|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
October 2018 | Vol. 96
No.19 |
Title: |
THE TRANSITION FROM 4G TO 5G BY EMPLOYING FEMTO CELLS PROVEN THROUGH DATA RATE,
PLR AND DELAY |
Author: |
HAIDER ABDUL HASSAN HADI AL KIM, MAGHRIB ABIDALREDA MAKY ALRAMMAHI |
Abstract: |
This paper introduces the generation five of the mobile systems (5G) utilizing
of Femto cells in a single Macro cell of a 4G mobile network. By using three
schedulers (Proportional Fair (PF) and its updated version Exponential PF
(EXP/PF) besides Maximum Largest Weighted Delay First (MLWDF)), the suggested
system has examined three sorts of traffics: Video, VoIP and Best Efforts BE. An
enhancement on the overall system moving from 4G to 5G has been shown in the
results by adding Femto cells to the main Macro cell. Data rate, packet loss
ratio PLR, latency and radio resource allocation fairness are the main
parameters that the overall system is judged based on. The simulation findings
show that the overall system evaluation is as this: delay and PLR are degraded
to decline towards 5G and data rate is boosted even while the number of the
system’s users is increased. Moreover, fairness in allocating radio resources is
also achieved proven through fairness index. So it is counted as one of the
efficient methods to introduce the 5G environment where proven through the
increment in the data rate, the breadth of the coverage and the reduction in the
latency [1]. |
Keywords: |
4G, 5G, LTE-Sim, Macro, Femto, Schedulers, RRM, Data Rate, PLR, Delay &
Fairness. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
MEASUREMENT OF E-LEARNING SUCCESS WITH ADOPTING THE DELONE & MCLEAN MODEL
(UNIVERSITY STUDY CASE IN SOUTH JAKARTA) |
Author: |
SUGI PRINGGANDANI, ALBERT ANTONIO TANUWIJAYA, ANDYLESMANA, SUMONO, WILLIEM,
JAROT S.SUROSO |
Abstract: |
Many universities nowadays have been trying to implement an integrated
information system, such as automated scheduling and e-learning, to provide
added value for students and efficiency in the business process. A university
located in South Jakarta has implemented an integrated system with e-learning
portals for lecturers and students, but the success of the information system
implementation has never been measured. As we know, the investment of
information systems implementation could cost a lot of resources, time, and
cost, which makes the measurement of the success of information systems a very
important thing to do. The aim of this research is to measure the success of the
e-learning system that was implemented in the university using the updated
DeLone and McLean IS Success model (2003), with the objective to understand
whether implementing an e-learning model really helped produced organizational
benefits in the university such as good corporate image, and also to understand
whether or not the updated DeLone and McLean IS Success model could really be
used to assess the success of implementing e-learning in the university. |
Keywords: |
D&M IS success model, e-learning, education, university |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
E-LEARNING ACCEPTANCE ANALYSIS USING TECHNOLOGY ACCEPTANCE MODEL (TAM) (CASE
STUDY: STMIK MIKROSKIL) |
Author: |
ANGELA, CHATRINE SYLVIA, HANDOKO, EDI ABDURACHMANE-learning system is one of
technology that can increase the competitiveness of STMIK Mikroskil. E-learning
system usage will be less than optimal if students refuse or cannot use the
system. Therefore, an understanding of student acceptance behavior toward the
system is also important in order to improve online learning environment. This
study measures the acceptance of e-learning system using the extended Technology
Acceptance Model (TAM). This study aims to determine the relationship between
self-efficacy, subjective norm, and experience as exogenous constructs to
perceived ease of use and perceived usefulness as endogenous construct followed
by testing to determine the relationship between perceived ease of use and
perceived usefulness toward behavioral intention to use on e-learning system
usage in STMIK Mikroskil Medan. Questionnaire data was collected from 354 active
students and analyzed with structural equation modeling (SEM) using AMOS 24. The
result of this study showed that self-efficacy, subjective norm, and experience
has significant positive effect on perceived ease of use. Perceived ease of use
has significant positive effect on perceived usefulness. Perceived usefulness
has significant positive effect on behavioral intention to use, but perceived
ease of use has no significant effect on behavioral intention to use. This
finding improves the understanding of student acceptance behavior toward
e-learning system that can help improve the service of STMIK Mikroskil
e-learning system and can be used as reference for doing other similar research. |
Abstract: |
E-Learning, Perceived Ease of Use, Perceived Usefulness, Structural Equation
Modeling, Technology Acceptance Model |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
LANDSCAPE PLANNING AND ECONOMIC VALUATION OF MANGROVE ECOTOURISM USING GIS AND
GOOGLE EARTH IMAGE |
Author: |
S.T.P. AMBARITA, M. BASYUNI, 1N. SULISTYONO, R. WATI, 1A. FITRI, B. SLAMET, T.
BALKE, P. BUNTING, E. MUNIR |
Abstract: |
Ecotourism is an alternative for development and management of forest area that
is expected to provide sustainable economic, cultural and social benefits to the
surrounding community. The central components of ecotourism are the landscape
and the people. This study aims to create spatial planning of mangrove
ecotourism through the exploration of landscape potential in the form of
biophysical element and to evaluate recreational and socioeconomic values of
Bakau Mas Ecotourism, in Lubuk Kertang Village, Langkat Regency, North Sumatra,
Indonesia. Travel cost method (TCM) was used to evaluate the economic value of
ecotourism. The ecotourism planning activities comprise of the potential
inventory, analysis, synthesis, concept planning, and create the design of the
site using geographic information system (GIS) and Google Earth Image (GEI).
