|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
June 2018 | Vol. 96
No.14 |
Title: |
COMPUTATIONALLY EFFICIENT SECURE AND PRIVACY PRESERVING STORAGE OF IMAGE DATA ON
HYBRID CLOUD |
Author: |
K.BHARGAVI, T.BHASKARA REDDY |
Abstract: |
Cloud computing has changed the model of computing by providing a huge shared
pool of resources to public in pay as you go fashion. The predicted growth of
cloud shows promising prospects in future. However, there is privacy concern
over outsourced data to cloud. This is the challenging problem to be addressed.
Many researchers contributed towards secure and privacy preserving storage of
data to cloud. They could provide security and privacy benefits to cloud data
owners. At the same time, they are causing much overhead. For instance, most of
the cryptography based solutions introduced heavy computational costs. Another
problem with many existing solutions for hybrid cloud is that the overhead and
cost of usage is more. To overcome these problems, in this paper, we proposed a
methodology that advocates the effectiveness of using a hybrid cloud. It
discriminates the sensitive information from insensitive data and stores it in
private cloud while the insensitive data which is bulky is stored in public
cloud. This approach has two influencing benefits. The first benefit is optimal
utilization of resources over public cloud which results in saving money. The
second benefit is to have high level of security as the data stored in public
cloud is highly modified copy of original data and insensitive while sensitive
data stored in private cloud is needed to establish original data. We proposed
an algorithm to realize secure and privacy preserving storage and retrieval of
image data on hybrid cloud. We built private cloud with Aneka cloud platform and
used Amazon Web Services as public cloud. We built a prototype to demonstrate
proof of the concept. Results revealed that our methodology provides data
privacy with negligible computational cost when compared with AES. Besides it
causes little delay due to the methods employed for modification of original
image data. |
Keywords: |
Cloud Computing, Image Security, Hybrid Cloud, Privacy Preserving,
Discrimination Of Sensitive And Insensitive Data |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
UNDERSTANDING THE EFFECTIVE FACTORS OF KNOWLEDGE MANAGEMENT SYSTEM USAGE IN
PETROLEUM INDUSTRY IN DEVELOPING ECONOMY |
Author: |
AKBAR BADPA, JUHANA SALIM, JAMAIAH YAHAYA |
Abstract: |
Knowledge management system (KMS), as a class of information system, is the
backbone of organization that supports the implementation of KM practices. KMS
usage contributes to competitive advantages. In the context of oil and gas
industry in developing economy, there are reports of KMS usage failure; however,
little knowledge is available about antecedents of KMS usage. The extant studies
investigating the effective factors of KMS usage have yielded inconclusive
findings. In oil and gas industry, there is a paucity of study on determinants
of KMS usage. Our research addresses this issue by identifying the determinant
factors of KMS usage in the context of oil and gas industry in developing
economy, Pakistan. The study adopted cross-sectional survey involving 813
knowledge workers through clustered random sampling and 428 workable responses
were returned. Drawing upon the theories of planned Behavior (TPB), Technology
Acceptance Model (TAM) and Task Technology Fit (TTF), the study developed a
conceptual model and tested it using SPSS and AMOS, Structural Equation Modeling
(SEM). The initial conceptual model encompassed 11 hypotheses from which 7
hypotheses were accepted, while the rest were rejected. Thus, the constructs of
commitment, subjective norms, perceived usefulness (PU), perceived ease of use
(PEOU), Task-KMS-Fit, leadership and knowledge characteristics were accepted as
determinants of KMS usage, while the variables of trust, socio-political
influences, KMS-self-efficacy, and organizational structure were found to be
insignificant. The results of this study have theoretical, practical, and
methodological implications. This study bridges the knowledge gap between
research and practice of KMS usage in oil and gas industry. |
Keywords: |
Knowledge Management, Knowledge Management System, Information System,
Developing Economy |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
APPLICATION OF FUZZY AND INTERVAL ANALYSIS TO THE STUDY OF THE PREDICTION AND
CONTROL MODEL OF THE EPIDEMIOLOGIC SITUATION |
Author: |
ISSIMOV NURDAULET, MAZAKOV TALGAT, MAMYRBAYEV ORKEN, ZIYATBEKOVA GULZAT |
Abstract: |
In this article, monitoring and control issues of the social and epidemiological
situation have been analyzed. Emergency situations caused by infectious diseases
represent the greatest danger in the social and epidemiological sphere. Analysis
of infectious morbidity involves determining the quantitative characteristics of
the dynamic series, the trend of growth, reducing or stabilizing the incidence,
identifying causative factors, in specific areas and for different groups. The
criterion of fuzzy controllability was obtained for solving the problem of
forecasting and monitoring the epidemiological situation. A new mathematical
model and algorithm for solving the task of monitoring and controlling the
social and epidemiological situation on the basis of its interval implementation
have been described. The social effect will be expressed in increasing the
safety of human life. As a consequence, it will be possible to carry out
preventive measures in the necessary areas. |
Keywords: |
Epidemiologic Situation, Controllability, Interval Mathematics, Linguistic
Variable |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
COMPARATIVE ANALYSIS OF COHESION METRICS FOR COMPONENT BASED SOFTWARE SYSTEM |
Author: |
POOJA RANA, RAJENDER SINGH |
Abstract: |
Background/Objectives: Component-based software engineering (CBSE) is a process
of reusing pre- built software components to build a new software. CBSE is based
on good software engineering design principles. CBSE is based on black box
technique, in which the implementation of components are hidden in nature and
the communication between the components is through well-defined interfaces.
