|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2016 | Vol. 91 No.2 |
Title: |
EMERGENCY STATIONS IN THE GRAND MOSQUE OF MECCA AS AN APPLICATION FOR WIRELESS
SENSOR NETWORKS |
Author: |
ALI IBRAHIM LATIF, MARINI OTHMAN, NOR'ASHIKIN BTE ALI, YUSOR RAFID BAHAR AL-MAYOUF,
OMAR ADIL MAHDI |
Abstract: |
During the annual Hajj pilgrimage, a large number of pilgrims suffer death as a
result of misadventure and natural causes. Others, unfamiliar with the location,
become lost in the crowds. As the demands of catering to the needs of
ever-growing numbers of pilgrims visiting the Sacred Mosques increase, crowd
control and communication between pilgrims and those responsible for the
provision of services remains a significant issue for both the local authority
and the pilgrims themselves. This paper reports how, in order to alleviate some
of these problems, wireless sensor network stations should be established as
emergency fixed stations. Such stations should be strategically situated
throughout the holy mosque to assist rescue teams in locating and recovering
lost pilgrims. Important factors in selecting the type of sensor are the power
it consumes, its range and financial cost. The best combination of these factors
can be found in the RF Engines sensor produced by Synapse. In modelling the
network characteristics of this sensor in a variety of circumstances, the
results demonstrate stability in sending and resaving packets with low rates of
delay and dropped packet. In view of these results and due to the limited size
of the network, high network performance can be anticipated. |
Keywords: |
Crowds, Wireless sensor network, Station, RF Engines, Dropped packet |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
E-COMMERCE ADOPTION IN PENINSULAR MALAYSIA: PERCEIVED STRATEGIC VALUE AS
MODERATOR IN THE RELATIONSHIP BETWEEN PERCEIVED BARRIERS, ORGANIZATION READINESS
AND COMPETITOR PRESSURE |
Author: |
SENG CHEE LIM, AHMAD SUHAIMI BAHARUDIN, RONG QUAN LOW |
Abstract: |
This research proposed a parsimony model by combined two streams of theories:
technological organizational environmental framework and perceived strategic
value to seek more information to explain the e-commerce adoption phenomena in
Peninsular Malaysia. Three predictor variables namely: Perceived Barriers,
Organization Readiness and Competitor pressure and three moderators namely:
operational support, managerial productivity, and strategic decision to
investigate e-Commerce adoption. A total of 1200 survey questionnaires were sent
to target audiences. After 3 months, 300 datasets were returned, and 217
datasets are useful. SmartPLS and SPSS tools used to perform data analysis.
Perceived Barriers is not significant for small and medium sized enterprises.
Perceived strategic value does not has any influence on small sized enterprises
but it has a strong influence to medium sized enterprises to adopt e-Commerce.
Three research questions used to guide for the research: (i) What is the level
of e-Commerce adoption, (ii) Do perceived barriers, organization readiness and
competitor pressure have relationship with e-Commerce adoption and (iii) Do
perceive strategic value has moderation effects on the relationship between
predictor variables and dependent variable. |
Keywords: |
Adoption, Small Medium Enterprises, Perceived Strategic Value, E-Commerce |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
FACE RECOGNITION USING ARTIFICIAL NEURAL NETWORKS IN PARALLEL ARCHITECTURE |
Author: |
BATYRKHAN OMAROV, AZIZAH SULIMAN, KAISAR KUSHIBAR |
Abstract: |
Face detection and recognition is the main aspect for different important areas
such as video surveillance, biometrics, interactive game applications, human
computer interaction and access control systems. These systems require fast real
time detection and recognition with high recognition rate. In this paper we
propose implementation of the Artificial Neural Network by using high
performance computing architecture based on Graphics Processing Unit to get face
recognition with high accuracy and more speedup. There, we consider a parallel
training approach for backpropagation algorithm for face recognition. For the
high performance of face recognition it was used Compute Unified Device
Architecture (CUDA) on a GPU.
