|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
January 2018 | Vol. 96
No.2 |
Title: |
LOW-COMPLEXITY HEVC INTRA-MODE DECISION USING MODES REDUCTION |
Author: |
AHMAD A. MAZHAR |
Abstract: |
Digital video technology has witnessed many important improvements in the last
decade. Increasing video quality to be high resolutions is one of the most
important developments in the field of video processing. Modern video sequences
with higher resolutions led to larger consuming of storage capacity and
transmission capability. Video compression became essential concern to avoid the
impact of dealing with this huge amount of data. Devising efficient coding
techniques came with high complexity and computation time. The High Efficiency
Video Coding (HEVC) is one of the most popular encoding standards. It was
designed for high-resolution video sequences. However, HEVC suffers from high
encoding complexity. This paper proposes a fast intra prediction technique by
reducing the number of comparisons in RDO process. In HEVC intra prediction,
there are many candidates that may contain similar contents to the neighboring
blocks. The content information and the direction of the most similar
neighboring blocks are exploited to minimize the number of candidate blocks to
speed up the encoding process. |
Keywords: |
HEVC, Intra Prediction, Mode Decision, RDO, Video Coding. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
LOCAL QUANTIZED EDGE BINARY PATTERNS FOR COLOUR TEXTURE IMAGE RETRIEVAL |
Author: |
G. SUCHARITHA, RANJAN K. SENAPATI |
Abstract: |
A new image retrieval technique has been proposed in this paper namely local
quantized edge binary patterns using HSV color space. To make use of color,
intensity and brightness of image HSV color space is used. Local quantized
patterns are used to define the local information in all possible directions
i.e0^0,〖45〗^0,〖90〗^0and〖135〗^0. Local edge binary patterns extract the maximum
edge information from the quantized patterns in all directions in an image.
Performance is compared with local binary pattern(LBP), Centre symmetric local
binary pattern(CS_LBP) with color feature, local edge patterns for segmentation
(LEPSEG) with color feature and wavelet transform with color feature and another
existing method by conducting three experiments on standard databases Corel-10k,
MIT-Vistex and Color Brodatz texture. After results investigation, a significant
improvement in terms of their evaluation measures as compared with existing
methods on respective databases. |
Keywords: |
Content Based Image Retrieval, Local Binary Patterns, HSV Color Space, Local
Quantized Pattern, Edge Binary Patterns, Histograms, Feature Vector. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
TRUE COLOR IMAGE ENCRYPTION BASED ON DNA SEQUENCE, 3D CHAOTIC MAP, AND
KEY-DEPENDENT DNA S-BOX OF AES |
Author: |
ASHWAK ALABAICHI |
Abstract: |
Digital image encryption techniques play crucial roles in preventing
unauthorized accsess. In this study, color image encryption and decryption are
performed through a technique that applies a 3Dchaotic map, DNA sequence, and
the key-dependent DNA S-box of the Advanced Encryption Standard (AES) to get
higher security. This technique comprises five steps: block transcription,
encoding of DNA base, reverse/ reverse complement of DNA, use of a 3D chaotic
map, and key-dependent DNA S-box of AES. In the proposed scheme, block
transcription is performed to shuffle image pixels by changing their positions
in the image. Encoding of DNA base and reverse/reverse complement of DNA are
conducted to change pixel values, thereby diffusing the image. A 3D chaotic map
is then utilized to generate a secret key for shuffling and diffusing the pixels
of an image. The S-box of AES is scrambled by changing the coordinate values of
the DNA S-box of AES to keep it obscured. Then, the image is substituted into
the key-dependent DNA S-box of AES. The aforementioned processes aim to satisfy
the high-level security requirement of certain encrypted images. The proposed
algorithm is comprehensively tested using different criteria, such as the Number
of Pixels Change Rate (NPCR), the Unified Averaged Changed Intensity(UACI), the
