|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
May 2018 | Vol. 96
No.10 |
Title: |
INCORPORATION OF NEGOTION PROCESS INTO AN E-COMMERCE PLATFORM TO ICREASE SALES |
Author: |
FAYSAL MEKKAOUI-ALAOUI, EL HIBAOUI ABDELAZIZ |
Abstract: |
Negotiation is back-and-forth communication designed to reach an agreement when
two entities have some interests that are opposed. It is a basic means of
getting what one wants from others. The purpose of this study is to incorporate
the negotiation concept in an e-commerce platform in order to increase benefit
at once for the seller and the buyer. In this paper, we will introduce a
model of negotiation which allows the buyer to negotiate some product
characteristics, including price. The proposed model uses game theory to find a
compromise between the propositions of the seller and those ones of the buyer.
The negotiation process is carried out automatically on the seller’s side. In
terms of quality and efficiency of this process, an experimental evaluation
shows that the proposed model allows reaching a win-win deal with a reduced
number of operations. Thus, the buyer stays in the same e-commerce website and
therefore increases the sales of this latter. |
Keywords: |
Automated negotiation, Decision making, E-commerce, Equilibrium, Game theory |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
THE PROPOSED IRAQI VEHICLE LICENSE PLATE RECOGNITION SYSTEM BY USING PREWITT
EDGE DETECTION ALGORITHM |
Author: |
ELAF J. AL TAEE |
Abstract: |
Since the number of vehicles is increasing hugely every year, the process of
controlling and tracking those cars forms a significant human challenge. The
automatic recognition of those cars can help in solving this problem and save
much effort and time. The license plate could involve a lot of content, which
make the recognition process is difficult to many researchers around the world.
In addition to that, license plate may not have fixed in uniform place on the
car, hence the recognition of this plate should recognize it. This research aims
to recognize the characters, numbers, and words, that extracted from Iraqi LPS,
into a text. This system consists of four main stages: The first phase is
License Plate Detection by using the vertical Sobel edge detection and extracts
these LP by using morphological operation. The second phase is License Plate
Alignment. The third phase is License Plate Segmentation and isolates each
character, numbers, and words of the license plate by using scanning techniques.
The last phase is License Plate Recognition to display the alphanumeric
character and words as the text file by using Prewitt edge detection algorithm.
The overall performance of the system reached to 100%. |
Keywords: |
Image Acquisition, License Plate Detection, License Plate Rotation, License
Plate Segmentation, License Plate Recognition, Morphological Operation, Edge
Detection |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
FINGERPRINT TEMPLATE PROTECTION SCHEMES: A LITERATURE REVIEW |
Author: |
APRI SISWANTO, NORLIZA KATUK, KU RUHANA KU-MAHAMUD |
Abstract: |
The fingerprint is the most widely used technology for identification or
authentication systems, which can be known as fingerprint authentication systems
(FAS). In addition to providing security, the fingerprint is also easy to use,
very reliable and has a high accuracy for identity recognition. FAS is still
exposed to security attacks because fingerprint information is unencrypted.
Therefore, fingerprint information requires protection known as fingerprint
template protection (FTP). This paper aims to provide an organized literature on
FTP. Three research questions were formulated to guide the literature analysis.
First, this analysis focuses on the types of FTP schemes; second, the metrics
used for evaluating the FTP schemes; and finally, the common datasets used for
evaluating the FTP schemes. The latest information and references are analysed
and classified based on FTP methods and publication year to obtain information
related to the development and application of FTP. This study mainly surveyed 62
documents reported on FTP schemes between the year 2000 and 2017. The results of
this survey can be a source of reference for other researchers in finding
literature relevant to the FTP. |
Keywords: |
Biometric Authentication, Fingerprint Template Protection, Template
Transformation, Fingerprint Cryptosystem, Authentication Systems |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
SCHEDULING FOR JOB SHOP PROBLEMS WITH TRANSPORTATION AND BLOCKING NO-WAIT
CONSTRAINTS |
Author: |
SAAD LOUAQAD, OULAID KAMACH, ADIL IGUIDER |
Abstract: |
The problem studied in this paper is the Transportation job shop problem with
blocking and no wait constraints. This problem is an extension of the classical
job shop problem that take into account transport operations and the absence of
storage space between machines. We formulate the problem by means of a new
disjunctive graph. We modelized blocking situations and described properties of
partial schedule that lead to deadlock situations. The new disjunctive graph and
deadlock situations properties served us to develop a greedy heuristics based on
priority and avoiding blocking cycle rules. We also propose to resolve our
problem by an exact method based on a Mixed Integer Linear Program (MILP).
Computational results for a set of benchmarking tests are reported and the
effectiveness of our methods are discussed. |
Keywords: |
Job Shop Scheduling problem, Transport, Blocking No Wait Constraint, Mixed
Integer Linear Program, Heuristics |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
A GRAPH –BASED APPROACH FOR KEYPHRASES EXTRACTION USING A PRETOPOLOGICAL
FORMALISM |
Author: |
FADOUA GHANIMI, ABDLWAHED NAMIR, ILYAS GHANIMI |
Abstract: |
In this paper, we present a new graph -based approach for keyphrases extraction
using the pretopology theory. We formalize the notion of neighborhood to express
different types of connections that may exist between the terms of a document.
