|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
February 2019 | Vol. 97
No.03 |
Title: |
A NOVEL TWO-DIMENSIONAL SPECTRAL/SPATIAL HYBRID CODE FOR OPTICAL CODE DIVISION
MULTIPLE ACCESS SYSTEM |
Author: |
RIMA. MATEM, S. A. ALJUNID, M. N JUNITA, C. B. M RASHIDI, ISRAA. SHIHAB AHMED |
Abstract: |
A newly two-dimensional hybrid code based on Zero Cross Correlation (ZCC) and
Multi Diagonal (MD) codes (2D ZCC/MD) has been proposed for incoherent spectral/
spatial OCDMA system in this paper in order to supress MAI and mitigate PIIN.
The 2D ZCC/MD keep the zero cross correlation property since the both of Zero
Cross Correlation (ZCC) and Multi Diagonal (MD) codes have zero cross
correlation property. Using the direct detection technique the proposed code is
analysed where the performance of 2D ZCC/MD code is compared with existing 2D
FCC/MDW and 2D DPDC. The analytical results prove that at low BER and high data
2D ZCC/MD can support more simultaneous user. |
Keywords: |
Optical Code Division Multiple Access (OCDMA), Multiple Access Interference
(MAI), Zero Cross-Correlation Code (ZCC), Multi-Diagonal code (MD), Phase
Induced Intensity Noise. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
EVALUATION OF E-KELURAHAN INFORMATION SYSTEMS AT SUBDISTRICT OF PANCORAN MAS
DEPOK USING TECHNOLOGY ACCEPTANCE MODEL |
Author: |
YENNY FRANSISCA LAMPOUW , AHMAD NURUL FAJAR |
Abstract: |
In an effort to improve the quality of public services, the Government Issues
Minister Regulation No. 24 Year 2006 on Guidelines for the Implementation of
Integrated Services One Stop. As well as through the Minister of Home Affairs
No. 4 of 2010 launched a program called the Integrated Administrative Service
Sub-District or abbreviated PATEN. Utilization Implementation of System E -
Kelurahan on integrated sub-district administrative services are expected to
boost the performance to support the implementation of good governance, it is
necessary for adaptation by the user and the environment in order to obtain
optimal results. Methods TAM (Technology Acceptance Model) is used to determine
how much influence the perceived ease of use and perceived usefulness in the
implementation process System E-Kelurahan Pancoran Mas Depok sub-district. |
Keywords: |
Integrated services, Good governance, Technology acceptance models |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
HAND GESTURES RECOGNITION WITH IMPROVED SKIN COLOR SEGMENTATION IN
HUMAN-COMPUTER INTERACTION APPLICATIONS |
Author: |
ROMI FADILLAH RAHMAT , TENGKU CHAIRUNNISA1, DANI GUNAWAN , MUHAMMAD FERMI PASHA
, RAHMAT BUDIARTO |
Abstract: |
Hand gesture has significant roles in human’s interaction and the hand gesture
recognition itself nowadays becomes an active research area in human-computer
interaction. Previous researches on hand gesture recognition used various
techniques and tools such as Kinect and data glove. Hand gesture recognition
area has many challenges, such as variation of illumination conditions, rotation
problem, background problem, scale problem, and classification or translation
problem. This research uses computer vision techniques to recognize hand gesture
in human-computer interaction to control various apps, such as slideshow
presentation, music player, video player, and PDF reader app for people with
bare hand and in complex background of the image via web camera. Thus, a method
is required to cope with background and skin detection problem. The proposed
method combines two color spaces into HS-CbCr format for skin detection and uses
averaging background for solving the background problem. The experimental
results show that the proposed method is able to recognize hand gesture and
reach up to 96.87% of correct results in good lighting condition. The accuracy
of hand gesture recognition is influenced by lighting condition. The lower
changing illumination on video occurs, the higher accuracy of hand gesture
recognition is generated |
Keywords: |
Hand Gesture Recognition, Human Computer Interaction, Skin Detection, Average
Background, Convexity Defects |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A PROPOSED METHOD OF SELECTING PAIRS OF SIFT POINTS |
Author: |
MOHAMMED I. ABD-ALMAJIED , LOAY E. GEORGE , KAMAL M. ABOOD |
Abstract: |
Pattern matching between two scenes is an important part in image or pattern
recognition and registration. It based on finding the best match between two
scenes using some selected control points. Image of Solar Planets are somehow
difficult in defining distinctive features for matching especially when compared
with Earth’s image (ex. Contrast, resolution). Geometrical transformation
(scaling and rotation) may affect the registration due to improper selection of
correct control points. The degree of distortion due to geometrical transform
may affect numbers and accuracy of match. In this article, a new auto-selection
method for the reference points is established. First, the scale compensation, a
new procedure has evaluated for the range of scaling factor (0.5-1.5). Also, the
method was established when there is a rotation effects associated with the
scaling one. It was evaluated for rotation range (1o-90o) with the same range of
scaling. Second, new matching method for finding the best match between the
selected list of control was introduced. This method depends on the distance and
angle between corresponding points. This method tested on satellite image of
Mars. A computer simulation was build using Matlab Language. The results showed
a good performance. |
Keywords: |
Sift Points, Pattern Matching, Rotation Assessment, Control Points List,
Scale Assessment. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
