|                                                                                 
                                                             
                                                  
                                                                     
          
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
        
 
 
July  2017 | Vol. 95  No.13  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
COMPARISON OF JAMMING EXCISION METHODS FOR DIRECT SEQUENCE/SPREAD SPECTRUM 
(DS/SS) MODULATED SIGNAL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GIAN CARLO CARDARILLI, LUCA DI NUNZIO, ROCCO FAZZOLARI, AMIRHOSSEIN 
FEREIDOUNTABAR, FILIPPO GIULIANI, MARCO RE, LORENZO SIMONE |  
|  			
									
Abstract: | 
 			
									
Direct Sequence/Spread-Spectrum (DSSS) signals are characterized by a wide 
bandwidth and a low-power spectral density. These characteristics make them very 
robust with respect to the jamming.  
The Jamming represents one of the main concerns for secure communication and 
communication in a crowded spectrum. When the jamming to signal power ratio is 
greater than the Process Gain, even the use of DSSS signals requires the 
introduction of mitigation techniques.  
Common anti-jamming systems are based on adaptive filters. However, this 
solution presents several disadvantages, as the inefficiency to mitigate 
multi-tone jamming and nonstationary jamming. 
For these reasons, great interest is toward the development of anti-jamming 
systems based on different techniques as the Wavelet Transform and the Filters 
bank. 
This paper has two objectives. The first one regards the evaluation of the 
parameter choice on the jamming excision performance. The second objective is to 
compare the performance obtainable by the two above techniques. 
Experiments for parameter evaluation and performance comparison are carried out 
using MATLAB simulations. These simulations were performed using the most common 
jamming types. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Jamming Excision; Wavelet Packet Decomposition; DSSS; DWT; Polyphase Filters 
Bank |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPROVING DIAGNOSIS OF DIABETES MELLITUS USING COMBINATION OF PREPROCESSING 
TECHNIQUES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
RAZIEH ASGARNEZHAD, MARYAM SHEKOFTEH, FARSAD ZAMANI BOROUJENI |  
|  			
									
Abstract: | 
 			
									
Diabetes mellitus is one of the most common diseases among people of all age 
groups, affecting children, adolescents and young adults. There is an increasing 
interest in using machine learning techniques to diagnose these chronic 
diseases. However, the poor quality of most medical data sets inhibits 
construction of efficient models for prediction of diabetes mellitus. Without 
efficient preprocessing methods, dealing with these kinds of data sets leads to 
unreliable results. This paper presents an efficient preprocessing technique 
including a combination of missing value replacement and attribute subset 
selection methods on a well-known diabetes mellitus data set. The results show 
that the proposed technique can improve the performance of applied classifier 
and outperforms the traditional methods in terms of accuracy and precision in 
diabetes mellitus prediction. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Data Mining, Preprocessing Techniques, Diabetes mellitus. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AUTHENTICATION GROUPS WITH PRIVACY-PROTECTION OF MACHINE-TO- MACHINE IN LTE/LTE-A 
NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HAQI KHALID, KWEH YEAH LUN, MOHAMED OTHMAN, IDAWATY AHMAD  |  
|  			
									
Abstract: | 
 			
									
Machine-type Communication (MTC) is a form of data communication which involves 
one or more entities that do not necessarily need human interaction, which has 
become the hotspot in industry area. Furthermore, Machine-Type Communication (MTC) 
has shown the advantages, including better coverage and lower network deployment 
cost, which makes it become the hotspot in industry area. However, the current 
cellular network is designed for human-to-human communication (H2H), and less 
optimal for machine-to-machine, machine-to- human or human-to-machine 
applications. In addition, current cellular network is less optimal for MTC 
applications, and now facing some urgent issues, e.g. congestion and overload 
caused by the access of masses of MTC devices. This paper shows the techniques 
that used in MTC for LTE/LTE-A networks to enhance the authentication protocols 
with reduce signaling overhead and computational cost. Furthermore, this work 
discussed the problems that causing signaling overload in the core network 
especially, when a group of MTCD try to get authenticate to the system at the 
same time. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Machine-Type-Communication, Authentication Groups, Privacy-Preserving, Signaling 
Congestion, LTE/LTE-Advanced Networks. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
LOCAL LINE BINARY PATTERN AND FUZZY K-NN FOR PALM VEIN RECOGNITION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
KHADIJAH FAHMI HAYATI HOLLE, JAYANTI YUSMAH SARI, YUWANDA PURNAMASARI PASRUN |  
|  			
									
