|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2015 | Vol. 78 No.1 |
Title: |
MATHEMATICAL MODELS OF THREATS OF UNAUTHORIZED ACCESS TO SENSITIVE INFORMATION
OF MOBILE NETWORK SUBSCRIBERS AND MEASURES TO PROTECT MOBILE SYSTEM |
Author: |
D.M. MIKHAYLOV, A.V. STARIKOVSKIY, A.V. ZUYKOV, M.I. FROIMSON, A.S. SMIRNOV, N.V.
SYCHEV A.YU. BORUCHINKIN, S.D. FESENKO |
Abstract: |
The issue of mobile devices’ security is now of great interest as they store and
process data more valuable for users than the data stored and processed on
personal computers. This paper deals with the development of models of a threat
of unauthorized access to confidential information of subscribers to cellular
networks, namely: mathematical model of the brute force attack, mathematical
model of attacks using software exploits, mathematical model of an attack using
additional equipment for its implementation, and mathematical model of attacks
using instrument bugs and malicious logic. The article also discloses approaches
to the protection of confidential information in cellular communication
networks. The implementation of mathematical models discussed in the paper will
significantly enhance the information security of mobile devices. |
Keywords: |
Brute force attack, data protection, exploits, malicious logic, mathematical
model of threat/attack, unauthorized access. |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
THE IMPACT OF COMPUTER INFORMATION SYSTEMS IN THE REDUCTION OF THE TAX EVASION /
EXPLORATORY STUDY IN JORDANIANS FIRMS |
Author: |
HAROON ALTARWNEH, MOHAMMAD ALTARAWNEH, FARHAN ALOBISAT |
Abstract: |
This paper examines how the computer information system affects in the reduction
of tax evasion in Jordanians firms. The Increased phenomenon of tax evasion
recently which is one of the phenomena that limit the performance and
effectiveness of the Income Tax Departments in Jordanians firms, and with the
tremendous development, technology and scientific progress obviously increased
the importance of the development of computer information systems that help in
tax evasion reduction.
it should be noted the need for attention to computer information system by the
Income Tax Departments and the staff and the estimated training has on this
technology because it increases the efficiency and effectiveness of tax
collection |
Keywords: |
Tax evasion, computer information system, Jordanian firms |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
A NEW APPROACH TO REPRESENT ROTATED HAAR-LIKE FEATURES FOR OBJECTS DETECTION |
Author: |
MOHAMED OUALLA, ABDELALIM SADIQ, SAMIR MBARKI |
Abstract: |
In this paper, we propose a new approach to detect rotated object at distinct
angles using the Viola-Jones detector. Our method is based on two main steps: in
the first step, we determine the rotated Haar-like feature by any angle (45°,
26.5°, 63.5° and others), this allowed us to obtain a very large number of Haar-like
features for use them during the boosting stage. The normal Integral Image is
very easy to be calculated, but for rotated Haar-like feature, their computation
is practically very hard. For this reason, in second step, we propose a function
to calculate an approximate value of rotated Integral Image at a generic angle.
To concretize our method, we test our algorithm on two databases (Umist and
CMU-PIE), containing a set of faces attributed to many variations in scale,
location, orientation (in-plane rotation), pose (out-of-plane rotation), facial
expression, lighting conditions, occlusions, etc. |
Keywords: |
Haar-Like Feature, Integral Image, Object Detection, Face Detection, Viola &
Jones Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
SIMULATION AND COMPARISON OF SPWM AND SVPWM CONTROL FOR TWO LEVEL UPQC |
Author: |
G.ANNAPURNA, DR.G.TULASIRAMDAS |
Abstract: |
Unified Power Quality Conditioner (UPQC) is an effective tool to solve the power
quality problems. The main purpose of UPQC is to compensate harmonics present in
the utility voltage and source current. The UPQC has the ability of improving
the power quality at the point of installation in power distribution systems.
