|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
November 2018 | Vol. 96
No.22 |
Title: |
APPLICATION OF FITNESS SWITCHING GENETIC ALGORITHM FOR SOLVING 0-1 KNAPSACK
PROBLEM |
Author: |
KIM JUN WOO |
Abstract: |
Fitness switching genetic algorithm is a sort of genetic algorithm, which was
initially developed for solving combinatorial optimization problems with rare
feasible solutions. Compared to previous genetic algorithms, fitness switching
genetic algorithm has three distinguishing procedures including fitness
switching, fitness leveling and simple local search, which enable the infeasible
solutions to be included within the population. Consequently, fitness switching
genetic algorithm can effectively explore the search space of given problem by
utilizing infeasible solutions, even if it is difficult to find arbitrary
feasible solutions. On the contrary, 0-1 knapsack problem is a well-known
combinatorial optimization problem that typically has many feasible solutions,
and this paper aims to apply fitness switching genetic algorithm to solve this
problem in order to investigate applicability of the algorithm. To this end,
fitness switching, fitness leveling and simple local search procedures are
tailored to 0-1 knapsack problem, and a revised algorithm structure is proposed.
Consequently, this paper demonstrates that combinatorial optimization problems
with many feasible solutions also can be solved by applying fitness switching
genetic algorithm. Especially, fitness switching genetic algorithm is easy to
implement in that it does not require repair or penalization procedures for
handling infeasible solutions. |
Keywords: |
0-1 Knapsack Problem, Genetic Algorithm, Combinatorial Optimization,
Metaheuristics, Operations Research |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
WHO THINKS MEMORY MORE VALUABLE IN E-COMMERCE? MATING GOAL PRIMING AND IMPLICIT
SELF THEORY |
Author: |
JUNSIK KWAK |
Abstract: |
What is the value of memory? If I give you money, can you erase your memories?
What would you do if you had to erase your memories after a pleasant vacation?
In this study, we examined to see how much people appreciate memories. The
results show that the value of memory is different with gender and age. First,
People like what they can remember rather than current pleasures. Second, men
consider current pleasures than memories over women when priming a mating goal.
Third, depending on age and gender, the choice of pleasure and memory is
different. As men age, the value of memory decreases. But women are no
different. Fourth, Mating Goal priming effect is different according to implicit
self-theory. The mating goal priming in a group with incremental theory gives
higher value for pleasure than a group with entity group. |
Keywords: |
Mating goal priming, Implicit self-theory, Value of memory, Gender
difference, Online choice. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
CAUSAL DIRECTIONALITY BETWEEN MOBILE PHONE DEPENDENCY AND MOBILE PHONE USE AMONG
KOREAN ADOLESCENTS |
Author: |
JUNG AH CHOI |
Abstract: |
As adolescents using mobile phone rapidly increase, the associated problems are
also reported, one of which is mobile phone dependency. While several
cross-sectional studies revealed the associations between mobile phone use and
mobile phone dependency, little is known about the causal directions between the
two variables. To examine the causality, this study developed and empirically
tested a series of autoregressive cross-lagged models where prior mobile phone
dependency predicts both subsequent mobile phone dependency and mobile phone
use, and vice versa, using longitudinal data. The data of 1,148 adolescent
mobile phone users from Korean Children and Youth Panel Survey of Grade 4
students who were followed for 6 years (2010-2015) were analyzed using
structural equation modeling. Results suggested that prior mobile phone
dependency predicted subsequent mobile phone use, while prior mobile phone use
didn’t predict subsequent mobile phone dependency. Empirical evidence was found
for mobile phone dependency as a causal precedence to mobile phone use. |
Keywords: |
Mobile Phone Dependency, Mobile Phone Use, Autoregressive Cross-lagged Model,
KCYPS |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A MIXTURE OF EXPERTS FOR CATARACT DIAGNOSIS IN HOSPITAL SCREENING DATA |
Author: |
SUNGMIN MYOUNG, HONG-KI LEE |
Abstract: |
One of the objects of many big-data analytic methods is to search through large
amounts of information, analyzing to predict for individual patients. Cataract
is a clouding of the lens inside the eye which leads to a decrease in vision,
and the most common cause of blindness and is conventionally treated with
surgery. It is important to detect the diagnosis early to reduce abstract
cataracts develop. Many machine learning and data mining techniques have been
suggested to do automatic diagnosis cataract. In this study, mixture of expert
method was applied on 126,532 people collected from visiting a health screening
center. Mixture of expert was implemented in R 3.4.1 to train the data for the
development of the model. The performance of the ME model was evaluated by
plotting a ROC curve for the validation of the results. The ME model achieved
accuracy rates which were higher than that of the logistic regression model.
