|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2013 | Vol. 53 No.3 |
Title: |
OPTIMAL PARAMETERS SELECTION TO REDUCE CUTTING TEMPERATURE OF MILD STEEL USING
PARTICLE SWARM OPTIMIZATION INTELLIGENT TECHNIQUE |
Author: |
ADNAN JAMEEL, MOHAMAD MINHAT, MOHAMAD NIZAM |
Abstract: |
The temperature evolution, which happened in cutting operations due to heat,
influences the properties of the cutting tool and work piece materials. This
study focuses on the primary heat zone so called shear zone and secondary heat
zone which also called tool-chip interface zone temperatures during turning a
mild steel work piece via carbide insert cutting tool in process of CNC turning
operation in dry machining. The temperature between the tool and the work piece
can be neglected because it is small and also can be reduced using cutting tool
with sharp cutting edge. Two new objective functions are proposed to optimize
the cutting temperature problems. The proposed system uses particle swarm
optimization (PSO) methodology to find the ideal cutting parameters which help
in finding the optimal temperatures. This research shows that there is lack of
machining conditions optimization studies especially in the field of the cutting
tool temperature optimization. The study also shows that the feed rate has a
major affect on the cutting temperature compared with other parameters. |
Keywords: |
particle swarm optimization (PSO), temperature optimization, CNC turning
machine, shear zone temperature, tool-chip interface temperature. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED
HETEROGENEOUS WIRELESS SENSOR NETWORKS |
Author: |
BAGHOURI MOSTAFA, CHAKKOR SAAD, HAJRAOUI ABDERRAHMANE |
Abstract: |
The wireless sensor network is composed of a set of nodes which energy is
limited in terms of computing, storage and communication power. In this network,
a few nodes become cluster head which causes the energetic heterogeneity of the
network, therefore the behavior of the sensor network becomes very unstable as
soon as the life of the first node is elapsed. SEP has proposed the extension of
time to network stability before the death of the first node and the reduction
of unstable time before the death of the last node. This protocol is based on
the election of cluster head by the balance of the probabilities of the
remaining energy for each node. In this paper, we propose to improve SEP by
fuzzy logic (SEP-FL). We show by simulation in MATLAB that the proposed method
increases the stability period and decreases the instability of the sensor
network compared with LEACH, LEACH-FL and SEP taking into account the energy
level and the distance to the base station. We conclude by studying the
parameters of heterogeneity as the protocol proposed (SEP-FL) provides a longer
interval of stability for large values of additional energy brought by the more
powerful nodes (advanced). |
Keywords: |
WSN, Fuzzy Logic, SEP, Energy, Heterogeneous Clusters, Lifetime. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
CLUSTER LABELING WITH LINKED DATA |
Author: |
MARTIN DOSTAL, MICHAL NYKL, KAREL JEŽEK |
Abstract: |
In this article, we would like to introduce our approach to cluster labeling
with Linked Data. Clustering web pages into semantically related groups promises
better performance in searching the Web. Nowadays, only special semantic search
engines provide clustering of results. Other engines are doubtful as far as the
quality of clusters and moreover a dependable system for labeling these clusters
is lacking. Linked Data is a set of principles for publishing structured data in
a machine readable way with regards to linking with other Web resources. This
enables data from different sources to be connected and queried over the
Internet. The information from Linked Data can be used for preliminary estimates
of topics covered by a set of documents. Topics are represented as resources
from Linked Data and are used for smooth human-readable labeling of clusters. |
Keywords: |
Cluster labeling, Linked Data, Clustering, Semantic web |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
ELECTRONIC RECORDS MANAGEMENT IN INSTITUTIONS OF HIGHER LEARNING IN LIBYA:
ADOPTION OF DIRKS MODEL |
Author: |
YOUSEF I. ABUZAWAYDA, ZAWIYAH MOHD YUSOF, MOHD AB AZIZ |
Abstract: |
Institutions of Higher Learning (IHL) have now produced and created most of
their documents and records electronically. These records need to be managed
efficiently and effectively according to the widely accepted standards.
Well-managed records could give untold benefits to organization, hence, help
organizations remain competitive. The management of electronic records ought to
be guided by a policy, which serve as a roadmap in implementing the initiative.
