|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2013 | Vol. 54 No.1 |
Title: |
FUZZY LOGIC BASED VOLTAGE AND FREQUENCY OF A SELF EXCITED INDUCTION GENERATOR
FOR MICRO HYDRO TURBINES FOR RURAL APPLICATIONS |
Author: |
C.KATHIRVEL, DR. K. PORKUMARAN |
Abstract: |
In this paper, a standalone electric generating system for remote locations is
discussed. A typical micro hydro site layout and photograph which shows how the
hydro power can be extracted is given. The three phase induction motor is used
as a generator for producing three phase output by providing excitation through
three capacitors connected in shunt. The design of the capacitor in a simple way
is shown. To consume the excess power in the system an Electronic Load
Controller (ELC) is used which will maintain the voltage and frequency within
limits. The selection of components for ELC with the chosen device ratings is
tabulated. Simulation was done on Matlab/Simulink using the Fuzzy Logic
Controller. The membership functions and rules of the fuzzy controller are
presented. The various models with the output waveforms are represented and
discussed. It is shown that when the ELC is used, the output voltage and
frequency remains within the limits when the load is changed from 300W to 600W.
The experimental setup uses a separately excited DC motor coupled to a 1 H.P
squirrel cage induction motor running at a speed above synchronous speed of the
induction motor. Circuit diagrams, ratings and photographs of the experimental
setup are provided. Drawbacks of the discussed system are enumerated and
possible solutions and enhancements are briefed. |
Keywords: |
Fuzzy Logic, SEIG, Micro hydro, Stand alone, Excitation capacitor, ELC |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZATION OF VERTICAL HANDOFF DECISION PROCESS FOR HETEROGENEOUS WIRELESS
NETWORKS |
Author: |
T.VELMURUGAN, Dr.SIBARAM KHARA |
Abstract: |
The most common method used for Vertical Handoff (VH) is the Strongest Signal
First (SSF) method. In this technique, when there is a choice of multiple
attachment points, the one that gives the Mobile Node (MN) the strongest signal
is chosen. While it is simple and effective, the SSF method does not consider
factors such as traffic load in the network, battery lifetime of the MNs and the
cost of handoff. In this paper, we propose an optimized handoff decision
algorithm that balances the load across all the attachment points, maximizes the
collective battery life of the MNs and reduces the cost of handoff. We focus on
the handoff between WLAN and Cellular Network. |
Keywords: |
WLAN, Cellular Network, Mobile Node, Vertical Handoff, Load balancing, Received
Signal Strength (RSS), quality of service(QoS). |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE CONSTRUCTION OF A VISITOR NUMBER FORECASTING MODEL FOR THE SHIHMEN RESERVOIR
RECREATION AREA USING ARTIFICIAL INTELLIGENCE TECHNOLOGY |
Author: |
HAN-CHEN HUANG |
Abstract: |
Visitor number is an important reference for recreation area managers when
developing tourism and marketing plans, and recreation area managers must be
able to precisely forecast visitor numbers to possess sufficient information for
establishing management strategies and plans. Developing an effective and
accurate visitor number forecasting model can allow managers to respond in
advance and adjust operating and development directions accordingly.
Consequently, this study used an artificial neural network (ANN) to establish a
visitor number forecasting model. The results of verification using actual data
indicated that the absolute relative error (ARE) of the model developed in this
study was 17.6565% and the correlation was 0.773. These results show that the
model is highly accurate for forecasting visitor number. |
Keywords: |
Recreation Area, Tourism, Forecasting, Artificial Neural Network, Visitor Number |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
DESIGN OF GROUP HIERARCHY SYSTEM FOR MULTICAST COMMUNICATION |
Author: |
R. VARALAKSHMI, Dr. V. RHYMEND UTHARIARAJ |
Abstract: |
Secure and reliable group communication is an active area of research. Its
popularity is fuelled by the growing importance of group-oriented and
collaborative applications. The central research challenge is secure and
efficient group key management. The present paper is based on the Design of
Group hierarchy system for multicast communication using the most popular
absolute encoder output type code named Gray Code. The focus is of two folds.
