Journal of Theoretical and Applied Information Technology
April 2015 | Vol. 74 No. 2
Vol. 74 No. 2
Journal of
Theoretical and Applied Information Technology
274 Measuring The Quality Of E-Services And Its Impact On Students Satisfaction At Jordanian Universities
Hareth Alshamayleh, Rasha Aljaafreh, Ali Aljaafreh, Dara Albadayneh
285 Key Determinants Of Customer Satisfaction: Evidence From Malaysia Grocery Stores Mohammed Al-Ali , Nor Erne Nazira Bazin , Siti Maryam Shamsuddin
300 Efficient Techniques For Predicting Suppliers Churn Tendency In E-Commerce Based On Website Access Data
Veronica S. Moertini, Niko Ibrahim, Lionov
310 Review Of Quality Of Service In Routing Protocols For Wireless Sensor Networks Abdullah Bamatraf, Mohammad Shafie Bin Abd Latiff, Yahaya Coulibaly, Ahmad M. Khasawneh
321 Intensive Fixed Chunking (IFC) De-Duplication For Space Optimization In Private Cloud Storage Backup
M.Shyamala Devi, V.Vimal Khanna, M.Shaheen Shah
329 Microwave Imaging For The Detection And Localization Of Breast Cancer Using Artificial Neural Network
Abdelfettah Miraoui, Lotfi Merad, Sidi 1mohamed Meriah
336 An Assessing Approach Based On Fmeca Methodology To Evaluate Security Of A Third Party Cloud Provider
Bentajer Ahmed, Abouelmehdi Karim, Dali Loubna, El-Fezazi Said, Hedabou Mustapha, El Amrani Fatimaezzahra
345 Proposed It Financial Management Process Using ITIL (IT Infrastructure Library) For Port Company In Indonesia
Dedy Rahman Wijaya
355 An Enhancement Algorithm Using Gabor Filter For Fingerprint Recognition Einas Almarghni Azzoubi, Rosziati Bint Ibrahim
364 Carrier Based PWM Technique For Harmonic Reduction In Cascaded Multilevel Inverters
S.Leela, S.S.Dash
374 Portfolio Selection Using The Cat Swarm Optimization Hamza Kamili, Mohammed Essaid Riffi
381 New Architecture Of IDS Based Interaction On Mobile Agents And Data Mining Chaimae Saadi , Rachid Cherkaoui , Habiba Chaoui, Hassan Erguig
386 IDFP-Tree: An Efficient Tree For Interactive Mining Of Frequent Subgraph Patterns Mohammad H. Nadimi-Shahraki, Maryam Taki, Mohammad Naderi
391 A Low Power Phase Frequency Detector For Delay-Locked Loop
3/1/2016 Journal of Theoretical and Applied Information Technology April 2015 Volume 74 No 2
Frequency : monthly
FeedBack | Contact Us | Links | Site Map
Welcome to Journal of Theoretical and Applied Information Technology
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines encompassing the most basic research to the most innovative technologies. Please submit your papers electronically to our submission system at http://jatit.org/submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal identifiable information in the manuscript before submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).
Journal of Theoretical and Applied Information Technology
April 2015 | Vol. 74 No.3
Title: MEASURING THE QUALITY OF ESERVICES AND ITS IMPACT ON STUDENTS
SATISFACTION AT JORDANIAN UNIVERSITIES
Author: HARETH ALSHAMAYLEH, RASHA ALJAAFREH, ALI ALJAAFREH, DARA ALBADAYNEH
Abstract: This research aims at measuring the quality of EServices and its impact on student satisfaction at Jordanian universities. Toward this aim, a research model was developed and tested within the context of Jordanian universities. A questionnaire consisting of 40 (Likert) type items were distributed to a convenience sample of 755 respondents. Primary data were collected from 703 students with a response rate of 90.7%. SPSS package was used to determine if the quality of Eservices dimensions (Website design, reliability, efficiency, responsiveness, ease of use, availability and privacy) has an impact on students� satisfaction. The results show that all of the Eservices dimensions have an impact on students satisfaction expect for the dimension of ease of use. In addition, the researchers present some recommendations for universities to apply eservices quality dimensions through websites, and some suggestions for future research.
Keywords: Students Satisfaction, Electronic Services Quality, Jordanian Universities.
Source: Journal of Theoretical and Applied Information Technology
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: KEY DETERMINANTS OF CUSTOMER SATISFACTION: EVIDENCE FROM MALAYSIA
GROCERY STORES Partial Least SquaresSEM (PLSSEM) analysis method, we show that three determinants (��monetary value��, ��service and convenience��, and ��store quality image��) have a direct impact on customer satisfaction. However, the weight that each factor shows is different. Results may help managers of grocery stores in Malaysia to develop and implement more successful relationship marketing strategies.
