|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
June 2019 | Vol. 97
No.12 |
Title: |
DEVELOPMENT OF SUSTAINABILITY SYSTEMS FOR OPEN GOVERNMENT DATA (OGD) MANAGEMENT
BY COMBINING THE SHEL MODEL AND SOFT SYSTEMS METHODOLOGY ANALYSIS |
Author: |
RETNOWATI RETNOWATI, DANNY MANONGGA, HARI SUNARTO |
Abstract: |
OGD is an agreement of countries in the world to implement disclosure of public
information. This agreement is also applied in Indonesia. One of the most
important problems in managing Open Government Data (OGD) is the ability to
collect, classify information, publish, and present information. OGD management
in Indonesia is carried out by the Information and Document Management Officer
(IDMO). Research on OGD in Indonesia is still very minimal and limited to the
issue of initiating the implementation of OGD. In fact, the problems that occur
are not only at the organizational level, but also need to be focused on the
actors or information management employees working on IDMOs. The important thing
is how OGD should be managed, so that all information which are produced must be
carried out for the benefit of the community. When the right OGD management
model can be carried out, then the concept of service to the community should
also be developed and implemented as better as possible as a manifestation of
the sustainability of OGD implementation. This study uses a qualitative method
with the chosen rationality approach is the soft systems methodology (SSM). The
results obtained from this study are the OGD management model that adopts the
SHEL concept, namely strengthening the understanding, use and strengthening of
software, hardware, environment and life-ware. And when the SHEL can be done
well, the concept of service to the community must also be improved by adopting
the concept of RATER (Reliability, Assurance, Tangible, Empathy, and
Responsiveness). The combination of SHEL and RATER is a conceptual model and
change plan to strengthen management and maintain the sustainability of OGD
implementation in Indonesia through IDMO in all local governments. |
Keywords: |
Shel Model, RATER, Soft-System Methodology, OGD Management, OGD Sustainability |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
ANALYSIS OF THE FACTORS AFFECTING REPURCHASE INTENTION IN SOCIAL COMMERCE IN
INDONESIA |
Author: |
WULAN YUWANTI, ATUR SUMEDI, TOMMI RAHMAN PERDANA, SFENRIANTO, SFENRIANTO, EMIL
ROBERT KABURUAN |
Abstract: |
E-commerce use in Indonesia continues to increase rapidly to market a product or
service. Currently e-commerce has new a new form which is called social
commerce. Social media is used by social commerce as a tool for buying and
selling transactions because of its ease. Thus, interesting to know what causes
customers to do repurchase intention in social commerce. For this reason,
authors conducted research to look for factors that have significant influence
on intention to repurchase in social commerce. The variable of this research
model uses variable of customer experience, customer satisfaction, service
quality, information quality and trust. Total of respondents in this study
amounted to 384 respondents using Multiple Linear Regression as analytical
method. In this sudy, the result shows that customer experience, customer
satisfaction and service quality significantly influence the repurchase
intention in social commerce. Meanwhile, information quality and trust have no
significant influence on repurchase intention in social commerce. |
Keywords: |
E-Commerce, Social Commerce, Repurchase Intention, Multiple Linear Regression |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
IMAGE INDEXING AND RETRIEVAL USING VISUAL PERCEPTUAL LEARNING IN HUMAN OBJECT
RECOGNITION |
Author: |
FIRAS ABDALLAH, SHADI KHAWANDI, ANIS ISMAIL |
Abstract: |
Image indexing and retrieval became an interesting field of research nowadays
due to the lack of advanced methodologies to index and retrieve images and to
the existence of huge quantities of images available everywhere; especially on
the web. The available solutions are able to find similar items having the exact
shape but not the same item if it has a different shape. In this paper, we
propose cloning the human being visual perception and cognitive learning to
recognize, index and retrieve images. In Computer Vision, Mesh data structure is
used for its capacity of neighboring, therefore Mesh data structure will be used
for the fact that human being groups objects in categories where neighboring is
essential for indexing and retrieval. The proposed methodology is intelligent in
the way that retrieving images lead into an insertion of the searched image. In
