|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2015 | Vol. 78 No.3 |
Title: |
IDENTIFYING THE CHALLENGES AND BARRIERS HEARING-IMPAIRED LEARNERS FACE WITH
USING ICT EDUCATION COURSES |
Author: |
NORAZAH NORDIN1, MELOR MD YUNUS, ROZNIZA ZAHARUDIN, HADI SALEHI, MOHD HANAFI
MOHD YASIN, MOHAMED AMIN EMBI |
Abstract: |
Communication between the hearing-impaired individuals and the normal-hearing
individuals can be very difficult. It is often true that in universities or
classes scenarios, the hearing-impaired individuals are often involved in
project-oriented groups; thus, miscommunication is normal between them and the
normal-hearing individuals. This research aims to identify the problems and
challenges amongst the hearing-impaired individuals in learning the various ICT-Education
(Information and Communication Technology) courses for connecting the ICT
courses and the deaf learners for further education. To achieve the aim of this
study, analysis was carried out in all schools in Malaysia, including Sabah and
Sarawak, which employ the hearing-impaired education program for the secondary
level of Form 4 and Form 5. This analysis was done in the forms of survey
questionnaires, interview sessions, and observation. Teachers were chosen as
respondents mainly because they are the main individuals that interact directly
with the hearing-impaired individuals. Therefore, their views and opinions about
the suitable ICT courses for the hearing-impaired students were greatly
appreciated and needed. According to the problems stated, an e-learning portal
offering ICT courses was needed to be developed especially for the
hearing-impaired individuals to solve the problems. The hearing-impaired
individuals deserve the equal opportunities as the normal-hearing individuals to
learn ICT education; hence, they would not be left behind in learning computer
courses. |
Keywords: |
Hearing-Impaired Individuals, Information and Communication Technology (ICT),
E-Learning, E-ICT Courses. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
TEST CASE GENERATION AND PRIORITIZATION BASED ON UML BEHAVIORAL MODELS |
Author: |
AJAY KUMAR JENA, SANTOSH KUMAR SWAIN, DURGA PRASAD MOHAPATRA |
Abstract: |
Test case prioritization (TCP) techniques have been proven to be beneficial for
improving testing activities. Prioritized test suites are found using different
techniques of prioritization. While code coverage based prioritization
techniques are found to be used by most scholars, test case prioritization based
on UML behavioral models has not been given much attention so far. We propose a
novel approach for generating and prioritizing test cases using UML sequence and
interaction overview diagrams. First, we convert the interaction overview
diagram to interaction Graph (IG) and sequence diagram to Message Sequence
Dependency Graph (MSDG). An intermediate graph known as Sequence Interaction
Graph (SIG) is generated by combining MSDG and IG. From SIG, we generate the
test scenarios and subsequently the test cases. For test case prioritization,
the first task is to convert the SIG into another graph known as Dependency
Graph (DG). Then, we assign weights to each node of the DG according to its
impact using backward slices and based on condition criticality. Further, we
calculate the weights of each basic path. According to these weights, finally,
we prioritize the test cases. We have used the impact, complexity and
criticality of the elements present in the model for the prioritization of test
cases. The results obtained by our approach indicates that the proposed
technique is efficient and effective in prioritizing (ordering) the test cases
using UML models. Our proposed approach achieves higher Average Percentage of
Fault Detection (APFD) compared to other related approaches. |
Keywords: |
Test case, Backward Slicing, Dependency Graph, Code Coverage, Prioritization,
Interaction Graph. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
MOBILE OPTICAL WIRELESS SYSTEM FOR HEALTHCARE CONTINUOUS MONITORING USING IR
TECHNOLOGY |
Author: |
E. A. ALYAN, S. A. ALJUNID, M. S. ANUAR |
Abstract: |
In this paper, indoor optical wireless system using Infrared (IR) technology is
developed for healthcare monitoring. This to insure the reliability, the
security and the mobility of the patient during his/her stay in hospital.