ENERGY CONSUMPTION IN MOBILE AD HOC NETWORK: CHALLENGES AND SOLUTIONS |
Author: |
HASAN AWNI SHAKIR, RAVIE CHANDREN MUNIYANDI, ZULKARNAIN MD. ALI |
Abstract: |
The composition of a Mobile Ad-hoc Network (MANET) is made without any fixed
infrastructure. This is presently one of the most attractive researches with
regards to wireless communication. MANET is a distributed mobile nodes
autonomous collection which has every node working in the form of a source and a
sink that is capable of relaying packets for other nodes. Dynamic network
topology and the nature of the distributed network, together with multi-hop
communication, limited bandwidth, and limited energy constraints are all major
features of a MANET. Taking the limitations of the nodes’ battery into
consideration, the nodes’ energy and the network’s lifetime are crucial problems
that confront MANETs. Thus, providing communication requires that an effective
routing technology allows node to establish communication in real time. Such
routing technique must have the ability of minimizing the energy costs and
computation overload on mobile host and traffic overhead on network. MANET
energy is reviewed in this paper. |
Keywords: |
MANET, Routing Protocol, Energy Consumption, Wireless Communication |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
AN EFFICIENT APPROACH OF EXTERNAL COMMUNICATION SYSTEM IN AUTONOMOUS VEHICLES
BASED ON CDMA |
Author: |
KHATTAB M. ALI ALHEETI, ABDULLAH MOHAMMED AWAD , MUZHIR SHABAN AL-ANI |
Abstract: |
There are large amounts of cars passing through the streets every day and this
increases significantly in the morning or evening rush hours. The automotive
industry has evolved greatly and many technologies have been introduced to
automate many of its functions. The emergence of driverless vehicles has led to
a boom in the world of automotive technology, because of its importance in
creating a new environment and new concepts aimed at human conformability and
increased productivity. Many solutions have been appeared to offer suitable
self-driving vehicles environment that is capable to overcome the arising
problems. When the self-driving vehicles are well equipped, the only remaining
goal is how to control external communications with other vehicles, with updates
that can appear in the road and with main center. This paper proposed code
division multiple access as a communication technology to overcome the problems
may appeared in time division multiple access. The synergy efforts in both
industry and research centers giving powerful push to the intelligent
transporting system. The proposed system of robot cars is implemented through
high way environment scenario. The communication system is implemented via code
division multiple access (CDMA) to realize high security, high quality of
services, robustness and high capacity. |
Keywords: |
V2V, Vehicular Networks, Self-Driving Vehicles, Multiple Access. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A HYBRID METHOD FOR EXUDATES DETECTION USING CHAIN PROCESSING BY WATERSHED
SEGMENTATION AND K-MEANS CLUSTERING |
Author: |
MOKHLED S. ALTARAWNEH |
Abstract: |
The Exudates detection is an important task in diabetic retinopathy screening.
Chain processing method (CPM) for exudates segmentation and detection has been
designed for this purpose. CPM proposed new pre-processing approach, which
perform not only enhancement task, but also detect and crop object region of
interest in the image, which is the main contribution of this work. In post
processing stage, a double segmentation and clustering based on chaining
watershed and K-means clustering is proposed. The importance of the study lies
in the use of clustering segmentation based on chain processing. The method has
been validated on DIARETDB1 database; it is compared to 4 ground truths expert's
of database evaluation protocols. Following the database evaluation protocol
under statistical measurement factors to evaluate overall performance, it is
found that the sensitivity specificity, predictive value, and accuracy of
96.12%, 99.76%, 92.64% and 99.69% respectively. |
Keywords: |
Exudates detection, Watershed, K-means clustering, Segmentation. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
ORGANIZATIONAL GREEN INFORMATION TECHNOLOGY (IT) ADOPTION THEORETICAL
FRAMEWORKS: A SYSTEMATIC LITERATURE REVIEW |
Author: |
ABUBAKAR ATIKU MUSLIM, ALEX TZE HIANG SIM, JEE MEI HEE |
Abstract: |
Although, organisational Green Information Technology (Green IT) adoptions have
been on the increase, yet many organisations face difficulty in identifying and
adopting relevant Green IT strategy. Green IT adoption studies at the
organisational level are primarily based on theoretical frameworks. However,
these underlying theories are understudied. This paper review 103 published
research articles from leading information systems’ literature sources on
organisational Green IT adoption from 2007 – 2018 to guide future research. The
review focuses on the theoretical frameworks used in organisational Green IT
adoption studies and provides analysis by purpose, by country, by year of
publication and the frequency of use with insights and recommendations for
future research. |
Keywords: |
Green Information Technology (It), Green Information Systems (Is), Sustainable
It, Adoption, Is Theory |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A SOCIOMATERIALITY PERSPECTIVE ON INFORMATION SECURITY MANGEMENT IN ICT
OUTSOURCING ENVIRONMENT |
Author: |
KYUNG JIN CHA, HWA JONG KIM |
Abstract: |
Large scale ICT outsourcing allows enterprises to reduce ICT costs and procure
their competitive advantage as it enables them to focus on core competences.