This paper discusses unit vector template generation control strategy with a
focus to mitigate harmonics present in the utility voltage. The main aim of this
paper is to evaluate the performance of two level voltage source converter(VSC)
based UPQC for effective harmonic reduction in the load voltage and source
current when adopted Sinusoidal Pulse Width Modulation(SPWM) and Space Vector
Pulse Width Modulation (SVPWM). The adoption of SVPWM technique allows better
compensation of load voltage and source current harmonics. Simulation results
based on MATLAB/ SIMULINK are presented to verify effective compensation of
voltage and current harmonics when adopted SVPWM technique. |
Keywords: |
Power Quality, Harmonics, UPQC, Pulse Width Modulation, MATLAB / SIMULINK |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
AUTOMATED BRAIN HEMORRHAGE LESION SEGMENTATION AND CLASSIFICATION FROM MR IMAGE
USING AN INNOVATIVE COMPOSITE METHOD |
Author: |
SUDIPTA ROY, SANJAY NAG, SAMIR KUMAR BANDYOPADHYAY, DEBNATH BHATTACHARYYA, TAI-HOON
KIM |
Abstract: |
Accurate identification of acute hemorrhage is a critical step in planning
appropriate therapy. The correct characterization of underlying pathology, such
as neoplasia, vascular malformation, or infarction, is equally important for
conclusive diagnosis. Computer-aided diagnosis (CAD) systems have been the focus
of several research endeavors and it is solely based on the idea of analyzing
images of different types of brain hemorrhage by implementing improved image
processing algorithms. In this paper, an innovative and automated approach is
cited to detect existence of brain hemorrhage in multiple MRI scan images of the
brain, the type of hemorrhage and position of the hemorrhage. The implemented
algorithm includes several stages such as artifact and skull elimination
constituting preprocessing, image segmentation, and hemorrhage localization. The
result of the conducted experiments has been compared statistically with
reference image showing very promising results. |
Keywords: |
Brain, Hemorrhage, MRI, CAD, Hemorrhage Lesion, Image Segmentation, Position of
Hemorrhage, Classification |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
DESIGNING A DATA GOVERNANCE MODEL BASED ON SOFT SYSTEM METHODOLOGY (SSM) IN
ORGANIZATION |
Author: |
HANUNG NINDITO PRASETYO, KRIDANTO SURENDRO |
Abstract: |
Today, many emerging various models of data governance like DAMA, DGI and the
latest is a model from IBM. Model DAMA International is a data governance model
designed by industry associations. The model requires the fulfillment of the
entire artifact in a matrix that has been determined that too many components
that must be built in data governance in an organization. While the data
governance model is built from the data DGI consulting organization which
requires the development of data governance is formed of several related items
(including programs, stages, decision domain, universal objects, and components)
that this requires significant effort to learn and use. While IBM's approach is
a model of data governance that is built from the vendor data governance
software provider, so as to establish a data governance will ultimately require
software support. So in this case we need a model that can be easily adopted in
accordance with the needs and resources of the organization's information.
Designing a model that fit the needs of the organization is not easy. One way to
build a model with based on the problems encountered is the concept of soft
systems Methodology (SSM). SSM is used because basically change the way of
thinking of a person or group as a system for solving problems encountered. |
Keywords: |
Data governance, Soft System Methodology (SSM). |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
THROUGHPUT ENHANCEMENT OF WIRELESS SENSOR NETWORK LOCALIZATION ACCURACY AGAINST
JAMMING ATTACKS |
Author: |
AHMED ABDULQADER HUSSEIN, THAREK A. RAHMAN, CHEE YEN LEOW |
Abstract: |
Localization refers to locating the position or area in which the sensor or
object to be tracked. Based on the localization, many applications are emerging
in the wireless sensor network. Since the wireless sensor network is a shared
medium, jamming attacks can be launched by adversary emitting the radio
frequency signal. Therefore jamming attacks affect the localization process.
