|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2013 | Vol. 53 No.1 |
Title: |
THE THROUGHPUT FOR MULTI-HOP RELAY WIRELESS SENSOR NETWORKS BASED ON COOPERATIVE
DIVERSITY |
Author: |
YU GENJIAN, WENG KUNPENG |
Abstract: |
This paper studied the problem of the throughput of multi-hop multi-relay
wireless sensor networks based on the cooperative diversity technology. At
first, the paper established the cooperative diversity model for multi-source,
multi-sink and multi-relay sensor networks, on which the specific expression of
throughput of wireless sensor networks was deduced, it not only prove that the
throughput performance of multi-hop multi-relay wireless sensor networks would
be increased by the cooperative diversity technology, but also gave the
criterion for discussing further the application effect of the technical scheme
such as the cooperative selection strategy and so on in actual multi-hop
multi-relay wireless sensor networks. In the other hand, the paper theoretically
proved that cooperative diversity could improve the throughput of multi-hop
multi-relay wireless sensor networks. |
Keywords: |
Wireless Sensor Networks, Diversity Cooperative Technology, Throughput Capacity,
Multi-Hop, Multi-Relay |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
ARCHITECTURE OF MALWARE TRACKER VISUALIZATION FOR MALWARE ANALYSIS |
Author: |
CHAN LEE YEE, MAHAMOD ISMAIL, NASHARUDDIN ZAINAL, LEE LING CHUAN |
Abstract: |
Malware is a man-made malicious code designed for computer destructive purposes.
The early destructive programs were developed either for pranks or experimental
purposes. However, in this day and age, malware are created mainly for financial
gain. Since years ago, the use of malware attack tools, such as keylogger,
screen capture software, and trojan were rapidly used to commit cybercrimes. The
figures are expected to increase significantly and the attack tools are becoming
more sophisticated in order to evade the detection of current security tools.
The malware debugger analysis process is an essential part of analyzing and
comprehending the purpose and the destructive part of the malware. It is an
exhausting and time consuming task; moreover, in-depth computer knowledge is
required. With the popularity and variety of malware attacks over the Internet,
the number of virus needed to be analyzed by computer security experts are
rapidly increasing and has bottlenecked the effectiveness of the analysis
process. In this paper, we present a method to visually explore the reverse
engineering of a binary executable flow over time to aid in the identification
and detection of malicious program on x86-32 platform. We first achieve the
pre-execution analysis for a sketch of a program’s behavior by combining static
analysis and graphical visualization to construct a control flow graph (CFG) as
an interface for the analyzed code. Each node in the CFG graph which represents
a basic block allows analysts to be selective in the components they monitor.
All nodes in the CFG express the complex relationships and causalities of the
analyzed code. As the binary executes, those codes that are dynamically
generated will be monitored and captured; thus, a fuller understanding of the
execution’s behavior will be provided. The backward track approach which allows
analysts to restudy the changes of the executed instructions’ memory during
dynamic analysis provides a chance for analysts to restudy the execution
behavior of the executed instructions. The overall architecture of the
visualization debugger, both statically and dynamically will be explained in
this paper. To the end of the paper, we analyze a malware test case; W32/NGVCK.dr.gen
virus with our malware tracker visualization toolkit and the analysis results
proves that our visualization malware tracker tool can simplify the analysis
process by displaying the analyzed code in basic block approach. This work is a
substantial step towards providing high-quality tool support for effective and
efficient visualization malware analysis. |
Keywords: |
Malware Visualization Debugger, Static Analysis, Dynamic Analysis, Malware
Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NARRATIVE REVIEW OF RESEARCH ON LEARNING STYLES AND COGNITIVE STRATEGIES |
Author: |
BALASUBRAMANIAN VELUSAMY, MARGRET ANOUNCIA S |
Abstract: |
The aim of this article is to analyze the existing e-learning environment and to
detect the different learning styles of an individual. In general, the
e-learning system provides assistance to the learner’s in terms of providing
learning contents that spans from textual information to multimedia information.
