|                                                                                 
                                                             
                                                  
                                                                     
          
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
        
 
 
November 2015 | Vol. 81  No.2  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SPECTRUM INVESTIGATION FOR SHARING ANALYSIS BETWEEN BWA SYSTEM AND FSS RECEIVER |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ZAID A. HAMID, KANAR R. TARIQ, MOHAMMED B. MAJED, THAREK ABD. RAHMAN |  
|  			
									
Abstract: | 
 			
									
In this research, testing the compatibility between Fixed Broadband Wireless 
Access (BWA) as a case study for the International Mobile Telecommunication (IMT-Advanced) 
and Fixed Satellite Services (FSS) networks in 3400-4200MHz range (C-band) has 
been studied and discussed in details. The interference between Fixed Satellite 
Service earth station(FSS ES) and Broadband Wireless Access(BWA) is considered 
and the aim of the article is to avoid interference between FSS ES and BWA by 
using minimum separation distance. Possibility of coexistence and sharing 
analysis were obtained by taking into account the detailed calculations of the 
most useful formulas for path loss effect and clutter loss by using the existing 
parameters of FSS and the BWA base station parameters located in the wireless 
communication center, Universiti Teknologi Malaysia (UTM). In-band interference 
has been concluded, analyzed and simulated (using Matlab) for several 
environments (rural, suburban, urban and densurban) in response to different 
clutter altitude. Channel prediction for two scenarios (rural and suburban) as a 
trail map was delineated by ATDI software. Simulation results indicate that the 
proposed mitigation scheme is highly efficient in terms of reducing the 
separation distances. Comparing the measurements with simulated result has also 
been done with high percentage of accuracy to show the amount of closeness or 
similarity between both results. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Coexistence, BWA, Mobile Service, FSS, Propagation Model, Interference, 
Separation Distance, And Co-Channel Interference. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
INFLUENCE OF CLASSIFIED AD ON GOOGLE PAGE RANK AND NUMBER OF VISITORS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUHAMMAD MULTAZAM, BAMBANG EKA PURNAMA |  
|  			
									
Abstract: | 
 			
									
One of the media used for promotion was classified ad. The study aimed to find 
out whether classified ad can increase search engine rankings and increase the 
number of visitors to a website. The study focus on the influence of classified 
ad on Google Pagerank line and number of visitors. This research purposes to 
find the effect classified ad on Google Pagerank line and number of visitors to 
the website with the comparison period and the number of ads with Google 
Pagerank change numbers and number of visitors. The benefits of this study is to 
produce a solution for the owner and manager of the website to get a higher 
index on Google Page and Google Search through media advertising campaign line 
to increase the number of visitors. The research result concluded that 
advertising line with Autosubmit Software is effective tools to increase the 
number of visitors to four times and effectively index the website domain name 
on the first page of Google Search engine but is less effective for keywords 
search specifically. In addition, classified ad via Google plus effectively 
increase search engine ranking in Google, especially for internet users who 
connect to the Google plus network. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Classified Ad, Search Engine, Google Pagerank, High Visitor |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
HYSTERETIC SYNCHRONIZATION MODELS OF BIOLOGICAL NEURONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MIKHAIL SEMENOV, EVGENIA KABULOVA, VLADIMIR MIKHAILOV, OLESYA KAN-ISHEVA |  
|  			
									
Abstract: | 
 			
									
The article provides a synchronization model of biological neurons based on the 
hysteretic properties of metabotropic receptive clusters. We study the 
properties of the proposed model and various variants of connections between 
individual neurons. The advantage of the proposed model is its ‘ordered’ 
response to external environment, which is determined by the hysteretic 
connection between individual neurons. The described biological neural network 
model may find application in the segmentation tasks and classification with 
efficiency exceeding standard numerical algorithms of data handling.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Neural Networks, Hysteresis, Simulation, Attractor, Delay Differential 
Equations. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SELECTION OF ROBUST FEATURE SUBSETS FOR PHISH WEBPAGE PREDICTION USING MAXIMUM 
RELEVANCE AND MINIMUM REDUNDANCY CRITERION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HIBA ZUHAIR, ALI SELAMAT, MAZLEENA SALLEH |  
|  			
									
