|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
December 2018 | Vol. 96
No.24 |
Title: |
AUTOMATIC SPOKEN LANGUAGE RECOGNITION FOR MULTILINGUAL SPEECH RESOURCES |
Author: |
MOHAMMED O. ELFAHAL, MOHAMMED E. MUSTAFA, RASHID A. SAEED |
Abstract: |
Automatic spoken language recognition refers to a sequence of processes aim to
transfer human perception ability of identifying spoken languages to machine
using computer program. In spite of great achievements in the domain, the task
is still challenging to be practically efficient and reliable. This paper run
throughout decades of research attempts approaching optimal languages
identification accuracy comparable to human ability of identifying spoken
language. Analysis methodologies of extracting most relevant speech information
were reviewed. Achievements of approach based on language dependent linguistics
rules and those based only on spectral attributes conveys in speech signal were
investigated and compared. Exists of standard multilingual speech corpora offers
evaluation and comparison of varies speech analysis methods and classification
algorithms in single speech variability effects environment. In spite of great
achievements, this demanding multilingual communities' communication solution,
still looking flexible model easily accepting new language, shorten recognition
time, overcoming difficulties of dialects and accents variations and mixed
languages speech recognition. |
Keywords: |
language identification, features extraction, phonotactics, acoustic, mixed
speech. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
FACTORS AND MODEL FOR SENSITIVE DATA MANAGEMENT AND PROTECTION IN INFORMATION
SYSTEMS’ DECISION OF CLOUD ENVIRONMENT |
Author: |
HAIFAA JASSIM MUHASIN, RODZIAH ATAN, MARZANAH BINTI A.JABAR, SALFARINA BINTI
ABDULLAH |
Abstract: |
Cloud computing is a growing field, providing the need for enterprises and
individuals to access cloud computing resources to meet their organizational
computing requirements. The features of scalability, low cost and unlimited
resources of cloud computing encourage many organizations and individuals to
transfer their data including personal, financial or health data to the cloud.
However, security and privacy are main issues in cloud computing because of the
factors of confidentiality, integrity, availability and privacy. As well as
access control, management and internal attacks. These fears become one of the
biggest challenges in the cloud, especially when dealing with sensitive data.
This paper described a research done that proposed a framework to enhance
information systems decision on managing sensitive information in cloud
environment. The main factors are defining which are influencing on decision of
management system on sensitive data in cloud and explain the model for these
factors. Also, this paper explains shared responsibilities by all parties in the
proposed framework which is one of our contribution for this study. The
empirical study was conduct which is include expert-questionnaire, interview for
pilot study and interviews validation. The proposed framework was evaluated
through experts from academics and industries. The results of validation process
confirmed the validity of proposed framework and the validity and reliability of
the instrument proposed for the study. Empirical study was verified the proposed
framework. This framework is enhanced information systems decision on managing
sensitive information in cloud computing. This framework using multilevel
related to Authorization, Authentication, classification and identity anonymity,
and save and verify. The findings for this study by using anonymization
technique and classifying the contents of the sensitive data file confirmed
preserve privacy and security of sensitive data and enhanced the managing
sensitive data. |
Keywords: |
Cloud Computing, Privacy, Confidentiality, Anonymity, Sensitive Data,
Information System Decision |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
THE IMPACT OF SOCIAL NETWORKS IN INFLUENCING THE CONSUMER PURCHASING DECISION
VIA THE INTERNET: ANALYTICAL STUDY IN ALBALQA APPLIED UNIVERSITY |
Author: |
SATTAM RAKAN ALLAHAWIAH, MOHAMMAD MAHMOUD TARAWNEH |
Abstract: |
This study aimed to investigate The role of social networks in influencing the
consumer purchasing decision via the Internet from students’ perspective in the
Faculty of karak in southern region of Jordan , The descriptive analytical
approach was used in this study. The study included a random sample of students
in the faculty and the sample representative of all the study population (100)
student. To achieve the objectives of the study, a questionnaire was developed
for the purpose of data collection, the SPSS Package / Version (16) was used to
analyze the data. The most important findings of this study were ,the
perceptions of respondents toward social networks and consumer purchasing
decision in karak college were at high level , there also is association between
social networks and consumer purchasing decision via internet .The study
concluded with a number of recommendation , among which , That the
cyber-marketers and web designers should understand the advantages that social
networking sites provide, The random sampling process for social network users
is a combination of individuals who do not use and who do not buy. Therefore,
website designers and marketers should seek to convince users to increase the
awareness and awareness of the means of social communication and learn how to
apply these tools in order to increase the effectiveness and interaction of
websites and their impact on purchasing decisions, know which social networks
connect the appropriate site tools and should focus on features that increase
consumer support and allow easy exchange of information as well as other
features such as site handling, product preview opportunity and product
evaluation assistance. |
Keywords: |
Social Lnetworks, Consume Rpurchasing, Internet, Analytical, University |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
NEW APPROACHES TO MODEL SIMULATED SPATIO-TEMPORAL MORAN’S INDEX |
Author: |
HAITHAM S. HASAN, HUDA A. OBEED, JAAFAR AL-SHAMMAA |
Abstract: |
The strength of spatial autocorrelation can be measured by Moran’s index, which
enumerates the dispersal (or clustering) degree of objects in space. For
instance, investigating data over a general area in 2D by employing a single
Moran’s index could not offer a enough summary of the features, spread,
behavior, or latent surfaces shared by neighboring areas; rather, by dividing
the area and acquiring the Moran’s index of each divided area. Hence, we can
determine patterns of the local neighbors not otherwise visible. In this paper,
we present a simulation experiment where a time variable is added to a spatial
Poisson point process. We then investigate the changes in the Moran statistics
over the neighboring areas and propose ideas on how to perform the analysis.
