|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
May 2022 | Vol. 100 No.09 |
Title: |
NEURO NETWORK TECHNIQUES OF TELEMETRY MULTIVARIATE TIME SERIES PROCESSING AND
THEIR APPLICATIONS IN INDUSTRY |
Author: |
MUHAMMAD IQBAL, HAMDANI, MUHAMMAD SIDDIK HASIBUAN, ADLI ABDILLAH NABABAN |
Abstract: |
The main innovations proposed for development and implementation within the
framework of the project, assessment of their fundamental novelty and
competitiveness, compliance with environmental and other indicators, as well as
the requirements of international standards. The main innovation of the project
is to create more accurate methods and algorithms for identifying and predicting
abnormal situations in the subsystems of remote technical objects (spacecraft,
UAVs) using ensembles of artificial neural networks. The practical significance
lies in the fact that the use of the developed methods and algorithms for the
implementation of high-performance software and hardware systems will
significantly reduce the time spent on processing incoming telemetry data, and
especially on training classifiers of spacecraft states. An effective solution
can be the development of a neural network software system for identifying the
state of onboard objects and spacecraft subsystems based on modeling their
behavior and intelligent processing of telemetric data. |
Keywords: |
ANN, Telemetry, Multivariate Time Series |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
PREDICTION OF SURVIVAL RATE OF HEART FAILURE PATIENTS USING MACHINE LEARNING
TECHNIQUES |
Author: |
NARGIZA FOZILJONOVA, ITO WASITO |
Abstract: |
Heart Failure problem as part of Cardiovascular Disease (CVD) is one of the
leading causes of death taking about 17.5 million of people’s lives yearly that
is amounted about 32% of all deaths in the world. This study is to analyze the
leading factors to the heart failure patient problem. The main goal of the paper
is to determine the most appropriate machine learning technique for prediction
of the survival rate of heart failure of patients. The data in the experiment
was taken from a hospital in Pakistan from April to December of 2015. The
algorithms were chosen for prediction model are KNN, Random Forest and Decision
Tree. The results of the experiments show that Random Forest which produced ROC
value 0.956 that outperforms the other machine learning techniques. |
Keywords: |
Prediction Model, KNN, Decision Tree, Random Forest, Heart diseases. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
ENSEMBLE LEARNING FOR MINING EDUCATIONAL DATA |
Author: |
ASMAE BENTALEB, JAAFAR ABOUCHABAKA |
Abstract: |
Predicting students’ academic performance allows giving feedback that helps in
making the right decisions. Previous studies proposed using traditional
statistical methods; however, they are tedious and not practical especially with
the large volume of data. As for the solution, this article proposes a
classification model to classify students according to their performance. It
combines some of the well-known classification machine learning algorithms with
Xgboost. The combination is done thanks to the voting classifier. This model was
applied on two datasets and gave good results for the two: 85% and 92%. |
Keywords: |
Xgboost, Model,Voting Classifier,E-learning,Student Academic Performance,
Recommendation |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
IMPLEMENTATION MOBILE SMART FARMING MONITORING SYSTEM WITH LOW-COST PLATFORM
USING BLYNK |
Author: |
MOCHAMMAD HALDI WIDIANTO, BUNARDI SANJAYA, VANESSA AURELLIA, SOFIE ADIRA
CHRYSANTHIA |
Abstract: |
The need to carry out plant care and monitoring is especially in demand by all
circles in the household. Because some people reduce outside activities and do
all internal activities, new activities such as taking care of plants occur.
These activities are carried out by households and in buildings and workplaces.
In this study, Research was conducted on implementing Low-Cost IoT tools by
utilizing blynk to monitor them. Other Research was conducted specifically to
discuss simple IoT monitoring tools, but it is not uncommon to discuss the price
required to make these tools. This Research is needed because automation is
needed for various industries. It's just that not everyone has the luck in
providing money. Other needs, because lately many people are busy and need the
remote control. In this Research, the focus is on making IoT with low-cost
materials but still monitoring Blynk-based phones. The Research uses air,
humidity, ultrasonic (air content), and temperature sensors. Testing using a
BlackBox with test results ten times produces a water content of 20cm, soil
moisture 60%, humidity 80%, and an average temperature of 21 C. But the study
has a weakness in the number of sensors used and updating the database user
needs to be expanded and repaired again. It is hoped that further Research can
overcome this deficiency |
Keywords: |
Energy Harvesting, Smart GARNUS, IoT, Low-Cost |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
VIRTUAL COMMUNITY, CUSTOMER EXPERIENCE, AND BRAND AMBASSADOR: PURCHASING
DECISION ON YOUTUBE |
Author: |
LA MANI, NURUL SAVITRI GANISASMARA, ZULFIAH LARISU |
Abstract: |
This study aimed to examine the effect of virtual community, customer
experience, and brand ambassador on purchasing decisions for cosmetic products
on YouTube. This study employed quantitative method with the survey technique.
Data were collected using a questionnaire distributed to 400 respondents who are
followers of the beauty product X YouTube account. The respondents were
determined purposively. The data collected were analyzed using a multiple linear
regression test. The results indicated that the virtual community, customer
experience, and brand ambassador factors have a real, positive, and significant
effect on purchasing decisions for cosmetic X products on the YouTube platform.
These three variables may affect partially or simultaneously. Many factors
influence consumer decisions to buy a product. In purchasing cosmetic products,
virtual community factors, customer experience, and brand ambassadors have a
reasonably large contribution. Therefore, the public or cosmetic companies must
consider these variables to increase the number of buyers or customers. This
study only covered cosmetic products and identified three independent variables.
