|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
August 2019 | Vol. 97
No.15 |
Title: |
APPLICATION OF CELLULAR AUTOMATA FOR MODELING AND REVIEW OF METHODS OF MOVEMENT
OF A GROUP OF PEOPLE |
Author: |
M.A. KANTUREYEVA, J.A.TUSSUPOV, F.A.MURZIN, A.I. USPANOVA, A.A. ABISHEVA |
Abstract: |
The article deals with the modeling of the movement of most people. The
finite-automaton (FA) model is applied. The analysis of methods of modeling
human behavior, including the dependence of density, speed and capacity of
various structures on various external parameters. Transition rules for the
model of human motion based on the theory of cellular automata are presented. In
this work the aim is the strict formalization of rules of transitions that
uniquely identify the model. The results of numerical studies are presented. |
Keywords: |
Cellular Automata, Modeling Of Human Movement, Field Model Of Human Movement,
FA-Model, FF-Model. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
ANALYSIS WITH VARYING QUESTION SIZE IN QUESTION PAPER TRANSLATION |
Author: |
SHWETA VIKRAM, SANJAY K. DWIVEDI |
Abstract: |
Word Sense Disambiguation in question paper translation is a challenging task.
Some words in the question sentence can make the entire sentence ambiguous. WSD
is a process to remove the ambiguity in a natural sentence to provide the
correct sense of the word according to the sentence/context. Works have been
done in question answering system to deal with ambiguity, however there has not
been much work in resolving ambiguity related issues specially when it comes to
translate questions rather than simple text. This paper specially highlights
issues in the translation of Wh-questions from English to Hindi. We used five
translators to show the impact of translation of Wh-questions using these
translations. The experimental analysis of some English questions classified in
three categories based on the number of words in each question. After analyzing
these translations through MT tools for the three categories of questions, we
found that the performance of translations of small questions is much better
than that of other category questions having size medium to large. Further the
average BLEU score (for all categories) has been found 0.483 for Babelfish which
is best whereas Babylon performed poorly with 0.429. |
Keywords: |
Machine Translation, Word Sense Disambiguation, Questions, English and Hindi. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
REVIEW OF IOS ARCHITECTURAL PATTERN FOR TESTABILITY, MODIFIABILITY, AND
PERFORMANCE QUALITY |
Author: |
FAUZI SHOLICHIN, MOHD ADHAM BIN ISA, SHAHLIZA ABD HALIM, MUHAMMAD FIRDAUS BIN
HARUN |
Abstract: |
In the mobile development especially in iOS, a correct selection of architecture
patterns is crucial. Many architectural patterns used by developers such as
Model View Controller (MVC), Model View Presenter (MVP), Model View ViewModel
(MVVM), and View Interactor Presenter Entity Router (VIPER) have promised
stability of the product. Nowadays, most developers tend to use MVC
architectural pattern as this pattern is easy to use and separate the logic
between model, view and controller. However, this architecture has common
problems which are hard to test and manage the code because all the codes for
business application are placed in controller components. Therefore, this paper
reviewed some of the existing architectural patterns qualities specifically in
testability, modifiability and performance quality in order to investigate the
mentioned problems. By using Contact mobile apps as a case study, the results
show the MVVM architecture is good for testability, modifiability (cohesion
level procedural), and performance (memory consumption). In addition, VIPER is
the best in modifiability (coupling level data and coupling level message) and
performance of CPU. |
Keywords: |
Architecture Pattern; Design Pattern; Software Architecture; Quality attributes;
Software Professionals |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
A STUDY OF USER EXPERIENCE FOR E-LEARNING USING INTERACTIVE ONLINE TECHNOLOGIES |
Author: |
SHAIDAH JUSOH , SUFYAN ALMAJALI , ABDELRAHEEM ABUALBASAL |
Abstract: |
User experience (UX) is a branch of human computer interaction (HCI) field. UX
is a study that focuses on behaviours, attitudes, and perspectives towards
services or technologies used within a specific context such as teaching and
learning context. The teaching and learning process has evolved from traditional
to e-learning and recently interactive e-learning settings. The aim of this
research is to study UX in online interactive e-learning. The study use
