|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2013 | Vol. 53 No.1 |
Title: |
EVALUATION OF INTRUSION DETECTION TECHNIQUES IN MOBILE AD-HOC NETWORKS |
Author: |
ANUSHA.K , JAYALESHWARI.N |
Abstract: |
Mobile ad-hoc networks are improvised wireless network increasingly appearing in
recent years as portable wireless devices. Due to remarkable characteristics
such as lack of central coordination, infrastructure less, dynamic topology and
nature of wireless communication, Mobile ad-hoc networks are vulnerable to many
security threats. Many Intrusion Detection Systems (IDS) have been introduced to
identify the possible attacks in the MANET. In this paper, we review different
methods of detection systems and evaluate the systems that have been proposed
prominently. |
Keywords: |
Intrusion detection system, Mobile ad-hoc network, Routing protocols, Security
threats |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
SELECTION OF CLUSTER HEAD USING FUZZY ADAPTIVE CLUSTERING FOR ENERGY
OPTIMIZATION IN WIRELESS SENSOR NETWORK |
Author: |
A.KARTHIKEYAN, SURYALOK SARKAR, AKANKSHA MOHAN GUPTE V.SRIVIDHYA |
Abstract: |
In Wireless Sensor Network the (WSN) main constraint against the enhanced
lifetime of a network is the consumption of energy by the sensor nodes which are
basically driven by battery. Extending the effective operating duration of
wireless sensor networks remains in the center of attention while talking about
wireless sensor network issues. As lifetime is directly related with the energy
supplies of the nodes, a robust approach to contribute towards overall network
lifetime is to optimize the energy consumption the nodes. At the same time an
energy efficient routing protocol is the major concern in field of wireless
sensor network. In this paper we present comparison of five energy efficient
hierarchal routing protocols, developed from conventional LEACH protocol. We are
concentrating in our research how these extended routing protocols work in order
to enhance the longevity of the wireless sensor network. Simulation results
shows that newly developed fuzzy based LEACH or LEACH-F is able to enhance the
lifetime of the network better than any other version of existing LEACH
protocol. |
Keywords: |
Wireless Sensor Network, LEACH, LEACH-F |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
PREDICTIVE LOAD BALANCING FOR DATA MINING IN DISTRIBUTED SYSTEMS |
Author: |
M.EUGIN LILLY MARY, PROF.DR.V.SARAVANAN |
Abstract: |
Load Balancing is the key attribute in distributed systems to ensure fast
processing and optimal utilization of hardware components. The processing
elements of varying hardware architecture and computing capabilities in a shared
network system constitute the distributed system. In such a heterogeneous
environment, load balancing and scheduling become complex and complicated.
Dynamic feedback based techniques, predicting the processing time of a task in a
node, will be a promising solution to resolve variations of this ubiquitous
system. A collaborative agent system comprising mobile and stationary agents
captures the feedback from the contributing nodes and the prediction for the
proceeding time epoch is made by minimizing the gap between the predicted
processing power and the actual processing power of the node in the preceding
epoch. As a result, the actual processing time of a task recorded is very close
to the predicted time, thereby reflecting the variations of the distributed
system. This predictor enables the construction of load balancing algorithms
suitable for a heterogeneous distributed environment. |
Keywords: |
Predictive Processing Power, Actual processing power, Next Predicted Time
Ratio, Actual Time_Ratio, Rate of mining. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
ACCURACY SYNTHESIS OF A 3-UCR PARALLEL ROBOT USING GENETIC ALGORITHMS |
Author: |
TAIKE YAO, YONG WANG, FENG ZHOU, XI ZHOU |
Abstract: |
The genetic algorithm is implemented to solve the problem of accuracy synthesis
for a 3-UCR (Universal-Cylindrical-Revolute) parallel robot. Accuracy synthesis
is one challenging topic for the parallel robot in the precision applications.
