|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
October 2015 | Vol. 80 No.3 |
Title: |
EMBEDDING RАPIDMINER MODELS IN JAVA CODE |
Author: |
ZHANAT SERGAZIEVNA SAUKHANOVA, MAGRIPA SERGAZIEVNA SAUKHANOVA, OMARBEKOVA ASSEL
SAILAUBEKOVNA |
Abstract: |
Intelligent data analysis, also known as Data Mining, is implemented for a
search for new and useful knowledge in large data arrays. Data Mining models can
be easily built by means of visual graphic interface of Rapid Miner open-ended
software. RаpidMiner provides operators for the most well-known algorithms and
methods for data analysis and machine learning, including input and output, data
pre-processing and visualization. The presented paper discusses problems of
embedding of models, which were created using Rapid Miner, into Java codes of
other applications. |
Keywords: |
Data Mining, Rapidminer Operators, Read CSV, Decision Tree, Apply Model,
Rapidminer Classes, Java Code. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
APPLICATION OF MODULAR TECHNOLOGIES IN THE LARGE-SCALE ANALYSIS OF SIGNALS |
Author: |
IGOR ANATOL’EVICH KALMYKOV, KONSTANTIN ALEKSANDROVICH KATKOV, LEONID IVANOVICH
TIMOSHENKO, ANDREI VALER’EVICH DUNIN, TATIANA ALEKSANDROVNA GISH |
Abstract: |
The purpose of the research is to improve the accuracy of the large-scale
analysis of signals. This goal can be achieved through the use of algebraic
systems having the properties of a ring and a field. The paper presents the
implementation of the discrete Haar wavelet transform in the finite Galois field
GF (17). To detect and correct the errors that can occur during the operation of
a special processor for digital signal processing (DSP) due to malfunction and
failure of equipment, an algorithm is developed for calculating a positional
characteristic. The use of new modular technologies in the DSP problems enables,
by virtue of parallelization at the level of operations and processing the
short-bit data, not only to increase the calculation accuracy, but also to
ensure obtaining the correct result. |
Keywords: |
Discrete Wavelet Transform Of Signal, Residue Number System, Polynomial System
Of Residue Classes, Error Correction, Positional Characteristics |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE METHODOLOGY OF MATHEMATICAL MODELING IN INFORMATION-ANALYTICAL SYSTEMS OF
THE SCIENTIFIC SPHERE |
Author: |
NATALIA VLADIMIROVNA MAMAEVA, LEV BORISOVICH MILYUTIN, VLADIMIR NIKOLAEVICH
NIKOLENKO, ARTEM IGOREVICH FEDOSEEV |
Abstract: |
Currently, the information-analytical systems are widely applied to solve
problems of information support and to justify decision-making in the management
of complex systems for various purposes, including in the scientific sphere.
Since the mathematical models for the analysis of the science development, when
making management decisions, are of the utmost importance, the authors focus on
the need to include the mathematical modeling subsystem in the
information-analytical systems of the scientific sphere. The article presents
the methodological issues of development of a complex of mathematical models of
different levels. It is concluded, that the estimate of the state of the
scientific sphere, forecasting its development and analysis of consequences of
possible management decisions according to the results of modeling on the
offered set of mathematical models will improve the effectiveness of the made
decisions. |
Keywords: |
Scientific Sphere, Information-Analytical System, Scientometrics, Mathematical
Modeling |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
ON A METHOD OF FORMATION OF SIGNALS WITH HIGH SPECTRAL EFFICIENCY FOR COGNITIVE
RADIO COMMUNICATION SYSTEM |
Author: |
DMITRY IGOREVICH USHAKOV, IVAN ALEKSANDROVICH STAROVOIT |
Abstract: |
The paper presents results of the studies aimed at development of new method for
formation of signals for cognitive radio communication systems, which would
allow to increase spectral efficiency of systems for data transmission as
compared to the existing approaches. Signals which are used in cognitive radio
communication systems nowadays (signals with Orthogonal Frequency Division
Multiplex (OFDM)) have a number of disadvantages, one of which is high level of
side lobe of some subcarrier, and that fact doesn't allow to provide potential
spectral efficiency of cognitive radio communication system. The developed
method is based on implementation of special forming functions, which provide
good level of energy localization in frequency part and rapid decrease of side
lobes in spectrum of formed signal for a specified duration of signal.