The first part of the proposed method consists in first selecting the keywords
candidates using a pattern approach; the second part consists in detecting
keywords as the most representative candidates by means of graph-based ranking
algorithm using a pretopological formalism. |
Keywords: |
keyphrases extraction, graph–based approach, ranking algorithm, pretopology |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
AN INTELLIGENT COOPERATIVE MULTI-AGENTS BASED PARKING SYSTEM: DESIGN AND
IMPLEMENTATION |
Author: |
ABDEL RAHMAN A. ALKHARABSHEH |
Abstract: |
Currently, normal parking systems are inefficient, frustrating and time
consuming. The number of cars increased rapidly; as a result of this many
problems are appeared remarkably. One of the most problem is drivers cannot find
parking as easily as they would like. In addition, the drivers need more cost
and time during finding a car space. Accordingly, the drivers spend more time
searching inside the cars park looking for free slot and so the petrol cost, the
congestion and car accident can be increased. As a result, various negative
impact may appear in traditional parking systems i.e. traffic congestion,
pollution, fuel consumption, time consumption and car accidents. Such problems
will be evident in most of capital cities, in special events and in malls.
Such problems motivated the researcher to look deeper and find appropriate
solutions. To cope with such growing problems of parking management, the
researcher proposes an advanced solution for monitoring free and busy parking
slots. Such system will help the drivers to find out the free slots in easy way.
In addition, the proposed system will show them on mobile screen the busy slot,
the free slot number, floor number in big car parking which is consisting of
several floors or will appear to them the available slot. The proposed
system will mainly consist of multi-agent system cooperated with hardware
components such as IR sensor nodes to sense the status of the slots and
accordingly send the data to Arduino. A gateway device will be used to collect
wirelessly the status from the sensor nods. Agents system will be used to
analyse the collected data then provide the drivers through web with the needed
important information in real time. The proposed system is implemented and
prototyped to solve the above problems. The main contribution of the proposed
system is the ability of solving more than five car parking system problems in
one application. In addition, new ideas have been added to such system compared
with current systems. |
Keywords: |
Multi-agents, Intelligent Parking System, Wireless Sensors |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
FALSE ALARM REDUCTION SCHEME FOR DATABASE INTRUSION DETECTION SYSTEM |
Author: |
AYMAN MOHAMED MOSTAFA, FATEN AYIED ALMUTAIRI, M.M. HASSAN |
Abstract: |
Database intrusion detection system is considered a mandatory security layer in
recent database applications. The detection of intrusions in database
applications is mostly based on anomaly methods like access patterns,
association rule mining and mining data dependencies between data items. These
countermeasures achieve good results in traditional applications but new forms
of attacks on computer systems lead to the depreciation of intrusion detection
systems due to the high rates of false positive alarms. The goal of this paper
is to improve the accuracy of intrusion detection system by reducing false
alarms using alert clustering mechanism and system hibernation capabilities. In
this paper, a three-stage access control framework is developed for detecting
malicious users in database. This framework is embedded with an alert clustering
mechanism for reducing false alarms by correlating low-level alerts into one
cluster. A post security countermeasure is developed by merging system
hibernation capabilities into the developed application. The hibernation
mechanism is used for maintaining the availability of data in case of intrusion
detection. The experimental results of the proposed algorithm achieve high
detection rate with low false positive and low false negative alarms when
compared to recent researches in intrusion detection systems. |
Keywords: |
Intrusion Detection System, Alert Clustering, Hibernation Mechanism |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
A RULE SELECTED FUZZY ENERGY & SECURITY AWARE SCHEDULING IN CLOUD |
Author: |
SIRISATI RANGA SWAMY, Dr SRIDHAR MANDAPATI |
Abstract: |
The paradigm in which Information Technology (IT) application is provided as a
service is referred to as cloud computing. It enables the users to make
commercialized use of computation, storage, data and services across the world.
