|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2015 | Vol. 76 No.3 |
Title: |
UNDERSTANDING THE IMPACT OF WEB LAYOUT AND EMOTIONAL CHANGES TOWARDS NAVIGATION
BEHAVIOUR AMONG VISUALLY IMPAIRED USERS |
Author: |
BAVANI RAMAYAH, AZIZAH JAAFAR |
Abstract: |
Facebook is the largest social network and it’s widely used by everyone.
Facebook consists of webpages designed in modular layouts. Assistive
technologies such as screen readers not able interpret the content in complex
layout to visually impaired (VI) users. This causes lots of troubles to VI
users. In order to understand the impact of layout to VI users’ navigation
behavior, we conducted a comparison study of how VI users navigate in Facebook
desktop and mobile version. Besides, this article examines the relationships
between users’ emotions and their navigation behavior in complex layout. The
result shows that VI users prefer Facebook mobile version compares to desktop
version. The study revealed that there is a strong relationship between users’
emotions and their navigation behavior. The understanding of VI users’
navigation behavior and their emotions changes can help web designers to bridge
the gap between the user and system. |
Keywords: |
Facebook, Modular Layout, Visually Impaired Users, Emotion |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
FRAMEWORK FOR PROVIDING ACCESS TO WEB DATA BASES USING BUDGET AWARE ROLE BASED
ACCESS CONTROL |
Author: |
NIRMALRANI V, SAKTHIVEL P |
Abstract: |
In Dynamic Environments such as World Wide Web, Role Based Access Control (RBAC)
has been one of the challenging factors. In RBAC, wide ranges of authorized task
have been carried out by the users for regulating the user’s action dynamically.
Regulating access to computers or network resources is based on individual user
within an enterprise. To define the roles, enterprises use authority,
responsibility, job competency, etc. When the need arises, the administrator can
provide the service access to users. An authorized user may misuse the granted
permissions purposely or unfortunately, even though the policies are assigned
correctly to them. Most of the enterprise databases are stored over the web.
Many web databases are vulnerable to misuse by the authorized users. To avoid
such issues, this paper proposes a framework using Budget-Aware Role Based
Access Control (BARBAC). The issues can be overcome by providing budget and cost
to the users for accessing the resources, where users are assigned with a
limited budget; users pay the cost of permits they needed to access the
resources. Much more desirable properties have been included in this framework
to enhance the accessibility. Unassigned permissions are acquired by the users.
The user’s misuse capability is also bounded by their allocated budget. It also
provides a uniform mechanism to detect and prevent misuse. |
Keywords: |
Budget, Role, Delegation, Access Control, Privilege |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
A POWER SAVING VARYING CACHE WAYS ARCHITECTURE |
Author: |
S. SUBHA |
Abstract: |
Extending the cache ways in conflict sets to alternate set has been proposed in
literature. Selectively enabling cache ways to save energy is proposed in
literature. This paper enables occupied ways in mapped sets and alternate sets
increasing the cache associativity saving energy. The model consists of variable
cache ways extending the ways of conflict set to alternate set. The occupied
ways are enabled. The alternate set is chosen as the set with maximum unoccupied
ways. The proposed model is simulated with SPEC2K benchmarks. On an average
there is improvement in power consumption by 10.6% for the chosen cache size of
256 sets with associativities of 4,8,16,32. The percentage of power improvement
for L1 sizes remains same with increase in number of sets of same capacity. It
increases slightly from 256x4 to 256x32 level one cache size. The average memory
access time is comparable with the chosen model for the chosen cache parameters. |
Keywords: |
Average Memory Access, Cache Power, Variable Cache Ways, Set Associative Cache,
Selective Cache Way Enabling |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT MATHEMATICAL ANALYSIS FOR SAVING ENERGY IN WSN ROUTING PROTOCOL |
Author: |
EMAD MOHAMMED IBBINI , KWEH YEAH LUN, MOHAMAD OTHMAN, ZURINA MOHD HANAPI ,
MOHAMMED S IBBINI |
Abstract: |
The issue of energy efficiency in wireless sensor networks (WSNs) is a prime
consideration. Therefore, we propose an energy-saving scheme for use in wireless
sensor networks and this the goal of this Research. The proposed protocol is a
mixture of the low energy adaptive clustering hierarchy (LEACH) and mediation
device (MD) protocols. It combines the advantages of both. The suggested
protocol includes a mechanism for avoiding the collisions that exist in the MD
protocols. Also, it allows the cluster head to be in sleep mode if there is no
data to be sent. (In addition, MD Device in the proposed protocol will send ID
to the node which will send the data to the cluster head that avoid collision
signals that unfortunately happen in MD protocols and know which node sent
data). This is in contrast to the LEACH protocol and MD protocol, where the
cluster head is always switched on. Placing the cluster head in sleep mode
contributes to reducing energy consumption.In the proposed scheme, clustering is
