|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2011 | Vol. 33 No.1 |
Paper ID: |
14348
-JATIT |
Title: |
FULL RELATIONSHIP AMONG E-SATISFACTION,
E-TRUST, E-SERVICE QUALITY, AND E-LOYALTY: THE CASE OF IRAN E-BANKING |
Author: |
SOHEILA GHANE, M. FATHIAN, M. R.
GHOLAMIAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 01 - 06 Vol 33. No. 1 -- 2011 |
Abstract |
Customer e-loyalty is an important issue
in the very competitive environment of e-banking. Different studies show that
e-loyalty is influenced by e-satisfaction, e-trust and e-service quality.
However, little attention has been given in the literature to fully understand
the full relationships among them. The purpose of this study is to empirically
investigate the impacts of e-satisfaction, e-trust and e-service quality on
e-loyalty, in e-banking as an aspect of B2C e-commerce context. Data was
collected to test the model from faculties and students of Tehran universities
as respondents, and empirical analyses were performed using SEM. The analytical
results indicate that although service quality, e-satisfaction, and e-trust have
strong direct effect on e-loyalty, impacts of indirect effects (with
e-satisfaction and e-trust playing mediating roles) are more significant.
Additionally, this study represents a framework that indicates the full
relationship among the three factors and their (direct and indirect) effects on
e-loyalty, a phenomenon that has not previously been explored. |
Keywords |
E-Satisfaction, E-Service Quality,
E-Loyalty, Relationship, E-Banking, IRAN |
Full Text |
|
Paper ID: |
14347
-JATIT |
Title: |
A DETAILED STUDY OF MOBILITY MODELS IN
WIRELESS SENSOR NETWORK |
Author: |
VASANTHI.V, ROMEN KUMAR.M, AJITH SINGH.N, M.HEMALATHA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 07 - 14 Vol 33. No. 1 -- 2011 |
Abstract |
Wireless sensor networks (WSN) is
emerging technology finds variety of applications in military, movement
tracking, industries and medical fields. WSNs are self configurable, self
healing networks. This paper is a survey of mobility models that are used in the
simulations of sensor networks. I describe several mobility models that
represent mobile nodes whose movements are independent and dependent of each
other respectively. The goal of this paper is to present a number of mobility
models and their advantage and disadvantages over here to overcome with future
model. With this model researchers get choices when they are deciding upon a
mobility model to use for my future performance evaluations. |
Keywords |
Sensor Network, Mobility Models, Group,
Models |
Full Text |
|
Paper ID: |
14339
-JATIT |
Title: |
A TASKS ALLOCATION ALGORITHM FOR
DISTRIBUTED SYSTEMS |
Author: |
MOSTAPH ZBAKH, MOHAMED DAFIR EL
KETTANI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 15 - 21 Vol 33. No. 1 -- 2011 |
Abstract |
In this paper, we complete and implement
the general problem of tasks allocation. The theoretical part of this work is
developed in our previous work [14] and here we focus our research on the
practical aspect.
