|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2014 | Vol. 61 No.1 |
Title: |
MOBILE SINK BASED RELIABLE AND ENERGY EFFICIENT DATA GATHERING TECHNIQUE FOR WSN |
Author: |
P. MADHUMATHY, D. SIVAKUMAR |
Abstract: |
In wireless sensor network (WSN), data gathering causes more energy consumption.
Also most of the existing literature work on data gathering process considers
only distance and node density and skips reliability criteria. Hence in order to
offer both reliability and energy efficiency, in this paper, we propose to
design a Mobile Sink Based Reliable and Energy Efficient Data Gathering
technique for WSN. In this process, a biased random walk method is used to
determine the next position of the sink. Then, a rendezvous point selection with
splitting tree technique is used to find the optimal data transmission path.
When the data is sensed and ready for transmission, the sensor node encodes the
data and communicates it to the sink. On receiving the encoded data from the
sensors, the mobile sink decodes the messages and stores the resulting block in
its local buffer. Once all blocks have been correctly decoded, the mobile sink
reconstructs the original bundle. The increased packet losses in a specific
region of the network can be prevented by increasing the pause time of the sink.
By simulation results, we show that the proposed technique increases the
reliability and energy efficiency. |
Keywords: |
Mobile Sink, Data Gathering, Rendezvous Point, Splitting Tree Technique, Energy
Efficiency, Biased Random Walk |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
THE USE OF GREEN INFORMATION TECHNOLOGY GOVERNANCE MODEL TO DETERMINE CAPABILITY
MATURITY LEVEL IN DKI JAKARTA PRIVATE HIGHER EDUCATION INSTITUTIONS |
Author: |
NURIL KUSUMAWARDANI SOEPRAPTO PUTRI, HUDIARTO, ARGOGALIH, HANDI MULJOREDJO |
Abstract: |
Defined as the use of eco-friendly system and information technology, green
Information Technology (IT) has been adopted in most world class universities
worldwide. Meanwhile, DKI Jakarta as the capital city of Indonesia has a total
of 325 private higher education institutions. Green IT term is quiet well known
in these areas, although its implementation is still sporadic. However,
information technology (IT) gives fully support toward the learning process at
the campus area. As its project scope, this research was focused in DKI Jakarta,
but it is applicable for others. Many research on green IT or green computing
have been conducted, however none of them focusing on Private Higher Education
Institutions in Indonesia. Based on the previous research done by various
Private Higher Education Institutions,IBM and Green Computing Methodology by
GTYS , the Green IT Governance Model for Private Higher Education Institutions
in DKI Jakarta area was developed. However, further researches are expected in
order to develop the best practice. Furthermore, energy saving, waste management
systems and information technology will be controlled accordingly and the threat
of toxins that can harm our health can be avoided. |
Keywords: |
Private Higher Education Institution, Green IT, Green IT Model |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
A REVIEW ON CMOS GM-C BAND PASS FILTERS IN RF APPLICATION |
Author: |
MOHAMMAD ARIF SOBHAN BHUIYAN, MASTURA BINTI OMAR, MAMUN BIN IBNE REAZ, KHAIRUN
NISA MINHAD, FAZIDA HANIM HASHIM |
Abstract: |
Fully integrated CMOS band-pass filter is a prerequisite of all modern
transceivers. The filters are expected to encompass very low power dissipation,
relatively higher Q-factor with proper centre frequency tuning. But there is
some trade off among the parameters. Conventional band-pass filters suffer from
some inevitable drawbacks which are not prominent in CMOS Gm-C configuration. In
this paper, a review on the advancement of Gm-C filter circuits, illustrated in
different literatures, is discussed with their merits and demerits. This review
will serve as a comparative studies and reference for the researchers in
designing future high performance band-pass filters for wireless transceiver
frontend applications. |
Keywords: |
CMOS, Low Power, Bandpass Filter, RF |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
EVALUATION OF MOST USER BAND (MUB) ATTACK IN A COGNITIVE RADIO NETWORK BASED ON
SUB-NYQUIST SAMPLING |
Author: |
R.SABITHA, Dr.K.R.SHANKAR KUMAR, CHRISTO REEGAN RAJ.V, RAMYA BHARANI.G |
Abstract: |
The unused or under-utilized TV bands are opportunistically utilized by
Cognitive Radio enabled IEEE 802.22 Wireless Regional Area Networks(WRAN).
