|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2015 | Vol. 71 No.1 |
Title: |
ENHANCEMENT OF AES ALGORITHM BASED ON CHAOTIC MAPS AND SHIFT OPERATION FOR IMAGE
ENCRYPTION |
Author: |
ALI ABDULGADER, MAHAMOD ISMAIL, NASHARUDDIN ZAINAL, TARIK IDBEAA |
Abstract: |
With the rapid development of the Internet and communication networks, the
confidentiality of digital images transmitted over public networks must be
preserved by using encryption techniques. Advanced Encryption Standard (AES) is
one of the most commonly used encryption algorithms at present. Although AES has
several advantages, such as security in data encryption, it also has a number of
drawbacks, such as high computations, pattern problems when used for encrypting
images, and fixed S-box weak points. This paper proposes a method that overcomes
the fixed S-box weak points and improves the performance of AES when used for
encrypting images, particularly when the image data are large. In addition, the
MixColumn stage is replaced by chaotic mapping and XOR operation to reduce the
high computations in MixColumn transform. The proposed method is tested on
several images, and the results show that the proposed method efficiently
generated cipher images with very low correlation coefficients of adjacent
pixels and provided better encryption speed and high security as a result of the
dependence of the S-box on the key characteristics of the chaotic system. |
Keywords: |
AES, S-Box, Cyclic Shifting Operation, Inverse S-Box, Round Key, Chaotic Map. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
HIGH PERFORMANCE GAMELAN ANALYZER USING ADAPTIVE WAVEFORM PATTERN MATCHING |
Author: |
YOYON K. SUPRAPTO, VINCENTIUS E. PRADHANA |
Abstract: |
Exploration of the eastern music such as gamelan is very rare, so its
development is far lagged to western music. Estimation of fundamental
frequencies and estimation of the envelope are needed to determine the
performance of traditional music instrument. We applied Waveform Adaptive
Pattern Matching (WAPM) to estimate fundamental frequency which is detected with
limited frequency band.The fundamental frequency is estimated by very short
recorded gamelan music signal of 45 ms, with accuracy of 0.25 Hz. Besides the
fundamental frequency estimation, the invention is useful gamelan tuning the
signal envelope.
This method is implemented in Android applications to analyze a signal gamelan,
thus enhance the portability of the application. |
Keywords: |
Gamelan Music, Fundamental Frequency, Waveform Adaptive Pattern Matching,
Minimum Absolute Error, Android. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
SECURITY POLICIES MATCHING THROUGH ONTOLOGIES ALIGNMENT TO SUPPORT SECURITY
EXPERTS |
Author: |
OTHMAN BENAMMAR, HICHAM ELASRI, MOSTAFA JEBBAR and ABDERRAHIM SEKKAKI |
Abstract: |
The management of security policies has become increasingly difficult for the
security expert given the number of domains to manage their extent and their
complexity. A security expert has to deal with a variety of frameworks, with
different language specifications, formalization and aspect used in domains that
may belong to any Cloud Computing or Distributed Systems. This wealth of
frameworks and languages make the management task and the interpretation of the
security policies so hardly difficult. Each approach provides its own conflict
management method or tool, the security expert will be forced to manage all
these tools, which makes the field maintenance and time consuming expensive. In
order to hide this complexity and to facilitate and automate some security
expert’s tasks, we propose a security policies aligning based on ontologies
process; this process enables to detect and resolve security policies conflicts
and to support security experts in managing tasks. |
Keywords: |
Security-Based Policy; Security Management; Ontology Alignment; Ontology
Enrichment; Conflicts Resolution Method. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
A COMPREHENSIVE REVIEW OF THE MULTI-SENSOR DATA FUSION ARCHITECTURES |
Author: |
EHSAN AZIMIRAD, JAVAD HADDADNIA, ALI IZADIPOUR |
Abstract: |
With the development of computer science and hardware implementation
instrumentation in various areas of industry, more and more diverse data have
become available. Multi-sensor Data fusion is a technology that contains the
combining and analysis of data and information from multiple sensors in order to
form a more accurate situation awareness and determine how to respond to it.
