|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2012 | Vol. 38 No.1 |
Title: |
ARABIC TEXT CATEGORIZATION: A COMPARATIVE STUDY OF DIFFERENT REPRESENTATION
MODES |
Author: |
ABIDI KARIMA, ElBERRICHI ZAKARIA, TLILI
GUISSA YAMINA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 001 - 005 Vol 38. No. 1 -- 2012 |
Abstract |
The quantity of accessible information on Internet is phenomenal, and its
categorization remains one of the most important problems. A lot of work is
currently focused on English rightly since; it is the dominant language of the
Web. However, a need arises for the other languages, because the Web is each day
more multilingual. The need is much more pressing for the Arabic language. Our
research is on the categorization of the Arabic texts, its originality relates
to the use of a conceptual representation of the text. For that we will use
Arabic WordNet (AWN) as a lexical and semantic resource. To comprehend its
effect, we incorporate it in a comparative study with the other usual modes of
representation (bag of words and Ngrams), and we use different similarity
measures. The results show the benefits and advantages of this representation
compared to the more conventional methods, and demonstrate that the addition of
the semantic dimension is one of the most promising approaches for the automatic
categorization of Arabic texts. |
Keywords |
|
Full Text |
|
Title: |
E-SERVICE QUALITY STRATEGY: ACHIEVING CUSTOMER SATISFACTION IN ONLINE BANKING |
Author: |
Dr. MOHAMMED A. T. AL SUDAIRI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 006 - 024 Vol 38. No. 1 -- 2012 |
Abstract |
Customer satisfaction is a challenging task in today’s competitive world of
e-businesses. Among these e-businesses is banking sector business. These
businesses are tremendously trying to deploy customer relationship management
and improve the connections between the business and customer for their
satisfaction. Online banking offers facilities and services to the customers
where as the role of IT is very dominant factor for improving the quality of
services to achieve customer satisfaction. So the objective of our research
study is to build a customer satisfaction strategy and measuring e-service
quality by relating it to the web service quality. This requires formulating a
strategy of building the framework for web based e-service quality model in
internet banking services. This paper will discuss the literature review of
different models related to online banking for the customer satisfaction which
can lead to build and measure an innovative e-service model that is applicable
to evaluate the web based internet banking service quality. |
Keywords |
Customer Satisfaction, Satisfaction Strategy, e-Service Quality, e-business,
KPPV, Arabic wordnet , N-grams |
Full Text |
|
Title: |
THE CONCEPT OF HEIGHT IN A MATRIX AND RELATED PROPERTIES |
Author: |
RT. PANNEER SELVAM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 025 - 030 Vol 38. No. 1 -- 2012 |
Abstract |
Matrix has no value whereas a determinant has a value. An attempt is made to
associate a value to a matrix, whose elements are integers. For that, a concept
of “Height” is introduced in the matrices over Z. As soon as an integral value
is associated with every matrix, an attempt is made to introduce odd, even and
prime matrices etc. Then related number theoretical properties are proved. |
Keywords |
Integral matrices, Odd and Even Matrices - Prime and Composite Matrices, Basic
Prime Matrix, Relatively Prime Matrices, GCD of two Matrices, Congruences of two
Matrices |
Full Text |
|
Title: |
PUBLIC TRANSPORT TICKETING AND MONITORING SYSTEM |
Author: |
V.VENKATAKRISHNAN, R.SEETHALAKSHMI
|
Source: |
Journal of Theoretical and Applied
Information Technology
pp 031 - 034 Vol 38. No. 1 -- 2012 |
Abstract |
Controlling the traffic is one of the important and the major issues. The
purpose of the paper is to develop a public transportation system using GPS, GSM,
RFID and Zigbee which acts as user friendly to the user. The entire network
comprises of three modules; Base Station Module, In-Bus Modules and Bus Stop
Module. The base station module consists of monitoring system which includes GSM
and a PC. The In-Bus Modules consists of two Microcontrollers, GSM Modem, GPS,
Zigbee, RFID, LCD and infrared sensor. RFID for ticketing purpose, GSM, GPS is
used for mobile data transmission and tracking location. The Zigbee module is
