups in Indonesia.
The sample size was 270 respondents. The data analysis is the Structural
Equation Modeling analysis method using AMOS Ver. 22. In this study, eight
hypotheses are accepted and one hypothesis is rejected. The r2 of the Facebook
Fan Page usage intention is 0.446, it means that the variable can be explained
by user expectations, user motivations, and Facebook Fan Page User Experience.
The r2 of the visit museum intention is 0.350, it means that the variable can be
explained by the Facebook Fan Page User Experience and online community
involvement. The contribution of this research is to contribute the Facebook
Adoption model that accommodates the Facebook Fan Page usage experience and the
online community involvement for marketing and cultural education in the Museum
industry in Indonesia. |
Keywords: |
Facebook Fan Page User Experience, User Motivations, User Expectations, Online
Community Involvement, the Facebook Fan Page Usage Intention, the Visit Museum
Intention. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
IRBYTSA: A NOVEL LINK-SCHEDULING ALGORITHM FOR IEEE 802.15.4E TSCH NETWORK |
Author: |
IMAN HEDI SANTOSO, KALAMULLAH RAMLI |
Abstract: |
This paper proposes a novel algorithm named IRByTSA, as a scheduling algorithm
that is both simpler and faster than TASA, in terms of its speed in generating
link-schedule decision. The simplification makes IRByTSA a low-complexity
algorithm. The IRByTSA algorithm owes its relatively low complexity to the
following procedures: maximum matching to generate link-schedule; maximization
of nodes performing simultaneous transmissions by prioritizing from
higher-ranking nodes to leaf node; transmission of all queued data packets in
bursts (bursty); and provides each node with a transmission opportunity based
solely on turn. The research confirms that the resulting complexity is , which
indicates that IRByTSA is a low-complexity algorithm. The advantage of using
such a fast and low-complexity algorithm is increased network scalability, as
the reduction in complexity and increase in speed enable the existing PCE to
serve additional networks. |
Keywords: |
IoT, IEEE802.15.4e, Scheduling, Algorithm, Matching. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
A MULTILEVEL PRINCIPAL COMPONENT ANALYSIS BASED QOS AWARE SERVICE DISCOVERY AND
RANKING FRAMEWORK IN MULTI-CLOUD ENVIRONMENT |
Author: |
A V L N SUJITH, Dr. A. RAMA MOHAN REDDY, Dr. K MADHAVI |
Abstract: |
With the rapid increase in the utilization of the cloud services, various cloud
service providers are keeping their efforts in the design and development of the
Quality of Service (QoS) aware composite services that satisfy the user
preferences. QoS aware cloud service discovery and selection is considered as an
NP-hard problem due to the existence of similar cloud services in different
cloud environments. Existing cloud service selection mechanisms adopt the
procedure of calculating the weighted summation of the QoS attributes to select
cloud services. But due to the lack of correlation between the QoS preferences
of the cloud service, these approaches may produce inaccurate results. In this
paper, a multilevel principal component analysis (PCA) based service selection
mechanism is proposed to discover and rank the services based on the user
preferences in a multi-cloud environment. Modified PCA based service agent is
deployed to select the services on analyzing the QoS correlations if each
service. Finally, the experimental results show that our proposed mechanism
outperforms the existing service selection techniques in terms of computation
time and reduction of discovery overhead. |
Keywords: |
Cloud Computing, Service Ranking, Principal component analysis, cloud service
selection, Quality of service |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
A BELIEF FORECASTING METHODOLOGY TO PRESERVE DATA SECURITY AND PRIVACY IN MANET
ROUTING |
Author: |
K. RAMESH RAO, S. N. TIRUMALA RAO, P. CHENNA REDDY |
Abstract: |
The importance of data communication in wireless network demands a complete
belief system through which the data security and privacy can be preserved
during communication. Even the increase of the utilization of wireless data
sharing especially in short-range communication or ad hoc network suffers from
impersonation and DoS attacks. It is highly important to identify the belief
nodes which supports the sort range or hop based communication to have a secure
and privacy routing. In this paper, we propose a Belief Forecasting Methodology
(BFM) to forecast the routing node about the believing nodes to improvise the
data privacy routing in MANET. The goal of the BFM to protect the network from
the malicious intruders and secure the data privacy during routing. It will
compute the Belief Weight (BW) prediction based on the node activity and
trustiness to decide the level of privacy of a node to support routing. The
experiment simulation was performed through intruding malicious node in the
network to evaluate the improvisation, and the result analysis suggested the
effectiveness of the BFM to preserve the routing privacy in comparison of
different evaluation measures. |
Keywords: |
Belief, Trust, Data Security, Privacy Routing, MANET |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
THE CONCEPT OF PINK MARKETING: A META-ANALYSIS FROM THE GENDER DIFFERENCES
PRESPECTIVE |
Author: |
OSAMA AHMED ABDELKADER, AKRM AHMED ABDELKADER |
Abstract: |
Women are half the society, but so far women's issues have not been given proper
