|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2017 | Vol. 95 No.14 |
Title: |
GUIDING FEATURE BASED SAR IMAGE ALIGNMENT USING BAG OF WORDS MODEL |
Author: |
B SIRISHA, B SANDHYA, CHANDRA SEKHAR PAIDIMARRY, AS CHANDRASEKHARA SASTRY |
Abstract: |
Automatic SAR image alignment or registration is one of the fundamental
preprocessing operations in several applications of computer vision, image
processing, pattern recognition etc. Advances in feature extraction algorithms
have led to the development of efficient alignment algorithms which offer
invariance to deformations like scale, rotation, view angle etc. To further
improve the performance of standard SAR image alignment, an iterative approach
generating multiple synthetic views, known as view synthesis has been employed.
State of art detectors like SIFT, SURF, Hessian Affine and MSER when used with
view synthesis have been proved to be invariant to a wider range of
deformations, however at the cost of additional memory and time to be spent on
generation of views and feature extraction across all the views. Hence we
studied if the characteristics of source and target SAR images to be aligned can
be used to provide some knowledge and guide SAR image alignment approach. This
paper focuses on identifying the possibility of aligning two SAR images and also
predicts suitable alignment approach by building a predictive data mining model
using classification based algorithms. The dataset of 540 Terra SAR X band
images is tested and applied on various classification algorithms such as Naive
Bayes, SVM, and J48 using attributes computed from Bag of Words model applied on
feature detector and descriptor. |
Keywords: |
Image Alignment, Feature Detection, Feature Description, View Synthesis, Bag of
Visual Words, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
QUESTION ANSWERING SYSTEM : A REVIEW ON QUESTION ANALYSIS, DOCUMENT PROCESSING,
AND ANSWER EXTRACTION TECHNIQUES |
Author: |
FANDY SETYO UTOMO, NANNA SURYANA, MOHD SANUSI AZMI |
Abstract: |
Question Answering System could automatically provide an answer to a question
posed by human in natural languages. This system consists of question analysis,
document processing, and answer extraction module. Question Analysis module has
task to translate query into a form that can be processed by document processing
module. Document processing is a technique for identifying candidate documents,
containing answer relevant to the user query. Furthermore, answer extraction
module receives the set of passages from document processing module, then
determine the best answers to user. Challenge to optimize Question Answering
framework is to increase the performance of all modules in the framework. The
performance of all modules that has not been optimized has led to the less
accurate answer from question answering systems. Based on this issues, the
objective of this study is to review the current state of question analysis,
document processing, and answer extraction techniques. Result from this study
reveals the potential research issues, namely morphology analysis, question
classification, and term weighting algorithm for question classification. |
Keywords: |
Information Retrieval, Question Answering, Question Analysis, Natural Language
Processing |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
BIOMETRIC IDENTIFICATION USING GLOBAL DISCRETEZATION |
Author: |
BAYAN OMAR MOHAMMED, RZGAR SIRWAN RAZA , SITI MARIYAM SHAMSUDDIN |
Abstract: |
Biometrics is the science and technology that involves the measurement and
analysis of the human body’s biological data. Biometrics involves the extraction
a feature set from the obtained data. The feature set is then compared against
the template set stored the database. Identification of people must demonstrate
reliability and accurately especially in the domains of business transactions
and in the access to confidential information. The currently available
fingerprint biometric Identification concentrates on feature extraction and task
of classification for authorship identification. In fingerprint, the random
representation may cause degradation to the performance of classification. Thus,
prior to the classification task, certain standards should be present to denote
these unique features. In relation to this, the application of the
discretization technique would be beneficial. Hence, a new framework for
fingerprint biometric identification is proposed. This paper particularly shows
the outcome of discretization process on fingerprint samples to attain
individual identification. In this paper, the new proposed framework and classic
framework were compared using samples. Based on the results, classification
accuracies of 90% were obtained when using discretization process with
fingerprint biometric identification. |
Keywords: |
Biometric, Fingerprint Identification, Individuality, Geometric Moment
Invariant, Discretezation |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
COMPILING A DICTIONARY OF LOAN WORDS IN BALINESE: THE EVALUATION RESULT OF
EFFECTIVENESS TESTING IN THE FIELD AIDED BY MOBILE TECHNOLOGY |
Author: |
I NENGAH SUANDI, IDA BAGUS PUTRAYASA, DEWA GEDE HENDRA DIVAYANA |
Abstract: |
The objective of this third year study was to describe the result of the
effectiveness testing in the field aided by mobile technology to the draft of
dictionary of loan words in Balinese that has been successfully validated by
linguists and lexicologists in the second year. This study was designed by
following the stages of thinking in research and development adapted from the
development of a set of teaching materials using 4-D model (Define, Design,
Develop, and Disseminate). The subjects for this third year were Balinese
language teachers and the students of Balinese Language Department in the public
as well as in private institutes of higher learning in Singaraja and Denpasar.