Keywords: Customer Satisfaction, Grocery Stores, Store Attributes, PLSSEM
Source: Journal of Theoretical and Applied Information Technology
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: EFFICIENT TECHNIQUES FOR PREDICTING SUPPLIERS CHURN TENDENCY IN E
COMMERCE BASED ON WEBSITE ACCESS DATA
Author: VERONICA S. MOERTINI, NIKO IBRAHIM, LIONOV
Abstract: Electronic supplier relationship management (eSRM) is important in order to maintain strong, long lasting and beneficial relationship between ecommerce firms and their suppliers. One important function of eSRM is to predict suppliers who tend to churn such that early �treatment� can be given. In the ecommerce systems that involve suppliers as the websites users, predicting suppliers� churn tendency can be based on analyzing their frequencies in accessing the ecommerce websites.
Our proposed techniques include data warehouse design (supporting the data collection and preprocessing) and unsupervised algorithms that analyze the preprocessed bitmaps of time series data representing suppliers website access from time to time. Having bitmaps as inputs, our proposed algorithms are efficient (the time complexity is O(n)) as proven with our experiments. In experimenting with real world data of an ecommerce system selling hotel rooms, our techniques produce output of supplier segments where each segment has certain churn level tendency and need specific treatment. Keywords: Churn Prediction In ECommerce, Supplier Relationship Management, Web Usage Mining
Source: Journal of Theoretical and Applied Information Technology
3/1/2016 Journal of Theoretical and Applied Information Technology April 2015 Volume 74 No 2
http://www.jatit.org/volumes/seventyfour3.php 2/5
Full Text
Title: REVIEW OF QUALITY OF SERVICE IN ROUTING PROTOCOLS FOR WIRELESS SENSOR
NETWORKS bandwidth issues. The expanding demand for realtime services in WSN applications means that interest in quality of service (QoS)based routing has risen. Offering consistent QoS in sensor networks
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: INTENSIVE FIXED CHUNKING (IFC) DEDUPLICATION FOR SPACE OPTIMIZATION IN
PRIVATE CLOUD STORAGE BACKUP
Author: M.SHYAMALA DEVI, V.VIMAL KHANNA, M.SHAHEEN SHAH
Abstract: Cloud Storage provides users with abundant storage space and make user friendly for immediate data access. But there is a lack of analysis on optimizing cloud storage for effective data access. With the development of storage and technology, digital data has occupied more and more space. According to statistics, 60% of digital data is redundant, and the data compression can only eliminate intrafile redundancy. In order to solve these problems, DeDuplication has been proposed. Many organizations have set up private cloud storage with their unused resources for resource utilization. Since private cloud storage has limited amount of hardware resources, they need to optimally utilize the space to hold maximum data. In this paper, we are going to discuss the flaws in the existing deduplication methods and introduce new methods for Data DeDuplication. Our proposed method namely Intensive Fixed Chunking (IFC) Deduplication which is the enhanced File level deduplication that provides dynamic space optimization in private cloud storage backup as well as increase the throughput and de duplication efficiency
Keywords: Cloud Computing, Private Storage Cloud, Cloud Backup, Data DeDuplication, Chunking, Redundancy
Source: Journal of Theoretical and Applied Information Technology
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: MICROWAVE IMAGING FOR THE DETECTION AND LOCALIZATION OF BREAST CANCER
USING ARTIFICIAL NEURAL NETWORK
Author: ABDELFETTAH MIRAOUI, LOTFI MERAD, SIDI 1MOHAMED MERIAH
Abstract: Localization and Reconstruction of homogenous objects from electromagnetic scattered fields have been shown to be of great importance, because of their various applications in many areas such as medicine, biology, geophysics and other sciences. In this paper, we propose a computational method for
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: AN ASSESSING APPROACH BASED ON FMECA METHODOLOGY TO EVALUATE SECURITY
3/1/2016 Journal of Theoretical and Applied Information Technology April 2015 Volume 74 No 2
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: PROPOSED IT FINANCIAL MANAGEMENT PROCESS USING ITIL (IT INFRASTRUCTURE
LIBRARY) FOR PORT COMPANY IN INDONESIA
Author: DEDY RAHMAN WIJAYA
Abstract: ASEAN Single Window (ASW) implementation ensures compatibility of Member States National Single Windows (NSWs) with international open communication standards while also ensuring that not managed properly. Port Company in Indonesia often ignore linkage analysis between IT investment, business objectives, and business impact. Therefore, the value of IT service not been well defined. This work has raised this issue and try to propose systematic approach for IT Financial Management process based on ITIL best practice standard. Research case study in one of the largest governmentowned port company in Indonesia that implements Port Integrated IT services. This work start with planning, analysis, and design to be produced proposed IT Financial Management process. Business case analysis perform in planning phase to make sure the IT investment related with business objectives and has measurable impact. Assessment perform in analysis phase to measure the IT Financial Management process readiness. Total Service Valuation (TSV) also formulated to know the
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: AN ENHANCEMENT ALGORITHM USING GABOR FILTER FOR FINGERPRINT
RECOGNITION in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Further, minutiaebased matching has difficulty in quickly matching two fingerprint images containing different numbers of unregistered minutiae points. We introduced an enhancement algorithm using Gabor filter based matching to capture both local and global details in a fingerprint as a compact fixedlength Fingercode. The improved filtering used to feather extraction in our proposed algorithm with eight different directions. The last step of our proposed algorithm is fingerprint matching, which is based on
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: CARRIER BASED PWM TECHNIQUE FOR HARMONIC REDUCTION IN CASCADED
3/1/2016 Journal of Theoretical and Applied Information Technology April 2015 Volume 74 No 2 of the proposed control technique is verified by the simulation results. The test results verify the effectiveness of the proposed strategy in terms of computational efficiency as well as the capability of the inverter to produce very low distorted voltage with low switching losses.
