|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
June 2022 | Vol. 100 No.12 |
Title: |
ENHANCED CT-IMAGE FOR COVID-19 CLASSIFICATION USING RESNET 50 |
Author: |
LOBNA M. ABOU EL-MAGD, AMIRA. A. ELSONBATY, MANAL SOUBHY ALI ELBELKASY |
Abstract: |
Disease caused by the coronavirus (COVID-19) is sweeping the globe. There are
numerous methods for identifying this disease using a chest imaging.
Computerized Tomography (CT) chest scans are used in this study to detect
COVID-19 disease using a pre-train Convolutional Neural Network (CNN) ResNet50.
This model is based on image dataset taken from two hospitals and used to
identify Covid-19 illnesses. The pre-train CNN (ResNet50) architecture was used
for feature extraction, and then fully connected layers were used for
classification, yielding 97%, 96%, 96%, 96% for accuracy, precision, recall, and
F1-score, respectively. When combining the feature extraction techniques with
the Back Propagation Neural Network (BPNN), it produced accuracy, precision,
recall, and F1-scores of 92.5%, 83%, 92%, and 87.3%. In our suggested approach,
we use a preprocessing phase to improve accuracy. The image was enhanced using
the Contrast Limited Adaptive Histogram Equalization (CLAHE) algorithm, which
was followed by cropping the image before feature extraction with ResNet50.
Finally, a fully connected layer was added for classification, with results of
99.1%, 98.7%, 99%, 98.8% in terms of accuracy, precision, recall, and F1-score. |
Keywords: |
COVID-19; CNN; Resnet50; BPNN; CLAHE; CT-scan. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
THE EFFECT OF AMBIDEXTROUS LEADERSHIP AND SOCIAL MEDIA ON CORPORATE PERFORMANCE:
THE MEDIATING ROLE OF DIGITAL TRANSFORMATION |
Author: |
MARINDRA BAWONO, IDRIS GAUTAMA, AGUSTINUS BANDUR, FIRDAUS ALAMSJAH |
Abstract: |
This paper aims primarily to examine the effect of ambidextrous leadership and
social media on company performance and to measure the mediating role of digital
transformation of telecommunications companies in Indonesia. For this main
purpose, a quantitative research dimension is applied with particular reference
to surveys. This research was conducted using quantitative methods to collect
and analyze data, integrate findings, and draw conclusions. The sample in this
study amounted to 180 (0.72%) complete questionnaires which were processed in
quantitative testing. The main results show that Based on the discussion above,
it is concluded that ambidextrous leadership has a positive effect on company
performance, ambidextrous leadership has a positive effect on digital
transformation, Social Media has a positive effect on digital transformation,
Social Media has a positive effect on Firm performance and Digital
transformation has a positive effect on Firm performance. . The study suggests
utilizing extraordinary plans to identify external and internal situations
during and after the coronavirus (COVID-19) pandemic. |
Keywords: |
Ambidextrous leadership, Social Media, Digital transformation, Corporate
performance |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
ANALYSIS OF CROSSED DIPOLE ESA FOR WIRELESS COMMUNICATION APPLICATIONS |
Author: |
KATIREDDY. HARSHITHA REDDY, M. VENKATA NARAYANA, GOVARDHANI. IMMADI |
Abstract: |
A compact size of (35mm x 35mm) single band ESA has been simulated and
fabricated for wireless communication applications like Bluetooth, cordless
phone etc. The Design consists of a circular slot and it is embedded with cross
type structures. The overall dimensions of this antenna are reduced to satisfy
the rules of ESAs, two dipoles are arranged in a cross shape (plus shape) on the
surface of the substrate inside the circular patch to achieve impedance
bandwidth. The simulation of the ESA is done through HFSS and it is fabricated
on FR4 with a thickness of 1.6mm, ℇr of 4.4mm and the size of ESA is 35mmx35mm.
