|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
August 2018 | Vol. 96
No.15 |
Title: |
FEATURE ANALYSIS OF PUBLIC COMPLAINT HANDLING APPLICATION USING FODA |
Author: |
AKHMAD SAEFUL BAKHRI, AHMAD NURUL FAJAR |
Abstract: |
This study is to know the result of the comparison of functions in the main
business process of Public Complaint Handling (PLM) based on Judicial Commission
of Indonesia decree No. 4 2013 and Judicial Commission decree No. 2 2015 and to
know Public Complaint Handling features using Feature-Oriented Domain Analysis
(FODA). The data that used and processed from Public Complaint Handling business
process observation, interpretation, documents, reports, and interview with
users and experts. The data is processed by compared both functions in the main
business process of Public Complaint Handling and perform feature analysis using
FODA. The results of this study that the Judicial Commission simplify and refine
the functions in the main business process of Public Complaint Handling based on
Judicial Commission decree no. 2 2015. From the features analysis results there
are 125 features with 86 mandatory features, 7 optional features, 17 features OR
and 15 alternative features. This study as one of highly recommendation for
Judicial Commission that FODA's approach will be more effective and efficiency
in enhancing and developing applications from reusable features to be developed
and new features to be built when there are regulatory changes and business
process changes for the application of Public Complaint Handling. |
Keywords: |
Business Process, Feature Analysis, FODA |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
COMPOSITE MEDIAN WIENER FILTER BASED TECHNIQUE FOR IMAGE ENHANCEMENT |
Author: |
KAYODE AKINLEKAN AKINTOYE,NOR ANITA FAIROS BINTI ISMIAL, NUR ZURAIFAH SYAZRAH
BINTI OTHMAN, MOHD SHAFRY MOHD RAHIM, ABDUL HANAN ABDULLAH |
Abstract: |
Image processing begins with image enhancement to improve the quality of the
information existing in images for further processing. Noise is any unwanted
object that affects the quality of original images. This always happened during
the acquisition of images, which cause gaussian noise via photoelectric sensor.
Also, impulse noise as well is introduced during transferring of some images
from one place to another because of unstable network. Hence, these noises
combine to form mixed noise in some images, which change the form and loss of
information in the images. Filtering techniques are usually used in smoothing
and sharpness of images, extraction the useful information and prepare an image
for analysis processing. In this research, a novel technique of hybrid filter
for enhancing images degraded by mixed noise has been exhibited. The proposed
model of the novel filter uses the concept of two element composite filter. This
technique improved the fusion of Median filter and Wiener filter to eliminate
mixed form of noise from digital image created during image acquisition process.
Composite Median Wiener(CMW) is not two filters in series, yet it can remove the
blurredness, keep the image edges, and eliminate the mixed noise from the image.
The result of CMW filter application on noisy image shows that it is an
effective filter in enhancing the quality image. |
Keywords: |
Median Filter, Weiner Filter, Image Enhancement, CMW Filter, Peak
Signal-to-Noise Ratio (PSNR) |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
ON THE IMPACT OF REAL TIME PARAMETERS INTO THE DESIGN OF CLOUD LOAD BALANCERS |
Author: |
ALI HUSSEIN ALI ALNOOH, DHUHA BASHEER ABDULLAH |
Abstract: |
The term "Cloud" has turned out to be universal in our life since it manages a
large portion of our activities. Truth be told, cloud benefits are achieved in
the vast majority of our social, scholastic, and business tasks. The
technological era we are currently living in, is almost based on Internet
services. A novel load balancer called Community-Based Cloud Load Balancing
Approach (CBCLBA) for distributing tasks to their appropriate server is
proposed. The main goal of this paper is to adopt a community based algorithm
that takes into considerations tasks time constraints. Our proposed algorithm is
implemented on a dataset that is brought from Google. The proposed algorithm
shows that when considering two real time parameters, namely; Scheduling Class
and Priority, the number of missed deadline tasks decreases comparing to the
case when ignoring the two mentioned parameters. Finally, we believe that this
is the first kind of work that utilizes concepts from sociology in designing
cloud load balancing approaches. |
Keywords: |
Cloud Load Balancing, Cloud Computing Approaches, Google Clusters-usage traces,
Real time |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
THE BALIANS: PROMOTING BALINESE TRADITIONAL ART EXHIBITION USING GEOGRAPHIC
INFORMATION SYSTEM |
Author: |
I KETUT ADI PURNAWAN, I NYOMAN PIARSA, I PUTU AGA DARMA WINANDA |
Abstract: |
Bali is a tourism destination which be famous by its nature, culture, art and
artist. Many Balinese artists gathered together in an art studio and held some
traditional art attraction or exhibition. However, they are lack of promotion.
Advances of technology could help Balinese artist for promoting Balinese
traditional attraction or exhibition. This research focused on the development
of a geographical information system named “The Balians” (The Balinese-Art
Entertainment Reservation). “The Balians” was an information system which
provided a way for promoting Balinese traditional art exhibition and
facilitating the tourist or local people who want to watch the exhibition. This
geographical information system worked as a website service, which was developed
using PHP as the programming language, MySQL database, and cloud computing SaaS.