A study is conducted in order to determine whether Institutions of Higher
Learning in Libya have guideline to manage electronic records. It is also to
identify whether there are problems in managing electronic records, and to
identify what problems are encountered. This study adopts survey as its method
employing a questionnaire as the technique to collect data. |
Keywords: |
Electronic Records, Records Management, Libyan Institutions Of Higher Learning,
Information Policy. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
E-LEARNING SYSTEM IN THE UNIVERSITY OF JORDAN: PROBLEM SOLVING CASE STUDY |
Author: |
WALA'A QUTECHATE, TAMARA ALMARABEH, REEM ALFAYEZ |
Abstract: |
No one can deny the role of Information and communication technology (ICT) in
our lives, and integrating it with the various sectors. The education sector is
not immune of these sectors. The learning process is a complex process where
student’s motivation, teacher, learning material and several other aspects
interact with each other. This paper investigates two areas which are learner
motivation toward e-learning and the learning preferences of students by using
Visual, Aural, and Kinesthetic (VAK) Model, measuring students satisfaction and
motivation, the difficulty they encountered, and time consumed. Good response
toward e-learning, where e-learning students scores were the same with
traditional learning even higher in the kinesthetic e-learning approach with
increasing satisfaction ,reduction of the difficulty, and excellent results in
time reduction. Students exhibit a high level of preference for kinesthetic
learning even they have a shallow background about dealing with computer
systems. |
Keywords: |
E-Learning, Learning Style Model, VAK Model. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
DETAILED LITERATURE SURVEY ON DIFFERENT METHODOLOGIES OF UNIT COMMITMENT |
Author: |
N.MALLA REDDY, N.V.RAMANA, K.RAMESH REDDY |
Abstract: |
This Paper explores the existing methodologies for the solution of unit
commitment problem of large size power system. The survey covers exhaustive
review of literature available over the past five decades published by the
Pioneers, Experts & Researchers working in this field. It includes publications
in standard international journals like IEEE, IEE, ELSEVIER etc, and proceedings
of prominent international conferences. The various methods employed to solve
the unit commitment problem can be broadly grouped as Conventional and
Intelligent. The conventional methodologies include the well known techniques
like Priority List, Dynamic Programming, Lagrange Relaxation, Branch-and-Bound ,
Integer and Mixed- Integer methods. Intelligent methodologies include the
recently developed and popular methods like Genetic Algorithm, simulated
annealing, ant colony, Particle swarm optimization, Fuzzy Logic and Neural
Networks. This paper summarizes salient features, merits and demerits of, as
well as contributions made by research scholars and experts on each of the unit
commitment method based on detailed review and critical examination of various
methods, The contents of this paper provide ready-to-refer and ready to use
information for the researchers working in the field of unit commitment. |
Keywords: |
Priority List, Dynamic Programming, Lagrange Relaxation, Integer And Mixed
Integer Methods, Genetic Algorithm, Particle Swarm Optimization, Ant Colony,
Simulated Annealing |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN EVOLUTIONARY PROGRAMMING APPROACH TO OPTIMIZE SYNCHRONOUS GENERATOR INPUT
POWER USING AREA-BASED TRANSIENT STABILITY INDEXES |
Author: |
H. HASHIM, I. Z. ABIDIN, I. MUSIRIN, KEEM SIAH YAP, Y. R. OMAR, M. R. ZULKEPALI |
Abstract: |
Stable operation of a power system requires a continuous match between energy
input to the prime movers and the electrical load of the system. Any change of
load demand must be accompanied by a corresponding change in terms of the amount
of energy prime mover given to the turbine system. When a power system is
subjected to significant transient disturbances, the machine may lose
synchronism to the system. If this were to happen, the machine’s rotor angle
will undergo wide variations, voltage and frequency may deviate widely from
normal values. This paper presents the applications of Area-Based Transient
Stability Indexes (TSI): COI Angle and COI Speed as a new technique to evaluate
the impact of disturbances to power system stability and to optimize the
mechanical input power of synchronous generators in order to prevent transient
instability in a power system using Evolutionary Programming (EP) approach.