Component platforms are shared and help in reducing the development costs. To
determine the complexity of a software different software metrics are used. It
is predetermined that for fineness in software complexity the cohesion should be
high and coupling should be low. In our approach we are determining the reusable
components of a software system and enhancing the accuracy of the methods for
determin¬ing them. Proposed: Two cohesion metrics are proposed Cohv(Cohesion of
variables) and Cohm(cohesion of methods). Method : an attempt has been made to
present an analytical and empirical evaluation of cohesion metrics proposed in
this paper and comparison is drawn between different cohesion metrics which were
proposed by Rana and Rajender Singh [11] and Yadav and Tomar[23]. An attempt has
also been made to present the results of empirical evaluation based on the case
study. Java Beans has been used for validating the Metrics and SPSS tool is used
to find out the correlation between different variables and metrics and T test
is applied to find out the significance of the metrics. Findings: The Result of
the present study is quite satisfactory and may further help in estimation of
the complexity of components. The comparative analysis performed between
proposed metrics and different cohesion metrics and find that the cohesiveness
of proposed metrics is more than existing metrics and the possibility of
reusability for developing new applications become high. |
Keywords: |
Cbse, Testing, Black Box, Metrics, Cohision |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
CLASSIFICATION AND MONITORING OF AUTISM USING SVM AND VMCM |
Author: |
PROF. KESRA NERMEND, WAJIH ABDUL GHANI ABDUL HUSSAIN, DR. AMMAR IBRAHIM SHIHAB |
Abstract: |
Autism is a lifelong developmental deficit that affects how people perceive the
world and interact with each others. An estimated one in more than 100 people
has autism. Autism affects almost four times as many boys than girls. The
commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more
recently "eye tracking". A preliminary study on eye tracking trajectories of
patients studied, showed a rudimentary statistical analysis (principal component
analysis) provides interesting results on the statistical parameters that are
studied such as the time spent in a region of interest. Another study, involving
tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients
also showed interesting results. In this research, need confirm the results
of the preliminary study but also going forward in understanding the processes
involved in these experiments. Two tracks are followed, first will concern with
the development of classifiers based on statistical data already provided by the
system "eye tracking", second will be more focused on finding new descriptors
from the eye trajectories. In this paper, study used K-mean with Vector
Measure Constructor Method (VMCM). In addition, briefly reflect used other
method support vector machine (SVM) technique. The methods are playing important
role to classify the people with and without autism specter disorder. The
research paper is comparative study between these two methods. |
Keywords: |
Autism, Eye tracking, Classification, VMCM, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
NOVEL RESEARCH FRAMEWORK FOR SOCIAL COMMERCE PURCHASE INTENTIONS |
Author: |
AHMAD SAMED AL-ADWAN |
Abstract: |
The absence of social aspects and human presence is conceived as being one of
the key drawbacks that impede the future development of e-commerce. The
development of social commerce may help overcome this weakness. Social commerce
is viewed as a subset of e-commerce that integrates both social and commercial
activities by utilising social technologies into e-commerce websites. Social
commerce participates significantly in re-introducing the social side of
purchasing to e-commerce by enhancing the social presence in the online
environment. Based on the role of social technologies and Social Presence Theory
(SPT), this study describes the nature of the social side in social commerce by
proposing a theoretical framework that incorporates a multidimensional
conceptualisation of social presence. The impact of this conceptualisation on
building trusting beliefs and subsequent intentions to purchase is then
explored. The proposed model suggests that trust is a key driver of social
commerce. Furthermore, social presence factors rooted in social technologies
participate effectively in the formation of trustworthy relationships between
consumers and sellers. While the proposed research model has not been
empirically tested, it reveals new insights into social commerce research, and
has several practical and theoretical implications. |
Keywords: |
Commas Social commerce, Social technology, Web 2.0, Social presence, Perceived
trust |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
A SMART STICK FOR ASSISTING VISUALLY IMPAIRED PEOPLE |
Author: |
ASHRAF ANWAR, SULTAN ALJAHDALI |
Abstract: |
This paper presents a smart stick system for assisting blind or visually
impaired people. The smart stick acts as a vision assistant to enable visually
impaired people to find difficulties in obstacles detection and dangers in front