Correlation Coefficient(CC), Information Entropy (IE), histogram, Mean Square
Error (MSE), and key sensitivity analysis. Result shows that the proposed
algorithm satisfies all the aforementioned criteria, thereby indicating that it
is resistant to different types of attacks, including differential, statistical,
and exhaustive attacks. |
Keywords: |
Chaotic map, block transcription, encoding of DNA base, reverse and reverse
complement of DNA, 3D logistic map, 3D Chebyshev map, key-dependent DNA S-box of
AES, NPCR, UACI, CC, IE, histogram, MSE, and key sensitivity analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
E-FWARM: ENHANCED FUZZY-BASED WEIGHTED ASSOCIATION RULE MINING ALGORITHM |
Author: |
K. MANGAYARKKARASI, M. CHIDAMBARAM |
Abstract: |
In the Association Rule Mining (ARM) approach, equal weight is assigned to all
itemsets in the dataset. Hence, it is not appropriate for all datasets. The
weight should be assigned based on the significance of each itemset. The WARM
reduces extra steps during the generation of rules. As, the Weighted ARM (WARM)
uses the significance of each itemset, it is applied in the data mining. The
Fuzzy-based WARM satisfies the downward closure property and prunes the
insignificant rules by assigning the weight to the itemset. This reduces the
computation time and execution time. This paper presents an Enhanced Fuzzy-based
Weighted Association Rule Mining (E-FWARM) algorithm for efficient mining of the
frequent itemsets. The pre-filtering method is applied to the input dataset to
remove the item having low variance. Data discretization is performed and
E-FWARM is applied for mining the frequent itemsets. The experimental results
show that the proposed E-FWARM algorithm yields maximum frequent items,
association rules, accuracy and minimum execution time than the existing
algorithms. |
Keywords: |
Association Rule Mining (ARM), Data Mining, Frequent Itemset Mining, Fuzzy-based
Weighted Association Rule Mining (FWARM) |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
MULTIVIEW BUSINESS MODEL FOR DESCRIBING A MECHANISM OF HANDLING PHYSICAL AND
DIGITAL EVIDENCE IN DIGITAL FORENSICS |
Author: |
YUDI PRAYUDI, AHMAD ASHARI, TRI KUNTORO PRIYAMBODO |
Abstract: |
Digital evidence should be handled by the same mechanism with the physical
evidence. Both types of such evidence should be complementary to support the
investigation and data required in digital forensics activities. An appropriate
business model is required to be able to support this mechanism. The existing
business models, not yet able to explain the relationship between the three
principal components in digital forensics: People who run activities, Digital
Evidence as the primary object and Process which serves as a guide in conducting
digital forensics activities. This study proposes a business model known as 3IR
(Initiative-Investigative-Interactive-Report) as a multiview business model that
can describe the relationship between the People - Digital Evidence - Process
that must be understood in the activity of digital forensics and digital
evidence handling. The proposed multiview business model has been able to
provide an overview of how the mechanism is supposed to handle digital evidence
to match the handling of physical evidence. The 3IR multiview business model is
supposed to be used as a reference to comprehensively describing how to handle
digital evidence in any digital forensics activities. |
Keywords: |
Business Model, Digital Forensics, Physical Evidence, Digital Evidence |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION FOR MEDIA-AWARE TRANSMISSION METHOD BASED ON MMT |
Author: |
JONGHO PAIK, SONGYEON LEE, KYUNGA YU |
Abstract: |
Ultra-High-Definition (UHD) broadcasting, which is one of advanced broadcasting
technologies, has met the users needs for high-definition and realistic
services. By the way, UHD content is too large to be transported due to the
limited bandwidth of existing HD broadcasting systems. In order to solve this
problem, a lot of advanced broadcasting technologies have been suggested. One of
the related researches proposed a UHD broadcasting service that each layer of
video separated hierarchically are transmitted over heterogeneous networks.