Various studies were performed to develop a mobile optical wireless system but
using celling bounce model which considers just one reflection and the
transmitter has to be pointed to the ground which limits the patient’s mobility
and movements. In this research, we consider an optical source (LED) coupled
with the medical sensor and can randomly change its position within the xy-dimensions
of the room and within height varying from 0 to 1.3 m which is the average
height of the medical sensor to be put on the body. While the receiver is
located on the centre of the ceiling. The line of sight and diffuse propagation
links are considered to investigate the capability of the developed system to
transmit the health information of the patient to the receiver after undergoing
multiple reflections from different walls and objects placed in the room. Using
MATLB simulation, the average received power, RMS delay spread, SNR and BER are
calculated in order to evaluate the performance and capability of the system
with LOS, first and second order reflections for all positions that patient can
reach to. |
Keywords: |
Infrared; Optical wireless; Diffuse; LOS; RMS delay spread; Healthcare
monitoring |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
A SYSTEMATIC LITERATURE REVIEW OF COMPUTER ETHICS ISSUES |
Author: |
TAN MING MING, MARZANAH A. JABAR , FATIMAH SIDI, KOH TIENG WEI |
Abstract: |
Given the importance and concern of computer ethics, four issues have been
identified in the field of computer and Information Technology (IT). This study
was carried out to review the work done on computer ethics issues for the years
2010 to 2014. This paper identifies the methods used, topics addressed, and the
main findings published of the research about ethical issues in computer usage.
Systematic literature review (SLR) has been conducted according to the standard
guidelines, and a study protocol was applied to answer three research questions:
1) What are the ethical issues in computer ethics that have been discussed in
previous research?, 2) What are the most recent topics among computer ethics
issues?, and 3) To what extent does investigation among IT students, Non-IT
students and IT professionals display different perceptions of IT issues? Based
on the evidence extracted from 40 studies, it has been clearly stated that
software piracy in Privacy, Accuracy, Property and Accessibility (PAPA) and
general issues are the topics most frequently discussed. It shows the gaps in
the current literature pertaining to computer ethical issues and in particular,
the issue of software piracy. |
Keywords: |
Computer Ethics, Ethical Issues, Systematic Literature Review, Papa Framework,
Software Piracy |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
DC POWER SUPPLY WITH POWER FACTOR CORRECTION USING INTEGRATION OF FLYBACK-FORWARD
TOPOLOGY IN PARALLEL CONNECTION |
Author: |
MOH. ZAENAL EFENDI, NOVIE AYUB WINDARKO |
Abstract: |
This paper presents a new configuration of a dc power supply with power factor
correction using integration of flyback and forward topology in parallel
connection. Flyback converter is used for power factor corrector and it operates
in discontinuous conduction mode so that it becomes as a natural resistance.
Forward converter is used as a dc regulator and operates in continuous
conduction mode. A prototype circuit, which has 20 Volt of output voltage and 5
A of output current is designed and tested by a simulation and experiment.
According to the simulation and experiment results, the power factor of this
circuit can be achieved up to 0.96 and the input current meets the international
harmonics standard of IEC61000-3-2 class A and class D so it can be used as
power supply for computer, monitor and television. |
Keywords: |
Power factor correction, Flyback converter, Forward converter, IEC61000-3-2 |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
CUSTOMER SEGMENTATION THROUGH FUZZY C-MEANS AND FUZZY RFM METHOD |
Author: |
NI PUTU PUTRI YULIARI ,I KETUT GEDE DARMA PUTRA , NI KADEK DWI RUSJAYANTI |
Abstract: |
This research aims for finding the potential customer use data transaction. This
causes, the company is difficult to arrange customers who have high and low
loyalty and this research have a application for customer segmentation to help
analyzing transaction data with Fuzzy C-Means for clustering and Fuzzy RFM for
identify the customers. Softwares used to conduct this experiment are Microsoft
SQL Server to saving the database and Matlab as the tools. The results of this
segmentation for four experiments are two classes. Its has superstar I and
Occasional H for each number cluster and then for the best number of cluster for
this experiments are two clusters according MPC method. |
Keywords: |
Customer segmentation, Clustering, Fuzzy c-means, Fuzzy RFM, MPC (Modified
Partition Coefficient) |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
LEAST AND UNIQUE PRICE AUCTION WITH ASCENDING SLICES (LUP-AS): PLAYING GAME
STYLE ONLINE-AUCTION |
Author: |
DR. MOHAMMED OTAIR |
Abstract: |
In last two decades, Online (Web) auctions and its types took a lot of attention
by researchers and business corporates. The main problem in many auction types
is the fixed-closing time, which causes a phenomenon called "sniping" (i.e.