The return loss(S11) of the Simulated and fabricated proposed antenna is greater
than -10db which is acceptable for practical applications and there is a good
agreement between the simulated and fabricated results. |
Keywords: |
ESA, Cross shape, Circular slot, Return loss and Bluetooth. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
IMPACT OF SCRUM PRACTICE ON SOFTWARE DEVELOPMENT IN INDIVIDUAL AND TEAM
PERFORMANCE DURING COVID-19 PANDEMIC |
Author: |
ANDRE LAZUARDI AMIN, RIYANTO JAYADI |
Abstract: |
Software development has always been an essential sector in companies that
implement information technology, pandemic impacting how people manage IT
projects. Scrum is one of the most used frameworks in Agile methodology commonly
adopted in multiple companies as the concept has a robust way to track the task
and people. This paper seeks to understand whether the implementation of Scrum
will affect employee performance during the pandemic, either in individual or
team aspects. The data was analyzed using inferential statistics and structural
equation modeling. The questionnaire received 117 responses from scrum
practitioners in Indonesia. Factor analysis supported the validity of the
scales, and shows good coefficient of determination percentage for the impact of
scrum practice on the perceived individual performance with 62% (majorly
affected by self-determination and self-control) and perceived team performance
with 71.1% (majorly affected by trust and communication). |
Keywords: |
Project Management, System Information, Agile, Scrum, Employee Performance |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
UNDERSTANDING EMPLOYEE SECURITY BEHAVIOR IN USING INFORMATION SYSTEM OF
ORGANIZATIONS: EVIDENCE FROM JAKARTA GREATER AREA, INDONESIA |
Author: |
RIDIPURNOMO, RIYANTO JAYADI |
Abstract: |
Almost all organizations currently have implemented the use of technology in
running their business to enhance productivity and performance, there by gaining
competitive advantage and achieving strategic goals. However, the use of this
technology is very vulnerable to data breaches. Data breach incidents became a
big topic in Indonesia during 2020 since the leaks of millions of users'
personal data from some of the largest e-commerce sites. This incident should
certainly be a warning to all organizations, especially in Jakarta Greater Area
(Jabodetabek), Jakarta, Indonesia, to pay more attention to the security of
their company's information. Most of organizations have prioritized a technology
approach to protect their information assets from potential attacks. Some of the
commonly used information security technologies are firewall devices, Antivirus
software, IDS, etc. Although the prevention of attacks by technical means is
important, the risk of insider threats must be taken into account, Users or
employees tend to be the main factor in many information security breaches. This
research aims to determine whether security education & training, information
security awareness, employee relationships, employee accountability,
organizational culture, and national culture have a significant effect on
employee security behavior. The empirical analysis relies on a survey data from
a cross section of employees from 10 companies in Jabodetabek and a structural
equation modeling approach via SmartPLS 3. The results showed no direct and
significant effect of security education & training on improving employee
security behavior in Jabodetabek. The security education & training influences
all mediators (information security awareness, employee relationship and
employee accountability), and all the mediators influences employee behavior in
using the company's information system. The most influential variable is
employee accountability. Organizational culture and national culture influence
employee behavior in using company information systems. |
Keywords: |
Data Breach, Employee Security Behavior, Security Education & Training,
Information Security Awareness, Employee Relationships, Employee Accountability,
Organizational Culture, National Culture |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
IMPLEMENTATION OF RECOMMENDATION SYSTEM IN E-COMMERCE USING APPROXIMATE NEAREST
NEIGHBOR |
Author: |
HANDY TANTYO, TUGA MAURITSIUS |
Abstract: |
At least 20 e-commerce businesses in Indonesia have stopped operating due to
human resource problems. The recommendation system is an important feature in
e-commerce which was initially done manually. However, a computing field has
emerged that can replace human labor in recommendation systems, reduce human
errors and work more efficiently. This paper aims to implement an efficient and
scalable recommendation system using Machine Learning techniques. The
content-based filtering used in this paper uses the Approximate Nearest Neighbor
algorithm with different indexes that provide similar product recommendations.
Data is collected from Tokopedia product information, which is divided into five
categories. The optimal Nprobe is found at 6% which is the standard Nprobe for
each index. The index that has the best recall@R parameter, fastest prediction
time and training time respectively are IDMap,Flat, IVF1024_HNSW32,Flat and
IDMap,Flat. |
Keywords: |
E-commerce, Recommendation System, Machine Learning, Content Based Filtering,
Approximate Nearest Neighbor |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
ENHANCED SPATIAL PYRAMID POOLING AND INTERSECTION OVER UNION IN YOLOV4 FOR
REAL-TIME GROCERY RECOGNITION SYSTEM |
Author: |
SAQIB JAMAL SYED, PUTRA SUMARI, HAILIZA KAMARULHAILI ,VALLIAPPAN RAMAN,
SUNDRESAN PERUMAL ,WAN RAHIMAN |
Abstract: |
The ability to recognize a grocery on the shelf of a retail store is an ordinary
human skill. Automatic detection of grocery on the shelf of retail store
provides enhanced value-added to consumer experience, commercial benefits to
retailers and efficient monitoring to domestic enforcement ministry. Compared to
machine vision-based object recognition system, automatic detection of retail
grocery in a store setting has lesser number of successful attempts. In this
paper, we present an enhanced YOLOv4 for grocery detection and recognition. We
enhanced through spatial pyramid pooling (SPP) and Intersection over union (IOU)
components of YOLOv4 to be more accurate in making recognition and faster in the
process. We carried an experiment using modified YOLOv4 algorithm to work with
our new customized annotated dataset consist on 12000 images with 13 classes.
The experiment result shows satisfactory detection compare to other similar
works with mAP of 79.39, IoU threshold of 50%, accuracy of 82.83% and real time
performance of 61 frames per second |
Keywords: |
Grocery Recognition, Yolov4, Object Localization, Deep Learning, Machine Vision |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF OBJECT DETECTION MODELS FOR VEHICLE-RELATED IMAGE
SERVICES |
Author: |
JUN-HYUNG KO, NAMGI KIM |
Abstract: |
Object detection is an actively researched field of computer vision, and notable
research outcomes have been presented through an integration with deep learning.
However, most previous studies on object detection have focused on evaluating
the object detection performance for multiple classes. To a practical extent,
such detection contrasts with how the type of classification required for object
detection models is limited to a few numbers of classes. For example, the object
detection classes required for autonomous vehicles or in vehicle detection
services are limited to small specific classes, such as vehicles, persons, and
road signs. In other words, the need has arisen to confirm which model exhibits
an excellent performance for a small, specialized class such as vehicle object
detection. Therefore, we evaluate representative object detection models to
identify which models is more appropriate for vehicle object detection services.
