|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
| |
|
Journal of Theoretical and Applied Information Technology
November 2009 | Vol. 9. No.1 |
Title: |
FAIR AND SCALABLE WIRELESS MULTI-PLAYER
GAMING SYSTEM |
Author: |
ELHAM VAZIRIPOUR, MOHAMMAD-REZA
KHAYYAMBASHI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
Multi-player games are engaging because of
social interaction and competing with real players. Currently, many digital
games are multi-player or have multi-player features. When evaluating the
playability of multi-player games, we need to consider fairness of interactions.
This paper develops a mobile distributed system for dependable mobile games over
WLANs , meeting the requirements of fairness, scalability, responsiveness and
equilibrium. |
|
Full
Text |
|
Title: |
OPTIAL WEB SERVICE COMPOSITION USING
HYBRID GA-TABU SEARCH |
Author: |
Sondos Bahadori, 2 Somayeh Kafi, 3 Kamran
Zamani far, 4 Mohammad Reza Khayyambashi |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
Web services are rapidly changing the
landscape of software engineering. One of the most interesting challenges
introduced by web services is represented by Quality of Service (QoS) _aware
composition and late binding. This allows to bind, at run-time, a service
oriented system with a set of services that, among those providing the required
features, meet some nonfunctional constraints, and optimize criteria such as the
overall cost or response time. In other words, QoS_aware composition can be
modeled as an optimization problem. We propose to adopt Genetic Algorithms to
this aim. In order to increase the performance of genetic algorithm we use Tabu
search. By using Tabu search ultimately a kind of composition is selected which
is in close connection with user wants. |
|
Full Text |
|
Title: |
ENHANCE FUZZY COMMITMENT SCHEME: AN
APPROACH FOR POST QUANTUM CRYPTOSYSTEM |
Author: |
J.P.PANDEY1, D.B.OJHA, AJAY SHARMA |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
This paper attempt has been made to
explain a fuzzy commitment scheme with McEliece scheme because the efficiency
and security of this cryptosystem is comparatively better than any other
cryptosystem. Since this scheme is one of the interesting candidates for post
quantum cryptography. Hence our interest to deal this system with fuzzy
commitment scheme . |
|
Full Text |
|
Title: |
ROBUST TECHNIQUES FOR DESIGNING POWER
SYSTEM STABILIZER |
Author: |
ZIAD M. M. ALI , ALEXANDER I. MALIKOV |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
This paper introduces an analysis of the
phenomena of stability of synchronous machines under small perturbations by
examining the case of a single machine connected to a large system through
external impedance, and uses robust control H∞ techniques to design stabilizer
for electric power system. H∞ techniques that are used are H∞ -optimal
controller synthesis, H∞ - mixed sensitivity controller synthesis and H∞- loop
shaping controller synthesis. |
|
Full Text |
|
Title: |
WEB CACHING USING RANDOMIZED ALGORITHM IN
WEB PERSONALIZATION |
Author: |
G.N.K.Suresh Babu and Dr.S.K.Srivatsa |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
This paper defines the usage of our
randomized algorithm in web personalization area. The web personalization is
performing under four techniques the handicraft decision technique,
hyperlink-based technique, content-based filtering, and collaborative filtering.
In our paper we are considering these technique for improve our proxy server�s
performance. The proposed item specifies the implementation of randomized
algorithm is for the website managers establish decision rules according to the
statistics of users or session history. So the required files are filtered in an
efficient manner according to our algorithm, moreover from this algorithm we
improve our system�s efficiency, frequency and memory. |
|
Full Text |
|
Title: |
TRANSLATED NIGERIA STOCK MARKET PRICES
USING ARTIFICIAL NEURAL NETWORK FOR EFFECTIVE PREDICTION |
Author: |
Akinwale Adio T, Arogundade O.T. and
Adekoya Adebayo F. |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
This paper used error back propagation
algorithm and regression analysis to analyze and predict untranslated and
translated Nigeria Stock Market Price (NSMP). Nigeria stock market prices were
collected for the periods of seven hundred and twenty days and grouped into
untranslated and translated train, validation and test data. A zero mean unit
variance transformation was used to normalize the input variables in order to
allow the same range which makes them to differ by order of magnitude. A 5-j-1
network topology was adopted because of five input variables in which variable j
was determined by the number of hidden neurons during network selection. The
untranslated and translated data served as input into the error back propagation
algorithm and regression model which were written in Java Programming Language.