However due to the nature of cognitive radio networks and lack of proactive
security protocols, the IEEE 802.22 networks are vulnerable to various Denial of
Service (DoS) threats. In this paper the target band for DoS attack is a
specific band called as Most User Band which has maximum number of users among
the available sub bands in the CR network. We propose a countermeasure strategy
(Time concealment strategy), to counter the MUB attack. Simulation results are
provided to demonstrate the effectiveness of the proposed MUB attack and TCS
with attack time control for further survival improvement of secondary nodes. |
Keywords: |
Cognitive Radio, Denial Of Service Attack, Most User Band Attack, Sensing Time,
Attack Time Control. |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
CRYPTANALYTIC ATTACKS ON RIVEST, SHAMIR, AND ADLEMAN (RSA) CRYPTOSYSTEM: ISSUES
AND CHALLENGES |
Author: |
ADAMU ABUBAKAR, SHEHU JABAKA, BELLO IDRITH TIJJANI, AKRAM ZEKI, 4HARUNA CHIROMA,
MOHAMMED JODA USMAN, SHAKIRAT RAJI, MURNI MAHMUD |
Abstract: |
RSA cryptosystem is an information security algorithm used for encrypting and
decrypting of digital data in order to protect the content of the data and to
ensure its privacy. Prior research studies have shown that RSA algorithm is very
successful in protecting enterprises commercial services and systems as well as
web servers and browsers to secure web traffic. In an email application, it's
utilized to ensure the privacy and authenticity of email message. Some studies
have also shown the efficiency of RSA algorithm in securing remote login
sessions, and electronic credit-card payment systems. Generally RSA algorithm
gain a security support because of it’s frequently use in most applications
where security of digital data is mostly a concern. Its strength lies with its
ability of withstanding many forms of attacks. While many studies focus on
proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet
there are some confrontations on the circumstances of applying those attacks.
This paper presents the issues and challenges on some key aspects of
cryptanalytic attacks on RSA algorithm. The paper also explores the perceived
vulnerabilities of implementing RSA algorithm which can render a cryptanalyst
easier means of attack.
|
Keywords: |
RSA Cryptosystem, Cryptanalysis, Cryptanalytic Attacks |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
IDENTIFICATION OF VOLCANO HOTSPOTS BY USING STANDARD BACK PROPAGATION (SBP)
ALGORITHM VIA SATELLITE IMAGES |
Author: |
MR.S. MUNI RATHNAM, Dr.T.RAMASHRI |
Abstract: |
Remote Sensing is vital because of their pressing need due to the analysis of
natural hazards. Among the various natural hazards, the Volcanoes are terrific
hazard which may harm the nature as well as the living things. Due to the
aforesaid reasons, the identification of volcanoes and their hotspot
identification are important to protect the living things. A mechanism which
will be utilized to identify the volcanoes and their hotspot from the satellite
images is proposed. Initially, the color space of the satellite image will be
converted to another color space to identify the contents of the image clearly.
After this process, the image will be segmented to identify the volcano’s
hotspot. In order to identify the hotspot of volcano, the Artificial Neural
Network (ANN) is utilized which uses Standard Back Propagation (SBP) Algorithm.