used as in LEACH, but the cluster head is asleep by default. However, when a
sensor node has data to send, it informs the MD, which then awakens the cluster
head, making it ready for receiving sensor data. To evaluate the proposed
scheme, we suggest a mathematical model that estimates the energy that the
scheme saves as compared with LEACH. The results show that substantial energy
saving is possible when the cluster head can be placed in sleep mode for a large
percentage of time. Intuitively, this time percentage is higher when sensors
have less data to send. |
Keywords: |
WSN ,Energy Saving, LEACH , Sleep , Wake up ,Routing |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
A SURVEY OF ROUTING MAC TECHNIQUES FOR WIRELESS SENSOR NETWORKS ROUTING PROTOCOL |
Author: |
EMAD MOHAMMED IBBINI , KWEH YEAH LUN, MOHAMAD OTHMAN, ZURINA MOHD HANAPI ,
MOHAMMED S IBBINI |
Abstract: |
A Wireless Sensor Network (WSN) contains a random number of sensors distributed
in the environment to monitor physical conditions. In the following, a survey of
MAC routing mechanisms in WSN is presented and discussed. One of the most
important issues in WSN is the issue of energy efficiency of the routing
protocols. The importance of this issue stems from the fact that the nodes have
usually a life time and this life time can be extended by saving more energy by
using efficient routing techniques.
In the following, we present a survey of the MAC routing mechanisms in WSN.
Firstly, an outline of the architecture challenges for routing protocols in WSN
is given according to the system tradeoffs between the power and communication
overhead savings in different routing techniques. Secondly, advantages and
disadvantages for each routing protocol are presented and discussed.
In this survey, we will concentrate only on some protocols like Data Centric,
Hierarchal and other related energy saving protocols. In addition, we will
discuss some of the surveyed protocols results, comparisons and conclusions. |
Keywords: |
WSN, MAC, Routing Protocols, Low Energy, Energy Efficiency. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
A REVIEW ON DECISION MAKING OF RISK MITIGATION FOR SOFTWARE MANAGEMENT |
Author: |
NORAINI CHE PA, BOKOLO ANTHONY JNR |
Abstract: |
Decision making (DM) is one of the main phases in risk mitigation for software
management. DM is undeniably an essential phase in risk mitigation. Every
decision has a different level of influence or impact in software management. In
order to come up with the best choices, it’s necessary to go through the
decision making process and adopt an optimal decision making model or tool to
aid risk decisions in risk mitigation. Many studies have been accompanied for
viewing the issues from different aspects based on a systematic method which is
called Systematic Literature Review (SLR). This review identifies the process,
factors, frameworks, models of DM of risk mitigation in software management. The
findings of this review indicate that DM is one of the complications in
mitigating risk in software management. |
Keywords: |
Decision Making, Risk Mitigation, Risk Management and Software Management |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
ICT USAGE PATTERNS AMONG RURAL ADOLESCENTS |
Author: |
TENGKU SITI MERIAM TENGKU WOOK, HAIRULLIZA MOHD JUDI, NORAIDAH SHAARI@ASHAARI,
NOR AZAN MAT ZIN, ZAWIYAH MOHD YUSOF, ZURINA MUDA, ZULAIHA ALI OTHMAN |
Abstract: |
The government of Malaysia has emphasized the application of Information and
Communication Technology (ICT) for developing the rural community It is
important to investigate the ICT usage among the rural adolescents particularly
its effect on of socio-demographic This study seek to identify the ICT usage
patterns among rural adolescents in Bukit Serampang, Johor, Malaysia. A survey
with nominal research data was adopted as the method for the study. A
descriptive and inference analysis through questionnaire involving 477
adolescents aged between 11 and 17 years old was carried out. Findings from the
analysis suggest that the respondents who are of generation Y responded
positively and prominently towards ICT usage including the tools such as
computers, ipads, ipods, smartphones and other gadgets which use internet
facility. It has also been found that in overall there is a significant
difference in ICT usage between genders and age groups of the male and female
adolescents. |
Keywords: |
ICT Usage, Socio-economy, ICT Skills and Pattern, Rural Adolescents and ICT
gender. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
MODELING OF SPEECH SYNTHESIS USING INTELLIGENT SYSTEM BASED ON PROLOG |
Author: |
TEBBI HANANE, HAMADOUCHE MAAMAR, AZZOUNE HAMID |
Abstract: |
In this work, we present our Expert System for the automatic reading of a text
written in Standard Arabic based on logic programming. To accomplish this, we
have gone through three stages:
Firstly, the creation of a knowledge base that contains different rules which
determine the pronunciation of Arabic words and a set of the exceptions words;
Secondly, the creation of a sound database that contains specific sounds
(phonemes, diphones) to that language, spoken by a female speaker;
Finally, the implementation of the system itself that will ensure the
transformation of the written text into a spoken text.
