|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
April 2019 | Vol. 97
No.08 |
Title: |
THE EFFECTS OF TECHNOLOGY, ORGANISATIONAL, BEHAVIOURAL FACTORS TOWARDS
UTILIZATION OF E-GOVERNMENT ADOPTION MODEL BY MODERATING CULTURAL FACTORS |
Author: |
HOSAM ALDEN RIYADH , SALSABILA AISYAH ALFAIZA , ABDULSATAR ABDULJABBAR SULTAN |
Abstract: |
In the new knowledge-age economy, which revolutionary changes in science and
technology have buttressed, information and knowledge have become critical
elements in economic competitiveness and developing countries must engage in
more active roles in formulating national policies and strategies promoting an
information economy to garner benefits via economic and social growth
development. E-Government is believed to play a fundamental role in achieving
these ends. This study objective are to examines factors associated with the
adoption of B2G e-government in Iraq and to determine the impacts of its
adoption on these businesses by examining the effects of technology,
organisational, and behavioural factors towards the utilization of the
E-Government Adoption Model among Iraqi Business Organizations using moderating
cultural factors in a quantitative exploratory approach. The study utilized
listed on the Iraq Stock Exchange including banking, insurance, investment, and
service and industrial companies, hotels, and corporate communications sectors.
The results of hypothesis testing show several significant relationships such as
relative advantages, Compatibility, Security, Management Support, Performance
Expectancy, Perceived Usefulness on e-government, and Ease of Use by moderating
uncertainty to e-government, IT Infrastructure by moderating language on
e-government adoption. |
Keywords: |
Adoption, B2G e-government, model, cultural factors, Iraq |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
SELECTION OF FACTORS AFFECTING WOMENS LOYALTY IN BUYING GOODS IN INDONESIAN
E-MARKETPLACES USING THE PROFILE MACHINE METHOD |
Author: |
LINDA MARLINDA, SRI RUSIYATI, WIRUMA TITIAN ADI, MAISYAROH, RACHMAN KOMARUDIN,
AGUS SALIM |
Abstract: |
Abstract- The use of social media in the field of online marketing has been used
by female consumers. In its use found uncomfortable transactions even though
vendors have provided good features to reduce risk. This study investigates web
site factors that affect consumer loyalty online shopping through social media
namely Buyer Loyalty (Business View, Market Service View, Third Party B2B EM
Performance, Transaction View, and Infrastructure View) and its attributes Trust
(Quality of information, Customer loyalty, Volume trading, Product promotion,
Reduction of transaction costs, Consumer characteristics (Free Shipping Costs,
Trust in Marketing Makers), Firms characteristics (Functionality and
value-added, Reputation, Privacy), Brand Recognition (Likability, Customer
satisfaction, Attitude towards online shopping), Quality of Service (Transaction
security, Use of the website, Reliability of the website). This study uses an
IT-based platform for data collection and collects data from female consumers
using the profile machine method. Data analysis by grouping female consumers
using online shopping websites based on the attributes they like. |
Keywords: |
Factors Shopping, Social media, Consumer trust, B2B electronic marketplaces,
Multi Criteria atribute, profile machine method, Womens |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A DETAILED ANALYSIS ON THE USE OF GAMIFICATION IN CLOUD BASED LEARNING
MANAGEMENT SYSTEMS |
Author: |
MUHAMMAD EHSAN RANA, MUHAMMAD AHSAN, WAN NURHAYATI WAN AB RAHMAN |
Abstract: |
The concept of infusing game elements into non-game applications has been
gaining momentum as of lately. In this paper we explore and identify the
variables which affect learning experience and how knowing those can help in
implementing game mechanics on a Learning Management System (LMS) which is
flexible in nature in its operations so that it can be scaled as required using
cloud infrastructure. This research tries to assess how, why and where
gamification and cloud computing should be best utilized in the context of
learning management systems by exploring both existing learning management
systems using game mechanics and outlook of how gamification can be used to
propel students’ overall learning experience. |
Keywords: |
Gamification, Learning Management System (LMS), e-Learning, Computer aided
instruction, Educational technology, Mobile learning, Cloud platform |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
USING DATA MINING ALGORITHM FOR SENTIMENT ANALYSIS OF USERS OPINIONS ABOUT
BITCOIN CRYPTOCURRENCY |
Author: |
MOHAMMED ALGHOBIRI |
Abstract: |
Cryptocurrency has turned out to be one of the most significant currencies in
the recent times due to their secureness, ease and value. Among the other
cryptocurrencies available in the market, Bitcoin cryptocurrency is the most
