|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
September 2019 | Vol. 97
No.18 |
Title: |
AN IOT BASED FRAMEWORK FOR STUDENTS’ INTERACTION AND PLAGIARISM DETECTION IN
PROGRAMMING ASSIGNMENTS |
Author: |
HAMZA ALDABBAS |
Abstract: |
The Internet of Things (IoT) is the connection through the Internet of handling
devices within physical objects, allowing them to move and communicate data.
These devices may be used in academia to facilitate student- instructor
interaction. In this research, I used IoT devices to automate an online
examination system. The instructor uploaded the questions online and students
provide solutions through IoT devices on University premises. The source code
similarity in diverse types of source codes, however, is hard to detect because
each programming language has a specific assembly of grammar. To address this
issue, a code similarity detection approach was employed to extract the
similarity between different source codes. The Latent Semantic Analysis (LSA)
technique was used to retrieve semantic similarity by first transforming source
codes into tokens to compute and then it finding semantic similarity in a pair
of tokens. The dataset contained five different source codes: C, C#, C++, Python
and Java. |
Keywords: |
Internet of Things, Cloud Computing, Data mining, Similarity, E-assessment |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
DETERMINANTS OF USERS INTENTION TO USE SMARTWATCH |
Author: |
NURA MUHAMMAD BABA , AHMAD SUHAIMI BAHARUDIN , ALI SAEED ALOMARI |
Abstract: |
The rapid advancement of information and communication technologies in recent
years has enabled the design and production of compact mobile devices with
robust computing power. These advances have resulted in a plethora of wearable
devices, including smartwatches. In particular, smartwatches are highly hyped in
the information and communications technology industry for multiple functions
that appeal to a broad range of user interests, fitness, health monitoring, and
connect to smartphones to extend their functionality with the goal of
simplifying users’ lives, reducing distractions, and letting them experience the
world without fussing with their phones. Despite these benefits and hypes, the
smartwatch market has been declining continuously, and current sale estimates
are still relatively low. Thus, this study aims to investigate the level of
Malaysian individuals’ intention to use a smartwatch and to identify and assess
their impacts. Therefore, the study will assess the impacts of perceived
usefulness, perceived ease of use, cost, privacy, and health risk on user’s
behavioural intention to use smartwatch. A total of 501 collected data was used
to test the study hypotheses using structural equation modelling technique. The
results revealed the high level of Malaysian individuals’ intention to use a
smartwatch. Moreover, perceived usefulness and perceived ease of use have a
significant positive effect whereas cost, privacy, health risk did not
negatively affect users’ intention to use a smartwatch. The extended technology
acceptance model explains 34 per cent of the variance in the intention to use a
smartwatch. The findings of the study will help future researches and smartwatch
developers by providing a guideline for the development of the smartwatch
devices. |
Keywords: |
Wearable DEVICES, Smartwatch, Tam, User Adoption, Intention TO Use |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
UNIFIED CONCEPT-BASED MULTIMEDIA INFORMATION RETRIEVAL SYSTEM USING DEEP
LEARNING PROCESS WITH ONTOLOGY |
Author: |
RIDWAN ANDI KAMBAU , M.OCTAVIANO PRATAMA |
Abstract: |
The amount of digital data is growing at a staggering pace and mostly in the
form of text. The growth of data, including multimedia (text, images, video, and
audio) poses challenges in developing Multimedia Information Retrieval Systems
(MIRS). Today, MIRS uses one or two media as a query input, for example, Google
using text and image. There are comprehensive information needs in multimedia,
including video and audio media as query input that can increase the amount and
variety of information in retrieval result. Also, it is difficult to organize
the relationship between the query input and the retrieval result in the same
context or semantically related. This paper proposes a Unified Concept-based
MIRS using deep learning with Ontology to tackle these problems. There are three
main processes of this research; the first is Indexing Process which consist of
collecting multimedia data, creating the multimedia dataset, extracting
