|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2015 | Vol. 73 No.3 |
Title: |
SYMMETRIC CRYPTOGRAPHY KEYS MANAGEMENT FOR 6LOWPAN NETWORKS |
Author: |
ANASS RGHIOUI, RIAD ABDMEZIEM, SAID BOUCHKAREN, MOHAMED BOUHORMA |
Abstract: |
Thanks to the 6LoWPAN (IPv6 over Low power Wireless Personal Area Network)
technology, each object will get the opportunity to obtain an IPv6 address and
integrate the world of the Internet of Things. This provides the ability to
collect and monitor data remotely.
Objects are heterogeneous; they vary depending on their operation, their
material resources, and their role: data server, data requester or both. They
are deployed everywhere and the information communicated via the internet
between two separate objects is not secure and is vulnerable to an eavesdropping
or modification attacks. We must implement an end-to-end security system to
protect exchanged data confidentiality and integrity. Efficient used systems are
based on asymmetric cryptography, but since these objects are
resource-constrained and low power energy, it is not practical to adopt such
solutions.
Thus, 6LoWPAN combines between two different networks: LoWPANs and IPv6, we need
a solution that addresses the security of internal communications and those
across the internet. Existing solutions address the security of each type of
communication separately from each other, where we must implement multiple
solutions to secure a single network, the thing that is not practical for
networks with resource constraints.
In this paper, we propose a hybrid solution suitable for 6LoWPAN networks, based
on the use of a remote server for authentication and security keys management,
which aim to secure inter-LoWPAN and end-to-end communications. Our simulations
and performance analysis shows that our solution provides security, and it is
efficient in computation, communication, and storage. |
Keywords: |
6LoWPAN, IoT, KMS, Network security, AVISPA. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
GENERIC ANALYSIS METAMODEL BASED ON SERVICE ORIENTED SOFTWARE DESIGN |
Author: |
NIK MARSYAHARIANI NIK DAUD, WAN M.N. WAN KADIR |
Abstract: |
Analyzing software in order to evaluate its quality attributes is not a foreign
concept in software lifecycle. There are many methods that can be implemented to
analyze software with some focusing on source code analysis and others
concentrating on analyzing software artifacts from various phases such as design
artifacts. Service oriented software is not excluded from this. As software that
uses services as part of its functionalities, service oriented software designs
represent more completed view of the software compared to other artifacts. This
work focus on identifying elements from design artifacts that represent service
oriented software structure and behavior based on standard modeling language for
service oriented architecture. The elements are then represented in a generic
metamodel that can be used to analyze the software. A case study will be used to
show how design artifacts from selected standard modeling language, SoaML being
mapped to model based on proposed metamodel. |
Keywords: |
Service oriented software, metamodel, modeling language, SoaML |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
A CLOUD TECHNOLOGY MIGRATION MANAGEMENT STRATEGY MODEL FOR SME'S IN IRAQ : AN
OVERVIEW |
Author: |
MR. IBRAHIM ABDULLAH, PROF. ZAINUDDIN HASSAN |
Abstract: |
Purpose: Cloud computing has to play a major role in addressing inefficiencies
and make a profitable contribution towards the Growth and Competitiveness mainly
for SMEs. Cloud Computing came into prominence when Service Providers were
offering a wide range of Cloud Based Solutions for Business. But the acceptance
and interest shown towards Cloud Computing is less. The purposose of this paper
is to evaluate the factors that affect the adoption of Cloud Computing in
developing economy Small and Medium Enterprises (SMEs).
Design/methodology/approach: The study was carried out by mens of a
non-experimental exploratory research design. The exploratory phase of this
study included a critical and exploratory investigation of secondary data. This
involved study, modelling and development of secondary data to highlight the
results of the study
Findings: The study findings highlights the Cost education in IT infrastructure
and maintenance, Improving Communication, versatility and business coherence as
the principal drivers of cloud Service. Furthermore, the findinsg reveal that
the key elements which impact the distribution of Cloud Computing and adoption
were the Support from Top Management, Tried and Tested, fitness of Cloud Vendor,
resistance towards adopting a new technology, compatibility and presence of IT
Infrastructure.