First, the kinematic model and error model are built for the 3-UCR parallel
robot. Then, the accuracy synthesis model based on manufacturing cost is
formulated. The synthesis problem is converted to an optimization problem taking
the tolerances of all error sources as design parameters, the manufacturing cost
as objective and the accuracy requirements as the constraint condition. Finally,
the genetic algorithm is used to solve this constraint and nonlinear
optimization problem. The simulation of a 3-UCR parallel support for the
telescope secondary mirror shows that genetic algorithm is an appropriate tool
to achieve the accuracy synthesis based on manufacturing cost. This approach is
practical and effective, and the synthesis results can satisfy the need of pose
accuracy. The synthesis result is more economical and practical than accuracy
synthesis based on sensitivity which cost twice as much. |
Keywords: |
3-UCR Parallel Robot, Error Model, Accuracy Synthesis, Manufacturing Costs,
Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZATION SCHEME OF DISTRIBUTED GENERATION INSTALLATION GROWTH CONSIDERING
NETWORK POWER QUALITY |
Author: |
YUSRAN, MOCHAMAD ASHARI, ADI SOEPRIJANTO |
Abstract: |
The distributed generation (DG) installation growth must be anticipated,
primarily by electrical power network operator. An unmanaged DG installation
will cause problems of network power quality. This research discussed
optimization scheme of DG installation growth considering network power quality.
This research was conducted by using multi-type DG eg. capability to inject
active power only, capability to inject active and reactive power and capability
to inject active power and to absorb reactive power. The three types of DG were
connected simultaneously to the network. The objective of this research was
obtaining the maximum allowable DG penetration on the network and based on the
result, arranging the DG installation growth scenarios at 75, 50, and 25 %
level. The Particle Swarm Optimization (PSO) based optimization method was
conducted to obtain maximum allowable DG penetration on the network. The DG
optimization in this research was expected to obtain minimum network active
power losses with network voltage value within 0.95 – 1.1 pu standard value. The
proposed optimization scheme was implemented on the IEEE 30 bus network. Based
on optimization result, DG was distributed on 8 distribution load bus with
maximum 205 MW+ j1 Mvar total capacity. The optimization result indicated that
DG penetration improving network power quality. After DG optimization, the
network active power losses was reduced by 74.176 %. The voltage of entire bus
were still maintained within 0.95-1.1 pu standard value even though network
average voltage was increased by 2.066 %. For 75, 50 and 25 % DG growth
installation scenario, the active power losses was reduced by 69.2, 55.7, 33.96
%, respectively and the network average voltage was increased by 1.9472, 1.6869,
1.2257 %, respectively. |
Keywords: |
Optimization Scheme, Multi-Type Distributed Generation (DG), Particle Swarm
Optimization (PSO), Power Quality |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
SPHINX-4 INDONESIAN ISOLATED DIGIT SPEECH RECOGNITION |
Author: |
IKA NOVITA DEWI, FAHRI FIRDAUSILLAH, CATUR SUPRIYANTO |
Abstract: |
Sphinx-4 is one of speech recognition engine which is the latest addition to
Carnegie Mellon University’s (CMU) repository of Sphinx speech recognition
system. This study was applied Sphinx-4 for Indonesian digit speech recognition
using JavaTM programming language. Seven men were selected in order to test the
Indonesian digit speech recognition system in term of recognition rate. The
result of the experiment showed that each man had different number of
recognition rate caused by the difference tone, pronunciation, and speed of
speech. The future works of this study will be mapping English-Indonesian
pronunciation in order to increase the recognition rate and compare men-women
recognition rate to identify gender aspects in speech recognition. |
Keywords: |
Speech Recognition; Indonesian Isolated Digit; Sphinx-4 |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
A NOVEL VOICE RECOGNITION SYSTEM FOR DUMB PEOPLE |
Author: |
S.GANESH, Dr.SARAVANA KUMAR, Dr. SHANKAR, SAMUEL D.RAJ, R.KARTIK |
Abstract: |
Information Communication Technology (ICT) can support people with physical
disabilities by enabling them to access the information along with others.