This research will be applied to an important diagnostic decision mechanism for
cataract in health examination subject. |
Keywords: |
Mixture of Expert, Diagnosis, Cataract, Screening Data, Data Mining |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A MULTI-LEVEL E-COMMERCE ANOMALY DETECTION MODEL USING OMSVM |
Author: |
WOONG PARK, HYUNCHUL AHN |
Abstract: |
In our modern digital society, enterprises have been forced to make rapid
changes, called Cloud and Digital Transformation. Maintaining reputation by
effectively managing risks and uncertainties pressures enterprises whose
readiness cannot afford them. e-Commerce provides enterprise service-based
internet platforms. These rapid changes have also manifested in the form of
e-Commerce services; there is no doubt that sustaining a stable e-Commerce
service is at the core of competitiveness in the coming digital transformation
era. However, this involves architectural complexity. Thus we suggest a
proactive approach that manages risks based on a machine learning algorithm,
called anomaly detection. In particular, we propose a novel anomaly detection
model that considers ordinal and multi-class cases that is effective in complex
environments. Particularly, we propose OMSVM(Ordinal Multi-class Support Vector
Machine) method for a multi-level e-Commerce anomaly detection. We also suggest
a practical model evaluation method that exploits hidden information and
provides numerical insights. Finally we discuss imbalanced data’s impact on
multi-classes and solutions. |
Keywords: |
Anomaly Detection, E-Commerce, Multi-class Support Vector Machine, Ordinal
Pairwise Partitioning, OMSVM |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A STUDY ON THE RELATIONSHIP BETWEEN BIRTH WEIGHT OF CHILDREN AND ADOLESCENTS
WITH DISABILITIES AND THE CURRENT INCIDENCE OF DISEASES IN INFORMATION SYSTEMS |
Author: |
MYUNG JI JUNG, KWANG OK LEE, EUN SOOK LEE |
Abstract: |
Against the backdrop of increase in low birth weight babies recently in Korea,
this study aimed to examine their health problems after growing up compared to
those at the same age born with normal weight and to provide basic data in
information systems for preventive measures. Particularly, the study tried to
identify the effect of the weight at birth of children and youths with
disability on their current health condition in information systems. The study
was conducted for 2 months from May 6 to July 16, 2009 with children with
disability, and chose 10 schools where teachers and parents gave consent, out of
50% of schools for children with disability selected randomly. Questionnaires
were distributed to 2,163 students in elementary, middle, and high schools among
children and youth with intellectual, physical, and both intellectual and
physical disabilities nationally, and the survey was conducted. Respondents also
included 949 parents of those students who agreed to participate. The survey
consisted of structured 19 questions. As a dependent variable, the parents were
asked to answer whether their children currently had diseases and if so, to name
the diseases diagnosed at hospitals. As an independent variable, they were asked
to write whether their children were born with low weight and how much they
actually weighed at birth. General characteristics of study subjects were
analyzed with a technical statistical analysis, and x2 test and one-way ANOVA
were applied to variables of general characteristics. The risk rate of diseases
related to the birth weight was analyzed using multilevel logistic regression.
In conclusion, those born as premature showed a higher risk of disease in school
age and puberty and also a higher incidence of heart disease and other diseases
than those born with normal weight. |
Keywords: |
Information Systems, Relationship, Birth Weight, Disability, Incidence Of
Disease |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
TOWARDS BETTER BILATERAL POLICY MAKING DECISIONS: INVESTIGATION OF
AUSTRALIA-RELATED ISSUES IN KOREAN MEDIA THROUGH KEYWORD ANALYSIS |
Author: |
HWA JONG KIM, TAE SUNG KIM, HYUK MIN KWON, DAE SEO PARK, ELIZAVETA SREDNIK,
KYUNG JIN CHA |
Abstract: |
Along with the growth of Big Data age, the value of analytics using data is
improving and contributes to the new value creation. Moreover, data from news
articles becomes important to identify and predict economic activities.