“The Balians” website was able to handle three entities, they were art studio as
a place for the artist gathered together and also accommodating an exhibition,
administrator who has authority for data verification, and the user -the tourist
or local people- who wants to watch the held exhibition. There were three main
features of “The Balians”, those were exhibition booking, event ticket
reservation, and online payment for the booked exhibition or tickets. The
success rates of “The Balians” as a reservation system and promotion media were
measured by the Likert scale. The result of questionnaires which were used for
measurement pointed out that 10 measurement variables were in Agree (A) and
Strongly Agree (SA) categories. Those result meant that “The Balians” had run
appropriately. |
Keywords: |
Geographic Information System, Tourism, Bali, Balinese Exhibition, The Balians |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
VIDEO COMPRESSION VIA MINIMUM FRAME DIFFERENCE LOCALIZATION ADAPTED FOR MOBILE
COMMUNICATIONS |
Author: |
KHATTAB M. ALI ALHEETI |
Abstract: |
Huge amount of multimedia data are circulated via communications media (wired
and wireless), Internet, and many other media, so these data need to be
compressed to achieve storage space and speed. Many method are used for image
and video compression such as discrete cosine transform, discrete wavelet
transform and discrete curvelet transform. Some of these methods are efficient
and have wide range of applications. The aim of this paper is to implement an
efficient approach of video compression based on frame difference localization.
The implemented approach based on the mixing of two methods; firstly, calculate
the difference between the two near frames to avoid the similarity and secondly,
applying discrete wavelet transform to reduce the amount of similar pixels as
possible. The implemented approach is tested for many types of image, in which a
good performance results are obtained. This approach is adapted for mobile
communications in order to save speed and space. |
Keywords: |
Image Compression, Video Compression, Frame Compression, Frame Extraction
2D-DWT. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
IMPROVE QUALITY OF E-LOYALTY IN ONLINE FOOD DELIVERY SERVICES : A CASE OF
INDONESIA |
Author: |
ROMI ILHAM |
Abstract: |
This study aims to improve e-loyalty by analyzing the effect of e-service
quality on customer e-loyalty through e-satisfaction in online food service
delivery. This research uses quantitative approach with survey method. The
population in this study were customers who had used online food service with a
sample of 320 respondents. Data analysis using SEM-PLS (Partial Least Square)
with Smart-PLS software. The results showed that e-service quality positively
affects e-loyalty and e-satisfaction, e-satisfaction has positive affect on
customer e-loyalty and e-service quality positively affect e-loyalty of customer
through e-satisfaction. It can be concluded that e-satisfaction mediates the
influence of e-service quality on e-loyalty of online food service customers, so
e-service quality and e-satisfaction is required to improve e-loyalty. |
Keywords: |
E-Service Quality, E-Satisfaction, E-Loyalty, E-Commerce. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
IMPLEMENTATION OF A REMOTE MONITORING SYSTEM FOR CONDITION-BASED MAINTENANCE
USING WIRELESS SENSOR NETWORK: CASE STUDY |
Author: |
S. SADIKI, 1M. RAMADANY, M. FACCIO, D.AMEGOUZ, S. BOUTAHARI |
Abstract: |
Increasing number of interconnected embedded "SMART" devices pervade our
environments. Their use in various scenarios including smart-city,
building-automation, industrial control, energy grids etc. have dramatically
improved the overall performance. Use of IoT (sensors, actuators etc) and
wireless sensor networks WSN) can help to sense and act based on real-time
monitoring of industrial equipment. Our proposed architecture explores the
advantages of embedding smart sensors on industrial equipment and collect data
for monitoring and better maintenance. This real-time monitoring will enable
predictive analysis for the health status of industrial equipment. To the best
of our knowledge, this article is the first investigation of employing
intelligent network sensors in case of remote maintenance applications that
couple information technology solutions with condition-based maintenance. Tests
are carried to prove the validity of our proposed system by using Contiki based
Cooja emulator. Although the technique developed in this work is tuned toward
this application, it could be used in other applications as well which deals
with condition-based maintenance. |
Keywords: |
Condition Based Maintenance, Wireless Sensor Network, Decision Support Systems,
Asset Management, Contiki-Cooja. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
SOFTWARE TOOLS FOR CELL WALLS SEGMENTATION IN MICROPHOTOGRAPHY |
Author: |
GULZIRA BAKHITBEKOVNA ABDIKERIMOVA, FEODOR ALEXANDROVICH MURZIN, ALEKSEY
LEONIDOVICH BYCHKOV, JAMALBEK TUSSUPOV, SERGEY KHAYRULIN, WEI XINYU, ELENA
IVANOVNA RYBCHIKOVA |
Abstract: |
This article provides an analysis of how textural areas are segmented on the
microphotography in the image processing systems. A comparative description of
the main methods is provided. The purpose of our research is to develop and find
algorithms for analyzing the textural characteristic of images and the
segmentation of textural features obtained using the transmission electron
microscopy using software, established under Treaty No. 16-13-10200/2. Work has
been done for the Institute of solid state chemistry and mechanochemistry of the
Siberian branch of the Russian Academy of Sciences. The focus is on the
development of software tools of choice and the creation of features that
describe texture differences; of selection and segmentation of the textural
areas; of classifying textural areas and identifying the texture object to
analyze the above-named microphotographs. The question of the applicability of
textural sets to analyse experimental data in order to identify in the
microphotography the patterns that could be linked in the future to porousness,
chemical reactiveness, etc. Suitable algorithms have been selected and
appropriate software tools have been established at Matlab and in the software
package for statistical analysis of Statistica. |
Keywords: |
Textural Features, K-Means Method, Agglomerative Method, Image Processing,
R/S-Analysis, Microphotography Analysis, Electron Microscopy, Herbal Raw
Material. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
DESIGN RESTFUL WEB SERVICE OF NATIONAL POPULATION DATABASE FOR SUPPORTING
E-HEALTH INTEROPERABILITY SERVICE |
Author: |
M. MIFTAKUL AMIN, ADI SUTRISMAN, DERIS STIAWAN, ERMATITA, ANDINO MASELENO |
Abstract: |
The Government of the Republic of Indonesia nowdays has implemented a
centralized national population database with Electronic Identity Card (e-ID) as
the sole reference to the legality and validity of data used for various public
services. In line with the population database, the government has also run a
National Health Insurance Program which also needs e-ID card data to obtain
health services. When patients visit health service providers such as hospitals,
health centers, medical centers, and health clinics, personal data is requested
for registration by showing ID cards, so the presence of a national demographic
database is not yet optimal. The presence of RESTful Web Service technology
enables communication between different platform applications, so the
demographic database can be accessed using a variety of different client
applications, operating systems, programming languages, and databases. This
study aims to design the national demographic database using RESTful Web
Services, which can be implemented to support e-health services. E-ID data can
be used by the health provider for patient registration and patient referral.
