|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2010 | Vol. 18. No.2 |
Paper ID: |
1392 -JATIT-2K10 |
Title: |
ADOPTION OF INFORMATION TECHNOLOGY
SECURITY POLICIES: CASE STUDY OF KENYAN SMALL AND MEDIUM ENTERPRISES (SMES) |
Author: |
MICHAEL KIMWELE, WAWERU MWANGI, STEPHEN
KIMANI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
The purpose of this paper is to study the
adoption of information technology security policies in Kenyan Small and Medium
Enterprises (SMEs). Particularly this study looks at whether the roles and
responsibilities of Information Technology (IT) security in SMEs are well
defined, whether SMEs have a documented information security and are if
employees aware of the policy. Further the study finds out whether SME employees
are given adequate and appropriate information security education and training,
and if employees are well informed as to what is considered acceptable and
unacceptable usage of the organization’s information systems. There is evidence
from the survey to suggest that IT security policies are not widely adopted and
the benefits harnessed by Kenyan SMEs. The survey reveals that much more needs
to be done if SMEs are to realize the benefits of information technology without
compromising their security status. This is one of the first studies to explore
IT security issues in Kenyan SMEs. The survey is likely to assist SME owners,
practitioners, and even academicians gauge how effective their information
security efforts have been. |
Keywords |
SMEs, Information Security Policy, Kenya,
Information Technology Security |
Full
Text |
|
Paper ID: |
1353 -JATIT-2K10 |
Title: |
PERFORMANCE ANALYSIS OF CHAOTIC CHIRP
SPREAD SPECTRUM SYSTEM IN MULTIPATH ENVIRONMENT |
Author: |
THAIR A. SALIH |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
Wireless channels often include multipath
propagation, in which the signal has more than one path from the transmitter to
the receiver. Atmospheric reflection or refraction, as well as reflection from
the ground or from objects such as buildings may cause this phenomena. The aim
of this research is to study the effects of multipath environment on the
performance of a proposed chaotic chirp spread spectrum system (CCSSS). The
benchmark performance of the proposed system is investigated in term of bit
error rate (BER) under multipath environment. A Quadrature Phase Shift Keying (QPSK)
modulation scheme and a matched filter based on adaptive threshold decision were
used in this work. To assess the performance of this system, simulations were
performed to compare the proposed system with the traditional frequency
modulation differential chaotic shift keying (DCSK) spread spectrum system. The
proposed system may be considered as a well qualified communication system in
multipath environment. |
Keywords |
Chirp, Chaotic, QPSK, Matched filter,
Spread Spectrum Systems |
Full
Text |
|
Paper ID: |
1390 -JATIT-2K10 |
Title: |
ON ANALYSING INTERACTIONS BETWEEN ASPECTS
AT REQUIREMENTS PHASE |
Author: |
AMEL BOUBENDIR, 2ALLAOUA CHAOUI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
Aspect Oriented software development (AOSD)
is an emerging technology, that improve existing paradigms of development, by
providing explicit mean to model crosscutting concern (aspect). However, the
complexity of interactions among aspects and between aspects and base modules
may reduce the value of aspect-oriented separation of cross-cutting concerns.
Aspects must be identified as early possible in the life cycle. Interactions
analysis, as well, is desirable to be done as early as possible in the life
cycle. In this paper we propose a technique during the requirement phase that
allows the user to analyse interactions between aspects, identify aspects
interactions, detect and resolve conflicts between them based on the search of
Hamiltonians paths. The technique is generic since it exploits the dependencies
generated by the operators such as before, after, around and replace. It uses
the specification of composition of aspects to analyse aspects and produce rules
of composition witch may be used to compose or guide the process of composition.
The technique is illustrated through examples. |
Keywords |
Aspects, Aspect oriented development,
Requirement phase, Aspects Interactions |
Full
Text |
|
Paper ID: |
1396 -JATIT-2K10 |
Title: |
A TEST GENERATION METHOD BASED ON STATE
DIAGRAM |
Author: |
NICHA KOSINDRDECHA, 2JIRAPUN DAENGDEJ |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
In general, the software testing phase
takes around 40-70% of the time and cost during the software development life
cycle. Software testing is well researched over a long period of time.
