|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2016 | Vol. 83 No.1 |
Title: |
GRAPH PATTERN MATCHING IN YEAST DATASET |
Author: |
DION TANJUNG, KEMAS RAHMAT SALEH W, ST., M.ENG., SHINTA YULIA P, ST |
Abstract: |
Graph representation has been widely used in scientific study to analyze a
pattern. Geographic maps, computer networks, chemical structures, and databases
are examples of information that can be applied to graph representation. This is
related to graph representation method that makes manipulation data easier.The
needs and growth of information make graph representation larger. Pattern
analysis need more time while searching in larger graph. Therefore we need new
method to searching graph pattern in a large graph. In thisresearch , graph
query language(GraphQL) algorithm is used for searching graph pattern in graph
database using yeast dataset. This algorithm is used because it can search graph
pattern in graph databases by reducing search space. The result obtain
combination of local pruning and global pruning can reduce search space with the
result of reduction ratio and running time being lower. Smaller search space
make process of searching graph pattern in graph faster. |
Keywords: |
GraphQLAlgorithm, Reduction Ratio, Running Time, Graph, Graph Pattern |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
EMPIRICAL EVALUATION OF DIFFERENT CLUSTERING APPROACHES FOR VISUAL CODEBOOK
GENERATION |
Author: |
JURAJ RABCAN, GABRIELA GRMANOVA |
Abstract: |
Bag of Visual Words is a common representation of images in computer vision. The
important task for this representation is a creation of visual codebook, where
the set of all considerable visual words is stored. Visual words are represented
by descriptors of local features and to reduce their amount and to choose only
significant ones, the visual codebook is generated by clustering of these
descriptors. State of the art for clustering descriptors of local features is k-menas
algorithm. The drawback of codebook generation by k-means algorithm is that
cluster centers are located in high density areas. In this paper, we investigate
several other algorithms and we compare them with k-menas algorithm. Tested
algorithms are similar to k-means in their goals, but have algorithmically
different approaches. Comparison is done by evaluating of image retrieval task
on UK-bench dataset and classification on Caltech 101. |
Keywords: |
Bag of Visual Words, Clustering, Local features, Image retrieval |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
CROSS-LANGUAGE PLAGIARISM OF ARABIC-ENGLISH DOCUMENTS USING LINEAR LOGISTIC
REGRESSION |
Author: |
ZAID ALAA, SABRINA TIUN, MOHAMMEDHASAN ABDULAMEER |
Abstract: |
Cross-Language Plagiarism Detection (CLPD)is used to automatically identify and
extract plagiarism among documents in different languages.The main challenge of
cross-languageplagiarism detection is the difference of text languages, where
the original source can be analysed and translated, and plagiarism can be
detected automatically by comparing suspected text with the original text. This
paper proposes an Arabic-English cross-language plagiarism detection method,to
automatically detect the semantic relatedness between the words of two suspect
targeted files.The proposed method consists of four phases. The first phase is a
pre-processing phase,the second involves key phrase extraction and translation,
the third phase used plagiarism detection techniques and the fourth phase is the
classification process, which using Linear Logistic Regression (LLR). The
evaluation process is created using precision and recall measurements of a
dataset consisting of Wikipedia articles. The experimental resultsachieved96%
precision, 85% recall and 90.16% F-measure. The results show that the
LLRalgorithm can be used effectively to detect Arabic-English cross-language
plagiarism. |
Keywords: |
Cross-Language Plagiarism Detection, Linear Logistic Regression,Arabic-English
Cross- Language Plagiarism, Plagiarism Detection, And Wikipedia Articles. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
SENSORLESS CONTROL OF SWITCHED RELUCTANCE MOTOR WITH FUZZY-PI CONTROLLER |
Author: |
KHALID GRARI, JAMAL BOUCHNAIF, MOHMMED AZIZI, HICHAM FADIL, ANAS BENSLIMANE |
Abstract: |
Currently, the switched reluctance motor is recognized as a performing engine,
due to its high reliability, robustness and low cost
In this paper, a PI controller applied for SRM speed control is improved using a
Fuzzy logic algorithm, which made the PI controller gains self-adapting.
Simulation with MATLAB/SIMULINK software are carried out to show the improvement
performance under many constraints.