Landscape planning was developed through the spatial distribution of mangrove
forest ecotourism areas. To obtain the socioeconomic values, 51 questionnaires
were collected from the visitors. The ecotourism area is provided with 42.20 ha
and 11.46 ha of buffer area. The area is equipped with land routes such as
trails and boardwalk about 3,628.89 meters and waterways about 1,721.23 meters
was the access to interpret the mangrove ecosystem. The economic value of Bakau
Mas ecotourism area was IDR 55,002,604.00/year (USD 3,929). These results
indicated that the willingness to pay was decreased by increasing the entrance
fee. The models estimated that the optimal ticket price was IDR 16,000.00/person
(USD 1,14). |
Keywords: |
Mangrove forest, Ecotourism, Landscape planning, Travel cost method,
Socioeconomic value |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
ENHANCED MAC WITH DELAY AWARE MULTIPATH ROUTING (EMAC – DAMR) MECHANISM FOR
QUALITY OF SERVICE IN MOBILE AD HOC NETWORKS |
Author: |
V. SATHISH, DR.V. THIYAGARASU |
Abstract: |
Mobile ad hoc networks (MANETs) is a kind of wireless network which can be
deployed anywhere, anytime. Its applications extend its wings to larger extent
and there exists a vast research scope for ensuring Quality of Service (QoS). In
this research work, an Enhanced (Medium Access Control) MAC with Delay Aware
Multipath Routing (EMAC – DAMR) Mechanism for Quality of Service in MANETs has
been proposed. Certain enhancements are made with the conventional MAC in terms
of remaining time, packet transmission delay and usage of Erlang factor.
Simulations are conducted using NS3, and the performance metrics such as
throughput, packet delivery ratio, delay, overhead and packets drop are taken
into account for analysing the performance of the EMAC-DAMR. EMAC-DAMR has been
compared with existing routing solutions and the results significantly prove
that EMAC-DAMR attains better throughput and packet delivery ratio. Also,
EMAC-DAMR reduces the packet delay, number of packets drop and overhead packets. |
Keywords: |
MANET, Wireless Link, Throughput, Packet Delay, MAC. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
COMPARATIVE STUDY OF PARALLEL IMPLEMENTATION FOR SEARCHING ALGORITHMS WITH
OPENMP |
Author: |
RENEA CHOWDHURY SHORMEE, RAVIE CHANDREN MUNIYANDI, DIP NANDI |
Abstract: |
Investigating the multi-core architecture is an essential issue to get superior
in parallel reenactments. However, the simulation highlights must fit on
parallel programming model to build the execution. The main goal of this
research is to choose and evaluate parallelism using OpenMP over sequential
program. For this purpose, there is a portrayal of two searching algorithms. The
calculation is to discover the next edge of Prim's algorithm and single source
shortest way of Dijkstra's algorithm. These two algorithm actualized in
sequential formulation. Parallel searching algorithms are then implemented in
view of multicore processor. The speed-up ratio and efficiency of parallel
searching algorithms are tested and investigated in SGEMM GPU Kernel performance
dataset with 241600 records and 18 attributes. Results show the dataset with
different data sizes achieved super linear speed-up ratio and efficiency on
OpenMP by running on 4 cores processor and reduction of the running time over
sequential program. More importantly, the new implementation drastically
decreases the time of execution for thread 8 for Prims algorithm from 5.16ms to
1.48 ms for Dijkstra algorithm. Parallel calculation is impressively powerful
for huge graph size. General outcome shows that multi-threaded parallelism is
exceptionally successful to accomplish better performance for dataset based on
searching algorithms by separating the primary dataset into sub-datasets to
increase diversity on arrangement investigation. |
Keywords: |
Sequential programming, Parallel programming, Prim’s, Dijkstra’s, OpenMP |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
PREDICTING THE SUCCESS RATES OF SCHOOLS USING ARTIFICIAL NEURAL NETWORK |
Author: |
AHMED SUBHI ABDALKAFOR, AIMAN MAJID NASSAR, MUSTAFA NADHIM OWAID |
Abstract: |
The Prediction is one of the most important and prevalent topics recently. It is
an estimation of what will occur in the future depending on the data obtained
previously. In this paper, a model was proposed to predict the success rates of
schools neural networks approach. The proposed model was trained and tested by
taking the data from General Directorate of Education in Anbar for the academic
year 2016-2017 then divided into two equal groups (male and female). Physics and
Chemistry subjects are considered the main influent on the success rate after
applying the Garson technique. It was obtained a real equation that can be used
to predict future success rates for all other educational institutions with
regression for Training, Validation and Testing reached to 95.161%. |
Keywords: |
Artificial neural network, Prediction, Success Rate, Regression |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
MULTIPLE MODELS OF BINARY-SUPPORT-VECTOR-MACHINE FOR FACE VERIFICATION USING
HISTOGRAM ORIENTATION GRADIENT FEATURES |
Author: |
MUSTAFA GH. SAEED, 2MAYSOON M. AZIZ, FAHAD LAYTH MALALLAH, BARAA T. SHAREF |
Abstract: |
In the past decade, face recognition is considered as an important biometric
type due to its wide applications in practice in terms of authentication. The
verification process of a human face is not trivial task especially different
face poses are captured to be matched. In this paper, an efficient algorithm for
face recognition is proposed. In the beginning, the step is starting by
capturing the image of the face, then applying some preprocessing operations,