also interfaced with the microcontroller which is used to send the bus
information to bus stop and to get the information from the bus stop to bus. The
Bus Stop Module is fixed at every bus stop consists of zigbee node which is
interfaced with the Microcontroller. The public transport service can be
effectively implemented by deploying the concept of this paper and quality of
the service can be improved. |
Keywords |
RFID, Ticketing, GPS, Zigbee, GSM |
Full Text |
|
Title: |
FIELD STUDY BASED ON SOFT COMPUTING TECHNIQUES |
Author: |
KARTHIGA. N, B. SANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 035 - 040 Vol 38. No. 1 -- 2012 |
Abstract |
Usage of soft computing techniques in field study saves human labor. Field study
plays a vital role in the economic importance of agriculture which in turn
results in poverty reduction. Farmers guess the solutions to the disease based
on the loss of plant life that occurred previously. Technology is used to
support farmers and botanist which give precise solution for the vague input
information. The human labor used in the existing system is replaced with
technology in the proposed system which reduces the time complexity, increases
the performance and overcomes the lack of satisfaction. Decision Support System
is the computer-based expert information system to predict the output response
of field with respect to the input parameters. Fuzzy Control application is
programmed in Fuzzy Control Logic (FCL). In fuzzification the value of the input
variables are converted into degrees of membership for the membership functions
defined on that variable. Fuzzy set is any set that allows its members to have
different grades of membership in the interval [0, 1]. Smartness of the fuzzy
depends on the rule evaluation. The performance of the fuzzy machine is
restricted by the capability of human brain. DSS based fuzzy system provides
interactive, flexible and quick decision making. Use of latest technology
provides profitable performance to the farmers. The limitations in existing
system are overcome by using relational database which is used as database in
field study through which large queries can be handled easily. Fuzzy logic is a
powerful concept of handling non-linear, time-varying, adaptive systems. The
knowledge-driven DSS is created for crop management in proposed system. |
Keywords |
Soft Computing techniques, Decision Support System (DSS), Fuzzy Logic (FL) |
Full Text |
|
Title: |
CLOSED LOOP CONTROL OF A NOVEL EFFICIENT THREE OUTPUT PORTS DC-DC CONVERTER WITH
ZERO VOLTAGE SWITCHING |
Author: |
T. NAGESWARA RAO, DR. V.C. VEERA REDDY |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 041 - 048 Vol 38. No. 1 -- 2012 |
Abstract |
Multiport converters, a promising concept for alternative energy systems, have
attracted increasing research interest recently. Compared with the conventional
approach that uses multiple converters, a multiport converter promises
cost-effective, flexible and more efficient energy processing by utilizing only
a single power stage. This paper presents a three output port single stage
converter. To reduce the switching losses and henceforth to improve efficiency
of converter system, Zero Voltage Switching (ZVS) is employed. The proposed
multi output port converter with soft switching is simple and efficient. The
analysis is carried out for both open loop and closed loop control. The
simulation results for the same are presented in this paper. |
Keywords |
Multiport DC-DC converter, Single stage converter, Zero Voltage Switching, Soft
Switching, Closed Loop Control of DC-DC Converter. |
Full Text |
|
Title: |
FINGERPRINT LOOKUP-AN EFFECTIVE AND EFFICIENT BACKUP USING DEDUPLICATION
TECHNIQUE |
Author: |
VELVIZHI J, BALAJI C G |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 049 - 054 Vol 38. No. 1 -- 2012 |
Abstract |
Data deduplication avoids redundant data in the storage of backup operation.
Deduplication reduces storage space and overall amount of time. In this system,
files that contain data are split into chunks by using context aware chunking
and fingerprints lookup to each chunk. Backup storage process is for avoiding
duplicate data using fingerprints lookup. In this paper, we compare three
methodology of backup systems such as full backup, cumulative incremental backup
and differential incremental backup. Full backups contain all data file blocks.
Cumulative incremental backups contain blocks from level n-1 or lower.
