|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
January 2018 | Vol. 96
No.1 |
Title: |
PERFORMANCE OF COOPERATIVE COMMUNICATION SYSTEM WITH NETWORK CODING USING
SOFTWARE DEFINED RADIO |
Author: |
SUWADI, ENDROYONO, TITIEK SURYANI, UMMUL KHAIR |
Abstract: |
Network coding is a technique where the transmitted data is encoded and decoded
to increase throughput, reduce delays and building a stronger network. Physical
network coding (PNC) was originally proposed as a way to boost the performance
of Network coding using electromagnetic waves. Cooperative communication aims to
reduce fading multipath interference. Amplify and forward (AF) cooperative
communications system is the information sent to the relay node will be
strengthened and sent to the node destination. This article presents AF
cooperative communication systems without and with network coding were
implemented on Software Defined Radio module (SDR) was Wireless Open-Access
Research Platform (WARP). Furthermore, the measurement of system performance is
throughput of the system in indoor and outdoor environment at LOS and NLOS
condition. Based on the results of measurement throughput of the system in the
indoor environment indicated that cooperative communication system with network
coding yield increase of 14% throughput without network at LOS condition and 20%
at NLOS condition. While in the outdoor environment indicated increase of 16%
throughput at LOS and NLOS condition. |
Keywords: |
AF Cooperative Communication Systems, Amplify and Forward, Physical Network
coding, throughput, SDR, WARP |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
INDUSTRY 4.0 REVOLUTION IN AUTONOMOUS AND CONNECTED VEHICLE A NON-CONVENTIONAL
APPROACH TO MANAGE BIG DATA |
Author: |
ALESSANDRA PIERONI, NOEMI SCARPATO, MARCO BRILLI |
Abstract: |
In literature, the term Industry 4.0 is used to represent the current Industrial
Revolution. This revolution, however, involves different sectors: from
manufacturing to healthcare. Indeed, the current revolution is also known as the
Internet of Things or Internet of Everything or the Industrial Internet,
and it is a vision rather than a technological improvement. Industry 4.0 is able
to create value during the entire product life cycle. For the reasons described
above, the outcome of this revolution may be an object but also a service
designed for a final user, whose development is driven by innovation in several
areas: IT, embedded systems, production, automation technique and mechanical
engineering, all of them combined in order to deliver more complex systems as we
know today. In this scenario, Autonomous and Connected Vehicles (ACV)
represent the perfect connection between digital and real world, an issue that
stands in the center of Industry 4.0. This article intends to present a brief
overview of the Autonomous and Connected Vehicles, while proposing a
non-conventional approach to manage the great amount of data generated by the
sensors disseminated inside the vehicle and all around itself, in other words,
in the urban environment where the vehicle is completely spread-in. In this
paper, we address the issue of the calculation of the paths of vehicles totally
connected. We present two approaches: the relational approach and the GraphDB
solution. Our intent is to demonstrate that the GraphDB approach is more
convenient and easy respect to RDBMS solution especially in relation to
real-time big-data management. |
Keywords: |
Autonomous Vehicle, Connected Vehicle, Big Data, GraphDB, Internet of Things,
Industry 4.0 |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
SYSTEM FOR SELECTION STARTING LINEUP OF A FOOTBALL PLAYERS BY USING ANALYTICAL
HIERARCHY PROCESS (AHP) |
Author: |
IMAM N. PURWANTO, AGUS WIDODO, SAMINGUN HANDOYO |
Abstract: |
In a Football match is inseparable from the role of a coach in charge of
selecting players as the starting lineup that is formed subjectively without
regard to various criteria. The decision of the coach can impact team
performance is not maximal. In this article discussed the selection method of
the starting lineup that is objective based on the desired criteria of Physical,
Technique, Tactic, and Mental using AHP method and also built a system for
selection of starting lineup which is easy to use and also user-friendly. The
successfully built system provides some important features, a namely menu for
entry and data store, menu to display the results of AHP calculation, menu to
display the ranking of players based on their position and menu to display the
selected starting lineup based on the player's top ranking. By using the
built-in system, the Coach can easily explain to all parties about his starting
lineup decision chosen. With this transparency, it is expected to satisfy all
the components of the club and impact on the team's more maximal performance.
