|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
April 2018 | Vol. 96
No.7 |
Title: |
AN APPROACH FOR FEATURES MATCHING BETWEEN BILATERAL IMAGES OF STEREO VISION
SYSTEM APPLIED FOR AUTOMATED HETEROGENEOUS PLATOON |
Author: |
MOHAMMAD ALFRAHEED |
Abstract: |
Recently, the stereo vision system (SVS) has been developed in measuring tasks.
Using SVS in measuring tasks plays an important role in automated highway system
(AHS) because the SVS can be used instead of high cost distance sensors. The AHS
is being developed to be run in different environments (i.e. unstructured and
dynamic environment) and to form different shapes of platoon (i.e. heterogeneous
platoon). In this work, a proposed method has been developed to improve the
performance of the SVS in terms of automated heterogeneous platoon. The first
stage of improvement has been here introduced by proposing a method for matching
the left and right image of SVS (i.e. bilateral image). The significant
contribution of the proposed method is to localize the points of interest in
matching considering the shape of context assigned to the localized object of
interest. The idea behind this development is to localize alternative connected
points whenever the back view of the preceding vehicle BVPV (i.e. reference
object) is influenced by the environment, including but not limited to sunshine
reflection. In order to eliminate the surrounding objects of the BVPV, the
Histogram of Oriented Gradient (HoG) has been developed by a proposed enhanced
procedure. The latter depends on passing a precise knowledge about the position
of edges and enhancing the gradient of intensity values. As for feature
extraction, the proposed method has been developed to use the smoothed image
generated by DoG instead of using the original image. The similarity value
between each enhanced blocks is calculated based on the Euclidean Distance.
Similarity value of the successful matching is greater than 99% between each
enhanced blocks. In comparison with other methods, including SIFT and HoG, the
proposed method extracts many corresponding features at different distances
(from 3 to 10 meters) for the whole BVPV. |
Keywords: |
Stereo Vision System, Automated Heterogeneous Platoon, Features Matching |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
RECOGNITION OF MISSING CHILDREN USING FEATURE-BASED METHOD |
Author: |
RAJIV KUMAR, ARTHANARIEE A. M. |
Abstract: |
In this research work, a new system has been proposed to tackle the problem of
identifying and recognizing missing children. The skin and non-skin part of the
original image has been segregated by using binary operation, then, the face
area of skin image has been obtained by using morphological operation. Finally,
the feature points (mouth, right nostril, left nostril, right eye and left eye)
are located on the face image of missing children of later age. The four
triangles are formed by taking the combination of feature points (mouth, right
nostril, left nostril, right eye and left eye) of the face images of missing
children of later age. The ratios of three sides of all the four corresponding
triangles of the two face images of missing child of later and early ages have
been calculated. The difference between ratios of sides as well as difference
between angles of these four corresponding triangles have been calculated. If
the difference between ratios of any two sides and difference between the
included angles of anyone of the four corresponding triangles is equal to or
less than specified threshold value, then these two face images belong to same
child, otherwise not. FG-NET aging database are used to analyze the proposed
system. The performance of the proposed system has been compared with the
existing system. It has been acknowledged that the proposed system is better and
more useful to identify and recognize the missing children from age 1 to age 18
years. |
Keywords: |
Biometric, Feature Points, FG-NET, Geometrical Transformation, Missing Children |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
IMPLEMENTATION OF A PCG SIGNAL CLASSIFICATION SYSTEM IN THE FPGA EMBEDDED
PLATFORM |
Author: |
BOUSSAA MOHAMED, BENRABH MOHAMED, ATOUF ISSAM, ATIBI MOHAMED, BENNIS ABDELLATIF |
Abstract: |
The medical assistance systems do not cease to evolve from one day to the next,
which requires them to be implemented in reliable platforms that are capable of
guaranteeing the efficiency and accuracy of these systems. In this perspective,
this document describes in detail the hardware implementation of a medical
assistance system that can classify PCG phono cardiac signals in two types:
normal and abnormal. This system combines two algorithms: an algorithm for the
description of the acoustic signal based on discrete wavelets transform and
statistical operations, and a classification algorithm based on MLP artificial
neural networks. In order to give this system the possibility of being used in
real world applications, a hardware implementation was made in the embedded
platform FPGA type, this implementation is based on the NIOS II microprocessor
and its input-output devices. The results of the hardware implementation of this
system have shown that the system is robust, fast and accurate in these
decisions. |
Keywords: |
PCG classification, discrete wavelet transform, artificial neural network, FPGA,
NIOS II |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
FAST MULTIFRACTAL EDGE DETECTION USING ANISOTROPIC DIFFUSION |
Author: |
RAWAN ZAGHLOUL, HAZEM HIARY, MOH’D BELAL AL-ZOUBI |
Abstract: |
Image edge detection is a core operation in image processing applications.