The security of this model is questionable despite the fact that several
potential gains can be achieved through cloud computing and this deters the
adoption of the cloud computing model. One of the main tasks that is performed
in cloud computing is Job scheduling. This not only improvises the working of
the cloud environments but also enables achieving maximum profit. Due to its
large solution space and the large amount of time required to find an optimal
solution, Scheduling is a part of problem category known as Non-deterministic
Polynomial (NP)-hard problem. This work proposes the usage of fuzzy logic as
well as optimized rule selection for cloud scheduling. A fuzzy logic system that
maps the input space into an output space using a list of if-then statements
referred to as rules is known as the fuzzy inference system. Here Stochastic
Diffusion Search (SDS) algorithm based fuzzy rule selection is proposed. The SDS
as the basis of the approach and modified it with the aid of fuzzy theory to
assign jobs to the most suitable resources. It has been shown that the suggested
technique helps to achieve better performance than fuzzy logic, as per
experimental outcomes. |
Keywords: |
Cloud Computing, Job Scheduling, Cloud Security, Fuzzy Logic, Rule Selection and
Stochastic Diffusion Search (SDS) |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
MATHEMATICAL TRANSFORMATIONS WITH SPIHT ALGORITHM FOR STEGANOGRAPHY TECHNIQUES |
Author: |
NAJI MUTAR SAHIB, TAHA MOHAMMAD HASAN, MENA MOHAMMED ABOOD |
Abstract: |
Due to the rapid and immense development within information transmission and
communications, there is a growing need for the usage of steganography
techniques which greatly stimulated the emergence of intensive research
activities to study steganography. The current paper submits a new system for
steganography technique which relies on discrete transforms with SPIHT (Set
Partition in Hierarchical Trees) algorithm. The system is able to hide secret
massages in a colored cover image. This picture is split up into pixel blocks in
the ratio 8x8. Haar wavelet transforms, DCT (Discrete Cosine Transform) and
SPIHT algorithm are in turn used on each lock in order to get our (LIP) list,
which points out the unnecessary pixels, which represent the optimum locations
for hiding the secrete massage. The paper presented two ways for hiding, the
first is in (band Blue) and the second is in (band Blue and Green), and we made
a comparison between the results of the two methods. Another approach, which is
based off of DWT (Discrete Wavelet Transform) as well as Haar wavelet transforms
with SPIHT algorithm, is also presented in this paper. The two approaches were
compared through capacity, correlation, PSNR and MSE. |
Keywords: |
Steganography, DCT, DWT, Haar Wavelet Transform, SPIHT Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
LEFT-RIGHT HEAD MOVEMENT FOR CONTROLLING SMART WHEELCHAIR BY USING CENTROID
COORDINATES DISTANCE |
Author: |
FITRI UTAMININGRUM, PUTRA PANDU ADIKARA, YUITA ARUM SARI, DAHNIAL SYAUQY, ANGGI
GUSTININGSIH HAPSANI |
Abstract: |
Head movement is one stage to handle the movement of smart wheelchair for
hands-free disabled person. This tool is useful to help disability of having
free movement using computer vision. In this paper, we propose a new framework
to recognize left-right head movement by using diagonal coordinates distance
(DCD) and horizontal coordinates distance (HCD). Face detection as main part is
applied at the first stage and skin detection is combined in terms of failure of
face detection. Skin detection stages has some steps as well. First step is
image conversion from RGB to HSV and YCbCr channel to get the skin detection to
work over face image. From the detected face area, eyes recognition is utilized
by using only a half of upper side face’s image. Nose detection is applied as
well based on whole face area. The center coordinates of eyes and nose are used
to determine the movement referred as centroid. The result shows that HCD is
better than DCD. HCD could cope the accuracy 82.5% for head movement detection.
This accuracy represents that by using HCD left-right head movement outcome the
problem of person with and without glasses as well as the various position of
web camera which is mounted in front of smart wheelchair. |
Keywords: |
Head Movement, Eye Gaze Movement, Eye Detection, Face Detection |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
LEARNING PREFERENCE ASSESSMENT: A FUZZY LOGIC APPROACH |
Author: |
DEDDY BARNABAS LASFETO, PUNAJI SETYOSARI, ERY TRI DJATMIKA, SAIDA ULFA |
Abstract: |
Learning Preference Assessment is necessary to assess the students’ readiness to
be involved in the self-directed learning such as online learning. Knowing the
level of Learning Preference Assessment, an educational institution or students
can prepare themselves to be better to get involved in the online learning. The
measurement of Learning Preference Assesment that has been done so far is by
using the questionnaire of Learning Preference Assessment in which the score of
total score of each questionnaire is classified into the level of students’
Learning Preference Assessment. Every level has certain score range. The total
number of students in each level used the statistical principle and classical
logic but they still have a weakness since they do not consider the total score
of the certain level threshold. As a consequence, the mapping of the level of
students’ Learning Preference Assessment in the university or study program
results in inaccuracy. We propose a fuzzy method that is a mathematical approach
and human’s cognitive aspect in this level measurement. The research results
showed that there was a difference of the score of Learning Preference
Assessment between using the statistical method and using the fuzzy logic
method. The Fuzzy system can find the different level that cannot be found by
statistical or logical analysis. |
Keywords: |
Online learning, Self Directed Learning, Learning Preference Assessment,
Statistical, Fuzzy Logic |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
SMART MONITORING AND CONTROLLING SYSTEM TO ENHANCE FISH PRODUCTION WITH MINIMUM
COST |
Author: |
HUSSEIN. A. MOHAMMED, INTISAR AL-MEJIBLI |
Abstract: |
Fish production has significant impacts to several factors in many countries for
example it affects the economic especially countries that include seas and
rivers and in influence the individual health as it is one of the high nutrients
food. In addition to, increasing fish production may participate in overcoming
the poverty issue in the world. This paper proposed smart system to monitor and
control fish pond by using six different sensors to monitor the dissolved oxygen
in water, water temperature, pH, turbidity, TDS and water level sensor. The
Arduino platform is used and the two Arduino Uno devises is employed as
microcontrollers. Further, the proposal employed servo motor in order to
regularly feed the fish. The system has the ability of collecting the sensors
reading regularly to perform the proper task. In addition to, sending alert SMS
to the fish farmer when critical situations occur by using GSM model. The
results were promising because maintaining the fish environment in healthy
conditions will affect positively in fish production in terms of number and
size. |
Keywords: |
Fish Ponds, Fish Production, Dissolved Oxygen Sensor, Turbidity Sensor, Arduino
Uno Microcontroller. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
CONSTRUCTION PROFESSIONALS’ PERCEPTION OF A WEB-BASED RECRUITING SYSTEM FOR
SKILLED LABOUR |
Author: |
AFOLABI, A. O. , OYEYIPO, O. O. , OJELABI, R. A. AND AMUSAN, L. M. |
Abstract: |
Globally, the construction industry is experiencing shortage of skilled labour
to handle most of its construction projects. There is the need to develop a
two-way collaborative technology that adequately connects the available skilled
labour to the construction projects where they are needed and vice versa in
order to reduce the shortage. By harnessing the strength of web-based
technologies, this study intended to evaluate construction professionals’
perception of a web-based recruiting system for skilled labour. The study
developed a web-based recruiting system using CSS, HTML, Javascript and MyQSL.