Based on the AHP calculation results for club Arema Cronus Indonesia U_21
obtained information that the factor of technical ability and physical fitness
is very significant influence the position of the player ranking. |
Keywords: |
AHP, Decision Making, Football Game, Starting Lineup, System for Selection |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
A PROTOTYPE ANALYSIS OF DIFFERENT FORENSIC METHODS IN SOCIAL MEDIA APPLICATIONS |
Author: |
P. MARESWARA RAO, K. RAJASHEKARA RAO |
Abstract: |
Now a days, usage of social online networks and other communication services
has been increased and perform important role in humans day to day life. So all
the users share their feelings in different formats like messages, audio, video,
photographic usage on different types of events in real time data assessment.
Whenever increasing social communication then forensic activities also increased
to access users personal data from online social network servers. Intuitively
social forensics is a new field to investigate criminal and illegal user
activities from user’s communication networks like Face book, Whatsup, and other
social networks in android and web oriented applications. Some of the law
enforcement consultants significantly research on online user data to provide
solution for criminal activities. So analysis and collect large amount of data
from multiple online social networks is a challenging aspect in present days. In
this paper, we give brief literature about different forensic analysis
approaches and techniques used to investigate different types of forensic
problems to identify criminal activities from both android oriented and web
oriented applications. Our survey gives those techniques implementation
procedures to identify criminal forensics present in online social networks. |
Keywords: |
Online Social Networks, Face book, Twitter, Whatsup, Digital Forensic Analysis
and Instance Messages and Email-Forensic Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
SCHEME OF AN ALGORITHM FOR THE SUPPRESSION OF ENVIRONMENTAL NOISE IN HEARING
DEVICES |
Author: |
JUAN A. R. CHAVEZ |
Abstract: |
At present, noise pollution is a relevant factor to measure the quality of life
of people. In order to solve this problem, in this article an algorithm is
proposed that allows to filter the unwanted noise levels and to admit the flow
to the sounds that are required. The algorithm is based on the amplification and
filtering techniques that are provided by the operational amplifiers. The
function of the algorithm is divided into two parts: it first filters out the
frequencies that are not wanted (environmental noise) and then amplifies the
frequencies that are required (conversations, sounds very close to the user);
the output signal is evaluated by calculating the ODG (Objective Difference
Grade) as regulated by the ITU (International Telecommunications Union). The
average ODG obtained was -0.946, the previous result indicates that the output
signal of the algorithm (clean signal of noise) with respect to the input signal
(signal with noise attached) has been correctly filtered such that the noise is
slightly perceptible but not annoying to Human Auditory System (HAS). The
algorithm was designed using ORCAD® and the subjective test was the MOS (Mean
Opinion Score) with people who have suffered various hearing loss. |
Keywords: |
Algorithm, Noise, Filtering, Amplification, Hearing Loss |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT |
Author: |
RAFAT AHMED ALHANANI, JAAFAR ABOUCHABAKA, RAFALIA NAJAT |
Abstract: |
In this work, we identify, analysis and evaluate the role of mobile agent to
solve the problem of selecting the minimum connected dominating set CDS better
alternative approach than the exchange messages approach. The first problem
concerns the nature of the CDS construction algorithms in question. Their design
is justified as the purpose to construct a virtual infrastructure for wireless
network with varied high cost in the permanent exchanged messages to select the
CDS. The redundant broadcasting of the packets effects the overall network
performance, increases the latency, the collision and the need of
synchronization mechanism. Common techniques and algorithms such as marking
process, Greedy Algorithms, Maximal Independent Set MIS, Pruning process, and
Multipoint Relaying are exploited to select the potential nodes of the connected
dominating set. We analyzed and implemented some of these techniques from the
using perspective of the mobile agent. We shall argue that the mobile agent
implements the CDS algorithms with less cost in its moves comparing with the
cost of exchanged messages. Mobile agent just requires local information and a
limited number of iterative rounds instead of the redundant broadcasting packets
that imposed by other techniques. There is no work similar to our work that
discusses the using of mobile agent to construct the connected dominating set
based on those common techniques.
