|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2015 | Vol. 71 No.2 |
Title: |
CYBER SECURITY FOR CYBER PHYSCIAL SYSTEMS: A TRUST-BASED APPROACH |
Author: |
SAQIB ALI, RAJA WASEEM ANWAR, OMAR KHADEER HUSSAIN |
Abstract: |
Cyber- Physical Systems (CPS) consist of a combination of different embedded
subsystems, which work independently of each other and also interact with the
external environment. Such embedded systems operate in the presence of inherent
uncertainty, context dependencies and adversarial certainty arising from both
the cyber and physical worlds. Security is one of the key concepts to shield the
CPS environment and different embedding devices in order to have a reliable and
secure communication platform. There are many security approaches and methods
proposed and implemented globally in order to secure CPS, along with areas such
as social engineering, security standards, vendor control, as well as access
control implementation, etc. However, in addition to these areas, another
important concept, namely trust, is significant in ensuring secure and reliable
communications in CPS. In the current state-of-the-art, none of the existing
approaches discusses the issue of a secure, trust-based CPS. Thus, to address
this shortcoming, in this paper, a two-tier blanket approach is proposed
consisting of internal and external layers of trust among different entities to
create reliable and secure CPS. This trust-based framework improves the
confidence of secure entities joining the CPS system and also builds
relationships among entities, thereby increasing the security protecting the
formed CPS from outside threats and attacks. |
Keywords: |
Cyber-Physical Systems, Trust, Security, SCADA, Embedded Systems |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
EXPERIMENTAL EVALUATION OF TCP CONGESTION CONTORL MECHANISMS IN SHORT AND LONG
DISTANCE NETWORKS |
Author: |
Mudassar Ahmad, Md Asri Ngadi, Mohd Murtadha Mohamad |
Abstract: |
Originally TCP was designed for early, low bandwidth, short distance networks,
so Standard TCP did not utilize the maximum bandwidth in today’s high bandwidth
network environments. Therefore a lot of TCP congestion control mechanisms also
known as TCP variants have been developed for today’s long distance high
bandwidth networks. In this paper the experimental results evaluating the
performance of TCP Reno, HighSpeed TCP, BIC TCP, TCP CUBIC and Compound TCP in
short and long distance high bandwidth networks are presented. Results show that
TCP CUBIC shows the highest performance in goodput whereas TCP Compound shows
the highest performance in protocol fairness and TCP friendliness as compared to
the other stat of the art congestion control mechanisms. |
Keywords: |
Congestion Control Mechanism, Protocol Fairness, TCP Friendliness,
Goodputs. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
INFORMATION AND COMMUNICATION TECHNOLOGIES ROLE IN DEVELOPING ELECTRONIC
LIBRARIES AND INFORMATION CENTERS |
Author: |
ZOHAIR MALKI |
Abstract: |
The researcher in his study addresses - after the systematic introduction -
three key aspects; first information and communication technologies position
within the knowledge society among its components and tools, second examples of
some Arabic and foreign countries (Egypt – Saudi Arabia) seeking the advantages
of information and communication technologies to build a knowledge society, and
finally concentrating on how information and communication technologies can
revolutionize libraries and information centers services with results and
recommendations. |
Keywords: |
Information technologies, Knowledge society ,ICT in Saudi Arabia , ICT in
Egypt , IT Tech. , Communications Tech. , Imaging and Printing Tech. ,
Information Professionals. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
RISK ASSESSMENT OF IT GOVERNANCE: A SYSTEMATIC LITERATURE REVIEW |
Author: |
NORAINI CHE PA, BOKOLO ANTHONY JNR, ROZI NOR HAIZAN NOR, MASRAH AZRIFAH AZMI
MURAD |
Abstract: |
Risk assessment (RA) is one of the main activities in risk management of IT
governance. Basically, IT governance is a process or a procedure that involves
evaluating and directing the plans for the use of ICT to support the
organization and monitoring the achievement of these plans. The risks that may
emerge during the implementation of IT governance must be properly assessed to
ensure its success. In general, risk assessment in IT governance is focusing on
the essential process to aid all relevant parties involved in IT implementation
from both the technical and services aspects. Many studies related to IT risk
assessment and risk assessments of IT governance have been reviewed based on a
