|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2014 | Vol. 70 No.2 |
Title: |
AN EFFECTIVE TECHNIQUE FOR BRAIN TUMOUR SEGMENTATION AND DETECTION USING
CUCKOO-BASED NEURO-FUZZY CLASSIFIER |
Author: |
RAMESH BABU VALLABHANENI , V. RAJESH |
Abstract: |
In this paper, we have proposed a robust technique to detect and classify the
tumour part from medical brain images. In recent times, a number of image
segmentation and detections techniques have been proposed in the literature.
But, the detection of brain tumour through the help of classification technique
has received significant interest among the research community. By considering
the above issue, here, we combine three different techniques such as, cuckoo
search, neural network and fuzzy classifier to detect the tumour part
effectively. Our proposed approach consists of four phases, such as,
pre-processing, region segmentation, feature extraction and classification. In
the pre-processing phase, the anisotropic filter is used for reducing the noise
and in the segmentation process; K-means clustering technique is applied. For
the feature extraction, the parameters such as contrast, energy and gain are
extracted. In classification, a modified technique called Cuckoo-Neuro Fuzzy (CNF)
algorithm is developed and applied to detection of tumour region. In the
modified algorithm, cuckoo search algorithm is employed for training the neural
network and the fuzzy rules are generated according to the weights of the
training sets. Then, classification is done based on the fuzzy rules generated.
Experimental results shows that the proposed technique achieved the accuracy of
79.49% but existing technique achieved only 76.92%. |
Keywords: |
CNF, Contrast, Energy, Entropy, K-Means, Anisotropic Filter, Sensitivity,
Specificity, Accuracy |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
A REVIEW OF ANT COLONY OPTIMIZATION ROUTING PROTOCOLS FOR WIRELESS MULTIMEDIA
SENSOR NETWORK |
Author: |
MOHAMMED ABAZEED, NORSHIELA FAISAL, ADEL ALI, SULEIMAN ZUBAIR |
Abstract: |
Multimedia applications have become an essential part of our daily lives, and
their use is flourishing day by day. The area of wireless sensor network is not
an exception where the multimedia sensors are attracting the attention of the
researchers increasingly, and has shifted the focus from traditional scalar
sensors to sensors equipped with multimedia devices. The multimedia sensors have
the ability to capture video, image, audio as well as scalar sensor data and
deliver the multimedia content through sensors network. Due to the resource
constraints nature of WSN introducing multimedia will add more challenges, so
the protocols designed for multimedia wireless sensor network should be aware of
the resource constraints nature of WSN and multimedia transmission requirement.
Ant colony optimization is a swarm intelligent algorithm that proved the
efficiency to solve many complex optimization problems. Recently many routing
protocols proposed based on ant colony optimization for WMSN to take advantages
of ACO algorithm. In this paper we outline design challenges and requirements
for designing routing protocols for WMSN, and then we review ACO routing
protocols proposed for WMSN and discuss their feature and limitations. After
that we will present a general comparison between them. |
Keywords: |
Ant Colony Optimization (ACO), Wireless Multimedia Sensor Network (WMSN),
Resource Constraints, Routing Protocols, Quality of Services(QoS). |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
ADAPTIVE BACKSTEPPING SLIDING MODE CONTROL OF SPACECRAFT ATTITUDE TRACKING |
Author: |
CHUTIPHON PUKDEBOON |
Abstract: |
This paper investigates the attitude tracking problem for rigid spacecraft. An
adaptive backstepping sliding mode control law is proposed to solve this problem
in the presence of inertia uncertainties and external disturbances. The control
scheme is developed by combining sliding mode control with adaptive backstepping
technique to achieve fast and accurate tracking responses. The proposed control
law provides complete compensation of uncertainty and disturbances. Although it
assumes that the uncertainty and disturbances are bounded, this control law does
not require information about the bounds on the uncertainties and disturbances.
The asymptotic convergence of attitude tracking is ensured by Lyapunov approach.