The first fold deals with the reduction of computation complexity which is
achieved in our protocol by performing fewer multiplication operations during
the key updating process. To optimize the number of multiplication operations,
the Fast Fourier Transform (FFT), divide and conquer approach for multiplication
of polynomial representation of integers, is used in this proposed work. The
second fold aims at reducing the amount of information stored in the Group
Center and group members while performing the update operation in the key
content. Comparative analysis to illustrate the performance of various key
distribution protocols is shown in this paper and it has been observed that this
proposed algorithm reduces the computation and storage complexity significantly. |
Keywords: |
Multicast Group Key Management, Group Hierarchy System, Fast Fourier Transform,
Polynomial Integer Multiplications, Computation Complexity, Storage Complexity. |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATION OF TWO SUB-ASSEMBLIES IN 3-Ф LOW VOLTAGE CAPACITOR MANUFACTURING |
Author: |
ROMIL D GANDHI, AMUTHA PRABHA N. |
Abstract: |
In this paper, the aim is to automate two of the sub-assemblies involved in the
manufacturing of 3-Ф low voltage capacitors. The vacuum heat treatment process
and the reactor addition process while element testing are the sub-assemblies
which are intended to be automated.
The vacuum heat treatment process is presently manual and when the unloading of
elements is to be done is unknown. So, there is a need to automate this process
in order to save precious time. Also, the automation of the element testing
process is to be done in order to comply the element in accordance with the
international standards in a faster and efficient way. Also during this process,
the automatic addition and selection of the reactor for the power factor
improvement of the element. Using Programmable Logic Controllers, the respective
automations are achieved. |
Keywords: |
Automation, Programmable Logic Controller, Power Factor Correction, Low Voltage
Capacitor Manufacturing, Ladder Logic |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
PETRI NET MODEL OF ERP BUSINESS PROCESS VARIATION FOR SMALL AND MEDIUM
ENTERPRISES |
Author: |
RIYANARTO SARNO, BANDUNG ARRY SANJOYO, IMAM MUKHLASH, HANIM MARIA ASTUTI |
Abstract: |
In addition to various benefits to Small and Medium Enterprises (SMEs), the
application of ERP system for SMEs still encounters a quite number of
challenges. One of the challenges is such a great number of variations of the
business needs among the SMEs. The Moreover, ERP business processes in SMEs
often change due to any change in business needs and technological advancements.
To cope with these challenges, it requires a development of ERP systems which is
reliable to meet diverse varieties in business processes in each of its modules.
In order to analyze various models in the business processes, it calls for a
business process modeling. This paper discusses about a business process
modeling by means of Petri Net. The modeling emphasizes on aspects of business
process analysis, i.e.: a modeling capable of verifying and analyzing the
performance of business processes at present. The analysis on business process
can adopt two approaches, namely Matrix Algebra and Structure Analysis. |
Keywords: |
Petri Net, ERP Business Process, Business Process Verification, Reachability
Analysis, Web Services |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
SURVEY ON AN EMBEDDED SYNCHRONIZED DAQ USING ARM AND FPGA MODULE |
Author: |
KUMARESAN N, SUGANTHI J |
Abstract: |
Data acquisition system plays an important role in the field of modern
technology. Often Data acquisition system is abbreviated as DAS (or) DAQ. The
idea behind the DAQ is to sample the data which represents real-time conditions
and to convert it in a digital form in which computers and processor can
manipulate it. Each application has its own design and its structure. Hence in
this paper, a survey of an RT Data acquisition system has been presented. DAQ is
capable of carrying around 300 channels of RT DAS, a static test facility for on
board systems, high speed acquisition and redundant systems. At present,
different application in DAQ software is developed using the LabVIEW for
real-time acquisition, analyzing and to display. |
Keywords: |
Data Acquisition, FPGA, Embedded System, Real-Time System, ARM Controller |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
GENETIC ALGORITHM AND PROGRAMMING BASED CLASSIFICATION: A SURVEY |
Author: |
DHARMINDER KUMAR, SUNITA BENIWAL |
Abstract: |
Classification is the process of finding a model or a function that describes
and distinguishes data classes and concepts, for the purpose of being able to
use the model to predict the classes of objects whose class label is not known.