The data were collected through questionnaire The data that had been collected
were analyzed by using a descriptive analysis Based on the formulation of the
problems in this third year research and data analysis that has successfully
been done it can be concluded that quantitatively, the draft of dictionary of
loan words in Balinese can be said to be effective since the mean score obtained
was 3.6 (falling into effective category). However, qualitatively, there are
reasonably many inputs given by the respondents for the purpose of improving the
draft of the dictionary. The inputs given are related to the aspects of (1) the
appearance, (2) the title of the dictionary, (3) the foreword, (4) the guide to
the use of the dictionary, (5) the quality of the contents of the dictionary and
(6) bibliography. |
Keywords: |
Dictionary of Loan Words, Effectiveness Test, Mobile Technology |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
SYSTEM OF MEDIATION FOR MOBILE PAYMENT WITH THREE FACTORS AUTHENTICATION |
Author: |
WADII EL HILLALI, JAOUAD BOUTAHAR, SOUHAÏL EL GHAZI EL HOUSSAINI |
Abstract: |
Since the early ages, the human being has not ceased to develop its system of
exchange. The first system introduced is barter which has evolved over time in
currency, taking various forms (shells, teeth, feathers ...). The appearance of
microelectronics has favored the appearance of a new era of payment systems
which is the credit card, it is currently the most used means of payment
throughout the world. Today financial institutions want to replace the credit
card by mobile phone. In this article we will present the implementation of a
mediation platform for mobile payment, and we will present an implementation
approach to the Fido standard for Three-Factor Authentication. |
Keywords: |
M-payment, 3FA, NFC, Fingerprint, Android, SOAP |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
ALTERNATIVE MODEL BASE AS AN ENABLER FOR SUCCESS OF BUSINESS INTELLIGENCE-BASED
COMPANIES USING C4.5 |
Author: |
KISWORO |
Abstract: |
Business intelligence has been base for new form of business in the world.
Companies have respectfully adopted the base for gaining success. Internet is
used for reaching the goal. Information and users becomes core assets for facing
the future. But so many complex factors have been making up every detail
efforts. It is very interesting to be researched under conscience and smartness.
Business intelligence concepts should be observed and causes should be found.