Implementation of that method allows to generate signal not only with holes of
signal spectrum with specified width for adaptation in complicated
electromagnetic environment, but also with low level of interference in that
domains, which is impossible to achieve using OFDM channels. The paper presents
studies on evaluation of possibility of signal formation with minimally
acceptable holes in spectrum and provision of a specified level of interference
in that interval; also, the study demonstrates advantages of the developed
method as compared to OFDM. In addition, feature of rapid decrease of side lobes
in spectrum allows to use a part of protective intervals in spectrum between
adjacent channels for data transmission, and, thus, increase spectral efficiency
of the system by 20% as compared to systems operating on traditional methods of
signal processing. |
Keywords: |
Cognitive Radio Communication System, OFDM, Spectral Efficiency, Spectral Mask,
Dynamic Spectrum, Subcarrier, Forming Function, Orthogonality. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
DYNAMIC ALLOCATION OF MEMORY BLOCKS OF THE SAME SIZE |
Author: |
ALEKSANDR BORISOVICH VAVRENYUK, IGOR VLADIMIROVICH KARLINSKIY, ARKADY PAVLOVICH
KLARIN, VIKTOR VALENTINOVICH MAKAROV, VIKTOR ALEХANDROVICH SHURYGIN |
Abstract: |
The problem of allocating and freeing operative memory in multiprogramming is
relevant for all modern operating systems. The algorithms of almost all memory
managers (allocators) used, claiming being universal, either lead to decreasing
efficiency of memory usage, or require significant CPU time. This article
describes the allocator algorithm proposed by the authors that makes it possible
to achieve greater efficiency in using memory when blocks of the same size are
allocated. An allocation testing method has been described, and the results of
comparing the proposed allocator to a standard allocator of a UNIX system GNU C
library have been described. |
Keywords: |
Allocator, Memory Manager, Bit Matrix, Memory Fragmentation, Operating Systems |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
SPEED WARNING SYSTEM USING SOLAR POWER |
Author: |
N. H. SHAMSUDIN, N. A. MISDAR, A. R. ABDULLAH, M. S. S. M. BASIR, N.A SELAMAT |
Abstract: |
It is recorded that road vehicle accidents in Malaysia are increasing yearly.
The major cause to road accident is mostly caused by human speed. Police
authorities have enforced the speed limits of the vehicle to control the road
accidents. Thus, to monitor the traffic more efficiently, the speed of a moving
vehicle is determined by using calculation from particular distance and time as
an approach to estimate the vehicle speed. This system is designed to reduce the
road accidents in development of speed warning system by using solar power
energy. Solar is used to provide the energy to the system in terms of optimizing
the operational cost and reducing the energy wastage. It requires a battery to
store energy that automatically recharged from solar panel. Three light
indicators which are green, yellow and red based on the speed level of vehicles
are used in this system. The indicators shows the condition of the speed warning
system, whether in slow, fast and very fast conditions. With that, people will
be motivated to follow the rules and enhance their responsibilities on the road.