The results show that CenterNet [9] achieves the best performance for vehicle
object detection during autonomous driving and for CCTV use among the three
models, followed by YOLOv4 [7] and SSD [8]. |
Keywords: |
Object detection; Image processing; Deep learning |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
AUDIO STEGANOGRAPHY METHOD USING LEAST SIGNIFICANT BIT (LSB) ENCODING TECHNIQUE |
Author: |
EESA ABDULLAH ALSOLAMI |
Abstract: |
MP3 is one of the most widely used file formats for encoding and representing
audio data. One of the reasons for this popularity is their significant ability
to reduce audio file sizes in comparison to other encoding techniques.
Additionally, other reasons also include ease of implementation, its
availability and good technical support. Steganography is the art of shielding
the communication between two parties from the eyes of attackers. In
steganography, a secret message in the form of a copyright mark, concealed
communication, or serial number can be embedded in an innocuous file (e.g.,
computer code, video film, or audio recording), making it impossible for the
wrong party to access the hidden message during the exchange of data. This paper
describes a new steganography algorithm for encoding secret messages in MP3
audio files using an improved least significant bit (LSB) technique with high
embedding capacity. Test results obtained shows that the efficiency of this
technique is higher compared to other LSB techniques. The aims to add
effectiveness and performance for hide message in MP3 file and explains all
detail in steganography process in MP3 files, and The new proposed method was
able to increase the capacity and robustness, while improving imperceptibility. |
Keywords: |
Steganography; Least Significant Bit (LSB); MP3. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
DIGITIZING IN BUSINESS MODEL INNOVATION: PRELIMINARY RESEARCH OF COURIER,
EXPRESS, AND PARCEL SECTORS |
Author: |
CHARLES SITORUS, IDRIS GAUTAMA SO, ASNAN FURINTO, WIBOWO KOSASIH |
Abstract: |
This study aims to identify digital business model innovations carried out by
Indonesian courier service companies to meet customer needs. This research also
uses three case studies and several references or previous research as the main
data sources. This study uses a qualitative approach with the Historical method,
with the sampling method used is a purposive sample with three case studies at
DiDi Taxi, Cisco, Dell companies. This study found that e-commerce needs to make
some innovations in adjusting to the needs of today's customers, especially in
the era of digitalization. Some of the innovations that can be done consist of
product terms, service features, customer satisfaction, involvement in the
e-commerce marketplace, and in terms of delivery patterns. Based on this, this
study designs several recommendations based on crucial issues that need to be
studied further from the issue of digital business innovation models in
Indonesian courier service companies. The results of this study are expected to
be able to recommend several crucial issues that need to be studied further from
the issue of digital business innovation models in Indonesian courier service
companies. Therefore, this review is expected to initiate further research
related to the scope of the research. |
Keywords: |
Digitalization, Business Model Innovation, Case-Study, Courier, Express, Parcel
Sectors |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
SOLVING A NEW MATHEMATICAL MODEL FOR A PERIODIC VEHICLE ROUTING PROBLEM BY
NEIGHBORHOOD SEARCH METHOD |
Author: |
MARLAN, HERMAN MAWENGKANG |
Abstract: |
For a Periodic Vehicle Routing Problem (PVRP), this study offers a new
mathematical model which optimizing vehicle travel expenses based on many
assumptions. Periodic planning includes consideration of the following four
issues that is a vehicle routing problem with time windows (VRPTW), a
capacitated vehicle routing problem (CVRP), a vehicle routing problem with split
service (VRPSS) and a vehicle routing problem with simultaneous pickup and
delivery (VRPSPD). In large-scale issues, the computational complexity of this
problem can be handled by any optimization program in a reasonable amount of
time since it is based on a single model that we have created. In this paper a
neighborhood search meta-heuristic is proposed. |
Keywords: |
Periodic VRP, Logistics, Split Service, Meta-heuristic, Neighborhood Search |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
MOBILE APPLICATION FOR PRODUCTS COMMERCIALIZATION IN PULAU TUBA, LANGKAWI USING
AGILE DEVELOPMENT |
Author: |
MUHAMMAD AZIZI MOHD ARIFFIN, MOHAMAD YUSOF DARUS, MUHAMMAD ADLAN AKMAL ABDUL
AZIM KHOR |
Abstract: |
Digital Divide is one of the factors which cause income inequality and poverty
among the rural population. In Malaysia, one of the poorest rural communities is
Pulau Tuba Langkawi. The Island is located 5 kilometres away from the main Pulau
Langkawi island, rich with forest herbs, seafood, and natural beauty. Although
the island has basic infrastructure such as electricity, running water and a
telecommunication tower, the population lived in poverty as half of the
population has a monthly income of RM500 although they have an abundance of
natural produce. To address the problem and poverty among the Pulau Tuba
population, this paper proposed an easy-to-use e-commerce application using a
dynamic mobile and web-based framework for commercializing the rural area
product to the external market. The design of the proposed e-commerce
application will incorporate a simple interface to help users with a limited
ICTs skillset. The development of the mobile application uses Agile methodology
to enable continuous features development to cater for the needs of the rural
population at the later stage of deployment. Moreover, the application was
developed using the Ionic framework, Angular for frontend and Firebase for
back-end implementation. After the mobile application has been developed,
several individuals in Pulau Tuba are chosen as a tester for the Beta version of
the mobile application. Based on tester feedback, the majority agree that the
apps help them to market their product and the apps are easy to use even for
individuals with no ICTs skills. This has the potential to ease the process of
commercializing the rural area product and eventually reduce the poverty among
the island population. |
Keywords: |
E-Commerce, Digital Divide, ICTs, Rural Area Development, Internet, Agile
Methodology |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
AUTOMATION OF INCIDENT RESPONSE AND IT TICKET MANAGEMENT BY ML AND NLP
MECHANISMS |
Author: |
M.VENKATA SUBBARAO, KASUKURTY VENKATARAO, CH. SURESH |
Abstract: |
In todays digital world, Ticket Management Systems are widely utilized in
various businesses and organizations since they are essential for efficiently
resolving client requests and difficulties. Moreover, in real-world application
contexts (e.g., technology support platforms and defect detection systems),
properly labeling new requests is essential to improving ticket handling
quality, grade and productivity. This research aims to discover the factors
affecting customers’ online ticket purchasing behaviors and proposes an
effective technique for systematic ticket categorization that effectively
clusters and labels. Information technology (IT) tickets quickly using Machine
Learning and Natural Language Processing techniques. The framework’s performance
in numerous ticket categorization jobs has been indicated by experimental
results based on a specific usage situation that involves data from ticket
mining the ServiceNow platform and filtering a vast dataset, among other things.