attention in marketing researches. The world needs review papers cover furtherly
the nature of dealing with women, with full respect for their rights, without
being considered them as second-class populations on this planet. Thousands of
scientific studies have identified dozens of gender differences between males
and females in most physical, medical and behavioral fields. But literature
needs researches that combine these gender differences in order to achieve
effective integrations between men and women rather than racial discrimination
against women. 17 meta-analyses papers were included in this current study; the
results identified more than 74 fundamental differences that must be observed
when dealing with women to achieve effective communication. The depended
meta-analyses studies covered 1863 of previous studies; their samples were
collected from more than 58 countries. One of the seventeen meta-analyses
studies was added by this present study, it includes 65 of previous studies. The
essence of the modern concept of marketing can be expressed in the question:
"How (you/and what you offer) to be accepted from others?" therefore, this study
presents a significant contribution in this context by suggesting the academic
proposal of the "Marketing Pink" concept. It also could be considered as a
strong review paper on the context of how to achieve more effective
communication between women and men. Future researchers can address the
components of the pink marketing mix and analyze other areas of gender
differences to support the issues of successful dealing with women. |
Keywords: |
Meta-Analysis, Review Paper, Pink Marketing, Gender Differences, Women Studies,
Communication Skills, Negotiation, Persuasion |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
FACTORS INFLUENCING INFORMATION TECHNOLOGY PROJECT MANAGEMENT SUCCESS IN THE
FINANCIAL INDUSTRY |
Author: |
MOHD SAZILI SHAHIBI , SHAMSUL ANUAR SARIFUDIN , NORHAYATI HUSSIN , ZAHARUDIN
IBRAHIM4, JUWAHIR ALI , SHAMSUL KAMAL WAN FAKEH |
Abstract: |
This study expounds five factors including twenty aspects of project management
factors that influenced Information Technology project success, such as scope
management, time management, cost management, quality management and people
management whose impact on the successfulness of project delivery was assessed
through the survey in several project-based departments of financial industry in
Malaysia. The purpose of the study is to examine the significant relationship
between the project success and the management of iron triangle artifacts which
include quality and people management, in order to ensure more positive outcomes
in banking project delivery. Depending on the theoretical framework the
questionnaire was compiled and it covered five relevant management areas
including project success factors. The questionnaire was used as a data
collection technique. The observation and the statistics revealed that proper
management of scope, time; cost, quality and people have a strong influence on
Information Technology project success. There is also a necessity for further
research which arises from certain limitations of the study. Further research
should cover those management factors that have not been covered in this study.
It also investigates in-depth those practices that show the most significant
correlation with project success. |
Keywords: |
Library And Information Science, IT Project Management, Project Management,
Banking IT Project) |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
HYBRID MODEL, NEURAL NETWORKS, SUPPORT VECTOR MACHINE, K-NEAREST NEIGHBOR, AND
ARIMA MODELS FOR FORECASTING TOURIST ARRIVALS |
Author: |
PURWANTO, SUNARDI), FENTY TRISTANTI JULFIA, ADITYA PARAMANANDA |
Abstract: |
An autoregressive integrated moving average (ARIMA) model has been succeed for
forecasting in various field. This model have disadvantages in handling the
non-linear pattern. Artificial Neural Networks (ANN), Support Vector Machine
(SVM) and K-Nearest Neighbor (k-NN) models can be considered to handle
non-linear pattern. Neural network, SVM and k-NN models have also succeed for
forecasting in various fields and these models yield mixed results of
performance. In this paper, we propose a hybrid model combining ARIMA and
Artificial Neural Networks model with optimum number of neuron in input layer,
optimum number of neuron in hidden layer, optimum of activation function for
forecasting tourist arrivals. The forecasting accuracies of the models are
compared based on tourist arrivals time series data. The proposed hybrid model
yield better forecasting accuracies results compared to ARIMA, K-Nearest
Neighbor, neural network and Support Vector Machine with various kernel. |
Keywords: |
Hybrid Model, ARIMA, K-Nearest Neighbor, Artificial Neural Networks, Support
Vector Machine, Forecasting Tourist Arrivals |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
A COMPREHENSIVE ARCHITECTURE FOR SECURING VIRTUALIZATION ENVIRONMENT IN AN HYPER
CONVERGED SYSTEMS |
Author: |
DR. AHMAD RAZA KHAN |
Abstract: |
As virtualization enhances the use of computing and scalability of computing
resources it's important to secure these resources and the applications which
are running on the virtualization environment. Most of the small and medium
scale businesses are switching over to virtualization environment so that the
capital expenditure CapEx can be reduced and the operational expenditure Opex
can be increased this can be achieved only by switching to the virtualization