systematic method which is called Systematic Literature Review (SLR). Based on
this approach, all previous studies related to this title can be analyzed
systematically. Based on the same framework, this paper presents the results of
the systematic reviews on the concept, process, framework, model and challenges
of risk assessment of IT governance. In general, the findings from this review
indicate that RA requires a more holistic consideration on numerous limitations
and issues. |
Keywords: |
Risk Assessment, IT Governance, Systematic Literature Review. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
HYBRID STATISTICAL RULE-BASED CLASSIFIER FOR ARABIC TEXT MINING |
Author: |
ABDULLAH S. GHAREB, ABDUL RAZAK HAMDAN, AZURALIZA ABU BAKAR, MOHD RIDZWAN YAAKUB |
Abstract: |
Text categorization is one of key technology for organizing digital dataset. The
Naiv Bayes (NB) is popular categorization method due its efficiency and less
time complexity, and the Associative Classification (AC) approach has the
capability to produces classifier rival to those learned by traditional
categorization techniques. However, the independence assumption for text
features and the omission of feature frequencies in NB method violates its
performance when the selected features are not highly correlated to text
categories. Likewise, the lack of useful discovery and usage of categorization
rules is the major problem of AC and its performance is declined with large set
of rules. This paper proposed a hybrid categorization method for Arabic text
mining that combines the merits of statistical classifier (NB) and rule based
classifier (AC) in one framework and tried to overcome their limitations. In the
first stage, the useful categorization rules are discovered using AC approach
and ensure that associated features are highly correlated to their categories.
In the second stage, the NB is utilized at the back end of discovery process and
takes the discovered rules, concatenates the associated features for each
category and classifies texts based on the statistical information of associated
features. The proposed method was evaluated on three Arabic text datasets with
multiple categories with and without feature selection methods. The experimental
results showed that the hybrid method outperforms AC individually with/without
feature selection methods and it is better than NB in few cases only with some
feature selection methods when the selected feature subset was small. |
Keywords: |
Text Categorization, Naïve Bayes, Associative Classification, Hybrid
Categorization Method, Feature Selection. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
A NEW ADAPTIVE THROUGHPUT POLICY ALGORITHM ON CAMPUS IP-BASED NETWORK INTERNET
TRAFFIC |
Author: |
MURIZAH KASSIM, MAHAMOD ISMAIL, MAT IKRAM YUSOF |
Abstract: |
This paper presents the development of a new scheme called Adaptive Throughput
Policy (ATP) algorithm to control internet inbound throughput utilization in an
IP-based network by considering traffic flows and their processing times. Real
live inbound internet traffics collected from a Campus Network with Committed
Access Rate (CAR) of 16 Mbps bandwidth allocations to internal users are
analyzed. New mathematical model with identified parameters are derived and
policies are simulated using Token Bucket theory control mechanism. Three main
policies conditions called P1 which is controlled on 5% under threshold, P2
which is controlled on threshold rate and P3 which is controlled beyond 10%
threshold are defined as filtered condition. ATP simulation evaluated throughput
performance on the real live internet traffic. Result present achievement in
throughput performance which includes Bucket Capacity, Bandwidth Saving and
Processing Time for daily and weekly traffics. The findings show that ATP
algorithm resulted in higher bandwidth saving and faster traffic process time in
particular during under threshold (P1). Burst throughput are managed to control
according to identified implement policies in the development system. |
Keywords: |
Policy, Throughput, Internet Traffic, Algorithm, Model, Bandwidth
Management, IP-based Network. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
ENERGY EFFICIENT NODE DISJOINT MULTIPATH ROUTING TO IMPROVE WIRELESS SENSOR
NETWORK LIFETIME |
Author: |
ABDULALEEM ALI ALMAZROI, MA NGADI |
Abstract: |
Some of the major challenges confronting wireless sensor networks are usually
associated with scarcity of energy and resource limitations. In order to achieve
efficient utilization of energy and increase the operational lifetime of the