Transient analysis is carried out using PSSE software on IEEE 118 Bus Test
System at system conditions with various types of loads, static and dynamic. The
optimization of the input power to generator is carried out using transient
stability indexes as fitness functions for a three area IEEE 30 Bus and IEEE 118
Bus Test Systems respectively. Results obtained from the experiment revealed
that the EP approach is able to give an optimal solution. |
Keywords: |
Area-Based Transient Stability Indexes: COI Angle and COI Speed, Optimization,
Evolutionary Programming |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
ADAPTIVE DYNAMIC RESOURCE SYNCHRONIZATION DISTRIBUTED MUTUAL EXCLUSION ALGORITHM
(ADRS) |
Author: |
MARIAM ITRIQ, WAFA DBABAT, AHMAD SHARIEH |
Abstract: |
Existing mutual exclusion algorithms for distributed systems are not well
suitable for mobile system, because of several limitations: small memory, a
relatively slow processor, low power batteries, and communicate over low
bandwidth wireless communication links. In this paper, we adapted the DRS mutual
exclusion algorithm applying it on the infrastructure machines that communicate
directly with the mobile hosts, called Mobile Support Stations (MSS) with some
modifications. As DRS algorithm, the adapted version ADRS tends to minimize the
number of messages needed to be transmitted in the system, by reducing the
number of sites involved in the mutual exclusion decision, and reducing the
amount of storage needed at different sites of the system. |
Keywords: |
Distributed systems, Permission, Synchronization, Mutual exclusion, MSS |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NOVEL CHEMICAL REACTION OPTIMIZATION ALGORITHM FOR HIGHER ORDER NEURAL NETWORK
TRAINING |
Author: |
K. K. SAHU, SIBARAMA PANIGRAHI, H. S. BEHERA |
Abstract: |
In this paper, an application of a novel chemical reaction optimization (CRO)
algorithm for training higher order neural networks (HONNs), especially the
Pi-Sigma Network (PSN) has been presented. In contrast to basic CRO algorithms,
the proposed CRO algorithm used to train HONN possesses two modifications. The
reactant size (population size) remains fixed throughout all the iteration,
which makes it easier to implement; and adaptive chemical reactions followed by
a strictly greedy reversible reaction have been used which assist to reach the
global minima in less number of iterations. The performance of proposed
algorithm for HONN training is evaluated through a well-known neural network
training benchmark i.e. to classify the parity-p problems. The results obtained
from the proposed algorithm to train HONN have been compared with results from
the following algorithms: basic CRO algorithm and the two most popular variants
of differential evolution algorithm (DE/rand/1/bin and DE/best/1/bin). It is
observed that the application of the proposed CRO algorithm to HONN training (CRO-HONNT)
performs statistically better than that of other algorithms. |
Keywords: |
Artificial Neural Network, Higher Order Neural Network, Pi-Sigma Neural Network,
Chemical Reaction Optimization, Differential Evolution |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN ONTOLOGY-BASED INTRUSION DETECTION FOR VEHICULAR AD HOC NETWORKS |
Author: |
M.ERRITALI, B. EL OUAHIDI, B.HSSINA, B. BOUIKHALENE, A. MERBOUHA |
Abstract: |
A vehicular ad hoc network (vanet) is an independent system of vehicles
connected by wireless connection to form a network. This type of network is used
to reduce the number of accidents via the exchange of alert messages between the
neighborhood vehicles. These alert messages constitute an ideal target for
attacks that aim to prevent them to reach their destinations, and thereby
endangering human lives.
In vanet ,intrusion detection has become an indispensable defense line in face
of vulnerabilities such as high mobility, shared wireless medium and the absence
of centralized security services offered by dedicated equipment , where
authentication and access control mechanisms routinely prove inadequate in
preventing new and increasingly numerous and disastrous attacks .However, when
we think to deploy an ids the major problem rest the characterization of an
intrusion. The use of a semantic resource such as ontology could be an effective
way to enrich data about intrusions to respond more specifically to complex
questions about the definition, nature, characteristic of the intrusion.