The problem is modelled as a non-cooperative game between several players. For
this game, we adopt the Nash equilibrium structure and on the basis of this
structure, we draw a distributed tasks allocation algorithm that can find this
equilibrium. We implement this algorithm by using the MPI environment and a
system of 10 computer sources that generate the tasks and 10 processing
computers. The theoretical and numerical results show that the tasks allocation
strategy obtained leads to a good load balancing of computers |
Keywords |
Tasks Allocation, Game Theory,
Non-Cooperative Game, Nash Equilibrium, Distributed Algorithm, MPI Environment |
Full Text |
|
Paper ID: |
14418
-JATIT |
Title: |
COMPARISON OF PULSED ELECTRIC FIELD
GENERATION TECHNIQUES FOR MICROBIAL INACTIVATION APPLICATION |
Author: |
HANIFAH JAMBARI, NAZIHA AHMAD AZLI,
MOHAMED AFENDI MOHAMED PIAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 22 - 31 Vol 33. No. 1 -- 2011 |
Abstract |
This paper presents a comparative study
on various pulsed electric field (PEF) techniques for liquid food sterilization
applications. Pulsed Electric Field (PEF) is an alternative method compared to
the conventional food pasteurization method in removing harmful bacteria
contained in liquid food products. A Cascaded Multilevel Inverter (CHMI) is
proposed as a PEF generator to produce a higher output voltage without using a
transformer to inactivate microbial in liquid food. It will reduce the power
losses of the system while yielding better sterilization effectiveness as well
as reduce cost. The CHMI has been simulated using MATLAB/Simulink software to
analyze the performance of the circuit. The simulation results demonstrate that
the CHMI can produce both bipolar and unipolar square wave output pulses. This
in turn contributes to the flexibility of the CHMI in testing the effectiveness
of the PEF produced on liquid food sterilization compared to the conventional
method and other power electronics circuits that have been used for similar
application. |
Keywords |
Pulsed Electric Field, Conversional
Method, Cascaded H- Bridge Multilevel Inverter, Simulation |
Full Text |
|
Paper ID: |
14422
-JATIT |
Title: |
SHARP-EDGES METHOD IN ARABIC TEXT
STEGANOGRAPHY |
Author: |
NUUR ALIFAH ROSLAN, RAMLAN MAHMOD,
NUR IZURA UDZIR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 32 - 41 Vol 33. No. 1 -- 2011 |
Abstract |
One of the issues that arise in the text
steganography is the capacity of hiding secret bit. Focusing in Arabic text
steganography we propose a sharp-edges method to encounter the issue. This new
method will hide the secret bits in the sharp-edges for each character in the
Arabic text document. The main processes involved are identifying sharp-edges in
the cover-text, secret message preparation to be hidden as a binary string and
lastly, the bit hiding process. The experiments show that the capacity
percentage used to hide the secret bit was increased up to 37.8%, resolving the
capacity issue. The stego-text for this method has high invisibility, and
therefore it is possible to be published publicly. We introduce keys to
determine the possition of the secret bit randomly. This method utilizes the
advantages of the Arabic text for steganography and can also be implemented to
the same text scripting of languages such as Jawi, Persian or Urdu. |
Keywords |
Steganography, Text Steganograpy, Arabic
Text Steganography, Arabic Character, Sharp-Edges. |
Full Text |
|
Paper ID: |
14437
-JATIT |
Title: |
A COMPARATIVE SURVEY OF DATASHARING
APPROACHES AND THEIR APPLICATIONS IN DISTRIBUTED COMPUTING ENVIRONMENTS |
Author: |
SOFIEN GANNOUNI, HASSAN MATHKOUR,
MUTAZ BERAKA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 42 - 57 Vol 33. No. 1 -- 2011 |
Abstract |
The Internet or distributed computing has
evolved from a simple file sharing mechanism to data source sharing and dynamic
services. This evolution has made data source sharing an urgent necessity at the
present time. Therefore, we should benefit from distributed data sources that
are spread across a network and address current data sharing challenges, which
include masking the heterogeneity between data sources, and between disparate
clients and different communication protocols and formats. In the recent past,
efforts have been made by researchers and private companies to propose
approaches for accessing remote, heterogeneous and autonomous data sources to
share them across a network. Other efforts are looking at these approaches and
concepts with the aim of developing applications in both centralized and
decentralized environments to provide uniform access to and sharing of data
sources. In this paper, we review four data sharing approaches that have been
proposed, namely Transaction Processing Monitors, Tuplespace, Resource
Description Framework and Data Service Approach. For each approach, we will
present its architecture, limitations and problems, as well as applications that
have been developed based on its concepts. Moreover, the most important open
problems related to datasharing systems are briefly highlighted. |
Keywords |
Data Sources, Data Sharing Approaches,
Transaction Processing Monitor, Tuplespace, Resource Description Framework, Data
Service Approach, Open-Source Applications, Proprietary Applications. |
Full Text |
|
Paper ID: |
14496
-JATIT |
Title: |
USERS EXPECTATIONS FEEDBACK CONSISTENCY AS
A FIRST STEP FOR A BETTER DATA QUALITY |
Author: |
L. BRADJI , M. BOUFAIDA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 58 - 68 Vol 33. No. 1 -- 2011 |
Abstract |
User feedback is a new direction employed
to assist users in building data integration systems and to improve their
quality. We claim that the first step to the efficient data quality improvement
in a data integration system is the consistency of user’s expectations feedback
because user(s) can have multiple expectations of the quality of the value and
the content of the query results at the same time. Therefore, in this paper we
propose an approach that allows one to detect user’s expectations quality
problems, especially inconsistency, and so their improvement before their use
for determining the data quality issues at the data sources in the second step.
