|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2014 | Vol. 60 No.2 |
Title: |
THE IMPACT OF LOCATION BASED ATTACKS ON GEOGRAPHICAL ROUTING PROTOCOLS |
Author: |
B.MUTHUSENTHIL, S.MURUGAVALLI |
Abstract: |
Several applications of mobile ad hoc networks select geographical routing
especially the Greedy Perimeter Stateless Routing (GPSR) protocol due to its
scalability, efficiency, and ability to support location based applications.
However, there are many security issues in protecting location information,
which can easily be abused by attackers. Location based adversarial activities
affect the operation and performance of geographical routing protocols. There
are only a few works on the literature that studied the impact of location based
attacks on geographical routing. This work analyzes the impact of malicious
nodes on the GPSR performance associated with fake location. This proposal
identifies a set of possible location based attacks and analyzes the local
problems that arise from the location based adversarial activities. Finally, it
demonstrates the overall impact on the routing performance, by simulating the
network in various attack scenarios. This study illustrates the effect of the
adversarial activities with respect to the packet delivery ratio, overhead,
average end-to-end delay, routing loops, packet dropping probability, and
location error rate. The simulation results concluded that the overall routing
performance degrades, depending on the type and percentage of adversaries. |
Keywords: |
Location Based Routing, Location Information, Active Attack, Passive Attack, And
Impacts |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
TMAS-TRIO MEASURE ASSESMENT SCHEME FOR EFFICIENT ROUTING IN WIRELESS SENSOR
NETWORKS |
Author: |
NAVANEETHAN.C, MUTYALA V.S.RATHNA KUMARI, THAMARAI SELVI.V, N.D.VIKRAM |
Abstract: |
Wireless sensor networks have become one of the buzzwords in the field of
networks. The challenging issue in wireless sensor networks is to design energy
efficient routing in wireless sensor networks which is mainly focuses on
increasing the network lifetime that emphasizes on main aspects namely residual
energy, link condition, network lifetime. We introduced an appealing mechanism
that supports for energy efficient routing titled as” Trio Measure Assessment
Scheme for Efficient Routing in Wireless Sensor Networks”. In TMAS algorithm
prioritized transmission count (PTX) is used for calculating node status and
link quality in addition to this we will balance the load for enhancing the
network life time. The main intention to introduce the scheme of load balancing
is that sensor nodes that are closer to sink carries more inter-cluster traffic
and hence deplete their energy faster than far away sensor nodes, So, by
assessing the node status and link quality and load balancing we will get
maximum results for efficient routing which will increase the network life time
. Our Simulation results on TMAS prove that it outperforms the network lifetime
and efficiently maintains the link quality among the clusters. |
Keywords: |
TMAS,PTX ,Node Status, Link Quality, Network Lifetime, Inter-Cluster Traffic. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
A SURVEY ON REPUTATION BASED SELFISH NODE DETECTION TECHNIQUES IN MOBILE AD HOC
NETWORK |
Author: |
S.SENTHILKUMAR, J.WILLIAM |
Abstract: |
Mobile Ad hoc Network (MANET) is well known for its limited transmission range
of wireless network interface. Hence, multiple hops (multi-hops) may be needed
for exchanging the information from one node to another across the network
without any base stations or routers. In MANETs, as there is no hierarchy among
nodes, every node is responsible for forwarding packets to its neighbouring
nodes. Due to severe resource constraints like memory, computing power, energy,
bandwidth and time, some nodes may not participate in forwarding the packets for
saving its resources. The presence of selfish behaviour among nodes may lead to
network partitioning and makes a major negative impact in throughput and the
network operation. To avoid such circumstances selfish node deduction is very
important. Already many selfish node detection mechanisms have been developed
and still exist. And this survey is to evaluate some of the reputation based
selfish node detection mechanisms and to analyze its merits and demerits. This
paper compares different methods based on QoS metrics as well as on node’s
behavioral analysis for reducing the effect of selfish nodes in mobile ad hoc
networks. |
Keywords: |
MANET, Multi-Hops, Selfish Nodes, QoS |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
CONCEPTUAL MODEL OF IT GOVERNANCE FOR HIGHER EDUCATION BASED ON COBIT 5
FRAMEWORK |
Author: |
HERU NUGROHO |
Abstract: |
Effective governance in an organization does not happen by coincidence. The
success of implementing effective governance in an organization associated with
the right pattern or fit for the organization so that they can be a complement
or supplement of organization's strategic focus. Information technology (IT)
governance is not a static concept but rather processes inherent in the
organization. Decentralized organizations such as a university need a regular
review to renew the IT governance structure to take account of changing business
and technological environment. However, the mechanism IT governance in an
organization will depend on the characteristics and needs of the organization.