Numerical simulations on attitude tracking control of spacecraft are provided to
demonstrate the performance of the proposed controller. |
Keywords: |
Attitude Tracking Control, Sliding Mode Control, Backstepping Design, Adaptive
Control |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
CBIR BASED ON SINGULAR VALUE DECOMPOSITION FOR NON-OVERLAPPING BLOCKS |
Author: |
A.RAHMAN M.ALAMIN , SITI MARIYAM SHAMSUDDIN |
Abstract: |
Image retrieval techniques are useful in many image processing applications.
Conventionally, the content based image retrieval systems work with whole images
and searching is based on comparison of the query and database images. The
retrieval of the images is commonly based on the color, shape, texture and
others. However, the color only or texture only or shape only cannot enough to
discriminate the image. Therefore, in this paper, we present a proposed scheme
based on the color and texture information using the Singular Value
Decomposition feature to achieve better results. The proposed scheme consists
the process of converting an image to HSV color space and each color plane is
partitioned into 4, 16, 64 non-overlapping blocks. Later, a one to one matching
procedure is implemented to compare the query and target images by using the
Euclidean distance for retrieving the similar images. Experimental results
demonstrate that the proposed method has higher retrieval precision than other
conventional methods color moments, Dominant color, Dominant color and GLCM
texture methods. Also shows that SVD features represent the color and texture
features of the image. |
Keywords: |
Singular Value Decomposition (SVD), Content Based Image Retrieval (CBIR),Non-Overlapping
Blocks,Rank Matrix Approximation,HSV Color Space |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN AND DEVELOPMENT OF ZIGBEE BASED WIRELESS REMOTE CONTROLLING AND DATA
ACQUISITION DEVICE THROUGH INTERNET |
Author: |
ABDUL SAMAD BIN SHIBGHATULLAH , SAKHR M. SULTAN1, HADEUR R.ABUDULSHEED , SUZI
IRYANTI FADILAH , MOHD HELMY ABD WAHAB |
Abstract: |
IrDa and Bluetooth have been used widely in many wireless monitoring and
controlling devices. Although, these devices have been replaced the traditional
wired systems and contribute in solving the high cost of such systems, there are
drawbacks been emerged. The major disadvantages are the range limitation of
Bluetooth module and the line of sight problem of IrDa device. A ZigBee is low
cost and low power consumption wireless technology. It has a higher connectivity
range than Bluetooth and doesn’t have line of sight problem. In this paper, an
application model using ZigBee wireless remote controlling and data acquisition
device as well as the use of internet connection to enable the device to be used
worldwide is presented. Such system has several benefits such as portable, long
wireless range, low power consumption, low cost and can be used worldwide using
internet. The test results show its potential to be implemented in small offices
and smart homes. |
Keywords: |
Internet, Remote Controlling And Monitoring, Zigbee, Wireless. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
ROTOR POSITION OF SWITCHED RELUCTANCE MOTOR USING SENSORLESS METHOD |
Author: |
RAMESH PALAKEERTHI, Dr. P. SUBBAIAH |
Abstract: |
Switched reluctance motor (SRM) is an energy converter that converts an
electrical energy to mechanical energy in motoring operation and vice-versa in
generating operation. When the rotor is out of alignment, the inductance is very
low and the current also increase rapidly. The rotor is aligned with the stator
then the inductance become very large. In the simulation results, how the rotor
minimizes the reluctance position during excitation in a magnetic circuit is
presented in this work. |
Keywords: |
Switched Reluctance Motor (SRM), Rotor Position, Sensorless Method, Flux
linkage. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN ALGORITHM TO CONSTRAINTS BASED MULTI-DIMENSIONAL DATA CLUSTERING AIDED WITH
ASSOCIATIVE CLUSTERING |
Author: |
B.KRANTHI KIRAN, Dr. A VINAYA BABU |
Abstract: |
To address the clustering problem related to multi-dimensional data clustering,
a number of techniques have been implemented. A constraint based
multi-dimensional data-clustering algorithm is proposed in this paper which