Classical approaches make use of fixed neighborhood detectors, while recent
research recommends the incorporation of scale factor in filter design to
increase both the accuracy of classifying edge pixels, and to provide more
flexibility in retrieving multilevel edge maps. Multifractal approach follows
this trend of incorporating the scale in feature analysis, and it is widely used
in image analysis and pattern recognition applications. However, very few
researches explore the abilities of multifractals in image edge map generation
due to its extensive computation time which is a major obstacle in this research
area. Herein, we propose AD-MED; a fast multifractal edge detector based on
anisotropic diffusion filter. The evaluation of the proposed edge detector was
done first qualitatively by visual assessment. Second, quantitatively in terms
of both the quality of the results and the execution time. Experimental
simulation shows that AD-MED outperforms the well-known multifractal edge
detectors in both terms. |
Keywords: |
Fractals, Multifractal Analysis, Anisotropic Diffusion, Multilevel Edge
Detection, Regularization Filters |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
SOFTWARE RELIABILITY PREDICTION IN VARIOUS SOFTWARE DEVELOPMENT STAGES |
Author: |
MOHAMMAD IBRAIGHEETH (ABU-AYYASH) , SYED ABDULLAH FADZLI |
Abstract: |
Software reliability prediction is performed at different stages during software
development process to assess if the software meets reliability requirement and
avoid any potential software failures. Reliability prediction methods play an
important role in guiding software project decision makers to recognizing
strategies that can transform project outcomes from failure to success. This
paper presents a summary of several recently published reliability prediction
methods. The presented approaches are classified into either earlier or later
stage. Various techniques for reliability prediction, such as probability,
metric based, fuzzy logic, and neural networks are discussed. The theoretical
bases of these approaches are explained whereas many of their limitations are
identified. General points related to software reliability prediction topics are
concluded based on this review. |
Keywords: |
Software Reliability, Software development stages, Reliability Models, failure
prediction, software metrics |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
CLASSIFYING STUDENTS’ ANSWERS USING CLUSTERING ALGORITHMS BASED ON PRINCIPLE
COMPONENT ANALYSIS |
Author: |
ALAA KHALAF HAMOUD |
Abstract: |
Recently, almost all the academic institutions focus on finding the factors
which increase the educational outcomes. Due to its importance in reflecting
achievement of the academic organizations, students’ success is a significant
goal pursued by all educational institutions and grabbed their wide attention.
Different data mining tools and algorithms are implemented and used for
increasing students’ academic success and analysing the factor affect the
student’s performance. The paper introduces a proposed model for classifying
students’ answers using four clustering algorithms (EM, Hierarchical Clustering,
Make Density Based and K-Means). PCA is used for attributes selection for two
reasons; the first one is to reduce the number of attributes in order to
increase the results accuracy, and second reason to find the most relevant
attributes which affect on the final class. A comparison is made between
clustering algorithms based on specific classification performance to find the
optimal one for clustering. The questionnaire consists of 62 questions that
cover the most related fields such as health, social activity, relationships and
academic performance. Google form and LimeSurevey questionnaire (open source
application) are used to build the questionnaire and the total number of
students’ answers is 161 answers. The answers of students are collected from two
departments (Computer Science and Computer Information Systems) in the college
of Computer Science and Information Technology, University of Basrah, Iraq. Weka
3.8 tool is used to build and implement the model. The overall model design
process can be divided into four stages, the first stage is data pre-processing,
and the second one is applying PCA to find the correlated attributes. In the
third stage, four proposed clustering algorithms are applied and the final stage
the optimal algorithm is selected based on a comparison between algorithms. |
Keywords: |
Educational Data Mining (EDM), Student’s Answers, Clustering Algorithm,
Principles Component Analysis (PCA), Classification, Weka. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
HOMOMORPHIC ENCRYPTION IMPLEMENTATION TO ENSURE DATA SECURITY IN CLOUD COMPUTING |
Author: |
MOHAMAD T. SULTAN, KHALED N. YASEN |
Abstract: |
Cloud computing is an evolving technology paradigm with incredible momentum.