Unlike the existing MPEG-2 TS based on stream mode, UHD contents are transmitted
based on packet mode. Therefore, to ensure the Quality of Service (QoS) of UHD
content against inevitable packet delay, the UHD broadcasting system has to be
taken into account the priorities of transmission depending on type of media and
the layers of video simultaneously. In this paper, we propose a media-aware
transmission method and also experimental results will be shown to verify the
effectiveness of the proposed method. |
Keywords: |
MPEG Media Transport, Transmission Model, Scheduling, UHD, Hybrid Broadcasting
System |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
A NEW FRAMEWORK FOR USABILITY EVALUATION WEB ENGINEERING METHODS |
Author: |
KARZAN WAKIL, DAYANG N. A. JAWAWI |
Abstract: |
Usability is an important attribute for measuring a quality of web engineering
methods. Also, many usability evaluation methods proposed. The problem is web
engineering methods can not complete web development lifecycle especially
evaluation phase and the developers sometimes do not meet users expectations
regarding usability. For expressing the actual feedback from developers
directly, we have defined a new framework for usability evaluation of web
engineering methods. The new framework consists of six phases, in these phases
we defined web engineering process development, web application features,
usability attributes, usability evaluation methods, and usability testing. In
the usability testing, we use several ways for returning users feedback such as
usability testing by expert and group developers, open-ended and close-ended
questionnaires, and interviews. This framework is too strong for measuring
usability of web engineering methods because it has reach feedback from
developers. |
Keywords: |
Usability, Usability Evaluation, Web Engineering, Evaluation Method, Framework. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
ELECTRONIC GOVERNMENT ASSESSMENT IN WEST JAVA PROVINCE, INDONESIA |
Author: |
IRA IRAWATI ; ENJAT MUNAJAT |
Abstract: |
In the view of public administration, electronic Government (eGovernment) is the
use of information and communication technology (ICT) to improve the activities
of public sector organizations. Understanding eGovernment, is not only related
to ICT, but all public sector activities are included. In relation with the
excellent service that must be delivered by public institutions, the government
began to concern about the application of Information and Communication
Technology (ICT) for various services. With regard to the readiness of the
Regional Device Work Unit (SKPD) to deliver services, the authors are interested
in analyzing the readiness of some districts / cities in the West Java Province
to see how far the SKPD is prepared in Bandung, West Bandung regency, Cimahi and
Garut regencies in preparing everything to achieve an optimum service based on
electronics. The method used is Quantitative method based on Hee Joon Song
(2006) theory on 3 phases of eGovernment Action Plan (Pre-Implementation,
Implementation, Post-Implementation) and he also does similar things in South
Korea. For the pre-implementation stage, West Bandung regency occupies the first
position with a value of 3.44 far above the other Regencies / Cities, and the
lowest is the city of Bandung. In the implementation phase, Bandung still gets
the lowest value even far below the average. It is quite getting attention is
West Bandung regency, which in the pre-implementation phase gets the highest
value, but in the implementation it is far below the average. This is caused by
the lack of experience of the implementation process because West Bandung is the
youngest area among others. For the post-implementation stage, Cimahi City
domination is seen as the city with the best implementation and
post-implementation phases, followed by Garut regency. This is quite reasonable
considering that Cimahi is the best city for eGovernment implementation in 2011,
and became a pilot city project for eGovernment implementation in 2014. It's
just that the city of Bandung as a city that is also initiated as the will of
Silicon Valley city of Indonesia seems to be trying to improve services in the
field of eGovernment for even better. Given Bandung is the capital of the
province as well as an icon of West Java. |
Keywords: |
ICT; e-Government, Indonesia, Public Administration, Services |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
SPATIAL MODEL OF KOPPEN CLIMATE CLASSIFICATION USING THIESSEN POLYGON
OPTIMIZATION ALGORITHM |
Author: |
KRISTOKO DWI HARTOMO, SRI YULIANTO, J.P., EMMANUEL GUMILANGGENG |