wireless sensor network while at the same time providing consistent packets
delivery, energy efficient node disjoint multipath routing was recommended. In
our method the node-disjoint multiple paths are discovered from the source node
to the sink node. We make efficient utilization of the network paths by
intelligently elect the most suitable paths for packet transmissions based on
path cost calculation. The path cost calculation considers the number of hops,
minimum energy node in the path and latency rate, As a result the best paths
will select based on latest path cost. The structure of the control messages
were shown in different categories. The fragmentation of data packets on
node-disjoint multipath were also set-up through the network. Results through
simulations investigated explains how EENDM accomplished better outcomes than DD
and also N-1 multipath routing technique when compared with the benchmarks
lifetime of network, control message overhead, consumption of energy node,
Packet delivery ratio, and average packet delay. |
Keywords: |
Wireless Sensor Networks, Multipath Routing, Energy Efficient, Node
Disjoint |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
SPEED SYNCHRONIZATION OF SOFT SWITCH GEAR TRANSMISION FOR HYBRID CAR BASED ON
PID FUZZY SELF-TUNING |
Author: |
DEDID CAHYA HAPPYANTO |
Abstract: |
Hybrid car on the drive system used in the study are two types of driving three
phase induction motors and the Internal Combustion Engine (ICE) as a backup
drive. On the second drive system is required movement drive transmission soft
transition during the both movement of the drive. Therefore, techniques are
required to control the electronic switch gear in the car drive transmission
equipment. The control technique used is the PID Fuzzy control to synchronize
the speed of the both the rotation speed driver, so that the resulting movement
of the soft transmission electronic switch gear in the transmission. This step
is done by setting the rotation speed of the ICE as a master and motor rotation
speed as a slave, because the electric motor setup easier than setting ICE, so
that adjusts the transmission shift is the speed of the electric motor. At the
time of transfer will be an adjustment speed transmission electric motor and
speed the ICE, then when synchronization is achieved with PID Fuzzy control
techniques with modeling algorithms then proceed to shift the transmission.
Prime mover is an electric motor car, but when the battery power is weak then
the mover will make the shift the transmission into drive ICE. During Mover ICE
work going through the generator will be charging current to the battery is
fully charged then moved again to the transmission of electric motor drive, and
so on. To get a better sync speed both mover speed then using the PID Fuzzy
Self-Tuning control technique. The results show that the control PID Fuzzy
appropriate when applied to the hybrid car because it has fast response and good
autotuning on any change of mover car speed. |
Keywords: |
Three-Phase Induction Motors, Pid Fuzzy Self-Tuning, Electronic Switch
Gear, Autotuning |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
INFORMATION SYSTEMS INTEGRATION FACTORS IN ORGANIZATION: TOWARDS GOVERNMENT
INFORMATION SYSTEMS SUSTAINABILITY |
Author: |
SITI ISTIANAH MAHDZUR, JUHANA SALIM |
Abstract: |
An Information Systems (IS) change to meet the changing organizational
environment is crucial in e-Government (e-G) implementation to give it
competitive advantage. Unfortunately research showed that though e-GIS
implementation leveraged the IS integration concept, e-GIS does not using the
benefits of resource integration to provide strategic information and reuse of
knowledge to sustain. Aiming on the beneficial capabilities of e-GIS integration
implementation to facilitate IS sustainability (ISS), this research revealed
challenges and 15 factors contributing to the needs of e-GIS integration and
identified 4 factors of e-GIS integration implementation that contribute to the
ISS in organization. This study then suggests a comprehensive support of e-GIS
integration implementation using Work System Theory, Diffusion and Innovation
Theory and Knowledge Based Theory in organization and at the same time using
benefit of ISS explained by Belief-Action-Outcome framework. The four prominent
factors are business and systems stakeholder collaboration, organizational
operation transformation and organizational memory system. This study also
proposes an e-GIS integration implementation model towards ISS. |
Keywords: |
IS Integration, Organizational Memory, Organizational Memory System, IS
