|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2015 | Vol. 74 No.3 |
Title: |
MEASURING THE QUALITY OF E-SERVICES AND ITS IMPACT ON STUDENTS SATISFACTION AT
JORDANIAN UNIVERSITIES |
Author: |
HARETH ALSHAMAYLEH, RASHA ALJAAFREH, ALI ALJAAFREH, DARA ALBADAYNEH |
Abstract: |
This research aims at measuring the quality of E-Services and its impact on
student satisfaction at Jordanian universities. Toward this aim, a research
model was developed and tested within the context of Jordanian universities. A
questionnaire consisting of 40 (Likert) type items were distributed to a
convenience sample of 755 respondents. Primary data were collected from 703
students with a response rate of 90.7%. SPSS package was used to determine if
the quality of E-services dimensions (Website design, reliability, efficiency,
responsiveness, ease of use, availability and privacy) has an impact on
students’ satisfaction. The results show that all of the E-services dimensions
have an impact on students satisfaction expect for the dimension of ease of use.
In addition, the researchers present some recommendations for universities to
apply e-services quality dimensions through websites, and some suggestions for
future research. |
Keywords: |
Students Satisfaction, Electronic Services Quality, Jordanian Universities. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
KEY DETERMINANTS OF CUSTOMER SATISFACTION: EVIDENCE FROM MALAYSIA GROCERY STORES |
Author: |
MOHAMMED AL-ALI , NOR ERNE NAZIRA BAZIN , SITI MARYAM SHAMSUDDIN |
Abstract: |
Customer satisfaction is critical to retail success. Concentrating on customer
satisfaction has become a major goal in retailing industry, especially in
grocery retail. This work examines the key determinants of customer satisfaction
in grocery retailing and measure the link between store attributes and customer
satisfaction. In addition, it aims to find out the effect size of these
determinants on overall customer satisfaction in an emerging market, namely
Malaysia. For this purpose, an extensive dataset from 313 shoppers who had
carried out their purchase in different type of grocery stores has been
analyzed. Using Partial Least Squares-SEM (PLS-SEM) analysis method, we show
that three determinants (‘‘monetary value’’, ‘‘service and convenience’’, and
‘‘store quality image’’) have a direct impact on customer satisfaction. However,
the weight that each factor shows is different. Results may help managers of
grocery stores in Malaysia to develop and implement more successful relationship
marketing strategies. |
Keywords: |
Customer Satisfaction, Grocery Stores, Store Attributes, PLS-SEM |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
EFFICIENT TECHNIQUES FOR PREDICTING SUPPLIERS CHURN TENDENCY IN E-COMMERCE BASED
ON WEBSITE ACCESS DATA |
Author: |
VERONICA S. MOERTINI, NIKO IBRAHIM, LIONOV |
Abstract: |
Electronic supplier relationship management (e-SRM) is important in order to
maintain strong, long lasting and beneficial relationship between e-commerce
firms and their suppliers. One important function of e-SRM is to predict
suppliers who tend to churn such that early “treatment” can be given. In the
e-commerce systems that involve suppliers as the websites users, predicting
suppliers’ churn tendency can be based on analyzing their frequencies in
accessing the e-commerce websites.
Our proposed techniques include data warehouse design (supporting the data
collection and preprocessing) and unsupervised algorithms that analyze the
preprocessed bitmaps of time series data representing suppliers website access
from time to time. Having bitmaps as inputs, our proposed algorithms are
efficient (the time complexity is O(n)) as proven with our experiments. In
experimenting with real world data of an e-commerce system selling hotel rooms,
our techniques produce output of supplier segments where each segment has
certain churn level tendency and need specific treatment. |
Keywords: |
Churn Prediction In E-Commerce, Supplier Relationship Management, Web Usage
Mining |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
REVIEW OF QUALITY OF SERVICE IN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS |
Author: |
ABDULLAH BAMATRAF, MOHAMMAD SHAFIE BIN ABD LATIFF, YAHAYA COULIBALY, AHMAD M.
KHASAWNEH |
Abstract: |
Rapid innovative improvements in wireless communication technology have
revolutionized wireless sensor networks (WSNs). A WSN is comprised of
self-ruling sensors that are distributed spatially to monitor physical or
environmental conditions, such as temperature, sound, vibration, pressure,
motion, or pollutants, and to pass this information through the network to a
main area. Sensor nodes in wireless sensor networks experience the ill effects
of resource constraints, such as energy deficits, buffers, and bandwidth issues.