At the same time, this system is implemented to increase awareness on people
regarding safety. The results are performed for the status of light indicator,
the time taken and condition based on the speed detected by the system to show
the effectiveness of the system. |
Keywords: |
Solar Energy, Vehicle Speed Detection, Sensor, Microcontroller, Indicator |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
ENHANCED DATA SECURITY APPROACH FOR CLOUD ENVIRONMENT BASED ON VARIOUS
ENCRYPTION TECHNIQUES |
Author: |
IBTIHAL MOUHIB, EL OUADGHIRI DRISS |
Abstract: |
Cloud Computing is the future of the next generation architecture of IT
solutions , a way to increase the capacity or add capabilities dynamically
without investing in new infrastructure, training new personnel, or licensing
new software. Like any other technology cloud computing offer many advantages,
however it still has some problems. One of the most challenging problems in
Cloud Computing is the fact that the security and confidentiality of a remote
resource cannot be technically validated by the customers, who can use the
traditional methods of encryption (DES,AES,RSA…) to enhance the security of
their data in the cloud .but they can’t do any processing (searching, indexing…)
on their data without giving their private keys to the cloud company .So there
is a need for a mechanism to operate on encrypted data. A great interest has
been growing homomorphic encryption a solution for discussed problem. In this
paper we present first the cloud computing technology, then the security issues
related to this technology, we will also explain the different methods of
encryption and its applications to the cloud computing . Finally we propose our
approach to evaluate and analyze the performance of the Traditional and
Homomorphic encryption cryptosystems in cloud computing using OpenStack cloud
environment . |
Keywords: |
Cloud Computing ,Security Issues,Data Security,Symmetric Encryption, Asymmetric
Encryption, Homomorphic Encryption. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
REVIEW OF WEB-BROWSER COMMUNICATIONS’ SECURITY |
Author: |
ANTON PAVLOVICH TEYKHRIB |
Abstract: |
The issues of Internet communications’ security are considered in the article.
The causes of security violation and the main threats to communications’
security were defined. As a result, it became clear that protection against
threat of listening, interception, and data alteration is determined by
technology of data transmission, while other threats are connected with
organizational issues and infrastructure. Further, security aspects in modern
web browsers communications’ technologies such as WebRTC and RTMFP are
considered. As a result, it became clear that both technologies provide similar
protection capabilities based on AES encryption against unauthorized access to
data. |
Keywords: |
WebRTC, RTMFP, Internet Communications, Internet Communications’ Security
Threats, Encryption |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
MULTIPATH TRUST BASED FRAMEWORK FOR PREVENTION OF BLACKHOLE ATTACK IN MANETS |
Author: |
DILRAJ SINGH, Dr. AMARDEEP SINGH |
Abstract: |
Due to its self-organizing nature the Mobile Ad hoc Networks (MANETs) are
successfully able to provide a great channel for communication anywhere, anytime
in absence of any centralized infrastructure and have a huge potential in actual
applications like, in the military, rescue and commercial fields. However, due
to its dynamic nature the network they are susceptible to different type of
attacks which can hinder smooth functioning of the network. The standard routing
protocols for MANETs do not perform well in the presence of nodes that
intentionally drop data packets, one such malevolent behavior is launched by
blackhole nodes. In this paper, we propose a new protocol Enhanced Secure
Trusted AODV (ESTA) to cope with the problem of presence of such nodes in
network. ESTA is extension of on the broadly used reactive protocol Ad hoc
On-demand Distance Vector (AODV). The proposed protocol is multiple path
approach combined with the use of trust to eliminate the corrupt paths. The NS-3
based simulation results present that the proposed protocol is efficiently able
to thwart the effect of the blackhole attack in different scenarios and proves
to increase the ratio of successfully delivered data packets significantly. |
Keywords: |
Blackhole Attack, NS-3, Multipath, AODV, Trust. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE ROLE OF IT IN ENHANCING PRODUCTIVITY AT HIGHER EDUCATION INSTITUTIONS FROM
STAFF AND STUDENTS’ PERSPECTIVE - EVIDENCE FROM OMAN |
Author: |
SAMIR HAMMAMI, MANSOUR NASER ALRAJA, SYED AHSAN JAMIL |
Abstract: |
The main goal of this research is to assess the factors affect the overall role
of information technology to increase productivity of higher education
institutes from staff and students’ perspective, as there is a strong need to
involve other stakeholders such as employees and students besides top management
in these institutes in overall assessment and development, this will help
decision makers to get the needed practices through which these institutes can
overcome the challenges which are facing such as rapid changing in education
requirements, increasing complexity of the technology domain, which required
solid and updated information and analytical systems, and IT staff and student
skills.
In addition the new raising challenges, like infrastructure and applying project
management concepts in order to gain a competitive advantage, which will lead
these institutes to grow and attract more students while offering quality
education.