ISO/IEC 38500 help the people at the highest levels in the organization to
understand and fulfill their legal obligations, regulations and ethics in
relation to the use of IT in their organizations by providing key principles.
COBIT 5 framework provides guidance how IT governance should be built by taking
into account the area of enterprise governance and management of governance
areas that both have their roles within the scope of IT governance. Conceptual
model of IT governance is built based on the main principles that should exist
in the process of governance with COBIT 5 framework guide as a reference how the
governance of IT must be organized with attention to area governance and
management areas, each rendered in a particular domain so that it will be a
guide for higher education for developing IT blueprint that not only seen as
supporting the IT aspects of academic and non-academic activities but look at
the overall aspects of the scope of university governance. |
Keywords: |
ISO/IEC 38500, IT Governance, COBIT 5 Framework, University Governance, key
Principles |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
S-MSE: ASEMANTIC META SEARCH ENGINE USING SEMANTIC SIMILARITY AND REPUTATION
MEASURE |
Author: |
P. VIJAYA , G. RAJU , SANTOSH KUMAR RAY |
Abstract: |
In order to increase web search effectiveness, Meta search engines are invented
to combine results of multiple search engines as a result of larger coverage of
indexed web. Meta search engine is a kind of system which is useful for internet
users to take advantage of multiple search engines in searching information.
Recently several approaches were developed using ontology and ranking measures.
Accordingly, Meta search engine is developed here using ontology and semantic
similarity measure. In order to bring semantic in keyword matching, a semantic
similarity measure (SSM) is developed. Here, every concept sets are matched with
the title sets using SSM that consider the hyponyms and hyponyms of the keywords
presented in the title sets. Along with three different ranking measures
relevant to contents, title sets and raking value given by the standard search
engines are effectively combined to improve the effectiveness. Finally, the
experimentation is carried out using different set of queries and the
performance of the meta-search engine is evaluated using TREC-style average
precision (TSAP) measure. The proposed semantic meta-search engine provides 80%
TSAP which is high compared with existing search engine and meta-search engine. |
Keywords: |
S-MSE, Search Engine, Semantic Similarity, Reputation Measure, TREC, TSAP |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
PATTERN REPRESENTATION MODEL FOR N-ARY RELATIONS IN ONTOLOGY |
Author: |
VINU P.V., SHERIMON P.C., RESHMY KRISHNAN, YOUSSEF SAAD TAKRONI |
Abstract: |
The vision of Semantic Web is to make web resources more accessible to automated
resources. Here the role of ontology is to provide vocabulary for metadata
description with computer-understandable semantics. The main components of
ontology are concepts, relations and individuals. The most common type of
relation is binary relation that maps between a single subject and a value.
Sometimes there exist n-ary relations in ontology. W3C provides several patterns
to represent n-ary relations. In this paper we discuss the issues in n-ary
relations, the concept of RDF reification and provide an appropriate pattern to
represent the n-ary relations. The examples of n-ary relations are taken from
Seafood Ontology we developed earlier. |
Keywords: |
N-Ary Relations, Reification, Semantic Web, OWL, RDF |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
THE BLOCK STORE OF BLOCK-BASED PROGRAMMING APPROACH |
Author: |
MUSTAFA ALMATARY, MARINI ABU BAKAR AND ABDULLAH MOHD ZIN |
Abstract: |
Block-based Programming approach is an software development approach that makes
programming task easier by enabling end user programmers to develop applications
by integrating software blocks. In order for block based programming approach to
be successful, there is a need for a large number of blocks to be developed in
various application domains. These blocks must be developed based on a certain
standard so that they can easily be combined with other blocks to create
applications. These blocks must also be distributed and shared so that they are
available for end users. This paper describes the concept and implementation of
block store, which is a is a web based repository system that enables blocks to
be managed and shared. |
Keywords: |
End-User Programming, Software Repository, Block-Based Software Development,
Component-Based Software Development. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
REAL CODED GENETIC ALGORITHM (RCGA): A NEW RCGA MUTATOR CALLED SCALE TRUNCATED
PARETO MUTATION |
Author: |
SIEW MOOI LIM, MD. NASIR SULAIMAN, ABU BAKAR MD. SULTAN, NORWATI MUSTAPHA, BIMO
ARIO TEJO |
Abstract: |
This paper presents a comparison in the performance analysis between a newly
developed mutation operator called Scaled Truncated Pareto Mutation (STPM) and
an existing mutation operator called Log Logistic Mutation (LLM). STPM is used
with Laplace Crossover (LX) taken from literature to form a new generational
RCGA called LX-STPM. The performance of LX-STPM is compared with an existing
RCGA called LX-LLM on a set of 10 benchmark global optimization test problems
based on a few performance criterions to investigate the reliability,
efficiency, accuracy and quality of solutions of both optimization algorithms.