The expanding demand for real-time services in WSN applications means that
interest in quality of service (QoS)-based routing has risen. Offering
consistent QoS in sensor networks creates considerable challenges. In real time
applications, it is important to deliver data as soon as it is sensed. If the
network has multiple real and non-real-time applications, its ability to manage
them will be challenging due to different requirements. In this study, we
investigate QoS-based routing protocols for WSNs. Metrics of analysis are
end-to-end delay, congestion, energy efficiency, and reliability. The aim of the
study is to identify the limitations of relevant papers and show research
direction in routing. This will not only help new comers to the field of WSN but
also will ease the tasks of WSN researchers in developing appropriate routing
solutions for WSNs. |
Keywords: |
QoS, WSN, End-to-end Delay, Congestion, Energy Efficiency, Reliability,
Heterogeneity. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
INTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE
CLOUD STORAGE BACKUP |
Author: |
M.SHYAMALA DEVI, V.VIMAL KHANNA, M.SHAHEEN SHAH |
Abstract: |
Cloud Storage provides users with abundant storage space and make user friendly
for immediate data access. But there is a lack of analysis on optimizing cloud
storage for effective data access. With the development of storage and
technology, digital data has occupied more and more space. According to
statistics, 60% of digital data is redundant, and the data compression can only
eliminate intra-file redundancy. In order to solve these problems,
De-Duplication has been proposed. Many organizations have set up private cloud
storage with their unused resources for resource utilization. Since private
cloud storage has limited amount of hardware resources, they need to optimally
utilize the space to hold maximum data. In this paper, we are going to discuss
the flaws in the existing de-duplication methods and introduce new methods for
Data De-Duplication. Our proposed method namely Intensive Fixed Chunking (IFC)
De-duplication which is the enhanced File level de-duplication that provides
dynamic space optimization in private cloud storage backup as well as increase
the throughput and de-duplication efficiency |
Keywords: |
Cloud Computing, Private Storage Cloud, Cloud Backup, Data De-Duplication,
Chunking, Redundancy |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
MICROWAVE IMAGING FOR THE DETECTION AND LOCALIZATION OF BREAST CANCER USING
ARTIFICIAL NEURAL NETWORK |
Author: |
ABDELFETTAH MIRAOUI, LOTFI MERAD, SIDI 1MOHAMED MERIAH |
Abstract: |
Localization and Reconstruction of homogenous objects from electromagnetic
scattered fields have been shown to be of great importance, because of their
various applications in many areas such as medicine, biology, geophysics and
other sciences. In this paper, we propose a computational method for detection
and localization of the object for medical application (breast cancer). The
proposed technique is based on the use of artificial neural network ANN. A
spherical tumor was created and at arbitrary locations in a breast model using
an EM simulator. Bow-tie antennas were used to transmit and receive Ultra-Wide
Band (UWB) signals at 4GHz. A training and validation sets were constructed to
train and test the ANN. A very optimistic results have been observed for early
received signal components with the ANN model. Hence, the proposed model is very
potential for early tumor detection to save human lives in the future. |
Keywords: |
Microwave Imaging, Artificial Neural Network (ANN), Computer-Aided Diagnosis,
Breast Cancer. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN ASSESSING APPROACH BASED ON FMECA METHODOLOGY TO EVALUATE SECURITY OF A THIRD
PARTY CLOUD PROVIDER |
Author: |
Bentajer Ahmed, AbouElMehdi Karim, Dali Loubna, EL-Fezazi Said, Hedabou
Mustapha, El Amrani FatimaEzzahra |
Abstract: |
Cloud Computing is recognized as a great eliminator of the hefty costs and
complex processes that come with evaluating, purchasing, configuring or managing
software and hardware essentials that are necessary for enterprise applications.