valuable and famous currency. A large number of people discuss about the Bitcoin
currency on the internet and social media platforms as well. These discussions
help in determining the importance of Bitcoin in terms of users discussions
about Bitcoin and can help in determining the value of Bitcoin in terms of
people point of views about the topic. In this paper, sentiment analysis of the
tweets of users on the topic of Bitcoin has been carried out. For this purpose,
real-world twitter data set of Bitcoins is used. The data set has been divided
into five separate sections for better comparative analysis, including overall
extensive data analysis regarding tweets, retweets, tweets with mentions, tweets
containing external links and also about the users who discuss regarding
cryptocurrency of Bitcoin. A framework for sentiment analysis is proposed on the
basis of Naive Bayes sentiment classification algorithms which is widely used as
a better option for text data. The proposed framework is capable to perform
sentiment analysis of the tweets data. The results resemble that users opinions
are on the high positive side about Bitcoins and people mostly people represent
the positive sentiment about Bitcoins. The results are evaluated using the
standard performance evaluation measures including precision, recall, f1-score
and accuracy. |
Keywords: |
Sentiment Analysis; Bitcoin; Classification; Naive Bayes; Machine Learning;
Proposed Framework; Users Opinions |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
IMAGE WATERMARKING ALGORITHM BASED ON A COMBINATION OF TEXTURE MAPPING AND BIT
SUBSTITUTION METHOD |
Author: |
DUJAN B. TAHA , TAHA BASHEER TAHA , PHAKLEN EHKAN |
Abstract: |
Watermarking algorithms can be implemented using simple and direct calculations
in time domain embedding as replacing the least significant bit (LSB) of the
original image pixels, it also can be implemented using more complex but more
robust transform domain based embedding by changing coefficients values. In this
paper, a new method of using a combination between the transform domain and time
domain watermarking is presented by embedding the watermark within the
approximation band coefficients of LWT transform. This method will combine the
simplicity of time domain watermarking and the high performance of transform
domain watermarking. The choice of the coefficient bit in certain image block is
based on the amount of texture in that block. The texture amount is calculated
using a low complexity texture mapping model. The experimental results shows
high quality watermarked images since a small portion of image is used for the
embedding process. |
Keywords: |
Image Processing, ALD, Non-Blind Watermarking, Texture Masking, Copyrights
protection. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
BREADTH FIRST BASED SINK MOBILITY MODEL FOR WIRELESS SENSOR NETWORKS |
Author: |
ANAS ABU TALEB |
Abstract: |
Many research papers proposed deploying mobile sink node or nodes within a
wireless sensor network to collect data from static sensor nodes. Thus, the
performance of the wireless sensor network can be improved and its life time can
be prolonged. In this paper, a new sink mobility model that is based on the
breadth first traversal of a graph is proposed. As a result, the mobile sink
will traverse the sensor network and visit static sensor nodes to collect data
according to movement paths that are calculated based on the breadth first
algorithm. After that, the proposed mobility model is simulated using NS-2
simulator and the performance of the proposed model is studied under different
network sizes and speeds. Finally, average end-to-end delay, packet delivery
ratio and throughput are the performance parameters used to study and
investigate the behavior of the network using the mobility model proposed in
this paper. |
Keywords: |
Wireless sensor networks, Mobility, Models, Performance, Routing |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
ONTOLOGY2RDB FOR STORING ONTOLOGY IN RELATIONAL DATABASE |
Author: |
RAWAN ABO ZIDAN, MUHAMMAD MAZEN ALMUSTAF, MOHAMMAD TAHAWI |
Abstract: |
With the large expansion of data volume found on the web the majority of it is
stored in relational format which provide maturity, performance, robustness,
reliability, and availability but they lack the expressiveness and
process-ability of semantic data and ontologies. The semantic web has a
significant impact in various domains, which has led to the need of finding a
formula for communicating with relational databases. In this paper we present a
tool that acts as a bridge between the relational database and semantic data in
which we provide a fully automated and effective approach that converts between
a populated ontology and a relational database without losing the ontological
structure while preserving the knowledge relations between the entities.