helped with associative clustering can find out the number of clusters optimally
present in a multi-dimensional data set. Now, by bays factor computation process
associative constraint based clustering process is executed. Moreover, genetic
algorithm is applied to optimization process to discover the optimal cluster
results. The constraints based proposed algorithm assists in recognizing the
right data to be clustered and the knowledge considering the data regarded as a
constraint which enhances the precision of clustering. The data constraints
furthermore assist in indicating the data related to the clustering task. The
result of the proposed optimal associative clustering algorithm is compared with
an existing algorithm on two multi dimensional datasets. Experimental result
demonstrates that the proposed method is able to achieve a better clustering
solution when compared with one existing algorithm. |
Keywords: |
Associative Clustering, Genetic Algorithm, Multi-dimensional Data, Bays Factor,
Contingency Table |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
THREE LAYERS APPROACH FOR NETWORK SCANNING DETECTION |
Author: |
OMAR E. ELEJLA, AMAN B. JANTAN, ABDULGHANI ALI AHMED |
Abstract: |
Computer networks became one of the most important dimensions in any
organization. This importance is due to the connectivity benefits that can be
given by networks, such as computing power, data sharing and enhanced
performance. However using networks comes with a cost, there are some threats
and issues that need to be addressed, such as providing sufficient level of
security. One of the most challenging issues in network security is network
scanning. Network scanning is considered to be the initial step in any attacking
process. Therefore, detecting networks scanning helps to protect networks
resources, services, and data before the real attack happens. This paper
proposes an approach that consists of three layers to detect Sequential and
Random network scanning for both TCP and UDP protocols. The proposed Three
Layers Approach aims to increase network scanning detection accuracy. The Three
Layers Approach defines some packets to be used as signs of network scanning
existence. Before applying the approach in a network, there is a Thresholds
Generation Stage to that aims to determine descriptive set of thresholds. After
that, the first layer of the approach aggregates sign packets in separated
tables. Then the second layer of the approach analyzes these tables in new
tables by counting packets generated by each IP. Finally, the last layer makes a
decision of whether or not a network is being scanned. |
Keywords: |
Network Security, Network Scans, Scan Detection, TCP, UDP. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
A STUDY ON ARTIFICIAL INTELLIGENCE FORECASTING OF RESORT DEMAND |
Author: |
HAN-CHEN HUANG |
Abstract: |
In recent years, the number of foreign visitors to Taiwan continued to increase,
and people paid greater attention to quality of life, thus, the domestic tourism
industry has become increasingly active. Resorts are very popular and are the
hot mainstream commodity of the leisure and tourism industry. However, leisure
and tourism are not livelihood necessities, and consumer demand is subject to
many other factors. The resort industry must be able to master the demand volume
in order to achieve advance planning of resource management and allocation,
human use, financial management, marketing management, etc. Therefore, this
study applies artificial intelligence technology to establish the resort demand
forecasting model. The empirical results show that forecasting model Mean
Absolute Relative Error (MARE) is 0.1232, and correlation coefficient is 0.9408,
indicating that the model has a good forecasting ability and can be used as a
reference for the resort industry and related industries in Taiwan. |
Keywords: |
Resort, Demand, Forecasting |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPACT OF SOFTWARE RISK MANAGEMENT ON ANALYSIS MODELING IN LIFE CYCLE OF WEB
APPLICATION DEVELOPMENT |
Author: |
J.ALJABRI |
Abstract: |
Various branches of engineering use models effectively to reduce complexity,
document analysis steps and facilitate communication within the development
team. And this applies to software engineering and web engineering. Modeling
aims to provide detailed sufficient descriptions to accomplish the system we
