|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
July 2019 | Vol. 97
No.14 |
Title: |
A NOVEL LEADER ELECTION ALGORITHM FOR HONEYCOMB MESH NETWORKS |
Author: |
MOHAMMED AL-REFAI, YOUSEF ALRABA'NAH, MOHAMMED ALAUTHMAN, AMMAR ALMOMANI,
MOUHAMMD AL-KASASSBEH AND 5MOHAMMED ALWESHAH |
Abstract: |
Leader election is an important issue in distributed systems and communication
networks. Many protocols and algorithms that are running on distributed systems
need a leader to ensure smooth execution; the leader has the responsibility to
synchronize and coordinate the system processes. The absence of the leader makes
the system inconsistent, and therefore unreliable. Such problem, however, can be
solved by leader election algorithms. In this paper, we propose –for the first
time- a new leader election algorithm to solve the leader failure in honeycomb
mesh network. The honeycomb mesh network desired due to its low network cost,
regularity, and scalability. The proposed algorithm aims to select exactly one
node among all active nodes in the network to be a new leader, the node, which
is elected as the new leader, has more priority over other nodes. The
performance of the proposed algorithm is evaluated by computing the number of
messages and time steps required to elect a new leader and complete the
algorithm mission. The mathematical evaluation shows that the proposed algorithm
requires O(n) messages in O( ) time steps in the best case to complete, as well
as O(n1.5) messages in O( ) time steps in the worst case. |
Keywords: |
Leader Election, Distributed Systems, Honeycomb Mesh, Concurrency. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
MEASURING THE PERFORMANCE OF BIG DATA ANALYTICS PROCESS |
Author: |
ISMAIL MOHAMED ALI , YUSMADI YAH JUSOH , RUSLI ABDULLAH , ROZI NOR HAIZAN NOR ,
AND LILLY SURIANI AFFENDEY |
Abstract: |
Big data analytics (BDA) in a process perspective has major benefits towards a
better outcome, thereby satisfied customers and evidence-based practices. The
aim of BDA is to examine and analyze raw data and to derive and extract
actionable insights from it. BDA involves data and tools for processing and
analyzing, and the process which data is handled and managed. BDA process is the
end-to-end process which consists of phases named as data acquisition, data
preparation (integration and preprocessing), data analysis, visualizations and
interpretation. The performance of big data analytics is not merely dependent on
having quality data input, but also on performance of the process which the data
goes through from acquisition to visualization and interpretation. Measuring the
process performance has the benefit of identifying problems and launching
corrective actions before these problems deteriorate. The aim of this paper is
to present the evaluation for BDA process performance. In view of that, the
study identifies the measures, metrics, and indicators for each phase of the BDA
process. A subject-matter expert review and a pilot study were conducted, and
the results obtained were reported in this paper. |
Keywords: |
BDA Process, Process Performance, Big Data, Measures, Performance Measurement |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
DETERIORATION OF VITAL SIGNS BASED ON ARTIFICIAL NEURAL NETWORK |
Author: |
TARIQ IBRAHIM ABDEL LATIF AL-SHWAHEEN, YUAN WEN HAU |
Abstract: |
Tracking and detection of the deterioration of vital signs has always been a
challenging issue since it always happens suddenly and is associated firmly with
serious problems such as recurrent readmissions of patients, increase the
mortalities, and very little time window left for the clinician to take prompt
medical action to treat the patient upon the detection. Many research have
proposed various methods to predict and detect the deterioration of vital signs,
but each of them has some strength and limitation, in terms of algorithm
complexity and detection accuracy. This paper evaluates the capability of
various Artificial Neural Network (ANN) models based on machine learning method
to detect the deterioration of vital signs which consists of heart rate, blood
pressure, body temperature and the saturation of oxygen in the blood. To
evaluate and benchmark the detection accuracy of vital signs deterioration,
various ANN models were constructed with the specific characteristics of each
vital sign as input variables. Results show that the Levenberg-Marquardt ANN
