International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 10, No. 12, Dec. 2018

Cover page and Table of Contents: PDF (size: 252KB)

Table Of Contents

REGULAR PAPERS

Onto-Digital: An Ontology-Based Model for Digital Transformation’s Knowledge

By Fadwa Zaoui Nissrine Souissi

DOI: https://doi.org/10.5815/ijitcs.2018.12.01, Pub. Date: 8 Dec. 2018

The digital transformation of the company is a condition for the socio-economic development. Dealing with ICT integration in the enterprise, the paper’s aim is the identification of the digital transformation conceptual components, required for designing a knowledge model.
To do this, a literature review is established to identify the dimensions, and their interrelations, to consider in the construction of a model, and which led to an ontology-driven model for digital transformation’s knowledge.
In comparison with other models proposed in the literature, this ontology is exhaustive in terms of knowledge, adaptable to any sector of activity and scalable in terms of dimensions and relationships composing it.

[...] Read more.
Phoneme Concatenation Method for Myanmar Speech Synthesis System

By Chaw Su Hlaing Aye Thida

DOI: https://doi.org/10.5815/ijitcs.2018.12.02, Pub. Date: 8 Dec. 2018

This paper discusses the approach used to develop a Text-to-Speech (TTS) synthesis system for the Myanmar language. Concatenative method has been used to develop this TTS system using phoneme as the basic units for concatenation. In this proposed system, phoneme plays an important role so that Myanmar phoneme inventory is presented in detail. In Myanmar language, schwa is the only vowel that is allowed in a minor syllable or consonant that has half-sound of the original one. If these half sound can be handled, the TTS quality will be high. After analyzing the number of phoneme and half-sound consonant to be recorded, create the Myanmar phoneme speech database which contains total 157 phoneme speech sounds that can speech out for all Myanmar texts. These phonemes are fetched according to the result from the phonetic analysis modules and concatenated them by using proposed new phoneme concatenation algorithm. According to the experimental results, the system achieved the high level of intelligibility and acceptable level of naturalness. As the application area, it is intended for the resource limited device to use as language learning app and so on.

[...] Read more.
ICT Training Recommendation using Web Usage Mining

By Susi Maulidiah Imas S. Sitanggang Heru Sukoco

DOI: https://doi.org/10.5815/ijitcs.2018.12.03, Pub. Date: 8 Dec. 2018

The sustainability of a course and training institute depends on the availability of students. There are many ways to promote the courses and training programs including promoting it through the institution's website. The visitor behavior of a website have hidden information that can be found using web usage mining approach. This study aims to discover the hidden information from the visitor patterns of course website. The data used are web access log data of August 2016. Web usage mining process was done using the Co-Occurence Map Sequential Pattern Mining using Bitmap Representation (CM-SPAM) algorithm which is available in the SPMF tool. Based on sequential pattern mining on the access log data, this study recommends improvements regarding the website structure and information that should be displayed on certain web pages. This study also found that the visitors of course website interested in three page types: one day seminar, tutorial and the training program.

[...] Read more.
Quantum-Dot Cellular Automata based Fragile Watermarking Method for Tamper Detection using Chaos

By Turker Tuncer Sengul Dogan

DOI: https://doi.org/10.5815/ijitcs.2018.12.04, Pub. Date: 8 Dec. 2018

Fragile watermarking techniques have been widely used in the literature for tampered areas localization and image authentication. In this study, a novel quantum-dot cellular automata based fragile watermarking method for tampered area localization using chaotic piecewise map is proposed. Watermark generation, embedding, extraction and tampered area localization phases are consisted of the proposed quantum dot cellular automata and chaos based fragile watermarking method. In the watermark generation phase, quantum dot cellular automata and piecewise map which is a chaotic map are utilized. A block based method is utilized as authentication values embedding and extraction phases. To detect tampered areas, generated watermark and extracted watermark are compared. Also, block counters are used to tamper detection. In order to evaluate this method, capacity, imperceptibility and image authentication ability were utilized as performance metrics and the results of these metrics clearly illustrated that the presented method is suitable for image authentication and tamper detection.

[...] Read more.
Low Power and Area Optimized Architectures for BPSK Modulator

By Usha S.M. Mahesh H.B.

DOI: https://doi.org/10.5815/ijitcs.2018.12.05, Pub. Date: 8 Dec. 2018

Low power modulators are most efficient for wireless communication. The conventional BPSK modulator consumes more power and area. In this work, the new approaches for BPSK modulator are discussed and recorded. The four new approaches consume less area and power than the conventional design of BPSK Modulator. The power and area consumed by new approaches are compared with the conventional method. Cadence software is used for the simulation and synthesis, the power and area reduction in 180nm, 90nm and 45nm CMOS Technology is reported, MATLAB/SIMULINK is used to do BER analysis of BPSK modulator with AWGN channel. The new architectures enhance the performance of BPSK Modulator in consuming less power and utilizing less area than the conventional design.

[...] Read more.
ScrumFall: A Hybrid Software Process Model

By Md Shamsur Rahim AZM Ehtesham Chowdhury Dip Nandi Mashiour Rahman Shahadatul Hakim

DOI: https://doi.org/10.5815/ijitcs.2018.12.06, Pub. Date: 8 Dec. 2018

Every software project is unique in its own way. As a consequence, a single software process model cannot be suitable for all types of projects. In the real world, practitioners face different difficulties with the existing process models during development. Still, they cope up with the challenges by tailoring the software development lifecycle according to their needs. Most of these custom-tailored practices are kept inside the walls of the organizations. However, sharing these proven and tested practices as well as acquired knowledge and experience would be highly beneficial for other practitioners as well as researchers. So in this paper, we have presented a software process model which contains the characteristics of both Scrum and Waterfall model and named it “ScrumFall”. This model has been practicing in an Anonymous Software Development Company, Bangladesh to solve the shortcomings of Scrum and Waterfall models. Moreover, we have analyzed the performance and suitability for applying this process model. The result shows that this process model is highly effective for the certain projects.

[...] Read more.