|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2015 | Vol. 74 No.1 |
Title: |
SECURE DYNAMIC SYSTEM DEVELOPMENT METHOD (SDSDM): A SURVEY ABOUT ITS SUITABILITY |
Author: |
IMRAN GHANI, ABDULLAHISANI, NAGHMEH NIKNEJAD, MANNIR BELLO, SHAHID KAMAL,
MUHAMMAD WASEEM CHUGHTAI, SEUNG RYUL JEONG |
Abstract: |
Building secure software is about taking security into account during all phases
of software development. However, the major problem in agile methods is the lack
of basic security elements in their phases and practices. One of such method is
Dynamic System Development Method (DSDM).Based on this study, we have observed
that the original/traditional DSDM does not help guide the agile to develop
secure software. In order to address this issue, we introduced additional phases
and sub-phases to the original/traditional DSDM to integrate security. The
proposed model is named Secure Dynamic System Development Method (SDSDM), which
has six phases. These phases and sub-phases are feasibility study, functional
model iteration, secure functional model iteration, secure design, design and
build iteration and implementation. Our findings highlight an improved agility
in DSDM after integration of security. However, the study focuses on a
questionnaire (survey) where the subject matter experts’ opinion has been used
to validate our model. Based on the experts’ opinion, we can say that it is
possible to develop secure software using SDSDM model without affecting its
agility negatively. |
Keywords: |
Agile Methodology, Software Security, Dynamic System Development Method, Degree
of Agility |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
IMPROVEMENT OF RECTANGULAR PATCH ANTENNA PERFORMANCE FOR RFID APPLICATIONS |
Author: |
ABDELHAK BENDALI, MOHAMED HABIBI, SEDDIK BRI, ADIBA ELFADL |
Abstract: |
In the present paper, the optimal design of the rectangular patch antenna
parameters, excited by a microstrip line having a power port 50 adapted to Ω,
are introduced to the requirement of improvement of radiation characteristics
namely reflection coefficient, the standing wave ratio (VSWR), the input
impedance of the antenna and bandwidth. The design was performed using the
simulator HFSS (High Frequency Structure Simulator) based on the resolution of
Maxwell's equations for the ticket of the finite element method. The objective
of this improved radiation characteristics of the antenna patch is the full
performance of this antenna at 0.92 MHz for RFID applications. Simulation
results show that the reflection coefficient reaches a level of less -31dB, the
standing wave ratio is equal to 1.057, and the bandwidth is about 2.75%. |
Keywords: |
Antenna Patch, Return Loss, RFID, HFSS |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
ENERGY SAVING IN GREEN CLOUD COMPUTING DATA CENTERS: A REVIEW |
Author: |
IMRAN GHANI, NAGHMEH NIKNEJAD, SEUNG RYUL JEONG |
Abstract: |
The Cloud computing is a new computing standard which targets to offer reliable,
adaptive and Quality of Service (QoS) based computing environments for IT users.
One of the recent major concerns in cloud environment is efficient usage of
energy in its data centers. This paper reviews energy saving strategies in Data
Centers for cloud computing and also discusses various approaches proposed in
the previous research works in this field. The paper presents an intensive study
of SIXTY EIGHT (68) researches focusing on energy consumption by data center
servers and networks and energy efficient approaches in cloud computing. Based
on the existing studies, Servers have been introduced as the most energy
consumer in Data Centers. |
Keywords: |
Green Cloud Computing, Data Center, Energy Saving, Energy Efficiency, Review |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
RC6 BASED SECURITY IN WIRELESS BODY AREA NETWORK |
Author: |
A.SIVA SANGARI, J.MARTIN LEO MANICKAM , R.M.GOMATHI |
Abstract: |
Wireless body area networks have grown more attention in healthcare
applications. The development of WBAN is essential for tele medicine and Mobile
healthcare. It enable remote patient monitoring of users during their day to day
activities without affecting their freedom. A WBAN is a network of sensors
placed on the human body for monitoring healthcare information. The surveillance
of the person can be performed through wearable sensors. The WBAN used for
diverse applications including healthcare applications and athlete monitoring
.In WBAN, the body sensors in and around the patient body that collect all
patient information and transferred to remote server through wireless medium.