model yields the highest detection accuracy of 95%, hence it is reliable in
detecting the deterioration of vital signs. |
Keywords: |
Artificial Intelligence (AI), Artificial Neural Network (ANN), Deterioration Of
Vital Signs, Machine Learning, Prediction And Detection |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
INTERACTIVE BOOK APP IN BAHASA MELAYU FOR TYPICALLY DEVELOPING CHILDREN AGED
FROM FOUR TO SIX AS A SPEECH THERAPY AID |
Author: |
ZHANG XUAN, SUHAILA ZAINUDIN, BADRULZAMAN ABDUL HAMID |
Abstract: |
Interactive book app is defined as the app which is used for practicing speech
language and literacy skills for children. Language development is the process
by which children come to understand and communicate language during early
childhood. Delayed language development will have negative effects on children’s
daily life. Language development is one of the most important issues in children
development. In the past few years, different kinds of interactive book apps
have been developed. It has been proven that interactive story book app plays an
important role in children's language development. However, it is difficult to
find a suitable app for children, especially for Malay language. This study aims
to develop a suitable interactive book app as a speech therapy aid for typically
developing children aged from 4 to 6 years. In this research, the survey was
conducted among typically developing children aged from 4 to 6 years and their
parents to get the requirement for the interactive book app. The questionnaire
included the basic information about parents and children, requirement of
content and requirement of function. The collected data was analyzed by using
the Statistical Package for Social Science. According to analysis result, the
interactive book app was developed using Java and Android studio. The target for
the app is speech therapy. As a speech therapy aid, the interactive book app
uses three kinds of speech therapy strategies, including: Language intervention
activities, Articulation therapy and Oral-motor therapy. The speech-language
pathologists can use the app to help children do speech therapy activities
easily and correctly. |
Keywords: |
Interactive Book App, Speech Therapy Aid, Typically Developing Children, Malay
Language, Language Development |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
SOCIAL MEDIA IN THE CONSTITUENT INTERACTION AND MOBILITY (CASE STUDY IN THE 2017
JAKARTA-INDONESIA GOVERNOR GENERAL ELECTION CAMPAIGN) |
Author: |
YUNILA LARAS ISMAWANI, LA MANI, MUHAMMAD ARAS |
Abstract: |
The use of social media in general election campaign in Indonesia becomes more
common but the relationship between social media existence in political campaign
and the final vote result still need to be scrutinized. Therefore this study
aims to analyze with a systematic and empirical approach of the social media
usage (Including Facebook, Twitter, and Instagram) by DKI Jakarta governor
candidates for the 2017-2022 period. Based on the observations, we found that
each DKI Jakarta governor candidate has had a popular social media account in
Indonesia, namely Facebook, Twitter, and Instagram. Such media were used to in
conducting political campaigns and interacting with their constituents. Based on
in-depth analysis of the empirical data showed that the presence of social media
in the political campaigns in Indonesia had a strong relationship with the final
results of DKI Jakarta governor election. Relationship between the results of
the general election and the popularity, participation, and activeness of
candidates in using social media were shown not only in interaction quantity but
also in quality of the political campaign contents. Furthermore social media
popularity of the political parties which supported the candidates allegedly had
a relationship with 2017 DKI Jakarta governor election results. |
Keywords: |
Social Media, Constituents, Iinteraction and Mobility, Political Campaigns,
General Election |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
DISCOVERING RANSOMWAREBEHAVIOR BY HOST-BASED APPROACH |
Author: |
MUHAMMAD SAFWAN ROSLI, RAIHANA SYAHIRAH ABDULLAH, WARUSIA YASSIN, FAIZAL M.A. |
Abstract: |
Numerous researchers have discovered multiple types of ransomware that has been
rampaging in cybersecurity which is the main concern for business companies