Physical challenge either temporary or of permanent nature put limitations in
learning process of an individual as it can limit accessibility, can hamper
understanding thus making it difficult for such persons to be at par with
others. Learning activity such as following a lecture, reading a book, accessing
resources, websites, appearing in the exams (written or oral) becomes an uphill
task for physically challenged persons. A wide range of software and peripherals
are now available as alternatives to using the traditional keyboard and mouse,
which can suit learners with varying physical disabilities. A person can choose
a technology based on his or her ability and ease in using a technology This
paper analysis how ICT can meet requirements of education and employment of
physically challenged people. This paper is basically aims in making mobile
phones that can be easily accessible by the dumb, who are not deaf. The primary
aim lies in capturing the lip movements of the dumb and converting these into
vibrations and consequently into sound signals which are later transmitted to
the receiver as such. Basically a device needs to be fitted in their mouth to
sense the lip movements and consequently convert them into vibration. Then the
process of recognizing the speech from vibrations takes place. The recognized
speech is sent to receiver. Thus this product will prove effective for
conversing with dumb people, thereby bringing a great impact in improving their
communication with others and for understanding and sharing their thought and
feelings. This product will be “SERVICE TO HUMANITY”. |
Keywords: |
Dump people, Lip movement, Speech recognition, Sound detection, Transceiver. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN ENERGY EFFICIENT KEY MANAGEMENT AND AUTHENTICATION TECHNIQUE FOR MULTICASTING
IN AD HOC NETWORKS |
Author: |
PAVITHIRA LOGANATHAN, Dr. T. PURUSOTHAMAN |
Abstract: |
In Mobile Ad hoc Networks (MANETs) multicasting, when an attacker inserts
spurious packets into the network any time, its neighbors can drop these packets
when proper authentication is performed. Hence, efficient authentication with
key management is required for multicasting in MANET. Also multicast key
management in ad hoc networks involves energy expenditure in key distribution
and rekeying. In this paper, we propose a trust authority based key management
and authentication technique for multicasting in ad hoc networks. Initially we
construct an energy efficient topology aware key tree which mainly aims to
reduce the re-keying load by pre-processing the joining members during the idle
re-keying interval. Key management is processed based upon Diffie-Hellman key
pair and RSA secret public key pair. A trust authority establishes public key
certificates for each group member by signing the public key with its secret
key. From the simulation results we show that this key management guarantees key
authentication, enhances fault-tolerance and protects the tree from
impersonation attacks. |
Keywords: |
Mobile Ad hoc Networks (MANET), Key Management, Authentication Technique |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
WHAT DRIVES SUCCESSFUL E-LEARNING? AN EMPIRICAL INVESTIGATION OF THE KEY
TECHNICAL ISSUES IN SAUDI ARABIAN UNIVERSITIES |
Author: |
AYMAN ALTAMEEM |
Abstract: |
In the new era of learning, electronic learning (e-learning) has become a vital
strategy for the vast majority of educational organizations across the world.
This has instigated a fundamental change in the whole education sector’s
structure, values, culture and the ways in which learning is conducted. The
worldwide e-learning market has grown considerably, but failures are still
occurring. While technology is the enabler of e-learning, in many institutions
it is also an obstacle affecting the full utilization of its own potential. This
paper investigates the major technical issues that impact on e-learning delivery
in Saudi Arabian universities. The study identified four major technical issues:
information communication technology (ICT) infrastructures, security, access
(on-site and off-site) and information technology (IT) support. The various
technical issues were investigated through the use of empirical case studies
from the Kingdom of Saudi Arabia. This research also presents several
recommendations which could be enforced to aid the implementation of e-learning
systems at universities in Saudi Arabia. This research therefore has relevance
for researchers, educational leaders and developers. Finally, a number of
possible further research directions are discussed. |
Keywords: |
E-learning, communication technologies, information security, empirical studies |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
IDENTICAL SOUND DETECTION OF USING LEAST MEAN SQUARE – ADAPTIVE CROSS
CORRELATION FOR TRANSCRIPTION |
Author: |
YOYON K. SUPRAPTO, ARIS TJAHJANTO, DIAH PUSPITO WULANDARI |
Abstract: |
Development of eastern music like gamelan is far lagged from that of western
music because gamelan is still stigmatized as part of traditional arts which
must be preserved instead of being analyzed and developed. Therefore development
of in depth research concerning gamelan music is needed to bring back the
greatness of this music like that in its era (17th-18th century).