System block design and a use case diagram was used to model the web-based
systems which are presented in screen shots in this study. A total of one
hundred (100) structured questionnaires were distributed to construction
professionals in the attitudinal survey on the developed web-based system. The
data obtained was analysed and presented using SPSS v21. Statistical tools such
as stacked bars, mean score, analysis of variance (ANOVA) and Kruskall Wallis
test were utilized. Based on the designed web-based platform, the study revealed
that in recruiting skilled labour for construction projects, construction
professional are mostly concerned with having the sufficient number of skilled
labour which are readily available to the site location, properly screened and
obtained through a low-cost recruiting process in order to improve their
competitive advantage in the construction industry. The study identified lack of
knowledge about using a web-based system, low IT training among skilled labour
and inaccurate information supplied by worker as major drawbacks to using a
web-based system for sourcing for skilled labour. The study revealed that there
was a statistically significant difference in the drawbacks to the use of
web-based recruiting system for sourcing for skilled labour among the
construction professionals. The study recommended that there is need to increase
ICT trainings among construction professionals and its ancillary stakeholders in
order to utilize new innovative ICT tools in the construction industry.
Innovative ICT tools can be used to complement traditional methods in use in the
construction industry so as to enhance the delivery of construction projects. |
Keywords: |
Construction Industry, Recruitment, Skilled Labour, Social media, Web-based
systems. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
IMPROVEMENT OF CLASSIFICATION FEATURES TO INCREASE PHISHING TWEETS DETECTION
ACCURACY |
Author: |
SEOW WOOI LIEW, NOR FAZLIDA MOHD SANI, MOHD. TAUFIK ABDULLAH, RAZALI YAAKOB,
MOHD YUNUS SHARUM |
Abstract: |
Phishing can be defined as a form of social engineering crime that uses to
deceive victims by directing them to the fraudulent websites that appear
legitimate which will then collect their personal and sensitive information.
Phishing attacks use to target email users traditionally but now, target to
Online Social Networks (OSN)s typically Twitter. Therefore, a research study of
improving classification features for machine learning technique to classify a
dataset collected from Twitter is required. In this study, 3 supervised machine
learning techniques - Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and
Random Forest (RF) and classification features were used to test on a dataset
collected from Twitter. The result of our experiment showed that with only 11
selected features, we managed to yield 94.75% classification accuracy higher
than 94.56% achieved by other researchers who made use of more than 11 features
for the same dataset. From the experiment, we also found that RF remained the
best machine learning technique compared to SVM and KNN. |
Keywords: |
Phishing, Online Social Networks (OSN)s, Twitter, Classification Features,
Machine Learning Techniques |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
FACTORS AFFECTING THE DEVELOPMENT OF MSME BUSINESSMEN COMPETENCY IN THE USE OF
INFORMATION AND COMMUNICATION TECHNOLOGY IN RURAL AND URBAN AREA OF WEST JAVA
(CASE STUDY: MSME BUSINESSMEN IN BANDUNG AND BOGOR, WEST JAVA) |
Author: |
VERA AGUSTINA YANTI, SITI AMANAH, PUDJI MULJONO, PANG ASNGARI |
Abstract: |
This research aims to: (1) describe the level of MSMEs bussinesmen competencyy
in the use of ICT in rural and urban areas of Bandung and Bogor, (2) to analyze
the factors that influence the competence of natural businessmen to utilize ICTs
for their business activities in rural and urban areas of Bandung and Bogor, and
(3) to formulate strategies for developing competence of MSMEs businessmen,
especially in the utilization of ICT in rural and urban areas of Bandung and
Bogor, West Java, Indonesia. Competence in this research is personal competence
that is personal ability and skill in effort and technical competence is
technical ability in operational of ICT facilities in its implementation at
every activity of MSMEs businessmen. This research was conducted in Kota
Bandung, Kota Bogor, Kabupaten Bogor and Kabupaten Bandung from December 2016 to
April 2017. The sample of respondents was 358 based on the total population
selection of 3479. The data analysis method in this research used Structural
Equation Modelling (SEM)-AMOS. Based on the results of this research indicate
that the profile of MSMEs businessmen, the perception of MSMEs businessmen and
the utilization of ICT facilities have a positive effect on the competence of
utilization of ICT facilities, while the level of external environmental support
has negative effect but not significant on the competence of MSMEs in utilizing
ICT facilities. |
Keywords: |
Competence, Small medium enterprise (SME), Information communication and
technology (ICT). |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
TOWARD FOR STRONG AUTHENTICATION CODE IN CLOUD OF INTERNET OF THINGS BASED ON
DWT AND STEGANOGRAPHY |
Author: |
ALI A. YASSIN, ABDULLAH MOHAMMED RASHID, ZAID AMEEN ABDULJABBAR, HAMID ALI ABED
ALASADI, ABDULLA J. Y. ALDARWISH |
Abstract: |
Now days, with the remarkable fast development of micro processing devices and
communicating technologies, networks, computers, mobile devices and Internet
have become very unavoidable, as a result led to the emergence and prevalence of
the Internet of Things (IoT). The mobility devices in IoT have entered in all
areas of life ranging from a smart home down to a smart city. Due to big storage
systems are extremely needed for securing data in flexible processing.
Especially, the two or more entities wish to exchange data in IoT. In this
paper, we propose secure and scalable scheme to keep data against attacks during
a communication channel in IoT environment when IoT's components want to
exchange their data. This scheme work based on crypto hash function, and
Discrete Wavelet Transform (DWT) that apply on sender's/receiver's message. Our
proposed scheme distinguishes a good of security, scalability, and reliability
in entities' data via IoT. Additionally, our work includes numerous security
features like one time message code for each user's login request, user's
message integrity, user's message anonymity, and session key agreement.
Empirical results have explained the potential and profits of the proposed
scheme as well as significant gains in performance. |
Keywords: |
IoT, MAC, Key Management, Inside Attack. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
HEALTH INFORMATION SYSTEM SUCCESS FRAMEWORK BASED ON USER REQUIREMENTS
PERSPECTIVE |
Author: |
EBRAHIM GAHLEB, IBRAHIM MOHAMED |
Abstract: |
Although the success of Health information system (HIS) has attracted many
researchers to investigate the factors that affect the net-benefit in the
success framework, to date, there is no comprehensive framework available for
the success of the HIS, which takes the impact of user requirements factors in
developing countries. Therefore, the present study addressed this gap by
proposing a success framework which integrates the HIS quality and HIS user
dimensions in the context of Yemen. The HIS users dimension includes the
following factors: user requirements, user need, intention to use and user
satisfaction. To validate the integrated framework, a quantitative method was
used in which a self-administered structured questionnaire was distributed to a
total of 250 employees, under HIS departments in seven hospitals in the capital
Sanaa, Yemen. SPSS.VS.22.0 and AMOS VS.22 were used to design and analyze the
framework. The results revealed that the factors in the HIS users have positive
effect on the net benefit. In addition, the factors in the HIS users are
influenced by the factors in the HIS quality. The Deleon’s and Mclean’s results
indicated that the HIS quality has a positive relationship with the net
benefits. |
Keywords: |
User need, Health Information System (HIS); Health Information system Quality
(HISQ); Health information system users (HISU) and health information system Net
benefits (HISNB). |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
THE IMPORTANT OF SERVICE QUALITY AND THE TRUST IN TECHNOLOGY ON USERS
PERSPECTIVES TO CONTINUES USE Of MOBILE SERVICES |
Author: |
Dr. IBRAHIM ALMARASHDEH |
Abstract: |
Delivering government services through the mobile applications is popular in
developed countries, which benefit the citizens and governments. However, the
user’s acceptance of services via mobile applications still challenging for the
government. The purpose of this research is to investigate the factors that
influence citizens acceptance of mobile government services, based on the
relative variables to help government to maintain the services and fulfill the
citizen’s needs. A sample of 536 participants has shared their thought and
participate in the online survey. Structural equation modeling (AMOS)
implemented is conducted to validate the research model and test the research
hypotheses. This research provides evidences to show that mobile governments can
facilitate and assist citizens to access government services. In general, user
acceptance can be viewed as the intention of user to use a new technology,
together with an understanding of how to find it and how to use it. Citizens
acceptance should be investigated based on major factors such as self-efficacy,
trust in technology and service quality. The results of this research contribute
to the user acceptance theory and to the marketing of mobile services by
providing a clear picture and more understanding of the user perspective of
using mobile services. |
Keywords: |
Perceived Self-Efficacy, Perceived Ease Of Use, Perceived Usefulness, Service
Quality, Trust In Technology, Cost Of Service, Behavioral Intention. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
PRIVACY PRESERVING DATA MINING OF VERTICALLY PARTITIONED DATA IN DISTRIBUTED
ENVIRONMENT- AN EXPERIMENTAL ANALYSIS |
Author: |
DR. PREETI GULIA, HEMLATA |
Abstract: |
Classification in data mining is the most pervasive problem in the distributed
computing environment. It is really challenging to classify the data residing on
different sites without revealing the private data to each other. However,
decision tree classifier has become a good solution to reduce this problem. This
paper explains how to build a privacy preserving decision tree over a vertically
partitioned data. The decision tree is created on the data which is partitioned
vertically and is owned by different parties along with concealing data of
different parties. The proposed algorithm uses a best and most efficient
splitting strategy for attributes and at the same time a semi-honest third party
is also used. It helps different parties in calculation for construction of
decision tree. Scalar product protocol and secure multi-party protocol are the
keys behind the security and privacy of the method used. The experimental
results show that the accuracy and precision of the proposed algorithm, that is
suitable for distributed environment, is much higher than the algorithm which
works on the centralized data and in which privacy is not needed. |
Keywords: |
Data Mining, Classification, Decision Tree Classifier, Privacy Preserving Data
Mining, Vertically Partitioned Data |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
ANALYSIS AND CLASSIFICATION OF BRAIN SIGNALS USING DWT AND SVM |
Author: |
AHMED MOHAMMED ABED, MUZHIR SHABAN AL-ANI |
Abstract: |
The brain is the main dominant of the human body and any defect that occurs in