While the benefits of cloud computing are clear, it introduces new security
challenges. Security issues in cloud computing is shown to be the biggest
obstacle that could affects its wide benefits. These security issues become a
critical concern when outsourcing sensitive data and business application to a
third party. Sensitive information such as medical records, financial records or
high impact business data has its own strict and sensitive security requirements
for confidentiality, availability to authorized users, and traceability of
access. This paper focuses on storing data on the cloud in the encrypted format
to avoid data contact from an unauthorized access. The paper introduces the
principle of homomorphic encryption and suggests the use of fully homomorphic
encryption (FHE) scheme to provide a secure environment for sensitive user data
in the cloud. The proposed scheme is secure and practical. And the performance
assessment and analysis demonstrate the practice and validity of the proposed
technique. |
Keywords: |
Cloud Computing, Homomorphic Encryption, Cloud Security, Security Threats. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
ALGORITHM FOR ENERGY EFFECIENCY AND LIFETIME OPTIMIZATION IN WIRELESS SMART
SENSORS NETWORK |
Author: |
LAGRAINI HAJAR, CHHIBA MOSTAFA, TABYAOUI ABDELMOUMEN, LASBAHANI ABDELLATIF,
BAHRI MOHAMED, KAMAL ADIL, MOUHSEN AHMED |
Abstract: |
Wireless sensor network (WSN) is a wirelessly interconnected network; it has
increased massively due to the vast potential of smart wireless sensors to
connect the physical globe with the virtual globe. Sensor nodes are used for
monitoring and tracking fields they sense many environment conditions such as
vibration, temperature, speed and even pollution level and many other such
environmental conditions. Thus it's quite common to deploy WSs in hostile
environments where there are no electricity sources so SN get powered from its
battery and this battery get evacuated with time. However decreasing power
energy consumption in WSN is one of the most essential keys to challenge WSN
lifespan, hence Low energy adaptive clustering hierarchical routing protocol
(LEACH) has been suggested to enhance network lifespan. This protocol is based
on clustering technique; each cluster of the network has cluster members CMs and
one chief cluster named cluster head CH responsible for routing data to the BS.
In this paper, we will present an algorithm based on LEACH to optimize energy
efficiency level and improve life time of the WSN, Moreover, a comparison of
this algorithm and the pure LEACH is being done. Finally simulation results
shows that the proposed protocol beats pure LEACH in terms of network power
consumption saving and network lifetime. |
Keywords: |
WSN, IOT, Clustering, Leach, Wireless Transmission, Power Energy
Effeciency |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
MODELING BUSINESS PROCESS AUTOMATION FOR CHECKING CERTIFICATE RETRIEVAL
REQUIREMENTS USING SOMA METHOD |
Author: |
CHRISTINE DEWI, DANNY MANONGGA |
Abstract: |
Service-Oriented Architectures (SOAs) was founded as an Information and
Technology strategy to meet business goals, so it can integrate various existing
information systems in an organization especially in educational institutions.
However, the main goal of this research is to design and analyze business
process automation for checking certificate retrieval requirement using Service
Oriented Modeling Architecture (SOMA) in the Faculty of Information and
Technology Satya Wacana Christian University Salatiga, as well as confronting
the business processes of checking certificate retrieval requirement before and
after being integrated. As the result of this research, the benefits will be
found from the services that are operating in the checking system of certificate
retrieval requirement. At the time when systems were integrated each other, it
could help the certificate retrieval management process, so that it can
facilitate all related parties involved. |
Keywords: |
Information System, Integration, SOA, SOMA. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
THE FACTORS THAT AFFECT THE QUALITY OF ACCOUNTING INFORMATION SYSTEM EMPIRICAL
TESTING IN THE STATE-OWNED ENTERPRISES |
Author: |
MEIRYANI |
Abstract: |
Business process and management support are factors which can improve the
quality of information systems. Information systems used as a tool to help the
company's daily operations and management in decision making. Integration of the
system is indicated by the harmony in the system so as to achieve user
satisfaction. Thus, to improve the quality of information systems required
business processes, management support that will improve the quality of
information systems. This research was conducted at 61 for companies in the
State-Owned Enterprises. This study uses an explanatory cross-sectional survey,
and testing the data used by Structural Equation Model (SEM) approach to
analysis tools Partial Least Square (PLS).The results found in companies in the
business processes and management support affecting the information system. |
Keywords: |