The wearable sensors are able to monitor vital signs such as temperature, pulse,
glucose information and ECG. However there are lots of research challenges in
WBAN when deployed in the network. The sensors have limited resources in terms
of memory, size, memory and computational capacity. In this paper,we proposed
secure communication between the sensor nodes using selective encryption.The RC6
algorithm is appled for that selective encryption. |
Keywords: |
Wireless Body Area Network, Electro Cardiogram Signal,Rivest Cipher |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
USING DATA MINING TO ANALYZE USAGE PATTERN OF MOBILE PROVIDERS (CASE STUDY PT.
XL AREA SALATIGA) |
Author: |
ANDREAS ARTAHSASTA TAROREH, DANNY MANONGGA, ADE IRIANI |
Abstract: |
Data mining is one of the disciplines in computer science that explores the
useful information about individual trends and segments. The numbers of mobile
operators in Indonesia and high consumer displacement cause the competition
among the operators to provide service and rate that attract users. PT. XL
Axiata (XL) as the second biggest cellular providers in Indonesia gives special
rate to the members of target community. The purpose of this study was to
analyze the usage patterns of service build from XL community members who belong
to groups of workers and students by conducting data mining using a pivot table
on the users’ profile and consumer service usage data for three consecutive
months. The data was processed and analyzed to determine the marketing strategy
in accordance with constumer needs in order to improve loyalty. The results of
processing data showed that the variable of occupation and sex have effect on
the usage patterns of service which emerged. Moreover, the internet service was
a service that provides intake for most major mobile operators. By analyzing the
usage patterns of community members, it can assist the service providers in
determining the marketing strategy according to user needs. |
Keywords: |
Data Minning, Pivot Table, Usage Pattern |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
A NOVEL VLSI BASED CRYPTOCODING TECHNIQUE USING ERROR CONTROL ALGORITHM |
Author: |
B. SENTHILKUMAR, V. RAJAMANI |
Abstract: |
This paper presents a hardware implementation for Encoder and Decoder of the
cryptography technique using versatile Error Control Algorithms of Block Codes
used in wireless communication networks. This work is focused on the designing
of VLSI based hardware implementable and more secured alternative of existing
software based symmetric cryptography techniques using DES (Data Encryption
Standard) and AES (Advanced Encryption Standard Algorithm). In this design
process, traditional methods of sub key generation using bit shifting along with
modulo 2 addition, performance of padding and puncturing the bits of words are
done so as to maintain the reliability of the design at par with conventional
technique. In this design, (7,4) Block code with hamming code algorithm is
considered as it has very low probability to retrieve originality without
specific syndrome analysis and can be easily penetrated between any number of
bits of original message as required by the Cryptography. This design is
simulated and the synthesis report is generated using Verilog coding of Xilinx
ISE software and the modules and results are illustrated. The report and result
reveals that the proposed design will occupy very lesser number of components
with reliable performance. This will lead to the small amount of power
consumption and compactness in hardware implementation. Also, it is observed
that the even though the used key size is small, the complexity for the intruder
to retrieve the original message is greatly increased by incorporating the
variety of hardware diversifying practice without sacrificing the strength of
required cryptography technique. The test result shows the significance of the
proposed design as the same set of message never produces the same set of cipher
text. So that the computational attacks using software based iteration can not
be used to track the plain text. |
Keywords: |
Cryptography, Error Control Algorithm, Block Code, VLSI architecture, Encoder
and Decoder |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
ESTIMATION METHOD BASED ON AN UEWAA OPERATOR AND ITS APPLICATION |
Author: |
YONG-PING LI, CI-LI JIA |
Abstract: |
This paper bring forward a kind of estimation method based on UEWAA (Uncertain
Enhanced Weight Arithmetic Average) operators, which establishes an estimation
attribute set, a weight vector, and an estimation matrix. Then a queue vector is
acquired and the best optimized project is gotten. Finally, the availability of
this method is validated by an FMC (Flight Management Computer) repair example.
