|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
September 2018 | Vol. 96
No.17 |
Title: |
A FUZZY-BASED BUFFER SPLIT ALGORITHM FOR BUFFER ATTACK DETECTION IN INTERNET OF
THINGS |
Author: |
MUSHTAQ MOHAMMED ABDULNABI, ROSILAH HASSAN, NOR EFFENDY OTHMAN, AZIZAH YAACOB |
Abstract: |
Internet of Things (IoT) process technology is a rapidly emerging technology
with great benefits for the pool of individuals, homes, companies and other
institutions in general. This technology is used to connect everyday devices to
the network to enable additional features such as remote control and access to
data, But the network is exposed to several attacks, the most important attacks
that cause the problem of overload is event-based attack, Smart stretched attack
on the buffer one of the most important attacks on the network, in this research
we propose a new algorithm called a Fuzzy Buffer Split (FBS) to defend against
these two types of buffer attacks. |
Keywords: |
IoT, Buffer Reservation Attacks, Overflow, Fuzzy System, Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
AN OPTIMIZED ATTACK TREE MODEL FOR SECURITY TEST CASE PLANNING AND GENERATION |
Author: |
HABEEB OMOTUNDE , ROSZIATI IBRAHIM1 MARYAM AHMED |
Abstract: |
Securing software assets via efficient test case management is an important task
in order to realize business goals. Given the huge risks web applications face
due to incessant cyberattacks, a proactive risk strategy such as threat modeling
is adopted. It involves the use of attack trees for identifying software
vulnerabilities at the earliest phase of software development which is critical
to successfully protect these applications. Although, many researches have been
dedicated to security testing with attack tree models, test case redundancy
using this threat modeling technique has been a major issue faced leading to
poor test coverage and expensive security testing exercises. This paper presents
an attack tree modeling algorithm for deriving a minimal set of effective attack
vectors required to test a web application for SQL injection vulnerabilities. By
leveraging on the optimized attack tree algorithm used in this research work,
the threat model produces efficient test plans from which adequate test cases
are derived to ensure a secured web application is designed, implemented and
deployed. The experimental result shows an average optimization rate of 41.67%
from which 7 test plans and 13 security test cases were designed to mitigate all
SQL injection vulnerabilities in the web application under test. A 100% security
risk intervention of the web application was achieved with respect to preventing
SQL injection attacks after applying all security recommendations from test case
execution report. |
Keywords: |
Security Testing, SQL injection, Attack trees, Threat Modeling, MOTH. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
KNOWLEDGE GRID MODEL IN FACILITATING KNOWLEDGE SHARING AMONG BIG DATA COMMUNITY:
SYSTEMATIC LITERATURE REVIEW |
Author: |
SARA HOSSEINIOUN, RUSLI ABDULLAH, YUSMADI YAH JUSOH, MARZANAH JABAR |
Abstract: |
This systematic literature review (SLR) aimed to identify issues of knowledge
sharing in big data community as a huge amount of data and highlight the
knowledge grid’s characteristics which can improve knowledge flow between
members of a community. In achieving the objectives, this study follows
Kitchenham’s, (2009) method for SLR. In consequence, three research questions
have been chosen in the first phase and in following phases all the related
article which help to answer the research questions by the keywords that have
been collected. Analysis of results revealed the difficulty of knowledge sharing
between community members’ interaction and collaboration and there is a gap in
researches on big data user’s roles on sharing through the big data community.
Moreover, knowledge grid as communication infrastructure can effectively
acquire, represents and exchanges massive amount of knowledge however current
knowledge grid models focus on knowledge discovery through big data and there is
a lack of efficient knowledge grid model for distributing knowledge among
community members by considering their influence on knowledge. |
Keywords: |
Big Data, Big Data Community, Knowledge Management, Knowledge Sharing, Knowledge
Grid |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
USING THE RSA AS AS AN ASYMMETRIC NON-PUBLIC KEY ENCRYPTION ALGORITHM IN THE
SHAMIR THREE-PASS PROTOCOL |
Author: |
DIAN RACHMAWATI, MOHAMMAD ANDRI BUDIMAN |
Abstract: |
The Shamir three-pass protocol lets two parties to communicate in a secure
manner without the need of exchanging any secret keys. As with many other
cryptographic protocols, the Shamir three-pass protocol needs an algorithm in
order to work in a proper manner. The algorithms used in the three-pass protocol
should belong to the class of symmetric algorithms and follows
commutative-encryption system. Our study takes an unconventional approach:
instead of using a symmetric algorithm, we use RSA, an asymmetric algorithm, in
the three-pass protocol. RSA is a public key crypto-system that relies its
security on the difficulty of factoring a big integer into two prime numbers.