Quality of Information Systems, Business Process, Management Support |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
THE CULTURAL CHARACTERISTICS OF ONLINE PLAYERS IN THE INTERNET CAFES OF
JABODETABEK, INDONESIA |
Author: |
DEVIE RAHMAWATI, DEDDY MULYANA, SITI KARLINAH, PURWANTI HADISIWI |
Abstract: |
This paper argues that many claims about online game addiction are not accurate
and that criteria of addiction based on studies conducted in Western countries
are not true. Through an ethnographic study based on the theory of Symbolic
Interaction observing 152 online players in the neighbouring cities of Jakarta,
Bogor, Depok, Tangerang and Bekasi (Jabodetabek) in Java Island, Indonesia, was
found that the online players’ gaming behavior are locally and culturally
contextualized which differentiate them from the typologies of online game
players in the world. The majority of players indicated positive behaviors
characterized by organized time management, interaction etiquette, and the
presence of sensitivity of individuals within the community of online players. |
Keywords: |
Online Game, Ethnography, Symbolic Interaction, Labelling, Culture |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
A NEW TECHNIQUE FOR ESTIMATING AND ENHANCING ORIENTATION FIELD OF FINGERPRINT
IMAGE |
Author: |
ALAA AHMED ABBOOD, GHAZALI SULONG, AHMED MAJID TAHA, SABINE U.PETERS5 |
Abstract: |
The direction of fingerprint patterns normally changes from one block to
another, which makes it necessary to have information about neighbouring blocks
to obtain the original shape of the fingerprint patterns. This paper introduced
a novel approach for orientation field calculation using an innovative filter
formed as Epicycloid window shape. In which estimates the orientation fields of
each block in the main space of work, to create true-angle orientation fields.
The calculation procedure of the proposed method is executed by first dividing
the image into blocks of pixels with size (16x16). Then, Epicycloid shape filter
with k=4 is located surrounding the target block to extract some information
from its 8 neighbours. Finally, calculate the local gradient for each target
block which is values later used to estimate the gradient angle θ for that
block. The obtained patterns then grouped together to form four distinct
homogenous regions using a region growing technique. The current method was
evaluated using the NIST-14 database and showed reliable results on different
quality images. |
Keywords: |
Fingerprint Image Enhancement, Orientation Field Estimations, Epicycloid Window
Shape Filter, Region-Growing Technique, Feature Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
SENTIMENT ANALYSIS USING HYBRID METHOD OF SUPPORT VECTOR MACHINE AND DECISION
TREE |
Author: |
YASSINE AL-AMRANI, MOHAMED LAZAAR, KAMAL EDDINE EL KADIRI |
Abstract: |
The exploitation of social media (forums, blogs and social networks) has become
crucial due to the explosive growth of textual data from these new sources of
information. Our work focuses on the sentiment analysis resulting from the
messages (SMS, Facebook, Twitter...) using original techniques of search of
texts. These messages can be classified as having a positive or negative feeling
based on certain aspects in relation to a query based on terms. This paper
presents a hybrid approach of Support Vector Machine and Decision Tree. This
approach permits to ameliorate the result in terms of accuracy and CPU time. |
Keywords: |
Sentiment Analysis, Social Media, Classification, Support Vector Machine,
Decision Tree |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
A NEW APPROACH FOR FEATURES SELECTION BASED ON BINARY SALP SWARM ALGORITHM |
Author: |
MUNTADHER KHAMEES, ABBAS ALBAKRY, KHALID SHAKER |
Abstract: |
Metaheuristic techniques become considerably popular in solving feature
selection (FS) problems due to their flexibility and ability to avoid the local
optimum problem. Features selection is important and essential mean to tackle
the classification problems through choosing an optimal features subset
according to a certain criterion. FS is used to reduce dimensionality and remove
noise from data, these are given rise to speed of learning, simplicity of rules,
visualizes the data and predictive accuracy. Salp Swarm Algorithm (SSA) is a new
metaheuristic algorithm that emulates the inbred behaviour of the Salp chain. In
this study, a new FS approach applies the native SSA in machine learning domain
to select the optimal feature group on the basis of wrapper mode. Subsequently,
SSA is hybridised with a mutation operator. Mutation is embedded to act as an
internal operator and consequently maintain diversity and improve the
exploration ability within the SSA. The performance of SSA with mutation
operator (SSAMUT) on 16 datasets from UCI Machine Learning repository is
evaluated and compared with that of the native SSA and other related approaches
in the literature. Experimental results proved the efficiency of the proposed
approaches in solving search space problems. SSAMUT presents the most excellent
performance compared with those of other approaches on all datasets. |
Keywords: |