multimedia features, identifying and classifying objects and media format with
Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), then
storing object indexed as the concepts. The second is Query Processing which
consists of inputting multimedia query or object to identifying and classifying
object becomes a concept, and then the third is Retrieval and Rank Process of
concept or object indexed and concept of query input. The ontology organizes the
relationship between the concepts. Resource of this research uses the Cultural
Heritage domain. The Unified Concept-based MIRS shows the capability of the
system to extract features of four media (text, image, audio, and video) as
concept representation to identify the multimedia object from query input and
retrieve the object in four types of media at once. The retrieval results
performance with deep learning increase about 30%-40% than support vector
machine technique, and the usage of ontology increases the retrieval relevant
results about 30 % is compared with MIRS without Ontology. |
Keywords: |
Information Retrieval System, Multimedia Information Retrieval System, Ontology,
Content-based MIRS, Context-based MIRS and Concept-based MIRS. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
FORMULATION AND SOLUTION TO CONTROL PROBLEMS OF OPERATION MODES IN DELAYED
COKING UNIT IN FUZZY ENVIRONMENT BASED ON THE HEURISTIC METHOD |
Author: |
B.B. ORAZBAYEV , G.B. IMANGAZIEVA1, K.N. ORAZBAYEVA |
Abstract: |
This paper presents a formulation to the optimal control problems of operation
modes for technological systems in the fuzzy environment and proposes a
heuristic approach for solutions to the introduced problems. For the purposes of
formalization and mathematical problem formulation, we employ methods of fuzzy
set theory and various compromise schemes, methods of multi-criteria selection
and optimality principles. By modifying and adapting the methods of main
criteria, maximin and the principle of Pareto optimality, new formulations to
the optimal control problems are obtained and effective heuristic methods for
their solutions are developed. The uniqueness and novelty of the proposed
approach to solving the control problems of operation modes in the fuzzy
environment provides more efficient solutions without prior conversions of a
fuzzy problem into an equivalent deterministic problem, i.e. maximizes the use
of initial fuzzy information. This is justified by the fact that, in contrast to
well-known approaches, problems are set in a fuzzy environment without replacing
them with equivalent deterministic tasks, and they are solved using the original
fuzzy information. The authors' research contribution refers to the fact that
for the first time mathematical formulations of optimization problems are
formulated during the control of operation modes for a delayed coking unit
(DCU), and heuristic methods for the problems are developed based on various
optimality principles (main criterion, maximin and Pareto optimality). Moreover,
the developed method based on maximin and Pareto optimality are employed in
solving the problem of controlling the operation modes for delayed coking unit
of the Atyrau Oil Refinery (AOR). We present and analyze the results of
applying the proposed heuristic method-based maxi-min method and Pareto
optimality principle, considering possible concessions during solving the
problem of decision-making on the optimal control of operating modes for the
delayed coking unit in Atyrau Oil Refinery, which works in the fuzzy
environment. The obtained results of applying heuristic methods show the
effectiveness of the proposed method for solving the control problem of
operation modes for DCU in the fuzzy environment. In comparison with the results
of known methods, the proposed method gives the best results, as well as
calculates the membership functions of fuzzy constraints, i.e. allows
controlling the extent to which the fuzzy constraints are met. For verifying the
claims and the adequacy of the obtained decisions, we apply scientifically-based
methods of multi-criteria optimization, decision-making methods, theories of
fuzzy sets, the software package "Delayed coking unit" developed by
participation of the author, modern computers with Pentium V processors, as well
as real, i.e. experimental production data from the existing delayed coking
unit. |
Keywords: |
Pareto, Operation Model, Fuzzy Environment, Heuristic Method, Control Problem,
Decision Maker |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
OPTICAL COLOR IMAGE CRYPTOSYSTEM BASED ON DISCRETE COSINE TRANSFORM AND DOUBLE