However, in this study, the RSA is not used as a public key algorithm, but
rather as an asymmetric non-public key encryption algorithm. This is done by
setting both encryption and decryption keys to private. The complete computation
of this scheme is done in Python programming language. Our study shows that this
scheme works conveniently in the three-pass protocol. |
Keywords: |
Cryptography, Commutative-Encryption, Asymmetric Non-Public Key, RSA, Shamir
Three-Pass Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
CLUSTERED HEED SCHEME FOR CONGESTION AVOIDANCE IN COGNITIVE RADIO SENSOR
NETWORKS |
Author: |
JANANI .S, RAMASWAMY .M , SAMUEL MANOHARAN .J |
Abstract: |
Reliable and high throughput data delivery in cognitive radio sensor networks
(CRSN) remain an open challenge owing to the inability of the source to quickly
identify and react to challenges in spectrum availability. The paper proposes a
novel congestion control scheme called Enhanced congestion detection and
avoidance (ECODA) for CRSN to operate in a mobile framework. It articulates a
clustered HEED based mechanism in an effort to exploit the available spectrum on
the principles of the cognitive radio technology. The ECODA involves a threefold
methodology in order that it uses a dual buffer threshold and weighted buffer
difference for congestion detection and a bottleneck-node-based source sending
rate control and multi-path loading balancing. The attempt owes to evaluate its
performance on a NS2 platform and bring out the improvement in indices through
the use of the congestion avoidance mechanism. The results project far reaching
impacts in the sense it portrays the viability of the procedure and allows it
for exploring fresh applications in this domain. |
Keywords: |
Cognitive radio sensor networks, ECODA, Clustered HEED, Throughput |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
DESIGN AND SIMULATION OF TRAFFIC CONTROLLER IN COMMUNICATION NETWORKS USING
MATLAB |
Author: |
MAJID S. NAGHMASH AND SAADI ALOBIDI |
Abstract: |
In this paper, the efficient traffic control in communication networks is
investigated and developed. The congestion delay control in the mobile network
based fluid flow theory has been used to design the suggested model with
efficient managements. The suggested approach is able to adapt manage with
physical layer resource and time delay. The proposed controls techniques are
established with mathematical consequent structure by use customized sliding
controller technique. In this method, a high utilization with minimum delay is
provided by adapt the state feedback with sliding mode controllers. The
achievements in the requirements of quality of service (QoS) by mean of dynamic
regulation and effectiveness of network resources for traditional structures.
The limitation in the bandwidth and capacity as a network input restriction has
been considered in this work. Results shows minimum delay by 0.9 msec. in the
networks delay by this approach which is consider a novel developments compared
with existing design. |
Keywords: |
Traffic control, Communication Network, QoS, MATLAB |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
SECURITY REQUIREMENTS AND TECHNOLOGIES FOR THE INTERNET OF THINGS (IOT)
APPLICATIONS: A SYSTEMATIC LITERATURE REVIEW |
Author: |
ASMA ASDAYANA IBRAHIM, MASSILA KAMALRUDIN |
Abstract: |
Security requirement is one of the most important intangible requirements which
could be taken as a burden on the smooth functioning of the system or
application. Requirements engineers without expertise in security are at risk of
overlooking security requirement, which frequently leads to the act of misuse.
This study plans to identify the security requirements and technologies being
used in IoT applications. We conducted a systematic literature review in order
to identify and analyse related literature on elicitation of security
requirements for IoT applications. We found that the most used technologies for
IoT applications are sensors, mobility networks, RFID systems, WiFi, Bluetooth
and Zigbee and the security requirements that are relevant for IoT applications
are authentication, confidentiality, integrity, authorization, access control
and availability. Finally, the characteristics and properties of the security
requirements and technologies were also discussed. It can be concluded that the
primary challenge of security requirements is to identify the most appropriate
security requirements. Furthermore, requirement engineers should consider
challenges posed by security requirements such as to analyse and develop
security requirements for IoT applications. In addition, right security
requirements for IoT applications should be recognized at the early phase of IoT
applications development. |
Keywords: |
Internet Of Things, Systematic Literature Review, Security Requirements,
Internet Of Things, Iot Technologies |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
EARLY DETECTION FOR BREAST CANCER BY USING FUZZY LOGIC |
Author: |
SHAKER K. ALI, WAMIDH K. MUTLAG |
Abstract: |
Breast cancer (BC) is one of the important general health problem in the world .