To develop a Machine Learning model that significantly predicts an incident
resolution category with supervised ML algorithms. The models’ performance was
estimated using various NLP techniques LDA with TF-IDF and 3 Gram, and stop-word
removal and lemmatization produced the best results, with a precision of 96.46
percent. |
Keywords: |
Natural language processing (NLP), Machine Learning, classification, Incident
Response, Text Mining, Information Retrieval |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION BY FEATURE REDUCTION USING DEEP LEARNING FOR IDENTIFYING
MALICIOUS WEBSITES |
Author: |
SHAIK IRFAN BABU, DR.M.V.P. CHANDRA SEKHARA RAO |
Abstract: |
Now a days, Internet activities are growing in exponential rate so are the
criminal activities, with the growth of internet usage. Internet is also a
source of malicious web pages. Automatic Malicious URL identification resulted a
relative novel and sensitive security challenging area. The area would aim in
aiding the users to overcome security threats due to the presence of malicious
webpage’s resulting in a better network security. The present study makes
attempt in assessing and identifying malicious websites, a malicious
identification model is proposed using deep learning ideas. The present work
uses the URL and HTML based features to identify malicious websites. PCA is
applied to reduce features, dominating features are identified. It is found that
dominating features play vital role in segregating the URLs into malicious and
non-malicious. Dataset from PhishTank and Alexa is used in this study. Seven
Layer Neural Network has shown significant improvements resulting in accuracy of
94%. The proposed work gave true-positive rate 95.51 and False-malicious rate
9.51. |
Keywords: |
PCA, Neural Network, TMR, FMR. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
DATA MANAGEMENT FRAMEWORK IMPLEMENTATION FOR FINANCIAL SERVICE AUTHORITIES
(FSA): CASE STUDY IN ASIA PACIFIC REGION |
Author: |
RENDY DALIMUNTHE, WIRIANTO WIDJAYA, INDRAJANI SUTEDJA, ARMAND WAHYUDI HARTONO |
Abstract: |
The digital economy is transforming financial service industry, raising critical
question for regulatory and supervisory authorities about the appropriate
process, tools, and infrastructure to manage the explosion of data .
Unfortunately, data governance is a new field in which guidance is limited and
practical implementations among organizations are vary wildly due to various
interpretation. While substantive practical progress has been made on how
regulatory and supervisory agencies manage and govern their data, there is still
a lack of academic literature that pivot towards the characteristics of
resilient architecture of data management, particularly in financial regulatory
& supervisory environment. Using the research method of benchmarking, this study
analyses exemplary data management cases in four Asia Pacific’s financial
supervisory agencies (FSA), to articulate resilient concepts and strategies that
foster effective architecture of data management. Proprietary eighteen items of
comparison are used to benchmarked data management and governance implementation
in each FSA. Results of analysis yield three common underlying characteristics
that define effective data management architecture for financial regulatory
agencies. These characteristics can provide significant direction and be used as
foundations in designing resilient and practical integrated data management
architecture. Furthermore, the eighteen items of comparison formulated for this
study can be utilized by other organizations wishing to conduct benchmarking
study to extract the characteristics of data management and governance
operations. |
Keywords: |
Data Management Architecture, Data Governance, Financial Regulators,
Benchmarking |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
ATTITUDE AND COMPETENCE TO USE MADRASATI (M LMS) AMONG SCHOOL TEACHERS IN
RIYADH, SAUDI ARABIA |
Author: |
HAMAD MUAYBID ALHARBI, HABIBAH AB JALIL, MUHD KHAIZER OMAR, MOHD HAZWAN MOHD
PUAD |
Abstract: |
Attitude and competence are two factors that affect the acceptance and
utilization of new technology in education. In this regard, the full utilization
of the new Madrasati (M) technology among teachers in public schools in Riyadh
is still challenging. Thus, this study aimed to determine the moderating effect
of gender and age on the relationship between teachers’ attitudes and competence
in utilizing M LMS technology in public schools in Riyadh, as mediated by
behavioral intention. The survey method and quantitative approach were employed.
