|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
December 2019 | Vol. 97
No.24 |
Title: |
THE USE OF DELONE AND MCLEAN IS SUCCESS MODEL AND UTAUT APPROACH IN REVIEWING
ANY FACTORS WHICH INFLUENCE KOMINFO PORTAL SYSTEM |
Author: |
NABILLA ROSITA, NILO LEGOWO |
AC
Abstract: |
Department of Data Center and Information Facilities (Pusdatin) of the Ministry
of KOMINFO is one of the Ministries in Indonesia that has the task of carrying
out affairs in the field of communication and information technology in the
government. The Web Portal Kominfo has many benefits every day for the
performance of employees. At present the web Portal used by internal parties
experiences obstacles such as the SLA that is not yet clear and sometimes slow
response. So that it inhibits operational activities. For this reason management
of the Ministry of Information and Technology Center conducts an evaluation on
the Communication and Information Web Portal system so that employees have no
difficulty in using it. The purpose of researching and analyzing how successful
the implementation of the web portal system at the Ministry of Communication and
Information, with the method used DeLone and McLean, and two additional
variables from UTAUT. The population is internal employees who already have
accounts to use the web portal and the number of samples needed in the study of
356 samples, and data processing using Smart PLS. This research uses several
variables from DeLone & McLean, including: Information Quality, System Quality,
Service Quality, Use, User Satisfaction, Net Benefit, and two additional
variables from UTAUT, namely Performance Expectancy and Effort Expectancy. Some
of the variables involved in this study include some influence on the
Communication and Information web portal. The success of information systems is
strongly influenced by several factors, where these factors are very dependent
on the conditions and environment in which the system is implemented. To find
out which factors are the most dominant, a factor analysis is needed by first
submitting a number of hypotheses on factors that are theoretically considered
to influence the success of the system. Data processing results show that 6 out
of 11 hypotheses are considered to be proven, namely that user satisfaction is
strongly influenced by second main factors as follows: information quality,
service quality, and net benefits influenced by Intention to use , User
Satisfaction, and the remaining any 5 hypothesis are rejected. |
Keywords: |
Factors, Kominfo Portal, DeLone & McLean, UTAUT |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
SEGMENTATION OF BRAIN MR IMAGES USING ROUGH SET BASED INTUITIONISTIC FUZZY
C-MEANS |
Author: |
GAGAN KODURU , KUDA NAGESWARA RAO , ANUPAMA NAMBURU , SIBI CHAKKARAVARTHY |
Abstract: |
Intuitionistic fuzzy sets and rough sets are widely used for medical image
segmentation, and recently combined together to deal with uncertainty and
vagueness in medical images. In this paper, a rough set based intuitionistic
fuzzy c-means clustering algorithm is proposed for segmentation of the magnetic
resonance (MR) brain images. Firstly, we proposed Generalized intuitionistic
rough fuzzy c-means [1] algorithm to overcome the dependency with the membership
function, parameter tuning and histogram based initial selection of centroids to
avoid local minima. In this paper, a modified generalized rough intuitionistic
fuzzy c-means is proposed to avoid the histogram-based selection of initial
centroids, instead from the obtained intuitionistic regions the centroids are
calculated. Also, a minimized distance measure is proposed to improve the
performance in all considered scenarios. Experimental results demonstrate the
superiority of proposed algorithm. |
Keywords: |
Intuitionistic Fuzzy Sets, Segmentation, Rough Sets, Brain Image, Soft Sets |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
REDUCED SISO POSITION MODEL AND PD CONTROL OVER FPGA FOR A DIFFERENTIAL ROBOT
PLATFORM THAT USES A TWIN ULTRASONIC SENSORS SYSTEM |
Author: |
EDWAR JACINTO GOMEZ, FREDY HERNAN MARTINEZ, FERNANDO MARTINEZ SANTA |
Abstract: |
This paper shows the design, calculus and implementation of a digital PD
(proportional derivative) position control for a differential two-wheeled robot
commanded by means of a FPGA (Field Programmable Gate Array). It started with
the design of the digital driver for the ultrasonic sensors (located in both
sides of the robot) which gets the differential distance between walls or any
other obstacle; this is followed by the modeling of the robot taking it into
account as a dynamic plant and giving to both sensors and both motors the
treatment of only one sensor and only one motor, which reduces the model to a
simple SISO system. After that, this shows the design and optimization of the
controller using the root location approach, then the digital controller is
obtained by means of applying a discretization method over the designed
controller. After, the design of the digital controller is implemented on a FPGA