after that feature extraction is applied, which is exploiting Histogram
Orientation Gradient (HOG) to build the most representative feature vector for
each digital image of the face. Next, the feature vector is passed into binary
Support Vector Machine classifier (SVM) to construct a binary-SVM model for one
individual in order to either accept or reject this individual. In this
research, multiple models of binary-SVM are utilized in this methodology, in
which for each individual has its own SVM model, which is deemed as the
contribution of this paper. Set of experiments have been conducted to estimate
the accuracy and performance of the proposed algorithm by using ORL database,
which has 400 images face captured from 40 users each user has 10 different
images as variant possess lighting, etc. The result has given accuracy up to
99.23% as successful rate coming from both error types: False Accept Rate (FAR)
is 0.25 % and False Reject Rate (FRR) is 0.52 %. |
Keywords: |
Face Recognition and verification, Biometrics, Histogram Oriented Gradient
(HOG), Support Vector Machine (SVM). |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
MODELING OF INFORMATION QUALITY MANAGEMENT IN MALAYSIAN PUBLIC SECTOR: A PLS-SEM
APPROACH |
Author: |
ERIZAMSHA HASSAN, ZAWIYAH M. YUSOF, KAMSURIAH AHMAD |
Abstract: |
In every organization, the importance of information is undeniable since it
exerts prominent effects on all internal activities, ranging from
strategy-devising to operational exercises. In the absence of high-quality
information, an organization will not be able to adopt sound resolutions, which
in turn squander opportunities and augment business risks. For decision-making
processes, efficient and effective management of information is needed in order
to make the same readily accessible as well as up to date. The aim of this
research was to devise a model on information quality management with respect to
the factors that had an impact on the quality of information. As such, there was
a need to first evaluate the relationship of the aforementioned factors with
information quality. A questionnaire was utilized to obtain quantitative data
from Malaysian public organizations. There were 273 respondents (response rate:
63.5%) responses for which the data was assessed via partial least squares
structural equation modeling (PLS-SEM). The findings show that top management
commitment, policy, training, record and information management, employee
involvement, continuous improvement, teamwork, customer focus, innovation, and
information supplier management are capable of acting as a predictor for the
information quality products managed in organization. However, benchmarking,
employee empowerment, and reward are found incapable to act as a predictor for
information quality. Apart from being suitable for use as a source of guidance
in organizational implementation and evaluation of information quality, these
results could improve the information quality management measures as well, which
in turn enhances service-delivery, particularly in public organizations. |
Keywords: |
Information Quality; Information Quality Management; Information Management;
Information System; Information Assets |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
A NEW MODEL OF ARABIC HANDWRITTEN ECOGNITION USING COMBINATION BETWEEN DWT WITH
DATA REDUCTION METHOD |
Author: |
Dr. ANWAR YAHYA EBRAHIM, Dr. ASMAA SHAKER ASHOOR |
Abstract: |
The objective of this research was to improve an automatic writer recognition
technique for off-line Arabic handwritten text. This objective was met by
developing a new method which not only addressed the problems in existing
techniques but also realized better outcomes than the current solutions on this
issue. The projected method is based on Discrete Wavelet Transform (DWT) to
extract feature. Also important features for Arabic handwritten alphanumeric
character recognition to aid the verification step. This scheme involves of four
phases: preprocessing, feature extraction, important features and finally
writing recognition. Important features are constructed by data reduction
method. After collecting all important features of each character. To recognize
fonts, which improves the classification performance. Then decision tree
classifier was used for writing recognition. In this paper provide good accuracy
dealing with important attributes. The suggested ideal is fast and reliable. The
proposed technique has been achieved very promising results, with a validation
accuracy of 98.45% for HACDB database. |
Keywords: |
Discrete Wavelet Transform (DWT), Data Reduction Method, (DT) Decision Tree
Classifier, Writing Recognition |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
HYBRID E-GOVERNMENT FRAMEWORK BASED ON CLOUD COMPUTING AND SERVICE ORIENTED
ARCHITECTURE |
Author: |
ABDEL NASSER H. ZAIED, ASMAA H. ALI, HAITHAM A. EL-GHAREEB |
Abstract: |
The increase use of E-Government is a challenge goal for many governments.
Through E-Government, an interactive service can be provided to the citizens and
businesses. Due to citizens consciousness of internet, E-Government allows
citizens to entrance governmental services, information and participate in
governmental decision-making process. However, many challenges may prohibit the
success of E-Government that may lead to the failure of e-government. Most
important of these challenges include shrinking of budgets, increasing of the
demand for services, unqualifying of the human resources and changes of
scalability demands. Cloud Computing offers more choices to help in implementing
and improving E-Government and creating new business and jobs opportunities.