addition to that the proposed solution will be able to recognize items having
different shape from their features. |
Keywords: |
Image, Indexing And Retrieval, Visual Perception, Cognitive Learning, Shape. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
THE EFFECT OF STATOR WINDING PARAMETER DESIGN TO THE MAGNETIC FLUX
CHARACTERISTICS IN HIGH-SPEED MOTOR APPLICATIONS |
Author: |
WAWAN PURWANTO, HASAN MAKSUM, TOTO SUGIARTO, M NASIR, MARTIAS, FAHMI RIZAL |
Abstract: |
The purposed of this research is an evaluation of magnetic flux characteristics
for the high-speed motors in different stator winding topologies. This is
essentiality for developing a stator arrangement with lower stator leakage and
higher magnetic flux linkage. The topologies of stator parameters are generated
using Hooke-Jeeves optimization, Taguchi method, and response surface
methodology (RSM). The influence of stator winding topologies obtained from
design optimizations are evaluated by using flux linkage finite element
analysis. The stator leakage and magnetic flux resulting from finite element are
verified with prototype motor model produced by Taguchi method optimization. The
result confirm that proposed designs reduce stator leakage reactance and
increase magnetic flux linkage than initial design had. A comparing of the
optimize design and the prototype experimental results confirm the reasonable of
the suggested motor model. |
Keywords: |
Hooke-Jeeves Optimization, Magnetic Flux Linkage, Response Surface Methodology,
Taguchi Method, Stator Parameters |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
EFFICIENT VERTICAL HANDOFF IN HETEROGENEOUS NETWORK BY CEAM PROTOCOL |
Author: |
FARAH PATHAN , DR. JAYMIN BHALANI |
Abstract: |
Heterogeneous wireless networks comprise of variety of wireless technologies
integrated to satisfy user’s demand. In these heterogeneous networks, the
vertical handover problem exists and causes issues in satisfying user demand
which are tackled by handover algorithm. Even though, the Vertical handover
algorithm tackles the handover problem internally they are in the need to select
optimum network among the available networks with energy preserving for their
efficient process. In order to satisfy the above stated need in this framework,
an Energy Effective Context Based handover algorithm, CEAM (Context and Energy
Aware MADM) Protocol is formulated. Multiple attribute decision making (MADM)
based on CANVI handover algorithm are capable in selecting optimum network
having requisite set of context parameters. Context information related to
quality of service parameters offered by networks varies with movement of mobile
terminal, which is more efficient, and optimal way of content finding by ANFIS
and similarly the ideal solution is found out by vector normalized preferred
performance based VIKOR method. The performance has been analyzed for
conversational traffic and compared with other available normalization methods
based on CANVI (Context Aware ANFIS-VIKOR) Algorithm and energy efficient
resource allocation by Mutt FG-CRA algorithm. Simulation results show that the
proposed algorithm performs better in terms of network selection and number of
handovers as compared with other methods used in this work. |
Keywords: |
ANFIS, CANVI, CEAM, FG-CRA, VIKOR |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
EFFICIENT LOW DETAILED IMAGE ENCRYPTION USING LOGISTIC MAP AND FrFT TRANSFORM IN
DIFFERENT MODES OF OPERATION |
Author: |
ASHRAF AFIFI |
Abstract: |
This paper presents an efficient encryption for low detailed image using
logistic map and fractional Fourier transform (FrFT) in different modes of
operation. The proposed cryptosystem employed logistic map with the FrFT using
different modes of operation. The proposed cryptosystem is composed of two
phases; encryption phase and decryption phase. The encryption phase began with
applying the FrFT on the few detailed plain image. Then, the plain image is
encrypted using logistic map in different operation modes. While in the
decryption phase, this scenario will be reversed. The efficiency of the proposed
image cryptosystem is investigated using different encryption quality metrics
via simulation. The obtained results confirmed the viability of the proposed
cryptosystem in CBC,CFB, and OFB operation modes. Moreover, the proposed system
is successively applicable in terms of security encryption. |
Keywords: |
Five Image Encryption, ECB, CBC, OFB, CFB, Digital Communications, Few Details
Images. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
SPEAKERS AND AUDITORS SELECTION TECHNIQUE IN ASSESSING SPEECH INFORMATION
SECURITY |
Author: |
YERZHAN N. SEITKULOV, SEILKHAN N. BORANBAYEV, HENADZI V. DAVYDAU, ALEKSANDR V.