Finally, we tested this approach to convert a weather ontology into relational
database, by converting its ontological constructs to their corresponding
entities in relational format, then maps the converted ontology with pre-existed
relational database so that it could be queried effectively, as a result we were
able to get a relational database with knowledge incorporated relations that was
quite descriptive of the stored knowledge. |
Keywords: |
Relational Database, Semantic Web, Ontology, OWL, WordNet |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
HANDLING OF MISSING DATA FOR E-READINESS INDICATORS |
Author: |
RABII LAMRIQ, ABDELAZIZ DOUKKALI, NAJIB BELKHATAT |
Abstract: |
Missing data is one of the main problems associated with composite indicators of
electronic readiness (e-readiness), but the way in which these missing values
are processed can have a serious impact on the results of e-readiness
assessments. The complexity of this problem increases with the number of missing
values. However, despite the known limitations on the performance of some
missing data processing methods, such as imputation based on the following
year’s values or the average of previous years’ values, many composite indices
of e-readiness continue to use these methods. The main objective of this article
is to improve the estimation of missing data in a dataset used by the Networked
Readiness Index (NRI) organisation. In order to improve existing estimates, we
establish a predictive model based on multiple linear regressions for each
indicator containing missing values. We also use variable selection techniques
to choose the best input variables for each model. |
Keywords: |
E-Readiness, Missing Data, Imputation, Variable Selection, Linear Regression,
Composite Indicators. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A CONCEPTUAL FRAMEWORK OF CRM ADOPTION AMONG PALESTINIAN SMES |
Author: |
OMAR HASAN SALAH, ZAWIYAH MOHAMMAD YUSOF, HAZURA MOHAMED |
Abstract: |
Customer relationship management (CRM) is the concept of using process,
information, technology, and people to manage the organization’s interactions
with customers. SMEs have to implement CRM practices into their business to
achieve competitive advantage over its rivals. The adoption rate of CRM among
SMEs in developing countries is low due to the absence of some important factors
to guide the adoption of CRM. A pilot study was undertaken to investigates the
effect of technological, organizational, and environmental factors on CRM
adoption in developing countries, specifically in Palestinian SMEs. This study
uses a quantitative approach by employing questionnaire to collect data from 35
randomly sampled participants from different managerial levels who were
requested to answer questionnaire items online. Out of the 35 questionnaires
distributed, 33 were returned and three questionnaires were rejected. The
results show that compatibility, IT infrastructure, complexity, relative
advantage, security, top Management Support, information policies, employee
engagement financial resources, customer pressure and competitive pressure are
capable of acting as a predictor for CRM adoption among Palestinian SMEs. |
Keywords: |
Customer relationship management system, Palestine; small and medium enterprise,
Diffusion of Innovation (DOI), Technology–Organization–Environment (TOE),
Resource-based View (RBV). |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A REVIEW OF THE CURRENT TRENDS AND FUTURE DIRECTIONS OF CAMERA BARCODE READING |
Author: |
NORLIZA KATUK, KU-RUHANA KU MAHAMUD, NUR HARYANI ZAKARIA |
Abstract: |
Modern mobile phones or smartphones have become a pervasive and affordable
device for users at different levels of age around the world. Smartphones
equipped with many useful sensors, including camera, barometer, accelerometer,
and digital compass. The sensors on smartphones attracted researchers and
developers to develop mobile applications (apps) and study the potential use of
the sensors to support daily life activities. Unlike other types of sensor, the
smartphone camera has been underutilized. Analysis of the literature suggested
that smartphone camera mainly serves for personal and social photography.
Practically, a smartphone camera can be used as an imaging device for reading a
barcode. Although barcode has been used for identifying products and items, the
use of a smartphone camera as a reading device has not been explored thoroughly.
