|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2016 | Vol. 85 No.2 |
Title: |
OPTIMIZING COMMUNICATION AND COOLING COSTS IN HPC DATA CENTER |
Author: |
PROF. FADI FOUZ, SHADI ALRAHAL |
Abstract: |
Decreasing communication among nodes is an important factor to achieve high
performance in the data centers. All proposed allocation approaches (contiguous
and discontiguous) targeted the nodes itself that are included in a data center.
In this paper, we targeted the job itself to decrease the communication through
proposing an algorithm that schedules the jobs according to their sizes called
same_job_same_size (SJSS). Running these heavy jobs needs a high cooling cost to
avoid point of faultier, caused by heat generated by active servers, since
executing these jobs takes very long times. A hybrid allocation approach (CBS)
is proposed to distribute these jobs over cold spots relying on heat
recirculation factor (HRF) to decrease the cooling costs. Our proposed approach
hits the best values, comparing to some other approaches, under terms of usage
system and saving cooling costs where it achieved 14% of saving power
consumption. |
Keywords: |
Air Circulation, Communication Jump Message, Contiguous Allocation ,Cold Spots,
Cooling Cost, Discontiguous Allocation, Hot Spot. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
A DYNAMIC APPROACH TO TASK SCHEDULING IN CLOUD COMPUTING USING GENETIC ALGORITHM |
Author: |
R. DURGA LAKSHMI , N SRINIVASU2 |
Abstract: |
Cloud computing is one of device technology trends in the future since it
combines the advantages of both device computing and cloud, Recent years have
seen the massive migration of enterprise applications to the cloud. Cloud
computing used in business organizations and educational institutions. One of
the challenges posed by cloud applications is Quality-of-Service (QoS)
management, which is the problem of allocating resources to the application to
guarantee a service level along dimensions such as performance, availability and
reliability. To improve the QoS in a system one must need to reduce the waiting
time of the system. Genetic Algorithm (GA) is a heuristic search technique which
produces the optimal solution of the tasks. This work produces one scheduling
algorithm based on GA to optimize the waiting time of overall system. The cloud
environment is divided into two parts mainly, one is Cloud User (CU) and another
is Cloud Service Provider (CSP). CU sends service requests to the CSP and all
the requests are stored in a Request Queue (RQ) inside CSP which directly
communicates with GA Module Queue Sequencer (GAQS). GAQS perform background
operation, like daemon, with extreme dedication and selects the best sequence of
jobs to be executed which minimize the Waiting time (WT) of the tasks using
Round Robin (RR) scheduling Algorithm and store them into Buffer Queue (BQ).
Then the jobs must be scheduled by the Job Scheduler (JS) and select the
particular resource from resource pool (RP) which it needs for execution. |
Keywords: |
Genetic Algorithm, Cloud computing, Quality of Service, Cloud User, Cloud
Service Provider, Request Queue, GA Module Queue Sequencer, Buffer Queue,
Waiting Time, Round Robin Scheduling Algorithm, , Resource Pool. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
CROWDSOURCING SYSTEMS ON FACEBOOK PLATFORM: EXPERIMENT IN IMPLEMENTATION OF
MATHEMATICAL METHODS IN SOCIAL RESEARCH |
Author: |
NATALIA ANATOLIEVNA RYABCHENKO, INNA VALERIEVNA MIROSHNICHENKO, ANNA
ALEKSANDROVNA GNEDASH, ELENA VASILIEVNA MOROZOVA |
Abstract: |
The authors research the potential of network civil society for public
crowdsourcing development in the contemporary Russian environment. The authors
consider public crowdsourcing as policy subjects’ activity aimed at using the
resources of citizens, who are engaged in online social networks, to
collectively work out (ideas, projects) and/or support (a decision, practice)
political innovations in the sphere of public policy. Thus, the authors put
forward the issue of studying the quality of network structures and mechanisms
of their functioning. The article reflects the main results of empirical
research that attempted to define the network structure uniting Russian
crowdsourcing resources employing the mathematical analysis of social networks
and network communities within the framework of Facebook platform and to
describe dominant actors of the network structure under research on the basis of
social graph theory. |
Keywords: |
Online Space, The Internet, Online Social Networks, Network Analysis, Public
Policy, Network Civil Society, Crowdsourcing |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
MODELING OF COMMUNICATION PROCESS IN SOCIAL ENVIRONMENT |
Author: |
ISKANDAR MARATOVICH AZHMUHAMEDOV, AL'BERT ISKANDAROVICH AZHMUHAMEDOV, DINA
ALUEVNA MACHUEVA |
Abstract: |
The social component is an essential element of most real-world systems, the
efficiency of it’s control largely influences any company success and
competitiveness. Control manipulations of the staff are divided into measures
related to the control over the staff members and the structure of the social
subsystem (SSS), as well as measures of institutional, motivational and
informational manipulation. Informational manipulation takes a special place in
this case. It involves the management of the structure and the amount of
information available to the participants of a certain process. It is usually
used to create a supportive and safe environment, maintain and strengthen the
authority of the leadership, manipulate the consciousness of people in order to
increase the level of motivation and loyalty to the system, create the
atmosphere of zero tolerance for violations of certain norms of behavior, raise
awareness of the decision-maker (DM), misinform hostile environment, etc.