Abstract: | 
 			
									
Recently, palm vein recognition has been studied to overcome the problem in 
terms of convenience and performance of conventional systems in biometrics 
technologies such as fingerprint, palm print, face, and iris recognitions. 
However, palm vein images that are used in palm vein recognition systems are not 
always clear but sometimes can show irregular shadings and highly saturated 
regions that can slow the processing time. To overcome this problem, we propose 
palm vein recognition system using Local Line Binary Pattern (LLBP) method that 
was reliable against irregular shadings and highly saturated regions. LLBP is a 
texture descriptor based on the gray level comparison of a neighborhood of 
pixels. Proposed method have been conducted in three major steps: preprocessing 
that includes Region of Interest (ROI) detection, image resizing, noise removal 
and image enhancement, feature extraction using LLBP method, and matching using 
Fuzzy k-NN classifier. We use CASIA Multi-Spectral Image Database as dataset to 
examine proposed method. Experimental results show that the proposed method 
using LLBP has a good performance with 93.2% recognition accuracy. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Fuzzy K-NN, LLBP, Local Line Binary Pattern, palm vein |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SAMIRA SARVARI, NOR FAZLIDA MOHD SANI, ZURINA MOHD HANAPI, MOHD TAUFIK ABDULLAH |  
|  			
									
Abstract: | 
 			
									
Wireless Local Area Networks (WLAN) was once a single network solution. Yet now, 
it contributes to all part of business and computer industry. Thus, WLAN 
security measures need special attention. In order to identify WLAN networks’ 
vulnerability, some intrusion detection systems, architecture, and potential 
threats in the literature of this area is investigated. This approach is to 
categorize present wireless intrusion detection system (IDS) and detection 
technique. Several advantageous and drawbacks are presented and an in-depth 
critical literature review is presented. Different WLAN attack types and review 
some metrics in relation to operability and performance of IDS is summarized and 
extensively argued which can be conducted through integrating both practitioners 
and scholars. The future research areas are also discussed. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Wireless Local Area Networks (WLAN), Intrusion Detection System (IDS), Network 
topology, Ad-hoc Network, Network attack  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
GENE BASED MULTIVARIATE BIOMETRIC USER ACCESS CONTROL AND AUTHENTICATION FOR 
SOCIAL NETWORKS COMMUNICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JAYANTHI SIVASUBRAMANIAM, Dr. C. CHANDRASEKAR |  
|  			
									
Abstract: | 
 			
									
Using multimodal biometrics for effective management of user authentication in 
online social networks (OSNs) is currently of practical interest. Considerable 
efforts is said to have taken in this field. However, multi-modal biometrics 
user authentication provides additional information to enhance the secured and 
reliable user communication compared to that of traditional cryptographic key 
authentication in social network. In this work, biometric user authentication 
scheme with multi-modalities (i.e., types of biometric data) for secured and 
reliable social network communication, called Multivariate Biometric User Access 
Control and Authentication (MBUAC-A) scheme is presented. User biometric feature 
template is extracted from corresponding human individuals and stored in spatial 
vectors. Gene encoding is applied on user biometric feature template to form an 
access control strategy. User biometric keys are generated for corresponding 
gene encoded user biometric feature templates. Authentication of user access is 
done based on the user biometric keys. Finally, the authenticity of user access 
is checked and ensured by gene decoding of corresponding user biometric keys. 
The experimental evaluation of proposal work is conducted with parameters such 
capacity of biometric feature template, user access control time, number of 
users, gene encode/decode latency, and access control accuracy. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Multimodal Biometrics, Online Social Networks, Multivariate, Access Control, 
Authentication, Gene Encoding/Decoding |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A COMPARISON OF PID AND LQR CONTROLLERS FOR POSITION TRACKING AND VIBRATION 
SUPPRESSION OF FLEXIBLE LINK MANIPULATOR |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
E. A. ALANDOLI, M.Z.A. RASHID, MARIZAN SULAIMAN |  
|  			
									