This serves as a proof of concept as to why we should be careful in using
methods that contain implicit normality assumptions when dealing with
spatio-temporal data. |
Keywords: |
Spatio-Temporal Autocorrelation, Monte Carlo Simulation, Moran’s Index,
Asymmetric Eigenvector Maps, Chesapeake Bay. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
(9th January 2019) Paper retracted due to
exceeding similariy isseus with follwing paper published and now availble
online.
https://www.researchgate.net/publication/327390832_New_Approaches_to_Model_Simulated_Spatio-Temporal_Moran's_Index
|
|
Title: |
EXTRACTING THE FACTORS INFLUENCING THE USE OF COMMUNITY-BASED TRAVELER
INFORMATION SYSTEMS BY ANALYSING COMMUTING CRITICAL INCIDENTS |
Author: |
ABDALLAH NAMOUN |
Abstract: |
Community-based traveler information systems have become prevalent in our daily
life to help people commute from one location to another. Despite the perceived
benefits of these systems, such as sustainability and green transportation, the
literature still lacks studies about how such systems are used and their impact
on promoting sustainable travel decisions and behaviors. This research
investigates the current use of two popular traveler information systems, namely
Waze (a crowdsourcing navigation app) and BlaBlaCar (a car-pooling website and
app). More precisely, this paper identifies commuters’ use of such systems, the
real challenges that hinder the adoption of such systems, and the factors
leading to the successful adoption of traveler information systems. To this end,
we conducted an exploratory study that involved collecting and analyzing 257
real commuting critical incidents through several online channels. The inductive
thematic analysis of these commuting stories resulted in four major influential
categories, namely instrumental, social, technological, and environmental
factors. These factors are further divided and considered critical to the design
of effective community-based traveler information systems. |
Keywords: |
Community based Traveler Information System, Critical Incident, Challenges,
Enabling Factors, Design Recommendations |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
INITIAL CONCEPT OF COUNTENANCE MODEL BASED ON ANEKA-TRI HITA KARANA IN
EVALUATING COMPUTER LEARNING QUALITY AND STUDENTS’ CHARACTER |
Author: |
DEWA GEDE HENDRA DIVAYANA, I PUTU WISNA ARIAWAN, AGUS ADIARTA, I WAYAN SUWENDRA,
I MADE SUNDAYANA |
Abstract: |
The evaluation of computer learning character and quality that were learned by
students (especially student of the vocational school of information technology)
are still in very minimum grade currently. The problems arose when teachers
assumed that student competencies have able to measured through just in their
cognitive abilities, even though student competencies is also supported by the
positive character which they have. Based on these, the purpose of this research
was to determine the countenance evaluation model that is integrated with the
ANEKA concept and the Tri Hita Karana concept, so that it can be used to
comprehensively assess of student cognitive abilities and character in computer
learning process. The initial location of this research was on one of the
vocational school of information technology in Bali Province that was SMK TI
Udayana. The subjects that were involved in this research there were four
people, those were two informatics engineering experts and two education
evaluation experts. This research was carried out for three years using Borg and
Gall development method, wherein the first year research was carried out the
conceptual development of evaluation model, in the second year the research will
make an evaluation application and field testing, while on the third year the
research will doing an operational field testing and dissemination of
applications which is ready to be used on a wide scale. Especially in this
first-year research, the development of evaluation model’s conceptual design was
done used a data collection tool in the form of questionnaires, documentation
picture, observation guidelines, and interview guidelines. The data those had
been collected then analyzed by using quantitative descriptive analysis
techniques. The results of this research indicated the design of countenance
evaluation model based on ANEKA-Tri Hita Karana, and those had been tested by
experts with effectiveness level of 88%, so it is ready to be used as a basis in
making the physical design of the application in the next second-year research. |
Keywords: |
ANEKA, Countenance Model, Tri Hita Karana, Computer Learning |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
DETERMINING THE LEVEL OF TRUSTWORTHINESS OF INFORMATION IN SOCIAL MEDIA |
Author: |
MOHAMAD NAZRI BIN KHAIRUDDIN YAP, MASSILA BINTI KAMALRUDIN, SAFIAH BINTI SIDEK |
Abstract: |
The social media are increasingly becoming the main reference and having
important implications on virtual community. Parts of the information published
in the social media could be useful and some could be misleading. Therefore,
there is a need to develop an approach that can verify the trustworthiness of
online information to minimise the dissemination of misleading information. This
paper presents a study that develops an objective approach to determine the
level of trustworthiness of information. Based on four parameters derived from
literature and empirical data, an algorithm to determine the level of
trustworthiness has been developed. This algorithm measurement of
trustworthiness was then realised through an automated tool called TrustCrawler.