Though the existing system tries to maximize the aptitude of learning in users,
it fails to act in a dynamic way. To bring the dynamic nature into the system,
the learning behavior of an individual has to be modeled. In order to expedite
the process, it is necessary to automate the process of detecting learning style
based on the learning behavior. This paper attempts to uncover the specialties
of the existing e-learning learning style models and cognitive strategies
towards understanding and proposing the learning style for the learners based on
the popular Felder Silverman Learning Style Model (FSLSM) learning input and
dimensions. |
Keywords: |
E-Learning, Learning Style, cognitive, FSLSM, Learning dimension and Learning
behavior |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE INVESTIGATION OF WIMAX 802.16M IN MOBILE HIGH ALTITUDE PLATFORMS |
Author: |
MARWA IBRAHIM, M.M. ZAHARA, SAMEH NOAMAN, RAGAB AL SAGHIER |
Abstract: |
Providing WiMax broadband services via high altitude platforms (HAPs) is still
an open research issue. One of the major problems affecting the system
performance on the link level is Doppler Effect caused by the mobility of the
served users. This paper investigates the Doppler effects on the bit error rate
of mobile users in the downlink of the WiMax802.16m standard. The system key
parameters that affect the error bit rate performance are also studied. These
parameters include the channel propagation model. The Bit Error Probability (BEP)
is the performance metric used to evaluate the downlink performance. Numerical
results provided through simulations show that providing WiMax through high
altitude platforms enhances the BER performance over that expected from
conventional terrestrial systems. |
Keywords: |
WiMax; HAPs; Doppler effect; IEEE802.16m; mobility |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
A METHOD FOR AUTOMATIC DETECTION OF THE RUNNING RED LIGHT BY USING OPTICAL FLOW
MIXED FRAMES SUBTRACTION |
Author: |
JIANGFAN FENG, WENWEN ZHOU |
Abstract: |
Running red lights (RRL) currently become a hotspot social issue. Although it is
commonly mentioned to detect and warn by using traffic monitoring, this idea has
still remain in human recognition. Therefore, this paper designs a method to
remedy it, which can detect the behavior of the pedestrians crossing the road
automatically. From the sequential images taken by traffic monitoring, the use
of optical flow estimating the track of motion objects whether cross the
designated area enables automatic identification, then we carry out frames
subtraction to isolate and identify the pedestrians from the moving objects.
Combine the advantage of both algorithms, a system is presented to recognize the
RRL event. Ultimately, the experiment confirms and indicates that what we
proposed works effectively in some way. |
Keywords: |
Optical Flows, Frame Subtraction, Target Tracking, Event Detection, Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
ACTIVE CHOICE IS TENDENCY OF PLAYERS: CASE STUDIES OF MOTIVATION CLASSIFICATION
IN THE MOTIVATION BEHAVIOR GAMES |
Author: |
MOH. ARIES SYUFAGI, SITI MUSLICHAH HARINI, MOCHAMAD HARIADI, MAURIDHI HERY
PURNOMO |
Abstract: |
To assess the motivation level of player interest is difficult; many instruments
are potentially biased, unreliable and invalid test. Whereas, in serious game is
important to know the motivation level. If the motivation level can be measured
well, the mastery learning can be achieved. Mastery learning is the core of the
learning process in serious game. To classify the motivation level of players,
researchers propose a Motivation Behavior Game (MBG). MBG improves this
motivation concept to monitor how players interact with the game. This game
employs Learning Vector Quantization (LVQ) for optimizing the motivation
behavior input classification of the player. Training data in LVQ use data
observation from the teacher. Populations of motivation behavior classification
in this research are pupils when playing the game. Mostly players Motivation
Behavior Game have motivation behavior category are Active Choice. Some of them
have Mental Effort category, and a few included in the group Persistence. Thus,
the general level of interest of the player is still to trial. |
Keywords: |
Active Choice, Motivation Classification, Learning Vector Quantization (LVQ),
Motivation Behavior Game (MBG) |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
GENERALIZED P-ARY SEQUENCES WITH TWO-LEVEL AUTOCORRELATION |
Author: |
