|                                                                                 
                                                             
                                                  
                                                                     
          
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
Journal of 
Theoretical and Applied Information Technology 
August 2018 | Vol. 96  
No.15  |  
 			
							
  			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FEATURE ANALYSIS OF PUBLIC COMPLAINT HANDLING APPLICATION USING FODA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AKHMAD SAEFUL BAKHRI, AHMAD NURUL FAJAR |  
|  			
									
Abstract: | 
 			
									
This study is to know the result of the comparison of functions in the main 
business process of Public Complaint Handling (PLM) based on Judicial Commission 
of Indonesia decree No. 4 2013 and Judicial Commission decree No. 2 2015 and to 
know Public Complaint Handling features using Feature-Oriented Domain Analysis 
(FODA). The data that used and processed from Public Complaint Handling business 
process observation, interpretation, documents, reports, and interview with 
users and experts. The data is processed by compared both functions in the main 
business process of Public Complaint Handling and perform feature analysis using 
FODA. The results of this study that the Judicial Commission simplify and refine 
the functions in the main business process of Public Complaint Handling based on 
Judicial Commission decree no. 2 2015. From the features analysis results there 
are 125 features with 86 mandatory features, 7 optional features, 17 features OR 
and 15 alternative features. This study as one of highly recommendation for 
Judicial Commission that FODA's approach will be more effective and efficiency 
in enhancing and developing applications from reusable features to be developed 
and new features to be built when there are regulatory changes and business 
process changes for the application of Public Complaint Handling. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Business Process, Feature Analysis, FODA |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
COMPOSITE MEDIAN WIENER FILTER BASED TECHNIQUE FOR IMAGE ENHANCEMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
KAYODE AKINLEKAN AKINTOYE,NOR ANITA FAIROS BINTI ISMIAL, NUR ZURAIFAH SYAZRAH 
BINTI OTHMAN, MOHD SHAFRY MOHD RAHIM, ABDUL HANAN ABDULLAH |  
|  			
									
Abstract: | 
 			
									
Image processing begins with image enhancement to improve the quality of the 
information existing in images for further processing. Noise is any unwanted 
object that affects the quality of original images. This always happened during 
the acquisition of images, which cause gaussian noise via photoelectric sensor. 
Also, impulse noise as well is introduced during transferring of some images 
from one place to another because of unstable network. Hence, these noises 
combine to form mixed noise in some images, which change the form and loss of 
information in the images. Filtering techniques are usually used in smoothing 
and sharpness of images, extraction the useful information and prepare an image 
for analysis processing. In this research, a novel technique of hybrid filter 
for enhancing images degraded by mixed noise has been exhibited. The proposed 
model of the novel filter uses the concept of two element composite filter. This 
technique improved the fusion of Median filter and Wiener filter to eliminate 
mixed form of noise from digital image created during image acquisition process. 
Composite Median Wiener(CMW) is not two filters in series, yet it can remove the 
blurredness, keep the image edges, and eliminate the mixed noise from the image. 
The result of CMW filter application on noisy image shows that it is an 
effective filter in enhancing the quality image. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Median Filter, Weiner Filter, Image Enhancement, CMW Filter, Peak 
Signal-to-Noise Ratio (PSNR) |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ON THE IMPACT OF REAL TIME PARAMETERS INTO THE DESIGN OF CLOUD LOAD BALANCERS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ALI HUSSEIN ALI ALNOOH, DHUHA BASHEER ABDULLAH |  
|  			
									
Abstract: | 
 			
									
The term "Cloud" has turned out to be universal in our life since it manages a 
large portion of our activities. Truth be told, cloud benefits are achieved in 
the vast majority of our social, scholastic, and business tasks. The 
technological era we are currently living in, is almost based on Internet 
services. A novel load balancer called Community-Based Cloud Load Balancing 
Approach (CBCLBA) for distributing tasks to their appropriate server is 
proposed. The main goal of this paper is to adopt a community based algorithm 
that takes into considerations tasks time constraints. Our proposed algorithm is 
implemented on a dataset that is brought from Google. The proposed algorithm 
shows that when considering two real time parameters, namely; Scheduling Class 
and Priority, the number of missed deadline tasks decreases comparing to the 
case when ignoring the two mentioned parameters. Finally, we believe that this 
is the first kind of work that utilizes concepts from sociology in designing 
cloud load balancing approaches. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Cloud Load Balancing, Cloud Computing Approaches, Google Clusters-usage traces, 
Real time |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE BALIANS: PROMOTING BALINESE TRADITIONAL ART EXHIBITION USING GEOGRAPHIC 
INFORMATION SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
I KETUT ADI PURNAWAN, I NYOMAN PIARSA, I PUTU AGA DARMA WINANDA |  
|  			
									
Abstract: | 
 			
									
Bali is a tourism destination which be famous by its nature, culture, art and 
artist. Many Balinese artists gathered together in an art studio and held some 
traditional art attraction or exhibition. However, they are lack of promotion. 
Advances of technology could help Balinese artist for promoting Balinese 
traditional attraction or exhibition. This research focused on the development 
of a geographical information system named “The Balians” (The Balinese-Art 
Entertainment Reservation). “The Balians” was an information system which 
provided a way for promoting Balinese traditional art exhibition and 
facilitating the tourist or local people who want to watch the exhibition. This 
geographical information system worked as a website service, which was developed 
using PHP as the programming language, MySQL database, and cloud computing SaaS. 
“The Balians” website was able to handle three entities, they were art studio as 
a place for the artist gathered together and also accommodating an exhibition, 
administrator who has authority for data verification, and the user -the tourist 
or local people- who wants to watch the held exhibition. There were three main 
features of “The Balians”, those were exhibition booking, event ticket 
reservation, and online payment for the booked exhibition or tickets. The 
success rates of “The Balians” as a reservation system and promotion media were 
measured by the Likert scale. The result of questionnaires which were used for 
measurement pointed out that 10 measurement variables were in Agree (A) and 
Strongly Agree (SA) categories. Those result meant that “The Balians” had run 
appropriately. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Geographic Information System, Tourism, Bali, Balinese Exhibition, The Balians |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
VIDEO COMPRESSION VIA MINIMUM FRAME DIFFERENCE LOCALIZATION ADAPTED FOR MOBILE 
COMMUNICATIONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
KHATTAB M. ALI ALHEETI |  
|  			
									
