|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2017 | Vol. 95 No.8 |
Title: |
ASSESSING LEARNING PARADIGMS IN TEXT CLASSIFICATION |
Author: |
MOHAMMED ABDUL WAJEED, MOHAMMAD ABDUL RAHMAN |
Abstract: |
Today abundant information is available due to the advent of Internet, which is
usually stored with sole purpose of current needs alone. Such data thus rest in
unclassified in dump repository. Instead if it would be stored in a classified
repository then navigation could be done easily, or classified at the later
stage reaching it could become easier and thus could helpful in decision making.
In the process of classification, commonly supervised and unsupervised paradigm
is adopted. Semi-supervised is a new term which is in-between supervised and
unsupervised learning where in-addition to the unlabeled data, the algorithm is
provided with some supervision information but not necessarily for all example
data. A blend of supervised and unsupervised classification is explored in the
formation of fuzzy clusters based on the importance of the terms in each class.
Enhancements in traditional KNN algorithm is explored taking into consideration
the different weights for the features based on the concept of variance in each
class. Finally the results obtained in supervised paradigm and semi-supervised
paradigm is compared. |
Keywords: |
Text Classification, Semi-Supervised, Fuzzy-Clusters, Variance, Enhanced-KNN |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
THEORETICAL COMPUTER ALGORITHMS CONFERENCES: ANALYZING THE PROGRAM COMMITTEE
CHARACTERISTICS |
Author: |
RADWA EL SHAWI |
Abstract: |
Algorithm represents the computer-based road map for accomplishing a given,
well-defined task. In general, computer algorithms form one of the core
practical technologies of computer science. In principle, research in
theoretical computer science focuses on the design and analysis of algorithms
and data structures, as well as the study of fundamental barriers to efficient
computation. The research community of this field has been significantly growing
in the last decade. In general, in the computer science field, publishing
research results is an integral part of a researcher’s professional life. The
preference for conference publications is motivated by many arguments such as
the high dynamism of the field requiring shorter turnaround time between
submissions; the prestige associated with publishing at highly-selective venues.
With the main aim of retaining the high quality and the prestige of these
conference, program committee members plays the major role of evaluating the
submitted papers and deciding which submissions are to be included in the
conference programs. In this article we assess the health of the computer
algorithms research community by analyzing four top-tier and prestigious
computer algorithm conferences (ESA, ICALP, SOCG and SODA) over the period
between 2006 and 2015 based on different criteria. We study dynamics in the
membership of the committees of the different editions of these conferences.
Finally, we report about the major contributing scholars in the committees of
these conferences as a mean of acknowledging their impact in the community. This
knowledge can be used by prospective authors to decide in which conferences to
publish and by conference steering committees or PC chairs to assess their
selection process. |
Keywords: |
Program committee, Steering Committees, Computer Algorithms conferences,
Research Communities, committee membership |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
DEVELOPMENT OF A WEB-BASED TENDERING PROTOCOL FOR PROCUREMENT OF CONSTRUCTION
WORKS IN A TERTIARY INSTITUTION |
Author: |
AFOLABI ADEDEJI, OWOLABI DELE, OJELABI RAPHEAL, OYEYIPO OPEYEMI, AINA DAMILOLA |
Abstract: |
There are myriads of ICT tools in the construction industry but many
construction procurement organizations are yet to harness the benefits. Tertiary
institutions that are at the forefront of accountability, transparency and
openness, engage in a lot of construction works but majority of them do not have
e-procurement sites. The aim of the study was to develop a web-based tendering
protocol for procurement of construction works in a tertiary institution. The
development of a web app and a survey research design was carried out for the
study. For the latter, a questionnaire instrument distributed to the client
representatives and contracting firms operating within a renowned tertiary
institution through a convenience sampling method was utilized. A total of 58
questionnaires were returned between the two groups. The study tested hypotheses
using Mann Whitney-U and T-test. The result revealed that there are no
significant differences between client representatives and contractors on
e-readiness and importance of implementing e-tendering in the procurement of
construction works. The study developed a web-based tendering system for
procurement of construction works in a tertiary institution using PHP, MYSQL,
CSS and HTML. The study recommended the increase in awareness of e-tendering
platforms through trainings and implementation and stakeholders should take hold
