|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
June 2018 | Vol. 96
No.13 |
Title: |
AN OVERVIEW OF TECHNOLOGY EVOLUTION: INVESTIGATING THE FACTORS INFLUENCING
NON-BITCOINS USERS TO ADOPT BITCOINS AS ONLINE PAYMENT TRANSACTION METHOD |
Author: |
IBRAHIM ALMARASHDEH |
Abstract: |
Today, the technological revolution influenced the methods of payment. Most
interesting is that our perception towards money is changing, and we are
beginning to try forms of money which have not been used or seen previously in
history of human such as cryptocurrency or digital currencies. Since the factors
influence the adoption of bitcoins still unknown, this study aims to investigate
the user’s behavioural intention use bitcoins as a payment method. Based on the
literature review, this study used Amos 18 to analyse the collected data from
161 participants. The finding indicate that all research hypotheses were
supported except hypothesis measures the effect of security and control on user
perceived self-efficacy to use Bitcoins. In term of measuring the user’s
intention to adopt bitcoins, the data analysis illustrate that all hypotheses
were significantly supported. Among all constructs, the highest effect on user’s
intention comes from perceived trust and the lowest affect is transaction
processing. This study has contributed to our understanding of current knowledge
of user adoption theory in the context of cryptocurrency. Also, based on the
sample uses on this study, farther data collection to compare the adoption of
current bitcoins users with non-users is need it. |
Keywords: |
Transaction Processing, Behavioural Intention To Use, Perceived Trust,
Self-Efficacy. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
SOFT DECISION DECODING OF LINEAR BLOCK CODES USING MEMETIC ALGORITHMS |
Author: |
HICHAM BOUZKRAOUI, AHMED AZOUAOUI, YOUSSEF HADI, LAHCEN NIHARMINE |
Abstract: |
The general problem of soft-decision decoding a linear code is a NP-complete
problem. This article introduces a soft-decision decoding algorithm, the first
of its kind, based on memetic algorithm. The new approach is applicable to the
more general case of linear codes; binary or nonbinary codes and cyclic and
noncyclic codes where the only known structure is given by the generator matrix.
The proposed algorithm used in each generation, two individuals selected
randomly; the uniform crossing that exploits information specific to the
communication system; a mutation that simply involves altering one or more genes
in an individual and a local search (LS) that makes a descent by glorifying the
created individual. The proposed decoder is simulated in an AWGN channel and
enhanced through a parameter tuning process. In other side the simulation
results generally show that our decoder is more efficient in terms of bit error
rate compared to competitors' decoding algorithms. The analytical complexity of
the proposed decoder is also presented and compared to other decoders. |
Keywords: |
Error Correcting Codes, Soft Decision Decoding, Linear Codes, Memetic
Algorithms, Metaheuristics |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
MONITORING MEAN SHIFT OF SKEWED DISTRIBUTION USING MODIFIED ONE-STEP M-ESTIMATOR
WITH EWMA CONTROL STRUCTURE |
Author: |
AYU ABDUL RAHMAN, SHARIPAH SOAAD SYED YAHAYA, ABDU MOHAMMED ALI ATTA |
Abstract: |
A generalized form of Shewhart chart, known as Exponentially Weighted Moving
Average (EWMA) control chart is frequently exercised to monitor small shift in
the process mean. Aptly tune, it is claimed to be robust to slight deviation in
normality. For that to be successful, the weighting constant (λ) shall be set
quite small. However, too small of the value may reduce the effectiveness of the
chart in shift detection, a phenomenon known as the inertia effect. Thus,
meticulous approach ought to be exerted to tune the traditional EWMA chart under
non-normality. Recurrent use of robust control charts is now seen in quality
control literature as one of the few solutions to cope with non-normality. In
line with this, a novel EWMA control chart was proposed in this paper. The
proposed chart was constructed using a highly robust breakdown point location
estimator, known as modified one-step M-estimator (MOM). Monte Carlo simulation
approach was used to model and evaluate performance of the proposed chart when
process data was subjected to non-normality using skewed distributions. Two
separate cases were considered: (i) when both mean and standard deviation of the
process were known and (ii) when the mean was unknown and estimated from an
in-control Phase I sample. While demonstrating a mediocre power to detect shift
in the first case, an outcome on simultaneous effect of parameter estimation and
non-normality for the proposed chart indicated a reversal. Besides equipped to
regulate false alarm rate following an increase in the level of skewness of the
distribution, the proposed chart also possessed the best-shift detecting ability
in extreme non-normal cases as observed in this paper. This was demonstrated
using average run length (ARL) when the underlying distribution of Phase I and
Phase II data were matched. |
Keywords: |
Average Run Length (ARL), EWMA Control Chart, Skewed Distribution, MOM, Robust
Process Location. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
HANDWRITTEN ELECTRONIC COMPONENTS RECOGNITION: AN APPROACH BASED ON HOG + SVM |
Author: |
LAKSHMAN NAIKA R, R DINESH, SANTOSHNAIK |
