|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
May 2015 | Vol. 75 No.1 |
Title: |
INVESTIGATION STUDY: AN INTENSIVE ANALYSIS FOR MSA LEADING METHODS |
Author: |
MUHANNAD A. ABU-HASHEM, NUR'AINI ABDUL RASHID, ROSNI ABDULLAH, AWSAN A. HASAN
AND ATHEER A. ABDULRAZZAQ |
Abstract: |
Multiple sequence alignment (MSA) is a cornerstone process in computational
biology and bioinformatics and it is necessary for sequence analysis. Through
decades of extensive research to solve the MSA problem, numerous methods have
been proposed and developed. Dynamic programming-based methods suffer from the
high computational cost in building MSA. Therefore researchers tend to solve MSA
problem using heuristic methods as they attempt to reach optimal results in a
reasonable time. Progressive alignment method is the most used method for
constructing MSA. In this paper we present an extensive analysis for the leading
methods and top performing methods in MSA. The leading methods of MSA are
discussed individually to highlight the differences in methods and techniques
they use beside the progressive alignment. Also, we present a critical analysis
for MSA leading methods based on experimental results where BaliBASE database is
used as a benchmark. Results show that MSAProbs algorithm has the superior
accuracy performance over all leading methods while MUSCLE and Clustal W are the
fastest. Although numerous algorithms have been proposed for MSA, producing an
efficient MSA with high accuracy remains a huge challenge. |
Keywords: |
Multiple sequence alignment, MSA leading methods, Progressive alignment,
Sequence alignment, Guide tree, and Computational biology. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
EVALUATION OF SECURITY IN SOFTWARE ARCHITECTURE USING COMBINATION OF ATAM AND
STRIDE |
Author: |
PRAJNA DESHANTA IBNUGRAHA*, RIDI FERDIANA, SUHARYANTO, PAULUS INSAP SANTOSA |
Abstract: |
In this time, security is important thing that must be included when develop
software because it has large effect on continuity of software and business.
Therefore, security evaluation is required as a phase in software architecture
development. Security evaluation is useful to minimize future problems about
security. The objective of this study is to simplify evaluation security
attribute using ATAM and STRIDE. ATAM is used to analysis and evaluate security
of software architecture. The output of ATAM is scenarios of quality attribute.
Classification of security threat can be used to simplify scenarios building and
test the scenarios. The result of experiment in case study show that security
problems can be discovered using analysis and evaluation phase. |
Keywords: |
Evaluation, ATAM, STRIDE |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
DATA MINING FOR PREDICTING CUSTOMER SATISFACTION IN FAST-FOOD RESTAURANT |
Author: |
BAYU ADHI TAMA |
Abstract: |
Managing customer satisfaction has become a crucial issue in fast-food industry.
This study aims at identifying determinant factor related to customer
satisfaction in fast-food restaurant. Customer data are analyzed by using data
mining method with two classification techniques such as decision tree and
neural network. Classification models are developed using decision tree and
neural network to determine underlying attributes of customer satisfaction.
Generated rules are beneficial for managerial and practical implementation in
fast-food industry. Decision tree and neural network yield more than 80% of
predictive accuracy. |
Keywords: |
Customer Satisfaction, Classification Model, Data Mining, Fast-Food Restaurant,
Rules Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
BANDWIDTH PROVISIONING SCHEME FOR 3D WIRELESS SENSOR NETWORKS |
Author: |
MANAL A. MIZHER, SALEH H. AL-SHARAEH, RIZA SULAIMAN, MANAR A. MIZHER |
Abstract: |
Bandwidth (BW) resources are scarce and valuable in Wireless Sensor Networks (WSNs).
Managing this scarcity in BW is a key challenge in WSN's environments. Achieving
high BW utilization (BWU) will rise the Quality of Service (QoS) that network
can guarantee, without the omission of the importance of concurring BWU, with
the minimizing of connection blocking (CBP) and dropping (CDP) probabilities.
