|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2015 | Vol. 82 No.3 |
Title: |
DISOCIAL MEDIA SYNCHRONIZATION MODEL: IN ASSOCIATION WITH DEVELOPING SMALL
MEDIUM ENTERPRISE’S SALES INFORMATION SYSTEM |
Author: |
ANANG SUBARDJO, MIA IKA RAHMAWATI, ANJIK SUKMAAJI |
Abstract: |
The development of internet technology and smart mobile phone is followed by the
social media significant growth. Now in accessing facebook, twitter and other
popular social media are easily at anytime and anywehere. It can be said that
the role of social media in delivering information flow for start-ups, small
medium enterprises (SMEs) and big-sized companies is becoming crucial than ever.
Even more if the company could synchronize those disocial media into one solid
platform, this leads to company’s additional value added. Since they offer
efficiency and effectiveness in term of market its products and services
penetratrions. The mechanism of disocial media synchronization is up-dating the
content of one social media but it also integrate with other social media
automatically. The purpose of this research is to develop disocial media
synchronization (facebook and twitter) model that it can be associate with sales
information system development of one particular Small Medium Enterprise (SME)
in Indonesia. This synchronization definately increasing the Small Medium
Enterprise’s advantages by decreasing the cost of marketing product
significantly and improving the sales information system. The result of this
research is a data flow diagram of disocial media synchronization model that in
conjuction with sales information system development for Indonesian SME. It
shows four main type of process, sales transactions; daily sales report; social
media information and member register. The conclusion is the disocial media
synchronization model could be claimed as the new platform in Indonesia. It is
strongly believed that it would take Indonesian SME into another level of value
added. |
Keywords: |
Disocial Media Synchronization Model , Sales Information System, Small Medium
Enterprise |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
GRAPH BASED GENE/PROTEIN PREDICTION AND CLUSTERING OVER UNCERTAIN MEDICAL
DATABASES |
Author: |
SHAHANA BANO, K.RAJASEKHARA RAO |
Abstract: |
Clustering over protein or gene data is now a popular issue in biomedical
databases. In general large set of gene tags are clustered using high
computation techniques over gene or protein distributed data. Most of the
traditional clustering techniques based on subspace, hierarchical and
partitioning feature extraction. Various clustering techniques have been
proposed in the literature with different cluster measures, but the performance
is limited due to its spatial noise and uncertainty. In this paper, an improved
graph based clustering technique was proposed to generate efficient gene or
protein clusters over uncertain and noisy data. Proposed graph based
visualization can effectively identify different types of genes or proteins
along with relational attributes. Experimental results show proposed graph model
effectively clusters the complex gene or protein data compare to conventional
clustering approaches. |
Keywords: |
Biomedical, gene, protein, clustering, medline, pubmed, Synonym
Identification |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
TV WHITE SPACE DETECTION USING USRP |
Author: |
AMRITHA R, ANJALI T, ASWATHYLAKSHMI P, GREESHMA V, Dr T SUDHA |
Abstract: |
The burgeoning demand on radio spectrum owing to explosive development in
wireless communication necessitates efficient use of the available frequency
spectrum. But this need is at cross purposes with the present system of fixed
spectrum allocation. The use of TV white space for communication is one way of
circumventing this problem. In this paper a Universal Software Radio Peripheral
(USRP) is employed to detect the unused spectrum in TV band. The USRP is a
hardware platform for software radio. |
Keywords: |
Spectrum sensing, TV white space, Software Defined Radio (SDR), Universal
Software Radio Peripheral (USRP) |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF QUANTITATIVE METRICS ON ANCIENT TEXT DOCUMENTS USING
MIGT |
Author: |
N. VENKATA RAO, Dr. A.S.C.S.SASTRY, Dr. A.S.N.CHAKRAVARTHY, A.V.SRINIVASA RAO |
Abstract: |
In the present world scenario Optical Character Recognition (OCR) has wide
variety of applications in the text document image analysis for recognizing
individual characters of any language. Digitizing the old documents is a tough
job for preserving the essence of the documents to the coming eras. In this
paper we are summarizing different image quantitative metrics for estimating the
loss of information from the image after cleaning the noisy image by using
anyone of the local or non-local thresholding techniques. The quality
evaluations are made on 40 Telugu and English text documents after cleaning the
documents with Modifies Iterative Global Threshold (MIGT) approach. |
Keywords: |
Thresholding Techniques, Digitization, Evaluation, Optical Character
Recognition, Document Image Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
A FUZZY LOGIC APPROACH TO MANAGE UNCERTAINTY AND IMPROVE THE PREDICTION ACCURACY
IN STUDENT MODEL DESIGN |
Author: |
SALISU MUHAMMAD SANI, TEH NORANIS MOHD ARIS, NORWATI MUSTAPHA, MD NASIR SULAIMAN |
Abstract: |
The intelligent tutoring systems (ITSs) are special classes of e-learning
systems developed using artificial intelligent (AI) techniques to provide
adaptive and personalized tutoring based on the individuality of each student.
