Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Exploring Relevance as Truth Criterion on the Web and Classifying Claims in Belief Levels1127578610.22059/jitm.2020.75786ENFairouzZendaouiLaboratoire de la Communication dans les Systèmes Informatiques, Ecole Nationale Supérieure d’Informatique, BP 68M, 16309, Oued-Smar, Alger, Algérie.0000-0002-8270-1614Walid KhaledHidouciLaboratoire de la Communication dans les Systèmes Informatiques, Ecole Nationale Supérieure d’Informatique, BP 68M, 16309, Oued-Smar, Alger, Algérie.0000-0002-8290-1093Journal Article19991130The Web has become the most important information source for most of us. Unfortunately, there is no guarantee for the correctness of information on the Web. Moreover, different websites often provide conflicting information on a subject. Several truth discovery methods have been proposed for various scenarios, and they have been successfully applied in diverse application domains. In this paper, we have attempted to answer the question whether the truth is relevant. We conducted an experimental study in which we analyzed and compared the results of two different truth discovery methods: Relevance-based sources ranking and Majority vote. We have found that the truth is not always held by the most relevant sources on the web. Sometimes the truth is given by the majority vote of the crowd. In addition, we have proposed a method of presenting the results of truth discovery with gradual degrees of belief. A method that allows to configure and target the desired level of trust.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Classification of Brain Tumor by Combination of Pre-Trained VGG16 CNN13257578810.22059/jitm.2020.75788ENOuiza NaitBelaidLaboratoire de la Communication dans les Systèmes Informatiques, Ecole Nationale Supérieure d’Informatique, BP 68M, 16309, Oued-Smar, Alger, Algérie.0000-0002-2948-7284MalikLoudiniLaboratoire de la Communication dans les Systèmes Informatiques (LCSI), École Nationale Supérieure d’Informatique (ESI), BP 68M, 16309, Oued-Smar, Alger, Algérie.0000-0003-4936-4019Journal Article20200424In recent years, brain tumors become the leading cause of death in the world. Detection and rapid classification of this tumor are very important and may indicate the likely diagnosis and treatment strategy. In this paper, we propose deep learning techniques based on the combinations of pre-trained VGG-16 CNNs to classify three types of brain tumors (i.e., meningioma, glioma, and pituitary tumor). The scope of this research is the use of gray level of co-occurrence matrix (GLCM) features images and the original images as inputs to CNNs. Two GLCM features images are used (contrast and energy image). Our experiments show that the original image with energy image as input has better distinguishing features than other input combinations; accuracy can achieve average of 96.5% which is higher than accuracy in state-of-the-art classifiers.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Online Buying Behavior among University Students: A Cross Cultural Empirical Analysis26397578910.22059/jitm.2020.75789ENMaqsood HussainJunaidiAssistant Professor, Department of Supply Chain Management, College of Business, University of Jeddah, Jeddah, Kingdom of Saudi Arab.Mohammad SalehMiralamAssociate Professor, Vice Dean of Post Graduate Studies and Scientific Research, Department of Business Administration College of Business, University of Jeddah, Jeddah, Kingdom of Saudi Arab.Journal Article20200424Internet users all over the world are increasing day by day and showing great interest for online shopping. The main reason for the high usage of the internet is the affordable price of mobile gadgets and low internet tariff plans. Consumer behavior is influenced by various factors such as culture, social class, reference groups relationship, family, income level and income independency, age, gender, etc. The purpose of this study was to find out the differences in buying behaviors among the university students. The study was carried out using google survey with a sample size of 236 students randomly selected from the university of India and Saudi Arabia. The study shows that University students of both countries have more online shopping experience because they use the internet more frequently and they have larger internet usage. Nowadays Students are more computer professionals and those who use the internet for their study work and assignments work are more active in online shopping. As per student’s opinion, they said few things remember in our mind when coming to payment options credit card is the safest option or using online services like pay pal and google wallet services also a good way but finally, cash on delivery is the best way of shopping online. The result of this study would contribute marketers who want to penetrate the market in India and in Kingdom of Saudi Arab, who are already present in the market and desire to take care of the loyalty and satisfaction of their customers.