This research initiates the gamelan sound extraction for music transcription. We
applied Least Mean Square - Adaptive Cross Correlation (LACC). ACC was conducted
to generate spectral density for music transcription while LMS was utilized to
detect instruments which have identical fundamental frequency, in order to avoid
over detection. Experiment demonstrates the test performance demonstrates that
the proposed method provided 2 - 12 % improvement for real gamelan performance
comparing to conventional methods such as STFT. |
Keywords: |
Saron time frequency model, Adaptive cross-correlation, saron extraction, music
transcription, Least Mean Square. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
RESOURCE CONSUMPTION IN NEMO ROUTE OPTIMIZATION USING CORRESPONDENT ROUTER |
Author: |
SAMER SAMI HASAN, ROSILAH HASSAN, HUSSAM ALI |
Abstract: |
Network mobility (NEMO) is an important requirement for internet networks to
reach the goal of ubiquitous connectivity. The IETF design NEMO BSP to manage
network mobility in an aggregate way. Standard NEMO suffers from number of
limitation and problems such as pinball problem and link-drop problem. In NEMO
route optimization, an attacker may induce the mobile router to initiate the
route optimization procedure with a large number of correspondent nodes at the
same time by sending to a mobile network node of the NEMO a spoofed IP packet
that appears to come from a new correspondent node. If the correspondent
addresses are real addresses of existing IP nodes, then most instances of the
binding update protocol may be successfully completed. The entries created in
the Binding Cache are correct but useless. In this way, the attacker can induce
the mobile to execute the binding update protocol unnecessarily, which can drain
the mobile’s resources. A correspondent node can also be attacked in a similar
way. The attacker sends spoofed IP packets to a large number of mobiles, with
the target node’s address as the source address. These mobiles will initiate the
binding update protocol with the target node. Again, most of the binding update
protocol executions will be completed successfully. By inducing a large number
of unnecessary binding updates, the attacker is able to consume the target
node’s resources. Meanwhile, using the correspondent router will reduce this
kind of attack according to its rules and function as a single point of
management to optimize on behalf of multiple entities. This research provides an
analytical method for evaluating the resource consumption in different NEMO
schemes using correspondent router. |
Keywords: |
Network mobility, Route optimization, Mobile IPv6, Correspondent router |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
USING PSO ALGORITHM FOR THE TRAFFIC LIGHTS SETTING PROBLEM WITH CELLULAR
AUTOMATON MODEL |
Author: |
K. ZINE-DINE, A. MADANI |
Abstract: |
The problem of traffic light optimization has been studied in the past twenty
years. Since too many factors in the real traffic could be involved, lots of
researchers proposed different kinds of models with various assumptions. In this
paper, we propose a PSO algorithm based model to investigate how to set the
given traffic lights such as that the total waiting time of roads is minimized.
