|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
March 2018 | Vol. 96
No.6 |
Title: |
DESIGN OF DISINFECTANT MANUFACTURING SYSTEM WITH AUTOMATIC CONCENTRATION CONTROL |
Author: |
WON-KEE HONG , KYUNG-AE CHA |
Abstract: |
HACCP (Hazard Analysis and Critical Control Point) is a systematic preventive
approach that has been first developed for astronaut food safety in the 1960s.
Recognized as an effective tool to suppress food poisoning broken out by
pathogens, toxins and chemicals, it has been adopted by many countries.
Preventive procedures based on HACCP processes are becoming increasingly
important since food poisoning accidents at large meal service stations, which
can infect a large number of people at once, are not decreasing each year. The
chemical disinfection is a common method to remove pathogens and the chlorine
solution is mainly used. Since chlorine can harm not only the bacteria but also
the human body, the concentration of the chlorine solution should be suitably
adjusted. In addition, the disinfectant solution must be prepared immediately so
that the disinfection process is carried out on the spot. Therefore, the
chlorine solution should be able to accurately measure in a short time. The
disinfectant management system proposed in this paper is a device that can
prevent the contamination of tableware and food materials by manufacturing
disinfectant of exact concentration and measuring its concentration in real
time. The proposed system detects the inflection points of the ORP and pH
changed by applying the reducing agent to the disinfectant and measures the
concentration. Experimental results show that the average measurement accuracy
is 97.42% and the measurement elapsed time is 97.9 seconds. |
Keywords: |
Measurement system, Disinfectant, Chlorine Concentration, ORP, pH |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
AN XML-BASED USER DESCRIPTION SCHEME AND METHOD FOR RECOMMENDATION SERVICE |
Author: |
SI HWAN JANG, YONG SOO CHOI, CHEONG GHIL KIM |
Abstract: |
ISO/IEC 21000-22 User Description is being developed by ISO/IEC JTC1/SC29/WG11
(MPEG: Moving Picture Experts Group) that aims to achieve interoperability among
different applications and services in the context for enhancement of user
satisfaction. In this paper, we analyze an ISO/IEC 21000-22 User Description
including with current status and future application plans. To realize the
proposed newly description, it performs the experiment of XML-based recommending
service for visual communication (VC) using ISO/IEC 21000-22 User Description.
Finally, it prove the XML-Based description for Recommendation service can be
implemented and show the visual effectiveness. |
Keywords: |
ISO/IEC 21000-22 User Description, User, Context, Service, Recommendation,
Description |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
ANALYZE USER PATTERN AND DERIVE NEEDS OF BLUETOOTH LOCATION TRACKER |
Author: |
HAEKYUNG CHUNG |
Abstract: |
This study focuses on rapidly growing internet of Things(IoT) products,
especially Bluetooth embedded location tracker. We used Bluetooth locator to
figure out the needs of people who need it, and to analyze their usage patterns
if they are already using it. Based on the results, we generated Affinity
Diagram and Per sonar to derive the practical requirements of users who use the
location tracker. The requirement tells you the location of your first item to
prevent it from being lost. Second, when the baby is out of sight of the parents
of infants or companion animals, it can be confirmed through smart phone
application. Third, if the smartphone is lost, it informs the loss of the
smartphone by an alarm. Fourth, it provides design and color that can reveal
personality. We propose a prototype of application interface design that works
with location tracker through created person. |
Keywords: |
Bluetooth Location Tracker, UX Design, Affinity Diagram, Persona, Chipolo |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
A STUDY ON NLP APPLICATIONS AND AMBIGUITY PROBLEMS |
Author: |
SHAIDAH JUSOH |
Abstract: |
Natural language processing (NLP) has been considered as one of the important
area in Artificial Intelligence. However, the progress made in natural language
processing is quite slow, compared to other areas. The aim of this study is to
conduct a systematic literature review for identifying the most prominent
applications, techniques and challenging issues in NLP applications. To conduct
this review, I had screened 587 retrieved papers from major databases such as
SCOPUS and IEEE Explore, and also from Google search engine. In searching
relevant papers search keywords such as "natural language processing, NLP
applications, and complexity of NLP applications" had been used. However, to
focus to the scope of the study 503 papers were excluded. Only the most
prominent NLP applications namely information extraction, question answering
system and automated text summarization were chosen to be reviewed. It is
obvious that the challenging issue in NLP is the complexity of the natural
language itself, which is the ambiguity problems that occur in various level of
the language. This paper also aims at addressing ambiguity problems which occur
at lexical and structural levels and significance techniques or approaches for
solving the problems. Finally, the paper briefly discuss the future of NLP. |
Keywords: |
Natural language processing, NLP applications, Ambiguity in NLP |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
MEASURING INTERNET ADDICTION IN ARAB BASED KNOWLEDGE SOCIETIES: A CASE STUDY OF
SAUDI ARABIA |
Author: |
HABIB ULLAH KHAN, YOSER GADHOUM |
Abstract: |
As the technology is getting entwined with the lives of people, the adverse
impacts are also mushrooming. Since decades, researchers have been trying to
identify the reasons for such negative impacts with the help of various
measuring tool. The present study used the modified version of the Widyanto’s
Internet Addiction Test questionnaire designed by introducing ‘culture’
construct to the existing three constructs. This tool is exercised for 306
respondents, selected at random in Saudi Arabia to know the extent of internet
addiction prevalence and the triggering factors. Three levels of analysis are
done on the data – basic analysis for demographic characteristics, binary
logistic regression analysis and principal component analysis. The results
revealed interesting facts about the internet usage phenomenon in Saudi Arabia.