For an intelligent tutoring system to provide an interactive and adaptive
assistance to students, it is important that the system knows something about
the current knowledge state of each student and what learning goal he/she is
trying to achieve. In other words, the ITS needs to perform two important tasks,
to investigate and find out what knowledge the student has and at the same time
make a plan to identify what learning objective the student intends to achieve
at the end of a learning session. Both of these processes are modeling tasks
that involve high level of uncertainty especially in situations where students
are made to follow different reasoning paths and are not allowed to express the
outcome of those reasoning in an explicit manner. The main goal of this paper is
to employ the use Fuzzy logic technique as an effective and sound computational
intelligence formalism to handle reasoning under uncertainty which is one major
issue of great concern in student model design. |
Keywords: |
Intelligent tutoring systems, Fuzzy Logic, Student Model, Uncertainty |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
RESEARCH OF PROCESSES OF IDENTIFICATION, AUTHENTICATION AND AUTHORIZATION |
Author: |
AMANZHOLOVA S.T., KALIZHANOVA А.U., SHAIKULOVA А.А., KOZBAKOVA A. KH. |
Abstract: |
The article herein considers the issues of users’ identification. Aspects
connected with identification, authentication and authorization are represented
in the form of mathematical systems of queuing. The article uses single-channel
two-phase and three-phase models. Simulation modeling is performed in the
language GPSS World. |
Keywords: |
Mathematical Modeling, Two-Phase Modeling, Three-Phase Modeling, Simulation
Modeling, Identification, Authentication, Authorization. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
A BACKPROPAGATION NEURAL NETWORK TO IMPROVE ARABIC STEMMING |
Author: |
KHALDOON MEZHER, NAZLIA OMAR |
Abstract: |
Stemming aims to identify the roots or stem of each word by eliminating the
grammatical affixes or lexical information. Many approaches have been proposed
in terms of stemming for various languages. Unlike English language, Arabic
stemming is not a simple task of eliminating suffixes and prefixes. Arabic has a
complex morphology where the process of stemming requires comprehensive analysis
for such morphology. Several approaches have been proposed to enhance Arabic
stemming. However, the state of the art of Arabic stemming algorithms such as
Khoja and Light stemmer were built using rule-based approach. Hence, recent
researches have attempted to examine the machine learning technique regarding to
its capability of identifying word’s stem based on training. Nonetheless, there
is still room for improvement in terms of addressing new features that have the
ability to assign accurate weight for the words. In fact, assigning an accurate
weight for the words plays an essential role in terms of classifying its actual
root. Therefore, this study aims to develop a set of features that would enhance
the process of weighting for words. The proposed set of features consists of
affixes, word length and tenses. Then, the acquired weight that would be
obtained from the proposed features will be entered as an input for a
backpropagation neural network classifier in order to output the actual stem.
The corpus that has been used in this study is an Open Source Arabic Corpus (OSAC),
which consists of 21,861 documents that are distributed among multiple topics
including economy, sport, social, religion, stories, health, law, astronomy and
food recipes. Two stemmers i.e. Khoja and Light stemmers have been used as
baseline for comparison with the proposed method. The experimental results have
shown that the proposed method has outperformed both of Khoja and Light stemmers
by achieving 88% precision and 82% recall. In addition, this study proposed a
new sampling method in terms of Arabic stemming evaluation. |
Keywords: |
Arabic Stemming, Back-Propagation Neural Network, Feature Extraction, Arabic
Morphology |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
RESEARCH AND IMPLEMENTATION OF SECURITY FRAMEWORK FOR SMALL AND MEDIUM SIZED
E-COMMERCE BASED ON SOA |
Author: |
Dr. ASHISH KR. LUHACH1, RAVINDRA LUHACH |
Abstract: |
This research paper focuses on the technical considerations for evaluating the
E-commerce platform and proposed a logical security framework for small and
medium sized E-commerce. The proposed logical security framework is inherited
the benefits of Service Oriented Architecture (SOA) and presents an analysis of
the eminent security attacks which can be prevented. The proposed logical
security framework is implemented and validated on Oscommerce, an open source
E-commerce. This paper also presents an analysis on the comparison between the
proposed security framework and the security framework of the existing
E-commerce systems such as Flipkart and Rechargeitnow. On the basis of
comparison with existing security standards and validation of all the major
computing attacks on the proposed security framework concludes that the proposed
logical security framework helps enterprise to organize an absolute suite of
amalgamated security architecture which protects E-commerce system based on SOA. |
Keywords: |
Service Oriented Architectures, Web Services, Encrypted Database, Security
Attacks, and Legacy Systems |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
A RELIABLE AND ENERGY EFFICIENT ROUTING ALGORITHM IN WSN USING LEARNING AUTOMATA |
Author: |
RAZIEH ASGARNEZHAD, NASER NEMATBAKHSH |
Abstract: |
In Wireless Sensor Networks (WSNs), the most important challenges are the
bandwidth and energy limitations, network topology changes, and lack of fixed
infrastructures. Flooding is a broadcasting method which is used in almost all
existing routing protocols and suffers from the broadcast storm problem. It may
result in excessive redundancy, contention, collision, and energy consumption.