There are two types of Breast Cancer; Benign breast cancer and Malignant breast
cancer . benign state is poor growing, rarely distributed to other areas of body
and also have well- defined edges. Alternatively, Malignant point out has
inclination to expand faster which is life intimidating. So, classification of
the two state is essential for proper medical diagnosis of a breasts cancer
patient. In this paper we suggest a new algorithm to diagnosis the Benign and
Malignant cancer where each one (Benign and Malignant) has two types; Begin has
two types of tumor adenosis and phyllodes_tumor ,while Malignant has two types
also ductal_carcinoma and papillary_carcinoma. In this paper we proposed
algorithm for diagnosis the Breast cancer where our algorithm has two parts
where the first part contain from four steps; the first step is pre-processing
step, the second step is for image analysis which used wavelet transform to
analysis the images and the third step to extract benefit features which used
the results from the wavelet transform to obtain most important numbers of
features by using standard division and the fourth step is to know wither the
image is Benign or Malignant by using Fuzzy logic to know the two types ( Benign
or Malignant ). The second part is contain the classified image ( Benign or
Malignant from first part) this part is for classify the other types of Benign
(tumor adenosis and phyllodes_tumor) and Malignant (ductal_carcinoma and
papillary_carcinoma), in this part we analysis the images by using GLCM after
calculate watershed for the image to know the types of benign. For the Malignant
we calculate the colour moment (HSV) then calculate standard deviation and mean
to extract the features of each types of cancer, where these features will be as
input for fuzzy logic to give the final decision for two types of Begin
(adenosis and phyllodes_tumor) and two types of Malignant (ductal_carcinoma and
papillary_carcinoma), the results accuracy from our algorithm are 98 %. By using
the data base from http://web.inf.ufpr.br/vr/breast-cancer-database, which
contain more than 7000 images.The suggested knowledge-based system can be
utilized as a professional medical decision support system to aid doctors in the
healthcare practice. |
Keywords: |
Ductal_Carcinoma , Papillary , Adenosis , Phyllodes , Breast Cancer, Benign ,
Malignant. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
SUGGEST TRUST AS MEDIATION TO ADOPT ELECTRONIC VOTING SYSTEM IN IRAQ |
Author: |
SAMER B. ALKHAKANI, SAAD M. HASSAN |
Abstract: |
There are huge benefits that offered by e-government, which can increase the
number of users with big platform for transparency, as in this time the use of
information technology promises to revolutionize both the provision of
government services and the vibrancy of democracy. One of the solutions in many
developing and developed countries is electronic voting system (E-voting) which
can eliminate the needs for subjective recounts, fast and reliable delivery
services, with big possibility to prevent such kind of fraud, or manipulate in
results during the delivering process. The aimed of this paper is to find the
factors that involved in applying E-voting systems in Iraq. This paper explores
the impact of Trust in E-voting as mediation between electronic voting adoption
and Security, Privacy, Usability and Reliability as dependent and independent
variables are respectively. The samples conduct registered voters of six
colleges within six different provinces in Iraq by using survey, the total
sample of ‘299’ respondents participate, with the use of linear regression and
bootstrapping analysis through SPSS. The results revealed positive and
significant direct effects of the independent factors on electronic voting
adoption, while trust in electronic voting mediated independent and dependent
factors hypothesized. Overall, the paper can reveal facts for Iraqi government
about adopt an electronic voting system as a replacement for the paper-based
system to perform voting electoral operation efficiently and effectively |
Keywords: |
Trust in E-Voting, Security, Privacy, Usability, Reliability. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
OPTIMIZED HYBRID APPROACH TO SECURE TRANSMITTED MESSAGES USING THE ADVANCED
ENCRYPTION STANDARD AND THE WORD SHIFT CODING PROTOCOL |
Author: |
ABDELRAHMAN ALTIGANI, SHIRAZ NASERELDEN |
Abstract: |
In [1], a hybrid approach to secure messages using encryption and steganography
has been introduced. The methodology of the latter hybrid is to encrypt the
secret data using the Advanced Encryption Standard (AES), then hiding the
encrypted bits in the spaces of a carrier text using the Word Shift Coding
Protocol (WSCP). In WSCP, the hiding process is achieved by increasing or
decreasing the font size of the spaces in the carrier text. This hybrid has some
limitations. As an extension for [1], these limitations have been resolved.
On the other hand, compared to bare encryption, the performance remains
considerably sluggish. For instance, we need 8.87 milliseconds to hide 50
characters using this approach, were we only need 0.12 milliseconds to encrypt
the same number of characters using the AES with Counter (CTR) mode of
operation. |
Keywords: |
Textual Steganography, Encryption and Steganography Hybrid, AES, Word Shift
Coding Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
ESTIMATION ALGORITHM OF SULFATE CONCENTRATION AT THE SEA SURFACE BASED ON
LANDSAT 8 OLI DATA |
Author: |
MUHSI, BANGUN MULJO SUKOJO , MUHAMMAD TAUFIK , PUJO AJI |
Abstract: |
A model to estimate an element on the earth's surface by remote sensing
technique is known as estimation algorithm. Many researches have been conducted
to develop estimation algorithm particularly on the elements of the sea surface
using Landsat imagery data such as sea surface salinity, sea surface
temperature, total suspended solids, chlorophyll-a, etc. This study aimed to
develop estimation algorithm of sulfate concentration at the sea surface of
Madura Strait waters. Knowing the sulfate concentration at the sea surface was
very important for concrete planners to construct a mixture of concrete elements
that best matches the existing environmental conditions based on SNI 2847-2013
about the class of sulfate exposure. Besides, it was beneficial for salt farmers
as it makes them easier to know the process of precipitation of unnecessary
elements in the process of producing salts such as magnesium sulfate (MgSO4).