where most of their data has been digitalized. However, the main problem in
detecting this type of malware, where it is known as sophisticated behavior is
quite challenging since it capable to do encryption in file activity system and
hide its malicious activity in computer host. Nevertheless, previous researcher
also has done major contribution in discovering its pattern and behavior of
ransomware and provide numerous solutions in detecting this malware. This paper
will be focusing on ransomware behavior during normal file activity system by
using host-based approach experiment. The design of the experiment and dataset
collection are one of the main important in this experiment for analyzing the
ransomware behavior using available tools and software. Then, the behavior of
the ransomware will be saved as log file for in-depth analysis. Finally, the
results from the experiment will be tabulated and discussed further before the
conclusion of the experiment. |
Keywords: |
Ransomware, Behavior Analysis, File Activity System, Process Explorer, Process
Monitor. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
IMPROVEMENT OF ACCURACY IN BATIK I MAGE CLASSIFICATION DUE TO SCALE AND ROTATION
CHANGES USING M2ECS-LBP ALGORITHM |
Author: |
ABDUL HARIS RANGKUTI, AGUS HARJOKO, AGFIANTO EKO PUTRA |
Abstract: |
This research evolves feature extraction algorithms in overcoming difficulties
in classifying batik images that encounter changes in scale and rotation. the
algorithm is multiscale and multilevel extended center symmetric local binary
pattern (M2ECS-LBP). In utilizing this algorithm using several types of windows
to obtain optimal feature extraction results, ranging from the size of 6x6, 9x9,
12 x 12 and 15x15 or a combination of several windows. However, for the use of
algorithm carried out sequentially, it also requires a special strategy to
obtain optimal image feature extraction results to support performance accuracy
in the classification. The results of classification accuracy using K-Nearest
neighborhood had reached up until the percentage to 78,4 – 81.7 percent of the
image undergoing changes in scale and rotation. However, if the batik image
undergoes a change in scale but the rotation is the same then the accuracy
percentage can reach 98-99 percent. This algorithm is a very powerful
breakthrough with lighter computing techniques than other algorithms. This
research can be continued to recognize moving images, expected with maximum
accuracy. |
Keywords: |
Scale, Rotation, Classification, Batik, Multiscale And Multilevel, Similarity
Measurement |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
THE EVALUATION OF COMPLIENCE LEVEL OF COMPUTER AND MOBILE FORENSIC WITH ACPO IN
HELPING SPECIAL AUDIT DISCLAIM FRAUD |
Author: |
LELYA NOVITA KUSUMAWATI, FERGYANTO E GUNAWAN |
Abstract: |
The threat on information system security in public service companies is a
dangerous thing that often occur. For example, the electricity company in
Indonesia, PT PLN, sees the high threat especially is fraud that involving
information systems. The company, from 2015 to 2018, found many cases of fraud
using information systems. PT PLN established an audit team to collect fraud’s
digital evidence by implementing computer and mobile forensic that referring to
the guidelines of the Association of Chief Police Officers (ACPO). The purpose
of this study is to measure the comlience level of the audits that have been
carried out with the ACPO guidelines. Forensic digital examination and analysis
procedures must follow and refer to the basic principles or guidelines
(guidelines) internationally, such as the Good Practice Guide issued by the
Association of Chief Police Officers (ACPO) so that the examination output in
the form of digital findings can be accepted as legal evidence at the trial. The
study involves 113 digital evidence from the implementation of computers and
mobile forensics at PT PLN. Surveys that refer to ACPO are used to measure
complience level in handling 113 evidence with ACPO. The results showed that the
average of complience has only reached 51%. In more detail, the proportion of
evidence (in %) and the level of ACPO’s complience (in brackets and in %) are:
37 (57), 21 (48), 20 (52), 19 (43), and 2 (24). |
Keywords: |
Fraud, Computer Forensic, Mobile Forensic, Association of Chief Police Officer,
Digital evidence |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