Nowadays Cloud Computing and Service Oriented Architecture (SOA) are becoming
ubiquitous, the main goal of this research is to propose a Cloud Oriented
E-Government Architecture based on Cloud Computing and Service Oriented
Architecture that enables citizens to obtain governmental services easily and
efficiently regardless the time and geographical barriers. To verify the
proposed framework and study the successful implementations, CloudSim simulator
was used. The results show that the proposed framework is a powerful framework
for E-Governments that provides reusability and discovery of government services
and provides solutions to some cloud computing issues. |
Keywords: |
Cloud Computing, E-Government, Service Oriented Architecture (SOA), Hybrid
E-Government Framework. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
EVALUATION OF CRITICAL SUCCESS FACTORS FOR BUSINESS INTELLIGENCE SYSTEMS USING
FUZZY AHP |
Author: |
ABDEL NASSER H. ZAIED , MOHAMED O. GRIDA , GAWAHER S. HUSSEIN |
Abstract: |
Business intelligence systems (BIS) play an important role in organizations
through enabling managers and decision-makers to make accurate, timely and
relevant decisions to increase the productivity and profitability of their
organizations. To be able to consolidate resources, the prioritization of
critical success factors (CSFs) need to be determined. This study articulated
sixteen CSFs of BIS based on the previous researches and classified them into
four categories. To find out their relative priorities, Fuzzy Analytic Hierarchy
Process (FAHP) has been used. Twelve BI experts were asked to pairwise rank the
success factors of business intelligence system to conclude that organizational
and technological should be the top priority for BIS projects. In addition, that
top management support, proper BI vendor selection and adequate resources
availability are more important than the other thirteen factors. |
Keywords: |
Business Intelligence System, Critical Success Factors, Fuzzy Analytic Hierarchy
Process. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
RECOGNITION NORMAL AND ABNORMAL HUMAN ACTIVITIES BY IMPLEMENTATION K-NEAREST
NEIGHBOR AND DECISION TREE MODELS |
Author: |
WALA A N. JASIM, ESRA J. HARFASH |
Abstract: |
Recently the advancement of technology has led to develop human activities
recognition (HAR) system in video. HAR system is one of the important fields in
computer vision (CV) . This paper presents a system for helping people who
suffer from health problems and are stayed alone for long times especially the
elderly , by recognizing three normal activities : (walking , drinking and
eating) and six abnormal activities : (headache , vomiting , fainting , renal
colic , intestinal colic , angina ) from videos monitoring that are chosen from
the daily life activities of elderly people . In this paper, we proposed
iterative thresholding (global thresholding) to subtract background from
foreground, and utilized four different features of extraction techniques
:(Radon Transform , DWT , SURF and STIP ) . Finally, K-Nearest Neighbor (KNN)
and Decision Tree (DT) are used to classify normal and abnormal activities in
video . When the system recognizes any abnormal activities, the alarm system is
activated by sending SMS email to the person who is concerned with the status of
the patient. The system evaluates (Radon Transform , DWT , SURF and STIP ) with
K-NN and DT . LDA is used to select the best features from the four feature
extraction techniques and PCA is used with DWT and SURF to apply dimension
reduction to obtain the best results. In addition , this paper presents the
combination between ( STIP & Radon Transform) and (STIP & SURF) in order to rise
the evaluation of the STIP technique and others features extraction techniques
with DT. After combination, the performance of combined techniques was improved. |
Keywords: |
Human Activity Recognition(HAR),Normal and Abnormal Activity, Feature Extraction
, Classification, K-NN and DT. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
AN IMPROVED RESCHEDULING AND FAULT TOLERANCE WITH TCSA FOR PERFORMANCE
IMPROVEMENT IN COMPUTATIONAL GRID |
Author: |
S GOKULDEV, ANAGHA P, SUJANA SAGAR S J, AKSHATHA TANTRY H |
Abstract: |
Fault tolerance is one of the major challenges during fault occurrence in any
computational environment. Since, computational grids provide access to huge
pool of shared processing power, the chances of fault occurrence are high. The
proposed system is focused on performing job scheduling using Two Choices
Scheduling Algorithm (TCSA) with tolerating the faults that occur during the
process. Job allocation is done with the help of grid system consisting of
resource broker and GIS. Once, the faulty resources are identified, scheduler
analyses the load of remaining idle resources and reschedules the faulty jobs to
the new set of resources which currently has the least load. A comparison is
done between Round Robin algorithm and TCSA before and after incorporating fault
tolerance. It is observed that the time taken for the completion of allocated
tasks has been minimized after the implementation of improvised TCSA
incorporating fault tolerance. The work focuses on tolerating the faults that
are occurred during task allocation and performs rescheduling by reallocating
the tasks to different resources which helped the system to obtain significant
results while the system is exposed to high loads. |
Keywords: |
Average Utilization, Computational grid, Fault Tolerance, Improvised TCSA,
Rescheduling |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
MALICIOUS URL CLASSIFICATION SYSTEM USING MULTI-LAYER PERCEPTRON TECHNIQUE |
Author: |
MOHAMMAD FAZLI BAHARUDDIN, TENGKU ADIL TENGKU IZHAR, MOHD SHAMSUL MOHD SHOID |
Abstract: |
Currently web-based applications, such as online shopping, education and web
based discussion forums are popular. The employments of these applications have
successfully assist organizations to stay competitive. Nevertheless, most of
website developers are using Content Management Systems (CMS) as a platform to
build a website. CMS provides third party plug-in in which this services has
lack of control. CMS is designed to enable non-technical user with less
knowledge on computer programming, graphics imaging tools, or markup language
like HTML to develop their own website. The drawbacks that were highlighted when
using CMS are software and operating systems are patched for security threats.
Due to lack of patching by the user, hackers can use unpatched CMS software to
exploit vulnerabilities to enter the website or web based application. This is
the evident of exposing web application to cyber security risks such as
malicious Uniform Resource Locator (URL). Meanwhile, malicious URL is the URL of
a website that attempts to do the illegal activities on the client side.