Range based methods like received signal strength indication (RSSI) is affected
a lot by physical jamming attacks. This paper proposes a solution based on
modified multi frequency multi power antenna to provide robust and accurate
localization technique .In this paper continuous, random and capture and replay
jammers are be simulated to test the localization accuracy of the RSSI algorithm
However the access point sends beacons in different frequencies and jammer
cannot jam all the frequencies, sensor nodes will be able to receive beacons in
spite of the existence of continuous and random jammer. The only problem now is
with capture and replay jammer. So that this paper proposes a set of filters to
eliminate the replayed beacons The simulation results showed a powerful and
improvement in the localization accuracy against jamming attacks through
detecting , filtering and eliminating the effect of these attacks. |
Keywords: |
Wireless Sensor Network, Received Signal Stregnth Indicator (RSSI) ,Trilateration
Technique , Jamming Attacks, Localization Accuracy. |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
FACTORS AFFECTING E-GOVERNMENT SERVICES ADOPTION: FIELD STUDY |
Author: |
MANSOUR NASER ALRAJA, SAMIR HAMMAMI, TAREQ ALHOUSARY |
Abstract: |
Electronic government provides a diversity of services to citizens using
website, which include carrying out a range of transactions that will increases
the accessibility of information and government services by citizens. The aim of
this study is to determine the critical factors that affect citizen adoption of
e-government services. Constructs from the Trust models and Diffusion of
Innovation (DOI), were integrated into an insightful model of electronic
government adoption. The study was organized by surveying a group of citizens at
Dhofar governorate Sultanate of Oman. The results point out that Trust in
Internet and Relative Advantage are significant indicators of citizens’
intention to use government services. |
Keywords: |
Technology Adoption, DOI, Trust, E-Government. |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
EXPERT SYSTEM DIAGNOSIS CHRONIC KIDNEY DISEASE BASED ON MAMDANI FUZZY INFERENCE
SYSTEM |
Author: |
MUCH AZIZ MUSLIM, IIN KURNIAWATI, ENDANG SUGIHARTI |
Abstract: |
Expert systems are computer-based system that uses knowledge, facts and
reasoning techniques in solving problems that usually can only be solved by an
expert in a particular field. In this research, expert systems are used for the
diagnosis of Chronic Kidney Disease. The purpose of this research is to develop
an expert system diagnosis of Chronic Kidney Disease based on Mamdani Fuzzy
Inference System and determine the level of system accuracy in diagnosis of
Chronic Kidney Disease. There are four processes in this method, namely
fuzzification, implications, composition of the rules and defuzzification. Agile
Method was used for software development in a systematic way. In this research,
A simulation of expert system was built using Matlab R2009a. The accuracy expert
system of diagnosis Chronic Kidney Disease is calculated using the Confusion
Matrix. Based on results of the research, showed that bisector method generate
the highest level of accuracy. |
Keywords: |
Expert System, MFIS, Diagnosis, Chronic Kidney Disease, Software Matlab R2009 |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
A METHOD OF COMPUTING THE TRAFFIC FLOW DISTRIBUTION DENSITY IN THE NETWORK WITH
NEW FLOW-FORMING OBJECTS BEING PUT INTO OPERATION |
Author: |
NATALYA ALEKSANDROVNA NAUMOVA, VLADIMIR VASILIEVICH ZYRYANOV |
Abstract: |
The problem of efficient designing of new traffic networks and operation of
existing ones is an active topic of research. This problem is being solved in
most countries by using Intelligent Transportation Systems and Decision Support
Systems. The core of these systems is a mathematical model of processing the
data of monitoring traffic flow parameters and road conditions. The efficiency
of managerial decisions depends on minimizing the time interval from the moment
of obtaining data till the moment of making a decision. We developed a
mathematical model based on the Erlang time distribution which allowed us to
deduce in explicit form a function of transportation costs for traffic network
routes. Of great importance is the practical problem of determining the changes
in the network traffic flows distribution with new flow-forming objects being
put into operation. This article provides and justifies a new method that helps
solve the given problem. The algorithms developed are based on the theory of
flow equilibrium. Their adequacy was proved in practice. |
Keywords: |
Traffic Flow, Statistical Distribution, Mathematical Model, Function of
Transportation Costs, Origin/Destination Pair |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
CLUSTERING ARCHITECTURE FOR SMART MOBILITY CONTROL: APPLICATION TO PILGRIMS IN
THE GREAT MOSQUE IN EL HAJJ |
Author: |
HERNAFI Yassine, BOUHORMA Mohammed, BEN AHMED Mohamed, BOUDHIR Anouar,
ALLUHAIDAN Yasser Abdulrahman |
Abstract: |
The mobile ad hoc networks are a special case of wireless networks, where we
encounter some form of spontaneous communication, in which groups of different