observation, interview, and survey methods for data collection. Quantitative and
qualitative analyses methods were applied. Findings of the study suggest that
students and a teacher demonstrate positive attitudes and behaviours towards
online interactive e-learning. Moreover, most of the advantages of face-to-face
class interaction in a traditional classroom can be also achieved in online
interactive e-learning. The interactive e-learning setting helps less confident
and shy students to participate resulting in engagement between a teacher and
students. Despite the power of new technologies in stimulating students to learn
and retain knowledge in a more effective way, there is still room to improve the
technologies to give a better UX to the teacher. |
Keywords: |
User Experience, Human Computer Interaction, E-learning |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
A VISION OF BLOCKCHAIN TECHNOLOGY AND ITS INTEGRATION WITH IOT:
APPLICATIONS, CHALLENGES, AND OPPORTUNITIES; FROM THE AUTHENTICATION PERSPECTIVE |
Author: |
F.A.HADI1 , AHMED RAISAN HUSSEIN , JABAR RAHEEM RASHED , NAWAR SAAD ALSEELAWI ,
HASANAIN ALBEHADILI |
Abstract: |
The Internet of Things (IoT) is used in our daily lives, thus this type of
technology greatly affects various environments such as smart home, smart
cities, and industrial systems. Through IoT, daily objects will be able to
interact and interconnect to gather information and automate specific tasks. An
IoT framework is a group of guiding rules, protocols, and standards. The
implementation of IoT applications depends on the characteristics of the IoT
environment especially the security issue and the mechanisms implemented for
this purpose, where security and privacy are pivotal. This paper maps the
research landscape in two ways. The first describes the blockchain technology,
the principles of using the blockchain technology, and the different areas of
its applications. The second highlights the capabilities and challenges of
blockchain, the most famous applications of IoT used in blockchain, and the
opportunities of using blockchain together with IoT in the present and future.
Finally, the recommendations and future research directions are discussed. |
Keywords: |
IoT, Blockchain, Authentication, Digital Identity, Authorization. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
AN EMPIRICAL EVALUATION OF THE SUBTLETY OF THE DATA-FLOW BASED HIGHER-ORDER
MUTANTS |
Author: |
AHMED S. GHIDUK , AHMOUD ROKAYA |
Abstract: |
Mutants are erroneous forms of the source code generated by deliberately
inserting one fault (first-order mutant) or more (higher-order mutant) into the
source code. Smart mutants that require numerous numbers of test cases to be
killed are called Subtle Mutants (SMs). These mutants are required in order to
increase the efficiency and effectiveness of test cases. Creation of these
mutants is an expensive step especially in higher-order mutation testing.
Data-flow analysis has been effectively applied to create higher-order mutants
and overcome the explosion problem. To the best of our knowledge, subtle mutant
generation with the aid of data-flow concepts and identifying them among all
mutants have not been studied adequately. In this paper, an empirical study to
evaluate the impact of data-flow analysis on the subtlety of higher-order
mutants is introduced. Therefore, this study discusses two research questions:
which mutants are more subtle data-flow based second order mutants (DFSOMs) or
their constitute FOMs mutants? And which mutants are harder to be killed or
covered DFSOMs or all du-pairs criterion? The results of the conducted
experiments showed that the subtlety of data-flow based second order mutants
(DFSOM) is higher than their constitute first-order mutants by 6% in average. In
addition, DFSOM criterion dominates all du-pairs criterion and covering
(killing) DFSOM criterion is harder than covering all du-pairs criterion by
14.6% in average. |
Keywords: |
Mutation Testing, Higher-Order Mutants, Subtlety Mutants, Data-flow analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
GRAPH MINING TECHNIQUES FOR GRAPH CLUSTERING: STARTING POINT |
Author: |
RASHED SALEM, WAFAA ABDEL MONEIM, MOHAMED HASSAN |
Abstract: |
Nowadays, large number of applications of graph clustering are available, with
expanding the span of the graph the conventional methods of clustering are not
appropriate to manipulate this issue which are costly for computation. So that,
it is necessary to get a good algorithm to tackle this problem. Graph clustering
algorithms are considered as the most effective techniques for solving various