In this paper, an ontology for vanets Security has been modeled and specified
using Web Ontology Language (OWL). The aim is to provide a complete
classification which takes into account the impact of attacks and intrusions on
the offered service, in terms of functionality implemented in routing protocols
and other applications. |
Keywords: |
Ontology, Intrusion detection, OWL, Vanets, security. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
ADAPTIVE SENSING RANGE FOR CO-OPERATIVE SENSING COGNITIVE RADIO. |
Author: |
AARTI MANDAL, A. KARTHIKEYAN, T.SHANKAR, V.SRIVIDHYA |
Abstract: |
Cognitive radio is emerging as an effective solution against the spectrum
scarcity issue. The main processes which make up the cognitive radio working are
the spectrum sensing, learning and adapting procedures. Co-operative sensing is
a method in which the nodes share the spectrum sensed data. In ad-hoc network
the decentralized nature makes it quite difficult to gather sensing data with
constraints like energy consumption, shadowing, hidden terminal and fading
effect. In cognitive radio ad-hoc network these effects creates issues in
spectrum allocation and management. In this paper, the hidden terminal issue is
considered with the solution of adaptive sensing range in a static network. The
nodes in the ad-hoc network have sensing and transmitting ranges. The sensing
helps to gain knowledge about the channels which are occupied by overhearing the
RTS/CTS or ACK transmission or reception by the nearby nodes. The sensing range
of a node is always greater than the transmitting range of a terminal. The
sensing range if varied as per the transmission to the receiver then hidden node
issue can be dealt to a great level. With the help Cognitive radio Network
Simulator (CR-NS) adaptive sensing is simulated for an ad-hoc network and also
its effect on throughput, packet loss, normalized routing load, end-to-end
packet delay is also compared with respected to a fixed sensing environment. |
Keywords: |
Cognitive Radio, Hidden Node, Co-Operative Sensing, Cognitive Radio Network
Simulator (CR-NS) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
SSPC ALGORITHM BASED ON THREE DIFFERENT METHODS FOR ONLINE SKYPE TRAFFIC
CLASSIFICATION |
Author: |
HAMZA AWAD HAMZA IBRAHIM, SULAIMAN MOHD NOR, IZZELDIN IBRAHIM
MOHAMED ABDELAZIZ, ALI AHMED ALFAKI ABDALLA |
Abstract: |
Classification of real time applications such as Skype and online games has
gained more attention in the last few years. Most of the current Skype
classification methods were only valid for offline classification. Each of the
three common classification methods (port, payload, statistics based) has some
limitations. To increase the quality of Internet traffic classifier, this paper
combined the three methods to products a new classification algorithm (SSPC). In
the proposed algorithm, each traffic flow was classified parallel three times by
one of the three method classifiers. Based on some priority rules, SSPC makes
classification decision for each flow. The SSPC algorithm was used to classify
Skype traffic in two stages offline and online. The results of both cases shown,
SSPC is the higher accuracy when compared with other classifiers. Also, the
results indicate that the SSPC algorithm was suitable for online classification
decision which is taken within capturing time. |
Keywords: |
Internet Traffic classification, Skype classification, Online classification,
Machine Learning, classification Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
COMPARING E-COMMERCE CONTENT MANAGEMENT SYSTEMS |
Author: |
AMAL A. ALRASHEED, SAMIR D. EL-MASRI, |
Abstract: |
Content Management Systems (CMS) are popular ways for e-commerce to set up
websites as they provide easy editing of website content. Popular generic CMSs
are of a race to provide the best solution for e-commerce. At the same time,
some customized CMSs for e-commerce are evolved. This paper compares and
evaluates three open source CMSs solutions for e-commerce: VirtueMart from
Joomla!, Ubercart from Drupal, and Magento. We compare these products according
to many aspects: hosting and installation, performance, support/community,
content management, add-on modules, and functional features. The aim of the
paper is to find the best CMS solution for e-commerce which encompasses the best
of both CMS and store management. Finally, we propose some improvements to these
products. |
Keywords: |
Content Management System (CMS), E-commerce , Plug-in, Add-on module, Features |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMAGE COMPRESSION USING WAVELET TRANSFORM AND GRAPH CUT ALGORITHM |
Author: |
VASANTHI KUMARI P, K THANUSHKODI |
Abstract: |
The need for an efficient technique for compression of images is ever increasing
because, the raw images need large amounts of disk space seems to be a big
disadvantage during transmission and storage. Even though, there are so many
compression techniques already present, a better technique which is faster,