Abstract: |
Global climate change significantly affects global and regional climate
conditons. This research aims to predict climate distribution by using thiessen
polygon algorithm optimization. Thiessen polygon weighs rainfall and measured
surrounding areas to predict locations affected by surrounding climate
condition. Our study produces spatial model of climate classification and
thematic maps of spatial climate in the forms of types of spatial climates based
on Koppen climate classification. The Central Java Province itself has three
climate types, namely (af) wet tropical, (am) monsoon tropical, and dry wet
tropical or savana tropical (aw). It is expected that our study could be used
for reference of disaster impact mitigation, determining agricultural cropping
patterns, transport navigation and disaster management. |
Keywords: |
Climate, Koppen, Thiessen Polygon, Spatial Model, Optimization, Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
A DEPLOYMENT OF FSR SENSORS AND ITS SENSING ALGORITHM FOR IMPLEMENTING A SMART
BED TO PREVENT PRESSURE ULCERS |
Author: |
YOUN-SIK HONG, DONG-YEONG KIM |
Abstract: |
The number of domestic senior care centers has increased exponentially. The
biggest problem of the senior care centers is that they have absolutely
insufficient manpower and need efficient management of patients with limited
manpower. Patients with pressure ulcers often do not move themselves, so it is
necessary to change their postures when lying down in the same position for a
certain period of time. In particular, admission to a senior care center is
known to be an important risk factor for the development of pressure ulcers. In
the case of dementia patients, most of them are able to move themselves, so it
is necessary to prevent falls or to tell nurses or caregivers whether they are
lying in bed or not. We are interested in an implementation of a smart bed to
aid nurses or caregivers for nursing elderly patients. The smart bed can detect
the pressures occurred on a whole body of a patient at regular interval to
prevent pressure ulcers and/or falling accident from the bed. The body structure
of a person can be divided into three parts according to their characteristics:
head, body, and leg. Legs, like arms, have weak loads and are frequently moving
parts. On the other hand, the body is the area where the load is the largest and
the area where the pressure ulcer occurs. Heads and legs can be measured only by
the presence or absence of pressure, rather than by the exact location of the
pressure. To do this, two types of pressure sensors are used to sense pressures
on specific body parts depending on sensing purposes. |
Keywords: |
Pressure Ulcers, Fall Prevention, Pressure Sensor, FSR Sensors, Smart Bed, IOT |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
ALERT CORRELATION USING SUPPORT VECTOR MACHINE FOR MULTI INTRUSION DETECTION
SYSTEMS |
Author: |
XIAOYUN YE, MYUNG-MOOK HAN |
Abstract: |
This paper presents a new alert correlation model for multiple intrusion
detection systems. Based on the analysis of the complex relationship between the
alert information of the intrusion detection system, an alert fusion model is
proposed and used to alert correlation. The SVM algorithm has an advantage in
the multi-dimensional classification, which can further reduce the influence of
false positives and false negatives. The experimental results show that the
alert fusion model has high accuracy and low false positive. |
Keywords: |
Alert Correlation, Intrusion Detection System(IDS), Support Vector Machine (SVM) |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
FEATURE SELECTION PRACTICE FOR UNSUPERVISED LEARNING OF CREDIT CARD FRAUD
DETECTION |
Author: |
HOJIN LEE, DAHEE CHOI, HABIN YIM, EUNYOUNG CHOI, WOONG GO, TAEJIN LEE, INSUK
KIM, KYUNGHO LEE |
Abstract: |
Unsupervised Learning processes the massive data and discover the underlying
patterns, even though explicit target values are nonexistent. Achieving high
predictability for Unsupervised Learning, we practiced to select most influenced
feature related to fraud detect system among numerous data. Financial
transactions are provided through various channels. On this account, selection
of new feature brings increment either on time and cost. In this paper, we
practiced the various Feature Selection to detect abnormal transactions
exploiting Unsupervised Learning. Here, we select proper features by valuing
weight on various Feature Selection Algorithms. The efficiency and accuracy of
Feature Selection we practiced are demonstrated by credit card data set.