Abstract: | 
 			
									
Phishers usually evolve their web exploits to defeat current anti-phishing 
community. Accordingly, that becomes a serious web threat and puts both users 
and enterprises at the risks of identity theft and monetary losses day by day. 
In the literature, most computational efforts were dedicated to justify 
well-performed phishing detection against evolving phish exploits. However, 
facets like exploration of new and predictive features, selecting minimal and 
robust features compactness still raise as key challenges to optimize the 
detection scenarios over vast and strongly interrelated web. In this study, we 
proposed a set of new hybrid features, and refine it as few, maximum relevant, 
minimum redundant, and robust features as possible. In the presence of a machine 
learning classifier and some assessment criteria that recommended for this 
purpose, the reported results experimentally demonstrated that our remedial 
scenario could be used to optimize a phish detection model for any anti-phishing 
scheme in the future. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Hybrid Features, Maximum Relevance, Minimum Redundancy, Goodness, Stability, 
Similarity. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AUTO-RATE ADAPTIVE MECHANISM FOR TRAFFIC-CONTROL IN SENSOR NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
K V UMASHANKAR , DR.C.CHANDRASEKAR |  
|  			
									
Abstract: | 
 			
									
Each sensor node in wireless network comprises of different processing ability 
with multipath energy sources, resulting in traffic while performing routing. 
Control of traffic through multipath routing in sensor network poses a serious 
challenge during packet transfer due to different characteristics of sensor 
nodes like beam, temperature and seismic sensors minimizing the desired 
throughput. If multi-hop traffic occurred on wireless network, the percentage of 
delay is also increased and fails in achieving robustness with inefficient 
packet transfer rate. In order to achieve the desired reliability during packet 
transfer over wireless network, a new mechanism is proposed in this paper. The 
mechanism Traffic-control using Auto-rate Adaptive with Medium Access Control (TAAd-MAC) 
is designed to improve the efficiency of packet transfer rate on sensor network. 
Initially, TAA-MAC creates a route with instantaneous transmission queue length 
and identifies the traffic level of nodes in wireless sensor network. The 
traffic level of nodes is identified using Fuzzy Markovian Queue based Random 
Node Distributed Traffic point. Next to increase the robustness of packet 
transfer in sensor network by controlling the traffic, Auto-Rate Adaptive MAC 
mechanism is designed. Auto-Rate results in achieving higher throughput 
according to the changes observed in the network behavior. Finally, TAA-MAC 
mechanism uses the Auto-rate Distributed Contingency Algorithm to reduce the 
delay on multipath packet transfer in wireless network. Auto-rate Distributed 
Contingency algorithm also helps to reduce the traffic on emergency dynamic 
routing on sensor network zone. Experiment is conducted on factors such as 
traffic-control routing effectiveness, average delay time on multipath routing 
sensor network, and throughput rate. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Medium Access Control, Auto Rate, Distributed Contingency Algorithm, Wireless 
Sensor Network, Traffic-Control, Fuzzy Markovian Queue |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
INVESTIGATION OF KNOWLEDGE RETRIEVING CHALLENGES IN UNIVERSITIES ENVIRONMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ZAINAB AMIN AL-SULAMI, ZAINUDDIN BIN HASSAN, ALI TAHA Al-OQAILY |  
|  			
									
Abstract: | 
 			
									
Organizations of various industries linked to education have adopted Knowledge 
Management System (KMS) in order to enhance businesses operations to better 
provide competitive advantages of services and products. Knowledge Retrieval is 
a crucial component of knowledge management. Retrieving focused and valuable 
knowledge from explicit sources such as scientific articles is of vital 
importance to better serve academic staff of universities so as to enable them 
to accomplish their researching and teaching activities more effectively. 
Traditional methods of knowledge retrieval are time consuming. Academic staff 
members have often exhausted valuable time and effort in their attempts to 
extract a precise need of knowledge i.e. expertise. The main aim of this paper 
is to analyze the challenges faced daily by academic staff members of 
universities in their working environment pertaining to knowledge retrieval. A 
questionnaire survey with 50 academic staff members from two Malaysian 
universities was conducted to analyze knowledge retrieval challenges as well as 
to highlight solutions to these challenges. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Knowledge Management, Knowledge Retrieval, Universities, Scientific Articles, 
Academic Staff |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN ADVANCED PRODUCT RECOMMENDATION FRAMEWORK BY USING MULTIPLE PRODUCT FEATURE 
ANALYTICS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MR.T.SUBHA MASTAN RAO, DR.G.RAMA KRISHNA |  
|  			
									