Furthermore some malicious URL can embed the malicious scripts into the web
pages and exploit the vulnerabilities when the user browses such websites. This
study is a baseline of measuring the effectiveness of identifying Malicious URLs
by using Multi-Layer Perceptron Technique. The identification of malicious URL
will be beneficial to web developer to improve the security of web based
application. It is then assisting the user or organizations to access the
websites without hesitate and doubt. By providing the necessary result and
outputs of the effectiveness, this information can be used either for future
research of any machine learning techniques. |
Keywords: |
Malicious URL Classification, Multi-Layer Perceptron, Content Management System,
Web-based Application, Web Vulnerability |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
SCHEDULING FOOD INDUSTRY SYSTEM USING FUZZY LOGIC |
Author: |
ANAS BLASI |
Abstract: |
In todays food industry, regardless if it is fast food or a sit down restaurant,
wait time has a huge effect on customer satisfaction. It has been empirically
proven that different firms compete with one another based on how fast their
service is and it is also very well known in the food industry community that
customers value speed of service highly and weigh it heavily when deciding who
the preferred provider is. This paper presents a scheduling food industry using
fuzzy based control system and focuses on determining the number of the ovens
and workers needs for a certain job in food manufacturing system specially the
pizza production industry. The reduction in money waste, increase in customer
satisfaction, and the increase in the quality of the service were considered in
this paper. Matlab software was used for the implementation stage and code was
developed to achieve the final results. |
Keywords: |
Fuzzy Logic, Fuzzy Inference Systems, Control Theory, Artificial Intelligence |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
HYBRID HOMOMORPHIC CRYPTOSYSTEM FOR SECURE TRANSFER OF COLOR IMAGE ON PUBLIC
CLOUD |
Author: |
HAIDER M. AL-MASHADI, ALA A A. KHALAF |
Abstract: |
Cloud computing is a model of advanced computing that has an important impact on
information technology and provides access to the shared digital resources that
existed in cloud servers by using Web services. Great benefits for users through
cloud computing such as social networking, banking, finance, storage, e-mail,
and many features related to flexibility, ease of use and reliability with high
performance and low cost. On the other hand, cloud applications and information
are vulnerable to security breaches by unauthorized parties as a result of the
shared and online resource environment, which requires protection through
appropriate policies, techniques and controls to protect published data,
applications, infrastructure and related components of cloud computing. This
paper presents three efficient hybrid homomorphic encryption techniques for
image encryption to ensure the safe exchange of private images in the public
cloud based on the block pixel position. The proposed techniques are constraint
on El-Gamal and Enhanced Homomorphic Cryptosystem (EHC). Many methods of
security analysis have been implemented on proposed techniques which used many
types of images with many experiments. The results showed that our methods are
very invulnerability and efficient in terms of security and time compared with
El-Gamal and EHC schemes, because they take the good characteristics of El-Gamal
and EHC methods like very good security and small run time executions. |
Keywords: |
Cloud Computing; El-Gamal cryptosystem; Homomorphic Encryption Cryptosystem;
Enhanced Homomorphic Cryptosystem; Cryptography. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
A THIRD-ORDER FORMATIVE MODEL: AN EMPIRICAL INSIGHT FROM SME’S WEBSITE INTERFACE
QUALITY IN WEST SUMATERA, INDONESIA |
Author: |
RATNI PRIMA LITA, MEUTHIA MEUTHIA, RANNY FITRIANA FAISAL, RAHMAT HIDAYAT, SARI
SURYA |
Abstract: |
E-commerce has created an idiosyncratic role for Small Medium Enterprises (SMEs)
in order to pursue the global market. While the perceived advantage to maximize
the potential of E-commerce, SME’s innovation in adopting e-commerce through
website remains constant in developing countries. The main impetus of this study
is to analyze the effect of the website interface quality and online trust
toward website revisit intention in West Sumatera, Indonesia. This present study
proposed a comprehensive model of website revisit intention through a
third-order level of multidimensional construct using first-order reflective,
second and third-order formative. Website interface quality was formed by four
dimensions, which are information quality, system quality, service quality, and
design quality. Each of dimensions consists of two elements, including content,
communication, ease of management, accessibility and speed, customization,
emotion, clarity of layout, and usability respectively. Subsequently, online
trust also measured by five dimensions including perceived ease of use,
perceived usefulness, privacy and security, perceived enjoyment of technology,
and company competence. Data were collected using a questionnaire survey from
135 customers of the SME’s embroidery in West Sumatera. Non-probability sampling
was employed by convenience sampling technique during data collection. The
result of this study revealed that both of hypotheses proposed were accepted.
Empirical findings reported that website interface quality has a significant
effect on online trust which in turn leads to website revisit intention. The
afterward research will provide a valuable insight for further research and
practical implication. Consequently, there is a need for more efforts on
increasing SME’s awareness to transform their way in doing business by website
usage. |
Keywords: |
SMEs innovation, website interface quality, online trust, website revisit
intention, third order level, reflective, formative |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
EMPIRICAL VALIDATION OF COUPLING METRICS FOR OBJECT-ORIENTED SYSTEM |
Author: |
MUKESH BANSAL , CHAITANYA PURUSHOTTAM AGRAWAL |
Abstract: |
The Object oriented design metrics can be used to make quality management
decisions. The objective of this study is the examination of the connection
among object-oriented design metrics. We made a survey and analyzed various
object oriented metrics available in literature. We have proposed three new
object oriented metrics viz. Attribute Interface Coupling, Method Interface
Coupling (MIC) and Design Complexity to measure coupling. The new metrics shall
help in measuring complexity of design at early stage based on coupling,
designing object-oriented code as well as improve its quality by removing the
anomalies and redundancy from code. These metrics have been validated by using
six java based projects of different application areas. The empirical validation
proves the significance of the proposed metrics. |
Keywords: |
Coupling Metrics, Object-Oriented System, MOOD, CK, Complexity, Interface
Coupling |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
COMPARATIVE STUDY AMONG SOBEL, PREWITT AND CANNY EDGE DETECTION OPERATORS USED
IN IMAGE PROCESSING |
Author: |
AHMED SHIHAB AHMED |
Abstract: |
It is a fundamental process in image processing. The edges include a great deal
of the information in the image. The edges give information about the locations
of the objects, their shapes, their sizes and information concerning their
texture.in this paper, three edge detection algorithms namely Sobel, Prewitt and
Canny edge detection techniques that are used in different images to extract
edges. Analyzing the Performance factors are done in the terms of time interval
and accuracy on the premise of Mean Squared Error (MSE) and Peak signal to Noise
Ratio (PSNR). C# is employed for edge detection. The experimental results shows
that canny edge detection technique results higher than Prewitt and Sobel edge
detection techniques. |
Keywords: |
Edge Detection, Image Processing, Sobel, Prewitt, Canny, PSNR, MSE. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
COMPUTATIONAL ANALYSIS OF EFFICIENT ENVIRONMENTAL STRATEGIES FOR SMART CITIES
DEVELOPMENT |
Author: |
ANTON PITONAK, MARTIN LOPUSNIAK, MILOSLAV BAGONA |
Abstract: |
The existing housing stock offers a large potential for the future. The housing
stock of the mass construction is located mainly near downtowns or at their
outskirts. Internet network, road network, urban mass transportation, social and
cultural services, civic amenities, sports grounds, rest and relaxation zones
are established in these residential districts, housing estates. All social
strata of residents reside in city districts. The trend during the last 20 years
shows that people move from cities to their suburbs. We cope with problems
related to civic amenities, transportation, sewerage and water supply networks
or internet connection in suburbs. Residents of suburbs work in cities, so they
must commute to cities for work, and spent many hours in means of transport,
there are no sufficient parking places for them, they produce excessive quantity
of CO2 emissions, which is not smart. On the basis of the aforementioned
factors, a residential district with the existing housing stock and its
renovation in comparison with the individual housing construction at suburb was
selected for subject of the case study. In this case study, we focused on
obtaining the information and solution of three components creating a smart
city, namely: smart energy, smart mobility, and smart economy. These three
components were verified in the study by comparison of two areas in the SR. One
area is located in the downtown, existing city district in the City of Kosice.
The second area is located 11 km from downtown, and it is the suburb. These two
areas were compared taking into account energy, environmental and economic
demandingness. Primary energy and CO2 emissions were solved in energy
assessment. The quantity of primary energy and CO2 emissions was calculated as
the total quantity and specific quantity related to the measure unit. In order
to take into account the number of residents residing in areas of interest, a
new coefficient has been introduced, namely the population number coefficient
(KPO). From results of multi-criteria analysis it follows that the residential
district achieves the potential of 91.2% to 96.2%. The suburb achieves the
potential of 30.2% to 45.7%. It has been demonstrated that the renovation of the
existing housing stock is more advantageous from the point of view of energy,
environment and economy than the construction of the new housing stock. |
Keywords: |
Smart city, City district, Suburb, Renovation, Energy |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
PUBLIC SERVICE FOR SMART CITY THROUGH INTERNET MESSENGER: WHICH MESSENGER
PERFORM BETTER IN TERMS OF ANTI IDENTITY FRAUD? |
Author: |
KRESNA RIDWAN, HATMA SURYOTRISONGKO, ARIS TJAHYANTO, BEKTI CAHYO HIDAYANTO |
Abstract: |
To deliver services to the public, the government needs to communicate with the
resident. The easiest way to communicate without boundary is by using social
media. This concept brings messenger applications such as Line, Whatsapp, and
Telegram as a communication media for a smart city. However, of those three
applications, which one is the safest to use? There are various threats such as
cybercrime and identity fraud which make the government must choose the most
appropriate application that can be applied as public service media. In this
study the authors analyze that three application (Line, WhatsApp, and Telegram)
in the most popular operating system, Android and iOS to assess which messenger
application that has non repudiation characteristic – it means we should know
the origin of data about who send the message to prevent an identity fraud in
the development of e-government system in smart city. This research analyzed
messenger storage location to get the desired data and perform further analysis
into forensics analysis software. From this research WhatsApp messenger on every
OS platform has the best performance. WhatsApp not only identifies user’s id but
also their phone number like Telegram Messenger. Also, WhatsApp has no
encryption on their conversation data that make the examiner easier to solve a
case on WhatsApp than Telegram. WhatsApp also manages their media data well, all
media have names registered in the database, have an extension and neatly
organized in the media folder. |
Keywords: |
Identity Fraud, Internet Messenger, Smart city |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
NOVEL VSS-NLMS ALGORITHM FOR ADAPTIVE EQUALIZER UNDER COMPLEX DYNAMIC WIRELESS
CHANNEL |
Author: |
MOHANNAD A. M. AL-JA AFARI, AMEER H. ALI, SAIF H. ABDULWAHED, HUSSEIN M. H.