device using VHDL as hardware description language. Next, some simulations of
the system response in open loop and along with the digital control are shown,
as well as the block diagram of the whole digital control and the code of the PD
controller are shown. Finally, this shows how the generated controller improves
the behavior of the position of the robot for most of the testing cases. |
Keywords: |
PD Controller, Differential Robot Platform, Digital Position Control, FPGA,
Ultrasonic Differential Sensor |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
α-SKEW π-ARMENDARIZ RING FOR IMPROVING SECURE ALGEBRAIC ZERO KNOWLEDGE
CRYPTOSYSTEM |
Author: |
AREEJ M. ABDULDAIM |
Abstract: |
A zero knowledge proof is a form of an authentication technique that gives no
data more than the authenticity allowed to mark a being. Without transit any
data about the password to the other trusted tip, the password must be known by
the first party and he must prove that. The proposed scheme is considered as a
method for preventing a password over a particular network that is capable of
being detected by a third party. Factorization and discrete logarithm problems
(which are hard mathematical problems) are adopted in several public-key
cryptosystems. Nowadays, several cryptographic protocols have been improved with
respect to noncommutative algebraic frameworks like authentication and
encryption-decryption methods. They are proven to be efficient in corresponding
to their commutative case. Under this study, proof on a novel zero knowledge is
based typically on α-skew π-Armendariz rings is proposed. The algebraic
structure (α-skew π-Armendariz ring) is the heart of this method. Unlike methods
raised previously for the zero knowledge proof, this work is searching to
construct an algebraic scope of the zero knowledge proof depending upon the
constraint in the definition of the mentioned ring. |
Keywords: |
α-Skew π-Armendariz Ring, Zero Knowledge Proof, Algebraic Structure,
Authentication, Cryptosystem. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
SEGMENTATION OF TOOTH USING WATERSHED TRANSFORM AND REGION MERGING |
Author: |
HAJAR HADDANI, ABDELMAJID EL MOUTAOUAKKIL, FATIHA BENZEKRI, RACHIDA IHYA |
Abstract: |
Due to the great influence in image analysis and processing systems, the problem
of image segmentation has been studied for years; there is not yet any automatic
method able to correctly process any kind of image. In this study we did
concentrate about the most important method of segmentation, “The Watershed
transformation”. However, The watershed method has interesting properties that
make it useful for many different image segmentation applications: it is simple
and intuitive can be parallelized, and always produces a complete division of
the image, when applied to medical image analysis, it has important drawbacks:
over segmentation, sensitivity to noise, poor detection of thin or low signal to
noise ratio structure and others problems, the current approach we use due to
correct some drawbacks, to minimized the number of watersheds by merging it but
is still close to the original. |
Keywords: |
Image, Watershed Transform, Segmentation, Merging Region, Cost, Variance, Nodes,
Region |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
NEW HYBRID METHODOLOGY FOR SECURE SYSTEMS |
Author: |
MOHAMMAD ZAKARIA, ABDALLAH QUSEF, ISRAA ALBADARNEH, AALAA ALBADARNEH |
Abstract: |
Software security is considered as a time consuming and after-thought activity,
this could be because of its complexity or the lack of enough knowledge. Today`s
software development companies are focusing on high speed software delivery,
however, many companies are still using the traditional methodologies. In this
paper, we propose a new secure methodology named NHMSS, which aims to give
security its needed attention by the development team, the proposed methodology
mixed Waterfall and Scrum to produce a hybrid software development approach that
will apply the rules of both of them. The methodology will integrate security
activities according to well-known security processes and best-practices. |
Keywords: |
Software development methodology, Security, Secure System, Agile, Waterfall,
Scrum. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
TCP AT-ER: TCP ADAPTIVE TIMEOUT BASED-ON EARLY RETRANSMISSION OVER MANET |
Author: |
NJOUD O. Al-MAAITAH |
Abstract: |
Transmission control protocol (TCP) is a transport layer protocol that provides
many services to the network, such as reliable transmission and flow control.
TCP provides reliability either by using timeout retransmission that based on
timeout calculation or by fast retransmit mechanism that depends on receiving
three successive duplicated acknowledgments. However, waiting for along period
of timeout or waiting for three duplicated acknowledgments, could increase total
delay and decrease the data transmission in a wireless network, which in turn
negatively affects its performance. Since TCP was originally designed for wire
networks, it suffers from low performance over Mobile Ad hoc network (MANET).
