|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2017 | Vol. 95 No.13 |
Title: |
COMPARISON OF JAMMING EXCISION METHODS FOR DIRECT SEQUENCE/SPREAD SPECTRUM
(DS/SS) MODULATED SIGNAL |
Author: |
GIAN CARLO CARDARILLI, LUCA DI NUNZIO, ROCCO FAZZOLARI, AMIRHOSSEIN
FEREIDOUNTABAR, FILIPPO GIULIANI, MARCO RE, LORENZO SIMONE |
Abstract: |
Direct Sequence/Spread-Spectrum (DSSS) signals are characterized by a wide
bandwidth and a low-power spectral density. These characteristics make them very
robust with respect to the jamming.
The Jamming represents one of the main concerns for secure communication and
communication in a crowded spectrum. When the jamming to signal power ratio is
greater than the Process Gain, even the use of DSSS signals requires the
introduction of mitigation techniques.
Common anti-jamming systems are based on adaptive filters. However, this
solution presents several disadvantages, as the inefficiency to mitigate
multi-tone jamming and nonstationary jamming.
For these reasons, great interest is toward the development of anti-jamming
systems based on different techniques as the Wavelet Transform and the Filters
bank.
This paper has two objectives. The first one regards the evaluation of the
parameter choice on the jamming excision performance. The second objective is to
compare the performance obtainable by the two above techniques.
Experiments for parameter evaluation and performance comparison are carried out
using MATLAB simulations. These simulations were performed using the most common
jamming types. |
Keywords: |
Jamming Excision; Wavelet Packet Decomposition; DSSS; DWT; Polyphase Filters
Bank |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
IMPROVING DIAGNOSIS OF DIABETES MELLITUS USING COMBINATION OF PREPROCESSING
TECHNIQUES |
Author: |
RAZIEH ASGARNEZHAD, MARYAM SHEKOFTEH, FARSAD ZAMANI BOROUJENI |
Abstract: |
Diabetes mellitus is one of the most common diseases among people of all age
groups, affecting children, adolescents and young adults. There is an increasing
interest in using machine learning techniques to diagnose these chronic
diseases. However, the poor quality of most medical data sets inhibits
construction of efficient models for prediction of diabetes mellitus. Without
efficient preprocessing methods, dealing with these kinds of data sets leads to
unreliable results. This paper presents an efficient preprocessing technique
including a combination of missing value replacement and attribute subset
selection methods on a well-known diabetes mellitus data set. The results show
that the proposed technique can improve the performance of applied classifier
and outperforms the traditional methods in terms of accuracy and precision in
diabetes mellitus prediction. |
Keywords: |
Data Mining, Preprocessing Techniques, Diabetes mellitus. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
AUTHENTICATION GROUPS WITH PRIVACY-PROTECTION OF MACHINE-TO- MACHINE IN LTE/LTE-A
NETWORKS |
Author: |
HAQI KHALID, KWEH YEAH LUN, MOHAMED OTHMAN, IDAWATY AHMAD |
Abstract: |
Machine-type Communication (MTC) is a form of data communication which involves
one or more entities that do not necessarily need human interaction, which has
become the hotspot in industry area. Furthermore, Machine-Type Communication (MTC)
has shown the advantages, including better coverage and lower network deployment
cost, which makes it become the hotspot in industry area. However, the current
cellular network is designed for human-to-human communication (H2H), and less
optimal for machine-to-machine, machine-to- human or human-to-machine
applications. In addition, current cellular network is less optimal for MTC
applications, and now facing some urgent issues, e.g. congestion and overload
caused by the access of masses of MTC devices. This paper shows the techniques
that used in MTC for LTE/LTE-A networks to enhance the authentication protocols
with reduce signaling overhead and computational cost. Furthermore, this work
discussed the problems that causing signaling overload in the core network
especially, when a group of MTCD try to get authenticate to the system at the
same time. |
Keywords: |
Machine-Type-Communication, Authentication Groups, Privacy-Preserving, Signaling
Congestion, LTE/LTE-Advanced Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
LOCAL LINE BINARY PATTERN AND FUZZY K-NN FOR PALM VEIN RECOGNITION |
Author: |
KHADIJAH FAHMI HAYATI HOLLE, JAYANTI YUSMAH SARI, YUWANDA PURNAMASARI PASRUN |
Abstract: |
Recently, palm vein recognition has been studied to overcome the problem in
terms of convenience and performance of conventional systems in biometrics
technologies such as fingerprint, palm print, face, and iris recognitions.