Nonetheless, despite a recent outbreak of ICT adoption among companies; there is
serious outsourcing-related concern in regards to data security, such as
personal information leakages during IT outsourcing projects. Extant information
security studies provide different frameworks to solve these security matters in
outsourcing environment by stressing the need for application of information
security vulnerability and willingness to comply with security systems analyses.
However, several concerns arise as proposed measures only consider internal
environment without considering partner or sub-supplier’s internal culture.
Furthermore, in most cases research is limited to discussing network control and
systems supplements using the perspective of technical issues only. Subsequently
there is no consideration for the nature of ICT outsourcing security environment
which varies depending on size of an organization and complexity of outsourcing
stages. Thus this conceptual study proposes new theoretical framework for
information security management that concerns characteristics of ICT
outsourcing, considers perspective of sociomateriality and aims at strengthening
security capabilities in accordance with outsourcing types and organization’s
characteristics. |
Keywords: |
Management, Security, Human Factors, Theory |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
MULTI-GROUP ANALYSIS OF FACTORS DETERMINING USER’S COMMITMENT IN MOBILE SOCIAL
NETWORK GAMES |
Author: |
SAE BOM LEE, SEOKHUN KIM |
Abstract: |
Social Network Game genre is a game in which people connect to each other by
utilizing a mobile platform, and interact with each other while enjoying related
contents. It has now become a popular game. The purpose of this study is to find
significant factors that have effects on the commitment of M-SNGs. We also
conduct multi-group comparison test to study the difference in factors of models
between 2012 and 2016. We use structural equation model analysis with SmartPLS
3.0 and compare models of different times. This study is to give academicians
and practitioners insight about its effects and implications. The results showed
that there was a significant difference between the two groups only in the
relationship between competition-commitment and social interaction-commitment.
This study is to give academicians and practitioners insight about its effects
and implications. |
Keywords: |
Mobile Social Network Game, Commitment, Social Factors, Social-Game Factors,
Game Factors |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
HUMAN EAR RECOGNITION USING SURF-PSO TECHNIQUE |
Author: |
AHMED ALI AHMED AL-DULAIMI, JAMAL MUSTAFA ABBAS AL-TUWAIJARI, ZIYAD TARIQ
MUSTAFA AL-TA I |
Abstract: |
Human ears have shown significant robustness and distinctiveness in human
biometric applications. Thus, many techniques have been proposed to recognize
humans, based on the shape of their ears. In this research, Speeded-Up Robust
Feature (SURF) technique is employed in an ear recognition method, which
measures the similarity between the input ear image and the ear images of known
individuals in a database. The performance of this method is optimized using
Particle Swarm Optimizer (PSO), which is used to reduce the size of the
descriptors generated by the SURF method, before used in similarity
measurements. Any descriptor value that has negative or no influence on the
similarity measurements is removed. The approach (SURF-PSO) has been able to
improve the performance of the SURF method, by increasing the recognition
accuracy and reducing the time required of measuring the similarities. The
evaluation results using three datasets, show that the recognition accuracy of
the SURF-based method is improved by 2.41%, while the average time per each
similarity measurement has been reduced by 43.72%. The performance of the
optimized method is compared to the performance of ear recognition using
Feed-Forward Neural Network (FFNN) and Convolutional Neural Network (CNN)
techniques, which are designed and implemented. Although the use of CNN has
shown better performance, the classification approach is difficult to implement
in real-life applications, according to the need to retrain the classifier upon
any modification to the database of the known individuals, and also the topology
of the classifying neural network is relevant to the number of individuals that
it can recognize. However, the proposed method has shown better performance than
the other techniques in the literature that are used for the same applications.
where the performance optimization has reduced the gap between the SURF-PSO
method and the CNN classification method , where the gap between CNN method and
SURF method is 6% and decreased to 3.59% between CNN method and SURF-PSO . |
Keywords: |
Ear Recognition, Cnn, Ffnn, Surf, Pso . |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
AN APPROACH BASED ON HETEROGENEOUS MULTI-AGENT SYSTEM FOR STOCK MARKET
SPECULATION |
Author: |
YOUNES CHIHAB , ZINEB BOUSBAA, HANA JAMALI, OMAR BENCHAREF |
Abstract: |
Foreign Exchange market (FOREX) is the global and most liquid market interested
in buying, selling and exchanging currencies. The price of these currencies
changes rapidly. However, we need to have a good trading strategy to take
advantage of these variations. As Forex is a dynamic market, it becomes more
difficult to control trading behavior and it becomes very complex to predict the
events that can occur. Due to the chaotic, noisy, and non-stationary nature of
the data, many algorithmic approaches were adopted in the aim to help traders
and make FOREX speculation successful. Algorithmic trading offers the ability to
have a strategy in advance. It helps traders to take the final decision. When
the decision is so wide and complex, that one algorithm cannot possess all rules
to take it. It becomes necessary to call upon several agents, who must work
together in pursuing a common objective. These agents co-operate with one
another to solve these decision problems. Coordinating between agents in a
multi-agent system gives more flexibility and performance to problem solving.