Further research should include more complex variables and various products. |
Keywords: |
Virtual Community, Customer Experience, Brand Ambassador, Purchasing Decision |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
MODELING TEXT GENERATION WITH CONTEXTUAL FEATURE REPRESENTATION AND
DIMENSIONALITREDUCTION USING DEEP TRANSFER LEARNING AND BI-LSTM |
Author: |
K YOGESWARA RAO, K SRINIVASA RAO |
Abstract: |
The text generation models encounter challenges in learning the high-dimensional
and abundance of data from the source domain, which leads to inaccurate text
generation. In addition, generating the text sequence with contextual knowledge
is challenging, even training the learning model with the domain knowledge.
Hence, it is essential to effectively extract the knowledge from the source
domain in the transfer learning model, which necessitates the contextual
embedding of the input sequence and dimensionality reduction. Thus, this work
develops the Deep Transfer Learning-based Text Generation (DTGEN) with the
Embedding from Language Model (ELMo), Variational AutoEncoder (VAE), and
Bidirectional-Long Short Term Memory (Bi-LSTM). The proposed DTGEN model focuses
on the low-dimensional text feature representation and the deep transfer
learning-based text generation. Initially, the proposed DTGEN approach
contextually models the input text sequence with the help of the ELMo and
generates the vectorized input data as the feature representation. Moreover, it
generates the low-dimensional feature vector for the embedding input-based
knowledge transfer by adopting the VAE model with the weighted regularization.
In subsequence, the DTGEN approach learns the relevant knowledge from the source
domain based on the contextual vector representation and analyzes the sequential
patterns of the text data in the target domain. Consequently, the proposed
approach predicts the terms based on the sequential relationships in the target
text and the knowledge extracted from the source text with the assistance of the
Bi-LSTM model. Thus, the experimental results demonstrate that the proposed
DTGEN approach yields 2.89% higher text generation accuracy than the existing
Deep Learning-based Next Word Prediction (DNWP) approach while testing on the
NewsRoom dataset. Furthermore, the DTGEN approach outperforms the LSTM-based
text generation by 10.11% higher accuracy for the samples in Cornell
Movie–dialog Corpus (CMC) dataset. |
Keywords: |
Text Generation, Deep Transfer Learning, Elmo, Context Vector, VAE,
Knowledge Transfer, And Bi-LSTM |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
ONTOLOGICAL APPROACH FOR OVERCOMING PESTICIDE PARADOX IN INTER-CLASS TESTING |
Author: |
SAYED ABDELGABER, RASHA MANSOUR MOHAMED, LAILA ABDEL HAMID, A.ABDO |
Abstract: |
Object-Oriented System Testing (OOST) focus on issues emerged with
Object-Oriented features e.g. encapsulation, polymorphism, inheritance and
dynamic binding. Different faults can detect during the interfacing between
classes: interface faults, conflicting functions, and missing functions. With
iterative nature of testing process, Traditional (automation) testing techniques
become less efficient in forecasting new defects resulting in pesticide paradox.
To overcome the limitations of traditional inter-class testing techniques,
automation testing techniques need to be powered by artificial intelligence for
bring dynamic testing techniques into testing process. This paper presents a new
dynamic approach to overcome the pesticide paradox in inter-class testing of
object-oriented applications that stores the knowledge into ontologies and
providing algorithms, which operate on the knowledge to regenerate testing steps
easily with required modification to uncover defects. Hence, ontologies can be
modified without changing the algorithms, and vice versa omitting using the same
test cases to overcome the pesticide paradox. The proposed approach generates an
executable test suite in five phases omitting using the same test cases to
overcome the pesticide paradox. To validate the proposed approach, a tool
entitled PSCCOTM (Polymorphism State Collaboration Class Ontology Test Model) is
developed and a case study is applied using PSCCOTM tool. The results show that,
test cases can be easily updated by uploading modified ontology file of a test
model into PSCCOTM tool. Also, the execution results show high percentage of
faults detection, however new cases studies need to be implemented to confirm
the attained results. |
Keywords: |
Object-Oriented System Testing, Pesticide Paradox, Inter-Class Testing,
Ontologies, Test Cases |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
A REVIEW OF THE PARTICLE SWARM CLUSTERING METHOD FOR INTRUSION DETECTION IN IOT |
Author: |
MOHAMED EL BEKRI, OUAFAA DIOURI, DALILA CHIADMI |
Abstract: |
Intrusion Detection Systems (IDS) are security components that could serve IoT
security. They do, however, face challenges in terms of autonomy, scalability,
and efficiency. The pressing question is how to make the IDS extract the correct
network’s behavior while being intelligent enough to detect new intrusions. It
is, therefore, essential to explore new possibilities that could lead to further
improvement in the efficiency of these systems. Introducing particle swarm
optimization in intrusion detection systems is a way to approach the problem
differently. In this paper, we explain the combination of two techniques,
machine learning, a field that provides robust methods for learning and
knowledge extraction, and particle systems that include collaborative heuristics
for search and detection. There is a shortage of researches which have addressed
the IoT intrusion detection problem based on this combination. We will try to
fill the gap and discuss the aspects to consider for implementing particle swarm
clustering method for intrusion detection in IoT. |
Keywords: |
Particle systems; IoT; Intrusion Detection; Machine learning; Clustering;
Particle Swarm Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
ANALYSIS AND RESEARCH OF TASKS FOR OPTIMIZING FLOWS IN MULTISERVICE NETWORKS
BASED ON THE PRINCIPLES OF A SYSTEMS APPROACH |
Author: |
SADIKOVA G., AMREEV M., MANANKOVA O.A, YAKUBOVA M.Z., YAKUBOV B.M. , MUKASHEVA
A.K. , SERIKOV T.G. |
Abstract: |
Multiservice networks support the rapid deployment of multiple applications on a
single technology based on the convergence of services. When designing such a
network, many complex tasks arise. When transmitting traffic in a multiservice
network, developers are facing with the problem of monitoring network
performance in terms of packet loss and delay. These options allow you to
specify the state of the network when a user is accessing multiple applications
with different needs. One of the most important problems of modern society is
the creation of a telecommunications environment that will provide highly
efficient access to distributed information resources. The paper proposes to
investigate the qualitative indicators of a multiservice network, which
characterize the most fully satisfying user requests, guided by a systematic
approach. In this problem, one of the central place is occupying by the
optimization of technical and economic options for building communication
networks. This is especially important when it is necessary to lay the
possibility of easy integration of the projected data transmission network into
the existing information structure. In this regard, the article discusses the
solution, based on the justification and the choice of the objective function