Data were collected from 374 teachers out of the population of 13,782 teachers
in schools implementing M LMS in Riyadh. The finding of the tested model showed
a potential positive mediation role of BI on attitude (ATT) and competence (COM)
to use M LMS among public school teachers in Riyadh. The overall mean showed
that ATT1 was high among the eight items used after CFA testing, while ATT11 had
the lowest mean score. Among the seven items used for CFA testing, COM18 had the
highest mean score. The results also indicated that the utilization of M LMS is
high among teachers. They visit M LMS three times a week and spend between 61–90
minutes per visit. The finding also revealed the direct effect of COM over ATT
on M LMS utilization through mediator BI. The relationship between ATT and M
LMS, as moderated by gender and age, is statistically insignificant, suggesting
that ATT has no significant moderating effect on M LMS utilization among
teachers. Meanwhile, COM to use M LMS positively and significantly affects M LMS
acceptance and utilization in Riyadh. In conclusion, the COM to use M LMS plays
a more crucial role in accepting and utilizing public school teachers in Riyadh
than their ATT. Therefore, it is recommended that future studies use a
longitudinal design to obtain more accurate findings. |
Keywords: |
Attitude, Competency, Madrasati (M LMS), Utilization |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
A CRITICAL ANALYSIS OF SWARM INTELLIGENCE FOR REGRESSION TEST CASE
PRIORITIZATION |
Author: |
BAKR BA-QUTTAYYAN, HASLINA MOHD, YUHANIS YUSOF |
Abstract: |
In software development, applications always undergo frequent modifications to
cope with the changing needs of the users. Hence, this will affect the
reliability of the applications. Regression testing is used to tackle this
problem in which test case prioritization (TCP) is considered as one of the
effective approaches. Optimization methods are employed to enhance the
proficiency of prioritizing test cases in terms of efficiency and effectiveness.
Swarm intelligence (SI) algorithms are mostly applied to TCP as one of the
effective optimization methods. This paper aims at providing state-of-the-art
for TCP using SI algorithms. The methodological process of performing this
review includes conducting a search in the Scopus database using predetermined
keywords to obtain relevant primary studies where suitable papers have been
selected according to a set of predefined criteria. Predefined research
questions also provide a basis for assessing nominated studies. Hence, the most
relevant papers (57 out of 420) have been identified, analyzed, and classified.
Based on the findings, it is learned that the deployment of swarm intelligence
algorithms in prioritizing test cases yields promising results. Moreover, this
study also includes suggestions that can be deployed to improve existing
studies. |
Keywords: |
Swarm Intelligence, Software Testing, Regression Testing, Test Case
Prioritization, Optimization Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
DATASET MISSING VALUE HANDLING AND CLASSIFICATION USING DECISION TREE C5.0 AND
K-NN IMPUTATION: STUDY CASE CAR EVALUATION DATASET |
Author: |
WAHYU WIDYANANDA, MUHAMMAD FAUZAN EDY PURNOMO, MUHAMMAD ASWIN, PANCA
MUDJIRAHARDJO, SHOLEH HADI PRAMONO |
Abstract: |
Data mining is a data analysis process using software to find certain patterns
or rules from a large amount of data which is expected to find knowledge to
support decisions. However, missing value presence in data mining often lead to
loss of information. Information loss inside dataset such car evaluation can
result in poor predictive models. The purpose of this study is to improve the
performance of data classification with missing values precisely and accurately
using Decision Tree C5.0 and k-NN Imputation. The test method is carried out
using the Car Evaluation dataset from the UCI Machine Learning Repository.
RStudio and RapidMiner tools were used for testing the algorithm. This study
will result in data analysis of the tested parameters to measure the performance
of the algorithm. Using test variations: 1. Performance at C5.0, C4.5, and k-NN
at 0% missing rate. 2. Performance on C5.0, C4.5, and k-NN at 5-50% missing
rate. 3. Performance on C5.0 + k-NNI, C4.5 + k-NNI, and k-NN + k-NNI at 5-50%
missing rate. 4. Performance on C5.0 + CMI, C4.5 + CMI, and k-NN + CMI at 5-50%
missing rate. The results show that C5.0 with k-NNI produce better
classification accuracy than other tested imputation and classification
algorithms. For example, for 35% missing in the dataset, this method obtains
93.40% in validation accuracy and 92% accuracy in the test. C5.0 with k-NNI also
offers fast processing time compared with others methods. |
Keywords: |
Missing Value Handling, C5.0, k-NNI, R-Studio, RapidMiner |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
SENTIMENT ANALYSIS OF COVID-19 VACCINE WITH DEEP LEARNING |
Author: |
MARYAM NUSER, EMAD ALSUKHNI, AHMAD SAIFAN, RAMA KHASAWNEH, AND DINA UKKAZ |
Abstract: |
After the emergence of the Covid-19 virus, pharmaceutical companies began making
vaccines against this virus. Peoples’ reactions towards vaccines varies between
acceptance and rejection. Information about these reactions can be found in
social media which has become the largest and best source of users' opinions on
a specific topic nowadays. One of the most important social media through which
this data can be collected is Twitter. It is important to analyze people's
opinions about these vaccines to find out the percentage of supporters and
opponents of vaccines. Sentiments analysis can be used to analyze people's
opinions. In this paper, we proposed a hybrid deep learning model to analyze
user sentiment towards the COVID-19 vaccine. The contributions of our work are
to adopt an efficient-designed model by combines Convolutional Neural Network
(CNN), which has the capability to extract features, and Long Short-Term Memory
(LSTM), which can monitor and study long-term dependencies between words. And
provide the proposed network topology setting that contributed in producing high
performance in sentiment analysis of the COVID-19 vaccine tweets. Extensive
experiments have been conducted on a data set of 13,190 tweets. The results
proved that the proposed model with the proposed topology setting outperformed
the other machine learning models. |
Keywords: |
CNN-LSTM, Deep learning, Hybrid Model, Natural Language Processing (NLP),
Sentiment Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
QURANIC COLLOCATIONS EXTRACTION USING STATISTICAL MEASURES |
Author: |
MAJED ABUSAFIYA |
Abstract: |
Collocations are a common phenomenon in natural languages in general and in
Arabic in specific. Quran is widely considered to be the most eloquent and
authentic Arabic text. This fact should motivate researchers to explore and
study the collocations of this miraculous book. One approach to find
collocations for a given corpus is by identifying pairs of words that are more
likely to exist adjacent than being separate using special statistical measures.
