|                                                                                 
                                                             
                                                  
                                                                     
          
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
        
 
 
 August 2015 | Vol. 78  No.2  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DEVELOPING A HIGH PERFORMANCE REAL TIME PEOPLE DETECTION SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HILAL ADNAN FADHIL, AHMAD B. ALKHODRE , HAITHAM ALYOUSEF |  
|  			
									
Abstract: | 
 			
									
A lot of research has been conducted to detect people within images and video 
frames, Our goal in this research is to develop a protection system against 
thefts, by analyzing video frames incoming from surveillance cameras, and 
running early alarm to discover, detecting thieves in real time. Theft has many 
damages in the community. Failure in putting strategies for preventing theft has 
caused material, moral and psychological harm to the humans. All new technology 
comes to find rest and stability for the humans, by monitoring the properties 
especially when the owners are absent or far away. Now days the presence of 
cameras becomes very essential for monitoring places, it limits from theft , 
burglary, for this reason we have seen lot of theft occurs when a power outage. 
We want to prevent theft, narrowing the time for robbers and confusing them 
during robbery ,not only to alleviate its effects or pursuing criminals and 
disclosure them, this arrangements require more efforts and calling the 
police…etc. Our primary goal is for deterring criminals, we need achieving a 
preventive policy. In this research we could get a high rate of classification 
equivalent to 96% of detected humans in implementation time of approximately 0.5 
seconds. 
Within this article, we will review the previous studies which had been done for 
discovering, detecting the humans and the steps which performed effectively are 
beside what enhancements we've made for. in summary ,we will review the obtained 
optimal values of the used parameters and analyze them . |  
|  			
									
  										
			
Keywords:  | 
 			
									
Object Detection, Real Time Human Detection, Real Time ANTI-THEFT System, 
SURVEILLANCE System, People Detection, Background Removal In Video |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SLOTTED MICROSTRIP ANTENNAS FOR CIRCULAR POLARIZATION WITH COMPACT SIZE FOR RFID 
,BLUETOOTH &S-BAND APPLICATIONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
P.POORNA PRIYA, K.SAI NAGA SOWMITH, K.DINESH VARDHAN, P.TANMAYEE, K.MADHU PAVAN |  
|  			
									
Abstract: | 
 			
									
Micorstrip patch antennas play a major role in day to day life. In this paper 
the designed microstrip patch antenna is compact sized with circular 
polarization for RFID applications. Different arbitrary shaped slots like square 
circle plus are used and parameters like return loss, gain and frequency are 
observed for each of the patches. All these are done using ANSOFT HFSS . The 
antenna is fabricated using duroid as dielectric substrate (relative 
permittivity =2.2, loss tangent=0.0004) and coaxial feed. These designed 
antennas are fabricated and used in real time applications. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Micorstrip patch, RFID ,ANSOFT HFSS. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ONTOLOGY ASSISTED SEMI-SUPERVISED BUG REPORT CLASSIFICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SAKTHI KUMARESH, BASKARAN R |  
|  			
									
Abstract: | 
 			
									
Automated bug report clustering and classification plays a significant role in 
managing, assigning, and understanding the bug categories. The most challenging 
problem in bug report classification is the inadequate amount of labeled 
dataset. The proposed framework introduces an Ontology-assisted Semi-supervised 
Clustering Based Classification (OS-CBC) for bug reports amid a small size of 
the labeled dataset scenario. The proposed approach enriches the data set of the 
bug report using constructed Bug and Enriched Meta-feature Extraction (BEME) 
ontology. Semantic constraints based semi-supervised hierarchical clustering 
(Semantic-HAC) algorithm prioritizes the constraints for clustering the bug 
reports based on the BEME ontology. The cluster formation of bug reports depends 
on the transitive dissimilarity and ultrametric distance using ontology-based 
prioritized constraints. It extends the dataset (stretched) of the bug reports 
based on the maximum likelihood of the features in the cluster for labeling the 
unlabeled data. Moreover, the proposed approach categorizes the bug reports of 
stretched test set under the category of training set label using Multi-label 
Naive Bayes (MLNB) classifier. The classification technique focuses on the 
threshold based filtered weight of each term in the training set to improve the 
accuracy. The proposed OS-CBC approach significantly improves the classification 
accuracy of the bug reports.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Bug, Classification, Clustering, Ontology, Constraint, Semi-Supervised  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE INFLUENCE OF INTERNAL SYSTEM, EXTERNAL SYSTEM AND ETHIC TO THE SATISFACTION 
OF USER SYSTEM AND FINANCIAL INFORMATION QUALITY ALONG WITH THE PERFORMANCE OF 
FINANCIAL ACCOUNTING INFORMATION SYSTEM AT PRIVATE POLYTECHNIC IN EAST JAVA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MULYANTO NUGROHO, TRI RATNAWATI, SRIE HARTUTIE MOEHADITOYO |  
|  			
									