The demographic database can be used as a reference for valid demographic data.
The test that has been done shows that the performance of the system design
developed, reliable to be implemented with the accuracy of the acquisition of
data records of valid residence in accordance with the design of data
structures. |
Keywords: |
Population Database, E-Id, Interoperability, Restful Web Services, E-Health |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
THE BAG-OF-WORDS VECTORS AND A SOKAL & SNEATH-IV COEFFICIENT USED FOR A K-MEANS
ALGORITHM OF ENGLISH SENTIMENT CLASSIFICATION IN A PARALLEL SYSTEM |
Author: |
DR.VO NGOC PHU, VO THI NGOC TRAN |
Abstract: |
Many different researches have already been used for sentiment classification
for many years because the sentiment lexicons have already had many significant
contributions to everyday life, such as in political activities, commodity
production, and commercial activities. We have proposed a novel model using many
bag-of-words vectors (BOWV) and a SOKAL & SNEATH-IV Coefficient (SSIVC) for a
K-Means algorithm (KM) to classify all the documents of the testing data set
comprising 13,500,000 documents, the 6,750,000 positive and the 6,750,000
negative , into either 2,500,000 positive sentences or 2,500,000 negative
sentences of our training data set including 5,000,000 sentences in English. In
this survey, the BOWVs are improved by using many sentiment lexicons of our
basis English sentiment dictionary (bESD) by using the SSIVC through a Google
search engine with AND operator and OR operator. One sentence in English is
transferred into one BOWV. The KM is used in clustering one BOWV into either the
positive BOWVs or the negative BOWVs of the training data set. The sentiment
classification of one document is based on the results of the sentiment
classification of its BOWVs. We have firstly tested the proposed model in a
sequential environment, and then, the novel model has been tested in a
distributed network system secondly. The results of the sequential system are
not as good as that of the parallel environment. The accuracy of the testing
data set has been achieved 88.76%. Many different fields can widely use the
results of the novel model certainly. |
Keywords: |
English sentiment classification; parallel system; Cloudera; Hadoop Map and
Hadoop Reduce; K-Means algorithm; SOKAL & SNEATH-IV Coefficient |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
IMPROVED WATER FLOW-LIKE ALGORITHM FOR CAPACITATED VEHICLE ROUTING PROBLEM |
Author: |
MOKHTAR MASSOUD KERWAD, ZULAIHA ALI OTHMAN, SUHAILA ZAINUDIN |
Abstract: |
The capacitated vehicle routing problem (CVRP) has many applications in
different domains seeking ways to minimize the total traveled distance. Although
the CVRP has been widely investigated in the literature, it is facing ongoing
operational challenges. Moreover, despite various metaheuristics that have been
proposed to solve this problem, its optimal solution is still not achieved. Thus
far, the water-flow-like algorithm (WFA) has obtained a reasonable solution for
this problem, with room for further improvement. The WFA has strategies for
diversification (in the precipitation operation). This study aims to enhance the
WFA for solving the CVRP by providing a good solution in terms of diversity and
quality. The basic WFA is capable of solving the CVRP, however, it has problems
in terms of slow convergence and the tendency of being trapped in the local
optimum. Therefore, an improved WFA (IWFA) is proposed in this study to overcome
this weakness by increasing the diversity of solution search in the
precipitation operation using constructive heuristics (i.e., nearest neighbor,
random method, and greedy randomized adaptive search procedure). Constructive
heuristics aim to construct new solutions instead of duplicating existing ones.