The final outcomes show that LX-STPM is far superior than LX-LLM at all aspects. |
Keywords: |
Real Coded Genetic Algorithms, Mutation Operator, Crossover Operator, Global
Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
A CRITICAL OVERVIEW OF EXISTING QUERY PROCESSING SYSTEMS OVER HETEROGENEOUS DATA
SOURCES |
Author: |
Naoual MOUHNI, Abderrafiaa EL KALAY |
Abstract: |
In the past, to answer a user query, we generally extract data from one
centralized database or from multiple sources with the same structure. then
things have been changed and we are facing the fact that in some cases, it is
necessary to use a set of data sources to provide a complete information. these
sources are physically separated, but they are logically seen as a single
component to the final user. Besides the structure heterogeneity, there is
another important point for what specialists are trying to find a solution which
is the semantic heterogeneity of data sources. In this paper we are going to
provide a list of different approaches that treated the query processing problem
on heterogeneous data sources under different angles |
Keywords: |
Query Processing, Heterogeneous Data Sources, Ontology, Data Warehousing,
Federation |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
THE ROAD AHEAD FOR THE INDIAN IT AND ITES INDUSTRY CONSIDERING ITS SERVICE
OFFERINGS, DOMESTIC MARKET AND TECHNOLOGY TRENDS |
Author: |
LALIT S KATHPALIA, DR. R RAMAN |
Abstract: |
Offshoring has been a popular mantra over the past two decades. The Indian
Information Technology (IT) companies are finding ways and means to retain their
competitive advantage by changing delivery locations and giving value added
services offering. This paper delves into the current state of the Indian IT
services industry and attempts to find out the domestic IT services opportunity
from perspective of Indian IT vendors. The paper attempts study the domestic IT
market also explores the future of the Offshoring revolution for the Indian IT
industry. The papers throws light on the domestic opportunity that are still
left untapped and proposes a model for outsourcing, which can be adopted by
Indian IT giants for long term sustainability of business. |
Keywords: |
Outsourcing, IT services, Domestic IT services, Indian IT Industry,
Sustainability of Business |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN PARAMETER OPTIMIZATION BASED ON ARTIFICIAL BEE COLONY (ABC) ALGORITHM FOR
MEMS ACCELEROMETERS |
Author: |
KRUSHNASAMY V.S, A.VIMALA JULIET |
Abstract: |
As MEMS technology continue to grow, MEMS device design optimization is becoming
an interesting and important research issue. In order to design a MEMS device to
meet the given specifications, the relationship between the device performance
and various design parameters must be investigated. There are various
optimization algorithms that can produce an optimized design of MEMS. Designing
of MEMS accelerometer may include the parameters like Beam length, Beam width,
Beam depth, Beam mass, proof mass etc. The primary intension of this research is
to identify the optimal parameters to design an efficient accelerometer in MEMS.
