|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2015 | Vol. 76 No.2 |
Title: |
DOCUMENT SIMILARITY DETECTION USING SYNONYMS FACTOR AND PARALLEL PROCESSING |
Author: |
KEMAL ADE SEKARWATI, LINTANG YUNIAR BANOWOSARI, I WAYAN S. WICAKSANA, ANA
KURNIAWATI |
Abstract: |
Research regarding Indonesian language document similarity measurement has not
yet broad to do. Mostly those researches using Karp Rabin algorithm and string
matching method, and the documents used in the form of abstracts and articles
which only has one page.
This study focused on measuring similarity detection of Indonesian language
documents using synonyms factor for more than one page document and the
processing speed measurement. The system developed is to measure the similarity
of existing documents with other documents that are stored in an internal
database. Similarity calculation results in the form of a percentage of the
document similarity comparison. The measurement results of document processing
speed in the form of speed detection in processing the documents. The
calculation of the similarity detection measurement and its detection speed is
performed using the following steps: (i) examine the documents title, (ii)
Distribution of work, (iii) the document similarity measurement and (iv) speed
measurement of document similarity detection process.
Tests carried out using Indonesian documents that are larger than one page.
Documents that have been tested were 15 documents. Test results to calculate
document similarities and detection speed conducted on four types of documents.
This study has shown that the algorithm used can check the similarity of
documents with the maximum number of pages is 56 pages. From the speed of the
detection process shows that the speed measurement in detection process
algorithm is also said to be successful. |
Keywords: |
Document, Similarity, Processing Speed, Parallel Processing. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
SECURE 6LOWPAN NETWORKS FOR E-HEALTHCARE MONITORING APPLICATIONS |
Author: |
DHANANJAY SINGH |
Abstract: |
Nowadays embedded computing has tremendous usage into the development of smart
environment services such as smart city, smart home, intelligent transportation,
e-healthcare monitoring and many more services. Owing to increase in use of
these services by companies, several security issues have emerged and this
challenges embedded computing framework to secure, protect and process user’s
data. These services have certain cons like security, lock-in, lack of control,
and reliability. Privacy and security are the major concerns in embedded
computing services. In this paper, we have designed a novel secure framework for
6lowpan (IPv6 over Low Power Wireless Personal Area Networks) networks, as well
as presented a critical analysis of CCMP (Counter with Cipher Block Message
Authentication Code Protocol) protocol for secure data management of
e-Healthcare monitoring applications. |
Keywords: |
Wireless Sensor Networks (WSN), 6lowpan, embedded system, healthcare system,
secure networks |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
EDGE DETECTION ALGORITHM FOR COLOR IMAGE BASED ON QUANTUM SUPERPOSITION
PRINCIPLE |
Author: |
DINI SUNDANI, A. BENNY MUTIARA, ASEP JUARNA, DEWI AGUSHINTA R |
Abstract: |
Edge detection is first stage of image analysis. Edge can produce information of
an image used for pattern recognition or image retrieval. A problem encountered
in the process of edge detection is the edge was not detected properly. This
happens because the color image was being transformed into gray image. The
development of method or edge detection algorithms has been carried out with the
aim to obtain a clear and perfect edge. However, the development of algorithms
performed by classical computing, where data is calculated in parallel. This
paper proposed a development of edge detection algorithm on color images with
transformation into gray image and without transformation where data is
processed at each channel based on the RGB color space. Both are done based on
the principles of quantum superposition. Superposition is one of the properties
owned in quantum computing, where data can be calculated simultaneously which is
the probability of the states. Stages of research are initiated by image
enhancement to reduce noise or get a smoothing area. The second stage is to
determine superposition of edge strength (magnitude value) using Sobel operator.
