|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2015 | Vol. 78 No.2 |
Title: |
DEVELOPING A HIGH PERFORMANCE REAL TIME PEOPLE DETECTION SYSTEM |
Author: |
HILAL ADNAN FADHIL, AHMAD B. ALKHODRE , HAITHAM ALYOUSEF |
Abstract: |
A lot of research has been conducted to detect people within images and video
frames, Our goal in this research is to develop a protection system against
thefts, by analyzing video frames incoming from surveillance cameras, and
running early alarm to discover, detecting thieves in real time. Theft has many
damages in the community. Failure in putting strategies for preventing theft has
caused material, moral and psychological harm to the humans. All new technology
comes to find rest and stability for the humans, by monitoring the properties
especially when the owners are absent or far away. Now days the presence of
cameras becomes very essential for monitoring places, it limits from theft ,
burglary, for this reason we have seen lot of theft occurs when a power outage.
We want to prevent theft, narrowing the time for robbers and confusing them
during robbery ,not only to alleviate its effects or pursuing criminals and
disclosure them, this arrangements require more efforts and calling the
police…etc. Our primary goal is for deterring criminals, we need achieving a
preventive policy. In this research we could get a high rate of classification
equivalent to 96% of detected humans in implementation time of approximately 0.5
seconds.
Within this article, we will review the previous studies which had been done for
discovering, detecting the humans and the steps which performed effectively are
beside what enhancements we've made for. in summary ,we will review the obtained
optimal values of the used parameters and analyze them . |
Keywords: |
Object Detection, Real Time Human Detection, Real Time ANTI-THEFT System,
SURVEILLANCE System, People Detection, Background Removal In Video |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
SLOTTED MICROSTRIP ANTENNAS FOR CIRCULAR POLARIZATION WITH COMPACT SIZE FOR RFID
,BLUETOOTH &S-BAND APPLICATIONS |
Author: |
P.POORNA PRIYA, K.SAI NAGA SOWMITH, K.DINESH VARDHAN, P.TANMAYEE, K.MADHU PAVAN |
Abstract: |
Micorstrip patch antennas play a major role in day to day life. In this paper
the designed microstrip patch antenna is compact sized with circular
polarization for RFID applications. Different arbitrary shaped slots like square
circle plus are used and parameters like return loss, gain and frequency are
observed for each of the patches. All these are done using ANSOFT HFSS . The
antenna is fabricated using duroid as dielectric substrate (relative
permittivity =2.2, loss tangent=0.0004) and coaxial feed. These designed
antennas are fabricated and used in real time applications. |
Keywords: |
Micorstrip patch, RFID ,ANSOFT HFSS. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
ONTOLOGY ASSISTED SEMI-SUPERVISED BUG REPORT CLASSIFICATION |
Author: |
SAKTHI KUMARESH, BASKARAN R |
Abstract: |
Automated bug report clustering and classification plays a significant role in
managing, assigning, and understanding the bug categories. The most challenging
problem in bug report classification is the inadequate amount of labeled
dataset. The proposed framework introduces an Ontology-assisted Semi-supervised
Clustering Based Classification (OS-CBC) for bug reports amid a small size of
the labeled dataset scenario. The proposed approach enriches the data set of the
bug report using constructed Bug and Enriched Meta-feature Extraction (BEME)
ontology. Semantic constraints based semi-supervised hierarchical clustering
(Semantic-HAC) algorithm prioritizes the constraints for clustering the bug
reports based on the BEME ontology. The cluster formation of bug reports depends
on the transitive dissimilarity and ultrametric distance using ontology-based
prioritized constraints. It extends the dataset (stretched) of the bug reports
based on the maximum likelihood of the features in the cluster for labeling the
unlabeled data. Moreover, the proposed approach categorizes the bug reports of
stretched test set under the category of training set label using Multi-label