A model was developed in order to support the research theoretical parts about
the effects of IT infrastructure, IT system analysis, IT plan, IT systems, IT
staff skills, students skills and library systems on increasing productivity at
higher education institutes, for this purpose a survey was done and distributed
among departments and students and there were (156) respondents.
Through the theoretical study, and based on the outputs of the research survey,
the researchers found that the results indicated that higher institutes
productivity can be enhanced, and this enhancement will be reflected in several
sub factors of the tested model, like enhancing IT systems will seriously impact
the higher institute productivity and this impact can be noticed in many fields
like the incomplete, and limited information for decision-making, ineffective
use of employee time, lack of accurate and real-time information in the right
people’s hands when they need it and so on.
The findings present number of recommendations which aim to develop the
awareness about the productivity of higher education institutes, from the
perspective of their students.
This research clearly highlights the needs to build the right culture that keeps
looking at technology as a main asset of the higher institute, in addition to
pay attention to the employee factor, and try to develop their skills; all of
these will make the needed results by building an IT strategy for wise
investment in information technology. |
Keywords: |
IT, Education, Productivity, Knowledge, Systems, Capabilities. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
DESIGNING APPLICATION TO SUPPORT PROCESS AUDIT USING PROCESS MINING |
Author: |
ANGELINA PRIMA KURNIATI, GUNTUR PRABAWA KUSUMA, GEDE AGUNG ARY WISUDIAWAN |
Abstract: |
Process audit is a mechanism that is frequently used by organizations to ensure
the quality of their implemented processes. In auditing, auditors often conduct
testing based on sample data taken randomly. The auditors can use computerized
data sources, such as event logs which are automatically recorded in the
information system. Event logs illustrates how business processes run in real
process in the organization. This paper suggests the use of process mining in
auditing business processes based on data from event logs stored in information
systems. We propose the complete guide to use process mining in business process
audit, from planning to the evaluation. We also design an application which
implements process mining to support business process audit. This is expected to
improve the quality of audit recommendations, because they are based on the
overall data in the event logs. |
Keywords: |
Process Audit, Process Mining, Event Logs, Application |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
EXPLORATION OF INSTANT MESSAGING BEHAVIOR IN SMARTPHONE IN TAIWAN |
Author: |
YI-CHIH LEE, WEI-LI WU , YANG CHU LIN |
Abstract: |
Smartphones have become increasingly popular among consumers, and their
popularity has given rise to various kinds of applications, or apps. This study
attempts to use consumer gender and real world interpersonal relationships to
explore the moderating effect of popular cellphone communication software usage
on interpersonal interactions. This study uses variance analysis to test its
hypotheses, collecting data from a research sample of 128 university students
who use instant messaging (IM). The results show that when users have good
interpersonal relationships, they also have good interpersonal interactions.
Even if consumers use cellphone IM software infrequently, users who have good
interpersonal relationships in daily life can also interact via other
communication channels because they have better interpersonal interaction
techniques. |
Keywords: |
Smart Phones, Interpersonal Interaction, Instant Messaging |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
IDENTIFYING SIMILAR PATTERN OF POTENTIAL ASPECT ORIENTED FUNCTIONALITIES IN
SOFTWARE DEVELOPMENT LIFE CYCLE |
Author: |
MAZEN ISMAEEL GHAREB, GARY ALLEN |
Abstract: |
Aspect Aspect-oriented programming is known as a technique for modularizing
crosscutting concerns. However, there are no clear rules to help detect and
implement Aspects in the software development lifecycle. Consequently, class
developers face changeability, parallel development and comprehensibility
problems, because they must be aware of aspects whenever they develop or
maintain a class. These problems can be mitigated by using adequate design rules
between classes and aspects in the design stage and then in implementation
process. We need to define a similar pattern of aspect for many systems to
explore. This pattern will help development process from the initial phases,
especially with the aim of supporting modular development of classes and
aspects. Adding to that shows some design patterns relationships with aspects.