AL-RIKABI |
Abstract: |
The Inter-Symbol Interference (ISI) is a challenging problem in a wireless
channel that degraded communication links. One of the efficient methods to
reduce the ISI is the adaptive equalizer. In the wireless channel, the ISI
elimination required an algorithm with powerful computation due to the fast
changing of the wireless channel properties. In this paper, a novel Selective
Mapping Variable Step Size Normalized Least Mean Square (SMVSS-NLMS) algorithm
has been introduced to mitigate the ISI efficiently. The SMVSS-NLMS algorithm
operates by computing a mapping of weight vectors from many variable step sizes
and selects the vector that gives the minimum error. The SMVSS-NLMS algorithm
has been tested and compared to the Tuning-Free VSS-NLMS algorithm (TFVSS-NLMS).
The simulation results have been observed under complex static and dynamic
wireless channels using Binary Phase Shift Keying (BPSK) and Quadrature Phase
Shift (QPSK) modulation schemes. The Bit Error Rate (BER) performance of
SMVSS-NLMS considerably outperformed the TFVSS-NLMS at typical levels of
signal-to-noise ratio (SNR). Moreover, the SMVSS-NLMS offered faster convergence
speeds (12 iterations) and lower Mean Square Error (MSE) (-79 dB) than the
TFVSS-NLMS (88 iterations, -14 dB MSE). |
Keywords: |
Selective Mapping, NLMS, Adaptive Equalizer, Inter-Symbol Interference, Adaptive
Filter. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
THE QUALITY EVALUATION OF SCHOOL MANAGEMENT MODEL BASED ON BALINESE LOCAL WISDOM
USING WEIGHTED PRODUCT CALCULATION |
Author: |
ANAK AGUNG GEDE AGUNG, I GUSTI PUTU SUDIARTA, DEWA GEDE HENDRA DIVAYANA |
Abstract: |
The evaluation of the school management model, especially at the junior high
school level, it aimed to provide information about the quality level of school
management model based on local wisdom that was owned by the Bali region in
particular. This research used an evaluative approach with evaluation design
that used the calculation stage of weighted product method to determine the
minor and major aspects as a determinant of school management model quality that
was applied to junior high school level in Bali Province. Subjects that were
involved in this study were selected by using purposive sampling technique which
was amounted to 72 people, 27 teachers and 45 students who came from 9 junior
high schools in Bali Province. The evaluation data were collected by using
interview guides, questionnaires, observation guidance, and documentation
studies. The data had been collected, and then was analyzed by using
quantitative descriptive technique through interpretation of evaluation result
data that utilized the calculation of weighted product method with the quality
standard of evaluation result which refers to the evaluation of benchmark grade
eleven. The result of this research was the quality level of school management
model based on the local wisdom of Bali which was considered special because the
percentage of quality level is 92.7%. In addition, through the calculation of
weighted products which was obtained minor aspects of determining the school
management model quality was the aspect of “menyama braya” while the major
aspect was the aspect of “karma phala”. |
Keywords: |
Evaluation, School Management Model, Balinese Local Wisdom, Weighted Product |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
DEVELOPMENT OF ANEKA EVALUATION MODEL BASED ON TOPSIS IN SEARCHING THE DOMINANT
ASPECTS OF COMPUTER LEARNING QUALITY DETERMINANTS |
Author: |
I PUTU WISNA ARIAWAN, WAKHINUDDIN SIMATUPANG, ANDI MUHAMMAD ISHAK, ANAK AGUNG
GEDE AGUNG, SURATMIN, AGUS ADIARTA, DEWA GEDE HENDRA DIVAYANA |
Abstract: |
The implementation of this research was intended to obtain information about the
design of ANEKA evaluation model based on TOPSIS which can describe the stages
to obtain dominant aspects of the quality determinant of computer learning. This
research was development research using Borg and Gall design that was limited up
to preliminary field test stage in generating ANEKA evaluation model based on
TOPSIS. The data collection in this research was done through documentation,
interview, observation, and questionnaire distribution. Subjects involved in
conducting the preliminary field test of evaluation model designs were two
informatics experts and two education experts. The analyst technique used in
this research was descriptive quantitative based on descriptive’s percentage
calculation. The results shown in this study was a design of ANEKA evaluation
model based on TOPSIS that was ready to be used because evidenced from the
average percentage of model design quality of 89.00% viewed from the results of
the preliminary field test that was conducted by experts. Besides, it has also
been proven from the simulation result of TOPSIS method accurately, can be
determined the most dominant evaluation aspect. |
Keywords: |
Evaluation, ANEKA, TOPSIS, Dominant Aspect, Computer Learning. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
DETERMINATION OF INITIAL CENTROID IN K-MEANS USING PCA FACTOR SCORES |
Author: |
BELABED IMANE, TALIBI ALAOUI MOHAMMED, TALIBI ALAOUI YOUSSEF |
Abstract: |
Clustering is considered as the task of dividing a dataset, such that elements
within each subset are similar between them and are dissimilar to elements
belonging to other subsets. One of the most commonly and widely used is K-Means
clustering because of its simplicity and performance. The initial centroids for
clustering are generated randomly before clustering. If the dataset used is
large, then the performance of K-Means will be reduced and also the time
complexity will be increased. To overcome this problem, this paper focuses on
determining the initial cluster centroids for K-Means. For this purpose, PCA
factor score initialization is used in this paper. The experimental results show
that the proposed technique provides better clustering and also decreases the
time complexity. |
Keywords: |
K-Means, Principal Component Analysis, PCA factor score, centroid initialization |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
A NEW APPROACH FOR MIGRATION OF A RELATIONAL DATABASE INTO COLUMN-ORIENTED NOSQL
DATABASE ON HADOOP |
Author: |
YOUNESS KHOURDIFI, MOHAMED BAHAJ, ALAE ELALAMI |
Abstract: |
This article presents a new approach based on the "Object" concept, to
successfully migrate a relational MySQL database to a column oriented HBase