To solve these problems, a routing algorithm is a promising approach for
reducing the broadcast routing which is usually used. WSNs need to send data
reliably and decrease consumption energy nodes. This paper proposes a reliable
and energy efficient routing algorithm in WSNs using learning automata. Multiple
paths are used to increase reliability. We increase network effective lifetime
using learning automata and appropriate probability function. The results of our
proposed algorithm decrease the overall energy consumption and increase
reliability in a WSN. The simulation results show that the proposed scheme
outperforms the existing methods in terms of reliability and residual energy,
and size. |
Keywords: |
Reliability, Energy Efficiency, Learning Automata, Routing, Wireless Sensor
Network (WSN) |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
APPLICATION OF GAME THEORY AND NEURAL NETWORK TO STUDY THE BEHAVIORAL
PROBABILITIES IN SUPPLY CHAIN |
Author: |
Ilham SLIMANI, Ilhame EL FARISSI, Said ACHCHAB |
Abstract: |
As a review of game theoretic approach to optimize the logistic costs with the
objective of modeling interactions among players in a basic supply chain, this
paper focuses on a single channel, two-echelon supply chain with a retailer and
his supplier of a one-product where careful attention is given to information
sharing in general and demand forecasting in particular. Therefore, in the
industrial world, firms cannot risk waiting for the actual demand to occur so
they can react and determine the quantities to purchase, produce or deliver.
Demand forecasts are important and necessary to any member of the supply chain
as they gave them the advantage of planning and anticipating for future needs.
However, demand forecasting is one of those crucial decisions where an error can
cost too much. This is why we choose to implement the artificial neural network
as a forecasting technique. Obviously the closest actor to the market i.e the
retailer has the best view of demand levels than the supplier, so sharing demand
information with the other actors has an impact on the performance of the whole
supply chain but it is not necessarily the case since the retailer can choose to
withhold this information. This is why we focus in this investigation on the
demand’s prediction when information is not shared using the artificial
intelligence of neural networks. |
Keywords: |
Supply chain management, Game theory, demand forecasting, Asymmetric
information, Demand uncertainty, Neural network. |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
SCALE TO DISEASE PRONENESS (SDP) & SCALE TO DISEASE INEPTNESS (SDI): DESIGN OF
HEURISTIC METRICS TO ASSESS HEALTH CONDITION TOWARDS HEART DISEASE PRONENESS |
Author: |
RAMANA NAGAVELLI, DR.C.V.GURU RAO |
Abstract: |
The early stage diagnostics of heart disease is a challenging task. The
interdependent and high complexity characteristics and factors related to heart
disease combined with human constraints contribute towards the necessity of
intelligent medical systems. In this paper we design heuristic metrics for
predicting patterns of heart disease, the Scale to Disease Proneness (SDP)
metric and Scale to Disease Ineptness (SDI) metric. The prediction system to be
efficient in the performance and the scalability requirements has to select an
optimal set of attributes from the data for which in our approach we make use of
canonical correlation analysis. The test outcomes shown that the heuristic
scales SDP and SDI devised here in this paper delivered optimal performance
towards predication accuracy, also scalable and robust in the context of
computational and process complexity. The approach tends to deploy easily to
focus according to individual risk levels of the disease. |
Keywords: |
Health Mining, DDP, SDP, SDI, Disease prediction, Decision Support System,
Machine Learning |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
SMOOTHING TECHNIQUES EVALUATION OF N-GRAM LANGUAGE MODEL FOR ARABIC OCR
POST-PROCESSING |
Author: |
AHMED FARIS RAAID AL-MASOUDI, HISHAM SALAM RAFID AL-OBEIDI |
Abstract: |
N-gram language model is used to correct the errors that resulted from Optical
character recognition process. However, the major problem facing N-gram language
modeling is that it depends on finite training corpus. Therefore, some words
will be missed from the corpus. They are called unknown words. If any N-gram is
missing, then the language model will assign a probability of zero to it.
Smoothing is a task used to prevent assigning zero probability for missing
N-gram in corpus. Each smoothing technique suffers different limitations, and
selecting the appropriate smoothing technique depends on where it will be used.