Therefore, it provides rapid response in compliance with feature variance and
guide to efficient feature selection. |
Keywords: |
Feature Selection, Unsupervised Learning, Credit Card Fraud Detection, Filtered
Algorithm, Ranked Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
TOWARD IMPLEMENTATION OF ONEM2M BASED IOT PLATFORM |
Author: |
VINCENTIUS CHRISTIAN ANDRIANTO, JUNHUY LAM, RYAN NATHANAEL SOENJOTO WIDODO,
SANG-GON LEE , HOON-JAE LEE, HYO-TAEK LIM |
Abstract: |
A Many organizations have its own proprietary Internet of Things (IoT)
architecture. This creates additional processes such as system extension,
integrating new data, managing device, and adding security become difficult,
especially when it involves multiple platforms. In order to solve this problem,
the standardized oneM2M architecture was initiated. OCEAN is an IoT platform
based on oneM2M standards. This work presents an implementation of oneM2M based
IoT platform using OCEAN, in which the system is built from the proposed smart
home scenario. |
Keywords: |
Internet of Things, M2M, MQTT, OCEAN, oneM2M. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
DEVELOPMENT OF MAZE ESCAPE ALGORITHM USING RASPBERRY PI-BASED MOVING OBJECT FOR
THE SERVICES OF UNMANNED AUTOMOBILE |
Author: |
SANG-CHUL KIM, GOO-HOON BYUN |
Abstract: |
In this paper, we developed a self-propelled vehicle using Raspberry Pi-based
moving object that performs the mission to escape from the maze that will be
used as key algorithms for the services of unmanned automobile. For the mission
of maze escape, the line tracing and intersection discrimination algorithms have
been developed using Raspberry Pi-based moving object. Various situations that
occur during the experiments have been studied and solutions to solve them have
been investigated. As the related research, a front collision avoidance system
that avoids obstacles by recognizing the distances between moving object and
obstacles when performing the mission of maze escape has been developed and a
lane-keeping system between vehicles by employing various algorithms using the
Raspberry Pi and Arduino based moving objects was developed. Finally, we
observed the experimental results between the left-hand and right hand methods
in the mission of maze escape. |
Keywords: |
Raspberry Pi, Raspberry Pi-based Moving Object, Maze Escape, Right-hand
Method, Motor Control |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
A DATA PROPAGATION METHOD CONVEYING OPERATOR INTENT FOR WIRELESS SENSOR NETWORKS |
Author: |
HEEJUNG BYUN, SUMI YANG |
Abstract: |
In this paper, we propose a data propagation method inspired by epidemic theory
with aims of delay reduction and energy saving in Wireless Sensor Networks
(WSNs). Also, we propose a control method for conveying operator intent to the
WSNs. The proposed method controls the state of a sensor node depending on the
delay requirements of a specific application and allows users to interact with
the WSNs to convey desired parameter values for the operations. We analyze the
proposed method based on control theory and show the convergence and stability
of the WSN system. Simulation results indicate that the proposed method achieves
reliable data propagation and user intent delivery while saving energy
consumption in the WSN system. |
Keywords: |
Wireless sensor networks, Data propagation, Parameter setting |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
EXPLORING THE ROLE OF SOCIAL CAPITAL IN IMPLEMENTING A COLLABORATIVE SCM
SYSTEM |
Author: |
DONG HYUK JO, JONG WOO PARK |
Abstract: |
In recent years, since uncertainty increases in business environment and market
competition intensifies, the importance of collaborative supply chain management
(SCM) is increasing. Companies need to collaborate with partner Firms within the
supply chain from the perspective of strategy and system to respond quickly to
dynamic market changes. Therefore, this study was conducted with the aim to seek
ways to implement the collaborative supply management system of manufacturing
Firms from the perspective of social capital. To achieve the purpose of this
study, the author examined the concept and dimensions of social capital and
supply chain collaboration through literature review and empirically verified
the influencing relationship between the social capital, collaborative supply
chain management system, and supply chain performance of manufacturing Firms.