The functionality of the tool was demonstrated using online information on
Government Service Tax (GST) of Malaysian drawn from Twitter. It was found that
the tool is able to provide consistent results on the level of trustworthiness
of online information based on the four parameters. It is anticipated that this
tool is able to help social media users to determine level of trustworthiness of
the information, hence becoming informed, safe and ethical users of media
content. |
Keywords: |
Degree, Information Trustworthiness, Social Media |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
CONCEPTUAL MODEL FOR ASSESSMENT TOOL TO MEASURE CITIZEN-CENTRICITY IN
E-GOVERNMENT WEBSITES |
Author: |
KAMALIA AZMA KAMARUDDIN, UMMI SAA’DAH MARNI, NOR LAILA MD NOOR |
Abstract: |
Citizen-centric e-government website is a crucial element for the present
governments because it serves as a key tool to increase access to and from
citizens. To ensure websites comply with citizen-centricity concept, assessment
on the websites need to be done to measure its conformance. However studies have
shown that there are no standardized approaches and evaluation criteria to
assess citizen-centric e-government websites. This research sets out to develop
a conceptual model for an assessment tool to measure citizen-centricity in
e-government websites and propose an assessment tool for measuring
citizen-centricity in e-government websites. To achieve the objectives, a
qualitative approach using literature analysis and website observation methods
was employed. Analysis of the results showed that the proposed conceptual model
encompassed four components and thirty-nine characteristics under seven
different themes. Based on the model, an assessment tool to measure
citizen-centricity in e-government websites has been developed as an artifact of
the research. |
Keywords: |
Citizen-Centric, E-Government, E-Government Website, Website Assessment,
Assessment Tool |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
DYNAMIC EXTENSION OF ENTROPY-BASED GRAVITY MODEL FOR TRIP DISTRIBUTION PURPOSE |
Author: |
ASMA SBAI, ABDELALI TOUIL, FATTEHALLAH GHADI |
Abstract: |
Previous studies had investigated the estimation of demand using either static
or dynamic approach. Each approach has its positive and negative side. During
these last years, more attention was given to the combination of static and
dynamic models and the integration of traffic assignment to obtain a more
accurate updated matrix. In this paper, we present a simulation where we use the
entropy-based gravity model to generate a seed matrix then we update the links
costs using Stochastic User Equilibrium assignment model to obtain a new
estimation. We show that incorporating an assignment method to the process of
estimation of Origin Destination Matrix lead to a better estimation. |
Keywords: |
Dynamic gravity models; Transport planning; Origin Destination Matrix; Gravity
model; Stochastic User Equilibrium |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
EVALUATION FRAMEWORK OF M-GOVERNMENT SERVICES SUCCESS IN MALAYSIA |
Author: |
NOOR DHEYAA AZEEZ , MUHAMMAD MODI LAKULU |
Abstract: |
Technological amplification has expended the involvement of information and
communication technology in public sectors and has increased governmental
dependence on information systems bringing the management attention towards
improving the success of m-government services. Based on the analytical
literature review, it was found that most of the m-government evaluation models
address the m-service dimensions that assess the quality of m-government
platforms. This gives a very constrict perspective to m-government and
ignores the key dimensions. Hence, it becomes important to understand how
citizens perceive m-government services. This involves defining what
m-government service is, identifying its underlying dimensions, and determining
how it can be measured. Therefore, periodical evaluation on the success of
m-government services becomes essential. Foregoing discussion clearly
indicates the necessity of developing a comprehensive m-government service
success evaluation framework which not only evaluates the m-government service
success but also evaluates the m-government service quality criteria and the
citizens’ perception in the form of citizens’ trust in m-services offered. Thus,
the objective of this study is to develop a framework called "m-government
service success evaluation framework" (M-GSEF) that evaluates m-government
service success from the citizen’s perspective. The Fuzzy Delphi method
based on expert opinions was used to evaluate the proposed framework to
determine whether all important dimensions and measurement items included in the
proposed framework (M-GSEF) were in the right research context or not. Ten
sub-factors were excluded after the implementation of the Fuzzy Delphi analysis
because they did not meet the requirements. As a result, final framework was
obtained in evaluating the success of Malaysian mobile government services |
Keywords: |
M-Government, Success, Evaluation Framework, Fuzzy Delphi. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
CROWD-BASED PROCESSING OF SOCIAL MULTIMEDIA TO SUPPORT INFORMATION ASSESSMENTS
IN DISASTER RESPONSE |
Author: |
H. FRITZE, E. CLEMENTINI, S. BREDA, C. KRAY |
Abstract: |
At the onset of a disaster, the rapid assessment of relevant information is one
of the most critical challeng-es for decision-makers at all levels. The
proliferation of social networking software combined with the in-creasing
pervasiveness of smartphones has established new sources of very timely and
current infor-mation. However, crowd-sourced social media suffer some major
drawbacks hindering its efficient use. Aid organizations and agencies need to be
able to rely on a valid and relevant set of information, which they can
incorporate systematically in their response actions. This paper addresses the
identification of poten-tially relevant photos shared through social networks
and their preparation for a rapid spatial assessment. We present a conceptual
framework for a crowd-based, semi-automated approach of processing photos to
leverage them for a spatial information assessment. The framework enables ad-hoc
volunteers to digitally support response actions by reviewing, georeferencing,
and annotating shared photos. We introduce a pro-totype called DisasterMapper,
which retrieves photos from Twitter and provides a geovisualization tool for
semi-automatic human processing and annotation. In two different evaluations, we
were able to demon-strate that digital volunteers can successfully process
social multimedia content and create a set of valua-ble photos applicable for
systematic information assessment operations. |
Keywords: |
Social Multimedia, Micro-Tasking, Interactive Geovisualizations, Digital