And the conclusion is that this method is quantitatively effective but not
accurate, which means that it can only provide the decision-maker some
references. |
Keywords: |
Estimation Method, UEWAA Operator, Weight, Attribute, Aircraft Component Repair |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
SOLAR FLARE M-CLASS PREDICTION USING ARTIFICIAL INTELLIGENCE TECHNIQUES |
Author: |
AZAM ZAVVARI, MOHAMMAD TARIQUL ISLAM, RADIAL ANWAR, ZAMRI ZAINAL ABIDIN |
Abstract: |
Currently, astronomical data have increased in terms of volume and complexity.
To bring out the information in order to analyze and predict, the artificial
intelligence techniques are required. This paper aims to apply artificial
intelligence techniques to predict M-class solar flare. Artificial neural
network, support vector machine and naïve bayes techniques are compared to
define the best prediction performance accuracy technique. The dataset have been
collected from daily data for 16 years, from 1998 to 2013. The attributes
consist of solar flares data and sunspot number. The sunspots are a cooler spot
on the surface of the sun, which have relation with solar flares. The Java-based
machine learning WEKA is used for analysis and predicts solar flares. The best
forecasted performance accuracy is achieved based on the artificial neural
network method. |
Keywords: |
Neural Network, Support vector machine, Naïve Bayes, Solar Flare, Artificial
Intelligence Techniques |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
INITIAL TRUST IN INTERNET BANKING SERVICE IN JORDAN: MODELING AND INSTRUMENT
VALIDATION |
Author: |
ALI ALJAAFREH, AHMED AL-ANI, RAID ALADAILEH, RASHA ALJAAFREH |
Abstract: |
As with many other e-services, the adoption rate of Internet banking services
(IBS) in developing countries is relatively low compared to developed countries.
It is well-established that customer’s trust plays an important role in adopting
new technologies, and hence, initial trust could be the first issue that needs
to be investigated when studying the adoption of online banking. The aim of this
study is to develop and validate a research instrument empirically, and then use
it to examine a proposed conceptual model of initial trust for IBS in developing
countries. The model’s constructs are integrated from the trust literature,
diffusion of innovation theory (DoI), and the Hofstede’s culture theory. This
paper also aims to develop and validate a research instrument to examine the
research model. We conducted a pilot study in Jordan, one of the developing
countries in the Middle East. A survey was carried out, and a total of 75
responses were gathered in the study. The collected data was analyzed using IBM
SPSS 22.0. Results of the pilot study are used to validate the instrument and to
refine the proposed model. The validated and refined instrument will be used to
examine the model in the intended primary study. |
Keywords: |
Initial Trust, Developing Countries, Internet Banking Services, Customer
Behavior, National Culture. |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE OF TWO-PATH SUCCESSIVE RELAYING IN THE PRESENCE OF INTER-RELAY
INTERFERENCE |
Author: |
QIAN YU LIAU, CHEE YEN LEOW |
Abstract: |
Half-duplex constraint refers to the inability of a radio to transmit and
receive signals simultaneously due to the hardware limitation. In cooperative
communication, half duplex constraint requires orthogonal time or frequency
channel use between source transmission phase and relay transmission phase. This
limits the spectral efficiency of conventional relaying to half of the
performance of direct transmission without relay. Two-path successive relaying
has been proposed to relax this half-duplex constraint by allowing
non-orthogonal transmission, where the source transmits new message continuously
in every time slot. In two-path successive relaying, two relays are scheduled to
assist the transmission alternately. However, the inter-relay interference
degrades the performance significantly since the two relays are not operating in
orthogonal channel. Majority of the existing literature neglects the inter-relay
interference and over estimates the performance of two-path successive relaying.