of them for autonomous navigation. Unlike existing papers, related to obstacles
detection means: ultrasonic sensor, infrared sensor, and water sensor, alarm
modules: buzzer, sound, and voice statement, and a location finder like the
GPS/GSM system, the proposed system integrates all these technologies for the
benefits of the blind. The system is designed to act like an artificial vision
associated with an alarm unit, and a location finder of the blind. The Global
Positioning System (GPS) and Global System for Mobile communications (GSM) are
interfaced to the microcontroller to detect the blind person location. The
feedback from the real test was positive. The average of avoidance accuracy is
88.75%. |
Keywords: |
Obstacle Detection, Ultrasonic Sensor, Infrared Sensor, Microcontroller, GPS. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
EDUCATIONAL DATA MINING FOR ENHANCED TEACHING AND LEARNING |
Author: |
ATTA-UR-RAHMAN, KIRAN SULTAN, NAHIER ALDHAFFERI, ABDULLAH ALQAHTANI |
Abstract: |
There are different classroom teaching techniques for effective teaching and
learning like; teaching on black/white board, projectors, etc. Some of the
students feel comfortable with one technique while others may be comfortable
with some other. This study aims to discover trend of comfort level of students
with respect to timetabling and teaching techniques. In this regard, a
questionnaire is designed to acquire students’ interest that will show what
techniques are mostly liked or preferred by different types of students. Based
on the feedback, machine learning algorithms are applied to extract the useful
results. The analyses are conducted in WEKA and the proposed scheme is compared
with other well-known techniques in the literature. |
Keywords: |
EDM, Machine Learning, Clustering, C-Mean, Apriori Algorithm, WEKA |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
THRESHOLD IDENTIFICATION FOR HTTP BOTNET DETECTION |
Author: |
NUR HIDAYAH M. S, 1FAIZAL M. A, WAN AHMAD RAMZI W. Y, RUDY FADHLEE M. D |
Abstract: |
Over the past years, botnets have gained the attention of researchers worldwide.
A lot of effort has been given to detect the presence of a botnet. Many
researchers focus on developing the systems and compare the detection method to
detect the botnet activity. Identifying an appropriate threshold value is
essential in order to differentiate between normal and abnormal network traffic.
The suitable value of the threshold can minimize false positive rate botnet
activity. Therefore, in this paper, we will identify the appropriate static
value of the threshold for detecting HTTP botnet. The likelihood ratio tests and
classification table were two test that will be used in order to access the fit
of the model. The comparative analysis with another researcher also has been
conducted. The result found showed about 95% of the data are declared as an
attack when the sample of data has been compared with the value of the
threshold. Thus, the value of the threshold is acceptable discrimination to use
in detecting HTTP botnet activity. |
Keywords: |
Threshold, Malware, Botnet, HTTP Botnet, Logistic Regression |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
ANALYSIS OF CUSTOMER SATISFACTION LEVEL ON E-COMMERCE WEB FASHION PRODUCT |
Author: |
DANIEL WAIL, SFENRIANTO |
Abstract: |
Nowadays E-commerce becoming essentials especially in tenage life. It has become
the most popular business in the world. People around the world could shop
between countries in ease. An online shopping website could be the source of
success not only because it contains useful information, but also because it
displays information in a way that is easily recognizable by its users. To
compete with other competitor it is important to find out the effectiveness of a
site is by examining users' visual preferences while using web pages. This
research is done to find out what customers’ preferences by using eye tracking
methods and questionnaire method. The two methods are then being compared to
find out wether there are any similarities or any cross section within the two.
There are several things which are measured; the relation between aspect of
information quality; system quality; service quality; user readiness and user
satisfaction. The quantitative data are gained through questionnaire and eye
tracking test by distributing the questionnaires to online shopping customers.
The analysis of data indicated that both research methods using questionnaires
and eye tracking are extremely different that they cannot be compared. Apart
from that the results of the evaluation of both websites using the method of eye
tracking shows that both sites are in accordance with the expectations of the
site maker. |
Keywords: |
Website, E-Commerce, Eye Tracking, Research, Customer Satisfaction |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
DYNAMIC DUAL THRESHOLD BASED SCHEMES FOR ABRUPT SCENE CHANGE DETECTION IN VIDEOS |
Author: |
MANISH K THAKUR |
Abstract: |
Detection of abrupt and gradual change of scene in a video is an active area of
research for last many years due to its applicability in many applications, viz.
content based image retrieval, computer vision, etc. This paper presents dynamic
dual threshold based schemes to detect the abrupt scene change in a video.