partitioning problems. Global graph clustering which based on the whole graph as
input isn’t convenient of large graphs. Local graph clustering algorithms solve
this problem by working on a given vertex as input seed set without looking at
the whole graph to find a good cluster. This research explores different graph
clustering techniques based on the input parameters, e.g., local and global, as
well as illustrating appropriate applications of graph clustering. This paper
directed to help new researchers take a summary of graph clustering techniques
that can be used for graph partitioning. |
Keywords: |
Graph Mining, Graph Clustering Methods, Big Graph Mining, Global Graph, Local
Graph. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
COST-EFFECTIVE FPGA IMPLEMENTATION OF PARALLEL SCHMIDT-SAMOA CRYPTOSYSTEM (SSC) |
Author: |
QASEM ABU AL-HAIJA, IBRAHIM MAROUF, MOHAMMAD M. ASAD, KAMAL AL NASR |
Abstract: |
Schmidt-Samoa Cryptosystem (SSC) is a public key Cryptosystem. SSG is heavily
based on modular arithmetic involving large prime number. In this paper, we
consider a SSC that is used to secure the data over a communication system
against vulnerabilities and attacks. We propose an efficient FPGA implementation
of SSC cryptosystem that employs scalable arithmetic modules and effective
number theory schemes in maximum parallelism exploitation. The provided
simulation results show the advantage of using parallelization of system modules
in optimizing the system performance of data security against attacks. On
average, the encryption/decryption process of 128-bit SSC registered a total
delay of 125 ms approximately with maximum operational frequency of 40 MHz
utilizing of 50% of the logic elements of Altera Cyclone IV FPGA EP4CGX22CF19C7
device and consuming 250 mW of thermal power. Consequently, the obtained results
are attractive for FPGA designer of cryptographic algorithms with scalable
design area, fast encryption/decryption processes and low power consumptions. |
Keywords: |
Cryptography, Computer Arithmetic, FPGA Design, Hardware Synthesis,
Schmidt-Samoa Cryptosystem, Integer Factorization |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
ENHANCING USER DATA AND VM SECURITY USING THE EFFICIENT HYBRID OF ENCRYPTING
TECHNIQUES |
Author: |
SAM NJUKI , JIANBIAO ZHANG , EDNA TOO, HAROLD BUKO DADYE |
Abstract: |
Security of data is a big concern to individuals and organizations that may be
compelled to use the cloud services since some of these data are quite
sensitive. The major challenges that any Cloud Computing Service Provider (CSP)
must overcome are to make sure that its servers (VMs) are free from hacking by
masqueraders or other attackers inside the CSPs. Therefore, there is the need
for data to be encrypted and then sent to the cloud. This will ensure that
users/clients sensitive data-in-transit and at rest is protected. In our new
cloud framework, we implement for the user the best-fit hybrid algorithm for
their data combined with an enhanced security for the VM instance. We propose
the use of hybrid algorithms for VMs and user data encryption. The algorithms
include RSA, AES 256-bit, ECC and SHA-256 which makes up a strong framework for
speed, security, and integrity mainly for individual users. In the case of bulk
data or organizations, we propose Homomorphic Encryption where the provider can
operate on the data without decrypting it. We minimize the indices for fast
decryption and then the decryption algorithm will require the computation of
only two pairing operations, the hybrid of the standard encryption techniques
and the homomorphic encryption. |
Keywords: |
Cloud Computing; Cloud Security; Homomorphic Encryption; Cryptography;
Virtualization |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
DIGITAL IMAGE STEGANOGRAPHY SCHEME BASED ON SK-LSB SUBSTITUTION AND THREE
PARAMETERS ENCRYPTION METHOD |
Author: |
MOHANAD NAJM ABDULWAHED |
Abstract: |
Recently, steganography has played an important part in the field of
communication, especially in image steganography. The major points of image
steganography are the image quality (imperceptibility) of the stego image and
the security of the system towards stopping the recoverability of the secret
data. Several digital image steganography methods has been introduced, all are
focused based payload and image quality. Moreover, there is a trade-off amidst
these two metrics and saving a better balance amidst them is yet a challenging
case. Therefore, previous methods fail to realize a high security level because
to direct embedding secret information inside image without cryptography
consideration, making information extraction relatively simple for adversaries.