This paper considers attaining high QoS from point of BW scheduling whether WSNs
is designed in two or three dimensions, also our scheme studies the effect of
existence or the absence of base station blind spot. We have tested WSN under
sixteen different cases, which comprised: Two Dimension structure (2D), 3D
structure, Indoor space (Is), Outdoor space (Os), without Blind Spot (nBS), with
Blind Spot (wBS), using static borrowing mechanism (SBBS), and finally using
dynamic borrowing mechanism (DBBS). The results revealed that considering
network with using dynamic borrowing scheme and with rate up to 50 connection
rate (CR) will have better QoS guarantees. Moreover, we can summarize that 3D
space outperforms 2D space in general view. Finally, not considering BS and
building network outdoor will have better QoS guarantee in general. In addition,
it is worth mentioning that previous results are processed from repetition each
situation 2500 times, which make these results high strict and reliable. |
Keywords: |
Borrowing Scheme, Connection Blocking Probability, Connection Dropping
Probability, Connection Rate, 2D structure, 3D structure, Blind Spot, Indoor
Space, Outdoor Space. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
PACKET LEVEL DATA COMPRESSION TECHNIQUES FOR WIRELESS SENSOR NETWORKS |
Author: |
S.JANCY, DR . C. JAYA KUMAR |
Abstract: |
Wireless sensor network consist of a set of sensor nodes. The processing
capacity varies with each node. Sensors in it have storage capacity which is
limited. The main challenge today in this field is to improvise the power and
energy management of sensor network. Different techniques have been introduced
by various researches. In this paper proposes an algorithm to improvise sensor
energy using compression techniques. This is called as packet level data
compression techniques. In my previous paper sequential data compression
techniques two different techniques were proposed to improve energy in sensors.
This paper includes processes called segmentation along with the previously
proposed algorithm to improve sensor energy. The compression ratio obtained is
higher than the previously proposed method. Along with the proposed method
discussed various other standard compression techniques. |
Keywords: |
Wireless Sensor Networks(WSN),Data Compression, Sensors, Fragmentation, Sensor
Energy. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
DETECTION OF COMMUNITIES IN COMPLEX GRAPHS BASED ON THE NORMALIZED COVARIANCE
BETWEEN VERTICES |
Author: |
ABDERRAHIM GHADI, MOHAMED BEN AHMED, A.ANOUAR BOUDHIR, MOHAMED BOUHORMA |
Abstract: |
Communities detection in graphs has been the subject of many algorithms. Recent
methods seek to optimize a function of modularity indicating a maximum of
relationships within communities and a minimum of inter-communities relations.
This paper will be presented as follows, first, we present the state of the art
in matters of detection methods of communities then we propose a method for
detecting communities. This method works into two steps, the first step consist
to split the graph into subgraphs by using the normalized covariance measurement
and the second part allows to merge the sub-graphs by maximizing the modularity
of the resulting graph. |
Keywords: |
Graph Theory, Complex Networks, Modularity, Clustering Coefficient,
Assortativity |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
STATE OF THE ART SURVEY ON SECURITY ISSUE IN CLOUD COMPUTING ARCHITECTURES,
APPROACHES AND METHODS |
Author: |
YOUSRA ABDUL ALSAHIB S.ALDEEN, MAZLEENA SALLEH AND MOHAMMAD ABDUR RAZZAQUE |
Abstract: |
The development of cloud computing has revolutionized in how the computing and
storage are utilized remotely. It has grown from being hopeful business concept
to one of the fast growing segments of the IT manufacturing. It has become
attractive to businesses and organizations. Although of all the benefits of the
cloud, enterprise customers are still unwilling to position their business in
the cloud. Security and privacy are the main issues which decrease the growth of
cloud computing and preservation of data continue to plague the market. In this
paper, we present the vulnerabilities and attacks; identify relevant solution
directives to strengthen security in the cloud environment. The main goal of
this paper is to offer a better understanding of the security challenges of
cloud computing and identify architecture, approaches and methods that have been
proposed. |
Keywords: |
cloud computing, cloud security, characteristics of cloud computing, security
challenges, security vulnerabilities |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
THE IMPACT OF DEMOGRAPHIC VARIABLES BASED ON BUYING BEHAVIOUR INTENTION TOWARDS
E-STORE IN INDIA |
Author: |
KAVITHA RAJAYOGAN & DR. MUTHUMANI. S |
Abstract: |
Having personally done shopping online, it is times a greater hurdle to overcome
before clicking the buy button within the e-store. Perception of the product
while initially reviewing the product features and internet page changes being a
‘good deal’ to ‘maybe not’ when factors such as shipping and handling, time for
delivery, registration, preferred payment method etc. come in after the product
is added to the card right at the end of the purchasing process. The
technological advancement of e-commerce in e-retailing has also triggered the
retail shoppers to provide e-store facility to attain potential customers. The
samples taken for this study are 210 and descriptive research design has been
used. The main statistical tools used in the study are ANOVA, Chi-square. This
article shall focus on the impact of demographic variables with the consumer
decision buying process and how attitude and motivation have a role to play on
the consumer’s “intention to buy online” |
Keywords: |
E-Retailing , Perception, E-Commerce |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF RELAY AND COMBINING METHODS IN WIRELESS NETWORKS |
Author: |
ABDULJALIL SAIF , MAHAMOD ISMAIL, ROSDIADEE NORDIN AND MOHAMMED FADHIL |
Abstract: |
The quality signal in a wireless transmission occasionally suffers from severe
bad channel quality due to effects like fading caused by multi-path propagation.