However, palm vein images that are used in palm vein recognition systems are not
always clear but sometimes can show irregular shadings and highly saturated
regions that can slow the processing time. To overcome this problem, we propose
palm vein recognition system using Local Line Binary Pattern (LLBP) method that
was reliable against irregular shadings and highly saturated regions. LLBP is a
texture descriptor based on the gray level comparison of a neighborhood of
pixels. Proposed method have been conducted in three major steps: preprocessing
that includes Region of Interest (ROI) detection, image resizing, noise removal
and image enhancement, feature extraction using LLBP method, and matching using
Fuzzy k-NN classifier. We use CASIA Multi-Spectral Image Database as dataset to
examine proposed method. Experimental results show that the proposed method
using LLBP has a good performance with 93.2% recognition accuracy. |
Keywords: |
Fuzzy K-NN, LLBP, Local Line Binary Pattern, palm vein |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
WIRELESS LOCAL AREA NETWORK: A COMPREHENSIVE REVIEW OF ATTACKS AND METRICS |
Author: |
SAMIRA SARVARI, NOR FAZLIDA MOHD SANI, ZURINA MOHD HANAPI, MOHD TAUFIK ABDULLAH |
Abstract: |
Wireless Local Area Networks (WLAN) was once a single network solution. Yet now,
it contributes to all part of business and computer industry. Thus, WLAN
security measures need special attention. In order to identify WLAN networks’
vulnerability, some intrusion detection systems, architecture, and potential
threats in the literature of this area is investigated. This approach is to
categorize present wireless intrusion detection system (IDS) and detection
technique. Several advantageous and drawbacks are presented and an in-depth
critical literature review is presented. Different WLAN attack types and review
some metrics in relation to operability and performance of IDS is summarized and
extensively argued which can be conducted through integrating both practitioners
and scholars. The future research areas are also discussed. |
Keywords: |
Wireless Local Area Networks (WLAN), Intrusion Detection System (IDS), Network
topology, Ad-hoc Network, Network attack |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
GENE BASED MULTIVARIATE BIOMETRIC USER ACCESS CONTROL AND AUTHENTICATION FOR
SOCIAL NETWORKS COMMUNICATION |
Author: |
JAYANTHI SIVASUBRAMANIAM, Dr. C. CHANDRASEKAR |
Abstract: |
Using multimodal biometrics for effective management of user authentication in
online social networks (OSNs) is currently of practical interest. Considerable
efforts is said to have taken in this field. However, multi-modal biometrics
user authentication provides additional information to enhance the secured and
reliable user communication compared to that of traditional cryptographic key
authentication in social network. In this work, biometric user authentication
scheme with multi-modalities (i.e., types of biometric data) for secured and
reliable social network communication, called Multivariate Biometric User Access
Control and Authentication (MBUAC-A) scheme is presented. User biometric feature
template is extracted from corresponding human individuals and stored in spatial
vectors. Gene encoding is applied on user biometric feature template to form an
access control strategy. User biometric keys are generated for corresponding
gene encoded user biometric feature templates. Authentication of user access is
done based on the user biometric keys. Finally, the authenticity of user access
is checked and ensured by gene decoding of corresponding user biometric keys.