COMMON PRACTICES IN ELICITING SECURITY REQUIREMENTS OF INTERNET OF THINGS (IOT)
APPLICATIONS |
Author: |
ASMA ASDAYANA IBRAHIM, MASSILA KAMALRUDIN, SAFIAH SIDEK |
Abstract: |
The increased complexity in security requirements due to the widely spread
development of Internet of Things (IoT) applications requires Requirements
Engineers (REs) to have a security knowledge and experience in the process of
eliciting requirements. Requirements captured by REs are commonly inconsistent
with their client’s intended requirements and often error prone. This paper
intends to address this issue by conducting a survey to investigate the common
practices among practitioners in IoT industry, focusing on how they deal with
security requirements, what are their knowledge about IoT and its security and
what resources they use when dealing with security. An online survey has been
conducted involving 42 respondents from IoT organizations in Malaysia. The
results show that respondents have knowledge of IoT and its security, but they
have less involvement in eliciting security requirement in developing secure IoT
applications. Therefore, there is a need to propose a new approach in eliciting
security requirement in IoT application to help the professionals to develop
more secure applications. |
Keywords: |
Requirement Engineering, security requirements, Internet of Things (IoT),
elicitation |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
MODERATING EFFECT OF ORGANISATION SIZE IN MEASURING THE TECHNOLOGY ORGANISATION
ENVIRONMENT AND PRESSURE (TOEP) IN ENTERPRISE ARCHITECTURE ADOPTION |
Author: |
NOR AZIZAH AHMAD, SULFEEZA MOHD. DRUS, NUR AZALIAH ABU BAKAR |
Abstract: |
Different names of the model have been proposed from various factors and
fragmented perspectives. Besides, overall studies have put much attention on
post-adoption process and EA implementation phase. Previous scholars used one or
combination of different theories to identify the existing approach and
perspective for formulating EA adoption model. However, not many studies were
emphasized during the stage of the adoption phase. Currently, EA adoption model
was also being emphasized in EA implementation. Notwithstanding these
limitations, the researcher will further be investigating the possible
development of EA adoption model during the adoption phase and early phase of
the EA cycle. This can provide wide-ranging and rational views of business,
information, and technology for the organisation. It is also found out that, the
organizational adoption of EA is still missing from the technological,
organizational, environmental and pressure (TOEP). Based on inferences from the
previous study, there were relatively little empirical studies conducted in EA
adoption studies. The existing studies tend to apply single and multiple
theories from organization and management domain in one study. Therefore, this
paper aims to investigate the factors that influence EA adoption at the
organization level and propose a conceptual model for EA adoption from TOEP
perspective. The research method of the survey using questionnaires will be
employed on the multiple organizations as the selected sample size of the
population. This study would be integrated with the advanced knowledge with the
development of the extended and integrative TOE model with the inclusion of
institutional theory and moderator variable and its relation to Enterprise
Architecture adoption. This research may shed the light on the EA adoption
process in organisation by proposing EA adoption model as guidelines for the
decision makers in understanding factors that influence EA adoption in the MPS
in the future. |
Keywords: |
Enterprise Architecture, Adoption, Technology-Organisation-Environment (TOE)
Framework; Institutional Theory |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
RISK MITIGATION FOR ANTI SOFTWARE AGEING – A SYSTEMATIC LITERATURE REVIEW |
Author: |
THAMARATUL IZZAH AZMAN, NORAINI CHE PA, ROZI NOR HAIZAN NOR, YUSMADI YAH JUSOH |
Abstract: |
Software normally undergoes an inevitable ageing process that occurs because of
the software performance degradation and the failures of the software to
execute. Usually, maintenance process is implemented to eliminate and fix the
emergence of errors triggering software failures. The phenomenon also can be
slow down and prevented by considering risks exposure through risk mitigation.