TCP interprets packet loss as congestion and blindly doubling timeout value by
ignoring any other reasons such as link failures due to mobility or high bit
error rates. Therefore, we need calculating a suitable value of timeout which
reflect the real reason of loss. This paper modifies the timeout calculation
approach in order to obtain more accurate retransmission time based on MANET
environment state. It uses the difference time between the first and second
acknowledgments as indicator to network state. Also it proposes a reduction of
the number of required duplicated acknowledgments to two rather than three to
solve a case when there are no sufficient number of duplicated acknowledgments
to fire fast retransmit. Using a discrete simulator, a set of experiments with
various traffic load and mobility speeds have been conducted to assess the
effect of proposed method (AT-ER) over TCP New Reno. Results have shown that
AT-ER improves TCP New Reno throughput by 20% over MANET. |
Keywords: |
TCP, New Reno, Timeout, Fast Retransmit, adaptive timeout, MANET. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
ENERGY EFFICIENCY AND SCHEDULING TECHNIQUES USING CLOUD COMPUTING METHODS WITHIN
DATA CENTERS |
Author: |
YAO FRANCOIS MICHAEL KRA , SAAD MASOOD BUTT , NOAH KWAKU BAAH , IMRAN MEMON ,
BOAFOH KYEI BAFFOUR , FRANCK ADDO MANTE , MALO TEHINKE ACHILLE |
Abstract: |
As knowledge increases and technology advances, a large pool of data has become
available to man. With data growing endlessly every day, data centers have
become important in ICT, emphasizing the need to ensure efficient use of energy.
Due to the high quantity of electricity consumed by these data centers, Data
centers in the U. S. alone has been estimated to consume about 92-billion
-kilowatt-hours of voltage during the year 2013. By 2020, the power consumed is
predicted to reach 140-billion kilowatt hours and estimated to causes release of
about 145-million metric-tons of carbon substances yearly. Datacenters have
rapidly come to be the pillar of the global mobile system. In the present paper,
we surveyed on various techniques used for efficient scheduling of tasks in
datacenters and also reviewed the traditional scheduling algorithms advantages
and their disadvantages to better insight new researchers in this field of
research. We discussed contributing issues to data centers energy inefficiency
such as Physical servers, Energy-efficient hardware, energy efficient workflows,
Cooling Equipment, and Power plants. We recommended some optimal techniques and
prospect directions regarding the future development of new algorithms to
overcome some of the energy inefficiency drawbacks in the cloud data centers. |
Keywords: |
Data Green Centers, Task scheduling, Cloud Computing, Energy Efficiency,
Scheduling Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
A MULTI-SCALE DEEP LEARNING NETWORK FOR VEHICLE DETECTION |
Author: |
HOANH NGUYEN |
Abstract: |
Vehicle detection is an important subject in intelligent transportation systems.
With the development of deep learning, many methods for vehicle detection based
on deep learning have been proposed and showed better performance compared with
traditional methods. However, due to difficult conditions such as occlusion or
truncation of vehicle in image, small size of vehicle, and environment
conditions, the performance of deep learning-based vehicle detection is still
limited. This paper proposes a multi-scale deep learning framework for vehicle
detection in traffic scene. To improve the performance of small vehicle
detection, an enhanced multi-scale feature map generation module is designed to
fuse different convolution layers at different scales of the base network and
create the enhanced feature map which improves the resolution of small vehicle
and simultaneously includes more semantic information. In the detection stage,
the information surrounding a given object proposal is exploited to enhance the
feature representation of proposals. At final stage, a classifier including a
region of interest pooling layer and fully connected layers is used for
classification and bounding box regression. For evaluating the proposed
framework, the KITTI dataset is adopted. Experimental results on the KITTI
dataset show that the proposed method achieves nearly as performance as other
state-of-the-art methods on vehicle detection. |
Keywords: |
Vehicle Detection, Convolutional Neural Network, Intelligent Transportation
System, Object Detection, Deep Learning |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
ONLINE GAMING ADDICTION AMONG ADOLESCENTS IN KUWAIT: PRIVATE SECTOR |
Author: |
REEM NASER ABDULRAHMAN AL-KHALEEFI , EIMAN TAMAH AL-SHAMMARI |
Abstract: |
The popularity of online gaming has introduced many issues and concepts that
former research ascertains such as pathological gaming, gaming disorder and
online gaming addiction, as some extreme gamers may exhibit some indications of
addiction symptoms that are equivalent to those of more serious pathological
addictions like gambling and substance addiction symptoms, as many aspects of
their lives can be affected negatively. This research aims to determine
whether adolescents in Kuwait are at risk of being addicted to online gaming
while considering gender differences. Additionally, we explore possible
correlations between academic performance and online gaming addiction.