Abstract: |
Recognition of hand drawn electronics components has application in academic and
research in electronics engineering. In this paper, we propose an approach to
recognize hand drawn electronic components using histogram of oriented gradient
(HOG) features and subsequently Support Vector Machine (SVM) classifier is used
to classify the components. The objective is to recognize the hand drawn
electronics components. In order to achieve best recognition, we consider hand
drawn scanned images and converted them to bi-level image then applied
morphological operation to remove discontinuity. Further, the proposed method
extracts features of intensity gradient and direction. We trained ten components
with large data set each with 200 samples and tested with tenfold cross
validation. To establish the efficacy of the proposed method, we have conducted
experiment on large dataset of about 2000 images. From experiments it is
revealed that the proposed method has yielded 96.9% recognition rate. |
Keywords: |
Classifier, Circuits, Hand Written Components, HOG Descriptor |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
RESOURCE-AWARENESS: A STRATEGY FOR RESOURCE OPTIMIZATION AND RELEVANT SERVICE
DISCOVERY IN AD-HOC MOBILE CLOUD |
Author: |
DOMINIC AFURO EGBE, BETHEL MUTANGA MURIMO |
Abstract: |
The challenges of limitation in devices’ resources and dynamic context is an
inherent characteristic of mobile environments. These challenges have strong
implication on service discovery efficiency. While service discovery operations
may create resource-burden on mobile devices, service-relevance is impacted by
changes in device context. Generally, discovery mechanisms aim to discover
services relevant to consumers’ requirements hence service-relevance is based on
service functionalities. However, due to changing context in mobile
environments, service functionalities alone are insufficient to address
service-relevance with regards to resource capability. Consequently, discovered
services may fail to match the resource capabilities of client devices, leading
to resources wastage. Addressing this challenge requires proactive discovery
mechanisms that can adapt to context change based on devices’ resource
capabilities and service functionalities. In this paper we designed and
prototyped an adaptive service discovery mechanism. The mechanism monitors
client devices to collect context data used to adapt to changing
resource-context before discovering services. This approach recorded high
precision and recall rates and reduced processing time, while relative quality
of service discovery was significantly enhanced - meaning resource usage in
optimized. |
Keywords: |
Resource-Awareness, Adaptive, Resource-Efficient, Service Discovery, Relevant
Services. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
PERFORMANCE IMPROVEMENT AND ANALYSIS OF SPEAKER INDEPENDENT EMOTION RECOGNITION
SYSTEM USING I-VECTORS |
Author: |
NAGA PADMAJA JAGINI, RAJESWAR RAO. R |
Abstract: |
Emotion recognition from speech is experiencing different research applications.
It is becoming one of the tool for analysis of health condition of the speaker.
In this work, the emotions such as anger, fear, happy, neutral are considered
for speech emotion algorithm design. A database built by IITKGP is used for
emotion recognition. For any recognition, feature extraction and pattern
classification are the important tasks. In this work the features considered are
Mel Frequency Cepstral Coefficients (MFCC), Pitch chroma, prosodic features are
used and i-vectors are used to identify the emotions. in this research work, the
database considered for emotion recognition is taken in different combinations
such as male training- female testing, male training-male testing, female
training- female testing, female training-male testing. In almost all the cases,
i-vector method has shown an improvement in recognition accuracy than the method
employed principle component analysis. |
Keywords: |
Emotion Specific, I-Vector, Gaussian Mixture Models, Prosody Features, Spectral
Features, PCA |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
TARGET SEARCHING IN UNKNOWN ENVIRONMENT OF MULTI-ROBOT SYSTEM USING A HYBRID
PARTICLE SWARM OPTIMIZATION |
Author: |
BAHAREH NAKISA, MOHAMMAD NAIM RASTGOO, MOHD ZAKREE AHMAD NAZRI, MD. JAN NORDIN |
Abstract: |
Target searching in unknown environment using multi-robot search systems has
received increasing attention in recent years. Particle Swarm Optimization (PSO)
has applied successfully on multi-robot target searching system. However, this
algorithm suffer from premature convergence problem and cannot escape from the
local optima. It is, therefore, important to have an efficient method to escape
from the local optima and create and efficient balance between exploitation and
exploration. In this study, we propose a new method based on PSO algorithm
(ATREL-PSO) to find the target in unknown environment using multi-robot system
within a limited time. This novel algorithm is demonstrated to escape from the
local optima and create an efficient balance between exploration and
exploitation to reach the target faster. The concept of attraction, repulsion
and the combination of repulsion and attraction enhancing the search
exploration, and when the robot get closer to the target it should forget the
PSO concept and apply the local search method to reach the target faster.