Abstract: | 
 			
									
The This study examines behavioral accounting on the basic theory of accounting 
information system. Respondents in this study were 123 respondents of the use of 
accounting information system in this study is composed of management director, 
deputy director, head of the study program, the head of the laboratory, faculty, 
staff users of information systems Private Polytechnics in East Java as many as 
123 respondents were categorized in population research questions in complete 
charge. The results in this study is that the Internal System is a system in the 
organization Polytechnic regarding internal control systems, the competence of 
the Human Resources, System Operating Procedure, and the support of top 
management, and External Systems regarding hardware and software can result in 
increased user satisfaction system Private Polytechnic in East Java. Internal 
system does not have a significant effect on the performance of financial 
accounting information systems, although in East Java Private Polytechnic System 
Internal Control, Human Resource Competency, Standard Operating Procedure, and 
top management support is good and this is because the level of compensation is 
still low so that the spirit of Human Resources still low. Internal systems, 
external systems, and Ethics significant effect and impact on improving the 
quality of financial information private Polytechnic in East Java. External 
Systems, Ethics, system user satisfaction, and quality of financial information 
have a significant effect on the performance of financial accounting information 
systems in East Java Private Polytechnic. Originality of this research is 
ethical path associated with the quality of financial information and ethical 
lines that are connected with the performance of financial accounting 
information system. Besides originality of this research external system 
pathways related with the system user satisfaction. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Internal System, External System, Ethic, The Satisfaction Of User System, 
Financial Information Quality, Performance Of Financial Accounting Information 
System. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SHADOW IDENTIFICATION USING ANT COLONY OPTIMIZATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
D. USHA NANDINI, DR. A. EZIL SAM LENI |  
|  			
									
Abstract: | 
 			
									
A novel method has been proposed for the identification of shadows in satellite 
images. The method is based on the use of Ant Colony Optimization (ACO) for the 
identification of shadows in remotely sensed images. The existence of shadow 
regions in images has been a hindrance to image analysis and hence accurate 
shadow detection and removal is still a current research topic. The proposed 
work is a combination of the previous techniques and an object based technique. 
The proposed work first identifies the edges of all the objects in the scene and 
then each object is analyzed using ant colony optimization to determine whether 
it is a shadow or a foreground object. The shadow regions are detected in a 
finite number of steps, considering the various properties of the shadow 
regions.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Ant Colony Optimization (ACO), Edge Detection, Shadow Detection, Shadow 
Properties, Threshold. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A COMPREHENSIVE HUMAN FACTOR FRAMEWORK FOR INFORMATION SECURITY IN ORGANIZATIONS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AREEJ ALHOGAIL, ABDURRAHMAN MIRZA, SAAD HAJ BAKRY |  
|  			
									
Abstract: | 
 			
									
Human factor represent an essential issue in the security of information in 
organizations, as human factor determine the behavior of the employees toward 
information security. This paper attempts to integrate related human factors, 
recognized by previous work, into a structured comprehensive framework. The 
framework has four main domains that take the form of a diamond. Two domains are 
concerned with the environment and management issues representing an 
organization dimension; while the other two are related to preparedness and 
responsibility issues giving an employee dimension. The domains at the four 
corners of the diamond interact with one another influencing the human behavior 
toward information security. Expert views on the framework have been collected 
through a survey that addresses the importance of its various components to 
human behavior. The framework provides a base for the future investigation of 
information security protection in organizations, and the development of 
controls for this purpose. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Human Factor; Information Security; Human Behavior; Information Security 
Controls; Insider (Employee) Threats |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
C.S. RAJARAJESWARI, M. ARAMUDHAN |  
|  			
									