environments running multiple machines on highperformance services or
hyper-converged environments. As a huge number of virtual machines are running
on the virtualization environment it becomes critically important to protect
each virtual machine from getting attacked by various intruders such as
attackers, viruses, and malware. In this research we are proposing a
comprehensive architecture and deployment method for virtual machines on the
hyperconverged environments so that data and applications running on the
environment will be protected from the attacks that are taking place and also
thin provisioning of the virtual machines so that exact capacity of the disk
storage is available to the virtual machine to compress its data on the virtual
image or the .vmdk, .nvram and .vmem files which are stored on the
hyper-converged environments |
Keywords: |
Virtualization, security, virtual machines, hyper converged, cloud computing |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
MATHEMATICAL AND COMPUTER MODELS IN ESTIMATION OF DYNAMIC PROCESSES OF VEHICLES |
Author: |
ASSYLKHAN ASSEMKHANULY, ZHANSAYA NIYAZOVA, RAIGUL USTEMIROVA, ALEXSANDR KARPOV,
ABIL MURATOV, KABDIL KASPAKBAYEV |
Abstract: |
A great role in the evaluation of questions of the interaction of the rolling
stock and the path, along with full-scale experiment and laboratory research,
belongs to the methods of mathematical modeling. The proposed method allows us
to consider the behavior of the rolling stock without large expenditures, in a
wide range of dynamic processes. |
Keywords: |
Experiment, Mathematical Model, Rolling stock, Running Gear, Speed |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
A FRAMEWORK FOR THE INTEGRATION OF LEAN TOOLKIT IN ITIL FOR MORE FLEXIBILITY |
Author: |
BELKADI SOUKAYNA, CHERTI ILIAS, BAHAJ MOHAMED |
Abstract: |
Due to fast evolution on the services provided by telecommunication companies,
the Information Technology (IT) environment has been gaining an increasingly
importance inside organizations which are under increasing pressure to improve
their efficiency in delivering more and better services to citizens. As a
result, IT governance tools are becoming increasingly important in the operation
of business, namely ITIL (Information Technology Infrastructure Library)
framework which has positioned itself as a generic solution to tackle a broad
range of IT service Management (ITSM) issues and try to guide IT managers in
their endeavors. However, researches about ITIL framework has been mostly
restricted on the best practices of ITIL to the implementation of incident,
problem and change management processes, but few of them focus on its
improvement using lean methodology. Also the initiatives taken to improve ITIL
processes using Lean have some limitations as they do not address all Lean’s
principles and goals. The aim of this work is to study an innovative approach of
Lean methodology applied to ITIL by representing an ontological framework of
ITIL using Lean Toolkits and by developing a model with deeper explanation of
the various concepts of Lean that could be used for qualitative use of ITIL
service lifecycle, We will try in this paper to show how Lean, from the world of
manufacturing, applies to ITIL can improve the performance and the safety of the
information system. |
Keywords: |
ITIL ; Lean IT; IT Services; Framework; Ontology, Improvement; Costumer; Value;
Waste; Quality |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
E-PARTICIPATION ADOPTION OF GOVERNMENT SERVICES IN IRAQ: A PILOT STUDY |
Author: |
MUSTAFA A. A., FAIZAL M.A., AL-MANSOR BIN ABU SAID |
Abstract: |
The purpose of this study is to validate the reliability of the questionnaires
items in order to make sure that items are ready to be utilized in the main
survey of adopting an e-participation model for e-government in Iraq. Three main
theories and models have been utilized in addition to three ICT related
constructs for the formation of the new integrated e-participation model in
Iraq, namely, the Diffusion of Innovation theory (DOI), the Technology
Acceptance Model (TAM) and Uses and Gratification theory (U&G) in addition to
three other ICT related variables namely, ICT Infrastructure, Security and
Privacy. As a result of this pilot study, all variables items have shown
acceptable values of Cronbach’s alpha, namely, e-participation, perceived
usefulness, perceived ease of use, relative advantages, compatibility,
complexity, security, cognitive need, social need, except for three variables
have shown excellent values including ICT infrastructure, privacy and affective
need. This study contributes to the body literature of e-government adoption and
to the technology adoption literature in Iraq. |
Keywords: |
Pilot Study, E-government, E-participation, Adoption, Information and
Communication Technology, and Survey. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
WEB MINING BASED CLOUD SERVICE RANKING AND RECOMMENDATION MECHANISM FOR
PERSONALIZED USER IN CLOUD COMPUTING |
Author: |
R. SHANTHI , S.P. RAJAGOPALAN |
Abstract: |
Lately, there is a rapid increase in the demand of CC-Cloud Computing. Companies
offering cloud services have are now endowed with new enhancement in their list
of services which includes: WB-Web Mining and DM-Data Mining taking into
consideration variety of available computing resources. Recently, the
RS-Recommender systems are offering improvised services to the users by
minimizing the user’s cost time so as to quickly achieve the required outcome.