The process of data analysis becomes time consuming and tedious as volume of
data increases. So to make the process of data classification faster, soft
computing techniques have been applied. Great deal of work has been done in the
area of classification using evolutionary techniques. This survey gives an
insight into the work done on classification using genetic algorithms and
genetic programming and their applications in different problems and areas. |
Keywords: |
Classification, Genetic algorithm, Genetic programming, Fitness function |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
A CONCEPTUAL FRAMEWORK OF FINANCIAL INFORMATION SYSTEMS TO REDUCE CORRUPTION |
Author: |
ALI BDULBAQI AMEEN, KAMSURIAH AHMAD |
Abstract: |
Financial Information Systems (FIS) is an integral part of business and is
fundamental to its stability, sustainability, and growth. In recognition of the
importance of FIS, various countries have started to invest massively in such a
system. The World Bank has financed several projects worth billions of US
dollars, which have been designed with a better focus on the quality of
information to reduce the risk of fraud and improve system reliability. This
paper aims to develop a conceptual framework that examines FIS effectiveness in
reducing corruption in the public sector. The research approach draws on extant
literature in financial information strategies, information systems quality,
strategic information systems planning, and international anti-corruption
strategies to identify determining factors of information quality, system
quality, service quality, FIS characteristic effectiveness, and financial
corruption reduction. Results of the literature review suggest 19 propositions
and 5 main factors grouped into determinants, including information systems
quality, information quality and service quality. Linking financial corruption
reduction with anti-corruption strategy, the proposed framework adopts the
anti-corruption strategy four-perspective approach to examine the impact of
increasing transparency, increasing accountability, decreasing discretion, and
low enforcement. FIS characteristic dimensions in this research comprise
monitoring, auditability, tracking, and controlling. Originality/value: The
framework provides a starting point for researchers and practitioners to further
investigate the use of FIS in governance. For researchers, the framework
clarifies the determining factors that can successfully enhance the quality of
FIS and the impact of these systems on financial corruption reduction through
proposed relationships. For practitioners, the framework can be used to gain
insights into the contributing factors of information systems quality and its
effectiveness in reducing corruption. |
Keywords: |
Financial Information Systems, System Quality, Information Quality, Service
Quality, FIS Characteristic, Corruption Reduction |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONGESTION BASED ROUTE RECOVERY TECHNIQUE FOR MANET |
Author: |
DEVI .M AND, V.RHYMEND UTHARIARAJ |
Abstract: |
In mobile adhoc network (MANET), the previous work of the authors considered
route recovery technique based on route failures alone and doesn’t consider the
packet drops due to congestion. The congestion is likely to occur when incoming
traffic exceeds the network capacity which results in increased delay and packet
loss. In order to overcome these issues, in this paper, congestion detection and
recovery technique is proposed in mobile ad hoc network. In this technique, each
node estimates the parameters such as queue length, data rate, and medium access
control (MAC) contention. The upper and lower limit of these parameters is
compared and node is marked with the congestion status such as normal, medium or
high level. When data is to be transmitted from the source to destination, the
intermediate nodes along the path verify its congestion status. If the
congestion status of any one node is high or congestion status of more than one
node is medium, a warning message will be sent to the source. The source then
selects the alternate congestion free path for data transmission. By simulation
results, it is estimated that the proposed technique reduces the packet drop due
to congestion and increases the packet delivery ratio. |
Keywords: |
Mobile Ad Hoc Network (MANET), Medium Access Control (MAC), Congestion
Detection, Route Recovery Technique |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATED SEGMENTATION OF BRAIN MR IMAGES BY COMBINING CONTOURLET TRANSFORM AND
K-MEANS CLUSTERING TECHNIQUES |
Author: |
ARSHAD JAVED, WANG YIN CHAI, NARAYANAN KULATHURAMAIYER, MUHAMMAD SALIM JAVED,
ABDULHAMEED RAKAN ALENEZI |
Abstract: |