RANDOM PHASE ENCODING |
Author: |
ASHRAF AFIFI |
Abstract: |
This paper introduces an efficient optical color image cryptosystem using the
discrete cosine transform (DCT) and the Double Random Phase Encoding (DRPE). The
proposed method employs the DCT on input red, green and blue color plain image
components. The resulting color image components are then decomposed by the
Fourier Transform (FT). A number of test experiments are performed in order to
evaluate the proposed method performance mainly the security and the quality of
the encryption. The achieved results demonstrated the superiority of the
proposed approach with respect to encryption quality, statistical, information
entropy, maximum deviation, and irregular deviation, differential, and noise
immunity tests. |
Keywords: |
Discrete cosine transform, Double Random Phase Encoding, Color Image
Cryptosystem. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
AN ANALYSIS OF INFORMATION AND COMMUNICATION TECHNOLOGY AND VIRTUAL REALITY
TECHNOLOGY IMPLEMENTATION THROUGH A QUANTITATIVE RESEARCH ON USERS’ EXPERIENCES |
Author: |
BOA RHEE |
Abstract: |
This study investigated users overall experiences with <Klimt Inside> and
<Stoclet Frieze>, based on the Technology Acceptance Model (TAM), using the
convergence and integrated approach. In terms of <Klimt Inside>, the degree of
satisfaction correlated with degree of immersion and Behavioral Intention to
Digital Exhibition. The degree of satisfaction and degree of immersion
correlated with the detail factors of usability for learning and usability for
appreciation. All detail factors of perceived ease of use positively correlated
with the degree of satisfaction and degree of immersion. With regard to <Stoclet
Friese>, the degree of satisfaction with the VR application significantly
correlated with the degree of immersion and Behavioral Intention to Digital
Exhibition. However, the degree of satisfaction with the VR application did not
affect the degree of satisfaction and degree of immersion with <Klimt Inside>.
In the case of <Stoclet Friese>, the detail factors of usability for learning
and usability for appreciation were relevant to the degree of satisfaction and
degree of immersion. The degree of satisfaction with the VR application
significantly correlated with the degree of immersion and Behavioral Intention
to the VR Application. The detail factors of perceived ease of use significantly
correlated with the degree of satisfaction and influenced the degree of
immersion with the VR application. Finally, both <Klimt Inside> and <Stoclet
Frieze> did not guarantee the same quality of the original regarding usability
for appreciation. Most importantly, these technological reproductions never
fully substituted the originals, but their benefits are noteworthy as a means
for stimulating intrinsic motivation in learning. As more museums are exploring
ICT and VR technology in their exhibition environments, museum professionals and
technology specialists should collaboration well to achieve optimal results.
Insight on the visitor experience through in-depth and on-going research on the
adoption of technologies is required to enrich visitor engagement. |
Keywords: |
Information and Communication Technology, Digital Exhibition, Virtual Reality
Application, User Experience, Technology Acceptance Model (TAM) |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
THE RELATIONSHIP BETWEEN E-PERCEIVED VALUE, E-RELATIONSHIP QUALITY, AND
E-LOYALTY |
Author: |
HYUN-CHUL KIM, KEUM-SOO KIM, JAE-IK SHIN |
Abstract: |
In spite of their lack of income, high school students are more likely to make
independent purchasing decisions out of parental interference with their
consumption patterns. Understanding their online shopping propensity will help
expand a new market for Internet shopping malls. The purpose of this study is to
analyze the relationship between e-perceived value, e-relationship quality, and
e-loyalty, and to suggest implications of the study. The measures of this survey
were modified based on the review of previous studies and the hypothesis testing
was conducted on 472 high students of Gyeongnam province in South Korea. The
structural equation model of AMOS 21.0 was used. The results of the hypothesis
testing are as follows. First, e-perceived value has a positive effect on
e-satisfaction, e-trust, and e-commitment. Therefore, e-perceived value is
confirmed to be a major influence factor of e-relationship quality. Second,
e-satisfaction, e-trust, and e-commitment have positive effects on e-loyalty.