Here the optimization will be done by using Artificial Bee Colony Optimization
(ABC) algorithm. This algorithm will overcome the issues of GA and the ABC based
design parameter optimization technique will helpful to design MEMs
accelerometer architecture. The fitness is based on the parameter die area with
specified range. The implementation of the proposed method will be done by
MatLab 7.12 and the performance will be analyzed with some existing
methodologies. |
Keywords: |
ABC(Artificial Bee Colony), MEMS,Optimization, Accelerometer,GA |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ENHANCEMENT OF SHUNT ACTIVE POWER FILTER WITH FUZZY AND HYSTERESIS
CONTROLLERS |
Author: |
K.SEBASTHIRANI, K.PORKUMARAN |
Abstract: |
This paper proposes fuzzy and hysteresis controllers based three phase Shunt
Active Power Filter for current harmonic compensation to improve the performance
of 3ɸ supply system feeding non- linear loads. The Shunt Active Power Filter is
used to eliminate current harmonics. The dc link control strategy is based on
the fuzzy logic controller. Gating pulses for the Shunt Active Filter is
generated using Hysteresis current controller based Pulse width modulation
technique. The proposed model is simulated in MATLAB/SIMULINK. Simulation
results show that the dynamic behavior is better than the conventional
Proportional- Integral (PI) controller and is found to be more robust for
changes in load. |
Keywords: |
Shunt Active Power Filter(SAPF), Fuzzy Logic Controller(FLC), Hysteresis current
controller, Harmonics, Total Harmonic Distortion (THD). |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
A DECISION SUPPORT TOOL FOR MODELING TIME-TO-EVENT DATA IN POWER SYSTEMS |
Author: |
ABDOLVAHHAB FETANAT |
Abstract: |
Survival analysis, also known as time-to-event analysis, focuses on modeling
waiting times until events of interest occur. This paper proposes statistical
flowgraph models (SFGMs) as a suitable decision support tool for survival
analysis in power systems. SFGMs are useful for modeling time-to-event data that
result from a stochastic process. Analysis from the flowgraph model gives an
entire waiting time distribution as well as cumulative distribution function,
survivor function and hazard function for any total or partial waiting time. The
importance of survival analysis in power system is demonstrated when our power
supply is disrupted. Two examples illustrated in this paper demonstrate with
clarity, the effectiveness of SFGMs to the survival analysis in power systems.
One of the advantages of SFGMs is to reduce the multistate models into an
equivalent binary-state model. Based on this study, the authors suggest that the
use of SFGMs will help decision makers to identify weak points in the system in
order to control system conditions. |
Keywords: |
Hazard; Power System; Statistical Flowgraph Model; Survival Analysis;
Time-To-Event Data. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF 0.92 GHZ ARTIFICIAL MAGNETIC CONDUCTOR FOR METAL OBJECT DETECTION IN
RFID TAG APPLICATION WITH LITTLE SENSITIVITY TO INCIDENCE OF ANGLE |
Author: |
M. ABU, E. E. HUSSIN, A. R. OTHMAN, FAUZI. M. JOHAR, NORHIDAYAH M. YATIM, ROSE.
F. MUNAWAR |
Abstract: |
In this paper, the new structure of Artificial Magnetic Conductor is presented.
The AMC is designed to overcome the failure of detecting the RFID tag when
placed near to the metal based object. It is too complicated to design an AMC at
low frequency due to limitation of size and bandwidth. In this paper, the 0.92
GHz AMC is designed with different sizes and shapes of slots inserted into the
square PEC patch. The size of single unit cell of this AMC is 45.5 mm x 45.5 mm.
The AMC is designed in stacked layer to increase the bandwidth of single unit
cell. The optimized AMC at 0.92 GHz frequency, had increase the performance of
dipole antenna by return loss = -21.8 dB, gain = 3.0 4dB and directivity =
5.149. |
Keywords: |
Artificial Magnetic Conductor, RFID, Metal object detection |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
NEW INTERACTIVE MULTIMEDIA APPLICATION MODEL USING OBJECTS STORAGE IN A DATABASE |
Author: |
HASAN HARASIS |
Abstract: |
This paper presents a new interactive multimedia application model which
combines the advantages of object-oriented programming with aspect programming.
The model proposes a structure for multimedia applications with a good
reutilization of code in other applications and objects storage in databases. As
a result, the global time spend for realization of an entire multimedia
application is reduced and the size of the executing file is smaller. |
Keywords: |
Multimedia, Database, Object, Storage, Processing. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
APPLYING HYBRID GENETIC ALGORITHMS TO RECOVER FOCAL LENGTH, CAMERA MOTION AND 3D
MODELS FROM SILHOUETTES |
Author: |
AMINE MOUAfi, RACHID BENSLIMANE, AZIZA EL OUAAZIZI |
Abstract: |
In this paper, a hybrid method is applied to recover parameters and motion of
camera from a set of silhouettes of an object taken under circular motion.