The experimental evaluation of proposal work is conducted with parameters such
capacity of biometric feature template, user access control time, number of
users, gene encode/decode latency, and access control accuracy. |
Keywords: |
Multimodal Biometrics, Online Social Networks, Multivariate, Access Control,
Authentication, Gene Encoding/Decoding |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
A COMPARISON OF PID AND LQR CONTROLLERS FOR POSITION TRACKING AND VIBRATION
SUPPRESSION OF FLEXIBLE LINK MANIPULATOR |
Author: |
E. A. ALANDOLI, M.Z.A. RASHID, MARIZAN SULAIMAN |
Abstract: |
This paper presents PID controller versus LQR controller approach to suppress
the vibrations of flexible link manipulator. The PID controller is design using
Ziegler Nichols method and tuned for obtaining the best controller gains, the
LQR controller utilizes four different controller gains to control the flexible
link manipulator and suppress the vibrations. Simulation results are simulated
using MATLAB/Simulink software. The simulation results depict that vibration of
the flexible link manipulator can be suppressed and stable. LQR controller is
better that the PID controller in terms of performance and reducing the
vibrations of the flexible link manipulator as well. |
Keywords: |
Flexible Link Manipulator, PID Controller, LQR Controller, Vibrations
Suppression |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
DEVELOPING A WEB-BASED ADVISOR EXPERT SYSTEM FOR GREEN TRANSPORTATION SYSTEM |
Author: |
HASSAN M ABDELSALAM, MUHAMMAD NAZRI BORHAN, ABDALRHMAN MILAD, HAMZA
IMHIMMED,RIZA ATIQ OK RAHMAT |
Abstract: |
Considering the sustained and pervasive popularity of the private vehicle not
only in Malaysia National University (UKM) but in most of Malaysian
Universities, what makes people prefer to use a Bicycle rather than car or
public transport? What will facilitate the use the bicycle paths to the
promotion of more sustainable behavior and the achievement of the green
transportation targets? In this paper, a web-based advisory expert system for
the purpose of applying Geometric Design of bicycle paths on residential streets
is described because of their currently a weakness in the educational outcomes
and structured framework for the implementation of such strategies . Developing
an expert system can assist and advise engineers for dealing with geometric
design problems. This expert system is developed to fill the gap between the
sustainable urban design experts and people who seek to employ Geometric Design
of bicycle paths including decision makers, engineers, and students. The system
has more than six main functions including classifying, bicycle paths width,
Separation from road way, Horizontal alignment, sight distance, and grades
design .Verifying, validating processes, and comparing the system with similar
works have shown that the system is consistent and acceptable for practical
uses. In order to build the expert system, examining sources related to bicycle
sharing path studies as well as interviewing with domain experts have been
carried out. The system includes rules and images for different types of
measures finally, some recommendations for improving the system are presented. |
Keywords: |
Expert System; Green Transportation System |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
MODIFIED VIRTUAL FORCE METHOD FOR MOBILE ROBOT NAVIGATION |
Author: |
MENDILI MANEL, BOUANI FAOUZI |
Abstract: |
This paper deals with the problem of target tracking of two wheeled mobile
robots with obstacle avoidance. The model predictive control approach and the
virtual force method are used to compute the control sequence applied to the
mobile robot. The force is proportional with the distance between the robot and
the obstacle. Simulations are performed and their results are provided to show
the effectiveness of the proposed method. This paper improves the formulae of
force computing in the virtual force method to avoid the obstacles. |
Keywords: |
Two Wheeled Mobile Robot, Predictive Control, Obstacle Avoidance, Virtual Force |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
A PROPOSED DYNAMIC ALGORITHM FOR ASSOCIATION RULES MINING IN BIG DATA |
Author: |
ANAS HANI AL-DAHER, MOHAMMAD SHKOUKANI |
Abstract: |
Because of the explosive growth of data that we are suffocating in, while we are
starving for knowledge, mining data and information from substantial databases
has been perceived as a key research topic. So, Due to the huge size of data
that exists in the databases and warehouses and because these data are big,
dynamic and change frequently it is difficult and expensive to do mining for
frequent patterns and association rule from scratch. In light of such an
interest, this paper proposes a Dynamic Algorithm for Association Rules Mining
in Big Data that is capable of finding frequent item-sets dynamically and
generating association rules from the item-sets by using accumulated knowledge
stored in a database table, this table will be modified frequently when the
system runs every time and the new value of the table will be the result of
processing new inserted data added to the results of previously processed data.