However it presents a significant security concerns that need to be addressed
when moving to the cloud that should be well studied and quantified for more
visibility. In this article we will study how to quantify a risk associated with
a cloud service/deployment model and use FMECA methodology to audit a third
party cloud provider risks. |
Keywords: |
Trust Computing, Fmeca, Cloud Computing, Predictive Analysis, Confidentiality |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
PROPOSED IT FINANCIAL MANAGEMENT PROCESS USING ITIL (IT INFRASTRUCTURE LIBRARY)
FOR PORT COMPANY IN INDONESIA |
Author: |
DEDY RAHMAN WIJAYA |
Abstract: |
ASEAN Single Window (ASW) implementation ensures compatibility of Member States
National Single Windows (NSWs) with international open communication standards
while also ensuring that each of those Member States can then exchange data
securely and reliably with any trading partners that use international open
standards. Simpler and faster processing time, and a more transparent way of
doing business. In order to facing of ASW, Indonesian Port Companies have to
improve their services. Based on this fact, some Indonesia Port Companies try to
invest Information Technology to achieve their goals and improve
competitiveness. However, frequently processes related with IT investment do not
managed properly. Port Company in Indonesia often ignore linkage analysis
between IT investment, business objectives, and business impact. Therefore, the
value of IT service not been well defined. This work has raised this issue and
try to propose systematic approach for IT Financial Management process based on
ITIL best practice standard. Research case study in one of the largest
government-owned port company in Indonesia that implements Port Integrated IT
services. This work start with planning, analysis, and design to be produced
proposed IT Financial Management process. Business case analysis perform in
planning phase to make sure the IT investment related with business objectives
and has measurable impact. Assessment perform in analysis phase to measure the
IT Financial Management process readiness. Total Service Valuation (TSV) also
formulated to know the value of Port Integrated IT services. The last is design
phase which is defined complete procedures, role and responsibilities for IT
Financial Management process implementation. The result of this work is
systematic approach to implementation IT Financial Management process in
Indonesian Port Company. |
Keywords: |
IT Financial Management, ITIL, Port Company |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN ENHANCEMENT ALGORITHM USING GABOR FILTER FOR FINGERPRINT RECOGNITION |
Author: |
EINAS ALMARGHNI AZZOUBI, ROSZIATI BINT IBRAHIM |
Abstract: |
Fingerprint recognition is being widely applied in the personal identification
for the purpose of high degree of security by matching processes between two
human fingerprints. Many different techniques have been proposed to have a
satisfactory fingerprint identification. The widely used minutiae-based
representation does not utilize a significant component of the rich
discriminatory information available in the fingerprints. Local ridge structures
cannot be completely characterized by minutiae. Further, minutiae-based matching
has difficulty in quickly matching two fingerprint images containing different
numbers of unregistered minutiae points. We introduced an enhancement algorithm
using Gabor filter based matching to capture both local and global details in a
fingerprint as a compact fixed-length Fingercode. The improved filtering used to
feather extraction in our proposed algorithm with eight different directions.
The last step of our proposed algorithm is fingerprint matching, which is based
on the Euclidean Distance (ED) between the two corresponding Fingercodes. The
proposed algorithm can be personalized according to the value of Euclidean
Distance (ED) and threshold (TH). If the ED is less than TH or equal to zero, it
means that the two fingerprint images came from the same person. We compared our
proposed algorithm (enhanced) with algorithm (without enhanced). The values of
false acceptance rate (FAR), false reject rate (FRR) and equal error rate (EER)
are lower than the algorithm (without enhanced). Also, the result based on
proposed algorithm are also presented and based on the result, it gives higher
accuracy and recognition rate. |
Keywords: |
Fingerprint Recognition; Gabor Filter; Fingercode; Matching; Euclidean Distance |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
CARRIER BASED PWM TECHNIQUE FOR HARMONIC REDUCTION IN CASCADED MULTILEVEL
INVERTERS |
Author: |
S.LEELA, S.S.DASH |
Abstract: |
Cascaded multilevel inverters have received more attention due to their ability
to generate high quality output waveforms with low switching frequency. This
paper deals with a novel analysis of a carrier based PWM method for cascaded
multilevel inverters. Its effect on the harmonic spectrum is analysed. The