the brain impact the body's vital activity. There are many diseases that affect
on the brain tasks. They Infects many people worldwide. The Brain signals
recorded by Electroencephalography (EEG) system are used to diagnose brain
signals and classify them as normal or abnormal. Detecting and classifying of
EEG signals are exhausting and difficult process and require effort by the
neurologist to diagnose them. When the brain injury is severe, treatment of
brain injuries become difficult and require surgical intervention, but in early
detection of the injury it may be treated without surgical intervention. The
purpose of this paper is to detection and analysis of the brain signals and
extract the main bands of the signal by Discrete Wavelet Transform (DWT) and
then to classify them by the Support Vector Machine (SVM) for early detection of
brain abnormalities. The database used in this paper were collected from a group
of patients at Baghdad Teaching Hospital / Medicine City by an EEG system in the
form of images. The signals are extracted from the images by detecting the
signal inside the image and dealing with it as a digital signal. These signals
are immersed by noises to eliminate this noise the Finite Impulse Response (FIR)
filter is used where low frequencies pass and block the high frequencies to
obtain noise-free signals. Set of statistical measurements are measured to use
as input to train the Support Vector Machine and used them in classification of
the signal. The classification ratio obtained in this paper is 96.8 %. |
Keywords: |
Brain Signals, Signal Processing, Signal Analysis, DWT and SVM. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
A NEW FRAMEWORK: POST-POSITIONAL PARSER AND ANALYZER FOR TELUGU PRONOUNS |
Author: |
P.PRASAD RAO, Dr S. PHANI KUMAR |
Abstract: |
Objectives : Postpositional Parser and Analyzer is a program which compiles and
analyses pronouns of Telugu language into their roots and their constituent
postpositions along with their grammatical properties, which is a full length
translation surface of Telugu Pronouns . Grammatical properties at word level
includes finding a tense, number, gender , person and other associated features.
Methods :The method employed in this paper is based on Suffix-Order-Pattern
technique to develop a computational model for morphological analysis of
pronouns in Telugu. Suffix-Order-Pattern is a new technique in linguistic
computation. The current work is a module of a POS Tagger and Word-Level
translation surface for Telugu, a java application developed for analyzing
Telugu pronouns. Test samples were taken from grammar text books for Telugu
language and tested thoroughly with various inflections of pronouns with respect
to tense, person, number and gender. Findings: The evaluation was performed on a
data set taken from Wiktionary (Wiktionary is a multilingual, Web-based project
to create a free content dictionary, available in over 150 languages). The
results were very encouraging as the accuracy of the developed software is
really absolute. The findings cannot be compared with any other results
published because very little work was done previously in this area of research
in Telugu language. Application/Improvements: The procedure used to build this
is theoretically justified and practically executed for variety of inflections
related to Telugu pronouns . The present proposal is a demonstration of XML
based repository for all the root words of different categories of Telugu
Pronouns. It is an optimal organization of linguistic database and its
performance in computational environment is highly motivated. |
Keywords: |
Post-Positions, Root, Oblique, Suffix-Order, Case Markers, Inflections |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
A MODIFIED LBP METHOD TO EXTRACT FEATURES FROM COLOR IMAGES |
Author: |
BILAL ZAHRAN, JAMIL AL-AZZEH, ZIAD ALQADI, MOHD–ASHRAF AL-ZOGHOUL, SALEH
KHAWATREH |
Abstract: |
Local image texture descriptors are widely used in image analysis. The local
binary pattern (LBP) is a texture descriptor that is simple and efficient. LBP
has been utilized in many applications in image processing field such as face
recognition, pattern recognition and feature extraction. In this paper, a
modified LBP method was proposed to extract texture features. The proposed
algorithm was implemented on many digital images and the local structure
features of these images were obtained. Several image recognition experiments
are conducted on these features and compared with other algorithms. The results
of the proposed algorithm showed that the digital image was represented in a
very small size and furthermore the speed and accuracy of image recognition
based on the proposed method was increased significantly. |
Keywords: |
Local Binary Patterns (LBP), Local Features, Cyclic Symmetric Reduced LBP
(CSLBP), Mean Square Error (MSE) And Peak Signal-To-Noise Ratio (PSNR). |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
CREATING SUSTAINABLE CONSTRUCTION: BUILDING INFORMATICS MODELLING AND LEAN
CONSTRUCTION APPROACH |
Author: |
AMUSAN LEKAN, EZEWINWE OLUCHI, OSAWARU FAITH; JOSHUA OPEYEMI, AFOLABI ADEDEJI,
OJELABI RAPAHEL |
Abstract: |
Sustainability concept has been a driving force in construction process because
it has become a priority in the industry. This research explores a means to the
desired good results by introducing the integration of Lean construction and
Building information modeling in the construction industry. It was observed that
most companies implemented the use of BIM tools in their design process but yet
do not realize that a greater level of efficiency can be attained by the
integration of the duo. This research sought to find answers to the areas of
construction that Lean and BIM can be applied. Their workability, barriers to
their implementation and the success factors for their effective implementation.