However, the effective use of informational manipulation is constrained by the
fact that the specificity of human behavior inherently contains uncertainty.
This uncertainty is subjective and cannot be described by classical methods of
mathematical statistics that use the concept of objective probability. To
account for this feature, the concept of the theory of fuzzy sets was applied
when building the model. Communication in the SSS is presented in the form of
dissemination of information in a graph whose vertices are the people and a
plurality of ribs reflects a potential exchange of information between them and
forms a "matrix of information exchange." The model built takes into account
such factors as a possible asymmetry of the "matrix of information exchange",
availability of the certain topic for the block of information that carries the
vector of control signals, availability of the information exchange subject's
own initial views on the information disseminated, degree of "conservatism" of
the subject and his or her trust in the other members of the information
exchange, level of his or her exposure to " social integrated force", etc. The
model of communication in the social environment built in the work and the
algorithm of informational manipulation of the staff developed on its basis with
the purpose of bringing the SSS to a state set by the DM contribute to improving
the efficiency of managing the social component. The experimental check
conducted on the basis of a large international collection agency showed the
adequacy of the proposed model and the usefulness of the approach in practice. |
Keywords: |
Social Subsystem, Information Exchange, Concept Of Fuzzy Sets; Information
Control |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
COMPUTATIONAL LOAD DISTRIBUTION METHOD IN A PRIVATE CLOUD OF A MOBILE
APPLICATION OF AN INTEGRATED ENTERPRISE INFORMATION SYSTEM |
Author: |
VLADIMIR VYACHESLAVOVICH KOPYTOV, ANDREI OLEGOVICH SHULGIN, NIKITA GEORGIEVICH
DEMURCHEV, VLADIMIR VIKTOROVICH NAUMENKO, ANDREI VLADIMIROVICH GRITSENKO, SERGEI
ALEKSANDROVICH FEDOROV |
Abstract: |
The use of cluster technology in a private cloud of a mobile application of an
integrated enterprise information system requires the measures ensuring the
reliable operation of its hardware component to be developed. The solution of
this problem involves the use of effective mechanisms for maintaining high
availability of a private cloud of a mobile application as well as the solutions
to ensure the failover operation of server and client components. This paper
describes the method of load distribution among computer network nodes in a
private cloud of a mobile application integrated in a corporate information
system; this proposed algorithm is based on the load prediction of the computer
system, it performs the preliminary resources reservation required to perform a
given task, initiated by user request. Load prediction is performed by the
decomposition analysis of the history of running user tasks, which is a
preliminary allocation of recurring task patterns with a certain set of
parameters and with further prediction of occurrence of these problems in queue.