The proposed mechanism will be developed with the aid of the platform MATLAB
(version 7.11). |
Keywords: |
Remote Sensing, Traffic Hazard, Volcano, Satellite Imaging, Hotspot
Identification, SBP |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
GAME-THEORETIC NASH-EQUILIBRIUM AND ECMDP-RANKING POLICIES FOR VERTICAL HANDOVER
DECISION WITH EMERGENCY BRAKING IN VANETS |
Author: |
P. VETRIVELAN, S.SIVA MAHARAJAN, AND P. NARAYANASAMY |
Abstract: |
A Vehicular Ad-hoc Networks (VANETs) is a technology that uses moving vehicles
as nodes in a network to create a mobile network. Vehicular communications like
V-2-V and V-2-I with vertical handover decision process has to consider the
speed limits and other real-time constraints such as lane-changes, emergency
braking along with QoS parameters such as bandwidth, delay, jitter, bit error
rate and cost. The proposed handover mechanism uses a game-theoretic Bayesian
Nash-equilibrium based algorithm to select the network indicated by the
Nash-Equilibrium point and uses a Extended Constrained MDP (Markov Decision
Process) based algorithm with speed constraints in case of a tie between the
networks. |
Keywords: |
WiFi, WiMAX, LTE, MIHF, Bayesian Game, MDP, VANETS |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
A FLEXIBLE WEB SERVICE ENVIRONMENT WITH HIGH RANGE OF SECURITY AND QoS
MECHANISMS |
Author: |
CHAKARAVARTHI.S , SELVAMANI.K |
Abstract: |
Providing information with Quality of Service (QoS) through Web services is
essential to QoS-aware service management and composition. Delivering QoS on the
Internet is a critical and significant challenge due to its dynamic and
unpredictable nature. Even though the UDDI registry has all the details of WSDL
documents provided by the service provider, it does not suggest the client to
have a service with QoS parameters. In this proposed model, the UDDI extension
is suggest to provide the Quality of Service information the customers.
Moreover, the user affords the self encrypted data (privacy preserving) to the
requester agent. The requester agent again encrypts the data by providing and
considering the important QoS requirement for security. With the process of
privacy preserving, the HTTPI protocol having the more secure capability like
HTTPs. Thus the property of the HTTPs is integrated with HTTPI protocol and
satisfies the QoS requirements for mechanisms, such as authentication,
authorization, integrity and confidentiality in various level like Application
level, Message Level and Transport level. QoS also covers non functional
characteristics like performance (throughput), response time, security,
reliability and capacity. This paper also analysis with non functional QoS
parameters. Experimental results shows that our proposed work has excellent
throughput, good response time and reply size in various configurations. |
Keywords: |
Quality of Services, UDDI, Web Services, Privacy Preserving |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN INDOOR-OUTDOOR POSITIONING SYSTEM BASED ON THE COMBINATION OF GPS AND UWB
SENSORS |
Author: |
ABDELGHANI BELAKBIR, MUSTAPHA AMGHAR, NAWAL SBITI |
Abstract: |
Today localization techniques are gaining popularity because of the high
interest for many business cases as well as for emergency/security scenarios
including real-time tracking, navigation, clock synchronization … The need to
obtain a precise position in a short time at any point, leads to use an
efficient navigation system. In outdoor environments, GNSS (GPS, Galileo,...) is
used and provide a good accuracy, but in the indoor environments, GNSS signal is
deteriorated due to the signal degradation by different obstacles, so other
techniques are used to locate users such as IR, RF, Cellular network or GNSS
repeater. This paper provides a new design of Indoor-Outdoor positioning system
based on the combination of data from UWB and GPS sources. |
Keywords: |
Indoor Localization, Fusion Data, UWB, GNSS, RF Localization, Sensor Network. |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
MRI BRAIN SEGMENTATION VIA HYBRID FIREFLY SEARCH ALGORITHM |
Author: |
WALEED ALOMOUSH, SITI NORUL HUDA SHEIKH ABDULLAH, SHAHNORBANUN SAHRAN, RIZUANA
IQBAL HUSSAIN |
Abstract: |
Magnetic resonance imaging (MRI) brain tumor segmentation is a challenging tasks
which include the detection task of tumor from images. In general, this process
is done manually by experts in medical images field which is always unclear,
