|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
May 2015 | Vol. 75 No.2 |
Title: |
A PARALLEL SCHEDULING SEQUENCE OF GF (P) EDWARDS COORDINATES COMPUTATION FOR ECC |
Author: |
QASEM ABU AL-HAIJA |
Abstract: |
Elliptic curves cryptography (ECC) algorithm is well-known powerful approach of
implementing public key cryptography created by Victor Miller and Neil Koblitz.
ECC is a modular arithmetic based algorithm that includes modular inversion
operation in its computation, which is considered as one of the heaviest
operations that can be performed by the coprocessor. Implementing ECC with
projective coordinates avoided the use of inversion by replacing it with a
number of parallel multiplications. A parallel hardware scheduling of ECC based
Edward's projective coordinates over prime finite field (GF (p)) will be studied
in this paper to perform ECC doubling operation by using parallel hardware
units. The analysis showed that parallelizing Edward's projective coordinates
enhanced the performance factor by even three times over the serial design as it
gives a considerable enhancement for the security against power/time attacks. |
Keywords: |
ECC Algorithm, GF (p) field, Modular Inverse, Edwards Curves, and Projective
Coordinates |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
CLASSIFICATION OF BRAINWAVE USING DATA MINING IN PRODUCING AN EMOTIONAL MODEL |
Author: |
NURSHUHADA MAHFUZ, WAIDAH ISMAIL, ZALISHAM JALI, KHAIRUL ANUAR, MD JAN NORDIN |
Abstract: |
In this paper, classification of brainwave using real world data from
Parkinson’s patients is presented. Emotional model is produced from the
classification of brainwave. Electroencephalograph (EEG) signal is recorded on
eleven Parkinson’s patients. This paper aim to find the “best” classification
for the emotional model in brainwave patterns for the Parkinson’s disease. The
work performed based on the two method phases which are using the raw data and
pre-processing data. In each of the method, we performed for steps in the sum of
the hertz and divided by total hertz. In the pre-processing data we are using
statistic mean and standard deviation. We used WEKA Application for the
classification with 11 fold validation. As a results, implecart from the
classification tree performed the “best” classification for the emotional model
for Parkinson Patients. The Simplecart classification result is 84.42% accuracy. |
Keywords: |
Classification, Brainwave, Emotional Model, Parkinson Patients |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
AACGFA : ADAPTING AUTO-CONFIGURATION GEOGRAPHICAL FIDELITY ALGORITHM FOR MOBILE
WIRELESS SENSOR NETWORKS |
Author: |
MBIDA MOHAMED, DR EZZATI ABDELLAH |
Abstract: |
Today Mobile Wireless sensor networks (MWSN) are used in several areas. There
are many environments of developments and designs MWSN in programing level
according to projects needs, however in this article we will design a MWSN model
using design tools as Wisen Profile (model devoted to a Driven Development MDD
paradigm precisely in Topology of applications) that aims to extend the lifetime
of MWSN and have a powerful communication covered network and also provide a
number of nodes reachable in case the default path is isolated. We will simulate
this new Algorithm of Topology control called AACGFA(Adapting auto-configuration
geographical fidelity algorithm), and we proceed to a comparative study with
GAFA (geographical adaptive fidelity) algorithm, to see if the AACGFA make more
optimal energy consumption and strongest connectivity between nodes . |
Keywords: |
Mobile Wireless Sensor Networks (MWSN), Topology control (TC), Model Driven
Development (MDD) , Wisen Profile(WP), geographical adaptive fidelity algorithm(
GAFA), Duty Cycle, Feature Model (FM). |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
CASENG: ARABIC SEMANTIC SEARCH ENGINE |
Author: |
AMAL AL MUQRISHI, AWNY SAYED, MOHAMMED KAYED |
Abstract: |
Accurate information availability is a key factor for knowledge acquisition
without going into extraneous information. Understanding searcher intent and the
contextual meaning of terms as they appear in the searchable dataspace is a
challenge that has been addressed and handled by many semantic search engines.
