|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2013 | Vol. 53 No.2 |
Title: |
STUDY OF SPI FRAMEWORK FOR CMMI CONTINUOUS MODEL BASED ON QFD |
Author: |
Yonghui CAO |
Abstract: |
Software Process Improvement (SPI) is the modification of current software
process methods in many software development organizations. It is the key of the
continuous process improvement. In this paper, we introduce Software Process
Improvement (SPI) and Quality Function Deployment (QFD); the SPI framework based
on CMMI contains two portions: 1) SPI framework for CMMI staged model based on
QFD and 2) SPI framework for CMMI based on QFD continuous model. This paper
focuses on the analysis of the later. |
Keywords: |
Software Process Improvement, CMMI, QFD |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS |
Author: |
Xiang Liyun, Fang Zhiyi, Sun Hongyu |
Abstract: |
Single sign-on is a strategy that is used to integrate user information
resources, provide solutions for unified login and enhance the security of the
user accounts. There exist many realizations of single sign-on model, such as
Cookie based, passport based, CAS based and etc., in this paper, the merits and
drawbacks of the various realizations have been analyzed. According to the
analysis and the requirements of the enterprise, SCAS (Separated CAS) which is
the improvement of CAS has been proposed to integrate the user information
resources, Actual application of SCAS model shows that the database server
pressure was reduced, the response speed was increased, the scalability of
business logic was also better than CAS model. |
Keywords: |
Single Sign-on, CAS, SCAS, Throughout |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
BUILDING PLATFORM FOR SHARING DIGITAL RESOURCE UNDER THE BACKGROUND OF NEW URBAN
AGGLOMERATION |
Author: |
SHANGQIN ZHONG |
Abstract: |
The current building pattern of digital library has failed to meet the needs of
the construction of new urban agglomeration. A platform for sharing digital
resource is proposed. The network deployment program, framework of the platform,
data processing mechanism, and processes of lending and returning books are
described. The platform provides not only excellent data security mechanism, but
also user-transparent interlibrary loan service of inter-city, which greatly
facilitates the city residents. It also promotes the process of building a new
urban agglomeration as its innovations in technology, management, and service. |
Keywords: |
Digital Resource Sharing Platform, Digital Library, Interlibrary Loan, New Urban
Agglomeration |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMPROVING OCR BY EFFECTIVE PRE-PROCESSING AND SEGMENTATION FOR DEVANAGIRI
SCRIPT:A QUANTIFIED STUDY |
Author: |
Dr. DEEPA GUPTA, LEEMA MADHU NAIR |
Abstract: |
Optical Character Recognition (OCR) system aims to convert optically scanned
text image to a machine editable text form. Multiple approaches to preprocessing
and segmentation exist for various scripts. However, only a restricted
combination of the same has been experimented on Devanagari script. This paper
proposes a study which aims to explore and bring out an alternative and
efficient strategy of pre-processing and segmentation in handling OCR for
Devanagari scripts. Efficiency evaluation of the proposed alternative has been
undertaken by subjecting it to documents with varying degree of noise severity
and border artifacts. The experimental results confirm our proposition to be
superior approach over other conventional methodologies to OCR system
implementation for Devanagari scripts. Also described is detailed approach to
conventional pre-processing involved in initial stage of OCR, including noise
removal techniques, along with the other conventional approaches to
segmentation. The proposed alternative has been deployed to reach character and
top character segmentation level. |
Keywords: |
Optical Character Recognition(OCR), Pre-processing, segmentation, Morphological
operators, Connected component, Projection profile, Noise removal, Devanagari |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
REQUIREMENT TRACEABILITY MATRIX THROUGH DOCUMENTATION FOR SCRUM METHODOLOGY |
Author: |
Gunavathi Duraisamy and Rodziah Atan |
Abstract: |
Requirement traceability matrix is a table that captures the complete user and
system requirement for the system. It helps to trace from requirement till
testing in order to verify that the requirement is fulfilled. In SCRUM
development methodology, requirement traceability matrix is used to capture the
linkage of user stories between product backlog and sprint backlog. The linkages
between the requirements are retrieved through these two documents. However,
unstructured format of both documents do not help in getting the requirement
traceability. Thus, requirement traceability has become an issue for SCRUM
practitioners especially for system development and maintenance. Therefore, this
study will introduce structured format of available artifacts and develop a
tracing tool to automatically generate the requirement traceability matrix by
keyword searching. Both the documents used in this study have to be prepared by
using the structured format and the proposed traceability tool is able to
generate the requirement traceability matrix automatically by keyword searching
functionality. The result shows that the introduced structured format is very
useful and it has increase the efficiency of retrieving the matrix far better
than previous process. There is a significant time saved up to 95% for