Metaheuristics, Salp Swarm Algorithm, Feature Selection, Wrapper Model, Mutation
Operator |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
EXPERT SYSTEM FOR GREEN TRANSPORTATION SYSTEM: AN OVERVIEW |
Author: |
HASSAN M ABDELSALAM , MUHAMMAD NAZRI BORHAN, RIZA ATIQ OK RAHMAT |
Abstract: |
Several developing nations, there is a relationship between the variables that
affect a trip’s duration departure to arrival and the chosen transportation
mode. There are a few issues to be considered when reducing travel time to the
maximum extent. A trip is considered green if green transportation strategies
are followed and green transportation modes are used, such as walking, cycling,
or opting for public transport. This paper provides an outline for possible
directions of future research. It presents a brief introduction to expert
systems, explaining how technology plays a role in the latest approaches to
transportation engineering. The purpose of this paper is to summarize the latest
outcomes of researches related to the process of engineering, developing, and
implementing an expert scheme for a green transportation system. The current
expert system does not accommodate the requirements of a green transportation
system. Moreover, the paper highlights the necessity to develop an expert system
for green transportation. This system enables performance engineers to
determine, analyze, and customize information to help relevant parties during
decision-making processes. Lastly, a few recommendations are presented for
improving the existing expert system in transportation and developing the
framework for the expert system for green transportation. |
Keywords: |
An expert system; green transportation system; alternative transport modes |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
PUBLIC KEY FULLY HOMOMORPHIC ENCRYPTION |
Author: |
SARAH SHIHAB HAMAD, ALI MAKKI SAGHEER |
Abstract: |
The meaning of cloud computing is the Information Technology (IT) model for
computing, which is consist of all the IT components (software, hardware,
services and, networking ) that are needed to enable delivery and development of
cloud services through the private network or the internet. In the cloud
computing the client put his data on the cloud, and any computations on his
stored data will be implemented in the cloud. Intentionally the cloud service
provider can access, change or even delete the stored data of the client. To
produce the effective services, some of the cloud service providers share the
information with third parties. The third party can access to the client private
data and modifies on this data to make it beneficial to him. Moreover,
providers, untrusted servers, and cloud operators can keep identifying elements
of users long after users end the relationship with the services. For these
reasons, the security has become the most important thing in cloud computing.
The mechanism that protects the privacy of sensitive information is called the
encryption. To protect the data that it’s stored on the cloud we must use an
encryption system that can perform computations on the encrypted data. The
scheme that allows to executing several computations on the encrypted message
without decrypting this message is called homomorphic encryption. This paper
provides encryption scheme (PKFHE) that can applied it on a cloud computing .The
proposed scheme is based on Euler’s theorem, which proved both addition and
multiplication operations at the same time on ciphertext without decryption. we
compute the time complexity of the encryption and decryption function for the
Elgamal, RSA cryptosystems and our proposed PKFHE scheme which, the order of
encryption function of all the schemes is O ((log (n))3) and the order of
decryption function of Elgamal, RSA cryptosystems is O (log (n)3), while the
order of decryption function of PKFHE scheme is O (log (n)2) that mean the
proposed PKFHE scheme is faster in the time complexity. Also compared the
execution time among the three schemes with five sizes of the messages and used
five lengths of a secret key, where we concluded that the execution time of the
proposed scheme was slower than the execution time of Elgamal, RSA cryptosystems
except in the case of the key 128-bit which, the execution time of RSA was
slower than the two others. Also we noticed that the length of the private key
was effect on the execution time of the algorithms in which the execution time
increased when the length of the private key was increase and finally the
security of the schemes is analyzed. The proposed scheme showed a good security
for the stored data on the cloud. |
Keywords: |
Fully Homomorphic Encryption; Public Key Cryptosystem; Homomorphism; Cloud
Computing Security. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
A SYSTEMATIC REVIEW OF TECHNOLOGICAL ISSUES IN MONITORING PILGRIMS HEALTH DURING
HAJJ: CURRENT STATE, CHALLENGES AND FUTURE DIRECTIONS |
Author: |
SHAH MURTAZA RASHID AL MASUD, ASMIDAR ABU BAKAR, SALMAN
YUSSOF |
Abstract: |
Hajj pilgrimage has been the focus of public health initiatives for centuries
because it is one of the biggest and oldest annual mass gatherings in the world.