Though culture is added in the study tool to understand its impact on the level
of internet usage, it is not highlighted in the final result. However, education
level is proved to be the most influencing factor internet addiction. The
principal component analysis also revealed that only the demographic factors
like age, gender, income level and education are the variables that could
explain the variation in the internet usage phenomenon to a greater extent.
Thus, this study not only throws light on the influencing factors but also gives
room for further analysis to look for the possible influencing factors such as
the emotional/psychological, time management, mood management and culture in all
the regions. |
Keywords: |
Internet Addiction (IA), Internet Addiction Test (IAT), Internet Gaming Disorder
(IGD),, Online Cognitive Scale, Pathological Internet Use Scale (PIUS). |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
NEW PHISHING HYBRID DETECTION FRAMEWORK |
Author: |
YOUNESS MOURTAJI, MOHAMMED BOUHORMA, DR. DANIYAL ALGHAZZAWI |
Abstract: |
Internet use is growing every day, accessing a website via its URL (Uniform
Resource Locator) address is a daily task, but not all websites are benign to be
accessed without any fear from malicious aims - not matter where those websites
are being accessed from (Web Browsers, e-mails body, chat application, SMS,
VoIP) neither the nature of the operating system or the device. Our thesis aim
is being able to detect the kind of websites that try to steal any user’s
(normal users, communities, societies, laboratories, etc.) personal information
like name, date of birth, e-mail, credentials, login and passwords from
e-banking services for example or any other web services. Unlike traditional
techniques that consists of penetrating data sources of web services providers
by decrypting algorithms, the man idea of this kind of criminal activities is
letting the victims give those informations unconsciously, by creating fake
emails or websites that looks very similar of original ones and tell victims to
fill some forms with their informations for some fake reason, this technique is
called phishing. This article aims to discuss some used techniques in detecting
phishing websites, like Black-list based, Lexical based, Content based and
Security and Identity based methods combined with some machine learning
classifier to classify if a test URL is a safe or phishing website and to
propose a new hybrid framework to detect phishing web pages from only their URL
without need to access it visually with a browser. The data used for building
the model and classification is a collection of active phishing websites
gathered from PhishTank[1]. |
Keywords: |
Machine Learning, Malicious URL Detection, Network Security Intelligence,
Phishing, Smart Systems and Communication |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
A NOVEL AUTHENTICATION AND AUTHORIZATION MODEL BASED ON MULTIPLE ENCRYPTION
TECHNIQUES FOR ADOPTING SECURE E-LEARNING SYSTEM |
Author: |
SHADI R.MASADEH, JAMAL S.ZRAQOU, MOUTAZ ALAZAB |
Abstract: |
The era of e-learning systems among educational organisations has grown
exponentially. Educational organisations have a competition to provide a secure
wireless network service to staff members. In this paper, a novel authentication
and authorization model (NAAM) has been presented to securely transmit the data
in e-learning environment without affecting the system resources. As a part of
the analysis, multiple encryption methods and face recognition technique are
utilized to develop a complete secure e-learning model. MAC address filtering
over the wireless network together with the application of pretty good privacy
(PGP) encryption algorithm are presented. This model may be termed as hybrid
security and authentication scheme (HSAS). The main contribution of this
research is to achieve maximum security level. This was achieved by integrating
the strength of OpenVPN, HMAC, AES, VLAN, sWIFI, PGP, SSL and faces recognition.