Each agent simultaneous results are combined by using a super-agent who helps to
make the final decision. In our paper, we propose a theoretical Multi Agent
System for stock market Speculation. We use four agents working in one system.
The first one is a Metaheuristic Algorithm agent, the second one is based on
technical indicators, the third one is a Text Mining agent, and the fourth one
is a Fundamental Factor agent. The final decision should be made based on the
combination of the four agents results. We think that working with
Metaheuristics can improve speculation results compared to the use of classical
algorithms. In perspective work, we test our system on a multi-agent systems
platform. |
Keywords: |
Stock Market, Speculation, Text Mining, Smart Agent, Technical Indicators,
Fundamental Factor, Metaheuristic, Particle Swarm Optimization, Multi Agent
System. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
DATA ANALYSIS IN SOFTWARE EFFORT ESTIMATION USING IMPROVED DELPHI METHOD |
Author: |
ASHISH RAI,, G. P. GUPTA, PANKAJ KUMAR |
Abstract: |
Software Estimation Accuracy is one of the most difficult tasks for the software
developers. Defining the project duration, effort estimation and estimated cost,
early in the development phase is greatest challenge has to be achieved for
software projects. Inaccurate effort estimation of software development is one
of the most important reasons of computer and IT major project failures. Low
effort estimates may lead to project management problems, delayed deliveries,
budget overruns and poor software quality, too high effort estimates may lead to
loss of business opportunities and improper and inefficient use of resources.
The projects main focus at Simulate Research Laboratory is to improve
judgment-based effort estimation methods, which is most frequently used by the
software industries. By introducing better mental steps in effort estimation, we
can achieve significant improvement in software development estimation
processes. There are great challenge while studying expert judgment like
Delphi Estimation. To understand the use of multidisciplinary competencies,
especially financial resources enables studies in realistic software development
process, psychology and software engineering. This paper explores the
relationship between development effort, team size and software size. The main
objective of this research is to improve the existing Delphi method for the
estimation of software development effort using hybrid approach. Proposed,
improved method has been validated by using 15 NASA project dataset and the
results show that the improved Delphi method for software effort estimation
resulted in slightly better as compared to results obtained earlier. |
Keywords: |
Effort Estimation, Productivity, Algorithmic Model, Variance, MMRE, Pred. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A NEW ALGORITHM WITH DIFFERENT MODULATION INDEX (MI) IN CASCADED H-BRIDGE
MULTILEVEL INVERTERS (CHB MLIS) |
Author: |
ROSLI OMAR , MOHAMMED RASHEED , NIZAM MIES, MARIZAN SULAIMAN , WAHIDAH ABD HALIM
, KRISMADINATA KRISMADINATA |
Abstract: |
The output waveforms of the multilevel inverters must be maintained smooth and
not highly contents of the harmonics.Due to that the research of the multilevel
inverters is still relevant to explore. For maintaining sinusoidal of the output
waveforms of the multilevel inverters the design of an appropriate controller is
crucial, hence the best controllers must be chosen. The suitable and its
performance of the controllers will determine whether the output waveforms of
the multilevel inverters can reduce the harmonics contains or not. This research
aimed to investigate the performance of the Firefly Algorithm (FFA) which is
applied to the modified cascaded H-Bridge multilevel inverters (MCHBMLIs) for
five levels for harmonics reduction of the MCHBMLIs output waveforms especially
for the currents and the voltages with different modulation index (MI). FFA is
considered as an easy way which is aims to compute of the switching angle to be
optimized for harmonics reduction in the proposed inverters.The concept is based
on the Selective Harmonics Elimination (SHE) and the FFA is capable to reduce
the lower order harmonics in the output voltages and currents of the waveforms.