Segmentation is usually conceived as a compulsory phase for the analysis and
classification to the field of medical imaging. The aim of the paper is to find
a means for the segmentation of brain from MR images by technique of combining
Contourlet Transform and K-Means Clustering in an automatic way. De-noising is
always an exigent problem in magnetic resonance imaging and significant for
clinical diagnosis and computerized analysis such as tissue classification and
segmentation. In this paper Contourlet transform has been used for noise removal
and enhancement for the image superiority. The proposed technique is exclusively
based upon the information enclosed within the image. There is no need for human
interventions and extra information about the system. This technique has been
tested on different types of MR images, and conclusion had been concluded. |
Keywords: |
Image Segmentation, Silhouette, Laplacian Pyramids (LP), Directional Filter
Banks (DFB), Means, SNR (Signal To Noise Ratio), MSE (Mean Squared Error) |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
ARTIFICIAL INTELLIGENC E TECHNOLOGY IN TRAVEL AGENCY OPERATING REVENUE FORECASTS |
Author: |
HAN-CHEN HUANG |
Abstract: |
The state of the economy has a great impact on the tourism industry; therefore,
the management of a travel agency requires good financial revenue and
expenditure management. Otherwise, travel agencies have difficulties surviving
in a highly competitive market. Establishing an effective and accurate revenue
forecasting model can enable travel agencies to predict possible financial
crises, providing operators with time to react and adjust their management
direction. This study used an artificial neural network (ANN) to establish an
operating revenue forecasting model. According to the actual data verification
results, the model presented in this study had 12.257% absolute relative error
(ARE). This indicated that this model has an accurate forecasting ability and
can provide reliable and efficient reference data for operators. |
Keywords: |
Travel Agency, Financial Revenue, Forecasting, Artificial Neural Network,
Operating Revenue |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
CAPACITY ENHANCEMENT OF MC-CDMA SYSTEM THROUGH RECEIVER PHASE ROTATED CONJUGATE
ICI CANCELLATION WITH ITERATIVE CFO AND IQ IMBALANCE ESTIMATION AND COMPENSATION |
Author: |
S.CHITRA, N.KUMARATHARAN |
Abstract: |
The ever increasing demand for very high data rate multimedia services such as
audio, video, image and data requires the technologies which make use of the
available electromagnetic resources in the most intellectual manner.
Multi-carrier code division multiple access (MC-CDMA) is one of the best
techniques to meet the requirements of next generation wireless mobile
communication systems. MC-CDMA system combines the benefit of both orthogonal
frequency division multiplexing (OFDM) technique and code division multiple
access scheme (CDMA). It offers high spectral efficiency, high data rate, low
transmit power, lower implementation complexity, large system capacity and
narrowband interference rejection capability. Direct conversion receivers in
multi-carrier systems are very sensitive to carrier frequency offset (CFO), gain
and phase offsets called IQ imbalances. CFO leads to loss of orthogonality among
the subcarriers resulting in intercarrier interference (ICI). IQ imbalance will
cause severe degradation in the detection accuracy. To reduce the ICI and to
improve the demodulation accuracy, a receiver phase rotated conjugate
cancellation (RPRCC) using joint iterative CFO& IQ imbalance estimation and
compensation algorithm is proposed in this work. Simulation results show that
the proposed method provides better carrier to interference ratio (CIR) and bit
error rate (BER) performance compared to phase rotated conjugate cancellation (PRCC)
without CFO and IQ compensation and conventional conjugate cancellation (CC)
techniques. |
Keywords: |
CFO, ICI, IQ imbalance, MC-CDMA, RPRCC |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
PREDICTION OF STOCK PRICE USING ARTIFICIAL NEURAL NETWORK: A CASE OF INDONESIA |
Author: |
TOGAR ALAM NAPITUPULU, YOHANES BUDIMAN WIJAYA |
Abstract: |
Artificial Neural Network (ANN) has been widely used in many application because
of its ability to solve non-parametric problems. ANN is also recognized as a
good and widely used tool in forecasting stock prices. Traditionally stock
forecasting in Indonesia usually used time series analysis. This paper compared
the stock forecasting result of ANTM (PT Aneka Tambang) using ANN and that of
Autoregressive Integrated Moving Average (ARIMA). The results of the study
showed that forecasting using ANN method has smaller error than ARIMA method.