The algorithm was constructed using regression models both linear and nonlinear,
including multiple regressions, in which RRS NIR (Band 5) of Landsat 8 OLI as
predictor variable and sulfate as the response variable. The finding showed that
nonlinear power regression model was the best algorithm to estimate the sulfate
concentration at the sea surface than other models with error value (NMAE) 9.53%
and residue value (RMSE) 320.84. In the model which was developed, the intercept
value was 3055.5 and the slope value was 0.049. |
Keywords: |
Sulfate, Reflectance remote sensing (Rrs), Landsat 8 OLI, Estimation algorithm,
Data mining, Madura Strait |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
FOUR-PHASE PROTOCOL FOR DETECTION, DELETION, PROTECTION AND RECOVERY FROM
AUTORUN VIRUS |
Author: |
KHALID M. HOSNY, AMEER E. GOUDA, EHAB R. MOHAMED |
Abstract: |
Keeping any computing system stable is a very sentenced job, since virus
programs can easily infect any computing system via external devices such as pen
drive, floppy disk, Memory sticks, DVDs, CD ROMs, and USB devices. The auto run
virus is one of the most dangerous attacks that affect different computing
system. In this paper, a detection, deletion, protection and recovery (DDPR)
protocol is proposed. This protocol consists of four phases. The first phase of
the protocol is working toward detecting the system's infection with the virus.
If the virus is detected, the second phase of the protocol is deleting the virus
and all of its associated accessories from the system. Then the third phase is a
full protection of the computing system from possible future infection by this
virus. Finally, the fourth phase of the protocol is the process of recovering
the destroyed or tampered data/information. The proposed DDPR protocol
introduces a lightweight contribution that is represented in detecting and
preventing both autorun virus and also the DDoS attack at it’s early stages.
DDPR has been tested with different computer devices and platforms. The obtained
results clearly show that the proposed protocol is superior to all existing
algorithms and solutions. |
Keywords: |
Virus, Autorun Virus, Protection, System Maintenance, DDPR Protocol. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
DEVELOPING A NEW REGRESSION BASED MONTE CARLO FORMULA TO ESTIMATE THE COVERAGE
OVERLAPPING AREA IN WSNS |
Author: |
HAYDER AYAD KHUDHAIR, PROF. DR. SAAD TALIB HASSON |
Abstract: |
This paper aims to develop a general equation suitable for the process of
estimating the overlapping (intersection) area between any two symmetric
(homogeneous) circles. The sensor node can be represented by a circle centers on
the node position and its radius represents the coverage or the sensing range.
Many experiments are done to develop a suitable representative equation. The
first step is performed by applying Monte Carlo simulation to estimate the
circles areas and comparing their estimated areas with the mathematically
calculated areas. The results show that the simulation results are too close to
the mathematical calculations. Then Monte Carlo is applied to estimate the
overlapping area between two intersected circles. The estimated results are used
to develop a general regression equation which can be used easily in estimating
any overlapping area between any two similar circles depending on the circle
radius and the distance between the two centers. The experiments are conducted
on the two not similar (heterogeneous) circles. The results show difficulties in
developing one general equation to represent all the cases. This study helps in
developing a suitable equation for each set of two not similar circles. |
Keywords: |
WSNs, Overlapping, Coverage, Simulation, Regression and MSE. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
TOUR TIME MINIMIZATION FOR MULTIPLE UAV IN DEADLINE BASED WSN APPLICATIONS |
Author: |
ALAA TAIMA ALBU-SALIH, Dr. SAYED AMIN HOSSEINI SENO |
Abstract: |
Today, with scientific and technological advances in the field of robotics,
artificial intelligence, control and computers, land, air and sea vehicles, they
have been considered. Unmanned Aerial Vehicles (UAVs) have also significantly
improved and are very useful for many important applications in the business,
urban and military environment. One of the important uses of UAVs in Wireless
Sensor Networks (WSNs) is that these devices may not be able to communicate in
large areas due to their energy constraints. In this case, a UAV can play mobile
collectors for WSN networks. In this paper, we survey the work done towards
all of practical applications of UAVs as mobile collectors for wireless sensor
networks. We first examine the proposed UAV applications and compared their
weaknesses with each other. We also examine the technical challenges we have
about the applications of UAVs in the Wireless Sensor Network in detail.