of the benefits of ICT in the construction industry. There is need to create
official e-tendering sites for both public and private institutions for the
purpose of procurement of construction works to encourage competitiveness among
different classes of contractors, enhancing transparency, accountability and
proper documentation. |
Keywords: |
Construction works, ICT, Procurement, Tertiary Institution, Web-Based Tendering
Protocols |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
NEW CROSSOVER OPERATOR FOR GENETIC ALGORITHM TO RESOLVE THE FIXED CHARGE
TRANSPORTATION PROBLEM |
Author: |
AHMED LAHJOUJI EL IDRISSI, CHAKIR TAJANI, MOHAMMED SABBANE |
Abstract: |
Genetic algorithms (GAs) are a class of global optimization methods. It has been
used to solve combinatorial problems. Among the difficulties in GAs, the
parameter setting and the choice of the crossover operator adapted to the
problem. In this paper, we studied the influence of these operators on the
performance of the GAs by making a comparative study with different adapted
operators to the Fixed Charge Transportation Problem (FCTP) and described the
genetic algorithm to find an optimal solution. In addition, we proposed a new
crossover operator for solving the FCTP. The experimental results show that the
choice of adequate crossover is important to solve each combinatorial problem by
genetic algorithm. Moreover, the GA with our developed crossover operator is
more efficient. |
Keywords: |
Combinatorial Problem, Fixed Charge Transportation Problem, Genetic Algorithm,
Crossover Operator, Priority Based Encoding |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
THE SYSTEM ARCHITECTURE OF VIBRATORY HAPTIC INTERFACE (SA-VHI) APPLIED WITH
JORDANIAN AUTISM CHILDREN |
Author: |
FARAH.H.ZAWAIDEH |
Abstract: |
This study aimed to bridge the gap between learning and social interaction by
employing learning tools and techniques through the sense of touch to improve
social interaction of autism children in Jordan. A computer game that includes
haptic interface in a 3D environment which uses the 3D glass and 3D screen was
developed. The effects of using vibratory haptic interface to improve social
interaction was investigated. The subjects of this study were 20 autistic
children suffering from mild autism aged between 9 to 14 years old in National
Autism Society of Jordan (NASOJ), from the who have impairments in social
interactions.
This is the main contribution made by the present study by which the autistic
children will be effectively able to interact and communicate with their
families, friends, and the entire community. Accordingly, the focus of the
present study is autistic children and how to improve their social interaction
capabilities, through using 3-D game and glasses; a screen supporting 3-D
display with vibratory haptic interface. In particular, how the joystick
technique can help the autistic children in improving their social interaction
capabilities. Results revealed a significant relationship between satisfaction
and social interaction among autism children by using the haptic interface
(joystick). |
Keywords: |
Vibratory Haptic Interface (VHI);social interaction;mild autism children,
single-user Virtual Environment (SVE). |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
A PROPOSED MODEL OF E-COMMERCE USING MODERN SOCIAL MEDIA AND ITS IMPACT ON
CUSTOMER LOYALTY |
Author: |
MOHAMMAD SHKOUKANI, OMAR BADRAN, RAWAN ABU LAIL |
Abstract: |
This study aims to find the impact of social media e-commerce on customer
loyalty and discover the impact of each characteristic (measure) of the user
experience on customer loyalty. These are Usability, Trustability, Relevancy,
and Reputation. It also aims to find the difference in customer loyalty when
demographic factors change in aspects of gender, age, and education. On the
basis of the theoretical framework, hypotheses were proposed to describe the
relationship between the independent variables (Usability, Trustability,
Relevancy, Reputation), and the dependent variable loyalty, i.e. the demographic
factors (gender, age and education). Data was collected from 990 university
students and employees of all levels and ages, through a questionnaire
instrument. The hypotheses were tested with hierarchal linear and simple
regression analyses, which confirmed that the study hypotheses have positive
relationships. Finally there is a significant impact of modern social media
e-commerce on customer loyalty. |
Keywords: |
Social media, E-commerce, Customer loyalty |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
TECHNOLOGY FACTORS INFLUENCING E-GOVERNMENT READINESS |
Author: |
MUSTAFA OMAR M. BAEUO , NOR ZAIRAH BINTI AB. RAHIM , ASMA ALI MOSA ALARAIBI |
Abstract: |
A rapidly growing number of countries are realizing that e-government has become
a powerful tool for governments, as it can assist with measures such as making
public administration significantly more efficient and effective. There is an
urgent need for e-government to be able to enhance government administration
performance and to provide efficient services to citizens. It can contribute to
shortening time and effort as well as alleviating pressures on citizens.