want to build, modeling easily produces patterns represent specific forms of the
system and supposed to be comprehensive. Because of privacy web applications the
general framework of web application development is surrounded by many risks
related with time pressure, the need for rapid release within environment its
requirements are constantly changed . Thus time commitment Issue will be more
important than waiting to achieve some requirements, this is the reason causes
several parallel versions , depending on reuse parts, components and integrating
it within the application. Also web development procedure have to adapt
dynamically with the complexity of the application, quality we want. Any
malfunction occurs during web development procedure life cycle; even on level of
aesthetic appearance of web application; will lead to accumulated problems
making internet users runaway the product, and this will illustrate the
importance of this paper. In this paper, we will discuss impact of risk
management on analysis modeling within web application development framework, we
will explore its levels (content – navigation – presentation ) and impact of
risk management on each level, supported by review system of scientific papers
as an example to show the impact of risk management on analysis modeling and
increasing the chances of success. |
Keywords: |
Web Application, Analysis , Modeling, Level, Risk, Management. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NEW METHODOLOGY OF THREE WAY DISTRIBUTION PROCESS OF IMPROVED PSO ALGORITHM
USING MOBILE SINK NODES |
Author: |
S. RAJ ANAND, E. KANNAN |
Abstract: |
In a recent trend, Mobile sink (MS) is a major part of Wireless Sensor network (WSN)
for distributing, scalable network of communicating with localized environment.
Improved Particle Swarm Optimization algorithm (IPSO) has been used to find the
exact location of three way processes such as sink, distribution of frequency
and localization. The combined OFDMA/TDMA approach is used in multiple carrier
channels for accessing the data parallel without any overlapping bandwidth at
the appropriate scheduled time. The existing multiple access techniques have not
been used in the mobile sink for accessing the secure data. The time schedules
were not fixed for all levels of communication to identify the localization. The
proposed research is to implement IPSO algorithm with Orthogonal Frequency
Division Multiple Access (OFDMA) techniques for utilizing exact bandwidth to
communicate in the schedule time. The experimental results have produced the
Quality of Service (QoS) for accessing the better outcome of bandwidth and
producing the efficient throughput. |
Keywords: |
Mobile Sink, Particle Swarm Optimization, OFDMA, Wireless Sensor Network |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
BUILDING DAMAGE HAZARD ZONATION USING FKCN AND IDW ALGORITHM |
Author: |
MUHAMMAD FAISAL, EDY IRWANSYAH |
Abstract: |
The objective of this study is to create building damage hazard zonation area
using fuzzy kohonen clustering network (FKCN) for physical parameter data
clustering and inverse distance weighting (IDW) for data interpolation in Banda
Aceh city, Indonesia. IDW algorithm is used alongside FKCN because of its
simplicity. The physical parameter in this study consists of lithology,
topographic zone and peak ground acceleration value (PGA). The result is Banda
Aceh city divided into 3 zones which are low, medium, and high building damage
area, based on the combination of physical parameter on each area. |
Keywords: |
Building Damage, Earthquake, Fuzzy Kohonen Clustering Network, Hazard Zonation,
Inverse Distance Weighting |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
SCORING MODEL FOR AVAILABILITY OF VOLATILE HOSTS IN VOLUNTEER COMPUTING
ENVIRONMENT |
Author: |
SOODEH PEYVANDI, ROHIZA AHMAD, M.NORDIN ZAKARIA |
Abstract: |
Volunteer Computing systems (VC) use the idle computing resources which are
composed of unreliable volunteers whose exhibit volatile behavior and often they
are not available because of the autonomy nature of owners. Scientific
experiments that use internet-connected computers are internet based VC
projects. However, the volatility of volunteer is significant challenge in VC
and it is effective on applications that are using these types of hosts.