Computational results show that the IWFA outperforms the basic WFA with a
solution quality improvement of up to 76.92% and is better than other
state-of-the-art methods by up to 74.55%. This finding indicates that the IWFA
is a promising approach for solving instances of CVRP. |
Keywords: |
Capacitated Vehicle Routing Problem, Metaheuristics, Constructive Heuristics,
Water-Flow-Like Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
A CO-TRAINING MODEL USING A FUZZY C-MEANS ALGORITHM, A K-MEANS ALGORITHM AND THE
SENTIMENT LEXICONS - BASED MULTI-DIMENSIONAL VECTORS OF AN OTSUKA COEFFICIENT
FOR ENGLISH SENTIMENT CLASSIFICATION |
Author: |
DR.VO NGOC PHU, VO THI NGOC TRAN |
Abstract: |
A semi-supervised learning of a machine learning used for a new model for big
data sentiment classification has already been built in this survey. We have
proposed a novel model using mainly a co-training (CT) approach to classify
10,500,000 documents of our testing data set comprising the 5,250,000 positive
and the 5,250,000 negative into 4,000 documents of our training data set
including the 2,000 positive and the 2,000 negative in English. In this
co-training model (CTM), a Fuzzy C-Means algorithm has been used in training a
first classifier and a K-Means algorithm has been used in training a second
classifier based on many multi-dimensional vectors of sentiment lexicons of An
OTSUKA coefficient (OM).After training the first classifier and the second
classifier of the CTM of each loop, the 50 documents of the testing data set
have certainly been chosen from the first classifier, then, they have been added
to the second classifier, and the 50 documents of the testing data set have
certainly been chosen from the second classifier, then, they have been added to
the first classifier. The sentiment classification of all the documents of the
testing data set has been identified after many loops of training the first
classifier and the second classifier of the CTM certainly. In this survey, we do
not use any vector space modeling (VSM). We do not use any one-dimensional
vectors according to both the VSM and the sentiment classification. The OM is
used in creating the sentiment classification of our basis English sentiment
dictionary (bESD) through a Google search engine with AND operator and OR
operator. The novel model has firstly been performed in a sequential system and
then, we have secondly implemented the proposed model in a parallel network
environment.The results of the sequential environment are less than that in the
distributed system.We have achieved 89.25% accuracy of the testing data set. The
results of the proposed model can widely be used in many commercial applications
and surveys of the sentiment classification. |
Keywords: |
English sentiment classification; parallel system; Cloudera; Hadoop Map and
Hadoop Reduce; Fuzzy C-Means; K-Means; OTSUKA coefficient; co-training. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF VARIOUS ON-CHIP TOPOLOGIES |
Author: |
BANSIDHAR JOSHI, MANISH K THAKUR |
Abstract: |
With shifting of the present world towards automation, computer intensive
applications are gaining popularity in day-to-day life, resulting into demands
for highly scalable and reliable Network-on-Chip (NoC) based architectures along
with low power consumption. NoCs are an exertion to impoverish the approach of
huge networking architectures and implement them with embedded System-on-Chip
(SoC) sphere. In reliable NoC based architectures, efficiency of the system
primarily depends upon the interconnected structure or topology. The topologies
are critically analyzed on the basis of various performance factors like
throughput, latency, scalability, cost of traversal etc. The availability of
fixed sized buffer queues at intermediate routers in the interconnection network
topology holds a tight constraint over managing the incoming data packets from
neighboring routers. With the traffic being heterogeneous and
application-centric, the overlay architecture must be chosen wisely to deal with
possible congestion scenarios. This paper analyzes the relative conduct of
topologies and their altered versions and evaluates the prime performance
parameters, viz. throughput and latency under various buffers’ queue management
schemes. Simulations (NS2) on two different nodes configuration, 16 cores and 64
cores shows Torus and Mesh of Tree as the favorable topologies respectively
under diversified traffic. |
Keywords: |
Network-on-Chip, System-on-Chip, Topology, Interconnection Network, off-chip,
on-chip |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
ONTOLOGY-BASED GENERATION OF RANDOM PATHS BETWEEN TWO POINTS |
Author: |
AHMAD TAYYAR, MOHAMMAD ALI H. ELJININI |
Abstract: |
In the first part of our research, a novel computer algorithm has been proposed
to generate random path between two points in space. Random path consists of
finite number of randomly generated adjacent points that satisfy the condition:
L(pipn) < L(pi-1pn). Where L(p1pn) is the length of the path between the two
adjacent points p1 and pn. The algorithm has been coded and evaluated.
Experiments showed that the randomly generated points were converged to the
target point. The main importance of this method is the ability to generate
paths between two points in real time, which cannot be predicted in advance.
Points are generated, one at a time, where each point brings us closer to the
target point. This contribution is applicable to many fields such as economics,
engineering, robotics, computer science, military, and other fields of applied
sciences. In this part of our research work, we tackled the problem from
different aspects. An ontology has been developed that describes the domain of
discourse. The aim is two folds; firstly, to provide an optimized generation of
best points that are closer to the target point. Secondly, to provide sharable,
reusable ontological objects that can be deployed to other projects. The
ontology is designed to guide the process of generating acceptable points based
on some criteria described in the ontology. Adding intelligence to the process
has provided us with a better solution, in comparison with our previous results.
Ontologies have been engineered and reused in many research projects across the
globe with success. Our contributed solution can attract many applications in
the various fields of applied sciences. One implication of the utilization of
ontologies is that it remains poorly exploited field, which may have an impact
on the adoption of ontology-driven technologies outside the academic community.
We underpinned our solution by the initiation of several case studies that have
been designed using and extending our work, and progressing very well. Initial
findings are very encouraging and leading to the applicability of the proposed
solution to real life cases. |
Keywords: |
Ontology, Object-Oriented Paradigm, Random Paths, Mobile Robots, Graph Theory |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
HOME SURVEILLANCE SYSTEM DESIGN AND IMPLEMENTATION TOWARDS IOT ENVIRONMENT |
Author: |
SAWSEN ABDULHADI MAHMOOD, ZAINAB KAREEM ABDULLAH |
Abstract: |
A personal home surveillance system is a low cost technology based on internet
of things technology (IOT) that makes it possible for users to monitor the
events that is happening in their homes remotely. There are multiple challenges
in home surveillance systems such as picture is unclear, oddity cannot be
specified automatically, motion sensors limitations, in addition to high cost of
storage space. The trend of this paper, is to design and achieve moving objects
extraction based home surveillance system with low cost, functional, and
suitable solution within IOT context. The communication process is achieved
essentially using Rasberry-Pi microcontroller device which enables a streaming
of real time video along with capturing a snapshot images. In addition, a
modified approach for moving objects detection in video sequences is presented
in this paper based on the results of motion detection approach. The key result
of the proposed moving object detection is represented by retaining the moving
parts only in the video sequences captured by Pi camera in order to decrease the
duration time of video frames, storage space required, in addition to minimize
the reviewing time of the recording video. Furthermore, a real time stream video
can be viewed from any web browser or mobile platform in term of surveillance
system. The moving parts extraction process is achieved using the statistical
information of the sequence frames within a modified motion detection algorithm.