and the development of an algorithm for optimizing flows in a modern
multiservice network. The solution to the optimization problem of the
distribution of flows will allow rationally distributing the existing
(allocated) resources for the purpose of serving heterogeneous user flows in
such a way that the loss of user requests from imperfect network functioning
would be minimal. ICMP and 32-byte Ping are used as a real-time
reliability-monitoring tool between two systems in a multiservice network. Also
shows the use of the Packet Tracer environment for modeling the
hardware-software reliability of the multiservice backbone network. The studies
carried out make it possible to assess the state of equipment at the network
level when transmitting information in a multiservice network, guided by a
systematic approach. Therefore, these studies are of great importance and
further development. |
Keywords: |
Multiservice network, Flows, Optimization, Objective Function, Reliability,
Packet Tracer. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
INITIAL DESIGN AND EVALUATION OF WESIHAT 3.0 FOR OLDER ADULTS |
Author: |
NAZLENA MOHAMAD ALI, MOHAMAD HIDIR BIN MHD SALIM, DWI FIQRI QURNIAWAN, DIVYA
VANOH, SUZANA SHAHAR |
Abstract: |
User Experience (UX) is important in the interaction between humans and
computers. It includes user`s satisfaction of the use, efficiency, and
effectiveness. A good and acceptable design of an application is also important
especially for older adults with impairment. The pilot study was conducted to
evaluate the acceptance and usability of healthcare of designed mobile
application named WESIHAT 3.0 among older adults. We conducted a survey using
System Usability Scale (SUS) to obtain initial feedback on the developed
prototype before we further refined it. Ten older adults aged above 50 years of
age were recruited in this study. We aim to get an earlier insight of user
satisfaction and acceptance on the early design interfaces before further
improvement being made. The result from SUS score was 66.00 which indicated an
average acceptance level. Refinement and recommendations were listed for further
improvement. Participants agreed that the design is simple and easy to use, but
there are still some parts of interaction that are considered complicated for
them to use. The outcome of the study has potential to provide a technological
support to the older adults to get knowledge on healthy lifestyle. This
innovation was in line with the national policy on empowerment in technology
usage to improve quality of life of older adults. |
Keywords: |
Usability, Older Adults, Interface Design, System Usability Scale |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
SYSTEMATIC DESCRIPTION OF THE INTERNET OF THINGS: A BIBLIOMETRIC ANALYSIS |
Author: |
M. IZHAM JAYA, MOHD FAIZAL AB RAZAK, DANAKORN NINCAREAN EH PHON, SYIFAK IZHAR
HISHAM, AHMAD FIRDAUS |
Abstract: |
The explosive progress of the Internet of Things (IoT), such as smart watches,
medical implants, and smart refrigerators, has empowered researchers to view
these developments of science and technology from the research perspective. The
breakthrough of accelerated technologies has helped to reshape global research
patterns in IoT. Despite the many articles published in research, there is,
however, still a lack of bibliometric reports that demonstrate the comprehensive
research patterns of the IoT. This study seeks to assess the world’s research
activities on the IoT by observing the gaps through a thorough research pattern
of the IoT research practices. The analysis of more than 1000 articles that were
published between 2009 to 2019 in the ISI Web of Science (WoS) database was
performed through the bibliometric approach. The outcome showed the global
research pattern of the activities in the following forms: notable journals,
foremost articles, research areas, influential institutions, most prolific
countries, authors productivity, keywords and network collaborations. A closer
inspection of the bibliometric analysis also showed that a comprehensive
analysis is significant for measuring the degree of activity in research
patterns. |
Keywords: |
Bibliometric, Internet of Things, Security, Review, Web of Science |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
DEVELOPMENT OF DUAL-BAND ENCRYPTION FOR WLAN SECURITY |
Author: |
SAED THUNEIBAT |
Abstract: |
Nowadays there is a large amount of information that needs to be communicated
securely such as military and governmental issues over WLAN for example AD HOC
network. In this paper, we propose the dual-frequency band cryptography with
frequency hopping technique. By implementing the proposed method, we can create
a system that can be protected from harmful intentions. While numerous WLAN
security techniques have been presented in previous research, to our knowledge,
no similar simple and effective methodology for WLAN encryption has been
previously proposed. Our invention is the creation of a new methodology based on
the transmitting data and keys separately by dual-frequency band. Simulation
results validate the advantage of the proposed dual-band encryption for WLAN
security. |
Keywords: |
AES, Dual-Frequency Band, WLAN, Cryptography, Symmetric technique. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
ADAPTIVE WHALE OPTIMIZATION BASED SUPPORT VECTOR MACHINE FOR PREDICTION OF
AUTISM SPECTRUM DISORDER |
Author: |
S. MALATHI, Dr. D. KANNAN |
Abstract: |
Autism Spectrum Disorder (ASD) is a prominent form of neurological disorder that
impairs a person's ability to engage socially and interact effectively with
others. ASD is also characterised by a tendency toward repetitive and restricted
behaviours. The costs associated with autism can rise during the time it takes
to get a diagnosis and begin treatment, but many of these expenditures are
long-term and will remain with a person throughout their lives. Optimization and
machine learning methods have been used in many different industries and
professions in an effort to improve results.In this paper, an bioinspired
optimization-based classifier namely Adaptive Whale Optimization based Support
Vector Machine (AWO-SVM) is proposed for precisely detect ASD. AWO-SVM performs
classification after optimization phase gets complete. AWO-SVM involves three
different phases namely Exploitation Phase, Exploration Phase, and
Classification Phase. Each phase of AWO-SVM plays a major role to predict ASD
more accurately. The metrics "accuracy" and "F-Measure" are used to evaluate
AWO-SVM on three distinct ASD screening datasets. When AWO-SVM results are
compared to those of other classifiers, it is clear that AWO-SVM is superior in
terms of accuracy in predicting ASD. |
Keywords: |
Autism, ASD, Optimization, Classification, Whale, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
DETECTION OF OMICRON VIRUS BASED ON CONVOLUTIONAL NEURAL NETWORK |
Author: |
EMAN M. ALI, MAI A. ELNADY, ALIAA K. ABDELLA, RASHA A. ELSTOHY |
Abstract: |
COVID-19, an upper respiratory viral infection, is spreading too quickly and is
now found almost everywhere on the planet. A chest x-ray and RT-PCR are used to
confirm Covid-19. However, resource constraints in developing countries make
this difficult. This paper aims to monitor infection in Egyptian's lungs using
chest X-rays and convolutional neural networks in the early-stage detection. The
omicron chest X-ray dataset is gathered from public records along with hospital
and doctor arrangements that are approved by their patients to achieve our goal.