Naive Bayes (MLNB) classifier. The classification technique focuses on the
threshold based filtered weight of each term in the training set to improve the
accuracy. The proposed OS-CBC approach significantly improves the classification
accuracy of the bug reports. |
Keywords: |
Bug, Classification, Clustering, Ontology, Constraint, Semi-Supervised |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
THE INFLUENCE OF INTERNAL SYSTEM, EXTERNAL SYSTEM AND ETHIC TO THE SATISFACTION
OF USER SYSTEM AND FINANCIAL INFORMATION QUALITY ALONG WITH THE PERFORMANCE OF
FINANCIAL ACCOUNTING INFORMATION SYSTEM AT PRIVATE POLYTECHNIC IN EAST JAVA |
Author: |
MULYANTO NUGROHO, TRI RATNAWATI, SRIE HARTUTIE MOEHADITOYO |
Abstract: |
The This study examines behavioral accounting on the basic theory of accounting
information system. Respondents in this study were 123 respondents of the use of
accounting information system in this study is composed of management director,
deputy director, head of the study program, the head of the laboratory, faculty,
staff users of information systems Private Polytechnics in East Java as many as
123 respondents were categorized in population research questions in complete
charge. The results in this study is that the Internal System is a system in the
organization Polytechnic regarding internal control systems, the competence of
the Human Resources, System Operating Procedure, and the support of top
management, and External Systems regarding hardware and software can result in
increased user satisfaction system Private Polytechnic in East Java. Internal
system does not have a significant effect on the performance of financial
accounting information systems, although in East Java Private Polytechnic System
Internal Control, Human Resource Competency, Standard Operating Procedure, and
top management support is good and this is because the level of compensation is
still low so that the spirit of Human Resources still low. Internal systems,
external systems, and Ethics significant effect and impact on improving the
quality of financial information private Polytechnic in East Java. External
Systems, Ethics, system user satisfaction, and quality of financial information
have a significant effect on the performance of financial accounting information
systems in East Java Private Polytechnic. Originality of this research is
ethical path associated with the quality of financial information and ethical
lines that are connected with the performance of financial accounting
information system. Besides originality of this research external system
pathways related with the system user satisfaction. |
Keywords: |
Internal System, External System, Ethic, The Satisfaction Of User System,
Financial Information Quality, Performance Of Financial Accounting Information
System. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
SHADOW IDENTIFICATION USING ANT COLONY OPTIMIZATION |
Author: |
D. USHA NANDINI, DR. A. EZIL SAM LENI |
Abstract: |
A novel method has been proposed for the identification of shadows in satellite
images. The method is based on the use of Ant Colony Optimization (ACO) for the
identification of shadows in remotely sensed images. The existence of shadow
regions in images has been a hindrance to image analysis and hence accurate
shadow detection and removal is still a current research topic. The proposed
work is a combination of the previous techniques and an object based technique.
The proposed work first identifies the edges of all the objects in the scene and
then each object is analyzed using ant colony optimization to determine whether
it is a shadow or a foreground object. The shadow regions are detected in a
finite number of steps, considering the various properties of the shadow
regions. |
Keywords: |
Ant Colony Optimization (ACO), Edge Detection, Shadow Detection, Shadow
Properties, Threshold. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
A COMPREHENSIVE HUMAN FACTOR FRAMEWORK FOR INFORMATION SECURITY IN ORGANIZATIONS |
Author: |
AREEJ ALHOGAIL, ABDURRAHMAN MIRZA, SAAD HAJ BAKRY |
Abstract: |
Human factor represent an essential issue in the security of information in
organizations, as human factor determine the behavior of the employees toward