The proposed method greatly enhances the productivity of a mobile application;
it expands the set of the functions performed by the remote client by request
and ensures the integration of several information systems on the basis of a
single private cloud. |
Keywords: |
Mobile Application, Information System, Cloud, Load Forecast, Resource
Management System |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
CONTENT BASED VIDEO RETRIEVAL USING DOMINANT COLOR OF THE TRUNCATED BLOCKS OF
FRAME |
Author: |
TEJASWI POTLURI, GNANESWARARAO NITTA |
Abstract: |
We describe a system for content-based video retrieval for a large set of
geographical data set consisting different categories of data like animals,
birds, flowers, etc. The system retrieves similar videos using most dominant
color of the non-overlapping truncated blocks of the key frame from a video. To
reduce the complexity, the system converts each block of a key frame into
combination of only twenty colors by using color look-up table. We can find out
the most dominant color of each block by using same color-lookup table. Simple
and efficient Euclidean distance metric is used to find out the most similar
videos that match to our query video. The approach is reliable and flexible by
consisting videos of different lengths in the dataset. |
Keywords: |
Content-Based Video Retrieval, Block Truncation, Color Mapping, Identification
of Dominant Color, Euclidean Distance. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
TRUST MODEL TO INCREASE PURCHASE INTENT AMONG E-COMMERCE CONSUMERS |
Author: |
SHARFI M. ABBASS, SAIFE ELDIN FATTOH OSMAN |
Abstract: |
This paper draws a comparison between proposed trust model and other online
trust models, with special emphasis on eBay, as one of the best trusted sites in
this field conducted by comparisons with similar sites in this paper, and it has
been identified strengths and weaknesses that exist in the eBay site and a
solutions for those problems has been proposed. Proposed model depends on a
secured database by assurance key (AK), technically known as the AK-DB, which
contains a unique number for each consumer can not possess other, and designed
AK generation and verification system (AKGVS). The proposed AKs are intended to
replace credit card numbers, as a tool for verification of consumer identity
when conducting electronic transactions. After that capture a picture of the
face of the consumer using a digital camera is stored digital image in the
database (Image-DB) by his/her AK and then compared this data in a trusted third
party (TTP) database equipped with technology Face Recognition (FR), where is
verified by online verification (OV) system. After verifying the customer's AK
and image, it is compared that data with the blacklist (BL) that have all of
his/her data remnants precedent set by the TTP to make sure that the consumer
has no previous offenses and then allow or not to allow him/ to practice
e-commerce through the website. When allowed to practice E-Commerce in
e-fulfillment of the terms of trade becomes (seller / buyer) to know each other,
which, in turn, leads to increase the trust among them, and the formation of a
secure e-community. Were generated AK system test and compare the results with
the system used in the generation of credit cards results then were analyzed
this data using the ANOVA statistical analysis to identify the results, the
results proved that proposed model has made the best of these credit cards
results, There is a significant difference and statistically significant (Sig.
0.000), then the proposed model assessing the same method adopted in the
evaluation eBay model. Finally, proposed new e-payment mothed more secure and
easy such as (Hassa service) or use of social networks such as (Twitter) in
financial transactions. |
Keywords: |
Assurance keys (AK) , credit cards, trust, electronic commerce (E-Commerce),
electronic consumers (E-Consumers), trusted third party (TTP) |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
IMPROVED MODEL FOR THE DETECTION OF MYOCARDIAL INFARCTION FROM MULTILEAD ECG
USING QRS POINT SCORE AS AN ADDITIONAL FEATURE |
Author: |
SMITA L KASAR , MADHURI S JOSHI |
Abstract: |
Complexities of interpretation of various ECG findings in patients with
myocardial infarction are well known. This study is an attempt to find out the
utility of point scoring system in diagnosing myocardial infarction. The present
study was done as an analysis of the data available in the database PTB from the
public domain “Physionet” where 12 lead simultaneous signals of Normal patients
and Myocardial Infarction are available. Multi-lead ECGs acquired simultaneously
improves the accuracy in the diagnosis of heart diseases. The signals were