Then, in this paper, we provide an energy efficient data gathering with a
deadline for wireless sensor networks using the UAV and a series of virtual grid
points, named virtual grid energy efficient deadline based data gathering
(VGEEDDG), to determine the optimal virtual grid points, optimal sojourn time
for deploying multiple UAVs with the minimum time required in a predetermined
deadline time to collect buffer data from cluster heads. In fact, in many
applications, especially in practical applications, the deadline is limited to
the critical level of application, and as a result, this deadline time for
collecting data is not enough, and single UAV cannot collect data from cluster
head with minimal energy. In this situation, this paper presents seven
strategies for solving the problem of inadequate deadline time is provided by
multiple UAVs for deadline based WSN applications. The results obtained in the
simulation section show that the proposed framework is able to provide efficient
data collection with satisfactory energy constraints and a deadline when
dependent on the critical level of the application. |
Keywords: |
Data Collection, Wireless Sensor Networks, Unmanned Aerial Vehicles, Mixed
Integer Linear Programming Deadline, Virtual Grid Points |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
DEVELOPMENT OF ALKIN MODEL INSTRUMENTS AS EVALUATION TOOLS OF BLENDED LEARNING
IMPLEMENTATION IN DISCRETE MATHEMATICS COURSE ON STIKOM BALI |
Author: |
GUSTI AYU DESSY SUGIHARNI, NI WAYAN SETIASIH, I WAYAN EKA MAHENDRA, I MADE
ARDANA, DEWA GEDE HENDRA DIVAYANA |
Abstract: |
This study was conducted with the main purpose of obtaining in-depth information
about the validity and reliability of Alkin model instruments used to evaluate
the effectiveness of blended learning in Discrete Mathematics courses on STIKOM
Bali. The approach of this study was instrument development research, with five
steps: 1) definition of variables, 2) translation variables into indicators, 3)
arrangement of instrument’s item, 4) test of instrument, and 5) validity and
reliability analysis of instruments. Subjects involved in this study, such as:
an expert in informatics engineering education and experts in evaluation
education involved in testing the validity of instrument contents, and as many
as 50 students who were involved to be respondents to fill out the test result
instrument of content validation by experts, so it can be obtained the
instrument validity and reliability instruments. The tools used in data
collection are questionnaires that have not been tested and photos
documentation. The technique used to analyze the validity of the instruments
contents using Gregory formula, while the technique used to analyze the validity
of instrument items using correlation formula Pearson-product moment, Techniques
used to analyze the instrument’s reliability using the formula of Cronbach Alpha
coefficient. The results of this study indicate the content validity and the
instrument’s reliability belonging to excellence criteria. Also, from the
validation of instrument items obtained 52 instrument items that remain used
because it’s valid and three instrument items are discarded because it’s not
valid. |
Keywords: |
Instruments, Alkin Model, Evaluation, Blended Learning, Discrete Mathematics |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
A REVIEW AND OPEN ISSUES OF DIVERSE TEXT WATERMARKING TECHNIQUES IN
SPATIAL DOMAIN |
Author: |
ALI A. ALWAN, SHAHIDAN M.A, NILAM NUR AMIR |
Abstract: |
Nowadays, information hiding is becoming a helpful technique and fetches more
attention due to the fast growth of using the internet; it is applied for
sending secret information by using different techniques. Watermarking is one of
major important technique in information hiding. Watermarking is of hiding
secret data into a carrier media to provide the privacy and integrity of
information so that no one can recognize and detect it's accepted the sender and
receiver. In watermarking, many various carrier formats can be used such as an
image, video, audio, and text. The text is most popular used as a carrier files
due to its frequency on the internet. There are many techniques variables for
the text watermarking; each one has its own robust and susceptible points. In
this study, we conducted a review of text watermarking in the spatial domain to
explore the term text watermarking by reviewing, collecting, synthesizing and
analyze the challenges of different studies which related to this area published
from 2013 to 2018. The aims of this paper are to provide an overview of text
watermarking and comparison between approved studies as discussed according to
the Arabic text characters, payload capacity, Imperceptibility, authentication,
and embedding technique to open important research issues in the future work to
obtain a robust method. |
Keywords: |
Information Hiding, Text watermarking, Least Significant Bit (LSB), Different
types of watermarking, Spatial Domain. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
A REVIEW OF DIGITAL FORENSICS METHODS FOR JPEG FILE CARVING |
Author: |
RABEI RAAD ALI, KAMARUDDIN MALIK MOHAMAD, SAPIEE JAMEL, SHAMSUL KAMAL AHMAD
KHALID |
Abstract: |
Digital forensics is an important field of cybersecurity and digital crimes
investigation. It entails applying file recovery methods to analyze data from
storage media and extract hidden, deleted or overwritten files. The recovery
process might have accompanied with cases of unallocated partitions of blocks or
clusters and the absence of file system metadata. These cases entail advance
recovery methods that have carving abilities. The file carving methods include
different types of techniques to identify, validate and reassemble the file.
This paper presents a comprehensive study of data recovery, file carving, and
file reassembling. It focuses on identifying and recovering JPEG Images as it is
a wildly covered in the literature. It classifies the carving techniques into
three types: signature-, structure-, and content-based carvers. Subsequently,
the paper reviews seven advanced carving methods in the literature. Finally, the
paper presents a number of research gaps and conclude a number of possible
improvements. Generally, both the gaps and possible improvements are associated
with the fragmentation problem of data files. |
Keywords: |
Digital Forensics, Data Recovery, File Carving, File Reassembling, JPEG Image |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
RECOGNITION OF CUNEIFORM SYMBOLS USING NEURAL NETWORK |
Author: |
NADA A. RASHEED, WESSAM LAHMOD NADOS |
Abstract: |
Recognition is regarded as a basic human attribute. In pattern recognition,
there are many practical applications such as: handwriting, fingerprints, face
recognition and many others. The purpose of the current work is to propose a
method is able to recognize cuneiform symbols through the use of neural network.