voltage source inverters are modelled and the same is used for simulation
studies. The effectiveness of the proposed control technique is verified by the
simulation results. The test results verify the effectiveness of the proposed
strategy in terms of computational efficiency as well as the capability of the
inverter to produce very low distorted voltage with low switching losses. |
Keywords: |
Carrier Based PWM technique, Cascaded Multilevel Inverter, Matlab Simulink,
Total Harmonic Distortion. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
PORTFOLIO SELECTION USING THE CAT SWARM OPTIMIZATION |
Author: |
HAMZA KAMILI, MOHAMMED ESSAID RIFFI |
Abstract: |
The portfolio selection is a discipline in finance interested in the
optimization of the investment represented by a mixed quadratic programming
problem. The approach of this paper to studying the portfolio selection problem
is the implementation of the metaheuristic cat swarm optimization , a method
inspired from the behavior of different felines and characterized by two modes:
the seeking and the tracing mode; the seeking mode is when a cat is at rest
observing its environment ,the tracing mode is when the cat is hunting. In this
article, we have adapted this method to the cardinality constrained efficient
frontier (CCEF) compared to the data of mean return and risk obtained by the
unconstrained efficient frontier (UEF) for five indexes markets and we have
obtained efficient results. |
Keywords: |
Portfolio Selection Problem, Metaheuristic, Cat Swarm Optimization , Efficient
Frontier, Cardinality Constrained Efficient Frontier. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
NEW ARCHITECTURE OF IDS BASED INTERACTION ON MOBILE AGENTS AND DATA MINING |
Author: |
CHAIMAE SAADI , RACHID CHERKAOUI , HABIBA CHAOUI, HASSAN ERGUIG |
Abstract: |
Intrusion detection system (IDS) is a very useful tool for the defence of a
network against attacks. Nowadays, intruders use a complex attacks towards a
target. This make the IDS unable to detect all intrusions and the latter
generate two frequent false alarms. The purpose of this paper is to propose a
new architecture of an IDS allowing to increase the rate of intrusion detection
and to minimize the false positive rate. The proposed architecture is based on
mobile agents and data mining algorithms. |
Keywords: |
Intrusion, Intrusion Detection System, Mobile Agent, Data Mining Algorithms. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
IDFP-TREE: AN EFFICIENT TREE FOR INTERACTIVE MINING OF FREQUENT SUBGRAPH
PATTERNS |
Author: |
MOHAMMAD H. NADIMI-SHAHRAKI, MARYAM TAKI, MOHAMMAD NADERI |
Abstract: |
Recently, knowledge extraction from transactional graph databases by mining
frequent subgraph patterns has become an interesting research topic. One of the
important challenges in this topic is the situation called interactive mining in
which the minimum support threshold can be frequently changed to find proper
frequent subgraph patterns. Obviously, running the mining method from scratch is
very costly. Therefore, in this paper, an efficient tree called IDFP-tree is
proposed to develop our previous two-layer model for interactive mining of
frequent subgraph patterns from transactional graph databases. The proposed tree
constructs the mining model separated from the mining process. Thus, when the
minimum support threshold is changed, there is no need to reconstruct the mining
model, and only the mining process must be rerun. The experimental results show
when the mining model is constructed by IDFP-tree, it can be frequently used and
the total runtime of interactive mining of frequent subgraph patterns can be
reduced. |
Keywords: |
Interactive Mining, Graph Mining, Transactional Graph, Frequent Subgraph Pattern |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
Title: |
A LOW POWER PHASE FREQUENCY DETECTOR FOR DELAY-LOCKED LOOP |
Author: |
LAU WENG LOON, MAMUN BIN IBNE REAZ, KHAIRUN NISA’ MINHAD, NOORFAZILA KAMAL, WAN
MIMI DIYANA WAN ZAKI |
Abstract: |
High performance phase frequency detector (PFD) is one of the key modules in
high speed delay-locked loop (DLL). The operation of DLL depends on the
performance of its detector. The demand for the reduction of power dissipation
in CMOS design is a challenge in order to optimize circuit power consumption. A
low power dynamic pseudo-PMOS PFD is proposed to make DLL system more reliable.
In this work NOR gate of typical TSPC PFD is replaced with a low power
dissipation pseudo-PMOS AND gate built of 3 PMOS transistors. Pseudo-PMOS AND
integrated into proposed TSPC PFD to run maximum frequency at 1G Hz with 1.8 V
input power supply. This proposed PFD has been implemented in Mentor Graphics
0.18 μm CMOS process technology and consumed 163.36 µm2 active layout area with
206 nW total power dissipation will further trim down the total cost of the DLL. |
Keywords: |
DLL, Dynamic PFD, Low Power PFD, Low Noise PFD, Pseudo-PMOS |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2015 -- Vol. 74. No. 3 -- 2015 |
Full
Text |
|
|
|