The conducted experiments revealed that the performance of the proposed model
has surpassed the related works in terms of security enhancements during data
transmission in e-learning environment systems. |
Keywords: |
OpenVPN, PGP, sWIFI, HMAC, cryptography, face recognition, and firewall. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
RADIO FREQUENCY (RF) ENERGY HARVESTING USING METAMATERIAL STRUCTURE FOR
ANTENNA/RECTENNA COMMUNICATION NETWORK: A REVIEW |
Author: |
NORNIKMAN HASSAN, BADRUL HISHAM AHMAD, MOHAMED FAREQ ABD MALEK, MOHAMAD ZOINOL
ABIDIN ABD AZIZ, HAMIZAN ABU BAKAR, MUHAMMAD SYAFIQ NOOR AZIZI, MOHD KHAIRY
ISMAIL |
Abstract: |
Starting from the year 2000, metamaterial structure has been one of the favorite
techniques used by several researchers to improve the performance of many radio
frequency (RF) device designs, especially in the microwave range area. Wireless
charging technologies that have emerged are also one of the highlighted
discussions among users, fabricators and researchers. This paper presents a
literature review of radio frequency energy harvesting, using a split ring
resonator (SRR) and other metamaterial structure in antenna network
applications. The objective of this paper is to define and compare the several
performances such as the technique used, the material of the substrate,
dimension, return loss and the resonant frequency of the antenna. The split ring
resonator is an interesting metamaterial structure, that is applied in several
researcher’s work compared with other metamaterial structure such as electronic
band gap (EBG), photonic band gap (PBG), and artificial magnetic conductor
(AMC). This structure has the capability to improve the performance of the
resonant frequency, minimizing the size and improving the return loss of the
design, while sometimes creating a filter notch to the design. SRR structure is
a good candidate for energy harvesting because it can increase the conversion
efficiency. |
Keywords: |
Radio Frequency, Energy Harvesting, Antenna Network, Split Ring Resonator,
Metamaterial, Rectenna |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
TRANSMISSION EFFICIENT PROTOCOL USING POPULATION-BASED META-HEURISTIC TECHNIQUE
WITH MOBILE SINK FOR LIFETIME ENHANCEMENT OF HETEROGENEOUS WIRELESS SENSOR
NETWORKS |
Author: |
A.KARTHIKEYAN , DR.T.SHANKAR |
Abstract: |
Wireless sensor Networks are small sized devices which work on the small
batteries which cannot be recharged again, due to this optimization of battery
resources are the most important design criteria for wireless sensor networks A
hybrid algorithm incorporating social insect colony and double cluster head
approach, with improved Mobile Balanced Energy Efficient Network Integrated is
proposed to improve the intra and inter cluster organization of the existing
four level heterogeneous wireless sensor networks. The social insect colony
algorithm reduces the energy loss due to long distance transmission within the
cluster by introducing layered multi hop transmission. The double cluster head
approach helps in load balancing. The burden of the cluster head is shared by
the vice cluster head which will reduce the energy loss in cluster heads due to
long distance transmissions. The proposed algorithm increases the life time,
throughput and stability of the network by reducing the energy losses due to
long distance transmissions. |
Keywords: |
Mobile Sin, Heterogeneous, Social Insect Colony Clustering, Routing, Energy
Efficient, BEENISH, Ibeenish, Imbeenish |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
COMPARING TWO FEATURE SELECTIONS METHODS (INFORMATION GAIN AND GAIN RATIO) ON
THREE DIFFERENT CLASSIFICATION ALGORITHMS USING ARABIC DATASET |
Author: |
ADEL HAMDAN MOHAMMAD |
Abstract: |
Text classification is a very important topic. Nowadays there are a huge amount
of available data. This data need to be classified and categorized. Number of
researches applied on Arabic dataset still need more investigation. There are
several available methods and techniques to classify data. Also, there are
several feature selection methods used in pre-processing stage. Experiments in
this paper done using two feature selections (information gain and gain ratio)
on three classification methods (Naďve Bayes, Decision tree C4.5 and Support
Vector Machine SVM. Experiments done using Arabic dataset. Results shows that
feature selection done in pre-processing stage is a key success factor for
success. Also results demonstrate that gain ratio is a little bit better than
information gain and SVM is approximately very closed to Naďve Bayes and both of
SVM and Naďve Bayes is more accurate than C4.5. |
Keywords: |
Text classification, information retrieval, Naďve Bayes, Support Vector
Machine, Decision tree, C4.5. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
A NOVEL MODIFICATION OF SURF ALGORITHM FOR FINGERPRINT MATCHING |
Author: |
KADHIM H. KUBAN , WASAN M. JWAID |
Abstract: |