memory efficient and simple surely suits the requirements of the user. This
paper presents image compression technique using graph cut and wavelet
transform. At first, block partitioning process is carried out which is
quantized and subsequently, graph cut algorithm is applied to select the
dissimilar blocks. DPCM (Differential pulse-code modulation) is consequently
applied for increasing the compressibility of an image. Finally, the transformed
image is given to Huffman-encoder that is designed by merging the lowest
probable symbols in such a way that, the images get compressed. The proposed
image compression is implemented using MATLAB and the performance of the
proposed technique is compared with the wavelet-based previous techniques and
DCT method. From the results, it can be inferred that our proposed technique
have outperformed the existing techniques. |
Keywords: |
Image compression, Discrete Wavelet Transform, Graph Cut algorithm, Differential
Pulse-Code Modulation (DPCM), Huffman-coding. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
PATTERN DISCOVERY AND ANALYSIS FROM SEMI-STRUCTURED DATA: THE AUTOMATIC
REGENERATION OF PATTERNS |
Author: |
ASMÂA ELOUERKHAOUI, DRISS ABOUTAJDINE |
Abstract: |
Web-mining is the application of data mining techniques to extract knowledge
from the world wide web, including web documents, hyper-links between documents,
etc. Content-mining is the second step in Web data mining which mines web pages
text to determine the relevance of the content to the search query. In 2008, we
have proposed WIEBMat (Wrapper Induction Environment Based on Matrices) a new
web content mining method[1]. This paper aims to optimize pattern discovery of
WIEBMat. Effectively, the process of discovering frequent patterns from
semi-structured data is one of the most important weaknesses in every web-mining
technique |
Keywords: |
Web-Mining, Semi-Structured Data, Pattern Discovery. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZATION METHOD OF PILOT ALLOCATION FOR COOPERATIVE AMPLIFY-AND-FORWARD OFDM
SYSTEM |
Author: |
SUOPING LI, LITING YANG, JIN LI |
Abstract: |
Pilot-assisted channel estimation has been studied only in common cooperative AF
(Amplify-and-Forward) OFDM which has no feedback mechanism. In this paper, for
cooperative AF-OFDM system, we propose a feedback technique in which the pilot
allocation mechanism is adapted to the cooperative mobile channel. Then we show
how uniform pilots may no longer be optimal compared with our pilots. After
deducing the instantaneous system SNR is the function of the pilot allocation,
we optimize the pilot locations using optimization method at the destination
node. We examine the feedback overhead that is associated with our method and
make comparisons with the conventional uniform pilot allocation. To improve
system capacity, we suggest reduce the feedback information using K-means
clustering algorithm. Simulation results confirmed that the proposed
optimization method has an ideal performance gains and the algorithm of feedback
reduction can reduce the feedback information under the premise of ideal
performance. |
Keywords: |
AF-OFDM system, Feedback mechanism, Optimization of pilot allocation, Reduce
feedback. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
EXTENDING TEMPORALLY ER MODEL FOR DESIGNING TEMPORAL DATABASES WITH MULTIPLE
TIME GRANULARITIES |
Author: |
CHUNLONG YAO, FENGLONG FAN, LAN SHEN, XU LI |
Abstract: |
Entity-Relation (ER) model may be used for different but related purposes, e.g.
to model real world for analysis, to describe a database scheme of a computer
system for design. In recent years, with the increasing needs of time-related
application, how to extend the ER model to enable it to properly capture
time-varying information has been active area of research. By extending
temporally traditional ER models, we propose a new temporal ER model, which is
called ETER model. For the ETER model, we introduce two new constructs including
variety granularity and time cardinality. We discuss how to specify time-varying
attributes and relationships using these constructs, and how to specify TFDs
constraints. Therefore, the ETER model and temporal normalization theory can be
integrated to design temporal databases with multiple time granularities. |
Keywords: |
ER Model, temporal database, database design, temporal functional dependency (TFD) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
APD GAIN EFFECT ON SAC-OCDMA SYSTEM USING MODIFIED-AND DETECTION TECHNIQUE |
Author: |
HAMZA M. R. AL-KHAFAJI, S. A. ALJUNID, ANGELA AMPHAWAN, HILAL A. FADHIL, ANUAR
M. SAFAR |
Abstract: |
This paper investigates the avalanche photodiode (APD) gain effect on
spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA)
system using a modified-AND subtraction detection in comparison to the
conventional AND detection scheme. Analytical results are presented to
investigate the APD gain impact on the bit-error rate (BER) performance. In
addition, we confirm the influence of the APD over the