Abstract: | 
 			
									
Online store plays a vital role for product analysis using automatic recommended 
system to the new customers. Since purchase patterns of traditional approaches 
considered the overall product rating and website preferences in the 
recommendation process. Commercial ecommerce recommended system use machine 
learning techniques to make appropriate decision rules for the customers during 
real-time sessions. Also, various machine learning techniques depend on the type 
of product and the number of transactions. It also depends on the customer 
purchase history whose purchase rules are close to that of new customers. 
Conventional recommendation techniques generate recommendation patterns similar 
to products that the target user has computed recommendation by analyzing the 
products purchased by the customers who are identical to the target customers. 
In this proposed work, an improved multi-feature based product recommendation 
system was built on the real time ecommerce sites. In this proposed 
architecture, multiple web based products are analyzed and ranked by using 
multi-product based recommender system. In this system, multiple products from 
different vendors are taken with multiple product features. The proposed work 
gives the best solution to the users who are interested in comparing the 
different vendors' products for product purchase. Experimental results show that 
proposed multi-product system give better user product recommendation compared 
to traditional single site product recommendation systems. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Online Store, Product Analysis, Automatic Recommendation, Multi Feature |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A NOVEL PRODUCT FILTERING AND PRODUCT RECOMMENDATION SYSTEM TO OPTIMIZE THE 
SEARCH SPACE AND SPARSITY IN REAL TIME ECOMMERCE ENVIRONMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MR.T.SUBHA MASTAN RAO, DR.G.RAMA KRISHNA |  
|  			
									
Abstract: | 
 			
									
Online Product recommended system is the most effective prediction system in the 
e-commerce websites. Customized/Automated recommendation systems can assist the 
users to find relevant products within short time in large e-commerce databases. 
Several recommendation techniques have been proposed to filter the user 
interested products and to optimize e-commerce sales from different vendors. 
With the tremendous increase in the products and customers in e-commerce 
systems, the time taken to search the required product using traditional 
recommended techniques increases due to the large number of products features 
and its specifications. With the tremendous growth in the products and customers 
information however, the traditional systems encounter two key issues, enhanced 
response time and minimized recommending quality. New Qualitative recommended 
systems are essential to handle. The traditional techniques can’t implement 
search space optimization when the item-space changes; on the other hand, the 
overall efficiency of the recommendation system will decrease as the items grow 
into a large amount. Sparsity of the product is the most significant basis which 
minimizes the inadequate quality. In this paper, a new product filtering and 
product recommended system is proposed to optimize the search space and sparsity. 
Product filtering can be used to filter the relevant products from the web using 
the conditional probability and similarity values. Product prediction based 
recommended system is proposed to predict the products ranking based on the 
products features as well as calculated predicted probabilities. Experimental 
results show that proposed filtering based recommended system outperforms well 
on web applications like e-bay in terms of search space and ranking are concern. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Online, Product Filtering, Qualitative, Sparsity, Product Filtering |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
REDEFINING ICT GOVERNANCE FOR MALAYSIAN PUBLIC SECTOR |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ROSIDA AB RAZAK, MOHAMAD SHANUDIN ZAKARIA |  
|  			
									
Abstract: | 
 			
									
The automation of government services using ICT began in 1997, with the 
commencement of E-government in Malaysia. The E-government gained it momentum in 
early 2000 to satisfy the public insatiable appetite for such services. Later, 
we have reached a threshold where some service provisions failed to live up to 
public‘s expectation. Clearly, this illustrates the failure of optimizing 
existing resources and minimizing risks from which the provisions are expected 
to deliver value to public. Businesses took serious view on ICT Governance (ICTG) 
to align their strategies, optimize resources, and minimize risks and, above 
all, to deliver value. Public sector needs to put effective ICTG into practice. 
We contented that Malaysian Public Sector (MPS) still elude a proper ICTG 
definition.  
Thus, this research is an effort to formulate a specific ICTG definition that 
suit MPS but framed within the present and acceptable definition of ICTG for 
businesses. The Delphi Method was adopted as a qualitative approach for the 
validation process. Where, the validation and refining process is to obtain 
experts’ consensus for the proposed definition. 
In particular, a proposed definition acknowledges the gulf of differences 
between the functions of public services and businesses. Therefore, indirectly 
it helps ICTG practitioner in handling ICTG goings-on in their organization, and 
to be used as a standard reference in strengthening ICTG practices for MPS |  
|  			
									