Nowadays, a lot of studies are being done using news articles to investigate the
economic phenomenon. Present study analyzes which issues have received attention
in Korea by using Australian news data reported in Korea. Based on this study we
aim to analyze Korea`s perception of Australia and further improve relationship
between Korea and Australia by helping to strengthen bilateral policy decisions
by using news textual analysis. |
Keywords: |
Big Data, News Articles, Textual Analysis, Korea, Australia |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A STUDY OF NEURAL NETWORK BASED IOT DEVICE INFORMATION SECURITY SYSTEM |
Author: |
SEUNGWON LEE, CHANGBAE MUN, OOK LEE |
Abstract: |
The development of ubiquitous computing environment has increased interest in
IoT (Internet of Things) technology. As IoT has flexible and open
characteristics applicable in various fields of industry, increased external
accessibility has raised the possibility of external threats. As the existing
IoT network was small on scale, there was less risk of security attack. However,
continuous IoT development brought the large scale network environment by
combining various networks, therefore causing higher risk of security attack
compared to small scale network environment. By figuring out the response and
implementation time while operating IoT devices to detect intrusion through
virus or hacking, the artificial neural network learns various responses using a
wide variety of mobile devices. This process may help to deal with current virus
and hacking. In addition, by detecting virus and malware in real time, this
process may also help to prevent future intrusion. As IoT security risk sharply
arises, we suggested an intrusion detection system using artificial neural
network model in this study. The system method which is developed in this study
can be adjusted to fit various fields and situations of IoT by facilitating
flexible modification of critical values. Considering limitations of IoT, the
research method which detects anomaly through learning the response and
implementation time is expected to be widely used for information security
system of various fields which utilize IoT in the future from various angles. |
Keywords: |
Anomaly, Intrusion Detection, Artificial Neural Network, Information System,
IoT, Security System |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
VULNERABILITY ANALYSIS ON THE IMAGE-BASED AUTHENTICATION: THROUGH THE WM_INPUT
MESSAGE |
Author: |
KYUNGROUL LEE, KANGBIN YIM |
Abstract: |
We verified the exposure of the mouse data using the WM_INPUT message handler
that extracts the mouse-inputted data to analyze the vulnerability of the
image-based authentication. Consequently, the mouse data were exposed on most of
the banking and payment sites of South Korea. Therefore, we proved that the
safety of the authentication information is vulnerable, even when image-based
authentication is applied. |
Keywords: |
Vulnerability analysis, Mouse data, Image-based authentication, WM_INPUT message |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
WORKING HOLIDAY IN AUSTRALIA: A SOCIAL-DATA BASED STUDY ON THE CORRELATION
BETWEEN PARTICIPANTS’ PERCEPTION AND PARTICIPATION CHANGE |
Author: |
JUN IL BANG, DEOK JOO LEE, ABIDA SULTANA, KYUNG JIN CHA, HWA JONG KIM |
Abstract: |
The main purpose of the study is to understand the relationship between people’s
perception and participation regarding a future event. The analysis was
performed to investigate whether the participation in Australian working holiday
program changes due to the change in the perception of the people of Korea. In
the research, we utilized time series statistical data and a set of sentiment
data collected from a social platform. We used the number of Korean people who
entered and exited Australia during the last 10 years and sentiment data from
two social blogs, called cafes: 'I Love Australia' and 'Hoggoksung', having
registered members of 150,500 and 110,127, respectively. The total numbers of
posts were 169,827 and 196,217, respectively. In was found that the change in
perception has strong impacts on the number of people participating in the
program. We also found that the sentiment data-based prediction is much more
effective than the simple numerical data-based prediction. |
Keywords: |
Big Data, Working Holiday, perception, Sentiment analysis, Australia. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
STATISTICAL ANALYSIS OF IMPACT FACTORS AFFECTING STRATEGIES OF THE VIRTUAL
REALITY SERVICE SYSTEMS AND INTERVENING EFFECTS OF PERFORMANCE EXPECTANCY |
Author: |
YOUNG-HO HWANG, YOO-JIN MOON |
Abstract: |
The purpose of this paper is to statistically analyze impact factors affecting
strategies of the virtual reality systems and to address intervening effects of
performance expectancy. The result demonstrates that the main predictors of
intention to use virtual reality service systems, in the order of importance,
are hedonic motivation, personal innovativeness, social influence and
performance expectancy. All intervening effects were significant: interactions
between effort expectancy and performance expectancy, between social influence
and performance expectancy, between personal innovativeness and performance
expectancy, and between hedonic motivation and performance expectancy. It
implies that the higher the customer’s performance expectancy, the stronger the
impacts of effort expectancy, social influence, personal innovativeness, and
hedonic motivation on intention to use the service systems. Based on the
statistical results, the paper suggests that consumers should experience the
services with enjoyment and get benefits by utilizing them, and so system
strategies for virtual reality services should appeal to consumers by
positioning the using experience as an adventure or a way to reduce their stress
and change a negative mood. Another system design strategy suggested for the
virtual reality services is to be reputation-building in order to gain a
favorable opinion from referents, and to target the early adopters. |
Keywords: |
Virtual Reality Service, Performance Expectancy, Hedonic Motivation, Social
Influence, Personal Innovativeness |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
ESTIMATION OF CENTRAL NERVOUS SYSTEM ACTIVITY BY DATA MINING NORMAL SINUS-ECG
RHYTHMS |
Author: |
JEONG-HWAN KIM, JEONG-WHAN LEE, KYEONG-SEOP KIM |
Abstract: |
In this study, we propose a method to assess central nervous system activity in
terms of activity-degree in sympathetic and parasympathetic state by estimating
the cardiac oscillator-parameters of Integral Pulse Frequency Modulation (IPFM)
model in which the artificial heart rhythms are generated by modulating sinusoid
signal with applying the threshold level for resolving R-peaks. With this aim,
we proposed a modified IPFM model by the empirical method with applying
preset-threshold of unity. The artificial R-R interval data are analyzed by the
time and frequency-domain features to describe Heart Rate Variability (HRV)
under the effects of cardiac oscillator constants. The benchmarking MIT/BIH
database consisted of Normal Sinus Electrocardiogram rhythms (NSR-ECG) are
utilized to estimate the sympathetic and parasympathetic constants by comparing
HRV measures on MIT/BIH NSR with those on the data generated by our modified
IPFM model. Based on our experimental results on estimating the modulatory
parameters of central nervous system activity, we can conclude that IPFM
parameters on the real ECG data can be effectively estimated to assess
cardiac-sympathetic and parasympathetic activity. |
Keywords: |
Electrocardiogram (ECG), Heart Rate Variability (HRV), Integral Pulse Frequency
Modulation (IPFM), Autonomic Nervous System (ANS), sinus rhythm, Poincare plot. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
ZERO WATERMARKING SCHEME FOR CITYGML |
Author: |
DAYOU JIANG, JONGWEON KIM |
Abstract: |
City Geography Markup Language (CityGML) is developed as an open data model,
which is based on the XML format for the storage and exchange of virtual 3D city
models. CityGML defines the basic entities, attributes, and relations of a 3D
city model. With respect to the cost-effective sustainable maintenance of 3D
city models, it allows the reuse of the same data in different application
fields. However, the copyright protection in suchlike virtual 3D city filed is
not popular. Therefore, we present a zero watermarking scheme based on the
global geometry property of the point cloud for CityGML. Firstly, the paper
analyzes the data structure of CityGML and discusses the feasibility data for
watermark. Secondly, extracts the point and topology information from CityGML.