positive-intrinsic-negative (PIN) photodiode on the system performance using
data transmission simulations. |
Keywords: |
SAC-OCDMA, modified-AND subtraction detection, phase-induced intensity noise (PIIN),
APD, PIN photodiode |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
CLUSTER ANALYSIS APPLICATION ON PERMEABILITY’S DIRECTION IN NUMERICAL SIMULATION |
Author: |
YUAN Li, YAO Junbo, TAN Junxiang, MA Yujie, LI Guorong, YI Xiangyi, LU Yuan |
Abstract: |
They are permeability scalar data which doesn’t has direction in geologic
modeling due to lack of data. However, we can get the value and volume
coordinate data from the minimum nine-square cube in the gridding model. As a
secure and accurate classification methodology in multivariate statistics
analysis, the ward-method cluster analyzing can classify the permeability data
by clustering slow-changed data in some directions. Then we decompose the
permeability into x, y, z directions by three-dimensional space geometric
operation. It has an significant impact on improve the numerical simulation
accuracy after the processing transformation of permeability data, which provide
the basis for the development of the oil field. |
Keywords: |
Permeability: Direction, Gridding Model, Cluster Analysis, Direction
Decomposition |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF ROUTING PROTOCOLS IN LARGE-SCALE MOBILE AD HOC
NETWORKS |
Author: |
JAMALI ABDELLAH, NAJA NAJIB, EL OUADGHIRI DRISS, BENAINI REDOUANE, ZYANE
ABDELLAH |
Abstract: |
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes
communicating with each other using multi-hop wireless links without any
existing network infrastructure or centralized administration. Efficient routing
protocols can provide significant benefits to mobile ad hoc networks, in terms
of both performance and reliability. Many routing protocols for such networks
have been proposed so far. Amongst the most popular ones are Dynamic Source
Routing (DSR), Ad hoc On-demand Distance Vector (AODV), Destination-Sequence
Distance-Vector (DSDV), Temporally-Ordered Routing Algorithm (TORA, ) and
Location-Aided Routing (LAR). Research efforts have not focused in evaluating
the performance of these protocols when applied to large-scale wireless
networks. In this paper we present our observations regarding the behavior of
the above protocols, in large-scale mobile ad hoc networks (MANETs). We consider
wireless mobile terminals spread over a large geographical area, and we perform
extensive simulations, using NS-2 simulator. |
Keywords: |
Mobile Ad-hoc Network (MANET), Routing Protocols AODV (Ad-hoc on demand distance
vector), DSDV (Destination Sequenced distance vector), DSR (Dynamic Source
Routing) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
MINING STUDENTS’ ACADEMIC PERFORMANCE |
Author: |
AZWA ABDUL AZIZ, NUR HAFIEZA ISMAIL, FADHILAH AHMAD |
Abstract: |
Data Mining techniques are widely used in educational field to find new hidden
patterns from student’s data. The hidden patterns that are discovered can be
used to understand the problem arise in the educational field. This paper
surveys the three elements needed to make prediction on Students’ Academic
Performances which are parameters, methods and tools. This paper also proposes a
framework for predicting the performance of first year bachelor students in
computer science course. Naïve Bayes Classifier is used to extract patterns
using the Data Mining Weka tool. The framework can be used as a basis for the
system implementation and prediction of Students’ Academic Performance in Higher
Learning Institutions. |
Keywords: |
Data Mining, Educational Data Mining, Prediction, Students’ Academic Performance |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE ROLE OF BUILT ENVIRONMENT IN DEVELOPING SUSTAINABLE HIGH TECH PARKS:
ESTABLISHMENT OF PHYSICAL DEVELOPMENT AND KNOWLEDGE COMMUNITY NEEDS |
Author: |
MOHD HISYAM RASIDI, OLORUNTOBA KAYODE |
Abstract: |
This paper emphasize the role of built environment in developing sustainable
high tech park, the needs of knowledge community and the relationship between
the physical development of high tech parks. In addition, it's describes the
comparative physical development between Cyberjaya, Malaysia and Tsukuba Science
City, Japan. Thus, this study is engender towards identify the significant role
of high tech parks in terms of the build environment, physical planning and
design strategy in knowledge community planning. The analysis of the case study
through physical elements and community participation in Cyberjaya, Malaysia and
Tsukuba Science City, Japan indicates how people perceive their living and
working environment. This study demonstrates and posits that sustainable
environment can be achieve through effective physical planning and design
approach in high tech park
development. |
Keywords: |
Built Environment, Knowledge Community, High Tech Parks, Sustainable Planning |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
|
|