Data fusion technologies emerged in various military and non-military
applications such as battlefield surveillance, guidance and control of
autonomous vehicles, monitoring of complex machinery, medical diagnosis, and
smart buildings. Applications for multi-sensor data fusion are widespread, thus
a common (universal or unique) data fusion implementation framework isn't
possible and unique data fusion architecture don’t recommended in diverse areas
of applications. This paper present a comprehensive review of data fusion
architecture, and exploring its conceptualizations, benefits, and challenging
aspects, as well as existing architectures. |
Keywords: |
Fusing data, target tracking, data fusion architectures, data fusion framework |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
VISUALLY LOSSLESS LEVEL VIDEO QUALITY ASSESSMENT: NRDPF-VQA |
Author: |
SUBRAHMANYAM.CH, Dr.D.VENKATA RAO, Dr. N.USHA RANI |
Abstract: |
In this paper, we proposed No-Reference subjective video quality assessment
based on NRDPF-VQA metric and classification based metric are tested using
MPEG-2, H.264/AVC, wireless, IP. We plot the Spearman’s Rank Order Correlation
Coefficient (SROCC) between each of these features and human DMOS from the LIVE
VQA database to ascertain how well the features correlate with human judgement
quality especially for H.264.The results of 2-Alternative Forced Choice (2-AFC)
are verified with reference to visually lossless level at a bit rate of 0.5
Mbps, 0.62 Mbps, 0.77 Mbps, 0.95 Mbps, 1.18 Mbps, 1.46 Mbps, 1.81 Mbps, 1.46
Mbps, 1.81Mbps and 2.25 Mbps. The videos are recorded in YUV420 format. |
Keywords: |
No Reference, NRDPF-VQA, H.264, SROCC, DMO, YUV420 |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
APPLYING ISHIKAWA APPROACH FOR MODELING ERP RISKS-EFFECTS |
Author: |
ZAITAR YOUSSEF, OUZARF MOHAMED |
Abstract: |
Implementation of Enterprise Resource Planning systems (ERP) presents many risks
and often severe effects, which must be identified and analyzed. This work shows
how Ishikawa approach can be used to model risk factors and their effects on ERP
projects, on the one hand and on the organization, on the other. A real case
study regarding three large companies and involving a panel of experts and
practitioners is presented to illustrate application of the method .We can
present this research according to the following general question: What are the
probable risks of ERP projects and their effects on the project and on the
organization? |
Keywords: |
ERP, Risks Management, Risks Assessment, Effects, Ishikawa |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
SUPPLIER RELATIONSHIP MANAGEMENT MODEL FOR SME’S E-COMMERCE TRANSACTION BROKER
CASE STUDY: HOTEL ROOMS PROVIDER |
Author: |
NIKO IBRAHIM, VERONICA S. MOERTINI, VERLIYANTINA |
Abstract: |
As market intermediaries, e-commerce transaction broker firms need to strongly
collaborate with suppliers in order to develop brands seek by customers.