The experimental results demonstrate a significant decrease on executing times
and greater speedup than serial implementation. |
Keywords: |
Artificial Neural Networks, CUDA, Face recognition, GPU, Parallel Computing |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
APPLICATION OF GREEN ENERGY FOR BATIK PRODUCTION PROCESS |
Author: |
RAMADONI SYAHPUTRA , INDAH SOESANTI |
Abstract: |
Batik is a piece of cloth applied by means of a dye-resist technique using
"batik-wax" as the resisting medium. Batik has been named as the cultural
heritage of Indonesia, which has been recognized by the world. As generally in
Indonesia, batik industry is currently still a class of small and medium
enterprises (SMEs). One of the quite popular in Indonesia is Yogyakarta batik.
There are some Batik SMEs in Yogyakarta. The issue of the SMEs is that the
production process is still using kerosene stoves, while the price of kerosene
is very expensive. In addition, the use of kerosene means using fossil fuels
that produce environmental pollution. Therefore, in this paper described the
application of environmentally friendly green energy sources for the production
process of batik. The energy source is the installation of solar home system.
The system is used to distribute electrical power to the batik electric stove.
The use of solar home system and batik electric stoves is more practical and
economical than kerosene stove. Another advantage is to reduce dependence on
fossil fuels and help preserve the environment with the use of green technology.
Applications of green technology in Yogyakarta Batik SMEs help continuity of
batik production. This is in accordance with the needs of both SMEs who have
often experienced a power outage that disrupts batik production process,
especially if using an electric stove for batik. Solar home systems installation
and procurement of electric stoves for batik has managed to increase both
production capacity and gross profit of the SMEs. |
Keywords: |
Green Energy, Solar Home Systems, Smes Batik, Batik Electric Stove, Community
Development. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
ONTOLOGICAL MODELING OF MORPHOLOGICAL RULES FOR THE ADJECTIVES IN KAZAKH AND
TURKISH LANGUAGES |
Author: |
LENA ZHETKENBAY, ALTYNBEK SHARIPBAY, GULMIRA BEKMANOVA, UNZILA KAMANUR |
Abstract: |
This work aims to study the ontological model of morphological rules used in
forming adjectives of Kazakh and Turkish languages. The analysis used in this
work allows comparing the similarities and differences between the
above-mentioned languages. The results taken can be used to create semantic
translation systems that would be able to translate from Kazakh language into
Turkish and vice versa, also for e-learning these languages through computers or
the Internet. |
Keywords: |
Natural language processing, Adjective, Morphological rules, Ontological
modeling, Machine translation |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
CUSTOMER KNOWLEDGE MANAGEMENT: DEVELOPMENT STAGES AND CHALLENGES |
Author: |
ARASH KHOSRAVI , AB RAZAK CHE HUSSIN |
Abstract: |
Customer knowledge management (CKM) is necessary for firms in order to benefit
from customer engagement which is referred as active involvement in innovative
product or service development. Providing customized product and enhancing
quality of service and product without successful CKM is not possible. However,
organizations face major challenges concerning CKM. In this study,
organizational, human and technological challenges of CKM were investigated.
Then, the CKM development phases in the organizations are discussed. Finally,
the organizational, human and technological challenges of each phase and the
main CKM process of each phase are identified. Scholars and practitioners can
use this research to estimate the current CKM phase of each organization and the
challenges that the firms might face during the current and upcoming phases. |
Keywords: |
Customer Engagement, Customer Knowledge Management (CKM), CKM Challenges, CKM
Process, CKM stages, Customer Relationship Management, Knowledge Management |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
FUZZY LOGIC CONTROLLER FOR DEPTH CONTROL OF UNDERWATER REMOTELY OPERATED VEHICLE |
Author: |
MOHD SHAHRIEEL MOHD ARAS, SHAHRUM SHAH ABDULLAH, SITI YASMIN BINTI OTHMAN,
MARIZAN SULAIMAN, MOHD FARRIZ BASAR, MOHD KHAIRI MOHD ZAMBRI, MUHAMMAD NIZAM
KAMARUDIN |
Abstract: |
Nowadays, unmanned underwater vehicle (UUV) is created to reduce human
intervention in deep-water application. UUV can help human to make an underwater
application that commonly used in deep water industries. During operation, the
UUV undergoes a complex multi-axis motion trajectories that are highly nonlinear
because the subsystems in the UUV are ill-defined and strongly coupled to each
other. The conventional controller such as Proportional, Integral and Derivative
(PID) and Proportional and Derivative (PD) have a problem to control nonlinear
operation. The conventional controller hardly to achieve zero overshoot.