PATAPOVICH |
Abstract: |
The article is devoted to the requirements development for speakers and auditors
in assessing speech information security. Speakers selection features and
methods of their preparation for reading the text are considered. The choice of
texts for articulation measurements method when assessing speech intelligibility
and masking it with combined signals is substantiated. A technique for selecting
auditors for auditory sensitivity and their training in speech perception in
conditions of strong noise is proposed. |
Keywords: |
Speech Intelligibility; Voice Information Security; Announcers; Auditors;
Auditory Sensitivity; Articulation Method. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
STUDYING OPEN BANKING PLATFORMS WITH OPEN SOURCE CODE |
Author: |
ANDREY KOLYCHEV, KONSTANTIN ZAYTSEV |
Abstract: |
Intensive growth of public web interfaces started early in 2010; and if
initially API was a procedure of interaction of various software tools, then at
present web interfaces are genuine digital products on the basis of which
companies, especially major companies, can derive profits while providing their
internal services to third parties via open API. Banks are not an exception.
They also can derive profits by providing access to their internal services for
third-party developers. The advantage of banking enterprises is that they
possess unique data and services, which can hardly be competed. As a
consequence, there appeared the software market for the development of open
source API and provision of access to them with monetization capabilities. API
management platform is comprised generally of three components: developer site,
API development tools, and API gateway. API gateway is the most important
component since it is responsible for interface operation; hence, this work is
aimed at the determination of the most efficient API gateways. Three software
variants have been considered: Gravitee API Platform, APIMan, and WSO2 API
Manager, which meet two preset criteria: Java product implementation, open
source code of the product. The study has been performed in comparison
environment with three coordinates: intensity of performed functions for API
development, labor intensity of API implementation, the performance of API
gateway. During the experiments, Gravitee.io API Platform was the best software
with regard to each coordinate. |
Keywords: |
API Management, API Management System, API Platform, API Manager, API Gateway,
Open API, Software Functionality, Performance |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
FACE RECOGNITION: LITERATURE REVIEW WITH EMPHASIS ON DEEP LEARNING |
Author: |
RAJESHWAR MOGHEKAR, SACHIN AHUJA |
Abstract: |
Under the broad umbrella of object recognition, Face recognition is one area
with active research for last few decades mainly due to its applications and the
challenges in the environment where they are used. The face recognition as a
biometric authentication can work without much cooperation of human. The current
face recognition techniques perform well in constrained environment but
performance degrades in unconstrained environment as the images captured may
vary in resolution, illumination, pose, occlusion and expressions. This
sometimes makes intra class variance more than the inter class variance and
leads to misclassification. In this article, an overview of some of the
strategies adopted by the researchers to overcome the challenges like pose
variation, low resolution and occlusion in unconstrained environment has been
discussed. Moreover, this paper reviews the use of deep learning in face
recognition to achieve accuracy at par with humans in image classification
tasks. We also discuss the challenges with Deep learning and the strategies
adopted to overcome them. This paper provide an up-to-date review of face
recognition techniques. |
Keywords: |
Face recognition, Deep Learning, Low resolution, Occlusion, Pose invariant. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
DISCRETE EVENT SIMULATION AS AN INNOVATIVE APPROACH TO SUPPORT EDUCATION AND
AWARENESS STRATEGIES IN ROAD SAFETY AND PREVENTION |
Author: |
KHADIJA OUAZZANI TOUHAMI, SALIHA ASSOUL, NISSRINE SOUISSI |
Abstract: |
Nowadays, a large part of African countries, and all over the world, don’t cease
to make considerable efforts, especially in recent years to advance and predict
possible strategies and policies for more effective road safety and prevention.