Camera parameters can be obtained by maximizing the total coherence between all
silhouettes. Two optimization methods, the Powell optimizer (PO) and the Genetic
algorithms (GA), are applied to maximize the silhouette coherence and their
performances are compared for several experiments. To take advantage of the
strengths of the two methods, we developed a hybrid method that combines the
genetic algorithm and the Powell optimizer to improve the performances in term
of convergence speed and accuracy. The recovered parameters are used for 3D
image-based modeling to obtain high fidelity 3D reconstruction. |
Keywords: |
Hybrid Genetic Algorithms, Powell Optimizer, Silhouette Coherence, Parameters
Estimation, Circular Motion |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
LOGIC MODELLING AND MATHEMATICAL MODEL IN DEVELOPING A TREE SPECIES SELECTION
PROTOTYPE |
Author: |
KAMARUDIN SHAFINAH, NORAIDAH SAHARI, MOHD HASAN SELAMAT, RUSLI ABDULLAH, RIZA
SULAIMAN, MOHAMMAD MOHD IKRAM |
Abstract: |
Logic modeling and mathematical model can aid system analysts, system developers
and programmers to construct a system during a system development process. Logic
modeling and mathematical model are the techniques used in the system analysis
phase. In the midst of the most common logic modeling, are decision tables and
structured English. These techniques help the person in charge to develop a
system through illustrations in order to give better understanding and for
solving a problem specification. In this article, we briefly describe on
decision tables, structured English and mathematical model. The article aims to
explain the use of decision tables, structured English and mathematical model
for the development of a tree species selection prototype for Malaysian forest
plantation. The algorithms related to the analysis of the systems prototype were
also presented in this article. Overall, the techniques are capable of
supporting the data acquisition and presentation from the context of the given
problem specification. |
Keywords: |
Logic Modeling, Decision Tables, Structured English, Mathematical Model,
Prototype, Tree Species |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
A MATHEMATICAL APPROACH FOR IMPROVING THE PERFORMANCE OF THE SEARCH ENGINE
THROUGH WEB CONTENT MINING |
Author: |
S.SATHYA BAMA, M.S.IRFAN AHMED, A.SARAVANAN |
Abstract: |
Internet is a rapid growing technology that contains a vast and rich set of
information stored on the web. To retrieve, share and to process all these
information from the web, a tool has been created called search engine which
plays an essential role for the web users. On searching the information from web
servers through search engines, many irrelevant and redundant documents
containing the required information will be retrieved and presented to the
users. But this irrelevant and replicated information affects the performance of
the search engine by wasting the user’s time by surfing the uninterested
documents which is inefficient to the web users. So, to make the search
effective, and to improve the performance of the search, many researchers turned
their attention towards Web mining since web is used in almost all areas. Web
content mining is a sub area under web mining that mines required and useful
knowledge or information from the web content. Most existing algorithms focus on
applying weight age only to the common terms in the documents by which the
accuracy gets consecutively reduced. The performance of a search engine can be
improved through this proposed approach based on term frequency ranking to mine
the web contents. |
Keywords: |
Correlation Coefficient, Search Engines, Term Frequency, Web Content Mining, Web
Content Outliers. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF WLAN UNDER VARIABLE NUMBER OF NODES USING THE ADJUSTABLE
PARAMETERS IN EDCA |
Author: |
A.ANITHA, J.JAYAKUMARI |
Abstract: |
This paper deals with the performance analysis of WLAN under variable number of
nodes using the adjustable parameters such as TXOPLimit, CWmin, CWmax and AIFS
in EDCA. The comparative analysis is done by varying the number of nodes and the
adjustable Access Category (AC) parameters in the EDCA access mechanism. The
throughput and delay parameters of the QoS are measured. The simulation is done
using the Network Simulator NS-2.28 tool in RedHat Linux environment. The
simulation results obtained gave a better performance improvement using the
adjustable altered parameters in EDCA access method than the existing methods.