Proposed schemes use static as well as dynamic thresholds defined over set of
features proposed in this paper. These features include Mean Squared Error
(MSE), Entropy, and Count of displaced blocks. Extensive experiments have been
conducted to recommend the values for the proposed thresholds to efficiently
detect the abrupt scene change in videos. Experimental results show the good
accuracy to detect the abrupt change of scene. |
Keywords: |
Abrupt Change of Scene Detection, Entropy, Mean Squared Error, Histogram, Count
of Displaced Blocks |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
A NOVEL APPROACH OF MOBILE SECURITY ROBOTICS MOVED BASED ON GRAPH THEORY |
Author: |
KHATTAB M. ALI ALHEETI |
Abstract: |
Mobile computing plays vital role in our daily life. It has a lot of important
applications in modern technology such as, scientific discoveries, rescue
operations, and scientific research. The movement direction of mobile robots is
considered very important issue because of their direct relationship to the
amount of energy consumed. Therefore, computerized direction movement of mobile
computer must be measured before transfer from one point to others. Because of
any random movement of robots will have negative and direct impact on nodes
life. It In this paper, mobile computing is waiting in stand-by mode to obtain a
new control data at critical time for moving from one point to other in a
specific zoon. In more details, graph theory is utilised in positioned of mobile
nodes. In addition, it has the ability in determine mobile computer movement
without any energy losses. Our simulations result of the new movement system
show that the proposed approaches possess outstanding result with a reduction in
energy consumption. |
Keywords: |
Image Compression, Video Compression, Frame Compression, Frame Extraction
2D-DWTAd hoc network; mobile computing; graph theory; search and rescue.
|
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
DESIGN OF MAXIMUM POWER POINT TRACKING BASED ON ADAPTIVE NEURO-FUZZY SYSTEM FOR
SOLAR ARRAY SYSTEM |
Author: |
RAMADONI SYAHPUTRA, RAMA OKTA WIYAGI, INDAH SOESANTI, SUDARISMAN |
Abstract: |
This paper proposes a design of maximum power point tracking (MPPT) based on
adaptive neuro-fuzzy system for solar array system. In a solar power plant, MPPT
serves to maximize the solar array output power. The characteristics of solar
array performance always follow the sun's line. Under normal circumstances, the
maximum solar array output power is obtained when the maximum sunlight
intensity. This power will decrease as the intensity of sunlight decreases.
Therefore, MPPT technology is needed to maximize solar array output power at any
time. Several methods have been applied to MPPT technology. In this study the
proposed method is adaptive neuro-fuzzy based method. MPPT supported by this
adaptive neuro-fuzzy method is mounted on a power converter connected to the
solar array output. Along with this MPPT, it is expected that solar array output
power is always maximal. Solar array with adaptive neuro-fuzzy-based MPPT method
has been implemented in Simulink software. Based on the research results, they
have been obtained that MPPT is able to maximize solar array output power well. |
Keywords: |
Fuzzy Adaptive; MPPT; Optimization; Solar Array, Renewable Energy. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
FILTERING APPROACH AND SYSTEM COMBINATION FOR ARABIC NEWS CLASSIFICATION |
Author: |
DR. ZAINAB A. KHALAF, KHADEIJA A. HASSAN |
Abstract: |
Text classification is one of the important research in text mining applications
because of the increasing growth of digital data from different resources. It
became urgent need to find systems that help users to get information from this
large number of texts easily and faster. One of the most significant challenges
facing the text classification is how to reduce the number of features in high
dimensional data spaces without reduced the performance. The objective of this
research is to design an automatic text classification system and improve its
performance with less number of features. Two approaches are proposed in this
paper: N-gram features filtering and system combination. The main aim of using
different N-gram types is to use deep semantics and less number of features.