Abstract: | 
 			
									
Cloud Computing is an innovative technology in the field of information 
technology. Federated cloud is an amalgamation of several cloud service 
providers. Since there are many cloud service providers in the federated cloud, 
users get confusion in choosing the best cloud service provider for their 
requirements. To choose the best cloud service from the available and eligible 
cloud service providers ranking concept is proposed. Poincare Plot method (PPM) 
based mathematical model is proposed to find the rank of the cloud service 
providers in federated cloud management system. The proposed ranking model 
reveals that the federated cloud model improves the performance of resource 
provisioning when compared to the existing rank model using Analytical Hierarchy 
Process (AHP). |  
|  			
									
  										
			
Keywords:  | 
 			
									
Federated Cloud, Service Level Agreement, Broker Manager, Cloud Broker, Cloud 
Ranking |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RANK BASED DOCUMENT CLUSTERING AND SUMMARIZATION APPROACH IN THE DISTRIBUTED P2P 
NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A.SRINIVASA RAO, Dr.Ch.DIVAKAR, Dr.A.GOVARDHAN |  
|  			
									
Abstract: | 
 			
									
Quick and high quality document clustering techniques play a vital role in text 
mining applications by grouping large text documents into meaningful clusters 
and enhancing the clustering accuracy using dimensionality reduction or query 
expansion. Detecting meaningful clusters and summaries in Distributed p2p 
network applies single document summarization techniques and peer relationships 
for detecting meaningful clusters and summaries. Traditional cluster based 
summarization methods usually suffer with the computation speed, compression, 
peer selection and sentence clustering in order to generate high quality 
summaries. Traditional document clustering and summarization methods assume node 
adjacency and neighborhood information to build clusters and summaries. Since 
the multilevel overlay p2p networks have suffered with node adjacency and 
duplicate information, it was difficult to generate optimal clusters and 
summaries within the peers. Proposed approach provides better solution to 
generate optimal document clustering using probabilistic k- representative 
clustering algorithm and forms efficient summaries using phrase rank based 
summarization. Experimental results give better performance in terms of 
execution time, entropy and cluster quality are concerned. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Document clustering, Summarization, Phrase ranking,P2P networks |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
WEB SERVICES COMPOSITION FOR CONCURRENT PLAN USING ARTIFICIAL INTELLIGENCE 
PLANNING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUHAMMAD AKMAL REMLI, SAFAAI DERIS, MAMOUN JAMOUS, MOHD SABERI MOHAMAD, 
AFNIZANFAIZAL ABDULLAH |  
|  			
									
Abstract: | 
 			
									
Automatic planning of web services composition is a challenging problem both in 
academia and real-world application. Artificial Intelligence (AI) planning can 
be applied to automate web services composition by depicting composition problem 
as AI planning problem. Web services composition would combine multiple services 
whenever some requirements cannot be fulfilled by a single service. 
Subsequently, many of the planning algorithms to detect and generate composition 
plan would focus only on sequence composition thus, neglecting concurrent 
composition. The aim of this paper is to develop an approach to generate a 
concurrent plan for web services composition based on semantic web services 
(OWL-S) and Hierarchical Task Network (HTN) Planning. A Bioinformatics case 
study for pathway data retrieval is used to validate the effectiveness of 
proposed approach. The planning algorithm extend Hierarchical Task Network (HTN) 
algorithm to solve the problem of automatic web service composition in the 
context of concurrent task planning. Experimental analysis showed that the 
proposed algorithms are capable of detecting and generating concurrent plan when 
compared with existing algorithms. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Web service composition, Semantic web service, Artificial Intelligent (AI) 
Planning, Hierarchical Task Network (HT) Planning, |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CADSSO: A DEVELOPMENT APPROACH FOR CONTEXT-AWARE SERVICE ORIENTED SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
M. LETHRECH, A. KENZI, I. ELMAGROUNI, M. NASSAR, A. KRIOUILE |  
|  			
									