analyzed for each of the 34 normal patients and 33 patients who have been
diagnosed to have myocardial infarction. Point score as a feature and Naïve
Bayes classifier were used to assess the ECGs. The point scores and Naïve Bayes
classifier found the maximum diagnostic accuracy in the lead V6 where the area
under curve is 0.968 and 95.65% individuals were correctly classified. Kappa
score for all the leads when both the point score and Naïve Bayes classifier was
used ranged between 0.78 and 0.96 with 93% sensitivity but with the exclusion of
the point scores, the same ranged between 0.61 and 0.87. We found the
combination of both point scores and Naïve Bayes classification to be good
predictive utility in diagnosing myocardial infarction. |
Keywords: |
ECG, MI, Naïve Bayes, PCA |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
PRELIMINARY MODEL FOR COMPUTER BASED ASSESSMENT ACCEPTANCE IN DEVELOPING
COUNTRIES |
Author: |
HAKAMI, YAHYA ABDUH A, AB RAZAK CHE BIN HUSSEI & KAYODE I. ADENUGA |
Abstract: |
In information systems study, computerized testing has evolved into what it is
today as a result of the technological advancements. It has been a preferred
form of assessment in some educational establishment since assessment process is
considered to be fair, faster and reliable. However, a number of studies have
provided evidence supporting a direct relationship between computer anxiety and
computer utilization. The computer anxiety research clearly shows that a highly
computer apprehensive individual will be at a great disadvantage compared to
his/her peers. Quite a lot of technology acceptance studies in the field of
education have been carried out, but a majority of them have been on the use of
e-learning. Most of these studies used TAM as the base model and extended it
with other constructs. Only very few studies used TAM without extending it. In
comparison with e-assessment acceptance, just little research work has been
done; the majority of the work has been done by Terzis and Economides. However,
till date it is quite incomprehensible if the potential advantages of CBAs have
been fully implemented due to many factors affecting its acceptance. The
researchers investigate this by using a systematic literature review to explore
these factors, and establish suitable technology acceptance model that would
minimize fear associated with computer usage. This study is expected to help the
education decision makers towards implementing a solid CBA system for secondary
school students. Therefore this research is a research in progress review paper
which is designed to understand the issues relating to CBA acceptance and
implementation issues. |
Keywords: |
"E-Assessment" AND Acceptance "Computer Based Assessment” AND Computer Anxiety,
And “Computer Based Assessment” AND Computer Literacy |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
AGE CLASSIFICATION BASED ON ROTATIONAL INVARIANT FEATURES |
Author: |
P.J.S. KUMAR, V. VENKATA KRISHNA, Prof. YK SUNDARA KRISHNA |
Abstract: |
Age classification has many useful applications, such as finding lost children,
age-based face classification, surveillance monitoring, and face recognition.
That’s why automatic age classification has become one of the challenging tasks
in recent years and gained lot of attention from the research community. The
present research derived a rotational invariant method by considering the
rotational invariant local binary pattern (riLBP) that captures the local
information of the facial images significantly. On this, shape features are
evaluated using textons. On this GLCM features are derived to classify age in to
four groups on FG-NET database using various classifiers. The results are
compared with other methods and a comparison is made among the various
classifiers. |
Keywords: |
Local binary pattern, Textons, Grey level co-occurrence matrix features,
Classifiers, FG-NET data base |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL
CONTRAST ENHANCEMENT |
Author: |
NUR HALILAH BINTI ISMAIL, SOONG-DER CHEN |
Abstract: |
This paper presents an algorithm for detecting smooth texture in facial images
which is prone to unnatural contrast enhancement. The algorithm consists of
texture analysis and machine learning algorithm. Wavelet decomposition is used
for texture analysis. Smooth texture tends to have small variance among the
wavelet coefficients within the same scale. This paper proposes to divide image
into 32×32 sub-image with overlapping of 16 pixels, then perform wavelet
decomposition with 5 scales. The final feature is a 5 dimensional vector
consists of the variance of the wavelet coefficients from each of the 5 scales.