To achieve anti software ageing, IT organizations need to employ relevant and
effective approach to counteract ageing occurrences, thus ensuring optimum
software quality and performance from degradation to fit with current and future
environmental and technological changes. For this reason, it is significant to
ascertain and understand the concepts of anti software ageing and available
approaches addressing the issues to identify existing studies limitation and
research gaps. This paper conduct a systematic literature review on the studies
related to risk mitigation for anti software ageing by following a standard
systematic literature review guidelines proposed by Kitchenham (2009). It aims
to review the existing current state of research on risk mitigation for anti
software ageing. A total 106 studies related to the topic from various journals
and conference proceedings has been reviewed. The research in this topic is
still active throughout the decade. We noticed that majority of the proposed
solution are focusing on implementing software rejuvenation approach to delay
ageing occurrences. Throughout findings, technical risk is the most addressed
and discussed risk in the literature. The results of this review are
significance as a reference on the current trend of research in anti software
ageing. Although software rejuvenation are mainly proposed to handle software
ageing issues, there are still no clear solutions and guidelines modeled by past
researchers to effectively mitigate risks to software ageing especially during
software maintenance process and addressing the risks from external risk. Thus,
this paper had achieved its aim to review current state of existing research
related to risk mitigation for anti software ageing. |
Keywords: |
Anti Software Ageing, Software Performance Degradation, Risk Mitigation,
Maintenance Process, Systematic Literature Review |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
DECISION MAKING IN THE INDONESIAN STOCK EXCHANGE USING A FUZZY LOGIC METHOD |
Author: |
ZUHERMAN RUSTAM, AINI SURI TALITA, LINTANG A.M. PERTIWI |
Abstract: |
Defining the best strategy to trade stocks is difficult, especially on the
Indonesian stock exchange. A small mistake can lead to a huge loss. Investors
analyze stock behavior of targeted companies to make decisions to buy, sell, and
hold. Various technical analysis methods use a combination of chart indicators
to make these decisions. This study proposes combining four existing indicators
with fuzzy logic to create a method for predicting the appropriate action for a
stock. This method will use the Moving Average Convergence/Divergence (MACD),
the Relative Strength Index (RSI), the Stochastic Oscillator (SO), and the
On-Balance Volume (OBV) indicators to recommend a buy, sell or hold decision to
an investor. This experiment used two Indonesian companies to test the accuracy
of the algorithm. Based on 2014 data, using the fuzzy logic method, accuracy of
the algorithm reached 66.67% and 75% for the two companies. |
Keywords: |
Fuzzy Logic, Stock, Moving Average Convergence/Divergence, Relative Strength
Index, Stochastic Oscillator |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
GENERATING 3D IMAGE BASED ON DEPTH MAP ESTIMATION USING HYBRID CLUSTERING AND
MERGING ALGORITHM |
Author: |
SREELETHA S H , ABDUL REHMAN M |
Abstract: |
Nowadays, all the portable devices including camera, mobile phones etc., are
being worked based on the multimedia applications. Along with multimedia, 3d
technologies are in peak demand. Yet, the hurdles such as poor image quality and
increased time complexity makes the prior 2D to 3D transformation technologies
weaker as days goes by. So as to overwhelm this problem, our proposed work
initiates an 3D Agglomeration framework, which is an integration of an Improved
Simple Linear Iterative Clustering (ISLIC) and a Statistical Region Merging
(SRM). With our proposed framework, better quality of image is retained thereby
abet of Gaussian smoothing with color uniformity principle. Moreover to tackle
with time overhead that are experienced with the prior methodologies, a Depth
Image Based Rendering (DIBR) method is utilized in our proposed framework. This
in turn makes use of an input 2D texture image to construct the required 3D
output image. Thus our 3D agglomeration framework generates a high quality 3D
texture image with reduced time complexity. Finally, the performance of the
proposed framework work is analyzed and is compared with the other existing
methodologies. |
Keywords: |
ISLIC-Improved Simple Linear Iterative Clustering; SRM- Statistical Region
Merging; 3D image- three dimensional images.
|
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
WIRELESS SENSOR NETWORK DEPLOYMENT BASED ON MACHINE LEARNING FOR PROLONGING
NETWORK LIFETIME AND PDR |
Author: |
ALI NOORI , ONG BI LYNN , HASNA AHMAD , R BADLISHAH AHMAD , AMIZA AMIR , AYMEN
ABD , MARWA K IBRAHIM |
Abstract: |
Sensor Deployment (SN) is one of the major challenges in wireless sensor network
architecture. One of the most fundamental issues in wireless sensor deployment
is to balance the objective to resolve network conflicts. This paper aims to
find the Pareto front that maximizes the packet delivery ratio and minimizes
sensor energy consumption for prolonging network lifetime. For this proposal, a
hyper-heuristic framework for improving the performance of the metaheuristic
(LMOJPSO) search optimization process by combining two different searching
techniques was designed. The first optimization technique carried out its
searches with the help of an extreme learning machine (ELM), whereas the second
used a wireless sensor network simulator. In this paper, the proposed method is
examined in given wireless sensor network test instances, and the evaluation of
its performance is carried out using a WSN performance metric. The results
indicate that the proposed model is superior to the non-dominated sorting
genetic algorithm (NSGA-II). |
Keywords: |
Wireless Sensor Network Deployment, NSGA-II, Hyper-heuristic, PSO, Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
REQUIREMENTS PRIORITIZATION ASPECTS QUANTIFICATION FOR VALUE-BASED SOFTWARE
DEVELOPMENTS |
Author: |
FALAK SHER , DAYANG N. A. JAWAWI , RADZIAH MOHAMMAD |
Abstract: |
Requirements prioritization considered as an important activity in requirements
engineering, helps in decision making for software development. Requirements
prioritization is performed to select the candidate requirements for different
software releases. Different prioritization techniques are available in
literature to facilitate experts for requirements prioritization in the
industry. It is also evident from the literature that different requirements
prioritization aspects are considered to support the process of prioritization.