We have made slight modifications on
those algorithms, their notations and parameters to be appropriate through the
implementation by the mobile agent. Using the mobile agent shows encouraging
results for constructing connected dominating set with few iterations,
eliminates the overhead caused by the large volume of message exchange, and
improve the structure of the computed CDS. However, the agent by implementing
those algorithms successfully constructs the connected dominating set; the
constructed connected dominating nodes are still large set. The agent by
implementing those algorithms could not construct the minimum CDS. |
Keywords: |
Mobile Agent, Graphic Theory, Connected Dominating set, Maximal Independent Set,
Whiteboard |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
AFFECTIVE AGILE DESIGN A PROPOSAL FOR A NEW SOFTWARE DEVELOPMENT MODEL |
Author: |
ALESSANDRA PIERONI, NOEMI SCARPATO, MATTEO SCORZA |
Abstract: |
This paper deals with two apparently distant and well-known technologies: the
agile development methodology and the affective design discipline. The aim of
the paper consists of investigating how to combine the two technologies in order
to obtain a new software development model: the affective agile design. The
innovative software development model, indeed, leverages agile - Scrum Framework
guidelines and recalls affective design practices that consist of collecting and
analyzing emotional feedback during the running process. The proposed model,
furthermore, address firmly people-oriented principles, that have opened up a
new front in regards of the needs of the productive path, calling in a loud
voice the initiation of affective design practices. The main pillars of the
proposed agile affective design model are the following: defining the points of
the process where iteration with individuals is strong, intercepting their
emotional expressions, analyzing their useful contributions and proceeding with
systematic affective analysis leading to an optimized process of change
management. In order to measure the validity of the proposed model, a real
instance of a software developed by using the basic agile methodology at Fastweb
Spa has been studied. The results have demonstrated that the benefits obtained
by the use of the proposed innovative software development model overcome the
main pain-points identified in the use case. |
Keywords: |
Agile Methodology, Affective Design, Affective Computing, Scrum, Software
Development Models, Artificial Intelligence. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
CRITICAL FACTORS IN KNOWLEDGE COMMUNICATION OF MALAYSIAN PUBLIC SECTOR |
Author: |
ROHAIZAN DAUD, NOR ZAIRAH AB RAHIM, ROSLINA IBRAHIM, SURAYA YAACOB, ROSIDA AB
RAZAK |
Abstract: |
In the Malaysian public sector, a group of Information Technology (IT) experts
and decision makers is the mastermind of the future in Information Technology
(IT). Therefore, common understanding between the IT experts and the decision
makers is imperative for a collaborative and comprehensive decision making.
However, there are few studies that gauge the parties potential in knowledge
integration, especially in terms of communication. Hence, developing further
understanding of the communication factors that influence the knowledge
integration between IT experts and decision makers is essential. Literature
analysis showed that four factors influence the knowledge communication
conceptual model: sharer, knowledge, relationship, and institution. However,
after examining the Malaysian public sector by using purposive sampling
strategy, there is a need to enhance the factors by highlighting two new items:
high-level thinking and type of knowledge. These additional factors would
improve the comprehensive knowledge communication in organizations for the
decision making process. |
Keywords: |
Knowledge Communication, IT Experts, Decision Makers, Malaysian Public Sector,
IT Projects |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
AUDIT INFORMATION SYSTEM RISK MANAGEMENT USING ISO 27001 FRAMEWORK AT PRIVATE
BANK |
Author: |
EKIN KABAN, NILO LEGOWO |
Abstract: |
Control of risk management information systems in the developing world is
currently needed to improve performance and provide a very important impact for
users of information systems, especially to promote business focus on
information systems. Therefore, the perpose of the research it will conduct an
audit of risk management information system at private Bank to determine the
level of maturity level that has been applied whether it is in accordance with
Methodology using ISO / IEC 27001 standard. The process to be used in this risk
management information system audit focuses on annex 7. Asset Management, annex
10. Communication and operation and annex 11. Access control. The result of the
stages that will be done is from seeing the current condition to the conclusion
that results from the maturity level the relevant bank. From the results
obtained, the maturity level of asset 7 asset management 3.2, annex 10
communications and operation 3.9 and aneex 11 access controls is 3.7. To
increase the value of the maturity level of the bank, a process that must be
carried out includes: There are several procedures and compliance that have not
been executed by Bank in the overall control of the management asset. the
conclution of the research obtained is 3.2 for the maturity level scale of 5
which means there is a gap of 1.8 for the value of compliance to achieve target
5. But, to achieve target 4, Bank has gap analysis 0.8 to get level 4 in
maturity Level. To get these levels, things that must be run can be seen in the
sub suggestion on the next page. In annex 10 that discuss the Communication and
Operations Management, the Bank already done well and in accordance with the
existing SOP at the bank. From a scale of 5, the bank has applied maturity level
with point 3.9 which can be interpreted that the gap in the annex is 1.1 to get
level 5 on the maturity level. To get level 4, Bank must do a little development
because the diffrence value from maturity level from 3.9 to level 4 is 0,1. So,
it can be ascertained with the compliance and the existing documents in Bank can
be run entirely to get the appropriate results for the future. In annex 11 that
discusses the Access Control on Bank, it is very good and in accordance with SOP
and the standards applicable to Bank. The bank. From the implementation of Bank
get maturity value 3,7. To get maturity level 4, then the gap is 0.3. For the
future can be maturity level 4 if the process and procedures on sub suggestions
can be run properly and correctly. |
Keywords: |
Audit IS , Risk management , Asset Management , Bank , ISO 27001 |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
AN EMPIRICAL STUDY OF THE BEHAVIORAL FACTORS AFFECTING STUDENTS PERCEPTION ON
ADOPTING ELECTRONIC ASSESSMENT SYSTEM |
Author: |
SHERVIN FARZIN, HALINA MOHAMED DAHLAN |
Abstract: |
Electronic assessment (e-assessment) system inevitably plays a role in the
educational environment as one of the means available to measure students
learning outcomes. There are large numbers of cases that prove the establishment
of an e-assessment system did not bring the promised benefits for students.