Experimental results obtained in a simulated environment show that biological
and sociological inspiration could be useful to meet the challenges of robotic
applications that can be described as optimization problems. |
Keywords: |
Swarm Robots, Particle Swarm Optimization, Premature Convergence, Target
Searching |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
KEY LOGISTIC TO IMAGE CRYPTOGRAPHY VIA GENERAL SINGULAR VALUES
DECOMPOSITION |
Author: |
MAHER JALAL BURJUS AL-BASHKANI , PROF. DR. ADIL AL- RAMMAHI |
Abstract: |
Cryptography is one of the most important topics of this era after the
introduction of technology into most aspects of life. It was necessary to
protect the property of private documents and important files, which we use in
its understandable form such as texts, pictures, sounds, folders and other
information . The purpose of image cryptography is to maintain the security
and confidentiality of information against the process of breaking the image
code , as it is a coding application where it encrypts the images want we to
keep from tampering with the intruders. This paper deals with the method of
general singular value decomposition algorithm with logistic function . To
strengthen our algorithm, a key was used during a general singular value
decomposition algorithm. First , We generated a key and then used it to encode
the selected image via general singular value decomposition algorithm. For
testing the powerful of proposed algorithms, many recent related algorithms were
studied and compared. All programs had been executed by the MATLAB. The results
were very encouraged. |
Keywords: |
Image Cryptography Via General Singular Values Decomposition With Logistic
Function |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
A NOVEL ZERO-ERROR METHOD TO CREATE A SECRET TAG FOR AN IMAGE |
Author: |
JAMIL AL-AZZEH, BILAL ZAHRAN, ZIAD ALQADI, BELAL AYYOUB, MAZEN ABU-ZAHER |
Abstract: |
Nowadays, privacy is a demand for every one specially when sending personal
information over the internet using social media sites and applications. One way
to ensure this privacy is by hiding our personal or secret information inside an
image (cover image). Only how knows the hiding process can extract the
information from the cover image. To ensure that the cover image must preserve
its quality as possible so that no one doubt about it. The process of hiding a
text in gray and color image (creating a tag) is used in many important
applications. Generally, most methods have been proposed to solve the issue
depend on least significant bit (LSB) criteria. LSB methods have a set of
negatives and defects in addition to lack of safety of these methods, error
ratio between the original image and the text-bearing image ranges from small to
large; If the error rate is high, this will lead to distortion in the image
which can be observed by the naked eye of the human. Accordingly, to reduce
error rate the text message size must be small; the size of the hidden text in
the image depends on the size of the image. In this paper, we introduced a novel
approach to hide any text independently on the size of cover-image and make the
size of the text unrestricted “as it can be larger than the cover-image size”.
Our approach provided a high degree of safety with zero error ratio regardless
of the size of the text. |
Keywords: |
LSB, short message, covering image, PSNR, MSE. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
A NOVEL METHOD BASED ON PRIORITY FOR ENHANCEMENT ROUND-ROBIN SCHEDULING
ALGORITHM |
Author: |
AHMED SUBHI ABDALKAFOR, HADEEL MOHAMMED TAHER, KHALID W. AL-ANI |
Abstract: |
Scheduling of central processing unit is one of the greatest essential
operations implemented over operating system (OS). There are many different
algorithm used for scheduling but the main one called round-robin(RR) algorithm
that achieved by optimum in period shared environment. The feature of RR
algorithm is decrease the starvation besides integrates the improvement of
priority. In this paper we propose a new optimization for the round- robin
algorithm to improvement the CPU scheduling through all task allocated in CPU
takes a new priorities depended on lowest value of burst time take highest
priority when quantum time have the same value, then rescheduling to give a new
priority after compute the burst time of tasks that will be reduce the average
waiting time(A.W.T) and turnaround time (T.A.T) compare with standard round-
robin algorithm and other related works. |
Keywords: |
CPU Scheduling, Round Robin, Priority, Waiting Time, Turnaround Time. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
EXPERIMENTAL STUDY OF NEURAL NETWORK-BASED WORD ALIGNMENT SELECTION MODEL
TRAINED WITH FOURIER DESCRIPTORS |
Author: |
AMANDYK KARTBAYEV, UALSHER TUKEYEV, SVETLANA SHERYEMETIEVA, ALIYA KALIZHANOVA,
BEKTURGAN KALYBEK UULY |
Abstract: |
This paper presents an approach to word alignment selection by Fourier
descriptors that were used together with a neural network for image recognition.