From computer science side, especially computation with its effects to decision
making of management level, this research has found a small side relates to
alternative model base as enabler. From ocean names computation references, C4.5
appears and looks very incredible to be entered. A decision then comes to use by
the reasons that the algorithm has been top ten in the computation world. It is
used widely by academic environment and practitioners, tested and accepted. It
will be promising for the future. Therefore, this research has: (a) motivation
to encourage seeking answer against hope for success in Business
Intelligence-based business, (b) focus on offering an alternative model base
possibility for companies to develop information, (c) research object: companies
spread on the internet, and (d) significance on contributing modeling result in
form of decision tree via C4.5. |
Keywords: |
Business Intelligence, Alternative Model Base, C4.5, Companies. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
WEB SERVICE FOR INCREMENTAL DATA WAREHOUSES FRAGMENTATION ASSISTED WITH
TEMPORARY MATERIALIZED VIEWS |
Author: |
ABDELAZIZ ETTAOUFIK, MOHAMMED OUZZIF |
Abstract: |
The Data warehouse (DW) has become the essential component of almost every
modern enterprise information system. It is proposed to collect and store
heterogeneous and bulky data. DW represents a collection of thematic,
integrated, non-volatile and histories data. It is feds from different data
sources and it is highly required of the system to respond to complex online
analytical queries. Generally, the analytical queries execution cost on large
tables is very high. Reducing this cost becomes essential to enable
decision-makers to interact in a reasonable time. In this context, different
optimization techniques such as fragmentation, indexing, materialized views, and
parallelism are used. On the other hand, the volume of data residing in the DW
is constantly evolving. This can increase the complexity of frequent queries,
which can degrade the performance of DW. The administrator always has to
manually improve the DW performance from the new load of frequent queries.
Distance Administration of DW through the web becomes important. The approach
proposed in this paper aims at an incremental horizontal fragmentation technique
assisted with temporary materialized view through a web service. This technique
is based on managing the temporary materialized view in order to optimize the
new frequent queries before proceeding on the implementation of the
fragmentation. An experimental study on a real DW is carried out and comparative
tests show the satisfaction of our approach. |
Keywords: |
Data Warehouse, Cloud Computing, materialized views, incremental fragmentation,
frequent queries, web service. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
A REVIEW OF FINDINGS ON AGENT SPAWNING AND MOBILITY |
Author: |
OSAMA TREEF ALSHAKI, MOHD SHARIFUDDIN AHMAD, MOAMIN A. MAHMOUD |
Abstract: |
Mobile agent technology is becoming more popular and has been implemented in
many areas. Several research have been conducted to address its challenges
including two of the most important which are agent spawning and agent mobility.
This paper reviews the mobile agent technology, the background concept of mobile
agent cloning and spawning, agent mobility as well as the problems faced by many
researchers during their research on mobile agent. Various mobile agent types
are also discussed. The paper finally proposes a new agent spawning and mobility
models to resolve some of the researchers problems. |
Keywords: |
Agent Architecture, Mobile Agent, Agent Cloning, Agent Spawning |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
FINE GRAINED MULTI ACCESS CONTROL VIA GROUP SHARING IN DISTRIBUTED CLOUD DATA |
Author: |
RANJEETH KUMAR M , N.SRINIVASU , LOKANATHA C. REDDY |
Abstract: |
Distributed cloud data storage is an advanced and empirical concept in present
days for out sourcing of data in cloud. A new decentralized grained access
control approach is required for privacy on data storage that supports anonymous
authentication. In this paper we introduce to propose and develop an approach
i.e. Scalable Attribute Based Encryption (SABE) to achieve grained with flexible
and scalable access control in cloud computing for secure distributed cloud
storage. SABE is not only perform scalable due to its pyramid structure, it also
share effective and flexible access control in supporting on ABE, it also
assigns for user expiration time and revocation efficient than existing schemas.