Random sampling technique was used in sample sizing, 150 samples of
questionnaire was used in data collation and processed with SPSS software. It
was discovered among the number of construction companies surveyed that there is
major focus on various challenges of delay and ineffective works during the
course of their construction process. As a result of the research, a model was
created to aid the easy implementation of lean construction using a BIM tool
without playing blind to the truth that lean construction requires a conscious
change of way of thinking and order of operations within a company. |
Keywords: |
Construction, Sustainability, BIM, Lean, Diffusion, Integration |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
APPLICATION OF SPECTROGRAM AND DISCRETE WAVELET TRANSFORM FOR EMG PATTERN
RECOGNITION |
Author: |
JINGWEI TOO, A.R. ABDULLAH, NORHASHIMAH MOHD SAAD, N MOHD ALI, T.N.S.
TENGKU.ZAWAWI |
Abstract: |
Electromyography (EMG) pattern recognition has recently drawn the attention of
the researchers to its potential as an efficient manner in rehabilitation
studies. In this paper, two time-frequency methods, discrete wavelet transform
(DWT) and spectrogram are employed to obtain the time and frequency information
from the EMG signal. Seventeen hand and wrist movements are recognized from the
EMG signals acquired from ten intact subjects and eleven amputee subjects in
NinaPro database. The root mean square (RMS) feature is extracted from each
reconstructed DWT coefficient. On the other hand, the average energy of
spectrogram at each frequency bin is extracted. The principal component analysis
(PCA) preprocessing is applied to reduce the dimensionality of feature vectors.
Four different classifiers namely Support Vector Machines (SVM), Decision Tree
(DT), Linear Discriminate Analysis (LDA) and Naïve Bayes (NB) are used for
classification. By applying SVM, DWT achieves the highest mean classification
accuracy of 95% (intact subjects) and 71.3% (amputees). To validate our
experimental results, the performance of DWT and spectrogram features are
compared to other conventional methods. The obtained results obviously evince
the superiority of DWT in EMG pattern recognition. |
Keywords: |
Electromyography (EMG), Discrete wavelet transform (DWT), Spectrogram, Pattern
recognition |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
GRAVITATIONAL SEARCH ALGORITHM FOR EFFECTIVE SELECTION OF SENSITIVE ASSOCIATION
RULES |
Author: |
GAYATHIRI P , Dr. B POORNA |
Abstract: |
Association rule mining is the process of identifying the frequent items and
associative rules in a market basket data analysis for large set of
transactional databases. Association rules are employed in different data mining
applications including web mining, intrusion detection and bioinformatics. In
recent years it has been seen tremendous advances in the ability to perform
effective association rule mining. It causes the need of sensitive rule
selection to enhance the privacy preservation of data transactions. A new
technique called Gravitational Search Based Sensitive Rule Selection (GS-SRS) is
proposed to select the sensitive rules is to be hided for improving the privacy
preservation of transactional database. The GS-SRS technique is introduced to
select the sensitive rules from the derived association rule through conditional
probability. The sensitive rules contain the sensitive information of
transactional database. Sensitive rules are identified for many applications.
One of the applications of sensitive rule identification is to preserve the
privacy of an organization or an individual by hiding these rules. The GS-SRS
technique initially generates association rules through identifying the frequent
items by using conditional probability-based association rules and support count
and confidence value. Next, GS-SRS technique used gravitational search algorithm
that lists the cohesive and non-cohesive items for the given transactional
database in shorter time than the conventional means of feature selection using
Rough Set technique. The association rule containing more cohesive items is
selected as sensitive rule. A threshold value is used to select sensitive rules
with the convergence of cohesive items and divergence of the non-cohesive items.
Finally, the sensitive rules selected are hided for preserving the privacy of
transactional database. The experiments have been carried out on transaction
database using four data sets and compared with state of art existing
techniques. The experiment results show that the proposed GS-SRS technique is
able to improve the accuracy of privacy preservation with minimum execution time
when compared to state-of-the-art works. |
Keywords: |
Association Rule Mining, Gravitational Search, Sensitive Rule Selection,
Conditional Probability, Cohesive Items, Non Cohesive Items |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
PERFORMANCE ASSESSMENT OF FUZZY AND NEURO FUZZY BASED ITERATIVE IMAGE FUSION OF
MEDICAL IMAGES |
Author: |
Dr . K. SRINIVASA REDDY , Dr. CH.RAMESH BABU., Dr D. SRINIVASA RAO, G.Gopi |
Abstract: |
Medical image fusion is a significant job to regain an image which delivers as
much as evidence of the same body part at the similar time it also assistances
to decrease the storing capability to a particular image. In this paper an
assessment is completed between conventional image fusion methods; principal
component analysis (PCA), discrete wavelet transform (DWT) and the projected
fuzzy and neuro fuzzy based iterative image fusion techniques. The proposed
method fuses images based on fuzzy inference system (fis) prepared.