In order to validate the effectiveness of the proposed algorithm a simulation
model has been built up. The parametric model of the simulation to be a
benchmark to build up a prototype. Finally the experimental results are a good
agreement with the simulation results. |
Keywords: |
Firefly Algorithm (FFA), harmonics, SHE, modulation index(MI). |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
MERGE BETWEEN CYCLIC PREFIX AND TRAINING SEQUENCE FOR CFO ESTIMATION TECHNIQUES
ON OFDM SYSTEMS |
Author: |
GHASSAN MUSLIM HASSAN , KHAIRUL AZMI ABU BAKAR, MOHD ROSMADI MOKHTAR |
Abstract: |
Synchronization is the essential process between the transmitter and the
receiver of wireless communication system, such as orthogonal frequency division
multiplexing. Two essential factors, namely, carrier frequency offset (CFO) and
symbol timing offset (STO) are related to synchronization. Each factor has
several methods for solving the problems from synchronization in the time and
the frequency domain. In this study, the work is performed in the time domain
that handles CFO effect. It uses two techniques, namely, a training sequence and
a cyclic prefix. Each technique hasadvantages and disadvantages. The proposed
method uses a hybrid of these two techniques for CFO estimation. Simulation
results corroborate that the proposed method has the combined benefits of both
methods. The signal-to-noise ratio is used as the indicator. It plays
substantial role with respect to bit error rate by transitioning from one
technique to another as shown in the research results. MATLAB is used to set all
simulation results. |
Keywords: |
OFDM, carrier frequency offset, Training Sequence, cyclic prefix. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
AN UNDERSTANDING RICE HYPERSPECTRAL REMOTE SENSING IMAGERY CLASSIFICATION
FRAMEWORK |
Author: |
PURWADI, NANNA SURYANA, NOR AZMAN ABU |
Abstract: |
The staple food for the Indonesian people is rice because in rice it contains a
large number of calories for the intake of more than 200 million people.
Hyperspectral is the sensors that can be used in a variety of applications, one
of which is for rice monitoring. Hyperspectral is a sensor that is very well
used to support precision agriculture because the information obtained is more
detailed. One method of monitoring rice is to use a classification method. Many
classification methods were carried out in previous hyperspectral studies such
as unsupervised, supervised, statistical-based and so forth. Some methods have
their own advantages and disadvantages. However, hyperspectral imagery has a
large number of bands, requires sophisticated analytical methods to analyze it
and requires a long process to extract priority information so as not to burden
computing. In this paper discusses the state-of-the-art framework and step by
step regarding the classification methods commonly used to rice monitoring. From
the results of the review, it was found that the RBFN classification technique
has the best accuracy compared to other classification techniques. |
Keywords: |
Rice Monitoring, Classification, Hyperspectral, Remote Sensing, Framework |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A SYSTEMATIC LITERATURE REVIEW ON ENTERPRISE ARCHITECTURE DEVELOPMENT IN VARIOUS
INDUSTRY DOMAINS |
Author: |
MOCHAMMAD ZULIANSYAH, MOHAMMAD ISHAK DESA, SABRINA BINTI AHMAD |
Abstract: |
Industry’s needs for Enterprise Architecture (EA) support are increasing in line
with the increasing development of EA in various industries globally. The level
of business competition and the growing economic and technological developments
have forced decision-makers to make critical decisions quickly yet effective for
gaining enterprise’s competitive advantage. It is argued, from information
technology supports point of view, that in the current competitive business
environment, the role of EA becomes crucial as the enabler to the decision
makers. This study examines previous works specifically on EA development in
various industry domains with the systematic literature review (SLR). An SLR
search has resulted in 63 related journal articles published from 2013 to 2018.
A content analysis of articles was carried out taking into account parameters
such as publication year, a focused element of EA, and industry domain in which
the EA element was implemented. The study concluded that e-government,
healthcare, smart city, and software development are the industry domains where
EA was mostly implemented. The study also found that the EA model is the element
of EA most frequently discussed and implemented in almost all industry domains. |
Keywords: |
Enterprise Architecture, Systematic Literature Review, Enterprise Architecture
Model, Business Competitive Advantage, Enterprise Architecture Development. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
SOFTWARE QUALITY MEASUREMENT IN SOFTWARE ENGINEERING PROJECT: A SYSTEMATIC
LITERATURE REVIEW |
Author: |
A.J. SUALI, S.S.M.FAUZI, M.H.N.M. NASIR, W.A.W.M. SOBRI, I.K. RAHARJANA |
Abstract: |
The quality of software satisfies when the requirements are fulfilled. The
quality of software need to be measured to indicate the degree of satisfaction
of the software to the users. There are several kinds of literature on software
quality metrics have been published. However, very little research has been
conducted to synthesise the measurement of software quality. The purpose of this
paper is to synthesize the measurement of software quality in software
engineering projects published in the literatures. Systematic Literature Review
(SLR) was used to conduct the study. Systematic review in distinct stages was
used such as the development of review protocol, search and keywords criteria,
screening, development of inclusion and exclusion criteria, search for relevant
studies, data extraction and synthesis. This study could give significant
figures to measure software quality using different types of measurement such
line of code (LOC), quality attribute, design pattern, the number of failure,
fault, software trustworthiness, functional size, defect, and criteria software
quality. |
Keywords: |
Software Quality, Systematic Literature Review, Measurement Type, Software
Engineering, Software Quality Metrics |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
SIMPLEX ALGORITHM BY MIXED ACTIVITY-BASED COSTING FOR OPTIMIZATION OF BATIK
MADURA PRODUCTION |
Author: |
ERWIN PRASETYOWATI, BADAR SAID, SHOLEH RACHMATULLAH |
Abstract: |
Each production activity will generate financing and have limitations on every
resource needed in the production. Limitations of production resources other
than due to capital, the ability of labor and machinery, the production time
available in fact give an influence on the planned production capacity.
