|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2012 | Vol. 40 No.2 |
Title: |
GA-SVM WRAPPER APPROACH FOR GENE RANKING AND CLASSIFICATION USING EXPRESSIONS OF
VERY FEW GENES |
Author: |
N.REVATHY, Dr. .R. BALASUBRAMANIAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 113 - 119 Vol. 40. No. 2 -- 2012 |
Abstract |
Recently in the classification and diagnosis of cancer nodules, Gene expression
profiling by micro array techniques are playing a vital role. Various
researchers have proposed a number of machine learning and data mining
approaches for identifying cancerous nodule using gene expression data. But,
these existing techniques have certain limitations that do not handle the
particular needs of gene micro array examination. Initially, micro array data is
featured by a high-dimensional feature space repeatedly exceeding the sample
space dimensionality by a factor of 100 or higher. Moreover, micro array data
consists of a high degree of noise. Most of the conventional approaches do not
adequately handle with the limitations like dimensionality and noise. Gene
ranking techniques are later proposed to overcome those problems. Some of the
widely used Gene ranking techniques are T-Score, ANOVA, etc. But those
approaches will sometimes wrongly predict the rank when large database is used.
To overcome these issues, this paper proposes an efficient feature selection
technique. Wrapper feature selection approach called the GA-SVM approach is used
for the effective feature selection of genes. Then, the selected features are
given as input to the classifier. The classifier used in the proposed technique
is Support Vector Machine (SVM). The experiment is performed on lymphoma data
set and the result shows the better accuracy of classification when compared to
the standard SVM with T-Score method. |
Keywords |
Feature subset Selection, GA-SVM, Support Vector Machine |
Full Text |
|
Title: |
A FRAMEWORK FOR EVALUATING SOA GOVERNANCE FRAMEWORKS |
Author: |
FAZILAT HOJAJI, MOHAMMAD REZA AYATOLLAHZADEH SHIRAZI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 120 - 130 Vol. 40. No. 2 -- 2012 |
Abstract |
While there are several SOA governance frameworks to serve SOA implementation in
organizations, no systematic evaluation of these frameworks has been proposed.
As a result, it is difficult to select a framework to address SOA governance
requirements. Also, there are no methods for determining advantages and
weaknesses of each framework. To resolve these problems, we devise a framework
for evaluating and comparing SOA governance frameworks. The framework is
designed to assess evaluation across the spectrum of substantive fields. It
focuses on four major aspects of a SOA governance framework: concepts and
properties, qualitative features, SOA governance focus areas, and pragmatics.
The evaluation framework ensures that a complete picture of all aspects of SOA
governance can be achieved. We demonstrate the usage of the suggested framework
by evaluating Open Group framework. This evaluation identifies the strengths and
the weaknesses of Open Group, and also exemplifies the capabilities of our
framework. |
Keywords |
SOA Governance, Evaluation Framework, Qualitative Features, SOA Governance
Framework |
Full Text |
|
Title: |
AVOID CAMOUFLAGED USERS ON A SOCIAL NETWORKS USING URGA |
Author: |
DURGA SHANKAR BAGGAM, SALINA ADINARAYANA, RAGHURAMAN.K |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 131 - 134 Vol. 40. No. 2 -- 2012 |
Abstract |
Social network Sites (SNS) are the major source for social capital[6], now a
day’s dynamic mining [2] is a part of its activity for many organizations.
Interestingly on the other end we can see that most of the users are having more
than one registration on social networks [6] has been associated with two fold
effects in positive and negative shades. Many young users are using these
networks for adolescents [10] and for downloading free entertainment stuff,
which may leads to lot of fake user registrations. Just receiving invitation to
their emails, creates some of the user profiles and it then pulls the userdata
of the mail account. The profile created may not be correct and this was copied
[11] may lead to false or redundant information on the network domain. This
became a common problem for all organizations, websites who are associated with
the SNS to find many facts like number of users registered and tracking any
person also sometime it may leads to ambiguity problem. As one may contain more
than one profile created by her/him intentionally or unknowingly generated by
anyone way specified above. Recent issues on SNS says that most of the Popular
Indian film actress were defamed with fake user profiles which were created in
Twitter by unknown persons and posted some morphing photos and cheap comments.