mobile nodes forming a network without the need of infrastructure, thus access
to information is through the users’ mobile equipment’s. One of the basic
features of this kind of network is the famous principle of routing. However,
the users’ considerable need to have access to data in the best conditions
involves some thinking to pro pose relevant solutions on the whole. In this
purpose, our work applies in one particular case. El Hajj is a holy gathering
place of millions of Muslim pilgrims from around the world. During this season,
the organizers faced a lot of problems related to communication of pilgrims and
their position in the area of El Hajj, hundreds of believers acknowledge that
they may have difficulties each year at relaying communications and connections
during these rituals, others who may have problems with serious situations,
especially in large crowds. In this context, we are proposing an architecture
that enables optimization of network and routing, depend on a smart mobility
with a goal to represent the surrounding area of Mecca as a Smart city to offer
a whole of advantages to improve a quality, to make their different services and
infrastructure more flexible. It is based on the data compression technique, it
depends on the compression of this data sector by implementing a clustering
architecture. This solution, present a model for an area, and which can be
duplicated for the full area of El hajj. It also facilitates the communication
and localization, in real time. The evaluation of this approach leads us to
anticipate simulations to do a great job of refinery. We made a choice to
perform a number of simulations based on the AODV protocol and implementing the
technique of clustering, ideal for identifying performance to consolidate our
approach |
Keywords: |
El Hajj, Smart city, MANET, Cluster, Compression, AODV-C |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
INTERNATIONAL TECHNOLOGY TRANSFER MODELS: A COMPARISON STUDY |
Author: |
ALI HASSAN, MD. YUSOFF JAMALUDDIN, MENSHAWI.K.M |
Abstract: |
Technology transfer (TT) is a way of obtaining advanced techniques to enhance a
country’s technological development. The International Technology Transfer (ITT)
projects involve the cross-border transfer of technology to develop the local
technology capabilities. In this work, a survey on valuable ITT studies and deep
analysis of the most reliable ITT models have been presented. The aim is to
identify the factors and sub-factors that influence the TT process. Analytical
comparison of ten relevant models in terms of their objectives, dominant
factors, major concerns and model limitations has been conducted. The main focus
of this analysis has been on models construct, factors relationship, models
contribution, models strength & weakness, and models reliability. The most
influential factors of ITT process have been categorized as: Technology provider
and technology recipient characteristics, integration of local and foreign
actors, government policy, culture difference, transfer environment, nature of
technology, mode of transfer, and management of TT program. Meanwhile, the
outcomes of ITT process have been represented as economic advancement, knowledge
and competency development, and project performance. This study provides a
significant reference on ITT modeling process and presents a scholarly critique
review on several ITT models. |
Keywords: |
Technology, International Technology Transfer, Modeling, Influential Factors |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
THE ROLE OF E-MARKETING FRONT END APPLICATIONS ON CUSTOMER RETENTION: EVIDENCE
FROM JORDAN |
Author: |
MAZEN KAMAL QTEISHAT, HAITHAM HMOUD ALSHIBLY, KHALID N. ALZUBI |
Abstract: |
E-marketing front-end applications have become an important consideration for
bolstering customer relationship management, customer satisfaction, and customer
loyalty. Even though front-end applications are important models examining how
these variables contribute to customer retention has not been widely reported in
the literature. Based on this assessment the current investigation seeks to fill
this gap, examining the role of seller portal personalization, electronic
catalogues, shopping cart, search engine, and payment gateway in customer
retention in the Jordanian telecommunications sector. The results indicate that
the seller portal independently contributes to customer retention with
electronic catalogues, shopping cart, search engine, and payment gateway
providing support for the e-marketing front-end applications needed to support
customer retention. |
Keywords: |
E-Marketing, Customer Retention, Seller Portal Personalization, Electronic
Catalogues, Shopping Cart, Search Engine, And Payment Gateway |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
APPLYING CASE BASED REASONING IN AGILE SOFTWARE DEVELOPMENT |
Author: |
AIMAN TURANI |
Abstract: |
There is a common misconception among developers who follow Agile development
methods, that following formal processes and modeling are unnecessarily and
perceived as a waste of effort [1]. The initial intension of Agile was not an
anti-methodology movement but rather a balance between processes and production.