So, a new steganography scheme based on two control random parameters and new
encryption method based on three parameters can address the security challenge
while new stego key-LSB substitution, SK-LSB can ensure the imperceptibility of
the stego image. The objectives of paper to increase the security and PSNR of
the stego image. The Hyper technique has been used to compress the secret
information prior to embedding, this will also ensure an increase in the payload
capacity. The proposed scheme takes effect after compressing and encrypting the
secret information. This algorithm is provide different layers of security
worked together to augment protection from attacks. The experimental results
shows the efficient scheme from PSNR, SSIM and payload for evaluating the stego
image compared to the existing methods. |
Keywords: |
Steganography, Cryptography, SK-LSB substitution, PSNR, SSIM, BER. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
A MODEL TO PREDICT STUDENTS PERFORMANCE BASED ON INSTRUCTORS PATTERN OF
METACOGNITIVE SCAFFOLDING THROUGH DATA MINING ANALYSIS |
Author: |
NURUL FARHANA JUMAAT, ZAIDATUN TASIR, HAJARA MUSA |
Abstract: |
The purpose of this study is to develop a decision tree model that can predict
student’s performance based on the mechanisms of metacognitive scaffolding
prompted by the instructor in Facebook discussion. Prior to the development of
the decision tree model, the study identified the pattern of dominant mechanism
of metacognitive scaffolding (MS) prompted by the instructor in Facebook
discussion. Additionally, students’ academic performance was also investigated.
37 postgraduate’s students from the Authoring System course was participated in
a pre-experimental, one group pre and post-test research design. The data were
mined using WEKA software and calculated based on the frequency of metacognitive
scaffolding posted by the instructor in online learning setting which is
Facebook group discussion and also students’ scores in the performance test. The
decision tree model predicts that students who achieved grade A in their study
were prone to receive a combination of guidance that focused on: i) the process
of learning, ii) the rationale for each tasks and activities by the instructor,
iii) encouragements in terms of relationship and collaboration among
participants and iv) supervision through feedbacks by the instructor such as
giving response towards students’ comments. The decision tree model also
suggests the appropriate mechanisms of instructor’s metacognitive scaffolding;
such a technique should be able to contribute to students’ performance in
learning. |
Keywords: |
Metacognitive scaffolding, Data mining, Facebook, Performance test |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
VALIDATION OF INFORMATION TECHNOLOGY READINESS MODEL: A FOCUS GROUP STUDY |
Author: |
MOHAMAD IRFAN, SYOPIANSYAH JAYA PUTRA |
Abstract: |
This article reveals how an opinion or argument is applied to validate the model
of Information Technology (IT) implementation readiness using
inductive-qualitative method rather than ongoing hypothesis testing. This study
is intended to elaborate and validate the model of focus group study (FGS) in
order to weigh the disadvantages and advantages of this study models. Most
researchers validate model by quantitative method. There are not so many
researchers who validate the model with qualitative method, even some
researchers are not aware of using this method. This article is very beneficial,
especially to describe, explain, prove, and explain the context and condition
that model validation has been done qualitatively before the researcher
conducted quantitative validation. The research finding represents three points
of model validation regarding the modeling process, methodology, and
recommendation for implementation. This will be a good reference point for
researchers who are going to validate the feasibility of their models,
especially using qualitative validation method. |
Keywords: |
Validation model, Information Technology, Focus Group Study, IT Readiness Model,
Qualitative Methology |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
ENHANCING CYBERSECURITY ON PRIVATE CLOUD USING NIST CYBERSECURITY FRAMEWORK |
Author: |
TUGA MAURITSIUS, BRILLYAN ADITYA SAPUTRA |
Abstract: |
Cloud computing is evolving technology that provides many benefits for the
company. Along with its growth, there are increasing threats to cloud computing
because hackers are always exploiting vulnerabilities in the cloud computing
infrastructure. XYZ Corporation is an IT system integrator company in Indonesia
that has a private cloud infrastructure at the company's data center. Based on
the interview, currently there is no cybersecurity in the private cloud and
there have been several problems regarding the cybersecurity incident which has
caused company financial, operational and reputation losses. The purpose of this