Finally, generates the zero-watermarking by using the global geometry property
from vertex norm. We conduct several experiments on CityGML models with
translation, rotation, uniform scaling, vertex re-ordering, simplification,
smoothing, and noise attacks. Experiments show the scheme can satisfy the
requests for copyright protection of CityGML models. |
Keywords: |
CityGML, Zero Watermarking, Point Cloud, Geometry Property |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
CTQ FOR SERVICE QUALITY MANAGEMENT USING WEB-BASED VOC: WITH FOCUS ON HOTEL
BUSINESS |
Author: |
DONGWON KIM |
Abstract: |
This study aims to derive CTQ(Critical-to-Quality) for service quality
management strategy optimized to the hotel service. In order to derive CTQ, text
mining analysis of 46,870 reviews written by foreign visitors covering 20 hotels
in Seoul, Korea, is conducted from Jan. 2014 to Jun. 2017. In this study,
KJ(Kawakita Jiro) method applied by text mining technique, LDA(Latent Dirichlet
Allocation) for topic modeling, is examined and raw VOC data were translated to
CTQ characteristics. In addition, the measurement of CTQ is practiced based on
sentiment analysis related to keywords from topics in contrast to typical CTQ
measurement. Finally, it examined what CTQ measured influences on the hotel
business performance through the linear regression. |
Keywords: |
CTQ, LDA, Sentiment Analysis, Service Quality Management, Text Mining, VOC. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A STUDY ON THE EDUCATIONAL EFFECT OF MIXED REALITY IMPLEMENTATION EXPERIENCES:
FOCUSED ON THE PROGRAMMING TASK VALUE OF ELEMENTARY SCHOOL STUDENTS |
Author: |
JI-YUN KIM, TAE-WUK LEE |
Abstract: |
Mixed Reality (MR) is one of promising technologies in the 4th industrial
revolution era. The purpose of this study is to let elementary school students
experience directly programming of MR implementation and to examine how
educationally the task value of programming is effective. To achieve that, 100
elementary school students were divided into an experimental group (50 students)
and a control group (50 students), and a preliminary questionnaire survey as
pre-test was conducted for homogeneity test. With the same theme, MR
implementation programming class was applied to the experimental group and
general programming class was applied to the control group, ten times. After the
experimental application, the two groups had post-test with the same
questionnaire used in pre-test. To find the difference between the two groups,
data were analyzed at the significance level of .05. As a result, the
experimental group recognized the value of programming tasks more highly than
the control group (t=2.009, P=.048). According to the analysis on the change in
the programming task value between the groups depending on a class type, the
control group recognized the programming task value in the same level as in the
one before the class (t=1.446, p=.525), whereas the experimental group more
recognized it than before the class (t=-2.327, p=.024). |
Keywords: |
Mixed Reality, Task Value, Programming Education, Scratch, Webcam |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
IMPLEMENTATION OF NON-INSTALL TYPE DRM SYSTEM TO PREVENT ILLEGAL COPYING OF
WEB-BASED MEDIA CONTENT |
Author: |
KI-BOK NAM, KOO-ROCK PARK, JOON-YOUNG KIM, YOUNG-SUK CHUNG |
Abstract: |
With the development of IT technology today, many media content services are
being used, and there are cases where they have to use both online and offline
depending on the service type. However, there are various difficulties due to
illegal distribution of content. In this paper, we study DRM (Digital Right
Management) method which can run on a web browser that supports HTML5, which
does not need to be installed separately, in order to prevent illegal
distribution of media content. The existing DRM method is expensive, and since
the encryption algorithm is not standardized even when it is operated off-line,
it is difficult to use since a dedicated DRM viewer for each installation type
have to be installed. To solve this problem, this paper proposes and implements
a new DRM system using base64, an encrypted media source file, which can be used
without installing separately in a web browser supporting HTML5. |
Keywords: |
DRM, AES256, Base64, BLOB, Javascript |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
DEVELOPMENT OF EDUCATIONAL MATERIALS USING PREZI AS DIGITAL STORYTELLING TOOL |
Author: |
HYERYEONG SHIM, SUNJOONG LEE |