because the similarity between normal and abnormal tissues. The present study
proposes a new clustering approach based on the hybridization of firefly
algorithm (FA) and fuzzy c-means algorithm(FCM) called (FFCM) to segment MRI
brain images. this approach use the capability of firefly search to find optimal
initial cluster centres for the FCM and thus improve (MRI) brain tumor
segmentation. The proposed approach was evaluated by applying it to a magnetic
resonance imaging (MRI) brain segmentation problem using a simulated brain data
set of McGill University and real MRI images from Internet Brain Segmentation
Repository benchmark data sets. The cluster validity index (Rm) was used as a
fitness function to determine the best solutions obtained by the firefly
algorithm. The experiments indicated encouraging results after applying FFCM,
compared with the outcomes of state-of-the-art segmentation algorithms and FCM
random initialization of cluster centres. |
Keywords: |
Fuzzy c-means, Firefly algorithm, MRI Images segmentation, Rm validity index |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
APPLICATION OF NEURAL NETWORK TRAINED WITH META-HEURISTIC ALGORITHMS ON FAULT
DIAGNOSIS OF MULTI-LEVEL INVERTER |
Author: |
M.SIVAKUMAR, R.M.S.PARVATHI |
Abstract: |
Growing industrial need makes the choice of fast response, accurate and
efficient systems. The Multilevel inverter based induction drives (MLID) are the
best solution for the industrial drive needs, which reduces the harmonics and
increases the efficiency of the system. And also the need for hybrid electric
vehicles increases the need of an efficient traction system with the use of
multilevel inverters. As multilevel inverter has many semi-conductor switches,
it is difficult to identify the fault in it. In this paper a new fault diagnosis
method by using the total harmonic distortion (THD) of the voltage waveform and
to classify the fault, neural network (NN) trained with back propagation,
genetic algorithm (GA) and also with particle swarm optimization (PSO) is
applied and the results are compared. Results shows that NN trained with PSO
gives fast response in training algorithm when compared to BP and GA. Here a
cascaded multi-level inverter based three-phase induction motor drive is taken
as the test system. Mat-lab software is used to analyse the effectiveness of the
test system and results are tabulated. |
Keywords: |
Fault diagnosis, neural network, Particle Swarm Optimization, Genetic Algorithm,
Cascaded multi-level inverter, Total Harmonic Distortion. |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
ANALYSING PERFORMANCE OF SUPER-CAPACITOR AND BATTERY IN LOW VOLTAGE ELECTRICAL
DISTRIBUTION SYSTEMS |
Author: |
AHMED AL-JANAD, ROSLI OMAR, M. RASHEED, Z. IBRAHIM, M. H. A. MUSTAPHA |
Abstract: |
The aim of this research project is to analyze and design of energy storages in
electrical distribution system. The proposed energy storages consist of
super-capacitor and battery based on MATLAB/SIMULINK software environment. These
two types of energy storages is implemented to two level voltage source
inverters (VSI). The controller d-q reference frame technique is used and
applied to the two level inverters. In order to avoid high frequency ripple from
inverters output, low pass filter is investigated. The various performances of
simulation results between super-capacitor and battery have been investigated.
The Total Harmonic Distortion (THDv) of the inverter output voltage is measured
where two types of energy storages (battery and super capacitor) are applied to
the inverter input. It can be observed that the THD voltage and current at load
for the super capacitor is considerably lower than the battery. |
Keywords: |
Super capacitor (SC), Total Harmonic Distribution (THDv), Voltage Source
Inverter (VSI). |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
WATER CYCLE ALGORITHM FOR ATTRIBUTE REDUCTION PROBLEMS IN ROUGH SET THEORY |
Author: |
AHMED JABBAR, SUHAILA ZAINUDIN |
Abstract: |
The attribute reduction is known as the procedure for decreasing the number of
features in an information system and its action is a vital phase of data mining
processing. In the attribute reduction process, the least subset of attributes
is selected (according to rough set theory which is employed as a mathematical
tool) from the initial set of attributes with very little loss in information.