XINJIAO CHEN, HUANGUO ZHANG |
Abstract: |
In this paper, we find a family of -ary sequences with ideal two-level
autocorrelation with symbols in the finite field . The proposed family may be
considered as a generalization of the well-known nonbinary sequences introduced
by Helleseth and Gong. Using the constructed sequences and -sequences, we
present a family of -ary sequences of which the correlation property is optimal
in terms of the Welch lower bound. |
Keywords: |
Communication Systems, Pseudorandom Sequences, Correlation, Ideal Two-Level
Autocorrelation |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
SERVICE RESPONSE WITH OPTIMAL QOS IN SERVICE CLUSTER SCHEMA |
Author: |
QIANG HU, YUYUE DU |
Abstract: |
The large amount of Web services in internet brings more opportunities for the
users, however, it also increases the difficulty to search and find an
appropriate Web service for a service request since there are too many similar
Web services. To reduce the search space and increase the flexibility of service
response, a group of Web services with similar functions are mapped as a service
cluster in this paper. A service request and response schema based on service
cluster is proposed. The service request from a user is responded by a Web
service or a service flow. The service architecture oriented on service clusters
is presented and tow algorithms are designed to bind an appropriate Web service
or a service flow with the optimal Qos under the service cluster schema.
Simulation results show that efficiency is greatly increased in discovering
services under service clusters schema, and the rediscovery time is also greatly
decreased once the current working Web service is unavailable |
Keywords: |
Web service, Quality of Service (QoS), Service Cluster, Flexibility, Service
flow |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
DECOUPLING CONTROL FOR THREE DEGREES OF FREEDOM SERVO SYSTEM BASED ON NEURAL
NETWORK |
Author: |
XIAOFEN JIA, BAITING ZHAO |
Abstract: |
Three degrees of freedom servo system(TDFSS) is one of the key equipments of
inertial testing, such as evaluation of inertial navigation system and test of
inertial components. It is a kind of servo system with some non-linearity and
uncertainty. This thesis takes advantage of the characteristic of Neural network
in approaching non-linear function, applies the Neural network on the three-axis
simulator, provides a method for the TDFSS. Simulating experiment has been used
to verify the advantage of the scheme and achieved completely decoupling
control. The scheme gives good control precision, and it is simply structured
and easily implemented. |
Keywords: |
Three Degrees Of Freedom(TDF); Servo System(SS); Neural Network(NN); Decoupling
Control(DC) |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF DS-CDMA SYSTEM OVER AWGN AND FADING CHANNELS BASED ON
DIVERSITY SCHEME |
Author: |
ARUNARASI JAYARAMAN, INDUMATHI PUSHPAM |
Abstract: |
This paper investigates, a technique which uses antenna diversity to achieve
full transmit diversity using an arbitrary number of transmit antennas for
secure communications and to improve the system performance by mitigating
interference. The work is focused on the performance of DS-CDMA systems over
Rayleigh, Rician and AWGN fading channel, in the case of the channel being known
at the receiver .The diversity scheme used in the analysis is Alamouti STBC
scheme. Using simulation and analytical approach, we show that STBC CDMA system
has increased performance in cellular networks We also compare the performance
of this system with the typical DS-CDMA system and show that STBC and multiple
transmit antennas for DS- CDMA system provide performance gain without any need
of extra processing . Evaluation and comparison of the performances of DS-CDMA
system in the AWGN (Additive White Gaussian Noise) channel, Rician fading
channel and the Rayleigh fading channel are provided. |
Keywords: |
Additive White Gaussian Noise, DS-CDMA, Rician distribution, Space time block
codes (STBC) |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN EXTENSIVE DATA CACHING FRAMEWORK APPROACH FOR ENTERPRISE APPLICATION |
Author: |
NILAYAM KUMAR KAMILA, PRASHANTA KUMAR PATRA |
Abstract: |
There are a number of approaches, which have been developed and are still in
process of development, to regulate and frame the data transfer to/from the
servers or storage base. The developers are still facing number of difficulties
in terms of time required in fetching or storing the data in remotely located