E-government projects need government support in order to create, apply,
disseminate and continue the experience by providing all necessary resources.
Various means of information transmission (such as the media) are vitally
important by which to educate the stakeholders and increase their awareness to
ensure the success and sustainability of such projects. Moreover, governments
should assess their readiness for developing e-government procedures before
embarking on the implementation of such a project to avoid any possible
failures. Most of the failures of previous e-government measures can be
attributed to technology factors. These factors include: infrastructure;
security; technological/ technical issues; hard/soft gap; digital divide;
internet use; and finally, skills. The successful implementation of e-government
relies on assessing the readiness of technology aspects in order to realize the
benefits of e-government and reduce potential failures of e-government
implementation. Existing studies on e-government readiness lack agreement on the
important technology aspects; thus, there remains a need to identify the
relevant factors that shape the technology aspects of e-government readiness.
The aim of this paper is to identify the said technology aspects of e-government
readiness. |
Keywords: |
Technology Factors, E-Government, E-Government Readiness, E-Government Ready |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
HYBRID BOTNET DETECTION USING ENSEMBLE APPROACH |
Author: |
SAMSON F, VAIDEHI V |
Abstract: |
Botnets are one of the most threatening cyber-attacks available today. This
paper proposes a hybrid system which can effectively detect the presence of C&C,
P2P and hybrid botnets in the network. The powerful machine learning algorithms
like BayesNet, IBk, KStar, J48 and Random Tree have been deployed for detecting
these malwares. The performance and accuracy of the individual classifiers are
compared with the ensemble approach. Labelled dataset of botnet logs were
collected from the Malware Facility. Secured data was collected from Christ
university network and the combined dataset is tested using virtual test bed.
The performance of the algorithms is studied in this paper. Ensemble approach
out performed individual classifiers. |
Keywords: |
Botnet, C&C, P2P, Hybrid Botnets, Ensemble |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
MDAASI: MODEL DRIVEN ARCHITECTURE APPROACH FOR APPLICATION SECURITY INTEGRATION |
Author: |
LASBAHANI ABDELLATIF, MOSTAFA CHHIBA, ABDELMOUMEN TABYAOUI, OUSSAMA MJIHIL |
Abstract: |
There have been many research works suggesting Model-driven Architecture (MDA)
approaches for automatic application generation and personalization. MDA
approach allows code generation from platform-specific models (PSMs) by the
means of generators that automatically transform models into the source code for
a chosen platform to automate software engineering process. Previous works have
widely addressed code generation, but they are not considering nonfunctional
aspects such as application security. In this current work, we are proposing
some additional MDA mechanisms to generate secure applications based on a given
set of security policies. In this context, this approach is used for integrating
security properties, such as Authorization, Authentication, Communication
encryption, Message Integrity, and Confidentiality of critical data, thus
security properties will be incorporated in the generated software during the
whole development process or in early abstraction stages. In other words,
security models will be merged with the system models in different abstraction
levels by applying a set of model-to-model transformation. As a result of this
process, the system's source code and configuration files will be generated
automatically from communication diagrams by applying a model-to-code
transformation. |
Keywords: |
Model Driven Architecture, Code Generation, Application Security, Communication
Diagram. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
AN IMPROVED HARMONY SEARCH ALGORITHM FOR REDUCING COMPUTATIONAL TIME OF FRACTAL
IMAGE CODING |
Author: |
NADIA M. G. AL-SAIDI, SHAIMAA S. AL-BUNDI, AND NASEIF J. AL-JAWARI |
Abstract: |
Fractal image coding (FIC) based on the inverse problem of an iterated function
system plays an essential role in several areas of computer graphics and in many
other interesting applications. FIC received considerable attention because of
its high resolution, fast decoding, and many other advantages. However, the
method has not been used widely because it required high computation time in the
encoding process, which is one of its drawbacks. Many optimization methods are
introduced to serve in solving this drawback and reducing the searching time for
optimal solution. The approach that based on meta-heuristic methods is
promising, which employ some degree of randomness to search for an optimal
solution. This study introduces the harmony search algorithm to improve the FIC
technique. The algorithm searches for an optimum solution while playing music.