Difficulties encountered to impose a standard mechanical sensor to the SRM and
the disadvantages of this sensor in terms of cost and reliability have motivated
us to use current gradient slope method to estimate the SRM position, this
method uses the current profile. |
Keywords: |
Switched Reluctance Motor, Sensorless, PI Controller, Fuzzy-PI controller, speed
control |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
DOMAIN-SPECIFIC ONTOLOGY-BASED APPROACH FOR ARABIC QUESTION ANSWERING |
Author: |
MUSTEFA SHEKER, SAIDAH SAAD, REHAB ABOOD, MOHANAAD SHAKIR |
Abstract: |
Automatic Question Answering (QA) is the process of identifying exact answer in
response of question asked by the user. Several QA approaches have been proposed
for many languages. One of such languages is Arabic which spoken by nearly 200
million people. Approximately 90% of Arab people are Muslims. Many Muslims need
religious consultations toward specific issues. Such consultations have to be
acquired from a legitimate source such as Islamic scholars. The response toward
these consolations is called a Fatwa, which is considered as an Islamic point of
view toward such issues. Therefore, there is a vital demand to present a QA
system that has the ability to answer Muslims questions based on a collection of
Fatwas. Several research efforts have been implemented to provide QA for Islamic
domain. However, such efforts have used simple lists of lexicons as a source of
knowledge, which leads to several limitations in terms of the correctness of the
answers. This is due to the process of analyzing question would not be guided
with a rich source of knowledge. Hence, this study aims to propose an
ontology-based question answering approach for the domain of Islamic Fatwa. The
ontology has been constructed using a collection of Fatwas, which has been
collected from Ibn Uthaymeen-Prayer Fatwas. Several pre-processing tasks have
been applied in order to eliminate the irrelevant data (e.g. numbers, non-Arabic
letters and punctuation). Furthermore, Term Frequency-Inverse Document Frequency
(TFIDF) has been used in order to provide the main concepts of the domain for
ontology construction. The proposed ontology-based QA has been evaluated by
comparing it with QA approach that uses simple semantic lexicon as a source of
knowledge. The proposed method has outperformed the other approach by obtaining
an approximately 90% of F-measure. This demonstrates that the use of ontology as
a source of knowledge for QA would enrich the process of extracting the answers. |
Keywords: |
Question Answering, Query Expansion, Ontology, Similarity Measures, Arabic |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
ON-LINE CLUSTERING OF LECTURERS PERFORMANCE OF COMPUTER SCIENCE DEPARTMENT OF
SEMARANG STATE UNIVERSITY USING K-MEANSALGORITHM |
Author: |
ENDANG SUGIHARTI, MUCH. AZIZ MUSLIM |
Abstract: |
Lecturer is one of the essential components of an educational system in
universities. Quality of lecturer performance can be reflected in the
productivity and quality of the implementation of the Three Responsibilities
that include activities in education, research, community services, and other
supporting activities. Clustering of lecturer performance is required in order
to gain a knowledge (knowledge discovery) of the pattern of the Three
Responsibilities implementation, in this case in the Department of Computer
Science Unnes. Clustering is also necessary to control the balance of lecturer
performance in implementing the Three Responsibilities. This is why the research
was conducted.The problem is how to create an inovative program in the form of
Clustering On-line of Computer Science Department for lecturer performance based
on the implementation of the Three Responsibilities using of K-Means Algorithm?
The objective of this institution research in order to obtain on-line
information system for clustering of Computer Science Department for lecturer
performance using the K-Means Algorithm. To resolve this problem, researchers
divided into two stages of completion. The first stage was literature review.