This study is meaningful in that the author confirmed the importance of social
capital formation and collaborative SCM system establishment for enhancing the
competitiveness of manufacturing Firms, and suggested the strategic directions
of the supply chain management that can contribute to improving supply chain
performance. |
Keywords: |
Supply Chain Management (SCM), SCM Systems, Social Capital, Supply Chain
Collaboration, Supply Chain Performance, Small And Medium-Sized Enterprises
(SMes) |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
UNDERSTANDING THE ACCEPTANCE OF IT-BASED SHARING ECONOMIC SERVICES |
Author: |
DONG HYUK JO, JONG WOO PARK, HONG SEOK PARK |
Abstract: |
This study aims to empirically verify the structural relationships between
perceived risks, perceived values, trust, and intention to use for sharing
economy services. In order to achieve the objective of this study, the survey
was conducted targeting the car sharing service which has been noticeably
growing in the sharing economy service. In the results of the study, first, the
perceived risks of sharing economy service had negative(-) effect on the
perceived values. Second, the perceived risks had negative(-) effect on trust.
Third, the economic value and social value had positive(+) effect on trust while
the functional value not had effect on trust. Fourth, the functional value and
economic value had positive(+) effect on the intention of use while the social
value not had effect on the intention to use. Lastly, trust had positive(+)
effect on the intention to use. This study provided a chance to understand the
risks and values actually perceived by potential users before the full-scale
vitalization of sharing economy service, and also to see the importance of
trust. Moreover, it also suggested the direction to establish strategies for the
vitalization of services. |
Keywords: |
Sharing Economy Services, Perceived Risk, Perceived Values, Trust, Intention to
Use |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
RECONSTRUCTIONS OF MARKET VALUES ACCORDING TO THE ICT-BASED CREATED VALUES TO
REACH MARKET EQUILIBRIUM |
Author: |
HYUN JUNG LEE, YONG SIK CHANG |
Abstract: |
In this research, we are focusing on the reconstructions of market values
according to created services and products in ICT-based environment. The 4th
industrial revolution is based on ICT-based technologies like IoT, Big data, AI,
and so on. The converged technologies are applied to economies and societies in
the direction of creation of new services and products. In the market, it is
possible to be conflicted between market values which come from ICT- and
non-ICT-based services and products. So, we propose the market equilibrium to
solve the confliction of value chains. In the created ICT-based new market, it
is possible for multiple value-chains to share values in a market unlike
traditional market. To do this, in the value chains, we define priority values
which are created primary values in the value chains. It is also necessary to
determine conflicted and destroyed values to maximize the market value in each
value chain. It also accelerates to increase the global market value in the
converged market like a platform. To do this, it is important to reconstruct the
market values because ICT-based market creation will be tremendously increased.