Abstract: | 
 			
									
This paper presents PID controller versus LQR controller approach to suppress 
the vibrations of flexible link manipulator. The PID controller is design using 
Ziegler Nichols method and tuned for obtaining the best controller gains, the 
LQR controller utilizes four different controller gains to control the flexible 
link manipulator and suppress the vibrations. Simulation results are simulated 
using MATLAB/Simulink software. The simulation results depict that vibration of 
the flexible link manipulator can be suppressed and stable. LQR controller is 
better that the PID controller in terms of performance and reducing the 
vibrations of the flexible link manipulator as well.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Flexible Link Manipulator, PID Controller, LQR Controller, Vibrations 
Suppression |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DEVELOPING A WEB-BASED ADVISOR EXPERT SYSTEM FOR GREEN TRANSPORTATION SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HASSAN M ABDELSALAM, MUHAMMAD NAZRI BORHAN, ABDALRHMAN MILAD, HAMZA 
IMHIMMED,RIZA ATIQ OK RAHMAT |  
|  			
									
Abstract: | 
 			
									
Considering the sustained and pervasive popularity of the private vehicle not 
only in Malaysia National University (UKM) but in most of Malaysian 
Universities, what makes people prefer to use a Bicycle rather than car or 
public transport? What will facilitate the use the bicycle paths to the 
promotion of more sustainable behavior and the achievement of the green 
transportation targets? In this paper, a web-based advisory expert system for 
the purpose of applying Geometric Design of bicycle paths on residential streets 
is described because of their currently a weakness in the educational outcomes 
and structured framework for the implementation of such strategies . Developing 
an expert system can assist and advise engineers for dealing with geometric 
design problems. This expert system is developed to fill the gap between the 
sustainable urban design experts and people who seek to employ Geometric Design 
of bicycle paths including decision makers, engineers, and students. The system 
has more than six main functions including classifying, bicycle paths width, 
Separation from road way, Horizontal alignment, sight distance, and grades 
design .Verifying, validating processes, and comparing the system with similar 
works have shown that the system is consistent and acceptable for practical 
uses. In order to build the expert system, examining sources related to bicycle 
sharing path studies as well as interviewing with domain experts have been 
carried out. The system includes rules and images for different types of 
measures finally, some recommendations for improving the system are presented. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Expert System; Green Transportation System  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MODIFIED VIRTUAL FORCE METHOD FOR MOBILE ROBOT NAVIGATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MENDILI MANEL, BOUANI FAOUZI |  
|  			
									
Abstract: | 
 			
									
This paper deals with the problem of target tracking of two wheeled mobile 
robots with obstacle avoidance. The model predictive control approach and the 
virtual force method are used to compute the control sequence applied to the 
mobile robot. The force is proportional with the distance between the robot and 
the obstacle. Simulations are performed and their results are provided to show 
the effectiveness of the proposed method. This paper improves the formulae of 
force computing in the virtual force method to avoid the obstacles. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Two Wheeled Mobile Robot, Predictive Control, Obstacle Avoidance, Virtual Force |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A PROPOSED DYNAMIC ALGORITHM FOR ASSOCIATION RULES MINING IN BIG DATA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ANAS HANI AL-DAHER, MOHAMMAD SHKOUKANI  |  
|  			
									
Abstract: | 
 			
									
Because of the explosive growth of data that we are suffocating in, while we are 
starving for knowledge, mining data and information from substantial databases 
has been perceived as a key research topic. So, Due to the huge size of data 
that exists in the databases and warehouses and because these data are big, 
dynamic and change frequently it is difficult and expensive to do mining for 
frequent patterns and association rule from scratch. In light of such an 
interest, this paper proposes a Dynamic Algorithm for Association Rules Mining 
in Big Data that is capable of finding frequent item-sets dynamically and 
generating association rules from the item-sets by using accumulated knowledge 
stored in a database table, this table will be modified frequently when the 
system runs every time and the new value of the table will be the result of 
processing new inserted data added to the results of previously processed data. 
The proposed solution is implemented using C#.net and SQL server. The results 
compared with the Apriori algorithm. It was conclude that Apriori algorithm 
showed better results than the proposed algorithm in the initial runs, on the 
other hand the proposed dynamic algorithm provided results near to Apriori 
algorithm on frequent runs that use small number of transactions but the 
proposed dynamic algorithm took less processing time than Apriori algorithm by 
63.95% on the frequent runs that use big number of transactions. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Big data, Apriori algorithm, Association rules, Data mining |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FPGA IMPLEMENTATION OF HIGH SPEED MEDICAL IMAGE SEGMENTATION USING GENETIC 
ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
Mrs. MANNE PRAVEENA, Dr. NARAYANAM BALAJI, Dr. CHALLA DHANUNJAYA NAIDU |  
|  			
									