As meaning encoded separately from data in semantic technology, adding, changing
and implementing new relationships can be done easily. The evolution of semantic
search added a new dimension of challenge due to a lack in support of the Arabic
language. In this paper, we figure out the problem and implement a Semantic
Search Engine (CASEng) for College of Applied Sciences, Oman. CASEng supports
both Arabic and English search. It uses a Resource Description Framework (RDF)
data and Lucene for indexing and searching to move from keyword-based search via
Google and other engines to semantics-based search. The experiments show that
both the spell-checker and the search engine perform well with a set of test
queries. |
Keywords: |
Semantic Search, RDF, CASEng, Lucene, keyword-based search, semantics-based
search |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
NETWORK SELECTION IN HETEROGENEOUS WIRELESS ENVIRONMENT USING DECISION MAKING
ALGORITHMS-TOPSIS AND PROMETHEE |
Author: |
KSS ANUPAMA, DR S SRI GOWRI, DR B PRABHAKARA RAO |
Abstract: |
Forthcoming wireless environment is a fusion of numerous networks with diverse
technologies deployed by individual operators. In such an environment,
innovative network selection methodologies are required not only to provide
“always best connected” service to mobile users but also to maximize network
operator’s revenue. To fulfill such requirements, multiple attributes from each
network are to be systematically assessed. Consequently network selection
becomes an issue of multiple attribute decision making (MADM). Various MADM
algorithms have been proposed for use in network selection decision process.
This paper compares the performance of PROMETHEE (Preference Ranking
Organization Method for Enrichment Evaluations) an outranking MADM algorithm
with TOPSIS (Technique for order of Preference by Similarity to the Ideal
Solution (TOPSIS), a classical MADM algorithm in selecting the best network in a
heterogeneous wireless environment. It also analyzes the effect of PROMETHEE and
TOPSIS algorithms on ranking abnormality and mobile terminal distribution among
the networks during handoff. A combination of Analytic Hierarchy Process (AHP)
and Entropy method is used to assign weights to the decision criteria.
Simulation results show that PROMETHEE algorithm outperforms TOPSIS in network
selection decision making. |
Keywords: |
Network Selection, Handoff Decision, MADM, PROMETHEE, TOPSIS. |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
PREDICTING STUDENTS’ PERFORMANCE THROUGH CLASSIFICATION: A CASE STUDY |
Author: |
MASHAEL A. AL-BARRAK, MONA S. AL-RAZGAN |
Abstract: |
Performance in academic courses is among the most important factors affecting
the quality of higher education available to students. In this paper, we use
data mining techniques, specifically classification, to analyze students’ grades
in different evaluative assignments for a course on data structures. For this
purpose, we compare three different classifiers using real data from King Saud
University to predict students’ performances. We apply classification techniques
to both numerical and categorized attributes. Our results show that the model
based on the Naďve Bayes algorithm provides the most accurate predictions. In
addition we were able to obtain a model with a 91% accuracy to predict students
failure in the course. |
Keywords: |
Educational Data Mining, Classification, Prediction, Naive Bayes, JRip |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN IMPROVED WATERMARKING RESISTANCE DATA COMPRESSION ON DIGITAL IMAGES USING
HAAR WAVELET ORTHONORMAL BASIS DISCRETE COSINE TRANSFORM |
Author: |
M.SHARMILA BANU, DR.C.CHANDRASEKAR |
Abstract: |
Digital watermarking is an emerging area of research for developing diverse
system in order to avoid the repetition and exploitation of secret data. Digital
watermarking protects data contents such as images, audio and video files with
higher accuracy rate. Recently, several lossy and lossless data compression
methods were developed so far but with an additional computation burden making
the system not flexible. When implementing, data compression algorithm on
digital images, attaining robustness is one of the challenging issues. As the
noise ratio is higher, the compressed data are not well reconstructed if
compression is done on digital images. In my research work, HAAR Wavelet
Orthonormal based Discrete Cosine Data Compression Transformation (DCDCT) is
developed to improve the resistant level and to reduce the computational burden
on digital images. Initially, the HAAR Wavelet Orthonormal based DCDCT method is
composed of two parts namely, watermark compression and decompression operation.