Further, scholarly resources describing the fundamental knowledge of smartphone
camera barcode reading is not available in the literature which could be the
reason contributed to slow research progress of the domain. Therefore, this
study aims to review the current trends and future directions of smartphone
camera for barcode reading. Specifically, the study reviews the literature on
the types of applications that are currently available and run on the standard
mobile platform for reading a barcode. It also analyzes the necessary components
that made up barcode reading apps. Further, the review identifies technical and
non-technical issues that are critical for the development of the apps. The
contributions of this work are twofold, first, it provides the fundamental
knowledge on the building blocks of camera barcode reading apps, and second, it
explores the issues in the current camera barcode reading apps that could
encourage exploration towards addressing the issues. Practically, the findings
could spark new research ideas to address the current issues related to the use
of smartphone camera for barcode reading in the near future. |
Keywords: |
Bar codes, Communication Systems, Mobile Phones, Mobile Telecommunication
Systems, Sensors |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A NOVEL
MOBILITY ADAPTIVE ROUTING PROTOCOL FOR MANETS |
Author: |
YOUNES BEN CHIGRA, ABDERRAHIM GHADI, MOHAMED BOUHORMA |
Abstract: |
Mobile Ad Hoc network (MANET) is a collection of smart mobile nodes, which form
a dynamic and autonomous system. Since mobile nodes are free to move, they cause
frequent changes in network topology and decrease the overall network
performances. Therefore, the task of finding and maintaining a reliable route
constitute the main issue in the design of efficient routing protocol for MANET.
In this paper, we introduce a novel Mobility Adaptive AODV routing protocol
(MA-AODV), which uses the degree of mobility time variation and the local route
repair approach to mitigate the influence of high mobility and improve routing
performances. We implemented the MA-AODV on network simulator NS2. Then, we
evaluated the performance of MA-AODV and AODV based on node mobility variation
such as speed and pause time. The comparison of performance metrics, such as
Packet delivery Ratio, Throughput, routing overhead and communication delay
demonstrates that MA-AODV outperforms AODV in high mobility environments. |
Keywords: |
Mobile Ad Hoc Networks (MANET), Adaptive Routing, Mobility, metric,
routing performances. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
AN MAIMS ALGORITHM FOR HANDOFF TACTIC IN HETEROGENEOUS WIRELESS NETWORK |
Author: |
FARAH PATHAN , DR. JAYMIN BHALANI |
Abstract: |
Wireless communication of users between the heterogeneous networks with multiple
access interface services lead to the emergence of most undesirable problem of
hand off occurrence. This undesirability in heterogeneous network has its root
cause in decision phase, which should be equipped with précised, less latency,
congestion free arrangement to mold an eligible network communication. Making
this as expectation, Mash-up Analytical Index Multiplicative Sensing (MAIMS)
algorithm is framed which makes précised analytical index based parameter
selection followed by elimination of uncertainty due to large parameter
selection by the actual use of qualitative and consistent unit vector direction,
following reduces the latency by the multiplicative process of optimized
ranking. The system has then suffered from the congestion, which shatters apt
resource utilization making the ranking invaluable due to the off-limit network
range. This is thrown away by a threshold-based adjustment in carrier sensing
range of this framework. The system had shown improved performance on
qualitative network criteria. |
Keywords: |
MAIMS, F-ANP, VEPSO, Luus-Jaakola, MEW. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
HYBRID FEATURES FOR FINGERPRINT RECOGNITION BASED ON INVARIANT MOMENTS AND GLCM |
Author: |
WISAM K. JUMMAR , ALI M. SAGHEER |
Abstract: |
The process of verification of the most important processes in security
applications and many applications that are special and depends on the
identification of the person to ensure privacy. The process of identifying
people is done through several things, but the most important of these are
biometrics, where people are distinguished by behavioral characteristics (such
as gait, signature, sound) or biologic (such as the fingerprint, iris, and vein
print).The fingerprint is one of the most important biometrics in humans,
because it does not change and be easy to capture in addition to that the human
has many fingers, if a problem got a finger can use another finger. In this
research a method was proposed to identify the fingerprint by the texture
features. Hybrid properties are used by using invariant moments that extract
features from a new proposed model is a double thinning model DTM, and GLCM that
extracts features from the binary model. The matching process was performed
using the Euclidean distance. The system was tested on a database of 40 people.
The results were very impressive above 98%. This research opens the horizon to
the use of hybrid properties to identify biometrics. |
Keywords: |
Fingerprint, DTM, GLCM, Invariant Moments, Recognition, Authentication. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
MULTI STEP AUTOMATIC ORDER FULFILLMENT MODEL IN GENERAL TRADING COMPANY |
Author: |
PURBA DARU KUSUMA |
Abstract: |
Purchase order fulfillment is a common activity in many companies, especially in
general trading company. Meanwhile, this process is never easy, especially for
companies that execute this process manually. Related to it, the most common
method in purchase order fulfillment is first come first served (FCFS) model.