The second stage was making a clustering program for Lecturer performance of
Department of Computer Science, based-on the implementation of College three
responsibilities. The works sequence were: (1) Data Collection, (2) Building a
data mining system, (3) Data Processing, (4) Conducting the clustering process
with K-Means algorithm. Analysis of data/results included: (1) data reduction;
(2) data display; and (3) conclusion (verification). As the results of this
research, now the Department of Computer Science Unnes already has a clustering
program that is capable of classifying and monitors all activities of lecturers
performance in accordance with the implementation of College three
responsibilities. |
Keywords: |
Clustering,K-MeansAlgorithm, Lecturer performance, College three
responsibilities |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
GENETIC - ZHLS ROUTING PROTOCOL FOR FAULT TOLERANCE AND LOAD BALANCING |
Author: |
M V NARAYANA, G NARSIMHA, SSVN SARMA |
Abstract: |
Mobile ad hoc network (MANET) is a self-initiated and self-structured network of
wireless mobile nodes.ZHLS is a peer-to-peer hierarchical mobile routing
approaches that generates two routing tables i.e. an intra-zone routing table
and an inter-zone routing table. Genetic algorithm is an evolutionary
optimization approach, applicable to the issues which are large,
non-deterministic, nonlinear and discrete in nature. As an extension to the
existing ZHLS, this paper is proposed based on Genetic Algorithm known as
Genetic ZHLS so as to have a restricted group of alternative pathsto load
balance the topology and have robustness in the course of node/linkagefailure in
the Inter Zone clustering and at the time of Route Discovery on Gateway Nodes.
This paper presented the outcomes of the effects of load balancing and
robustness depending on Packet Delivery Ratio, Control Overhead and End to End
Delay by fluctuating the movement of the nodes on Genetic Zone based Hierarchal
Link State Routing Protocol. |
Keywords: |
Mobile Adhoc Networks, Routing protocol, Genetic Algorithm, Fault Tolerance,
Load Balancing |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
PROPOSED IF_THEN GRAMMAR TO TRANSLATE ENGLISH LANGUAGE SENTENCE TO AMERICAN SIGN
LANGUAGE SENTENCE |
Author: |
ASMAA M. HAMANDI, ALIAA K. ABDULHASSAN, HALA BAHJAT |
Abstract: |
Sign Language is a language that used by Deaf community. One of the most widely
used SL is the American Sign Language. In order to investigate the communication
between Deaf people and others among them in the community, a machine
translation system should be available for them in free use. The development of
machine translation system that translate an English text into Sign language
needs a grammar that producing Sign language from an input English text.
In this paper a proposed ASL grammar rules that used to covert English sentence
into ASL sentence will be produced. The grammar rules have been introduced as an
If-Then- Grammar. |
Keywords: |
Sign Language, NLTK, American Sign Language, Grammar Rules, Machine Translation |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
DEVELOPMENT OF THE REAL TIME TELEMONITORING SYSTEM FOR EARTHQUAKE PREDICTION
DEDUCED FROM FLUCTUATIONS IN GROUNDWATER LEVELS
AT YOGYAKARTA REGION-INDONESIA |
Author: |
SUNARNO, M. M. WARUWU, R. WIJAYA |
Abstract: |
The real time telemonitoring system for earthquake prediction deduced from
fluctuations in groundwater levels at Yogyakarta region-Indonesia contains the
remote stations (the groundwater level transducers, signal conditioning,
controller, frequency shift keying (FSK)modem, and Tx/Rx) and a base station (Tx/Rx,
FSK modem, and personal computer with software). Data managements which are
developed in this report are expected to be used in telemonitoring system for
earthquake prediction deduced from fluctuations at Java island - Indonesia. The
characteristics of data communication in this system are unguided type with air
as the media, asynchronous serial mode, simplex mode transmission, with FSK
modulation. The results of the communication system test at Yogyakarta region
indicate that the accuracy level of the real time data measurement transmission
has an average of 95 % at a distance of 0-40 km. When many fluctuations in
groundwater levels occurred over specific time periods, it is possible the
earthquake will be occurring in the next 4 until 50 days. It shows that the
system can be used as a earthquake monitoring system based on fluctuations in
groundwater levels. It can be used for earthquake prediction needs further study
and development of database system.This report is expected to give valuable
information for the telemonitoring system engineering development, especially
for engineers who work in the field of telemonitoring system. |
Keywords: |
Earthquake, Prediction, Groundwater Level, Telemonitoring System |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
ICTAL EPILEPSY AND NORMAL EEG FEATURE EXTRACTION BASED ON PCA, KNN AND SVM
CLASSIFICATION |
Author: |
SISWANDARI NOERTJAHJANI, ADHI SUSANTO, RISANURI HIDAYAT, SAMEKTO WIBOWO |
Abstract: |
Driven by a deep interest to find some spesific epilepsy EEG signal features as
compared with normal ones. An array of electrodes, normaly the FP1, FP2, F7, F3,
F2, F4, F8, C3, CZ, C4, T3, T4, T5, T6, P3, P4, PZ, O1, and OZ. The recorder
signals were than processed and the standard sets of statistical quantities of
means, variances, skewnesses, kurtosises, entropies, minima and maxima.
