|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2012 | Vol. 40 No.1 |
Title: |
SOCIAL KNOWLEDGE NETWORK AS AN ENABLING FACTOR FOR ORGANIZATIONAL LEARNING
|
Author: |
ADEL AL-HASHEM, AMIN SHAQRAH
|
Source: |
Journal of Theoretical and Applied
Information Technology
pp 001 - 008 Vol. 40. No. 1 -- 2012 |
Abstract |
Organizational learning is a set of processes by which organizations improve
their performance. Learning processes furthermore require that the organization
anticipates and attends to feedback, creates knowledge from that feedback, and
takes action based on that knowledge. The relationships among people can be
modeled as social knowledge networks in which network nodes represent people and
network graph represent relationships for sharing opinions, experiences,
insights, perceptions, and various media, including photos, videos, and music,
with each other. Social knowledge networks play supportive role for
collaborative knowledge management phases -creation, capture, codify,
communicate, and capitalize knowledge.
|
Keywords |
Social Knowledge Network, Organizational Learning, Collaborative Knowledge
Network
|
Full Text |
|
Title: |
MINING DATA TO REDUCE SHRINKAGE IN ORGANIZED RETAIL |
Author: |
G.PAVITHRA, R.S.SARANYA, P.S.RAMESH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 009 - 014 Vol. 40. No. 1 -- 2012 |
Abstract |
Shrinkage is a reduction in inventory due to shoplifting, employee theft, paper
work errors and supplier fraud. If the shrinkage amount is large for a company
obviously it will result in the net profit deterioration. In this paper we
propose a model to reduce shrinkage in a retail industry using data mining. The
barcode of a product is taken as the primary key. The access to this key should
be with one trusted party and the remaining database can be accessed by anyone.
Maintaining barcode for the product types such as stationery, groceries will
solve this problem. This is done by using the data mining tool and presented in
a pictorial representation. For instance, in the observed pattern if the
quantity of the barcoded product exceeds the quantity of the product available,
it can be identified as a shoplifted item. Using the tool the data pattern
extracted from the dataset will contain the information of that particular item.
Thus the theft can be identified and prevented. The reliability of our model
lies in the trust of the administrator who can access the primary key. |
Keywords |
Data Mining Tools, Primary key, Shrinkage, Clustering |
Full Text |
|
Title: |
DETECTION OF ELECTRICAL FAULTS IN INDUCTION MOTOR FED BY INVERTER USING SUPPORT
VECTOR MACHINE AND RECEIVER OPERATING CHARACTERISTIC |
Author: |
DIAN R. SAWITRI, I. KETUT E. PURNAMA, MOCHAMAD ASHARI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 015 - 022 Vol. 40. No. 1 -- 2012 |
Abstract |
Fault in induction motor is crucial problem in industrial processes. This paper
presents the system for electrical fault detection in induction motor fed by
inverter. Current spectrum with different frequency is used to fault monitoring.
Faults observed includes variation of frequency, unbalance voltage, and inter
turn short circuits. Through an experiment, the fault was fired and the current
spectrum recorded at steady state condition. Preprocessing is performed before
the identification process. It includes noise reduction using wavelet analysis
and feature extraction with Principal Component Analysis (PCA). Both processes
are intended to eliminate the noise, reducing the dimension of feature, and
retrieve components of the optimal features for classification. Strength of
identification capability using Support Vector Machine (SVM) is 83.51%. Based on
the ROC (Receiver Operating Characteristic) analysis, the SVM classifier has a
good enough performance. This is indicated by the sensitivity is 74.31%,
specificity is 47.30% and G-Mean is 1.1028. |
Keywords |
Electrical Fault Detection, Induction Motor, Principal Component Analysis (PCA),
Receiver Operating Characteristic (ROC), Support Vector Machine (SVM). |
Full Text |
|
Title: |
QUERIES SNIPPET EXPANSION FOR EFFICIENT IMAGES RETRIEVAL |
Author: |
ROOH ULLAH, J. JAAFAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 023 - 028 Vol. 40. No. 1 -- 2012 |
Abstract |
Technological and dynamic growths of digital media have increased volume of the
multimedia corpus. Due to this growth, it is strongly urged for a system that
can efficiently and effectively compiles the user demand, and retrieving the
relevant images. Keyword based system retrieves an image on syntactic matching,
i.e. string matching not concept. Content Based Image Retrieval (CBIR) systems
retrieve the image based on low level features and still exist a gap is called
semantic. This paper discussed snippet technique that covers the semantic gap as
well as Word Sense disambiguation problems. It extracts user queries for
expansion with the help of Knowledgebase WordNet and ConceptNet. Experiments
performed on the open benchmark image dataset LabelMe. A substantial improvement
has been achieved in terms of precision and recall. Remarkably outperformed of
Results and showed 84% corrects. |
Keywords |
Query Expansion, Semantic Gap, LabelMe, WordNet, ConceptNet |
Full Text |
|
Title: |
NEW MODEL FOR TEACHING AND LEARNING TRADITIONAL CRAFT COURSEWARE: ANALYSIS AND
DESIGN PHASE |
Author: |
SALYANI OSMAN, NOR AZAN MAT ZIN, NORAIDAH SAHARI, YUHANIS OMAR, RATNA ZUARNI
RAMLI, NORAZIMAH AWANG |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 029 - 038 Vol. 40. No. 1 -- 2012 |
Abstract |
This research seeks to look into a design process of the development of a model
for teaching and learning traditional craft courseware called CDTC model.