Therefore, it is confirmed that e-relationship quality is a major influence
factor of e-loyalty. The implications and limitations of this study are
presented in the conclusion part. |
Keywords: |
High School Student, Online Shopping, E-Perceived Value, E-Relationship Quality,
E-Loyalty |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
SYSTEM DESIGN OF SYMPTOM DETECTION OF MILD COGNITIVE IMPAIRMENT WITH
OBSERVATIONAL ROBOT |
Author: |
GO-EUM CHA, DO-EUN KIM, KANG-HEE LEE |
Abstract: |
This paper proposes a robot observation system that enables users to recognize
mild cognitive impairment and early dementia. The behavior of users will be
recognized by a household robot to accumulate behavioral data which are
forgetfulness, wandering and sleep disorder that is suspicious of dementia
symptoms. DemTect, which is a sensitive examination tool of cognitive impairment
for early dementia, can check symptoms of dementia immediately by data. This
process proceeds continuously. If the user is evaluated to be below the normal
range after the DemTect evaluation, this system notifies the caregiver that user
should be needed professional inspection, which proceeds continuously. This
system has the purpose not only to recognize signs but also to respond promptly
to early dementia. |
Keywords: |
Robot System Design, Mild Cognitive Impairment, Diagnostic System, Mobile
Application, Web Application |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
THE INTELLIGENT USER INTERFACE SYSTEM BASED ON 3D DIGITAL ACTOR AND UTILIZATION |
Author: |
EELJIN CHAE, JUNHO LEE, JUWON HWANG, HONGSIK PAK |
Abstract: |
In the era of Industry 4.0, when we observe the UI, which is a characteristic of
digital media with openness and interaction, we find that concepts and functions
improve with each new media appearance. The research process and methods for
improving these user interfaces can enable user-centered interactions between
users and digital devices based on 3D Digital Actor. We need to expand our
concepts and methods to create people or virtual people who have existed in the
past and present in 3D Digital Actor and use them as User Interface. Currently,
the level of applications developed by filmmakers and computer engineers in the
audio-visual industry has become so high that it is difficult to distinguish
actual human performance from digital human acting. In a system where 3D Digital
Actor acts as an operating system or application, it will recognize the form,
action, and expression between 3D Digital Actor and actively interact with the
user. This paper presents the development of 3D Digital Actor authoring tool in
conjunction with game engines is to expand 3D Digital Actor based intelligent
user-customized interface. |
Keywords: |
3D Digital Actor, Intelligent User Interface, Industry 4.0, Sound cognition
Interface, User Feeling. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
APPLICATION OF FITNESS SWITCHING GENETIC ALGORITHM FOR SOLVING MULTIDIMENSIONAL
KNAPSACK PROBLEM |
Author: |
KIM JUN WOO |
Abstract: |
Combinatorial optimization problems with constraints typically have many
infeasible solutions, which cannot be used as a final solution. Therefore,
metaheuristic algorithms for such problems must be carefully designed so that
the infeasible solutions are dealt with appropriately. For example, repair and
penalization are well-known feasibility handling approaches for genetic
algorithm. However, those conventional approaches are problem-specific, which
means that they must be appropriately tailored in order to be applied for
solving a specific problem. On the contrary, fitness switching strategy is a
general search strategy that can be used to develop genetic algorithms for
solving a wide range of combinatorial optimization problems with constraints.