generating the requirement traceability matrix using the proposed method and
tool. As a conclusion, requirement traceability can be achieved in SCRUM
methodology through the proposed structured documentation and the tool
developed. |
Keywords: |
Requirement Traceability Matrix, SCRUM Development Methodology, Structured
Documentation, Forward Traceability, Backward Traceability, Correctness, Time
Saved |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
CHARACTER AND OBJECT RECOGNITION BASED ON GLOBAL FEATURE EXTRACTION |
Author: |
Maryam Naeimizaghiani, Siti Norul Huda Sheikh Abdullah, Farshid PirahanSiah ,Bilal
Bataineh |
Abstract: |
Optical character recognition (OCR) is one of the most important fields in
pattern recognition world which is able to recognize handwritten characters,
irregular characters and machine printed characters. Optical character
recognition system consists of five major tasks which are involved
pre-processing, segmentation, feature extraction, classification and
recognition. Generally, less discriminative features in global feature approach
leads to reduce in recognition rate. By proposing a global approach that
produces more discriminative features and less dimensionality of data, these
problems are overcome. Two feature extraction methods are studied namely Gray
Level Co-occurrence Matrix (GLCM) and edge direction matrix (EDMS) and
combination of two popular feature extraction methods is proposed. The most
important problem of EDMS is the number of produced features with this method
which is just 18 features and is not enough for feature extraction purpose and
it causes reducing the recognition rate. The aim of this research is improving
the recognition rate of EDMS by combining with a global feature extraction
method in order to increase the number of extracted feature and produce better
recognition rate. The proposed method is a combination of GLCM and EDMS method
with and without feature selection method called gain ratio and ranker search
which applied to reduce the dimensionality of data. They have been tested onto
four different datasets involving manually and automatically cropped licence
plate and font style images amounting 3520 images from 0 to 9 and capital letter
A to Z with various size and shape. Another dataset is large binary images of
shapes which involve 300 images of objects. Then, gain ratio and ranker search
are used to select discriminative features whereby the features reduced from 58
to 34 numbers of features. The proposed combinatory method, EDMS and GLCM
methods are classified using neural network, Bayes network and decision tree.
The experimental results for character recognition indicate that the proposed
combinatorial method obtain better average accuracy rate about 85.99% whereas
EDMS, GLCM and combination without feature selection achieved 80.19%, 38.84%,
and 58.78% subsequently and the experimental results for object recognition
indicates that proposed method before and after feature selection outperformed
other methods such as EDMS and GLCM with 90.83% and 92.5% accuracy rate
respectively with NN as the classifier. Consequently global and spatial
approaches are compared in recognition of objects and characters. The
experimental results show the better performance of proposed method as a global
feature extraction method for object recognition purpose with 92.5% accuracy
rate with NN while Robinson filter as a spatial feature extraction method
outperformed the global feature extraction methods for character recognition
purpose with 100% accuracy rate with NN. Also global approach obtains smaller
processing time comparing to spatial approach. |
Keywords: |
Feature extraction, Character Recognition, Image Processing, OCR, Global Feature
Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
E-ASSESSMENTS SYSTEMS FROM ACADEMICS PERSONAL TRENDS |
Author: |
SALWA ALSAMARAI, MOHAMMAD ALI ELJININI, AMAAL AMAWI, SUHA HAMEED |
Abstract: |
The research aims to identify the personal trends of the research sample which
consists of professors who use computer systems for students’ assessments at the
University. The Personal tends are about the relationship between the
availability of supplies needed to carry out e-exams and to what extent it has
been implemented successfully. The Research used descriptive analytical methods
on a sample that consisted of (44) professors from (5) colleges. The research
tool is composed of many variables for measuring the relationship influenced
among them. The research concluded that there is a relationship effect between
the availability of supplies and the success of the implementation process of
the electronic examinations system. Also, there is a differences in the
perspectives of members of the research sample on any of the variables. More
effect has been observed that the variation in personal trends differed for the
research variables where results indicated that there is variation in personal
trends about one variable, when there is no variation on other variables. In
previous study done on students, there was a variation in the attitudes about
all the variables. Results indicated that there is a difference in professors
attitudes about the problems facing the implementation process, and that there
are variations on indicators of the success of the implementation process. |
Keywords: |
E-Assessments, Assessments Trends, E-Learning, Open Source Learning Management
Systems, Moodle System |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
ROBUST H∞ TRACKING CONTROL FOR THE NON–GAUSSIAN STOCHASTIC DISTRIBUTION SYSTEMS |