These acts attracted most researchers to concentrate on providing solutions. The
best feasible solution is the Centralized database, which may not be feasible
for heterogeneous databases. so to overcome this we are proposing a technique in
this paper known as URGA(User Registration Gateway Algorithm). |
Keywords |
Social Capitals, RP(Registration page), DRS(Data Retrieval System), LD(Logical
Database), ADSM(Adaptive Database Service Manager), URGA(User Registration
Gateway Algorithm), UR-POLICY, RL(Record linkage) |
Full Text |
|
Title: |
GLEANING DISASTER RELATED INFORMATION FROM WORLD WIDE WEB USING GATE |
Author: |
IJAZ AHMED, QAZI MUDASSAR ILYAS, JAVERIA AJOON, MEHTAB AFZAL |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 135 - 142 Vol. 40. No. 2 -- 2012 |
Abstract |
SAHARA is a framework proposed by the authors of this paper to integrate
Semantic Web and Natural Language Processing tools, to timely collect and
disseminate disaster information to stakeholders to help in disaster management.
This paper is related with information extraction component of SAHARA and
presents a set of rules developed in GATE to extract disaster related
information from online text resources. The developed pattern-action rules can
be used to extract disaster entities including disaster location, type,
magnitude, date and number of dead, injured, lost, homeless and affected people.
A corpora is developed for various types of disasters such as earthquakes,
hurricanes, floods, tsunami, forest fires, suicide bombing and military
operations. The developed rule set is tested against this corpora. We achieved
varying results for overall precision, recall and f-measure of extracted
entities. The best results were achieved for disaster magnitude and the worst
for date and time. |
Keywords |
Information Extraction, NLP (Natural Language Processing), GATE (General
Architecture For Text Engineering), Semantic Disaster Management System |
Full Text |
|
Title: |
PROTOCOL FOR ADVANCED WIRELESS SENSOR NETWORKS |
Author: |
TULASI DWARAKANATH.V, D.MANIVANNAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 143 - 146 Vol. 40. No. 2 -- 2012 |
Abstract |
The Wireless Sensor Network (WSN) comprises of the nodes with the low power
processors having very limited resources and is deployed in field to sense and
analyze the data. The protocols used in the sensor network must be simple. The
data collected by the node is transmitted over the sensor network is
encapsulated with the IP satisfying the requirements of 6LoWPAN [3]. The
computation overhead on the sensor node must be less in order to increase the
life of a Sensor Node. The Simple Data Transmission (SDT) Protocol is used to
encapsulate the data collected by the node. The SDT protocol has the provision
of choosing the type of data to be collected by the node at various instances.