The proposed solution is implemented using C#.net and SQL server. The results
compared with the Apriori algorithm. It was conclude that Apriori algorithm
showed better results than the proposed algorithm in the initial runs, on the
other hand the proposed dynamic algorithm provided results near to Apriori
algorithm on frequent runs that use small number of transactions but the
proposed dynamic algorithm took less processing time than Apriori algorithm by
63.95% on the frequent runs that use big number of transactions. |
Keywords: |
Big data, Apriori algorithm, Association rules, Data mining |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
FPGA IMPLEMENTATION OF HIGH SPEED MEDICAL IMAGE SEGMENTATION USING GENETIC
ALGORITHM |
Author: |
Mrs. MANNE PRAVEENA, Dr. NARAYANAM BALAJI, Dr. CHALLA DHANUNJAYA NAIDU |
Abstract: |
Nowadays, image analysis plays a key role in processing of the medical images
such as retinal image, cardiac image and brain MRI images in bio-medical field.
Medical Image Segmentation (MIS) is a process of obtaining the different
intensity levels of the image and extracting the features for analysis. Some of
the existing algorithms are capable of extracting a section of image but not
able to find an optimum threshold for image segmentation. So, a novel image
segmentation algorithm with different thresholds is based on Genetic Algorithm
(GA) on Field Programmable Gate Array (FPGA) has been introduced in this paper.
Here the optimum threshold values are used to segment the same image as well as
similar kind of images, which is obtained from same kind of biomedical imaging
instruments. The proposed FPGA architecture for image segmentation is time as
well as power efficient algorithm. |
Keywords: |
Segmentation process, Genetic Algorithm, Field Programmable Gate Array. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
HYBRID CLASSIFICATION APPROACH HDLMM FOR LEARNING DISABILITY PREDICTION IN
SCHOOL GOING CHILDREN USING DATA MINING TECHNIQUE |
Author: |
MARGARET MARY. T, HANUMANTHAPPA. M |
Abstract: |
Learning Disability is a disorder of neurological condition which causes
deficiency in child’s brain activities such as reading, speaking and many other
tasks. According to the World Health Organization (WHO), 15% of the children get
affected by the learning disability. Efficient prediction and accurate
classification is the crucial task for researchers for early detection of
learning disability. In this work, our main aim to develop a model for learning
disability prediction and classification with the help of soft computing
technique. To improve the performance of the prediction and classification we
propose a hybrid approach for feature reduction and classification. Proposed
approach is divided into three main stages: (i) data pre-processing (ii) feature
selection and reduction and (iii) Classification. In this approach,
pre-processing, feature selection and reduction is carried out by measuring of
confidence with adaptive genetic algorithm. Prediction and classification is
carried out by using Deep Learner Neural network and Markov Model. Genetic
algorithm is used for data preprocessing to achieve the feature reduction and
confidence measurement. The system is implemented using MatLab 2013b. Result
analysis shows that the proposed approach is capable to predict the learning
disability effectively. |
Keywords: |
Learning Disability, Missing Value, Genetic Algorithm, Markov Model and Deep
Learner, Hybrid Classification |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
MODEL OF A BLANK FORM FOR COMPUTER LABORATORY WORK ON RESEARCH OF THE SPEED
SELECTOR |
Author: |
NURILA SAIDULLAYEVA, ROZA SPABEKOVA, GAUKHAR OMASHOVA, KENZHAN KABYLBEKOV,
NURLIBEK TAGAYEV, ALIYA BITEMIROVA, MERUYERT AIMAMBETOVNA BERDIYEVA |
Abstract: |
This paper presents the model of a black form for the organization of computer
laboratory work on studying the speed selector that provides short theoretical
data, tasks with the subsequent computer check, ambiguous tasks, research and
creative assignments. Students may not complete them all, and the teacher may
combine them or offer other similar tasks taking into account the ability of
each student. This model was tested by pupils of Shymkent schools: Nazarbayev
Intellectual School of Physics and Mathematics, the regional school "Daryn" for
gifted children, M. Auezov Gymnasium-School in Arys and by first-year students
enrolled in the specialty "Physics" during laboratory classes. According to the
questionnaires of students, teachers and parents, almost all the respondents
noted the effectiveness of teaching: such lessons are held with great interest