This transformation is performed by two manners; linguistic processing for
converting graphemes phonemes "produce a phonetic text of the written text" and
another acoustic treatment for the generation of the sound signal "play a sound
corresponding to the resulting phonetic chain of the transcription step». This
last step is achieved using a logic programming language which is less used
nowadays, but represents in our opinion the cornerstone of logic programming
languages, especially for natural language processing; Prolog. |
Keywords: |
Intelligent System, Artificial Intelligence, Speech Synthesis, Standard Arabic,
Prolog, Logic Programming. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
ARCHAEOLOGICAL FRAGMENTS CLASSIFICATION BASED ON RGB COLOR AND TEXTURE FEATURES |
Author: |
NADA A. RASHEED, MD JAN NORDIN |
Abstract: |
Artifacts are often found in archaeological excavation sites mixed with each
other randomly. Therefore, classifying them manually is a difficult task and
time consuming because they commonly exceed thousands of fragments. Thus, the
aim of this study is to find a solution for classification of ancient pottery
into groups by computer assistance. This is a preparatory stage for the next
phase, which is the reconstruction of the archaeological fragments with high
accuracy. To solve this problem, several steps must be taken, which are image
segmentation via a proposed algorithm, and cluster the fragments into groups
based on color and texture features. We proposed a novel algorithm that relies
on the intersection of the RGB color between the archaeological fragments, and
extraction of texture features from fragments based on Gray Level Co-occurrence
Matrix (GLCM) that include Energy, Contrast, Correlation and Homogeneity.
Finally, by using both proposed algorithm for classifying the color feature, and
Euclidean distance for classifying the texture feature, we can classify the
fragments with a high accuracy. The algorithm was tested on a pottery database,
and it achieved a success rate almost 95%, so we would like to point out that by
using the proposed algorithms we achieved promising results. |
Keywords: |
RGB Color, Texture Feature, Archaeological Objects, GLCM, Intersection |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
IMPROVED AODV ROUTING PROTOCOL BASED ON THE ENERGY MODEL |
Author: |
ABDESLAM EL FERGOUGUI, ABDELLAH JAMALI, NAJIB NAJA, DRISS EL OUADGHIRI, ABDELLAH
ZYANE |
Abstract: |
The QoS routing generates a significant number of control messages (overhead),
which are necessary for the discovery and maintenance of routes. Indeed, the
nodes must establish a mechanism to store and update the link-state in a mobile
environment. This mobility in ad-hoc environment makes maintaining the
link-state very difficult and costly. In addition to node mobility, lack of
energy can cause breaks in the established paths, the protocol must be able to
react quickly to such event by recalculating valid routes. In this paper we
propose a management approach of routing based on one of the largest existing
reactive routing protocols which is AODV, and able to minimize routing messages
(overhead) in contexts with strong constraints. This approach takes into account
a metric based on energy consumption during the route discovery, in order to
increase the lifetime of the network, and also allows such applications to
consider, when resources are lacking, the maintenance of QoS connections of
users with the highest priority. The traditional mechanisms based on AODV aim to
use parameters TTL ART,. . . for reduction of routing messages in the phase of
route discovery and maintenance phase. However, it is conceivable that in
certain application environments do not challenge these parameters for the
overhead reduction, and to consider management rested on a policy of
distribution of RREQ messages between mobile nodes, based on the energy level
residual of each node, which allows more to extend the lifetime of the network
for applications sensitive to energy use. This paper is structured in four
sections. The first section provides a brief presentation on the reactive
protocol AODV. The second section consists of a depth classification of the main