This approach takes a set of queries from the log file and the user’s
expectations relative to the results of each query to identify and prioritize
the inconsistencies of user’s expectations values. Thus, to accomplish this,
three algorithms are proposed. The first algorithm manages the user’s
expectations inconsistency related to the same query. The second algorithm
divides queries into groups of similar attributes by using the clustering
technique of data mining. As the rerun of the queries is time consuming, the
approach takes samples of data to determine the queries results interactions.
The quality of these samples is determined in advance in order to ensuring the
correctness of queries results interactions. The third algorithm takes both the
queries results interactions and the user’s expectations to address the
inconsistency between the user’s expectations of queries results interactions.
To detect the user’s expectations inconsistencies, we have established a set of
user’s expectations axioms and inference rules, which are used by the algorithm
to deduce an automatic expectation value. This algorithm introduces a solution,
which is inspired from the axioms systems of Logic, to solve the inconsistency. |
Keywords |
Data Integration Systems, Data Quality,
Consistency, User Feedback, User Expectation, Query Results, Clustering, Quality
Of Value, Queries Interactions. |
Full Text |
|
Paper ID: |
14501
-JATIT |
Title: |
SEARCH FOR CYTOLOGY PATTERNS USING THE
GENETIC ISLAND MODEL |
Author: |
JESÚS ALVAREZ-CEDILLO, ISRAEL
RIVERA-ZARATE,JUAN C. HERRERA-LOZADA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 69 - 75 Vol 33. No. 1 -- 2011 |
Abstract |
Island model deals with a species which
is subdivided into a number of discrete finite populations, races or subspecies,
between which some migration process occurs. If the number of populations is
small, an assumption of equal rates of migration between each pair of
populations may be reasonable approximation. In this paper we shown a general
solution is given for the process of population divergence under this model
following subdivision of a single parental population, expressed in terms of the
observed average frequency of cells and explains how to find a zone in an image
that is representative and small enough to optimize the later analysis of the
image in general whether manual or automatic. This diagnostic method will
analyze the behavior of a group of special cells (could be Cancer) |
Keywords |
Cytology Patterns, Genetic Island Model,
Population Divergence, Diagnostic Method |
Full Text |
|
Paper ID: |
14319
-JATIT |
Title: |
MEAN AND DIFFRENTIAL TORQUE CONTROL USING
HYSTERESIS CURRENT CONTROLLER FOR DUAL PMSM DRIVES |
Author: |
JURIFA MAT LAZI, ZULKIFILIE IBRAHIM,
MARIZAN SULAIMAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 76 - 82 Vol 33. No. 1 -- 2011 |
Abstract |
The dual motor drives fed by a single
inverter are purposely designed to reduce size and cost with respect to single
motor drives fed by a single inverter. This paper presents the speed responses
behavior of Dual Permanent Magnet Synchronous Motor (PMSM) driven by Mean and
Differential Torque Control technique. The drive is simulated by using
Hysteresis Current Controller. MATLAB/Simulink is chosen as the simulation
tools. The performance of speed, current and torque responses for Dual Motor
PMSM fed by a single inverter is presented. The applied technique shows
satisfactory speed regulation for a wide range of speed either with load, no
load or variation of load. |
Keywords |
Dual Motor Drives, Single Inverter,
Hysteresis Current Control |
Full Text |
|
Paper ID: |
14490
-JATIT |
Title: |
APPLICATION OF ANFIS SYSTEM IN PREDICTION
OF MACHINING PARAMETERS |
Author: |
MOSTAFA REZAZADEH SHIRDAR,
MEHRBAKHSH NILASHI, KARAMOLLAH BAGHERIFARD, OTHMAN IBRAHIM, S.IZMAN, HOSSEIN
MORADIFARD, NASIM JANAHMADI, MEHDI BARISAMY |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 83 - 92 Vol 33. No. 1 -- 2011 |
Abstract |