Meanwhile, many studies focused on technical difficulties of development rather
than incorporating the behavioral aspects. This all amounted to create a gap in
understanding of e-assessment system adoption from student's point of view.
Thus, the main concern in this research would be to identify all the behavioral
issues of adopting an e-assessment system from students point of view. Alas,
encapsulate identified constructs into one model that resolve all the behavioral
problems, and at last, investigating the existence of statistical relationship
among the proposed constructs. In that sense, the first step would be to
recognize real-world problems that students are facing in their practices. The
behavioral model has been proposed on the basis of the behavioral essence of the
unified theory of acceptance and use of technology. For the model evaluation,
the research conducts a survey on 380 students from Open University Malaysia
(OUM) who had prior experience with e-assessment system. The results show that
the entireties of hypothesis were significantly validated except in the case of
habit toward usage intention. Moreover, the statistical findings of this
research can create a well-established ground for future research, as well as,
developing of e-assessment system for university level students. |
Keywords: |
Electronic Assessment, E-Assessment, Adoption, Behavioral Model of Adoption,
UTAUT |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
REMOTE SENSING DATA RESTORATION TO COMPENSATE FOR HAZE EFFECT |
Author: |
NURUL IMAN SAIFUL BAHARI, ASMALA AHMAD, BURHANUDDIN ABOOBAIDER, MUHAMMAD FAHMI
BIN RAZALI, HAMZAH SAKIDIN, MOHD SAARI MOHAMAD ISA, GEDE PRAMUDYA ANANTA, YAZID
ABU SARI, NASRUDDIN ABU SARI |
Abstract: |
Remote sensing data recorded from passive satellite system tend to be degraded
by attenuation of solar radiation due to haze. Haze is capable of modifying the
spectral and statistical properties of remote sensing data and consequently
causes problem in data analysis and interpretation. Haze needs to be removed or
reduced in order to restore the quality of the data. This study aims to restore
the hazy data using proposed haze removal technique and evaluate its performance
by means of spectral and statistical methods. In this study, initially, haze
radiances due to radiation attenuation are removed by making use of pseudo
invariant features (PIFs) selected among reflective objects within the study
area. Spatial filters are subsequently used to remove the remaining noise causes
by haze variability. The performance of hazy data restoration was evaluated
using Support Vector Machine (SVM) classification. It is revealed that the
technique is able to improve the classification accuracy to the acceptable
levels for data with moderate visibilities and restored the spectral and
statistical properties of the data and shows an increase in overall
classification accuracy from 51.63% to 82.62%. |
Keywords: |
Haze Removal, Land cover Classification, Landsat 8, Support Vector Machine,
Spectral, Statistical |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
TECHNOLOGY USE, EMOTIONAL CONNECTION AND THEIR RELATIONSHIP: A LITERATURE REVIEW |
Author: |
NUR FATINI ISMAIL, MOHD HILMI HASAN, EMY ELYANEE MUSTAPHA |
Abstract: |
Demand for technology use upsurge as we often rely on technology in completing
countless tasks daily. Nowadays, the emerging technologies impact our way of
livings in different ways regardless of age. If technology is properly used, it
can make betterment to ones life, but if it is excessively used, it causes
severity to human beings. Impact arises from the excessive use of technology
could be hindered if we could be informed about the severity of technology use.