Author: |
QU YI, WANG HUI,LI A-HONG, DANG SHI-HONG |
Abstract: |
This paper considers the design problem of a novel H∞ controller for the
non–Gaussian Stochastic distribution system. The non–Gaussian Stochastic
distribution control aims to control the shape of the system output probability
density function(PDF) to track the shape of the target probability density
function for non-Gaussian stochastic distribution systems.the PDF tracking
control is transformed into a constraint tracking control problem for weight
vector by B-spline expansion with modeling errors and the nonlinear weight model
with exogenous disturbances. A design approaches H∞ controller are provied to
fulfill the PDF tracking problem. Finally,number examples are given to illustrate
that the proposed method can guaranteed the performances of stability ,tracking
and robustness as well as the state constraint simultaneously. |
Keywords: |
Probability Density Fuctions, Tracking Control , Linear Matrix Inequality, H∞
Controller,B-Spline Expansion |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
ORDINAL COMPUTING WITH 2-ARY CODE IN COMBINATORICS CODING METHOD |
Author: |
RUSHENG ZHU, ZHONGMING YONG |
Abstract: |
All characters in any character sequence can constitute a dictionary space by
permutation and combination and the character sequence can be replaced by the
ordinal of this sequence in the dictionary space. This coding method is named
combinatorics coding method. Combinatorics coding method is expatiated firstly
in this paper and ordinal computing in different data system is analysized.
Combinatorics coding method can be done by different code modes. In these code
modes, combinatorics coding method with 2-ary code has particular property.
Ordinal computing method with 2-ary code is advanced and the characteristics of
ordinal with 2-ary code are researched. Combinatorics coding technology with
2-ary code has reference to the intensive study of the combinatorics coding
method. |
Keywords: |
Data Coding, Source Coding, Combinatorics Coding, Ordinal, Max Ordina, Whole Max
Ordinal |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
TRACK ACCESS SYSTEM FOR HAZARDOUS CHEMICALS BASED ON MULTIPLE NETWORKS |
Author: |
QIULIN TAN, LIQIONG DING, WENYI LIU, XIANGDONG PEI,XIANGSHENG ZHANG,HAO
KANG1,DING MEN |
Abstract: |
Catastrophic accidents caused by the leak of hazardous chemicals in the storage
and transportation process occurred frequently, in order to seek for a
continuous, all-location, real-time solution for tracking, positioning the
vehicles transporting dangerous hazardous materials,this paper design a track
access system, which is the integration of Global Positioning Systems(GPS),
Google Earth geographic information systems, the GSM information systems and
computer data processing technology. The locus access system obtains the raw GPS
data from truck/ship-borne positioning terminal, and then transfer to the PC
through USB, at last, the PC extracts and analyzes these data and execute
coordinate transformation, and map these locations which point to the GPS data
on the screen, forming a locus. The accurate knowledge integrated in the system
of supervision of hazardous materials transportation ensures the establishment
of early warning of hazardous chemicals leakage and accurate monitoring of
storage and transportation. The integrated positioning monitoring system is
found flexible, reliable and accurate for recording trace of the target under
practical site conditions, is a mainstream of modern hazardous goods logistics. |
Keywords: |
GPS, Google Earth, GSM / GPRS Information Systems, Hazardous Chemicals, Track,
Leakage |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
FORMAL METHODS OF NON-FUNCTIONAL CONFLICT RESOLUTION FOR NETWORKED SOFTWARE TO
SOLVE TRAFFIC TRAVEL COSTS |
Author: |
LIU SHAO-HAI, WU JIN- ZHAO, AN NA |
Abstract: |
The products of Networked Software must meet customers' business needs in
addition to features other than the functional requirements, non-functional
characteristics. In order to ensure the system performance, reliability,
maintainability and scalability, it is necessary that non-functional conflict
digestion method to be optimized so that the higher the efficiency of the
implementation of Networked Software. Based on the Non-functional Requirement
Conflict Management Meta-model, takes formal description of the modeling
elements, and gives the definition of requirement semantic conflict as the
foundation of checking requirement conflict. Provide a resolution method for
conflict elimination. As the example of calculation traffic travel costs service
nonfunctional requirements in tourism travel field, it verifies the
effectiveness of this method. |
Keywords: |
Networked Software, Requirement Engineering, Non-Functional Requirement, Formal
Methods, Conflict Detection, Conflict Elimination |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
GLOWWORM SWARM OPTIMIZATION FOR OPTIMIZATION DISPATCHING SYSTEM OF PUBLIC
TRANSIT VEHICLES |
Author: |
YONGQUAN ZHOU,QIFANG LUO, JIAKUN LIU |
Abstract: |
The intelligent schedule of vehicles operation is one of the problems which need
to be solved in the dispatching system of public transit vehicles, it relates to
the development of the city and civic daily life. In this paper, a transit
vehicle scheduling model which balancing between the benefits of bus companies
and passengers is proposed. The glowworm swarm optimization (GSO) with random
disturbance factor, namely R-GSO is applied to the schedule of vehicles.