To analyze and evaluate the proposed motion detection algorithm results, we have
attended our own video dataset that compose of three video files with different
motion situations. The experimental result of the proposed moving objects
detection based home surveillance system outperforms a remote surveillance of
home integrity with efficient availability, reliability and high rate detection
of moving objects in the captured video sequences . |
Keywords: |
Surveillance system, cloud server, motion detection, Internet of things,
Background Model |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
NEW INFORMATION ECONOMIC (NIE) METHOD FOR INFORMATION TECHNOLOGY INVESTMENT
ANALYSIS: BUSINESS STRATEGIC |
Author: |
EMAN MULYAMAN, ASTARI RETNOWARDHANI, RAZIV HERMAN DIPUTRA, DESITA MUSTIKANINGRUM |
Abstract: |
Based on the development of technology, especially Information Technology and
Information System, and coupled with the needs of application development system
in the company, but only with the needs of the application used must be adjusted
to the value of investments issued by the company, because not a small fee to
spend as the value of the initial investment that must be issued. In this case
XYZ Group has been using the application system in the company's work
operations, the application is Nawakara Information System (NIS). However, in
the use of NIS in the company is still constrained by inaccurate management
data. Based on this, the company wants to improve the quality of service and
improve the quality of performance between departments by analyzing existing
systems, ranging from the value of investments that have been made to
infrastructure and applications that have been done, New Information Economic
(NIE) as the basis of analytical methodology used as a reference with the hope
of getting the right solutions and decisions in the implementation. |
Keywords: |
New Information Economic, Investment Information System And Technology,
Inaccurate, Improve, Right Solutions. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
DETECTING SYBIL ATTACKS USING HETEROGENEOUS TOPOLOGIES IN STATIC WIRELESS SENSOR
NETWORK |
Author: |
SOHAIL ABBAS, MUHAMMAD HAQDAD, SALMA BEGUM, MUHAMMAD ZAHID KHAN |
Abstract: |
Wireless Sensor Network (WSN) is composed of few to several hundred nodes that
coordinate to perform a specific action. Data is propagated in multihop fashion
from sources to sink(s). Security is an important issue in WSNs, especially when
they are used to protect or monitor critical situations. The WSNs require a
unique identity per node in order to function properly. However an attack called
Sybil attack violates this one-to-one mapping of identity and node; hence, a
Sybil attacker controls multiple identities on a single physical node. The Sybil
attacks are serious threats to the correct functioning of WSNs. Thus, effective
mechanisms for security of WSNs became vital. Various techniques have been
proposed in the literature that use received signal strength in order to thwart
and detect Sybil attacks. For coping with signal fluctuation and improved
accuracy, the proposed techniques incorporate extra hardware, such as GPS or
directional antennae, or communication overhead, such as periodic beacons and/or
node collaboration. In this paper, we propose a detection mechanism for Sybil
attacks without using the extra hardware or imposing overhead while trying to
achieve the same level of detection accuracy. We start off by proposing a
pre-planned nodes deployment strategy, as a first line of defence, to prevent
these attacks. The resulted topology will be Sybil-free that will also help in
improving the detection of these attacks. We also propose a signal strength
based detection mechanism for the counteraction of these attacks in static WSNs.
Our proposed technique does not require using any sort of extra hardware, like
directional antennae or GPS. The simulation based evaluation of the scheme
demonstrates good detection accuracy, i.e. high true positives with low or no
false positives. |
Keywords: |
Sybil Attacks, Wireless Sensor Networks, Node Deployment, Ad-Hoc Network
Security |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
ADVISE-GIVING EXPERT SYSTEMS BASED ON ISLAMIC JURISPRUDENCE FOR TREATING DRUGS
AND SUBSTANCE ABUSE |
Author: |
RAHMAD KURNIAWAN, AKBARIZAN, KHAIRUNNAS JAMAL, AFRIZAL NUR, MOHD ZAKREE AHMAD
NAZRI, DEBY KHOLILAH |
Abstract: |
Indonesia is the most populous Muslim country, but yet drugs and substance abuse
has not abated. Death penalty to punish drug traffickers does not stopping the
statistics on drug-related death to rise. Thus, education about drugs abuse is
an essential part of the war against drugs abuse. The daily loss of dozens of
lives to drug addiction in Indonesia drew the attention of researchers on how
artificial intelligence (AI) can be used as an educational tool to curb drug
abuse among youngsters. In this paper, an advice-giving expert system is
proposed as an online tool to educate users. The expert system explains and
advises the users based on the Islamic Jurisprudence point of view. This
research investigates the impact of using the Bayesian Network to the
effectiveness of the expert system in giving the right advice based on the
user's response or answer to the question asked by the system. Bayesian network
is chosen to be used as the inference engine because it organised the graph
theory and probability theory. The accuracy of the system is obtained by
comparing the output which is the advice given by the system to a human expert
in the Islamic Jurisprudence. Based on the 15 cases as a test, the developed
expert system using Bayesian Network can diagnose the social problems
accurately. Users were advised and explained with the right advice. The daily
loss of dozens of lives to drug addiction in Indonesia drew the attention of
researchers on how artificial intelligence (AI) can be used as an educational
tool to curb drug abuse among youngsters. |
Keywords: |
Bayesian Network, Drugs, Expert System, Social Problem, Islamic Jurisprudence |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
COMPARATIVE ASSESSMENT OF EFFECTIVENESS AMONG CORPORATE INFORMATION SECURITY
PROFILES |
Author: |
GEORGI N. TODOROV, MARINA V. VINOGRADOVA, GENNADII G. SOROKIN, ALEXANDER A.