Abstract: | 
 			
									
Huge amount of multimedia data are circulated via communications media (wired 
and wireless), Internet, and many other media, so these data need to be 
compressed to achieve storage space and speed. Many method are used for image 
and video compression such as discrete cosine transform, discrete wavelet 
transform and discrete curvelet transform. Some of these methods are efficient 
and have wide range of applications. The aim of this paper is to implement an 
efficient approach of video compression based on frame difference localization. 
The implemented approach based on the mixing of two methods; firstly, calculate 
the difference between the two near frames to avoid the similarity and secondly, 
applying discrete wavelet transform to reduce the amount of similar pixels as 
possible. The implemented approach is tested for many types of image, in which a 
good performance results are obtained. This approach is adapted for mobile 
communications in order to save speed and space. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Image Compression, Video Compression, Frame Compression, Frame Extraction 
2D-DWT. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPROVE QUALITY OF E-LOYALTY IN ONLINE FOOD DELIVERY SERVICES : A CASE OF 
INDONESIA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ROMI ILHAM |  
|  			
									
Abstract: | 
 			
									
This study aims to improve e-loyalty by analyzing the effect of e-service 
quality on customer e-loyalty through e-satisfaction in online food service 
delivery. This research uses quantitative approach with survey method. The 
population in this study were customers who had used online food service with a 
sample of 320 respondents. Data analysis using SEM-PLS (Partial Least Square) 
with Smart-PLS software. The results showed that e-service quality positively 
affects e-loyalty and e-satisfaction, e-satisfaction has positive affect on 
customer e-loyalty and e-service quality positively affect e-loyalty of customer 
through e-satisfaction. It can be concluded that e-satisfaction mediates the 
influence of e-service quality on e-loyalty of online food service customers, so 
e-service quality and e-satisfaction is required to improve e-loyalty. |  
|  			
									
  										
			
Keywords:  | 
 			
									
E-Service Quality, E-Satisfaction, E-Loyalty, E-Commerce. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPLEMENTATION OF A REMOTE MONITORING SYSTEM FOR CONDITION-BASED MAINTENANCE 
USING WIRELESS SENSOR NETWORK: CASE STUDY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S. SADIKI, 1M. RAMADANY, M. FACCIO, D.AMEGOUZ, S. BOUTAHARI |  
|  			
									
Abstract: | 
 			
									
Increasing number of interconnected embedded "SMART" devices pervade our 
environments. Their use in various scenarios including smart-city, 
building-automation, industrial control, energy grids etc. have dramatically 
improved the overall performance. Use of IoT (sensors, actuators etc) and 
wireless sensor networks WSN) can help to sense and act based on real-time 
monitoring of industrial equipment. Our proposed architecture explores the 
advantages of embedding smart sensors on industrial equipment and collect data 
for monitoring and better maintenance. This real-time monitoring will enable 
predictive analysis for the health status of industrial equipment. To the best 
of our knowledge, this article is the first investigation of employing 
intelligent network sensors in case of remote maintenance applications that 
couple information technology solutions with condition-based maintenance. Tests 
are carried to prove the validity of our proposed system by using Contiki based 
Cooja emulator. Although the technique developed in this work is tuned toward 
this application, it could be used in other applications as well which deals 
with condition-based maintenance. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Condition Based Maintenance, Wireless Sensor Network, Decision Support Systems, 
Asset Management, Contiki-Cooja. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SOFTWARE TOOLS FOR CELL WALLS SEGMENTATION IN MICROPHOTOGRAPHY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GULZIRA BAKHITBEKOVNA ABDIKERIMOVA, FEODOR ALEXANDROVICH MURZIN, ALEKSEY 
LEONIDOVICH BYCHKOV, JAMALBEK TUSSUPOV, SERGEY KHAYRULIN, WEI XINYU, ELENA 
IVANOVNA RYBCHIKOVA |  
|  			
									
Abstract: | 
 			
									
This article provides an analysis of how textural areas are segmented on the 
microphotography in the image processing systems. A comparative description of 
the main methods is provided. The purpose of our research is to develop and find 
algorithms for analyzing the textural characteristic of images and the 
segmentation of textural features obtained using the transmission electron 
microscopy using software, established under Treaty No. 16-13-10200/2. Work has 
been done for the Institute of solid state chemistry and mechanochemistry of the 
Siberian branch of the Russian Academy of Sciences. The focus is on the 
development of software tools of choice and the creation of features that 
describe texture differences; of selection and segmentation of the textural 
areas; of classifying textural areas and identifying the texture object to 
analyze the above-named microphotographs. The question of the applicability of 
textural sets to analyse experimental data in order to identify in the 
microphotography the patterns that could be linked in the future to porousness, 
chemical reactiveness, etc. Suitable algorithms have been selected and 
appropriate software tools have been established at Matlab and in the software 
package for statistical analysis of Statistica. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Textural Features, K-Means Method, Agglomerative Method, Image Processing, 
R/S-Analysis, Microphotography Analysis, Electron Microscopy, Herbal Raw 
Material. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DESIGN RESTFUL WEB SERVICE OF NATIONAL POPULATION DATABASE FOR SUPPORTING 
E-HEALTH INTEROPERABILITY SERVICE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
M. MIFTAKUL AMIN, ADI SUTRISMAN, DERIS STIAWAN, ERMATITA, ANDINO MASELENO |  
|  			
									