Abstract: | 
 			
									
Nowadays, image analysis plays a key role in processing of the medical images 
such as retinal image, cardiac image and brain MRI images in bio-medical field. 
Medical Image Segmentation (MIS) is a process of obtaining the different 
intensity levels of the image and extracting the features for analysis. Some of 
the existing algorithms are capable of extracting a section of image but not 
able to find an optimum threshold for image segmentation. So, a novel image 
segmentation algorithm with different thresholds is based on Genetic Algorithm 
(GA) on Field Programmable Gate Array (FPGA) has been introduced in this paper. 
Here the optimum threshold values are used to segment the same image as well as 
similar kind of images, which is obtained from same kind of biomedical imaging 
instruments. The proposed FPGA architecture for image segmentation is time as 
well as power efficient algorithm. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Segmentation process, Genetic Algorithm, Field Programmable Gate Array. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
HYBRID CLASSIFICATION APPROACH HDLMM FOR LEARNING DISABILITY PREDICTION IN 
SCHOOL GOING CHILDREN USING DATA MINING TECHNIQUE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MARGARET MARY. T, HANUMANTHAPPA. M |  
|  			
									
Abstract: | 
 			
									
Learning Disability is a disorder of neurological condition which causes 
deficiency in child’s brain activities such as reading, speaking and many other 
tasks. According to the World Health Organization (WHO), 15% of the children get 
affected by the learning disability. Efficient prediction and accurate 
classification is the crucial task for researchers for early detection of 
learning disability. In this work, our main aim to develop a model for learning 
disability prediction and classification with the help of soft computing 
technique. To improve the performance of the prediction and classification we 
propose a hybrid approach for feature reduction and classification. Proposed 
approach is divided into three main stages: (i) data pre-processing (ii) feature 
selection and reduction and (iii) Classification. In this approach, 
pre-processing, feature selection and reduction is carried out by measuring of 
confidence with adaptive genetic algorithm. Prediction and classification is 
carried out by using Deep Learner Neural network and Markov Model. Genetic 
algorithm is used for data preprocessing to achieve the feature reduction and 
confidence measurement. The system is implemented using MatLab 2013b. Result 
analysis shows that the proposed approach is capable to predict the learning 
disability effectively. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Learning Disability, Missing Value, Genetic Algorithm, Markov Model and Deep 
Learner, Hybrid Classification |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MODEL OF A BLANK FORM FOR COMPUTER LABORATORY WORK ON RESEARCH OF THE SPEED 
SELECTOR |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NURILA SAIDULLAYEVA, ROZA SPABEKOVA, GAUKHAR OMASHOVA, KENZHAN KABYLBEKOV, 
NURLIBEK TAGAYEV, ALIYA BITEMIROVA, MERUYERT AIMAMBETOVNA BERDIYEVA |  
|  			
									
Abstract: | 
 			
									
This paper presents the model of a black form for the organization of computer 
laboratory work on studying the speed selector that provides short theoretical 
data, tasks with the subsequent computer check, ambiguous tasks, research and 
creative assignments. Students may not complete them all, and the teacher may 
combine them or offer other similar tasks taking into account the ability of 
each student. This model was tested by pupils of Shymkent schools: Nazarbayev 
Intellectual School of Physics and Mathematics, the regional school "Daryn" for 
gifted children, M. Auezov Gymnasium-School in Arys and by first-year students 
enrolled in the specialty "Physics" during laboratory classes. According to the 
questionnaires of students, teachers and parents, almost all the respondents 
noted the effectiveness of teaching: such lessons are held with great interest 
of students and increased motivation for learning. This model helps to realize 
an individual approach to each student as well as promotes the development of 
experimental skills, research and creative abilities, critical thinking skills 
and adaptive competence, deep mastering of the topic, the effective use of 
information and computer technology. At the same time, such assignments as 
solving ambiguous tasks and tasks with missing data contribute to the 
development of an informal approach to the problem of theoretical competence. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Blank Form Model, Computer Laboratory Work, Mass Spectrometer, Speed Selector, 
Research And Creative Tasks, Electric Field Intensity, Magnetic Field Induction, 
Electron, Proton, Helium And Uranium Kernels.  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
KALMAN STABILIZATION UNDER CHANNEL DIVERSITY IN MIMO-OFDM SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
G. RAJENDER, Dr. T. ANILKUMAR, Dr. K. SRINIVASA RAO |  
|  			
									