Experimentations have been finished on two different sets of multimodal medical
images of brain. The projected technique is perceivably and significant related
with the present approaches. For the assessment of the projected image fusion
technique ten diverse measures is prepared and utilized of, namely Image Quality
Index (IQI), Mutual Information Measure (MIM), Fusion Factor (FF), Fusion
Symmetry(FS), Fusion Index (FI), Root Mean Square Error (RMSE), Peak Signal To
Noise Ratio(PSNR), Entropy(E), Correlation Coefficient (CC) and Spatial
Frequency (SF). Assessment outcomes demonstrated that the projected image fusion
technique mechanisms improved than any of the conventional image fusion
techniques. |
Keywords: |
Medical image fusion; Fusion Index; neuro fuzzy |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
INFORMATION SEARCH AND INTENTIONS TO PURCHASE: THE ROLE OF COUNTRY OF ORIGIN
IMAGE, PRODUCT KNOWLEDGE, AND PRODUCT INVOLVEMENT |
Author: |
YOSSIE ROSSANTY, MUHAMMAD DHARMA TUAH PUTRA NASUTION |
Abstract: |
This research purpose is to examine the effect of the country of origin image,
product knowledge and product involvement in information search and intentions
to purchase. Analysis of data used Structural Equation Modeling which operated
by Lisrel version 8.5. Data obtained by 180 respondents from three cities in
North Sumatera, Indonesia. The result of the research demonstrates that the
country of origin image has a positive and significant effect on information
search and intentions to purchase. Furthermore, Product involvement has a
positive and significant effect on information search and intentions to
purchase. However, product knowledge does not affect information search and
intentions to purchase. The selection of media and technology are accurate to
deliver information the launch of a product, and it will increase consumer's
knowledge. |
Keywords: |
Information Search, Intentions to Purchase, Country of Origin Image, Product
Knowledge, Product Involvement |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
BEE INSPIRED DETECTING AND TRACKING OF CURRENTLY DEVELOPING NEWS STORIES FROM
THE WEB |
Author: |
ŠTEFAN SABO, PAVOL NAVRAT |
Abstract: |
In this paper we present an approach to detection and tracking of currently
unveiling news stories through analysis of news articles obtained from the Web.
Articles are obtained using algorithm inspired by honey bees foraging for food.
Due to the distributed dynamic nature of communication protocol utilized among
bee workers when foraging for food, we are able to detect, evaluate and retrieve
articles related to current news events from the web. During this process key
terms related to news stories are identified and relationships between articles
are established based on these terms. This results in a graph of nodes modelling
the article space. The graph is updated and appended in a flexible way based on
the real time changes in the articles. News stories are subsequently extracted
from the graph using modularity optimizing graph algorithms. |
Keywords: |
Dynamic Story Tracking, Detecting A Developing News Story, Beehive Metaphor,
Nature Inspired Algorithm, Story Word |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
SIMPLIFIED CORAL MODELING IN BATIK PATTERN GENERATION |
Author: |
PURBA DARU KUSUMA |
Abstract: |
Coral is one of ocean organism that is beauty and various. Unfortunately, this
diversity has not been explored to create artistic pattern, especially batik.
Although there are lots of nature based batik patterns, most of these patterns
are developed based on land plant. In the other hand, Indonesia as an
archipelago country has lots of ocean biota and one of them is coral. In this
research, we propose simplified computational coral model. The simplification is
needed because modeling real coral growth or morphology is very complicated and
resource consuming. This model then is implemented to create batik pattern
computationally. This model is developed based on the stochastic approach. In
this research, we propose three coral models based on the genus: Leptoseris,
Gardinesoris, and Acropora. These basic coral models then have been implemented
to generate batik pattern by adding artistic objects. Based on several tests,
changing some controlled variables can generate different shapes or variation.
In some range, the generated image still can be recognized as coral. In other
range, the result image cannot be recognized as coral anymore. By ignoring
complicated the environmental and biological aspects, the proposed model still
can generate coral pattern and then is implemented to generate batik pattern. |
Keywords: |
Batik, Coral, Stochastic, Continue System |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
Title: |
A WEB USAGE ASSOCIATION LEARNING METHODS BASED ON MINING TECHNIQUES FOR WEB
PERSONALIZATION |
Author: |
Y.RAJU , DR D. SURESH BABU , DR.K.ANURADHA |
Abstract: |
The increase in information resources on the World Wide Web allows users to find
the information they need and navigate through multiple sites on the web.
Because the web is huge and complex, users often unable to reach the lookout
page when surfing the web. Web personalization is one of the potential conducts
to solve this problem by leveraging the knowledge gained from the analysis of
users accessing activities in the web usage logs to adapt the content and
structure of the website to our needs. The existing approach focuses more on
building user profiles that rely on web pages or documents that affect the
effectiveness of web personalization. In this paper, we propose a web usage
association (WUA) learning methods based on log usage association learning and
personalized cluster mining technique for effective web personalization. The
proposed method classifies the data using "frequent pattern mining (FPM)" and
"Multi-Stage Association Rules (MAR) for the user's interest in navigation sites
and personalization, and the chronic relationship of web usage using
hierarchical methods and clustering. The Experimental evaluation has shown that
the proposed approach has achieved effective personalization precision
measurements for user interest and can be used in real-time personalization
systems to minimize the storage cost and provide the provisioning for resources
personalization in real time systems. |
Keywords: |
Web Usage, Association Learning, Log usage association learning, personalized
cluster, Personalization. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2018 -- Vol. 96. No. 10 -- 2018 |
Full
Text |
|
|
|