Abstract: | 
 			
									
The Government of the Republic of Indonesia nowdays has implemented a 
centralized national population database with Electronic Identity Card (e-ID) as 
the sole reference to the legality and validity of data used for various public 
services. In line with the population database, the government has also run a 
National Health Insurance Program which also needs e-ID card data to obtain 
health services. When patients visit health service providers such as hospitals, 
health centers, medical centers, and health clinics, personal data is requested 
for registration by showing ID cards, so the presence of a national demographic 
database is not yet optimal. The presence of RESTful Web Service technology 
enables communication between different platform applications, so the 
demographic database can be accessed using a variety of different client 
applications, operating systems, programming languages, and databases. This 
study aims to design the national demographic database using RESTful Web 
Services, which can be implemented to support e-health services. E-ID data can 
be used by the health provider for patient registration and patient referral. 
The demographic database can be used as a reference for valid demographic data. 
The test that has been done shows that the performance of the system design 
developed, reliable to be implemented with the accuracy of the acquisition of 
data records of valid residence in accordance with the design of data 
structures. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Population Database, E-Id, Interoperability, Restful Web Services, E-Health |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE BAG-OF-WORDS VECTORS AND A SOKAL & SNEATH-IV COEFFICIENT USED FOR A K-MEANS 
ALGORITHM OF ENGLISH SENTIMENT CLASSIFICATION IN A PARALLEL SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DR.VO NGOC PHU, VO THI NGOC TRAN |  
|  			
									
Abstract: | 
 			
									
Many different researches have already been used for sentiment classification 
for many years because the sentiment lexicons have already had many significant 
contributions to everyday life, such as in political activities, commodity 
production, and commercial activities. We have proposed a novel model using many 
bag-of-words vectors (BOWV) and a SOKAL & SNEATH-IV Coefficient (SSIVC) for a 
K-Means algorithm (KM) to classify all the documents of the testing data set 
comprising 13,500,000 documents, the 6,750,000 positive and the 6,750,000 
negative , into either 2,500,000 positive sentences or 2,500,000 negative 
sentences of our training data set including 5,000,000 sentences in English. In 
this survey, the BOWVs are improved by using many sentiment lexicons of our 
basis English sentiment dictionary (bESD) by using the SSIVC through a Google 
search engine with AND operator and OR operator. One sentence in English is 
transferred into one BOWV. The KM is used in clustering one BOWV into either the 
positive BOWVs or the negative BOWVs of the training data set. The sentiment 
classification of one document is based on the results of the sentiment 
classification of its BOWVs. We have firstly tested the proposed model in a 
sequential environment, and then, the novel model has been tested in a 
distributed network system secondly. The results of the sequential system are 
not as good as that of the parallel environment. The accuracy of the testing 
data set has been achieved 88.76%. Many different fields can widely use the 
results of the novel model certainly. |  
|  			
									
  										
			
Keywords:  | 
 			
									
English sentiment classification; parallel system; Cloudera; Hadoop Map and 
Hadoop Reduce; K-Means algorithm; SOKAL & SNEATH-IV Coefficient  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPROVED WATER FLOW-LIKE ALGORITHM FOR CAPACITATED VEHICLE ROUTING PROBLEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MOKHTAR MASSOUD KERWAD, ZULAIHA ALI OTHMAN, SUHAILA ZAINUDIN |  
|  			
									
Abstract: | 
 			
									
The capacitated vehicle routing problem (CVRP) has many applications in 
different domains seeking ways to minimize the total traveled distance. Although 
the CVRP has been widely investigated in the literature, it is facing ongoing 
operational challenges. Moreover, despite various metaheuristics that have been 
proposed to solve this problem, its optimal solution is still not achieved. Thus 
far, the water-flow-like algorithm (WFA) has obtained a reasonable solution for 
this problem, with room for further improvement. The WFA has strategies for 
diversification (in the precipitation operation). This study aims to enhance the 
WFA for solving the CVRP by providing a good solution in terms of diversity and 
quality. The basic WFA is capable of solving the CVRP, however, it has problems 
in terms of slow convergence and the tendency of being trapped in the local 
optimum. Therefore, an improved WFA (IWFA) is proposed in this study to overcome 
this weakness by increasing the diversity of solution search in the 
precipitation operation using constructive heuristics (i.e., nearest neighbor, 
random method, and greedy randomized adaptive search procedure). Constructive 
heuristics aim to construct new solutions instead of duplicating existing ones. 
Computational results show that the IWFA outperforms the basic WFA with a 
solution quality improvement of up to 76.92% and is better than other 
state-of-the-art methods by up to 74.55%. This finding indicates that the IWFA 
is a promising approach for solving instances of CVRP. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Capacitated Vehicle Routing Problem, Metaheuristics, Constructive Heuristics, 
Water-Flow-Like Algorithm. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A CO-TRAINING MODEL USING A FUZZY C-MEANS ALGORITHM, A K-MEANS ALGORITHM AND THE 
SENTIMENT LEXICONS - BASED MULTI-DIMENSIONAL VECTORS OF AN OTSUKA COEFFICIENT 
FOR ENGLISH SENTIMENT CLASSIFICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DR.VO NGOC PHU, VO THI NGOC TRAN |  
|  			
									