Word alignment selection is an important problem of statistical machine
translation. The recognition of correct word alignment images is a special case
of shape recognition. There are various ways of studying image contours
experimentally, and we choose the Fourier method of descriptors, which is proved
to be effective and easy to implement. The key implementation options and
advantages of the method have been considered. From the given information of the
contour and the method of its comparison with the references, an algorithm of
word alignment selection has been developed. We also set some threshold
conditions for more accurate learning of contours and common patterns. |
Keywords: |
Word Alignment, Machine Translation, Image Recognition, Fourier
Descriptors, Neural Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
ALGORITHM COMPARISON OF NAIVE BAYES CLASSIFIER AND PROBABILISTIC NEURAL NETWORK
FOR WATER AREA CLASSIFICATION OF FISHING VESSEL IN INDONESIA |
Author: |
MUSTAKIM, ASSAD HIDAYAT, ZULIAR EFENDI, ASZANI, RICE NOVITA, EPLIA TRIWIRA
LESTARI |
Abstract: |
Indonesias maritime area is twice the size of its archipelago, with an area of
5.9 million km2. Based on the United Nations Convention on the Law of Sea
(UNCLOS 1982). Indonesia is also the second largest fish producing country in
the world with fish catch of 6 million tons in 2014 based on the latest data
from the Food and Agriculture Organization (FAO). The fish catching process
requires the role of vessels suited to the existing water conditions, one of
which has robust resilience to the state of the Indonesia sea. Thus, it is
necessary to study the classification of aquatic types on Indonesian fishing
vessels to determine the impact that will occur on the vessel. This research
performs classification process using Naïve Bayes Classifier and Probabilistic
Neural Network (PNN) algorithm. Accuracy result got in Naïve Bayes Classifier
algorithm using RapidMiner tool is equal to 48%. While for PNN algorithm,
experiment with three different spread values yield an accuracy of 68% for
spread value 0.1, 78% accuracy for spread value 0.01 and the last experiment is
the value of spread of 0.001 produce 100% accuracy. Therefore, in this study it
is known the classification using PNN algorithm is better than Naïve Bayes
Classifier. |
Keywords: |
Accuracy, Perairan, Fishing Vessel, Classification, Naïve Bayes
Classifier, Probabilistic Neural Network. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS |
Author: |
HENDRA RAHMAWAN, KUSPRIYANTO, YUDI SATRIA GONDOKARYONO |
Abstract: |
Today, heterogeneous computer systems (HCS) commonly rely on CPU and GPU, for
processing elements, and OpenCL, for the programming framework. In an HCS, a
workload should execute on its best processor to achieve its best speedup.
OpenCL currently entirely lefts the selection for the best-fit processor, termed
as workload mapping, to programmers. However, the NP-completeness of the
workload mapping task indicates it is not a trivial task to do manually by
programmers so that effective computational approaches are necessary. This
research proposes a static mapping method for OpenCL workloads that
automatically select the best-fit processor for the workloads. The method
accepts static features of a workload and utilizes K-Nearest Neighbor algorithm
to classify the workload to either CPU or GPU. The static features are collected
using LLVM/Clang compiler framework. To increase the accuracy of classification
while keep maintaining the physical meaning of features, the features are
reduced using feature selection approaches. Two feature selection models, filter
model and wrapper model, are used in this research. This approach was evaluated
using k-fold cross-validation against 18 OpenCL kernels obtained from standard
benchmark packages. According to the evaluation results, the workload mapping
accuracy was in the range of 93% to 97% indicating the method is well applicable
in the HC environment with two processors. Floating-point operations and
vector-integer operations, or floating-point operations and vector-global memory
access are the combinations of features that a have significant contribution to
the classification of workloads. The main contribution of the method in this
research, compared to previous related research, lies in its capability to state
features that are significant in the classification process. |
Keywords: |
Heterogeneous Computing, Workload Mapping, OpenCL, K-Nearest Neighbor, GPU |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
OPENFLOW SWITCH SOFTWARE-BASED PERFORMANCE TEST ON ITS IMPLEMENTATION ON CAMPUS
NETWORK |
Author: |
RIKIE KARTADIE, FAHRUR ROZI, EMA UTAMI |
Abstract: |
OpenFlow experiments are conducted by researchers often used hardware/OpenFlow
Switch issued by vendors. Actually, the performance of OpenFlow switch
software-based (starting while switching software-based) was only tested on a
laboratory scale. The problem to be raised in this research can be stated some
problems as follows. How is OpenFlow software-based OpenWRT software performance
when implemented into the Software-Defined Network (SDN) infrastructure on
campus and is there a significant difference between mininet switch and
prototype. In this study showed that the performance of which was owned by the
OpenFlow switch-base software and can be implemented on campus. Testing OpenWRT
OpenFlow software-based switching performance on campus implementation provides
the resulting prototype latency value fluctuated quite diverse compared mininet
with gap is 2.3361 msec, the average value of TCP and the absolute data gap and
prototypes is 10.2114 KByte/second, and the average UDP value and the value of
the data gap absolute mininet and prototypes is 151.419 KByte / second. Mininet
switches compared to prototype switches do not give significant difference, so
it can be said prototype successfully produced and can be implemented on campus
network. |
Keywords: |
Implementation, OpenFlow, OpenFlow Switch, Performance, Software-Defined Network |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
GRAPHIC DIGITAL TECHNIQUES IN THE FINE ARTS DESIGN AND PROCESSING |
Author: |
KHALID FAKHIR ABDULLAH DARRAJI |
Abstract: |
Computerized graphics processing techniques cannot just resolve the difficulty
of customary painting simulation in the art, but have more gains in the teaching
of art features and task to the art stylishness and morphology of the massive
modifications and save monetary, manpower and substantial resources and time.
Image processing tools may attract new expertise of contemporary art in the most
significant manner. Consequently, computerized techniques are customary art
conception of computerized design tool for the expansion tendency of fine art
images. This paper at first surveys the used techniques regarding graphic fine
art image processing including design, manipulation and artist photo detection .