Finding music harmony has been proven to solve optimization problems by
searching for an optimal solution. This algorithm is naturally inspired and is
currently in demand. The experiments show that, compared with other techniques,
the proposed method has excellent performance in image quality and reduces the
computation time and storage space. |
Keywords: |
Fractal, iterated function system (IFS), fractal inverse problem, fractal image
compression (FIC), harmony search algorithm (HAS). |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
MALAYSIAN ICT COMPREHENSIVE COMPETENCY STANDARDS FOR TEACHERS |
Author: |
AZIDAH ABU ZIDEN, FONG SOON FOOK, GERARD BOEY KONG HOONG, MUHAMMAD FAIZAL ABDUL
RAHMAN |
Abstract: |
While technology has been recognise as having tremendous potential to enhance
learning across all disciplines, there are queries on how teachers in Malaysia
are able to optimize and inculcate critical and creative thinking skills by
using technology to support teaching and learning. Despite of huge investment in
Information and Communication Technology (ICT) over the past decade in various
education initiatives, the potential of technology usage in Malaysian schools
have not reached the desired outcomes among teachers and students. The study has
explored the possible missing link for the realization of the expected
return-of-investment by establishing a Malaysian competency standard to review
and regulate ICT-related training curriculum. This study proposed to design and
develop the Educational Technology Competency Standards for 21st Century
Malaysian Teachers by using the modified Delphi technique. Education technology
experts from local and foreign universities as well as practitioners of ICT in
local schools, colleges and universities formed the Delphi expert panel. Using
an initial draft version of the standard developed through literature review,
document analysis and expert roundtable discussion, the experts went through an
iterative cycle of review, compare, amend and comment until the expert group’s
responses achieve consistency for each of the competency elements. The
consistent and valid responses for each of the competency elements that achieve
consensus then formed a reliable final all-encompassing ICT competency standard
for the teaching profession in Malaysia. It is with this ICT competency standard
that teacher training programmes can be adequately designed and developed to
train teachers to achieve the desired ICT competency standard in compliance with
the Malaysia National Education Blueprint 2013 – 2025. |
Keywords: |
ICT Competency standard; Modified Delphi Technique, Teachers, Teaching
Profession, 21st Century Skills |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
FACTORS INFLUENCING KNOWLEDGE SHARING IN ENTERPRISE RESOURCE PLANNING SYSTEM
USAGE IN SMALL AND MEDIUM ENTERPRISES |
Author: |
MOHAMMAD BANY BAKER, ZAWIYAH YOUSOF |
Abstract: |
Enterprise resource planning (ERP) system is a comprehensive integrated system,
which has been increasingly utilized in many organizations. The system is used
by organizations to help manage integrated business processes. The success of
such systems depends on how ERP users integrate and share relevant knowledge
that is needed to ensure the effective performance of their collective task.
Thus, it is evident that knowledge sharing is a key factor for the success of
ERP system usage. This study aims to identify the factors affecting knowledge
sharing among ERP users in small and medium-sized enterprises (SMEs). By means
of a survey of 413 ERP users from 32 Jordanian SMEs was executed. It was found
that absorptive capacity; organizational culture, top management support,
effective communication and ICT tools factors have impacted significantly on
knowledge sharing among ERP users. Such as finding could provide guidelines for
the management to enhance knowledge sharing process among ERP users other than
achieve business benefits with the use of ERP system. |
Keywords: |
Knowledge Sharing, ERP System Usage, Small And Medium Enterprises |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
IMAGE COMPRESSION TECHNIQUE USING SUCCESSIVE BLOCKS INTERFRAME CODING |
Author: |
ESCALIN TRESA L, DR. SUNDARARAJAN M |
Abstract: |
A powerful technique for compressing images is very essential because the raw
images needs huge amount of disk space which seems to be a disadvantage for
transmission and storage. Though many compression techniques available in the
field; a technique is needed which should be faster, more memory efficiency and
simple that meets the requirements of the compression vs. quality. In this
paper, we proposed a lossless method of image compression and decompression
using a technique called Successive Blocks Interframe Coding (SBIC). This
technique is simple in implementation and utilizes less memory. An algorithm has
been refined and executed to compress and decompress the given images using SBIC
technique in MATLAB R2014b simulation tool. The experimental results shows that
the SBIC technique is most powerful and gives a good compression ratio without
any data loss; while decompresses it reproduces the original image without any
loss of data with the same 100% original file quality. |
Keywords: |
Block Comparison, Neighborhood Similarity, Inter Pixel Redundancy, Hybrid
Compression, Lossless Compression, Successive Blocks Interframe, Image
Compression |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
APPLYING THE FUNCTIONAL EFFECTIVENESS INFORMATION INDEX IN CYBERSECURITY
ADAPTIVE EXPERT SYSTEM OF INFORMATION AND COMMUNICATION TRANSPORT SYSTEMS |
Author: |
LAKHNO V. A., KRAVCHUK P. U, PLESKACH V. L., STEPANENKO O. P., TISHCHENKO R. V.,
CHERNYSHOV V.A. |
Abstract: |
Developing a model for determining the functional effectiveness information
criterion for expert system learning to determine the state of cybersecurity,
while taking into account known statistical and distance clustering indicators
of cyber threats, cyber-attacks (CA), anomalies and also errors of the third
type, that may arise in the recognition of complex targeted CA on critical
computer systems, including the transport sector.