Principal Component Analysis (PCA) were applied to these quantities to acquire
two major one representing each quantity which separate best between epilepsy
ictal and normal persons resorting to the SVM and KNN classification algorithms.
The results show that the PCA elevates accuracy significantly and KNN achieves
the mission better than SVM. |
Keywords: |
Ictal, Normal, PCA, KNN, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
A MECHANISM TO ENSURE FAIRNESS IN WIRELESS MESH NETWORK |
Author: |
S.JOUNAIDI, B.NASSEREDDINE, Y.SAADI, A.HAQIQ |
Abstract: |
The actual tendency of the computing networks requires supplying to the clients
a permanent connection to the internet in a wireless manner. The wireless mesh
network technology WMN came up to answer these priority needs, it also allows
extending the network coverage with a less expensive infrastructure. The
performance of all the network technologies are not perfect, it’s the same case
for the WMN. This network based on the IEEE 802.11s standard still in
development to resolve problematics on several levels. Among these problems, we
situate the unfairness problem concerning the bandwidth sharing between the
flows flowing in the network. In this article, we will propose a protocol
capable of guaranteeing a fair sharing of the bandwidth. This protocol, in a
first place, is based on an exchange of information between the nodes, in order
that these nodes agree to the benefit rate of each one of them, and in a second
place, it works in collaboration with the “token bucket” mechanism. |
Keywords: |
WMN, Bandwidth, Fairness, Token-Bucket. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
INTERVENTIONAL FACTORS AFFECTING INSTRUCTORS ADOPTION OF E-LEARNING SYSTEM: A
CASE STUDY OF PALESTINE |
Author: |
Fareed Al-Sayyed, Baker Abdalhaq |
Abstract: |
The main questions addressed in this paper are the following: what are the
interventional factors that affect instructors' adoption of an e-Learning system
and what are the relationships among these factors?. For this purpose a number
of hypotheses were formulated. In this study, a framework was conceptualized
based on an extended version of the Technology Acceptance Model (TAM) integrated
with intervention factors. The findings of the study show that there is a
significant positive relationship between management support, design
characteristics, organizational support, training, perceived usefulness,
perceived ease of use and intention to adopt e-Learning. Based on the study
results, it was recommended that the Palestinian universities should intervene
to promote the adoption of e-Learning system. |
Keywords: |
e-Learning, e-Learning adoption; Interventions; Technology Acceptance Model
(TAM); Structural Equation Modeling (SEM) |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
COMPARING THE APPROACHES OF GRAPH-REDUCTION AND LANDMARK SHORTEST PATHS |
Author: |
FAISAL KHAMAYSEH, NABIL ARMAN |
Abstract: |
We study the different recent improvements on shortest path algorithms. We
suggest improvements to the classical path computing algorithms and we implement
them using random generated graphs with various sizes. Many attempts exist for
improving shortest path techniques. Computing shortest path is one of the most
important and recent issues in combinatorial optimization, emergency routs,
NoSQL data graph representation, road and public transportation networks, and
other applications. One of the big obstacles in such real-word applications is
the size of the graphs that motivates the attempts of enhancing the path-finding
procedures. Given a weighted graph G={V,E,w}, a heuristic method to improve
conventional shortest-path for a given source node <s> is provided. In this
paper, we address the complexity of shortest paths in large graphs and we
present a graph structure and enhancement process of finding the shortest path
in the given graph. We study the current improving algorithms and highlights the
improvements over the classical ones. We evaluate our implemented techniques
using randomly generated weighted graphs. The main procedure is compressing the
graph without losing the graph properties. We then, compare our technique with
the approach of using landmark optimization. We discuss the performance,
storage, error rate in our approach compared to landmark. Our experiments show
that the new technique of graph compression performs with better speedup and no
path mistakes compared to fast landmark approach which leads to high overhead in
most situations. |
Keywords: |
Candidate Subgraphs, Graph Compression, Shortest-path, landmarks, Reverse
Representation |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