Therefore, investigating resource characterization in order to derive efficient
factors of host’s availability is needed to improve VC systems. Factors analysis
of hosts is fruitful in making better decision for job scheduler in order to
improve system’s performance. The purpose of this paper is determination the
availability score model for volatile hosts according to statistical analysis of
host’s factors from actual occurrence trace data set. This study is proved the
relationship across host’s factors then it is proposed Scoring Availability
Model. |
Keywords: |
volunteer computing, resource characterization, CPU availability, scoring model |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
MOBILE SECURITY: SECURITY MECHANISMS AND PROTECTION OF MOBILE APPLICATIONS |
Author: |
NAJIM AMMARI, MOHAMED GHALLALI, ANAS ABOU EL KALAM, NORELISLAM EL HAMI, ABDELLAH
AIT OUAHMAN, BOUABID EL OUAHIDI |
Abstract: |
The main objective of this paper is to propose security policies and mechanisms
for mobile phones that better meet the expectations of users, either at the
level of mobile networks, or mobile applications.At the mobile networks level:
The study focuses on limiting the spread of malware via SMS / MMS and emails. It
describes the steps involved in identifying, analyzing and securing traffic in
mobile networks. For this purpose, a Framework MPSS (Mobile Phone Security
Scheme) is used as part of the mobile network of operator Telecom. MPSS aims to
increase the level of information security through the network of the telecom
operator and solve problems related to limited resources on mobile devices and
reduce the risk of loss of data users (individuals, companies). Basically, this
study proposes a new model of mobile security applications consisting of several
levels and layers. Each layer of this model is responsible for the security of
its components, and nothing more. The upper levels of the model are based on all
lower levels to ensure that their components are safe in an appropriate manner.
This model based on abstraction allows the design of a particular mobile
security mechanism to focus on one area of concern without spending resources to
analyze all layers that support its current position in the model. |
Keywords: |
Mobile security, Framework Mobile Phone Security Scheme (MPSS), Spread of mobile
malwares, The Security Model for Mobile Applications (SMMA), Mobile Network
Operator. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
INTERNAL THREAT CONTROL FRAMEWORK BASED ON INFORMATION SECURITY MANAGEMENT
SYSTEM |
Author: |
ZAILAWANI MUKHTAR, KAMSURIAH AHMAD |
Abstract: |
This paper focuses on proposing a framework for security control that based on
ISO 27001 and ISO 27002, which is a standard of Information Security Management
System (ISMS). This framework helps to mitigate internal threats for data centre
meant for public sector adoption. The ISMS implementation scope in the public
sector normally comprises of data centre and information security services.
Previous research indicates that there is no specific framework being develop to
mitigate internal threat in the data centre. Findings from the previous study
generally show that human resource security, access control, physical and
environmental security, and operation and communication security are used to
mitigate internal threats. Hence, this paper aims to identify the most important
security elements to develop internal threats framework for data centre, as well
as to formulate a guideline based on the identified elements. Finally, an
internal threats framework based on the elements and the guidelines is
developed. A qualitative research technique, such as an interview has been
conducted to study the suitability of the identified security control elements.
After the result of the first interview, a second interview is conducted to
validate the proposed framework. A methodology used to establish the framework
includes planning, analysis, design and validation. It is hoped that the
establishment of the framework, may guide the public sector to manage internal
threats for the data centre, as well as to reduce security incidents which may
cause by human factors. |
Keywords: |
ISMS, ISO27001/27002, internal threat, data centre |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
RECOMMENDATION OF PERSONALIZED RSS FEEDS BASED ON ONTOLOGY APPROACH AND
MULTI-AGENT SYSTEM IN WEB 2.0 |
Author: |
YASYN ELYUSUFI, MOHAMMED AMINE ALIMAM, HAMID SEGHIOUER |
Abstract: |
Nowadays, multi-agent systems (MAS) are used in many fields such as industry,
education, finance, etc. MAS counts among the most promising technological
paradigms in the development of Web applications. They can contribute
significantly to improving the quality of the use of these applications. In this
paper, we propose a new recommendation approach for personalized RSS (Really
Simple Syndication) feeds in Web2.0 applications (Wiki , Blogs, Social Networks
... ). This approach is based on a process of coupling ontologies and multi-
agent systems and benefits from the synergy between the two concepts. In this
context, we propose a model which allows human agents (scientists, experts ...)