But a little is done to objectively monitor pilgrims’ health during Hajj who has
been suffering from infectious and chronic diseases. The main objective of this
study is to identify the technological issues in monitoring pilgrims’ health in
Hajj environment. We searched and reviewed articles from several scholarly
databases along with relevant databases and web portals of the government of
Saudi Arabia and World Health Organization (WHO) from the year 2012 to 2017 to
identify the technologies and their limitations for pilgrims’ health monitoring
during Hajj. We explored the articles by using the search criteria “Hajj” AND
“pilgrims’ health monitoring” AND “technology” AND “medicine” OR “tracking” OR
“infectious and chronic diseases”. Only 15 research articles out of 134 articles
fulfilled the selection criteria. During the study it is found that the common
health problems during Hajj are mainly categorized into chronic or
non-communicable diseases (62.5%) and infectious or communicable diseases
(37.5%). Where, the major health burdens are respiratory disease, heat stroke or
heat attack, cardiovascular or heart disease, Gastroentritis infection,
diabetes, and influenza with high faver. Literature review reveals that so far
four different types of health facilities are proposed by the research
community, among which health records and health guidelines are 40%, pilgrims’
tracking to avoid risk is 27%, infectious diseases surveillance or prevention
systems 20%, and monitoring of pilgrims’ stress and health condition e.g. pulse
and temperature monitoring is about 13%. However, not a single research has
shown how to provide real-time health facilities to pilgrims who suffer from
various chronic and infectious diseases at Hajj ritual sites. During Hajj it is
urgent to ensure immediate healthcare facility and proper mecication in order to
secure pilgrims’ lives. Our present study is limited to focus on the
perspectives of deploying Wireless Body Area Networks (WBANs) which requires
further investigation considering overcrowded and harsh environment at Hajj
ritual sites. In this research, a future direction ensuring pilgrims’ real-time
health monitoring and providing adequate medical facilities during Hajj is also
depicted. |
Keywords: |
Hajj, Pilgrims, Technology, Health monitoring, Infectious and Chronic diseases,
WBANs |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
SURVEY PAPER: PSEUDO RANDOM NUMBER GENERATORS AND SECURITY TESTS |
Author: |
OMAR SALHAB, NOUR JWEIHAN, MOHAMMED ABU JODEH, MOHAMMED ABU TAHA, MOUSA
FARAJALLAH |
Abstract: |
Many security applications are based on Pseudo Random Number Generators (PRNGs).
Random binary numbers constitute a major reliance in many network security
algorithms. For example, common cryptosystems require a long dynamic key that
should be generated from a short secret key and has the random behavior. Random
or pseudorandom inputs are critical requirements in many protocols that need
this issue at certain points. A PRNG is a deterministic algorithm generates a
sequence of bits simulates the truly random numbers sequence behavior. Each
generated number should be independent of the previous or the future numbers, as
a result the PRNG become unpredictable. However there are many security and
performance tests can be applied on the PRNG sequence to evaluate it. And then
measure the power of the PRNG. Therefore not all PRNG are good enough to be used
in cryptographic applications. This depends on the kind of application and its
data sensitivity. A PRNG that passes these tests can be considered as a secure
PRNG. Furthermore, it can be used in many cryptographic applications. In this
survey, some missing results are reproduced by our team in order to have the
same level of assessment for presented algorithms under the test. Moreover, new
test tools are used to evaluate the behavior of the generators and assess the
randomness of them. Finally, details discussions of the new tools are considered
in order to validate the security level of the proposed generators. |
Keywords: |
PRNG, Stream Cipher, RC4, Salsa20, NIST Tests |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
THE DEVELOPMENT OF BAHASA INDONESIA CORPORA FOR MACHINE LEARNING MODEL IN
COMBATING CYBER BULLYING: A CASE STUDY OF THE INDONESIAN 2017 CAPITAL CITY
GOVERNOR ELECTION |
Author: |
MUHAMMAD IKHWAN JAMBAK, PUTRI SANGGABUANA SETIAWAN |
Abstract: |
The cyber bullying is considered as a serious problem and it is proven that the
impact obtained from cyber bullying is larger than the suppression of physical
in traditional bullying. One way to reduce the cyber bullying is doing an
earlier detection on it. Therefore, each of uploaded bullying content could be
removed by an application of concerned. However, it is not an easy task to do
this detection because of several reasons. First of all, the language form of
the cyber bullying constructed is usually not in accordance with the formal
language structure. As the result, the assessment of content cannot be processed
per word individually, but in the contrary, it should include the whole
sentence, including the punctuation marks, emoticons, and tagging. In other
words, ones cannot rely on the rough/dirty word filtering in combating the cyber
bullying, but rather have a tool that understands the bullying context within a