SHATSKY |
Abstract: |
The article is reviewing available approaches that make it possible to solve the
problem of effectiveness among information security systems. Ensuring
information security has become an important element in an enterprise
sustainable development. At the same time, there is an arising question of a
proper assessment for an information security level and its indicators. With an
example of enterprises from the same sector, the research shows that
effectiveness of an information security profile is mostly the same. This makes
it possible to use universal tools when companies design and establish
information protection. In the review of literature, there is a discussion of
identification issues of information risks and threats and a proposed
comprehensive evaluation technique. Elaborating the approach, there is a further
definition of maturity levels in IT infrastructure of business processes.
Findings make it possible to conclude that management levels in corporate
information security in the same sector are the same. Minor differences are in
place because of size effects and various investment costs that a company has to
establish the information security system. The analysis of results shows
heterogeneous effectiveness in information security profiles among companies
when their implement investment projects focused on modernization. |
Keywords: |
Information security, Construction sector, Security profile, Risks, Uncertainty. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
A SURVEY: THE CURRENT TRENDS OF PRIVACY TECHNIQUES FOR PROTECTING THE LOCATION
PRIVACY OF USERS IN LBS |
Author: |
ABDULLAH ALBELAIHY, JONATHAN CAZALAS, VIJEY THAYANANTHAN |
Abstract: |
With GPS-enabled devices and data connectivity now ubiquitous, Location Based
Services (LBSs) have seemingly penetrated all aspects of our lives. While
profoundly valuable, these services expose the user to a litany of privacy and
security issues. LBS users must reveal their location, and at times other
sensitive personal information, in order to effectively use the service and
receive accurate results. This paper presents a survey of the current trends of
privacy techniques employed in protecting the location privacy of users in LBSs.
The paper further highlights the efficacy, or otherwise, of each technique
discussed in this paper, with each technique having been evaluated based on
accuracy, quality, efficiency, flexibility, location privacy, and query privacy.
The outcome of this study is a taxonomy of current privacy and security
techniques, which will assist researchers and developers as they look to further
protect the sensitive information of their customer base. |
Keywords: |
Privacy, Bloom filter, LBS, Oblivious transfer, Dummy locations, Zero knowledge. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
THE BINARY BITS AND THE SENTIMENT LEXICONS BASED ON AN YULES SIGMA COEFFICIENT
USED FOR SENTIMENT CLASSIFICATION IN ENGLISH |
Author: |
DR.VO NGOC PHU, VO THI NGOC TRAN |
Abstract: |
We have already surveyed many different approaches for sentiment classification
to get higher accuracies, to shorten execution times, and to save a lot of
storage spaces for many years because many significant contributions of the
sentiment classification have widely been applied to everyday life, political
activities, commodity production, and commercial activities. As known, many
binary bits can help us save a lot of storage spaces. Therefore, we have
proposed a novel model in this survey using the binary bits and many sentiment
lexicons according to an Yule’s Sigma coefficient (YSC) to classify 9,000,000
documents of our teting data set comprising the 4,500,000 positive and the
4,500,000 negative into either the positive polarity or the negative polarity
based on 5,000,000 sentences of our training data set including the 2,500,000
positive and the 2,500,000 negative in English. We do not use any vector space
modeling (VSM). In addition, we do not use any one-dimensional vectors. We also
do not use any multi-dimensional vectors. We only use the binary bits and the
sentiment values of the lexicons for the proposed model. We use many similarity
measures of the YSC. One sentence is transferred into the binary bits (the
binary bits string) according to the sentiment scores of the lexicons. All the
positive sentences of training data set are transferred into all the positive
binary bits strings of training data set, called the positive group and all the
negative sentences of training data set are also transferred into all the
negative binary bits strings of training data set, called the negative group.
Based on many similarity measures by using the YSC, one sentence is clustered
into either the positive group or the negative group. The sentiment
classification of one document of the testing data set is identified according
to the sentiment classification results of all the sentences of this document.
The novel model has firstly been implemented in a sequential environment. Next,
we have performed the proposed model in a parallel network environment secondly.