Genetic algorithms based on fitness switching strategy need not to be equipped
with repair or penalization procedures. Moreover, the strategy enables to
utilize the infeasible solutions, typically ignored in conventional genetic
algorithms. In order to investigate the usefulness of fitness switching
strategy, this paper aims to extend the existing fitness switching strategy and
develop a fitness switching genetic algorithm for multidimensional knapsack
problem, which is a generalization of classical 0-1 knapsack problem. The
experiment results demonstrate that fitness switching strategy can be used to
develop effective metaheuristic algorithms for solving combinatorial
optimization problems with multiple constraints. |
Keywords: |
Fitness Switching Strategy, Genetic Algorithm, Infeasible Solution,
Multidimensional Knapsack Problem, Metaheuristic |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
FAST REPRESENTATION OF FLUID SHEETS WITH GRID PROJECTION AND CPU-GPU
HETEROGENEOUS COMPUTING |
Author: |
JONG-HYUN KIM , JUNG LEE |
Abstract: |
We introduce a fluid simulation method using a upsampling-based grid projection
and CPU-GPU heterogeneous computing that can explicitly represent and preserve
fluid thin sheets. The most important contribution of this paper is that the GPU
and grid projection are used to improve the particle-based framework to prevent
holes that appear to collapse at thin fluid surfaces or dense points. The
proposed framework can handle topology change reliably without numerical
diffusion or twisting problems. The anisotropic kernel and PCA (Principal
Component Analysis) are performed on the GPU to quickly find the direction of
fluid with a thin surface, and CPU-GPU heterogeneous computing technique greatly
enhances the efficiency of the candidate position extraction process to
calculate the position of a new fluid particle. Our technique is intuitively
implemented, allowing for easy parallelization and rapid visualization of the
surface of thin sheets of visually detailed water. As a result, we propose a
parallel processing framework that can quickly express surface details, such as
liquid sheets, that are difficult to represent in traditional particle-based
simulations and improve the surface details of the water simulation. |
Keywords: |
CPU-GPU heterogeneous computing, Thin sheets of water, Fluid simulation |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
BUSINESS MODEL INNOVATION FOR IOT SERVICE |
Author: |
ARUM PARK, KYOUNG JUN LEE |
Abstract: |
This paper presents the benefits and challenges that companies can get by using
the Internet of Things (IoT) technology. Researchers discovered business
problems and designed and implemented service model to solve problems through
action research. Action research methodology has five processes (diagnosing,
action planning, action taking, evaluating, and specifying learning). In
diagnosing stage and action planning, business problem and solution are derived
(IoT-based six service models). In action taking, system is constructed on the
real world space with IoT devices. In evaluation and specifying learning, the
results of the study are analyzed. Especially, the four key elements of
successful business model innovation (novelty, lock-in, complementarities,
efficiency) are explained. In addition, we analyzed the business model and
presented the benefits that stakeholders can gain as a result of business model
innovation. The study contributes by providing knowledge to researchers and
practitioners to study application of Internet of Things (IoT). |
Keywords: |
Internet of Things, Business Model Innovation, Action Research, System
Development, Service Design |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
UNDERSTANDING CONSUMERS' PURCHASE INTENTIONS IN ONLINE VIRTUAL COMMUNITIES: AN
INTEGRATION OF PERCEIVED BENEFIT AND COMMITMENT-TRUST THEORY |
Author: |
SAE BOM LEE, YUNG HO SUH, JAE YOUNG MOON |
Abstract: |
In the fourth industrial revolution era, people are purchasing products from
e-commerce. Even within the online community, we purchase products that match
the information provided by the community, or exchange used products. Therefore,
this study intends to study consumers' behavioral intention in online community.
The purpose of this study was to suggest factors affecting continuous
participation and purchase intention in online community of interest drawing on
the perceived benefit and Commitment-Trust Theory (CTT) to advance our
understanding. The collected 231 data through the survey were analyzed using
structural equating model analysis. SPSS 21.0 and AMOS 21.0 were used to analyze
the data. According to the result, continuous use intention influenced purchase
intention, and trust and commitment is critical for the continuance intention.