The aim of this research is to develop constructs for a scale measuring
technology severity among children regarding emotional connection. For this
study, emotional connection is defined as a bond or tie to the technology in the
form of attachment, engagement or addiction towards mobile devices. The
objective of this article is to understand technology use and emotional
connection from reviewing literature. Findings from the literature reviewed
suggested that there are intersections of characteristics between technology use
and emotional connection. |
Keywords: |
Technology Use, Acceptance, Continuous Use, Excessive Use, Emotional Connection,
Attachment, Engagement, Addiction |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
DE-NOISING FILTERS FOR MICROSCOPIC MEDICAL IMAGES OF HUMAN SPERMATOZOA |
Author: |
L. PRABAHARAN, A. RAGHUNATHAN |
Abstract: |
Image de-noising is a process of eliminating the unwanted information occupied
on the image during image acquisition and image digitization. The noise removal
in an image is a challenging pre-process, concern to preserve minute details in
the images. The selection of proper noise removal filter will make the sense of
retaining the fine details in the image will helpful for feature extraction.
Especially in the domain of sperm cell image processing, the better denoising
technique is obligatory to maintain the fine details in the image. Generally
these images are not clear due to different staining procedures followed during
image acquisition. The various emerging noise removal filters are developed for
microscopic medical images but they should be identified specifically with
respect to the noise in the input image. Most of the microscopic medical images
are degraded by Gaussian noise. So that the Gaussian noise is added artificially
on the human spermatozoa cell image and de-noised by using several spatial
filters. In this paper the performance of various de-noising filters is measured
using objective fidelity criteria such as Mean Square Error (MSE), Peak
Signal-to-Noise Ratio (PSNR) and Entropy. This performance analysis moves
forward to have further research in denoising for microscopic sperm cell images. |
Keywords: |
Image De-Noising, Gaussian Noise, Error Metric, Spermatozoa, Infertility |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
ANTECEDENTS AND CONSEQUENCES OF EWOM IN SOCIAL COMMERCE |
Author: |
SAHABI Y. ALI , AB RAZAK CHE HUSSIN, MASITAH GHAZALI |
Abstract: |
As a business paradigm, social commerce (s-commerce) has brought about a new
stage of innovation, and by extension, has transmuted the power from sellers to
buyers. S-commerce is an integration of transactional and social activities, in
which, individuals may spread word of mouth (WOM) about their shopping
experiences, knowledge, as well as providing information about product and
services to their friends. This kind of social interactions among individuals
has increased the potentials of eWOM communication. Most of the studies in
relation to eWOM happen to be fragmented as they consider either the antecedents
or consequences of eWOM leading to conflicting results especially in s-commerce.
The present study aims to look into the antecedents and consequences of eWOM in
s-commerce from different literatures and aggregate them into a comprehensive
model to guide future research. This study will help managers and practitioners
to understand the antecedents and consequences of eWOM communication, and it
will also spur the research community to delve into more research in order to
investigate other drivers as well as consequences of eWOM communication in
s-commerce. |
Keywords: |
eWOM, Social commerce, Social media, Purchase intention, Antecedents,
Consequence |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
FACTORS AFFECTING SELLER LOYALTY IN BUSINESS E-MARKETPLACE : A CASE OF INDONESIA |
Author: |
GABRIELLA JANE ADITHA SANTOSO, TOGAR ALAM NAPITUPULU |
Abstract: |
The development of e-commerce in Indonesia, especially e-marketplace is very
fast. The number of e-marketplaces operating in Indonesia continues to increase
over time. This condition makes the competition in e-marketplace business
becomes more competitive. To survive, e-marketplace must be able to maintain and
increase their number of customers. Basically, customers in the e-marketplace
business are not just buyers, the sellers who market their goods and / or
services in the e-marketplace are also customers of the e-marketplace. Some
constraints experienced by the seller can cause the seller to leave the
e-marketplace, this can be a serious threat for the e-marketplace that only acts
as an intermediary. Although many studies have been conducted to determine the
factors affecting buyer loyalty, but differences in objective and technical
experience of buyers and sellers cause studies conducted on buyers can not be
applied directly to sellers. Based on these backgrounds, then conducted research
to find the factors that affect the loyalty of sellers in e-marketplace
business. The research model was established and developed based on some
previous research. Some factors such as efficiency, security and privacy,
communication, reliability, information, value added services, image, cost, and
promotion are examined to obtain answers to research objectives. The sample in
this research is taken from the seller in e-marketplace in Indonesia. The method
of analysis used in this research is Structural Equation Modeling (SEM). The
results of this study found that the satisfaction, image, cost, promotion and
value added services have a positive impact on the loyalty of the seller.
Satisfaction is a factor that has the greatest influence on seller loyalty. |
Keywords: |
E-marketplace; E-commerce; Factors; Seller Loyalty; Structural Equation Modeling |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
DISASTER RECOVERY PROCESS IMPROVEMENT IN IT ORGANIZATION : KNOWLEDGE MANAGEMENT
AND GAP ANALYSIS |
Author: |
HANIZAH HJ. MOHIDEEN, MAGISWARY DORASAMY |
Abstract: |
Noteworthy research gap are being perceived on Knowledge Management (KM) in the
outlook of Disaster Recovery (DR) in Information Technology (IT) organizations.