The execution time of the distributed network system is faster than that of the
sequential environment. There has been an accuracy 89.01% of the testing data
set in this survey. The sentiment classification of many millions of the
documents can be identified by using this novel model successfully. Many
advantage results of our novel model can widely be applied to many different
fields in many commercial applications and surveys of the sentiment
classification. |
Keywords: |
English sentiment classification; parallel system; Cloudera; Hadoop Map and
Hadoop Reduce; binary bits; sentiment scores of lexicons; Yule’s Sigma
coefficient. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
FACTORS INFLUENCING THE CITIZEN TRUST TO ADOPT E-GOVERNMENT SERVICES IN SAUDI
ARABIA |
Author: |
HEND ALOUD, DR. YASSER IBRAHIM |
Abstract: |
With the rise of secure websites and mobile applications, the phrase “take a
number or wait in line” has become redundant in public services. The worldwide
evolution of e-government services has simplified lives as more citizens avail
of e-solutions. However, citizens’ adoption of e-government services rely on
multiple factors, including user awareness and trust. Therefore, to understand
the factors that influence trust in e-government services, an empirical study
must be conducted. This paper examines the antecedents of trust in e-government
services in Saudi citizens’ perceptions and investigates the means through which
this trust influences the intention to use e-government services. The study
analyzes a sample of 310 completed surveys that focus on trust-related metrics,
such as trust in government, trust in technology, information quality, and
privacy and security assurance. It also includes two constructs of the TAM model
(perceived usefulness and perceived ease-of-use) to predict the intention to use
e-government services. The study’s outcomes support the proposed research model,
whereby all proposed variables significantly predicted intention to use
e-government services. Furthermore, all proposed variables significantly
predicted trust in e-government except the privacy and security assurance
construct. |
Keywords: |
E-government, Trust Antecedents Model, TAM, Intention To Use, Saudi Arabia,
Empirical Study. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
AUTOMATIC DATA MODELING TRANSFORMATION APPROACH OF NOSQL DOCUMENT AND COLUMN
STORES TO RDF |
Author: |
ABDELJALIL BOUMLIK, NASSIMA SOUSSI, MOHAMED BAHAJ |
Abstract: |
In this paper, we have proposed a mapping system that makes heterogeneous NoSQL
data available in common machine-readable format. In fact, we aim to virtualize
the data stored in different NoSQL databases with a specific focus on document
and column oriented databases types (considered as the most used ones) using
Resource Description Framework (RDF) in order to contribute in the
interoperability between applications that exchange data and process it as
machine-understandable information, especially in the web application domain and
offering more opportunities for novel services and applications that have such
needs. In addition, our approach is very useful to carry out some operations
that are not currently supported by NoSQL database systems, also to unify their
heterogeneous data models. The proposed algorithms are based on a set of
procedure and methods that we execute at each stage depend on the input file and
as per the mapping rules that we already define. The obtained results via our
application were encouraged and reflect exactly what has been expected and
specified. |
Keywords: |
NoSQL-to-RDF, Column-Oriented Database, Document-Oriented Database, Unified
NoSQL Database, Interoperability |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
MULTI PARAMETERS DISPATCH MODEL IN TAXI COLLABORATION SYSTEM |
Author: |
PURBA DARU KUSUMA |
Abstract: |
Nowadays, conventional taxi business meets strong competition with the online
taxi service. One of the problem is that in online taxi service that adopts
sharing economy platform, public can join to be a driver easily as far as he
owns the vehicle. So, there are large number of vehicles are in the online taxi
service. This condition is different to the existing conventional taxi that is
operated by private company and the vehicles are owned by the taxi company. Even
the taxi company is a big corporate, it still cannot compete with the online
taxi service. The answer is developing collaboration between taxi companies so
that the service is operated by a single system. Unfortunately, creating
collaboration system among taxi companies is not easy. It is because the number
of fleets that are owned between companies is various. The other problem is that
each company has its own pricing strategy. In this research, we propose the
dispatch model for conventional taxi collaboration system. Parameters in this
model are travel cost, pickup distance, vehicle’s idle time, and the fleet size.
In this research, we propose three models. In the first model, order will be
allocated to the vehicle that offers the lowest travel cost and has longest idle
time. In the second model, order will be allocated to the vehicle that offers
the lowest travel cost but the model does not guarantee that longer idle time
vehicle will be preferred. In the third model, the order will be allocated to
the vehicle that has the highest aggregate score of travel cost, pickup
distance, idle time, and fleet size. Based on the simulation result, the first
and the second models has advantage in offering the lowest travel cost while the
third model has advantage in keeping pickup ratio at maximum level. |
Keywords: |
Dispatch system, Taxi, Collaboration, Simulation, Nearest Driver. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
DIGITAL HADITH AUTHENTICATION: A LITERATURE REVIEW AND ANALYSIS |
Author: |
EMHA TAUFIQ LUTHFI, NANNA SURYANA, ABDULSAMAD HASAN BASARI |
Abstract: |
Hadith is the second source of reference for Muslim all over the world after the
Holy Al-Quran. Plenty of Muslims used the internet as primary knowledge sources
including when searching for religious texts such as Hadith. Due to the vast
amount of data being transferred on the Internet, there is exists many
fabricated Hadiths, and these produce many problems in distinguishing between
authentic or fabricated Hadiths for Muslim and non-Muslim who are interested in
Hadiths. Therefore, Hadiths accessed from the internet needs to be researched to
get its authenticity and originality. Hadith has three parts that are Sanad,
Matn, and Taraf. Referred to Hadith science, an authentic Hadith can be seen
from the status of its Sanad and Matn. Based on the literature review of
previous research on Hadith authentication, it exists 14% of the studies were
using the authentication concept of Sanad and Matn, almost 33% of studies were
using only the authentication concept of Sanad, and 6% of studies were using
only the authentication concept of Matn. Most of the prior studies done manually
and fewer utilized any machine learning methods, and the performance is still
unable to measured or standardized. |
Keywords: |
Hadith, Sanad, Matn, Hadith Authentication, Hadith Authentication Methods |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
TOWARDS MORE ACCURATE AUTOMATIC RECOMMENDATION OF SOFTWARE DESIGN PATTERNS |
Author: |
ABEER HAMDY, MOHAMED ELSAYED |
Abstract: |
Design pattern is a high-quality reusable solution to a commonly occurring
design problem in certain context. Using design patterns in software development
improves some of the quality attributes of the system including productivity,
understandability and maintainability. However, it is hard for novice developers
to select a fit design pattern to solve a design problem. The paper proposes a
text retrieval based approach for the automatic selection of the fit design
pattern. This approach is based on generating a vector space model (VSM) of
unigrams and topics to the catalogue of patterns. The topic is a set of words
that often appear together. Latent Dirichlet Allocation topic model is adopted
to analyze the textual descriptions of the patterns to extract the key topics
and discover the hidden semantic. The similarity between the target problem
scenario and the collection of patterns is measured using an improved version of
the popular Cosine similarity measure. The proposed approach was assessed using
Gang of four design patterns catalog and a collection of real design problems.