Abstract: | 
 			
									
A semi-supervised learning of a machine learning used for a new model for big 
data sentiment classification has already been built in this survey. We have 
proposed a novel model using mainly a co-training (CT) approach to classify 
10,500,000 documents of our testing data set comprising the 5,250,000 positive 
and the 5,250,000 negative into 4,000 documents of our training data set 
including the 2,000 positive and the 2,000 negative in English. In this 
co-training model (CTM), a Fuzzy C-Means algorithm has been used in training a 
first classifier and a K-Means algorithm has been used in training a second 
classifier based on many multi-dimensional vectors of sentiment lexicons of An 
OTSUKA coefficient (OM).After training the first classifier and the second 
classifier of the CTM of each loop, the 50 documents of the testing data set 
have certainly been chosen from the first classifier, then, they have been added 
to the second classifier, and the 50 documents of the testing data set have 
certainly been chosen from the second classifier, then, they have been added to 
the first classifier. The sentiment classification of all the documents of the 
testing data set has been identified after many loops of training the first 
classifier and the second classifier of the CTM certainly. In this survey, we do 
not use any vector space modeling (VSM). We do not use any one-dimensional 
vectors according to both the VSM and the sentiment classification. The OM is 
used in creating the sentiment classification of our basis English sentiment 
dictionary (bESD) through a Google search engine with AND operator and OR 
operator. The novel model has firstly been performed in a sequential system and 
then, we have secondly implemented the proposed model in a parallel network 
environment.The results of the sequential environment are less than that in the 
distributed system.We have achieved 89.25% accuracy of the testing data set. The 
results of the proposed model can widely be used in many commercial applications 
and surveys of the sentiment classification. |  
|  			
									
  										
			
Keywords:  | 
 			
									
English sentiment classification; parallel system; Cloudera; Hadoop Map and 
Hadoop Reduce; Fuzzy C-Means; K-Means; OTSUKA coefficient; co-training.  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PERFORMANCE EVALUATION OF VARIOUS ON-CHIP TOPOLOGIES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
BANSIDHAR JOSHI, MANISH K THAKUR |  
|  			
									
Abstract: | 
 			
									
With shifting of the present world towards automation, computer intensive 
applications are gaining popularity in day-to-day life, resulting into demands 
for highly scalable and reliable Network-on-Chip (NoC) based architectures along 
with low power consumption. NoCs are an exertion to impoverish the approach of 
huge networking architectures and implement them with embedded System-on-Chip 
(SoC) sphere. In reliable NoC based architectures, efficiency of the system 
primarily depends upon the interconnected structure or topology. The topologies 
are critically analyzed on the basis of various performance factors like 
throughput, latency, scalability, cost of traversal etc. The availability of 
fixed sized buffer queues at intermediate routers in the interconnection network 
topology holds a tight constraint over managing the incoming data packets from 
neighboring routers. With the traffic being heterogeneous and 
application-centric, the overlay architecture must be chosen wisely to deal with 
possible congestion scenarios. This paper analyzes the relative conduct of 
topologies and their altered versions and evaluates the prime performance 
parameters, viz. throughput and latency under various buffers’ queue management 
schemes. Simulations (NS2) on two different nodes configuration, 16 cores and 64 
cores shows Torus and Mesh of Tree as the favorable topologies respectively 
under diversified traffic. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Network-on-Chip, System-on-Chip, Topology, Interconnection Network, off-chip, 
on-chip |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ONTOLOGY-BASED GENERATION OF RANDOM PATHS BETWEEN TWO POINTS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AHMAD TAYYAR, MOHAMMAD ALI H. ELJININI |  
|  			
									
Abstract: | 
 			
									
In the first part of our research, a novel computer algorithm has been proposed 
to generate random path between two points in space. Random path consists of 
finite number of randomly generated adjacent points that satisfy the condition: 
L(pipn) < L(pi-1pn). Where L(p1pn) is the length of the path between the two 
adjacent points p1 and pn. The algorithm has been coded and evaluated. 
Experiments showed that the randomly generated points were converged to the 
target point. The main importance of this method is the ability to generate 
paths between two points in real time, which cannot be predicted in advance. 
Points are generated, one at a time, where each point brings us closer to the 
target point. This contribution is applicable to many fields such as economics, 
engineering, robotics, computer science, military, and other fields of applied 
sciences.  In this part of our research work, we tackled the problem from 
different aspects. An ontology has been developed that describes the domain of 
discourse. The aim is two folds; firstly, to provide an optimized generation of 
best points that are closer to the target point. Secondly, to provide sharable, 
reusable ontological objects that can be deployed to other projects. The 
ontology is designed to guide the process of generating acceptable points based 
on some criteria described in the ontology. Adding intelligence to the process 
has provided us with a better solution, in comparison with our previous results. 
Ontologies have been engineered and reused in many research projects across the 
globe with success. Our contributed solution can attract many applications in 
the various fields of applied sciences. One implication of the utilization of 
ontologies is that it remains poorly exploited field, which may have an impact 
on the adoption of ontology-driven technologies outside the academic community. 
We underpinned our solution by the initiation of several case studies that have 
been designed using and extending our work, and progressing very well. Initial 
findings are very encouraging and leading to the applicability of the proposed 
solution to real life cases. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Ontology, Object-Oriented Paradigm, Random Paths, Mobile Robots, Graph Theory |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
HOME SURVEILLANCE SYSTEM DESIGN AND IMPLEMENTATION TOWARDS IOT ENVIRONMENT  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SAWSEN ABDULHADI MAHMOOD, ZAINAB KAREEM ABDULLAH |  
|  			
									
Abstract: | 
 			
									
A personal home surveillance system is a low cost technology based on internet 
of things technology (IOT) that makes it possible for users to monitor the 
events that is happening in their homes remotely. There are multiple challenges 
in home surveillance systems such as picture is unclear, oddity cannot be 
specified automatically, motion sensors limitations, in addition to high cost of 
storage space. The trend of this paper, is to design and achieve moving objects 
extraction based home surveillance system with low cost, functional, and 
suitable solution within IOT context. The communication process is achieved 
essentially using Rasberry-Pi microcontroller device which enables a streaming 
of real time video along with capturing a snapshot images. In addition, a 
modified approach for moving objects detection in video sequences is presented 
in this paper based on the results of motion detection approach. The key result 
of the proposed moving object detection is represented by retaining the moving 
parts only in the video sequences captured by Pi camera in order to decrease the 
duration time of video frames, storage space required, in addition to minimize 
the reviewing time of the recording video. Furthermore, a real time stream video 
can be viewed from any web browser or mobile platform in term of surveillance 
system. The moving parts extraction process is achieved using the statistical 
information of the sequence frames within a modified motion detection algorithm. 
To analyze and evaluate the proposed motion detection algorithm results, we have 
attended our own video dataset that compose of three video files with different 
motion situations. The experimental result of the proposed moving objects 
detection based home surveillance system outperforms a remote surveillance of 
home integrity with efficient availability, reliability and high rate detection 
of moving objects in the captured video sequences . |  
|  			
									