Fingerprint detection and recognition process is a critical task in many
biometric systems. Hence, the accuracy of detection and matching fingerprint
plays an important role in many research works. Many fingerprints sample are
degraded through such other transformations. Therefore, there is a need to find
a method that able to detect and match fingerprints sample over all other
circumstances and give high accuracy rate. There are two approaches are commonly
used, minutiae based and image based approach, minutia approach faced several
problems when fingerprint samples are degraded or rotated which lead to poor
performance result, image-based approach is seem that its very robust against
such other degradation issues. In this paper, we proposed a novel modification
to one of the most robust algorithms that used to extract the interest points,
called SURF. These points also called feature are later used for matching
process after eliminating outlier sets. The proposed system is tested on FVC2002
DB1, and FVC2004 DB2 according to set of performance evaluation metrics such as
FAR, FRR, SMR, EER and accuracy, which shows our proposed system can
successfully find matching between one fingerprint and other one (1:1) matching,
as well as (1:M) matching when more than one fingerprint images may have related
to the query image. |
Keywords: |
Fingerprint, Minutiae, Image Pattern, Descriptor Points, SURF, Matching Score. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
EFFICIENT APPROACH OF DETECTION AND VISUALIZATION OF THE DAMAGED TABLETS |
Author: |
RIHAB HAZIM QASIM , AND MUZHIR SHABAN. AL-ANI |
Abstract: |
People affected by many diseases in their lives and this effect with the
productivity of the individual in society and the lives of the entire person and
most of these diseases can be cured by medicines. The problem in pharmaceutical
industries, in the actual situation, existing a number of defects incorporated
in tablets inadequate fines to granules ratio, inadequate moisture content and
poor machine settings can be some of the reasons for those visual defects such
as faults in a cover of tablet pill. In addition, the production of medicines
and pharmaceutical factories are expanded so it is difficult to control the
quality of the tablets after packaging. The aim of this paper is to upgrade this
manual tablet-sorting machine into an automated system with the aim of improving
the speed and accuracy of the sorting process. The hole in the cover plastic
package is common defects that can be found in tablets. Therefore, this defect
was considered for the purpose of this paper. Damage on the Cover plastic
package can be produced during the production of the packaging and can be
produced before packaging therefore; will design system inspection the cover
plastic before packaging for less damage money as much as possible, also
inspection the cover plastic after packaging because the damage on the cover
plastic packaging causes damage in pills and capsules. The proposed system
algorithm includes preprocessing and feature extraction using opponent local
binary patterns &opponent coordinated clusters representation (its the
contribution research) and finally the classification of tablets for damage or
undamaged issue using an artificial neural network algorithm (ANN) and
specifically feed forward back propagation learning.The neural network training
with feature extraction from the data after it has been tested. The experimental
results are acceptable, the performances of the check pill cover plastic system
indicated the total accuracy of 94.4% for testing. Also, the approach using
opponent features provides better recognition accuracy than other approaches.
The system is evaluated using sensitivity, specificity, and accuracy. The
programs are done using Matlab package. |
Keywords: |
Hole in the Covered Plastic, LBP, CCR, Packaging, Texture. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
M-SANIT: A FRAMEWORK FOR EFFECTIVE BIG DATA SANITIZATION USING MAP REDUCE
PROGRAMMING IN HADOOP |
Author: |
Y.SOWMYA, Dr. M NAGARATNA, Dr.C SHOBA BINDU |
Abstract: |
Sanitization of big data before it is subjected to mining or publishing is very
important for privacy reasons. Though sanitization is not new, sanitization of
big data based on a measurability score is a novel idea. We proposed a framework
known as M-Sanit to realize this idea. The framework is meant for big data
sanitization prior to processing it. We proposed an extended misusablity score
function that can return misuse probability of given dataset. This score plays
an important role in determining the level of sanitization needed. This kind of
sanitization provides expected level of anonymity and protects data from privacy
attacks. The rationale behind this is that outsourced data may be misused by
insiders. To get rid of this problem, the data is subjected to sanitization
after finding measurability score. Our contributions in this paper are two-fold.