Abstract: | 
 			
									
Signal estimation and its performance has always remained a challenge for 
wireless communication society. New methods to consider channel diversity and 
spectrum usage were proposed in past. This paper present a new approach to 
interference controlling, With a proposal for control of resources, to achieve 
the goal of increasing performance in the allocation system, using the 
interference conditions. Approach to control overlap in the framework of 
coordination and indiscriminate accessing for multiple users communication is 
proposed. The proposed approach develops a correlation method for resource 
allocation in on a multi path interference condition for faded channel condition 
based on the space frequency and non-stationary domain estimation.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Kalman stabilization, MIMO-OFDM, channel diversity.  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
APPLICATION OF FUZZY LOGIC FOR EVALUATION OF RESILIENT MODULUS PERFORMANCE OF 
STONE MASTIC ASPHALT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HAMID SHIRMOHAMMADI , FARHAD HADADI |  
|  			
									
Abstract: | 
 			
									
Stone Mastic Asphalt (SMA) is a popular used asphalt on the main roads under 
heavy traffics. Due to its highly permanent age, excellent performance 
characteristics, road authorities, especially in European countries have 
selected it in arterial roads for pavements. But, some unexpected conditions 
might make the SMA improper, mainly because of the lack of enough evaluations. 
Another thing that should be examined is about the uncertain assessments of SMA 
performance. Uncertainty in engineering problems will cause incorrect 
evaluation. In recent years, new methods for assessing and analyzing were 
applied which include computational and artificial intelligence systems such as 
Artificial Neural Networks (ANN) and Fuzzy Logic (FL) in various engineering 
fields. The aim of this study focuses on the application of fuzzy logic for the 
assessment of Stone Mastic Asphalt (SMA) performance characteristic which is 
known as resilient module. It is evaluated under Stone Mastic Asphalt effective 
characteristics that are considered as air voids, bulk density, and permeability 
coefficient. In this study, standards for stone mastic asphalt have been 
gathered from the German and Australian tests. In the beginning, Fuzzy logic 
uses weighted average operations to enter input data, then the output will come 
into assessment by a mathematical model. Finally, results indicate as air void 
contents (%) increase, resilient modulus (Mpa) significantly decreases. Although 
resilient modulus (Mpa) rises when bulk density (t/m 3) and permeability 
coefficient (cm/s) have a rise trend. Moreover, the experimental results show 
that Fuzzy logic can be applied to improve the accuracy of this evaluation. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Stone Mastic Asphalt, Performance Characteristic, Resilient Module, Fuzzy Logic |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENSURING AUTHENTICATION IN CLOUD COMPUTING THROUGH HOMOMORPHIC ENCRYPTION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUTI-UR RASOOL, SAMAN IFTIKHAR , TANZILA SABA3, JARALLAH SALEH AL-GHAMDI |  
|  			
									
Abstract: | 
 			
									
Cloud computing is a relatively new research domain and currently, emphasizes a 
lot over the whole daily tasks of life. It's significant ownership and 
utilization is supposed to enhance furthermore, making it an essential 
ingredient for the future. In this research, data security of cloud computing is 
aimed to find out exactly how these kinds of problems are resolved. The 
objective of this particular research is to avoid data contact from an 
unauthorized user, to recommend a sort of distributed scheme to offer safety of 
the information in the cloud. We believe as per experimental results that it 
could be accomplished by utilizing homomorphism encryption along RSA algorithm. 
Promising results are achieved that are comparable to the state of art. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Cloud computing, Homomorphic encryption, Cloud security, Cloud computing RSA |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A SPEECH-LANGUAGE THERAPY TOOL USING INTERACTIVE BOOK APP IN BAHASA MALAYSIA FOR 
SPECIAL NEEDS CHILDREN |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
BAO XIN GANG, SUHAILA ZAINUDIN, HASHERAH MOHD IBRAHIM, LAM MENG CHUN |  
|  			
									