  										
			
Keywords:  | 
 			
									
Surveillance system, cloud server, motion detection, Internet of things, 
Background Model |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
NEW INFORMATION ECONOMIC (NIE) METHOD FOR INFORMATION TECHNOLOGY INVESTMENT 
ANALYSIS: BUSINESS STRATEGIC |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
EMAN MULYAMAN, ASTARI RETNOWARDHANI, RAZIV HERMAN DIPUTRA, DESITA MUSTIKANINGRUM |  
|  			
									
Abstract: | 
 			
									
Based on the development of technology, especially Information Technology and 
Information System, and coupled with the needs of application development system 
in the company, but only with the needs of the application used must be adjusted 
to the value of investments issued by the company, because not a small fee to 
spend as the value of the initial investment that must be issued. In this case 
XYZ Group has been using the application system in the company's work 
operations, the application is Nawakara Information System (NIS). However, in 
the use of NIS in the company is still constrained by inaccurate management 
data. Based on this, the company wants to improve the quality of service and 
improve the quality of performance between departments by analyzing existing 
systems, ranging from the value of investments that have been made to 
infrastructure and applications that have been done, New Information Economic 
(NIE) as the basis of analytical methodology used as a reference with the hope 
of getting the right solutions and decisions in the implementation. |  
|  			
									
  										
			
Keywords:  | 
 			
									
New Information Economic, Investment Information System And Technology, 
Inaccurate, Improve, Right Solutions. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DETECTING SYBIL ATTACKS USING HETEROGENEOUS TOPOLOGIES IN STATIC WIRELESS SENSOR 
NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SOHAIL ABBAS, MUHAMMAD HAQDAD, SALMA BEGUM, MUHAMMAD ZAHID KHAN |  
|  			
									
Abstract: | 
 			
									
Wireless Sensor Network (WSN) is composed of few to several hundred nodes that 
coordinate to perform a specific action. Data is propagated in multihop fashion 
from sources to sink(s). Security is an important issue in WSNs, especially when 
they are used to protect or monitor critical situations. The WSNs require a 
unique identity per node in order to function properly. However an attack called 
Sybil attack violates this one-to-one mapping of identity and node; hence, a 
Sybil attacker controls multiple identities on a single physical node. The Sybil 
attacks are serious threats to the correct functioning of WSNs. Thus, effective 
mechanisms for security of WSNs became vital. Various techniques have been 
proposed in the literature that use received signal strength in order to thwart 
and detect Sybil attacks. For coping with signal fluctuation and improved 
accuracy, the proposed techniques incorporate extra hardware, such as GPS or 
directional antennae, or communication overhead, such as periodic beacons and/or 
node collaboration. In this paper, we propose a detection mechanism for Sybil 
attacks without using the extra hardware or imposing overhead while trying to 
achieve the same level of detection accuracy. We start off by proposing a 
pre-planned nodes deployment strategy, as a first line of defence, to prevent 
these attacks. The resulted topology will be Sybil-free that will also help in 
improving the detection of these attacks. We also propose a signal strength 
based detection mechanism for the counteraction of these attacks in static WSNs. 
Our proposed technique does not require using any sort of extra hardware, like 
directional antennae or GPS. The simulation based evaluation of the scheme 
demonstrates good detection accuracy, i.e. high true positives with low or no 
false positives. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Sybil Attacks, Wireless Sensor Networks, Node Deployment, Ad-Hoc Network 
Security |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ADVISE-GIVING EXPERT SYSTEMS BASED ON ISLAMIC JURISPRUDENCE FOR TREATING DRUGS 
AND SUBSTANCE ABUSE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
RAHMAD KURNIAWAN, AKBARIZAN, KHAIRUNNAS JAMAL, AFRIZAL NUR, MOHD ZAKREE AHMAD 
NAZRI, DEBY KHOLILAH |  
|  			
									
Abstract: | 
 			
									
Indonesia is the most populous Muslim country, but yet drugs and substance abuse 
has not abated. Death penalty to punish drug traffickers does not stopping the 
statistics on drug-related death to rise. Thus, education about drugs abuse is 
an essential part of the war against drugs abuse. The daily loss of dozens of 
lives to drug addiction in Indonesia drew the attention of researchers on how 
artificial intelligence (AI) can be used as an educational tool to curb drug 
abuse among youngsters. In this paper, an advice-giving expert system is 
proposed as an online tool to educate users. The expert system explains and 
advises the users based on the Islamic Jurisprudence point of view. This 
research investigates the impact of using the Bayesian Network to the 
effectiveness of the expert system in giving the right advice based on the 
user's response or answer to the question asked by the system. Bayesian network 
is chosen to be used as the inference engine because it organised the graph 
theory and probability theory. The accuracy of the system is obtained by 
comparing the output which is the advice given by the system to a human expert 
in the Islamic Jurisprudence. Based on the 15 cases as a test, the developed 
expert system using Bayesian Network can diagnose the social problems 
accurately. Users were advised and explained with the right advice. The daily 
loss of dozens of lives to drug addiction in Indonesia drew the attention of 
researchers on how artificial intelligence (AI) can be used as an educational 
tool to curb drug abuse among youngsters. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Bayesian Network, Drugs, Expert System, Social Problem, Islamic Jurisprudence |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
COMPARATIVE ASSESSMENT OF EFFECTIVENESS AMONG CORPORATE INFORMATION SECURITY 
PROFILES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GEORGI N. TODOROV, MARINA V. VINOGRADOVA, GENNADII G. SOROKIN, ALEXANDER A. 
SHATSKY |  
|  			
									