sentence. Secondly, every language is different in how it is used in expressing
its user mood. Thus, although there are reports on how machine learning
successfully used in certain levels in combating cyber bullying in English, it
does not mean that it can be used in other languages. In fact, the machine
learning algorithm should work on the top of large and structured sets of texts
of a certain language that can be stored and processed electronically called
corpora. The ultimate goal is to propose a machine learning algorithm for
combating cyber bullying in Bahasa Indonesia. Bahasa Indonesia corpora have been
developed and will be tested using the existing machine learning algorithms that
work in Indonesia, English, and Hindi. The data had been scraped and derived
from social media during the 2017 Indonesian capital city governor election. |
Keywords: |
Machine Learning, Cyber Bullying, Social Media, Corpora, Feature Space Design,
Classification |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
EARLY WARNING SYSTEM FOR CERVICAL CANCER DIAGNOSIS USING RIDGE POLYNOMIAL NEURAL
NETWORK AND CHAOS OPTIMIZATION ALGORITHM |
Author: |
ROCKY YEFRENES DILLAK, GLORIA CHRISTIANA MANULANGGA, JANSEN LOUDWIK LALANDOS |
Abstract: |
Cervical cancer is one of the most dangerous cancer among women. Detecting this
cancer earlier could prevent the subject from cancer. The aim of this paper is
to propose a method that can be used as an early warning system for cervical
cancer diagnosis. Thirteen questions about subject sexuality background were
used as the significant parameters to determine whether the subject is a suspect
of cervical cancer or not. These parameters also were used as the input variable
to the classifier. This research hybridized Ridge Polynomial Neural Network with
Chaos Optimization Algorithm as classifier. The results of this study showed
that the proposed approach reached the sensitivity of 95.56%, specificity of
96.67% and accuracy of 96 %. |
Keywords: |
Cervical Cancer Diagnosis, Early Warning System, Ridge Polynomial Neural
Network, Chaos Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
AN EFFICIENT ONE-LAYER RECURRENT NEURAL NETWORK FOR SOLVING A CLASS OF NONSMOOTH
PSEUDOCONVEX OPTIMIZATION PROBLEMS |
Author: |
M. J. EBADI, M. M. HOSSEINI, S. M. KARBASSI |
Abstract: |
In this paper, an efficient one-layer recurrent neural network model which is
differential inclusion-based is proposed for solving nonsmooth pseudoconvex
optimization problems subject to linear equality constraints. The optimal
solution of the original optimization problem is proven to be equivalent with
the equilibrium point of the proposed neural network. In addition, the stability
of the proposed neural network in the Lyapunov sense and globally convergence to
an optimal solution are proven. Some illustrative examples are given to show the
effectiveness of the proposed neural network. In addition, an application for
condition number optimization is discussed. |
Keywords: |
Differential inclusion-based method, Nonsmooth optimization, Recurrent neural
network, Lyapunov stability. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
DESIGN AND ANALYSIS OF DIFFERENT SUBSTRATE MATERIALS FOR UWB ANTENNA USED FOR
BIOMEDICAL APPLICATIONS |
Author: |
K.RAJKAMAL , GOVARDHANI.IMMADI |
Abstract: |
A CPW fed Micro strip patch antennas of size 25 x 25 x 1.6 mm3 is proposed. The
antennas are designed and analysed with different materials like FR4, RT Duroid,
Polyester and Fleece. The proposed antenna possess a method to minimize the
monopole patch antenna by loading the U strip over the predictable monopole
patch antenna to lower the height of the antenna. The ground was vertically
extended toward two sides of the single radiator. The antenna is simulated using
MOM based CST microwave Studio. The antenna is practically fabricated. Measured
results show a good concurrence with simulated results. The operating frequency
band is 3-12 GHz (9 GHz) good agreement interms of return loss, Radiation
pattern and VSWR. The designed structure is suitable for wireless and as well as
biomedical applications[4][16] |
Keywords: |
Biomedical materials, coplanar wave guide, Micro strip patch antenna,
Ultra-wideband |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
THE HOLISTIC VIEW OF BUSINESS INTELLIGENCE (BI) AND BIG DATA ANALYTICS (BDA)
TOWARDS DESIGNING STRATEGIC PERFORMANCE MANAGEMENT FRAMEWORK: A CASE STUDY |
Author: |
MAILASAN A/L JAYAKRISHNAN, ABDUL KARIM BIN MOHAMAD, MOKHTAR BIN MOHD YUSOF |
Abstract: |
In this research paper, we had approached the contradictory characteristic of
holistic perspective in an organization that generated data value on
organizational strategic performance by utilizing Business Intelligence (BI)
mechanism and Big Data Analytics (BDA) within a conceptual framework and their
strategy expansion and execution for strategic performance management. BI and
BDA were emphasized due to the significance in empowering organizations for
deriving better knowledge inception and decision-making process. Derived
knowledge from organizing big data (BD) and utilizing BI together with MIT90s
model, McKinsey 7S’s framework and survey findings. These approaches were used
as the baseline of information excellence framework for the formulation of BI
and BDA towards strategic performance management framework for an organization.