The classification mission's backbone is a classic neural network (CNN), which
benefited from its speed while deep networks are being trained and reduced the
impact of vanishing gradient problems. Images are resized and pre-processed to
improve sharpness and contrast before being used to validate the proposed
system. Meanwhile, by feeding images into a deep neural network, infectiousness
can be predicted. The deep learning measurement's receiver operating
characteristics (ROC) region under the curve is 0.9888, with 96.2 percent
sensitivity, 98 percent accuracy, and 100 percent precision, according to the
findings. It has been demonstrated that the proposed system can be easily
modified to increase efficiency by adding additional images (normal and
infected). As a quick alternative to the current PCR-based method, the proposed
system offers a significant advantage to all nations in terms of screening and
diagnosing OMICRON. |
Keywords: |
COVID-19, OMICRON, CNN, Dimension Reduction, Haar, Image Classification, X-RAY. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
THE IBU-HEBAT HOUSEWIVES COMMUNITY REALITY CONSTRUCTION ON INSTAGRAM |
Author: |
RIEZCA KARTIKA DARA APRILINA, Z. HIDAYAT, YEANY NURANY, ROBBY MARCELINUS NANI |
Abstract: |
The development of the internet gave rise to other social media that the
community likes. Instagram is one of the most common examples of social media.
Various communities use Instagram as a medium for sharing aspirations. This
article aims to discuss the involvement of housewives as a community in the
construction of social reality that can build interaction and communication in
capacity building from various aspects of social life. A qualitative approach
with the phenomenological method is carried out to determine the depth of
individual experience in the community. Interviews and observations were
conducted on 40 participants in several cities in Indonesia. The semi-structured
interview at the beginning of data collection aims to identify the dimensions of
the analysis including sharing experience and knowledge, cohesiveness on social
media, self-development, product consumption, and self-presentation. The results
showed that with the construction of housewives’ reality in the community, they
shared and interacted about knowledge and experience with each other to create
values of compassion in the community on the Ibu-hebat Instagram account. Each
of these things fosters the construction of the reality of housewives in shaping
themselves as parents in developing their social life. |
Keywords: |
Construction Of Reality, Indonesian Housewife, Instagram, Online Community,
Social Media |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
DEMOCRATIZATION OF INFORMATION TECHNOLOGY SERVICE FOR HIGHER EDUCATION
INSTITUTES |
Author: |
CHANITA SATTABURUTH, PRACHYANUN NILSOOK |
Abstract: |
In the digitalization era, the role of Information Technology Services (IT
Services) for Higher Education Institutes (HEIs) is driven by the demand for the
use of such data and access to information. Nowadays, information is diverse and
constantly transforming. An IT Service that meets the needs of academic users is
therefore important. In this research, different patterns of information
technology service are studied by synthesizing the democratization of
information technology and IT Services, and by analyzing the components of the
democratization of IT Services for HEIs according to international standards
such as ITIL, COBIT5, and ISO 20000. This is followed by an evaluation of the
democratization of IT Services for higher education institutes. The analysis of
the democratization of IT Service for HEIs, this research finding to consist of
eight components that develop the administration process. The optimum IT Service
provided for HEIs and organizations is supporting the policy and the
democratization of information technology also encourages academic management to
increase competitiveness in strategic areas to achieve the objectives of
institutes and organizations. It also develops the potential of academic
institutes so that they can become superior to competitors in the business
arena. |
Keywords: |
Democratization of Technology, Information Technology Service, Data Management,
Higher Education Institutes (HEIs), University |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