of students and increased motivation for learning. This model helps to realize
an individual approach to each student as well as promotes the development of
experimental skills, research and creative abilities, critical thinking skills
and adaptive competence, deep mastering of the topic, the effective use of
information and computer technology. At the same time, such assignments as
solving ambiguous tasks and tasks with missing data contribute to the
development of an informal approach to the problem of theoretical competence. |
Keywords: |
Blank Form Model, Computer Laboratory Work, Mass Spectrometer, Speed Selector,
Research And Creative Tasks, Electric Field Intensity, Magnetic Field Induction,
Electron, Proton, Helium And Uranium Kernels. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
KALMAN STABILIZATION UNDER CHANNEL DIVERSITY IN MIMO-OFDM SYSTEM |
Author: |
G. RAJENDER, Dr. T. ANILKUMAR, Dr. K. SRINIVASA RAO |
Abstract: |
Signal estimation and its performance has always remained a challenge for
wireless communication society. New methods to consider channel diversity and
spectrum usage were proposed in past. This paper present a new approach to
interference controlling, With a proposal for control of resources, to achieve
the goal of increasing performance in the allocation system, using the
interference conditions. Approach to control overlap in the framework of
coordination and indiscriminate accessing for multiple users communication is
proposed. The proposed approach develops a correlation method for resource
allocation in on a multi path interference condition for faded channel condition
based on the space frequency and non-stationary domain estimation. |
Keywords: |
Kalman stabilization, MIMO-OFDM, channel diversity. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
APPLICATION OF FUZZY LOGIC FOR EVALUATION OF RESILIENT MODULUS PERFORMANCE OF
STONE MASTIC ASPHALT |
Author: |
HAMID SHIRMOHAMMADI , FARHAD HADADI |
Abstract: |
Stone Mastic Asphalt (SMA) is a popular used asphalt on the main roads under
heavy traffics. Due to its highly permanent age, excellent performance
characteristics, road authorities, especially in European countries have
selected it in arterial roads for pavements. But, some unexpected conditions
might make the SMA improper, mainly because of the lack of enough evaluations.
Another thing that should be examined is about the uncertain assessments of SMA
performance. Uncertainty in engineering problems will cause incorrect
evaluation. In recent years, new methods for assessing and analyzing were
applied which include computational and artificial intelligence systems such as
Artificial Neural Networks (ANN) and Fuzzy Logic (FL) in various engineering
fields. The aim of this study focuses on the application of fuzzy logic for the
assessment of Stone Mastic Asphalt (SMA) performance characteristic which is
known as resilient module. It is evaluated under Stone Mastic Asphalt effective
characteristics that are considered as air voids, bulk density, and permeability
coefficient. In this study, standards for stone mastic asphalt have been
gathered from the German and Australian tests. In the beginning, Fuzzy logic
uses weighted average operations to enter input data, then the output will come
into assessment by a mathematical model. Finally, results indicate as air void
contents (%) increase, resilient modulus (Mpa) significantly decreases. Although
resilient modulus (Mpa) rises when bulk density (t/m 3) and permeability
coefficient (cm/s) have a rise trend. Moreover, the experimental results show
that Fuzzy logic can be applied to improve the accuracy of this evaluation. |
Keywords: |
Stone Mastic Asphalt, Performance Characteristic, Resilient Module, Fuzzy Logic |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
ENSURING AUTHENTICATION IN CLOUD COMPUTING THROUGH HOMOMORPHIC ENCRYPTION |
Author: |
MUTI-UR RASOOL, SAMAN IFTIKHAR , TANZILA SABA3, JARALLAH SALEH AL-GHAMDI |
Abstract: |
Cloud computing is a relatively new research domain and currently, emphasizes a
lot over the whole daily tasks of life. It's significant ownership and
utilization is supposed to enhance furthermore, making it an essential
ingredient for the future. In this research, data security of cloud computing is
aimed to find out exactly how these kinds of problems are resolved. The
objective of this particular research is to avoid data contact from an
unauthorized user, to recommend a sort of distributed scheme to offer safety of
the information in the cloud. We believe as per experimental results that it
could be accomplished by utilizing homomorphism encryption along RSA algorithm.