In order to achieve this objective, the image is loaded into the memory and the
preprocessing can be done with introduce some modifications. Then, the
attributes are extracted by finding the frequency of the on-pixels in the (50×
50) image matrix on the horizontal lines, vertical lines, the upper triangle of
the main diagonal, and the lower triangle of the main diagonal. Finally,
Backpropagation Algorithm was used in recognition with (20) hidden nodes and at
the learning rate (0.05), within a short training time. |
Keywords: |
Cuneiform, Symbols, Numerals, Recognition, Backpropagation |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
TASK SCHEDULING ALGORITHM IN CLOUD COMPUTING BASED ON MODIFIED ROUND ROBIN
ALGORITHM |
Author: |
RUBA ABU KHURMA, HEBA AL HARAHSHEH, AHMAD SHARIEH |
Abstract: |
Cloud computing offers opportunities to access remote physical and virtual
resources. Due to the continuing development of cloud computing, many challenges
face this technology. One of these challenges is tasks scheduling. It refers to
the process of allocating users’ tasks to virtual machines (VMs) with a goal of
minimizing the turnaround time and improving the resource utilization. Tasks
scheduling is considered NP hard problem with O(mn ) run time complexity to
schedule n tasks on m resources. The process of tasks scheduling consumes a
large solution space and with lacking of algorithms that can find the optimal
solution in a polynomial run time. This paper presents a review study of
various task scheduling algorithms in cloud environment including: RR, MaxMin,
MinMin, FCFS, MCT, PSO, and GA, with a case study on modified round robin (MRR)
algorithm. The MRR algorithm has been tested using CloudSim toolkit. The results
show that when using the MRR algorithm to schedule a number of Cloudlets over a
number of VMs, the average waiting of run time becomes less than when using RR
in the same environments. Thus, it is advisable to use the proposed MRR for
tasks scheduling in cloud computing, because it reduces the average waiting time
and keeps the good features of the RR such as fairness, avoiding starvation,
based on simple rule, dynamic based on CC environment situations, and suitable
for load balancing. |
Keywords: |
Cloud Computing, CloudSim, Dynamic Scheduling, Modified Round Robin, Task
scheduling, Virtual Machines. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
DOCUMENTS AND IT RESOURCES AS ESSENTIAL ELEMENT IN AWARENESS IT GOVERNANCE: AN
ANALYSIS OF STUDY |
Author: |
UKY YUDATAMA, ACHMAD NIZAR HIDAYANTO, BOBBY A.A NAZIEF |
Abstract: |
This study aims to explore and provide recommendations on the priority scale of
the elements in documents and IT resources related to the implementation of IT
Governance. Excavation of this element is done through literature studies of
articles related to IT Governance. In addition to exploring the elements
contained in IT documents and resources, this research also looks for the most
important sequence of elements, both on documents and on IT resources.
Determination of priority scale is done through the survey by using pooling
system which addressed to some respondents with criterion have credibility and
quality that can be relied upon, so that answer given can be accounted its
validity. The end result of this research is that it can give a real
contribution especially in obtaining the important elements of IT documents and
resources and give the order of priority scale as recommendation material to the
stakeholders. IT documents and resources are crucial in the implementation of IT
Governance, therefore it is necessary to raise a good awareness in the
governance as well as strict supervision of all parties involved so that the
implementation of IT Governance can achieve success according to organizational
goals. |
Keywords: |
Documents, IT Resources, Elements, Awareness, IT Governance |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
TRAFFIC SURVEILLANCE SYSTEM FOR VEHICLE DETECTION USING DISCRETE WAVELET
TRANSFORM |
Author: |
IBTISSAM SLIMANI, ABDELMOGHIT ZAARANE, ABDELLATIF HAMDOUN, ISSAM ATOUF |
Abstract: |
Detecting vehicles using image processing is a real challenge and an important
task in intelligent transportation systems (ITS). This paper presents a simple
and accurate method for detecting vehicles to inform the transportation
department in real time about vehicles information with high accuracy and
efficiency. As details, two dimensional discrete wavelet transform is used first
for extracting features from the images which has a good location property in
time and frequency domains. Moreover, road detection is proposed to determine
the zone of interest, this technique is used one time at the beginning of the
processing to solve the problem of unimportant movement of the background and
also to reduce the processing time. To detect vehicles, the Background
subtraction method is used, followed by the connected components method to
improve the results of the detection. A background update method is performed
each period of time to overcome the problem of the road conditions changes and
also the weather conditions changes. The proposed method is tested in different
videos, especially highways videos where the presented results show clearly that
the method is efficient and suitable for real-time vehicle detection. |
Keywords: |
Detecting vehicles, Discrete wavelet transform, Background subtraction,
Connected components, Road detection, Background update, Vehicles detecting. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
HUMAN IDENTIFICATION BASED ON THINNING MINUTIAE OF FINGERPRINT |
Author: |
OMED HASSAN AHMED, JOAN LU, MUZHIR SHABAN AL-ANI |
Abstract: |
The rapid growth in the development of biometric applications causes human
identification as an important issue. In addition fingerprint as a part of
biometrics leading to an efficient method of human identification. Many problems
appears in fingerprint patterns such as noisy patterns, confused patterns,
unclear patterns displacement of patterns, spread of ink … etc. The main
objective of this paper is to design and implement an efficient and effective
approach for human identification using human fingerprint. The main operation of
this approach after preprocessing is to localize and recognize the minutiae in
fingerprint image. This approach depends on the thinning operation that is so
important to prepare the image to recognize the minutiae. Good results have been
achieved via implementing this approach, where the obtained similarity ratio is
approximately 90%. |
Keywords: |
Multi-Biometrics; Human Identification; Fingerprint Recognition; Biometric
Recognition. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
AN EFFICIENT APPROACH FOR TEST SUITE REDUCTION USING K-MEANS CLUSTERING |
Author: |
MOHAMMED AKOUR, IMAN AL JARRAH, AHMAD A. SAIFAN |
Abstract: |
Software testing is the primary approach that is used to test and evaluate
software under development. The main goal of testing is to find defects before
customers find them out. It is very costly. Therefore, reducing the cost of the
test is a big challenge. This paper aims at reducing the cost of the test by
eliminating the redundant test cases. Our methodology begins with generating the
test cases randomly. The Procedural Language/Structured Query Language (PL/SQL)
tool is used to generate test cases from the payroll system database functions.