METHOD FOR DETERMINING EFFECTIVE TYPES OF NEURAL NETWORK MODELS FOR RECOGNITION
OF CYBER ATTACKS BASED ON PROCEDURAL RULES |
Author: |
I. BAPIYEV , A. KHAMZINA , A. KASSYMOVA , G. KHAZHGALIYEVA , V. RAMAZANOVA , Zh.
BAGISOV |
Abstract: |
The article touches upon the ways of developing neural network systems for
recognizing cyber attacks on network resources of information systems. It is
shown that a promising way of such development is the elaboration of rules for
determining the effective types of neural network models. The expediency of
determining effective types of neural network models based on the consistent
application of three rules is substantiated. The first rule allows you to
determine the set of valid models from the set of available types of neural
network models. The definition of admissibility is implemented on the basis of
comparing the minimum possible training time of the type of neural network model
with the maximum admissible training time. The second and third rules, formed on
the basis of a multi-criteria approach, allow us to select many effective types
of neural network models from the set of valid ones, and then determine the most
effective type of them. |
Keywords: |
Neural Network Models, Cyber Attacks, Network Resources, Procedural Rules |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
REAL TIME ORDERED-UNORDERED SESSION KEY DISTRIBUTION SCHEME FOR IMPROVED DLP AND
IRM IN CLOUD ENVIRONMENT |
Author: |
PAVITHRA P, HARIHARAN B, WILFRED BLESSING N.R |
Abstract: |
The problem of Data Loss Prevention (DLP) and Information Right Management (IRM)
has been well analyzed towards security development in cloud. The walls of cloud
security enforcement hide the user’s personal data from the service provider
which challenges them in maintaining data secrecy as well as data leak.Such
loosely coupled nature allows the cloud users in generating different threats
against various Quality of Service parameters. Towards DLP and IRM, different
approaches are furnished in literature but suffer in achieving expected QoS
values. does not know much about There exist numerous techniques to handle the
security problem, but suffer to achieve To handle this issue, an efficient real
time Ordered-Unordered Session Key Distribution Scheme (ROUSKDS) is presented in
this article. The article is focused on using different secret keys in various
sessions to restrict malformed access as well as restricting information
leakage. In the focus to improve the performance of data loss prevention and
information right management, the proposed model generates keys for various
services for the session according to the result of Ordered-Unordered Shuffling
(OUS) scheme. The method maintains number of keys for various services and
shuffle the session keys either in a ordered way or unordered way. Similarly,
the model uses Dual Mode Information Right Management (DMIRM) to restrict the
user from malicious access. The method measure the trust of user at key level
trust and access level trust values. Based on these values, the method restricts
the malformed access to improve the performance of IRM.By maintaining various
secret keys towards different services in various time stamp, both IRM and DLP
process can be enhanced. The proposed method improves the performance of DLP and
IRM which in turn improves the performance of cloud. |
Keywords: |
Cloud Security, DLP, IRM, OUS, DMIRM, Access Restriction, Trust Measure. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
THE SYSTEM OF FINDING PEOPLE IN AN EMERGENCY SITUATION |
Author: |
ARDAK AKHMETOVA, ASSEM SHAYAKHMETOVA, ALIBI KHABDUALI, MARAT SHURENOV, ANAR
SULTANGAZIYEVA |
Abstract: |
Nowadays the issue of maximum survival of people in a fire and their immediate
evacuation is still under consideration. In this regard, many different methods
are offered from all over the world — intelligent devices and intelligent
wireless systems. We have considered this issue in detail. The main goal is
using time efficiently, inform people regularly and take them out, reduce human
casualties. The article also describes the concept of an emergency and its
causes. The article discusses in detail modern methods of detecting people and
navigation in case of fire, and also clearly describes using of wireless
equipment and intelligent algorithms. It also shows the system architecture,
goals, tasks and solutions. Examples are given of why this research is important
and useful for people. The article provides information about using sensors.
There are tables of their usage, interconnection, wireless communication with
the central server. As a result, a system was created that works on the basis of
electronic signs indicating the direction to a safe place in case of an
emergency. It receive the signal from the central server. |
Keywords: |
Sensor, Algorithm, System, Wireless Sensor, Microcontroller |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
MEASUREMENT SOLUTIONS IN THE ENTERPRISE ARCHITECTURE LITERATURE: A METROLOGY
EVALUATION |
Author: |
AMMAR ABDALLAH, ALAIN ABRAN, MÓNICA VILLAVICENCIO |
Abstract: |
The literature on enterprise architecture (EA) proposes several measurement
solutions to demonstrate the benefits expected by aligning IT initiatives with
business objectives. This study presents the first evaluation of these EA
measurement solutions by applying a metrology-coverage evaluation method based
on evaluation theory, metrology guidelines, and best practices from the software
measurement literature. This evaluation method was applied to four EA entities
(EA architecture, project, program, and framework) and identified strengths and
weaknesses in the theoretical and empirical designs of the proposed EA
measurement solutions. This research will assist EA practitioners in
understanding the limitations of the measurement solutions proposed and select
those with stronger designs. EA researchers can also leverage these evaluation
results to improve the current designs of the EA measurement solutions and
propose new ones with a stronger metrology foundation. |
Keywords: |
Enterprise Architecture (EA), Software Engineering Measurement, Metrology,
Metrics. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
IMPROVED PERFORMANCE OF CLOUD ENERGY USING CONTAINERIZATION WITH MULTIPLE
MANAGERS AND CONSENSUS ALGORITHM |
Author: |
MS. VASANTHA KUMARI N, DR. SHANMUGARATINAM |
Abstract: |
One of the favored topics in data centers and web application developers today
is Containerization. Within the path of reducing the energy in cloud data
centers virtualization is one among the important solution for minimization of
energy in cloud. In recent trends of software data centers, Docker container is
hottest tool used for Virtualization. In this paper, main concern is to
construct the cluster node and schedule for docker containers. With the adverse
use of containers by IT administrators and developers, cluster nodes are often
established as one virtual machine. Docker is an open source engine which was
introduced by Docker Inc. in 2013 under apache 2.0 license. The most objective
of the Docker is to make an environment where programmers develop the code
efficiently. A recent trend in docker technology with the introduction of tool
called Swarm which extends its feature to numerous swarms in multiple clouds.