In data compression phase, transformation, digitizing and Entropy Encoder
operations are carried out. DCDCT method performs the transformation operation
through cosine transform, where the embedding data is converted into analog
frequency signal components. Secondly, digitizing operation is processed using
the Orthonormal wavelet function to perform mapping and improve the resistant
level (i.e.,) avoidance of noise rate on data compression. Finally, HAAR wavelet
differential Manchester procedure is used on encoding operation. The same three
operations are carried out in reverse order for the decompression of data from
digital images in DCDCT method. Experiment is conducted on factors such as Peak
Signal Noise Ratio (PSNR) Difference, bit error rate and resistance ratio level. |
Keywords: |
Discrete Cosine Transform, Digital Watermarking, Data Compression, HAAR Wavelet
Transform, Entropy Encoder, Frequency Signal. |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
EMPIRICAL STUDY OF GUI TO REUSE UNUSABLE TEST CASES |
Author: |
ALBERT MAYAN. J , LAKSHMI PRIYA. K , YOVAN FELIX. A |
Abstract: |
Now-a-days it is more important to upgrade web applications which are provided
by companies due to changes in user requirements. In developing web applications
the graphical user interface (GUI) plays vital role. Due to frequent changes in
application it varies from old version and modified version. Finally, it makes
some of the test cases as unfeasible in modified version. We mainly, focus in
areas where modified version is affecting the old test suite to make some of the
test cases as unfeasible. To rectify this problem, we used to make changes in
input constraint values. Here, we consider regression testing to make testing
more flexible whenever changes occurred. Testing can be done manually and also
by using tools. By this technique we can make maximum number of unfeasible test
cases to feasible in modified versions. By reusing the unusable test cases it
requires less time to make modified version as more efficient and also reduces
cost of regression testing. |
Keywords: |
Regression Testing, Feasible And Unfeasible Test Cases, Constraint Values, Web
Applications |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
3D OBJECT SYMMETRY MEASUREMENT USING EXTENDED GAUSSIAN IMAGE |
Author: |
ABDELALIM SADIQ, YOUNESS TABII |
Abstract: |
In this paper, we state a new way for measuring symmetry of three-dimensional
graphic object. The idea is based on the representation of three-dimensional
objects by their Extended Gaussian Image (EGI). The EGI is constructed by
mapping each surface normal of any object to the Gaussian sphere. The Gaussian
sphere is presented by icosahedrons and 60 rotations are applied. An
experimental evaluation demonstrates the satisfactory performance of our
approach on a fifty three-dimensional models database. |
Keywords: |
3D Object, Extended Gaussian Image, Similarity Measure, Icosahedrons, Gaussian
Sphere. |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
CONTEXT RANK BASED HIERARCHICAL CLUSTERING ALGORITHM ON MEDICAL DATABASES (CRBHCA) |
Author: |
SHAHANA BANO, K.RAJASEKHARA RAO |
Abstract: |
In this paper we proposed a method which avoids the choice of natural language
processing tools such as pos taggers and parsers reduce the processing overhead.
Moreover, we suggest a structure to immediately create a large-scale corpus
annotated along with disease names, which can be applied to train our
probabilistic model. In this proposed work context rank based hierarchical
clustering method is applied on different datasets namely colon, Leukemia, MLL,
Lymphoma medical diseases. Optimal rule filtering algorithm is applied on these
datasets to remove unwanted special characters for gene/protein identification.
Finally, experimental results show that proposed method outperformed existing
methods in terms of time and clusters space. |
Keywords: |
Biomedical, Machine Learning, Gene/Protein, Clustering, Medline, Pubmed |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
TRIPLING FORMULAE OF ELLIPTIC CURVE OVER BINARY FIELD IN LOPEZ-DAHAB MODEL |
Author: |
SHARIFAH MD YASIN, ZAITON MUDA |
Abstract: |
In elliptic curve cryptosystem (ECC), scalar multiplication is the major and
most costly operation. Scalar multiplication involves with point operations such
as point addition, point doubling, and point tripling. Scalar multiplication can
be improved by using efficient point operations. This research focuses on point
tripling operation for elliptic curves over the binary field in Lopez-Dahab (LD)
model. Currently, there is no existing tripling formula for this model.