Unfortunately, while many researchers have found an efficient test case
generation methods to minimize time and cost, there are still a number of
important research issues. The primarily issue that motivated this study is to:
consume a great amount of time and cost to automatically generate tests from
diagrams, with a huge size of tests and less test coverage. Therefore, this
paper introduces an effective test sequence generation technique to minimize
time, cost and size of tests while maximizing test coverage. The proposed
technique aims to derive and generate tests from state chart diagram. The
diagram is widely-used to describe a behavior of the system. In addition, this
paper discusses and determines the best effective test generation methods that
derive tests from diagrams.
|
Keywords |
test generation technique, generate test
from state diagram, test case generation, test data generation and test sequence
generation |
Full
Text |
|
Paper ID: |
1397 -JATIT-2K10 |
Title: |
TEST CASE PRIORITIZATION TECHNIQUES |
Author: |
SIRIPONG ROONGRUANGSUWAN, JIRAPUN DAENGDEJ |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
Software testing has been proven that
testing, analysis, and debugging costs usually consume over 50% of the costs
associated with the development of large software systems. Many researchers have
found several approaches to schedule an order of test execution. Unfortunately,
existing test prioritization techniques are failed to prioritize multiple test
suites and test cases with same priority values. Consequently, those techniques
are inefficient to prioritize tests in the large commercial systems. They
incorrectly schedule tests and the cost is overrun during the prioritization
process. Thus, this paper proposes two new efficient prioritization methods to
address the above issues. The first method aims to resolve the problem of many
test cases assigned the same weight values. The second method is developed to
effectively prioritize multiple suites. As a result, this paper discusses an
ability to reserve high prioritize tests in multiple suites while minimizing a
prioritization time. |
Keywords |
Test Case Prioritization, Test
Prioritization Methods, Test Prioritization Comparison, Multiple Test
Prioritization And Test Suite Prioritization |
Full
Text |
|
Paper ID: |
1413 -JATIT-2K10 |
Title: |
SEMANTIC WEB AND ECONOMIC AND FINANCIAL
INFORMATION MANAGEMENT |
Author: |
N K PRASANNA, ANJANEYULU ANNA, SHASI M |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
The field of economy and finance is a
conceptually rich domain where information is complex, huge in volume and a
highly valuable business product by itself. Novel management techniques are
required for economic and financial information in order to enable an effective
generation, gathering, integration, management and consumption of complex and
big volumes of rich information. While the information integration problem is
common to all business areas, it becomes apparent in the financial area, where
information coming from multiple sources has to be homogenized in order to
facilitate analysis and to provide a uniform view of the business e.g. via a
balance scorecard. In addition, financial information is subject to official
supervision e.g. by central banks. As a consequence, the required information
has to be obtained, homogenized following the supervisor rules, and validated,
guaranteeing its quality. In this paper, we present part of our experience in
the use of semantic Web technologies for the management of economic and
financial information and the problems encountered. In addition, we briefly
introduce XBRL, a language that has gained a big momentum for business
reporting, and compare the paths followed by the XBRL community and the semantic
Web community. |
Keywords |
Semantic Web, Economic Management,
Financial Management |
Full
Text |
|
Paper ID: |
1362 -JATIT-2K10 |
Title: |
UTRAN CRYPTOGRAPHIC ALGORITHMS
VERIFICATION AND IMPLEMENTATION |
Author: |
GHIZLANE ORHANOU, SAÏD EL HAJJI, JALAL
LAASSIRI, YOUSSEF BENTALEB |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
In the present paper, we are interested in
Universal Mobile Telecommunications System (UMTS) Access Network security. A
special interest is given to the protection of the data integrity and the
provisioning of data encryption. Indeed, the appropriate procedures and
cryptographic algorithms are discussed. In previous work, we were interested in
the study of the operation and complexity of the algorithms, but actually we
will focus on other aspects. A closer look is taken at the two sets of UMTS
cryptographic algorithms: UEA1/UIA1 (UEA indicates UMTS Encryption Algorithm and
UIA UMTS Integrity Algorithm) based on the KASUMI algorithm and UEA2/UIA2 based
on the SNOW 3G algorithm. Furthermore, this paper includes the results of the
verification and the implementation of the two sets of the UMTS cryptographic
algorithms. The necessary corrections and/or adaptation of the 3GPP algorithms
codes having carried out to meet the 3GPP algorithms specifications.