algorithms that have influenced us, for reflection on the overhead reduction. As
specified by the traditional approaches, we propose a modification of this
management and we introduce this modification to the AODV protocol. The third
section concerns the presentation of the proposed algorithm. The fourth section
lies within the validation of our approach by simulations that we perform in
different contexts, then we analyse the consequences of this modification. |
Keywords: |
Wireless computing; ad hoc; algorithm; routing protocols; validation;
simulation. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
RISK BASED DECISION SUPPORT SYSTEM FOR STAKEHOLDER QUANTIFICATION FOR VALUE
BASED SOFTWARE SYSTEMS |
Author: |
MUHAMMAD IMRAN BABAR, MASITAH GHAZALI, DAYANG N.A. JAWAWI |
Abstract: |
Stakeholder identification and quantification (SIQ) is one of the core processes
in software requirements engineering (RE). The significance of stakeholders
becomes more vital when a software project is a value-based software (VBS) and
the value-based requirements engineering (VBRE) is involved in it.VBS systems
are developed based on business concepts in order to gain market leverage in
terms of financial or economic benefits. Different SIQ approaches are presented
in literature. However, most of the approaches are partially effective and SIQ
process is still immature. The techniques are presented and applied under
different conditions in order to monitor the performance of the approach. The
presented techniques are vague and difficult to initiate. In this research, a
decision support system is presented for stakeholders’ quantification. The
proposed system predicts the risk associated with the stakeholders using
back-propagation neural network (BPNN). |
Keywords: |
Value-based Software Systems, Stakeholders, Neural Networks, Decision Support
System, Expert System. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
FACTORS AFFECTING CUSTOMER LOYALTY IN BUSINESS E-COMMERCE: A CASE OF INDONESIA |
Author: |
TOGAR ALAM NAPITUPULU, HENDRA CIPTA ADITOMO |
Abstract: |
The purpose of this research is to determine the factors that are first,
significantly influence customer satisfaction and secondly, whether customer
satisfaction affects customer loyalty including the magnitude of the influence,
in e-commerce business. Several factors such as perceived usefulness, perceived
ease of use, customer risk perception, customer support, customer trust,
promotion, information quality, transaction security, and brand image of
e-commerce that influence satisfaction while buying from e-commerce sites were
analyzed. Factors such as those mentioned above, which are commonly considered
influencing customer satisfaction and customer loyalty through online shopping
in other countries were hypothesized to be true in the case of Indonesia. Data
obtained by using questionnaire that was distributed to random customers who
ever purchased through e-commerce in Jakarta. The method uses Confirmatory
Factor Analysis for the measurement model and Multiple Linear Regression
analysis to test the structure of the relationship. The results show factors
that affect customer satisfaction are: Perceived Usefulness, transactions
security, Brand Image of E-Commerce, Information Quality, Customer Support,
Customer Trust, and Promotion. Furthermore, customer satisfaction has
significant impact on customer loyalty. |
Keywords: |
E-commerce; Factors; Customer Satisfaction; Customer Loyalty; Regression;
Confirmatory Factor Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
ENHANCING ROUGH SET THEORY ATTRIBUTES SELECTION OF KDD CUP 1999 |
Author: |
HAMID H. JEBUR MOHD AIZAINI MAAROF, ANAZIDA ZAINAL |
Abstract: |
Attribute selection (Feature Selection) is a significant technique for data
preprocessing and dimensionality reduction. Rough set has been used for
attribute selection with great success. The optimal solution of rough set
attribute selection is a subset of attributes called a reduct. Rough set uses
approximation during reduction process to handle information inconsistency.
However, some rough set approaches to attribute selection are inadequate at
finding optimal reductions as no perfect heuristic can ensure optimality.