The SDT protocol is developed to collect the data from the various sensors on
the board to frame the data and to actuate a sensor on the board according to
the requirement of the application. |
Keywords |
WSN, 6LowPAN, SDT, Protocol, Computation Overhead |
Full Text |
|
Title: |
A REVIEW OF SPEECH RECOGNITION WITH SPHINX ENGINE IN LANGUAGE DETECTION |
Author: |
MORCHED DERBALI, MUTASEM JARRAH, MOHD TAIB WAHID |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 147 - 155 Vol. 40. No. 2 -- 2012 |
Abstract |
Speech recognition is the process of the computer identifying human speech to
generate a string of words or commands. The output of speech recognition systems
can be applied in various fields. Besides, there are many artificial intelligent
techniques available for Automatic Speech Recognition (ASR) development, and
hybrid technology is one of it. The common hybrid technique in speech
recognition is the combination of Hidden Markov Models (HMMs) and Artificial
Neural Networks (ANNs). In this research, Sphinx approach is applied to
integrate the advantage of the sequential modeling structure and its pattern
classification. Outcome from this paper will assist in next phase of the
research which is focusing on building an Arab language speech recognizer by
Sphinx4 engine process approach. |
Keywords |
Speech Recognition, Automatic Speech Recognition (ASR), Real-Time Operation,
Sphinx. |
Full Text |
|
Title: |
ADVANCED CONTROL OF ACTIVE RECTIFIER USING SWITCH FUNCTION AND FUZZY LOGIC FOR
NONLINEAR BEHAVIOUR COMPENSATION |
Author: |
SAIDAH, M. HERY PURNOMO, M. ASHARI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 156 - 161 Vol. 40. No. 2 -- 2012 |
Abstract |
Power Semiconductor switches of active rectifier are characterized by highly
nonlinear property, resulting in high harmonic distortion and high ripple
voltage on the DC side. This paper presents advanced control using switch
function and fuzzy logic for compensating nonlinear behaviour. The system
applies switch function of time as the input of control strategy, instead of
current and voltage in d-q frame. The fuzzy logic controller aims to minimize DC
voltage deviation by regulating the line current amplitude. This system uses
minimum number of sensors, which is the voltage only to avoid the effect of
sensor nonlinearity to the system. This performance is demonstrated and compared
with PI-optimized controller. Simulations result have been conducted for
variation values of capacitance, inductance and loads. The results show that the
harmonic distortion and the ripple voltage on the DC side are 0.036 % compared
PI-optimized controller as 5.64 %. |
Keywords |
Fuzzy Logic Controller, PI-optimized, Harmonic Distrotion, Optimized Controller |
Full Text |
|
Title: |
CEA FRAMEWORK: A SERVICE ORIENTED ENTERPRISE ARCHITECTURE FRAMEWORK (SOEAF) |
Author: |
ELAHE NAJAFI, AHMAD BARAANI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 162 - 171 Vol. 40. No. 2 -- 2012 |
Abstract |
Enterprise architecture (EA) is a new approach that organizations should
practice to align their business strategic objectives with information and
communication technology (ICT). Enterprise Architecture encompasses a collection
of different views and aspects of the enterprise which constitute a
comprehensive overview. Such an overview cannot be well-organized regardless of
incorporating a logical structure called Enterprise Architecture Framework (EAF).
EAF presents a comprehensive and transparent map of an organization showing how
all organization elements (business and IT) work together to achieve defined
business objectives. It clarifies the way in which these elements support the
business processes of the organization.
Several distinctive EAF have been proposed till now, the main challenges any of
these EAF faced are (1) defining process is heavy, prolonged and tedious (2)
Keeping EA artifacts up-to-date is an awkward work. These challenges make the
artifacts of EA useless and unreliable.
A number of researchers and practitioners try to eliminate these challenges by
using Service Oriented (SO) paradigm with common and famous EAF like Zachman and
FEAF. But none of them completely clarify how SO practices with EA concepts
combination may be realized and what are the important elements of it, they just
show an abstract mapping between these two concepts and state that this
combination can be possible. In this article we try to present a service
oriented EAF (SOEAF) to eliminate aforementioned challenges and elaborated this
framework in details. CEA Framework involves a SO Roadmap that is completely
compatible with ITIL and a Classification Schema that cover all aspects of
organization, these aspects categorize according to Purpose, Pattern or
Practice, Policy, Stakeholder and Resource.