Specifically, this research focuses on analysis and design phase. The model was
developed according to an established methodology and it is relied upon a
conceptual framework consisting of four development phases starting from
Analysis, Design, Development and Evaluation. The research begins with the
preliminary analysis to look into the problems in conventional traditional
apprenticeship method for teaching and learning traditional craft by looking at
students and craft instructors' perceptions. Various weaknesses were identified
in acquiring the craft skills taught to students especially when instructors
need to teach a group of students. The results of analysis helps to suggest and
determine a practical way to map out the suitable teaching environment and
strategy that would best serve for teaching and learning traditional craft. As a
result from initial analysis, the proposed CDTC model for educational courseware
development for teaching and learning traditional craft was developed consisting
of two main components. In Design phase, the proposed CDTC model's components
was evaluated by selected craft instructors through initial validation process
in order to verify its' components. The results from initial validation among
instructors help in establishing and designing a preliminary version of the
model. |
Keywords |
Model development, Traditional craft courseware, Web-based learning, Craft
Education |
Full Text |
|
Title: |
A REVIEW ON WEP WIRELESS SECURITY PROTOCOL |
Author: |
MUHAMMAD JUWAINI, RAED ALSAQOUR, MAHA ABDELHAQ, OLA ALSUKOUR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 039 - 043 Vol. 40. No. 1 -- 2012 |
Abstract |
WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE
(The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP
is widely used in telecommunication field. In daily usage, it had been
phased-out by IEEE since 2005 to be replaced by WPA/WPA2 (Wi-Fi Protected
Access). WEP encryption algorithm can be easily cracked because of its widely
documented weaknesses. Nevertheless, WEP is still has been used extensively as a
research topic in the academic field. Certain enterprises still using WEP due to
lack of security consciousness, economical constraint or because it is difficult
to replace the legacy communication devices in which WEP is already bulged. In
this paper, we give a review on WEP wireless security protocol in terms of its
history, weaknesses, improvements, and current alternative approaches to
overcome its weaknesses regarding the protocol in ICT (Information and
Communication Technology) field. This research aims to address WEP protocol in
its current versions and to give a spirit future direction research to enhance
its security mechanism. |
Keywords |
Rivest Cipher 4 (RC4), Wired Equivalent Protocol (WEP), Wireless Security |
Full Text |
|
Title: |
INTRUSION PREVENTION SYSTEM: A SURVEY |
Author: |
DERIS STIAWAN, ALA YASEEN IBRAHIM SHAKHATREH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 044 - 054 Vol. 40. No. 1 -- 2012 |
Abstract |
For the last few years, the Internet has experienced tremendous growth. Along
with the widespread evolution of new emerging services, the quantity and impact
of attacks have been continuously increasing. Defence system and network
monitoring has become an essential component of computer security to predict and
prevent attacks. This article presents a survey, open issues on early detection,
and response toward prevention network intrusion. Roadmap of intrusion
prevention of current approach is also presented. Furthermore, relevant issues
and challenges in this field are subsequently discussed and illustrated. This
research is expected to obtain learning phase. Finally, this work concludes with
an analysis of the challenges that still remain to be resolved. |
Keywords |
Intrusion Detection - Prevention System, Heterogeneous Parameter |
Full Text |
|
Title: |
STUDY OF ONTOLOGY OR THESAURUS BASED DOCUMENT CLUSTERING AND INFORMATION
RETRIEVAL |
Author: |
G.BHARATHI, D.VENKATESAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 055 - 061 Vol. 40. No. 1 -- 2012 |
Abstract |
Document clustering generates clusters from the whole document collection
automatically and is used in many fields, including data mining and information
retrieval. Clustering text data faces a number of new challenges. Among others,
the volume of text data, dimensionality, sparsity and complex semantics are the
most important ones. These characteristics of text data require clustering
techniques to be scalable to large and high dimensional data, and able to handle
sparsity and semantics. In the traditional vector space model, the unique words
occurring in the document set are used as the features. But because of the
synonym problem and the polysemous problem, such a bag of original words cannot
represent the content of a document precisely. Most of the existing text
clustering methods use clustering techniques which depend only on term strength
and document frequency where single terms are used as features for representing
the documents and they are treated independently which can be easily applied to
non-ontological clustering. To overcome the above issues, this paper makes a
survey of recent research done on ontology or thesaurus based document
clustering. |
Keywords |
Ontology, Thesaurus, Document Clustering, Intelligent Information Retrieval,
Semantics, Wikipedia, WordNet. |
Full Text |
|
Title: |
AUTOMATIC PATIENT MONITORING SYSTEM USING SCATTERNET FOR CRITICAL CARE |
Author: |
SIVARANJANI A, VIGNESH KUMAR K, SATHYA S, SANTHI B |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 062 - 066 Vol. 40. No. 1 -- 2012 |
Abstract |
Wireless sensor network provides a useful method to acquire and monitor the
physiological signals of a patient. Bluetooth has a wide variety of applications
in the medical field. Previously in a patient monitoring system, the
physiological signals of a patient are transferred by using piconet. And it has
some drawbacks such as limited number of nodes and limited communication range.