The model for determining the functional effectiveness information criterion of
machine learning expert system is developed. It is based on modified entropy and
Kullback - Leibler divergence information criterion at clustering features of CA
and anomalies that can receive an incoming fuzzy classified learning matrix,
that is used as an object of the study, and to build correct decision rules for
recognizing complex CA. Tests of the developed expert system were conducted. It
is established that the proposed model can significantly increase the anomalies
and CA detection effectiveness under constant increase in number and complexity
of the destructive influences on computer systems information security.
The model for determining the functional effectiveness information criterion
capable of self-learning information security expert system is developed. It
takes into account potential errors of the third type that may arise and
accumulate during the learning of the intellectual system of complex targeted CA
detection. |
Keywords: |
Cyber-Attacks Recognition, Expert System, Sign Clustering, Functional Learning
Effectiveness. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
PROCESS MODEL FOR SYSTEMATIC REQUIREMENTS PRIORITISATION PROCESS IN AN AGILE
SOFTWARE DEVELOPMENT ENVIRONMENT BASED ON 5S APPROACH: EMPIRICAL STUDY |
Author: |
RAMI HASAN AL-TAANI, ROZILAWATI RAZALI |
Abstract: |
In an unstable software development characterized by the turbulence of markets
and the competitive pressures, the organization is forced to adopt new software
development methodology to be survival. The agile methods have been introduced
to maintain the organization endurance. New challenges await agile methods, when
requirement prioritisation and re-prioritisation happened frequently, this leads
to unstable and disorganize requirement prioritisation process in agile
development environment. To improve its effectiveness and make the environment
more systematic and organized, this study proposes an adoption of the lean
manufacturing tool, which is 5S approach. The 5S approach improve the work
environment as it’s designed to check the process and guaranty that issues are
identified and get rid of issues. Consequently, this study aims to identify the
issues that affect the requirement prioritisation process. Therefore, in-depth
interviews have been carried by involving 18 agile practitioners from different
agile software development companies. The data collected for this study were
analyzed by using grounded theory techniques (Open, Axial and Selective coding).
The results are proposed a process model that will allow an improvement of the
process by applying a suitable S to overcome the issues that might lead to
unsystematic and disorganize environment. |
Keywords: |
Agile methods, Requirements Prioritisation process, Lean manufacture, 5S
approach, Requirements analysis |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
CLUSTER BASED SLEEP SCHEDULING MECHANISM FOR WIRELESS SENSOR NETWORKS |
Author: |
SREEVIDYA R. C., NAGARAJA G. S |
Abstract: |
Wireless Sensor Networks (WSN) are resource constrained. Energy consumption of
whole network is balanced at individual nodes. Due to this nodes lifetime is
extended. Absence of identifying the redundant nodes causes unnecessary energy
consumption. To solve this, an energy efficient cluster method with cluster
based redundancy discovery and sleep algorithm for energy efficient routing is
proposed. In this work, Cluster heads are chosen based on residual energy,
message representative path and distance. A cluster based algorithm is used for
discovery of redundant nodes in the network. The algorithm works without any
additional directional antennas. In each cluster, clustering sleep scheduling
mechanism is initiated when data transfer rate is less than the threshold value.