In this study, a new optimization approach, known as the water cycle algorithm (WCA),
has been used for attribute reduction and the rough set theory is employed as a
mathematical tool to assess quality of solutions that are produced. The idea of
the WC as an optimization algorithm was derived from nature, after examining the
whole water cycle process which involves the flow of streams and rivers into the
sea in the natural world. The WC-RSAR has been employed in public datasets that
are obtainable in UCI. From the findings of the experiments, it has been shown
that the suggested method performs equally well or even better than other
methods of attribute selection. |
Keywords: |
Attribute Reduction, Water Cycle Algorithm, Rough Set Theory. |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF A UWB WIRELESS INDOOR RAKE RECEIVER USING CONTINUOUS AND DISCRETE
WAVELET TRANSFORM APPROACHES |
Author: |
RASHID A. FAYADH, F. MALEK, HILAL A. FADHIL, SAMEER K. SALIH, FARRAH SALWANI
ABDULLAH |
Abstract: |
In this paper, four levels of analysis and synthesis filter banks are proposed
to create, coefficients for a continuous wavelet transform (CWT), a discrete
wavelet transform (DWT), and an inverse, discrete wavelet transform (IDWT). The
main property of these wavelet transform schemes is their ability to construct
the transmitted signal across a log-normal fading channel over additive, white
Gaussian noise (AWGN). There are many applications of wavelet transforms in
wireless communication systems, and we chose the design of rake receivers as a
major application to mitigate interferences and reduce the noise. In this
research, a new scheme of rake receivers was proposed to receive indoor,
multi-path components (MPCs) for ultra-wideband (UWB) wireless communication
systems. Rake receivers consist of a continuous wavelet rake (CWR) and a
discrete wavelet rake (DWR), and they use huge bandwidth (7.5 GHz), as reported
by the Federal Communications Commission (FCC). The indoor channel models chosen
for analysis in this research were the line-of-sight (LOS) channel model (CM1
from 0 to 4 meters) and the non-line-of-sight (NLOS) channel model (CM3 from 4
to 10 meters). Two types of rake receiver were used in the simulation, i.e.,
partial-rake and selective-rake receivers with the maximal ratio combining (MRC)
technique to capture the energy of the signal from the output of the rake’s
fingers. In the simulation, the transmitted and received radiations are
presented with UWB single-in, single-out (SISO) with Walsh matrix coding. |
Keywords: |
UWB Indoor Wireless Communication Systems, LOS And NLOS Channel Models,
Continuous Wavelet And Discrete Wavelet Rake Receivers, Analysis And Synthesis
Filter Banks. |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
FACE RECOGNITION SYSTEM ON ANDROID USING EIGENFACE METHOD |
Author: |
OKA SUDANA, A. A. K., DARMA PUTRA, I K. G., ALAN ARISMANDIKA |
Abstract: |
Face recognition is a biometric technology that can be applied to the various
fields in terms of human identity. The continued development of technology, face
recognition is also adopted in the latest technologies such as android devices
are applied to complete the job. In this paper, demonstrates the face
recognition system in android device using eigenface. The system can be used as
the base for the development of android applications such as android mobile
security application and as an archive for the recognition of human identity.
The experiment of face recognition system in this paper uses 50 facial images as
test images. Test images and training images are taken directly with the camera
in android device with a distance of face shooting is 60 cm. The test results
showed that the system produces high accuracy with a success rate reaches 94,48%
with FMR = 2,52% and FNMR = 3%. |
Keywords: |
Face Recognition, Eigenface, Threshold, Face Detection, Android Application |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
ERP PERFORMANCE AS INTERVENING VARIABLE TO FINANCIAL PERFORMANCE FOR ERP
IMPLEMENTATION, ADHERENCE TO COSO, AND GCG IMPLEMENTATION |
Author: |
JULISAR |
Abstract: |
The objective of this study is to make a conceptual framework for testing the
correlation hypothesis of ERP implementation, adherence to COSO, and GCG
implementation. Then, the writer will test the effect of ERP implementation,
adherence to COSO, and GCG implementation to ERP implementation and its
implications to financial performance. This conceptual framework will use ERP
performance as intervening variable. This writing is aimed at manufacturing
industries in Indonesia which have implemented ERP, guided by COSO, and applied
GCG as well. From the previous studies, there are spaces to do a research
relating to ERP implementation, adherence to COSO, and GCG implementation to ERP
implementation and its implications to financial performance. This research is
still a literature study, so that the concept written here is still a conceptual
framework which has to be tested empirically. |
Keywords: |
ERP, COSO, GCG, Financial Performance |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF A NEW CLASS OF CODES WITH FLEXIBLE CROSS CORRELATION FOR
SAC-OCDMA SYSTEM |
Author: |
C. B. M. RASHIDI, S. A. ALJUNID, M. S. ANUAR, HILAL A. FADHIL, F. GHANI |
Abstract: |
Design and analysis of a new class of code for the Spectral Amplitude
Coding-Optical Code Division Multiple Access (SAC-OCDMA) system is presented.