The SPSS software package is used to apply the K-means Clustering algorithm to
reduce the test cases. The results reveal that the proposed approach
significantly reduces the number of test cases from 776 to 240 while keeping the
same coverage. |
Keywords: |
Software Vulnerabilities, Software Complexity, Fault prediction, relation, code
complexity |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
THE ASSESSMENT MODEL OF LEGACY INFORMATION SYSTEM FOR PUBLIC SECTOR |
Author: |
HUMAIRATH KM ABU BAKAR, ROZILAWATI RAZALI, FATIN FILZAHTI ISMAIL |
Abstract: |
Over the last decade, the rapid development of the information and
communications technology (ICT) has increased the use of information systems in
the public sector. In a fast pace, the ICT technology has evolved and switched
to more advanced setting to fulfill the system’s intricate demand. Apparently,
some agencies in public sector are recognized to still be using an old and
outdated information system supposedly for the reason it brings high business
value. System with such circumstances is known as Legacy Information System
(LIS). However, maintaining LIS involves such significant technical problems.
Legacy systems are hard to maintain. There are only a few experts who understand
the system, with no much proper documentation prepared, requiring high
maintenance costs. This triggered the agencies to come with a decision in
determining the appropriate action towards the LIS implementation. This paper
therefore aims to address this concern by providing guidance in assessing the
LIS and suggesting the befitting response in a form of a model based on the
identified evaluation factors. This study adopted qualitative approach, which
incorporates the theoretical and empirical phase. The theoretical phase is
conducted by analysing existing literature of the information system assessment
models and methods which are the ISO 25010, ISO 25012, Hierarchical Model and
Renaissance Method. The empirical is conducted by employing interviews with
informants that involved in the use of LIS. Data from the theoretical and
empirical study were analysed using content analysis. The model then was
validated by selected experts that are experienced in the business and technical
of the public sector. The model combines three aspects; namely the
business-value, technical quality and organisational aspects. This model
contributes as references for the management people in assessing the LIS for the
public sector. |
Keywords: |
Legacy Information Systems; Legacy Information Systems Evaluation Models; Legacy
Information Systems Evolution |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
MODEL FOR DECISION-MAKING PROCESS WITH BIG DATA |
Author: |
BELKACEM ATHAMENA, ZINA HOUHAMDI |
Abstract: |
Currently, Big Data is an important concept due to the pervasive use of
electronic devices, computerization, and information sharing worldwide. Despite
the focus on Big Data, studies lack an explicit definition of the Big Data
concept. Big Data is assumed to present natural solutions to government and
private sectors, but the practical results of Big Data in other sectors are
still unknown. This paper discusses Big Data concerning two perspectives:
decision-making process and knowledge creation theory. The main finding of this
investigation is that Big Data represents an exceptional source to generate new
knowledge that supports the decision-making process in companies. |
Keywords: |
Decision Support System, Business Intelligence, Big Data, Decision-Making |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
A CONCEPTUAL FRAMEWORK FOR DETERMINING THE SUCCESS FACTORS OF E-LEARNING SYSTEM
IMPLEMENTATION USING DELPHI TECHNIQUE |
Author: |
DR. MOHAMMED AMIN ALMAIAH , DR. AHMED AL MULHEM |
Abstract: |
Several obstacles face the successful implementation of e-learning systems, and
one of the most important of these is user acceptance of the system. This
research investigated the critical factors that lead to successful
implementation of e-learning systems. We used the Delphi technique to obtain
consensus from expert respondents about the most critical factors that will
contribute to successful e-learning implementation at Saudi Arabian
universities. We then used these results to create a framework that highlights
11 critical factors grouped into four domains that cover website quality,
technology options, top management support, and e-learning awareness by academic
faculty and students. The results of this research will help designers,
developers, and decision-makers to better understand the most important
guidelines for a successful development of an e-learning system. |
Keywords: |
E-Learning System Implementation; Success Factors; Delphi Technique; Saudi
Arabia |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