Since cutting conditions have an
influence on reducing the production cost and time of machining process and also
the quality of a final product the prediction of output machining parameters
such as surface roughness and tool life criteria for different cutting speed,
feed rate, depth of cut and tool geometry is one of vital modules in process
planning of metal parts. In this study with use of experimental results on
machining of ST-37 and subsequently, ANFIS system, importance of each parameter
was studied. These parameters were considered as input in order to predict the
surface finish and tool life criteria, two conflicting objectives, as the
process performance. In this paper ANFIS system was applied to predict output
parameters of machining. Results show that amount of input influence on the
outputs parameters. By using ANFIS input parameters entered to ANFIS system then
all training data was trained with 300 epochs. After training the value of error
which is 1.039e−006 was calculated. |
Keywords |
Cutting Parameters, Surface Roughness,
Tool Life Criteria, ANFIS System, Fuzzy Logic, Intelligent System |
Full Text |
|
Paper ID: |
14413
-JATIT |
Title: |
APPLYING ISM AND ANN TECHNIQUES IN THE
DEVELOPMENT OF USER EXPECTED COMMAND LOCATION PREDICTING APPROACH |
Author: |
CHUNWEI CHEN |
Source: |
Journal of Theoretical and Applied
Information Technology pp
93 - 103 Vol 33. No. 1 -- 2011 |
Abstract |
The purpose of this research is to
develop a method for obtaining information on user’s expected command location
and to verify its effectiveness in improving the inconsistency between the
command locations of the software application tools and those expected by the
users. This method proposed in this research is called User Expected Command
Location Predicting Approach (UECLPA). It is defined as an approach to
deconstructing user’s expected idea of the command location and transform it
directly to a treelike command element structure. This forecast method for
user’s idea of the command location is characterized with real-time modification
of the predicting results of user’s command locations. These two features are
achieved by Interpretive Structural Modeling (ISM) and Artificial Neural Network
(ANN). In terms of command locations, the inconsistency problem between the
software application tools and the user’s expectation is quite common in current
software application tools. This often causes the users to have bad impressions
on the product or even affect the success of the product. The interface
designers should pay attention to this problem. In this study, users were
invited to operate the old and new interfaces of a software application tool to
verify the effectiveness of UECLPA. Results from the experiment indicated that
there did exist differences between users and designers in the command location
of software application tools. Moreover, UECLPA proposed in this study proved
effective in improving the inconsistency problem between user’s expectation and
the ready-made command location in the software application tool. Therefore, it
is, suggested that before organizing the command locations of software
application tools, the interface designers should understand the users’ ideas
and demands. Last but not least, the application of UECLPA in the planning of
command locations in software application tools will help decrease the
inconsistency problem of software application tools. |
Keywords |
Interface of Software Application Tools,
Command Location Layout, Human-machine Interface, Interpretive Structural
Modeling (ISM), Artificial Neural Network (ANN) |
Full Text |
|
Paper ID: |
14427
-JATIT |
Title: |
AN EFFICIENT AUTOMATED SYSTEM FOR GLAUCOMA
DETECTION USING FUNDUS IMAGE |
Author: |
K.NARASIMHAN, Dr.K.VIJAYAREKHA |
Source: |
Journal of Theoretical and Applied
Information Technology pp
104 - 110 Vol 33. No. 1 -- 2011 |
Abstract |
This paper proposes a new method for the
detection of glaucoma using fundus image which mainly affects the optic disc by