ARABIC TEXT TO SPEECH SYNTHESIS USING QURAN-BASED NATURAL LANGUAGE PROCESSING
MODULE |
Author: |
BANA ALSHARIF, RADWAN TAHBOUB, LABIB ARAFEH |
Abstract: |
Natural Language Processing (NLP) Module for Arabic Text to Speech is introduced
in this paper. It’s a module from our integrated design for Arabic named as Holy
Quran Based- Arabic Text to Speech (HQB-ATTS). HQB-ATTS system is implemented
using some Tajweed rules that are used in Standard Arabic. Through this paper,
new ideas are adopted and discussed in order to increase the quality of Arabic
Text-to-Speech (ATTS). The innovations that have been applied in NLP module are:
the use of some of Tajweed rules to build better letter to sound module, the
combination of Arabic Prosody with allophone /syllables slots is a new use for a
technique supported the linguistic property for Arabic, and the quality
evaluation for the NLP module is performed in new method to proof the success
for our hypothesis in comparison with other up-to-date approaches. The results
show that this HQB-ATTS approach can significantly enhance the quality of the
synthesized speech. The evaluation showed that this approach could produce a
better synthesized speeches’ quality than comparative ATTS synthesizers. |
Keywords: |
Text to Speech (TTS), Natural Language Processing Module (NLP), Tajweed Rules,
Prosody Syllabification, Evaluation. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
EFFICIENT MECHANISM FOR MITIGATING MULTIPLE BLACK HOLE ATTACKS IN MANETS |
Author: |
ABDUL-RAHMAN SALEM, DR. RUSHDI HAMAMREH |
Abstract: |
Mobile ad hoc networks (MANETs) have emerged as a major next generation wireless
networking technology. Due to their inherent capabilities of instant
communication, they are used for wide range of applications such as emergency
operations and disaster recovery. On the other hand, many challenges are facing
MANETs including security, routing, transmission range and dynamically changing
topology with high nodes mobility. Security is considered as the main obstacle
for the widespread adoption of MANET applications. Black hole attack is a type
of DoS attack that can disrupt the services of the network layer. It has the
worst malicious impact on network performance as the number of malicious nodes
increases. Several mechanisms and protocols have been proposed to detect and
mitigate its effects using different strategies. However, many of these
solutions impose more overhead and increase the average end-to-end delay. This
paper proposes an enhanced and modified mechanism called "Enhanced RID-AODV",
based on a preceding mechanism: RID-AODV. The proposed enhancement is based on
creating dynamic blacklists for each node in the network. Each node, according
to criteria depends on the number of mismatches of hash values of received
packets as compared with some threshold values, can decide to add or remove
other nodes to or from its blacklist. Enhanced RID-AODV was implemented in ns-2
simulator and compared with three previous solutions for mitigating multiple
black hole attacks in terms of performance metrics. The results show an increase
in throughput and packet delivery ratio and a decrease in end-to-end delay. |
Keywords: |
Enhanced RID-AODV, MANET Security, Network Layer Attack, Multiple Black Hole
Attacks. |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
Title: |
PROTECTING WIRELESS DATA TRANSMISSION IN MOBILE APPLICATION SYSTEMS USING
DIGITAL WATERMARKING TECHNIQUE |
Author: |
KARTINI MOHAMED, FATIMAH SIDI, MARZANAH A JABAR, ISKANDAR ISHAK |
Abstract: |
There have been many cases of fake documents be used for important legal
transactions. This includes the use of fake degrees or certificates during
professional job applications either in private sectors or government related
firms. Since many people are using smart phones currently, it is possible to
have a mobile application system apps that can validate the correctness of legal
documents or certificates in real time basis. The apps must be able to validate
the certificate by confirming it with the data obtained from a registered
database owned by relevant academic institutions. However, since these data
require wireless transmissions which are vulnerable to data manipulations by
hackers, this paper introduces a protection measure using encrypted elements of
user authentication to watermark the transmitting data. |
Keywords: |
QR Code, Digital Watermark, Data Transmission, Wireless Communication, Mobile
Application Systems |
Source: |
Journal of Theoretical and Applied Information Technology
10th January 2016 -- Vol. 83. No. 1 -- 2016 |
Full
Text |
|
|
|