Promising results are achieved that are comparable to the state of art. |
Keywords: |
Cloud computing, Homomorphic encryption, Cloud security, Cloud computing RSA |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
A SPEECH-LANGUAGE THERAPY TOOL USING INTERACTIVE BOOK APP IN BAHASA MALAYSIA FOR
SPECIAL NEEDS CHILDREN |
Author: |
BAO XIN GANG, SUHAILA ZAINUDIN, HASHERAH MOHD IBRAHIM, LAM MENG CHUN |
Abstract: |
Interactive story books (ISB) mobile application is an app designed for children
to practice their speech, language and literacy skills. ISB has the potential to
be used to support education and learning for individuals with cognitive
disabilities. These apps include visual and auditory artifacts that demonstrate
language and can be an incredible aid for children with different kinds of
speech-language symptoms. In the context of Malaysia, the development of ISB
suffers from a lack of practical experience with children, especially for the
children who have special needs in speech-language impairments. This research
focused on Malaysian children with special needs and their parents. The ISB was
developed using the Android platform. The ISB includes three parts: ISB, speech
exercise and animated songs. There is a media player to record and play the
children’s voices as a way for them to practice their pronunciation. There is
also an embedded media player to control the videos to stop or play. The experts
with experience in speech-language therapy are gathered to answer a survey about
the evaluation on the app. After that, the parents and the children who have
special needs are also gathered to answer another survey to get the evaluation
on the app as well. These surveys are targeted for collecting the evaluation on
the prototype of ISB (content and usability). Based on the result of the survey,
the respondents (the experts, parents and children) have the qualifications to
take part in the survey, the respondents agree with the content (pictures,
music, color and quiz) of the ISB and the respondents also agree with the
usability (usefulness, ease of use, ease of learning and satisfaction) of the
ISB. Some respondents also give their ideas to improve the app. The main
contribution of this study is the developed ISB for speech-language therapy that
allows the therapy to be performed by the parents of the special needs children
at home without the help of the Speech and Language Pathologists(SLPs). Other
than that, the app is also developed by involving the experts, parents and
children with special needs to ensure that the app fulfills the requirement for
speech -language therapy. |
Keywords: |
Interactive Book App, Children, Bahasa Malaysia, Speech -language Therapy,
Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
A NEW COMPUTATION METHOD FOR POINTING ACCURACY OF CASSEGRAIN ANTENNA IN
SATELLITE COMMUNICATION |
Author: |
S.V. DEVIKA, KAILASH KARKI, SARAT K KOTAMRAJU, K. CH. SRI KAVYA, Md. ZIA UR
RAHMAN |
Abstract: |
The amount of pointing error (beam squint) plays a decisive role in maintaining
high data link for satellite communication. Antenna pointing errors cause a
decrease in gain as well as an increase in interference to neighboring
satellites. Due to the restricted beam width in high gain antennas, precise
pointing is needed. In this paper, the pointing error for 1.5m Cassegrain
antenna (ground station antenna) is calculated with respect to its structural
displacements (mainly Feed Displacement and Secondary Reflector Translation).
Also, the impact of these structural deflections on antenna parameters such as
peak gain, phase error, and sidelobe level is evaluated. The result shows that
pointing error may rise up to 1.6 degrees for one-inch displacement of
structures. Finally, 75% of gain loss is compensated by using movable feed and
Subreflector. |
Keywords: |
Antenna Pointing, Cassegrain Antenna, Feed Displacement, Lateral Defocus, Axial
Defocus, Phase Error. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
EVALUATION OF BLENDED LEARNING PROCESS OF EXPERT SYSTEM COURSE PROGRAM BY USING
CSE-UCLA MODEL BASED ON MOBILE TECHNOLOGY |
Author: |
DEWA GEDE HENDRA DIVAYANA, ANAK AGUNG ISTRI NGURAH MARHAENI, NYOMAN DANTES, IDA
BAGUS PUTU ARNYANA, WARDANI RAHAYU |
Abstract: |
The aim of this research was to know the implementation of CSE-UCLA evaluation
model based on Mobile Technology and to know the evaluation result of blended
learning implementation on expert system course program by implementing CSE-UCLA