Volunteers, Crowd Processing |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY ON THE SOFTWARE ARCHITECTURE OF WRF AND OTHER NUMERICAL
WEATHER PREDICTION MODELS |
Author: |
ABEDALLAH ZAID ABUALKISHIK |
Abstract: |
Software modularity architecture facilitates software development and software
reusability. Software reusability enhances the maintenance of software,
facilitates building larger component out of sub-components. Numerical weather
prediction uses complex mathematical models and run them on powerful computers
to forecast weather conditions. Numerical weather prediction models have
proliferated and can be classified into regional and global models. The Weather
Research Forecast model is considered the next-generation mesoscale regional
model and widely used. The Weather Research Forecasting model consists of
several modules interacting with each other. This research aims to study the
WRF’s software architecture, software modules, and the forecasting accuracy of
WRF in respect to other well-known Numerical Prediction Models. The study
outcomes show that WRF’s software architecture characterized with high degree of
flexibility, loosely coupled modules which plays a very important role to obtain
accurate forecasting results through the application of independent modules, and
consequently it provides a high reliable and accurate forecasting results. |
Keywords: |
Weather Research Forecasting, Numerical Weather Prediction, Software
Architecture. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
USER EXPERIENCE ASSESSMENT TO IMPROVE USER INTERFACE QUALITY ON DEVELOPMENT OF
ONLINE FOOD ORDERING SYSTEM |
Author: |
HANIF AL FATTA, BAYU MUKTI |
Abstract: |
User interface played a significant rule in delivering an acceptable system to
the user. Many researchers have studied the use of user interface evaluation to
enhance the quality of the user interface. This study aimed to improve the
quality of the food ordering system by enhancing the user interface of the
existing system. It is believed that the better user interface may lead to
higher user satisfaction. This study analyzed user experience of food ordering
system’s users using Usefulness, Satisfaction, and Ease of Use ( USE)
Questionnaire. The data from 50 active customer participants as the primary user
of the food ordering system is gathered and analyzed. Moreover, the result of
this study showed that the utilization of USE questionnaire is successful in
capturing more usability problems. The questionnaires are significantly showed
the weakness of the current food ordering system and opened more possibilities
for the developer to enhance and revise the user interface of the existing
ordering system to deliver better service for the user. |
Keywords: |
user interface, user experience, USE, usability. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
THE ROLE OF INFORMATION TECHNOLOGY IN KNOWLEDGE MANAGEMENT IN SMALL MEDIUM
ENTERPRISE |
Author: |
SUHARDI, HAPOSAN BANJARNAHOR, STEFFI ADAM, ADE KURNIAWAN |
Abstract: |
The existence of Small Medium Enterprise (SME) has become a support and has a
major influence on Indonesia's economic growth. Furthermore, the general
problems and challenges of SMEs in several cities in Indonesia are lack of
knowledge and low competitiveness. There were 57.8 million SME practitioners in
Indonesia, with employment of 114 million people. Therefore, the purpose of this
study was to determine the role of information technology (IT) on knowledge
management applied by SME actors in Batam City, Riau Islands, Indonesia. This
study involved 30 of 1006 SMEs in the entire city of Batam Kepri, Indonesia with
5 types of businesses including industry, services, trade, fisheries,
plantations, agriculture, and livestock. The method used is multiple regression
analysis with T-Test and F Model Test. Researchers want to assess the influence
of information technology variables through IT knowledge, IT Operations, and IT
Infrastructure variables on knowledge management in SME. The results of this
study show at the 0.05 level of significance IT knowledge, IT Operations, and IT
Infrastructure has a positive and significant effect on knowledge management.
The results of the descriptive analysis state that the Acquisition and/or
development of knowledge provides the largest contribution in the application of
knowledge management for SMEs in Batam City. |
Keywords: |
IT knowledge, IT operations, IT Infrastructure, Knowledge Management, Small
Medium Enterprise |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
THE EFFECTS OF ICT COMPETENCIES AND WEBSITE DESIGN ON E-SERVICE WEB PORTAL
INFORMATION QUALITY IN SAUDI UNIVERSITIES |
Author: |
MOHAMMED AL MASARWEH |
Abstract: |
The rapid improvement of the Internet over the past two decades has offered
immense opportunities to state and private sector organizations to improve their
electronic services (e-services), and in Saudi Arabia there has been a major
drive to promote e-services provision by universities. This study examines the
relationship between information quality for e-service web portals and the
factors of ICT competence and website design in Saudi universities using an
online survey administered to 1327 undergraduate students from different
programs and faculties in six major universities. The main results of this
research indicate a significant relationship between information quality and
both ICT competencies and website design. Contrary to research expectations, the
effect of ICT competencies and website design on information quality did not
differ according to program types. Furthermore, the findings confirm that gender
moderates the effect of ICT competencies and website design on information
quality. Similarly, the findings reveal some differences in the suggested
relationships according to the academic level. |
Keywords: |
E-services, Website design, Web portals, Information quality, ICT competence,
Saudi Arabia, Universities. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
PROMOTING SUCCESSFUL KNOWLEDGE MANAGEMENT PROCESSES INTEGRATED INTO INFORMATION
TECHNOLOGY IN HIGHER EDUCATION UNIVERSITIES IN IRAQ |
Author: |
HAYDER SALAH HASHIM, ZAINAB AMIN AL-SULAMI |
Abstract: |
Knowledge is an important asset in many fields, such as business, health sector
and higher education. The incremental concern towards knowledge leads to the
formulation of knowledge management (KM). Universities are knowledge-intensive
organizations. Knowledge assets should be managed efficiently and effectively to
promote the education level and overall performance of universities. Information
technology plays vital task in sustaining knowledge management processes, such
as acquisition, sharing, conversion and application of knowledge. This study
explores the real situation of knowledge management processes. This study also
examines related IT systems that could be deployed to support successful KM