Indeed, the number of accidents and victims continues to increase, in the world
and in Morocco, this despite the efforts undertaken by the competent
institutions, knowing that the reasons in question are generally related to
human factors and behaviors, which justifies the relevance of interest to this
case. At our level, we believe that the use of new technologies in this area, as
well as some techniques of decision support, can be of a great contribution, and
thus contribute largely to the development of the countries. So far, the
Moroccan Ministry of Equipment, Transport, Logistics and Water, is generally
based on statistical studies to decide on points to focus and awareness
strategies and education in prevention and road safety. In this article, we
propose to use discrete event simulation, as a tool to help road education in
the perspective of better occupation and sharing of road space. The principle of
this approach would be to compare, through simulation, different scenarios or
policies to prevent traffic accidents, and to measure the impact of the
variation of a risk factor, or a combination of factors, concerning the behavior
of drivers, on the improvement of road safety. This could have a real impact on
the mastery and regulation of road traffic. The results of these simulations
could be the subject of didactic bracket, which can be used in support of road
user awareness and education workshops, for better prevention and road safety. |
Keywords: |
Discrete Event Simulation, Didactic Approach, Prevention and Road Safety, Risk
Factors, Driver Behavior. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
LICENSE PLATE DETECTION AND REFINEMENT BASED ON DEEP CONVOLUTIONAL NEURAL
NETWORK |
Author: |
HOANH NGUYEN |
Abstract: |
In this paper, a new method for detecting license plate in natural scene images
based on deep convolutional neural networks. Faster Region-based convolutional
neural network framework (R-CNN) and MobileNets architecture are used to design
our framework for license plate detection. Edges information of license plates
is then used to refine the detected bounding boxes and further improve the
performance on small license plates, which are not easy to regress precisely. We
train and evaluate our framework on public datasets. The results show that our
method can apply to different types of license plates with better performance
than current state-of-the-art methods in terms of detection accuracy and
run-time efficiency. |
Keywords: |
License Plate Detection, Convolutional Neural Network, Intelligent
Transportation Systems, Object Detection, Deep Learning |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
A NEW ROBUST APPROACH FOR SECURING DATA TRANSMISSION |
Author: |
NIDAL M. TURAB , JAMAL ZRAQOU |
Abstract: |
Much research work is conducting to find algorithms for embedding hidden
information that contribute in the fields of developing watermarking and
steganography. The research work introduced in this paper aims to propose an
approach for sending data securely by embedding a hidden cypher text in a stream
of images. This study presents an algorithm for hiding information in key frames
of a coloured video and then retrieving these data securely and efficiently. Two
things should be taken into account, the embedded information should be
invariant to the possible changes that might occur for video conversion from one
format to another and not all the video frames will be used for hiding the
information. Consequently, this research will focus on how to recover the exact
version of the original frame in case of any manipulation or update. The
proposed work can be divided into two parts, the first one is applying a data
encryption method to generate ciphertext, and the second part is to embed the
cypher text into frames of a video. The proposed algorithms then are being able
to retrieve the original text from the frames efficiently and securely. This
research study focuses on contributing more knowledge in both fields. |
Keywords: |
Encryption, Decryption, Embedded Key, Transform Coding |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
ANALYSIS OF INTELLIGENT INFORMATION SYSTEM FOR V2V AND V2I |
Author: |
NAMGI KIM |
Abstract: |
In smart transportation intelligent information systems, it is possible to
communicate between car and car or car and intra for data TX/RX. Then, a car
density is related to delay of data TX/RX and energy consumption of sensor nodes
and has the correlation of distance between cars. In this paper, we analyze the
latency and energy consumption in grid topology which is environment between
cars and star topology which is environment between car and infra. Communication
latency means total time that each car finds their neighbor cars or infra in
particular topology. The amount of energy consumption means that cars consumes
their batteries during total neighbor finding times. These analysis results are
useful in smart transportation intelligent information system when communicating
between people and everything. |
Keywords: |
Sensor Network, Smart Traffic, Neighbor Discovery Protocol, M2M |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
DATA VISUALIZATION: TOWARD VISUALIZATION AWARENESS IN OVERLAPPED DOTS MANAGEMENT
TECHNIQUES |
Author: |
WAN AZZURA WAN RAMLI, ZAINURA IDRUS, ZANARIAH IDRUS, SITI NURBAYA ISMAIL |
Abstract: |
Today, lead business, government and academic leader used data visualization to
make better decision for the specific problem. Data visualization is used to
visualize and analyze complex data in various fields of knowledge. However, in
dot-plot based visualization, over plot or overlap dot occur when visualizing
huge data. The overlapped dots, is a scenario where dots are plotted on top of
each other. When this occurs, they create convoluted and confusing visual and
data presented are not accurate. There are various techniques to manage