Then, a practical face recognition based on eigenface, LABP and database for
artist photo has been suggested to record all well-known artist information in
museums and art centers. The suggested face detection has been compared with
other testified researches in the literature. |
Keywords: |
Computerized graphic Processing, Fine Arts, Artist face recognition |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
MAPPING SPORTS TOURISM IN BULELENG-BALI USING GOAL-ORIENTED EVALUATION MODEL
BASED ON SAW |
Author: |
I KETUT SUDIANA, WARDANI RAHAYU, NYOMAN SANTIYADNYA, NI NYOMAN PARMITHI, I WAYAN
EKA MAHENDRA, DEWA GEDE HENDRA DIVAYANA |
Abstract: |
The main purpose of this study was finding the calculation process to determine
the mapping of tourism object in Buleleng Regency which is potential to be
sports tourism by using goal-oriented evaluation model based on SAW method. This
study used two approaches namely qualitative approach to determine tourism
objects in Buleleng Regency which are potential to be sports tourism, and
evaluative approach to determine high potential tourism object to be sports
tourism and mapping the tourism objects based on the highest and lowest
potential places to be sports tourism. Subjects of this study were people who
had micro business in sports tourism in three districts of Buleleng Regency. The
technique of collecting data in the study used observation, documentation,
interview, and questionnaires. The data analysis techniques of this study were
qualitative descriptive to analyze data of identification result about tourism
objects in Buleleng Regency which are potential to be sports tourism, and
quantitative descriptive to analyze data of calculation result of SAW method for
mapping and to determine the most dominant tourism object to be sports tourism.
The finding of this study produced a map of tourism object in Buleleng Regency
started from the highest to the lowest potential place, of which finally Lovina
was considered as the most dominant or the highest potential tourism object to
be sports tourism in Buleleng Regency. |
Keywords: |
Mapping, Sports Tourism, Goal-Oriented Evaluation Model, SAW |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
A PREFERENCE-BASED GRADE RECOMMENDER TOWARDS THE ATTAINMENT OF A TARGET GRADE
POINT AVERAGE (GPA) |
Author: |
AZUBUIKE EZENWOKE, OFURE AIGBEFO, ADELLET SARKIS, JONATHAN ODUKOYA |
Abstract: |
A number of GPA calculators exist to automate the calculations of GPA, and it is
used by college students to anticipate the amount of study required to
accomplish a desired academic target. However, many of these apps do not
sufficiently satisfy the user experience realities of the academic aspect of
college life because they require excessive user inputs; grades combination that
approximates their target GPA is known through a painstaking series of trials;
they do not consider user’s subject preference in recommending grades. A model
of a grade recommender towards the attainment of a target GPA based on a
self-efficacy reports and mathematical optimization is proposed. A prototype was
developed as a proof of concept and its viability was demonstrated using three
illustrative scenarios. The algorithm assigns lower grades to courses with low
subject preference, and upper grades are allotted to courses with higher
self-efficacy evaluation towards the attainment of a target GPA. An integration
of the full implementation of the proposed model into a student information
system will serve as a very useful resource to help college student achieve
their academic goals. |
Keywords: |
GPA, Academic Achievement, Recommender Systems, Optimization-based
Recommendation, Self-efficacy |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
TESTCASE PRIORITIZATION WITH SPECIAL EMPHASIS ON AUTOMATION TESTING USING HYBRID
FRAMEWORK |
Author: |
KONERU SRINIVAS, DR. MOHAMMED ISMAIL.B |
Abstract: |
Testing of the software application is done simultaneously during the software
development process, so that defects or errors could be detected at an early
stage and any changes made, do not have an adverse effect on the system. Test
suite with a different set of test cases is added as a result it keeps growing
to a large size. Keeping in mind the resource and time constraints, it is
important, implementing test case prioritization, so that core test cases or
scripts are executed which are mostly required by the user along with the
functionalities or modules that are prone to more bugs. Prioritization
techniques will help scheduling test cases for execution, so that faults could
be detected at an early stage. |
Keywords: |
Prioritization Techniques, Automated Tests for Prioritization, Order of
Prioritization, Calculating Test Priorities, Categorization of Test Cases,
Hybrid framework |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
A NOVEL HYBRID APPROACH FOR FEATURE EXTRACTION IN MALAYALAM HANDWRITTEN
CHARACTER RECOGNITION |
Author: |
AJAY JAMES, SUJALA K, CHANDRAN SARAVANAN |
Abstract: |
Optical Character Recognition (OCR) is defined as the process of segregating
textual scripts from a scanned document. To develop a digitally empowered
society, information is made available in digital form. The OCR software assists
in digitization of documents in different languages. Many researches are working
on digitization of documents particularly to develop effective and error free
character recognition models. To develop a digitally empowered society,
information should be made digitally available. There arises the need for an OCR
software in different languages. Malayalam handwritten character recognition
precision is still inhibited around 90% due to the confrontations in Malayalam
character set. The omnipresence of two different scripts old and new script,
huge character set, ubiquity of similar shaped characters makes Malayalam
handwritten character recognition more difficult. Feature extraction for each
language may vary depending on various characteristics of the language. By
observing the shape patterns in each language, different novel methods are
developed to extract features and also to recognize the same. In this research,
a novel hybrid approach is proposed which uses a combination of statistical and
structural features (SSF). The statistical features are those derived from the
statistical dissipating of pixels. Structural features are based on the
topological and geometrical properties of the character. This study gives
insight to the fact that combination of statistical and structural features
gives more accuracy in Malayalam character recognition. |
Keywords: |
Optical Character Recognition, Binarization, Feature Extraction, Classification,
Machine Recognition, Decision Tree. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
FUZZY MECHANISM FOR GAUSSIAN NOISE REDUCTION FOR SATELLITE IMAGE ENHANCEMENT |
Author: |
Mrs.S.MAHESHWARI, Dr.P.KRISHNAPRIYA |
Abstract: |
Noise removal or noise reduction is one of the thrust research dimensions in the
field of image processing, computer vision and pattern recognition. This paper
envisages fuzzy mechanism towards gaussian noise reduction for satellite image
processing. The membership functions generated using image histogram is
considered. Then noise removal is carried out by fuzzy technique followed up
with pixel classification, restoration and filtering. Images are taken from
multispectral datasets from Quickbird, Geoeye, SPOT and IKONOS satellite.