information security. This paper attempts to integrate related human factors,
recognized by previous work, into a structured comprehensive framework. The
framework has four main domains that take the form of a diamond. Two domains are
concerned with the environment and management issues representing an
organization dimension; while the other two are related to preparedness and
responsibility issues giving an employee dimension. The domains at the four
corners of the diamond interact with one another influencing the human behavior
toward information security. Expert views on the framework have been collected
through a survey that addresses the importance of its various components to
human behavior. The framework provides a base for the future investigation of
information security protection in organizations, and the development of
controls for this purpose. |
Keywords: |
Human Factor; Information Security; Human Behavior; Information Security
Controls; Insider (Employee) Threats |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD |
Author: |
C.S. RAJARAJESWARI, M. ARAMUDHAN |
Abstract: |
Cloud Computing is an innovative technology in the field of information
technology. Federated cloud is an amalgamation of several cloud service
providers. Since there are many cloud service providers in the federated cloud,
users get confusion in choosing the best cloud service provider for their
requirements. To choose the best cloud service from the available and eligible
cloud service providers ranking concept is proposed. Poincare Plot method (PPM)
based mathematical model is proposed to find the rank of the cloud service
providers in federated cloud management system. The proposed ranking model
reveals that the federated cloud model improves the performance of resource
provisioning when compared to the existing rank model using Analytical Hierarchy
Process (AHP). |
Keywords: |
Federated Cloud, Service Level Agreement, Broker Manager, Cloud Broker, Cloud
Ranking |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
RANK BASED DOCUMENT CLUSTERING AND SUMMARIZATION APPROACH IN THE DISTRIBUTED P2P
NETWORK |
Author: |
A.SRINIVASA RAO, Dr.Ch.DIVAKAR, Dr.A.GOVARDHAN |
Abstract: |
Quick and high quality document clustering techniques play a vital role in text
mining applications by grouping large text documents into meaningful clusters
and enhancing the clustering accuracy using dimensionality reduction or query
expansion. Detecting meaningful clusters and summaries in Distributed p2p
network applies single document summarization techniques and peer relationships
for detecting meaningful clusters and summaries. Traditional cluster based
summarization methods usually suffer with the computation speed, compression,
peer selection and sentence clustering in order to generate high quality
summaries. Traditional document clustering and summarization methods assume node
adjacency and neighborhood information to build clusters and summaries. Since
the multilevel overlay p2p networks have suffered with node adjacency and
duplicate information, it was difficult to generate optimal clusters and
summaries within the peers. Proposed approach provides better solution to
generate optimal document clustering using probabilistic k- representative
clustering algorithm and forms efficient summaries using phrase rank based
summarization. Experimental results give better performance in terms of
execution time, entropy and cluster quality are concerned. |
Keywords: |
Document clustering, Summarization, Phrase ranking,P2P networks |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
WEB SERVICES COMPOSITION FOR CONCURRENT PLAN USING ARTIFICIAL INTELLIGENCE
PLANNING |
Author: |
MUHAMMAD AKMAL REMLI, SAFAAI DERIS, MAMOUN JAMOUS, MOHD SABERI MOHAMAD,
AFNIZANFAIZAL ABDULLAH |
Abstract: |
Automatic planning of web services composition is a challenging problem both in
academia and real-world application. Artificial Intelligence (AI) planning can
be applied to automate web services composition by depicting composition problem
as AI planning problem. Web services composition would combine multiple services
whenever some requirements cannot be fulfilled by a single service.