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Implementation of Face Recognition Algorithm on Fields Programmable Gate Array Card40587579010.22059/jitm.2020.75790ENFatimaZohra AllamSignal and Communication Laboratory, Department of Electronics, National Polytechnic School, Algeria.0000-0002-2273-8685LatifaHamami-MiticheSignal and Communication Laboratory, Department of Electronics, National Polytechnic School, Algeria.0000-0002-4697-8288HichamBousbia-SalahSignal and Communication Laboratory, Department of Electronics, National Polytechnic School, Algeria.0000-0002-6416-5491Journal Article20200424The evolution of today's application technologies requires a certain level of robustness, reliability and ease of integration. We choose the Fields Programmable Gate Array (FPGA) hardware description language to implement the facial recognition algorithm based on "Eigen faces" using Principal Component Analysis. In this paper, we first present an overview of the PCA used for facial recognition, then use a VHSIC Hardware Description Language (VHDL) simulation and design platform, which is the ISE. We describe the operation of each block and implement, thereafter, the computation of the global centered images. This corresponds to the first step of the PCA algorithm to assess its performance. The comparison of the results of this implementation with that of MATLAB confirmed the operability and effectiveness of this method for centralizing images. We also implemented the last part of this algorithm which is the computation of the Manhattan distance. The tests have given very satisfactory results.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Revolution of Artificial Intelligence and the Internet of Objects in the Customer Journey and the Air Sector59697579110.22059/jitm.2020.75791ENHadjerSaadiLecturer, Instrumentation Laboratory (LNS), Faculty of Electronics and Informatics, USTHB, Algiers.0000-0003-2559-9323RachidaTouhamiProfessor, Instrumentation Laboratory (LNS), Faculty of Electronics and Informatics, USTHB, Algiers.0000-0003-0918-8022Mustapha C.E.YagoubProfessor, School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON Canada K1N 6N5.0000-0002-8763-7738Journal Article20200424Artificial intelligence (AI) is a discipline interested in the processes and methods that allow a machine to perform tasks related to human intelligence. It offers many opportunities related to problem solving, quick decision-making, increasing efficiency and reducing costs. Because of its so various fields of application, artificial intelligence is at the heart of the new industrial revolution. Algeria aims to present its AI strategy by 2020. In this paper, we are interested in defining AI, its potential fields of application, and in particular, its influence in the customer journey and position of RFID (<em>Radio-Frequency Identification</em>) in the chain; application in the aviation sector and its relationship to the Internet of Things are also described through examples.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Improving LoRaWAN Performance Using Reservation ALOHA70787579210.22059/jitm.2020.75792ENDina M.IbrahimDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-7775-0577Journal Article20200424LoRaWAN is one of the new and updated standards for IoT applications. However, the expected high density of peripheral devices for each gateway, and the absence of an operative synchronization mechanism between the gateway and peripherals, all of which challenges the networks scalability. In this paper, we propose to normalize the communication of LoRaWAN networks using a Reservation-ALOHA (R-ALOHA) instead of the standard ALOHA approach used by LoRa. The implementation is a library package placed on top of the standard LoRaWAN; thus, no modification in pre-existing LoRaWAN structure and libraries is required. Our proposed approach is based on a distributed synchronization service that is suitable for low-cost IoT end-nodes. R-ALOHA LoRaWAN gives better performance in comparison with the previous models; Pure-ALOHA LoRaWAN, Slotted-ALOHA LoRaWAN, and TDMA LoRaWAN. It significantly improves the performance of network regarding the probability of collision, the maximum throughput, and the maximum duty cycle.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Policy Model for Sharing Network Slices in 5G Core Network79897579310.22059/jitm.2020.75793ENMohammad AliHammoudehDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-9735-2365Journal Article20200424As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of network slices will be cost effective for slice managing and giving the required functionality. So, the aim is to improve the efficiency of mobile network by forming an ideal slice in a multi-service communication network. In this paper, we propose a model to demonstrate network resource allocation system that forms devoted network slices to serve particular types of services independently on shared infrastructure. This model solves the problem of creating a strategy to form multi-service core mobile communication network slices, which allow the providing of a wide scope of services with certain quality indicators according to the effective dynamic configuration of the system. A resource management system model is created, to provide a method that considers costs related with excessive resource allocation, and also reduces the number of network recalculations, allowing for a reasonable proportion of management costs and Qualities of Service.