submitting a bid at the final moments by one of the bidders). This paper
resolved this problem by presenting a proposed type of online auctions called
Least and Unique Price with Ascending Slices (LUP-AS) which is an enhanced
version of LUP [6][7]. In the LUP-AS, the item price will be collected by the
bidding processes. During the auction life there will be many temporary winners
(who submit the least and unique price). However, the winner in this auction has
to submit the least, unique but his price must be greater than the number of
cancelled bids. The number of cancelled bid is a counter incremented by one when
a bidder submit a least but not unique price during the auction life. The main
advantages of LUP-AS are: Funny (like playing game), semi-sealed, dynamic (no
fixed closing time and discard the snipers), the winner pay a very least price
for item, and the seller gets the fair price. An implementation of LUP-AS uses
an Artificial Neural Network in order to provide the administrators the ability
to classify the bidders into groups to distribute special benefits according to
each group. |
Keywords: |
Online Auction, Bidders, Descending Bid, Sealed Bid, Acceptable Price. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
SIMULATION OF GPR SCENARIOS USING FDTD |
Author: |
GAMIL ALSHARAHI, ABDELLAH DRIOUACH, AHMED FAIZE |
Abstract: |
The Finite-Difference Time Domain (FDTD) method has become a standard simulation
technique in computational electromagnetics. It has been extended and improved
for accurately treating almost any kind of problem involving complex materials
with arbitrary geometry and it continues to be an active field of research. The
method has become so powerful that it is used as the computational core of not
only many in-house tools but also commercial packages used to design
electromagnetic systems (Reflexw, CST, EMPIRE, XFDTD, etc). Computational tools,
such as FDTD, have become power-ful tools for GPR user, since the time-domain
nature of FDTD-based programs enables the visualization of the causal evolution
of complex electromagnetic phenomena such as the propagation of electromagnetic
pulses in GPR scenarios that involve layered media, dispersive media, objects of
arbitrary shape, etc. In the following paper several scenarios found during the
GPR survey are simulated using FDTD and the results are commented on. |
Keywords: |
Ground Radar, Propagation, Electromagnetic Wave, FDTD Simulations |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
NATURAL GRASS PATH LOSS MODELING BASED ON WIRELESS SENSOR NETWORK DEPLOYMENT |
Author: |
AUDA RAHEEMAH , NASEER SABRI, PHAKLEN EHKAN, M.S.SALIM, OMAR KHALDOON A |
Abstract: |
Empirical propagation models (EPM) have got high interest in both research and
various applications due to their speed of execution and their limited
dependence on detailed knowledge of the terrain. This paper derives a model for
predicting radio frequency propagation for Wireless Sensor Network (WSN)
deployment in natural grass environment. Real time physical data of ZigBee WSN
are collected and an empirical path loss prediction model is derived from the
actual measurements. To validate the proposed model, two popular models, FSPL
and PE models, are used and a comparison of results is conducted. The results
show that the mentioned popular models with WSN wave propagation are inaccurate
and cannot be used in predicting the path loss between wireless sensor nodes
deployed in natural grass environments. Thus, a new propagation model is derived
for natural grass Zigbee WSN and to be used adequately by researchers and
developers. |
Keywords: |
Propagation model, Path losses, RF attenuation, RF propagation, WSN, ZigBee
standard. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
A NEW ALGORITHM FOR OPTIMIZING THE SELF-ORGANIZING MAP |
Author: |
BEN-HDECH Adi , GHANOU Youssef, EL QADI Abderrahim |
Abstract: |
The selection of the architecture of Kohonen networks, associated with a given
problem, is one of the most important aspects of neural network research; the
choice of neurons number and the initial weights has a great impact on the
convergence of learning methods trained. In this paper, we present a new method
for optimizing the Self-Organizing Map. This approach consists to identify and
to select the best map. The goal is to delete unimportant units in the kohonen
map. To test our approach, we use two databases Iris and Seeds. The results
obtained demonstrated the effectiveness of the proposed approach. |
Keywords: |
Self-Organizing Map, Optimization, Clustering, Classification, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT DETECTION SYSTEM FOR A DROWSY DRIVER |
Author: |
JAMAL ZRAQOU, ADI MAAITA, WESAM ALKHADOUR, FADI HAMAD |
Abstract: |
This paper describes an efficient detection system to monitor driver vigilance.