Change, e-G Integration, IS Sustainability |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
AUTOMATIC ADAPTIVE RECONFIGURABLE FPGA WITH REUSABLE TECHINIQUES USING ARM |
Author: |
C. SUBASHINI, Dr. UMA RAJARAM, DR.S.RAVI |
Abstract: |
This papers discusses about reconfigurable system that allow online adaptation,
whenever a fault occurs in the system. This is obtained by using FPGA that
switches among Configurable Logic Block(CLB) automatically which has same
features in an optimal manner. This reduces the time and complexity. Also the
faulty CLB is tested for its output and if it matches with a desired output
pattern, then it can be used instead of a spare so that the area efficiency
improves. Automatic adaptation, selection of signals and controlling is obtained
using ARM STM32 controller . Different modulation application is chosen to
enumerate this reconfiguration by the controller. |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
A COMPARATIVE EVALUATION OF STATE-OF-THE-ART INTEGRATION TESTING TECHNIQUES OF
COMPONENT-BASED SOFTWARE |
Author: |
ABUBAKAR ELSAFI, DAYANG N. A. JAWAWI, ABDELZAHIR ABDELMABOUD, AWAD ALI |
Abstract: |
In the last few years, component-based software has gained widespread notice and
acceptance as a method that facilitates the development of existing large,
complex, and very critical systems by integrating prefabricated small pieces of
software called components. Component integration becomes an essential stage in
the component-based software development Lifecycle. Therefore, testing
components after integration is an important activity. Due to the unavailability
of source code of integrated components and due to the lack of component
information or documentations, integration testing becomes more difficult and
very complex task. In the literature, different techniques have been proposed
with the purpose of facilitating the integration testing of component-based
software. In this paper, we study, classify, and evaluate some of the existing
integration testing techniques and make a comparison in order to help in develop
new, better and more efficient and effective techniques for integration testing
of component-based software systems. |
Keywords: |
Comparative Evaluation, Integration Testing, Component-Based Software,
Component Testing, Critical Review |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
A REVIEW ON ONTOLOGY-BASED LABEL EXTRACTION FROM IMAGE DATA |
Author: |
AHMAD ADEL ABU-SHAREHA, MANDAVA RAJESWARI |
Abstract: |
Ontology-based label extraction is extensively used to interpret the semantics
found in image and video data. Particularly, ontology-based label extraction is
one of the main steps in object class recognition, image annotation, and image
disambiguation. These applications have important roles in the field of image
analysis, and as such, a number of variations of the ontology-based label
extraction used in these applications have been reported in the literature.
These variations involve ontology development and utilization, and can affect
the applicability (e.g., domain- and application-dependency) as well as the
accuracy of the output. Unfortunately, the variability aspect of this variation
has neither been established nor tracked. Thus, the variations were not
configured. A review of the ontology-based label extraction based on the input
data, the utilized technique, and the type of utilized ontology is presented in
this paper. The ontology-based label extraction is categorized based on two
aspects, namely, the type of input data and the type of ontology used. These two
aspects determine the type of the label extraction technique to be used. As a
result, the relative advantages and disadvantages of each category are
determined. The gaps and future research directions in this field are also
highlighted. |
Keywords: |
Label Extraction, Ontology, Semantics, Semantic Tagging, Knowledge Markup,
Image Object Recognition, Image Disambiguation, Image Annotation |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT ADAPTIVE GENETIC ALGORITHM FOR VECTOR SPACE MODEL |
Author: |
WAFA' ALMA'AITAH, KHALED ALMAKADMEH |
Abstract: |
In this study, we propose to use an Adaptive Genetic Algorithm (AGA) aimed to
enhance the performance of information retrieval under Vector Space Model (VSM)
in both (Cosine and Dice similarity). Using the algorithm is aimed to improve
the quality of the results of user's query and generate improved queries that
fit searcher’s needs. Furthermore, we investigate and evaluate different fitness
functions that reduce the search space and reduce the number of iterations
needed to generate an optimized query.