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Comparative Study between Hologram Technology and Augmented Reality901067579410.22059/jitm.2020.75794ENDoaa M.ElmahalDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0001-6787-6304Asma S.AhmadDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0001-5011-3562Alaa T.AlomaierDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-2144-2639Reem F.AbdlfatahDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-3014-4158Dina M.HusseinDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-7775-0577Journal Article20200424The great development witnessed by our current age has led to the emergence of many diverse modern technologies, one of these advanced technologies is Hologram technology and Augmented reality technology, These two technologies are somewhat similar to somewhat, as it can be said that they perform almost the same purpose, and at the same time, Hologram technology differs from augmented reality in several aspects, as the way in which the three-dimensional images are created and the properties of that images itself. This paper aims to compare and study the similarities and differences between Hologram technology and Augmented reality technology. It is a standard comparison as the comparison takes place according to a number of different aspects of both technologies. Comparing the characteristics of the two technologies showed that there is no one of them excels over the other, but according to different systems and situations, it is maybe better and more appropriate to use one of them than using the other one.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Top Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study1071227579510.22059/jitm.2020.75795ENArwaAlbelaihiDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0001-7135-5894NabeelKhanDepartment of Information Technology, College of Computer, Qassim University, Buraydah, Saudi Arabia.0000-0002-0505-5604Journal Article20200424Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the information and communication technology (ICT) industry. This paper illustrates a significant positive correlation between the use of cloud computing and organizational quality performances. The paper concluded that the knowledge level of SMEs on the accessibility of cloud services is below average scale. The greatest challenges about the cloud service are privacy and security in the cloud among providers and users for the Saudi Arabian firms.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media1231307579610.22059/jitm.2020.75796ENBedoor Y.AlHarbiDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-3125-9248Mashael S.AlHarbiDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-8919-8900Nouf J.AlZahraniDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0001-9696-8662Meshaiel M.AlsheailInformation Technology Dept., College of Computer, Qassim University, Qassim, Saudi Arabia.0000-0002-2991-7299.Dina M.IbrahimDepartment of Information Technology, College of Computer, Qassim University, Saudi Arabia.0000-0002-7775-0577Journal Article20200424Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine learning algorithms. In this paper, we have reviewed algorithms for automatic cyberbullying detection in Arabic of machine learning, and after comparing the highest accuracy of these classifications we will propose the techniques Ridge Regression (RR) and Logistic Regression (LR), which achieved the highest accuracy between the various techniques applied in the automatic cyberbullying detection in English and between the techniques that was used in the sentiment analysis in Arabic text, The purpose of this work is applying these techniques for detecting cyberbullying in Arabic.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601The Impact of Dynamic Balanced Scorecard in Knowledge-Intensive Organizations’ Business Process Management: A New Approach Evidenced by Small and Medium-Size Enterprises in Latin America1311527579710.22059/jitm.2020.75797ENFernandoYanineAssociate Professor, School of Engineering, Universidad Finis Terrae, Av. Pedro de Valdivia 1509, Providencia; Santiago.Felisa M.CordovaProfessor and Director of the School of Engineering, Universidad Finis Terrae, Av. Pedro de Valdivia 1509, Providencia; Santiago, Chile.ClaudiaDuranAcademic; Faculty of Engineering, Department of Industry, Universidad Tecnológica Metropolitana, Av. José Pedro Alessandri 1242, Ñuñoa, Santiago, Chile.Journal Article20200424Dynamic Balanced Scorecard (DBSC) is an effective business performance management control tool for dealing with business uncertainty, performance monitoring, evaluation and forecasting. DBSC has been proposed and utilized extensively over the years as an effective tool to manage and control the dynamics of business processes (BP) and their performance. However, there is little evidence of its application in knowledge-intensive (KI) organizations and how they can develop and enhance key aspects of their business processes, such as product-service systems innovation, and sustainability, for example. Moreover, the literature does not mention nor does it provide a vision or a DBSC model in cases where business process management (BPM), linked to knowledge creation and organizational transformation initiatives, are factored in the DBSC model. Hence this article explores this vein and aims to demonstrate the advantages of DBSC in this type of scenarios, with stark contrast of failed organizations of the past, particularly in small and medium-size enterprises (SME). Most of the private sector in developing countries like Chile is comprised of SMEs, which thrive and seek to grow sustainably adhering to a global economic trend. The DBSC model being shown here illustrates SMEs strategy, which reveals how intrinsic characteristics of knowledge-intensive organizations can foster sustainability and innovation in BPM.