Research implications: By solving this problem, we could develop results and
methodologies that specifically meet the needs of SMEs by energizing and
accelerating the rate of adopting Cloud Computing from the Service Providers. |
Keywords: |
Cloud Service Provider (CSP), Service-Oriented Architecture (SOA), SOA
Migration, Adoption, and Reuse Technique (SMART), Service Migration Interview
Guide (SMIG), Small and Medium Enterprises (SMEs) |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
NEW BRAIN EXTRACTION METHOD USING EXPECTATION MAXIMIZATION AND MATHEMATICAL
MORPHOLOGY |
Author: |
SANDABAD SARA, HAMMOUCH AHMED, SAYD TAHRI YASSINE, BENBA ACHRAF, CHERRADI
BOUCHAIB |
Abstract: |
The hi-tech development has led great success in both scientific and technical
fields. Therefore we can obviously note that data processing takes less
execution time and a smaller amount of human efforts. This is the advantage of
the automatic line of work which aimed to reduce either physical or intellectual
human effort. Furthermore it focused to let the painful and complex tasks to the
machine including the computer.
In our framework, the processing of medical images (brain MRI) is transferred to
the computer so the setting up of processing algorithms becomes an axis of rich
researches highly open to discussion and development in our work, and we know
that MRI is an effective examination of disease diagnosis, In this paper, we
present our own method of brain extraction inspired by different methods in the
literature namely brain method (BET; BSE, MSPL; MCSTRIP; TMBE ...) and different
segmentation algorithms. Then, we compare our own way to other methods with
excellent results using supervised evaluation criteria both outline and region. |
Keywords: |
Medical Image Processing; Segmentation; Supervised Evaluation; Brain Extraction;
BET; BSE; MSPL; MCSTRIP; TMBE, EMBE. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
CLOUD COMPUTING TECHNOLOGY INFRASTRUCTURE TO SUPPORT THE KNOWLEDGE MANAGEMENT
PROCESS (A CASE STUDY APPROACH) |
Author: |
RATNA SARI, YOHANNES KURNIAWAN |
Abstract: |
This paper discussed the implementation of cloud computing as a part from
technology infrastructure. Technology infrastructure well known as a key
ingredient of successful knowledge management process in a company and also a
strong support to improve the company’s competitive advantage. Technology is
rapidly changing, a lot of data from external source will give impact to the
company. That’s why with the right technology infrastructure will easy to
manage, record, transfer the data become information and knowledge. The purpose
of this paper is to know the reason behind, why the company implemented the
cloud computing model as a part of technology infrastructure to support
knowledge management process in the company. |
Keywords: |
Knowledge Management, Cloud Computing, Technology Infrastructure |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE EVALUATION OF OPERATIONAL PERFORMANCE OF SUPPLY CHAIN AT AUTOMOTIVE INDUSTRY |
Author: |
GHOLAMREZA GHOLAMPOUR, ABDUL RAHMAN BIN ABDUL RAHIM |
Abstract: |
Todays, Supply Chain Management is one of the most important and complex issues
for automakers in the world. The main objectives of this research are to explore
the factors to predict operational performance of the supply chain (OPSC)
through survey and case study research in IRANKHODRO Company (IKCO). Based on
the supply chain theories, previous studies and structural equation modeling
operational performance of the supply chain was predicted by process innovation
(PI) and partnership quality (PQ). In addition, the relationship between IT and
OPSC was moderated by process innovation and the positive effect of IT on OPSC
was rejected. A total numbers of 217 completed questionnaires were collected
from IKCO. The reliability of data was evaluated by using SPSS to analyse
Cronbach’s alpha, where all values of alpha were acceptable strongly. According
to SEM, measurement and structural model were analyzed to evaluate validity and
hypothesizes. The confirmatory factor analyses (CFA) were utilized based on the
Maximum Likelihood (ML) to examine model. OPSC model was examined for the first
time in the automotive industry, which as the research gap was concluded. This
research contributes to focus on IT, PQ, PI and OPSC as theoretical, managerial
and practical implications. |
Keywords: |
Supply Chain Management, Operational Performance, It, Organizational Learning,
Sem |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
IMPROVING SERVICES THROUGH ADOPTION OF CLOUD COMPUTING AT PT XYZ In INDONESIA |
Author: |
BACHTIAR H. SIMAMORA, M.SC., PH.D., JULIRZAL SARMEDY, S.KOM. |
Abstract: |
PT. XYZ as Indonesian institution is responsible for managing social insurance
programs of civil servants. With branch offices and business partners who are
geographically dispersed throughout Indonesia, information technology is very
important to support the business processes. Cloud computing is a model of
information technology services that could potentially increase the
effectiveness and efficiency of PT. XYZ information system. This study examines
the phenomenon exists at PT. XYZ in order to adopt cloud computing in the
information system, by using the framework of
Technology-Organization-Environment, Diffusion of Innovation theory, and Partial
Least Square method. Organizational factor is the most dominant for PT. XYZ to
adopt cloud computing. Referring to these findings, then performed a SWOT
analysis and TOWS matrix, which in this study recommends the implementation of a
strategy model of cloud computing services that are private and gradually in
process. |
Keywords: |
Cloud Computing, Technology-Organization-Environment Framework, Diffusion of
Innovation Theory, Partial Least Square; |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
DETECTING SUSPICIOUS PROFILES USING TEXT ANALYSIS WITHIN SOCIAL MEDIA |
Author: |
SALIM ALAMI, OMAR EL BEQQALI |
Abstract: |
The exponential advancement in information and communication technology has
fostered the emergence of new channels for online discussion and has also
reduced distances between people. Unfortunately, malicious people take advantage
of this technological achievement in the sense that they use it for illegal
purposes. In social media, the users produce several and various formats of
suspicious posts (text, image, video…) and exchange them online with other
people. The data in most social media sites are stored in text format, so in
this work we will focus only on text posts. Text mining is an effective way to
add semantics aspect to this communication’s form presenting a significant
research challenge. Similarity approach is used in text analysis to detect
suspicious posts in social media. The evaluation of our proposed approach is
done within real posts. |
Keywords: |
Semantic Web, Social Media, Text Analysis, Text Mining, Similarity, Similarity
Distance, NCD Normalized Compression Distance, Profiling, Suspicious Profile. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
PARAMETER OPTIMIZATION OF PROPORTIONAL INTEGRAL CONTROLLER IN THREE-PHASE
FOUR-WIRE GRID-CONNECTED INVERTER USING ANT COLONY OPTIMIZATION |
Author: |
SUSATYO HANDOKO, SASONGKO P. HADI, SUHARYANTO, EKA FIRMANSYAH |
Abstract: |
This paper presents the parameter optimization of proportional integral (PI)
controller in four-leg inverter for DG application when installed in a
three-phase four-wire distribution system. The inverter can be utilized as power
converter to inject power generated from renewable source to the grid and as
shunt active power filter to compensate load current harmonics, load reactive
power demand, and current unbalance. To achieve those functions, a reference
current needs to be determined. In this study, DC voltage regulator used PI
controller to generate the peak value of reference grid current. Optimal tuning
of PI gain was required to obtain the best performance of PI controller. An
algorithm based on the ant colony optimization (ACO) method was used to optimize
the PI parameters. The objective function of optimization was to minimize the
integral time absolute error (ITAE) of dc-link voltage and average total
harmonic distortion of grid currents (THDiave). The usefulness of the approach
was demonstrated by a simulation. |
Keywords: |
Grid-Connected Inverter, PI Controller, ACO, ITAE, THDi |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
UDFP-TREE: AN EFFICIENT TREE FOR INTERACTIVE MINING OF FREQUENT PATTERNS FROM
UNCERTAIN DATA |
Author: |
MOHAMMAD H. NADIMI-SHAHRAKI, FATEMEH HABIBOLLAHI, HAMID RASTEGARI |
Abstract: |
An increasing number of efficient methods have been proposed to mine frequent
patterns from uncertain data obtained from real applications such as social
networks and life-sciences. Since these data are constantly being updated, needs
of the users are changed and they adjust a new minimum support threshold to find
new and proper frequent patterns. Obviously, finding the new frequent patterns
by running the algorithm from scratch is very costly especially when the
database is very large. In this paper, an efficient tree called UDFP-tree is
proposed for interactive mining from uncertain data. The proposed tree aims to
construct the mining model separated from the mining process. The experimental
results show that by using UDFP-tree, there is no need to reconstruct the mining
model when user changes the minimum support threshold. |
Keywords: |
Data Mining, Interactive Mining, Uncertain Data, Frequent Pattern Mining |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
A FULLY ASSOCIATIVE CACHE ARCHITECTURE |
Author: |
S.SUBHA |
Abstract: |
Fully associative caches expend maximum energy among caches for any size. The
blocks of fully associative cache are searched in parallel during address
mapping. This paper proposes architecture to reduce the power consumption in
fully associative cache. The cache blocks are assumed to operate in one of two