The last stage is the edge localization to determine the exact location
expressed as edge or to detect the edge where the detected edges must be close
as the actual edge. |
Keywords: |
Color Image, Edge Detection, Quantum Computing, Superposition, Probability |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
EXAMINING THE EFFECTIVENESS OF USING WEB-BASED LEARNING FOR GIFTED STUDENTS:
JORDAN AS CASE STUDY |
Author: |
ALI RATIB ALAWAMREH, NUR FAZIDAH ELIAS |
Abstract: |
Learning Management System (LMS) as a part of e-learning has become very crucial
for modern societies. LMS uses several techniques, one of the most used ones is
web-based learning. Modern societies are divided into two types of students: i)
Regular students, and ii) Gifted students. Gifted students have various
distinguished abilities compared with regular ones. In this paper, a model to
enhance web-based learning for gifted students in developing countries is
proposed. The proposed model consists of three factors which are: i) Intrinsic
motivation, ii) Training, and iii) Compatibility. The proposed model also aims
to explore the key factors that affect gifted students’ acceptance of web-based
learning. The proposed model is applied in Jordan where web-based learning
concept was introduced in the 90s. The results gained from applying the proposed
model in Jordan shows that the proposed model is accepted. |
Keywords: |
Web-Based Learning, Gifted Students in Jordan, Intrinsic Motivation, Training,
Compatibility |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
INVESTIGATION OF TACIT KNOWLEDGE MEASUREMENT METHODS |
Author: |
ABDULLAH MOHAMMED RASHID, ZAINUDDIN BIN HASSAN, ALI TAHA Al-OQAILY |
Abstract: |
The knowledge management services are important to provide competitive
advantages for institutions of higher learning organizations. However most
organizations are facing challenges to manage and to develop the tacit knowledge
that to support services and products quality due to weaknesses of knowledge
measurement processes. The main objective of this study is to investigate the
roles of knowledge and effectively knowledge measurement factors in the
university environment. The quantitative data collected using questionnaire from
Tenaga Nasional (UNITEN) in Malaysia as a case study was analyzed finding tacit
knowledge measurement factors. The significant results show that the knowledge
measurement factors are not applied efficiently, thus the opportunity to use the
available tacit knowledge resources for best knowledge implementations would be
missed |
Keywords: |
Knowledge Management, knowledge Measurement, Success Factors, Tacit Knowledge |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
TRANSACTION LEVEL MODELS’ STRUCTURING: FROM IDIOMS TO TLM-2 |
Author: |
SALAHEDDINE HAMZA SFAR, IMED BENNOUR, RACHED TOURKI |
Abstract: |
A system on chip (SoC) designing cost is not only dependent on the manufacturing
process but also on the used design methodologies and tools. Transaction level
modelling (TLM) has emerged as an efficient methodology of electronic system
level (ESL) design, with an acceptable simulation speed and modelling accuracy.
During the last decade, the research efforts were to define the various TLM
abstraction levels, TLM taxonomies, and TLM programming languages. The result
was the definition and the standardization of the SystemC language, the TLM-2
library and a set of coding styles. The further step toward an efficient TL
modelling methodology consists in structuring the various TL models. This paper
firstly reviews the most important steps in the evolution of the TLM methodology
and secondly it presents an efficient structuring of the TL models based on
TLM-2 library. |
Keywords: |
Electronic System Level Design, SystemC, Transaction level modelling,
architecture exploration, system in chip, network on chip. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
OPTIMIZATION OF DEVICES AND LIGHT COUPLING BASED ON PHOTONIC BIDIMENSIONNELS
CRYSTALS |
Author: |
RACHIDA. HEDARA, AICHA. FLITTI, DJAMEL-EDDINE. KALAIDJI |
Abstract: |
The research high lights the value of using photonic crystals for integrated
optics. These materials, whose dielectric constant varies periodically across
the wavelength, have the particularity to present photonic bandgap prohibiting
light propagation in the structure. The use of this effect bandgap opens the way
for the realization of many optical functions such as guide. Usually the guide
in photonic crystals is accomplished by creating the linear defects in the
lattice constant. Our studies were conducted largely through simulations using
executable 2D FDTD software. The choice of the FDTD numerical method (Finite-
Difference- Time- Domain) is due to its universality and its simplicity of the
use and the implementation. To know the spectral response of this type of
periodic as well as field distributions in structures of finite dimensions
system, we used the most common 2D FDTD numerical method. |
Keywords: |
Photonics crystals, FDTD, square lattice, waveguide CPs, integrated optical
devices, PML. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
SOFTWARE TAMPERING DETECTION IN EMBEDDED SYSTEMS – A SYSTEMATIC LITERATURE
REVIEW |
Author: |
ABDO ALI ABDULLAH AL-WOSABI, ZARINA SHUKUR |
Abstract: |
Embedded systems (ES) become available anywhere and anytime as an established
part of our daily routines. Their usage in sense, store, process, and transfer
our personal and private data, such as ATM card, modern cars system, mobile
phones, and etc., become irreplaceable. Developers of these systems face
significant challenges in code and information security. Whereas, software
tampering is one of these challenges, code integrity detection is one of the
main approaches used to defeat it. Checking code integrity achieves tamper
proofing by method of identification of unauthorized alteration to recognize any
tampered code is executed or tampered data are used. For the purpose of this
paper, we perform a research methodology based on systematic literature reviews
in-order to present different techniques/approaches of code integrity checking
in embedded systems. We briefly survey a number of research studies
(specifically between 2008 and 2014) related to this issue and present their
proposed solutions. Obviously, there is no complete solution, and our aim by
conducting this review is to contribute (even a modest effort) on fighting
against software tampering. |
Keywords: |
Embedded Systems, Software Tampering, Tampering Detection, Software Integrity |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
THE IMPACT OF REQUEST TRACKER APPLICATION AS KNOWLEDGE MANAGEMENT SYSTEM ON
EMPLOYEE PERFORMANCE |
Author: |
BACHTIAR H. SIMAMORA |
Abstract: |
Knowledge increasingly well known as a foundation for creating a competitive
advantage for the company, so that Knowledge Management (KM) is very important
for organizations to improve process performance and hence service to customers.