Chi-squared, t and mutual information are three broadly accepted statistical
measures that are used for this purpose. In this paper, these three statistical
measures are used to extract the collocations of Quran. None of these measures
gave perfect results. So, a human interaction is required to filter the best
candidates from the found collocations. The t measure gave the best set of
collocations. The other two showed bias towards pairs of adjacent words that are
unique or exist with very low frequencies in Quran. To give a generic notion of
Quranic collocations that are extracted using this approach, those that were
found by the t measure are studied and categorized. |
Keywords: |
Natural Language Processing, Quran, Collocations, Statistical Approach,
Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
THE SENTIMENT ANALYSIS OF THE INDONESIAN PALM OIL INDUSTRY IN SOCIAL MEDIA USING
A MACHINE LEARNING MODEL |
Author: |
RANGGA PRADIPTA, RIYANTO JAYADI |
Abstract: |
This research is a sentiment analysis of opinion data obtained from the Twitter
social network about the palm oil industry in Indonesia. The opinion data used
is text in Indonesian to show the palm oil industry in Indonesia and text in
English to show issues of the palm oil industry happening globally. The palm oil
industry in Indonesia is one of the strategic industries engaged in agriculture,
so it is necessary to monitor public sentiment with information on the Internet,
especially on social media. This research has produced a model for classifying
public opinion on the palm oil industry from Twitter data. The data collection
technique used is the Twitter Developer API, and it obtained 14,048 words for
Indonesian and 12,421 words for English. This data collection begins in July and
ends in September 2021. This study uses a machine learning model with the Naïve
Bayes Classifier and Support Vector Machine algorithms to separate sentiment
into two labeling classes, namely positive and negative, then compares which
algorithm best serves to classify opinion data. The model generated by the Naive
Bayes algorithm has the highest accuracy value, namely for domestic (Bahasa
Indonesia) data of 82% and international (English) data of 85%. |
Keywords: |
Sentiment Analysis, Machine Learning, Naïve Bayes, Support Vector Machine (SVM),
Palm Oil Industry |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
COMPARATIVE EVALUATION ON THE ATTRIBUTES OF SOFTWARE DEVELOPMENT COST MODEL WITH
EXPONENTIAL AND INVERSE-EXPONENTIAL DISTRIBUTION PROPERTY |
Author: |
HYO JEONG BAE |
Abstract: |
In this study, attributes of software development cost were evaluated by
applying the exponential type distributions (Exponential-exponential,
Inverse-exponential) which are utilized in the reliability testing field to the
software development model. Also, the proposed distribution models were compared
with the Goel-Okumoto basic model to verify cost property, and the optimal
development cost model was presented. For this study, a total solution was
performed using software failure time data generated during desktop application
operation, parameter calculations were solved using the maximum likelihood
estimation (MLE) method. As a result, fist, when the testing cost per unit time
and the cost of eliminating a single fault detected during the development
testing process increase, the development cost increases, but the release time
does not change. But, if the fault correction cost detected by the operator
during normal system operation increases, the development cost increased along
with the delay of the release time. Second, it can be confirmed that the
Exponential-exponential distribution model is the most efficient among the
proposed models as it has the best performance in terms of development cost and
releasing time. Third, if software developers and operators can utilize this
analysis information efficiently, they can predict and design a reasonable
development process by analyzing the related cost and time attributes. |
Keywords: |
Goel-Okumoto, Exponential-exponential, Inverse-Exponential, mean value function,
Software Development Model, Cost Attributes. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
SOFT VOTING MACHINE LEARNING CLASSIFICATION MODEL TO PREDICT AND EXPOSE LIVER
DISORDER FOR HUMAN PATIENTS |
Author: |
MOHAMMAD A. ALSHARAIAH, LAITH H. BANIATA, OMAR AL ADWAN, ORIEB ABU
ALGHANAM,AHMAD ADEL ABU SHAREHA, MOSLEH ABU ALHAJ, QAIS ABDALLAH SHARAYAH,
MOHAMMAD BANIATA |
Abstract: |
The liver is the most significant organ in the human body since it handles a
significant role in food digestion and progression in our body. Mainly it takes
an essential part in enzyme activation, fat metabolism, bile synthesis, vitamin,
glycogen, and mineral storage. Depending on the role it controls, it has a
sophisticated accidental of coming in contact with harmful creation that goes
inside the body. Hence, the diagnosis of liver disorder has been subjective at
best, based on subjective approaches. Liver disorders are challenging to detect,
and as a result, they are regularly overlooked in the early stages due to a lack
of precise symptoms. Hyperbilirubinemia is one of the most substantial signs of
most liver illnesses, and it can be demanding to differentiate early on.