Traditionally, tripling is computed using one doubling followed by one addition
(i.e. 3P=2P+P) with cost of 18M+8S, where M is field multiplication and S is
field squaring. In this paper, we proposed tripling formulae with cost of
12M+7S. We proved the formulae and proposed its algorithm. The tripling saved
6M+1S which contribute to cost reduction in multiplication and squaring by 33%
and 12.5% respectively when compared with the traditional method. For National
Institute of Standards and Technology (NIST) curve (i.e. where a = 1), the cost
of the tripling is further reduced to 10M+7S which saved 8M+1S from the
traditional one. Further cost reduction in multiplication and squaring by 44%
and 12.5% respectively. |
Keywords: |
Elliptic curve over binary field, scalar multiplication, point tripling, Lopez-Dahab |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
A FAULT TOLERANT ALGORITHME FOR MULTIPLE RESOURCES SHARING IN DISTRIBUTED
SYSTEMS |
Author: |
TAHAR ALLAOUI, MOHAMED BACHIR YAGOUBI |
Abstract: |
In this paper we present a fault tolerant algorithm to resolve the K mutual
exclusion problem in distributed systems. Our algorithm, which is a token based,
ensures K mutual exclusion with an interesting message complexity where the
number of exchanged messages to satisfy each request is between 0 message in the
best case and K+2 messages in the worst case, where K denotes the system’
resources number. In this algorithm, we introduce a fault tolerance mechanism
that tolerates the likelihood crash of several nodes at the same time and
ensures the system well-functioning after messages loss without relying on
complex election algorithms to generate new tokens. |
Keywords: |
Mutual exclusion, K-mutual exclusion, Critical section, Distributed systems,
Fault tolerance, Tokens. |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
IMPACT OF PERCEIVED ORGANISATION SUPPORT AND ORGANISATION COMMITMENT ON TURNOVER
INTENTION OF WOMEN EMPLOYEES IN IT INDUSTRY |
Author: |
DR SARANYA R , DR MUTHUMANI S |
Abstract: |
As the information economy expands, the information technology workforce becomes
the key to a developing nation economic health. Even after the dotcom bubble
burst, IT jobs losses and unemployment growth were short lived. Even though
there is a shortage of IT worker supply, hence organization should support and
motivate the employees to retain them. This study focuses on Perceived
organization support so that it paves way for reducing the turnover intention of
employees in IT industries. |
Keywords: |
Perceived organization support, Organization commitment, Turnover intention |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
COMMUNICATION IS THE SOURCE OF CAREER PROBLEMS AMONG HEARING IMPAIRED GROUP IN
MALAYSIA |
Author: |
RUZIMI MOHAMED, OTHMAN IBRAHIM, MEHRBAKHSH NILASHI |
Abstract: |
Hearing impaired group claimed that they having difficulty in order to get a job
and a few of them also said that they likely to change over after they are able
to get the position. It seems to be difficult to employ any kind of job due to
unstable economy plus with a huge number of foreign workers immigrate into our
country. Hearing impaired people seem to change over their job and at the end
making unstable economy for them. Many efforts and ways that been made by the
government and non-government organization to open their mind and at the same
try to help. However, there is no positive outcome can be count over. Moreover,
when all issue on hearing impaired group be voice out, there is no evidence to
support all the problems and failed to detect the main factor related to this
issues. Research that include with quantitative, descriptive and interview
towards these group in order to identify the main cause in employment issue had
be done successfully with Yayasan Pembangunan Keluarga Darul Ta`zim. The result
that been gather from 33 respondents hearing impaired show that 28 people having
problem in their career (mean score 1.15). While through this research too,
problem in communication has been detected as a major problem with mean score
2.48 follow by issue on low salary (mean score 2.24) and higher workloads (mean
score 2.03). For hearing impaired people that get high level of education, they
have least problem in their career with standard deviation 0.36. In this
research, it will explain more on the main and other cause and also discuss more
on effect that cause by those problem towards hearing impaired group. And at the
same time try to find the solutions for all problems. |
Keywords: |
People with Disability (PWD), Hearing Impaired Group, Problem in Communication,
Employment Issue Faced By Hearing Impaired Group. |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
Title: |
APDATI: E-FISHING LOGBOOK FOR INTEGRATED TUNA FISHING DATA MANAGEMENT |
Author: |
DEVI FITRIANAH, ACHMAD NIZAR HIDAYANTO, REMMY A.M. ZEN, ANIATI MURNI ARYMURTHY |
Abstract: |
It is an absolute requirement for the fishing industry to have a management
system in order to increase the productivity and the competitiveness in the
fishing industry, specially in Indonesia. In this paper we proposed to develop
an ICT based integrated tuna fishing management system: E-Fishing Logbook APDATI.
The system encompasses all the business process in the fishing industry, start
from logging the fishing, licensing, fishing monitoring until the export
licensing to the other countries. The system should accomodate all the
stakeholders in the fishing industry which are going to be the user of the
future system. They are the Minister of The Marine Affair and Fishing (MMAF),
the fishing company and the fishing ships. Based on the integrated architecture
system proposed in the previous study, we developed the system in two platforms,
the web based system and the mobile based system. The development methodology
for both systems start from the user requirement analysis until the application
design that meets the requirements based on the business process identified. Of
all the stages conducted in the system development, we have succeded to design a
well suited integrated tuna fishing data management system that contribute to
the development of the Indonesian Fishing Industry. |
Keywords: |
E-Fishing Logbook, Fishing Data Management, Mobile Documentation, Android
Application, Indonesia |
Source: |
Journal of Theoretical and Applied Information Technology
20th May 2015 -- Vol. 75. No. 2 -- 2015 |
Full
Text |
|
|
|