Abstract: | 
 			
									
Interactive story books (ISB) mobile application is an app designed for children 
to practice their speech, language and literacy skills. ISB has the potential to 
be used to support education and learning for individuals with cognitive 
disabilities. These apps include visual and auditory artifacts that demonstrate 
language and can be an incredible aid for children with different kinds of 
speech-language symptoms. In the context of Malaysia, the development of ISB 
suffers from a lack of practical experience with children, especially for the 
children who have special needs in speech-language impairments. This research 
focused on Malaysian children with special needs and their parents. The ISB was 
developed using the Android platform. The ISB includes three parts: ISB, speech 
exercise and animated songs. There is a media player to record and play the 
children’s voices as a way for them to practice their pronunciation. There is 
also an embedded media player to control the videos to stop or play. The experts 
with experience in speech-language therapy are gathered to answer a survey about 
the evaluation on the app. After that, the parents and the children who have 
special needs are also gathered to answer another survey to get the evaluation 
on the app as well. These surveys are targeted for collecting the evaluation on 
the prototype of ISB (content and usability). Based on the result of the survey, 
the respondents (the experts, parents and children) have the qualifications to 
take part in the survey, the respondents agree with the content (pictures, 
music, color and quiz) of the ISB and the respondents also agree with the 
usability (usefulness, ease of use, ease of learning and satisfaction) of the 
ISB. Some respondents also give their ideas to improve the app. The main 
contribution of this study is the developed ISB for speech-language therapy that 
allows the therapy to be performed by the parents of the special needs children 
at home without the help of the Speech and Language Pathologists(SLPs). Other 
than that, the app is also developed by involving the experts, parents and 
children with special needs to ensure that the app fulfills the requirement for 
speech -language therapy.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Interactive Book App, Children, Bahasa Malaysia, Speech -language Therapy, 
Evaluation |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A NEW COMPUTATION METHOD FOR POINTING ACCURACY OF CASSEGRAIN ANTENNA IN 
SATELLITE COMMUNICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S.V. DEVIKA, KAILASH KARKI, SARAT K KOTAMRAJU, K. CH. SRI KAVYA, Md. ZIA UR 
RAHMAN |  
|  			
									
Abstract: | 
 			
									
The amount of pointing error (beam squint) plays a decisive role in maintaining 
high data link for satellite communication. Antenna pointing errors cause a 
decrease in gain as well as an increase in interference to neighboring 
satellites. Due to the restricted beam width in high gain antennas, precise 
pointing is needed. In this paper, the pointing error for 1.5m Cassegrain 
antenna (ground station antenna) is calculated with respect to its structural 
displacements (mainly Feed Displacement and Secondary Reflector Translation). 
Also, the impact of these structural deflections on antenna parameters such as 
peak gain, phase error, and sidelobe level is evaluated. The result shows that 
pointing error may rise up to 1.6 degrees for one-inch displacement of 
structures. Finally, 75% of gain loss is compensated by using movable feed and 
Subreflector. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Antenna Pointing, Cassegrain Antenna, Feed Displacement, Lateral Defocus, Axial 
Defocus, Phase Error. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EVALUATION OF BLENDED LEARNING PROCESS OF EXPERT SYSTEM COURSE PROGRAM BY USING 
CSE-UCLA MODEL BASED ON MOBILE TECHNOLOGY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DEWA GEDE HENDRA DIVAYANA, ANAK AGUNG ISTRI NGURAH MARHAENI, NYOMAN DANTES, IDA 
BAGUS PUTU ARNYANA, WARDANI RAHAYU |  
|  			
									