to cooperate with software agents to help the system to recommend personalized
RSS feeds for users’ interests. In the first section we present personalization
techniques using the ontological approach. In the second section we present the
new concept of coupling between Multi Agent Systems and ontologies. In the third
section, we present our approach to identifying ontology-based user profiles and
multi agent system for personalized RSS feeds. The conclusion comes in the last
section. |
Keywords: |
Recommendation, User Profile, RSS, Ontology, MAS, Web2.0. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
A REVIEW ON LASER SPOT DETECTION SYSTEM BASED ON IMAGE PROCESSING TECHNIQUES |
Author: |
NOR FARIZAN ZAKARIA, MOHD ASYRAF ZULKIFLEY, MOHD. MARZUKI MUSTAFA, ROHANA ABDUL
KARIM |
Abstract: |
Laser pointer is a low-cost daily essential item that can provide a prominent
spot, deliver the meaning of a pointing gesture and accurately indicate a spot.
Robust detection of a laser spot has been made possible with the help of the
computer vision techniques. Autonomous laser spot detection system has led to
the evolution of many applications such as laser pointer interaction, autonomous
robotic helper and simulation based computer game. This paper aims to provide
the general architecture and methodology used in a laser spot detection system.
Major lower level processing methods, such as thresholding, background
subtraction, region of interest extraction and coordinate mapping are
fundamental in developing a good laser spot system. Our study found out that
most of existing systems are prone to error whenever the lighting condition is
varied either gradually or suddenly. The spot is also difficult to detect when
it is overlaid on a white background due to the weakness in the detection
scheme. Jitter, which is mostly caused by uneven hand movement, is a big
challenge in developing an accurate system, especially for laser interaction
applications. Finally, we believe that a robust laser spot detection system can
be built if the aforementioned challenges are carefully addressed. |
Keywords: |
Laser Spot Detection, Coordinate Mapping, ROI Extraction, Thresholding,
Background Subtraction |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
MULTI-AGENT SECURITY ARCHITECTURE FOR A SHARIA COMPLIANT E-AUCTION |
Author: |
NOR AIMUNI MD RASHID, NORLEYZA JAILANI, ROSSILAWATI SULAIMAN, ZURAIDAH ABDULLAH |
Abstract: |
Electronic auction has introduced new processes in the way auction is conducted
which require investigation to ensure compliancy to Sharia (Islamic principles
that are based on Qur’an and Sunnah) rules. The use of mobile software agent in
electronic auction marketplaces adds ubiquity power to the bidders. In
particular it allows agents to quicker respond to local changes in auction
marketplaces and make bidding strategy decisions faster than remote agents or
human participants could. Nevertheless, mobile agent raises issues concerning
malicious attacks from a variety of intervening sources that might alter the
sensitive information it carries. A multi-agent based e-auction must fit the
concept of halal trade and address the problems resulting from fraud activities
in online auction. Most auction frauds such as bid shilling and bid shielding
also violate Sharia transaction law. If an attacker gains information on
sensitive data such as the maximum bid for the bidders, the information can be
manipulated to artificially increase prices through bid shilling. A Sharia
compliant e-auction must comply with Islamic business law and offer secure and
trustworthy trading environment. This paper discusses findings of
non-compliances to Sharia rules found in the case studies conducted on a number
of major online auction systems. This paper focuses on addressing the bid
shilling problem by proposing multi-agent security architecture for Sharia
compliant e-auction which encompasses security protocols for mobile agent
authentication and confidentiality of sensitive information. Mobile agents are
used to carry bidders’ and sellers’ data. Cryptography protocol such as
encryption/decryption, digital signature and hash function are used and applied
on identified high and low risk data. |