Swarms of Docker containers with multiple managers help guarantee high service
availability and improve election time during execution using Consensus
Algorithm. Swarm with multiple managers, performance is improved with the
algorithm. When there are increased numbers of managers any failures of the node
are often recovered without downtime. This paper also explains about model of
constructing a virtual system on multiple clouds in distributed systems. It also
discusses about novel methodology for traditional virtualization. |
Keywords: |
Docker, Swarm, Cloud, Container, Virtual Machine |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
AUTOMATED SATELLITE AND UAV IMAGE PROCESSING SYSTEM FOR EMERGENCY DETECTION IN
KAZAKHSTAN |
Author: |
OLGA SHVETS, DANIYAR KALIEV, GYÖRGY GYÖRÖK |
Abstract: |
The investigation is aimed at supporting decision-making in emergency situations
using modern information technologies on the example of the Republic of
Kazakhstan. The object of the study is a series of satellite or UAV images
prepared for analysis. The subject of the study is the identification of
emergency situations using an image from satellite or UAV. The purpose of the
work is to develop algorithms for processing images obtained as a result of
images from a satellite or UAV, providing a solution to the problems of
"machine" vision to detect emergency situations. The following tasks had been
solved to achieve this goal: researched image recognition technologies for
identifying emergency situations; methods and models for detecting an object by
external signs are selected; algorithms for preprocessing images have been
developed; a software package for image recognition was created to detect
emergency situations using the C# programming environment. Research methods are
based on the principles of automation and control, system analysis methodology,
theory of mathematical modeling, digital image processing, pattern recognition,
discrete transformations, modeling using specialized data and image processing
packages. A promising direction in solving the research problem for identifying
emergencies using satellite or UAV images is the development of a "machine
vision" system, the final "product" of which is not the image itself, but the
parameters of the controlled process. Thus, for any particular case, it is
possible to create a "machine" vision system that far exceeds the capabilities
of the human eye, and sometimes even the human as an image analyzer. The
creation of a software and hardware complex for processing images from a
satellite or a UAV makes it possible to solve the problem of identifying
emergencies in vast areas in a relatively short period of time, which can ensure
a quick response of the relevant services. |
Keywords: |
Image Processing, Automation, Ecological Monitoring, Emergency Situation,
Fuzzy Logic |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
ASSESSING AND REVIEWING OF CYBER-SECURITY THREATS, ATTACKS, MITIGATION
TECHNIQUES IN IOT ENVIRONMENT |
Author: |
AZZAM M. ALBALAWI, MOHAMMED AMIN ALMAIAH |
Abstract: |
Despite Internet of Things (IoT) technology has a great potential to connect
devices and sensors through communication media, such as Wi-Fi, to the internet
and customized applications. However, it is vulnerable to cyber security
attacks. Thus, integrating IoT technology requires attention to the increased
cybersecurity threats. Based on above, this study has several objectives: (1) to
review the common types of cybersecurity threats and attacks on IoT and (2) to
review the suitable mitigation techniques for IOT threats and attacks. A
systematic review has been conducted on 35 recent paper which have published in
top ranking journal like IEEE, Elsevier and Springer. Based on our findings,
which indicates that Jamming attack is the most common threats on the perception
layer or sensors layer, and DoS/DDoS attacks are the most common method at the
Network and Application layer. In addition, the results indicate that the most
suitable mitigation technique for addressing the IOT attacks is the
authentication technique. In addition, some of studies have been employed the AI
methods to reduce IoT threats to reduce risks that cannot be addressed with
traditional mitigation techniques. Finally, few of IOT studies used the
blockchain technology for mitigating the cybersecurity threats and attacks in
IOT environment. |
Keywords: |
Internet of things(IoT), Cybersecurity, Threats, Attacks, Mitigation Techniques,
Countermeasures |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
AN ENHANCED MUDI-STREAM ALGORITHM FOR CLUSTERING DATA STREAM |
Author: |
MAYAS ALJIBAWI, MOHD ZAKREE AHMAD NAZRI, NOR SAMSIAH SANI |
Abstract: |
Streaming data applications are common due to the advancement of technology to
continuously capture or produce data, such as sensors for temperature, humidity
and precipitation observations, social media or chatbots. These data
applications receiving massive data in real-time requires an efficient algorithm
and sufficient memory for analytics. Internet-of-Things (IoT) technologies
embedded in a system requires a robust algorithm for clustering the streaming
data to support decision making by analysing the historical sensor payloads. The
MuDi-Stream algorithm, a density-based method, has emerged as one of the
important methods for clustering data streams. The main issue with MuDi-Stream
is the number of empty grids increased with the dimensional number or the
increase of the streaming speed, making it less efficient when handling
high-dimensional data. Furthermore, each point that came to a grid in the online
phase will be saved, and with time, these points will consume larger memory
space. To overcome these issues, we proposed an enhanced version of MuDi-Stream,
coded as eMuDiS. Several benchmark datasets have been used in this study, and
the performance of eMuDiS is compared to the state-of-the-art methods, including
MuDi-Stream. The experimental results show that the proposed eMuDiS has better
memory allocation performance than the MuDi-Stream. |
Keywords: |
Clustering, Data Stream, Multi-Dimensional, Density Grid, Stream Speed. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
NOVEL TECHNIQUES FOR COMPONENTS CLASSIFICATION AND ADAPTATION |
Author: |
Dr.SAMPATH KORRA, Dr.V.BIKSHAM |
Abstract: |
More than thirty years have passed since the software introduced the idea of
reuse. There are many successful cases that have been reported, but people
believe that the programs are still in the re-development phase and are not
reaching its full potential. The software requires us to anticipate the future
needs of software systems so that new units can be built, some functions,
features are fragmented and reused easily by the engineers. These tools are
designed to achieve this aspect of software reuse through component adaptation
and enhance existing applications. Use software information to reuse a large
number of platforms and tools in the presence. This work does not think of the
classification based on the naming services and components, but this work tries
to use the most relevant features of components such as software developers and
it explains the functional requirements to make a definite decision. In the way,
the proposed algorithm is very generic and widely available to all technologies.