This research aims to determine the application and use of the Request Tracker
application as a KMS in handling Customer Request (CR) at one of IT Company in
Indonesia based on people, process and technology factors, and its influence on
employee performance. Data is processed and analyzed using reliabilities
testing, validity testing and linier regression. The result shows that request
tracker application able to assist employees in CR handling process, and have a
positive effect on employee performance. The result of this case study may be
used as recommendation for the improvement of the application from people,
process and technology aspect. |
Keywords: |
Knowledge Management System, Request Tracker, Employee Performance, Customer
Request, Customer Relationship Management |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
MINING DIBRUGARH UNIVERSITY DISTANCE EDUCATION WEBSITE AND BAYESIAN APPROACH FOR
WEB PROXY CACHE MANAGEMENT |
Author: |
SADIQ HUSSAIN, JITEN HAZARIKA, G.C. HAZARIKA |
Abstract: |
Web proxy cache management is a way to better serve the web-based application
and effectively manage and report the website. There are various traditional
methods like LRU, LFU etc. for web proxy caching. The web log files may be
preprocessed to find meaningful patterns and improve the hit ratio of the web
server. The proposed study used the web proxy data of directorate of distance
education, Dibrugarh University for data mining and analyzing the performance of
the proposed algorithm on the web proxy server. |
Keywords: |
Web Mining, Web Proxy Cache, Bayes Theorem, Algorithm, Pattern Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
A STUDY ON AGENT SCHEDULING SCENARIOS IN MULTI-AGENT SYSTEMS |
Author: |
CECILIA E. NUGRAHENI, LUCIANA ABEDNEGO |
Abstract: |
A multi-agent system (MAS) is understood as a collection of intelligent agents
that interact with each other and work together to achieve a goal. Since it
consists of many agents, the communication, coordination, and scheduling among
agents are important issues in MAS. This paper presents a study on the effect of
agent scheduling on the performance of a MAS. The study is conducted on a small
parameterized MAS, which is a Sudoku solver. Four agent scheduling scenarios
have been developed and implemented. Some experiments have been conducted to
measure the performance of each scenario. It is shown that the scheduling
scenarios have effect on the system performance. |
Keywords: |
Multi-Agent Systems, Agent Scheduling Scenario, Sudoku, Sudoku Solver, Block
World |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
RACARP: A ROBUSTNESS AWARE ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS |
Author: |
ZAMREE CHE-ARON, AISHA HASSAN ABDALLA, KHAIZURAN ABDULLAH, WAN HASLINA HASSAN,
MD. ARAFATUR RAHMAN |
Abstract: |
Cognitive Radio (CR) is a new paradigm which offers a viable solution to deal
with the spectrum shortage problem and enhances the spectrum utilization in
wireless communication systems. In Cognitive Radio Ad Hoc Networks (CRAHNs),
data routing is one of the most challenging tasks due to varying link-quality,
frequent topology changes and intermittent connectivity caused by the activities
of Primary Users (PUs). This paper proposes a robustness aware routing protocol
for CRAHNs, referred to the Robustness Aware Cognitive Ad-hoc Routing Protocol (RACARP),
with an aim to provide robust transmission path and offer fast route recovery in
presence of PU activities during data delivery. The Expected Path Delay (EPD)
routing metric used in the protocol for path decision is also introduced. The
protocol avoids creating a transmission path that uses PU’s channel in PU
regions in order to counteract the impact of PU activity. Moreover, for the
purpose of fast route recovery, the multi-path multi-channel routes are given by
utilizing the joint path and spectrum diversity in routing. The performance
evaluations are conducted through simulations using NS-2 simulator. The
simulation results obviously demonstrate that the RACARP protocol can
significantly achieve better performance in terms of average throughput, packet
loss, average end-to-end delay, and average jitter as compared to the recently
proposed D2CARP protocol in identical scenarios. |
Keywords: |
Cognitive Radio Ad Hoc Network, Robustness Aware Routing, Expected Path Delay,
PU Impact Avoidance, Joint Path and Spectrum Diversity |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
REVIEW OF THE DEFENSIVE APPROACHES FOR STRUCTURED QUERY LANGUAGE INJECTION
ATTACKS AND THEIR COUNTERMEASURES |
Author: |
NABEEL SALIH ALI , ABDUL SAMAD SHIBGHATULLAH, MUNQATH H. AlATTAR |
Abstract: |
Recently, Web applications have been used for most of the activities in
animation. These applications are affected by the structured query language
injection (SQLI). In this paper, four major objectives can be organized to
direct the work study are:
• Conduct a detailed review of various SQLI attacks and investigation of
previous approaches that detected and prevented these attacks in Web
applications.