Therefore this study provides an overview of how production financing combined
with production limitations can significantly affect the number of units
produced. The merging process is explained with an example that the application
uses Batik Madura, which is one of the original culture-based products from
Indonesia. Based on these problems, this research is focused on identifying all
the resources involved that affect production capacity. To clarify the scope
of the object under study, this study focuses on calculating the financing and
production capacity of Batik Madura based on the number of coloring. The purpose
of determining production capacity is to increase the profits of Batik products,
set as an objective function and based on the advantages of each type of Batik.
While the constraint factors that limit the amount of production that is
determined include, the use of the amount of material, the time required in each
activity such as membatik, coloring, nglorod, and finishing, the number of
employee salaries and minimum production targets, which then becomes a limiting
function in this study. The next most important part is formulating the problem
in a mathematical model or linear equation. The test results with the simplex
algorithm show that the optimum solution has been obtained, and the change
coefficient of the objective function and the limiting function are also
obtained through sensitivity analysis. Thus, this system is able to answer the
needs of batik producers or craftsmen for a system that is used as a guideline
to determine production capacity. |
Keywords: |
Production Capacity, Optimation, Activity-Based Costing, Linear Equation,
Sensitivity Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
OUTPUT TRACKING BY STATE FEEDBACK FOR HIGH-ORDER NONLINEAR SYSTEMS WITH
TIME-DELAY |
Author: |
KEYLAN ALIMHAN, NAOHISA OTSUKA, MAKSAT KALIMOLDAYEV, NURBOLAT TASBOLATULY |
Abstract: |
This paper addresses the problem of global practical output tracking for a class
of high-order time-delay uncertain non-linear systems via state feedback. On the
basis of the homogeneous domination technique, under mild conditions on the
system nonlinearities involving time delay, we construct a homogeneous state
feedback controller with an adjustable scaling gain. With the aid of a
homogeneous Lyapunov-Krasovskii functional, the scaling gain is adjusted to
dominate the time-delay nonlinearities bounded by homogeneous growth conditions
and make the tracking error arbitrarily small while all the states of the
closed-loop system remain to be bounded. Finally, a simulation example is given
to illustrate the effectiveness of the tracking controller. |
Keywords: |
Output Tracking, Time-Delay Nonlinear Systems, State Feedback, Homogeneous
Domination Technique |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
ANALYSIS AND PERFORMANCE OF BACK PROPAGATION NEURAL NETWORK FOR IDENTIFICATION
RANGE OF MOTION USING BACKGROUND SUBTRACTION AND FEATURE EXTRACTION |
Author: |
FAUZIAH, EP WIBOWO, HUSTINAWATY, S. MADENDA |
Abstract: |
The current image processing is used to identify, classification of other
process related to the two, can represent the characteristics of creature image
optimal for the analysis by algorithm that enable large computing power for it
also a combination of computational processing in the image and related computer
algorithm or methods used. The human being is the field done by adapting the
ability of the method to take information. In the research to get an analysis
and performance of hybrid method with Artificial Neural Network for
identification of motion the human array the Range of Motion (ROM) in Coronal
Plane, the extract is done by background method on binary image. Identification
human movement, in each frame extraction results then performed image processing
to detect type of the human body motion. Image segmentation is done using
background subtraction method to get result into binary image with morphological
operation against binary image in the form filling holes and opening area to
eliminated noise and improve the result of segmentation, skeleton process and
perform extraction. Feature extracted is used to distinguish motion between body
object one with the other object body is done through the analysis of
morphological forms based on seven grades of moment invariant previously been
extracted last step can performed to identifying using Neural Network and to
produce the great accuracy and exactly the Range of Motion with 1000 epoch for
training. Being in BPNN by combining Moment Invariant for feature extraction
whose performance is the highest accuracy about 97.8666%. |
Keywords: |
Back Propagation, Background Subtraction, Range of Motion |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
SAMA: A TWITTER BASED WEB SEARCH ENGINE |
Author: |
FALAH AL-AKASHI |
Abstract: |
How can a model efficiently identify relevant references in the hundreds of
millions of Twitter messages that are posted every day? In this paper, we intend
to address this fundamental research question, as well as introduce SAMA, a
scalable search model that uses Twitter streams. Real-time topic detection is an
important function for all search engines, and extracting topics from Twitter
raises new challenges. As a huge temporal data flow, Twitter has many various
types of topics, as well as a lot of noise. Current sophisticated search engines
with high computational complexity are not designed to handle such large data
flows efficiently. Twitter provides many opportunities for people to engage with
real-time world events through communication and information sharing, as well as
tools for dealing with its data. However, little is understood about the
external links available in Twitter content, and this affects topic engagement.