We demonstrate that PSO algorithm provides an optimal solution to traffic signal
timing, leading therefore to improve the total flow and minimize the waiting
times behind crossing points. |
Keywords: |
Traffic Signal Timing, Cellular Automata Models, PSO Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
SOLVING HEURISTIC ATTACKS USING ELLIPTIC CURVE CRYPTOGRAPHY IN QUANTUM COMPUTER |
Author: |
G. ALOY ANUJA MARY, C.CHELLAPPAN |
Abstract: |
Quantum Secret Sharing (QSS) is one of the important branch in Quantum
Cryptography which combines Quantum with classical mechanics. The main objective
of this paper is to propose elliptic curve cryptography (ECC) for solving
heuristic attacks. The QSS and ECC methods has been tested in the following
three quantum algorithms like Genetic Algorithm (GA), Tabu search algorithm
(TS), Cuckoo search algorithm (CS). By considering the error rate, ECC method
has higher error rate than the existing QSS method and secrecy also has been
improved. The proposed ECC method is implemented and tested for 50 iterations
and also comparison is made with QSS. |
Keywords: |
Quantum Secret Sharing, Genetic Algorithm, Tabu Search Algorithm, Cuckoo Search
Algorithm , Elliptic Curve Cryptography. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
A STUDY ON STATISTICAL BASED FEATURE SELECTION METHODS FOR CLASSIFICATION OF
GENE MICROARRAY DATASET |
Author: |
J.JEYACHIDRA, M.PUNITHAVALLI, |
Abstract: |
With the rapid development of computer and information technology, an enormous
amount of data in science and engineering had been generated in massive scale.
Also, the diversity of data, the data mining tasks and approaches pose many
challenges to research in data mining. The data mining field has widespread
applications including advance diagnosis, market analysis, business management
and decision support. But in medical field, illness in common and cancer in
particular have become more and more complex and complicated one. To solve the
problem in data mining, knowledge discovery tools had been used mainly in
research environment. The data mining algorithms are important tool and the most
extensively used approach to classify gene expression data and play an important
role for classification. Classification is a data mining task and is an
effective method to classify the data in the process of knowledge discovery .One
of the major challenges faced by many scientists today is the analysis of the
explosion of microarray gene expression data. This research is based on machine
learning particularly microarray gene expression data analysis . In this paper,
the authors have analyzed and compared the two statistical based feature
selection algorithms namely Chi Square and T – Test Methods. |
Keywords: |
Feature Selection, Gene, Microarray, Data Mining, Machine Learning |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
DELTA REFERENCE DATA DEDUPLICATION IN LOW UPLOAD BANDWIDTH NETWORK |
Author: |
XIANZHUO LIU, JINLIN WANG, MING ZHU |
Abstract: |
When users put their files on remote storage, it is important to update local
changes in short time. Due to the redundancy between successive versions of
files, compare-by-hash and delta compression have been studied to reduce total
volume locally transmit. Better performance are desirable since plain
compare-by-hash does not fully exploit redundancy and delta compression lay
additional space demands and application oriented limits on local storage
system. In this paper, a delta reference approach is proposed to further reduce
the volume sent to remote server by dynamically searching for similar file and
reference chunks for the chunk sent from the local host. Experiments on
practical datasets reveal that the proposed approach can reduce the volume sent
to remote server up to 28.3% thereby decreasing transfer time as much as 26.2%
in typical low upload bandwidth networks. |
Keywords: |
Delta Compression, Data Deduplication, Content Defined Chunking, Bandwidth
Asymmetric Network, Data Synchronization |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
GRAPHICAL PASSWORD SCHEMES DESIGN: ENHANCING MEMORABILITY FEATURES USING
AUTOBIOGRAPHICAL MEMORIES |
Author: |
OBASAN ADEBOLA, NORAFIDA ITHNIN, MOHD ZALISHAM JALI, NICHOLAS AKOSU |
Abstract: |
Memorability and security of passwords are two distinct extremes that are
difficult to achieve at the same time. These two important features are a major
problem in conventional textual password systems. Text-based is a system where
memorability is inversely proportional to security of passwords as such users
choose weak texts as passwords to make it easy for themselves to remember at the
expense of security. A weak password is easy to remember but provide little or
no security because weak password is easy to break. To correct this flaw ,
graphical passwords are developed as an alternative to text-based passwords.