A regular webcam is used to point directly towards the driver’s face and
monitors the driver’s eyes in order to detect drowsiness in about real-time.
Image processing technology is involved to analyze images of the driver's face
taken by a regular webcam. Alertness is detected based on the degree to which
the driver's eyes are open or closed. Several efficient methods are employed to
achieve the efficiency. Experiments are performed to reveal the performance of
the proposed method in a simulating environment with subjects of different ages,
genders, and under different lighting conditions. |
Keywords: |
Drowsy Driver Detection, Facial Expression Detection, Eyes Detection, Facial
Expression Extraction, Facial Action Unit Detection. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
IMPORTANCE OF USING GOLD SEQUENCE IN RADAR SIGNAL PROCESSING |
Author: |
G S KRISHNAM NAIDU YEDLA, C H SRINIVASU |
Abstract: |
In this paper we will discuss about the relevant topics of coding sequences. The
coding sequences are used in designing the waveforms in the radar applications.
By using different codes in generating the waveforms, there will be a decrease
in the side lobes in the ambiguity function. More minor lobes in the ambiguity
function represent the confusion in detecting the targets and another
application is we can easily identify the minor targets. Gold sequences, having
good cross correlation properties will help in managing the interference between
successive pulses. The strong research objective is to show the significant
improvement in radar clutter. Different lengths of barker codes are taken and
its autocorrelation properties and ambiguity functions are compared by
generating different lengths of gold sequence. All the results mentioned here
are simulated in mat lab. |
Keywords: |
Gold Sequence, Pseudorandom Sequence |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
A COGNITIVE E-LEARNING SYSTEM USING AROUSAL VALENCE EMOTIONAL MODEL |
Author: |
A. KANIMOZHI, DR.V.CYRIL RAJ |
Abstract: |
This paper proposes an approach to connote the basic human emotion to learner’s
emotion for e learning. The emotions are captured from the EEG signals and are
processed at various levels to classify them. This paper uses arousal-valence
model to recognize the learner’s emotion. In addition, we introduce a cognitive
system -Adaptive Control of Thought—Rational – (ACT–R) to dynamically monitor
the learner’s emotion. This dynamic cognitive learning environment brings the
learner’s mood to active listening mood through an external stimulus. This
enables the learner to improvise their in-depth knowledge about the learning
content and kindle their interest towards the subject. In general, this method
is similar to the conventional classroom teaching where the teacher modulates
the content delivery method depending on the mood of student. |
Keywords: |
EEG, Cognitive Architecture - ACT-R, Intelligent Learning Environment,
E-learning |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
USING FUZZY SETS TO MODEL PARALINGUISTIC CONTENT IN SPEECH AS A GENERIC SOLUTION
FOR CURRENT PROBLEMS IN SPEECH RECOGNITION AND SPEECH SYNTHESIS |
Author: |
SACHIN LAKRA , T. V. PRASAD , G. RAMAKRISHNA |
Abstract: |
Current problems in speech processing exist due to infinite variations of speech
utterances. No two speech utterances are exactly alike, even if they are
linguistically the same word. The difference is therefore, due to the
paralinguistic content of the speech utterances. This leads to the
conceptualization of the paralinguistic content of speech as arising from
infinite variation. Infinite variation in paralinguistic content has been
modeled using the interval [0, 1], the basis of fuzzy theory. Variability, that
is, the ability to vary, has been identified as the property of natural systems,
due to which infinite variation is possible. Thus, variability as a concept has
been mapped to paralinguistic content. Further, each component of paralinguistic
content has been mapped to a group of membership functions of fuzzy sets. |
Keywords: |
Variability, Paralinguistic Content Elimination, Paralinguistic Content
Expression, Speech Recognition, Speech Synthesis. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
EXAM QUESTIONS CLASSIFICATION BASED ON BLOOM’S TAXONOMY COGNITIVE LEVEL USING
CLASSIFIERS COMBINATION |
Author: |
DHUHA ABDULHADI ABDULJABBAR, NAZLIA OMAR |
Abstract: |
Assessment through written examination is a traditional method but it is a
universal test method practiced in most of the educational institutions today.