Although this model is very popular, many companies may face classical problem
in matching stock with orders: under supplied or over supplied. Besides that,
companies also face other problem in failing order fulfillment. Based on this
problem, the objective of this research is proposing new order fulfillment model
so that the mismatch between order and fulfillment can be reduced. In this work,
we propose three purchase order fulfillment model. In this work, our proposed
models are developed by combining several common models, such as: FCFS, smallest
quantity, highest price, and bidding models. The hypothesis is that by combining
the existing popular FCFS model with other models, this mismatch problem can be
reduced. Every model in this work is developed based on multi step fulfillment
to explore the advantages of every basic model that is used in it. We use
general trading company because in this company type, there is not any raw
material in its inventory. Based on the simulation result, our proposed models
have better performance in increasing the number of successful transactions than
the existing models at the same condition. The proposed FCFS-bidding model
performs the best in total revenue aspect. Meanwhile, these three proposed
models perform better than the existing FCFS model when the average order
quantity is high although this advantage is not significant. |
Keywords: |
Purchase order, First Come First Served (FCFS), Bidding, Smallest Quantity,
Highest Price. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
SEMANTIC VARIANCE MEASUREMENTS FOR EVALUATING SINGLE-DOCUMENT SUMMARIZATION |
Author: |
EIMAN TAMAH AL-SHAMMARI |
Abstract: |
This paper proposes a new measurement for evaluating single document summarizers
using a novel formulation of Latent Semantic Analysis techniques . Additionally,
we introduce a measure to the conceptual coherence of a passage against a
document or set of documents, based on singular value decompositions of
term-document matrices. The proposed work aims to reflect the coverage concepts
in a passage by quantifying the significance of semantic variance of documents
and words, per concept in the entire concept space. Our method developed
emphasize on completeness, rather than the soundness of a summary. The
performance based on the initial tests on a variety of corpus types shows
promising results that comply with human evaluation. |
Keywords: |
LSA, Summarization, Evaluation, Semantic Variance, SVD, Term-document Matrices. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A NEW FAULT DETECTION SYSTEM USING WIRELESS COMMUNICATION – ASSISTED WITH ANALOG
RELAYS FOR GRID ELECTRICAL LAMP POLE NETWORK |
Author: |
RANJIT SINGH SARBAN SINGH, WONG YAN CHIEW, BALJIT SINGH SARBAN SINGH, MAYSAM
ABBOD |
Abstract: |
This paper explained about the functionality of designed and developed fault
detection system for an electrical pole’s components. The proposed system aims
to accelerate the maintenance process when any component attached to the
electrical pole is detected faulty. Hence, the designing and development of the
proposed project includes integrating of a fault sensing circuit, control
switching and optimization which derives the complete methodology for the
proposed system. The fault sensing circuit provides a HIGH output signal when
any failure is detected at any component attached to the system. Tough the HIGH
signal is to detect the fault of a component; this HIGH signal also identifies
the respective failed component which provide information and analysis of the
failed component. Hence, this newly formulated integrated system is consists of
a smart microcontroller which simultaneously process a number of signals from
the fault sensing circuitry to enable fast fault managing and reduce the outage
time. Integrating the fault detection system which performs as fault detection
tasks, fault classification and location, the maintenance team can achieve the
fault repairing task in shorter time. |
Keywords: |
Fault Detection System, Fault Sensing Circuit, Continuous Fault Detection,
Network Communication System, Fault Detection System |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A NOVEL SCALE APPROACH FOR LOAD BALANCING WITH HARDWARE AND SOFTWARE IN CLOUD
AND IOT PLATFORM |
Author: |
NARANDER KUMAR, SURENDRA KUMAR |
Abstract: |
In the current scenarios cloud computing is most talked innovation which offers
resources from the extensive server farms. The fundamental motivation behind
cloud computing is to enable customers to take the favourable position from
these advancements. Cloud computing is made accessible as compensation on
interest administration to the customers. Cloud administrations are
"pay-per-use" over the web. It has numerous highlights that incorporate
estimated administrations, accessibility, security and scalability. Among all
the most and energizing component of distributed computing is Scalability which
offers the customers the straightforwardness and solace to utilize the resources
according to their desires and request. Versatility system could really compare
to whatever else. Resources can be scaled in and scaled out when the interest