Abstract: |
This study seeks new methods for developing educational materials using
web-based multimedia tools in Korean language education. For this purpose, this
study focuses on ‘Prezi’, a presentation tool which enables storytelling
approaches. ‘Prezi’ is a cloud-based presentation tool, which features the
interface that shifts pages using zoom-in effect. It breaks from the usual
two-dimensional presentation to a more effective presentation with dynamic
screen composition using space movement. Moreover, ‘Prezi’ enables a more
comfortable visualization of digital storytelling. Digital storytelling allows
nonlinear writing using the flexibility of the media, and anyone can become a
director with the development of various multimedia technology. Moreover, the
barrier between creators and audiences collapses and everyone can become
participants of the contents due to the same digital media they share that
allows networking. ‘Prezi’ presents the aforementioned advantages of digital
storytelling and the advantages can be integrated in education by using ‘Prezi’
to develop educational materials. Even more, ‘Prezi’ can be utilized anywhere
connected through the internet, and various people can access the educational
materials by sharing URLs. This study will show the process and system of
developing web/computer-based educational materials using ‘Prezi’ and will also
present its actuality as e-learning material. |
Keywords: |
Teaching Materials, Prezi, Online, Multimedia, Digital Storytelling, Korean
Language Education |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
AN ANALYSIS ON INFLUENCE FACTORS OF LOCAL RESIDENTS LIFE SATISFACTION IN
INFORMATION SYSTEMS |
Author: |
MYUNG JI JUNG, KWANG OK LEE |
Abstract: |
Objective: This study intended to grasp the influence factors on local
residents’ life satisfaction in Korea in information systems. Method: This study
set 263 person, who completed their responses to the life satisfaction survey
questionnaire by participating in a local festival held in October, 2015 at a
city, Chungnam Province, as its research subjects. The survey questionnaire was
developed by this research group by referring to preceding researches, together
with the interview with the subjects conducted by trained students of a nursing
college and this research group. This study conducted Chi-square analysis and
multi-regression analysis to verify the hypothesis that the higher the
objective, social factors, i.e. education level and household income, the more
cases where one lives with his/her spouse, and the better one’s subjective
health condition, the higher the life satisfaction will be. Result: In
multi-regression analysis with life satisfaction as a dependent variable, the
educational level, household income, and subjective health condition were found
to be the variables having something to do with life satisfaction in a state
where related factors were controlled. In addition, it was found that the higher
the educational level and household income, the higher the life satisfaction,
and that the better the subjective health condition, the higher the life
satisfaction. The analysis result in information systems showed that the family
income and subjective health condition were found to be the highest with R
=0.041, respectively among the variables, followed by the educational level with
R =0.021, and marital status with R =0.006. Conclusion: Resultantly, the
hypothesis set by this study was verified as true. It was found that the
demographic factors such as an educational level and economic level, etc., and
subjective health condition have an influence on life satisfaction in an area of
our country. |
Keywords: |
Analysis, Influence factor, residents life, satisfaction, Information systems |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
MODELING OF CRIME PREVENTION SYSTEM USING LOCATION-BASED SERVICE |
Author: |
SANG-HYOCK PARK, KOO-RARK PARK, JOON-YONG KIM |
Abstract: |
In modern society, smartphone has become one of the most important means that is
not separable from our actual life. Nowadays, we are able to be easily
introduced to people of the opposite sex through mobile social dating apps.
Mobile social dating apps are advantageous in that they allow us to be easily
introduced to people of the opposite sex whereas they are disadvantageous in
that they are vulnerable to exposure to crime since they do not feature a
function that would provide users with an opportunity to go on an actual date.