servers during the development (coding and unit test) phase. The remotely
located server could not be replicated or placed in local area network due to
high security concerns and unavailability of proper infrastructures. We are
presenting a new framework approach which can be utilized to cache the remote
data and hence the development process could be made faster than the usual
traditional development process. |
Keywords: |
Caching, Data Caching, Caching Framework, Development through Caching |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
NEW STABILITY CONDITIONS FOR NEUTRAL SYSTEMS WITH DISTRIBUTED DELAYS |
Author: |
XINGHUA LIU, HONGSHENG XI |
Abstract: |
The certain and uncertain neutral systems with distributed delays are
investigated in this paper. The uncertainties under consideration are
time-varying, but norm bounded. By the delay-dividing approach, firstly new
asymptotic stability conditions for the certain neutral systems with distributed
delays are given by Lyapunov method. Then the asymptotic stability conditions
for the uncertain case are obtained subsequently. Numerical examples illustrate
that the proposed criteria are effective and lead to less conservative results
than existing ones. |
Keywords: |
Neutral Systems, Robust Stability, Distributed Delays, Asymptotic Stability |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
BALANCING PROCESS TO THE CIPHERING SYSTEM SEC |
Author: |
ZAKARIA KADDOURI, FOUZIA OMARY, ABDOLLAH ABOUCHOUAR, MOHSSIN DAARI |
Abstract: |
In this article, we present a new symmetrical encryption system based on
symmetric encryption SEC, it formalizes the problem of encryption to a
combinatorial optimization problem and uses evolutionary algorithms to solve it.
The main objective of this work is to strengthen the resistance of the
encryption system “SEC” against cryptanalysis by the characters frequencies
study. The Balancing process (BP) is introduced to change the appearance
frequencies of characters, and to reach equilibrium. Through the key generated
by our algorithm, we illustrate the process of encryption and decryption.
Examples of applications will be given at the end of this article, the results
show that our new system is robust and resists to any attack by frequency
analysis. |
Keywords: |
Symmetric Encryption, Evolutionary Algorithms, Combinatorial Optimization, SEC,
Frequency Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
PARTIAL DEPENDENT GRAPHICAL MODELS FOR UNDIRECTED RELATIONSHIPS INVOLVING
PASSIVE STATES |
Author: |
DONGYU SHI |
Abstract: |
As a core framework in artificial intelligence, standard graphical models
generally assume that every state of a variable node has effect on other nodes
by propagating beliefs to them. However, in many real world problems concerning
undirected relationships, it is common that certain state of an object cannot
possibly change other objects' states. Besides, an object only remains in this
state when no effect on it successfully changes it. This paper defines it as
passive state, and presents a framework - Partial Dependent Graphical Models (PDGM)
for representing undirected relationships involving these states. Through a
static undirected structure with a varying directed edge system, it analytically
captures the behavior of variables having passive states. An inference method is
developed for reasoning in the model. Experiments and examples are provided to
show the effectiveness of PDGM. |
Keywords: |
Graphical Models, Uncertainty Representation, Probabilistic Dependence, Message
Passing |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
Title: |
SYNCHRONIZATION OF A CLASS OF COMPLEX NETWORKS WITH NETWORKED COUPLING CHANNELS |
Author: |
WEIKE SHANG, XINXIN FU, JIN ZHU, HONGSHENG XI |
Abstract: |
The synchronization problem is investigated for a class of discrete-time complex
networks, where the networking induced communication constraints between the
coupling nodes are considered. By choosing a novel Lyapunov functional,
sufficient conditions for the synchronization of the discrete-time complex
networks subject to both coupling delays and packet dropouts are given. The
derived criteria are presented in the form of linear matrix inequalities (LMIs),
which is easy to be solved numerically. Finally, an illustrative example is
presented to verify the effectiveness of the results. |
Keywords: |
Global Synchronization, Stochastic Complex Networks, Coupling Delays, Packet
Dropouts |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 1 -- 2013 |
Full
Text |
|
|
|