Keywords: Carrier Based PWM technique, Cascaded Multilevel Inverter, Matlab Simulink, Total Harmonic Distortion.
Source: Journal of Theoretical and Applied Information Technology
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: PORTFOLIO SELECTION USING THE CAT SWARM OPTIMIZATION
Author: HAMZA KAMILI, MOHAMMED ESSAID RIFFI
Abstract: The portfolio selection is a discipline in finance interested in the optimization of the investment represented by a mixed quadratic programming problem. The approach of this paper to studying the portfolio selection problem is the implementation of the metaheuristic cat swarm optimization , a method inspired from the behavior of different felines and characterized by two modes: the seeking and
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: NEW ARCHITECTURE OF IDS BASED INTERACTION ON MOBILE AGENTS AND DATA
MINING
Author: CHAIMAE SAADI , RACHID CHERKAOUI , HABIBA CHAOUI, HASSAN ERGUIG
Abstract: Intrusion detection system (IDS) is a very useful tool for the defence of a network against attacks. Nowadays, intruders use a complex attacks towards a target. This make the IDS unable to detect all
30th April 2015 Vol. 74. No. 3 2015
Full Text
Title: IDFPTREE: AN EFFICIENT TREE FOR INTERACTIVE MINING OF FREQUENT SUBGRAPH
PATTERNS
Author: MOHAMMAD H. NADIMISHAHRAKI, MARYAM TAKI, MOHAMMAD NADERI
Abstract: Recently, knowledge extraction from transactional graph databases by mining frequent subgraph patterns has become an interesting research topic. One of the important challenges in this topic is the situation called interactive mining in which the minimum support threshold can be frequently changed to find proper frequent subgraph patterns. Obviously, running the mining method from scratch is very costly. Therefore, in this paper, an efficient tree called IDFPtree is proposed to develop our previous twolayer model for interactive mining of frequent subgraph patterns from transactional graph databases. The proposed tree constructs the mining model separated from the mining process. Thus, when the minimum support threshold is changed, there is no need to reconstruct the mining model, and only the mining process must be rerun. The experimental results show when the mining model is constructed by IDFPtree, it can be frequently used and the total runtime of interactive mining of frequent subgraph patterns can be reduced.
Keywords: Interactive Mining, Graph Mining, Transactional Graph, Frequent Subgraph Pattern
Source: Journal of Theoretical and Applied Information Technology
30th April 2015 Vol. 74. No. 3 2015
Full Text
3/1/2016 Journal of Theoretical and Applied Information Technology April 2015 Volume 74 No 2
http://www.jatit.org/volumes/seventyfour3.php 5/5
Author: LAU WENG LOON, MAMUN BIN IBNE REAZ, KHAIRUN NISA� MINHAD, NOORFAZILA
KAMAL, WAN MIMI DIYANA WAN ZAKI
Abstract: High performance phase frequency detector (PFD) is one of the key modules in high speed delaylocked loop (DLL). The operation of DLL depends on the performance of its detector. The demand for the reduction of power dissipation in CMOS design is a challenge in order to optimize circuit power consumption. A low power dynamic pseudoPMOS PFD is proposed to make DLL system more reliable. In this work NOR gate of typical TSPC PFD is replaced with a low power dissipation pseudo PMOS AND gate built of 3 PMOS transistors. PseudoPMOS AND integrated into proposed TSPC PFD to run maximum frequency at 1G Hz with 1.8 V input power supply. This proposed PFD has been implemented in Mentor Graphics 0.18 μm CMOS process technology and consumed 163.36 �m2 active layout area with 206 nW total power dissipation will further trim down the total cost of the DLL.
Keywords: DLL, Dynamic PFD, Low Power PFD, Low Noise PFD, PseudoPMOS
Source: Journal of Theoretical and Applied Information Technology
30th April 2015 Vol. 74. No. 3 2015