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601Green Energy Generation in Buildings: Grid-Tied Distributed Generation Systems (DGS) With Energy Storage Applications to Sustain the Smart Grid Transformation1531627579810.22059/jitm.2020.75798ENAntonioSanchez-SquellaAssistant Professor; Dept. of Electrical Engineering, Universidad Técnica Federico Santa María, Santiago, Chile.FernandoYanineAssociate Professor, School of Engineering, Universidad Finis Terrae, Av. Pedro de Valdivia 1509, Providencia; Santiago, Chile.AldoBarruetoAssistant Professor; Dept. of Electrical Engineering, Universidad Técnica Federico Santa María, Santiago, Chile.AntonioParejoDepartment of Electronic Technology, Escuela Politécnica Superior, University of Seville, Seville, Spain.Journal Article20200424The challenge of electricity distribution’s upgrade to incorporate new technologies is big, and electric utilities are mandated to work diligently on this agenda, thus making investments to ensure that current networks maintain their electricity supply commitments secure and reliable in face of disruptions and adverse environmental conditions from a variety of sources. The paper presents a new model based on energy homeostasis for power control and energy management using tariffs differentiation as incentive, considered by ENEL, the largest electric utility in Chile. The model optimizes grid-tied distributed generation (DG) systems with energy storage, in line with the utility’s green energy program, part of its Smart Grid Transformation, aimed at installing grid-tied DG systems with solar generation and energy storage in Santiago, Chile. Results present different tariff options, system’s capacity and energy storage alternatives, in order to compare proposed strategies with the actual case, where no green energy is present. The results show the advantage of the proposed tariffs scheme and power-energy management model based on different scenarios, providing a good and safe option for installing DG solutions to the grid.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601The Role of Parental Mediation in the Relationship between Adolescents’ Use of Social Media and Family Relationships in Saudi Arabia1631837579910.22059/jitm.2020.75799ENNajwaAlbeladiPhD Candidate, Department of Neuroscience, Psychology & Behaviour, University of Leicester, George Davies Centre, Leicester, LE1 7HA, UK,EmmaPalmerReader in Forensic Psychology, Department of Neuroscience, Psychology & Behaviour, University of Leicester, George Davies Centre, Leicester, LE1 7HA, UK,Journal Article20200424This study aimed to examine the impact of parenting mediation strategies on family relationships and social media use among Saudi adolescents. To achieve the aim, a quantitative research design was used, involving questionnaires with data collected from 393 Saudi students aged 13-18 years. Pearson correlation and hierarchical multiple regression analyses were performed. The key findings of this study showed that Snapchat and Instagram were the most popular social media sites among Saudi adolescents, and parenting mediation strategies were affected by family relationships. Just over a third of participants (35.62%) reported that they spent 3-5 hours per day on social media with another 30.79% spending more than 6 hours per day on social media. Family relationships were found to strongly predict the social integration and social media addiction. The data showed a significant negative correlation between excessive use of social media and two components of family relationships (cohesion and expressiveness). Moreover, the results suggest that lower levels of family expressiveness and higher levels of family conflict were associated with social media addiction. The parenting mediation strategies were shown to predict the cohesiveness and expressiveness of family relationships. Finally, technical and monitoring parenting mediation strategies were found significant associated with the social media use and the family relationships. These results contribute to formulating guidelines for parents and policymakers in developing countries such as Saudi Arabia to protect their children from the social media risks.Faculty of Management, University of TehranJournal of Information Technology Management2980-797212220200601IRHM: Inclusive Review Helpfulness Model for Review Helpfulness Prediction in E-commerce Platform1841977580010.22059/jitm.2020.75800ENYasamyianAlmutairiMaster student in Information system at king Abduziz University, Jeddah, Saudi Arabia.ManalAbdullahAssociated Professor in king Abuduziz University, Jeddah, Saudi Arabia.Journal Article20200424Online reviews have become essential aspect in E-commerce platforms due to its role for assisting customers’ buying choices. Furthermore, the most helpful reviews that have some attributes are support customers buying decision; therefore, there is needs for investigating what are the attributes that increase the Review Helpfulness (RH). This research paper proposed novel model called inclusive review helpfulnessmodel (IRHM) can be used to detect the most attributes affecting the RH and build classifier that can predict RH based on these attributes. IRHM is implemented on Amazon.com using collection of reviews from different categories. The results show that IRHM can detect the most important attributes and classify the reviews as helpful or not with accuracy of 94%, precision of 0.20 and had excellent area under curve close to 0.94.