We discuss how several languages improve crosscutting modularity without
breaking class modularity. We evaluate our approach using a real case study and
compare it with other approaches to detect the Aspect Oriented in Design phase
of software developments. |
Keywords: |
Aspect Oriented Programming; ASDL (Aspect Oriented Design language),cross
cutting concern, modeling ,Design pattern. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
W-LEACH-MOBILE: AN ENHANCED MOBILE PROTOCOL WITH A DECENTRALIZED WAY IN WIRELESS
SENSOR NETWORK |
Author: |
ABDELHALIM HNINI, MOHAMMED FIHRI, ABDELLAH EZZATI, ABDEMAJID HAJAMI, MOHAMED
HANINI |
Abstract: |
A group of Wireless mobile nodes and a base station constitute a typical ad-hoc
network. This group is Wireless Sensor Network. Each node has a random
mobilization and a limited energy. Their battery’s powers play an important role
to extend lifespan. This problem is solved by hierarchical protocols, but they
are not effective with mobility. Random mobility generates the packets loss. To
manage these packets, there are two protocols proposed to control node mobility;
namely LEACH-mobile and CBR Mobile. In this work, we have ameliorated the
W-LEACH protocol to a new one called W-LEACH-Mobile in two ways. In the first
one, we have invested the idea proposed by W-LEACH to increase network life time
in a decentralized manner. In the Second, we have managed packets loss generated
with node mobility. Finally, we compare this new protocol with LEACH and
LEACH-Mobile protocols in terms of energy deception, and with LEACH, W-LEACH and
W-LEACH-Decentralized in terms of packets loss. |
Keywords: |
W-LEACH, LEACH-Mobile, W-LEACH-Mobile, WSN. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
IEC 61850-BASED WLAN PEER-TO-PEER FEEDER PROTECTION IMPROVEMENT IN SMART GRID
SUBSTATION AUTOMATION SYSTEM |
Author: |
NASSER HASAN ALI, BORHANUDDIN MOHD ALI, OTMAN BASIR, MOHAMMAD LUTFI OTHMAN,
FAZIRULHISYAM HASHIM |
Abstract: |
The development of a computational platform of a communication network for an
automation system using the precepts of IEC 61850 has become a great trend in
substation automation systems (SASs) research. Recent developments in wireless
communication technologies, especially the IEEE802.11 have enabled
cost-effective remote control systems with a capability of monitoring, control
and protection in the real-time operating conditions of substations. The message
delay and throughput in substation automation while using the WLAN and smart
grid must satisfy the standard requirements specified in the IEC 61850-5. In
this paper, the end-to-end (ETE) delay of IEC 61850-based messages and operating
time of the over current protection using the WLAN-based communication network
has been evaluated using Opnet Modeler Edition 18.0. |
Keywords: |
IEC 61850, Substation Automation Systems (SASs), Wireless Local Area Network (WLAN) |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
APPLICATION OF MANGROVE FOREST COVERAGE DETECTION IN NGURAH RAI GRAND FOREST
PARK USING NDVI TRANSFORMATION METHOD |
Author: |
I PUTU WAWAN SANJAYA PUTRA, I KETUT GEDE DARMA PUTRA, I PUTU AGUNG BAYUPATI,
A.A.K. OKA SUDANA, I DEWA NYOMAN NURWEDA PUTRA, NI KADEK DWI RUSJAYANTHI |
Abstract: |
This study aims to detect the area and the changes of Mangrove forest coverage
in Ngurah Rai Grand Forest Park in Bali. This detection was managed
automatically by using a particular application constructed by employing Matlab
programming language. It is more rapid and effective rather than manual
computation and direct field measurement. NDVI is the frequently used method in
indentifying vegetation. The value of pixel of NDVI is obtained from a formula
constituting two images of Landsat satellite. The pixel value of NDVI ranges
between -1 to +1 in which the positive value indicates the vegetations and the
negative value indicates non-vegetation objects. NDVI Threshold is a process of
classifying objects based on the NDVI pixel value. NDVI Threshold is conducted
by providing range of value towards NDVI pixel. Mangrove forest is included in
the category of briny forest, the NDVI pixel value for this kind of forest
ranges from 0.4 to 0.8. The result of NDVI Threshold is used to calculate the
total pixel of NDVI which includes within that range. Then, the result will be
multiplied to the spatial resolution of Landsat satellite to obtain the area of
Mangrove forest coverage. |
Keywords: |