evaluation model based on mobile technology. Research method used in this study
was development method with development design that was 4-D development model
(Define, Design, Develop, and Disseminate). Research subjects who were involved
in the initial trial were 4 people, they were: 2 informatics experts and 2
education experts, while the subject of this research on trial usage was 10
people, they were: 6 lecturers, 2 informatics experts, and 2 Educational
experts. Data analysis technique used in this research was quantitative
descriptive analysis technique. The results of this study indicated that the
implementation of CSE-UCLA evaluation model based on Mobile Technology was
realized in the design of model and evaluation application program which had
been compiled well. The effectiveness level of the implementation for blended
learning on expert system courses program at one private computer university in
Bali by using CSE-UCLA evaluation model based on Mobile Technology was 88.15%,
thus, it belong to good qualifications. |
Keywords: |
Evaluation, Blended Learning Process, CSE-UCLA, Mobile Technology. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
RECOGNITION OF HANDWRITTEN TIFINAGH CHARACTERS USING GRADIENT DIRECTION FEATURES |
Author: |
LAHCEN NIHARMINE, BENACEUR OUTTAJ, AHMED AZOUAOUI |
Abstract: |
Optical Character Recognition system goal is to convert handwritten characters
input images to an editable text. Many OCR techniques have been developed by
researchers for Latin and Arabic languages. Amazigh language still have few
works in this area. This paper emphasizes a new methodology to recognize the
Tifinagh characters using zoning gradient features with a high accuracy and
recognition rate. The new methodology is based on gradient direction as features
and artificial neural networks as a classifier. The novelty of the new proposed
system is the high accuracy and the training time which is very small compared
with other classifiers. |
Keywords: |
Tifinagh alphabet, Optical Character Recognition, Gradient Direction Features,
Artificial Neural Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
THE DECISION-MAKING MODEL REGARDING THE COMPLEXITY OF SYSTEM |
Author: |
SIHAM ABDULMALIK MOHAMMED ALMASANI, VALERY IVANOVICH FINAEV, WADEEA AHMED ABDO
QAID, ALEXANDER VLADIMIROVICH TYCHINSKY |
Abstract: |
The article is devoted to the development of methods and decision-making models
for assessing the complex system concept. The justification of the relevance of
the complex system assessment problem to solve the simulation and system control
problems. The system definition and the basic concepts of the systems
classification are given. The analysis of the existing complex systems
definitions is shown. The necessity of using the expert assessment of the system
complexity is determined. The method of the system complexity assessment
(determination) based on the experts knowledge is proposed. In this article the
application of the classification model for decision-making regarding the
complex system is shown. The example of the stock market complexity assessment
is considered. |
Keywords: |
System, Complexity, Assessment, Parameters, Simulation, Decision-making,
Experts. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
REAL-TIME NUMERICAL 0-5 COUNTING BASED ON HAND-FINGER GESTURES RECOGNITION |
Author: |
ABD ALBARY SULYMAN, ZEYAD T. SHAREF, KAMARAN HAMA ALI FARAJ3, ZAID AHMED
ALJAWARYY, FAHAD LAYTH MALALLAH |
Abstract: |
A well Pointing out by hand for originating some gestures is highly useful in
terms of human computer interactions especially when mute people desire to speak
something, here a difficulty is raised by delivering their message to the
outside world. Therefore, these people can do easily some tasks by drawing a
gesture in air using their hands in front of a computer camera which translates
these gestures to a speech or text to be understood by other people. Part of
hand gesture recognition is counting by hand. This paper proposes a new
technique describing hand gesture numerals which are from 0 to 5 that are
pointed out by people to be understood by a computer. The technique is
implemented by reading a frame as an image then extracting only hand by using
YCbCr colour space filter. Then, it is converting to black and white image.
After that, number is assigned to a gesture by counting number of flip as white
to black from left to right on an intelligently selected path to be scanned on.