Three classification systems based on SVM algorithm are applied with different
N-gram filtering to reduce the number of features. These systems were compared
with conventional classification approaches, cosine similarity and SVM. The
system combination fusion the hypotheses produced by the above classification
systems in order to select the best class label via voting. These systems are
applied on Arabic corpus. The filtering approach reduced the number of
features from (5,799) and (12,474) for cosine and SVM systems to roughly (3,400)
by using N-gram types representation without reduce the performance. The
performance of text classification is enhanced from (81.6) and (91.2) for cosine
and SVM respectively to (94.2) for system combination. |
Keywords: |
Classification , filtering, system combination, N-gram, Arabic news |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
HYBRIDIZATION APPROACH TO ELIMINATE SPARSE DATA BASED ON NONNEGATIVE MATRIX
FACTORIZATION & DEEP LEARNING |
Author: |
HANAFI, NANNA SURYANA, ABD SAMAD BIN HASAN BASARI |
Abstract: |
E-commerce company delivered product information to customer or customer
candidate trough web portal. There is basic mechanism which a system has belong
responsible to calculate and predict information that suitable to customers or
customers candidate interested namely recommender system. Most successful
approach to calculate customer/user interest are based on collaborative
filtering. This approach relies on rating from customers to products or items as
a basic approach aims calculate similarity of users responds about items to
produce recommendation. In fact, just a little number of customers who giving
the rating approximately less than 1 percent from all customer population in
datasets. It’s a reason of rising sparse data. In this research used 2 technical
approach to deal with sparse data consist Non-Negative Matrix factorization to
reduce dimensional reduction and involve deep learning to compute latent factor
in a part of users, item and rating. This research consider dataset from
MovieLens, many researchers believe to conduct experiment their approach
algorithm to increase better performance. Final experiment we used RME (Root
Mean Error) and RMSE (Root Mean Square Error) to measure accuracy of result
experiment and according the result, our approach has obtained good result to
reduce missing value. |
Keywords: |
Non-Negative, E-Commerce, Recommender System, Collaborative Filtering, Matrix
Factorization, Deep Learning |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
DEEP LEARNING FOR RECOMMENDER SYSTEM BASED ON APPLICATION DOMAIN CLASSIFICATION
PERSPECTIVE: A REVIEW |
Author: |
HANAFI, NANNA SURYANA, ABD SAMAD BIN HASAN BASARIRecommender system is critical
equipment for establishing an effective communication between consumers and
retailers in ecommerce business. Effective and enjoyable communication to find
the fit product is considered to have a massive implication to increase of sales
achievement. Recommender system established in the middle 90s. Based on
technical approach, there are four of recommender system model namely
Collaborative filtering, Contents Based, Knowledge Based and Demographic
filtering. Collaborative filtering is considered to be more superior than
another tree methods. It offers obviously advantages in terms of serendipity,
novelty and accuracy. Although it has several benefits in recommendation result,
in an effort to improve the weakness of the recommender system, many involving
machine learning, machine learning with shallow layers was popular in the 90's
for instance neural network, SVM. In the era of big data like now, where the
amount of data is abundant, and the data variations are very diverse, this will
become an increasingly interesting challenge in generating a recommender system
results more appropriate in the present era of big data. in this literature
review, researchers are trying to find answers to the weaknesses, challenges and
opportunities forwards that exist in the method of deep learning for ecommerce
recommender system. |
Abstract: |
Ecommerce, Recommender System, Recommendation System, Deep Learning, Deep
Network |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
DEVELOPMENT OF A DECISION SUPPORT SYSTEM BASED ON EXPERT EVALUATION FOR THE
SITUATION CENTER OF TRANSPORT CYBERSECURITY |
Author: |
LAKHNO V., AKHMETOV B., KORCHENKO A., ALIMSEITOVA Z. GREBENUK V. |
Abstract: |
The work is devoted to the development of the mathematical support of decision
support systems (DSS) for information and cybersecurity of information and
communication transport systems (ICTS). There was improved the algorithm on the
basis of the Delphi method for carrying out a survey to assess the ICTS security
using the DSS. The algorithm is adapted for on-line mode for solving the
problems of situations development forecasting related to information security
and to prevention of the destructive influence of cyber attacks on ICTS. There
was proposed a model for structuring of heterogeneous information obtained by
interviewing the experts and for forming a knowledge base of DSS. One of the
motivating reason for this research was the need to develop a fairly simple for
algorithmic implementation, but effective tool for the experts work online,
assessing the information security of a particular information object. On the
basis of the proposed model, there were developed and tested automated tools for
depth ICTS security analysis in the on-line mode using the generation of
questionnaires for the research conducting by Delphi method. There were
presented the results of approbation of the developed tools for the practical
tasks of ICTS cyber security ensuring. It is shown that the proposed solutions
allow to reduce financial and time costs in the process of on-line expert
evaluation organizing and contribute to its quality and effectiveness. |
Keywords: |
Information Security, Cybersecurity, Expert Evaluation, Decision Support System,
Delphi Method |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
INTERACTION AND LEARNING MODEL IN E-LEARNING USING LEARNING MANAGEMENT SYSTEM |
Author: |
SANTY, S. KURNIALI, INDRAJANI |
Abstract: |
It is important for learners to be able interact and learn, even in an
e-learning environment. The study focus on developing a model of interactions
with the components within the learning environment along with the Learning
Management System features that can be used to support the interactions. In this
paper we propose an Interaction and Learning Model in E-learning using Learning
Management System (LMS). In this approach the LMS acts as a hub that connects
every actor and element in the e-learning and acts as a platform where all the
e-learning activities will take place. The model emphasizes the relation between
the learner's interactions and learning to the type of e-learning and features
practiced inside a LMS. |
Keywords: |
E-Learning; Interaction; LMS; Interaction Model; Features In LMS; Learning Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
MODEL-BASED TEST CASE PRIORITIZATION: A SYSTEMATIC LITERATURE REVIEW |
Author: |
MUHAMMAD LUQMAN MOHD SHAFIE, WAN MOHD NASIR WAN KADIR |
Abstract: |
Re-testing all test cases during regression testing is costly and
time-consuming. These problems motivate researchers to come up with various
techniques to overcome them. One of the techniques is Test Case Prioritization
that prioritizes test cases in test suite by ordering them according to a
desired objective goal. Model-based is one of the approaches which utilizes the
system models to make prioritization. The main purpose of this systematic review
is to identify and categorize the current state-of-the-art while providing a
baseline for future research in model-based Test Case Prioritization. A general
search term related to model-based approach was used during the study search in
selected digital libraries ranging from 2005 to 2016 to find primary studies
that propose model-based approach. A total of 32 primary studies consisting of
21 combinations of conference proceedings, workshop, and symposium and 12
journal articles were finalized after going through a strict selection process.