processes in Basra University, which is used as the case study for higher
institutions in Iraq. Quantitative method in the form of a questionnaire survey
was used to obtain data from 217 technical employees in Basra University. The
findings show weaknesses in the KM processes in Basra University. Basra does not
have clear KM processes for acquiring, converting, sharing and applying
knowledge. Moreover, an IT system was not integrated with KM processes to create
a knowledge management system. This study advocates top management in Basra
University to adopt policies for the successful implementation of KM processes
with an integrated IT system. This integration could help enhance daily
activities in the university, such as teaching, research and administration. |
Keywords: |
Knowledge Management, Knowledge Management System, Knowledge Management
Processes and Information Technology. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
THE EFFECTS OF TECHNOSTRESS ON INFORMATION TECHNOLOGY ACCEPTANCE |
Author: |
Kyoungjune Kim, Hyunjun Park |
Abstract: |
Recent information technology is developing rapidly enough to provide new
insights beyond human intuition. However, due to incidents such as job loss and
privacy invasion, individuals are exposed to stress such as fear and pressure.
The stress caused by such information technology may have a negative impact on
the acceptance of new technology or productivity, and understanding this in
practice is a critical task in modern society. The purpose of this research is
to investigate the direct and indirect effects of technostress on the level of
the individual in accepting new information technology. We developed a research
model with innovation resistance as a mediating variable and conducted empirical
analysis through 190 questionnaire responses. As a result, there were influences
of the pace of change, reliability, connectivity, and complexity on the
characteristics of information technology that induces individual technostress.
Also, technostress has been proven to influence the acceptance of information
technology only indirectly through innovation resistance. This study will
provide meaningful insights and implications for the technostresses and
consequences raised in the information system field through innovation
resistance. |
Keywords: |
Technostress, Innovation Resistance, Technology Acceptance, Techno-Strain, P-E
Fit theory |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
FINGERPRINTS IDENTIFICATION AND VERIFICATION BASED ON LOCAL DENSITY DISTRIBUTION
WITH ROTATION COMPENSATION |
Author: |
ZAINAB J. AHMED, DR. LOAY E. GEORGE |
Abstract: |
The fingerprints are the more utilized biometric feature for person
identification and verification. The fingerprint is easy to understand compare
to another existing biometric type such as voice, face. It is capable to create
a very high recognition rate for human recognition. In this paper the geometric
rotation transform is applied on fingerprint image to obtain a new level of
features to represent the finger characteristics and to use for personal
identification; the local features are used for their ability to reflect the
statistical behavior of fingerprint variation at fingerprint image. The proposed
fingerprint system contains three main stages, they are: (i) preprocessing, (ii)
feature extraction, and (iii) matching. The preprocessing stage is accomplished
by removing some artifacts in order to ensure high identification rates. The
extracted features are collected as a feature vector; then they are used to
distinguish different individuals. In the matching stage, the nearest neighbor
classifier is used to make recognition decisions. The results for identification
of the proposed system indicate high identification performance reach to 100%,
while the verification test results indicate error rate 99.88% using FVC2004
databases. |
Keywords: |
Fingerprints Features, Fingerprints Identification, Fingerprints Verification,
Biometric Traits, Biometric Database. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
FORMULATION AND IMPLEMENTATION OF SOCIAL MEDIA STRATEGY FRAMEWORK: A CASE
STUDY OF JORDANIAN GOVERNMENT ORGANIZATION |
Author: |
YACOUB NASEREDDIN, MOHAMMED ALMAIAH, SARA NASEREDDIN |
Abstract: |
This study aims to formulate a social media strategy framework that appropriate
in government organization that has a low interaction rate with public through
their social media accounts. The research methods used was qualitative and
quantitative on a government organization which has already use social media
however the utilization was still low. The process of data collection was done
by interview, observation and documents studies. The social media strategy was
formulated using framework developed by Karl Werder combined with SWOT analysis,
PEST analysis and 7s model. The strategy priority was determined by using AHP
analysis. Three stages of social media framework formulation have been
identified and the implementation results suggest that the organization need to
prioritize the strategies that have the objective to improve the complaint
handling and then followed by the strategies related to engagement and
awareness. |
Keywords: |
Social Media Strategy, Social Media Framework, SWOT, AHP |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
BUILDING THE CLASSICAL ARABIC NAMED ENTITY RECOGNITION CORPUS (CANERCORPUS) |
Author: |
RAMZI ESMAIL SALAH, LAILATUL QADRI BINTI ZAKARIA |
Abstract: |
The past decade has witnessed construction of the background information
resources to overcome several challenges in text mining tasks. For non-English
languages with poor knowledge sources such as Arabic, these challenges have
become more salient especially for handling the natural language processing
applications that require human annotation. In the Named Entity Recognition
(NER) task, several researches have been introduced to address the complexity of
Arabic in terms of morphological and syntactical variations. However, there are
a small number of studies dealing with Classical Arabic (CA) that is the
official language of Quran and Hadith. CA was also used for archiving the
Islamic topics that contain a lot of useful information which could of great
value if extracted. Therefore, in this paper, we introduce Classical Arabic
Named Entity Recognition corpus as a new corpus of tagged data that can be
useful for handling the issues in recognition of Arabic named entities. It is
freely available and manual annotation by human experts, containing more than
7,000 Hadiths. Based on Islamic topics, we classify named entities into 20 types
which include the specific-domain entities that have not been handled before
such as Allah, Prophet, Paradise, Hell, and Religion. The differences between
the standard and classical Arabic are described in details during this work.