NoSQL database. The purpose of this article is to provide a new model of
migration process divided into three phases, the first of which allows to obtain
a copy of these metadata using the principle of semantic enrichment, and this to
extract the different principles of the objects, including aggregation,
inheritance and composition, the second phase of the process concerns the
automatic generation of a New Optimised Data Model 'NODM' containing all
relational database information in a flattened way. The last phase serves for
the migration of the existing relational database into column-oriented database
in the Hadoop ecosystem. The whole approach proposes a migration solution from a
relational database to a NoSQL column-oriented database, which exploits the fast
extraction of data columns for several types of applications, thus generating a
better factor for analytic query performance, minimizes the input / output load
of the disk, and reduces the amount of data being addressed from the disk. |
Keywords: |
Relational database, HBase, Data Migration, Semantic Enrichment, Schema
Translation, BigData, Hadoop. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY OF TEST CASE GENERATION AND OPTIMIZATION USING GENETIC
ALGORITHM |
Author: |
ITTI HOODA, PROF. DR. RAJENDER SINGH CHHILLAR |
Abstract: |
The main consideration of the work is a comparative study and analysis of test
case generation and optimization algorithms based on Genetic Algorithm. The work
also present how genetic algorithm shows the better result as compared to other
techniques by using UML diagram .The comparison is shown between three different
techniques which differently consider the genetic algorithm for the purpose of
test case generation and optimization. The survey is being presented using the
activity diagram and also the activity graph of the Airline Reservation System.
The activity diagram of the airline reservation system is first converted into
the activity graph. As any graph is the combination of vertices and edges which
are connected with some nodes, in the activity graph the nodes actually
represents the test path, the test path of the system is being optimized using
the optimization technique or we can say using the Genetic Algorithm. The survey
conducted is estimated or analysed on various defined factors which are
differing for every technique defined in the study. Three algorithms considered
are “Test case generation and Optimization using UML models and Genetic
Algorithm”, “Optimization of Test case generation using Genetic Algorithm” and
“Test case retrieval Model by Genetic algorithm with UML diagram”. This work
with the empirical results prove that the algorithm for test case retrieval
model by Genetic Algorithm with UML diagram shows better results as compared to
other discussed techniques. |
Keywords: |
UML, Genetic Algorithm, Optimization, test path, Test case,
Mutation,Crossover,GA. |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
EVALUATION OF A FUZZY 3D COLOR QR CODE DECODER |
Author: |
Bakri Badawi, TEH NORANIS MOHD ARIS |
Abstract: |
This paper is an extension of our previous work on color QR code decoder using
fuzzy logic. The input is the color QR codes with four versions which are
version 3, 13, 14 and 17. These QR code versions are converted to black and
white. Then, the QR codes are detected using an open source library named as
Zing. Next, the color QR code is retrieved by mapping the black and white QR
code with the color image. This is followed by enhancing the color QR code using
fuzzy logic. After that the QR code is split into three QR codes, red, green and
blue. Each of the color is decoded to get the original file text file. We made a
comparison on the success rate for our decoder with other existing decoder. We
take in consideration number of color used, camera resolution, QR code version,
and QR code error correction level. The comparison with other research work show
that by using fuzzy logic improves the decoding success rate up to 93.33% using
the same parameter from other research work. |
Keywords: |
Fuzzy, QR code, QR code version, Color QR code, Decoder |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
Title: |
ANALYSIS OF CITIZEN READINESS IN INDONESIA TOWARD E-GOV 2.0 |
Author: |
DARMAWAN NAPITUPULU, KRISNA ADIYARTA, TATA SUTABRI, KAMALIA KAMARUDDIN |
Abstract: |
Nowadays, many government institutions are competing to increase the quality of
public services being provided. Unfortunately, they more emphasized on
technology side rather than on citizens side. During this e-Government
initiative felt less involving the user as a result of the system designed less
match with the expectations of users so that the level of adoption is low.
T-Government or e-Gov 2.0 as a new generation of e-Government or Citizen Centric
Government has a key element of citizen or user involvement in policy
formulation. The objective of T-Government is to encourage more open and
transparent government, in which the public has a greater role in e-Government
initiatives. But unfortunately, the application of T-Government is still very
limited. This study aims to determine the level of citizen adoption of
e-Government as a picture of readiness towards the application of T-Government
in Indonesia. The method used is a survey where the questionnaire is distributed
electronically. The results of the study show two main parts of the level of
citizen use of e-Government services and citizen perceptions related to
e-participation. Key demographic findings are consistent with previous research
that e-Government users in general do not come from category such as old age,
low educated, low income and female. Based on the level of technology readiness,
citizens can be said quite ready because the majority of respondents (90%) have
Internet access from home. Citizens can also be considered as experienced users
as more than 60% of respondents have used the Internet for more than 10 years.
This is in line with the highly citizen interest in e-participation by 90%,
although only about 40% of respondents said they had been involved in
e-participation. The results of the analysis can be used as a basis to desaign
T-Government based on user needs. |
Keywords: |
e-Gov 2.0, Citizen, Readiness, ELR, Transformational, Government |
Source: |
Journal of Theoretical and Applied Information Technology
15th October 2018 -- Vol. 96. No. 19 -- 2018 |
Full
Text |
|
|
|