We believe that by using the proposed SOEAF referred to as CEA Framework,
created enterprise architecture is flexible and agile enough to define rapidly
and sense the environment quickly then, adapt and adopt business and information
changes appropriately. |
Keywords |
Enterprise Architecture, Service Oriented Enterprise Architecture (SOEA),
Service Oriented Enterprise Architecture Framework (SOEAF), Enterprise
Architecture Framework (EAF), Information Technology Infrastructure Library (ITIL),
Agile Enterprise Architecture (AEA), Agile Enterprise Architecture Framework (AEAF) |
Full Text |
|
Title: |
IMPACT OF INFORMATION TECHNOLOGY ON EMPLOYMENT OF WOMEN IN SAUDI ARABIA |
Author: |
SULAIMAN A. AL-HUDHAIF, NISAR AHAMAD NALBAND |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 172 - 177 Vol. 40. No. 2 -- 2012 |
Abstract |
The world across and in Saudi Arabia, women’s roles, has been traditional. Saudi
laws are based on the Shari’a, which besides giving much freedom to women
guarantees a right to work as well, but practice stipulates that women should
work in a decent, appropriate environment, that is, not mixing with men or being
exposed to nuisance. Hence, gender segregation in professional jobs is
prominently seen. The focus of this paper is on the use of information and
communications technologies (ICT) to generate employment for women, particularly
in a country like Saudi Arabia, where cultural barriers are present; attention
is paid to explaining about the challenges for women’s employment in Saudi
Arabia and the best practice and strategies that can be applied by organizations
in tapping a potential resource that is going unnoticed, and the efforts of the
government of Saudi Arabia to promote the employment of women. |
Keywords |
Women, Information Technology, Impact, Employment, Saudi Arabia |
Full Text |
|
Title: |
NEW CONTROL STRATEGY TO REDUCE THE FLUCTUATIONS OF THE DC BUS OF A WIND TURBINE
USING THE DFIG. |
Author: |
TARIQ RIOUCH, RACHID EL BACHTIRI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 179 - 187 Vol. 40. No. 2 -- 2012 |
Abstract |
The wind turbine based on the doubly-fed induction generator (DFIG) plays an
increasingly important role in power generation. This is thanks to the benefits
of these generators compared to other machines. In this paper, we present a new
control strategy that limits variations and the transient overshoots in the DC
bus voltage, which cause problems and sometimes leads to destruction of
converters (GSC) and (RSC). Good performance of DFIG depends strongly on the
stability of the DC bus. Simulations on Matlab / simulink/ SimPowerSystems
validate the effectiveness of our approach. |
Keywords |
Grid Electrical, Power Quality, Doubly-Fed Induction Generator, Fluctuation Of
DC Bus. |
Full Text |
|
Title: |
CLOUD MONITORING BASED ON SNMP |
Author: |
J. SWARNA, C. SENTHIL RAJA, DR.K.S.RAVICHANDRAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 188 - 193 Vol. 40. No. 2 -- 2012 |
Abstract |
With the new trend in the industry being everyone playing the role of a cloud
player, lots of pressure has been mounted on them as to how the resources are
efficiently managed, thus providing elasticity to the end-user’s demands. When
coming to a networked environment with larger hosts, especially in a cloud
environment, the monitoring tool should well be capable of handling the load and
reproduce the results in quicktime. In lots of cases SNMP based monitoring
proves worthy of the effort being put irrespective of the size of the
environment. Using SNMP MIBs may prove to be an effective approach for dealing
with the underlying information of different hosts in a cloud environment. The
monitoring tool is also capable of dealing with the SNMP checks. |
Keywords |
Cloud Monitoring, SNMP Mibs, Management, Cloud Environment, Oids, Discovery,
Auto-Registration |
Full Text |
|
Title: |
A MULTI-CRITERIA APPROACH TO THE EVALUATION OF MALAYSIAN GOVERNMENT PORTAL |
Author: |
MEHRBAKHSH NILASHI, KARAMOLLAH BAGHERIFARD, OTHMAN IBRAHIM, NASIM JANAHMADI ,
HAMID ALIZADEH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 194 - 201 Vol. 40. No. 2 -- 2012 |
Abstract |
National portal is one of the main gateways to e-government entry for providing
e-services to citizen. The purpose of this paper is to evaluate a set of factors
