|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2012 | Vol. 43 No.1 |
Title: |
INFORMATION SECURITY, 4TH WAVE |
Author: |
HICHAM ELACHGAR, BRAHIM BOULAFDOUR, MERYEM MAKOUDI, BOUBKER REGRAGUI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 001 - 007 Vol. 43. No. 1 -- 2012 |
Abstract |
The present paper deals with the 4th wave of the Information Security as a new
approach to governance of information security. After introducing the four waves
of information security, is focused on the last part which will be part of our
thesis.
Based on the three waves in the development of Information Security, Information
Security development is presently in its Fourth Wave. This wave reflects the
development of Information Security Governance as a result of the emphasis on
good Corporate Governance.
The Fourth Wave of Information Security can therefore be defined as the process
of the explicit inclusion of Information Security as an integral part of good
Corporate Governance, and the maturing of the concept of Information Security
Governance.
We as Information Security practitioners must use this development to its
optimum to ensure the security of IT systems.
In addition, following the PDCA approach (Plan, Do Check, Act), we will
establish an inventory of information system with the SoM (Statement of
Maturity), a risk assessment of assets, a business continuity plan to ensure a
resumption of IT. |
Keywords |
Security, PDCA, ISO 27002, ITIL, CObIT, Information |
Full
Text |
|
Title: |
AN APPROACH TO DESIGN INCREMENTAL PARALLEL WEBCRAWLER |
Author: |
DIVAKAR YADAV, AK SHARMA, SONIA SANCHEZ-CUADRADO, JORGE MORATO |
Source: |
Journal of Theoretical and Applied Information Technology
pp 008 - 029 Vol. 43. No. 1 -- 2012 |
Abstract |
World Wide Web (WWW) is a huge repository of interlinked hypertext documents
known as web pages. Users access these hypertext documents via Internet. Since
its inception in 1990, WWW has become many folds in size, and now it contains
more than 50 billion publicly accessible web documents distributed all over the
world on thousands of web servers and still growing at exponential rate. It is
very difficult to search information from such a huge collection of WWW as the
web pages or documents are not organized as books on shelves in a library, nor
are web pages completely catalogued at one central location. Search engine is
basic information retrieval tool, used to access information from WWW. In
response to the search query provided by users, Search engines use their
database to search the relevant documents and produce the result after ranking
on the basis of relevance. In fact, the Search engine builds its database, with
the help of WebCrawlers. To maximize the download rate and to retrieve the whole
or significant portion of the Web, search engines run multiple crawlers in
parallel.
Overlapping of downloaded web documents, quality, network bandwidth and
refreshing of web documents are the major challenging problems faced by existing
parallel WebCrawlers that are addressed in this work. A Multi Threaded (MT)
server based novel architecture for incremental parallel web crawler has been
designed that helps to reduce overlapping, quality and network bandwidth
problems. Additionally, web page change detection methods have been developed to
refresh the web document by detecting the structural, presentation and content
level changes in web documents. These change detection methods help to detect
whether version of a web page, existing at Search engine side has got changed
from the one existing at Web server end or not. If it has got changed, the
WebCrawler should replace the existing version at Search engine database side to
keep its repository up-to-date |
Keywords |
World Wide Web (WWW), Uniform Resource Locator (URLs), Search engine,
WebCrawler, Checksum, Change detection, Ranking algorithms |
Full
Text |
|
Title: |
USING GLOBAL FEATURES ON REFINED IMAGE PARTS FOR LOGO RECOGNITION |
Author: |
AHMED ZEGGARI, FELLA HACHOUF |
Source: |
Journal of Theoretical and Applied Information Technology
pp 030 - 038 Vol. 43. No. 1 -- 2012 |
Abstract |
In this paper we address the problem of what parts of an image can be used to
well perform content-based image retrieval system. Local parts are selected and
refined based on the clustering of interest points obtained by Harris corners
and minimum bounding box detectors. Global features such as invariant moments
and color histograms of the extracted local regions are combined to find similar
logos on the database. Several inter-regions distances are compared to perform
inter-images similarity based on the minimum average distance of the individual
components. Our system is tested on logo and trademark databases; results
demonstrate a good retrieval rate and tolerance to logo distortions such as
rotation, occlusion and some amount of noise. |
Keywords |
Clustering, Logo Retrieval, Invariant Moments, Color Histogram, Region-Based
Image Retrieval, Image Segmentation, Minimum-Bounding Region |
Full
Text |
|
Title: |
YAGI ANTENNA DESIGN FOR SIGNAL PHONE JAMMER |
Author: |
Y. FITRIYANI, A.B. MUTIARA, R. REFIANTI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 039 - 044 Vol. 43. No. 1 -- 2012 |
Abstract |
Mobile phone is one of the most widely used today in mobile communications. This
technology is very useful for communication but this raises several problems in
a situation where silence is required such as in libraries, places of worship,
classrooms and others. Mobile phone jammer is a device that used to block the
incoming signal to a mobile phone from the base station. If the mobile phone
jammer is turned on then it can’t form the incoming or outgoing calls even sms.
In this research, we designed a Yagi antenna (900MHz) to expand the range of
jamming because Yagi has a great gain. Results of impedance by gamma match are
50.16 $\Omega$. Obtained the value of VSWR Yagi is 1.46:1 and jamming distance
that can be taken approximately 16 meters, It is different from the jamming
distance of helical antenna on a mobile phone jammer itself is about 4 meters. |
Keywords |
Jammer, Mobile Phone, Yagi |
Full
Text |
|
Title: |
PRIVATE CLOUD - DOES IT REALLY A SAVIOR OF YOUR MONEY? FACTS ANALYZED |
Author: |
MADHUSOOTHANAN. R, PRAKASH.V |
Source: |
Journal of Theoretical and Applied Information Technology
pp 045 - 051 Vol. 43. No. 1 -- 2012 |
Abstract |
Organizations with the infrastructure and skills to implement highly virtualized
IT operations may consider a private cloud—a multi-tenant, highly scalable and
automated infrastructure—part of the enterprise data center’s natural evolution.
But before you commit to a private cloud, you need to understand associated
costs and tradeoffs. This paper tires to analyze and brief up the costs and the
needs for organizations who want to implement private cloud. Since so much of
costs are involved in establishing private clouds for organizations, this paper
attempts to show the real facts behind the private cloud costs. |
Keywords |
Cloud Computing, Private Cloud, Public Cloud, Cloud Computing |
Full
Text |
|
Title: |
EXPERIMENTS AND SIMULATIONS ON THE VIBRATION OF SHUNT REACTOR AND THE NOISE
CONTROL |
Author: |
XIAOQING ZHANG, XIAOHU YAO |
Source: |
Journal of Theoretical and Applied Information Technology
pp 052 - 057 Vol. 43. No. 1 -- 2012 |
Abstract |
The vibration signals in the running dry type shunt reactor are measured by the
vibration measurement system; the operating noise of the dry type shunt reactor
is also tested by the noise measurement system. The modal analysis of the
magnetic core is analyzed in different running temperature of the dry type shunt
reactor. By adjusting the air gap materials of the magnetic core, a method of
reducing vibration and noise of large dry type shunt reactor is presented. |
Keywords |
Dry-Type Shunt Reactor; Vibration; Noise Control. |
Full
Text |
|
Title: |
SOUND SPEED OPTIMIZATION USING IMAGE TEXTURE ON CUDA |
Author: |
XINGWU HE, HUAGUO YIN, HONGLIN ZHOU, XIA ZHANG |
Source: |
Journal of Theoretical and Applied Information Technology
pp 058 - 063 Vol. 43. No. 1 -- 2012 |
Abstract |
The Compute Unified Device Architecture (CUDA) is a brand new parallel
processing platform making use of the unified shader design of the most current
Graphics Processing Units (GPUs) from NVIDIA. In this paper, we apply this
revolutionary new technology to implement the sound speed optimization (SSO)
with image texture analysis for medical ultrasound imaging. The sum and
difference histogram of parallel texture mask production is also presented. This
SSO method achieves 77ms for a group of alternative sound velocities that are
from 1400 to 1700m/s every 10m/s a sample image with the size of 256 × 512,
about 45 times faster than the CPU implementation. Testing results from GPU and
CPU are compared in terms of decision results and program runtime with different
image size. |
Keywords |
Phase Aberration; Sound Speed Correction; Image Texture; Parallel Processing;
GPU |
Full
Text |
|
Title: |
T-S FUZZY CONTROLLER DESIGN OF SIMULATION TEST TURNTABLE |
Author: |
BAITING ZHAO, XIAOFEN JIA, ZHENBI LI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 064 - 068 Vol. 43. No. 1 -- 2012 |
Abstract |
For the control system of a certain type simulation test turntable (STT), a
simplified model is established firstly, then the T-S fuzzy controller is
designed, finally control results and stability are analyzed by simulation.
Simulation results show that the T-S fuzzy controller has the advantages of the
fast response and positioning, good stability, strong anti-interference. The
designed T-S fuzzy controller has variable gain characteristics, open-loop
automatic gain increases along with the interference amplitude, and open-loop
automatic gain decreases along with the interference amplitude. It can ensure
that the system can work in lower gain state, but has the ability to inhibit the
large amplitude of the interference. |
Keywords |
Aluminum Alloy; Plastic Anisotropy; Microstructure |
Full
Text |
|
Title: |
THE DESIGN OF PRECISION TEST TURNTABLE DIAGNOSIS SYSTEM BASED ON NEIGHBORHOOD
ROUGH SETS |
Author: |
BAITING ZHAO, XIAOFEN JIA, ZHENBI LI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 069 - 073 Vol. 43. No. 1 -- 2012 |
Abstract |
A fault diagnosis system is designed for Precision Test Turntable (PTT) based on
neighborhood rough sets. The fault diagnosis decision table is established, then
on the base of the core and the easy gained attributes, the decision table is
reduced by the forward greedy reduce algorithm. Finally, the logic rules are
gained as the diagnosis rules. Neighborhood rough sets can compress sample
space, and improves the efficiency of the diagnosis, and avoids information loss
produced by the discretization of Pawlak rough sets as well. Based on the needs
of the user, make the reduction contains the attributes which the user can
easily get as much as possible. The results show that the method can detect the
faults exactly, and it can improve the security and reliability of the PTT
effectively. |
Keywords |
|
Full
Text |
|
Title: |
A NEW MAINTENANCE TIME MEASUREMENT METHOD BY VIRTUAL REALITY |
Author: |
KANG LE , ZHOU DONG, LV CHUAN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 074 - 081 Vol. 43. No. 1 -- 2012 |
Abstract |
Virtual maintenance has emerged as one such technology which has attained
maturity and gained acceptance in industry. The key contribution of virtual
maintenance is to reduce the design cost and cycle. Currently, virtual
maintenance verification focuses on these statically qualitative contents, and
there is a big gap between virtual maintenance simulation time and actual
maintenance time. This paper divides those causes for the gap into three parts,
including integrity, determinacy and verisimilitude. A new virtual maintenance
time measurement based on DELMIA has been raised aiming at reducing the effects
of the verisimilitude causes. And qualitative and quantitative analysis has been
combined together to improve products’ maintainability. |
Keywords |
Virtual Maintenance, Maintenance Time, Maintainability Requirement, Incident
Matrix |
Full
Text |
|
Title: |
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION
FINGERPRINT |
Author: |
ZHANGGUO TANG, HUANZHOU LI, MINGQUAN ZHONG, JIAN ZHANG |
Source: |
Journal of Theoretical and Applied Information Technology
pp 082- 088 Vol. 43. No. 1 -- 2012 |
Abstract |
In order to monitor the use of network transmission software, the network
penetrating technique based on encrypted proxy is discussed. By comparing the
behavior of related penetration software, the concept of communication
fingerprint is introduced to expand the extension of the communication features.
The fingerprints database of encrypted proxy software with specific
characteristics is constructed, and a heuristic identification system for
encrypted proxy software is designed and implemented. Test results indicate that
the system runs efficiently and the results are accurate. |
Keywords |
Proxy; Encrypted Proxy; Network Penetrating; Communication Fingerprint; Network |
Full
Text |
|
Title: |
NEW ALGORITHM FOR COLOR IMAGE ENCRYPTION USING CHAOTIC MAP AND SPATIAL BIT-LEVEL PERMUTATION |
Author: |
RUI LIU, XIAOPING TIAN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 089 - 093 Vol. 43. No. 1 -- 2012 |
Abstract |
With the fast progression of data exchange in electronic way, information
security is becoming more important in data storage and transmission. This paper
proposed a new algorithm for color image encryption using chaotic map and
spatial bit-level permutation (SBLP). Firstly, use Logistic chaotic sequence to
shuffle the positions of image pixels, then transform it into a binary matrix
including the red, green and blue components simultaneously, and permute the
matrix at bit-level by the scrambling mapping generated by SBLP. Secondly, use
another Logistic chaotic sequence rearrangement of the position of the current
image pixels. Experiment results and security analysis show that the algorithm
can achieve good encryption result and low time complexity, in addition, the key
space is large enough to resist against common attack. |
Keywords |
Image Encryption, Chaotic Map, Spatial Bit-Level Permutation (SBLP). |
Full
Text |
|
Title: |
UNSUPERVISED CLUSTERING OF GENE EXPRESSION PROFILES OF MICROARRAY DATA USING LIM
AND PCA IN BIOINFORMATICS |
Author: |
R. SHANMUGAVADIVU, Dr. N. NAGARAJAN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 094 - 102 Vol. 43. No. 1 -- 2012 |
Abstract |
The development of microarray technology produces massive gene expression data
sets. A major task for the experimentalist is to understand the structure in the
huge data sets. Data generated by a scientific experiment always contain random
noise. The situation is worst in the area of biology. Statistical methods must
be used to accurately interpret large-scale experimental data. Microarray data
is represented as a matrix with rows representing individual genes and columns
representing conditions or experiments and very heterogeneous in nature. Because
many proteins have unknown functions, and because many genes are active all the
time in all kinds of cells, researchers usually use microarrays to make
comparisons between similar cell types. As a result, we need to develop our
ability to ‘‘see’’ the information in the massive tables of quantitative
measurements that these approaches produce. This research addresses a suitable
Micro array data clustering Algorithm which can be used to rearrange the gene
expression profiles of microarray data for easy observation and knowledge
discovery. In this research, a Lorenz Information Measure(LIM) based algorithm
will be used to order the microarray data and after ordering the data, Principal
Component Analysis(PCA) will be used to find the principal components in that
order. Then the data will be clustered using a special kind of neural network
called Self Organizing Maps (SOM).The Microarray data displayed after grouping
will have some significance. After the clustering, we can see that the genes
with similar expression patterns are grouped together under the related set of
conditions. The Implementation of the proposed model will be done using Mat lab
6.5 under Windows operating system. The Performance of the system will be tested
and evaluated with suitable gene expression data available for such kind of
research. |
Keywords |
Microarray, Lorenz Information Measure (LIM), Principal Component Analysis (PCA)
, Self Organizing Maps (SOM) |
Full
Text |
|
Title: |
EVALUATION OF FREQUENT-PATH ADAPTABILITY ASPECT IN ADWEF APPLYING BASIC BUSINESS
PROCESSES |
Author: |
FARAMARZ SAFI ESFAHANI, MASRAH AZRIFAH AZMI MURAD |
Source: |
Journal of Theoretical and Applied Information Technology
pp 103 - 111 Vol. 43. No. 1 -- 2012 |
Abstract |
Centralized business process execution in the Service Oriented Architecture (SOA)
suffers from lack of scalability. Decentralization of business processes is
introduced as an alternative approach to address this shortcoming. However,
decentralization methods do not consider adaptability of created fragments with
runtime environment. The Adaptable and Decentralized Workflow Execution
Framework (ADWEF) introduces frequent-path and proportional-fragment
adaptability aspects along with two architectures Type-1 and Type-2 and two
decentralization methods HPD and HIPD. The ADWEF has been tested for several
