You are previewing International Journal of Strategic Information Technology and Applications (IJSITA) Volume 5, Issue 3.
O'Reilly logo
International Journal of Strategic Information Technology and Applications (IJSITA) Volume 5, Issue 3

Book Description

The International Journal of Strategic Information Technology and Applications (IJSITA) provides state-of-the-art research on the optimization of performance in corporations, groups, associations, communities of practice, community organizations, governments, non-profits, nations, and societies that implement information systems. This journal covers analysis and avoidance of risk, detection and prevention of problems, acquisition and management of knowledge, preparation and response to emergencies, enhancement of decision making, facilitation of collaborative efforts, and incremental organizational wisdom.

This issue contains the following articles:

  • Fuzzy Prediction of Insolvent Customers in Mobile Telecommunication
  • Improving Performance and Convergence Rates in Multi-Layer Feed Forward Neural Network Intrusion Detection Systems: A Review of the Literature
  • A Bidder Strategy System for Online Auctions Trust Measurement
  • Dynamic Semi-Group Model for Reliability Engineering Optimizing the Risk on RTOS
  • Image Encryption Based on Development of Hénon Chaotic Maps using Fractional Fourier Transform

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Fuzzy Prediction of Insolvent Customers in Mobile Telecommunication
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PROBLEM DESCRIPTION
    4. 3. FRAUD DETECTION AND INSOLVENCY PREDICTION: LITERATURE OVERVIEW
    5. 4. METHODOLOGY
    6. 5. ROUGH SETS THEORY
    7. 6. DESCRIPTION OF THE SOLUTION STRATEGY
    8. 7. IMPLEMENTATION AND RESULTS
    9. 8. CONCLUSION AND PERSPECTIVES
    10. REFERENCES
  5. Improving Performance and Convergence Rates in Multi-Layer Feed Forward Neural Network Intrusion Detection Systems:
    1. ABSTRACT
    2. INTRODUCTION
    3. ARCHITECTURE EFFECTS ON MLFF IDS PERFORMANCE AND CONVERGENCE RATES
    4. EFFECTS OF INPUT DATA ON THE ARCHITECTURE OF MLFFNN IDS
    5. USE OF BP AND GA ALGORITHMS
    6. FINDINGS
    7. CONCLUSION
    8. REFERENCES
  6. A Bidder Strategy System for Online Auctions Trust Measurement
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CHALLENGES OF ONLINE AUCTIONS
    4. 3. RELATED WORK
    5. 4. THE PROPOSED BIDDER ALGORITHM
    6. 5. RESULTS
    7. 6. CONCLUSION
    8. REFERENCES
  7. Dynamic Semi-Group Model for Reliability Engineering Optimizing the Risk on RTOS
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE SURVEY AND DATA COLLECTION BASED ON EXISTING SYSTEM ENGINEERING
    4. 3. EXISTING RISK OPTIMIZATION METHOD
    5. 4. METHODOLOGY: PROPOSED RISK OPTIMIZATION METHOD
    6. 5. RESULTS AND DISCUSSION (SERVICES)
    7. 6. CONCLUSION
    8. 7. FUTURE ADVANCEMENT OF THIS WORK
    9. REFERENCES
  8. Image Encryption Based on Development of Hénon Chaotic Maps using Fractional Fourier Transform
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. TWO DIMENSIONAL CHAOTIC MAPS
    4. 3. FRACTIONAL FOURIER TRANSFORM (FRFT)
    5. 4. A PROPOSED SCHEME BASED ON THE DEVELOPMENT OF HÉNON CHAOTIC SYSTEM USING FRACTIONAL FOURIER TRANSFORM.
    6. 5. EXPERIMENTAL RESULT AND ITS ANALYSIS
    7. 6. CONCLUSION
    8. REFERENCES
  9. Call For Articles