The proposed code is called the Flexible Cross Correlation (FCC) code. The FCC
code has advantages such as the flexibility in-phase cross-correlation given any
number of users and weights. These proposed codes can effectively suppress Phase
Induced Intensity Noise (PIIN), has the Multiple Access Interference (MAI)
cancellation property and easy in the code construction. We found that, from the
theoretical analysis, FCC code had better achievement indicated that, the FCC
code can accommodate 240 simultaneous users as compared to former SAC-OCDMA
codes. FCC code also has low effective receive power (Psr) equal to -21 dBm at
error floor 10-9. The extensively simulation results, FCC code are well up to 45
km at system performance BER 10-9 for bit rate 155 Mbps as compared to 622 Mbps
only perform 10 km with exponentially increases to BER 10-2 error floor. |
Keywords: |
FCC Code, MAI, SAC-OCDMA, PIIN, Optical Transmission |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS AND DESIGN OF ACCOUNTING INFORMATION SYSTEM FOR SMALL MEDIUM ENTERPRISE
CASE STUDY FROM INDONESIA |
Author: |
Kelvindra Suryadi , Holly Deviarti, Vini Mariani, |
Abstract: |
This paper deals with the implementation of accounting information system in a
Small Medium Enterprises (SME) herb medicine manufacture from Indonesia. The
manufacture is facing problems in system process costing, lack of supervision on
inventory of raw material and finished goods. For the analysis and design of
accounting information system is done with Object-Oriented Analysis and Design (OOAD)
drawn using Unified Modeling Language (UML) notation and for the cost
calculation using weighted average method. Implementation accounting information
system can help the company to do every activity of daily process costing and
assist management in decision making. |
Keywords: |
Accounting Information System, Object-Oriented Analysis And Design, Unified
Modeling Language |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
THE ROLE OF KNOWLEDGE MANAGEMENT SYSTEM IN SCHOOL: PERCEPTION OF APPLICATIONS
AND BENEFITS |
Author: |
YOHANNES KURNIAWAN |
Abstract: |
The role of knowledge management is to assure competitiveness, through
capturing, storing, sharing, and utilizing knowledge in an innovative way. In
this paper, discusses the role of knowledge management from the perception of
application features and benefits. Knowledge management is a new field and
experiments are just beginning in school. We believe there is tremendous value
to school institutions that develop initiatives to share knowledge to achieve
business objectives. This knowledge management can be classified as support for
teaching and non-teaching staff. After we understand the application features,
we will then become far more motivated to look further at the value and benefits
of knowledge management in school. The article seeks to identify the features
for application of knowledge management in school (primary and secondary
education sector). It also details the nature of the role of knowledge
management in innovation, improve academic services, or achieve operational
excellence. The conclusion is that knowledge based system, could be used in
schools, facilitating the knowledge management within the school for academic
services. |
Keywords: |
Knowledge Management, School, Application, Benefit, Application |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
DATAWAREHOUSE SALES AND SUPPLY OF GOODS MODEL BASED ON HTML5 |
Author: |
MICHAEL YOSEPH RICKY |
Abstract: |
The purpose of this study was to conduct an analysis of sales and inventory
systems that exist in the company, then designing a data warehouse for PT. Delta
Djakarta, Tbk. to support the decision-making process in estimating the number
of sales in the future, then found the existing problems and provide solutions
to the company so that the company can overcome the existing problems and
provide the best service to its customers. The method used in this research is a
nine step methodology that is a model of systematic data warehouse in building
data warehouse with through the stages of choosing the process, choosing the
grain, identifying and confirming the dimension, choosing the facts, storing
pre-calculation in the fact table, rounding out the dimension table, choosing
the duration of the database, tracking slowly changing, deciding the query
priorities and the query modes. The results of this study are the form of