overlapped dots. However, the discussion is on the individual technique and
grouping them into their similarities is rarely discussed. Moreover, the
discussion hardly focuses on the impact of such techniques to visualization
awareness. The awareness is where users are aware that the original data have
gone through some pre-processed stage thus, what appears on the visual form is
the distorted version of the data. Thus, in order to reduce the gap, two
objectives have been set. The first objective is to identify the similarity
among the techniques through their behaviors. The second objective is to analyze
the impact of such behaviors to visualization awareness. To achieve the
objectives, fifteen commonly dot overlapped management techniques have been
identified and their behaviors are analyzed. The behaviors are then grouped into
six main behaviors. Finally, ten impacts of the behaviors to visualization
awareness have been identified. Such awareness is important as part of the input
during pattern extracting stage. |
Keywords: |
Overplotting, Overlap, Data Visualization, Dot Management Technique |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
ANALYSIS OF ENTERPRISE ARCHITECTURE COMPLEXITY: MODELING AND DIAGNOSIS
HETEROGENEITY |
Author: |
JIHANE LAKHROUIT, KARIM BAÏNA |
Abstract: |
The management of heterogeneity is of particular importance today. This new
problem is being tackled more and more by several works in various fields of
research. Among these areas is Enterprise Architecture EA, some work has been
limited to defining the various types of complexity measure, while others have
focused on the representation or direct calculation of different measures. In
our contribution we propose a complete methodology ranging from the discovery of
measurements to the implementation of the prototype. |
Keywords: |
Enterprise Architecture; EA patterns; Analysis of Enterprise Architecture;
Complexity; Heterogeneity. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
A FUZZY-BASED SMOKE DETECTION ON EMBEDDED SYSTEM |
Author: |
HOANH NGUYEN |
Abstract: |
This paper proposes a new method for smoke detection based on the characteristic
of color and movement of the video obtained from a static camera. Firstly,
background subtraction algorithm is used to detect the motion and distinguish
between motion and non-motion object on each frame. Secondly, color of each
pixel of the moving regions is checked and compared with the typical of color of
smoke such as gray, white and black. Thirdly, because smoke has rapid growth as
soon as it formed, this paper calculates the growth rate of the moving regions.
Finally, a fuzzy logic system is developed to process all previous results.
Output threshold of the fuzzy system can be adjusted to adapt to environment
conditions. The proposed method is implemented on embedded system to ensure
execution speed in real-time, so we can develop future applications such as
integrating into the surveillance camera, building a firefighting robot and so
on. Experimental results on different videos in different environments show that
the proposed method is very effective and achieves high accuracy in the
detection of smoke. |
Keywords: |
Smoke Detection, Image Processing, Computer Vision, Fuzzy Logic System, Embedded
system |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
SIMULATING FAULT TOLERANCE IN CLOUD COMPUTIN BY MIGRATION USING CLOUDSIM
SIMULATOR X |
Author: |
GHAITH AL ROSTOM |
Abstract: |
The concept of cloud computing refers to the resources and computer systems
available over the Internet through which we can provide a number of integrated
computing services without being restricted to existing local resources, but the
dynamic nature of cloud computing can suffer from many faults that affect the
quality of service provided to the customer. The ability of the system to
respond and deal with these faults determines its ability to tolerate faults and
thus affect the quality of service provided. The main objective of this
research is to achieve faults tolerance by using the CloudSim simulator, by
using a random model that generates faults in processors (PE) in a virtual
machine (VM), and then applying a proposed algorithm in this search which
migrates the existing Cloudlets from the disabled virtual machine on a host to
another virtual machine on another host. In the first stage, the fault
generation was achieved within the CloudSim simulator, and in the second stage,
the faults were processed by implementing migration algorithm. The results
showed a high reliability and availability is relatively good when the number of
performed cloudlets multiplied tenfold. |
Keywords: |
Cloud Computing, Fault Tolerance, Fault Detection, Cloudsim Simulator. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
EFFECTIVE SEMANTIC TEXT SIMILARITY METRIC USING NORMALIZED ROOT MEAN SCALED
SQUARE ERROR |
Author: |
ISSA ATOUM, MARUTHI ROHIT AYYAGARI |
Abstract: |
The Pearson correlation is a performance measure that indicates the extent to
which two variables are linearly related. When Pearson is applied to the
semantic similarity domain, it shows the degree of correlation between scores of
dataset test-pairs, the human and the observed similarity scores. However, the
Pearson correlation is sensitive to outliers of benchmark datasets. Although
many works have tackled the outlier problem, little research has focused on the
internal distribution of the benchmark dataset’s bins. A representative and
well-distributed text benchmark dataset embody a wide range of similarity scores
values; therefore, the benchmark dataset could be considered a cross-sectional
dataset. Although a perfect text similarity method could report a high Pearson
correlation, the standard Pearson correlation is unaware of correlated
individual text pairs in a single dataset’s cross-section due to outliers.