To overcome these drawbacks, we proposed a system using Bluetooth scatternet. In
this proposed model three piconets are interconnected to form Scatternet Sensor
Network. The first and second piconet consists of one master node (local nurse)
and five slaves nodes (patients). The third piconet consists of one master node
(Chief nurse) and three slave nodes (Chief Doctors). Chief nurse act as a bridge
node, which interconnect three piconets. The patients are at 24×7 critical care.
If anything critical occurs, the Chief Doctor receives the data and sends
acknowledge to the concerned patient. Furthermore, with the help of this system,
medical personnel can take care of a few patients simultaneously, and thus, the
personnel expenses can be reduced. |
Keywords |
Bluetooth, Scatternet Network, Piconet, Physiological Signals |
Full Text |
|
Title: |
PERFORMANCE ANALYSIS OF WOUND ROTOR INDUCTION MOTOR BY DSP BASED ROTOR DYNAMIC
CAPACITOR CONTROL |
Author: |
K.RANJITH KUMAR, S. PALANISWAMI, M.MANIKANDAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 067 - 077 Vol. 40. No. 1 -- 2012 |
Abstract |
The paper presents a novel secondary reactance control technique in the rotor
circuit of a three phase wound rotor induction motor (WRIM). The problem
associated with the conventional rotor capacitive reactance control is the
demand of exceptionally large capacitance requirement for enhancing the
performance of the motor in wide operating range. In the proposed technique, a
three phase bridge rectifier with a dynamic capacitor is used in the rotor
circuit. The dynamic capacitor is H-bridge circuit with a capacitor in which the
duty cycle of switching elements is varied for emulating the capacitance value
dynamically and to be used as capacitive reactance control. A TMS320F2407
Digital Signal Processor (DSP) controller is used for delivering Pulse Width
Modulation (PWM) pulses for appropriate switches. The performances such as
speed, torque, power factor, efficiency, harmonics of the motor are analyzed for
different speed and loading conditions. The feasibility of the proposed system
is verified by simulation and experimental results. |
Keywords |
Wound Rotor Induction Motor (WRIM), DSP Controller, Dynamic Capacitor (DC),
Secondary Reactance Control, Rotor Capacitive Reactance Control (RCRC), Pulse
Width Modulation (PWM). |
Full Text |
|
Title: |
AN INTEGRATED APPROACH TO RAPID AUTOMATED SERVICE DISCOVERY OF SEMANTIC WEB
SERVICE |
Author: |
MICHAEL RAJ T.F |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 078 - 082 Vol. 40. No. 1 -- 2012 |
Abstract |
The development of Web services has transformed the World Wide Web into a more
application-aware information portal. Web services are interoperable and
extensible and there are possibilities for simple services to be clustered to
build complex ones. To improve the automation of web services selection a lot of
techniques and technologies are recommended. Web service selection in a web
service group is an emerging research topic. In this paper we propose an
integrated model for web service selection and clustering can be done from a web
service group. The proposed model builds up a lightweight integrated model. |
Keywords |
Semantic Web Services(SWS),Clustering Web Services, Ontologies |
Full Text |
|
Title: |
FEATURE EXTRACTION TECHNIQUE FOR HANDWRITTEN INDIAN NUMBERS CLASSIFICATION |
Author: |
SALAMEH A. MJLAE , SALIM A. ALKHAWALDEH , SALAH M. AL-SALEH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 083 - 088 Vol. 40. No. 1 -- 2012 |
Abstract |
In this paper, we propose a recognition technique for handwritten Indian
numbers. Due to the variations in shapes and sizes of handwritten Indian
numbers, image representation, smoothing, skeletonization and localization
processes are applied to further improve the classification performance. We
employ five efficient classifiers RNN, DROP 1, DROP 2, DROP 3 and DROP 4 in our
technique. New feature extraction method that divides the image of the
handwritten Indian number into 16 sub blocks and 24 partition lines is proposed.