Protected data transmission among users should be effective in as well as
flexible in order to support access control policy models with secure team
communication, selective and hierarchal data transfer control in sharing. So in
this paper we propose and develop Transmitted Team Key Management (TTKM), where
each client (user) in group shares a secret trust key owner with subsequent
rekeying for data sharing join or departure of users requires only broadcast
message between data sharing in cloud. We analyze the privacy of proposed TTKM
schema and compare with existing SABE security schema’s in distributed data
sharing. We also provide real time secure cloud setup with suitable server
configurations based on service domain IP-address and service domain. Our
experimental results show effective data access control with authorized security
considerations. |
Keywords: |
Access Control, Pyramid Structure, Distributed Cloud Storage, Transmitted Team
Key Management, Privacy Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
MINING OPINIONS FROM BIG DATA OF INDONESIAN HOTEL REVIEWS |
Author: |
VERONICA S. MOERTINI, VINSENSIUS KEVIN, JEANE SATYADI |
Abstract: |
Mining customer opinions from hotel reviews is useful. The results can then be
used to help customers in choosing the most suitable hotel. In this research, a
technique for mining opinions from big data of Indonesian hotel reviews, which
is based on MapReduce, is developed. To avoid iterative computations, we adopt
look-up table approach. The experiments for evaluating the performance of the
technique were conducted on a Hadoop cluster with 14 clients. The results show
that the proposed technique discovers useful opinion summary and is scalable. |
Keywords: |
Mining Indonesian hotel reviews, big data, MapReduce |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
FIBROUS ROOT MODEL IN BATIK PATTERN GENERATION |
Author: |
PURBA DARU KUSUMA |
Abstract: |
Batik is one of famous cultural heritage in Indonesia. One effort to preserve
batik is by exploring new patterns. One of popular pattern is floral pattern. In
this research, fibrous root model is proposed and is combined with the
traditional batik pattern. This model is developed by combining root growth
model based on L-system and random walk. In this research, the fibrous root
model has been implemented into computer based batik pattern generation with
some alternatives: single direction, random direction, and radial direction.
Based on the test, split ratio has positive correlation with the average number
of segments. Die ratio has negative correlation with the number of segments. The
maximum deviation angle makes the root growth wider. The number of seeds and the
number of iterations have positive correlation with the number of segments. The
increasing of the number of seeds makes the complexity grows linearly. The
increasing of the number of iterations makes the complexity grows
logarithmically. |
Keywords: |
Fibrous Root, Batik, Pattern Generation, L-System, Stochastic |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
AN IMPROVED PERIPHERAL ENHANCEMENT OF MAMMOGRAM IMAGES BY USING FILTERED REGION
GROWING SEGMENTATION |
Author: |
NIRASE FATHIMA ABUBACKER, AZREEN AZMAN*, MASRAH AZRIFAH AZMI MURAD, SHYAMALA
DORAISAMY |
Abstract: |
During the mammographic acquisition, the breast is compressed with a tilting
compression paddle; hence the breast thickness is non-uniform across the
mammogram and thinner in the peripheral area and therefore over exposing this
area. In Computer Aided Detection systems, peripheral enhancements were used as
a pre-processing stage for the enhancement of peripheral visibility of the
uncompressed region of the projected breasts. A correction function is required
to expand the perceptibility of the peripheral area that necessitates a
better-segmented output of the peripheral region. This paper aims to improve the
peripheral enhancement technique by using region growing segmentation method
combined with an average filter that scales the grey level of the border regions
to brighten the mammogram image. The filter enhances the details of those images
and helps to obtain a better segmentation output, which is used as an input to
the peripheral enhancement process. In the evaluation, a total of 600 images
that consists of 300 normal, 170 benign and 130 malignant mass images, which are
obtained from the Digital Database Screening Mammography (DDSM) dataset of the
University of South Florida are used. The quality of an image after the
peripheral enhancement process is evaluated subjectively and objectively, by
using visual illustrations and the peak signal-to-noise ratio (PSNR),
respectively. The results obtained show that the filtered region growing
segmentation method outperforms the Otsu and the K-means segmentation methods. |
Keywords: |
Mammography Image Processing, Radiographic Image Enhancement, Computer-assisted
Diagnosis, Image Quality |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
PROGRESSIVE LOAD EQUILIBRATING USING HYBRIDIZED FA-CO IN DATA STREAM
CLASSIFICATION |
Author: |
S. RAJESH KUMAR, DR. S. MURUGAPPAN |
Abstract: |
Load Equilibration is the central attribute in the data stream classification. A
huge amount of data is generated from the streams of data in real time
applications such as set of transaction process, Intrusion Detection System and
so on. A plethora of load equilibration techniques are available but not
precised for global optima solutions. The paper re-searched on equilibrating the
loads among the nodes. We proposed “Hybridized FA-CO” algorithm that highlights
the features of best prediction of nodes for equilibrating the loads. The
operators of a firefly are merged with phenomenon of ant system to heighten the
generation of global optima solutions. The resources are assigned properly to
its corresponding nodes. In data stream, the data is continuous. In data mining
networks, the mining of nodes is of great importance. The paper deals with the
prediction of nodes to keep up the loads. The continuous attributes like
foretell value, foretell time and Rate of mining are used to keep up the loads.