  										
			
Keywords:  | 
 			
									
ICT Governance, Public Sector, Definition, CSFs, Validation |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A REVIEW OF FACE SKETCH RECOGNITION SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SALAH EDDINE LAHLALI, ABDELALIM SADIQ, SAMIR MBARKI |  
|  			
									
Abstract: | 
 			
									
Police sketching techniques are nevertheless a routine part of law enforcement 
investigation and often used to identify suspects from an eye witness memory. 
This classic technique of identifying is generally slow and fastidious and may 
not conduct to arrest the right offender. Therefore an automatic face sketch 
recognition systems that determine efficiently the perpetrator’s appearance from 
gallery of face images is required. Such technology design is open challenging 
research because faces and sketches are generated from distinct sources and have 
different gaps to overcome in low and high levels. Although many methods have 
been proposed, we are unaware of any surveys on this particular topic. For this 
reason we wrote this paper for reviewing the different researches on recognizing 
face from forensic sketch by analyzing their approaches and identifying their 
limitations. We also discuss relevant issues such as benchmarking datasets and 
evaluation protocols. After, we conclude with several promising directions for 
future research. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Face Sketch Recognition, Gap, Feature Extraction, Matching Methods, Machine 
Learning, Evaluation Protocol, Datasets. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CURRENT ISSUES IN ENSEMBLE METHODS AND ITS APPLICATIONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NURA MUHAMMAD BABA , MOKHAIRI MAKHTAR , SYED ABDULLAH FADZLI , MOHD KHALID AWANG |  
|  			
									
Abstract: | 
 			
									
This paper reviewed the current state-of-the-art of optimization of ensemble 
methods so as to provide us with a better direction of how we will conduct our 
research in the future. The primary aim of ensemble method is to integrate a set 
of models that are used for solving different tasks so as to come up with 
enhanced composite global model, which produces higher accuracy and reliable 
estimate than what can be achieved through a single model. Diversity, 
combination strategies, number of based classifiers, types of ensemble, and 
performance measures are the key factors to be considered in the build of 
committees. When the numbers of base classifiers become huge, ensemble methods 
incurred high storage space and computational time, selective ensemble is 
proposed by most literatures to solve these problems. In terms of optimization 
techniques, multi-objectives techniques have become the better ones to use due 
to their efficiency in terms of optimization process and they provide a set of 
near optimal solution instead of just a single solution. When comparing the 
performance of ensemble methods, most of the time, accuracy alone cannot 
differentiate which classifiers perform best; for this reason, other performance 
measures such as AUC, F-measure, TPR, TNR, FPR, FNR, RMSE were used. Based on 
the reviewed literatures, we concluded that in our proposed methodology we would 
come up with a new method for comparing and searching for relevant classifiers 
from a collection of models that would be used as a model for predicting the 
quality of water to achieve higher performance rate than other previous work. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Ensemble Method, Classification Model, Diversity Measures, Performance Measures |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN AUTOMATIC HUMAN GAIT RECOGNITION SYSTEM BASED ON JOINT ANGLE ESTIMATION ON 
SILHOUETTE IMAGES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ALI SAADOON, MD JAN NORDIN |  
|  			
									
Abstract: | 
 			
									
Gait recognition as a biometric attribute has the capability to be recognized in 
monitoring systems. In this paper, a method based on joint angle estimation of 
body motion for gait recognition is proposed. The representation of gait feature 
for the motion angles of upper and lower of body part is investigated and joint 
angle is calculated using Fourier, radon and Gabor features. Based on the joint 
angles estimation, we build a histogram of the feature individually. In the 
measurement stage of distance, x2 function is used to measure the 
similarity between these histograms. After that, a classifier is built to 
implement the stage of classification. Experiments were tested on CASIA (B) 
Database to demonstrate that proposed method can attain a high-quality 
recognition performance. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Gait Recognition, Silhouette, Joint Angle, Skeletonization, SVM |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RDB2XSD: AUTOMATIC SCHEMA MAPPING FROM RDB INTO XML |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LARBI ALAOUI, OUSSAMA EL HAJJAMY, MOHAMED BAHAJ |  
|  			
									