In this thesis, the major mobile social dating apps in Korea were analyzed, and
a system that can be used to manage the actual dating phase serving as the
vulnerability among these apps was designed and implemented. This system was
implemented so that, once users use the GPS location-based service to confirm
other users’ location and save their dating information, dating location and
dating time, it saves such information to database, and, thereby, allows users
to record and manage their dating phase. As a result of implementing and testing
this system proposed in this thesis, it was found that users felt less insecure
about their dating phase, and that this system may have an influence on crime
prevention. |
Keywords: |
Location Based Service, Social Dating, Couple Matching, Mobile Application, GPS |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A STUDY ON PROGRAMMING EDUCATION TO DEVELOP SUSTAINABLE INTEREST |
Author: |
SEONGKYUN JEON, EUNKYOUNG LEE, YOUNGJUN LEE |
Abstract: |
Programming education is considered a primary area aiding the development of
computational thinking, an essential 21st century competency. To verify the
effects of computer education, we must create well-designed learning
environments along with strategies to develop learner’s interests and
computational thinking. This study developed a programming education program
based on design principles to promote and maintain students’ interest in
learning; the program’s effects were then verified. The results of our study
show that our programming education program positively effects students’
interest in learning. |
Keywords: |
Programming Education, Interest, Computational Thinking |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
IMPLEMENTATION OF INDIVIDUAL CUSTOMIZED NEWS NOTIFICATION MODEL WITH WEB
CRAWLING |
Author: |
KYOUNG-ROCK CHUNG, KOO-RACK PARK, SEONG-HYUN PARK, YOUNG-SUK CHUNG |
Abstract: |
In modern society, there are many news media that cannot be compared with the
past because the news is made and reproduced by individual social media besides
the official press. For example, newspapers were issued once a day to receive
new news every day in the past. Now, with the development of information and
communication technology, it is possible to check newspaper news in real time
using PC and mobile internet, so that it can receive information anytime and
anywhere quickly. In modern times, it is possible to see the news quickly
through many media, but there are many articles that disappear without being
aware of anything other than important events for a long time. If the event you
are interested in is always in the news, you can keep track of all the events,
but if a larger, more exciting new article is treated as a news story, you will
not see an article about what happened afterwards It is also missed. Many of the
most recent events have been reported in so many news stories, but there are
many cases in which the truth or progress of the event is not revealed as
important as it was when the first event occurred. In this paper, to solve
these problems, we implemented a notification function that informs the news
information of the individual keywords to the mobile application by constantly
observing the news using the crawling technology. |
Keywords: |
NEWS, Database, Web crawling, Web scraping, Information retrieval. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
A TECHNOLOGY-INTEGRATED STORYTELLING METHOD IN DEVELOPING SYLLABUS DESIGN FOR
UNIVERSITY WRITING EDUCATION |
Author: |
HWA-SEON KIM, KYEONG-OUK JEONG |
Abstract: |
The purpose of this study is to develop syllabus design for university writing
education. To invent the architype of university writing instruction for the
curricular sequence, a technology-integrated storytelling method was
implemented. With the current development of digital technology, more and more
people are interconnected through storytelling to each other through various
social media or social networks. In the field of education, storytelling has
been considered as an effective instructional method that can provide students
with entertainment, promote learner motivation, and help students focus on their
own learning process. In the recent educational milieu based on constructivism,
learner responsibility and learner autonomy become much more crucial than those
of the teacher. This phenomenon has reflected the essential concept that the
main character of learning is the learner, not the teacher. Owing to the
development in technologies, technology-enhanced instructional methods such as
flipped learning or blended learning have also become the new educational
trends. Consequently, the notion of technology-integrated storytelling method
based on learner-centered perspectives becomes more significant than ever, and
various online platforms can be served as a powerful network to share stories
among people. In this regard, the storytelling instructional method with
technology integration can wonderfully match the learner-centered pedagogical
approach. In this study, the architype of syllabus will be designed using the
technology-integrated storytelling method in university writing education.
Learning and teaching strategies will be suggested with the use of
technology-integrated storytelling teaching method. |
Keywords: |
Storytelling Method, Technology-enhanced Learning, Syllabus Design, Writing
Education, Learner-centered Learning |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
EFFICIENT GROUP KEY DISTRIBUTION SCHEME IN NVR |
Author: |
GUN-WOOK CHOI, YONG-WOON HWANG, IM-YEONG LEE |
Abstract: |
NVR is a network video surveillance system that can be used in the Internet
environment. Through the system, the user can acquire image information remotely
and use it for various purposes. However, when cameras connected to the network
or not connected to the network are connected to the Internet, security problems
such as unauthorized access and leakage of image information occur. Therefore,
this paper can solve various threats effectively by encrypting image information
generated in IP CCTV through symmetric key group key management. |
Keywords: |
IP CCTV, Group Key Management, Authentication, NVR |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
EFFICIENT GROUP AUTHENTICATION AND KEY EXCHANGE SCHEME FOR IOT ENVIRONMENT |
Author: |
DAE-HWI LEE, IM-YEONG LEE |
Abstract: |
User authentication verifies that a user is a legitimate user. Such security is
essential. As the Internet of Things (IoT) continues to develop, user
authentication has become critical. In an IoT environment, many interconnected