Therefore, the purpose of this study is to test these techniques on Arabic
dataset, and determines which one of the techniques is the best for this
language. This study evaluates the performance of four main smoothing
techniques. The experimental results show that all smoothing techniques can
reduce error rate. However, the best among them is the Katz Backoff technique. |
Keywords: |
Smoothing Techniques, N-gram Language Model, Performance Evaluation, OCR,
Arabic Language |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
SOFTWARE DEFECT PREDICTION USING PARTICIPATION OF NODES IN SOFTWARE COUPLING |
Author: |
MARYAM SHEKOFTEH, KEYVAN MOHEBBI, JAVAD KAMYABI |
Abstract: |
Testing is the best way to ensure software quality. However, this activity makes
a huge challenge about limited time and financial resources. In order to achieve
high quality, managers need to detect the defect prone parts of code and
allocate the resources to them. Although many metrics, techniques and models
have been proposed, effective identification of such parts is still a challenge.
In this paper two new metrics, namely PIEDG and PIMDG are proposed for
predicting defects based on dependency between the file level components of the
code. The proposed metrics use the notion of participation of nodes in the
software dependency graph to recognize the parts of the code which possess
defects. This research also investigates the effect of ego graph on the software
dependency global graph. The feasibility of the software defect predictor which
is built based on the proposed metrics is evaluated. The experiments over the
Eclipse bug dataset demonstrate promising results in anticipation of the
software defects. |
Keywords: |
Defect, Prediction, Software, Metrics, Dependency Graph |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
INVESTIGATING THE RELATIONSHIP BETWEEN SOFTWARE DEFECT DENSITY AND COST
ESTIMATION DRIVERS: AN EMPIRICAL STUDY |
Author: |
FADI WEDYAN, HANI BANI-SALAMEH, WAJEEHA AL-AJLOUNI, SHIRIN AL-MANAI |
Abstract: |
This paper reports the results of an empirical study, where some hypotheses
about the relationship between software quality, expressed in terms of defect
density, and cost estimation drivers (cost factors) are assessed. The study is
performed using three cost factors, these are: work effort, project size,
measured in terms of function points, and average assigned work per team member.
The study is performed using the ISBSG repository data set release 12. ISBSG
dataset which contains 6006 completed project. For statistical analyses,
Regression Analysis and stepwise Analysis of Variance (ANOVA) are used. Our
results show that there is a significant negative impact of the project size and
work effort on the defect density. On the other hand, the average assigned work
per team member has a significant positive impact on defect density. These
results suggest that while assigning resources to a project, these quality
factors should be considered in order to decrease the defect density, and thus,
the maintenance cost of the product. |
Keywords: |
Cost Estimation drivers, Defect Density, Empirical Study, ISBSG
Repository, Software Quality |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
MULTIBAND SLOTTED APERTURE ANTENNA WITH DEFECTED GROUND STRUCTURE FOR C AND
X-BAND COMMUNICATION APPLICATIONS |
Author: |
K V L BHAVANI, HABIBULLA KHAN, B T P MADHAV |
Abstract: |
A series of simulations and investigations of slotted microstrip patch antennas
with defected ground structure are presented in this work. The analysis includes
the effects of varying the dimensions of the feed line, patch and the ground
plane. All the investigated antennas are showing good bandwidth enhancement with
microstrip feeding method. In this study, different shapes of slots, in U-shape
and L-shape are taken in to the account. Among all the examined antennas,
proposed slot microstrip patch antenna of dimensions 15X20X1.6 mm with
additional slot apertures of U and L combination is providing excellent
radiation characteristics at lower frequency band of communication systems. |
Keywords: |
Communication Systems, Defected Ground Structure (Dgs), Multiband Antenna,
Slotted Aperture, Micro Strip Patch Antenna (Mspa). |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
Title: |
EVALUATION MODEL OF SUCCESS AND ACCEPTANCE OF E-LEARNING |
Author: |
I PUTU RAMAYASA |
Abstract: |
E-Learning is a information technology-based learning, allowing participants to
access and acquire learning services using the Internet media. Implementation
system of e-learning has been widely used in college. The success or failure of
the implementation of e-learning system is highly dependent on the level of
success and acceptance user. To identification the factors that influence the
success and acceptance of e-learning systems in higher education, this research
proposes an integrated evaluation model using a Model DeLone and McLean
Information system sucses models, UTAUT Model, and HOT-Fit Model. This research
is important to be conducted in order to know the success and acceptance of
E-Learning in University in order to be able to get evaluated. Results of this
study was to describe the factors that influence the success of information
systems and user acceptance of the e-learning system and can describe the
correspondence between man, technology and organization to the E-Learning users
respondent to know the success and acceptance of E-Learning in University. |
Keywords: |
E-learning, Delone And Mclean Sucses Models, UTAUT Model, And HOT-Fit
Model, Integrated Evaluation Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st December 2015 -- Vol. 82. No. 3 -- 2015 |
Full
Text |
|
|
|