increasing the cup size is proposed. The ratio of the optic cup to disc (CDR) in
retinal fundus images is one of the primary physiological parameter for the
diagnosis of glaucoma. The K-means clustering technique is recursively applied
to extract the optic disc and optic cup region and an elliptical fitting
technique is applied to find the CDR values. The blood vessels in the optic disc
region are detected by using local entropy thresholding approach. The ratio of
area of blood vessels in the inferior-superior side to area of blood vessels in
the nasal-temporal side (ISNT) is combined with the CDR for the classification
of fundus image as normal or glaucoma by using K-Nearest neighbor , Support
Vector Machine and Bayes classifier. A batch of 36 retinal images obtained from
the Aravind Eye Hospital, Madurai, Tamilnadu, India is used to assess the
performance of the proposed system and a classification rate of 95% is achieved. |
Keywords |
Glaucoma, K-Means Clustering, Thresholding,
Fundus Image, CDR, ISNT,K-Nearest Neighbor, Support Vector Machine, Bayesian
Classifier |
Full Text |
|
Paper ID: |
14508
-JATIT |
Title: |
DIVERSITY ANALYSIS IN WIFI SYSTEM |
Author: |
M.HEMALATHA, V.PRITHVIRAJ,
S.JAYALALITHA, K.THENMOZHII |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 111 - 118 Vol 33. No. 1 -- 2011 |
Abstract |
Wi-Fi, a Wireless Local Area Network
technology has solely conquered the arena of short range wireless broadband
systems. To support the existing system and to further enhance the measure of
performance in multipath fading environment, Wi-Fi technology is intertwined
with space diversity technique which is implemented using Alamouti coding and is
then introduced with interleaving/scrambling technique to take the benefit of
time diversity. Diversity technique has been an essential factor in improving
the quality of the wireless system’s operation by providing performance almost
equivalent to that of the least distorted path among various multi paths at any
given time and thereby accounting for the fading effect caused in corruptive
communication channels. This paper discusses the performance of space diversity
techniques in Wi-Fi by comparing their Bit Error Rate (BER). Various channel
models are taken into account to simulate the real time scenario of a noisy
unreliable wireless environment. |
Keywords |
WiFi, WLAN, MIMO, MISO, Diversity, STBC |
Full Text |
|
Paper ID: |
14497
-JATIT |
Title: |
KEY MOTIVATORS FOR IRANIAN E-SHOPPING: A
NEURAL NETWORKS BASED APPROACH |
Author: |
MARYAM GHASEMAGHAEI, BAHRAM
RANJBARIAN, S. AMIRHASSAN MONADJEMI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 119 - 134 Vol 33. No. 1 -- 2011 |
Abstract |
There has been a significant growth in
Internet shopping over the last few years in Iran. However, there is a little
awareness of the effective factors which attract consumers to purchase online.
It has been predicted that the city of Isfahan in Iran will experience a sharp
increase in the Internet usage in the next decade. However, the factors affect
the local e- shopping of different types of products and the demographic
characteristics of the local Internet consumers have received a little direct
research so far. The present study aims to consider the effective factors on
consumer e-shopping behavior and the role of each personal characteristic on
these factors for different types of products. The data were obtained from 412
volunteers who have had the Internet shopping experience, and were analyzed
using MLP neural networks and logistic regression per product. Then, after
comparing the accuracy of these methods, the most essential factors which
motivate the consumers to buy online were determined by a trained neural
network. Finally, a regression analysis was performed to assess the significant
difference between variables of each demographic characteristic per factor. |
Keywords |
Consumer Behavior, Artificial Neural
Networks, Internet Shopping, E-Commerce, Regression. |
Full Text |
|
|
|