Problematic online gaming questionnaire (POGQ) was applied on a random sample of
248 adolescent students in their private schools, 158 males and 90 females,
whose ages ranged from 10 to 17. Analysis was performed using Confirmatory
Factor Analysis (CFA), Latent Profile Analysis (LPA), and statistical analysis. |
Keywords: |
Health Informatics, Online Gaming, Problematic Online Gaming, Addiction,
Adolescents, POGQ |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
PROFILING THE AVERAGE SAUDIS TRUST TOWARDS THE SOCIAL MEDIA |
Author: |
DIMITRIOS XANTHIDIS , PAVLOS NIKOLAIDIS , OURANIA K. XANTHIDOU |
Abstract: |
It is claimed that the use of Social Media has entered the era of maturity in
Saudi Arabia with an increasing number of studies focusing in examining the
phenomenon. The aim of this quantitative study is to profile the average Saudi’s
attitude towards the Social Media and to investigate the level of trust of the
local individual to the medium and study the motives or obstacles for revealing
one’s true identity online. The results point to a heavy use of the social
networks and suggest that the younger the user the more likely it is to get
involved in the Social Media. In the case of females, though slightly less in
population, the use seems more intense. There is no indication education affects
the frequency of the use as long as the individual has a degree at least higher
than a secondary diploma. Likewise, income and employment status only indirectly
affect the use since they affect the amount of free time one has to get involved
with the Social Networks and the more one is connected with the Internet the
heavier the use. As to trust the study shows Saudis are reluctant to accept the
motivations for such an attitude but, on the other hand, they don’t seem to
agree with the proven concerns related to the threats associated with it. |
Keywords: |
Saudi Arabia, Social Media, Identity Disclosure, Trust, Threats |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
3D OBJECT RECONSTRUCTION FROM 3D POINT CLOUD BY SUPERSHAPES USING PSO |
Author: |
REMMACH HASSNAE , SADGAL MOHAMMED |
Abstract: |
In this paper, we apply the PSO method 'Particle Swarm Optimization' to
reconstruct a 3d object from a 3d point cloud using supershapes. Reconstructing
a 3d object from a 3d point cloud obtained from different devices is very
important in many fields. For instance, the use of 3d scanners is very common in
the field of medicine. Thus, a good reconstruction of the 3d point cloud given
by the device can be very helpful. This problematic can be summed up in finding
the surface that approximate the best the point cloud provided at the beginning.
The rarity of works applying optimization methods and especially metaheuristics
to this kind of issues in the literature makes the originality of this work. We
have opted in our work to use a population-based metaheuristic method. The
parametric surfaces employed in our work are the recent forms introduced
recently by Gielis; called supershapes. We have also used the radial Euclidean
distance in the definition of the fitness function. This function will serve as
an indicator of dissimilarities between the original form and the reconstructed
one. Our approach has been quite successful in providing very satisfactory
results compared to the existing results in the literature. |
Keywords: |
PSO, 3D Reconstruction, Supershapes, Fitness Function, Point Cloud. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
BAHASA INDONESIA TEXT CORPUS GENERATION USING WEB CORPORA APPROACHES |
Author: |
AMALIA AMALIA, OPIM SALIM SITOMPUL, ERNA BUDHIARTI NABABAN, MAYA SILVI LYDIA,
NADIA RAHMATUNNISA |
Abstract: |
A text corpus is a collection of texts stored electronically for various
research and investigation for Natural Language Processing (NLP) needs. Bahasa
Indonesia is the Indonesian language that is used officially by the Indonesian
people, amounting to around 230 million people. However, the development of the
NLP of Bahasa Indonesia is not as fast as English. One of the factors because
Bahasa Indonesia still has limited linguistic resources like corpus. This study
aims to generate Bahasa Indonesia text corpus using a web corpora approach for
general purpose in NLP. We collected texts from the seven largest Indonesian
online news sites with various categories covered in 52 URLs. The research
stages contain resource observation, web structure analyzing, website crawling,
scraping, and data cleaning. The last step, the clean data, which is a
collection of sentences then arranged into a machine-readable format. In this
study, the percentage of successful crawling content from the resources is
85.85% or 569.456 news articles, with 219.392 distinct tokens. It can be
concluded that web corpora approaches can produce text corpus for Bahasa
Indonesia. |
Keywords: |