In this paper, we will discuss for the coexistence of the ICT-based created
values in a market and the traditional and ICT-based value chains. To do this,
especially, we are comparing the market value of healthcare service with that of
ICT-based e-healthcare service. |
Keywords: |
ICT, Market Value, Equilibrium, Healthcare Service, Value Chain |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN
802.11 WIRELESS NETWORKS |
Author: |
AYINEBYONA ELIAB, JONGSUN PARK, JUNGMIN SO |
Abstract: |
This paper presents schemes that reduces ACK (acknowledgement) overhead in IEEE
802.11 wireless networks and further improve network performance in high error
rate cases. While the ACK takes only 20us in 802.11a at 54Mbps, a combination of
SIFS period and preamble makes ACK the second largest overhead next to channel
access overhead. To reduce ACK overhead, we proposed periodic and cooperative
ACK schemes. In periodic ACK scheme, a single ACK is used to periodically
acknowledge multiple packets received independently at different transmission
occasions on each channel separately. However, the periodic ACK scheme suffers
throughput degradation in high error rates. To overcome this issue, a
cooperative ACK scheme was applied. In cooperative ACK, a single ACK is sent on
one of the active channels to acknowledge multiple packets received on different
channels collectively, rather than acknowledging multiple packets received on
each channel separately. This reduces ACK timeouts that would result in
excessive retransmissions since an ACK timeout on one channel would be recovered
on another channel thus improving network performance. Extensive simulation in
ns3 shows that the proposed schemes improve network throughput by considerable
amount in various environments. |
Keywords: |
IEEE 802.11, MAC overhead, Multi-radio, Acknowledgment |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
THE EFFECTS OF CUSTOMER SATISFACTION WITH E-COMMERCE SYSTEM |
Author: |
ALOTAIBI KHALID, OOK LEE, MINKYONG CHOI, JONGCHANG AHN |
Abstract: |
With the rapid growth of e-commerce in Saudi Arabia, this country is the biggest
e-commerce market in the Arab world. This paper aims to examine the degree of
customer satisfaction with e-commerce system in Saudi Arabia using modified
American customer satisfaction index (ACSI) model. The model was tested using
149 sample data obtained from online survey. The findings indicate that customer
satisfaction with e-commerce system was affected by customer expectation,
e-commerce service quality and perceived value. In addition, perceived value was
affected by customer expectation and e-commerce service quality, while
e-commerce service quality was affected by customer expectation. The findings
suggest that e-commerce service quality is main key element affecting customer
satisfaction with e-commerce system which is accordance with Saudi Arabian
online customers who have more concerns on e-commerce service, particularly
related to security and payment method. |
Keywords: |
Customer expectation, Customer Satisfaction, E-commerce, Perceived quality,
Service quality |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
A STUDY ON MOBILE ERP APPLICATION USAGE OF SMARTPHONES: A CASE OF TRAVELING
SALESMAN IN PHARMACEUTICAL COMPANY |
Author: |
SANGMIN LEE, KUN DONG CHOI |
Abstract: |
Today, many organizations have implemented the ERP system to enhance the
efficiencies of their business processes regardless of the company size and
industry sector. Moreover, lots of the organizations have already adopted the
mobile version of the ERP system, which actually provide the interface to enable
to get access to the back-end ERP system. In this sense, it is obvious that
mobile applications that connects to the companys ERP systems is very useful
tool for traveling sales forces since they can complete their tasks without
having to open their laptop. In Korea, Pharmaceutical companies are one of the
largest industry sectors who are quite dependent on the salespersons
competencies. However, not many studies regarding the mobile ERP application
usage in pharmaceutical industry were found. Thus, this study examined what
influences the salespersons satisfaction level when they use a mobile ERP
application. In addition, the relationships between the user satisfaction level
in pharmaceutical industry and that of other industry sectors were investigated.
To achieve this goal, this study examined variety of existing mobile application
evaluation model, and constructed a conceptual model by adopting some factors
from TAM and D&Ms IS success model in order to satisfy the research objectives.