Moreover, the comprehensive statistical analysis is introduced to measure the
factors that play important role in manual human annotation. |
Keywords: |
Arabic corpus, Corpus generation, Named entity, Classical Arabic |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
THE STUDY OF NON-SAMPLED AREA IN THE SMALL AREA ESTIMATION USING FAST
HIERARCHICAL BAYES METHOD |
Author: |
KUSMAN SADIK, ANANG KURNIA ANNASTASIA NIKA SUSANTI |
Abstract: |
Small area estimation is a method that arises as a result of the inability of
direct estimator to provide an estimator with high precision when the sample
size is inadequate. One of small area estimation methods which is widely used to
estimate the poverty indicators is a hierarchical Bayes (HB). Yet, the used of
HB method needs an intensive computation and requires a full census of
covariates or auxiliary variables while in the fact this condition is difficult
to reach. This paper proposed a method as the solution of this matter by using
the fast hierarchical Bayes approach (FHB) to estimate the poverty indicators.
Nevertheless the other problem arises when some of the areas have no sample
unit. Therefore, this paper adding the use of cluster information to estimate
the area effect. The simulation study is done in two conditions : (1) all the
areas have sample units, (2) some areas have no sample units. The evaluation is
based on Absolute Relative Bias (ARB) value, Relative Root Mean Square Error
(RRMSE) value, and the computational time. Both of the simulation studies
showing that the ARB and RRMSE of FHB and HB method is not significantly
different. In terms of the computational time, FHB method consumes very less
time than the HB method. Thus, it can be said that the FHB method is more
effective to use than the HB method especially when the population size is very
large. The application study is done to estimate the FGT poverty indicators of
the sub-districs in Bogor Regency. The results show that the FHB method can
provides better estimator of poverty indicators than the direct estimator,
especially in the non-sampled area by adding the cluster information. It can be
seen by the posterior variance of FHB estimator which provided very small
variances. |
Keywords: |
Cluster Information, Non-sampled Area, Fast Hierarchical Bayes,Small Area
Estimation, Poverty Indicators |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
SENTIMENT ANALYSIS ARTICLE NEWS COORDINATOR MINISTER OF MARITIME AFFAIRS USING
ALGORITHM NAIVE BAYES AND SUPPORT VECTOR MACHINE WITH PARTICLE SWARM
OPTIMIZATION |
Author: |
NIA KUSUMA WARDHANI, REZKIANI , SIGIT KURNIAWAN , HENDRA SETIAWAN , GRACE GATA ,
SISWANTO TOHARI , WINDU GATA , MOCHAMAD WAHYUDI |
Abstract: |
News has become a basic human need along with the development of technology and
the internet. The development of technology and the internet is causing the
change of publication pages from a print media to the internet. The use of
online media today is not only for reading news articles, but also can be used
to see the issues that occur can even be used to see the performance of a
political figure. The classification of the contents of news articles into a new
knowledge that is a negative or positive conclusions about the content of the
news contained in a news site. It is possible by using sentiment analysis that
is by document classification with text mining. The algorithm used in this
research is Naive Bayes and Support Vector Machine with Particle Swarm
Optimization. NB has an accuracy value of 89.50% with AUC of 0.500 while the NB
PSO obtains an accuracy of 92.00% with AUC of 0.550. SVM has an accuracy value
of 87.50% with AUC of 0.979, while SVM PSO has an accuracy value of 90.50% and
AUC of 0.975. The best application of optimization in this model is NB PSO can
provide solution to the classification problem in this case of sentiment
analysis. NB PSO algorithm provides solutions to the analysis of sentiments from
the content of various online media news optimally. |
Keywords: |
Sentiment Analysis, Text Mining, Classification, Naive Bayes, Support Vector
Machine, Particle Swarm Optimization, AUC |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
AN EFFICIENT HYBRID MODEL FOR RELIABLE CLASSIFICATION OF HIGH DIMENSIONAL DATA
USING K-MEANS CLUSTERING AND BAGGING ENSEMBLE CLASSIFIER |
Author: |
HAYDER K. FATLAWI ABBAS F. H. ALHARAN NABEEL SALIH ALI |
Abstract: |
Data mining is playing a significant role in the digital era, and there are
traditional techniques to classify, cluster the large data, etc. Today, the
variety of data and its size has grown increasingly. Preprocessing of the data
impose and need high computational resources due to raising the number of data
attributes. Thus, attributes reduction deem a vital and significant part of the
data pre-processing due to its ability to reduce the required computational
resources. In this study, a hybrid model is proposed to eliminate irrelevant
attributes with N number of goodness evaluation metrics by using K-Means
Clustering and Bagging Ensemble Classifier. The proposed model was implanted
with five different datasets. The model can minimize the number of the
attributes up to (70%). Hence, the results with reduction can be increased the
efficiency of the classification performance from the computation time
standpoint. |
Keywords: |
k-means clustering, Bagging classification, Attributes reduction |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
PERFORMANCE OF SIGNAL SIMILARITY MEASURES UNDER 1/F NOISE |
Author: |
ZAINAB H. ALMAHDAWIE, ZAHIR M. HUSSAIN |
Abstract: |
In this work we present a study on the performance of signal similarity measures
under non-Gaussian noise. Pink noise has been considered, with 1/f power
spectral density. This kind of noise has been generated by filtering Gaussian
noise through an FIR filter. One-dimensional and two-dimensional signals have
been considered. We tested 2D image similarity using the well-known similarity
measures: Structural Similarity Index Measure (SSIM), modified Feature-based
Similarity Measure (MFSIM), and Histogram-based Similarity Measure (HSSIM).