The high TXOP Limit gave a better performance increase than the other
parameters. |
Keywords: |
DCF, EDCA, TXOP Limit, QoS, Access category |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
A STRUCTURAL EQUATIONS MODELING OF PURCHASING DECISION THROUGH E-COMMERCE |
Author: |
TOGAR ALAM NAPITUPULU, OKKY KARTAVIANUS |
Abstract: |
The purpose of the study is to explore the factors influencing customer buying
decision through Internet shopping. Several factors such as information quality,
firm’s reputation, perceived ease of payment, sites design, benefit of online
shopping, and trust that influence customer decision to purchase from e-commerce
sites were analyzed. Factors such as those mentioned above, which are commonly
considered influencing purhasing decision through online shopping in other
countries were hypothesized to be true in the case of Indonesia. A random sample
comprised of 171 Indonesian people who have been buying goods/services through
e-commerce sites at least once, were collected via online questionnaires. To
test the hypothesis, the data were examined using Structural Equations Modeling
(SEM) which is basically a combination of Confirmatory Factor Analysis (CFA),
and linear Regression. The results suggest that information quality, perceived
ease of payment, benefits of online shopping, and trust affect online purchase
decision significantly. Close attention need to be placed on these factors to
increase online sales. The most significant influence comes from trust.
Indonesian people still lack of trust toward online commerce, so it is very
important to gain customer trust to increase sales. E-commerce’s business owners
are encouraged to develop sites that can meet the expectation of potential
customer, provides ease of payment system, provide detailed and actual
information and responsible for customer personal information and transaction
records. This paper outlined the key factors influencing online shopping
intention in Indonesia and pioneered the building of an integrated research
framework to understand how consumers make purchase decision toward online
shopping; a relatively new way of shopping in the country. |
Keywords: |
E-commerce; Online purchasing decision; Structural Equations Modeling;
Regression; Confirmatory Factor Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS AND LOCATION IDENTIFICATION OF STATCOM ON IEEE-14 BUS
SYSTEM USING POWER FLOW ANALYSIS |
Author: |
SUNDARARAJU.K, NIRMAL KUMAR.A, JEEVA.S, NANDHAKUMAR.A |
Abstract: |
FACTS devices open up wide and new opportunity for the enhancement of usable
capacity in the power system. This paper presents a comprehensive analysis of
STATCOM (STATic synchronous COMpensator) with IEEE-14 bus system concerning the
problem of variable loading and losses. The power flow analysis is performed on
a IEEE-14 bus system with and without STATCOM. Due to unequal loading, the most
affected bus is identified and the compensation is done in order to improve the
voltage for all the buses. The detailed investigations are carried out with
different loading and the performance of the IEEE-14 bus system is examined. The
voltage regulation and the reactive power compensation upto critical point of
voltage stability in the system is shown through proper output curves. These
investigations indicate the need of power flow analysis and location of STATCOM
on the proposed system. |
Keywords: |
Flexible AC Transmission Systems (Facts), Static Synchronous Compensator(STATCOM),
Power Flow Analysis, Ranking Analysis, Voltage Regulation |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
ROBUST IMAGE WATERMARKING SCHEME USING VISUAL CRYPTOGRAPHY IN DUAL-TREE COMPLEX
WAVELET DOMAIN |
Author: |
MERYEM BENYOUSSEF, SAMIRA MABTOUL, MOHAMED EL MARRAKI, DRISS ABOUTAJDINE |
Abstract: |
This paper, a robust image watermarking scheme for copyright protection based on
Dual Tree Complex Wavelet Transform (DT-CWT) and Visual Cryptography concept
(VC) is presented. The proposed scheme embeds the watermark without modifying
the original host image. In the embedding process, the original image is
transformed in the complex wavelet domain then, according to LL sub-band
features and VC, a secret share is generated. This later is required to extract
the watermark from the attacked image in the extraction process. To improve the
clarity of the extracted watermark, a post process called reduction procedure is
also proposed. The experimental results show that the proposed method can
withstand several image processing attacks such as cropping, filtering and
compression etc. |
Keywords: |
Robust Watermarking, Visual Cryptography, Complex Wavelet Transform, Copyright