ARTIFICIAL NEURAL NETWORK BASED UNIFIED POWER QUALITY CONDITIONER FOR POWER
QUALITY IMPROVEMENTS OF DOUBLY FED INDUCTION GENERATOR |
Author: |
kaoutar RABYI, Hassane MAHMOUDI |
Abstract: |
To reduce the mathematical operations and different transformations, the
artificial neural network (ANN) approach is proposed for the unified power
quality conditioner (UPQC). This paper proposes a voltage source inverter (VSI)
based UPQC with ANN controller when a Doubly Fed Induction Generator (DFIG) is
connected to the grid. The performance of UPQC with ANN controller is tested
under different sag, harmonic and swell conditions, the algorithm used for the
ANN control is Gradient Descent with Momentum to generate the referencing
signals and maintain the UPQC dc link capacitor voltage. The simulations are
carried out in the software Matlab/Simulink. Results shows efficiency of the ANN
control strategy in compensating currents and voltages of the system. |
Keywords: |
DFIG, UPQC, ANN, Sag, Swell, Harmonic |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
EFFECT OF FEEDBACK CHANNEL DELAY ON IMPROVED JOINT CARRIER SCHEDULING FOR
HETEROGENEOUS SERVICES BASED 5G LTE-ADVANCED NETWORKS |
Author: |
HAITHAM S BEN ABDELMULA, M. N.MOHD WARIP, ONG BI LYNN, NAIMAH YAAKOB |
Abstract: |
5G Long Term Evolution-Advanced (LTE-A) network based Carrier Aggregation (CA)
technique is a promising next generation of all IP mobile networks. The CA
technique is very vital to support the 5G LTE-A network with unprecedented speed
of data transmission and minimal latency. In order to support and meet the user
level Quality-of-Services (QoS) obligations for diversified services “Real-Time
(RT) and Non-Real-Time (NRT) traffic”, one of the main challenges in the
presence of CA is to offer robust and suitable resource scheduling scheme. For
each transmission, the Channel Quality Information (CQI) for individual wireless
channel is sent back to the base station eNB, which is used for selecting the
suitable modulation and coding scheme. However, prospect delays in the reception
of such CQI may lead degradation in QoS performance due to a mismatch between
CQI and current channel state at the eNB. This paper, proposes an Improved Joint
Carrier Scheduling (IJCS) algorithm which optimizes the performance of
User-Level Quality of Service in 5G LTE-A system. The IJCS scheme is more
suitable to various traffic users by introducing the service weight factor. As
for different feedback delays, both carrier scheduling algorithms namely, JCS
and IJCS scheme’s metrics were computed in order to achieve the user quality of
service (QoS) and equitable allocation of radio resources among users.
Furthermore, a comparison between these schemes metrics was done under different
feedback delays to select the best one that can satisfy the user-level QoS
constraints. Simulation outcomes demonstrate that the proposed IJCS scheme has
achieve the QoS demands for real-time users and fulfils the user’s throughput
requirements of NRT streaming video. |
Keywords: |
5G, LTE-Advanced, Carrier Aggregation (CA), IJCS, QoS, OFDMA, Service Weight
Factor, Feedback Delays |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
Title: |
BALINESE PAPYRUS MANUSCRIPT IMAGE SEGMENTATION USING DBSCAN CLUSTERING METHOD |
Author: |
AYU WIRDIANI, SURYA SUKMA, OKA SUDANA, SUAR WIBAWA |
Abstract: |
Papyrus Manuscript is handwritten in the form of an ancient script and written
using Balinese script. Existence of Balinese Papyrus Manuscript in Balinese’s
life is scarce. Today’s young generation almost left Balinese Papyrus Manuscript
because of its complexity and difficult to understand. This traditional
manuscript used Balinese Letters, which had some unique characteristics and
patterns. This unique characteristic could identified using image processing
technologies, which presented in this research. Segmentation on Balinese Papyrus
Manuscript image is to get Balinese script letter object. The result of
segmentation process would be used to helped recognized Balinese Letters by its
features, with a computer-based application. Segmentation of the Balinese
Papyrus Manuscript image used DBSCAN clustering method. This research consist of
three steps. First step was image acquisition. The second step was image
pre-processing. The last step was segmentation process using DBSCAN clustering
method. The average success rate of segmentation process reached 78.8% with
21.2% error rate. The average of excecution time when the testing process
reached 27.227 seconds. |
Keywords: |
Balinese Papyrus Manuscript, Balinese Script, Image Segmentation, Clustering
DBSCAN, Image Acquisition. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2018 -- Vol. 96. No. 17 -- 2018 |
Full
Text |
|
|
|