Abstract: | 
 			
									
In this paper, we present our development approach named CADSSO (Context-Aware, 
Domain Specific and Service Oriented) for Context aware Service oriented 
Systems. CADSSO is organized in two stages: the modeling stage and the code 
generation stage. It is essentially based on the Domain Specific Modeling (DSM) 
approach. Indeed, the creation of the five models of the modeling stage is done 
using Domain Specific Languages (DSLs). The first model is Domain Specific 
Context Model, it represents the service execution context. The second is Domain 
Specific Service Model, it allows the services modeling. We also have the 
Service Variability Model which is used in the service variability modeling. The 
bond between Service Variability Model and Domain Specific Service Model is 
provided by Adaptation rules model. Finally, specific domain business modeling 
is done via domain specific business model. At code generation stage, a specific 
code generator transform all these models to final source code using a framework 
specifically designed for a given target platform. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Domain Specific Modeling (DSM), Domain Specific Language (DSL), Service Oriented 
Computing (SOC), Context-Aware Computing (CAC), Adaptation |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DYNAMIC BINARY LOCATION BASED MULTI-WATERMARK EMBEDDING ALGORITHM IN DWT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AMMAR JAMEEL HUSSEIN, SEDA YUKSEL, ERSIN ELBASI |  
|  			
									
Abstract: | 
 			
									
In order to achieve a good imperceptibility and robustness, using 4-level DWT 
algorithm based on dynamic binary host image location and embedding two 
watermark logos in different DWT levels are proposed for copyright protection 
and authenticity. In the propounded watermarking algorithm, 5-level DWT is 
applied to host image to obtain the fifth low frequency sub band (LL5), and 
examination the dynamic binary location value of selected location for embedding 
purpose in five different locations in host image using the same algorithm 
process. Our experimental results demonstrate that our algorithm scheme is 
imperceptible and robust against several image processing attacks, and 
watermarked image quality evaluating by calculation of SNR, PSNR, RMSE, and MAE. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Copyright Protection, Discrete Wavelet Transforms, Information Security, 
Frequency Domain Analysis, Watermarking |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RELATIONSHIP BETWEEN BRAIN-BASED LEARNING STYLES AND BEHAVIOURAL LEARNING 
PATTERNS IN WEB-BASED EDUCATIONAL SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MOHAMMED AHMED GHAZAL, NOR AZAN MAT ZIN, ZURINA MUDA |  
|  			
									
Abstract: | 
 			
									
Web-Based Educational Systems (WBESs) deliver the same design features such as 
learning content and user interface to all learners. However, learners have 
different preferences according to their brain structures. The brain dominance 
determines how learners prefer to learn, communicate, collaborate and solve 
problems effectively. Tracking learners’ behaviours within the WBES is an 
essential approach to predict the learners’ Learning Styles. Therefore, the 
relationship between learners’ behavioural interactions in WBES and Learning 
Styles should be examined. This study investigated the learning patterns of 69 
respondents within WBES with respect to Herrmann Whole Brain Model (HWBM) 
Learning Style. Results showed that there is a significant correlation between 
some learning patterns and HWBM Learning Styles. The most preferred features for 
designing WBES according to Learning Style model were also identified. The 
results can be used for developing an adaptive learner model. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Herrmann Whole Brain Model Learning Style (HWBM LS), Behavioural Learning 
Patterns, Design Features of Web-Based Educational System (WBES), Learner 
Modelling, Systematic Observation Study. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANN EXPERT SYSTEM FOR DIAGNOSING FAULTS AND ASSESSING THE QUALITY INSULATION OIL 
OF POWER TRANSFORMER DEPENDING ON THE DGA METHOD |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AHMED RAISAN HUSSEIN, M. M. YAACOB, M.F. OTHMAN |  
|  			
									
Abstract: | 
 			
									
Dissolved gas analysis is a common method for diagnosing faults in electrical 
transformers and determining the type of faults early on, depending on the 
specific standards used. Applying dissolved gas analysis methods can be used in 
diagnosis and in the evaluation process. There are many methods used in the 
diagnosis of faults in power transformers, including traditional and intelligent 
.The use of an intelligent expert system relies on dissolved gas analysis using 
artificial neural networks, and it gives excellent results in diagnosing faults 
and assessing the quality of insulating oil during service and the application 
of appropriate treatment. |  
|  			
									