Natural Language Processing (NLP), Corpus, Bahasa Indonesia, Web Corpora, Scrapy |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
LEARNING PATH MODEL BASED ON COGNITIVE CLASSIFICATION USING HYBRID DISCRETE
PARTICLE SWARM OPTIMIZATION |
Author: |
EKO SUBIYANTORO, AHMAD ASHARI , SUPRAPTO |
Abstract: |
Revised Blooms Taxonomy (RBT) brings up taxonomic tables which are
interrelations between cognitive processes and knowledge. Taxonomic tables can
measure the depth and breadth of learning goals to be achieved. The variety of
characteristics of students' abilities in a class has always been a problem that
is often faced by a teacher. Unfortunately, cognitive classification to develop
student knowledge towards Higher Order Thinking Skills has not been used to plan
the learning path model. The purpose of this study is to determine the learning
path recommendation that is appropriate to students' cognitive abilities based
on the revised Bloom Taxonomy and ontology learning objects. The cognitive
classification of students uses the Learning Vector Quantization (LVQ) method to
get three cognitive classes (Cognitive Low, Cognitive Medium, and Cognitive
High). Whereas to determine the learning path using the Hybrid Discrete Particle
Swarm Optimization (HDPSO) method to overcome combinatorial problems, namely the
learning object ontology with discrete PSO that is controlled by cognitive
classes using binary PSO. The determination of the learning path is based on
testing the RBT connection quality between LO and the ontology of a subject
controlled by the student's cognitive class. The RBT cognitive classification
results of the developed model can identify student cognitive with very high
accuracy through determining the appropriate learning rate on the LVQ network.
While the Hybrid Discrete Particle Swarm Optimization (HDPSO) method applied can
overcome combinatorial problems more practically and regularly in determining
the learning path. Experimental studies show that the models and techniques
presented are suitable for finding a learning path that fits a student's
cognitive class. |
Keywords: |
RBT, learning object, ontology, learning path, HDPSO |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
CARDIOSYS: HUMAN CARDIOLOGY MEASUREMENT SYSTEM BASED ON INTERNET OF THINGS |
Author: |
RIDHA MULDINA NEGARA, ROHMAT TULLOH, ADIBAH ALFASYANAH, ASTARI UMBARAWATI |
Abstract: |
Indonesia as an archipelago requires a technology-based health data collection
system that can be a reference in the distribution of health services for its
citizens. Internet of Things (IoT) is currently a global concern because of its
ability as an ecosystem that is built from many hardware connected via the
internet that is connected via the internet. CardioSys development, consisting
of health gauges integrated with IoT-based software applications, is an option
to help collect disease data in the cardiovascular system. IoT allows CardioSys
devices to interact with the outside environment or with their internal
circumstances. CardioSys hardware is integrated with the CardioSys application
using the internet so that medical staff/doctors do not need to record
measurement results and record measurement data manually. CardioSys measurement
and recording results can be accessed on the android application features.
Measures in the form of blood pressure, heart rate, and body temperature are
automatically and realtime sent by the CardioSys hardware to the Firebase
realtime database. Cardiology devices and human body temperature gauges are
designed using ESP8266 wireless module as a microcontroller connected to three
sensors, namely the MPX4250AP sensor, heart rate sensor, and DS18B20 sensor that
allows users to monitor blood pressure, heart rate and body temperature
displayed in applications that have been displayed created using Android Studio
software, so this application can store measurement results for many users.
Based on the results of this test, the percentage of errors for blood pressure
in the form of systole is 7% and diastole is 17%, heart rate is 15%, and body
temperature is 3%. Also, based on a questionnaire from several respondents
showing that 80% said they agreed on the application of monitoring cardiology
and body temperature following the user's needs. Indonesia as an archipelago
requires a technology-based health data collection system that can be a
reference in the distribution of health services for its citizens. Internet of
Things (IoT) is currently a global concern because of its ability as an
ecosystem that is built from many hardware connected via the internet that is
connected via the internet. CardioSys development, consisting of health gauges
integrated with IoT-based software applications, is an option to help collect
disease data in the cardiovascular system. IoT allows CardioSys devices to
interact with the outside environment or with their internal circumstances.