The results of both untranslated and translated statements were analyzed and
compared. The performance of translated NSMP using regression analysis or error
back propagation was more superior than untranslated NSMP. The results also
showed that percentage prediction accuracy of error back propagation model on
untranslated NSMP ranged for 11.3% while 2.7% was for translated NSMP. The 2.7%
percent accuracy as against 11.3% indicates the relative stability of translated
NSMP prediction as against untranslated NSMP. The mean relative percentage error
was very low in all hidden topologies of error back propagation of translated
NSMP than untranslated NSMP. This indicates that translated NSMP prediction
approach was superior to untranslated NSMP predicition. |
|
Full Text |
|
Title: |
A PERSPECTIVE OF DATA MINING METHOD BASED
ON DRBF NEURAL NETWORKS |
Author: |
S. SAI SATYANARAYANA REDDY, P.ASHOK REDDY,
V.KRISHNA REDDY |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
Recently there has been significant
advances in the use of wavelet network methods in various data mining processes,
With the extensively application of many databases and sharp development of
Internet, The capacity of utilizing information technology to fabricate and
collect data has improved greatly. It is an imperative problem to mine useful
information or knowledge from large databases or data warehouses. Therefore,
data mining technology is urbanized rapidly to meet the need. But data mining
often faces so much data which is raucous, disorder and nonlinear.
Providentially, ANN is suitable to solve the before-mentioned problems of DM
because ANN has such merits as good vigor, flexibility, parallel-disposal,
distributing-memory and high tolerating error. This paper gives a detailed
discussion about the relevance of ANN method used in DM based on the analysis of
all kinds of data mining technology, and especially lays stress on the
categorization Data Mining based on RBF neural networks. Pattern classification
is an important part of the RBF neural network function. Under on-line
environment, the training dataset is variable, so the batch learning algorithm
which will generate plenty of surplus retraining has a lower efficiency. an
suitable metric for imbalanced data is applied as a filtering technique in the
context of Nearest Neighbor rule, to improve the classification accuracy in RBF
and MLP neural networks This paper deduces an incremental learning algorithm
from the gradient descend algorithm to improve the blockage. ILA can adaptively
adjust parameters of RBF networks driven by minimizing the error cost, without
any surplus retraining. Using the method projected in this paper, an on-line
cataloging system was constructed to resolve the IRIS classification problem. |
|
Full Text |
|
Title: |
A 0-1 MODEL FOR FIRE AND EMERGENCY SERVICE
FACILITY LOCATION SELECTION:A CASE STUDY IN NIGERIA |
Author: |
AROGUNDADE O.T., AKINWALE A.T.; ADEKOYA
A.F. AND AWE OLUDARE G |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
Facility location selection problem is a
variant of set covering problem. Set covering problem is a classical problem in
computer science and complexity theory. In this paper two different techniques
are applied to facility location problems. First, a mathematical model of
facility location is introduced and solved by using optimization solver, TORA.
Secondly, the balas additive algorithm of branch and bound techniques is used to
solve the facility location problem. Tests were made using real life data from a
city in Nigeria. We then observed that both algorithms indicate the same number
of fire stations in different locations. Also the results obtained by applying
and implementing balas additive were more explanatory by specifying the names of
the locations where the facilities are to be located and the names of the
locations to be served by each of the facilities |
|
Full Text |
|
Title: |
BUSINESS INTELLIGENCE: CONCEPTS,
COMPONENTS, TECHNIQUES AND BENEFITS |
Author: |
JAYANTHI RANJAN |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
For companies maintaining direct contact
with large numbers of customers, however, a growing number channel-oriented
applications (e.g. e-commerce support, call center support) create a new data
management challenge: that is effective way of integrating enterprise
applications in real time. To learn from the past and forecast the future, many
companies are adopting Business Intelligence (BI) tools and systems. Companies
have understood the importance of enforcing achievements of the goals defined by
their business strategies through business intelligence concepts. It describes
the insights on the role and requirement of real time BI by examining the
business needs. The paper explores the concepts of BI, its components, emergence
of BI, benefits of BI, factors influencing BI, technology requirements,
designing and implementing business intelligence, and various BI techniques. |
|
Full Text |
|
Title: |
CLOUD COMPUTING: AN OVERVIEW |
Author: |
SRINIVASA RAO V, NAGESWARA RAO N K, E
KUSUMA KUMARI |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
This overview gives the basic concept,
defines the terms used in the industry, and outlines the general architecture
and applications of Cloud computing. It gives a summary of Cloud Computing and
provides a good foundation for understanding. |
|
Full Text |
|
Title: |
IMPLEMENTATION OF BB84 PROTOCOL ON UDP
802.11i |
Author: |
NUR HANANI KAMARUL AIZAN, ZURIATI AHMAD
ZUKARNAIN, HISHAMUDDIN ZAINUDDIN |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 9. No. 1 -- 2009 |
Abstract |
Cryptography nowadays is looking for a
secure and trusted channel especially in key distribution between two legitimate
parties without being intercepted or decipher by intruders either in wireless or
wired communication medium. The invention of Quantum Cryptography as part of
quantum mechanics has solves the key distribution’s problem in cryptosystem by
providing a secure communication channel between two parties with absolute
security guaranteed by the laws of physics. Quantum Key Distribution (QKD) as a
new method in key distribution used to transmit secret key between two
legitimate parties. This paper will discuss the implementation of BB84 protocol
in UDP 802.11i Wireless Local Area Network (WLAN). WLAN as a wireless links are
much noisier and less reliable in general than wired links. This type of noise
will generate different numbers of key length and also different level of error
rate estimation. |
|
Full Text |
|
|
|