Developing suitable electronic Supplier Relationship Management (e-SRM) system
is the solution to this need. In this paper, we propose our concept of e-SRM for
transaction brokers owned by small medium enterprises (SMEs), which includes the
integrated e-SRM and e-CRM architecture, as well as the e-SRM applications and
their features. We then discuss the customization and implementation of the
proposed e-SRM model in a specific transaction broker selling hotel rooms, which
owned by an SME, KlikHotel.com. The implementation of the e-SRM in KlikHotel.com
has been successfully boosting the number of suppliers (hotel members) and hotel
room sales. |
Keywords: |
e-CRM, e-SRM, SME, Transaction Broker |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
TOWARDS A MULTI-AGENTS SYSTEMS APPLICATION BASED ON THE EAS-SGR FRAMEWORK |
Author: |
HAJAR IGUER, HICHAM MEDROMI, ADIL SAYOUTI, SOUKAINA ELHASNAOUI, SOPHIA FARIS |
Abstract: |
Information has always been in the heart of every organization. During its
exchange this information can be altered or modified. It is also considered as a
key element for the development of many businesses. In this context, we have the
obligation to protect it and secure it. In fact, it can’t be protected without
the use of frameworks and effective tools for risk management. Many industrial
companies have chosen to put out in the market solutions that feed the need of
IT managers. Our proposed framework EAS-SGR (Équipe Architecture des Systèmes-
Systèmes de Gestion de Risque) was created to use the advantages of the panel of
solutions that exists in the marketplace and designs a new system by using
multi-agents system which will bring the intelligence to our application and to
address risks from different angles and in different departments of the
organization. |
Keywords: |
Multi-agent system, EAS-SGR Model, Risk Management, IT Governance, ISO 27005. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
COMPARISON OF IMAGE CLASSIFICATION TECHNIQUES USING CALTECH 101 DATASET |
Author: |
NUR SHAZWANI KAMARUDIN, MOKHAIRI MAKHTAR, , SYED ABDULLAH FADZLI, MUMTAZIMAH
MOHAMAD, FATMA SUSILAWATI MOHAMAD, MOHD FADZIL ABDUL KADIR |
Abstract: |
This paper presents the technique for the classification of single object
images. First, this paper aims to introduce the efficient technique in order to
classify single object image. Second, each single methods uses in order to
propose the techniques were elaborated in this paper. It start from image
segmentation, object identification, feature extraction, feature selection and
classification. Finally, the best classifier that can provide the best results
were identified. The efficiency of the proposed method is define by comparing
the result of classification using two different datasets from author’s previous
paper. The obligation for development of image classification has been improved
due to remarkable growth in volume of images, as well as the widespread
application in multiple fields. This paper explores the process of classifying
images by the categories of object in the case of a large number of object
categories. The use of a set of features to describe 2D shapes in low-level
images has been proposed. The proposed technique aims a short and simple way to
extract shape description before classifying the image. Using the Caltech 101
object recognition benchmark, classification was tested using four different
classifiers; BayesNet, NaiveBayesUpdateable, Random Tree and IBk. Estimated
accuracy was in the range from 58% to 99% (using 10-cross validation). By
comparing with Amazon data, it is proved that the proposed model is more
suitable for single object image. Amazon images give higher accuracy with the
range from 80% to 99.48%. |
Keywords: |
Image Classification, Feature Extraction, Feature Selection, Classifier. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
IMAGE SEGMENTATION METHODS AND EDGE DETECTION: AN APPLICATION TO KNEE JOINT
ARTICULAR CARTILAGE EDGE DETECTION |
Author: |
NADEEM MAHMOOD, ASADULLAH SHAH, AHMAD WAQAS, ADAMU ABUBAKAR, SHAFIA KAMRAN, SYED
BAQAR ZAIDI |
Abstract: |
Image segmentation is the process of partitioning a digital image into multiple
segments and regions for further processing. Edge detection methods are widely
used in the area of image processing for feature detection and extraction. In
this paper we use human’s Knee MRI (Magnetic resonance imaging) images of
patients and applied various image segmentation and edge detection methods for
knee cartilage visualization. Also this paper focuses on providing an overview
of important concepts, methods and algorithms commonly used for image
segmentation and edge detection with focus on knee joint articular cartilage
image segmentation and visualization. |
Keywords: |
Image Segmentation, Feature Deduction, Feature Extraction, Edge Detection,
Cartilage Visualization |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
HIGH PERFORMANCE IMPLEMENTATION OF RSSI BASED WI-FI LOCATION TRACKER FOR ANDROID
APPLICATIONS |
Author: |
S.A. YUVARAJ, and Dr.L.C.SIDDANNA GOWD |
Abstract: |
Wi-Fi-based positioning system (WPS) is used where GPS is inadequate due to
various causes including multipath and signal blockage indoors. Such systems
include indoor positioning systems. The advantage of choosing Wi-Fi for a
location based service is its high compatibility and frequency of availability.