Protection |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
SWITCHING TABLE BASED 2-LEVEL INVERTER AND 3-LEVEL DIODE CLAMPED INVERTER |
Author: |
R.DHARMAPRAKASH, JOSEPH HENRY |
Abstract: |
This paper proposes a switching table based 2-level inverter and 3-level diode
clamped multilevel inverter (DCMLI) for the purpose of direct torque control of
induction motor. The proposed scheme determines the sector of reference vector
and the voltage vector is selected from switching table to generate gating
signals for the inverter. The 2-level inverter and 3-level DCMLI are used to
explain this scheme. This can be extended to n-level inverter and to all major
topologies. The performance measures in terms of total harmonic distortion (THD)
and fundamental voltage of line voltage and phase voltage are computed and
compared with and without filter. The results show that the performance is
greatly improved by increasing the number of levels. The significant feature of
the proposed scheme is that it can be utilized for direct torque control of
induction motor with affecting its simplicity. |
Keywords: |
2-Level Inverter, 3-Level Inverter, Multilevel Inverter, DCMLI, Direct Torque
Control |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN RFID SIMULATION FOR THE SUPPLY CHAIN MANAGEMENT OF THE UK DENTAL INDUSTRY |
Author: |
FERNANDO FELIX, RAUL VALVERDE |
Abstract: |
This paper documents an RFID simulation for the supply chain management in the
dental industry in the UK. The paper starts with a preliminary analysis of the
UK dental product industry followed by a literature review on topics of IT and
Logistics and Technological innovation. A case study from UK dental industry is
selected for the study and a supply chain analysis conducted in order to
discover the business processes and problems. A proposed solution with RFID
technology to the encountered problems is simulated and then compared with the
current supply chain system and metrics calculated for comparison and
justification of the introduction of the RFID technology. |
Keywords: |
JIT, Supply Chain Systems, RFID, Dental Industry |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
LIGHT POLARIZATION IN AN ANISOTROPIC MEDIUM IN TERMS OF ROTATIONS |
Author: |
MAJDI T. ORAIQAT, MAHDI A. NISIRAT, VICTOR I. TARKHANOV |
Abstract: |
Stokes vector evolution in a homogeneous birefringent medium is treated in terms
of Cayley-Klein parameters inside 8D space of geometric Clifford algebra. Scaled
to unity, Stokes parameters are compared with directional cosines of a unit
vector in geometric algebra and with a unit magnetization vector in NMR. The
unusual interpretation of Cayley-Klein parameters in matrix optics is regarded
as a stimulus to revise 4D entities in geometric algebra. |
Keywords: |
Polarization, Stokes vector, Mathematical methods in physics, Quantum optics. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
VLSI ARCHITECTURE OF DUAL STANDARD INTERLEAVER FOR TURBO CODES |
Author: |
BADRINARAYANAN.S, MATHANA.J.M, RANI HEMAMALINI.R |
Abstract: |
The superior error correcting performance of turbo codes is associated with the
suitable interleaver design. The primary function of the interleaver is to
improve the distance properties of the concatenated coding schemes and to
disperse the sequence of bits in a bit stream so as to minimize the effect of
burst errors introduced in the transmission. The key focus of the proposed work
is to design an architecture with minimal hardware complexity and maximum
reusable interleaver that can support two standards 3GPP WCDMA and 3GPP LTE. The
proposed interleaver/ deinterleaver architecture receives an input data stream
of any size established by the 3GPP standard and delivers the interleaved or
deinterleaved stream depending on the user requirements. Various optimization
techniques and novel VLSI architectures are utilized to achieve the proposed
hardware interleaver address generation architecture. By introducing the
algorithmic level transformations and hardware reuse methodology low complexity
reconfigurable architecture is designed. The frequency of operation of the
proposed interleaver is 122.46 MHz. |
Keywords: |
3GPP, Interleaver, Reconfigurable, LTE |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
DATA EXCHANGE DELIVERY BETWEEN INFORMATION SYSTEM AT LOW BANDWIDTH QUALITY USING
MESSAGING |
Author: |
I MADE SUKARSA, Ni WAYAN WISSWANI, PUTU WIRABUANA |
Abstract: |
Data exchange is a routine activity in a distributed system. This activity can
be done between organizations with equivalent positions or between branches with
the head office. Technology is commonly used web development service as
additional middleware.