However, in most of cases, this isn't certain, and the ability to detect and
confirm the presence of liver disease lead to a better understanding of enzyme
levels. The prediction of liver illnesses has been done using a variety of
machine learning techniques. In this investigation, the recommended ensemble
soft voting classifier offers binary classification and utilize the ensemble of
three machine learning algorithms: Decision Tree, Support Vector Machine, and
Naive bayes classifiers to predict and expose liver disease by Binary
Classification of the dataset into two particular types of patients with or
without liver disease (patient suffering liver sickness or not). The unbalanced
dataset comprises materials about human patient attributes such as Gender, Age,
Alanine, Total Bilirubin, Aminotransferase, Aspartate Aminotransferase, Direct
Bilirubin, Albumin, Alkaline Phosphatase, Globulin Ratio and the Result and
Total Proteins Albumin. Furthermore, the accuracy and various error calculations
of the predictions from the aforementioned algorithms are analyzed to recognize
and identify the best- convenient algorithm. |
Keywords: |
Liver Disorders, Machine Learning Techniques, Unbalanced Data Set,
Classification, Liver Hyperbilirubinemia |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
REVIEW ON FOREST FIRES DETECTION AND PREDICTION USING DEEP LEARNING AND DRONES |
Author: |
MIMOUN YANDOUZI, MOUNIR GRARI, IDRISS IDRISSI, OMAR MOUSSAOUI2, MOSTAFA AZIZI,
KAMAL GHOUMID, AISSA KERKOUR ELMIAD |
Abstract: |
Forests everywhere in the world are essential components for protecting the
biosphere. They strongly contribute to the global carbon cycle and sustain a
wide variety of plant and animal life forms. In many areas of the globe, forest
fires are one of the major threats to living beings; it leads the ecosystem in
jeopardy, including animals, plants, and even people. Last year, the
Mediterranean and North African regions were devastated by wildfires. The
earlier discovery of forest fires is strongly required to save lives and
properties. Forest fires detection or prediction are difficult tasks because
wildfires start small and are difficult to see from a distance, and then can
quickly spread to become large and dangerous fires. The combination of drones
and deep learning can be used to detect wildfires using images with high
accuracy. The use of drones can help to identify the location of the fire and
its spreading area, while deep learning can be used to identify the
characteristics of the fire. This combination is a key foundation to create a
system capable to detect wildfires more accurately. This paper examines current
state-of-the-art published research papers on detecting forest fires using deep
learning and drones. |
Keywords: |
Forest Fires, Wildfire, Deep Learning, Drone, UAV |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
CHOOSING A STRATEGY FOR THE LONG-TERM DEVELOPMENT OF THE COMMUNICATION SYSTEM
FOR RURAL AREAS |
Author: |
AMIRALI SEILOV, SHAKHMARAN SEILOV, YERDEN ZHURSINBEK |
Abstract: |
Strategies that include communication systems for rural development as a
significant aspect of rural development are utterly needed. The article proposes
a strategy of a long-term development of communication system for rural areas,
used to solve a number of actual problems including improving economy and social
aspect of people’s life. Depending on specific scenario different methods of
organization of access are proposed for rural areas. A model of multiservice
network is described in the form of a random graph and a multiphase teletraffic
system, including crucial aspects of modernization of infrastructure in country
area. |
Keywords: |
Communication System; Multiservice Network; Rural Area; Multiphase Teletraffic
System; |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
DIGITAL PLATFORM FOR MANAGING ENTERPRISES' BUSINESS PROCESSES IN AN INNOVATIVE
ECONOMY |
Author: |
AYSALKYN ASANOVA, OLEKSANDRA OLSHANSKA, MARIIA SAIENSUS, OLGA USATENKO, ANDRII
MAKURIN, ANDRII SUKHOSTAVETS |
Abstract: |
The aggravation of the international political situation throws new challenges
to industrial enterprises operating in the export-import sector; in light of
this, the need to develop effective work methods in the current situation is
most acute. The article discusses various approaches to the organization and
management of business processes for industrial enterprises whose main activity
largely depends on export-import operations. In the context of digitalization,
the approach itself is to organizing export-import activities is primarily aimed
at reducing the costs of ineffective organizational measures and avoiding
critical errors in creating the management system base. As a basis for creating
the scheme for managing export-import activities, the article proposes to
consider the approach of using a digital platform based on a single window. The
proposed method of work focuses not only on creating a mechanism for a
particular enterprise but also on the design and organization of the system's
core, participation in which will be beneficial to all interested parties. |
Keywords: |
Business Process Simplification; Digital Platform; Electronic Document
Management; Export-Import Operations; Single Window Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
TMRSG: TOPIC MODEL BASED RICH SEMANTIC GRAPH METHOD FOR ABSTRACTIVE
MULTI-DOCUMENT SUMMARIZATION |
Author: |
Dr. K. ARUTCHELVAN, R. SENTHAMIZH SELVAN |
Abstract: |
Multi-Document Summarization (MDS) has gained more popularity among the
industrialists and researchers in recent days. Extractive MDS simply extracts
the important contents from multi-documents and gives a summary based on
required length. Abstractive MDS provides summary based on the important of
words that are presented across various documents. This research work is mainly