It is only for a short period of time for the selection of software components
and all types of services. |
Keywords: |
software reuse, architecture, domain engineering, indicators, components. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
THE ROLE OF TRUST AND SATISFACTION AS MEDIATORS ON USERS’ CONTINUOUS INTENTION
TO USE MOBILE PAYMENTS: EMPIRICAL STUDY |
Author: |
RADWAN AL-DWAIRI , OMAR AL-ALI |
Abstract: |
During the period of Corona pandemic, many customers faced some difficulties due
to the repeated closures of banks and government institutions, which
necessitated them to search for other alternatives like mobile payments to pay
their due bills. Consequently, more research is needed to study what factors are
important to continue using of such technology. In response, this study used a
sample of 880 respondents, then proposed a theoretical model and tested it
empirically. Results highlighted the role of trust and satisfaction as mediators
which significantly impacted users’ continuous intention to use mobile payments
technology. |
Keywords: |
Continuous Intention, Mobile Payment, Exception Confirmation Theory, Technology
Acceptance Model, Satisfaction, Trust, Confirmation. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
FUZZY LINEAR PROGRAMMING PROBLEM IN WHICH FUZZY NUMBERS ARE TRIANGULAR SOLVED BY
FOURIER MOTZKIN ELIMINATION METHOD |
Author: |
C. KAVITHA, K. BHUVANESWARI, S. MAHESWARI, R. PARAMESWARI, PRIYA SHIRLEY MULLER |
Abstract: |
The goal of this research is to investigate a method for solving a fuzzy linear
problem using triangular fuzzy numbers. The Fuzzy Fourier-Motzkin elimination
technique for triangular fuzzy number is proposed in this research work to
address the fuzzy linear programming problem, which is based on the concept of
bounds. If the objective function is non-linear and the constraints are all
linear, this approach can be used to solve the problem. The approach solves
systems of inequalities to find the best solution for the fuzzy linear
programming problem using triangular fuzzy numbers. In comparison to the
standard simplex method, the suggested methodology is more computationally
efficient and easier to grasp. The approach is explored in depth and shown using
a numerical illustration. The development of numerical techniques is prompted by
the decomposition of a fuzzy based linear system into its equivalent crisp
linear form, which can then be solved using Fourier-Motzkin methods is useful.
The consistency of the fuzzy linear system using the given approach is checked.
The approaches are novel and it is applied in a variety of scientific fields
where ambiguity occurs. |
Keywords: |
Fuzzy Linear Programming Problem, Fourier Motzkin Elimination Method,
Triangular Fuzzy Number, Linear Inequalities, Optimal Solution. |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
DESIGNING A NEW BUSINESS MODEL FOR MOBILE GAMES AND E-BOOK CONTENT PROVIDER |
Author: |
THEDA WIDJAYA, VIANY UTAMY TJHIN |
Abstract: |
Content providers (CP) are one of the businesses that face many problems in
Indonesia, there are many frauds such as credit theft to many users, but on the
other hand content providers have a subscription business model which is one of
the most growing and very promising businesses in the future. All over the
world, especially subscription services have dominated the entertainment world,
especially the world of mobile games, but Indonesia as a developing country and
has a very fast growth in the game industry has not become a major player in
this industry. This article will design a new business model for CP companies in
Indonesia using the Business Model Canvas (BMC). Therefore, in this paper, we
will design a new business model for content provider companies in Indonesia
that sell mobile games, change the subscription-based business model using a BMC
to describe the business feasibility of content providers, and increase consumer
confidence in CP's business. The results of this paper are expected to be a
guideline and reference for use by all content provider businesses in Indonesia. |
Keywords: |
Content Provider, Business Model Canvas, Subscription Business, Mobile Games,
Business Model |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
MODEL-BASED RESILIENCE PATTERN ANALYSIS FOR FAULT TOLERANCE IN REACTIVE
MICROSERVICE |
Author: |
MUHAMMAD MIRAJ , AHMAD NURUL FAJAR |
Abstract: |
In designing the application, it must be robust, meaning that the application
design must be able to cope in the event of a failure. The failure here is more
of a failure in communication between microservices. Overcoming communication
failures between microservices is one of the most difficult problems to solve,
especially in distributed systems. In this study, we use a resistance pattern
consisting of a circuit breaker, bulkhead pattern, timeout pattern, and retry
pattern to test which resistance pattern has a better response time and
throughput when there is a failure to communicate between microservices and it
can be concluded that the circuit breaker and the timeout pattern has better
response time and throughput compared to other resilience patterns. |
Keywords: |
Microservices, Resilience Pattern, Reactive, Fault Tolerance, Architecture
TradeOff Analysis Method |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
ARE HEALTH APPLICATIONS USEFUL FOR SOCIETY TO EXERCISE? |
Author: |
NUR CAHYADI PERDANA, AHMAD NURUL FAJAR |
Abstract: |
In the current era of globalization, the health industry is one of the
industries that has made information technology the main facilitator of its
business activities. One company, PT. XYZ is also developing a health
application, based on the results of interviews with managers from PT. XYZ, two
main problems regarding this Health application were obtained, namely data
synchronization which takes a long time and the application is difficult to
detect trackers. Even though as many as 57% of users in Indonesia utilize health
applications, or about 95 million Indonesians are Health application users,
based on the number of Health application users at PT.XYZ, only 0.1% of the
number of Health application users in Indonesia. this is the background of PT.