and circumstance emerges that way. It may be static or dynamic in nature. In
this paper, we proposed a scalability mechanism for load balancing to recourse
management policies in the cloud computing. We check our proposed mechanism with
the different parameters likes scalability model, measurement of bad detections,
Performance heuristics, Diagnose of the Performance, production area and
scalability area. We also make the various comparisons between different kinds
of results. After that we simulate the results in the cloudsim and get the
optimized results with the help of appropriate examples. |
Keywords: |
Scalability, Load Balancing, Scale In, Scale Out, Cloud Computing |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
THE PROCEDURE FOR THE DETERMINATION OF STRUCTURAL PARAMETERS OF A CONVOLUTIONAL
NEURAL NETWORK TO FINGERPRINT RECOGNITION |
Author: |
TEREIKOVSKYI I. A., CHERNYSHEV D. O., TEREIKOVSKA L.A., MUSSIRALIYEVA SH. ZH.,
AKHMED G. ZH. |
Abstract: |
The article is devoted to improve the efficiency of the system of biometric
authentication on the basis of neural network fingerprint recognition. Analysis
of modern neural network biometric authentication tools shows that it is
possible to increase efficiency by adapting the structural parameters of the
convolutional neural network to the peculiarities of the fingerprint recognition
problem. The specified parameters include the size of the input field, the
number of input and output neurons, number of neurons in fully connected layer,
the number of convolutional layers, the number of feature maps in each
convolutional layer and others. It is also shown that the main features of the
recognition problem are the number of prints to be recognized, the size and
quality of scanned images of prints, as well as the number and parameters of
minutiae taken into account. A number of principles of adaptation of structural
parameters was formed by analogy with the known solutions in the field of neural
network recognition of biometric parameters. Based on the proposed principles
and the identified features of the fingerprint recognition problem, a
corresponding procedure for determining the structural parameters of the
convolutional neural network is developed. The efficiency of the developed
procedure is proved by numerical experiments, which confirmed the sufficient
accuracy of recognition. It is determined that the prospects for further
research are to develop a mechanism for optimizing the mathematical apparatus of
the convolutional neural network with respect to the conditions of the problem
of fingerprint recognition in the biometric authentication system. |
Keywords: |
Fingerprint Recognition, Biometric Authentication, Minutiae; Convolution Layer,
Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
A NEW LIGHTWEIGHT FILE FORMAT BASED ON FBX FOR EFFICIENT 3D GRAPHICS RESOURCE
PROCESSING |
Author: |
TAEK-SOO JEONG, YOUNGSIK KIM |
Abstract: |
The FBX format is one of the most popular graphics formats for 3D graphics
games. However, the FBX format contains a lot of information for general use.
Thus, when producing real 3D graphics games, it is inefficient in terms of file
size and 3D graphics rendering, because the FBX file contents are not used at
all. This paper proposed a new lightweight FBX file format based on the
conventional FBX format. Using the new FBX format created by extracting only the
necessary information, the 3D graphics resource file capacity and loading time
are reduced. Using the new FBX file format, this paper reduced the size of
resource files by an average of 81% and reduced resource loading time by an
average of 51%. This experiment proved its efficiency by comparing it with the
pure FBX format under the same conditions. |
Keywords: |
3D Game, DirectX, FBX Format, 3D Graphics Resource, Loading Time |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
INCREASING THE PERFORMANCE OF SPEECH RECOGNITION SYSTEM BY USING DIFFERENT
OPTIMIZATION TECHNIQUES TO REDESIGN ARTIFICIAL NEURAL NETWORK |
Author: |
SHILPI SHUKLA, MADHU JAIN, R.K. DUBEY |
Abstract: |
Speech recognition has a high complexity and a broad range of applications,
since it has to predict the word under many types of distortions. This paper
aims to compare the performance of different optimization techniques like
genetic algorithm, particle swarm optimization and artificial bee colony for
optimizing the different hidden layers and neurons of the hidden layers of
artificial neural network, for maximum speech recognition accuracy. The features
of the input speech signals are extracted using amplitude modulation
spectrogram. The outcome demonstrates that the accuracy of artificial bee colony
is 95.3% and it performs better when compared with the other optimization
techniques. |
Keywords: |
Amplitude Modulation Spectrogram, Artificial Neural Network, Artificial
Bee Colony, Speech Signal, Particle Swarm Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
SMARTPHONE USER AWARENESS OF PERSONAL INFORMATION SECURITY AND PRIVACY |
Author: |
JAROT S. SUROSO, ANGGA RHYANDA PUTRA, JEANIFER GUNAWAN, DIONISIUS W.