Preliminary interviews with the organization implied that the organization
facing two main challenges in the context of DR, namely (i) DR information
hosted in various knowledge repositories, and (ii) lesson learn capturing is
being done after the DR test completion and unavailability of centralized lesson
learn or best practice document for quick reference. We found that organization
can benefit from the inclusion of KM concept within the process improvement to
support its Disaster Recovery activities. This research is an action research to
improve DR process in a multinational company in Malaysia. Mixed method approach
will be used as to obtain some variation in data collection which will lead to
greater validity. Our aim is to fill the theoretical gap in KM for DR in IT
organizations. This paper presents the result of the first stage in canonical
action research which is Problem Diagnosis. The proposition of this research is
that an improvised process can successfully support disaster recovery activities
in IT organizations. |
Keywords: |
Disaster Recovery, Knowledge Management, Information Technology, Action Research |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
A NEW CRYPTOSYSTEM FOR ENCRYPTION AND DECRYPTION USING ELLIPITIC CURVES IN
CRYPTOGRAPHY OVER FINITE FIELDS |
Author: |
MOHAMMED RAFIQ NAMIQ, WRYA K. KADIR, ARAM M. AHMED |
Abstract: |
This paper considers the use of cryptography with elliptic curves. It is
presented and defined a new cryptosystem algorithm for encryption and decryption
using elliptic curves with more than one secret and public keys. Furthermore, it
is described the mathematical concepts related to elliptic curves, particularly
the discrete logarithm problem on elliptic curves. A description of the
Diffie-Hellman algorithm on elliptic curves and elliptic curve encryption
algorithm with the recipients public keys are represented. |
Keywords: |
Cryptography, Public-Key Cryptography, Computer Security, Algebraic Geometry,
Elliptic Curves, And Finite Fields. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
A TREEMAP BASED NETWORK VISUALIZATION SCHEME FOR DETECTING NETWORK ATTACKS |
Author: |
WALID I. KHEDR, ABDEL GHAFAR EMARA, IBRAHIM ZIEDAN |
Abstract: |
Because of the rapid increase in the size and complexity of computer networks
and the growing increase in the number of users, network security administrators
are being overloaded with large volumes of data (logs from various sources and
many security events to monitor). Due to its nature, these data are impossible
to handle manually, and even most automated data analysis tools are inadequate.
One of the main effective solutions for securing complex computer networks is
visualization. Visualization transforms data into visual objects which help
administrators to achieve real-time supervision, fast reaction and real-time
detection of emerging attacks. In this paper, a novel treemaps based network
visualization scheme is proposed. The proposed scheme groups many network
traffic attributes (source IP, destination IP, port number and packet size) in a
simple and manageable interface. The proposed scheme also combines traffic from
the same country in single Treemap rectangular region. Usability analyses show
that the proposed scheme is efficient and has a high level of usability. |
Keywords: |
Network Security, Data Visualization Techniques, Treemap, Geolocation Database |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
EECLA: CLUSTERING AND LOCALIZATION TECHNIQUES TO IMPROVE ENERGY EFFICIENT
ROUTING IN WIRELESS SENSOR NETWORKS |
Author: |
ANNAPURNA GUMMADI, DR. K RAGHAVA RAO |
Abstract: |
Wireless sensor network is an efficient technology in coming future. The main
problem of the WSN is consuming energy hence poor energy efficient routing. As
per our survey we found that to perform poor routing is localization problems
with respective to the clustering of the cells in the network. Hence we proposed
a clustering and localization techniques for improving an efficient energy
routing methods. We hope proposed methods given better solutions than the
existed techniques for more energy consumption and inefficient localization
problems. This research aims to optimize the energy consumption of wide scale
wireless sensor networks. This paper performs the survey on results, comparison
and analysis of the different existed works from, we feel confident to prove our
work is better by work on load balancing of each cell in the network,
measurement of node, cells overall availability and it is related to energy with
respective to the distance and data transfer, deal with the nodes in between two
clusters and finally make all nodes die almost at the same time by using an
adaptive system for solving these problems. We got confidant that this work
improves the energy conservation with 94% regards to the original LEACH
Algorithm, clustering and localization techniques. Finally the results are shown
and compared to the existed LEACH, clustering and localization approaches. |
Keywords: |
Wireless sensor networks, clustering, localization, LEACH, EECLA, CLAEER. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
SOFT BEHAVIOUR MODELLING OF USER COMMUNITIES |
Author: |
ALFREDO MILANI, VALENTINA FRANZONI |
Abstract: |