First we provided mathematical model for extended measurability score. Second we
proposed an algorithm to utilize the measurability score to determine the level
of sanitization. We built a prototype application using locally configured
Hadoop in clustered environment to demonstrate proof of the concept. Our results
revealed the utility of M-Sanit for protecting big data from privacy problems. |
Keywords: |
Big data, Hadoop, Map Reduce, Misusability measure, sanitization |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
FACTORS FOR MINIMIZING CYBER HARASSMENT AMONG UNIVERSITY STUDENTS: CASE STUDY IN
KINGDOM OF SAUDI ARABIA (KSA) |
Author: |
FAHAD ABDULLAH MOAFA, KAMSURIAH AHMAD, WALEED MUGAHED AL-RAHMI, NORMA ALIAS,
MAHMOOD ALI MOQBEL OBAID |
Abstract: |
This study attempted to mitigate the gap in literature concerning a one serious
problem in Saudi society and government is cyber harassment. This problem is
caused through the increasing use of technology. Accordingly, the main objective
was to explore the factors that influence the intention to minimize cyber
harassment among Saudi citizen. In this research were employed two theories the
first Theory of Planned Behavior (TPB), the second selected Technology
Acceptance Model TAM. However, based on TPB, the researcher has identified eight
factors, to minimize cyber harassment, which is: technological support,
attitude, subjective norms, social pressure, the influence of the mass media,
perceived behavioral control, regulatory support and the role of the government,
and security awareness. Nevertheless, the researcher has assured that the Saudis
will remain at risk of cyber harassment, until these factors are fully
investigated among the Saudi community. In conclusion, this research
specifically proposed in future a model and framework for identifying the
significant factors that are anticipated to play a major in minimizing cyber
harassment among Saudis. The proposed framework will help the administration and
decision-makers in the KSA to formulate strategies that can significantly affect
anti-cyber harassment among youths. |
Keywords: |
Factors, Cyber Harassment, Behavioural Intention, Saudi Arabia (KSA) |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
HARDWARE IMPLEMENTATION OF DIGITAL IMAGE CODING USING FDCT |
Author: |
MUZHIR SHABAN AL-ANI |
Abstract: |
Image coding becomes an interested issue for its extensive use in wide range of
applications. This work deals with the Fast approaches of hardware
implementation for Forward Discrete Cosine Transform (FDCT) and the Inverse
Discrete Cosine Transform (IDCT). These approaches are normally used for image
coding and decoding applications. The implemented approaches are built using
hardware design with specific control parameters to speed up the processing. The
implemented approach based on one dimensional Discrete Cosine Transform (1D-DCT)
and fast transposing through high access memory that offer real time operation.
The control system of flow of pixels is built to have two principal processing
of rows and columns and the flow of coefficients comes from high speed access
memory. The implementation of the system is done to achieve high speed and
accurate results. The differences between the original image and the recovered
image for all tested sizes are very small and it is about 10 -16. |
Keywords: |
FDCT, IDCT, Image Coding, Image Decoding. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
CRITICAL FACTORS INFLUENCING EFFECTIVE OF ICT RESOURCES AND CAPABILITIES |
Author: |
HANY MOHAMED, ADAMU ABUBAKAR, AKRAM ZEKI |
Abstract: |
Substantial research on the importance of strategic Information and
Communication Technology (ICT) resources and capabilities for higher institution
has mainly focused on developed countries. The results of these studies may not
hold for developing nations and in particular, the Kingdom of Saudi Arabia
(KSA). To address this gap, this research therefore, builds on theory of DeLone
and McLean to examine the strategic links between the success of effective
utilization of ICT Resources and ICT Capabilities of KSA higher institutions.
Quantitative research methodology has been used. The study was conducted in a
KSA context from a sample of 68 higher institutions. Nine main hypotheses were
formulated and tested. Analysis of the data provided support for all the nine
main hypotheses, except for relationship between “User Involvement and Effective
utilization of ICT resources and capabilities |
Keywords: |
Hardware; Software; Data; Network; ICT human capabilities. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
MULTIPLE DATA TRANSMISSION PROTOCOL BASED ON NODE GROUPING IN UNDERWATER SENSOR
NETWORKS |
Author: |
WOOJIN KANG, SUNMYENG KIM |
Abstract: |
Underwater sensor networks (USNs) are characterized by the limited bandwidth and
long propagation delay because they use radio waves to transmit data packets.