Implementation of the controller on the UUV using Fuzzy Logic Controller (FLC)
itself poses its own level of complexity. Consequently, implementation of FLC
also requires fast and high-performance processors. The objectives of this paper
are to study the effect of the tuning membership function to improved
performances of the FLC for depth control using actual underwater Remotely
Operated Vehicle (ROV) based on VideoRay ROV Pro III as well as to analyze
performance of system response of depth control in terms of zero overshoot,
faster rise time and small steady state error. Then, the proposed approach is
verified using hardware interfacing between MATLAB/Simulink and Microbox
2000/2000C. The result shows FLC gives rather best performance in term of faster
rise time, zero overshoot and small steady state error as compared with
conventional controllers. |
Keywords: |
Fuzzy Logic Controller; Depth Control; Remotely operated Vehicle; Tuning
Membership Function |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF AN EMBEDDED SYSTEM TO ANALYSIS AN ECG SIGNAL FOR
HEART DIAGNOSIS SYSTEM |
Author: |
AZMI A. BASAIF, S. A. ALJUNID, NASEER SABRI, M. IQBAL OMER. M. S. SALIM |
Abstract: |
In recent times, Biometric recognition has appeared to be among the applications
where there is necessity for privacy of information relating to health care
matters. The focus of this study is on embedded Heart disease diagnosis system
for individual centered on the Electrocardiographic (ECG) biometrics. This
proposed real time system design is a diagnostic algorithm that extracts
information from the ECG wave signal on architecture based Single Board Computer
(SBC) represented by the Raspberry PI Platform. The proposed system is targeted
to be free standing, and in situ heart abnormality identifying beside warning
system. In addition the system is easy to use in different environments.
Preliminary results show the successful implementation in an embedded platform,
enabling its usage on a countless of operations. |
Keywords: |
ECG Embedded System, Raspberry Pi, Diagnose of heart Diseases |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
EXTENDED PERFECT AND IMPERFECT REPEATS FINDER USING MOLECULAR DNA SEQUENCES |
Author: |
DR. RAJU BHUKYA |
Abstract: |
Microsatellites are ubiquitous short tandem repeats found in all known genomes
and are known to play a very important role in various studies and fields
including DNA fingerprinting, paternity studies, evolutionary studies, virulence
and adaptation of certain bacteria and viruses etc. Therefore, it is of
importance to study distribution, enrichment and polymorphism of microsatellites
in the genomes of interest. For this, the prerequisite is the availability of a
computational tool for extraction of microsatellites (perfect as well as
imperfect) and their related information from whole genome sequences.