study is to analyze current cybersecurity, find out the shortcomings and
establish cybersecurity recommendations in the private cloud. This case study
research refers to the NIST Cybersecurity Framework and uses observation and
interviews methods to gather information about current cybersecurity in the
private cloud. The results are action plans, recommendations for human resources
and cybersecurity technologies integration that are expected to increase the
tier of security for information systems in the private cloud so threats and
attacks can be detected and handled effectively and efficiently, therefore,
confidentiality, integrity and availability of information systems in the
private cloud is achieved. This study results also can be adopted in companies
that have private cloud which want to start improving information system
security using the NIST Cybersecurity Framework. |
Keywords: |
Cybersecurity, Information Security, Private cloud, NIST CSF, System Integrator
Company |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
STOCK MARKET PRICE PREDICTION SYSTEM USING NEURAL NETWORKS AND GENETIC ALGORITHM |
Author: |
NADIA ABDUL JAWAD, Dr.MHD BASSAM KURDY |
Abstract: |
Stock market forecasting of price/index has always been an important financial
subject. Knowing the close price/index based on previous information is useful
for investors who need to buy or sell the stock. Most of the applications are
focused on building systems with less error and more accuracy. Most traders have
used technical analysis tools to predict future stock market movements. Popular
methods to find dynamic relationship between input and target output were
artificial neural networks that proved to be effective recently. The
evolutionary algorithms improve performance in predicting financial market
results. This study uses the following: ten technical indicators as inputs,
genetic algorithm (GA) to select significant features, backpropagation neural
(BPN) to predict future stock price based on features of the previous day and
self-organizing map (SOM) to reduce data size. Also, this paper compares three
fusion hybrid prediction models, SOM-GA-BPN, SOM-BPN and GA-BPN, with a single
model, which is the BPN. Three indices (S&P 500, IBM and NASDAQ) are used in
order to evaluate the performance of the proposed hybrid methods. We compare
these models with other models such as Support Vector Regression (SVR),
Artificial Neural Network (ANN), Random Forest (RF), SVR–ANN, SVR–RF and SVR–SVR
fusion prediction models using evaluation measures. The comparison proves the
effectiveness and accuracy of the proposed technical indicators and methods. |
Keywords: |
Stock Market Price Forecast, Genetic Algorithm, Back Propagation Neural Network,
Self-Organizing Map, Feature Selection. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
COMPUTER SIMULATION OF LARGE DISPLACEMENTS OF THERMOELASTIC RODS |
Author: |
BAISAROVA G., BRZHANOV R., KIKVIDZE O.G., LAKHNO V., BURIACHOK V., CHUBAIEVSKYI
V. |
Abstract: |
This paper presents the results of research, including elements of theoretical
calculation, computer simulation and experimental study of displacements,
internal force factors and temperature fields during plane deformation of rods.
The temperature problem for a bar of rectangular cross section was studied. The
differential equation of one-dimensional unsteady heat conduction is solved in
the Mathcad system for boundary conditions of the first and third kind,
including for non-stationary boundary conditions established experimentally. The
results of numerical calculations in Mathcad are in good agreement with the
results of the experiment. The maximum error is 17% at the end of heating at
=440 с. The coordinates of the reduced center of gravity with uneven temperature
distribution are determined. It has been established that an increase in the
temperature gradient affects the coordinates of the reduced center of gravity
and, in fact, does not depend on the law of temperature change. The calculations
were carried out in the Mathcad system. The simulation experiments carried out
in the Mathcad system reduced the laboriousness of work by about 20% to study
factors that influence internal stresses and temperature fields during plane
deformation of rods. |
Keywords: |
Thermoplastic Rod, Computer Simulation, Non-Stationary Thermal Conductivity |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
AUTOMATIC NEWS BLOG CLASSIFIER USING IMPROVED K-NEAREST NEIGHBOR AND TERM
FREQUENCY-INVERSE DOCUMENT FREQUENCY |
Author: |
IRMA YUNITA , SENG HANSUN |
Abstract: |
The development of internet technology increases the need for information
management for the public. One of the information forms on the internet is the
web page. The increment of web pages which is caused by blog content writing has
been simplified by the existence of Content Management System, such as
WordPress. However, the information is still needed to be organized orderly so