The characteristics pose challenges to the design of medium access control (MAC)
protocol. In particular, handshaking based MAC protocols are not appropriate in
USNs because of the large delay in exchanging control and data packets. In this
paper, we propose a new MAC protocol, called node grouping based multiple data
transmission (NG-MDT) protocol to improve performance in USNs. In the proposed
protocol, nodes are grouped in a distributed manner according to the distance
between themselves and the destination node. When a node obtains a channel
access right, it selects one node in the next group. And then, it transmits its
own data packet, including the address of the selected node. The selected node
also selects another node in its next group, and transmits its data packet
including the address of the selected another node. This process is repeated
until the last group is reached. In the proposed protocol, multiple nodes
transmit their data packets consecutively with one handshaking for channel
reservation. Performance evaluation is conducted using simulation, and confirms
that the proposed protocol significantly outperforms the previous protocol in
terms of throughput, end-to-end delay, and frame success ratio. |
Keywords: |
Data Transmission, MAC, Node Grouping, Propagation Delay, USN |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
A NOVEL FILTERING TECHNIQUE FOR REDUCING REDUNDANT UNICAST TRAFFIC IN HSR
NETWORKS |
Author: |
NGUYEN XUAN TIEN, JONG MYUNG RHEE, SANG YOON PARK |
Abstract: |
High-availability seamless redundancy (HSR) is one of the seamless redundancy
protocols providing fault-tolerance for Ethernet networks. HSR is very useful
for applications that demand high availability with fault-tolerance. However,
redundant unicast traffic is excessively generated in HSR networks. This
drawback causes high consumption of network bandwidth and may degrade network
performance in HSR networks. In this paper, we propose a novel single-filtering
technique called FQR that filters unicast frames for unused QuadBox rings in HSR
networks. The FQR technique reduces duplicated unicast frames in an HSR network
by filtering the frames for passive QuadBox rings that are not used to forward
the unicast frames for a communication session between a source and a
destination in the network. The FQR uses a simple mechanism to discover passive
QuadBox rings and then prevent QuadBoxes from forwarding unicast frames into the
passive QuadBox rings. By pruning unicast frames for passive QuadBox rings, the
proposed technique dramatically decreases duplicated unicast frames in HSR
networks compared to the standard HSR protocol. Traffic performance of FQR is
analyzed and several simulations were carried out to validate the analysis.
Numerical results showed that, for the sample network used in this paper,
network unicast traffic under the proposed technique was reduced by 37% compared
to that under the standard HSR protocol, resulting in the save of network
bandwidth and the improvement of network traffic performance. The proposed
single-filtering technique can be combined with other single-filtering
techniques to propose a very effective combined-filtering technique for HSR
networks. |
Keywords: |
High-availability Seamless Redundancy (HSR) Protocol, Filtering Unicast Frames
for Passive QuadBox Rings, Traffic Reduction Technique, Fault-tolerant
Communications, Smart Grids |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
MEDIATION BETWEEN DIGITAL SURROGATES AND VIEWERS BASED ON THE TECHNOLOGY
ACCEPTANCE MODEL |
Author: |
BOA RHEE, JISOO KIM |
Abstract: |
This study investigates the values of engaging with digital surrogates,
including Van Gogh Inside (VIE; 2016), Monet’s Impression Exhibition 2016 (MIE;
2015–16), and Hello Michelangelo (2016-2017), based on a Technology Acceptance
Model (TAM). Both usability for learning and usability for appreciation in
perceived usefulness have significant correlations with the degree of
satisfaction (DOS) and degree of immersion (DOI). Our findings show that the DOS
not only has a significant correlation with the DOI but also influences the
intention to use digital surrogates (intention to visit the exhibition,
recommend the exhibition, and intention to visit digital exhibition) in all
digital surrogates. It was found that the perceived ease of use has an influence
on DOS and DOI in the case of VGI and MIE. This study unveils an insight on the
values and qualities associated with the digital surrogates to evoke a sense of
authentic experience as well as foster learning. In addition, it also
demonstrates the suitability of TAM as an evaluation model for digital
surrogates of remediating the originals. |
Keywords: |
Digital Surrogate, Technology Acceptance Model (TAM), Perceived Usefulness (PU),
Perceived Ease of Use (PEOU) |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF THE EXPERT SYSTEM FOR HEALTH AND MEDICAL TREATMENT
USING INTEGRATION OF BIG DATA |
Author: |
YOO-JIN MOON, EUNJOO CHOI, YOUNG-HO HWANG |
Abstract: |
This paper designs and implements the expert system for health and medical
treatment using integration of public medical big data. According to the trend
that the health and medical treatment data are gradually open to the public in
the world, the integrated medical information system is required for the
patients. By implementation of the medical expert system, representatives of the
analytical results are average treatment expenses per medical center per
disease, medical institutions frequently treating patients per disease, diseases
susceptibility in the age group, number of patients per disease by region, and
number of the medical clinics per department and district. The expert system
makes the big data helpful for the medical centers, patients, governments, the
medicine importers, pharmacists and insurance agencies etc. Overall, the expert
system deals with not only the fundamental analysis of the diseases per age or
per gender but also the practically beneficial information for all the
interested parties with analysis of the public medical treatment big data.