In a growing organization, the effort is quite difficult because it requires a
connection with a good quality of bandwidth and dedicated server as a service
provider. Therefore, the development of messaging-based middleware can be used
as a cheap alternative.In the first year, the study is focused to produce a
prototype of a middleware that can work on a machine that is homogeneous DBMS
MySQL. In the second year, will develop prototypes that can work in
heterogeneous DBMS engine. The resulting prototype in the first year can be used
to exchange data between applications by utilizing metadata for each homogeneous
DBMS. |
Keywords: |
Data Integration, Messaging, Low Bandwidth, Distributed System, Data Exchange |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
ODIUM PIPERIS FUNGUS IDENTIFICATION FOR PIPER BETEL PLANTS USING DIGITAL IMAGE
PROCESSING |
Author: |
J.VIJAYAKUMAR, S.ARUMUGAM |
Abstract: |
The betelvine cultivation is very much affected by diseases and outcome of the
farmer is big loss for betelvine cultivation. The aim of this paper is to
detection of Powdery mildew disease in the betelvine plants using digital image
processing techniques. The digital images of the uninfected or normal betelvine
leaves and the digital images of the infected in powdery mildew diseased
betelvine leaves at different stages are collected from different betelvine
plants using a high resolution digital camera and collected betelvine images are
stored with JPEG format. The digital image analyses of the leaves are done using
the image processing toolbox in MATLAB. The mean values for all sample leaves
are computed and calculated mean values are stored in the system. The mean
values of test leaves are computed and compared with the stored values. As the
result of this comparison, it is identified whether test leaves are affected by
powdery mildew disease or not. Finally this analysis helps to recognize the
powdery mildew disease can be identified before it spreads to entire crop. |
Keywords: |
Piperaceae, Powdery Mildew Disease, Betelvine |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
MOBILE-ASSISTED INSTRUCTIONAL FOR DOMESTIC MAID (MAID-M) |
Author: |
TEH PHOEY LEE, GEOFFREY MUCHIRI MUKETHA, GU YIN XIN |
Abstract: |
Statistics from Immigration Department of Malaysia has shown that the foreign
workers have increased tremendously over the past 4 years. Different
nationalities of foreign maids usually speak in their own mother languages from
their home countries. A certain level of communication barrier between the
Malaysia’s employers and the foreign workers were identified in the previous
study. The misunderstanding of tasks requested to their domestic maid had led to
the communication barrier. The study confirmed positively that this
communication barrier has occurred between the employer and the maid. In this
paper, the Mobile-Assisted Instructional for Domestic Maid (MAID-M) is proposed
and presented both conceptually and physically. Feedbacks of the proposed
application is collected and tested. |
Keywords: |
Mobile Assistant, Mobile Development and Mobile Application. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
Title: |
A HYBRID INDEXED TABLE AND QUASIGROUP ENCRYPTION APPROACH FOR CODE SECURITY
AGAINST VARIOUS SOFTWARE THREATS |
Author: |
Dr.N. SASIREKHA, Dr. M.HEMALATHA |
Abstract: |
Security is of fundamental importance in digital communication. The system
should be secure against brute force attacks and impersonation by the
eavesdropper. Code and the sensitive data should only be accessed and understood
by legitimate user/authority. Software in recent scenario has been highly
susceptible to various attacks and threats. Reverse engineering is one of the
key technique by which an intruder can understand the inner working of the
software. Most of the existing software protection techniques do not provide
reliable security against various attacks. Cryptographic approaches are observed
to be very efficient in providing security and authentication to the software.
Encryption of the code in the software has received much attention in the
software engineering domain and various researches are being done in that area.
This paper proposes a novel hybrid software protection code encryption scheme
based on the index table. This approach uses a novel and efficient encryption
technique for encryption the indexed table. The encryption technique used is the
quasigroup approach which provides least resemblance of the original data when
encrypted. The performance of the proposed approach is evaluated based on the
time cost and space cost and it is observed that the proposed approach provides
significant results and performance. |
Keywords: |
Cryptography, Decryption,Encryption, Quasigroup, Index Table, Reverse
Engineering, Software Protection. |
Source: |
Journal of Theoretical and Applied Information Technology
20 February 2014 -- Vol. 60. No. 2 -- 2014 |
Full
Text |
|
|
|