A sum of 48 distinct approaches with their respective characteristics and models
used have been identified, and some general constraints of model-based Test Case
Prioritization have been highlighted. Future research is recommended to put more
focus in detailing the introduced category to benefit the researchers and
practitioners. |
Keywords: |
Model-Based, Test Case Prioritization, Regression Testing, Systematic Literature
Review. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
CURRENT TRENDS IN COMPLEX HUMAN ACTIVITY RECOGNITION |
Author: |
NEHAL A. SAKR, MERVAT ABU-ELKHEIR, A. ATWAN, H. H. SOLIMAN |
Abstract: |
Recognition of human activities is a challenging task due to human’s tendency to
perform activities not only in a simple way, but also in a complex and
multitasking way. Many research attempts address the recognition of simple
activities, but little work targets the recognition of complex activities.
Currently research on complex activity recognition using sensors is growing in
many application domains. This paper provides an analysis of the most prominent
complex sensor-based activity recognition. We analyze the structure and working
methodology of the existing complex activities recognition systems, discuss
their strengths and weaknesses. In addition, we evaluate existing proposals from
three different perspectives including overall system evaluation, performance
evaluation, and dataset evaluation. |
Keywords: |
Complex Human Activities Recognition, Conditional Random Field, Hidden Markov
Model, Bayesian Network, Random Forest, Context Modeling, Semantic Reasoning |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
BLACK BOX EVALUATION OF WEB APPLICATION SCANNERS: STANDARDS MAPPING APPROACH |
Author: |
MALIK QASAIMEH , ALA A SHAMLAWI , TARIQ KHAIRALLAH |
Abstract: |
The Secure Development Life Cycle (SDLC) of web applications aims to enhance the
quality attributes of released applications. Security is among of the important
attributes during the penetration testing phase. Web Application Vulnerability
Scanners (WAVS) help the developers to identify existing vulnerabilities that
could compromise the security and privacy of data exchanged between the client
and web server during the development and deployment phases. WAVS are used
during the deployment phase to continuously evaluate the security of web
applications by checking for possible vulnerabilities that can threaten the
client services. This paper evaluates the effectiveness and accuracy of five
WAVSs (Acunetix WVS, Burp Suite, NetSparker, Nessus and OWASP ZAP) to identify
possible vulnerabilities of web applications. The selected scanners are among
the top ten recommended web vulnerability scanning software for 2017. The method
of black box testing was adopted to evaluate the five WAVSs against seven
vulnerable web applications. The evaluation is based on different measures such
as the vulnerabilities severity level, types of detected vulnerabilities,
numbers of false positive vulnerabilities and the accuracy of each scanner. The
evaluation is conducted based on an extracted list of vulnerabilities from OWASP
and NIST. The accuracy of each scanner was measured based on the identification
of true and false positives. The results show that Acunetix and NetSparker had
the best accuracy with the lowest rate of false positives. |
Keywords: |
Web Application Security Scanners, Evaluation, Owasp, Nist, Security
Vulnerabilities |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
IOT WIRELESS HOME AUTOMATION TECHNOLOGIES AND THEIR RELATION TO SPECIFIC
ABSORPTION RATE |
Author: |
NIDAL M. TURAB |
Abstract: |
Home automation is one of the most promising Internet of Things domains; it
involves the control and automation of the human surrounding environment such as
ventilation and heating. The automated home has evolved to include the use of a
large number of wireless devices that transmit radio frequency power and that
can negatively affect the human body when such devices exceed the standard
maximum allowable Whole-Body Absorption Rate (SAR). This paper provides an
overview of the most important home automation technologies as well as
calculates and compares the total transmitted power of these technologies. |
Keywords: |
SAR, Wavenis, Z-wave, ZigBee, Bluetooth, EnOcean, Insteon , and KNX-RF |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
IMPROVING QUALITY OF SMES INFORMATION SYSTEM SOLUTION WITH ISO 9126 |
Author: |
JOHANES FERNANDES ANDRY, JAROT S. SUROSO, DEVI YURISCA BERNANDA |
Abstract: |
Oil distribution company in Jakarta, which requires an Order Fulfillment Systems
Information, expected from the implementation of this software can achieve
several objectives desired by user requirement. The company is SMEs to assist
system to be more effective and efficient, provide convenience in terms of
process data and information. With the use of applications compared to the
manual process of recording which facilitates decision-makers to be able to
monitor transactions and report in a short time. To design and implementation of