Abstract: | 
 			
									
The aim of this research was to know the implementation of CSE-UCLA evaluation 
model based on Mobile Technology and to know the evaluation result of blended 
learning implementation on expert system course program by implementing CSE-UCLA 
evaluation model based on mobile technology. Research method used in this study 
was development method with development design that was 4-D development model 
(Define, Design, Develop, and Disseminate). Research subjects who were involved 
in the initial trial were 4 people, they were: 2 informatics experts and 2 
education experts, while the subject of this research on trial usage was 10 
people, they were: 6 lecturers, 2 informatics experts, and 2 Educational 
experts. Data analysis technique used in this research was quantitative 
descriptive analysis technique. The results of this study indicated that the 
implementation of CSE-UCLA evaluation model based on Mobile Technology was 
realized in the design of model and evaluation application program which had 
been compiled well. The effectiveness level of the implementation for blended 
learning on expert system courses program at one private computer university in 
Bali by using CSE-UCLA evaluation model based on Mobile Technology was 88.15%, 
thus, it belong to good qualifications. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Evaluation, Blended Learning Process, CSE-UCLA, Mobile Technology. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RECOGNITION OF HANDWRITTEN TIFINAGH CHARACTERS USING GRADIENT DIRECTION FEATURES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LAHCEN NIHARMINE, BENACEUR OUTTAJ, AHMED AZOUAOUI |  
|  			
									
Abstract: | 
 			
									
Optical Character Recognition system goal is to convert handwritten characters 
input images to an editable text. Many OCR techniques have been developed by 
researchers for Latin and Arabic languages. Amazigh language still have few 
works in this area. This paper emphasizes a new methodology to recognize the 
Tifinagh characters using zoning gradient features with a high accuracy and 
recognition rate. The new methodology is based on gradient direction as features 
and artificial neural networks as a classifier. The novelty of the new proposed 
system is the high accuracy and the training time which is very small compared 
with other classifiers. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Tifinagh alphabet, Optical Character Recognition, Gradient Direction Features, 
Artificial Neural Networks. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE DECISION-MAKING MODEL REGARDING THE COMPLEXITY OF SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SIHAM ABDULMALIK MOHAMMED ALMASANI, VALERY IVANOVICH FINAEV, WADEEA AHMED ABDO 
QAID, ALEXANDER VLADIMIROVICH TYCHINSKY |  
|  			
									
Abstract: | 
 			
									
The article is devoted to the development of methods and decision-making models 
for assessing the complex system concept. The justification of the relevance of 
the complex system assessment problem to solve the simulation and system control 
problems. The system definition and the basic concepts of the systems 
classification are given. The analysis of the existing complex systems 
definitions is shown. The necessity of using the expert assessment of the system 
complexity is determined. The method of the system complexity assessment 
(determination) based on the experts knowledge is proposed. In this article the 
application of the classification model for decision-making regarding the 
complex system is shown. The example of the stock market complexity assessment 
is considered. |  
|  			
									
  										
			
Keywords:  | 
 			
									
System, Complexity, Assessment, Parameters, Simulation, Decision-making, 
Experts. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
REAL-TIME NUMERICAL 0-5 COUNTING BASED ON HAND-FINGER GESTURES RECOGNITION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABD ALBARY SULYMAN, ZEYAD T. SHAREF, KAMARAN HAMA ALI FARAJ3, ZAID AHMED 
ALJAWARYY, FAHAD LAYTH MALALLAH |  
|  			
									
Abstract: | 
 			
									
A well Pointing out by hand for originating some gestures is highly useful in 
terms of human computer interactions especially when mute people desire to speak 
something, here a difficulty is raised by delivering their message to the 
outside world. Therefore, these people can do easily some tasks by drawing a 
gesture in air using their hands in front of a computer camera which translates 
these gestures to a speech or text to be understood by other people. Part of 
hand gesture recognition is counting by hand. This paper proposes a new 
technique describing hand gesture numerals which are from 0 to 5 that are 
pointed out by people to be understood by a computer. The technique is 
implemented by reading a frame as an image then extracting only hand by using 
YCbCr colour space filter. Then, it is converting to black and white image. 
After that, number is assigned to a gesture by counting number of flip as white 
to black from left to right on an intelligently selected path to be scanned on. 
The experiment was conducted using 180 random hand gesture frames taken from 
random people, the result of this recognition rate is recorded as 98%. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Hand Gesture Recognition, Feature Extraction, Image Processing, Computer Vision, 
Data Science. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A TRIPARTITE PARTITE KEY ASSIGNMENT SCHEME FOR SECURITY OF CLOUD DATACLASSES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
Mr. P.DILEEP KUMAR REDDY, Dr. R. PRAVEEN SAM, Dr. C. SHOBA BINDU |  
|  			
									