Restoration speed is faster than differential incremental backup but storage
space occupy much more. Differential incremental backups contain only modified
blocks from level n or lower. The processes of differential incremental backup
in which data objects changes made since the last full backups are copied. |
Keywords |
Deduplication, Chunking, Fingerprint lookup, LRU Table Management |
Full Text |
|
Title: |
QUALITY-BIASED RETRIEVAL IN ONLINE FORUMS |
Author: |
AMEER TAWFIK ALBAHAM, NAOMIE SALIM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 055 - 062 Vol 38. No. 1 -- 2012 |
Abstract |
This paper presents an ongoing research in utilizing content quality to enhance
thread and post retrieval tasks in support oriented forums. First, we adapt the
established information quality approach as a theoretical way to understand
quality. Then, we outline research areas that help in quantifying quality.
Lastly, we propose to use learning to rank method to weight quality parameters
while ranking. |
Keywords |
Online Forums, Information Quality (IQ), Information Retrieval (IR), Learning To
Rank (LTOR) |
Full Text |
|
Title: |
MODELING BIO INSPIRED SYSTEMS: TOWARD A NEW VIEW BASED ON MDA
|
Author: |
SEIF EDDINE MILI , DJAMEL MESLATI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 063 - 073 Vol 38. No. 1 -- 2012 |
Abstract |
Biologically inspired complex systems are increasing. As the abstractions
presented by biologically inspired systems, systems architects will be required
to include the abstractions in their architecture in order to communicate the
design to system implementers. The paper argues that in order to correctly
present the architectures of bio inspired system a need of bio inspired views
will be required. The paper describes a new formalism based on biology and Model
Driven Architecture (MDA) in order to find a new and easy way to design and
understand (reverse engineering) a complex bio inspired system. The paper also
describes then a set of bio inspired views which are used when describing bio
inspired system. Finally we use the proposed approach to model Xor artificial
neural network. |
Keywords |
Bio Inspired System, Model Driven Architecture, Architectural Units, Design
Pattern, Neural Network |
Full Text |
|
Title: |
A NOVEL CRYPTOGRAPHIC ARCHITECTURE |
Author: |
R THANUJA, S DILIP KUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 074 - 078 Vol 38. No. 1 -- 2012 |
Abstract |
The goal of cryptography is to make it possible for two people to exchange a
message in such a way that other people cannot understand the message. There is
no end to the number of ways this can be done, but here we will be concerned
with methods of altering the text in such a way that the recipient can undo the
alteration and discover the original text. Today the modern cryptography is
based on efficient algorithms for encryption that is used to provide better
security. Asymmetric and Symmetric are nowadays designed with some complex
function or key generations concept to provide security service in better
manner. But, still now there are some attacks are reported even on modern
cryptographic algorithms. In this paper we are going to propose a Novel
Cryptographic architecture that uses IDEA &BLOWFISH algorithm for encryption
purposes and using of SHA-I for generating hash value for cipher text in order
to provide a strong cryptographic architecture. |
Keywords |
Cryptographic Architecture, Hybrid Approach, Block Cipher, Hashing Algorithm |
Full Text |
|
Title: |
REVIEW ON SECURITY PROTOCOLS IN WIRELESS SENSOR NETWORKS |
Author: |
P.S RAMESH, F. EMILY MANOZ PRIYA, B.SANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 079 - 082 Vol 38. No. 1 -- 2012 |
Abstract |
Security in Wireless Sensor Network plays an important role in the node
communication. The significant growth is existed for developing the wireless
sensor network applications. The key features of Wireless sensor networks are
low power, low-memory, low-energy and having bulky scaled nodes. Due to this
various facts the existing security algorithms are not appropriate for current
applications. This causes the research to propose the novel security mechanisms
which contains minimum resource consumption and maximum security. Many papers
have been developed in this field. This paper is to isolate the security issues
in layer level, key management and routing framework. |
Keywords |
Wireless Sensor Network, Security, Routing, Key Management |
Full Text |
|
Title: |
RETROSPECTION OF SVM CLASSIFIER |
Author: |
NANDHINI.K, B.SANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 083 - 088 Vol 38. No. 1 -- 2012 |
Abstract |
SVM (Support Vector Machine) is a supervised learning which is a boon in
disguise to the field of machine learning. Though a number of classifier seems
to exist it gives better result and recognition rates for which it is opted the
most. The other brighter side of SVM is that it minimizes the empirical error
and maximizes the geometric region. Neural network has weakness such that they
converge only to the locally best solutions. Whereas, SVM is far improved. SVM
has the capability to select its own support vectors. In case of Back
Propagation algorithm, we should know in advance the value of the output and
once we receive a value after passing through the neurons, the two values are
compared and if there is no match found, backtracking is done as a result of
which weights are varied to obtain the exact value. The computational complexity
is going to be very great. It proves to be a useful tool when the data is not
regular or when the distribution is unknown. SVM gains its flexibility from the
kernel which in turn makes it successful. This can provide a unique solution
whereas neural networks have multiple solutions for each minima so it does not
seem to be robust for different samples. The greater recognition rate and
flexibility makes SVM popular. Accuracy, recognition rate is very important for
the purpose of classification, only then authentication can be done effectively.