Also, we tested 1D similarity measures: Cosine Similarity, Pearson Correlation,
Tanimoto similarity, and Angular similarity. Results show that HSSIM and MFSIM
outperform SSIM in low PSNR under pink noise and Gaussian noise. For 1D
similarity, it is shown that Cosine Similarity and Pearson Correlation
outperform other 1D similarity, especially at low SNR. |
Keywords: |
Gaussian Noise, Pink Noise, FM, SSIM, HSSIM, MFSIM, Image Similarity, Cosine
Similarity, Tanimoto Similarity, Angular Similarity, Pearson Coefficient. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
MATCHING ALGORITHMS FOR INTRUSION DETECTION SYSTEM BASED ON DNA ENCODING |
Author: |
OMAR FITIAN RASHID , ZULAIHA ALI OTHMAN1, SUHAILA ZAINUDIN |
Abstract: |
Pattern matching algorithms are usually used as detecting process in intrusion
detection system. The efficiency of these algorithms is affected by the
performance of the intrusion detection system which reflects the requirement of
a new investigation in this field. Four matching algorithms and a combined of
two algorithms, for intrusion detection system based on new DNA encoding, are
applied for evaluation of their achievements. These algorithms are Brute-force
algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt
algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris–Pratt
algorithm. The performance of the proposed approach is calculated based on the
executed time, where these algorithms are applied on NSL-KDD dataset. The
obtained results showed that the average time for matching for all NSL-KDD
dataset records, based on Brute-force algorithm, Boyer-Moore algorithm, Horspool
algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore
algorithm and Knuth–Morris–Pratt algorithm are equal to 18.4, 11.5, 9.23, 7.5,
and 23.2 seconds respectively. These results demonstrated that using single
algorithm achieved better time than combined algorithms, and Knuth-Morris-Pratt
algorithm gives the best result than the rest of the other three algorithms. The
results are reasonable and acceptable when they are compared with previous
systems. |
Keywords: |
Intrusion detection, DNA Encoding, Pattern Matching Algorithm,
Knuth-Morris-Pratt Algorithm, Boyer-Moore Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
A PROACTIVE DATA SECURITY SCHEME OF FILES USING MINHASH TECHNIQUE |
Author: |
MEHDI EBADY MANAA , RASHA HUSSEIN JWDHA |
Abstract: |
Data protection becomes an important issue for companies and organizations. Data
security is one of the essential issues in the field of networks by
synchronizing with the fast development of information technology, which is
always seeking service providers to improve them in a way that serves the user
and maintains the privacy of his data. It provides the goals of data security,
which is confidentiality, availability, integrity. Cryptographic algorithms
offer a healthy way for data confidentiality that used by many organizations
using mainly two types of symmetric encryption and asymmetric encryption
algorithms. The most important way to ensure the strength of the encryption
algorithm is to generate the encryption key in robust ways. In this paper, the
cryptosystem system is used the principle of the minhash technique to generate a
group of keys in an efficient way. The block keys are generated using the
k-shingle which is one of the main principles used in the minhash technique to
convert the text file into a sequence of consecutive words. The length of
shingles depends on the length of k value. The cryptosystem is used many hash
functions to generate the cipher keys and then to encrypt text files using AES,
DES, 3DES and Blowfish algorithms. The results show promised way to deny the
hacker from unauthorized access. The AES and Blowfish algorithms have excellent
results regarding encryption time, throughput, memory space, avalanche effect
and entropy in term of security. |
Keywords: |
Algorithms of Cryptography, Minhash Technique, Data Encryption, AES Algorithm,
The Blowfish Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
EXPERIMENTAL EVALUATION OF QUERY REFORMULATION TECHNIQUES IN THE CONTEXT OF
MEDICAL INFORMATION RETRIEVAL |
Author: |
MOHAMMED MAREE , ISRA NOOR, KHALID RABAYAH |
Abstract: |
With the proliferation of online medical information, a majority of laypeople
(ordinary people with little medical background knowledge) and medical
specialists now find the Web an indispensable tool for searching for medical
information in various domains of interest. However, when using existing medical
search engines, the precision of the retrieved results is governed by two main
factors. First, users (be they laypeople or medical professionals) need to
submit vocabularies that best describe their information needs. Second, the
quality of the returned results is largely based upon the effectiveness of the
techniques and medical knowledge resources that are exploited by such search
engines. Several systems and approaches have been proposed to address problems
associated with each of these factors independently; however, little attention
has been paid to cooperatively address problems of both factors. In this
article, we aim to investigate the impact of exploiting medical knowledge
resources and information retrieval techniques on 1) reformulating medical
queries through enriching them with semantically-related medical terms and 2)