applications that are reliable and avoid the bug or error, required evaluated
quality of order fulfillment software used ISO 9126. Problems is implementation
and evaluating quality of OFIS based on ISO 9126 standard in terms of
functionality, efficiency, portability, usability, maintainability, and
reliability, this paper is only on attribute functionality and sub
characteristic. Perspectives of user and developer must satisfaction as product
quality definitions, base on six high-level and other sub-qualities. The overall
attribute describes the behaviour of the system, depending on the specific needs
required by the firm. |
Keywords: |
Order Fulfillment Systems Information, ISO 9126, Attribute, Functionality, SMEs |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
CONSTRUCTION AND EVALUATION OF A USER INTERFACE ACCEPTANCE QUESTIONNAIRE |
Author: |
ASLINA BAHARUM , ROZITA ISMAIL , DIAN DARINA INDAH DARUIS , NOOR FZLINDA FABEIL
, IZA AZURA AHMAD BAHAR , MUHAMMAD OMAR |
Abstract: |
This study develops a questionnaire used to measure user acceptance of web user
interface (UI), particularly web object locations. It explored ASEAN users’
expectations based on constructs in Expectation-Confirmation Theory (ECT). Eight
constructs were investigated further, namely expectation (E), perceived
usefulness (PU), perceived ease of use (PEU), perceived performance (PP),
confirmation (C), satisfaction (S), continuance intention (CI), and interface
quality (IQ). A total of 160 respondents from the ASEAN community were surveyed
for their acceptance of web-based prototype. An exploratory factor analysis that
demonstrate satisfactory reliable and valid scales of the model constructs has
been identified. Results show that model contained eight constructs with 21
items could be used to guide and assess the UI design. This study also suggest
further analysis to confirm the model as a valuable tool to evaluate the user
acceptance towards informational website. It is hoped that, the outcome from
this study could be utilized in developing a sustainable web design,
particularly in user-centred website which is based on user expectation for web
object locations. |
Keywords: |
Mental Model, Expectation-Confirmation Theory, User Interface, User Acceptance |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
DEMUSE: RELEASING STRESS USING MUSIC MOBILE APPLICATION |
Author: |
ASLINA BAHARUM, SAKINAH ALI PITCHAY, ROZITA ISMAIL, NOOR FZLINDA FABEIL,
NORDALIELA MOHD RUSLI, IZA AZURA AHMAD BAHAR |
Abstract: |
It can be seen that, conflicts, negative revolution, suicides, and other crimes
becoming more common worldwide. Several studies and investigations have been
conducted due to this case. Thus, it has been found that one of the root cause
is stress, especially among the youth. Although stress can improve work
performance and awareness for those who can manage it properly, however if
someone is unable to cope with the stressful situation when it becomes
excessive, the reaction might be disastrous. In tackling this unfavourable
situation, several lifestyle changes have been prescribed such as listening to
music, physical activities, doing desired activities, surfing, and others. This
study uses the power of music to reduce stress. A mobile application named as
“DeMuse” was developed and in its development, Mobile-D step-by-step methodology
was applied. At explore phase, a number of existing applications have been
compared. At the second phase, the initialize stage, a quantitative analysis was
carried out to study the music and mood categories respectively. During the
third and fourth phases, which were Productionize and Stabilise, the completion
of Data Flow Diagram and Entity Relationship Diagram were established based on
the quanti-tative analysis done. In the final phase, the System Test and Fix,
the prototype were reviewed by 148 po-tential users. DeMuse showed to be one of
the alternative ways to relieve stress. From this finding, DeMuse highlight the
main feature which is the music and mood categories. In conclusion, DeMuse is a
valid mo-bile apps that could be used to help reduce stress of its user. With
this app, it hopes greatly to help in de-creasing and eliminating the tension,
dissatisfaction, and others negative feelings of users in their daily life. |
Keywords: |
Mobile Application, Stress, Music, Mood. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
REAL-TIME HARDWARE ARCHITECTURE OF THE ADAPTIVE DUAL THRESHOLD FILTER BASED ECG
SIGNAL DENOISING |
Author: |
WISSAM JENKAL, 1RACHID LATIF, AHMED TOUMANARI, ABDELHAFID ELOUARDI, ANAS HATIM,
OUSSAMA EL BCHARRI |
Abstract: |
This paper presents a hardware architecture of the Adaptive Dual Threshold
Filter (ADTF). This architecture leads to real-time process of the ECG signal
denoising. The ADTF is a recent technique that offers a simple and efficient
algorithm of the ECG signal denoising. The implementation of the ADTF is based
on a structural VHDL description of different functional blocks. The overall
architecture was designed and parallelized in order to accelerate processing.