Rate of mining is the mining of nodes with least carrying loads. The
experimentations are conducted on data mining networks and the performance
validation is done. The result proves that the hybridized approach works
efficiently for equilibrating the loads. |
Keywords: |
Load Equilibration, Firefly Operators, Ant system, Rate of mining, Foretell
Value and Foretell time |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
INTERACTION FORCES-RANDOM WALK MODEL IN TRADITIONAL PATTERN GENERATION |
Author: |
PURBA DARU KUSUMA |
Abstract: |
There are many traditional decorative patterns in Indonesia. Some of them are
regular pattern. The advantage of regular one is its simplicity and easiness to
be built by iterative algorithm. The disadvantage is it is monotonous. So,
stochastic method can be implemented into regular pattern to add uncertainty. In
this paper, the uncertainty was added by implementing combination of
deterministic and stochastic approach into the regular pattern. The
deterministic part is represented by modified interaction forces method. The
stochastic part is represented by random walk method. This model also
implemented multi agent approach by using two types of agent: starting point
determinant and walker. In this paper, walker still walks until it cannot walk
anymore. There are two parameters that are tested, the travelled nodes and the
occupied cells ratio. In this research, by using interaction force as movement
model, the occupied cell ratio is above 50 percents. |
Keywords: |
Pattern Generation, Interaction Forces, Multi Agent, Random Walk, Batik |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
A REVIEW OF STUDIES ON ONTOLOGY DEVELOPMENT FOR ISLAMIC KNOWLEDGE DOMAIN |
Author: |
MUHAMMAD AMAN, ABAS BIN MD SAID, SAID JADID ABDUL KADIR, BAHARUM BAHARUDIN |
Abstract: |
Ontologies are used to explicitly represent knowledge of a various domain, and
thus provide a shared understanding. Therefore, with the explosion of textual
information on the Internet they are becoming a key technology for
semantic-driven modeling, knowledge interchange and integration. Islam is one of
the most popular religions of the world and Quran and Sunnah is the main source
of knowledge for Muslims. To utilize this non-trivial knowledge domain for the
betterment of humanity, numerous studies have been carried out to exploit
ontologies for capturing knowledge from Islamic knowledge sources. This paper
presents a review of different ontology oriented approaches for building domain
specific ontology for Islamic knowledge domain, with the goal to identify the
main problems in ontology development, and shortcomings of these approaches. |
Keywords: |
Ontology development, knowledge representation, ontology learning, Quranic
knowledge domain, concept extraction |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
A NOVEL UNDERWATER IMAGE MOSAICKING USING IMAGE REGISTRATION BASED ON FLICKER
REMOVAL |
Author: |
ANJIK SUKMAAJI, EKO MULYANTO YUNIARNO, I KETUT EDDY PURNAMA, MOCHAMAD HARIADI |
Abstract: |
Video data size could become a problem when it is accessed or stored on mobile
devices. Currently, converting video into image mosaicing is the best solution
for video data storage on mobile devices. However, underwater video images have
more complicated problems. They have common concerns, such as low quality image.