Examination of available tools revealed certain lacunae in them and prompted us
to develop a new tool. |
Keywords: |
DNA Sequence, Microsatellites, Perfect, Imperfect, Extension of repeats. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
USING AMPLIFY-AND-FORWARD RELAY FOR COVERAGE EXTENSION IN INDOOR ENVIRONMENTS |
Author: |
MOUBACHIR MADANI FADOUL, MARDIAH BINTI MORSIN, CHEE YEN LEOW, AKAA AGBAEZE ETENG |
Abstract: |
Cooperative communication is a promising method for increasing the capacity and
extending the coverage between a base station (BS) and a mobile user (MU) by
using relays to exploit cooperative diversity. However, the existing literature
mainly focuses on theoretical performance evaluation without experimental
validation and, thus, fails to address the effects on real-world radio signal
propagation. This research, therefore, aims to develop a prototype
amplify-and-forward (AF) relay using software-defined radio (SDR) to evaluate
the real-world performance of such a relay in improving coverage. The proposed
relay is developed using the LabVIEW software and programmed on a National
Instruments-Universal Software Radio Peripheral 2922 (NI-USRP 2922) SDR
platform. The major merit of this entire communication setup is less expensive
as the system uses a reprogrammable hardware. The measurements are performed
indoors, and the signal strength or received power at the MU in cases with and
without the relay is recorded. The results show that the received power
performance and signal-to-noise ratio (SNR) at the user improve significantly
when the AF relay is deployed compared to when direct link point-to-point
transmission without the relay is used. |
Keywords: |
Cooperative communication, Amplify-and-forward Relay, Software-defined-radio,
GNU radio, SNR |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
TABLE-BASED MATCHING APPROACH USING GENETIC ALGORITHM FOR FEATURE SELECTION IN
TEXT CATEGORIZATION |
Author: |
B. SUNIL SRINIVAS, A. GOVARDHAN |
Abstract: |
Text categorization is a significant approach to manage the increasing text data
on the Internet and is a significant research issue since the out bursting of
digital and online web where numerous documents are available online and has
been increased greatly in recent years. In this paper, a modified version of
Table aided Matching algorithm for text categorization is proposed. This
approach addressed the issue of huge dimension in order to maximize the
computational efficiency and accuracy. The genetic algorithm has the ability to
solve this approach. Thus, prior to classification, the dimensionality reduction
technique is employed where the size of the documents in each profile is
minimized. The performance evaluation of the suggested approach is matched with
the two existing classification methodologies and has been demonstrated that the
proposed approach has better results matched with existing approaches. |
Keywords: |
Text Categorization, Feature Selection, Genetic Algorithm, Table-based Matching
Approach, Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
USING DATA MINING IN TELECOMMUNICATION INDUSTRY: CUSTOMER’S CHURN PREDICTION
MODEL |
Author: |
RAYAN MASOUD, TARIG MOHAMED AHMED |
Abstract: |
The field of telecommunication is a highly competitive environment. So,
telecommunication companies seek to maintain a prominent place in the light of
this competitiveness. Also, they seek to acquire new subscribers and retain
their subscribers and gain their satisfaction. To ensure that they have a place
in this competition, companies must develop their systems and gain knowledge
about their subscribers and reasons that may cause them move to their
competitors. The using of data mining techniques has become a more common means
of acquiring knowledge in a number of different areas. This paper aims to
develop a model to predict the churn to rival companies. The model can help
companies to know the reasons that may lead to the churn. Three classifiers CN2
(Rules Leaner), Decision Tree and Naïve Bayes were used to build the model. In
addition, the dataset was obtained from Columbia University for the purposes of
scientific research to develop the proposed model. To evaluate the model
performance, F-Measure, classification accuracy, recall and precision were used.
The model was implemented using Orange Data Mining Application. The result
mentioned that CN2 is the best classification algorithm to build the predicted
model. |
Keywords: |
Telecommunication; data mining; Churn; Classification |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
A2SIET - AUTOMATIC DETECTION OF MULTIPLE TUMOR S THROUGH MAGNETIC RESONANCE
IMAGE USING MATLAB |
Author: |
B.SRIKANTH, Dr. E. SREENIVASA REDDY |
Abstract: |
Image handing out is a lively research region in which medical representation
meting out is an extremely difficult field. Brain tumor is an irregular mass of
tissue in which a number of cells grow and increase nonstop it appears that
tolerant by the mechanism that manages sensual cells. Medical imaging technique
is used to image the internal portion of the human body for medical analysis.
When usual cell produce old or get upset, Research shows so as to people
exaggerated by brain multiple tumor s die due to their imprecise uncovering.