Therefore, the question must be provided in accordance with the subject content
learned by students to fulfil learning objectives. However, the process of
questions writing is very challenging step for the lecturer. The situation is
getting more challenging when lecturers try to produce good quality and fair
questions to assess different level of cognitive. Thus, the Bloom’s Taxonomy has
become a common reference for the teaching and learning process used as a guide
for the production of exam questions. Exam questions classification presents a
particular challenge is the classification of short text questions due to short
text involves text with less than 200 characters. In addition, the features of
short text are very sparse and far. This study proposed a new method to classify
exam questions automatically according to the cognitive levels of Bloom’s
taxonomy by implementing a combination strategy based on voting algorithm that
combines three machine learning classifiers. In this work, several classifiers
are taken into consideration. The classifiers are, Support Vector Machine (SVM),
Naïve Bayes (NB), and k-Nearest Neighbour (k-NN) that are used to classify the
question with or without feature selection methods, namely Chi-Square, Mutual
Information and Odd Ratio. Then a combination algorithm is used to integrate the
overall strength of the three classifiers (SVM, NB, and k-NN). The
classification model achieves highest result through the combination strategy by
applying Mutual Information, which proved to be promising and comparable to
other similar models. These experiments aimed to efficiently integrate different
feature selection methods and classification algorithms to synthesize a
classification procedure more accurately. |
Keywords: |
Bloom’s Taxonomy, Exam Questions, Voting Algorithm, Machine learning, Feature
Selection |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
AUDIT OF ACCOUNTING INFORMATION SYSTEM USING COBIT 4.1 FOCUS ON DELIVER AND
SUPPORT DOMAIN |
Author: |
NI PUTU SRI MERTA SURYANI, GUSTI MADE ARYA SASMITA, I KETUT ADI PURNAWAN |
Abstract: |
The audit is required at a university to evaluate the IT services on accounting
information system. The audit of accounting information system at one of the
universities in Indonesia aims to determine the maturity level of IT services in
support the financial data management. Audit of accounting information system is
very important because the university can determine the extent of IT services
that has been given. In addition, the audit results can also be used as a
reference for the future in improving IT services in accounting information
system. Stages of accounting information system audit begin with choosing a
domain which includes the identification of business goals, IT goals, IT process
and control objectives using COBIT 4.1 framework. The next stage is to collect
the necessary data through interviews and surveys using questionnaires. The data
collected are then processed to obtain a maturity level. Results of audit of
accounting information system that has been conducted show that the maturity
index of the entire IT process is 2.69, which means the current level of
maturity in 3-defined. The expected level of maturity is 4-managed. A comparison
of the current and expected level of maturity to give rise the gap. Improvement
strategy are given to overcome the gaps that appear based on the COBIT 4.1
framework and supported by ITIL V3 framework that has been through the mapping
process using the COBIT 4.1 IT process. |
Keywords: |
Audit of Information System, COBIT 4.1, ITIL V3, Maturity Level, Gap,
Improvement |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
DETERMINATION OF UNKNOWN PARAMETERS OF MATHEMATICAL MODEL USING THE EXPERIMENTAL
DESIGN THEORY |
Author: |
VLADIMIR SERGEEVICH EREMEEV, VLADIMIR LEONIDOVICH KURBATOV, ELENA VLADIMIROVNA
GULYNINA |
Abstract: |
The range of problems that can be solved with the help of mathematical modeling
is constantly increasing, which creates new theoretical problems. One of them is
connected with identification of unknown parameters of models. The problem of
parameters determination belongs to the class of inverse problems. They are
usually considered within the optimization theory. In the present paper, we
propose a fundamentally new approach. The method is based on the theory of
planning and processing of experiments developed by American scientists Box and
Wilson. To evaluate the adequacy of model, a numerical criterion W is formulated
depending only on the model parameters a1, a2,... ak. It is shown that the
maximum adequacy is achieved for the minimum value of W. Therefore, solving the
problem of calculating the parameters is reduced to determination of such values
of a1, a2,... ak that provide the minimum value of the criteria W. This problem
is solved by the steep ascent method due to Box and Wilson. |
Keywords: |
Mathematical Modeling, Inverse Problems, Regression Equation, Algorithm Of
Calculations |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
EHRS ACCEPTANCE IN JORDAN HOSPITALS BY UTAUT2 MODEL: PRELIMINARY RESULT |
Author: |
MALIK B. ALAZZAM, ABD. SAMAD HASAN BASARI , ABDUL SAMAD SIBGHATULLAH , MOHAMED
DOHEIR , ODAI M.A.ENAIZAN , ALI H.KH.MAMRA |
Abstract: |
Purpose: Electronic health records (EHRs) exchange improves hospital quality and
reduces health costs. However, few studies address the antecedent factors of
healthcare professionals’ intentions to use EHR system. We examine the factors
that effecting on EHRs acceptance by Unified Theory of Acceptance and Use of
Technology (UTAUT2) model, this is a new methodology for evaluating acceptance
of EHRs. We propose a theoretical model to explain the exercise behavior of
health care professionals’ to use an EHR system acceptance.