devices share data. Such devices can form small or large groups and communicate
with outside groups. With a group, a leader communicates with followers such as
smart devices. If a group is large, the group leader incurs a very large
operation overhead in terms of secure communication. When multiple devices
request simultaneous communication, many sessions must be authenticated, and
keys provided. Here, we propose an XOR-based group authentication technique
enabling group leaders to perform authentication and key exchange very quickly,
and a CRT-based group authentication technique that can be used when data are
less distributed. |
Keywords: |
IoT, Group-based Communication, Group Authentication, AKE, Key Exchange. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
ANALYSIS ON PREDICTING CYBERTERRORISM USING AHP (ANALYTICAL HIERARCHY PROCESS)
METHOD |
Author: |
LUTHFI FEBRIANSYAH, IMAM RIADI |
Abstract: |
This research aims to develop the steps used in mobile forensic based on the
previous cases by using EWS (Early Warning System) to gather useful information
about radical beliefs which will be transfered into intelligence product. The
process of this research began by making a case simulation, which contains
illustrations of the case that had happened and had been followed up by the
Police. Furthermore, the afformentioned case featured some evidences and one of
them is digital evidence which can be used to gain more information from the
followed up case so that information could be used to monitor the connection
between similar cases.The analytical method used is AHP (Analytical Hierarchy
Process) which is a method used to analyze the suspect’s acquired Smartphone to
search some contacts from the Whatsapp Messenger using these criteria: frequent
or high intensity with the suspect, contact, or individual or group that had not
yet inputted to the ISIS symphatizer list or the list of radical groups
(database), the existence of documents or information which lead to ISIS
movement or radical groups that lean towards terrorism. The result obtained from
this research is that Early Warning System, in predicting Cyberterrorism, could
use AHP (Analytical Hierarchy Process) method by doing these steps: determining
criteria, weighing which is adjusted to its importance, deciding on alternatives
to get new targets from on-going case and also based on analysis results and
tests. |
Keywords: |
Cyberterrorism, AHP, Digital Evidence, case simulation. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
GROUP FORMATION METHOD THROUGH HEURISTICS ALGORITHM |
Author: |
OKTARIANI NURUL PRATIWI, BUDI RAHARDJO, SUHONO HARSO SUPANGKAT |
Abstract: |
Cooperative learning is an approach of learning that work together in small
group to achieve goal together. This method has proven can increase student
ability, confident and communication skill. One method of cooperative learning
is Jigsaw method. Jigsaw method requires formation in heterogeneous groups, but
remains homogeneous between groups. Unfortunately, determination of appropriate
group formation according to the method is difficult, especially if the number
of students is large. Therefore, this research attempts to propose an algorithm
to set heterogeneous group formation of student properly. The right formation
can encourage students to learn optimally and able to improve students'
understanding well. In this study, the process of grouping students based on
student dissimilarity. This paper contributes a group formation algorithm with
the Centered-Optimization approach. For comparison, in this study the
Centered-Optimization algorithms compared to Centered-Random algorithms. As
result, the Centered-Optimization algorithm can provide the highest
heterogeneous fitness value. Based on ANOVA Univariate analysis, the fitness
value of fixed-root-optimization algorithm is significantly different from the
two comparison algorithms. |
Keywords: |
Cooperative learning tools, computer science education, e-learning, group
formation, |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
IT SUPPORT IN DECISION-MAKING WITH REGARD TO INFRA-RED GRAIN DRYING MANAGEMENT |
Author: |
LAKHNO V., 1KASATKIN D., BURIACHOK V., PALEKHA Y., SAIKO V. DOMRACHEV V. |
Abstract: |
The work is devoted to information support of grain infrared drying, on the
basis of a rational choice of the process temperature and computer control. The
model is developed and the original system of differential equations for double
and single inlet of heat from the infrared source. Implemented into software a
system of information support of infrared drying grain, with user-friendly
interface, intuitive control components, as well as the presentation of the
forecast and the resulting information. Experimental studies of the influence of
various parameters of the information support system for infrared grain drying
on heat exchange and evaporation of moisture in a drying chamber were performed.
The evaluation of various options for using the module of information support
systems for infrared grain drying was carried out. |
Keywords: |
information technology, grain drying, infrared radiation, management, decision
support. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
QUERYING RDF DATA |
Author: |
ATTA-UR-RAHMAN, FAHD ABDULSALAM ALHAIDARI |
Abstract: |
Resource Description Framework (RDF) is a data model to represent and store the
web contents and their association in the form of a graph. This will enable the
web (semantic web) to answer queries in a meaningful way as compared to the
current web of keyword locator. Querying is required to retrieve any information
from the semantic web (RDF data). In this context several algorithms have been
proposed which can be classified in different categories. There are mainly two
ways to query RDF data, one ‘on the fly’ and the other is ‘index query’. The
indexing method requires lot of offline work on RDF data to make the query run
faster over it but at the cost of increased space. On the other hand, the ‘on
the fly query’ algorithms’ takes more time to execute. In this research, an
algorithm with reduced time and space complexity is proposed. The data graph is
being stored in an Adjacency Matrix and Adjacency List. Our algorithm tries to
match the query graph with the data graph (graph pattern matching) with lesser
cost. By comparing the results, it is observed that proposed technique’s results
are more accurate with reduced complexity. |
Keywords: |
RDF, Graph Data Query, Semantic Web |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
TRACKING COMMUNITY MOTIVATION TO USE ONLINE SOCIAL NETWORKS: A CASE STUDY OF
FACEBOOK |