A soft modelling approach for describing behaviour in on-line user communities
is introduced in this work. Behaviour models of individual users in dynamic
virtual environments have been described in the literature in terms of timed
transition automata; they have various drawbacks. Soft multi/agent behaviour
automata are defined and proposed to describe multiple user behaviours and to
recognise larger classes of user group histories, such as group histories which
contain unexpected behaviours. The notion of deviation from the user community
model allows defining a soft parsing process which assesses and evaluates the
dynamic behaviour of a group of users interacting in virtual environments, such
as e-learning and e-business platforms. The soft automaton model can describe
virtually infinite sequences of actions due to multiple users and subject to
temporal constraints. Soft measures assess a form of distance of observed
behaviours by evaluating the amount of temporal deviation, additional or omitted
actions contained in an observed history as well as actions performed by
unexpected users. The proposed model allows the soft recognition of user group
histories also when the observed actions only partially meet the given behaviour
model constraints. This approach is more realistic for real-time user community
support systems, concerning standard boolean model recognition, when more than
one user model is potentially available, and the extent of deviation from
community behaviour models can be used as a guide to generate the system support
by anticipation, projection and other known techniques. Experiments based on
logs from an e-learning platform and plan compilation of the soft multi-agent
behaviour automaton show the expressiveness of the proposed model. |
Keywords: |
Community Behaviour, User Behaviour, User Interaction, Timed Transition
Automaton, Elearning, Automated Planning |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
AUTOMATIC ARABIC ONTOLOGY GENERATION FOR THE ANIMAL KINGDOM (NAAO) |
Author: |
DALIA FADL, SAFIA ABBAS, MOSTAFA AREF |
Abstract: |
Ontology is the gateway for the interaction between human and the machines
because it facilitates the gaining of the information for the end users. The
semantic web terms and vocabulary are considered as form of ontology. So the
improvement of the ontology helps in the semantic web progration. Arabic
ontology is a critical natural language processing field; it helps to enrich the
Arabic language resources. Although, the searchers started to focus their
efforts creating ontologies in Arabic language, the Arabic terms and fields have
not yet been covered. This paper introduces an innovative framework, annotated
as NAAO (Novel Automatic Arabic Ontology), which automates the ontology
generation process from XML documents. The novelty of NAAO resides in generating
the Arabic ontology, in the form of XML graph schema (XSG), from semi-structured
data (XML documents associated with graph schema). The automation process
entails four main phases (extrication, XML schema parsing, ontology generation
and refinement and evaluation). Extrication phase, where all the data required
for the ontology generation is extricated from the information source. XML
schema parsing phase, where the extracted data is going to be investigated and
the hierarchical analysis to identify all the parts of the ontology is going to
be created. Ontology generation phase deal with the production of the Arabic
ontology (classes, elements, and relations). Finally, refinement and evaluation
phase that deals with improvements of the Arabic ontology. Moreover, the paper
comprises versatile examples for an automatic generation to Arabic ontologies
regarding the animal kingdom. Such as the invertebrate's ontology, in which the
XSG is automatically extracted using 103 XML documents, 320 concepts (classes),
603 elements and 783 relations. Finally, NAAO enjoys certain advantages than
others since it shows an automatically generate Arabic ontology from
semi-structured data (XML file). It provides mapping connections to ensure the
right relationships with the classes and the elements to its corresponding nodes
in the XML documents and supplies huge ontology contents (concepts elements and
relations). Moreover, NAAO offers an automatic evaluation of the generated
Arabic ontology using cosine similarity measurements. |
Keywords: |
Arabic Ontology, Ontology Learning, Ontology Generation, XML Schema, Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
PROTECTING INVULNERABILITY AND SECURITY FOR WIRELESS SENSOR NETWORKS TO SAVE
DATA |
Author: |
V.KRISHNA, SYED UMAR, O.RAMESH, N. YOGENDER NATH |
Abstract: |
Based on the wireless sensor networks many applications are developed where more
usage at military, medical fields. All this leads to exposure of the network
against various threats from the outside. The network security from external
attacks considered as one of the most important studies of today. This study
examined the effects of security limits the wireless network WSN, typical
attacks of certain species, and provided security over the years for a wide
range of emotions to detect attacks and to protect wireless network. |
Keywords: |
WSN, Self-Defence, Authentication, Security |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