The deeper the underwater object is, the more unclear its image become. Although
lighting is relatively better in shallow waters, images obtained here often
contains flicker, which happens when sunlight is reflected on the water’s
surface. Therefore, in the mosaicing process, feature detection must be done
first before it is registered. This study attempts to make improvements to
underwater image registration process by eliminating flicker so that the feature
of the image can be registered. The proposed solution is to use a method to
perform flicker detection and removal based on the value (v) in the HSV color
model. The method will remove the flicker by automatic selection best value.
From the exsperiment result shows 0.65 as the best value (v) for reference
flicker. On these values (v), the amount of features that can be detected and
registered using SIFT are always higher than using other value (v). Thus, this
proposed method can contribute to the image mosaicing registration process |
Keywords: |
Flicker, mosaicking, HSV, sunlight, SIFT |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
CONCEPT AND APPLICATION OF VIRTUAL REALITY HAPTIC TECHNOLOGY: A REVIEW |
Author: |
NURATIQA NATRAH MANSOR, MUHAMMAD HERMAN JAMALUDDIN, AHMAD ZAKI SHUKOR |
Abstract: |
Haptics has been a major part of both future virtual reality experiences and
everyday consumer electronics. Wearable technology, since it is in contact with
human skins, will be the most likely place to deploy these solutions. Haptics
platform is a fast-evolving area and the virtual reality technologies has
matured and is giving suitable assistance to robotic surgery and people who are
handicapped. This paper reviews the general concept of virtual reality haptics,
altogether with its applications, previous research findings, the challenge and
its superiority for developing a virtual reality prototype/devices and
integration of virtual reality concept with the bilateral control system
platform. And lastly, potential upcoming works were discussed and suggestions
will be put together for melioration of review findings. |
Keywords: |
Virtual Reality, Sensory, Tactile, Haptics, Manipulation, Force Feedback |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
SPECIFIC FEATURES OF GRAPHICAL-ANALYTICAL REPRESENTATION OF A PROCESS MODEL OF
MANAGING INNOVATION ACTIVITY IN THE FRAMEWORK OF SOFTWARE DEVELOPMENT FOR IMPORT
SUBSTITUTION PROJECTS |
Author: |
OLEG JAKOVLEVICH KRAVETS , OLEG KOSORUKOV , LARISA UTYUSHEVA |
Abstract: |
The authors have carried out research on the graphical-analytical representation
of a process model of managing innovative activity in the framework of software
development for import substitution of high-tech IT projects.
Unlike the known approaches, the offered aspects of graphical-analytical
modeling of a process-based approach in the special subject domain provide both
new results concerning the life cycle of software products of import
substituting technologies and minimization of administrative costs of the
development processes.
Taking into account specific features of import substitution projects in the
area of IT development, a general graphical diagram of the process model which
illustrates composition and the sequence of execution of processes and
subprocesses of life cycle of innovative IT developments in the context of a
system (for example, in developing import substituting application-oriented or
instrumental software as a part of complicated industrial systems) has been
proposed.
Features of a life cycle of innovative IT solution (innovative software product)
with the use of the presented microclassification have been analyzed.
The presented results are perspective for elaborating hybrid process and project
models, as well as for algorithmization of flexible calculations of
administrative prime costs. |
Keywords: |
Control Of Processes, Life Cycle, Innovative Activities, Software, A Process
Model Of Control, Import Substitution |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
WEIGHT ANALYSIS FOR WEIGHTED CLUSTER ALGORITHMS IN MOBILE AD-HOC NETWORK |
Author: |
HADEEL NOORI SAAD, MOHAMMED BAQER M. KAMEL |
Abstract: |
Mobile ad-hoc network (MANET) is an infrastructure-less network with unstable
dynamic nature. Such environment may cause high control signaling for
self-rearrangement, and scalable problems. Weight-based Cluster routing
algorithms aim to reduce configuration steps, retransmission and collisions.
These algorithms differ in principal of cluster head selection upon some weight
criteria such as (energy, connectivity, no. of node’s neighbors and mobility).