If the data transfer rate do not cross the threshold value, then all nodes in
the cluster will go to sleep mode. The proposed method balances the energy at
individual nodes and extends the network lifetime. |
Keywords: |
Wireless Sensor Network, Cluster Head, Minimum Depth Tree (MDT), Intra-cluster
Routing, Sleep Scheduling Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
IMPLEMENTATION OF WIRELESS COMMUNICATION SYSTEM USING NETWORK CODING ON WARP |
Author: |
ENDROYONO, SUWADI, ACHMAD ANSORI, UMMUL KHAIR |
Abstract: |
Mobility is one of the most interesting assets in modern communications. The
need of a very fast data access in wireless communication is become a necessity.
It is obligatory to have a good throughput in a wireless limited bandwidth. In
this paper we propose to implement a combination of Network Coding and
Quadrature Amplitude Modulation (called NC-QAM), started by a simulation and
followed by a realization in a Wireless Open-Access Research Platform (WARP)
module. Our model consists of two sources and one relay and one receiver. Based
on an analytical simulation, theoretically we found that the combination of C-QAM
gives us a throughput improvement up to 31.8% compared to QAM without network
coding. Based on the same model, the implementation on WARP has been
carried-out. Two measurements and evaluations have been performed, with indoor
and outdoor channel, by considering distance between two different sources. The
evaluation shows that the improvement of combination NC-QAM can reach 14.02%
compared to a system without network coding. |
Keywords: |
Network Coding, Quadrature Amplitude modulation, throughput, wireless
Open-Access Research Platform |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
FUZZY CLUSTERING DRIVEN FAST AND INTUITIVE CLASSIFIER LEARNING WITH MAPREDUCE
FRAMEWORK |
Author: |
RAGHURAM BHUKYA, DR. JAYADEV GYANI |
Abstract: |
Many business organizations exploring their big data resources using Hadoop
distributed file system due to its capability in offering fast processing, easy
scalability and higher extend reliability on low cost commodity hardware. The
efficiency of Hadoop distributed file system is the result of using Mapreduce
frame work, which is leading research communities to scale conventional data
mining techniques to fit on Mapreduce framework. So far in the research we can
found proposals of data mining on Mapreduce frame work concentrating only on
scalability factor, but at the same time they are ignoring two important factors
which can affect the efficiency, those are reducing number of scans to database
and lacking of intuitiveness in obtained data mining results. In order to
overcome such short comes and considering importance of classification learning
techniques in real time environment, we propose an fuzzy associative classifier
learning model using Mapreduce framework which take advantage of Tid-list
representation to extract the total classifier with in single scan to database
and provides intuitiveness using data driven fuzzy clusters. The experimental
results show the proposed model successfully enhanced the fast and intuitive
efficiencies of classification techniques for big data analytics without
compromising the accuracy. |
Keywords: |
Associative Classification, Mapreduce, Distributed File Systems, Fuzzy
Clustering, Tid-List Representation, Result Intutiveness |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
IMPROVE THE QUALITY OF STATISTICAL METHOD OF OBTAINING REPRESENTATIVE DATA
SCHEME FOR DE-DUPLICATION USING FUZZY CLUSTERING AND GENETIC ALGORITHM |
Author: |
RAVIKANTH.M, DR.D.VASUMATHI |
Abstract: |
Record De-duplication is the important task under merging different database
records. We can provide tuning results to the users after implementation of
de-duplication operation. Existing approaches are failing under tuning of web
databases and removal of duplicate records. All existing approaches are not
providing efficient and effective results [1] [2] [3] [4]. In this paper we are
designing one new prototype discussion related to effective and enhanced
de-duplication. Prototype design starts with fuzzy clustering and genetic
algorithm. Its can control more number of duplicate records compare to other
approaches. Its saves more storage and time compare to other approaches [12]
[13]. In distributed databases the complexity of finding similarity factor is
very high. The existing techniques are not accurate to minimize the duplication
in the same data base. In the present work a new technique is proposed to
improve the accuracy level [24]. In the proposed work a multi-level technical
process implemented like tuning. The tuning technique finds all types of
duplicated documents in the database. Here all duplicate files are searched with