Support Vector Machine (SVM) is used for feature classification. The SVM
classifier was trained using 468 samples consist of samples from skin areas
(smooth texture) and non-smooth area (eye and nose) of 78 test images. The
performance of the classifier was evaluated using k-fold cross validation with k
range from 2 to 10. The performance was excellent with the average accuracy for
each value of k above 95%. The performance was also very consistent across
different set of test images with standard deviation range from 1% ~ 4%. |
Keywords: |
Naturalness, Contrast, Statistical Naturalness, Contrast, Image Quality
Assessment Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
E-MARKETPLACE LEGAL AND REGULATORY FRAMEWORK IN JORDAN: A GENERAL VIEW |
Author: |
HAITHAM ALALI, RAED WISHAH, SHIREEN ALALI, AHMAD AL-SUKKAR, AL-HARETH ABU-HUSSIEN |
Abstract: |
Jordan has rapid development of its virtual and real business environments; the
country is improving the framework necessary to support the growth of its
e-business activities. The increasing use of Internet and the potential of
e-commerce give rise to important policy issues relating to national economic
policy and rules of international trade. This article explores the general
situation of e-marketplace in Jordan. Over the time, the market has been
affected more by regulation than by any economic, social or technological
change. The necessary regulations to sustain e-business activities in Jordan
started almost with establishing the Electronic Transaction Law in 2001 which
covered the electronic records, electronic signature, information letter,
transferable electronic deed, electronic money transfer, authentication
certificate, and penalties. One of the nations in the Arabian countries which
has passed legislation (Electronic Transaction Act 85 of 2001) in terms of
regulating e-business is Jordan, which was recently revised with the Electronic
Transactions Law No.15 of the year 2015. Obviously, this set of laws requires
further steps to deal with the electronic commerce that is governed by other
laws and cover all e-business aspects. Likewise, more attention should be taken
for legal, financial and market access issues that related to the e-marketplace
and improve upon them. |
Keywords: |
E-Marketplace, E-Commerce, Jordan, Regulations, Property, Economy. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
APPLYING INTELLIGENT MOTION AND LOCATION MONITORING SYSTEM FOR THE ELDERLY |
Author: |
S. KHAWANDI, B. DAYA, F. KHALIL |
Abstract: |
One of three adults 65 years or older falls every year. As medical science
advances, people can live with better health and alone up to a very advanced
age. Therefore, to let elderly people live in their own homes leading their
normal life and at the same time taking care of them requires new kinds of
systems. In this paper, we propose a multi-sensor monitoring system for the fall
detection in home environments. The proposed system extracts motion and location
data from the webcam, and heart rate from the heart rate sensor.The extracted
parameters are the face and body speeds, center of mass, aspect ratio and heart
rate. These parameters will be fed to a neural network classifier in order to
classify the fall event in two classes: fall and not fall. Reliable recognition
rate of experimental results underlines satisfactory performance of our system. |
Keywords: |
Neural Network; fall detection; heart rate; webcam. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
Title: |
SECOND GENERATION IEEE802.11N PERFORMANCE FOR IEC61850-BASED SUBSTATION
AUTOMATION SYSTEM |
Author: |
NASSER HASAN ALI, BORHANUDDIN MOHD ALI, OTMAN BASIR, MOHAMMAD LUTFI OTHMAN,
FAZIRULHISYAM HASHIM |
Abstract: |
As the initial scope of supporting communications inside substation automation
systems, IEC 61850 was defined to be mapped on Ethernet as the layer 2
communication network technology. It is because the Ethernet is the dominant
technology for the Local area network – LAN and it brings significant advantages
of high bandwidth and low latency especially with the use of optics fibers at
the physical layer. Consequently, Ethernet is very appropriate for the
substation indoor LAN with applications that require high bandwidth e.g.
measurements and time-critical functions such as protection services. However,
when IEC 61850 is extended to support large-scale communication networks between
substations, control the centers to substations and DERs; Ethernet is no longer
a good solution. The rapid emergence of DERs, the increasing amount of electric
vehicles and smart meters reveal the shortcomings of Ethernet which rest in its
high set-up cost and scalability problem following the use of cable for all
connections. In this paper we focus on the use of the Wireless Local Area
Network (WLAN) technology to support distribution substation applications. The
advantages of this solution lie in the low cost of installation, enough data
rates, and hassle-free deployment. However, it is not suitable for remote
control communications in the distribution grid due to the limited coverage of
the Wi-Fi radio. Some examples of using WLAN Compliance with IEC 61850 models to
construct the SAS network as well as the network performance simulation results
are also included in this paper based on the Opnet software. |
Keywords: |
Distribution Energy Resources (DERs), IEC 61850, optical fiber, wireless Local
Area Network (WLAN), Substation Automation System (SAS). |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2016 -- Vol. 85. No. 2 -- 2016 |
Full
Text |
|
|
|