Keywords: |
E-Auction, Security, Cryptography, Multi-Agent, Sharia Compliant |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
TEXTUAL AND STRUCTURAL APPROACHES TO DETECTING FIGURE PLAGIARISM IN SCIENTIFIC
PUBLICATIONS |
Author: |
IDRIS RABIU, NAOMIE SALIM |
Abstract: |
The figures play important role in disseminating important ideas and findings
which enable the readers to understand the details of the work. The part of
figures in understanding the details of the documents increase more use of them,
which have led to a serious problem of taking other peoples’ figures without
giving credit to the source. Although significant efforts have been made in
developing methods for estimating pairwise diagram figure similarity, there are
little attentions found in the research community to detect any of the instances
of figure plagiarism such as manipulating figures by changing the structure of
the figure, inserting, deleting and substituting the components or when the text
content is manipulated. To address this gap, this project compares
theeffectiveness of the textual and structural representations of techniques to
support the figure plagiarism detection. In addition to these two
representations, the textual comparison method is designed to match the figure
contents based on a word-gram representation using the Jaccard similarity
measure, while the structural comparison method is designed to compare the text
within the components as well as the relationship between the components of the
figures using graph edit distance measure. These techniques are experimentally
evaluated across the seven instances of figure plagiarism, in terms of their
similarity values and the precision and recall metrics. The experimental results
show that the structural representation of figures slightly outperformed the
textual representation in detecting all the instances of the figure plagiarism. |
Keywords: |
plagiarism., figures, images, pairwise diagram, Jaccard similarity measure |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
PREDICTION OF SUSTAINABLE SUPPLY CHAIN MANAGEMENT FOR GAYO COFFEE USING SYSTEM
DYNAMIC APPROACH |
Author: |
RACHMAN JAYA, MACHFUD,2SAPTA RAHARJA, MARIMIN |
Abstract: |
Gayo coffee is an indigenous commodity in Aceh Province, Indonesia, especially
for Gayo ethnic who lives in Gayo Highland. Sustainable supply chain was an
extension of conventional supply chain that specifically focuses on economic,
social and environment dimension. In operational purpose, third aspects
appropriate trade off, one side actors have economic growth and the other side
gives negative impact for social and environment aspects. The objectives of this
research were to investigate important factors influence in sustainable Gayo
coffee supply chain (GCSC), and to predict the future about sustainability of
GCSC as well as to build the scenario policy for actors. In this research, we
explored relationship among economic, social and environment dimension on
farmers, collectors as well as processor while current practice and prediction
for the Gayo coffee supply chain using system dynamics and multi-dimensional
scaling approach. GCSC chain help to map actors and activities, while the
sustainability of GCSC was explained through net profit for economic dimension,
social welfares and management by product (pulp) to produce compost as well as
water efficiency when production process. Predictions for the future of
sustainable for GCSC within all actors based on third dimension were also
explored. |
Keywords: |
Sustainable Supply Chain, Gayo Coffee Supply Chain, System Dynamics, Aceh
Province |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPACT OF THE STATOR RESISTANCE OF SQUIRREL CAGE INDUCTION MOTOR USING DIRECT
TORQUE CONTROL AND PI CONTROLLER |
Author: |
RIDWAN GUNAWAN, FERI YUSIVAR |
Abstract: |
The three-phase induction motor squirrel cage has a characteristic change in the
event of a change in temperature beyond the motor operation, which leads to
changes in the stator so that the resistance value affects the performance of
the rotational speed of the motor, the motor rotation speed changes are
influenced by the amount flux generated by the flow of resistance in stator.