Nevertheless, the main challenges facing software that are developed using Agile
development methods are the risk of higher architectural design mistakes, and
the slower transfer rate of knowledge especially when valuable developers and
expertise tend to leave their organizations.
Agile advocates itself as a framework based on engaging knowledge workers in
affective way. It focuses primary on transferring the tacit type of knowledge
within production teams. Yet transferring the explicit type of knowledge is
important as well. Reusing past projects' artifacts will have a positive impact
on the reduction of costly architectural mistakes and the increasing of the
overall learnability, productivity and efficiency of the organization as a
whole. Both tacit and explicit knowledge are needed. A hybrid approach that
combines both kinds of knowledge is vital and essential especially for teams
with diversity skills and knowledge working closely throughout project’s
development life cycle.
This paper focuses on two main Knowledge Based Management processes that should
be applied within Agile development methodologies. The first process focuses on
the transformation of tacit knowledge into explicit knowledge using the
traditional design models techniques. The second process focuses on usage of
Case Based Reasoning systems for facilitating the retrieval and reuse of past
projects' solution artifacts. We have selected CBR over other Knowledge Base
systems due to its effectiveness in representing solutions for software
development domain, which is considered a complex domain, without the need of
having a large set of training cases. In this paper we have proposed an ICBR
(Product Backlog Item Case Based Reasoning) that could be easily integrated
within many Agile development methodologies to effectively disseminate valuable
knowledge among organizations’ teams and personals. In this paper we have
applied ICBR on the Scrum methodology as a proof o concept for facilitating the
dissemination of various software artifacts among team’s developers to maximize
the use of cooperative wisdom and experience found within organizational entity. |
Keywords: |
Agile development, Knowledge based Management, Scrum, and Case Based Reasoning. |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
FPGA IMPLEMENTATION OF OFDM TRANSMITTER USING SIMULINK AND XILINX SYSTEM
GENERATOR |
Author: |
G.V GANESH , B .MURALI KRISHNA, K. SRAVAN KUMAR3 T.PRATHYUSHA , R. VENKATESH,
T.VINEEL JESSY |
Abstract: |
Growth in technology has led to unmatched demand for high speed architectures
for complex signal processing applications. In 4G wireless communication
systems, bandwidth is a precious thing, and service providers are continuously
trying to accommodate more no of users within a limited available bandwidth. To
increase data rate of wireless medium with higher performance and to overcome
the frequency selective fading, inter-symbol interference (ISI) effectively,
Orthogonal Frequency Division Multiplexing (OFDM) is used. It will be a hard
core technology used in the future mobile communications. The basic principle of
OFDM is studied in this paper and modeling was carried out in MATLAB followed by
Verilog HDL implementation. The Verilog code is written and simulated in XILINX
14.2 and tested using FPGA Spartan-3E board. |
Keywords: |
OFDM (Orthogonal Frequency Division Multiplexing), ISI (Inter Symbol
Interference), FPGA (Field Programmable Gate Array), HDL (Hardware Descriptive
Language), 4G (4th Generation |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
Title: |
DERIVATION AND VALIDATION OF A CONCEPTUAL MODEL FOR ERP IMPLEMENTATION SUCCESS
FACTORS – AN INDIAN CONTEXT |
Author: |
R. SARAVANAN, Dr. C. SUNDAR |
Abstract: |
Enterprise Resource Planning (ERP) Implementations are growing as the business
grows in the Industry, whereas the question still remains whether there are real
benefits to the Organizations due to ERP. There are multiple factors that
contribute to the Success of ERP Implementations. The primary objective of this
research study is to bring-out the Critical Success Factors (CSF) which are
contributing for success of a typical ERP Implementation and to derive and
validate a model for ERP Implementation Critical Success factors. This study has
been conducted on predominant industries in India on a select region, who have
implemented ERP in their organisations. Through this study we have tried capture
the significance of each Critical Success Factor and subjected to analysis for
validating the relationship of these factors in Indian Context. Derived
Conceptual Model has been successfully validated in which most of the Hypothesis
are supported by the research statistics. |
Keywords: |
ERP Implementation, Critical Success Factors, Success of ERP, ERP, CSF |
Source: |
Journal of Theoretical and Applied Information Technology
10th August 2015 -- Vol. 78. No. 1 -- 2015 |
Full
Text |
|
|
|