DANUANINDITO |
Abstract: |
The security of information from users of internet services in recent years has
become a hot issue that continues to be reviewed, where researchers find that
the privacy of personal information is no longer controlled by individual data
or information owners but has changed hands to organizations which hold the data
or information. In Indonesia alone, the issue of cyber security is certainly
closely related to technological growth. In 2018 as many as 83.19% of
Indonesia's population are active internet users and as many as 26.26% of
Indonesia's population are smartphone users. When viewed positively, the use of
technological developments can facilitate data collection so that existing data
or information can be reused for interests that can benefit both organizations
and individuals. This study aims to find out what factors influence smartphone
users to open their personal information and provide access to mobile
applications. These factors have been examined previously by Benson et al [1],
which consists of 4 factors, namely Control Over Personal Information, Use of
Information, and Privacy Notice that affect Information Disclosure, and using
questionnaire techniques with 101 respondents. From the results obtained, it was
found that the Personal Control Over, Use of Information, and Privacy Notice are
the influential factors for individuals to open their information or not. In
addition, when users know the function of information that is opened and get
privacy notifications in advance, smartphone users will tend to open their
personal information and give permissions to either mobile platforms or mobile
applications to access personal information. |
Keywords: |
Smartphone, Control, Use of Information, Privacy Notice, Information Disclosure |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
LTL FORMULA PATTERNS FOR ENHANCING THE PERFORMANCE ANALYSIS OF E-BUSINESS
STRUCTURE |
Author: |
AYMAN MOHAMED MOSTAFA, JABER ALROUDHAN, MOHAMED. M. HASSAN |
Abstract: |
One of the major significant trends in Internet technology is the use of
E-business applications for conducting organizational resources. The structure
of E-business applications can enhance the analysis performance based on
customer preferences. Model checking analysis and linear temporal logic (LTL)
provide formula patterns for obtaining better query of user requirements. These
patterns are suitable for infinite traces of customer preferences. In this
paper, an enhanced framework of E-business application based on B2C and G2C is
presented. A web server log is generated and optimized to record infinite traces
of event actions and applying them to a set of finite E-business processes. An
enhanced set of mathematical LTL formula patterns are applied to the finite
traces on the web server log for enhancing the performance analysis and
predicting users’ behavior. To this end, we added new features of linear
temporal logic (LTL) for classifying and enhancing the analysis processes and
achieving better prediction of real-life event logs. A pattern analysis process
is applied to evaluate the presented LTL formula patterns for enhancing the
prediction of user behavior in web server event logs. |
Keywords: |
E-Business, Linear Temporal Logic, Web Server Log, And User Behavior |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
Title: |
EFFICIENT APPROACH FOR DETERMINISTIC DATA EXTRAPOLATION FROM A CLEAN PERIODIC
FUNCTION WITH PERIODIC COMPONENTS REPRESENTATION BY A SYSTEM OF LINEAR EQUATIONS |
Author: |
RULLY SOELAIMAN, STEVEN CANDRA, M.M. IRFAN SUBAKTI |
Abstract: |
Object forecasting has been a tedious task to be solved, such as money currency,
stocks, and solar cycle predictions which are proved to be epitomes from objects
that can be forecasted from periodic functions’ characteristic. The comparison
between an unoptimized approach and an optimized approach to extrapolate a clean
periodic function formed from a sum of periodic functions with integral periods
has been proposed. Initially, both approaches will be utilized system of linear
equations to identify periodic components which will be extracted using
arithmetic means from matrix multiplication. The resulting optimized approach
will have fewer runtimes, less memory allocation, and larger scope of periods
than the unoptimized one. Furthermore, the optimized approach with different
implementation will also be discussed to show how the computational technique
can impact the efficiency of the solution. Two testing models are involved in
this paper: the correctness test by source-code submission to Sphere Online
Judge, and the performance test by generating their chart of runtimes and
standard deviation. These models have shown that the efficient implementation
with optimized approach can be entitled as the first rank solution in Sphere
Online Judge. |
Keywords: |
Matrix-Vector Multiplication, Data Extrapolation, Arithmetic Mean, Periodic
Function, Central-Value |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2019 -- Vol. 97. No. 08 -- 2019 |
Full
Text |
|
|
|