This paper presents a novel technique for finding of brain multiple tumor from
Magnetic Resonance Image Pre-processing the representation makes it ready for
apply the Innovative watershed segmentation (IWS) , Pre-processing include image
resizing and change to gray. In this research develop a new method Adaptive
Advanced Segmentation Image Enhanced Technique (A2SIET) of multi tumor line
recognition and segmentation is used to part the abnormal from the normal nearby
tissue to get a real recognition of concerned and non involved area that help
the surgeon to differentiate the concerned area exactly. |
Keywords: |
A2SIET, SVM, HOG, IWS, MRI. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
ENERGY AWARE ROUTING FOR MANETS BASED ON CURRENT PROCESSING STATE OF NODES |
Author: |
ARSHAD AHMAD KHAN MOHAMMAD, ALI MIRZA, SRIKANTH VEMURU |
Abstract: |
Wireless mobile ad hoc network composed of mobile nodes (MNs) without any
Pre-established Infrastructure. MNs are free to move and organized themselves to
form a network over radio Communication area. In this environment establishing
optimistic route between source to destination is challenging due to limited
battery powered heterogeneous mobile nodes. Thus MANETs needs an efficient
dynamic routing protocol with respect to energy in order to extend the network
lifetime. In this work, we design a new energy aware reactive routing protocol
for MANETs to avoid the node to become bottleneck. This Mechanism addresses the
two important network performance attributes i.e., network lifetime & link
stability. Performance analysis has been evaluated with the help of NS2.
Simulation results indicate that our developed mechanism is better than the
existing energy aware AODV routing protocols. |
Keywords: |
Energy, AODV, MANETs, Route Discovery Time, Throughput, Packet Loss. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
GAME THEORY AND FUZZY BASED LOAD BALANCING TECHNIQUE FOR LTE NETWORKS |
Author: |
D. HARI BABU , DR. A. SELWIN MICH PRIYADHARSON |
Abstract: |
In LTE Networks, during load balancing, the adverse effects of radio link
failure on the handoff performance are not considered. In order to overcome this
issue, in this paper, we propose to design a game theory and fuzzy logic based
load balancing technique for LTE networks. In this technique, the load balancing
is triggered based on the status of each cell which is estimated using fuzzy
logic. Here the metrics call blocking ratio, transmit power, composite available
and missing capacity are considered as input for the fuzzy logic and the status
of cell is determined as output. Based on the cell status, the load balancing is
triggered and the dynamic hysteresis adjustment is performed based on the game
theory model. By simulation results, we show that the proposed technique
minimizes the radio link failure. |
Keywords: |
Load Imbalance, Self-Optimization, LTE, Fuzzy Logic, Game Theory, 3GPP |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
INVERSE OPTIMAL CONTROL OF SWITCHED DISCRETE NONLINEAR SYSTEMS USING CONTROL
LYAPUNOV FUNCTION WITH ADJUSTED PARAMETER AND DISCRETE PARTICLE SWARM ALGORITHM |
Author: |
MOUADH SAKLY, ANIS SAKLY, NESRINE MAJDOUB, FAOUZI M SAHLI |
Abstract: |
In this paper, the optimal control problem for switched discrete nonlinear
systems, using Control Lyapunov Function with adjusted parameter, is studied to
minimize the performance criterion. Two main stages are proposed, the first one
is to find the optimal control of discrete systems using Control Lyapunov
Function (CLF) and a speed gradient algorithm; whereas the second stage consists
in applying the Particle swarm approach in order to come up with the optimal
switching instants between the sub-systems. |
Keywords: |
Switched Discrete Nonlinear Systems, Particle Swarm Algorithm, Control Lyapunov
Function (CLF), Speed Gradient Algorithm, Adjusted Parameter. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
DYNAMIC GESTURE RECOGNITION FOR NATURAL HUMAN SYSTEM INTERACTION |
Author: |
HAJAR HIYADI, FAKHREDDINE ABABSA, CHRISTOPHE MONTAGNE, EL HOUSSINE BOUYAKHF,
FAKHITA REGRAGUI |
Abstract: |
This paper addresses two problems: 3d dynamic gesture recognition and gesture
misallocation. In order to solve these problems, we propose a new approach which
combines Hidden Markov Models (HMM) and Dynamic Time Warping (DTW). The proposed