Comparing with classic swarm intelligence algorithms, the simulation results
show our algorithm has higher efficiency and is an effective way to optimize the
public transit vehicle dispatching. |
Keywords: |
Public Transit Vehicle Dispatching, Glowworm Swarm Optimization (GSO), Random
Disturbance Factor. |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN AND PERFORMANCE EVALUATION OF ON CHIP NETWORK ROUTERS |
Author: |
U.SARAVANAKUMAR, R.RANGARAJAN |
Abstract: |
Due to minimization of communication latency, timing constraints and energy
consumption, Network on Chip (NoC) dominated System on Chip (SoC). In order to
keep up the balance between power, area, performance and robustness to traffic
changes in NoC, many research works conduct by designers. Here, we proposed new
router architectures for NoC which gives less delay time than the conventional
Wormhole router architecture. Different stages of pipelining methods implemented
at the input side of proposed router. The working function of new architecture
had verified by simulation and area, power and delay calculated by Synopsys tool
in UMC 0.13 µm. FPGAs are identified as an incarnation of NoC, then the proposed
architecture implemented in Virtex II Pro. And finally proposed router
architecture compared with previous router architectures in terms of power and
area. |
Keywords: |
System On Chip, On – Chip Communication, Network On Chip, Pipeline, FPGA, Power,
HRRA, Slack Time |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESEARCH ON IDENTIFICATION METHOD OF WIDEBAND JAMMING IN DSSS SYSTEM |
Author: |
NAIQI WEI, ZILI CHEN, ANSI ZHU,JUNWEI LV |
Abstract: |
Wideband suppressing jamming is one of the main threats faced by Direct Sequence
Spread Spectrum (DSSS) system. The identification of wideband jamming modes and
estimation of its parameters provide beneficial reference for applying effective
anti-jamming measures. Aiming at familiar wideband jamming modes faced by DSSS,
five characteristic parameters are extracted. An automatic identification method
of wideband jamming modes based on fractional Fourier transforms (FRFT) and
layered decision-making algorithm is proposed. Through the simulation results
and analysis, it can be found that the method can effectively identify
non-jamming, narrow-band jamming, wideband noise jamming, wideband comb jamming
and wideband sweep jamming. It has the advantages of high identification rate,
simplicity, short sample time, fine stability and robustness, etc. |
Keywords: |
Jamming Identification; Direct Sequence Spread Spectrum; Layered Decision-Making |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
Title: |
ROUTING IN MOBILE ADHOC NETWORKS (MANETS) USING FUZZY AIDED ANT COLONY
OPTIMIZATION (ACO) TECHNIQUE |
Author: |
B.NANCHARAIAH, B.CHANDRA MOHAN |
Abstract: |
In this work, a routing algorithm suitable for Mobile Adhoc Networks is
proposed. MANETS are unstable nature when network mobility increases. Path
selection process is a critical task in routing algorithms. The proposed work
addresses this problem by employing Ant Colony Optimization and Fuzzy logic
technques while developing the routing algorithm. The path information by ants
will be given to FIS(Fuzzy Interference system ) in order to compute the
available path’s score values, based on this score value from the FIS system the
optimal paths will be selected. Hence, the routing problem can be solved more
effectively by achieving high successful path delivery rate rather than the
conventional routing algorithms. This technique is implemented and the results
are compared to the existing algorithms. The performance of the proposed
algorithm is assessed using distance, power consumption etc.., |
Keywords: |
Ant Colony Optimization, Fuzzy Rules, Routing, MANET |
Source: |
Journal of Theoretical and Applied Information Technology
June 2013 -- Vol. 52. No. 2 -- 2013 |
Full
Text |
|
|
|