websites using HTML5 and data a warehouse information extraction model that
provide sales and inventory companies and an application that can be used for
all trading companies that sell products finished material. The conclusions
obtained from this research is a data warehouse models and applications that can
help executives (stakeholders) in obtaining the multidimensional report, where
the report can be directly obtained by performing customized according to the
wishes of stakeholders as a decision maker. |
Keywords: |
Data Warehouse, Nine Step Methodology, HTML5 |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
CLUSTERING OF HIGH DIMENSIONAL DATASET USING K-MAM (MAX-AVG-MIN) METHOD WITH
PRINCIPAL COMPONENT ANALYSIS A HYBRID APPROACH |
Author: |
S.DHANABAL , DR.S.CHANDRAMATHI |
Abstract: |
Clustering the high-dimensional data set is one of the main issues in clustering
analysis. Reducing the data from high-dimensional to a meaningful representation
of low dimensional will increase the efficiency of clustering algorithms. The
performance of K-means clustering algorithm is poor for high dimensions. Hence,
to improve the efficiency, in this paper, we apply the efficient dimension
reduction technique, Principal Component Analysis (PCA), to obtain possible
uncorrelated variables, called Principal Components (PCs), from the original
dataset. Then the reduced set is used to find the initial centroid using the
k-means initialization method, k-MAM (Maximum-Average-Minimum) and then it is
applied to K-Means clustering algorithm. The results are compared to k-means
with PCA. The final results show that the k-MAM with PCA outperforms well in
terms of accuracy and number of iterations compared to k-means, k-MAM and
k-means with PCA for high dimensional data set. |
Keywords: |
Clustering-Dimensionality Reduction - Principal Component Analysis - K-Means
Algorithm- Initialization Method- K-MAM. |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
ANSWERING INCOMING CALL FOR IMPLICIT AUTHENTICATION USING SMARTPHONE |
Author: |
M.F.A. ABDULLAH, H. K. BASHIER, S. SAYEED, I. YUSOF, A. AZMAN, S. Z. IBRAHIM,
LIEW T. H |
Abstract: |
Smartphones are being used to keep sensitive data and make private transaction
other than making calls and receive short messages. Thus, authentication of the
smartphones becomes very crucial and important aspect. However, users feel
inconvenience and difficult with current authentication methods, from password
up to physical biometrics. Implicit authentication system emerged intending to
improve the security and convenience of the smartphone users. One of the
approaches is considering the way users answer incoming phone calls using their
smartphones. We study and evaluate the voice signal from users when answering
incoming phone calls. Our study shows that the voice signals capable of
authenticating the smartphone users. The experiment conducted shows a very high
performance with 98.9% accuracy. These findings will promisingly augment that
the novel implicit and transparent authentication system based on voices of
answering incoming phone calls is feasible so that authentication of
smartphone’s users become easier and unobtrusive. |
Keywords: |
Implicit Authentication, Smartphone Security, Speaker Recognition, Signal
Processing |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
A MODIFIED LEMPEL–ZIV WELCH SOURCE CODING ALGORITHM FOR EFFICIENT DATA
COMPRESSION |
Author: |
MAHMOUD A. SMADI, QASEM ABU AL-HAIJA |
Abstract: |
Lempel–Ziv Welch (LZW) algorithm is a well-known powerful data compression
algorithm created by Abraham Lempel, Jacob Ziv, and Terry Welch. The algorithm
is designed to be fast to implement but is not usually optimal because it
performs only limited analysis of the data. A modified LZW algorithm on source
coding will be proposed in this paper to improve the compression efficiency of
the existing algorithms. Such method is to be implemented with appropriate
modifications that gives the best performance and satisfies the requirements of
the applications. |
Keywords: |
LZW algorithm, substitution compression, encoding/decoding process |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
A FUZZY NEURAL NETWORK AND MULTIPLE KERNEL FUZZY C-MEANS ALGORITHM FOR SECURED
INTRUSION DETECTION SYSTEM |
Author: |
P.ANANTHI , P.BALASUBRAMANIE |
Abstract: |
An Intrusion Detection System (IDS) is a security layer used to detect constant