boundary-condition and one complex business processes; nonetheless, the behavior
of prominent activities of business processes has not been studied yet. This
paper introduces If-process, While-process and Flow-process as three basic
business processes to study the behavior of their central activities from
frequent-path adaptability point of view in terms of response-time and
throughput running on architecture Type-1. Evaluations of the basic processes
show that considering the frequent-path adaptability provides a range of
improvements in response-time and throughput with
variable-request-rate/constant-message-size and
constant-request-rate/variable-message-size configurations. |
Keywords |
Service Oriented Architecture; Business Process Decentralization; Adaptable
Business Process Decentrlaization; Self-* Systems; Self-Adaptability; |
Full
Text |
|
Title: |
COEXISTENCE AND SHARING STUDIES OF COLLOCATED AND NON- COLLOCATED FOURTH
GENERATION NETWORKS IN THE 2.6 GHZ BAND |
Author: |
A. OUDAH, T. ABD. RAHMAN, N. SEMAN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 112 - 118 Vol. 43. No. 1 -- 2012 |
Abstract |
Lots of fourth generation (4G) wireless networks are currently being deployed
globally with similar or with dissimilar technologies in various operating
bands. In this paper, spectrum sharing and coexistence scenarios of the 4th
generation networks in the band (2500-2690) MHz are addressed. Interferences
from Long Term Evolution (LTE) to Worldwide Interoperability for Microwave
Access (WiMAX) systems and vice versa are carefully investigated. The
collocation and coexistence requirements in terms of separation requirements as
well as additional isolations are fully addressed. Interference measures of the
two systems as functions of adjacent channel interference power ratios are also
considered. Finally, the impact of deployment morphologies of the two systems is
accounted for by catering for losses due to surrounding clutter. |
Keywords |
Coexistence, Collocation, LTE, WiMAX, Isolation requirements, Adjacent Channel
Interference Ratio (ACIR) |
Full
Text |
|
Title: |
FEATURE SELECTION OF FREQUENCY SPECTRUM FOR THE BALL MILL LOAD BASED ON INTERVAL
PARTIAL LEAST SQUARES |
Author: |
LIJIE ZHAO, XUE FENG, DECHENG YUAN, 1 HUI XIAO |
Source: |
Journal of Theoretical and Applied Information Technology
pp 119 - 126 Vol. 43. No. 1 -- 2012 |
Abstract |
Due to highly complex of the grinding mechanism of the ball mill, it is a
challenging problem to select the informative frequency spectral features of the
response signals. High dimensionality and co-linearity of the frequency spectrum
are unfavorable to build the effective mill load model in the wet ball mill.
Interval Partial Least-Squares Regression (iPLS) is applied to select the
feature frequency bands of the shell vibration signal and acoustical signal,
which are closely relevant to the parameters of ball mill load. Redundant or
irrelevant frequency spectral variables are removed to improve the complexity of
ball mill load model and enhance the comprehension of the grinding process using
the frequency spectrum features. The experimental results have demonstrated that
the performance of the mill load models based on feature spectrum outperforms
the full spectrum model for both the shell vibration signal and acoustical
signal. |
Keywords |
Ball Mill, Mill Load, Feature Selection, Interval Partial Least Square |
Full
Text |
|
Title: |
A NEW DELAY-DEPENDENT STABILITY CRITERIA FOR NETWORKED CONTROL SYSTEMS |
Author: |
BING LI, JUNFENG WU |
Source: |
Journal of Theoretical and Applied Information Technology
pp 127 - 132 Vol. 43. No. 1 -- 2012 |
Abstract |
In this paper, the problem of stability for networked control systems (NCSs) is
investigated. Considering both the time-varying network-induced delay and data
packet dropouts, NCSs are transformed into typical linear systems with interval
time-varying delay. Based on the obtained model, a new delay-dependent stability
criteria in terms of linear matrix inequalities (LMIs) is provided by
constructing a novel time-dependent Lyapunov-Krasovskii functional. The tighter
integral inequalities are used to deal with the cross-product terms arose from
the time derivative of the Lyapunov-Krasovskii functional for obtaining much
less conservative result. Compared with some previous ones, the proposed method
introduces fewer matrix variables and has less conservatism. A numerical example
is provided to demonstrate the effectiveness and the benefits of the proposed
method. |
Keywords |
Stability Criteria, Networked Control Systems, Time-Varying Network-Induced
Delay |
Full
Text |
|
Title: |
AN IMPROVED ROUGH SET COMBINED WITH AGGLOMERATIVE CLUSTERING |