The main objective of this paper is to investigate the actual interference
limited performance of two-path successive relaying compared to conventional
half-duplex relaying in terms of ergodic capacity. We consider several channel
and system conditions to identify the optimal scheme in respective conditions.
The results show that the two-path successive relaying is not always optimal if
compared to the conventional half-duplex relaying in interference limited
scenario. |
Keywords: |
Wireless Communication, Cooperative Communication, Two-Path Successive Relaying,
Decode and Forward, Inter-Relay Interference |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
MALICIOUS NODE DETECTION THROUGH TRUST AWARE ROUTING IN WIRELESS SENSOR NETWORKS |
Author: |
RAJA WASEEM ANWAR, MAJID BAKHTIARI, ANAZIDA ZAINAL, KASHIF NASEER QURESHI |
Abstract: |
Wireless sensor network are constituted by a large number of tiny size sensors
and distributed randomly for gathering information. These types of networks have
remarkable applications and demand worldwide. The wireless sensor network has
been suffered with variety of attacks because of its design and deployment
nature. The previous traditional approaches including cryptography,
authentication cannot work properly against node misbehavior attacks. To solve
this problem, we propose a Trust Aware Wireless Routing Protocol (TAWRP) for
detection and isolation of malicious nodes in network. The main aim of TAWRP is
to establish an optimal route with trusted nodes and effectively forward the
packets from source to destination with minimum packet loss. The performance of
TAWRP is evaluated in terms of packet delivery ratio and routing overhead. The
results clearly showed that TAWRP can achieve high delivery ratio and efficient
in routing overhead in the presence of malicious nodes. |
Keywords: |
Sensor Nodes, Malicious, Trust, Overhead |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
RECENT METHODS AND TECHNIQUES IN VIDEO WATERMARKING AND THEIR APPLICABILITY TO
THE NEXT GENERATION VIDEO CODEC |
Author: |
M.F.L. ABDULLAH, ALI A. ELROWAYATI, AZIZAH ABD MANAF, ZAKARIA S. ZUBI |
Abstract: |
High efficiency video coding (HEVC) is the newest video coding generation of the
ITU-T and ISO/IEC, which first appeared in January 2013. It has the advantage of
reducing the bit rate by as much as 50 % when compared to H.264 while
maintaining the same visual quality. In the last decade, authentication and
copyright protection methodologies have become one of the essential items in
order to protect video contents by embedding within an efficient video codec.
Thus, the objective of this paper is to revise recent developments in the area
of watermarking techniques for video coding schemes and their applicability to
the new Standard HEVC. The results of this study provide motivation to achieve a
higher embedding capacity and higher compression performance for HEVC compared
to H.264/AVC especially, for low bit-rate coding. |
Keywords: |
Digital Watermarking, Hiding Data, Video Watermarking, Video Coding, HEVC |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
A BIBLIOGRAPHY OF OBJECT CLASS RECOGNITION AND OBJECT RECOGNITION BASED ON
VISUAL ATTENTION |
Author: |
VAHID ALIZADSEH SAHZABI, KHAIRUDDIN BIN OMAR |
Abstract: |
Object class recognition has exhibited significant progress in recent years and
is now an integral component of many machine vision applications. However,
object class recognition using visual attention image segmentation is a novel
idea, which has only been developed in the past decade. This paper presents a
comprehensive survey on object class recognition and object recognition
algorithms, in addition to their applications based on visual attention region
selection methods that as recently published. Additionally, increased efforts
have been directed to the development of a generic method for categorizing all
objects in a domain including examples such as Winn’s Method, used to recognize
object classes at a glance. The Majority of object class recognition algorithms
are highly dependent on shape matching results. The purpose of this review is to
provide a comparison among the visual attention (bottom-up and top-down), object
recognition (e.g., SIFT, SURF and PCA-SIFT) and object class recognition
methods, aimed to researchers identifying the most appropriate method for a
particular purpose. This survey is suitable for researchers in the pattern
recognition field, providing familiarity with the existing algorithms for object
classification from image acquisition steps to final output (i.e., image
segmentation, object recognition and object classification). At the end of each
part, the challenges, critical analysis table are provided and future directions
of every method are suggested for developing new ideas end of this paper.