Abstract: | 
 			
									
The article is reviewing available approaches that make it possible to solve the 
problem of effectiveness among information security systems. Ensuring 
information security has become an important element in an enterprise 
sustainable development. At the same time, there is an arising question of a 
proper assessment for an information security level and its indicators. With an 
example of enterprises from the same sector, the research shows that 
effectiveness of an information security profile is mostly the same. This makes 
it possible to use universal tools when companies design and establish 
information protection. In the review of literature, there is a discussion of 
identification issues of information risks and threats and a proposed 
comprehensive evaluation technique. Elaborating the approach, there is a further 
definition of maturity levels in IT infrastructure of business processes. 
Findings make it possible to conclude that management levels in corporate 
information security in the same sector are the same. Minor differences are in 
place because of size effects and various investment costs that a company has to 
establish the information security system. The analysis of results shows 
heterogeneous effectiveness in information security profiles among companies 
when their implement investment projects focused on modernization.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Information security, Construction sector, Security profile, Risks, Uncertainty. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A SURVEY: THE CURRENT TRENDS OF PRIVACY TECHNIQUES FOR PROTECTING THE LOCATION 
PRIVACY OF USERS IN LBS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDULLAH ALBELAIHY, JONATHAN CAZALAS, VIJEY THAYANANTHAN  |  
|  			
									
Abstract: | 
 			
									
With GPS-enabled devices and data connectivity now ubiquitous, Location Based 
Services (LBSs) have seemingly penetrated all aspects of our lives. While 
profoundly valuable, these services expose the user to a litany of privacy and 
security issues. LBS users must reveal their location, and at times other 
sensitive personal information, in order to effectively use the service and 
receive accurate results. This paper presents a survey of the current trends of 
privacy techniques employed in protecting the location privacy of users in LBSs. 
The paper further highlights the efficacy, or otherwise, of each technique 
discussed in this paper, with each technique having been evaluated based on 
accuracy, quality, efficiency, flexibility, location privacy, and query privacy. 
The outcome of this study is a taxonomy of current privacy and security 
techniques, which will assist researchers and developers as they look to further 
protect the sensitive information of their customer base. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Privacy, Bloom filter, LBS, Oblivious transfer, Dummy locations, Zero knowledge. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE BINARY BITS AND THE SENTIMENT LEXICONS BASED ON AN YULES SIGMA COEFFICIENT 
USED FOR SENTIMENT CLASSIFICATION IN ENGLISH |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DR.VO NGOC PHU, VO THI NGOC TRAN |  
|  			
									
Abstract: | 
 			
									
We have already surveyed many different approaches for sentiment classification 
to get higher accuracies, to shorten execution times, and to save a lot of 
storage spaces for many years because many significant contributions of the 
sentiment classification have widely been applied to everyday life, political 
activities, commodity production, and commercial activities. As known, many 
binary bits can help us save a lot of storage spaces. Therefore, we have 
proposed a novel model in this survey using the binary bits and many sentiment 
lexicons according to an Yule’s Sigma coefficient (YSC) to classify 9,000,000 
documents of our teting data set comprising the 4,500,000 positive and the 
4,500,000 negative into either the positive polarity or the negative polarity 
based on 5,000,000 sentences of our training data set including the 2,500,000 
positive and the 2,500,000 negative in English. We do not use any vector space 
modeling (VSM). In addition, we do not use any one-dimensional vectors. We also 
do not use any multi-dimensional vectors. We only use the binary bits and the 
sentiment values of the lexicons for the proposed model. We use many similarity 
measures of the YSC. One sentence is transferred into the binary bits (the 
binary bits string) according to the sentiment scores of the lexicons. All the 
positive sentences of training data set are transferred into all the positive 
binary bits strings of training data set, called the positive group and all the 
negative sentences of training data set are also transferred into all the 
negative binary bits strings of training data set, called the negative group. 
Based on many similarity measures by using the YSC, one sentence is clustered 
into either the positive group or the negative group. The sentiment 
classification of one document of the testing data set is identified according 
to the sentiment classification results of all the sentences of this document. 
The novel model has firstly been implemented in a sequential environment. Next, 
we have performed the proposed model in a parallel network environment secondly. 
The execution time of the distributed network system is faster than that of the 
sequential environment. There has been an accuracy 89.01% of the testing data 
set in this survey. The sentiment classification of many millions of the 
documents can be identified by using this novel model successfully. Many 
advantage results of our novel model can widely be applied to many different 
fields in many commercial applications and surveys of the sentiment 
classification. |  
|  			
									
  										
			
Keywords:  | 
 			
									
English sentiment classification; parallel system; Cloudera; Hadoop Map and 
Hadoop Reduce; binary bits; sentiment scores of lexicons; Yule’s Sigma 
coefficient.  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FACTORS INFLUENCING THE CITIZEN TRUST TO ADOPT E-GOVERNMENT SERVICES IN SAUDI 
ARABIA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HEND ALOUD, DR. YASSER IBRAHIM |  
|  			
									
Abstract: | 
 			
									
With the rise of secure websites and mobile applications, the phrase “take a 
number or wait in line” has become redundant in public services. The worldwide 
evolution of e-government services has simplified lives as more citizens avail 
of e-solutions. However, citizens’ adoption of e-government services rely on 
multiple factors, including user awareness and trust. Therefore, to understand 
the factors that influence trust in e-government services, an empirical study 
must be conducted. This paper examines the antecedents of trust in e-government 
services in Saudi citizens’ perceptions and investigates the means through which 
this trust influences the intention to use e-government services. The study 
analyzes a sample of 310 completed surveys that focus on trust-related metrics, 
such as trust in government, trust in technology, information quality, and 
privacy and security assurance. It also includes two constructs of the TAM model 
(perceived usefulness and perceived ease-of-use) to predict the intention to use 
e-government services. The study’s outcomes support the proposed research model, 
whereby all proposed variables significantly predicted intention to use 
e-government services. Furthermore, all proposed variables significantly 
predicted trust in e-government except the privacy and security assurance 
construct. |  
|  			
									