Author: |
SHENG YAO, LONGSHU LI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 133 - 140 Vol. 43. No. 1 -- 2012 |
Abstract |
Rough set is a powerful mathematical tool that has been applied widely to
extract knowledge from many databases. However, some drawbacks have been
detected in rough set, such as inconsistency, lack of flexibility, excessive
dependency on discretization of the initial attributes and so on. To overcome
these drawbacks, we propose an improved rough set combined with agglomerative
clustering. The concept of equivalence class is also incorporated to merge and
divide subclass. The experimental results show the better performance of the
proposed approach. |
Keywords |
Rough Sets, Agglomerative Clustering, Automatic Extraction |
Full
Text |
|
Title: |
ON-MACHINE MEASUREMENT OF LARGE-SCALE WORKPIECE BASED ON MACHINE VISION |
Author: |
ZHONGREN WANG, XIAOYU WANG |
Source: |
Journal of Theoretical and Applied Information Technology
pp 141 - 147 Vol. 43. No. 1 -- 2012 |
Abstract |
On-machine measurement(OMM) based on machine vision has been hot research topic
in recent years because coordinate measuring machine(CMM) measurement requires
significant resources in operating time and cost. This paper aims to develop an
OMM method with a manipulator and industry camera. First, an on-machine
calibration method of industry camera based on image sequence is studied. A set
of monocular stereo system was established on the NC milling machine. A
calibration target was designed to meet the requirements of finding enough and
accurate correspondence relationship. Calibration method is illustrated
involving taking image sequence, detecting the position of the calibration board
and the marking points, finding the marking points’ correspondence with their
projection, determining the camera parameters through optimization algorithm.
Accuracy of calibration shows that choosing 10 calibration images is appropriate
for on-machine calibration. Second, image mosaic method for on-machine
measurement of large-scale workpiece is investigated. Image sequences were
acquired by controlling the moving of working table. Image mosaic of large-scale
workpiece was realized with high precision. Size measurement result proved the
effectiveness and high efficiency of this OMM system. |
Keywords |
On-machine Measurement, Camera Calibration, Image Sequence, Image Mosaicing,
Large-scale Workpiece |
Full
Text |
|
Title: |
THE SPECIFICATION OF QUALITY OF SERVICE IN OPEN DISTRIBUTED PROCESSING
:FORMALISM USED IN MECHATRONIC SYSTEM |
Author: |
YOUSSEF BALOUKI, ABDESSAMED BALOUKI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 148 - 155 Vol. 43. No. 1 -- 2012 |
Abstract |
The paper discusses two approaches for designing mechatronic systems. the first
one is based on using Reference Model for open Distributed Processing (RM-ODP),
to specify any kind of mechatronic systems, RM-ODP is a reference model in
computer science, which provides a co-ordinating framework for the
standardization of open distributed processing (ODP), whereas in the second
phase , we introduce Event-B method to formalize and verify mechatronics system.
We explore the benefits provided by using the proof construction approach to
define the protocol of negotiating QoS requirements When Mechatronic components
in different clusters interact. In this context, we investigate the support for
the specification of Quality of Service (QoS) in Event-B, when modelling
mechatronic systems in ODP Engineering viewpoint. |
Keywords |
Mechatronic systems, RM-ODP, QoS Requirements, Event B, Rodin platform |
Full
Text |
|
Title: |
ANALYTICAL STUDY OF PROJECTS PERFORMANCE BEFORE 21ST CENTURY IN PAKISTAN |
Author: |
MUHAMMAD SALIM JAVED, AHMAD KAMIL BIN MAHMOOD, SUZIAH BT. SULAIMAN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 156 - 164 Vol. 43. No. 1 -- 2012 |
Abstract |
Economic growth and development has been pursued through public investments by
the government into the development of agriculture, infrastructure, services,
social and human sectors. The development of these sectors results into higher
GDP per capital income and life standards. The objective of this paper is to
find impact analysis of project in Pakistan. For this purpose, data were
collected from project directors, HEC personnel's and consultants of higher
learning institutions through interviews and a critical review of development
projects performance and their impacts is being studied. |
Keywords |
Higher Education Commission (HEC), Information System (IS), Gross National
Production (GNP), International Monitory Fund (IMF),Gross Domestic Product
(GDP), Purchasing Power Parity (PPP) |
Full
Text |
|
|
|