modes - on or off. The model consists of introducing one bit per block which is
enabled on block occupancy. This bit is checked before the address match is
performed. This saves power consumption in address comparison. The proposed
model is simulated with SPEC2K benchmark. An improvement in power consumption of
59% with no change in average memory access time is observed for the chosen
parameters. |
Keywords: |
Average Memory Access Time, Cache Architecture, Cache Performance, Fully
Associative Cache, Power Savings |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
USING MULTI-AGENTS SYSTEMS IN DISTRIBUTED DATA MINING: A SURVEY |
Author: |
AHMEDAMINE FARIZ, JAAFAR ABOUCHABAKA, NAJAT RAFALIA |
Abstract: |
Extract accurate information from huge databases about petabytes has an
unprecedented utility. However, the implementation of a data mining system
requires an enormous amount of work and an extremely long run time in some cases
of distributed environments. Distributed Artificial Intelligence consists that
the entities with certain amount of autonomy must have the capacities of
perception and action on their environment, which brings us to the concept of
"cooperative agents" and therefore multi-agent systems. These systems are
becoming more and more essential in many application fields due to the fact that
they can solve the problems of complexity and distribution, especially when it
comes to large systems such as data mining. This document is an overview of the
integration of multi-agent systems and distributed data mining known as MADM
(Multi Agent-based Distributed Data Mining). |
Keywords: |
SMA, DDM, MADM, data mining, agents, Distributed Data mining, Multi-Agent
System. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
BROKEN CHARACTER RESTORATION USING GRADIENT VECTOR FLOW AND BALLOON FORCE
ALGORITHM |
Author: |
QUSAY O. MOSA, MOHAMMAD F. NASRUDIN |
Abstract: |
The presence of a large number of broken characters in a digital document image
represents the main problem in Optical Character Recognition (OCR) of historical
documents. This problem still continues a challenge for recent OCR solutions.
Broken character restoration from historical documents it is substantial because
these documents contain important facts and leaving them leads to losing
invaluable information. Gradient Vector Flow (GVF) snake has much more capture
range than traditional snake therefore widely used in image segmentation. In
this paper we used balloon with triangle steps to improve GVF snake to converge
of deep concavity area and Restore broken characters using the improved GVF. |
Keywords: |
GVF, Snake Algorithm, Divergence, Deep Concavity, Balloon Force |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
UNDERSTANDING SUSTAINABILITY: AN EXPLORATION OF THE IS LITERATURE |
Author: |
HASLINDA SUTAN AHMAD NAWI, OTHMAN IBRAHIM, NUR SYUFIZA AHMAD SHUKOR, SITI
FATIMAH OMAR, IRNY SUZILA ISHAK, AZIZAH ABDUL RAHMAN |
Abstract: |
Government all over the world are increasingly realizing that implementing and
sustaining their electronic service delivery is the way forward to achieve
efficiency savings and to satisfy and engage demanding constituents. Once an
electronic service delivery has been developed and the infrastructure is in
place, they are almost infinitely scalable with minimal effort, and will reduce
variable costs of electronic service provisioning and service use. As this trend
continues, academics, IT professionals and decision makers need a deeper
understanding of electronic service initiatives sustainability. Yet, analysis of
IS academic literature reveals that electronic service initiatives
sustainability, has received little in depth attention. This paper investigates
the current state of electronic service initiatives sustainability research in
IS lit¬erature. The article detailed out a review of literature from main IS
journals. The study concludes with a tentative operational definition, a list of
source references, and an agenda for related future research. |
Keywords: |
E-service Sustainability, Information Systems, Systematic Literature Review,
Atlas.ti |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
RECONSTRUCTING, AUGMENTING AND MANIPULATING 3D SCENE FROM SEQUENCE OF IMAGES |
Author: |
Osama Hosam , Nadhir Ben Halima, Sameh Dakroury, Essam O. Abdel-Rahman |
Abstract: |
In this paper, the scene parameters are setup for scene reconstruction; camera
position and orientation are considered. Consecutive images are used to create
the depth map of the scene. After reconstructing the scene, we apply a new
methodology to augment the scene by using LAB color space and K-means
clustering. A general scheme for scene manipulation is also introduced. The new
methodology has shown high accuracy in scene reconstruction and augmentation. |
Keywords: |
3D Reconstruction, Scene Manipulation, Augmented Reality, Shape from Stereo, 3D
Point Cloud Generation. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
NEW TECHNIQUE FOR DUPLICATION THE REMOTE DATABASES BASED ON MULTI-AGENTS |