approach has two main phases; first, recognizing gestures using a hidden Markov
model. Second, avoiding misallocation by rejecting gestures based on a threshold
computed using DTW. Our database includes many samples of five gestures obtained
with a Kinect and described by depth information only. The results show that our
approach yields good gesture classification without any misallocation and it is
robust against environmental constraints. |
Keywords: |
Dynamic Gesture Recognition, Hidden Markov Model, Dynamic Time Warping, Kinect,
Depth image. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
DES SECURED K-NN QUERY OVER SECURE DATA IN CLOUDS |
Author: |
RANJEETH KUMAR M, N SRINIVASU, LOKANATHA C REDDY |
Abstract: |
Protecting databases or data contents from the web world environment is a tough
task for a company. Because every Company/ Financial Institute/ Hospital was
hiding their customers or end users list secretly and will not open for all. But
now Tom’s gang (Hackers) made this possible and tries stealing the data and
major portion. In these conditions securing the data outsourcing area such as
web hosting and cloud space storage option are becoming very prominent. To
manage the situation many were out with secured sharing solutions. Now one more
novel approach with high secured and efficient sharing option in data retrieving
by end user is demonstrating in this paper. The technique is comprises with two
famous algorithms one is DES an encryption scheme and the next is K-NN query
passing and data retrieving code. |
Keywords: |
Tom s Gang, Cloud Spacing, Secured, Sharing, DES, K-NN, Query. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
CLASSIFICATION OF IRIS IMAGE OF PATIENT CHRONIC RENAL FAILUR (CRF) USING
WATERSHED ALGORITHM AND SUPPORT VECTOR MACHINE (SVM) |
Author: |
Iridology is an alternative method in studying the condition of human internal
organ through the image of iris. Iris chart has been introduced by scientists
(Bernard Jensen) long time ago. In this paper we classified the iris image of
patients CRF (Chronic Renal Failure) on stage 5 (End Stage of Renal Disease).
Sixty one hemodialysis patients and 21 healthy volunteer with normal or nearest
normal kidneys participated in this research. Iris image of CRF patients were
taken using specific iris camera. Watershed transform technique was used to
extract the features of iris image of hemodialysis patients. The ROI (region of
interest) of iris image of renal organ is at 5.35-5.95 (2520 – 2680) for right
eye and at 6.05-6.6 (2720 - 2880) for left eye assuming that the circle of iris
is divided into 120 points (3600). The medical records of participants were used
to validate the result of this study. The result showed that 87.5% of patients
hemodialysis has shown broken tissue on their right iris and 89.3% has shown
broken tissue on their left iris. In conclusion, the condition of renal organ of
CRF patients mostly showed broken tissue in their iris image. SVM was used to
recognize the iris image whether it contains broken tissue that showing kidney
disease or not, and the accuracy showed that for learning and testing dataset,
best mean of precission is 87.5% and best mean recall is 91.7% given by the
percentage split 90 (where the data training was 90% and data testing was 10%). |
Abstract: |
Iridology, Iris Image Processing, Chronic Renal Failure, Watershed Algorithm,
SVM |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
TECHNICAL REVIEW OF RRM FOR CARRIER AGGREGATION IN LTE-ADVANCED |
Author: |
HAITHAM S BEN ABDELMULA, M. N.MOHD WARIP, ONG BI LYNN, NAIMAH YAAKOB |
Abstract: |
With the purpose of satisfying what is required for future IMT Advanced mobile
systems, 3GPP presented carrier aggregation (CA) in its latest LTE-Advanced
criterions. Although carrier aggregation permits accumulation of carrier
components (CCs) disseminated inside and transversely in different bands
(intra/inter-band) along with CCs grouping possessing different bandwidths, the
expectation is that the carrier aggregation provides a commanding improvement to
the user throughput in LTE-Advanced (LTE-A). CA will permit the achievement of
the target peak data rates in excess of 1 Gbps in the downlink and 500 Mbps in
the uplink and the users has the right to use up to 100 MHz total of bandwidth.