The majority of today’s smart phones also have Wi-Fi connectivity. Newer
revisions of Wi-Fi broadcast at the 2.4 GHz frequency, allowing for signals to
more easily travel through obstructions like doors and walls. Unlike other
wireless technologies such as Bluetooth, Wi-Fi incorporates signal strength
functions into all the firmware drivers and Application Programming Interfaces
(APIs) which are defined by the manufacturers and backed by IEEE.2 This feature
will provide a large benefit when using Wi-Fi to determine a location based on
signal strength triangulation. The localization technique used for positioning
with wireless access points is based on measuring the intensity of the received
signal strength (RSSI). Typical parameters useful to geo-locating the Wi-Fi
hotspot or wireless access point include the SSID and the MAC address of the
access point. The accuracy depends on the number of positions that have been
entered into the database. The possible signal fluctuations that may occur can
increase errors and inaccuracies in the path of the user. To minimize
fluctuations in the received signal, there are certain techniques that can be
applied to filter the noise. The Mobile Nodes will have featured Wi-Fi
capabilities and the processing power to deliver accurate results. The Nodes
will scan all known access points that in range and determine the signal
strength in dBm (or dBmW) and get there respective MAC address. The access
point’s MAC address is compared against a database of known access point
locations. All of the quantified location coordinates are saved and the location
of the each Node is obtained. The more available access points, the more
accurate the location reading will be. We are using only 3 access points to
obtain the (x,y) coordinate values/location of the mobile device. The calculated
position will be displayed in graphical format. |
Keywords: |
Wi-Fi based positioning Systems, IEEE.2, Wi-Fi, API |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
QUALITY ANALYSIS OF LOCAL GOVERNMENT WEBSITES IN INDONESIA |
Author: |
TB. M. YUSUF KHUDRI, DWI MARTANI, TEGUH I. MAULANA |
Abstract: |
This research aims to analyze design quality of local government’s website and
its statistics. Design quality is determined by several prior studies and this
research employed population data of local government websites in Indonesia
based on direct observation during May 2013. Analysis was done descriptively and
inferentially which shown that there are some variations among local governments
in Indonesia regarded its website’s quality. But in general, unsatisfaction
results are found in most of websites. In other hand, low visit to the websites
indicates that any possibility of low awareness from users of information about
condition and governmental activities in their area. Moreover we found that own
local revenue as well as governmental size are among important factors that
influencing design quality of local government’s website in Indonesia. |
Keywords: |
Local, Government, Website Design, Indonesia, Website Quality |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
RECOGNITION OF HUMAN ACTIVITIES FROM STILL IMAGE USING NOVEL CLASSIFIER |
Author: |
GHAZALI SULONG , AMMAR MOHAMMEDALI |
Abstract: |
The quest for recognizing human activities and categorizing their features from
still images using efficient and accurate classifier is never ending. This is
more challenging than extracting information from video due to the absence of
any prior knowledge resembling frames stream. Human Activities Recognition (HAR)
refers to computer identification of specific activities to aid understanding of
human behaviors in diversified applications such as surveillance cameras,
security systems and automotive industry. We developed a novel model for
classifier and used it in three main stages including preprocessing (foreground
extraction), segmentation (background subtraction) to extract useful features
from object and sort out these features by the classifier (classification). The
model is further simulated using MATLAB programming. Our new classifier
generates slightly different results for still image based on dataset INRIA and
KTH for 780 images of (64*128) pixels format obtained from literature. The
recognition rate of 86.2% for five activities such as running, walking, jumping,
standing and sitting achieved by us is highly promising compared to the existing
one of 85% over last decade. |
Keywords: |
Human Activities Recognition, Still Image, Segmentation, Features Extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
IT GOVERNANCE SELF ASSESSMENT APPLICATION FOR E-GOVERNMENT IMPLEMENTATION IN
INDONESIA |
Author: |
JOHAN J.C. TAMBOTOH, RUDI LATUPERISSA |
Abstract: |
Information Technology (IT) implementation in the government sector in Indonesia
continues to increase every year. However, this increase has not been followed
by good governance due to the lack of attention to good IT management.