• Compare the performance metrics of the different techniques to evaluate the
precision of the results and the cost of the time required to identify the
efficiency of the techniques.
• Evaluate the effectiveness of the techniques in practices based on the
effectiveness metrics.
• Define the efficiency and effectiveness direction of defensive approaches.
The main contributions of this work are:
• Summary and analysis of a critical review (strengths and weaknesses) of the
defensive approaches that have been implemented.
• Comparison of the result accuracy of the different approaches through an
evaluation using the standard performance metrics.
• Evaluation of the effectiveness of the techniques in practice.
• Identification and focus on the critical and important lines or defensive
techniques that need comprehensive studies by future researchers through which
the advantages of high efficiency and effectiveness can be obtained. |
Keywords: |
SQL, Injection, Detection, Prevention, Approaches. Techniques. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
TOWARDS A NEW WEB-BASED SERIOUS GAMES GENERATOR BASED ON FUZZY EXPERT SYSTEM |
Author: |
ELAACHAK LOTFI1, AMINE BELAHBIB AND MOHAMMED BOUHORMA |
Abstract: |
With the big success that serious games have known in education field a huge
need has been created to develop such video games in order to satisfy the demand
that does not cease to increase, but the time, the cost, and the interaction of
several actors during the creation process of video games can influence on the
envisaged result and create several unexpected problems, to avoid such problems
we propose in this article a new web-based serious games generator that adapts
the process of video game development by replacing game design and game
development phases by both programmed game design and gameplays, this new
concept will allow the game creators to focus more in pedagogical aspect and
pedagogical objectives that the players must acquire during a video game
sequence, instead of wasting much time in game design and game development. In
addition, the proposed game generator will be equipped with a fuzzy expert
system to assist the users during the game generation process; the proposed
serious games generator will be able to generate several web based video games
that are both educational and fun. An evaluation of how our proposed game
generator proved successful along with an outlook on future research concludes
this paper. |
Keywords: |
Web Based Serious Games, Fuzzy Expert System, Game Generator, Gameplay, and AHP. |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
Title: |
DESIGNING A MULTIPURPOSE EDR201A05 BASED HIGHLY ELECTRICAL ENERGY EFFICIENT
AUTOMATIC IRRIGATOR SYSTEM PROVIDING CONTINUOUS CROP NOURISHING AND OPTIMAL
UTILIZATION OF WATER RESOURCES |
Author: |
P. MICHAEL PREETAM RAJ, HARI KISHORE KAKARLA, RAKESH TIRUPATHI, P.SALEEM AKRAM,
T.ANJI REDDY |
Abstract: |
Automatic water pumping system is extremely required for effective usage of
water resources in various areas such as irrigation for crops. In this paper, an
Automatic Irrigator (AI) system which can save water wastage by controlled water
pumping thus provides very high energy efficiency is presented. The system has
its ability to automatically control the turning on and off of the motor, based
on the water level, thus maintaining a controlled water level. The stunning
feature of this system can be to provide solutions for the varying water
requirements of the crops at different stages during the growth process by
considering a micro-controller based approach to automatically maintain the
varying levels of waters as per requirements. Also several other applications of
this proposed system exists such as water level control in water tanks,
maintaining ground water level, etc., thus usable for multiple applications, by
making slight modifications to the system. The proposed system based on
EDR201A05 makes use of only a single 5V DC supply to control, based on the
conductive property of water, a motor which can pump water. The proposed system
is also extremely attractive because of its simplicity, controllability, and low
cost. This system can also automatically sends the pumping motors into idle
state during rainy days saving power and water. |
Keywords: |
AI, Controlled water pumping, EDR201A05, Automatic water pumping system, Data
Acquisition device myDAQ, LabVIEW |
Source: |
Journal of Theoretical and Applied Information Technology
20th June 2015 -- Vol. 76. No. 2 -- 2015 |
Full
Text |
|
|
|