In this research an analytical model was proposed to examine different
criteria’s weights themes for cluster head election. The result expos the effect
of the significant of multi combinations of them. Computation of criteria weight
upon another criteria gives a smooth weight update with different update steps
as results show. This can reflect new trend of weighted clustering algorithms
based on network state. |
Keywords: |
MANET, MANET Clustering, CH Selection, Weighted Clustering, |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
ADAPTIVE WEIGHTED-COVARIANCE REGULARIZED KERNEL FUZZY C MEANS ALGORITHM FOR
MEDICAL IMAGE SEGMENTATION |
Author: |
HEMALATHA K. L., DR. SUNILKUMAR MANVI, DR. H.N. SURESH |
Abstract: |
Image segmentation is the most common method used to analyze and locate
deformities in medical images. Clustering is a technique used in segmentation to
group up similar data in a single cluster. FCM is the successful clustering
technique employed, which is repeatedly modified by the researcher to make it
more robust against noise. In this paper, we present an improved kernel FCM
algorithm for image segmentation by introducing a regularization parameter with
covariance weighted fuzzy factor and a Gaussian kernel metric. It calculates and
uses the heterogeneity of gray scales in the neighborhood location for acquiring
local contextual information and replaces the standard Euclidean distance with
Gaussian radial basis kernel functions. The main advantages are adaptiveness to
local context, preserve image details with enhanced robustness, independence of
clustering parameters and decreased computational costs. The experiments are
done in Brain Magnetic Resonance Images (MRI) and results are analyzed, show
that the proposed algorithm is better segmentation accuracy and efficiency than
the other methods. |
Keywords: |
Fuzzy c-means; Gaussian Kernel; Medical images; Weighted Covariance; Magnetic
Resonance Imaging |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
MEASURING THE ACCEPTANCE OF USING UTMS IN JORDAN UNIVERSITIES |
Author: |
BASSAM M. AL-MAHADEEN, AHMAD ALTHUNIBAT, SAEED M.Z A. TARABIEH |
Abstract: |
University Timetable management system (UTMS) are used to schedule courses,
lecturers and rooms in university by considering some constraints. Although UTMS
is a widely studied topic, the use of automated timetabling systems is not
widespread among large universities. Therefore, it is important to investigate
the factors that influence the intention to use university timetable management
system (UTMS) among Higher education lecturers. This study proposed a model for
determining the factors that affect the acceptance of using UTMS. The study was
conducted by surveying different groups of university’s’ lecturer community. A
structured questionnaire was used to collect data from 120 respondents. Results
of the study prove that the proposed model is comprehensive to study the
acceptance of UTMS in higher education institution. Overall, the results
indicated the appropriateness of fundamental elements of TAM in the UTMS
context. |
Keywords: |
Acceptance, Timetable management system, university timetable, TAM model |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
PC-MAC: PRIORITY CONSTRAINED AND CONGESTION AWARE MAC PROTOCOL FOR MULTICASTING
IN WIRELESS BODY SENSOR NETWORKS |
Author: |
V.T. VENKATESWARLU, Dr. P.V. NAGANJANEYULU, Dr. D.N.RAO |
Abstract: |
MAC (Medium Access Control) protocol is a critical objective in the BSN (Body
Sensor Networks).Achieving Quality of Service in Mac protocols towards
heterogeneous data transmissions generated from varied sensors is significant
research objective. In particular, the efficacy of MAC protocol performance,
focusing on the congestion avoidance in multicasting is very essential.