Therefore, this paper proposes the normalized mean scaled square error method,
inferred from the standard scaled error to eliminate the outliers. The newly
proposed metric was applied to five benchmark datasets. Results showed that the
metric is interpretable, robust to outliers, and competitive to other related
metrics. |
Keywords: |
Pearson, Absolute Error, Text Similarity, Correlation, Scaled Square Error,
Outliers |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
LITERATURE REVIEW OF AUTHENTICATION LAYER FOR PUBLIC CLOUD COMPUTING: A
META-ANALYSIS |
Author: |
ABDALLA ELDOW, MOHANAAD SHAKIR , MOHAMMED AHMED TALAB, AHMED KH. MUTTAR, RAGAD M
TAWAFAK |
Abstract: |
Cloud computing is a8rapidly growing technology due to its8highly flexible uses
and applications. It also has other features such as8simplicity, quick data
access and reduced8data storage costs. Consequently, it has been widely used8by
many organizations. This widespread use of cloud computing among8organizations
causes many security issues. Moreover, cloud computing layers8are likely to be
jeopardized8by many security risks such as privileged8user access, data
location, data segregation, and data8recovery. This paper aims to prepare8an
ample debate of a literature review-based studies that provided important
insights to researchers in the scope of security cloud computing. The researcher
applied a relevant8set of keywords. These keywords are limited8to the title,
abstract and keywords search archives published between 2010 and June 2018. The
database search returned a total of 308 publications. In addition, we conducted
backward-forward searches from the reference lists of relevant, quality previous
works on the security framework in public cloud computing studies. Then, the
researcher filtered the publications to only full text access articles that were
written in English only. Finally, this study obtained a many publication. The
findings of this paper address many important points such as in this study is
recommended to apply behavior recognition with password for improving
authentication layer performance in cloud computing. This study finds most of
current studies neglected the present of human factor in password-based
authentication, and learnability in password-based authentication is highly
weak. Despite this, very few studies have adopted the behavior recognition with
password in public cloud. |
Keywords: |
Authentication, Public Cloud Computing, Security In Cloud Computing,
Password-Based Authentication |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
COMPARATIVE AND ANALYSIS STUDY OF BIOMETRIC SYSTEMS |
Author: |
FAOUZIA ENNAAMA, KHALID BENHIDA , AHMED BOULAHOUAL |
Abstract: |
In recent years, there has been a growing interest in the field of biometrics as
a powerful identification technology. Various biometric technologies are based
on behavioral and physiological analysis; therefore they must be reliable,
robust, simple and cheap. In this paper, we have investigated an analytical
comparison of different biometric systems namely: fingerprint, iris, face,
voice, keystroke dynamics, signature, retina, etc. and we have classified these
methods based on several criteria such as: universality, uniqueness, permanency,
intrusiveness, effort, cost, and reliability, as well as the most used biometric
systems requested in the market and those that are of greater interest in the
current research work, and for each criteria we gave synthetic discussions.
Furthermore, we provided a brief overview of biometric methods, then we have
described the modes used in a biometric system such as enrollment, verification
and identification and we have presented the possible applications of
biometrics. |
Keywords: |
Biometric Systems, Identification, Recognition, Biometrics, Face. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
TASK SCHEDULING ALGORITHM FOR HETEROGENEOUS MULTI PROCESSING COMPUTING SYSTEMS |
Author: |
A. YOUNES, A. BEN SALAH, T. FARAG, F. A. ALGHAMDI, U. A. BADAWI |
Abstract: |
The main purpose of task scheduling is to assign tasks onto available processors
with the aim of producing minimum schedule length and without violating the
precedence constraints. In heterogeneous multi-processing systems, task
assignments and scheduling have a great impact on the system operation. In a
heuristic based task scheduling algorithm, different process will result
different task execution time (makespan) on a heterogeneous computing system.
Thus, a good scheduling algorithm should be capable to efficiently assign
precedence to each subtask depending on the resources required to reduce
makespan. In this report, we propose a genetic algorithm (PGA) to resolve a task
assignment and scheduling for homogeneous and heterogeneous multi-processing
problem. The basic idea of this process is to exploit the advantages of
heuristic-based algorithms to decrease space search and the time needed to get
the best solution. The achieved results show that the suggested approach
significantly outperforms the other approaches in terms of task execution time. |
Keywords: |
Heterogeneous Processors, Genetic algorithm, Heuristi algorithms, Task
scheduling, Multiprocessing |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
HADOOP AND BIG DATA CHALLENGES |
Author: |
ABEDALLAH ZAID ABUALKISHIK |
Abstract: |
Todays technologies and advancements have led to eruption and floods of daily
generated data. Raw data has no value if it’s not analyzed to extract the hidden
insight for business organization. Big data is heterogeneous, unstructured, and
enormous. Collecting, storing, manipulating, interpreting, analyzing and
visualizing Big data shape the dimensions of Big Data life cycle. Big data deals
most of time with unstructured data that require real time and batch processing.