intrusive behavior in information systems. Many intrusion detection systems have
been proposed based on the various data mining approaches such as decision tree,
clustering, etc. Although the intrusion detection system is efficient way to
find the attacks in the system, existing ones have some disadvantages which
affects the performance of the system. It is observed that Neural Networks
improves the overall performance of the intrusion detection system when it is
integrated with a clustering approach. This research work aims to improve the
performance of the intrusion detection system through the application of Fuzzy
Neural Network along with an efficient fuzzy clustering method. In this proposed
approach, initially Multiple Kernel Fuzzy C-Means (MKFCM) technique is used to
construct different training subsets. The performance of the fuzzy clustering
approach is improved through MKFCM. Then, different FNN models are trained to
formulate different base models according to the different training models. Then
the final results are aggregated through fuzzy based approach. The performance
of the proposed MKFCM-FNN approach is compared with other existing approaches. |
Keywords: |
Intrusion Detection System, Fuzzy Neural Network, Multiple Kernel Fuzzy C-Means,
false positive |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN RFID SIMULATION FOR THE SUPPLY CHAIN MANAGEMENT OF THE UK DENTAL INDUSTRY |
Author: |
FERNANDO FELIX, RAUL VALVERDE |
Abstract: |
This paper documents an RFID simulation for the supply chain management in the
dental industry in the UK. The paper starts with a preliminary analysis of the
UK dental product industry followed by a literature review on topics of IT and
Logistics and Technological innovation. A case study from UK dental industry is
selected for the study and a supply chain analysis conducted in order to
discover the business processes and problems. A proposed solution with RFID
technology to the encountered problems is simulated and then compared with the
current supply chain system and metrics calculated for comparison and
justification of the introduction of the RFID technology. |
Keywords: |
JIT, Supply Chain Systems, RFID, Dental Industry |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
Title: |
GLOBAL MODELING OF A NEW THREE PHASE HV POWER SUPPLY FOR MICROWAVES GENERATORS
WITH N MAGNETRONS BY PHASE (TREATED CASE N=1) UNDER MATLAB SIMULINK CODE |
Author: |
AOULD.AHMEDOU.M, BASSOUI.M, FERFRA.M, CHRAYGANE.M, BELHAIBA.A, EL GHAZAL.N,
BAHANI.B |
Abstract: |
In the industrial installations of microwave generators, the current single
phase power supply uses a single-phase HV power transformer with magnetic shunts
for each magnetron. Based on the encouraging results obtained from the modeling
of a new generation of single-phase HV power supplies for industrial microwaves
generators with N magnetrons, we performed a feasibility study for a new
three-phase HV power supply with N magnetrons per phase. In this paper, we
present an original conception of a new three-phase of HV power supply for
microwaves generators with N magnetrons per phase (treated case N = 1). The
modeling of this new generation of power supply for magnetrons passes
obligatorily by modeling and dimensioning of its own new three-phase HV power
transformer with shunts. This modeling of the new three-phase HV power supply of
one magnetron by phase, consists to exploiting the model of new three-phase HV
power transformer with shunts by MATLAB-SIMULINK code. This model, resulting
from the diagram of the armored magnetic circuit tetrahedron type equivalent of
this transformer with magnetic shunts, is a π quadruple model with saturable
inductances able to translating the saturation phenomena. The electrical signals
obtained (currents and voltages) are variable magnitude curves, periodic and
non-sinusoidal dephased 2π / 3 between them. These signals have the same form as
those of experimental of a cla ‘(ssical power supply containing one transformer
by magnetron. That presents multiple advantages in terms of reducing weight,
volume, electrical wiring and cost during the implementation and maintenance of
such a new device. |
Keywords: |
High Voltage (HV), Generators, Magnetrons, Matlab, Microwaves, New Modeling,-
Power Supply, SIMULINK, Three Phase Transformer |
Source: |
Journal of Theoretical and Applied Information Technology
10 March 2014 -- Vol. 61. No. 1 -- 2014 |
Full
Text |
|
|
|