Traditional Genetic Algorithms (GA) use fixed values for crossover and mutation
operators; and such values remained fixed during the execution of the algorithm.
The adaptive genetic algorithm uses crossover and mutation operators with
variable probability; which allows for faster attainment of improved query
results. The proposed approach is verified using (242) proceedings abstracts (in
Arabic) collected from the Saudi Arabian National conference. |
Keywords: |
Information Retrieval; Adaptive Genetic Algorithm; Vector Space Model;
Query Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
IDENTIFICATION OF THE NOTE PATTERN FROM BALUNGAN GENDING LANCARAN USING APRIORI
ALGORITHM |
Author: |
KHAFIIZH HASTUTI, AINA MUSDHOLIFAH |
Abstract: |
The note pattern of balungan gending can be used as a parameter reference in
creating the gending made by the Javanese gamelan. A number of gending lancaran
is used as sample of the experiment and notation as a dataset. The analysis is
done by using apriori algorithm, because it can search for the similarity in
attribute in a data. The complexity of time is a testing standard of an
algorithm to obtain an efficient execution of time, the approach of an
asymptotic analysis using the big-O concept is one of the techniques which are
usually applied to test the complexity of an algorithm. This research analyse
the complexity of time in the algorithm that is used to identify the note pair
pattern of the gending lancaran. |
Keywords: |
Gamelan, Apriori, Complexity |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
A SURVEY AND OPEN ISSUES OF JAMMER LOCALIZATION TECHNIQUES IN WIRELESS SENSOR
NETWORKS |
Author: |
AHMED ABDULQADER HUSSEIN, THAREK A. RAHMAN, CHEE YEN LEOW |
Abstract: |
Jamming sensor attacks localization is a significant area that acquires
considerable research interest. This interest is expected to grow further with
the prolifiration of wireless sensor network applications due to the physical
share environment. Jamming attacks emitting a radio frequency signals by the
adversaries and impact the wireless sensor network localization tactic. Also the
jamming attacks are discovering swiftly techniques in a wide range of the
intrusion in the wireless sensor network communications . Meanwhile the
detection and localization of the jammer is being absolutely indispensable
concern. This paper provides an overview of the jammer sensor localization
techniques in wireless sensor networks and analyze the challenges in this field.
The survey targets an important but mostly untouched open research issues in the
future works |
Keywords: |
Wireless Sensor Networks (WSNs), Jamming Attacks, Jammer Sensor
Localization Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
Title: |
IMPROVING KWH-METER PERFORMANCE AT PV ON GRID SYSTEM BY MULTIPLYING THE NUMBER
OF SAMPLING SIGNAL |
Author: |
ISDAWIMAH, RUDY SETIABUDY, RIDWAN GUNAWAN |
Abstract: |
The PV system is integrated with a low-voltage power network requires an
inverter to convert the generated DC voltage by PV systems into AC voltage, and
kWh-meter to measure the energy delivered by PV systems to the power grid . The
latest generation inverter uses high frequency switching method to reduce the
dimension and to improve the efficiency of the inverter. However, this high
frequency switching raises the harmonics distortion flowing into the power grid
and kWh-meter, and cause significant measurement errors in digital kWh-meter.
This study intends to overcome the measurement error by the method of adjusting
the frequency of sampling signal in kWh-meter digital with the switching
frequency of the inverter. First, kWh-meter tested with a variety of inverter
switching frequency to obtain the minimum value of the switching frequency which
affected the measurement results of digital kWh-meters. Then kWh-meter
measurement results corrected by sampling the signal according to the switching
frequency of the inverter. The proposed method is evaluated by simulation
LAB-VIEW and confirmed by experimental results. The proposed method is able to
maintain the performance of kwh-meters on inverter switching frequency in range
3kHz -150kHz. |
Keywords: |
Digital kWh-meter, Error Measurement, High Switching, Inverter, Sampling
Time |
Source: |
Journal of Theoretical and Applied Information Technology
20th January 2015 -- Vol. 71. No. 2 -- 2015 |
Full
Text |
|
|
|