As of today, Twitter posts and its external links is very limited using upon
traditional search engine despite the fact that content of micro-blogging
presented by Twitter is very curious and useful for some queries rather than
content of traditional Webs. In this paper, we propose a platform for modeling
URL and inverse message frequencies and Twitter external references, which
allows us to use a novel self-content detection algorithm for link authorities.
Our model can make use of a new source of Web references, and experiments verify
the effectiveness of the model in real time topic detection of Twitter social
content. In our evaluations, we investigate the impact of different features on
retrieval performance, and highlight tweet features that have high precision for
both adhoc and diversity tasks: 77% and 78% respectively. |
Keywords: |
Twitter, Topic Detection, Social Search Model, Web References |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
HYBRID CHAOTIC KEYSTREAM GENERATION (HCKG) FOR SYMMETRIC IMAGE ENCRYPTION |
Author: |
ALI H. KASHMAR, AHMED K. HASSN, E. S. ISMAIL |
Abstract: |
Today, data security is the main objective to protected personal data from
unauthorized access users, because of the high-speed development of unsecured
networks. The aim of apply symmetric-key algorithms is to produce a good encrypt
data in order to safety transmitted information through unsecure networks; such
goal is achieve by design efficient keystream generator mechanism. However,
there are many properties should be taken in consideration to design a good
ciphers including; implement strong and high-speed keystream generation, utilize
a complex invertible round functions, as well as time execution and security
level. This paper suggested a new technique for design efficient keystream
generator mechanism called Hybrid Chaotic Keystream Generator (HCKG) that is
suitable for symmetric image encryption. HCKG generator passes through four
stages; firstly, choose the chaotic maps, including, Chebyshev, Tent, Gaussian,
Henon, and Duffing maps. The secondly stage, exponential function [exp(x)] and
the next stage is machine words multiplexer to find the floating-point
representation group of random numbers. The final stage, random matrix table as
a dynamic substitution box (S-box) depend on random key, shifting, logistic maps
for (1D, 2D, 3D), and particle swarm algorithm. Visual Studio was employed as a
programming language to implement the algorithms of proposal system. The output
of HCKG is testing in several measurements represent including complexity, time
execution and avalanche criterion balance; the numerical results show that the
keystream generation successfully passed through NIST (statistical package tests
for randomness). Finally, image encryption for the corresponding algorithm was
done; preliminary results show that HCKG algorithm has good cryptographic
strength and resistant against security attacks. |
Keywords: |
Cryptography, Symmetric key, Chaotic Maps, Image encryption, NIST |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
QOS-AWARE SNR ADMISSION CONTROL MECHANISM |
Author: |
MOHAMMED HASAN ALWAN , KHAIRUN N. RAMLI , AMEER ALHASAN , AWS ZUHAIR SAMEEN ,
HUSSAIN FALIH MAHDI |
Abstract: |
Vehicular Ad-hoc Network (VANET) becomes a fundamental subcategory of mobile
ad-hoc networks which provides vehicles to communicate with each other and with
roadside infrastructure in a smart way. Various VANET performance challenges are
considered in terms of Quality of Service (QoS) due to vehicles speed and
transmission rates. Different problems cause performance degradation as
performance anomaly where high rates vehicles has to meet the speed of the low
rates vehicle while transmitting data. In this paper a QoS-aware Signal to Noise
Ratio (SNR) admission control mechanism (QASAC) is proposed to handle the
performance anomaly problem while maintaining the QoS levels for different
traffic types. QASAC has been compared against the latest SNR based admission
control mechanism. QASAC has enhanced the performance of data delivery up to 23%
in terms of data dropping rates for high priority traffic. |
Keywords: |
Signal to Noise Ratio (SNR), Vehicular Ad-hoc Network (VANET), admission
control, Quality of Service (QoS) |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
NEW MODEL OF TURING MACHINES WITH GENETIC ALGORITHMS |
Author: |
EMAN ALI HUSSAIN , YAHYA MOURAD ABDUL – ABBASS |
Abstract: |
In this paper we introduced new model of Turing machine, and represented the
Turing Machine in the space of matrices size 𝛼 ∗ 𝜆, is called Turing Matrices
Space (TMS), denoted by M(𝛼 , 𝜆),and construct the formulate which translate
the Turing machine to Turing Matrices Space Then the space is called Standard
Turing Matrices Space (Standard TMS). In the second phase of the work we using
the Turing Machines with crossover operators to accelerated the work of the
genetic algorithms then we have provided many of theorems and lemma to use as a
mathematical form in this new model of Turing machine |
Keywords: |
Genetic Algorithms, Crossover Method, Turing Machine, Multidimensional Turing
Machines |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A NEW CARD AUTHENTICATION SCHEMA BASED ON EMBED FINGERPRINT IN IMAGE
WATERMARKING AND ENCRYPTION |
Author: |
MARWA KAREEM RASHEED , ALI J. DAWOOD |
Abstract: |
The wide use of the smart card makes the security issue more and more important.