This conceptual framework stated the simultaneous BI stages and BDA in
strategies adoption via visualizing the organizational performance indicator.
The outcome will be a blueprint of a strategic performance management framework
for a prototype of such strategic application. |
Keywords: |
Business Intelligence, Big Data Analytics, MIT90s Framework, McKinsey 7S’s
Framework, Information System |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
A NOVEL APPROACH TO MEDICAL IMAGE WATERMARKING FOR TAMPER DETECTION AND RECOVERY
OF REGION OF INTEREST USING PREDICTIVE CODING AND HASHING |
Author: |
K.CHAITANYA, K.GANGADHARA RAO |
Abstract: |
Telemedicine is an important application based on telecommunication and
information technology to provide medical services to the remote patients with
the advice of the healthcare professionals. The treatment is planned by
analyzing the medical reports like CT scan, MRI scan, X-ray images etc. Hence,
transmission of these images over internet needs integrity and security. Medical
image watermarking has gained tremendous importance due to its catering needs in
diagnosis, treatment planning, and to increase the security, confidentiality and
integrity of the medical images. In medical image watermarking, the significant
part of the medical image is treated as Region of Interest (ROI) that is
important for diagnosis. Hence, it is very important to maintain integrity and
transmit the ROI securely. In this paper, predictive coding and hashing
technique is applied to ROI region in order to embed in Region of Non-Interest
(RONI) to generate watermarked image. The proposed method, effectively extracts
the ROI at the receiver side in spite of the tampering and noise added to it.
The experimental results of the proposed method on various medical image
databases proved to produce robust medical images to tampering. Compared with
the existing techniques, the proposed method outperforms with the Peak Signal to
Noise Ratio (PSNR) approximately 50dB. |
Keywords: |
Watermarking, Discrete Cosine Transform, Predictive Coding, Hashing, Peak Signal
to Noise Ratio. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
Title: |
A HOP-COUNT AND NODE ENERGY BASED MANET ROUTING PROTOCOL |
Author: |
NADEEM IQBAL, MOHAMMAD SHAFIE BIN ABD LATIFF, NADIM RANA |
Abstract: |
Mobile ad hoc network is a self-configuring network in which all participating
nodes are mobile and consist of limited channel bandwidth and energy. Mobile
devices are battery operated, and energy efficiency is a major issue for
battery-operated devices in mobile ad hoc networks. Routing data packets from
source to destination is the challenging task in mobile ad hoc networks due to
node mobility and dynamic topology change in the network. Link failure or node
energy depletion causes re-routing and establishing a new route from the source
node to destination node which consumes extra node energy, reduces connectivity
of the network and early partition of the network. Energy-related parameters
consideration in routing is an important solution to enhance network lifetime.
Several better performing routing schemes are presented and implemented for
MANETs. Ad-hoc On-demand Distance Vector (AODV) routing protocol is one which
performs well among similar routing protocols for MANET. AODV route selection
base on either lowest hop-count or fresh sequence number. Many enhancements to
AODV are proposed, which represents a better performance in comparison with
original protocol. However, in a large network different paths to the
destination could be found with the same hop-count. When efficiency is
deliberated for those paths in quickly data transmission, each path performance
varies in terms of throughput, end-to-end delay and packet delivery ratio due to
the mobility of the nodes in the network. AODV routing protocol and enhancements
suggested by other researchers do not give attention to such cases, and this
paper proposes Hop-count and Node Energy based Routing Protocol (HNERP) which
uses a multi-function routing strategy that incorporates with hop-count and node
energy while making the routing decision. The proposed protocol is simulated by
using NS2 and results show that HNERP performs better in term of packet delivery
ratio and throughput, moreover it increases network lifetime and reduces
end-to-end delay. |
Keywords: |
Hop-count, Node Energy, Route Selection, Link failure, Network Lifetime |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2018 -- Vol. 96. No. 7 -- 2018 |
Full
Text |
|
|
|