Furthermore, we propose an adaptation of the second set of algorithms to the
little-endian machines since the 3GPP proposed codes are only limited to the
big-endian machines. These corrections and adaptations are presented in the
present paper and some implementation examples are presented as well. |
Keywords |
UMTS, Confidentiality, Integrity, SNOW 3G,
Verification, Implementation |
Full
Text |
|
Paper ID: |
1414 -JATIT-2K10 |
Title: |
FOSTERING SUSTAINABILITY OF THE SUPPLY
CHAIN THROUGH ADOPTION OF THE STATE EXPLICIT PROCUREMENT STRATEGY - A
MATHEMATICAL APPROACH USING ANALYTICAL HIERARCHY PROCESS |
Author: |
R. S. BINDU, B. B. AHUJA |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
Despite the impressive success of JIT
programmes, many companies still use the traditional approach to determine their
purchase orders. This is particularly true for small manufacturing firms who
cannot effectively implement JIT purchasing. Manufacturing companies that use
economic order quantity (EOQ) purchasing, either classical EOQ model or a
variation thereof, increasingly are faced with the decision of whether or not to
switch to the just-in-time (JIT) purchasing policy. This is a complex decision,
requiring careful examination of each system and its possible impact on a
variety of factors, such as cost, quality, and flexibility of the operations.
Though JIT purchasing should be the goal of all the organizations for all the
items, it is not feasible /economical to implement JIT under all the
circumstances. In this paper a model is developed to identify the suitability of
an outsourced item for JIT purchasing. The study is basically qualitative and
exploratory in nature. The Methodology developed will be useful for industries
to select a proper purchase policy for an outsourced item. The proposed approach
is very well explained with the help of live case study. |
Keywords |
JIT (Just in Time) Procurement Policy,
Situation Specific Policy, Analytical Hierarchy Process (AHP), EOQ (Economic
Order Quantity) Model, JIC (Just in Case) Procurement Policy, MADM (Multi
Attribute Decision Making), State Explicit Policy |
Full
Text |
|
Paper ID: |
968 -JATIT-2K10 |
Title: |
A PERSPECTIVE OF DATA MINING METHOD BASED
ON DRBF NEURAL NETWORKS |
Author: |
S. SAI SATYANARAYANA REDDY, P.ASHOK REDDY,
V.KRISHNA REDDY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
Recently there has been significant
advances in the use of wavelet network methods in various data mining processes,
With the extensively application of many databases and sharp development of
Internet, The capacity of utilizing information technology to fabricate and
collect data has improved greatly. It is an imperative problem to mine useful
information or knowledge from large databases or data warehouses. Therefore,
data mining technology is urbanized rapidly to meet the need. But data mining
often faces so much data which is raucous, disorder and nonlinear.
Providentially, ANN is suitable to solve the before-mentioned problems of DM
because ANN has such merits as good vigor, flexibility, parallel-disposal,
distributing-memory and high tolerating error. This paper gives a detailed
discussion about the relevance of ANN method used in DM based on the analysis of
all kinds of data mining technology, and especially lays stress on the
categorization Data Mining based on RBF neural networks. Pattern classification
is an important part of the RBF neural network function. Under on-line
environment, the training dataset is variable, so the batch learning algorithm
which will generate plenty of surplus retraining has a lower efficiency. an
suitable metric for imbalanced data is applied as a filtering technique in the
context of Nearest Neighbor rule, to improve the classification accuracy in RBF
and MLP neural networks This paper deduces an incremental learning algorithm
from the gradient descend algorithm to improve the blockage. ILA can adaptively
adjust parameters of RBF networks driven by minimizing the error cost, without
any surplus retraining. Using the method projected in this paper, an on-line
cataloging system was constructed to resolve the IRIS classification problem. |
Keywords |
Data Dredging, Data Warehousing Concepts,
PNN/GRNN networks ,Intrusion Detection, Information Security, and Data Networks
Security, schooling algorithm Neural Networks, RBF Neural Networks. |
Full
Text |
|
Paper ID: |
1388 -JATIT-2K10 |
Title: |
INFORMATION RETRIEVALS TRIES TREE VS
INVERTED FILE WORD METHOD FOR ARABIC LANGUAGE |
Author: |
Dr. KHALAF KHATATNEH IMAN HUSSEIN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 18. No. 2 -- 2010 |
Abstract |
One of the key challenges of managing very
huge volumes of data in scalable Information retrieval systems is providing fast
access through keyword searches. The major data structure in the information
retrieval system is an inverted file, which records the positions of each term
in the documents. When the information set substantially grows, the number of
terms and documents are significantly increased as well as the size of the
inverted files. In this research we implement to techniques of inverted file
-posting list and Tries trees- on Arabic Language, then we will try to state the
optimum technique to store the vocabulary according to the speed of retrieving
queries from the collection of documents. |
Keywords |
Inverted File(Word Method),Tries Tree ( B+
tree), Information Retrieval, Posting List, Indexing, Depth-First Algorithm,
Vocabulary, Stopword. |
Full
Text |
|
|
|