Authentication by using traditional password can’t meet user requirements. Many
schemes for user’s authentication have been proposed, especially, those based on
image encryption. However, most of the existing schemes complain of many
problems like single authentication mode, weak quality of the restored image and
low encryption intensity. The authentication scheme is a cryptographic
mechanism, which helps two communication parties in the network environment to
authenticate each other. In this paper dual authentication scheme based in image
watermarking and encryption was proposed. Watermarking techniques have been used
to enhance the fingerprint-based authentication process where the fingerprint
feature are extracted and embedded in the user face image which act as
watermark, in addition to use the user name as second watermark in order to
protect the user's data from the illegal use. To increase the security level of
the proposed scheme we encrypt the two watermarks before embedding it by using
the Rivest Cipher 4 (RC4) encryption algorithm, in order to integrate the
advantages of watermarking and encryption into a single system. The obtained
result shows more robust authentication scheme to authorized the user to access
the system with a high quality watermarked image, the PSNR value's range between
83.57 dB and 92.05 dB. |
Keywords: |
Authentication • Smart card • Fingerprint Minutiae • Digital watermarking • RC4
encryption. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
A SYSTEM FOR RAPID LOCALIZATION AND INTENSITY EVALUATION OF SAPONINS
ACCUMULATION IN PLANT TISSUES |
Author: |
MELA G. ABDUL-HALEEM, Dr. LOAY E. GEORGE, Dr. ANSAM G. ABDUL-HALEEM |
Abstract: |
A fluorescence microscopy considered as a powerful imaging tool in biology and
medicine. In addition to useful signal obtained from fluorescence microscopy,
there are some defects in its images such as random variation in brightness,
noise that caused by photon detection and some background pixels in the acquired
fluorescence microscopic images appear wrongly auto-fluorescence property. All
these practical limitations have a negative impact on the correct vision and
analysis of the fluorescent microscope users. Our research enters the field of
automation of image processing and image analysis using image processing
techniques and applying this processing and analysis on one of the very
important experiments in biology science. This research is devoted to develop a
system based on digital image processing methodology to localize and assess the
concentration of saponins accumulation in plant tissues using Fluorescence
microscopic image. The proposed system involved preprocessing steps than to make
the region of interest more obvious and reflects the saponins accumulation area.
Also, the system introduces a simple mathematical way for concentration
assessment, and it was justified through the test results. It includes building
a system to get microscopic images with best appearance and no defects. It
determines the saponins accumulation sites in leaves, rhizomes and shoot apex of
Y. gloriosa Variegata and their in vitro cultured tissues (Calli, direct and
indirect regenerated shoots and rhizomes/roots). Statistical analysis is
performed using a computer to get the mean and median of saponins intensities in
each part, and finally perform a comparison between them to determine which part
can record the highest intensity level of saponins. The results showed high
ability of the system to determine the locations and intensity of saponins in
the different parts of the plant. It performs the statistical analysis very
quickly. In in vitro culture, it was found that callus treated with Thidiazuron
(TDZ) in a combination with benzyl aminopurine (BA) and naphthyl acetic acid
(NAA) after 3 weeks of culture had the highest level of saponins accumulation,
while the leaves of intact plant recorded the second highest accumulation of
saponins. |
Keywords: |
Fluorescence Microscopy, Histogram Statistics, Contrast Stretching, region of
interest (ROI), Saponins intensity |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
Title: |
IMPACT ASPECTES OF IT FLEXIBILITY SPECIFIC TO CLOUD COMPUTING ADOPTION ON IT
EFFECTIVENESS |
Author: |
SALAMEH A. ALMJLAE, ZARINA MOHAMAD, WAN SURYANI |
Abstract: |
Against the background of recent economic realities, certainly one of the bigger
forces that is affecting businesses worldwide is cloud computing technology,
whose advantages consist of agility, Cost savings, time to market, Competitive
edge, time to capability,Flexibility, Sustainability, etc. The purpose of this
study was to add to the body of knowledge that Might be implemented through
researchers, IT organizations and businesses, alike to attain best results
through focusing on factors of IT flexibility (connectivity, modularity, and
compatibility) specific to cloud based services and solutions. The study
findings provided statistical evidence that factors of IT flexibility
(connectivity, modularity, and compatibility) specific to cloud computing have
strong positive correlations on IT effectiveness. Also, the combination of three
factors of IT flexibility, precise to cloud computing, explained 67% of the
variance of IT effectiveness. The Connectivity factor predicted of IT
effectiveness the most while the compatibility the less contribute to the
prediction of IT effectiveness. |
Keywords: |
Cloud Computing, (CC), IT Effectiveness (ITE), IT Flexibility (ITF)Small And
Medium Enterprises (SMES) |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2019 -- Vol. 97. No. 03 -- 2019 |
Full
Text |
|
|
|