Abstract: | 
 			
									
Extensible Markup Language (XML) is nowadays one of the most important standard 
media used for exchanging data on the internet. Massive data is still however 
treated, transferred and stored using relational database systems (RDBs). 
Therefore, there is a need for an integrated method that deals with database 
migration from RDB schema to XML schema. In this paper we provide and develop a 
new solution called RDB2XSD that migrates the conceptual schema of RDB into XSD 
through a MA (multidimensional array) model. This solution takes an existing RDB 
as input and extracts its metadata with as much constraints as possible, creates 
the MA model to capture the semantics of the relational database and applies our 
mapping algorithm to generate the hierarchical XSD schema. For the 
implementation of our approach we developed a tool based on java and tested it 
using Oracle and Mysql databases. Our experimental results based on this tool 
show that our mapping strategy is feasible and efficient. |  
|  			
									
  										
			
Keywords:  | 
 			
									
XML, XSD, Relational Database RDB, Schema Conversion, MA Model |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MARWAN ALSHAR’E, ABDULLAH MOHD ZIN, ROSSILAWATI SULAIMAN, MOHD ROSMADI MOKHTAR |  
|  			
									
Abstract: | 
 			
									
A number of previous researchers have discussed the vulnerability of TPM to 
physical attack and have proposed a number of solutions to solve these issues. 
Investigation have shown a number of flaws that these solutions suffers from. 
Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was 
proposed and evaluated to overcome major safety issue that TPM found to be 
vulnerable to. A system prototype based on TPM-UAM was developed to prove the 
TPM-UAM ability to protect trusted computers protected by TPM. Expert review 
method depends on the understanding that experts are able to provide clear 
judgment and opinions from their experience and knowledge in their fields. The 
evaluation process consists of three sections, functionality evaluation, ‘can 
you break it?’ test and usability evaluation. Three experts in an individual 
expert review method were asked to evaluate the system prototype in order to 
confirm the system correctness of design and implementation and also to evaluate 
the prototype as a reflection of the TPM-UAM and confirm the model ability to 
protect trusted computers protected by TPM. The evaluation process was conducted 
as planed and the system prototype was successfully evaluated. The results 
confirmed on the system’s correct design and implementation, also confirms the 
correct imitation and representation of the TPM-UAM model in a software 
prototype, as well as the system efficiency and ability to secure TPM. This 
paper describes the expert evaluation of software prototype based on TPM-UAM 
model. Three experts in the field of trusted computing and information security 
evaluated the system prototype individually in three evaluation sections 
includes functionality evaluation, ‘can you break it’ test and usability 
evaluation. The evaluation results confirms the system correct design, ability 
to protect TPM and the reflection of the TPM-UAM model that the prototype system 
intended to represent.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
TPM, Expert Evaluation, Individual Expert Review, Heuristic Evaluation, 
Functional Evaluation. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PERFORMANCE ANALYSIS OF MIMO-OFDM RECEIVER USING MODIFIED PTS TECHNIQUE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
M. THANIGASALAM, P. DANANJAYAN |  
|  			
									
Abstract: | 
 			
									
Partial Transmit Sequence is one of the distortionless methods to reduce the 
peak-to-average power ratio (PAPR) in Orthogonal Frequency Division Multiplexing 
(OFDM) systems. It is an attractive method since it provides PAPR reduction 
without any degradation in bit error rate (BER) performance. PTS has high 
computational complexity which increases exponentially with increase in 
subblocks. But modified PTS technique of PAPR reduction has decreased this 
computational complexity by using a neighbourhood search algorithm for finding 
the optimum set of phase factors required for independent phase rotation of the 
symbols in each subblock. The potential capability of the modified PTS technique 
is explored in MIMO-OFDM systems for PAPR reduction and its performance is 
evaluated. In this paper, the performance of MIMO-OFDM system employing modified 
PTS technique is investigated by using Least Square (LS) and Minimum Mean Square 
Error (MMSE) channel estimation methods. The performance of the system is 
evaluated in terms of mean square error (MSE) and bit error rate (BER) for 
different subblock sizes and different subcarriers. The simulation results 
depict improved BER performance with PAPR reduction by increasing the subblocks. 
The results also show that there is a slight degradation in BER with increase in 
number of subcarriers. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Channel Estimation, Modified PTS, Multiple-Input Multiple-Output Orthogonal 
Frequency Division Multiplexing, Peak-to-Average Power Ratio, Bit Error Rate  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
BACKSTEPPING ADAPTIVE CONTROL OF DFIG-GENERATORS FOR WIND TURBINES 
VARIABLE-SPEED |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
Hassan MAHMOUDI, Madiha EL GHAMRASNI, Ahmed LAGRIOUI, Badre BOSSOUFI |  
|  			
									