CardioSys hardware is integrated with the CardioSys application using the
internet so that medical staff/doctors do not need to record measurement results
and record measurement data manually. CardioSys measurement and recording
results can be accessed on the android application features. Measures in the
form of blood pressure, heart rate, and body temperature are automatically and
realtime sent by the CardioSys hardware to the Firebase realtime database.
Cardiology devices and human body temperature gauges are designed using ESP8266
wireless module as a microcontroller connected to three sensors, namely the
MPX4250AP sensor, heart rate sensor, and DS18B20 sensor that allows users to
monitor blood pressure, heart rate and body temperature displayed in
applications that have been displayed created using Android Studio software, so
this application can store measurement results for many users. Based on the
results of this test, the percentage of errors for blood pressure in the form of
systole is 7% and diastole is 17%, heart rate is 15%, and body temperature is
3%. Also, based on a questionnaire from several respondents showing that 80%
said they agreed on the application of monitoring cardiology and body
temperature following the users needs. |
Keywords: |
Cardiovascular, IoT, ESP8266, MPX4250AP, Firebase, Android |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
DFIM: A NEW DIGITAL FORENSICS INVESTIGATION MODEL FOR INTERNET OF THINGS |
Author: |
MOHAMMAD QATAWNEH , WESAM ALMOBAIDEEN , MOHAMMED KHANAFSEH , IBRAHIM AL QATAWNEH |
Abstract: |
The Internet of Things (IoT) smart devices have been used widely in several
applications such as healthcare, education, environment, transportation, smart
city, etc. These objects are resource-constrained devices which involve lacks
regarding security and may lead to cyber-crime. Therefore, the IoT devices may
contain evidence that are considered as an important need to investigators and
can be admitted in courts. To tackle this problem most current research focuses
on security issues for different IoT architectures rather than approaches and
techniques of forensic acquisition and analysis for IoT objects. In this paper,
we propose a new Digital Forensics Investigation Model for IoT (DFIM). The DFIM
has two main components: The Data Provider Zone (DPZ) which responsible for
grouping all data gathered by sensor nodes into a set of groups, where each
group contains data or documents related to each other, and the investigation
authority which receives the requests from the claimers for investigation, check
the validation of the request, and finally select the appropriate investigators.
In order to improve the IoT forensics investigation process, the proposed DFIM
consists of seven stages and takes into consideration a set of principles such
as security, privacy accuracy, performance, data reduction, Openness and
transparency. |
Keywords: |
The Internet Of Things, IOT Forensics, Investigation Authority, Examination
Stage, Investigation Process, Committee Of Investigators. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
Title: |
MOTIVATION IN SELECTION OF OPEN SOURCE SOFTWARE LICENSE: ECONOMIC AND SOCIAL
PERSPECTIVE |
Author: |
M. ABDUL QADOOS BILAL , SHAHBAZ AHMED KHAN GHAYYUR , BILAL AHMED , SAIMA KANWAL
, ZOYA NAZIR , IFFAT RUBA |
Abstract: |
Open-source software development widely used the practice of software
engineering now a day. It is needed to explore the motivational factors for the
selection of open source software licenses. The objective of this research is to
find out the motivational factors for the selection of open source software
licenses concerning economic and social perspectives. Literature reported
motivational factors are verified. Types of different aspects of OSS license
selection do not include in the scope of this study. The research question
answered through the survey research method. We floated the survey in both local
(Pakistani) and international open-source software development community. The
results show motivational factors for open source software license selection
with respect to economic and social perspectives according to the expectations
of local (Pakistani) and international open-source software development
community. Literature reported motivational factors verified in this study.
There is no significant way/process to adopt any open source software license.
To choose an OSS license from a huge OSS license population is concerned about
the behavior of decision-maker personals. These motivational factors are those
on which the open-source software development community has made their choice of
the open-source software license. |
Keywords: |
Open Source Software, Open Source Software Development, Open Source Software
License, Open Source Software Development Community, Free Software |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2019 -- Vol. 97. No. 24 -- 2019 |
Full
Text |
|
|
|