Subsequently, many of the planning algorithms to detect and generate composition
plan would focus only on sequence composition thus, neglecting concurrent
composition. The aim of this paper is to develop an approach to generate a
concurrent plan for web services composition based on semantic web services
(OWL-S) and Hierarchical Task Network (HTN) Planning. A Bioinformatics case
study for pathway data retrieval is used to validate the effectiveness of
proposed approach. The planning algorithm extend Hierarchical Task Network (HTN)
algorithm to solve the problem of automatic web service composition in the
context of concurrent task planning. Experimental analysis showed that the
proposed algorithms are capable of detecting and generating concurrent plan when
compared with existing algorithms. |
Keywords: |
Web service composition, Semantic web service, Artificial Intelligent (AI)
Planning, Hierarchical Task Network (HT) Planning, |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
CADSSO: A DEVELOPMENT APPROACH FOR CONTEXT-AWARE SERVICE ORIENTED SYSTEMS |
Author: |
M. LETHRECH, A. KENZI, I. ELMAGROUNI, M. NASSAR, A. KRIOUILE |
Abstract: |
In this paper, we present our development approach named CADSSO (Context-Aware,
Domain Specific and Service Oriented) for Context aware Service oriented
Systems. CADSSO is organized in two stages: the modeling stage and the code
generation stage. It is essentially based on the Domain Specific Modeling (DSM)
approach. Indeed, the creation of the five models of the modeling stage is done
using Domain Specific Languages (DSLs). The first model is Domain Specific
Context Model, it represents the service execution context. The second is Domain
Specific Service Model, it allows the services modeling. We also have the
Service Variability Model which is used in the service variability modeling. The
bond between Service Variability Model and Domain Specific Service Model is
provided by Adaptation rules model. Finally, specific domain business modeling
is done via domain specific business model. At code generation stage, a specific
code generator transform all these models to final source code using a framework
specifically designed for a given target platform. |
Keywords: |
Domain Specific Modeling (DSM), Domain Specific Language (DSL), Service Oriented
Computing (SOC), Context-Aware Computing (CAC), Adaptation |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
DYNAMIC BINARY LOCATION BASED MULTI-WATERMARK EMBEDDING ALGORITHM IN DWT |
Author: |
AMMAR JAMEEL HUSSEIN, SEDA YUKSEL, ERSIN ELBASI |
Abstract: |
In order to achieve a good imperceptibility and robustness, using 4-level DWT
algorithm based on dynamic binary host image location and embedding two
watermark logos in different DWT levels are proposed for copyright protection
and authenticity. In the propounded watermarking algorithm, 5-level DWT is
applied to host image to obtain the fifth low frequency sub band (LL5), and
examination the dynamic binary location value of selected location for embedding
purpose in five different locations in host image using the same algorithm
process. Our experimental results demonstrate that our algorithm scheme is
imperceptible and robust against several image processing attacks, and
watermarked image quality evaluating by calculation of SNR, PSNR, RMSE, and MAE. |
Keywords: |
Copyright Protection, Discrete Wavelet Transforms, Information Security,
Frequency Domain Analysis, Watermarking |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
RELATIONSHIP BETWEEN BRAIN-BASED LEARNING STYLES AND BEHAVIOURAL LEARNING
PATTERNS IN WEB-BASED EDUCATIONAL SYSTEMS |
Author: |
MOHAMMED AHMED GHAZAL, NOR AZAN MAT ZIN, ZURINA MUDA |
Abstract: |
Web-Based Educational Systems (WBESs) deliver the same design features such as
learning content and user interface to all learners. However, learners have
different preferences according to their brain structures. The brain dominance
determines how learners prefer to learn, communicate, collaborate and solve
problems effectively. Tracking learners’ behaviours within the WBES is an
essential approach to predict the learners’ Learning Styles. Therefore, the
relationship between learners’ behavioural interactions in WBES and Learning
Styles should be examined. This study investigated the learning patterns of 69
respondents within WBES with respect to Herrmann Whole Brain Model (HWBM)
Learning Style. Results showed that there is a significant correlation between
some learning patterns and HWBM Learning Styles. The most preferred features for
designing WBES according to Learning Style model were also identified. The
results can be used for developing an adaptive learner model. |
Keywords: |
Herrmann Whole Brain Model Learning Style (HWBM LS), Behavioural Learning
Patterns, Design Features of Web-Based Educational System (WBES), Learner
Modelling, Systematic Observation Study. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
ANN EXPERT SYSTEM FOR DIAGNOSING FAULTS AND ASSESSING THE QUALITY INSULATION OIL
OF POWER TRANSFORMER DEPENDING ON THE DGA METHOD |
Author: |
AHMED RAISAN HUSSEIN, M. M. YAACOB, M.F. OTHMAN |
Abstract: |