NDVI, Landsat, NDVI Threshold, Mangrove Forest, Mangrove Coverage |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT
ALGORITHM |
Author: |
P.V.V.KISHORE, P.DHEERAJ SRIVATHSAV, M.MANIKANTA, N.VENKATRAM, L.S.S.REDDY,
GOUTHAM.E.N.D, D.KIMILA DEVI, A.S.C.S.SASTRY |
Abstract: |
Medical images communicate imperative information to the doctors about a
patient’s health situation. Internet broadcasts these medical images to
inaccessible sites of the globe which are inspected by specialist doctors. But
data transmissions through unsecured web invoke validation problems for any
image data. Medical images that are transmitted through the internet must be
watermarked with patient pictures for substantiation by the doctors to ascertain
the medical image. Medical images contain very susceptible information connected
to a patient’s health. Watermarking medical images necessitate attentive
adjustments to protect the information in the medical images with patient image
watermarks. The medical images are used as an envelope image in the watermarking
process which is visible on the network. These envelope medical images are
watermarked with patient images in wavelet domain there by using the BAT
algorithm form optimizing the embedding process for peak signal to noise
ratio(psnr) and normalized cross correlation coefficient (ncc) values. The
medical image envelope and letter inside envelope i.e. watermark image are
transformed into wavelet domain and are mixed using scaling factor alpha which
is termed as embedding strength. BAT algorithm is an optimization algorithm
specialized in optimizing the values of peak-signal-to-noise ratio for a
particular value of alpha, the embedding watermark strength. Finally these
watermarked medical images are put on the network along with the secret key that
will be used for extraction. At the receiving the embedded watermark is
extracted using 2DWT using the embedding strength value using BAT algorithm. The
robustness of the proposed watermarking techniques is tested with various
attacks on the watermarked medical images. Peak-Signal-to-Noise ratios and
Normalized cross correlation coefficients are computed to accesses the quality
of the watermarked medical images and extracted patient images. The results are
produced for three types of medical images with one patient image watermarks
using single key by using four wavelets (haar, db, symlets, bior) at four
different levels (1&2). |
Keywords: |
Medical Image Watermarking, Discrete Wavelet Transform (DWT), Optimization
algorithms, BAT algorithm, MRI, CT and Ultrasound Images, psnr and ncc |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
A DECISION SUPPORT SYSTEM FOR PREDICTION OF THYROID DISEASE - A COMPARISON OF
MULTILAYER PERCEPTRON NEURAL NETWORK AND RADIAL BASIS FUNCTION NEURAL NETWORK |
Author: |
SHAIK.RAZIA, M.R.NARASINGARAO, G R SRIDHAR |
Abstract: |
Thyroid disease is a major cause of concern in medical diagnosis and the
prediction / onset of which is a difficult proposition in medical research. In
this research, we use two Neural Network models Multilayer perceptron (MLP) and
Radial Basis Function Networks (RBF) for the prediction of onset of thyroid
disease using the data generated in real life. The MLP is trained and tested
with Back-propagation algorithm whereas RBF networks was trained and tested with
SPSS software. Thyroid disease database which had been published and was used
for empirical comparisons and the results show that MLP and RBF show the almost
same kind of results in diagnosing the thyroid disease. |
Keywords: |
Neural networks, Radialbasisfunction Network, Multilayer Perceptron, Thyroid
Disease, Back-Propagation, Medical Diagnosis. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE STRENGTH OF COMPLEMENTARITY OF E-LEARNING AND SERIOUS GAME |
Author: |
EL ARROUM FATIMA-ZOHRA, ZIDOUN YOUNESS, HANOUNE MOSTAFA |
Abstract: |
The digital revolution seems to be endless, it accelerates for well over a
decade with the innovation of new terminals and virtual worlds, social
networking, Web 2.0, cloud computing. Digital workspaces extend widely nowadays
and new sciences appear, notably digital learning is a technological revolution
that impacts learning and training: E-learning, Serious Games, MOOC, and Mobile
Learning ... although practices evolve, e -learning and serious games are still
equivocal approaches and we still hear questions relating to it. In this article
we identify the cataclysm leads by the two solutions serious game and e