For this feature extraction, a vector set is built with 41 attributes
representing 16 sub blocks, 24 partition lines and one for the possibility of
getting closed loop. Simulation results show that the above classifiers with the
new proposed feature extraction improve the recognition accuracy with acceptable
subset size. It is noted that DROP 3 method has the highest classification
accuracy with good reduced memory size compared to other methods. |
Keywords |
Feature Extraction, Pre-processing, Classification, Pattern Attributes, Indian
Numerals |
Full Text |
|
Title: |
AN AUTOMATIC APPROACH FOR GENERATING TABLES IN SEMANTIC WIKIS |
Author: |
LULUAH AL-HUSAIN, SAMIR EL-MASRI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 089 - 097 Vol. 40. No. 1 -- 2012 |
Abstract |
Wiki is well-known content management systems. Semantic wikis extends the
classical wikis with semantic annotations that made its contents more
structured. Tabular representations of information have a considerable value,
especially in wikis which are rich in content and contain large amount of
information. For this reason, we propose an approach for automatically
generating tables for representing the semantic data contained in wiki articles.
The proposed approach composed of three steps (1) extract the semantic data of
Typed Links and Attributes from the wiki articles and call them Article
Properties (2) cluster the collection of wiki articles based on extracted
properties from the first step, and (3) construct the table that aggregates the
shared properties between articles and present them in two-dimensions. The
proposed approach is based on a simple heuristic which is the number of
properties that are shared between wiki articles. |
Keywords |
Clustering, Semantic wikis, Resemblance Metric Wiki |
Full Text |
|
Title: |
AN IMPROVED APPROACH IN FLOODING WITH PACKET REACHABILITY IN FSR (FISHEYE STATE
ROUTING) PROTOCOL USING MANET |
Author: |
S. NITHYA REKHA, Dr.C.CHANDRASEKAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 098 - 104 Vol. 40. No. 1 -- 2012 |
Abstract |
Packet Reach ability and Broadcasting in Mobile Ad Hoc Networks (MANETs) is a
fundamental data dissemination mechanism with a number of important
applications, e.g., route discovery, address resolution. However broadcasting
induces what is known as the ‘‘broadcast storm problem’’ which causes severe
degradation in network performance due to excessive redundant re- transmission,
collision, and contention. Broadcasting in MANETs has traditionally based on flooding,
which simply swamps the network with large number of rebroadcast messages in
order to reach all network nodes. Although probabilistic flooding has been one of
the earliest suggested schemes to broadcasting, there has not been so far any
attempt to analyze its performance behavior in a MANET environment. In an effort
to fill this gap, this paper investigates using extensive NS-2 simulations the
effects of a number of important system parameters in a typical MANET, including
node speed, pause time, and node density on the performance of probabilistic flooding.
The results reveal that most of these parameters have a critical impact on the
reach ability and the number of saved rebroadcast messages achieved by
probabilistic flooding |
Keywords |
MANET, FSR (Fisheye State Routing) Protocol, Broadcasting, Flooding Probability,
Saved Broadcasting, Packet Reach Ability, Node Speed, Pause Time, Mobility, NS2 |
Full Text |
|
Title: |
BE AGILE: PROJECT DEVELOPMENT WITH SCRUM FRAMEWORK |
Author: |
SOUMYADIPTA PAUL, K. JOHN SINGH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 105 - 112 Vol. 40. No. 1 -- 2012 |
Abstract |
Today IT companies are facing the toughest competition to deliver their products
with high quality within time. The rapid changes of the behavior of the industry
and all new inventions of technologies in different fields, it becomes really
challenging to develop and deliver a large software product within time with
full customer satisfaction. Over all the industry is getting very spry in
nature. On other hand software is something we cannot see unless it is fully
working or providing some output. Now human cannot predict the future or plan
for uncertain changes in distant future. So to support the flexibility of the
market the development process of such project also needs to be more flexible,
more agile. Therefore agile software development methodology helps to develop a
project in iterative and incremental way and scrum is one of the frameworks
which help to implement agile methodology in a software project development. |
Keywords |
Agile Methodology, Scrum, Iterative and Incremental Development |
Full Text |
|
|
|