Applying rough set for selecting the optimal subset of KDD Cup 1999 does not
guarantee finding the optimal reduct of each class of this dataset due to the
overlap between the lower and upper approximation of each class and the overlap
between the reducts of all classes. This paper introduces a new approach to
enhance the reduct of all classes by overcoming the overlap problem of rough set
through adding union and voting attributes of all dataset classes as new reducts
in addition to the normal reduct. The all reducts were evaluated by using
different classification algorithms. The approach led to generate two generic
attributes sets that achieved high and comparable accuracy rates as the normal
attributes of rough set for the same dataset. |
Keywords: |
Rough set; Attribute selection; Reduct; approximations; KDD Cup 1999 |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
BLOOM'S TAXONOMY QUESTION CATEGORIZATION USING RULES AND N-GRAM APPROACH |
Author: |
SYAHIDAH SUFI HARIS, NAZLIA OMAR |
Abstract: |
Bloom's Taxonomy is a classification of learning objectives within education
that educators set for students. The cognitive domain within this taxonomy is
designed to verify a student's cognitive level during a written examination. An
experiment was designed to investigate student’s cognitive level, by developing
rules to determine the categorization of questions based on Bloom's Taxonomy
(BT). A sample of 135 questions collected from final examination past questions
from FTSM, UKM. All questions has been analyzed by Computer Science subject
matter experts to identify cognitive category based on BT. Rules are developed
by analyzing the syntactic structure from the text questions. Next, some
adjustment are made to utilize hybrid ability of rules and statistical approach.
This rule-based approach applies Natural Language Processing (NLP) techniques to
identify important keywords and verbs, which may assist in the identification of
the category of a question. The advantage of this approach is that statistical
classifier will assist the categorization when questions are not categorized by
the rules. This approach gives better flexiblity when a set of 64 rules are
developed for programming question domain. The result yeilds 86% for the average
F1 for the hybrid technique. The outcome of this study suggest that the combined
technique is capable of identifying the correct cognitive category of BT. |
Keywords: |
Programming questions, Bloom’s Taxonomy, hybrid technique, categorizing question |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
Title: |
EXTRACTION OF ARABIC NESTED NOUN COMPOUNDS BASED ON A HYBRID METHOD OF
LINGUISTIC APPROACH AND STATISTICAL METHODS |
Author: |
MARYAM AL-MASHHADANI, NAZLIA OMAR |
Abstract: |
Arabic noun compound are phrases that consist of two or more nouns. The key
characteristic behind noun compounds lies on its frequent occurrences within the
text. Therefore, extracting these noun compounds is essential for several
domains of research such as Information Retrieval, Sentiment Analysis and
Question Answering. Many research efforts have been proposed in terms of
extracting Arabic noun compounds using linguistic approaches, statistical
measures or a combination of both. Most of the existing methods have
concentrated on the extraction of bi-gram or tri-gram noun compound. However,
extracting 4-gram or 5-gram noun compound or nested noun compound is challenging
due to the difficulty of selecting an appropriate method with effective results.
Multiple features have a significant impact on the effectiveness of extracting
noun compound such as contextual information, unit-hood and term-hood. Thus,
there is still room for improvement in terms of enhancing the effectiveness of
nested noun compound extraction. Therefore, this study proposed a combination of
linguistic approach and statistical measures in order to enhance the extraction
of nested noun compound. Several preprocessing steps are involved including
transformation, normalization, tokenization, and stemming. The linguistic
approach that have been used in this study is Part-of-Speech tagging. In
addition, a new linguistic pattern for named entities has been utilized using a
list of Arabic named entities in order to enhance the linguistic approach in
terms of noun compound recognition. The proposed statistical measures consists
of NC-value, NTC-value and NLC-value. The experimental results have demonstrated
that NLC-value has outperformed NTC-value and NC-value regarding to nested noun
compound extraction by achieving 83%, 76%, 72% and 65% for bigram, trigram,
4-gram and 5-gram respectively. |
Keywords: |
Multi-word Expressions, Noun Compound, Nested Noun Compound, Statistical method,
POS tagging |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2015 -- Vol. 76. No. 3 -- 2015 |
Full
Text |
|
|
|