Diversity is one of the methods that used to reduce such effect whereby
different samples of the same signal are transferred over essentially
independent channels. Cooperative wireless communication it resolves this
problem by transmitting a message to a destination with the assistance of a
relay. Upon receiving the message from the transmission source, the relay
retransmits the message to the destination. Therefore, the combination of the
direct and relay transmissions, improves signal reception at the receiver
whereby the signal is clearer and better. As such, this paper compares and
evaluates the performance of different relays and combining methods in
cooperative relay network under noisy and Rayleigh fading channel. This paper
examines the Amplify and Forward (AAF) and Decode and Forward (DAF) relay
protocols using Maximal-Ratio Combining (MRC), Fixed-Rate Combining (FRC) and
Equal-Rate Combining (ERC) methods with BPSK and QPSK modulation based on
simulations. The result of the simulations, show that AAF performs better than
DAF in terms of Bit Error Rate (BER) without the introduction of error
correcting code. Another finding reveals that the relative distances between the
relay and the stations affect the performance of BER. The unique of this work
is, presented different combining methods with different distance channels
between users, distention and relay using different modulation technique. The
best performance is achieved when the relay is located in the middle between the
source and destination. Finally, the combination of FRC and BPSK shows the best
BER performance for SNR up to 20 dB. |
Keywords: |
Cooperative, Relay, Diversity Protocols, Combining Methods, Fading, Path Loss. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
A SURVEY OF CONGESTION DETECTION AND AVOIDANCE TECHNIQUES FOR TCP CONGESTION
CONTROL |
Author: |
LEE CHIN KHO, XAVIER DÉFAGO, YASUO TAN, YUTO LIM |
Abstract: |
With the emergence of novel network applications, the non-stop growing traffic
is starting to experience unexpected scenarios of network congestion. This paper
comprehensively reviews congestion control techniques of the mostly used TCP
variants. Those variants have been developed over a period of three decades. New
classifications are made for those variants based on device entity,
characteristic, and association. The survey also describes the parameters that
are used in each variant and how the parameters are used to update of TCP
congestion window size. Furthermore, congestion detection and avoidance
techniques that are implemented in those variants are also investigated and
classified. Among the contribution of this survey, the majority of variants
studied here were found to be sender-centric. |
Keywords: |
TCP, Congestion Control, Congestion Detection, Congestion Avoidance, Device
Entity |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
STEGANOGRAPHY USING PIXEL VALUE DIFFERENCING SPIRAL |
Author: |
AFAN GALIH SALMAN, ROJALI, VIVI |
Abstract: |
The Further progessive technology make information exchange can be easily
accessed by the unauthorized person. Threrefore the method of steganography is
made for hiding information in some medium in such a way that the medium
seemingly is not contained a piece of information when it seen by human eyes.
One of the steganography methods is Pixel Value Differencing (PVD). PVD is
inserting message byte into the difference in bytes of the applied medium. This
steganography use the modified PVD with some modification. The modification will
be carried out on the pixel pick up pattern using spiral pattern to form pixel
pair. It will make the message extraction become more difficult. Based on Peak
Signal to Noise Ratio(PSNR) and Mean Square Error (MSE) calculation, The results
of this study and survey show that using method of Spiral PVD, the quality of
the produced image is relatively good.The image before and after message
insertion process has relatively same quality. It is clearly evident in the
image of “Ungu Cahaya” based on survey as well as MSE and PSNR calculation is
proved that it has good quality after message insertion. |
Keywords: |
Steganography Methods, Pixel Value Differencing (PVD), Pixel Pick Up Pattern |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
BUILDING A SYSTEM WITH NO SQL APPROACH (CASE STUDY: ENGLISH WRITING APPLICATION) |
Author: |
Tanty Oktavia , Surya Sujarwo |
Abstract: |
As the complexity of business process, the need for implementing information
systems also grows. A number of companies have built sophisticated system to
fulfill operational. To maximize the benefit of the system, the data has to be
stored in database for long time period so it can be used for analysis in the
future. There are many models Database Management System (DBMS) architecture
that can be applied, one of them are NoSQL architecture. NoSQL and relational
model are two models that are very different. Relational model concept store
data in the table, which consists of column and row. Each table interconnected
by using foreign key (FK) which is an attribute. When the developer wants to
consolidate data from all existing table, then the developer must combine a
table with another table, through a foreign key that has defined in the first
time, so it can certainly be combined data. Nowadays it’s often be problem for a
developer, given the massive data growth, with a fairly high degree of
scalability that will be very difficult for a developer to provide the required
data in a short time. Therefore, NoSQL approach comes as a solution. In NoSQL,
data will be stored in the form of documents and data integration will be done
using programming language format. Each document can be likened to a programming
language object that can be used in applications that are built. So that access
to the data can be done efficiently and effectively despite the huge amount of
data. In this research focuses on implementation NoSQL in English Writing
Application based on JavaScript Platform. |
Keywords: |
Data, Nosql, Document, English Writing, JSP |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
ASSET MANAGEMENT SYSTEM FOR COMPUTER LABORATORY |
Author: |
TANTY OKTAVIA , RICHARD , ALBERT WONGSO |
Abstract: |
Asset has a very important role and significant value to support operational
business. Although a number of organization prefer to use outsourcing and
leasing services to manage the asset, but some organization prefer to buy their
own and manage their assets. Currently maintaining asset is not an easy task,
organization need to be considered about how to use the asset effectively.