This paper aims to monitoring the motor rotation speed a characteristic three
phase squirrel cage induction againts shift in the stator resistance value using
a PI controller and a sensor of the motor speed in which the reference modeling
is used motor stator current and stator flux. All of the three phase system is
transformed in quadrature and direct axis.The resistance change of approach to
equality of the number of turns in each phase in the stator. The Direct Torque
Control method is used because the process of the motor speed is determined by
the stator flux, torque, and position the sector to determine the input of
inverter switching obtained from the Lookup Table [6]. The value of resistance
in flux estimation gives the value of the flux hysteresis band against the
actual performance. |
Keywords: |
Stator resistance, Three-phase Induction motor Squirrel Cage, Direct Torque
Control (DTC), Proportional and Integral controller (PI Controller) , Quadrature-Direct
axis (qd-axis) |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
REVIEW ON SERVICE SELECTION SCHEMES BASED ON USER PREFERENCES |
Author: |
SHAHID KAMAL, ROLIANA IBRAHIM, IMRAN GHANI |
Abstract: |
A variety of schemes for user preference-based Web Service selection has been
developed over the years. Users provide their preferences and then receive
related services by the service selection mechanisms using different schemes.
The individual performance of these schemes may vary while using different
quality measures under changed circumstances. In this review, focus is on
Service Selection schemes in the Web Service selection domain. Overall, a total
of seventy-six (76) studies from 2004 to 2013 have been reviewed in this paper.
However, twenty-five (25) studies were selected and categorized into five (5)
groups that focused on each one of the five schemes (CP-Nets, OWL, QoS,
Multi-request, and Ranking) and performance related quality attributes. The
findings indicate the following results of differing schemes, namely: accuracy
is focused upon to a greater degree of (56%) compared to the other quality
attributes, specifically: efficiency (40%), effectiveness (40%), scalability
(24%) and reliability (16%) respectively. |
Keywords: |
Web Service Selection, User Preferences, Selection Scheme, Quality of Service (QoS) |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE MEASUREMENT MODEL FOR MOROCCAN AUTOMOTIVE SUPPLIERS: THE MCDM
APPROACH WITH AHP AND NONADDITIVE FUZZY SUGENO INTEGRAL |
Author: |
MOHAMED TAREK CHAHID, NOUREDINE EL ALAMI, AZIZ SOULHI & JAMILA EL ALAMI |
Abstract: |
The performance measurement systems (PMS) in the industry are defined in terms
of various measures to be combined for global performance. The proposed approach
treats with a qualitative approach for multicriteria decision with the
improvement strategy of an overall industrial performance. The approach is based
on a Sugeno integral aggregation operator, permits to express the global
performance, according to the fuzzy set theory of appropriate Key Performance
Indicators (KPI), the nonlinearity of this model, makes data ambiguous in the
process of multicriteria decision-making.
Hence, this manuscript is a contribution to the selection of the strategy of the
improvement of the overall performance. The approach applies to the Moroccan
Automotive Suppliers to evaluate the best strategy alternative by using a fuzzy
Sugeno Integral technique to deal with the complex interrelationships aspects
between KPI. |
Keywords: |
Performance measurement systems; Sugeno integral aggregation; fuzzy logic;
Global Performance, Improvement strategy. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
Title: |
PREPROCESSING AND GENERATION OF ASSOCIATION RULES FOR PREDICTION OF ACUTE
MYELOID LEUKEMIA FROM BONE MARROW DATA |
Author: |
D.MINNIE, S.SRINIVASAN |
Abstract: |
In this paper we analyze the components of the bone marrow and the structure of
the bone marrow database. The Knowledge Discovery in Databases (KDD) steps are
briefly explained. 18,000 bone marrow analysis records are collected from a
reputed Hospital and this raw data is transformed into a preprocessed data using
the pre-processing phases of KDD such as Data Cleaning, Data Selection and Data
Transformation. Eliminate the tuple technique is used to clean the data. The
attributes related to the bone marrow components are selected. The ranges of
low, high and normal values for the individual attributes are used to transform
the data. The Data Mining techniques are studied and the Apriori algorithm is
selected for finding frequent item sets that are used for the generation of
association rules. |
Keywords: |
Knowledge Discovery in Databases, Data Mining, Association Rule Mining,
Haematology, Bone Marrow Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
20th December 2014 -- Vol. 70. No. 2 -- 2014 |
Full
Text |
|
|
|