XYZ's health application research to evaluate whether the Health application in
providing services has been able to influence the user's health and also whether
the Health application can be said to be a useful system by using the success
model reference from DeLone & McLean and the Unified model. Theory of Acceptance
and Usage of Technology (UTAUT). After analyzing, the results obtained from this
study are that 3 hypotheses do not have a significant effect and the hypotheses
that do not have this influence are system quality on use, system quality on
user satisfaction, and effort expectancy on user satisfaction. |
Keywords: |
Helath Application, DeLone & McLean, Unified Theory of Acceptance and Usage of
Technology (UTAUT), Mobile Application |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
A NEW MATHEMATIC MODEL FOR HUMANITARIAN PHARMACEUTICAL SUPPLY CHAIN TO REDUCE
OBSOLESENCE COST |
Author: |
MOHAMED LAHJOUJI, AZIZ AIT BASSOU, JAMILA EL ALAMI, MUSTAPHA HLYAL, OMAR
LAHJOUJI |
Abstract: |
The unused drugs in Humanitarian supply chain (HSC) can lead to significant
financial losses and environmental damages. It can also be the target of
criminal organization for counterfeiting activities. This research aims to
investigate a new model that’s gives more responsibility to pharmaceutical
companies to keep control on excess medications at recipient countries. It
consists of motivating the humanitarian logistic provider to facilitate leftover
returns. We have explored the game theory through studying the mathematical
models of “non-cooperative” and “cooperative” decision-makers. A novel
composition of “incentive/bonus allocation” and “Tax/penalties sharing
agreement” is introduced to reach the expected level of synergy. The numerical
analysis shows that using the “cooperative” model can enhance the whole HSC
revenues, maintain sustainability commitment, and better serve vulnerable
patients. |
Keywords: |
Humanitarian Supply Chain, Reverse Logistic (RL), Cooperative Decision-Making,
Pharma Expired Drugs, Global Health Institution |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
IOT WEIGHT DATA DENOISE BASED ON EXPONENTIAL MOVING AVERAGE AND OUTLIERS |
Author: |
HARRY SURYA, ABBA SUGANDA GIRSANG |
Abstract: |
The emergence of Internet of Things (IoT) has delivered a new perspective about
how technology can accomplish human needs, IoT primarily used to deliver rapid
stream of data from sensors to variety options of storage system and used it to
accomplish objective of the development. As a result of that, IoT may occurs an
unavoidable challenges of data noise. In this paper we will present our result
of data noise removal approach based on data stream of IoT scale machine that we
built. Outliers and window functions will be used to pre-processing the raw data
of IoT, by applying this approach, we aim to deliver a better data in the
pre-processing phase as an effort to eradicate the data noise problem in IoT
sensors. IoT device that we built was using NodeMCU microcontroller, HX711
amplifier and 200 kg loadcell. We also comparing Exponential Moving Average
(EMA) to other Window Function to deliver an insight for reader of EMA
performance across other window function. |
Keywords: |
Data Noise, IoT, Outliers, Window Function, Exponential Moving Average |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
EVALUATION IMPLEMENTATION OF UI / UX IN MONITORING & CONTROLLING STUDY
IMPROVEMENT WITH USER-CENTERED DESIGN METHOD |
Author: |
NATASHA JOESPHINE, RICKY MARTIN, YOGA, TANTY OKTAVIA4, DAVID SUNDARAM |
Abstract: |
Implementing UI/UX Adjustments to Control & Monitor What Users of All Ages Can
Understand is much easier as it takes a lot of deliberation. So organizations
need to know whether the UI/UX applied can understand all users' ages. Users
aged 40 and over are struggling with the current UI/UX appearance. Therefore,
this study aims to fight for UI/UX adjustments for Controlling & Monitoring that
are reachable and understandable by users of all ages. The evaluation will begin
by conducting data collection using the Behavioral – Qualitative, Questionnaire
and Interview methods. After all the data has been collected, a UI/UX analysis
will be made, focusing on the approach through a discussion process with users
or the User-Centered Design method. Data was collected using questionnaires and
interviews, then analyzed with the help of Heuristic Evaluation. To get the
results achieved, a comparison will be made between the design before
implementation. So that users can find out which factors make a design that is
suitable for users of all ages. After which factors in creating a suitable
design for all ages, and organization will make recommendations to improve the
design. Based on the research results, it can be concluded that Overall, Parents
need a Monitoring & Controlling Learning Progress Application with a simple and
easy to understand UI/UX Design for Monitoring & Controlling their child's
Learning Progress; Usability factor is not significantly influenced by external
factors Learnability, Memorability, and Satisfaction. This is because these
factors do not affect parents' views about the UI / UX of the application, but
the parents see from the functions or features provided by the application
itself. In addition, other external factors have a significant effect on
Usability, namely Efficiency and Error, meaning that the efficiency and errors
that occur in the application can affect parents in using the Monitoring &
Controlling Learning Progress application; Overall, Parents are more concerned
with scheduling features/child activities for Monitoring & Controlling Learning
Progress Applications with UI / UX Design. |
Keywords: |
UI/UX, User, User-Centered Design, Heuristic Evaluation, Implementation,
Adjustment, Evaluation, Controlling, Monitoring |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
Title: |
BIG DATA ANALYTICS ADOPTION AT HIGHER EDUCATION INSTITUTIONS IN IRAQ |
Author: |
MOHAMMED GHAZI NAJI, NUR FAZIDAH ELIAS, MENG CHUN LAM, GHASSAN A. O.
ABUSAMHADANA, NOR AZLAN AHMAD |
Abstract: |
As data drives the digital evolution, the role of big data becomes increasingly
essential. Big data is making its presence known in almost every industry and
has the potential to transform the business world and society on a large scale.
Given that the higher education institutions in Iraq are still in the early
stages of using big data, studying factors affecting big data analytics (BDA)
adoption in Iraq is critical and timely. Grounded in the
Technology-Organization-Environment (TOE) framework, an integrative model was
developed to study factors affecting the adoption of BDA. The Technological
Context was measured by the relative advantage, compatibility, complexity, and
data and information quality factors. The Organizational Context was measured by
the top management support, the intensity of organizational learning, and
organizational readiness. Lastly, the Environmental Context was measured by the
security/privacy regulatory and institutional policy and regulatory factors. The
proposed model was tested using a survey with data collected from 352 lecturers
from three Iraqi universities. Results indicated that the three elements,
Technology-Organization-Environment, significantly influence the intention to
adopt BDA. The R2 of 0.514 was reported in the analysis. This study gives a new
look into the factors that influence BDA adoption, giving insight into promoting
and inhibiting BDA adoption that can benefit higher education institutions. This
study’s findings would help both the ministry and higher education institutions
in Iraq to plan and implement high-impact strategies from the Technological,
Organizational, and Environmental Context to increase participation and use of
BDA in the future. |
Keywords: |
Adoption, Big Data Analytics, Critical Success Factors, Higher Education
Institution, TOE Framework |
Source: |
Journal of Theoretical and Applied Information Technology
15th May 2022 -- Vol. 100. No. 09 -- 2022 |
Full
Text |
|
|
|