Methods: We conducted a pilot test survey in Jordan hospitals to collect data
from healthcare professionals who had experience using the EHR systems. A valid
sample of 22 responses from 70 questionnaires were collected for data analysis
to pilot test |
Keywords: |
Ehrs, Healthcare Professionals, UTAUT1, UTAUT2, Healthcare Professionals,
Acceptance |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE FREQUENCY RESPONSE OF A DYNAMIC SYSTEM |
Author: |
MIKHAIL L. SIMONOV, KONSTANTIN S. ZAITSEV, NATALYA P.POPOVA |
Abstract: |
The purpose of the solutions, proposed in the article, is further enhancement of
reliability of mathematical and program support of modern computer systems which
require accurate calculations in ill-conditioned problems by step by step
control of the priori error. For this purpose, a computational method for
calculating the frequency response of the system, based on the reduction of the
real Schur form of the initial matrix of coefficients of the system to a
triangular form of the general form using orthogonal similarity transformation,
has been developed. Next, the obtained matrix by permutations is transformed
into a new triangular form, in the lower part of the main diagonal of which the
multiple eigenvalues are placed. The value of the matrix frequency response for
each predefined frequency value is found as the solution of a system of linear
algebraic equations with a triangular coefficient matrix with an extracted
diagonalizable submatrix for multiple eigenvalues. A computational algorithm for
calculating the matrix frequency response of the system is presented. A
comparative assessment of the computational cost in the proposed method and the
method, based on the Hessenberg form, is conducted in the problem of calculating
the frequency response of the system. The article shows an obvious advantage in
the complexity of computations in the absence of multiple eigenvalues, which can
be assessed as a linear function of the dimension of the matrix, over the
quadratic dependence for an alternative method. In the absence of multiple
eigenvalues the proposed method is not inferior in performance to the method
based on the Hessenberg form. |
Keywords: |
Frequency Response, Schur Form, Hessenberg Form, Computational Methods, Linear
System |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
Title: |
BOUNDARY VALUE PROBLEM FOR A B-HYPERBOLIC EQUATION WITH AN INTEGRAL CONDITION OF
THE SECOND KIND |
Author: |
NATALYA VLADIMIROVNA ZAITSEVA |
Abstract: |
In the paper we consider the boundary value problem with an integral condition
of the second kind for a hyperbolic partial differential equation of the second
order with the Bessel operator. We prove the uniqueness of the solution of the
problem. In the paper we use the apparatus of the theory of partial differential
equations and ordinary differential equations, methods of functional analysis,
the apparatus of special functions. While solving the problem, we obtain some
restrictive conditions on the functions that define the initial data of the
problem. The solution of the problem is obtained explicitly, as a series, using
the variable separation method. The substantiation of the solution is carried
out by the method of spectral expansions. The work is theoretical. |
Keywords: |
Hyperbolic Equation, Nonlocal Integral Condition, Bessel Operator. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2015 -- Vol. 78. No. 3 -- 2015 |
Full
Text |
|
|
|