This study found not only the significant factors that influenced the
satisfaction level of the sales forces in pharmaceutical companies, but also the
factors of user satisfactions that varied across industry sectors. |
Keywords: |
Mobile Applications, M-ERP, User Acceptance Model, User Behavior, TAM, D&M IS
Success Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
MULTI-LEVEL ATTRIBUTE-BASED MATCHING APPROACH TOWARDS ENERGY-EFFICIENT RESOURCE
PROVISIONING IN CLOUD DATA CENTERS |
Author: |
FRANK ELIJORDE, SUNGHO KIM, JAEWAN LEE |
Abstract: |
In this paper, we present a resource provisioning technique which classifies
data center entities through their attributes as characterized by their resource
requirements. The classification process enables the multi-level matching
approach which assigns client requests to the most appropriate VM, while the VM
is assigned to a Host of similar characteristics. By considering the
multi-dimensionality of compute resources, data center entities which include
applications, VMs, and Hosts, are consolidated and assigned according to the
most proportionate available resource. Evaluation results confirm the benefits
of applying such techniques on the performance and energy consumption of a cloud
data center. |
Keywords: |
Resource Provisioning, Cloud Data Centers, VM Consolidation, Cloud Computing,
Green Computing |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
EXTENDED BLOCK NEIGHBOR DISCOVERY PROTOCOL FOR HETEROGENEOUS WIRELESS SENSOR
NETWORK APPLICATIONS |
Author: |
WOOSIK LEE, NAMGI KIM, TEUK SEOB SONG, JONG-HOON YOUN |
Abstract: |
For heterogeneous wireless sensor network applications, sensor nodes need
diverse duty cycles and energy efficient neighbor discovery protocols (NDPs) so
that they can rapidly find their neighbor nodes. However, existing block NDPs
have very limited duty cycle sets. To solve this problem, we propose extended
block NDP (EBNDP), a protocol that can support diverse duty cycles. EBNDP
adaptively generates block candidates depending on duty cycle requirements. It
selects block sets based on a heuristic search approach and combines the
selected block sets to make a new block design. This combined block design
supports the duty cycle requirements and has proper performance that is close to
optimal block design regarding latency and energy consumption. To evaluate the
effectiveness of EBNDP, we implemented various block combinations depending on
the duty cycles and compared the performance of each block combination. We also
compared EBNDP with other NDPs such as Quorum, Optimal, Random, and OR-based
NDPs. Through experimentation, we showed that EBNDP outperformed other NDPs in
all duty cycles. |
Keywords: |
Wireless Sensor Network, Neighbor Discovery Protocol, Block Design |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
IMPROVING SOFTWARE ARTIFACTS REUSABILITY BASED ON CONTEXT-AWARE REUSE TECHNIQUE |
Author: |
DOOHWAN KIM, JANG-EUI HONG |
Abstract: |
Reusing software artifacts is not limited to only source codes, but also various
artifacts which are created in software projects. However, traditional artifacts
reuse approach has some problems of difficulties to find an appropriate artifact
and to choose suitable terms as search keywords. To reduce the difficulties and
enhance reusability of software artifacts, this paper presents some novel
techniques based on context-aware reuse; which are context-based automatic
keyword generation, ontology-based keyword extension, context-aware retrieval
and learning-based result visualization. To realize the techniques, we firstly
defined microComponent with the smaller unit (section) of a document as the
reusable unit. And then we focus on to how can we retrieve and reuse the
microComponents with the concept of context-aware. Our technique can precisely
control the reusable unit, and enhance reusability of software artifacts based
on the microComponents. |
Keywords: |
Software Artifact, Reusability, Context-aware Reuse, microComponent, Reuse
Framework. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
Title: |
OPTICAL METHODS OF IDENTIFYING THE VARIETIES OF THE COMPONENTS OF GRAIN MIXTURES
BASED ON USING ARTIFCIAL NEURAL NETWORKS FOR DATA ANALYSIS |
Author: |
ARTEM O. DONSKIKH, DMITRY A. MINAKOV, ALEXANDER A. SIROTA |
Abstract: |
The article considers methods of identifying the varieties of the components of
grain mixtures based on the spectral analysis in the visible and near-infrared
wavelength ranges. Various measurement approaches - reflection, transmission and
combined spectrum methods - are used. The results of the spectral measurement
are processed using neural network based classification algorithms combined with
data dimensionality reduction techniques. The probabilities of incorrect
recognition for various numbers of features and combinations of spectral methods
are estimated for mixtures of wheat grains. Combined use of spectral methods
allowed to reduce the classification error by about ten times and bring its
absolute value to 0.01...0.001. |
Keywords: |
Spectral Analysis, Grain Mixtures, Wheat, Pattern Recognition, Neural Networks |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2018 -- Vol. 96. No. 2 -- 2018 |
Full
Text |
|
|
|