Predominantly, the physiological data monitoring applications always generate
varied types of traffic comprising multimedia data packets and it is very
important to ensure that the heterogeneous traffic schedule of such traffic
types are classified based on the priorities and for transmission of the data
packets. Considering the pros and cons of various MAC protocol solutions for
multicasting that proposed earlier, in this paper, the emphasis is on a novel
model of MAC protocol called Priority constrained and CongestionAware MAC
Protocol (PC-MAC) for multicasting, in which, the medium access control designed
based on traffic prioritization. The structure of data transmission redefined to
ensure that the critical data packets transmitted without congestion. PC-MAC
protocol shall deliver the missing frames to the multiple sinks with reduced
delay that retains the sequence of frames that delivered. The effectiveness of
PC-MAC protocol evaluated using experimental studies of simulation carried out
in mannasim that build over NS-2. Simulation results have depicted that the
proposed model certainly outperforms other contemporary models for BSNs. |
Keywords: |
Medium access control, Wireless Body Area Networks, Wireless Sensor Networks,
Energy-Efficiency, Multicast routing, Priority scheduling, congestion avoidance |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
HVM: A METHOD FOR IMPROVING THE PERFORMANCE OF EXECUTING SQL-QUERY OVER
ENCRYPTED DATABASE |
Author: |
JAAFER AL-SARAIREH |
Abstract: |
The database system is an important element of information systems for the
storage and management of information. Sensitive data in database systems must
be protected using encryption techniques, whose application must balance data
security and the functional efficiency of query processing.
Adaptive approach is proposed in this research to improve the performance of the
query over the encrypting sensitive information in databases based on generating
a unique hash value for each and every sensitive da ta and translating the SQL
clauses into an appropriate form to execute over the hash values attribute. In
this scheme, there are no statistical characteristics between the encrypted
value and hashed value. |
Keywords: |
Database; Cryptography; SQL; HVM, Query Processing |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
A RULE-BASED PREDICTION METHOD FOR DEFECT DETECTION IN SOFTWARE SYSTEM |
Author: |
B. DHANALAXMI, Dr.G.APPA RAO NAIDU, Dr.K. ANURADHA |
Abstract: |
Software is a complex object that consists of different modules with changing
degrees of defect occurrence. By efficiently and appropriate predicting the
frequency of defects in software, software project managers can better utilize
their workforce, cost and time to obtain better quality assurance. This paper
proposes a rule-based prediction (RBP) method for defect detection and for
planing the better maintenance strategy, which can support in the forecast a
defective or non-defective software module before it can deploy for any software
project. The RBP extends the Ripple-down rule (RDR) classifier method to
construct an effective rule-basedmodel for accurately classifying the software
defects. The method will enhance the software defect prediction so that software
testers can spend more time in testing those components which are expected to
contain errors. The experiment evaluation is performed over a software
repository datasets and the obtained results showa satisfactory improvement. |
Keywords: |
Defect Detection, Rule-based Prediction, RDR Classification, Software system |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
Title: |
AN EFFICIENT IMAGE NOISE ESTIMATION TECHNIQUE USING TYPE-2 FUZZY SET AND GENETIC
ALGORITHM |
Author: |
T. MAHA LAKSHMI, DR. ALLURI SREENIVAS |
Abstract: |
Noise estimation in digital images plays an important role in various kinds of
applications such as medical imaging, video processing and communication
systems. Noise density estimation from an image can help to analyze the channel
properties of a communication system. Some authors have been described with a
few algorithms to estimate noise present in the images in the spatial and
frequency domain. The quality of a captured image through image acquisition
devices like camera or sensor will not be noise free because of some parameters
like circuit noise and atmosphere conditions. The main objective of this project
is to evaluate the noise levels at different parts of the image with the help of
a new algorithm Interval Type-2 Fuzzy Sets Filter (IVT2 FSs) and Genetic
algorithm (GA). In this, we have estimated the performance in terms of the
Structural Similarity Index Metric (SSIM), Peak Signal to Noise Ratio (PSNR),
Mean Square Error (MSE) and Noise Variation (NV). |
Keywords: |
Interval Type-2 Fuzzy Sets Filter, Genetic algorithm, Structural Similarity
Index Metric, Peak Signal to Noise Ratio, Mean Square Error. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2017 -- Vol. 95. No. 14 -- 2017 |
Full
Text |
|
|
|