Additionally, this approach allows researchers to find the definition of
keywords and to obtain brief knowledge concerning how each method works and what
obtained results are for various datasets. |
Keywords: |
Visual Object Recognition, Object Class Recognition, Object Classification,
Object Categorization, Bottom-Up Visual Attention, Bottom-Up Visual Attention,
Saliency Visual Attention |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
HUNTING SEARCH ALGORITHM TO SOLVE THE TRAVELING SALESMAN PROBLEM |
Author: |
AMINE AGHARGHOR, MOHAMMED ESSAID RIFFI |
Abstract: |
Traveling salesman problem is a classic combinatorial optimization problem
NP-hard. It is often used to evaluate the performance of new optimization
methods. We propose in the present article to evaluate the performance of the
new Hunting Search method to find better results for the traveling salesman
problem. Hunting Search is a meta-heuristic inspired by the method of group
hunting of predatory animals. It is part of the evolutionary algorithms used to
solve the continuation optimization problems. The work presents an adaptation of
this method in a discrete case by redefining operations of the method into
operations of permutation in the path of the visited cities of the traveling
salesman. The proposed method was tested on the instances of reference of TSPLib
Library and it gave good results compared to the recent optimization methods. |
Keywords: |
Hunting Search; Traveling Salesman Problem; Combinatorial Optimization;
Meta-heuristic; |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
SOFT SWITCHING MODEL OF INTERLEAVED BUCK CONVERTER |
Author: |
R. PREMALATHA, Dr. P. MURUGESAN |
Abstract: |
This paper presents the modeling and simulation of interleaved buck converter
(IBC) with open and closed loop operation having low switching losses of ripple
with 0.012 and improved step-down conversion ratio, which is suitable for the
application where the input voltage is high. As Cuk, Sepic and Zeta converters
the two active switches are connected in series and a coupling capacitor is
employed in the power path. The proposed IBC shows the voltage stress across all
active switches is half of the input voltage before turn on or after turnoff.
The capacitive discharging and switching losses can be reduced considerably to
have higher efficiency, higher step-down conversion ratio, higher switching
frequency and a smaller output ripple compared with a conventional IBC. The
model of Interleaved buck converter system are presented. |
Keywords: |
Active Switch; Coupling Capacitor; Interleaved Buck converter; Phase Shift;
Soft-switching; Zero voltage switching |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
Title: |
IMAGE RECOGNITION BASED ON SIMILARITY OF CURVE CHARACTERISTICS INVARIANT TO
TRANSLATION |
Author: |
DINA INDARTI, SARIFUDDIN MADENDA, TUBAGUS MAULANA KUSUMA, DEWI AGUSHINTA R |
Abstract: |
Objects similarity are required in image recognition, such as in quality control
problems. Characteristics of objects in an image are represented by the
characteristics of the detected edges. Curve is one of the detected edge beside
point, line, and region. Curve provides geometric and structural information of
the image. It gives better information than point. The existing research related
to the similarity of curve characteristic are still facing problems associated
with invariant to geometric transformations. Therefore, this research discusses
how to use the characteristics of curve, so that the curve similarity can be
invariant to translation. In using the characteristics of curve, the first step
is curves tracking using 8 (eight) directions chain codes. Furthermore, the
algorithms to determine the type of curve and to determine the similarity
between curves which invariant to translation are explained. The definition of
curve itself was used in determining the types of curves. The similarity of
curves is determined based on the characteristics of curves. This proposed image
recognition algorithm can detect similar image while geometric translation is
occurred. |
Keywords: |
Curve Characteristic, Geometric Transformations, Image Recognition, Image
Similarity, Translation |
Source: |
Journal of Theoretical and Applied Information Technology
10th April 2015 -- Vol. 74. No. 1 -- 2015 |
Full
Text |
|
|
|