Author: |
NOREDDINE GHERABI |
Abstract: |
Most enterprises use multiple sites to store remote data. Therefore, it is
important to centralize the data in real time with efficient systems that
duplicate the data to a central site. In this paper, I present a new approach to
duplicate the data stored in multiple remote sites using multi-agents. These
facilitate the transfer of data and schema of a database automatically and
quickly, we exploit the communication between multiple agents to duplicate data
and schema. A prototype has been developed using multiple mobile agents to
extract the Relational-Object schema and corresponding data from a remote site,
and then make a comparison with the schema from the central site to duplicate
the data. The experimental results were highly significant, demonstrating that
the proposed method is feasible and effective. |
Keywords: |
Component; Web Semantic, Web Services. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
COMPARATIVE EVALUATION OF SERVICE INTERFACE APPROACHES TO SYSTEM INTEGRATION FOR
OPERATION CENTER |
Author: |
NORZIANA YAHYA, ABDUL HANAN ABDULLAH |
Abstract: |
System integration of an operation center has become more complex and
heterogeneous due to rapid innovations in the IT industry. Problems arise when a
new integration requirement emerges due to complexity of the system integration
architecture. To simplify the system integration, interoperability has to be
emphasized at the design stage. Architectural design is the stage wherein the
process to identify the interfaces involved in the system integration needs to
be considered. Approaches to simplifying system integration via service
interface design have been the subject of many research studies. In this paper,
case study on two (2) traffic operation centers in Malaysia i.e. Transport
Management Centre of Kuala Lumpur City Hall and Traffic Monitoring Centre of
Malaysian Highway Authority were conducted to identify gaps amongst the system
integration approaches used in both operation centers. Three (3) prominent
approaches of system integration used by both operation centers were chosen,
explored and discussed, namely, method-oriented interface, message-oriented
interface and resource-oriented interface. The result of a systematic comparison
of the approaches mentioned is also presented. Six (6) criteria were established
to make comparison on the approaches: interoperability, uniformity, scalability,
reusability, heterogeneity, and compatibility. The objective was to determine
the best contemporary approach to service interface design in centralized system
integration. The outcome of the evaluation was examined and improvement to the
service interface design is proposed. The study is very significant as an
attempt to establish a practice reference for enhancement of the current system
integration as well as serve as a guide for future deployment of operation
centers. |
Keywords: |
Service Interface Design; System Integration; Method-Oriented Interface;
Message-Oriented Interface; Resource-Oriented Interface |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
Title: |
CENTROID DYNAMIC SINK LOCATION FOR CLUSTERED WIRELESS MOBILE SENSOR NETWORKS |
Author: |
MANAR A. MIZHER, SALEH H. AL-SHARAEH, MEI CHOO ANG, AYMAN M. ABDALLA, MANAL A.
MIZHER |
Abstract: |
The wireless sensor network consists of three main components: a large number of
small-sized sensors, a remote sink connected to the internet, and a cluster head
whose existence depends on the overall network structure. The sensor in the
wireless sensor network can be deployed through many ways, such as a simple
model, a random walk model, and a random direction model. There were studies
that examined networks and their various installation methods to save energy
consumption and increase the network lifetime. These were usually achieved by
formatting the network structure with one or multi-sinks, with or without
clusters, or using static or mobile components such as sink, cluster heads, and
sensors. In addition, using a homogeneous or heterogeneous environment implies
using special devices as cluster heads or electing them from sensors
periodically at specified times depending on different protocols. Previous
studies did not focus on saving energy when all network's components were
mobile. Our scheme, Centroid Dynamic Sink Location (CDSL), focuses on this case
and aims to reduce the energy consumption through moving the sink to the optimal
location with respect to the cluster heads. The simulation results indicated
that the CDSL scheme increases the network lifetime by saving the cluster heads
energy. When the sink is mobile, the network lifetime increased in all cases
from 14.21% to 53.09% compared to that which use a fixed sink. |
Keywords: |
LEACH, Mobility model, Cluster Heads, Centroid algorithm, Power saving. |
Source: |
Journal of Theoretical and Applied Information Technology
31st March 2015 -- Vol. 73. No. 3 -- 2015 |
Full
Text |
|
|
|