been developed for different hybrid power system configurations for tuning the
proportional-integral controller for SVC. Transient responses of different
autonomous configurations show that SVC controller with its gained tuned by the
ANNs provide optimum system performance for a variety of loads. |
Keywords: |
Artificial Neural Network, ARIMA, time-series, stock forecasting |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
ENHANCED STRATEGY OF DEPLOYMENT FIREWALL POLICIES |
Author: |
F.Bezzazi, A.KARTIT, M. EL MARRAKI, D.ABOUTAJDINE |
Abstract: |
Firewall is one of the most widely utilized component on any network
architecture, since that a deployment is a very important step to turn the
initial policy to a target policy. This operation must be done without
presenting any risks or flaws. Much research has already addressed the
specification of policies, conflict detection and optimization, but in our paper
we will focus on researches that talk about strategies for the security of
policy deployment, some researchers have proposed a number of algorithms to
solve this problem, we will discuss one of these algorithm then we propose an
amelioration of this strategy. Our experimental results show that the new
version of algorithm is very fast and can be used safely even for deploying very
large policies. |
Keywords: |
Policy Deployment (PD), Firewall Policy (FP), Network Security (NS). |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF GEOGRAPHIC ROUTING PROTOCOLS IN HIGHLY MOBILE AD HOC
NETWORK |
Author: |
VARUN G MENON, JOE PRATHAP P M |
Abstract: |
Routing in Mobile Ad Hoc Networks (MANETs) has always remained a challenging
task due to its dynamic topology and lack of centralized control. Several
routing protocols have been proposed over these years starting with the
traditional topology based protocols to the geographic routing protocols. The
research over these years shows that the geographic routing protocols like
Greedy Perimeter Stateless Routing (GPSR) obtains much better performance
compared to all other previous routing protocols. The aim of this research paper
is to survey and analyse the performance of various geographic routing protocols
in highly mobile ad hoc networks and to perform a comparative analysis using
their advantages and disadvantages. |
Keywords: |
Dynamic Topology, Geographic Routing, Location Information, MANET, Routing
Protocols. |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE IMPLEMENTATION OF MULTI-ATTRIBUTE APPROACH IN DECISION MAKING FOR DEFENSE
SEA REGION MODELS |
Author: |
PUDJI SANTOSO, KETUT BUDA A, MASROERI, M. ISA IRAWAN, AAB. DINARIYANA |
Abstract: |
This paper discusses the concept of decision-making on the model of territorial
sea defense system to resolve cases of violations in Indonesia's marine
territory by foreign vessels, illegal fishing and illegal logging. The violation
also shows that Indonesia has not fully monitored its marine areas by the patrol
ships. The lack of Navy patrol boats owned causes mutual-conflicst in
decision-making.
From the three zones of the qualitative attributes, relative weight is searched
by the Analytical Hierarchy Process (AHP). Then, the value of the Relative
weight is converted to normalize relative weight, basic probability assignment,
and the total probability assignment, so the degree of preference is obtained
from the qualitative attributes. Then, the preference degree of qualitative
attributes is combined with the preference degree of the quantitative attributes
with the entropy method resulting a rank that shows the optimal alternatives
deployment of nine zones of base stations. The result of calculation using the
entropy method shows that the highest entropy value is 0.89. |
Keywords: |
Zones Re-Evaluation, AHP, MADM, Mutual Conflict, Territorial Defense |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
ARCHITECTURE OF A TELEMEDICINE SYSTEM FOR MONITORING SICK HEART REMOTELY |
Author: |
BENSLIMANE MOHAMED, ANAS BOUAYAD, ABDELALI IBRIZ, HARTI MOSTAFA |
Abstract: |
The monitoring of the vital functions of human organism could be in the future
facilitated by swallowing micro-sensors or implementing them under the skin.
Multi-sensor capsules or micro-cameras that can be swallowed already exist, by
which we can transmit images from inside the human body without surgery (with a
battery life of 24 hours). This paper presents our first reflection on the
development of an application based sensor networks in the field of
telemedicine, especially the monitoring the status of cardiac patients remotely.
The main objective is to identify constraints and adaptive algorithms for
synchronization and sharing resources in applications based sensor networks. |
Keywords: |
Network Sensors, Telemedicine, electrocardiograph (ECG), ZigBee TinyOS, nesC,
Wireless Personal Area Networks (WPANs). |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
DATABASE INTEGRATION: IMPORTANCE AND APPROACHES |
Author: |
IBRAHIM ALMAHY, NAOMIE SALIM |
Abstract: |
Database integration is a multistep process of finding similar entities in two
or more databases to create a non-redundant, unified view of all databases.