Consideration of these aspects is more worth-fuller in the domain of value-based
software engineering where the success of the system depends on the success of
software. These aspects are reviewed from literature and summarized accordingly
to improve the process of requirements prioritization. Moreover, these aspects
are classified and quantified as technical aspects and business aspects based on
relevance towards prioritization process. Further efforts are made to validate
these aspects and their logical grouping from industry experts through survey.
Most of the existing techniques in general and value-based software development
in specific missing consideration of these aspects. This research contribution
is an effort to highlight and summarize identification and quantification of
possible aspects to be a part of requirements prioritization process. |
Keywords: |
Requirements Prioritization, Technical Aspects, Business Aspects, Techniques |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
MULTIPLE WATERMARKING TECHNIQUE BASED ON RDWT-SVD AND HUMAN VISUAL
CHARACTERISTICS |
Author: |
NORUHIDA ALIAS, FERDA ERNAWAN |
Abstract: |
With the increasing multimedia technology, digital watermarking technique is
needed for copyright protection. The multiple watermarking technique is required
for embedding more than one watermarks. A major challenge needs to be solved
specially to recover multiple watermarks that may be destroyed due to JPEG
compression. This paper proposed multiple embedding techniques for watermarks
based on RDWT-SVD and human visual characteristics. The proposed scheme examines
U(2,1) and U(3,1) components of RDWT-SVD. Our scheme uses Arnold transform to
scramble the watermarks before embedding watermarks into the host image. The
proposed scheme is tested under several attacks such as image compression,
geometrical and image processing attacks. The experimental results show that our
scheme can achieve a higher robustness for both recovered watermarks than the
existing technique. Our scheme produces high robustness with the
normalized-cross-correlation about 0.99 under noise additions. |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
Title: |
ARABIC SPEECH RECOGNITION SYSTEM AND PHONETIC DICTIONARY |
Author: |
IBRAHIM EL-HENAWY, MARWA ABO-ELAZM |
Abstract: |
Automatic Speech Recognition (ASR) is a technology by which a computer can
distinguish the words that a person talks into a microphone or a telephone. It
is a key technology for many applications. It is gaining a growing role in a
variety of application such as telephone communication with information systems,
automatic query answering, hands free operation control as in airplanes and car,
speech-to-text transcription, etc. ASR can help also, handicapped people to
interact with society. Due to the ASR importance many systems are developed, the
most common are: Dragon Naturally Speaking, IBM via voice, Microsoft SAPI. Also,
many speech recognizing open source systems are available too. One of the
main obstacles challenge the development of ASR applications for Arabic speech
is the rarity of suitable sound databases commonly required for training and
testing statistical models. The pronunciation (or phonetic) dictionary is an
important ASR component that serves as an intermediate between language models
and acoustic models in ASR systems. It holds a subset of the words available in
the language and the pronunciation variants of each word in terms of sequences
of the phonemes existing in the acoustic models. The development of perfect
Automatic Arabic Speech Recognition (ASR) systems is challenged with the
accuracy of the phonetic dictionary. |
Keywords: |
Speech Recognition Systems, Arabic Language, Phonetic Dictionary, Pattern
Recognition |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2019 -- Vol. 97. No. 14 -- 2019 |
Full
Text |
|
|
|