Information System can help the organization to manage assets, maintenance and
repair of assets, calculate asset depreciation, and asset reallocation among
divisions in organization. Information System as a media becomes very important
to help the management of assets to be more coordinated. Laboratory ABC as part
of the computer laboratory at university in Jakarta, is currently had many
problems about asset management because there are a lot of devices to be
maintained. The assets in computer laboratory are consists of hardware,
software, and many other supporting devices. Based on these problems, the
research is perform to analysis the process in asset management as well as to
formulate and implement a framework of information system that suitable with the
management of existing assets in laboratory ABC, so all data can be managed with
the system. The method for this research is based on object-oriented analysis
and design. The result of this research is an asset management system to support
operational laboratory ABC process. |
Keywords: |
Information System, Laboratory, Asset Management |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
X-TRACT RECODING ALGORITHM FOR MINIMAL HAMMING WEIGHT DIGIT SET CONVERSION |
Author: |
MIZA MUMTAZ AHMAD, SHARIFAH MD YASIN, RAMLAN MAHMOD, MOHAMAD AFENDEE MOHAMED |
Abstract: |
Scalar multiplication is the most computational intensive operation in elliptic
curve cryptosystem (ECC). Improving the performance of this operation can be
achieved by using recoding technique which aims at minimizing the density of
nonzero digits in the scalar, also known as its Hamming weight. We proposed
X-Tract recoding technique that alters the representation of scalar from binary
digit to {-1,0,1,3} digit set in non-adjacent form (NAF). The recoding algorithm
can be expressed both mathematically and logically and reduces the Hamming
weight of the scalar to 41% in average for 163-bit scalar with balanced bit.
X-Tract Recoding algorithm reads every three adjacent bits overlapped by one bit
from left-to-right in the input binary scalar to produce each new output digit.
We use ANOVA analysis to show that the new recoding technique produces
significantly better output with less Hamming weight compared to its
counterparts. |
Keywords: |
Elliptic Curve Cryptosystem, Scalar Multiplication, Recoding, Hamming Weight,
Non-Adjacent Form |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
Title: |
USER’S AWARENESS SURVEY ON 1CITIZEN PROGRAM IN UNIVERSITI SAINS ISLAM MALAYSIA (USIM) |
Author: |
SHAHARUDIN ISMAIL, ZUL HILMI ABDULLAH, NAJWA HAYAATI MOHD ALWI, MOHD ZALISHAM
JALI |
Abstract: |
The Malaysia government educates the digital etiquette among teenagers,
especially the tertiary education, through a special awareness training program
named 1CITIZEN Program. The main objective of the program is to foster national
unity via appropriate use of technology. It inspires Netizen to become critical
thinkers that understand the ethical consequences of online behavior. Universiti
Sains Islam Malaysia (USIM) conducted two survey research – pre and post
training sessions - among the participants of the 1CITIZEN Program of the
Faculty of Science and Technology, in order to know their level of knowledge
related to digital etiquette. This paper discusses the results of the survey
research related to the topic of information security. Overall, the findings
indicated higher percentage of the participants have either “Knowledgeable and
able to clarify well” or “Competent and can put to practice fully” about the
related topics in information security after attending the training program,
means the participants have better knowledge of the information security
compared to their previous knowledge. |
Keywords: |
Digital Etiquette, 1CITIZEN, Netizen, Information Security, Digital
Certification. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2015 -- Vol. 75. No. 1 -- 2015 |
Full
Text |
|
|
|