all attributes in sequential order in tree fashion. The results are further
improved and reached to an optimized and acceptable range with new data
duplication detection method with Genetic Algorithm (GA) and Particle Swarm
Optimization (PSO). It further removes unwanted residual files from the
database. Bases on the view of previous ranking system problems a new manifold
ranking is proposed in the current research work. In the proposed system the
ranking is evaluated with new multimodality manifold ranking with sink points. |
Keywords: |
Web Databases, De-Duplication Operation, Un-Supervised Duplicate Recognition,
Edit Distance Algorithm, Fuzzy Clustering Algorithm, Genetic Algorithm, Margin
Relevance |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
IMPACT OF RANDOM BROADCAST OF THE INTERNET ON HUMAN HEALTH: A FIELD STUDY ON AL-NAJAF
CITY |
Author: |
ABDULHUSSEIN ABDULMOHSON |
Abstract: |
Demands of the Internet services have been increased and grown in the last one
decade. Due to absence and weakness of the fiber optic infrastructure in some
countries like Iraq. Thus, most of the Internet Service Provider (ISP) used
alternative solutions such as wireless broadcasting via central towers based on
free frequencies wireless devices ( broadband). Concern on the spread of
wireless internet services is growing, considering the lack of control and
regulation of this technology, particularly with the plenty of reports of
illnesses associated with Wireless Broadcasting and spread devices used for
internet broadcast in homes and companies. In this work, we conducted field
measurements in an Iraqi city that has more than 1250 towers within 28824 km2.
This area is large but is mostly an empty desert, so the concentration of these
towers is only about 500 km2. All towers use a free license frequency (5 GHz) to
broadcast the internet. The present study took 63 days to finish. It started on
6th October and finished on 7th December. The obtained measurements were
compared with international standards of wireless broadcasting for individuals
and businesses. The main objective of this research is to verify an Electric
Magnetic field (EMF) which is associated with Internet broadcasting from
internet towers that do not exceed international standards. Therefore, Internet
Broadcasting does not have negative effects on human health specifically to
those who lived near the towers. |
Keywords: |
Wireless broadcasting, Free license frequency; EMF; Standard for EMF exposure;
Power density |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
XSD2OWL2: AUTOMATIC MAPPING FROM XML SCHEMA INTO OWL2 ONTOLOGY |
Author: |
OUSSAMA EL HAJJAMY, LARBI ALAOUI , MOHAMED BAHAJ |
Abstract: |
XML (extensible Markup Language) nowadays is a common format widely used by
domain experts to exchange data and information on the internet. It allows
systems to agree on a common syntax and understand each data source that they
access. On the other hand, OWL (Ontology web language) contains a group of
concepts and properties to make the information in the Web processable and
semantically understandable by machines. Compared to XML, OWL is a vision for
the future web (web semantic), it gives explicit meaning to information and
provides additional vocabulary to formally describe the meaning of the
terminology used to annotate Web resources. In this paper we provide and develop
a new solution that converts the XML schema into OWL2 ontology. This solution
takes an existing XML schema (XSD) as input, loads the XSD document and parses
it using DOM parser. Then it extracts its elements with as much constraints as
possible and applies our mapping algorithm to create the resulting OWL2
document. Moreover, whole of the transformation processes are done automatically
without any outside intervention. Our aim in this work is to take a further step
in the existing research works by considering other important XSD aspects and
minimizing our algorithm execution cost. In order to apply our approach in real
environments, we have developed a tool XSD2OWL2 that implements our mapping
algorithm for our conversion model and demonstrates the effectiveness and power
of our strategy. |
Keywords: |
XML schema, XSD, OWL2, ontology, DOM parser |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
TEACHER-LEARNER & MULTI-OBJECTIVE GENETIC ALGORITHM BASED QUERY OPTIMIZATION
APPROACH FOR HETEROGENEOUS DISTRIBUTED DATABASE SYSTEMS |
Author: |
S.VENKATA LAKSHMI , VALLI KUMARI VATSAVAYI |
Abstract: |
Growing database demands more technological developments and computing
paradigms, as Grid and Cloud computing, unleashed new developments in the
database technology sector. Query Optimization is essentially a complex search
task to obtain the best possible plan from the enormously increasing databases.