Measurement of IT governance is therefore required as a basis for the continuous
improvement of the IT services to government agencies. This study is aimed at
producing an application to measure the maturity level of IT governance in
government institutions, thus facilitating the process of improvement of IT
services. The application developed is based on COBIT 4.1 framework and the
design used is Unified Modeling Language. Through stages of information systems
development, this research results in an applications for measuring the maturity
level of IT governance that can be used by government agencies in assessing
existing IT governance. |
Keywords: |
Information Technology Governance, IT Governance Maturity Level, COBIT 4.1 |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
A MULTI-SWARM PARTICLE SWARM OPTIMIZATION WITH LOCAL SEARCH ON MULTI-ROBOT
SEARCH SYSTEM |
Author: |
BAHAREH NAKISA, MOHAMMAD NAIM RASTGOO, MOHAMMAD FAIDZUL NASRUDIN, MOHD ZAKREE
AHMAD NAZRI |
Abstract: |
This paper proposes a method based on the Multi-Swarm Particle Swarm
Optimization (PSO) with Local Search on the multi-robot search system to find a
given target in a Complex environment that contains static obstacles. This
method by applying Multi-Swarm with Multi-Best particles on the multi-robot
system can overcome the premature convergence problem, which is one of the main
problems of Basic PSO. As the time progress the global searching of the
algorithm decrease and therefore the robots tend to get group together in the
small-explored region that called Premature Convergence and cannot reach the
target. By combining the Local Search method with Multi-Swarm, We can guarantee
the global convergence of this proposed algorithm and the robots can reach the
target. The Experimental results obtained in a simulated environment show that
biological and sociological inspiration could be useful to meet the challenges
of robotic applications that can be described as optimization problems. |
Keywords: |
Particle Swarm Optimization; Multi-Swarm And Multi-Best PSO; Premature
Convergence, Exploration And Exploitation. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
PATTERN-BASED SYSTEM TO DETECT THE ADVERSE DRUG EFFECT SENTENCES IN MEDICAL CASE
REPORTS |
Author: |
SAFAA ELTYEB , NAOMIE SALIM |
Abstract: |
The detection of adverse drug effect sentences in medical text reduces the
efforts required for the manual task of drug safety monitoring by decreasing the
number of reports which need to be investigated by drug safety experts. Moreover
it helps in compiling a highly accurate and machine-understandable drug related
adverse effects knowledge bases which can support pharmacovigilance research and
aids computational approaches for drugs repurposing. In this study, we proposed
a pattern-based method to detect the sentences containing drug-adverse effect
causal relation from medical case reports.
A set of 500 full abstracts from Medline medical case reports containing 988
adverse drug effect sentences from ADE corpus were used to evaluate the
sentences detection task. Our method combined an outcome of a concept
recognition system with a method for automatic generation of numerous patterns.
Our method achieved recall of 72.8, precision of 93.6 and F-Score of 81.7 % in
the adverse drug effect sentences detection task .
The results of this study can help database curators in compiling medical
databases and researchers to digest the huge amount of textual information which
is growing rapidly. Moreover, the mining algorithms developed in this study can
be employed to detect sentences contain new associations between other medical
entities in medical text. |
Keywords: |
Drug, Adverse effect, pattern-based, Relation extraction, Medical case reports |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
Title: |
DOES EFFICIENT FUZZY KOHONEN CLUSTERING NETWORK ALGORITHM REALLY IMPROVES
CLUSTERING DATA RESULT? |
Author: |
EDY IRWANSYAH, MUHAMMAD FAISAL, ANNISAA PRIMADINI |
Abstract: |
In this research, Fuzzy Kohonen Clustering Network (FKCN) algorithm is compared
to Efficient Fuzzy Kohonen Clustering Network (EFKCN) algorithm. This research
is conducted to see if EFKCN is really efficient and could do a better
clustering analysis than original FKCN. We do empirical testing and simulations
to compare both algorithms, by using an expanded Fisher’s Iris Data. The result
showed the accuracy of EFKCN is not yet better algorithm rather than FKCN. |
Keywords: |
Artificial Neural Network, Clustering Analysis, Fuzzy Kohonen Clustering
Network, Kohonen Network, Self-orginizing Map, |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2015 -- Vol. 71. No. 1 -- 2015 |
Full
Text |
|
|
|