-learning and deduce the major impacts on the field of learning and training,
identifying the strengths of each one of them in order to obtain accurate
information that will deepen reflections on the passage to digital learning and
the emblem of the competition and complementarity between e-learning and serious
games |
Keywords: |
A Digital Learning, Serious Game, E -learning, fun learning mechanisms. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
LINGUISTIC RULE-BASED TRANSLATION OF NATURAL LANGUAGE QUESTION INTO SPARQL QUERY
FOR EFFECTIVE SEMANTIC QUESTION ANSWERING |
Author: |
NURFADHLINA MOHD SHAREF , SHAHRUL AZMAN NOAH , MASRAH AZRIFAH AZMI MURAD |
Abstract: |
Semantic question answering (SQA) demands different processing compared to the
common information retrieval method because the semantic knowledge base is
stored in the triples form. However, manipulating the knowledge requires
understanding of its structure and proficiency in semantic query language such
as SPARQL. Natural language interface (NLI) alleviates this by allowing user to
input question in their human language. Then it produces an answer by
translating the input into an equivalent SPARQL before it is executed to
retrieve the answer. However, none of the existing research has presented a
holistic computational model for the translation of NL question into an
equivalent SPARQL for the semantic KB querying. Existing studies have focused
mainly on the semantic disambiguation through consolidation where user
interaction is initiated so that relevant concept can be chosen by the user to
be inserted into the SPARQL. Besides, the linguistic understanding of the input
has limited coverage where only one triple is constructed which loses many
original expressions. There is a necessity to increase the linguistic
understanding to involve multi-variables and multi-triples in the translated
SPARQL so that accurate answer will be returned. Therefore, in this paper the
linguistic challenge in NLI is addressed, specifically on the question
complexity depth, processes that need to be performed to answer the question and
gaps in existing study. A linguistic-rule-based translation model for natural
language question is introduced that utilizes a set of observational variables
to extract the information in the question; (i) checking if the focus is equals
to subject, (ii) number of subjects, (iii) number of property, (iv) number of
object, (v) checking if object is instance, (vi) checking if the question
contains superlative expression, (vii) superlative orientation and (viii)
checking if the question contains aggregates expression. The model is also aimed
to reduce dependability on clarification dialogues. The results
show that the approach has managed to eliminate clarification dialogues and
increase linguistic coverage of NLI. |
Keywords: |
Semantic Question Answering, Natural Language Interface, Natural Language,
SPARQL, Semantic Search, Semantic Web |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
Title: |
VIRTUAL MACHINE OPTIMIZATION USE DYNAMIC RESOURCE ALLOCATION ON XENSERVER |
Author: |
MARDHANI RIASETIAWAN, AHMAD ASHARI, IRWAN ENDRAYANTO |
Abstract: |
Virtual machines as mechanism of virtualization have several problems on
resource allocation and optimization. VM needs to be define to handle the
resource need for computation and services. The failure can be happen when the
transaction on virtual machines increase without the scalable resource
capacities. Virtual machines mostly run in multiple virtual machines to handle
different services. The research works on optimization on Virtual Machines use
dynamic resource allocation on XenServer 6.5 infrastructures. The optimization
implement two strategies there are resource allocation and topologies. Resource
allocation analyze and benchmark between dynamic and dedicated resource
allocation. Both of allocation strategies implemented on several core and
processor topologies. The results show that dynamic resource allocation have
more stable performance and show the optimization has reached by stability. The
stability supported by 4 VCPU with 1 socket with core topologies. This result is
important to define the resource need on Data Center or Infrastructures in term
of design and maintenances. |
Keywords: |
Virtual Machines, Resource Allocation, XenServer 6.5, Topologies, Dynamic |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2015 -- Vol. 80. No. 3 -- 2015 |
Full
Text |
|
|
|