focused on providing abstractive MDS using rich semantic graph-based methodology
and topic modelling. The proposed approach generates summary by using
graph-relations across multiple documents based on the relevant topics. The
proposed approach is build using the centrality node ranking technique. The
weighted graph ranking technique is applied to obtain the sequence of the
sentences. The summary is generated using the highest rank scores of the
sentences. The proposed technique is evaluated using the CNN/Daily Mail
datasets. |
Keywords: |
Semantic Graph, Multi-Document Abstractive Summarization, Sentence Ranking,
Similarity Measure, Topic Modelling |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
THE INFLUENCE OF SOCIAL MEDIA, TRUST, AND PURCHASE DECISIONS ON CUSTOMERS BUYING
INTEREST |
Author: |
ATIKA SYILFA LAINI, DAVID KENNEDY, JULIA SINTA, MICHSON BRYAN LIE, VANESSA
DELLA, TANTY OKTAVIA |
Abstract: |
This study discusses the influence of social media, trust, and purchasing
decisions on consumer buying interest who is entering the era of globalization
with rapidly developing technology. With this research, it can be seen that
there are advantages in marketing through social media which can optimize
marketing with the influence of social media in order to develop marketing
strategies. In addition, there are also methods from the research model and
methodology used in this study, which are based on previously studied
literature, and use variables in questionnaire development where the survey is
conducted online in Google Forms. In the findings, it can be seen that all
variables can be positively related to customer demand to buy a product |
Keywords: |
Purchase Decision, Purchase Interest, Trust, Social Media, Marketing, Customers,
E- Commerce |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
AN OVERVIEW OF THE DATA AND USER REQUIREMENT OF RESIDENT'S SECURITY AND SAFETY
APPLICATION ON SMARTPHONE |
Author: |
AMZARI ABU BAKAR, NORHAYATI HUSSIN, ZAHARUDIN IBRAHIM, HASNAH HASHIM |
Abstract: |
This paper discusses the crucial elements of developing a resident's security
and safety application on the smartphone. The discussion focuses on identifying
and determining the applicable requirement of the apps to be used by the
residents. The collated data and user requirements will comprise security and
safety parameters prevalent in the state and crucial features that residents
would like to use when implementing the mobile application. This paper aims to
construct an understanding of mobile apps and discuss the component that creates
a firm foundation for advancing knowledge and facilitating based on the
development of the apps. The method used is a literature survey. The secondary
data source of information has been identified to explore the element in
developing the security and safety of the mobile application for the large
population. The information gained from the previous journal nationally and
internationally ensures the right components are discussed. The paper's outcome
will significantly contribute to and benefit potential mobile application
developers, the communities, higher learning institutions, the federal
government of Malaysia, academicians, and researchers. It can also contribute to
the body of knowledge in the field of information management. Lastly, the
execution of this study will help bolster the government's plan of the National
Digital Economy Initiative (Digital Malaysia) towards strengthening the digital
information economy of the nation. |
Keywords: |
Safety, Security, Mobile Application, Data Requirement, User Requirement |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
Title: |
TVERSKY INDEXIVE CRAMER–SHOUP CRYPTOGRAPHY BASED DEEP STRUCTURED BELIEF NEURAL
LEARNING FOR SECURED ROUTING IN MANET |
Author: |
Mrs.R.NAVAMANI, Dr.N.ELAMATHI |
Abstract: |
A secure routing is a significant concern due to its self-organizing and
cooperative nature, capable of independent process, rapid changing topologies,
limited physical security and so on. With the routing being a critical aspect
for MANETs, existing routing protocols are not sufficient for security
constraints. In this paper, a novel routing algorithm called a Tversky Indexive
Cramer–Shoup Cryptography based Deep Structured Belief Neural Learning
(TICSC-DSBNL) technique is introduced with security and higher data
confidentiality in MANET. The TICSC-DSBNL technique comprises one input layer,
three hidden layers and one output layer. The number of mobile nodes is taken as
input in the input layer and sends the mobile node to the hidden layer 1. For
every mobile node in the hidden layer 1, the trust value is calculated to
identify the node as normal node or malicious node using Tversky Similarity
index. The index is used to find the similarity between mobile nodes for
classifying the node as normal node or malicious node. After that, the normal
nodes are given to the hidden layer 2. In that layer, a route path between the
nodes gets established and selects the shortest route path. In third hidden
layer, the Cramer–Shoup cryptosystem is applied for encryption and decryption to
perform secure routing with higher confidentiality in MANET. Simulation is
conducted in with different performance metrics such as packet delivery ratio,
packet drop rate, and delay, throughput, and data confidentiality rate with
respect to the number of data packets. The discussed results indicates that the
proposed TICSC-DSBNL technique improves the performance of secure routing with
higher delivery ratio, data confidentiality with lesser delay as well as packet
drop than the state-of-the-art methods. |
Keywords: |
MANET, Secure Routing, Deep Structured Belief Neural Learning, Tversky
Similarity Index, Cramer–Shoup Cryptosystem. |
Source: |
Journal of Theoretical and Applied Information Technology
30th June 2022 -- Vol. 100. No. 12 -- 2022 |
Full
Text |
|
|
|