Abstract: | 
 			
									
Class based cloud data security is more prominent today. Data of all the classes 
may not be that frequently accessed by the owner or the users. Data of high 
prioritized class is frequently accessed and the cloud technology seeks much 
secured parameters to raise the security of the high prioritized data. More over 
many of the old cloud technologies needed with user re-authentications when he 
is simultaneously accessing high class and low class data. This paper presents a 
new key generation and Class authentication scheme to run the security 
specifications of the prioritized data. This paper also presents a tri-partite 
authentication scheme. This scheme has found efficient in reducing the number of 
user re-authentications.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Cloud Technology, Prioritized Data, Re-Authentications, Tri-Partite |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPLEMENTING AN EFFICIENT EXPERT SYSTEM FOR SERVICES CENTER MANAGEMENT BY FUZZY 
LOGIC CONTROLLER |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MOHD KHANAPI ABD GHANI, MAZIN ABED MOHAMMED, MOHAMMED S. IBRAHIM, SALAMA A. 
MOSTAFA, DHEYAA AHMED IBRAHIM |  
|  			
									
Abstract: | 
 			
									
Expert System (ES) is considered to be the prominent reasoning practices which 
are commonly employed towards various application domains. Considering expert 
systems, human understanding regarding specific proficiency in accomplishing 
specific tasks could be signified as facts and rules towards their knowledge 
base, which finds and employs the data delivered by means of a manipulator. 
Reasoning procedure has been further employed towards the specified expertise by 
means of heuristic methods for formulating the elucidation. Mechanisms which 
employ knowledge based approaches are considered to be more candid when compared 
to other conservative approaches. Knowledge could be signified clearly towards 
knowledge base, thereby capable in alteration with comparative easiness, which 
commonly employs the concept of rules. Inference engines employ knowledge base 
subjects for solving specific problems based on user responses by means of 
interface (for instance, specify the situations needed for car assessment). This 
inference unit deeds with knowledge for applying this knowledge for specific 
problems. There are numerous approaches for control systems that are applied in 
all the major areas in industry. In all these approaches for controlling the 
systems, fuzzy has been deemed to be the best methodology, mainly because of its 
increased speed and cost-efficiency. For machine regulation, fuzzy logic is 
found to be vividly employed. This paper mainly focuses in designing the 
simulation model for fuzzy logic regulator in advising the supervisor of service 
center in maintaining definite delay in service towards acceptable limits to the 
customers by the usage of simulation package, the Fuzzy Logic Toolbox MATLAB 
Simulation tool. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Expert Systems, Artificial Intelligence, Services Center Management, Fuzzy 
Logics, Knowledge-Based Systems, Inference Engines. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EVALUATING THE ACCURACY OF USING CROSS DATASETS TO PREDICT NEW LOCAL HEART 
DISEASES CASES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AHMAD MOUSA ALTAMIMI, MOHAMMAD AZZEH |  
|  			
									
Abstract: | 
 			
									
Extracting hidden knowledge from healthcare datasets are quite important for the 
health sector. It is a common practice that health organizations often focus on 
their local data to build prediction model that can be used to predict and 
identify some popular diseases, heart diseases are no exception. The main 
challenge that faces health organizations around the world is how to generalize 
the prediction model on different cases collected from different places. It is 
well recognized that the health prediction models are built over data collected 
from a specific community, but there is a lack of confirmation if this model can 
be applied for data collected from different communities. In this paper we turn 
our attention to heart diseases problem. In this work, we empirically examine 
the prediction accuracy of different classification algorithms when different 
medical datasets are used for learning and testing. Specifically, three studies 
were developed to determine how successfully we can generalize a model that is 
built based on a dataset obtained from a health organization and then used to 
predict new cases from different one. In the first study we developed and tested 
classification models over each individual dataset, whereas in the second study 
we developed classification models over a dataset and tested using another 
dataset. In the last study, we made a merge between the employed datasets, then 
a classification model is built and tested over the merged dataset. Results from 
these studies confirm that using a classification model built from different 
dataset and used to predicted cases from another dataset is generally reasonable 
and accurate. They also confirm that merging heart disease datasets that have 
the same structure are useful for identifying potential cases.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Data Mining Classifiers, Prediction Model, Accuracy, Cross Datasets, E-Health  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th July 2017 -- Vol. 95. No. 13 -- 2017  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
 |     	 
 |