  										
			
Keywords:  | 
 			
									
ANN Expert System, Fault Diagnosis, Insulation Oil, Dissolved Gas Analysis, 
Power Transformer |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
NEW EXPERT SYSTEM FOR SHORT, MEDIUM AND LONG-TERM FLOOD FORECASTING AND WARNING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MAROUANE EL MABROUK, MOSTAFA EZZIYYANI, ZOUHAIR A. SADOUQ, MOHAMMAD ESSAAIDI |  
|  			
									
Abstract: | 
 			
									
Floods are among the most powerful forces on the planet. Therefore, the need for 
a system that predict and warn about the flood occurrence is required. The 
combination of several approaches into a single system was our concern to design 
and develop an intelligent system that meets the demands of our research. After 
many studies, we decided to work with multi-agent systems to benefit of its 
advantages in terms of the distributed artificial intelligence, and we worked 
with expert systems to benefit of the concept of logic programming and the 
concept of facts and rules. In this paper, we present an expert system for 
real-time flood forecasting and warning that consists of two levels of 
processing. A first level for short-term forecasting and warning ie. for a time 
that does not exceed two to three days, using the proposed model, which is based 
on coefficients that will be calculated to do the flood forecasting and warning. 
A second level for medium (the time could be up to 10 years) and long-term (the 
time could be up to 1000 years) forecasting and warning via the empirical model 
of Hazan-Lazarevic. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Flood, Forecasting, Warning, Real-Time, Expert Systems, Agent, Multi-Agent 
Systems. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EFFECTIVE e-LEARNING ENVIRONMENT A CLASSICAL INSIGHT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MR. A. SENTHIL KARTHICK KUMAR , DR. A.M.J MD. ZUBAIR RAHMAN |  
|  			
									
Abstract: | 
 			
									
The objective of this article provides an idea to every corporate, university 
and institutions on how to upload the knowledge towards the eLearning aspect for 
human resources. The discussion deals with three aspects: (1) eLearning is 
increasingly developed with lots of inputs, how these inputs are upgraded to be 
utilized in problem oriented areas of educational industry in a healthier way. 
(2) The concerns to provide a better platform to the learning community in which 
human behavioral analysis can be pursued on training and development schemes. 
(3) The ability to change continually and acquire new understanding towards the 
future developments. The main purpose of this article is for identifying or 
classifying the needs of better educational system to the current generation. In 
this research, researcher would like to provide a detailed report of learning 
methods and how technological endurance has provided better teaching aids in 
various dimensions. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Elearning; Cloud Oriented Learning; Courseware Creation And ICT |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EFFICIENT ARCHITECTURE FOR SEMANTIC EVOLUTION OF EMBEDDED SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SMT. J. SASI BHANU , A. VINAYA BABU , P. TRIMURTHY |  
|  			
									
Abstract: | 
 			
									
Embedded systems (ES) are being used these days for monitoring and controlling 
Safety or mission critical system. Mission and safety critical systems as such 
will not be shut down for the reasons of safety and also due the cost of 
restarting. Changes are inevitable for any system either due to the reasons of 
updating the modules contained in the ES software or addition of new modules for 
the reasons of adding new functionality. The changes to the ES software required 
are to be undertaken online while the ES system is up and running. Ability to 
make changes to the software while the system is running is called dynamic 
semantic evolution. For any software architecture is the basis. Modules are to 
be reflected in the architecture that support dynamic evolution of the embedded 
software. Many architectures have been proposed in the literature that cater to 
the dynamic semantic evolution of loaded systems. Every architecture proposed 
incorporated only one method of undertaking the dynamic evolution. Many methods 
have been in existence for dynamically evolving the embedded systems but all the 
available methods have not be brought under the same architecture. In this paper 
a comprehensive architecture is presented that considers all available 
approaches that help implementing dynamic semantic evolution of the ES software. |  
|  			
									
  										
			
Keywords:  | 
 			
									
ES Architectures, Dynamic Semantic Evolution, Monitoring And Controlling Safety 
Critical Systems, Software Evolution |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  August 2015 -- Vol. 78. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
 |     	 
 |