LDT: LOG DECISION TREE TO CLINICAL DATA CLASSIFICATION |
Author: |
T. SUREKHA, Dr. R. SIVA RAMA PRASA |
Abstract: |
The massive recording of the continuous data in the real-time imposes huge
burden in analyzing the medical data as it takes huge time for execution and may
cause errors due to the data uncertainty and the inability to interpret the
highly significant features. As a result, the data is classified according to
the rules and the efficiency of the data classification relies on the data
feature selection. To address this issue, the paper introduces a new algorithm
for the optimal selection of the features that uses a novel parameter for
optimally determining the features. The proposed Log Decision Tree (LDT) uses
the novel parameter termed as the Log-entropy to retrieve the mutually
significant feature from the data such that the future data classification
depends on the LDT classification model for determining the disease/condition of
the patients, which leads to the easy diagnosis. The Log-entropy function uses
the entropy and the weights of the features for computing the importance of the
features and based on the selected features, the LDT model is developed. The
experimentation proves that the proposed LDT attained a greater value of
accuracy, specificity, and sensitivity of 83.7386%, 77.6160%, and 86.4407%
respectively. |
Keywords: |
Log-entropy, decision tree, medical data classification, Entropy, feature
selection. |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
DEVELOPMENT OF A TIMESTAMPING WEB APPLICATION FOR THE ELECTRONIC FACTORING
PROCESS IN ECUADOR |
Author: |
JESUS MENDOZA MACIAS, SANG GUUN YOO |
Abstract: |
This document describes the experience in developing a Timestamping application
for the Electronic Factoring process in Ecuador which executes the process of
electronic signing of documents in XML format with timestamp. The need of this
application has its origin in an Electronic Factoring platform developed by the
company BIGDATA CA, where it was sought to have a mechanism that allows to
guarantee the integrity and validity of the information over time of certain
documents generated by the system. The UWE methodology was used for its approach
to processes, obtaining requirements, and support with CASE tools that provide
support for the treatment of the same, allowing to develop applications of
better quality. The use of electronic signatures in conjunction with timestamps
allowed greater legal validity and integrity to the information contained in the
signed documents, so that they can be used in judicial proceedings or to avoid
alteration of the same, the use of these Two mechanisms contributed to give
greater security and agility to the process of Electronic Factoring, since the
process of signing now is done in an entirely online environment and not in a
manual way as it was being done. |
Keywords: |
Timestamping, UWE, Factoring, XML, Security |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
Title: |
AN INTEGRATED AHP-TOPSIS METHODOLOGY TO EVALUATE FOR ADOPTION COTS DATABASE
COMPONENTS BASED ON USABILITY |
Author: |
AWNI HAMMOURI |
Abstract: |
The judicious use of commercial off-the-shelf (COTS) components in development
projects of large systems has effectively accommodated the changing business
landscape in addition to providing better software reuse functionalities.
Greater productivity, flexibility, ownership and reusability, accelerated
development, increased dependability, and reduced process risk being some of the
many. A bigger risk is involved in choosing a right component among many
available alternatives, which is also considered a hard process. The involvement
and contribution of different stakeholders with vested interests further
complicates this process. End users would prefer being abstracted from such a
process and are primarily concerned with an easy product usage, effectively
making Usability a much focused attribute. This drives the need for a mechanism
to help stakeholders make such abstracted decisions. Multiple conflicting
criteria during decision making can be explicitly evaluated through MCDA and
MCDM - Sub-Disciplines of Operations research. Here we introduce one such
decision-making methodology. Well-known MCDM techniques, namely Analytic
Hierarchy Process (AHP) and Technique for Order Preference by Similarity to
Ideal Solution (TOPSIS) have been employed to generate a hybrid approach from
AHP and TOPSIS. This approach facilitates the ability to analyze and select the
best alternative from a number of COTS components, a crucial feature in decision
making. We begin with obtaining the weights of selected criteria and then the
structure of the database software selection problem will be analyzed. Finally,
the alternatives ratings COTS or Database Software component will be calculated
by using TOPSIS Technique. |
Keywords: |
Commercial of the shelf (COTS), Technique for Order Preferences by Similarity to
the Ideal Solution (TOPSIS), Analytical Hierarchy Process (AHP), usability,
Multiple Criteria Decision Making (MCDM), Entity Relation Model (ERM), Data Flow
Diagram (DFD) |
Source: |
Journal of Theoretical and Applied Information Technology
15th January 2018 -- Vol. 96. No. 1 -- 2018 |
Full
Text |
|
|
|