Of the four benefits, only learning, economic and hedonic benefits affected
trust and commitment. This study contributes to the existing research on online
communities as it combines perceived benefit and CTT to explain variances for
users’ continuous participation. This study also provides suggestions in
numerous ways regarding interest-based online community operations. |
Keywords: |
Digital Item Purchase, Online Community, Perceived Benefit, Commitment-Trust
Theory, E-commerce |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
ENVIRONMENT ANALYSIS OF LAYING HENS BASED ON DETAILED SOUND CLASSIFICATION USING
SVM |
Author: |
DAEYOUNG NA, SANG HO MOON, CHEOL WON LEE, HEUNG SEOK JEON |
Abstract: |
This paper suggests a classification model to analyze the status of environment
of henhouse or circumstances of laying hens in real-time by inspecting the sound
of laying hens. In this model, the sound of laying hens which has entered in
real-time through the sound sensor installed in the henhouse classified into
seven categories of sound. The goal is to analyze the classified sound of laying
hens in diverse potential circumstances measuring the status of laying hens and
environmental conditions of henhouses. Environmental status has been designed to
detect high and low temperature, high density, and high pollution. This model
was implemented by using SVM. According to the result of experiments, sound
category analysis of laying hens showed the accuracy of 70.3% in average, and
the estimation of environmental status showed 60.8% of accuracy in average. |
Keywords: |
Classification, Laying Hens, Sound Analysis, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
CLASSIFICATION OF WILD BIRD BY BEHAVIOR WITH FASTER R-CNN FOR COMPLICATED
ENVIRONMENT LIKE ORCHARD |
Author: |
CHEOL WON LEE, AZAMJON MUMINOV, DAEYOUNG NA, HEUNG SEOK JEON |
Abstract: |
Wild birds cause great significant damages to agricultural crops in orchards
every year. The previous non-reactive controlwild bird detection algorithm
methods have limitations that cannot be accurately detected because of the
biological characteristics of wild birds. are limited by the nature of wild
birds adapting rapidly to the environment through learning. Therefore, an
aggressive real-time wild bird detection method is needed to respond to wild
birds. In this paper, we propose a vision-based real-time wild bird detection
method algorithm that operates in a complicated environment like orchard using
the Wild Bird Behavior Classification(WBBC) modelFaster R-CNN of deep learning.
That is tThe Wild Bird Behavior Classification (WBBC) model algorithm,
classifies wild birds according to their behavior, which intended to improve the
detection ability accuracy in a complicated environment. We also verified the
performance benefit of Behavior Classification model and the performance of the
WBBC algorithm through experiments. In our experiments, the Behavior
Classification shows 3.6 percent growth than unused. of WBBC by comparing it
with previous bird detection methods. The WBBC method algorithm has detected
wild birds with an average of by 95.7 percent of% average accuracy in a variety
of environments. |
Keywords: |
Computer Vision, Bird, Detection, Faster RCNN, Deep Learning. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
MONITORING AND CONTROLLING BEHAVIORS OF LIVESTOCK USING VIRTUAL FENCES |
Author: |
AZAMJON MUMINOV, DAEYOUNG NA, CHEOL WON LEE, HYUN KYU KANG, HEUNG SEOK JEON |
Abstract: |
This paper describes our virtual fence system. The present invention is a method
of controlling animals without visible physical fences and monitoring their
condition. Control occurs through affecting to animals by using one or more
signals and electric shocks when they attempt a restricted zone as well as to
observe the condition, one of the best machine learning classifications named
Support Vector Machines (SVM) is used. A virtual fence boundary can be any
geometrical shape. A smart collar worn goats can be detected by using a virtual
fence application. Each smart collar consists of an XBee communication module, a
global positioning system (GPS), an electrical shocker, and an mp3 player.