Abstract: | 
 			
									
In this paper, we present a new contribution for control of wind turbine energy 
conversion system. A new observer Backstepping control of DFIG-Generators for 
Wind Turbines Variable-Speed is developed.  
A new control technique for wind systems is presented. This control scheme is 
based on an adaptive pole placement control strategy integrated to a 
Backstepping control scheme. The overall stability of the system is shown using 
Lyapunov technique. The performance and robustness are analyzed and compared by 
simulation using Matlab / Simulink software. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Wind-Turbine, Double-Fed asynchronous generator (DFIG), MPPT, Adaptive Control 
Backstepping, Matlab / Simulink |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DEVELOPMENT OF LINEAR ENVELOPED SURFACE ELECTROMYOGRAPHY CIRCUIT BASED ON 
FOREARM MUSCLE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUHAMMAD ALIF NORIZAN, FARIZ ALI, NORAFIZAH ABAS, HERMAN JAMALUDDIN, WAN MOHD 
BUKHARI, MUHAMMAD ANAS BORHAN, MOHAMAD FAIZAL BAHAROM, ARFAH SYAHIDA MOHD NOR |  
|  			
									
Abstract: | 
 			
									
A linear enveloped circuit for processing of EMG signal has been designed and 
presented in this paper. The circuit acquires EMG signals from forearm muscle 
namely Flexor Digitorum Superficialis (FDS) using surface electrode and 
processed in into linear enveloped form. EMG can be defined as the electrical 
potential produced due to the contraction of muscle. EMG signal requires 
processes of preamplification, band limiting, rectification and smoothing in 
order to gain output signal in enveloped form. The output signal can be used for 
application in robotic such as prostheses or exoskeleton. |  
|  			
									
  										
			
Keywords:  | 
 			
									
EMG, Flexor Digitorum Superficialis, Signal Processing, Preamplifier, Driven 
Right Leg, Band pass filter, CMMR, Linear Enveloped EMG Signal, Sallen Key |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EMPIRICAL PERFORMANCE EVALUATION OF PUCRN AND CBRP-CRN PROTOCOL IN COGNITIVE 
RADIO AD-HOC MESH NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
T. PAVAN KUMAR, E.SURESH BABU, K.RAJASEKHARA RAO, V.SRIKANTH |  
|  			
									
Abstract: | 
 			
									
Now a day’s Wireless communication plays an important role in many of the user 
applications. Many of these applications follow either unicast or multicast 
routing protocol for their communication. In wireless mesh networks multicast 
routing protocol is mostly adopted as we can send more data packets to multiple 
places at the same time. So it is more important to understand and evaluate 
routing protocols in wireless mesh networks as it provides more reliability, 
efficiency with less bandwidth than in any other networks. In this paper we have 
simulated, examined and analysed two important routing protocols namely Primary 
user in cognitive radio network (PUCRN) and cluster based routing protocol in 
cognitive radio network (CBRP-CRN) which are models of mesh based routing 
protocols in wireless mesh networks. To better evaluate these routing protocols 
we have made required changes in the fields like change in number of nodes, 
pause time, traffic pattern and other parameters. We have used performance 
metrics like end to end delay, throughput and packet delivery ratio to evaluate 
the performance of PUCRN and CBRP-CRN in cognitive radio wireless mesh networks. 
Our scope of work will help you to compare and evaluate these two routing 
protocols using NS2.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Wireless Mesh Networks, Routing protocol, CBRP-CRN, PUCRN  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN ADAPTIVE-TRIANGLE METHOD FOR BINARY IMAGE CONTOUR DATA APPROXIMATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MAJDI FARAG MOHAMMED EL BIREKI, RUQIYA M ALBAHI ALI, ALI ABDRAHMAN M UKASHA, M. 
F. L. ABDULLAH |  
|  			
									