The approach of Cloud computing is the need of the hour and has turned out to be
the computing infrastructure for the present generation computing. There exist
numerous cloud vendors offering varied sort of cloud services as mentioned in
the SLC - Service Level Catalogue. Selecting the best suitable cloud service for
particular applications tends to be a difficult task. Among various challenges
and issues faced by the CSP (cloud service provider), disappointment among the
users related to the CSP stands the prime most. The reason being that there
exists numerous cloud services having same functionalities but different
non-functional attributes. In order to identify the most appropriate CSP the
most suitable cloud service attributes and selected quality along with the
feedback of the users is taken into consideration. In this research work
proposed to achieve to Rating based service selection techniques for best cloud
services selection processing and Multi-step matching algorithm for predict the
best cloud service to be recommended personalized users. The main objective of
this work is to recommend a methodology for choosing the most appropriate cloud
service for the users from the environment of cloud computing. The mechanism
updates the cloud service provider dynamically in order to deliver services. The
constructed structure and related workflow involves following stages:
first-cloud service filtering, second - selection, third - prediction, lastly,
Ranking and recommendations. The CSS (cloud services selection) then handles the
system by employing Rating Based Selecting Techniques, further, selecting
quality and most appropriate cloud services is predicted by adopting MSM-
Multi-Step Matching Algorithm and eventually, RBSR - Requirement Based
Similarity Ranking Techniques (RBSR) is incorporated for suggesting the top most
cloud service to be ranked to the personalized user. The scope of this research
is to recommend best cloud service for personalized user. It’s observed and
analyzed that the personalized Cloud services recommendation system is yielding
better performance compared to the present proposed techniques. |
Keywords: |
Cloud services, Multi-Step Matching Algorithm, Requirement Based Similarity
Ranking Technique, Service Level Catalogue, Cloud Service Selection, web mining,
and recommendation system. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
Title: |
FAILURE MODE EFFECT AND CRITICALITY ANALYSIS (FMECA) FOR DETERMINATION TIME
INTERVAL REPLACEMENT OF CRITICAL COMPONENTS IN WARSHIPS RADAR |
Author: |
BAMBANG SUHARJO , OKOL SRI SUHARYO , ADI BANDONO |
Abstract: |
Using of radar navigation in Indonesian Warships, specialty in Patrol Boats Unit
of Indonesian Eastern Fleet is very vital as remote sensing devices in
navigation. It’s using must exist absolutely at the time of Indonesian Warships
carry out operations, so the readiness of radar navigation will greatly affect
the implementation of the tasks performed. This study aims to obtain critical
components on navigation radars on warships and also aims to obtain a critical
time interval for replacing critical components of the navigation radar so that
warships are ready to operate. In the next stage this research also aims to
calculate the cost of critical component replacement components based on the
Cost Benefit Ratio (CBR) method. In this paper proposed FMECA models in
determining the critical components of Navigation Radar. Failure Mode Effect and
Criticality Analysis (FMECA) is used as a methodology to identify and analyze
all potential failure modes of various parts of the system, the effects of the
failure of the system, how to avoid failure and to reduce the impact of failure
on the system. Based on the model is obtained Risk Priority Number (RPN) that is
used as a reference value in determining the critical components. RPN value of
each component is analyzed by Risk Matrix, from 27 (twenty-seven) components
that have been identified, There are obtained seven (7) components that are
considered critical: Modulator, Power Supply Scanner, Diodes Limiter, Magnetron,
Receiver, Motor, and Circulator. The modulator has the highest RPN value, 24180
and Plotter Control Circuit has the lowest RPN value, 3289. Determining the
time interval replacement of critical components that have been obtained using
the approach Reliability and Cost Benefit Ratio (CBR). Results indicate that the
component replacement Diode Limiter has the fastest time, 152 days. While the
replacement of components with the longest time are Motor and Circulator, 458
days. CBR value for all of the critical components are less than 1 (CBR <1), it
shows the recommendation of replacement cost was efficient. Diode Limiter has
CBR value that is the most efficient, namely 0.57572. From sensitivity analysis
is obtained that Reliability R(t) variable greatly affects the determination of
the change in the time interval replacement of critical components, in which
there are parameter β (slope), Ƴ parameter (location), and the parameter Ƞ
(scale). Parameter β more influence on changes in the value of Reliability R(t). |
Keywords: |
FMECA, Risk Priority Number (RPN), Reliability, Time Interval of Replacement,
CBR. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2019 -- Vol. 97. No. 10 -- 2019 |
Full
Text |
|
|
|