Stimuli and classification results presented from on-farm experiments with a
goat equipped with a smart collar. |
Keywords: |
Virtual Fence, Smart Collar, Livestock, Machine Learning, IoT, SVM. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
MODELING OF CYBER THREATS IN INFORMATION NETWORKS OF DISTANCE EDUCATION SYSTEMS |
Author: |
ADRANOVA A., LAKHNO V., AKHMETOV B., KYSTAUBAYEVA A., MUSSAGULOVA G. |
Abstract: |
The work is devoted to the further development of the model for solving the
problem of information protection systems description in the context of its
interpretation for indicators characterizing threats of attacks on information
networks (INN) and distance education systems (DES) of large universities. It is
shown that on the basis of the proposed additions to the existing models, it is
possible to create specific correct Markov threat models of attacks on INN and
DES. The researches have shown that, in conjunction with the development of new
models and algorithms for choosing a rational investment strategy in
cybersecurity (CS) of DES, you can improve the methodology for the creation of a
functionally stable and protected DES. There is improved a method for detecting
cyber threats in the INN and DES. The improved method, in contrast to the
existing ones, contains recursive algorithms of distributed network
self-learning and the choice of countermeasures (strategies, in particular,
financial or technical for the protection side of the INN of DES) depending on
the type of cyber threats. It is shown that the implementation of the proposed
additions to the detection of cyber threats will allow the conclusion of
informed decisions about the necessary countermeasures in order to improve the
level of security of the INN of DES. |
Keywords: |
cyber security, distance education systems, mathematical modeling, cyber
threats. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
A SURVEY OF DIGITAL FORENSIC METHODS UNDER ADVANCED PERSISTENT THREAT IN FOG
COMPUTING ENVIRONMENT |
Author: |
AHMAD K. Al HWAITAT , SAHER MANASEER , RIZIK M. H. Al-SAYYED |
Abstract: |
DA Digital forensics has been recently become a significant approach to
investigate cybercrimes. Several questions exist about the future of this
domain. Many researchers have been done in this field for development, they
analyzed the challenges within the domain of cloud computing and an advanced
persistent threat (APT) attack. These challenges are rapidly increasing as the
volume of data increase, and the technology that the attacker used is
continually developed. However, the lack of valid evidence data that is due to
the diversity of technology, the deployment platforms, and the less effective
models for processing huge volume of data as seen in FOG computing whereas there
is a limitation in the analysis tools that are using for investigation of
cybercrime. The work in this paper represented in two folds the first is a
survey and the second is a proposed method. The survey review the current
forensic Methods under Advanced Persistent Threat (APT) attack and concentrates
on the challenge that faces cybercrime in Fog Environment. The other part
surveys Meta-heuristic approach such as particle swarm optimization (PSO) and
Frequencies particle swarm optimization (FPSO).Then we propose a unique method,
which deals with ambient environment and other ways of dealing at the network
level. The proposed method deals with APT attacks in a two-sided manner. The
first side identifies the detection and the second side analyzes the behavior of
the spread process. The proposed method is based on optimizing the solution
using Investigator Digital forensics particle swarm optimization (IDF-PSO) that
will be enhanced to detect APT attack that is considered an optimal solution for
collecting digital evidence, through to detection and classification APT attack
and Study of propagation behavior. |
Keywords: |
Digital Forensics , Investigation Cyber of Crimes , Security , APT Attacks, Fog
computing , Cyber security , Cloud Computing. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
Title: |
INFLUENCES OF E-WOM DATA ON VIEWER RATINGS |
Author: |
TAKHUN KIM , ALICE KYUNGRAN MA , JONGCHANG AHN |
Abstract: |
As media have evolved, consumer behavior for media and their contents were
developed together. For the traditional market of television and the program
that still maintain consumer power in terms of volume, that economic function
had been studied constantly. Therefore, the stakeholders who are seriously
interested in television program watching behavior are heavily noticing on
so-called e-WoM (word of mouth). With this situation, several studies were
performed to illuminate the effect of user-generated contents on the Internet
toward viewing rates. But the attention for essential characteristics for both
media content and user-generated content is considerably related to the
celebrities consisting of the media industry and contents inside. Thus the
analysis on checking the effect of consumer reaction’s volume toward celebrities
was performed. We collected the data of generated articles and the
consumer-generated comments inside for the television drama just until before
its first episode, to capture the factor explaining the number of viewer
ratings, or market share in the media industry. And it turns out that web buzz
data volume talking about celebrities made a positive impact on television
viewer ratings while other factors such as comprehensive user-generated
variables or promotion volume made by content supplier side were not. The
results show that the variable (the total number of articles received at least
one comment in the comment section) was significant statistically and present
meaningful suggestions for practitioners in an organization. |
Keywords: |
Media Management, e-Word of Mouth (e-WoM), User Generated Contents (UGCs),
Viewer Ratings, Celebrities |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2019 -- Vol. 97. No. 18 -- 2019 |
Full
Text |
|
|
|