Furthermore, the expert system can easily be extended with increasing public
medical big data open. |
Keywords: |
Big data, Expert system, Medical expense, Insurance agency, Medical center |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
STUDY ON MANAGEMENT ALTERNATIVES ON AGILE METHOD BASED FINANCIAL SECURITY
SOFTWARE PROJECT |
Author: |
YONG-GUK JEONG, KOO-RACK PARK, DONG-HYUN KIM |
Abstract: |
In tandem with development of information technologies, telecommunication
environment, infrastructure and device etc. are getting smarter and converged.
As non-facing service transactions are expanded, financial institutions provide
internet banking service, which customers are using with convenience.
Accordingly, the information system market related with finance is anticipated
to experience much changes in system setup due to change in business and
financial environment, and upgrade or new development is continuously performed.
However due to the development of informatized society, hacking and virus attack
technics are becoming sophisticated and diversified, and also as the cases of
infringement of personal privacy etc. are continuously occurring, much efforts
are required to resolve these situations. Especially, the current attack
paradigm on electronic financial service is concentrated on the customers using
electronic finance, so the need for security system is ever increasing to
resolve this situation. However, in pursuit of any effort to resolve such
situation by proceeding financial security related project, mostly the time and
cost incurred for the project is burdensome. Especially, most of such projects
accompany numerous risks, and representatively any change in requirements of
customers is exercising so heavy influence as to determine the success of the
project. Any change in requirements related to financial security shall be
immediately processed, but delay of project often occurs due to poor
communication between developer and customer. In this regard, this thesis
proposes the system to compose development team based on Agile Methods, to
differentiate the role of team members and manage the project period, in case
financial security software project is performed while development period and
development cost is fixed. Also in order to verify the proposed system, actual
project is implemented and comparison is made with the waterfall model which is
the traditional development methodology. The result of verification shows effect
of reduced number of 8% days required for development saving effect. By the
proposed system, it is expected that successful progress of financial security
related software project would be possible. In the future, subsequent studies on
flexible expandability and systematic management methodology are necessary. |
Keywords: |
Cloud Computing, Project Management, Agile Methods, Scrum, ICT |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
AN EMPIRICAL STUDY ON THE EFFECT OF BUNDLING SERVICE ON USER ACCEPTANCE OF IOT
SERVICES |
Author: |
SAE-BOM LEE, WON-HEE LEE |
Abstract: |
Recently, product using Internet of Things (IoT) have appeared. However, IoT
products are not popular yet. This study aims to research the intention of using
IoT products. The purpose of this study is to investigate the effect the
characteristic of internet of things and the bundling service of mobile provider
on the acceptance of IoT products. The bundled service means that the mobile
provider offers two or more services such as internet service + TV + regular
phone + smart phone. Therefore, this study establishes hypothesis and research
model that the bundling (bundled service, bundled fee), service stability,
compatibility is set as independent variables, and the perceived ease of use,
and perceived usefulness are used as parameters, and the intention to use is
used as a dependent variable. To test the hypothesis, we analyze the structural
equation model using AMOS 20.0. As a result, three of the hypotheses are
rejected. Stability is not statistically significant for perceived ease of use
and perceived usefulness, and the loyalty of mobile provider is not affect
perceived usefulness. This study will provide implications for the IoT service
market and business. |
Keywords: |
Internet of Things, Bundle service, Intention to use, Loyalty of Mobile
Provider, Technology Acceptance Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
STUDY ON PORT BASED ON USER AUTHENTICATION SYSTEM USING IEEE 802.1X |
Author: |
Young-Geun Yu, Koo-Rack Park, Dong-Hyun Kim |
Abstract: |
Recently due to electronic weight lightening and miniaturization of devices,
dissemination of devices such as smartphone is expanding abruptly. Concurrently
with the convenience in carrying services using smartphone are increasing
abruptly, leading us to many variations in life due to IOT environment realized.