Author: |
IMANE EL HAOUTA, ABDELOUAHAB IDELHADJ |
Abstract: |
Most people use the social network in their day to day life. In fact, social
networking has become central in the era of globalization. Facebook (FB) is a
great illustration of this phenomenon as its popularity has increased
tremendously in the last couple of years. It has become an essential tool for
connecting people and creating different kinds of interactions. In our study, we
aim to explore people’s motivations for using an online social network among a
sample of FB users in Morocco (N=355). It investigated how eight motivations to
use FB predicted the intensity of Facebook use (IFU). The results demonstrate
that the motivation to use FB for checking and posting status updates is the
major predictor of IFU. Findings are discussed in term of helping to build a
better knowledge of social networks and their user's behaviors as expanding
motivations to use Facebook. |
Keywords: |
Facebook, Motivation, Intensity of Facebook Use, Social Networking Sites,
Morocco |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
ANALYSIS OF ACCOUNTING INFORMATION SYSTEMS WITH NON-LINEAR SEM-PLS |
Author: |
MOCH BISYRI EFFENDI |
Abstract: |
The purpose of this research is to analyse the impact of accounting information
system, quality of accounting information system and service quality dimension
of accounting information system to customer satisfaction of mobile banking
application user (E-satisfaction). The population in this study are conventional
bank customers located in Surabaya, Indonesia. The samples are bank customers
who use mobile banking based applications. The method of analysis in this study
using non-linear Equation Modeling Partial Least Square (NL-SEMPLS) with the
help of WarpPls 5.0 software. NL-SEMPLS analysis is divided into 2 stages,
namely, outer model and inner model. Outer model is used to analyse the validity
and reliability of the indicator of the latent variable, while the Inner model
is used to analyse the significance of the path / test of influence between the
latent variables. The results showed that Reliable (RE), Responsiveness (RES),
Assurance (AS) and Empathy (E) were able to measure the quality of accounting
information system services. The best indicator to measure the quality of
accounting information system services is Responsiveness (RES). The results
showed that the accounting information system, the quality of accounting
information system and the quality of accounting information system services
affect the customer satisfaction of mobile banking application users
(E-satisfaction). The most influential factor on customer satisfaction of mobile
banking application user (E-satisfaction) is Quality of Information System
Services (QISS) that is Responsiveness (RES). It can be concluded that customer
satisfaction of mobile banking application user (E-satisfaction) is the
effectivity of mobile banking applications that can provide quick and precise
response when conducting transactions (RES2). |
Keywords: |
Accounting Information System, E-Satisfaction, Mobile Banking, SEM-PLS |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
APPLICATION OF ARTIFICIAL NEURAL NETWORK FOR POWER TRANSFORMER PEAK LOAD
PREDICTION |
Author: |
RAMADONI SYAHPUTRA, FEBRIAN DHIMAS SYAHFITRA, INDAH SOESANTI |
Abstract: |
Planning an electric power system is a very important task for electric power
providers. Good and measurable planning will make the operation of the electric
power system good, stable and highly reliable. One part of planning an electric
power system is the forecast of future loads. Load estimates must be made as
early as possible. The purpose of the peak load prediction is to anticipate the
growth of the load in the future, so that the electricity provider company is
ready with the condition of the electricity load that will occur in the next few
years, where as long as this has not been done in many substations in Indonesia.
In this study, a backpropagation neural network method for power transformers
peak load forecasting has been proposed. The choice of backpropagation type is
better accuracy of results than other types of neural networks. The case study
of this study was Bumiayu Substation located in Brebes district, Central Java
province, Indonesia. The parameters that are taken into account in electricity
load forecasting are population growth data, Gross Regional Domestic Product
(GRDP), and the data of peak load history of the Bumiayu substation. The results
of the study have shown that the estimated electricity load in the next 10 years
can still be served by two power transformers installed in Bumiayu Substation. |
Keywords: |
Artificial Neural Network, Backpropagation, Peak Load Prediction, Power
Transformer, Substation. |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
Title: |
MEASURING THE SUCCESS OF E-GOVERNMENT SYSTEMS: APPLYING THE SUCCESS MODEL OF THE
DELONE AND MCLEAN INFORMATION SYSTEM |
Author: |
ZAINAB AMIN AL-SULAMI, HAYDER SALAH HASHIM |
Abstract: |
The success model of an information system from an Iraqi citizen’s perspective
was utilized to examine the e-government system in developing countries,
exclusively in Iraq's environment. Partial Least Square path modeling algorithm
was applied as a fundamental technique to analyze the collected data using a
questionnaire of 160 citizens in Iraq. The proposed model was developed by
modifying the updated DeLone and McLean IS success model. The proposed model
consisting of the previous six constructs from the updated D&M model was
integrated with trust constructs. Results empirically corroborate that ten
hypotheses among the seven constructs are supported significantly, whereas the
other three are less supported. Model constructs are affirmed to affect the
citizen intention and satisfaction positively. The impact gradually decreases
from trust as the highest influence constructs, followed by service, system, and
information qualities. Trust is confirmed as the main powerful construct that
positively influences the Iraqi citizen’s usage intentions. The managerial
implications of these research results contend that the Iraqi government
agencies, along with the system developers, must pay extra attention to the
proposed model constructs that influence the citizen’s intention to use an
e-government system, specifically the construct of citizen trust. |
Keywords: |
e-government system, success model of DeLone and McLean, citizen trust, Iraqi
citizens, |
Source: |
Journal of Theoretical and Applied Information Technology
30th Novembber 2018 -- Vol. 96. No. 22 -- 2018 |
Full
Text |
|
|
|