Dissolved gas analysis is a common method for diagnosing faults in electrical
transformers and determining the type of faults early on, depending on the
specific standards used. Applying dissolved gas analysis methods can be used in
diagnosis and in the evaluation process. There are many methods used in the
diagnosis of faults in power transformers, including traditional and intelligent
.The use of an intelligent expert system relies on dissolved gas analysis using
artificial neural networks, and it gives excellent results in diagnosing faults
and assessing the quality of insulating oil during service and the application
of appropriate treatment. |
Keywords: |
ANN Expert System, Fault Diagnosis, Insulation Oil, Dissolved Gas Analysis,
Power Transformer |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
NEW EXPERT SYSTEM FOR SHORT, MEDIUM AND LONG-TERM FLOOD FORECASTING AND WARNING |
Author: |
MAROUANE EL MABROUK, MOSTAFA EZZIYYANI, ZOUHAIR A. SADOUQ, MOHAMMAD ESSAAIDI |
Abstract: |
Floods are among the most powerful forces on the planet. Therefore, the need for
a system that predict and warn about the flood occurrence is required. The
combination of several approaches into a single system was our concern to design
and develop an intelligent system that meets the demands of our research. After
many studies, we decided to work with multi-agent systems to benefit of its
advantages in terms of the distributed artificial intelligence, and we worked
with expert systems to benefit of the concept of logic programming and the
concept of facts and rules. In this paper, we present an expert system for
real-time flood forecasting and warning that consists of two levels of
processing. A first level for short-term forecasting and warning ie. for a time
that does not exceed two to three days, using the proposed model, which is based
on coefficients that will be calculated to do the flood forecasting and warning.
A second level for medium (the time could be up to 10 years) and long-term (the
time could be up to 1000 years) forecasting and warning via the empirical model
of Hazan-Lazarevic. |
Keywords: |
Flood, Forecasting, Warning, Real-Time, Expert Systems, Agent, Multi-Agent
Systems. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
EFFECTIVE e-LEARNING ENVIRONMENT A CLASSICAL INSIGHT |
Author: |
MR. A. SENTHIL KARTHICK KUMAR , DR. A.M.J MD. ZUBAIR RAHMAN |
Abstract: |
The objective of this article provides an idea to every corporate, university
and institutions on how to upload the knowledge towards the eLearning aspect for
human resources. The discussion deals with three aspects: (1) eLearning is
increasingly developed with lots of inputs, how these inputs are upgraded to be
utilized in problem oriented areas of educational industry in a healthier way.
(2) The concerns to provide a better platform to the learning community in which
human behavioral analysis can be pursued on training and development schemes.
(3) The ability to change continually and acquire new understanding towards the
future developments. The main purpose of this article is for identifying or
classifying the needs of better educational system to the current generation. In
this research, researcher would like to provide a detailed report of learning
methods and how technological endurance has provided better teaching aids in
various dimensions. |
Keywords: |
Elearning; Cloud Oriented Learning; Courseware Creation And ICT |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT ARCHITECTURE FOR SEMANTIC EVOLUTION OF EMBEDDED SYSTEM |
Author: |
SMT. J. SASI BHANU , A. VINAYA BABU , P. TRIMURTHY |
Abstract: |
Embedded systems (ES) are being used these days for monitoring and controlling
Safety or mission critical system. Mission and safety critical systems as such
will not be shut down for the reasons of safety and also due the cost of
restarting. Changes are inevitable for any system either due to the reasons of
updating the modules contained in the ES software or addition of new modules for
the reasons of adding new functionality. The changes to the ES software required
are to be undertaken online while the ES system is up and running. Ability to
make changes to the software while the system is running is called dynamic
semantic evolution. For any software architecture is the basis. Modules are to
be reflected in the architecture that support dynamic evolution of the embedded
software. Many architectures have been proposed in the literature that cater to
the dynamic semantic evolution of loaded systems. Every architecture proposed
incorporated only one method of undertaking the dynamic evolution. Many methods
have been in existence for dynamically evolving the embedded systems but all the
available methods have not be brought under the same architecture. In this paper
a comprehensive architecture is presented that considers all available
approaches that help implementing dynamic semantic evolution of the ES software. |
Keywords: |
ES Architectures, Dynamic Semantic Evolution, Monitoring And Controlling Safety
Critical Systems, Software Evolution |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2015 -- Vol. 78. No. 2 -- 2015 |
Full
Text |
|
|
|