that influence on Malaysian government portal using Multi-Criteria method. These
factors were derived from a previous studies and literature related to the
subject matter by Malaysian government to enhance rank of government portals and
websites. In addition, obtained factors were considered from all Malaysian
government portals and in this research based on them the rank of those were
evaluated. In this study we also consider those factors to rank them and show
which factors is more important for improving Malaysian government portal based
on citizen desires. With regard to the citizen's perception of government
portal, a questionnaire was structured to gather their responses for raking the
factors using TOPSIS method. Therefore, an MCDM supported study for ranking
criteria in government portals. The outcome of this paper assists to Malaysian
e-government that considers importance of effective factors for government
portal in giving better e-services. |
Keywords |
Assessment, Citizen, Multi-Criteria, Malaysian Government Portal, TOPSIS. |
Full Text |
|
Title: |
AN OPTIMAL AND COST EFFECTIVE KEY MANAGEMENT SCHEME FOR SECURE MULTICAST
COMMUNICATION |
Author: |
SRIDHAR J K , SENTHIL KUMAR R , ARUN KUMAR S |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 202 - 207 Vol. 40. No. 2 -- 2012 |
Abstract |
The recent growth, popularity and extensive need for the deployment of group
oriented applications like multiparty video conferencing, multiplayer online
gaming and real time push based delivery systems has triggered the demand for
secure group communication. These applications require multicast to minimize the
volume of network traffic they generate. Multiparty communications have recently
become the focus of new developments in the area of applications. The goal of
this paper is to establish a secure group communication using multicast key
distribution scheme. In general, to meet forward secrecy and backward secrecy,
any change in the group membership will induce group rekeying. Here, a novel key
management scheme is proposed in which no redistribution of group key (shared
key) is required during the group dynamics there by reducing computation and
communication complexities considerably. |
Keywords |
Multicast, Group Key Management, Rekeying |
Full Text |
|
Title: |
ENHANCEMENT OF CUSTOMER PREMISES EQUIPMENT WAN MANAGEMENT PROTOCOL USING TR-069 |
Author: |
J. ALEX MICHAEL RAJ, 2K. JOHN SINGH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 208 - 212 Vol. 40. No. 2 -- 2012 |
Abstract |
Wireless technology makes today’s work more flexible and easier. The customer
premises wan management protocol is used to communicate between customer
premises equipment and an auto-configuration server. The CPE wan management
protocol uses the TR-069 framework architecture for self-configuration of
devices. In this paper, using the broadband forum CWMP (TR-69) support the
applicability of our implementation by adding the wireless devices without
rebooting our system. |
Keywords |
Home Area Networks (HAN), Customer Premises Equipment (CPE), Customer Premises
Equipment Wireless Area Network Management Protocol (CWMP), Internet Service
Provider (ISP) |
Full Text |
|
Title: |
ANALYSIS DATA OF STUDENT’S GPA AND TRAVELLING TIME TO CAMPUS USING CLUSTERING
ALGORITHM AFFINITY PROPAGATION AND K-MEANS |
Author: |
S. JATMIKO, R.REFIANTI, A.B. MUTIARA, R. WARYATI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 213 - 217 Vol. 40. No. 2 -- 2012 |
Abstract |
In most of clustering algorithm, the cluster number and member are generated
randomly, called common method. Consequently, the result may vary from the same
clustering process. K-means algorithm is one example of these common methods.
Affinity propagation, called new method, is developed to overcome this drawback
by exchange the messages between data points to test the feasibility and
accuracy of all data points to become exemplar and using it to select the
cluster members. The aim of this research is to compare and analyse both methods
by applying these method for clustering the student grade point average (GPA)
and travel time to campus data. Both algorithms are implemented using Matlab
7.11. |
Keywords |
Affinity Propagation, Clustering, Implementation, K-Means |
Full Text |
|
|
|