However, a number of existing graphical schemes still have some drawbacks. The
present study introduces a framework of a graphical password scheme using
autobiographical memories to improve the memorabily of passwords. With this
feature, user can write or draw two characters in each round of the grid cells
for three rounds during the password creation and later use the corresponding
cells in three rounds for authentication, without touching the grid system in
order to prevent the password from being seen by any nearby observer and
ultimately to resist against shoulder surfing |
Keywords: |
Autobiographical Memory, Shoulder Surfing, Graphical Passwords, Draw-Based
Schemes |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
HYBRID WEB ENGINEERING PROCESS MODEL FOR THE DEVELOPMENT OF LARGE SCALE WEB
APPLICATIONS |
Author: |
OMAIMA N. A. AL-ALLAF |
Abstract: |
Many web development models had been proposed in the literature and there are
few studies related to proposing models for developing large web applications.
It is important to construct a model that lead to large web applications
development with minimum likelihood of failure. A Hybrid web engineering process
model for large web development enterprises has been proposed in this research.
This model focuses on overall development process phases and consists of many
activities: division of large web application into many small sub applications;
division of large number of developers into many sub teams; identify a
management team to control the development process; Stakeholders’ and customers’
inclusion and feedback during development process; requirement analysis and
management; adopting the Spiral model by management team; adopting the Throwaway
Prototype, XP agile method, Web Engineering process model by each sub team;
conducting CMMI levels key process areas; conducting web engineering practices
and SQA activities; and training developers on CMMI and web engineering
practices. An evaluation of this model according to CMMI process areas has been
conducted in this research. This evaluation has been carried out by many
professional developers currently working in many large web-development
Jordanian enterprises. The evaluation results shows that the Hybrid model highly
satisfied each of CMMI level2 and CMMI level3, medium satisfaction of CMMI
level4, and finally low satisfaction of CMMI level5. |
Keywords: |
Large Web Applications, Web Engineering, Web Engineering Process Model, Software
Process Improvement (SPI), Capability Maturity Model Integration (CMMI) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN EXPOSITION OF VARIOUS PARAMETERS TO ESTIMATE INTERFERENCE LEVEL IN WIRELESS
MESH NETWORKS. |
Author: |
G.KALPANA, D.KUMAR |
Abstract: |
The performance of wireless networks is highly dependent on the amount of
interference experienced by the wireless links. Wireless networks suffer much
from interference due to simultaneous traffic flows due to the shared nature of
the wireless medium. This worse feature of wireless networks necessitates the
prudent modeling Of interference to be used in several design areas like channel
assignment, routing etc. Wireless mesh networks are a type of adhoc networks
with a static backhaul network.This paper provides a comprehensive analysis of
different parameters that could possibly contribute to model interference and
use the same in the design of interference aware routing metric. |
Keywords: |
Inter Flow Interference, Intra Flow Interference, Logical Interference, Physical
Interference, Self Interference,Wireless Mesh Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
Title: |
OAMS - A GAME BASED ONLINE FORMATIVE KNOWLEDGE ASSESSMENT SYSTEM USING CONCEPT
MAP |
Author: |
KUMAR R, SARUKESI K, UMA G V |
Abstract: |
The modern age of education has started to change the dynamics of design of
assessment systems in a big way. The e-learning and Mobile-learning setups have
opportunities to introduce new solutions that can automatically understand user
intent which are the need of the hour for 21st century learning environments. To
add to this, a novel approach for formative knowledge assessment (FKA) has been
proposed and developed. A novel Concept Map and Game Theory based Assessment
System OAMS has been proposed. OAMS is short form of Online Assessment
Management System and it has been tailored as a game based on Concept Map (CM)
using a Modified Extensive Game Theory (MEGT). This system imposed demands such
as definition of game notions, strategies for game, formative knowledge
assessment system and feedback construction. This paper discusses the
architecture of the OAMS and design of proposed games in detail. Two assessment
tasks have been proposed; (i) Collapsed Concept Map Game (CCMG) and (ii) Concept
Tree Game (CTG). An experiment has been conducted to test the CCMG approach. The
experimental results show that the approach has been found useful for the
learners as well as educators. |
Keywords: |
Knowledge Assessment, Concept Map, Game Theory, System Design |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 1 -- 2013 |
Full
Text |
|
|
|