Performance metrics such as ERGAS, QAVE, RASE, SAM, FCC, PSNR, MSSIM and RMSE
are taken and the results shows that the proposed mechanism outperforms than
that of the existing methods. |
Keywords: |
Satellite Image, Noise Removal, Pixel Classification, Restoration, Filtering,
Image Dataset. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
FUNDING MODEL FOR PORT INFORMATION SYSTEM CYBER SECURITY FACILITIES WITH
INCOMPLETE HACKER INFORMATION AVAILABLE |
Author: |
LAKHNO V., MALYUKOV V. PARKHUTS L., BURIACHOK V., SATZHANOV B., TABYLOV A. |
Abstract: |
Article describes the model developed for the module of port information system
cyber security facilities funding decision making support system. The model is
based on multistage game theory toolkit. The solution offered allows an
opportunity for managers of information safety systems, particularly port
information systems and technologies, to carry out preliminary assessment of
financial strategies for development of effective cyber safety systems. The
distinctive feature of the model is the assumption that the defending party does
not have full information on the financing strategies of the attacking party and
on the state of its financial resources used to break cyber security barriers of
the port information system. The solution employs mathematical apparatus of
bilinear turn-based multistage quality game with several terminal surfaces. A
multiple-option simulation experiment was carried out to ensure validity of the
model. The results of the experiment will also be described herein. Thus, in the
article at the first time, decision of the game was shown for all cases of the
correlation of game parameters for the protection side of the port information
system (PIS) and hackers seeking to overcome the boundaries of cybersecurity.
The solution found in the article will be useful for the created decision
support system, in particular, for the situation when the attacker uses a mixed
financial strategy of hacking the information system. |
Keywords: |
Cyber Security, Port Information System, Game Theory, Decision Making Support
System, Financial Strategy Selection. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
THE OPTIMIZATION OF COMPUTE RESOURCES SCHEDULING IN CLOUD COMPUTING ENVIRONMENTS
USING ARTIFICIAL NEURAL NETWORKS |
Author: |
GIBET TANI HICHAM, EL AMRANI CHAKER, ELAACHAK LOTFI |
Abstract: |
Compute resources scheduling is an essential aspect of any computing paradigm
and it becomes a decisive feature for cloud computing model given the new
service delivery model proposed by this innovative computing technology. To the
extent of our knowledge, one of the most used scheduling algorithms, up to this
moment, is Round Robin scheduling considering its time-shared design, which
assigns a time slice (time quantum) to each task or job scheduled for execution
on the Core Processing Unit (CPU). Mostly, all computer platforms using Round
Robin scheduling, comprised the ones used on Cloud Computing environments,
adopts a fixed value for time quantum that usually causes processor thrashing.
In this paper, a new compute resources scheduling algorithm is proposed, in
which it uses the Round Robin time-shared design with a dynamic time quantum
extracted from scheduled tasks characteristics. Moreover, Artificial Neural
Networks capabilities of prediction and classification are used in order to
automatically select the finest time quantum calculation method that would
optimize the average waiting and turnaround time of the compute resources
scheduler intended for cloud computing environments. Additionally, a comparison
of the proposed algorithm with the First Come First Served and the simple Round
Robin algorithms is discussed in order to highlight the significance of our
proposed method. |
Keywords: |
Cloud Computing, Task Scheduling, Neural Networks, Multilayer Perceptron, Round
Robin |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
TEST CASE SELECTION FOR PENETRATION TESTING IN MOBILE CLOUD COMPUTING
APPLICATIONS: A PROPOSED TECHNIQUE |
Author: |
AHMAD SALAH AL-AHMAD, HASAN KAHTAN |
Abstract: |
The extensive use of mobile applications in terms of user’s number and size of
diverse data has introduced additional security threats which make uncovering
these vulnerabilities complex for testers. Testers use certain types of software
security testing to detect software vulnerabilities, particularly penetration
testing. Test case selection is an essential phase of penetration testing,
especially when testing complex and large applications. Multiple techniques have
been proposed for selecting test cases to be used in penetration testing. In
general, the majority of such techniques select a set of test cases that cover
the designated paths and fit well with the user requirements. This study reviews
existing techniques and models that are used for test case selection. Methods,
strengths and weaknesses are the main factors that are presented in this study.