  										
			
Keywords:  | 
 			
									
E-government, Trust Antecedents Model, TAM, Intention To Use, Saudi Arabia, 
Empirical Study. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AUTOMATIC DATA MODELING TRANSFORMATION APPROACH OF NOSQL DOCUMENT AND COLUMN 
STORES TO RDF |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDELJALIL BOUMLIK, NASSIMA SOUSSI, MOHAMED BAHAJ |  
|  			
									
Abstract: | 
 			
									
In this paper, we have proposed a mapping system that makes heterogeneous NoSQL 
data available in common machine-readable format. In fact, we aim to virtualize 
the data stored in different NoSQL databases with a specific focus on document 
and column oriented databases types (considered as the most used ones) using 
Resource Description Framework (RDF) in order to contribute in the 
interoperability between applications that exchange data and process it as 
machine-understandable information, especially in the web application domain and 
offering more opportunities for novel services and applications that have such 
needs. In addition, our approach is very useful to carry out some operations 
that are not currently supported by NoSQL database systems, also to unify their 
heterogeneous data models. The proposed algorithms are based on a set of 
procedure and methods that we execute at each stage depend on the input file and 
as per the mapping rules that we already define. The obtained results via our 
application were encouraged and reflect exactly what has been expected and 
specified. |  
|  			
									
  										
			
Keywords:  | 
 			
									
NoSQL-to-RDF, Column-Oriented Database, Document-Oriented Database, Unified 
NoSQL Database, Interoperability |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MULTI PARAMETERS DISPATCH MODEL IN TAXI COLLABORATION SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
PURBA DARU KUSUMA |  
|  			
									
Abstract: | 
 			
									
Nowadays, conventional taxi business meets strong competition with the online 
taxi service. One of the problem is that in online taxi service that adopts 
sharing economy platform, public can join to be a driver easily as far as he 
owns the vehicle. So, there are large number of vehicles are in the online taxi 
service. This condition is different to the existing conventional taxi that is 
operated by private company and the vehicles are owned by the taxi company. Even 
the taxi company is a big corporate, it still cannot compete with the online 
taxi service. The answer is developing collaboration between taxi companies so 
that the service is operated by a single system. Unfortunately, creating 
collaboration system among taxi companies is not easy. It is because the number 
of fleets that are owned between companies is various. The other problem is that 
each company has its own pricing strategy. In this research, we propose the 
dispatch model for conventional taxi collaboration system. Parameters in this 
model are travel cost, pickup distance, vehicle’s idle time, and the fleet size. 
In this research, we propose three models. In the first model, order will be 
allocated to the vehicle that offers the lowest travel cost and has longest idle 
time. In the second model, order will be allocated to the vehicle that offers 
the lowest travel cost but the model does not guarantee that longer idle time 
vehicle will be preferred. In the third model, the order will be allocated to 
the vehicle that has the highest aggregate score of travel cost, pickup 
distance, idle time, and fleet size. Based on the simulation result, the first 
and the second models has advantage in offering the lowest travel cost while the 
third model has advantage in keeping pickup ratio at maximum level. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Dispatch system, Taxi, Collaboration, Simulation, Nearest Driver. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DIGITAL HADITH AUTHENTICATION: A LITERATURE REVIEW AND ANALYSIS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
EMHA TAUFIQ LUTHFI, NANNA SURYANA, ABDULSAMAD HASAN BASARI |  
|  			
									
Abstract: | 
 			
									
Hadith is the second source of reference for Muslim all over the world after the 
Holy Al-Quran. Plenty of Muslims used the internet as primary knowledge sources 
including when searching for religious texts such as Hadith. Due to the vast 
amount of data being transferred on the Internet, there is exists many 
fabricated Hadiths, and these produce many problems in distinguishing between 
authentic or fabricated Hadiths for Muslim and non-Muslim who are interested in 
Hadiths. Therefore, Hadiths accessed from the internet needs to be researched to 
get its authenticity and originality. Hadith has three parts that are Sanad, 
Matn, and Taraf. Referred to Hadith science, an authentic Hadith can be seen 
from the status of its Sanad and Matn. Based on the literature review of 
previous research on Hadith authentication, it exists 14% of the studies were 
using the authentication concept of Sanad and Matn, almost 33% of studies were 
using only the authentication concept of Sanad, and 6% of studies were using 
only the authentication concept of Matn. Most of the prior studies done manually 
and fewer utilized any machine learning methods, and the performance is still 
unable to measured or standardized. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Hadith, Sanad, Matn, Hadith Authentication, Hadith Authentication Methods |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
TOWARDS MORE ACCURATE AUTOMATIC RECOMMENDATION OF SOFTWARE DESIGN PATTERNS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABEER HAMDY, MOHAMED ELSAYED |  
|  			
									