Especially as BYOD (Bring Your Own Device) ubiquitous environment is briskly
realized, the business focused on use of internet is becoming the general trend
in human living. Most of the businesses at government institutions, corporate or
research laboratory, general households, are performed through network service.
However, dependence on network is so high that any problem at network may cause
paralysis of all businesses. Also operator maintaining the network requires much
time and effort to resolve the problem of failure. Especially in case of any
failure occurred in relation to security, the system to grasp the information
comprising MAC, IP, access time, user etc in prompt and intuitive way is
lacking, consuming much time in resolving problems. Recently as the IEEE 802.1x
based wireless network expands, various services being provided. However, in the
situation where many attacks through wireless network are occurring, this thesis
proposes the authentication system that resolves the simple, repetitive problems
which may occur between network user and the person in charge of network
maintenance and can expedite user authentication, through user authentication
based network design that can manage the authentication of dispersed network in
centralized and flexible manner. Through the proposed system, threat to security
would minimized and the user and network managers are anticipated to break from
the simple, repetitive duties on internet service and management. Future studies
shall be directed to the IP back tracking that can respond positively to the
judgment and classification of wired-wireless traffic, and to the threat to
security. |
Keywords: |
IEEE 802.1x, Authentication, Authorization, RADIUS, Firewall |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
THE DIFFERENTIAL EFFECTS OF ONLINE CONTENT ON HEALTHCARE ADOPTION: HIERARCHICAL
MODELLING |
Author: |
JAE-YOUNG MOON, JAE-WON HONG |
Abstract: |
With increasing interest in health, the medical tourism market has become more
important than ever. This study was to analyze the factors of consumer keywords
used online search in healthcare. To this end, we based the amount of searches
on the text mining by Google. We used hierarchical modeling to categorize
consumer’s adoption of healthcare. The findings are as follows: First, medical
tourism has positive effects on various categories of travel, health, beauty,
social, and other categories as well. In particular, it is found that its impact
on travel category was greater than the other categories and its impact on the
social category was important as well among the online consumers. Second, the
categories of healthcare, finance, business, government have positive effect on
healthcare adoption. This study was intended to contribute to finding out
consumer behavior patterns in healthcare industry using big data. In conclusion,
it’s suggested that adoption strategy should be used differently according to
the type of its content, in order to diffuse medial tourism. |
Keywords: |
Keyword Analysis, Text Mining, Healthcare, IT content, Big Data, Adoption,
Differential effect |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
Title: |
CYBER HARASSMENT PREVENTION THROUGH USER BEHAVIOR ANALYSIS ONLINE IN KINGDOM OF
SAUDI ARABIA (KSA) |
Author: |
FAHAD ABDULLAH MOAFA, KAMSURIAH AHMAD, WALEED MUGAHED AL-RAHMI, NORAFFANDY
YAHAYA, YUSRI BIN KAMIN, MAHDI M ALAMRI |
Abstract: |
This research attempted to mitigate the gap in literature concerning a one
serious problem in Saudi society and government is cyber harassment. This
problem is caused through the increasing use of technology. Accordingly, the
main objective was to explore the factors that influence the intention to
minimize cyber harassment among Saudi citizen. Nevertheless, the researcher has
assured that the Saudis will remain at risk of cyber harassment, until these
factors are fully investigated among the Saudi community. In conclusion, this
research specifically proposed in future a model and framework for identifying
the significant factors that are anticipated to play a major in minimizing cyber
harassment among Saudis. The proposed framework will help the administration and
decision-makers in the KSA to formulate strategies that can significantly affect
anti-cyber harassment among youths. |
Keywords: |
Cybercrime, Cyber-Harassment, Behavior Analysis, online threats |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2018 -- Vol. 96. No. 6 -- 2018 |
Full
Text |
|
|
|