This study has been evolved to reveal that SVM gives good accuracy and
recognition rate compared to other classifiers and hence it is considered best
for gait recognition. |
Keywords |
Support Vector Machine (SVM), Accuracy, Efficiency, Biometrics |
Full Text |
|
Title: |
ANALYZING CONSUMER INTENTION TO PAY FOR ONLINE CONTENT: A SYSTEMATIC APPROACH |
Author: |
SAMEER DUTTA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 089 - 102 Vol 38. No. 1 -- 2012 |
Abstract |
Using the Theory of Planned Behavior and Rogers’s Innovation Diffusion Theory a
systematic model is developed to predict consumer intention to pay for online
content. Results of data analyzed through structural equation modeling suggest
that consumer attitude and subjective norms are significant predictors of such
intention whereas perceived behavioral control is not. Implications of the
results are discussed. |
Keywords |
Online Content, E-Commerce, Attitude, Intentions, Innovation |
Full Text |
|
Title: |
USING OF LDPC CODES IN STEGANOGRAPHY |
Author: |
I. DIOP1, S .M FARSSI, M.CHAUMONT,
O. KHOUMA, H. B DIOUF, K .TALL, K .SYLLA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 103 - 109 Vol 38. No. 1 -- 2012 |
Abstract |
Steganography is the art of secret communication [1] Since the advent of modern
steganography, in the 2000s, many approaches based on error correcting codes
(Hamming, BCH, RS ...) have been proposed to reduce the number of changes in the
roof while inserting the maximum bit. Jessica Fridrich's works have shown that
sparse codes best approach the theoretical limit of efficiency of insertion. Our
research works are a continuation of those on low-density codes (LDGM) proposed
by T. Filler in 2007. In this paper we propose a new approach to correcting
codes using LDPC codes rather than LDGM. The complexity of our approach is much
less than that of T. Filler which makes it usable in practice. |
Keywords |
LDPC Codes, Encoding, Decoding, Steganography |
Full Text |
|
Title: |
GUIDELINES FOR TACIT KNOWLEDGE ACQUISITION |
Author: |
ADEL HAMDAN MOHAMMAD, NEDHAL ABDUL
MAJIED AL SAIYD |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 110 - 118 Vol 38. No. 1 -- 2012 |
Abstract |
Knowledge is mainly divided into two parts explicit and tacit. There are several
studies which talk about explicit knowledge, but actually few studies talk about
tacit knowledge. Tacit knowledge is an important issue which needs more
exploration so authors are recently focusing on. The nature of tacit knowledge
makes acquiring and extracting tacit knowledge not an easy task since it is
complicated in its nature. As a result this research talks about tacit
knowledge. Also authors explain main characteristics of tacit knowledge. Authors
think that this research is worth reading because it covers and analyzes most
relevant research which talks about tacit knowledge. More over it develops
guidelines for acquiring and extracting tacit knowledge. This developed
Guideline can be used for almost large organizations with a little adaptation
related to job nature of the organizations. Finally, applying our guideline will
facilitate acquiring tacit knowledge without wasting a huge amount of cost or
effort. |
Keywords |
Knowledge, Knowledge Acquisition, Tacit Knowledge, Tacit Knowledge Guidelines,
Tacit Knowledge Characteristics |
Full Text |
|
|
|