Nonetheless, the carrier aggregation (CA) introduced is mentioned in LTE Rel.
10, has essential changes from the baseline LTE Rel. 8 even though individual CC
in LTE-A stays backwardly attuned with LTE Rel.8. This article offers carrier
aggregation methods’ review and the supported scenarios; subsequently
necessities on radio resource management (RRM) functionality supporting CA.
On-going research on the diverse algorithms supporting CA in LTE-Advanced are
charted. |
Keywords: |
Carrier Aggregation (CA), Component Carrier (CC), Radio Resource Management
(RRM) |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
A TAXONOMY OF PENDING INTEREST TABLE IMPLEMENTATION APPROACHES IN NAMED DATA
NETWORKING |
Author: |
RAAID ALUBADY, SUHAIDI HASSAN, ADIB HABBAL |
Abstract: |
Content-Centric Networking/Named Data Networking (CCN/NDN) architecture
introduces a novel paradigm for the future of the Internet by moving the current
system to cutting edge network protocols. Generally, the main goals of CCN/NDN
are to improve the traditional network operations by having devices that are
aware of content’s name, to route the decisions that are taken based on the
content’s name of the consumers' requests. Despite the numerous advantages out
of this shift, hardware challenges, including Pending Interest Table (PIT) are
still existing in respect to CCN/NDN implementation in terms of memory that is
fast in time accessing and large packet storing. In addition, designing,
implementing, and evaluating a fast and enough PIT with higher capacity is
certainly another issue in respect to both packet processing and router storage.
Furthermore, existing memory technology that is deployed in PIT, such as DRAM
and SRAM, is presenting further limitation. Therefore, PIT should be able to
serve a very large number of Interest (scalability). Significant works have been
presented by several researchers concerning the scalability of PIT, in
accommodating more interest; however, there are remaining possibilities for more
improvement in such a context. This paper aims to classify an extensive and
critical concerning PIT implementation in a concise manner. Then identifying
their strength and weaknesses and underline the necessary requirements for
better PIT improvement in terms of scalability. |
Keywords: |
Information Centric Networks, Named Data Networking, Scalability, Pending
Interest Table. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
Title: |
AWARENESS, PERCEPTION & BARRIER: AN EMPIRICAL STUDY OF CAMPUS ERP IMPLEMENTATION |
Author: |
RAJA MOHD TARIQI RAJA LOPE AHMAD, ZALINDA OTHMAN, MURIATI MUKHTAR, MOHD FAHMI
MOHAMAD AMRAN, WAN AZLAN WAN HASSAN@WAN HARUN, AZHAR HAMID, SUZIYANTI MARJUDI |
Abstract: |
The ERP system must provide a business with wide collection of functionalities
supported by features like flexibility, modularity, widespread, finest business
processes and global focus. Recently, Institution of higher learning has
invested considerable resources in the implementation of the Enterprise Resource
Planning (ERP) systems. Similar to the experiences in other industries, there is
a risk that these systems fail in the higher education environment due to poor
planning and preparation. Therefore, it is interesting to do a strategic
research towards implementing the campus ERP. The study is focused on the level
of Campus ERP implementation and the level of awareness against the ERP
implementation in education industries, identify perceptions of implementing
Campus ERP and identify the barriers of implementing Campus ERP. The respondents
are at the private institution of higher learning with University and College
University status. |
Keywords: |
Enterprise Resource Planning, Academic Institutions, Awareness, Perception,
Barriers |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2016 -- Vol. 90. No. 2 -- 2016 |
Full
Text |
|
|
|