indexing documents in the medical domain to improve the matching process between
the reformulated queries and their corresponding medical documents. A prototype
of the proposed system has been instantiated and experimentally validated using
CLEF2014 eHealth Dataset and state-of-the-art effectiveness indicators. The
produced results by our system demonstrate that the quality of the returned
results has improved compared to other similar medical information retrieval
systems. |
Keywords: |
Query Reformulation, Medical Queries, CLEF eHealth Dataset, Medical Knowledge
Bases, Precision/Recall Indicators |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
TREE BASED STATIC MULTI HOP LEACH (TBSMH-LEACH) ENERGY EFFICIENT ROUTING
PROTOCOL: A NOVEL GRAPH THEORETICAL APPROACH |
Author: |
NABEEL ZANOON , MOHAMMAD ALFRAHEED , HANUMANTHAPPA .J , EVON ABU-TAIEH |
Abstract: |
Research on tree based static multi hop leach energy efficient routing protocol
focused on efficiency and effectiveness of data dissemination. Furthermore,
previous research work on wireless sensor network mainly focused on homogeneous
wireless sensor networks where all wireless sensor networks have the same
capabilities. It was learnt that homogeneous wireless sensor networks have poor
basic performance limits and scalability. To achieve excellent performance, a
Heterogeneous Wireless Sensor Network (HWSN) model was deployed. In the present
paper a secure and an efficient protocol for HSNs
(Homogeneous/Heterogeneous-Tree Based Static Multi hop Leach Energy Efficient
Routing Protocol (TBSMH-Leach) is proposed for supporting different kinds of
trees such as binary trees or ternary trees, or quadrant trees etc. A tree based
static multi hop leach energy efficient routing protocol can be implemented. A
novel graph theoretic approach using greedy approach/divide(division) and
conquering technique. In this research, an investigation and a comprehensive
comparison between three different tree based energy efficient routing protocols
such as, binary tree, ternary tree and quad tree is demonstrated . By
considering packet loss rate(plr)(packet drop rate)(pdr) and dead hop rate(dhr),
results have indicated that quad tree based energy efficient routing is better
than ternary and binary tree based static multi hop energy efficient routing
protocols for the various rounds from 100 to 1000. By referring the throughput,
it is proved that binary based energy efficient routing protocol is better than
ternary/quad tree based static multi hop leach energy efficient routing protocol
for WSNs, when the number of rounds hikes from 100 to 1000. Finally, the time
complexities is computed for best case, average case and worst case, for
BTBSMH-LEACH, TTBSMH-LEACH, QTBSMH-Leach is O (n log n). |
Keywords: |
Binary Tree, Energy Efficient, Multi-Hop, Quad Tree, Static, Ternary Tree. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
MULTI-GROUP ANALYSIS OF FACTORS DETERMINING USER’S COMMITMENT IN MOBILE SOCIAL
NETWORK GAMES |
Author: |
SAE BOM LEE, SEOKHUN KIM |
Abstract: |
Social Network Game genre is a game in which people connect to each other by
utilizing a mobile platform, and interact with each other while enjoying related
contents. It has now become a popular game. The purpose of this study is to find
significant factors that have effects on the commitment of M-SNGs. We also
conduct multi-group comparison test to study the difference in factors of models
between 2012 and 2016. We use structural equation model analysis with SmartPLS
3.0 and compare models of different times. This study is to give academicians
and practitioners insight about its effects and implications. The results showed
that there was a significant difference between the two groups only in the
relationship between competition-commitment and social interaction-commitment.
This study is to give academicians and practitioners insight about its effects
and implications. |
Keywords: |
Mobile Social Network Game, Commitment, Social Factors, Social-Game Factors,
Game Factors |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
Title: |
PERFORMANCE COMPARISON BETWEEN BABY-STEP GIANT-STEP METHOD AND POLLARD RHO WITH
BRENT CYCLE DETECTION METHOD IN CAUSING TOTAL BREAK TOWARD DIGITAL SIGNATURE
ALGORITHM SCHEME |
Author: |
RULLY SOELAIMAN, MUHAMMAD GHAZIAN |
Abstract: |
This paper compares the speed of Baby-step Giant-step method and Pollard Rho
with Brent Cycle Detection method to cause Total Break, which in turn is used to
attack Digital Signature Algorithm i.e. forging a signature. This paper also
finds out how the free parameter of Digital Signature Algorithm can affect the
performance of the two method. This paper will present an empirical result on
how the two method would perform under signature forgery scenario. Furthermore,
an analysis of how close both method's performance is presented. Also, this
paper provides an analysis regarding how the size of free parameter of DSA may
affect the overall performance of the two methods. These analysis can provide
useful basis for DSA’s parameter security analysis. Moreover, the result
presented in this paper can extend to other discrete logarithm problem. |
Keywords: |
Cryptography, DSA, Discrete Logarithm, Number Theory, Security |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2018 -- Vol. 96. No. 24 -- 2018 |
Full
Text |
|
|
|