This study shows that offloading, that is, the technology used in mobile cloud
computing applications, has been disregarded by existing techniques and models
for test case selection. Therefore, this study proposes an enhanced test case
selection technique for penetration testing. This proposed technique considers
offloading parameters when selecting test cases to improve coverage paths and
reflect user preferences in terms of cloud and mobile priority percentages.
Moreover, test cases for both mobile and cloud in the mobile cloud computing
applications are considered to be selected in list of test cases to be executed.
Besides, user preferences feature is provided in the selection process to
reflect the importance of each parties, cloud and mobile sides of the
application under test. The proposed technique will improve the security of
mobile cloud computing applications by exposing the possible vulnerabilities
from both mobile and cloud sides application. |
Keywords: |
Penetration Testing, Test Case Selection, Offloading, Path Coverage |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
THE IMPACT OF FACILITY, SOCIAL MEDIA AND LEARNING MATERIAL ON STUDENT ENGAGEMENT
MASTER IN TECHNOLOGY ONLINE STUDENT IN INDONESIA |
Author: |
LINDA W, SFENRIANTO |
Abstract: |
The importance of knowing the factors that affect Student Engagement is required
in Online Learning in Indonesia because if the Online Master Student has a good
Student Engagement in the place where they study it will create a successful
study in line with expectations, have a good student engagement is mean student
can enjoy study in they place. Factors that can improve the Student Engagement
of Online Master Learning students can come from the facilities provided in the
Learning Management System, the material provided and also comes from Social
Media that can not be separated from the people of today. Some problems are
found in a student who does not achieve a GPA that has been established Online
Learning providers and the level of student satisfaction with LMS is lacking. So
this study aims to determine the influence of factors related to Student
Engagement Online Learning students that can be improved by Online Learning in
Indonesia, so as to improve the condition of the problems that occur. |
Keywords: |
Online Learning, Student Engagement, Learning Management System, Social Media |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
INTEGRATING FACE RECOGNITION ALGORITHMS WITH TYPING SPEED FOR WEBSITE
AUTHENTICATION |
Author: |
MOHAMAD AMIR DLIWATI, DR. MUHAMMAD MAZEN ALMUSTAFA |
Abstract: |
Website authentication has started and developed in 1995. When people started to
use the internet for shopping, sending emails, managing account, etc... Internet
plays a basic role in every in life's domain people use it in different ways.
Meanwhile the usage of the internet was monopolized for the educated people and
the industrialists whom used it to send emails or to do researches that support
their own queries. Developing the applications and the projects that depend on
the internet went simultaneously with the development of hacking tools and the
different ways of stealing accounts, credit cards' number and users'
confidential information, unfortunately, these thefts led to many problems and
risks. The statistical analysis shows more than 3.5 million victim of hacking
each year in the United states, alone. Website authentication is an important
thing to protect the important information for internet users who use a web
server to reach/access the information and the sources; it also offers a secure
background, which could be trusted while dealing with these sites.
Authentication is the first step of protecting data. The objective of this
project is to develop a security system which integrates some face detection
algorithms that rely on many common classification algorithms combined with
fleet password typing to confirm users' legality (authentication) access to
websites and related services for the purpose of increasing the security levels
of special websites, moneychanger machines and other services which are offered
and protected by websites. Recognizing security penetrators by feature
extraction took the first place because of the numerical gabs. The
password-typing fleetness would has an extensive effect on authenticating
amelioration and reduce the unfavorable negatives. By applying this integration,
I am seeking to reach future results that provide more assurances about the user
if he/she is a penetrator or not in order to generalize his/her photo on the
specialized security centers. |
Keywords: |
Face detection, Feature extraction, Classification Algorithms, Website
Authentication. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
TOWARD UNDERSTANDING INDIVIDUALS’ ACCEPTANCE OF INTERNET OF THINGS –BASED
SERVICES: DEVELOPING AN INSTRUMENT TO MEASURE THE ACCEPTANCE OF SMART METERS |
Author: |
GAMAL ABDULNASER ALKAWSI, NORASHIKIN BTE. ALI, ABDULLAH ALGHUSHAMI |
Abstract: |
The benefits of new technology can only be realized when and if the new
technology is widely accepted and used. Understanding the factors that may
determine of an individual’s willingness to use new technology is important to
improve the success rate of the implementation. The use of a smart meter as an
internet-of-things based device is the focus of this study. The smart meter is a
power energy saving device that aims to enable consumers to have more control of
their energy usage and save money. Apparently, there is still a lack of
acceptance of smart meter services among consumers. This study proposed a
conceptual model using the unified theory of acceptance and use of technology
(UTAUT2) as its underlying theories. A survey instrument was developed by using
existing scales from prior instruments and by creating additional items, which
might appear to fit the construct definition. The pilot study was conducted by