Abstract: | 
 			
									
This paper presents a new efficient algorithm for contour approximation and 
compression. The single step parallel contour extraction (SSPCE) method will be 
used in this work to achieve Cartesian representation of the object. We also 
discuss the main idea of the analyzed approach to obtain contour approximation 
and we will compare it with the Ramer and Trapezoid methods of contour 
approximation. For comparison, we are going to use the mean square error and 
signal-to-noise ratio criterions. Experimental results are obtained both in 
terms of image quality, compression ratios and speed. The main advantages of the 
analyzed algorithm are the short computational time of operations and good 
quality of approximation. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Contour Representation, Contour Compression, Polygonal Approximation, Ramer, 
Triangle and Trapezoid Methods |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EFFICIENT BATIK IMAGE RETRIEVAL SYSTEM BASED ON COLOR AND TEXTURE FEATURES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
RIMA TRI WAHYUNINGRUM, INDAH AGUSTIEN SIRADJUDDIN |  
|  			
									
Abstract: | 
 			
									
Research in batik image retrieval is still challenging today. In this paper, we 
present an efficient system for batik image retrieval that combine color and 
texture features. The proposed approach is based on color auto-correlogram 
method as color feature extraction method and Gray Level Co-occurrence Matrix (GLCM) 
method as texture feature extraction method. Firstly, HSV (Hue Saturation Value) 
color space but only the hue component is quantized into 18 color categories and 
continued in the process of color auto-correlogram. Secondly, converts the batik 
image from RGB color space to grayscale to obtain texture features using GLCM 
(Gray Level Co-occurrence Matrix). Finally, the integration of the color and 
texture features provide a robust feature set for batik image retrieval with 
calculates the similarity measure. Precision and recall are used as the accuracy 
measure in our proposed research, then the results are compared with the 
well-known existing approaches. The experimental results show that the proposed 
batik image retrieval is more accurate and efficient in retrieving the user 
interested images. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Feature Extraction, Color Auto-Correlogram, Gray Level Co-Occurrence Matrix (GLCM), 
Image Retrieval |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
INITIAL VALIDATION OF PERSUASIVE MODEL FOR WEB-BASED LEARNING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NOR AZIAH DAUD, NORAIDAH SAHARI , ZURINA MUDA |  
|  			
									
Abstract: | 
 			
									
Web-based learning (WBL) has many advantages and its usage has extended from 
time to time. However, WBL also has its limitations, thus an innovative design 
should be provided to complement the existing design. This research proposes the 
appropriate persuasive features of WBL. Those features are then adapted into WBL 
to encourage adult learners to engage and use the WBL approach in Islamic 
education (WBL-IE). In prior work, an initial persuasive model for Islamic 
education was constructed. Experts in the appropriate domains of expertise were 
identified to evaluate the persuasive features, and the Delphi technique (DT) 
was used to implement the verification process. Therefore, this paper also 
discusses the Delphi process and analyses the results. The process began by 
establishing preliminary priorities among the persuasive features that include 
dimensions, components and elements. To accomplish the process, an instrument in 
the form of a questionnaire based on five levels of agreement was created. The 
questionnaire was used by the Delphi experts to evaluate the persuasive features 
and the median score of the evaluation was analyzed using median score 
determination. The results from the first cycle of the Delphi process showed 
that all three dimensions, 23 components and most of the proposed elements 
should be accepted as persuasive features in the WBL design. The features were 
further discussed in depth in the second cycle of the Delphi process. The 
discussion covered comments and suggestions from experts regarding the agreed 
features. The redundancy of components and support elements when applied in a 
Web environment were identified. The experts concluded that three dimensions 
should remain in the model and only 18 components together with appropriate 
support elements should be included in the persuasive design model for WBL-IE. 
  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Persuasive, Web-Based Learning (WBL), Delphi Technique, Initial Persuasive 
Mode,L Islamic Education |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DATA SYNCHRONIZATION BETWEEN MOBILE DEVICES AND SERVER-SIDE DATABASES: A 
SYSTEMATIC LITERATURE REVIEW |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDULLAHI ABUBAKAR IMAM, SHUIB BASRI, ROHIZA AHMAD |  
|  			
									