that public can easily get relevant information they are looking for. One
solution that can be used to organize information is by using text
classification. Thus, the objective of this study is to build a WordPress
plugin, namely News Blog Classifier that can help users in classifying their
articles automatically. Two different algorithms were used to classify the blog
content automatically into Health, Economics, Sports, and Technology category,
i.e. K-Nearest Neighbor algorithm and TF-IDF. Furthermore, K-Nearest Neighbor
algorithm is improvised by adding Cosine Similarity calculation. Based on the
test results, the highest precision value is 0.92 obtained from Health category,
the highest recall value is 0.97 from Economics category, and the highest
F-measure score is 0.88 from Economics category. Overall, from this study, an
automatic text classification plugin for news blog content on WordPress CMS has
successfully built that can help bloggers in classifying their news articles
automatically. In addition to that, the result from the testing phase has
discovered a threshold value for each of the categories used in this study that
can be used for further research. |
Keywords: |
Content Management System, K-Nearest Neighbor, Text Classification, TF-IDF,
WordPress |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
PERFORMANCE ENHANCEMENT OF THE ADVANCED ENCRYPTION STANDARD VIA PIPELINED
IMPLEMENTATION |
Author: |
MALEK M. BARHOUSH, NAJIB A. KOFAHI, KHALID M.O. NAHAR, ANAS M.R. ALSOBEH, AMEERA
JARADAT, BAYAN ALOMARI |
Abstract: |
Information and computer security become a key issue these days. This is due to
rapid developments in data communications and computer technologies. Hence,
there is a serious need for a secure transmission of both data and information
between senders and receivers. Since there is no fully secured communication
system for Web-based systems, communication systems rely heavily on complex and
difficult cipher systems. Cipher systems usually consist of two main parts;
Encryption and Decryption to hide and secure both transmitted data and
information on long trunks. In addition, storing both important and sensitive
data and information requires securing them from intruders, which can be handled
by encrypting them. This paper studies one of the most important and widely used
secret key encryption/decryption algorithms, namely the Advanced Encryption
Standard (AES). The implementation of the AES algorithm involves complex
computational steps that have made the implementation of these steps slow and
time consuming. Using state of the art of multi-core architecture, we propose a
pipelined implementation of the AES algorithm to reduce both computation
complexity and elapsed computation time. Our contribution, the proposed AES
implementation does not require dedicated equipment, it works with any kind of
computers that are available to the public, such as Intel-based computers. A
comparison of CPU performance is performed on both pipelined and sequential
implementations on different file sizes. We have found that our pipelined
implementation outperforms the sequential one, without the use of any special
equipment. What distinguishes our work from the rest of the work done by several
researchers is that the proposed AES implementation is designed for multi-core
computers that do not have expensive equipment such as GPU or FPGA, such devices
are widely available. |
Keywords: |
Cryptography, AES Encryption & Decryption, Pipelined Advanced Encryption
Standard, Web-based application. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
Title: |
ACCEPTANCE MODEL PREDICTIONS FOR E-ORIENTATION SYSTEMS CASE OF STUDY : PLATFORM
“orientation-chabab.com” |
Author: |
RACHIDA IHYA, ABDELWAHED NAMIR, SANAA ELFILALI, FATIMA ZAHRA GUERSS, HAJAR
HADDANI, MOHAMMED AIT DAOUD |
Abstract: |
The orientation is the construction or development process of an educational or
career plan. This process is adopting the information and the communication
technologies through various platforms to help students making their own career
decision. The purpose of this study is to generate an acceptance model
prediction's of the e-orientation Moroccan platform “orientation-chabab.com”
that can be used during the conceptual design of the future e-orientation
platforms. The Technology Acceptance Model (TAM) is used as a theatrical model
for early user acceptance of the e-orientation systems by evaluating an extended
Technology Acceptance Model (TAM). Our experiment was conducted with the WEKA
machine learning software by using five algorithms namely: NaïveBayes, J48, SMO,
SimpleLogistic and OneR.According to the comparison of the accuracy rates of our
simulation, the Sequential Minimal Optimization classifier gives us the best
performance outcomes. |
Keywords: |
E-orientation, Technology Acceptance Model, Extended TAM, Machine Learning,
Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2019 -- Vol. 97. No. 15 -- 2019 |
Full
Text |
|
|
|