Results of this architecture design show high performances of the real-time
denoising process of the ECG signal. The proposed architecture presents a low
complexity and a low occupancy of the various resources of an FPGA architecture
based low-cost systems presented in this research work. |
Keywords: |
Electrocardiogram, VHDL, Real-Time, ADTF, FPGA, Low-Cost Systems |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
MALWARE PREDICTION ALGORITHM: SYSTEMATIC REVIEW |
Author: |
MOHD NAZRI MAHRIN, SURIAYATI CHUPRAT, ANUSUYAH SUBBARAO, ASWAMI FADILLAH MOHD
ARIFFIN, MOHD ZABRI ADIL TALIB, MOHAMMAD ZAHARUDIN AHMAD DARUS, FAKHRUL AFIQ ABD
AZIZ |
Abstract: |
Malware is a threat to information security and poses a security threat to harm
networks or computers. Not only the effects of malware can generate damage to
systems, they can also destroy a country when for example, its defense system is
affected by malware. Even though many tools and methods exist, breaches and
compromises are in the news almost daily, showing that the current
state-of-the-art can be improved. Hundreds of unique malware samples are
collected on a daily basis. Currently, the available information on malware
detection is ubiquitous. Much of this information describes the tools and
techniques applied in the analysis and reporting the results of malware
detection but not much in the prediction on the malware development activities.
However, in combating malware, the prediction on malware behavior or development
is as crucial as the removing of malware itself. This is because the prediction
on malware provides information about the rate of development of malicious
programs in which it will give the system administrators prior knowledge on the
vulnerabilities of their system or network and help them to determine the types
of malicious programs that are most likely to taint their system or network.
Thus, based on these, it is imperative that the techniques on the prediction of
malware activities be studied and the strengths and limitations are understood.
For that reason, a systematic review (SR) was employed by a search in 5
databases and 89 articles on malware prediction were finally included. These 89
articles on malware prediction has been reviewed, and then classified by
techniques proposed in detection of new malware, the identified potential
threats, tools used for malware prediction, and malware datasets used.
Consequently, the findings from the systematic review can serve as the basis for
a malware prediction algorithm in future as malware predication became a
critical topic in computer security. |
Keywords: |
Malware Prediction Techniques, Computer Security, Potential Threats, Malware,
Malware Datasets |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
SYSTEMATIC LITERATURE REVIEW ON USABILITY EVALUATION MODEL OF EDUCATIONAL GAMES
: PLAYABILITY, PEDAGOGY, AND MOBILITY ASPECTS |
Author: |
HANIF AL FATTA, ZULISMAN MAKSOM, MOHD HAFIZ ZAKARIA |
Abstract: |
Model for measuring usability evaluation for Mobile Game-Based Learning (m-GBL),
has developed by many researchers. Since m-GBL had a unique purpose as a tool
for the learning process, the model used for usability evaluation for this kind
of application should address those individual characteristics such as
playability, mobility, and pedagogy. This study presents the finding of
literature review concerning to usability model to measure m-GBL. This study
also highlights on the model from another application area which is considered
to be relevant. Some papers even presented unique characteristics of measurement
concerning to children context as a user. Another critical finding is the expert
evaluation, and user testing is the most frequently used method for evaluating
usability on m-GBL. And the last result shows some model to develop new
dimension for usability evaluation is identified |
Keywords: |
Usability Evaluation, Playability, M-GBL, Mobility, Pedagogy, Heuristics
Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
Title: |
DISCOVERING THE RELATIONSHIP BETWEEN SOFTWARE COMPLEXITY AND SOFTWARE
VULNERABILITIES |
Author: |
YASIR JAVED, MAMDOUH ALENEZI, MOHAMMED AKOUR, AHMAD ALZYOD |
Abstract: |
Software vulnerabilities might be exploited badly which might eventually lead to
a loss of confidentiality, integrity, and availability which translated into a
loss of time and money. Although several studies indicated that complexity in
software is the main cause of vulnerabilities, still the argument is poorly
designed and maintained. Moreover, some studies have already related complexity
to vulnerabilities and found that this cannot be generalized. In this work, we
explored that what are the factors that contribute more to make a software
vulnerable. Several feature selection techniques were applied to find the
contribution of each feature. Five classifiers are used in this study to predict
the vulnerable classes. The dataset is collected from twelve Java applications,
where these applications are analyzed and based on complexity, code coverage,
and security. The studied applications are varying in its characteristics
regarding a number of code lines, used classes; application size, etc. The
result indicates that complexity in all its components (size, depth of
inheritance, etc.) can be utilized in predicting vulnerabilities. |
Keywords: |
Software Vulnerabilities, Software Complexity, Fault Prediction, Relation, Code
Complexity |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2018 -- Vol. 96. No. 14 -- 2018 |
Full
Text |
|
|
|