Abstract: | 
 			
									
It is progressively important for mobile device databases to achieve additional 
coordination of diverse computerized operations. To do so, many research works 
have been conducted to attain more companionable solutions that can be used to 
synchronize data between the mobile device and the server side databases. The 
objective of this study is to survey the state of the art in various aspects of 
mobile devices with respect to data sharing and synchronization between mobile 
device databases and server-side databases as opposed to the server-to-server 
synchronizations. To achieve this feat, 5 different electronic databases were 
used to identify primary studies using the relevant keywords and search terms 
related to mobile data synchronization classified under journals, conferences, 
symposiums and book chapters. The study produced interesting results in 
different areas such as data synchronization, data processing, vendor 
dependency, data inconsistency and conflicts resolutions where 19 primary 
studies were selected from the search processes. In our conclusion, mobile data 
synchronization has been significantly discussed in the domain of databases. In 
general however, it was discovered that, existing synchronization solutions 
suffer from a number of limitations such as lack of consistency among data, 
resolving conflicts, data processing responsibility, vendor dependency, data 
type, bandwidth utilization and network fluctuation during data transmission. 
Also the applicability of the existing solutions has not been reported yet. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Data Synchronization, Mobile device, Mobile Databases, DBMS, SLR, Heterogeneous |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CAMERA-BASED TODDLER FALL DETECTION SYSTEM BY USING KALMAN FILTER |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LOW HAN LEONG, AINI BT HUSSAIN, MOHD ASYRAF ZULKIFLEY, WAN MIMI DIYANA WAN ZAKI |  
|  			
									
Abstract: | 
 			
									
Monitoring a toddler is a tedious job, yet a very important one. Fall down is 
the most common risk that leads to injury during the process of learning to 
walk. Thus, this paper proposed an algorithm to detect automatically the event 
of toddler fall down to assist the supervision process by alerting the caretaker 
if necessary. This system comprises of a background subtraction module to detect 
region of interest, a tracking module using Kalman filter to track toddler 
movement and a decision module through decision tree process to determine the 
toddler state. System performance is evaluated based on three metrics, which are 
accuracy, sensitivity and specificity. The proposed algorithm works well with a 
low error performance. Further research should be done to improve the robustness 
of the system for real life environment implementation.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Fall Down, Toddler Monitoring, Kalman Filter, Decision Tree Process and 
Background Subtraction Module |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD 
COMPUTING ENVIRONMENT  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SOUVIK PAL, PRASANT KUMAR PATTNAIK |  
|  			
									
Abstract: | 
 			
									
Cloud brokering service is an intermediate service which enables the 
producer-consumer business model enforcing the easy access to cloud services 
from Cloud Service Providers (CSPs). Cloud broker is to provide a platform where 
broker collects the information from the user, analyze the data, and sends those 
data to the CSPs. Cloud broker also provides data integration services and 
modeling the data across all the components or units of the cloud services. This 
paper deals with designing criteria and issues of cloud broker, system activity 
of broker, and sequence diagram of system design with implementation procedure. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Cloud computing, cloud broker, Virtualization, Virtual Machine |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ARTIFICIAL NEURAL NETWORKS MODELS OF TETRAHEDRAL FINITE ELEMENTS FOR SOLVING 
ANTENNA RADIATION PROBLEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
EYAD AL-ZURAIQI |  
|  			
									
Abstract: | 
 			
									
Abstract. In this work, an Artificial Neural Network (ANN) model of Finite 
Element Method (FEM) is developed and presented. The proposed method uses 
Hopfield NN that is able to efficiently represent the tetrahedral Finite Element 
(FE) functional that is formulated to interpolate the field radiation of a 
microstrip patch antenna. This study provide a robust method to combine NN with 
tetrahedral FE to provide a highly-reconfigurable memory-saving method, that 
help in reducing computational complexity of antenna radiation problems, and 
build a real-time analyzer of a reconfigurable antenna system implemented in a 
remote area. The proposed method shows a good match with the measured data and 
the analytical solutions.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Artificial Neural Network, Finite Element Method, Microstrip Patch Antenna |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2015 -- Vol. 81. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
 |     	 
 |