distributing the survey to 32 users of a smart meter in order to evaluate the
reliability and validity of the instruments prior to performance of a full scale
survey. The results showed that the reliabilities of all scales in the survey
instrument were above the target acceptance level. |
Keywords: |
IOT, Smart Meters, Technology Acceptance, UTAUT2, Smart Billing |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
HYBRID OF AHP AND TOPSIS FOR LOAN APPROVAL DECISION |
Author: |
MERI AZMI, YANCE SONATHA, DWINY MEIDELFI, RAHMAT HIDAYAT |
Abstract: |
Cooperative in Indonesia, has shown positive effect on the community economic
growth in general. It is due to its role in providing loan to community,
particularly to lower-middle-economic community. However, all through these
years, the verification process in approving the loan proposal from its members
has been done manually through interview process conducted by the cooperative
committee. Then, continued to evaluation in order to decide the eligible members
for receiving the loan. As a result, invalid, less qualified, and subjective
decisions are often occured. Therefore, changes are required to be made using
the decision support system. In this research, a decision support system has
been made by using the combination of two methods; AHP and TOPSIS methods. AHP
method is taken in order to obtain the priority value (weight) of criteria and
sub-criteria used, whereas TOPSIS method is concerned with the character of
criteria used in this system. This system applies five critera where each
criteria is consisted of sub-criteria. Further, the data is derived from five
cooperative members’ data. The result of this system shows that one member is
absolutely adequate in receiving the loan, two members are adequate, and another
two members are in adequate. This support system merely assists the cooperative
committee in making their decision for those members who are eligible getting
the loan, where the final decision is absolutely on the decision maker. |
Keywords: |
AHP, Decision Support System, Hybrid Method, Loan Approval, TOPSIS |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
AN ANALYSIS OF SYSTEM CALLS USING J48 AND JRIP FOR MALWARE DETECTION |
Author: |
FAIZAL M. A, WARUSIA YASSIN, NUR HIDAYAH M. S, SR SELAMAT, RAIHANA SYAHIRAH
ABDULLAH |
Abstract: |
The evolution of malware possesses serious threat ever since the concept of
malware took root in the technology industry. The malicious software which is
specifically designed to disrupt, damage, or gain authorized access to a
computer system has made a lot of researchers try to develop a new and better
technique to detect malware but it is still inaccurate in distinguishing the
malware activities and ineffective. To solve the problem, this paper proposed
the integrated machine learning methods consist of J48 and JRip in detecting the
malware accurately. The integrated classifier algorithm applied to examine,
classify and generate rules of the pattern and program behaviour of system call
information. The outcome then revealed the integrated classifier of J48 and JRip
outperforming the other classifier with 100% detection of attack rate. |
Keywords: |
Malware Detection, System Call, Machine Learning, Classifier, J48 and JRip |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
DETECTION OF ALTERED STATES OF CONSCIOUSNESS ON FACEBOOK USERS |
Author: |
ELEANA JEREZ VILLOTA, SANG GUUN YOO |
Abstract: |
Technologic advance in the last decades has permitted the development of many
applications that avoid the interaction of people with social networks and other
smart phones features while they have an altered state of consciousness caused
by alcohol consumption. However, none application identifies altered state of
consciousness in real time on Facebook users when they share content. Given the
lack of research on posting controversial content on Facebook while users have
an altered state of consciousness caused by alcohol consumption, this work
proposes a solution to prevent users from posting of controversial content on
Facebook. Additionally, this work makes an evaluation of the proposed solution
through an experiment focused on detecting altered states of consciousness on
Facebook users. |
Keywords: |
Altered States of Consciousness, Facebook, Social Network, Consciousness |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
Title: |
A STUDY OF SEQUENTIAL PATTERN MINING ALGORITHMS FOR USE IN DETECTION OF USER
ACTIVITY PATTERNS |
Author: |
MAXIM DUNAEV , KONSTANTIN ZAYTSEV1, MIKHAIL TITOV |
Abstract: |
In the last decade, the significant growth of the volume of analysis data has
set the high level of importance of data mining field. This field contains a
vast amount of different methods and techniques for knowledge extraction. One of
the highly-demanded areas of this field is sequential pattern mining (SPM),
which includes many methods for detection of frequent sequential patterns in
different types of input ordered data sets. The goal of this work is to compare
the efficiency of several types of SPM algorithms, and to identify the most
applicable algorithm to deal with data from physical experiments used in
scientific analysis tasks (e.g., analysis data from the ATLAS experiment at the
Large Hadron Collider, CERN, Switzerland), and to extract association rules from
experimental data samples. This paper presents the analysis of 3 types of SPM
algorithms - horizontal and vertical, as well as pattern-growth, with the
emphasis on algorithms’ performance. There were prepared corresponding test data
sets which are specific and typical for analysis tasks in the ATLAS experiment. |
Keywords: |
Sequences, Sequential Pattern Mining, Frequent Pattern Mining, Items Mining,
Searching Patterns, Association Rules, Vertical Format, Horizontal Format,
Pattern-Growth |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2018 -- Vol. 96. No. 13 -- 2018 |
Full
Text |
|
|
|