The experiment was conducted using 180 random hand gesture frames taken from
random people, the result of this recognition rate is recorded as 98%. |
Keywords: |
Hand Gesture Recognition, Feature Extraction, Image Processing, Computer Vision,
Data Science. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
A TRIPARTITE PARTITE KEY ASSIGNMENT SCHEME FOR SECURITY OF CLOUD DATACLASSES |
Author: |
Mr. P.DILEEP KUMAR REDDY, Dr. R. PRAVEEN SAM, Dr. C. SHOBA BINDU |
Abstract: |
Class based cloud data security is more prominent today. Data of all the classes
may not be that frequently accessed by the owner or the users. Data of high
prioritized class is frequently accessed and the cloud technology seeks much
secured parameters to raise the security of the high prioritized data. More over
many of the old cloud technologies needed with user re-authentications when he
is simultaneously accessing high class and low class data. This paper presents a
new key generation and Class authentication scheme to run the security
specifications of the prioritized data. This paper also presents a tri-partite
authentication scheme. This scheme has found efficient in reducing the number of
user re-authentications. |
Keywords: |
Cloud Technology, Prioritized Data, Re-Authentications, Tri-Partite |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
IMPLEMENTING AN EFFICIENT EXPERT SYSTEM FOR SERVICES CENTER MANAGEMENT BY FUZZY
LOGIC CONTROLLER |
Author: |
MOHD KHANAPI ABD GHANI, MAZIN ABED MOHAMMED, MOHAMMED S. IBRAHIM, SALAMA A.
MOSTAFA, DHEYAA AHMED IBRAHIM |
Abstract: |
Expert System (ES) is considered to be the prominent reasoning practices which
are commonly employed towards various application domains. Considering expert
systems, human understanding regarding specific proficiency in accomplishing
specific tasks could be signified as facts and rules towards their knowledge
base, which finds and employs the data delivered by means of a manipulator.
Reasoning procedure has been further employed towards the specified expertise by
means of heuristic methods for formulating the elucidation. Mechanisms which
employ knowledge based approaches are considered to be more candid when compared
to other conservative approaches. Knowledge could be signified clearly towards
knowledge base, thereby capable in alteration with comparative easiness, which
commonly employs the concept of rules. Inference engines employ knowledge base
subjects for solving specific problems based on user responses by means of
interface (for instance, specify the situations needed for car assessment). This
inference unit deeds with knowledge for applying this knowledge for specific
problems. There are numerous approaches for control systems that are applied in
all the major areas in industry. In all these approaches for controlling the
systems, fuzzy has been deemed to be the best methodology, mainly because of its
increased speed and cost-efficiency. For machine regulation, fuzzy logic is
found to be vividly employed. This paper mainly focuses in designing the
simulation model for fuzzy logic regulator in advising the supervisor of service
center in maintaining definite delay in service towards acceptable limits to the
customers by the usage of simulation package, the Fuzzy Logic Toolbox MATLAB
Simulation tool. |
Keywords: |
Expert Systems, Artificial Intelligence, Services Center Management, Fuzzy
Logics, Knowledge-Based Systems, Inference Engines. |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
Title: |
EVALUATING THE ACCURACY OF USING CROSS DATASETS TO PREDICT NEW LOCAL HEART
DISEASES CASES |
Author: |
AHMAD MOUSA ALTAMIMI, MOHAMMAD AZZEH |
Abstract: |
Extracting hidden knowledge from healthcare datasets are quite important for the
health sector. It is a common practice that health organizations often focus on
their local data to build prediction model that can be used to predict and
identify some popular diseases, heart diseases are no exception. The main
challenge that faces health organizations around the world is how to generalize
the prediction model on different cases collected from different places. It is
well recognized that the health prediction models are built over data collected
from a specific community, but there is a lack of confirmation if this model can
be applied for data collected from different communities. In this paper we turn
our attention to heart diseases problem. In this work, we empirically examine
the prediction accuracy of different classification algorithms when different
medical datasets are used for learning and testing. Specifically, three studies
were developed to determine how successfully we can generalize a model that is
built based on a dataset obtained from a health organization and then used to
predict new cases from different one. In the first study we developed and tested
classification models over each individual dataset, whereas in the second study
we developed classification models over a dataset and tested using another
dataset. In the last study, we made a merge between the employed datasets, then
a classification model is built and tested over the merged dataset. Results from
these studies confirm that using a classification model built from different
dataset and used to predicted cases from another dataset is generally reasonable
and accurate. They also confirm that merging heart disease datasets that have
the same structure are useful for identifying potential cases. |
Keywords: |
Data Mining Classifiers, Prediction Model, Accuracy, Cross Datasets, E-Health |
Source: |
Journal of Theoretical and Applied Information Technology
15th July 2017 -- Vol. 95. No. 13 -- 2017 |
Full
Text |
|
|
|