Database integration has become an active area for research due to increasing of
information resources with the need of users and applications to integrate data
from these different sources. This paper discusses the role of data integration
and the fields that require it, problem of integration and the processes of
integration. Finally it presents the current methods used in database
integration in a form of graph that classified the approaches in clear manner. |
Keywords: |
Database integration; integration approaches; schema matching |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATED RETENTION SCHEDULES: THE IMPORTANCE OF ITS IMPLEMENTATION BY
UNIVERSITIES IN MALAYSIA |
Author: |
YOUSEF I. ABUZAWAYDA, ZAWIYAH MOHD YUSOF, MOHD AB AZIZ |
Abstract: |
Records are a rich source of information often receive low priority and not
properly addressed in preventing Organisations from risks. It is common that
organisations do dispose off records unintentionally or before the records reach
its maturity due to the absence of the retention schedule. As organisations with
prevailing data and information, universities ought to practice retention
schedules to minimize the problems of losing vital information, thus protecting
universities from the risks of not being able to produce evident especially when
involve in litigation. Automated records retention schedule (ARRS) is paramount
as universities are now electronically operated. This study seeks to find out
the implementation of automatic retention schedule in universities in Malaysia.
The study uses a qualitative research approach with interview as technique to
gather data. Findings reveal that lack of training, lack of policies which
hinder universities in Malaysia to efficiently embark on electronic records
management. |
Keywords: |
E-Records, Records Management, Records Retention, Retention Schedule |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
A FRAMEWORK BASED PROTOCOL FOR A BETTER INTEROPERABILITY AMONG SERVICES IN
E-GOVERNMENT |
Author: |
ASSIA TEBIB, MAHMOUD BOUFAIDA |
Abstract: |
In order to improve the efficiency and quality of services provided to citizens
(and/or businesses), Public Administrations (PAs) are constantly trying to turn
their services into electronic-oriented ones (e-Government). Achieving
interoperability and security in this area is a challenging task. In this paper,
we define a middleware to ensure the interoperability of the information systems
in the domain of e-government, while guaranteeing some security properties. We
propose an applicative protocol integrated in the middleware. A case study was
developed to validate the suggested framework. |
Keywords: |
E-Government, Interoperability, Services, Middleware, Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
SEMANTIC BASED INFORMATION RETRIEVAL FOR WEB PAGES |
Author: |
R.LENIN BABU, Dr.S.VIJAYAN |
Abstract: |
Content stored/shared on Web and document repositories has increased greatly
leading to problems in locating required information from massive volumes.
Progress in retrieving required information was achieved with search engine
technology development that could collect, store and pre-process information
globally, responding to users’ needs instantly. Use of text classification
techniques ensures web page classification. Presently, semantics are the basis
for content description and query processing techniques required for Information
Retrieval (IR). This paper presents an approach for information retrieval from
web pages, based on the proposed extraction methods. AdaBoost algorithm is used
to obtain and classify features and BF tree with the proposed feature extraction
ensures high classification accuracy. |
Keywords: |
Information Retrieval (IR), Semantics, Latent Semantic
Analysis (LSA), AdaBoost |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
Title: |
MEMORABILITY FEATURES OF DRAW-BASED GRAPHICAL PASSWORDS |
Author: |
OBASAN ADEBOLA O., NORAFIDA ITHNIN, CHUA SIEW WENG |
Abstract: |
Password authentication has become a widely recognized element of computer
security practices, where human users are proven or confirmed as legitimate
users for access to secure systems. Every user needs to recall its password
correctly before access can be granted to an intended system. Remembering the
secure password chosen from mixture of random alphanumeric and non-alphanumeric
characters is an everyday problem for all users because of individual memory
limitation. In an effort to solve this problem, users tend to choose insecure
passwords that are making most systems vulnerable to many attacks. Instead of
using secure-but-difficult to remember or unsecure-but-easy to remember
alphanumeric password, now graphical password which works just by clicking with
a mouse or stylus could be used for user authentication. Graphical password is
able to solve the problem of alphanumeric password being hard to remember. The
main objective of this paper is to provide a comprehensive survey of array of
draw-based graphical password schemes and capture the memorability of each
scheme in a table. We highlight what makes images memorable and recommend that
choice of background image in a scheme could affect how memorable it is because
not all images are equal in memory. |
Keywords: |
Graphical Passwords, Password Space, Authentication, Images Memorability |
Source: |
Journal of Theoretical and Applied Information Technology
August 2013 -- Vol. 54. No. 1 -- 2013 |
Full
Text |
|
|
|