The experimental results showed the effectiveness of the proposed approach which
achieved 72 % precision. |
Keywords: |
Design Pattern Selection; DP Recommendation; Gang of Four, Text Mining,
Information Retrieval, Topic Modelling, Vector Space Model. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
SIMULATION OF CHAOTIC PHENOMENA IN INFOCOMMUNICATION SYSTEMS WITH THE TCP
PROTOCOL |
Author: |
ALEXAND KARPUKHIN, DMITRIJ GRICIV, EVGENY NIKULCHEV |
Abstract: |
In numerous works devoted to the study of network traffic, it was shown that in
high-speed networks, chaotic operation modes can appear, the main cause of which
is the behavior of the TCP protocol. The presence of such modes leads to a
significant reduction in the bandwidth of the entire network, especially in the
so-called bottlenecks. However, models that adequately describe
infocommunication systems and make it possible to apply the entire arsenal of
classical methods for analyzing nonlinear dynamical systems have not been
proposed yet. The paper proposes a new approach to the analysis of the behavior
of infocommunication systems with the TCP protocol – treating them as nonlinear
dynamical systems demonstrating chaotic properties for certain values of the
parameters. Phase portraits of the considered systems are constructed; the
values of the maximum Lyapunov exponent are calculated for different values of
the main parameters of the systems. The physical experiment was carried out in
the real network. The problem of optimizing the parameters of the
infocommunication system was solved in terms of the absence of undesirable
chaotic regimes. |
Keywords: |
Network Traffic, TCP Protocol, Lyapunov Exponent |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
MULTI-CLASSIFICATION OF UNSW-NB15 DATASET FOR NETWORK ANOMALY DETECTION SYSTEM |
Author: |
MUKRIMAH NAWIR, AMIZA AMIR, NAIMAH YAAKOB, ONG BI LYNN |
Abstract: |
Problem to classify more than two classes (called as multi-class) for network
anomaly detection system using machine learning techniques are very challenging
and become a vital factor when the growth of many network attacks might endanger
the performances of network system. A tremendous increase in the various number
of network threats compromise the network system motivate the network anomaly
detection system to be relevant and necessary to be implement using a powerful
tool (machine learning approach) for network security issue. In this work, a
model of an Online Average One Dependence Estimator (AODE) algorithm for
multi-classification of UNSW-NB15 dataset that high in accuracy with a low false
alarm rate (FAR) was built to overcome the issues such as the nature of data
(complex data that represent into more than two classes), dynamical data in a
network system, and frequent update (for streaming data that need a fast
processing). The obtained results from the conducted experiment showed that
Online AODE more recently detect the Worms class where the percentage of
accuracy for classification is 99.93% with small FAR is only 0.001. Moreover,
online AODE is an outperformed based on accuracy compare to online Naïve Bayes
(NB) where the classification rate 83.47% and 69.60% respectively for
multi-classification the UNSW-NB15 dataset. Since, the given data is a streaming
data in a computer network time need to be enumerated to have a fast algorithm
for network anomaly detection system before the network system become in a
critical condition. Although, the online NB is most fastest for
multi-classification yet online AODE give a comparable result based on
processing time. |
Keywords: |
Multi-classification, Network Anomaly Detection System, Averaged One Dependence
(AODE), Machine Learning, UNSW-NB15 Dataset |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
CONTENT BASED IMAGE RETRIVAL USING COMBINATION HISTOGRAM AND MOMENT METHODS |
Author: |
FOUAD H. AWAD, REEM IBRAHIM HASAN, AHMEED S. FARHAN, LAITH ALZUBAIDI |
Abstract: |
In this work, we introduce content based image retrieval CBIR. One of the
essential features is colour in an image processing and CBIR so we use the
colour histogram and colour moment features in order to compare a inquiry image
with the image in the database. The two ways, colour histogram and colour moment
have achieved state-of-art results when we applied them to WANG database images.
For testing purposes, We have used 100 images (10 images from each class).The
mean retrieval of precision of histogram was 74.4 % and the average of colour
moment was 72.4% when test every algorithm alone and the result be more
efficient when combine them which be 75.1 % by using constant weight and the
precision increase to 81.9% when make the weight of combination variable by the
user. (Restate with marks) |
Keywords: |
Image Processing, CBIR, Colour Histogram, Feature Extraction, Color Moment. |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
Title: |
PHOTOVOLTAIC OUTPUT POWER FORECAST USING ARTIFICIAL NEURAL NETWORKS |
Author: |
A. ELAMIM, B. HARTITI, A. BARHDADI, A. HAIBAOUI A. LFAKIR, P.THEVENIN |
Abstract: |
This article presents a method for predicting the power provided by photovoltaic
solar panels using feed forward neural network (FFNN) of a photovoltaic
installation located in the city of Mohammedia (Morocco). An almost one-year
experimental database on solar irradiance, ambient temperature and PV power were
used to study the prediction ability of the power produced by artificial neural
networks. To verify this model, the coefficient of determination (R2), the
normalized mean squared error (nRMSE), the mean absolute error (MAE), and other
parameters were used. The results of this model tested on unknown data showed
that the model works well, with determination coefficients lying between 0.99
and 0.998 for sunny days, between 0.961 and 0.965 for cloudy days and between
0.88 and 0.93 for rainy days. |
Keywords: |
Photovoltaic Installation, Feed Forward Neural Network, Artificial Neural
Networks |
Source: |
Journal of Theoretical and Applied Information Technology
15th August 2018 -- Vol. 96. No. 15 -- 2018 |
Full
Text |
|
|
|