The goal of any big data platform is to extract correlations, hidden sentiments,
patterns, values, and insights of these raw data. However, Big data analytics
pipeline is end-to-end challenging. The paper objectives are of three-folds:
Revisit the big data concept, dimensions and it is characteristics. Second, it
aims to introducing Hadoop open source big data platform and the supportive
utilities. Third, the paper aims to study the underlying challenges that
surround Big data pipeline end to end. |
Keywords: |
Big Data, Big Data Pipeline, Big Data V’s. Hadoop Platform, Challenges |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
THEORETICAL MODEL FOR DEVELOPING ELECTRONIC RECORDS AND INFORMATION MANAGEMENT
FRAMEWORK: CONTEXTS AND APPROACH |
Author: |
AZLAN LONG ABDULLAH, ZAWIYAH MOHAMMAD YUSOF, KAMSURIAH AHMAD, UMI ASMA MOKHTAR |
Abstract: |
The management of electronic Records and Information (ERI) poses great
challenges related to various issues, needs and limitations that have caused
difficulties in implementing the initiative. Thus, it is crucial for an
organization to identify the contexts underlying the issues, needs and
limitation and develop a framework for executing each endeavour. Frameworks
based on theory, technology and mandate purviews leaning towards perfection
seems no longer applicable or appropriate for managing ERI. There is a need to
embrace the concept of reasonableness in managing records in electronic
environment. However, approach for developing electronic Records and Information
Management (ERIM) framework that is a manifestly fit for purpose solution remain
elusive. The aim of this study is to propose a theoretical model for developing
ERIM framework which upholds a fit for purpose solution that manifests the
concept of reasonableness. These explorations and perspectives are based on the
literature review. People, organizations, technologies and processes were
identified as the interrelated contexts underlying the issues, needs and
limitations, while the attainable vision, rationale, practical, relevance and
responsiveness are the criteria which manifest the concept of reasonableness.
Drawing from Design Science Research (DSR) model and Military Decision-Making
process (MDMP) paradigm, a theoretical model for developing an ERIM framework
was proposed. This model provides a holistic approach and systematic process
that will ensure the design frameworks are fit for purpose and manifests the
criteria of reasonableness. |
Keywords: |
Electronic Records and Information Management, Framework, Reasonable,
Theoretical Model |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
Title: |
LIMITED RESOURCES OPTIMIZATION OF HEALTH CARE SERVICES WITH A LINEAR INTEGER
PROGRAMMING APPROACH |
Author: |
A M H PARDEDE, M ZARLIS, H MAWENGKANG, T TULUS |
Abstract: |
If the availability of resources in the service center is very adequate,
services can be carried out optimally, but we cannot be sure in this situation
and even if excessive resources can also result in wasteful costs. If the number
of requests more than the number of resources available at the service center
can result in non-fulfillment of service requests, this can lead to a long queue
of service requests, and if the demand for health care comes from an emergency
patient (prioritized patient) can definitely cause this problem to die need to
be handled better so as not to cause harm to service providers and patients as
service recipients. Health service requests by patients that provide information
about the location and type of service desired will be received by the service
provider / server connected to the internet service, so that health care request
information can be scheduled by the server (hospital health). Communication
between the resources available on the server allocates time for each health
service that maximizes the limited use of resources to meet the patient's health
service needs. The purpose of this study is to simulate the Smart Health model
on health services using linear integer programming, so that the resulting model
can solve the problem of limited available resources that can serve all requests
so that services and services can be done quickly, so as to reduce the risk of
losing lives or risks that can endanger the patient. From the new models
produced, this maximizes health services and minimizes the time of arrival of
medical personnel at the place of request, where when patients request treatment
for medical care from the hospital, health care will be provided according to
the patient's request. |
Keywords: |
Health Care, Hospitals, Optimization, Patients, Services. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2019 -- Vol. 97. No. 12 -- 2019 |
Full
Text |
|
|
|