Heterogeneous Distributed database management systems (DDBMS) are amongst the
most important and successful software developments where the query processing
is more difficult since large number of parameters effect the performance of the
queries. Thus, the author attempted to introduce a new approach for Query
Optimization in Heterogeneous DDBMS both for local and global optimization
separately. In this paper, two stochastic approaches such as multi-objective
genetic algorithm for local optimization and teacher-learner based optimization
for global optimization is employed. The local optimization approach deals with
optimization within the local sites whereas global optimization works with the
sites at different locations globally. Join ordering cost (JOC), Total Local
Processing Cost (TLPC) and Total Communication Cost (TCC) are used to obtain the
optimal query plans amongst the relation between the query sites. The
Experimental Analysis of the proposed approach showed that it has better
performance i.e. less cost when compared with other heterogeneous DDBMS and has
more cost when compared with the other existing homogeneous approaches. |
Keywords: |
Query Optimization, Heterogeneous Distributed Database Systems, Multi Objective
Genetic Algorithm, Teacher-Learning based Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
THE VALUE OF T-GIUESE-SUPPORTING USABILITY EVALUATION PRACTICES DURING
DEVELOPMENT PRODUCT: A CONTROLLED EXPERIMENT |
Author: |
FOUAD ABDULAMEER SALMAN, AZIZ BIN DERAMAN, MASITA BINTI ABDUL JALIL |
Abstract: |
Despite having different underlying concepts, both agile methods and usability
evaluation ultimately aim at producing high quality software. This paper
presents the results of an empirical study on incorporating usability evaluation
activities within an agile development plan. The study includes an experiment
testing the effectiveness and efficiency of the proposed tool in implementing
the quality aspect of usability. 32 novice participants were divided equally
into a group using the conceptual tool and another using ISO standards. Both
groups conducted a usability evaluation based on the same project (registered
students system). It is concluded that the conceptual tool significantly helps
inexperienced software teams to incorporate usability work within an agile
environment. |
Keywords: |
Controlled experiment, Usability Evaluation, Software Development Process, ISO
Standards |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
HOUGH TRANSFORM BASED WATERMARK EMBEDDING ALGORITHM IN DCT FREQUENCY DOMAIN |
Author: |
MOHAMMED ALSULTAN, THAER ALRAMLI , AMMAR ALBAYATI, ERSIN ELBASI |
Abstract: |
In this paper, an algorithm has been proposed that makes use of Hough transform
to locate the positions of lines in the cover image. The watermark was embedded
in these positions in the original DCT domain. The robustness of the new
algorithm has been evaluated and the experimental results were compared with the
Chaotic Sequence Based Watermarking algorithm, which also work in the DCT
domain. The Compression has been done depending on the Performance evaluation
for imperceptibility and robustness of proposed algorithms. Several attacks were
also used and peak signal to noise ratio (PSNR) value was calculated for cover
image and watermarked image. Similarity ratio (SR) for the extracted watermark
was also calculated. The Hough-based Watermark technique has been found robust
against Gaussian, Histogram, Intensity, Gamma and Corp attacks. Whereas, the
Chaotic-based Watermark technique was observed robust against Gaussian, Mean
filter, Rotation, Histogram, Intensity, Gamma and Corp attacks. |
Keywords: |
Chaotic Sequence, Digital Watermarking, Discrete Cosine Transform (DCT), Hough
Transform, Peak Signal to Noise Ratio (PSNR) |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
Title: |
PARALLEL K-MEANS FOR BIG DATA: ON ENHANCING ITS CLUSTER METRICS AND PATTERNS |
Author: |
VERONICA S. MOERTINI , LIPTIA VENICA |
Abstract: |
K-Means clustering algorithm has been enhanced based on MapReduce such that it
works in distributed Hadoop cluster for clustering big data. We found that the
existing algorithm have not included techniques for computing the cluster
metrics necessary for evaluating the quality of clusters and finding interesting
patterns. This research adds this capability. Few metrics are computed in every
iteration of k-Means in the Hadoop’s Reduce function such that when it is
converged, the metrics are ready to be evaluated. We have implemented the
proposed parallel k-Means and the experiments results show that the proposed
metrics are useful for selecting clusters and finding interesting patterns. |
Keywords: |
Clustering Big Data, Parallel k-Means, Hadoop MapReduce |
Source: |
Journal of Theoretical and Applied Information Technology
30th April 2017 -- Vol. 95. No. 8 -- 2017 |
Full
Text |
|
|
|