Abstract: | 
 			
									
Design pattern is a high-quality reusable solution to a commonly occurring 
design problem in certain context. Using design patterns in software development 
improves some of the quality attributes of the system including productivity, 
understandability and maintainability. However, it is hard for novice developers 
to select a fit design pattern to solve a design problem. The paper proposes a 
text retrieval based approach for the automatic selection of the fit design 
pattern. This approach is based on generating a vector space model (VSM) of 
unigrams and topics to the catalogue of patterns. The topic is a set of words 
that often appear together. Latent Dirichlet Allocation topic model is adopted 
to analyze the textual descriptions of the patterns to extract the key topics 
and discover the hidden semantic. The similarity between the target problem 
scenario and the collection of patterns is measured using an improved version of 
the popular Cosine similarity measure. The proposed approach was assessed using 
Gang of four design patterns catalog and a collection of real design problems. 
The experimental results showed the effectiveness of the proposed approach which 
achieved 72 % precision.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Design Pattern Selection; DP Recommendation; Gang of Four, Text Mining, 
Information Retrieval, Topic Modelling, Vector Space Model. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SIMULATION OF CHAOTIC PHENOMENA IN INFOCOMMUNICATION SYSTEMS WITH THE TCP 
PROTOCOL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ALEXAND KARPUKHIN, DMITRIJ GRICIV, EVGENY NIKULCHEV |  
|  			
									
Abstract: | 
 			
									
In numerous works devoted to the study of network traffic, it was shown that in 
high-speed networks, chaotic operation modes can appear, the main cause of which 
is the behavior of the TCP protocol. The presence of such modes leads to a 
significant reduction in the bandwidth of the entire network, especially in the 
so-called bottlenecks. However, models that adequately describe 
infocommunication systems and make it possible to apply the entire arsenal of 
classical methods for analyzing nonlinear dynamical systems have not been 
proposed yet. The paper proposes a new approach to the analysis of the behavior 
of infocommunication systems with the TCP protocol – treating them as nonlinear 
dynamical systems demonstrating chaotic properties for certain values of the 
parameters. Phase portraits of the considered systems are constructed; the 
values of the maximum Lyapunov exponent are calculated for different values of 
the main parameters of the systems. The physical experiment was carried out in 
the real network. The problem of optimizing the parameters of the 
infocommunication system was solved in terms of the absence of undesirable 
chaotic regimes. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Network Traffic, TCP Protocol, Lyapunov Exponent |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MULTI-CLASSIFICATION OF UNSW-NB15 DATASET FOR NETWORK ANOMALY DETECTION SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUKRIMAH NAWIR, AMIZA AMIR, NAIMAH YAAKOB, ONG BI LYNN |  
|  			
									
Abstract: | 
 			
									
Problem to classify more than two classes (called as multi-class) for network 
anomaly detection system using machine learning techniques are very challenging 
and become a vital factor when the growth of many network attacks might endanger 
the performances of network system. A tremendous increase in the various number 
of network threats compromise the network system motivate the network anomaly 
detection system to be relevant and necessary to be implement using a powerful 
tool (machine learning approach) for network security issue. In this work, a 
model of an Online Average One Dependence Estimator (AODE) algorithm for 
multi-classification of UNSW-NB15 dataset that high in accuracy with a low false 
alarm rate (FAR) was built to overcome the issues such as the nature of data 
(complex data that represent into more than two classes), dynamical data in a 
network system, and frequent update (for streaming data that need a fast 
processing). The obtained results from the conducted experiment showed that 
Online AODE more recently detect the Worms class where the percentage of 
accuracy for classification is 99.93% with small FAR is only 0.001. Moreover, 
online AODE is an outperformed based on accuracy compare to online Naïve Bayes 
(NB) where the classification rate 83.47% and 69.60% respectively for 
multi-classification the UNSW-NB15 dataset. Since, the given data is a streaming 
data in a computer network time need to be enumerated to have a fast algorithm 
for network anomaly detection system before the network system become in a 
critical condition. Although, the online NB is most fastest for 
multi-classification yet online AODE give a comparable result based on 
processing time.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Multi-classification, Network Anomaly Detection System, Averaged One Dependence 
(AODE), Machine Learning, UNSW-NB15 Dataset |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CONTENT BASED IMAGE RETRIVAL USING COMBINATION HISTOGRAM AND MOMENT METHODS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
FOUAD H. AWAD, REEM IBRAHIM HASAN, AHMEED S. FARHAN, LAITH ALZUBAIDI |  
|  			
									
Abstract: | 
 			
									
In this work, we introduce content based image retrieval CBIR. One of the 
essential features is colour in an image processing and CBIR so we use the 
colour histogram and colour moment features in order to compare a inquiry image 
with the image in the database. The two ways, colour histogram and colour moment 
have achieved state-of-art results when we applied them to WANG database images. 
For testing purposes, We have used 100 images (10 images from each class).The 
mean retrieval of precision of histogram was 74.4 % and the average of colour 
moment was 72.4% when test every algorithm alone and the result be more 
efficient when combine them which be 75.1 % by using constant weight and the 
precision increase to 81.9% when make the weight of combination variable by the 
user. (Restate with marks) |  
|  			
									
  										
			
Keywords:  | 
 			
									
Image Processing, CBIR, Colour Histogram, Feature Extraction, Color Moment. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PHOTOVOLTAIC OUTPUT POWER FORECAST USING ARTIFICIAL NEURAL NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A. ELAMIM, B. HARTITI, A. BARHDADI, A. HAIBAOUI A. LFAKIR, P.THEVENIN |  
|  			
									
Abstract: | 
 			
									
This article presents a method for predicting the power provided by photovoltaic 
solar panels using feed forward neural network (FFNN) of a photovoltaic 
installation located in the city of Mohammedia (Morocco). An almost one-year 
experimental database on solar irradiance, ambient temperature and PV power were 
used to study the prediction ability of the power produced by artificial neural 
networks. To verify this model, the coefficient of determination (R2), the 
normalized mean squared error (nRMSE), the mean absolute error (MAE), and other 
parameters were used. The results of this model tested on unknown data showed 
that the model works well, with determination coefficients lying between 0.99 
and 0.998 for sunny days, between 0.961 and 0.965 for cloudy days and between 
0.88 and 0.93 for rainy days. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Photovoltaic Installation, Feed Forward Neural Network, Artificial Neural 
Networks |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
15th August 2018 -- Vol. 96. No. 15 -- 2018  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
  		
							
 |     	 
 |