Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe paired sample t-test for testing the difference between two means in paired data is not robust against the violation of the normality assumption. In this paper, some alternative robust tests have been suggested by using the bootstrap method in addition to combining the bootstrap method with the W.M test. Monte Carlo simulation experiments were employed to study the performance of the test statistics of each of these three tests depending on type one error rates and the power rates of the test statistics. The three tests have been applied on different sample sizes generated from three distributions represented by Bivariate normal distribution, Bivariate contaminated normal distribution, and the Bivariate Exponential distribution.
The aim of this research is to clarify the importance of total quality management. Total quality management considered as a cultural process covering the various aspects of activities in society that helps human well-being, as well as the development of its efficiency and ability. They also have an effective role in achieving the desired goals that will benefit humanity. The concept of total quality management in the Qur'an is a broad, comprehensive and well integrated concept that aims to improve human life economically and socially. Quality in the Qur'an is a mean to achieve human beings happiness.
In this research we will highlight a successful story of quality management from Qur'an that ensures consumer protection and support of
ABSTRACT:
The study aimed to identify the impact of the role of voluntary accounting disclosure in enhancing confidence in the informational content of financial reports. Correlation - Spearman to measure the degree of correlation, as well as the method of simple linear regression analysis, and the study reached several results, including: The level of enhancing the information content in the annual financial reports of the Palestinian banks listed on the Palestine Exchange under study reached the overall average (total) (94.1%), and also Voluntary Accounting Disclosure in Enhancing Confidence in the Informational Content of the List of Change in Ownership Equity of Listed
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreHuman resources constitute the most important recourses that the organization owned today, as it may have developed financial and technology resources to achieve their goals, but they are not able to use it with required efficiency and effective and quality desired unless there is human resources that have good skills, experiences and talents that able to directing and exploited ideally that compatible with market requirements, where today's market and business organizations which compete naturally inherent talent, so the task is to attracting and developing talented resources and preservation these talented resources from the challenges that facing organizations.
The research seek to achieve
... Show MoreThe purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos