|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2015 | Vol. 79 No.1 |
Title: |
IMAGE DUPLICATION AND ROTATION DETECTION METHODS FOR STORAGE UTILIZATION |
Author: |
TIOH KEAT SOON, ABD SAMAD HASAN BASARI, BURAIRAH HUSSIN |
Abstract: |
Data storage is growing rapidly without surprise for nowadays. There are several
reasons that contribute to it are improper maintained and used including image
duplication and inappropriate image. In order to solve the problems above, this
paper proposed to enhance face detection (V-J) for inappropriate image and scale
invariant feature transform (SIFT) for image duplication method. However, the
enhancement of face detection (V-J) method is needed due to limited rotation
detection. With the limitation above, this paper proposed simple rotation method
to overcome the problem. Besides that, the SIFT method is also limited to the
speed performance. In order to overcome the speed performance above, this paper
also proposed to reduce the dimension of SIFT so that it increase the speed
performance. With the enhancement above show that the proposed resulted better
compared to previous researcher’s methods. Hence, the proposed methods above
have been proposed as pattern detection algorithms used for storage utilization. |
Keywords: |
Pattern Detection, Face Detection, Image Duplication |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
A REVIEW ON WORMHOLE ATTACKS IN MANET |
Author: |
MEHDI ENSHAEI , DR. ZURINA BT HANAPI |
Abstract: |
Mobile Ad-hoc Network (MANET) refers to a multi-hop packet based wireless
network consist of number of mobile nodes which be able to communicate and move
simultaneously, without using any fixed infrastructure. MANET’S are self
organizing networks that can be formed and deformed on the fly. A number of
different attacks have been discovered that can be launched against MANETs.
Wormhole attack is one such attack that has been recently discovered. Wormhole
attack is a very severe and challenging attack because of the fact that it can
be launched against any protocol and also due to its ability to be effective in
case of encrypted traffic. Enormous amount of work has been done towards the
mitigation of wormhole attack and its counter measure. In this paper we have
summarize the efforts previously done, our aim here is to provide the
researchers a platform where they can find a complete reference to all past work
done in regards to the wormhole attack. In the review paper we try to know all
the detection techniques and use appropriate one or modify previous related
works to have better defense mechanism against wormhole attacks. |
Keywords: |
Mobile Ad hoc Network, Wormhole Attack, Wormhole Detection Techniques |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING -
SATELLITE - SECOND GENERATION (DVB-S2) |
Author: |
EL HABTI EL IDRISSI ANAS, EL GOURI RACHID, AHMED LICHIOUI, HLOU LAAMARI |
Abstract: |
The Bose, Chaudhuri, and Hocquenghem (BCH) codes are being widely used in
variety communication and storage systems. In this paper, a simplified algorithm
for BCH decoding is proposed in order to reduce the implementation complexity.
Error locator polynomial with Peterson algorithm is proposed for both a quick
result and very low components instead of the Berlekamp’s algorithm that uses
the iterative method. In addition, a modified Chien search block is proposed to
reduce the hardware complexity. This algorithm reduces the number of logic
gates. Consequently, it reduces the power consumption with a percentage which
can achieve 32 % compared to the basic algorithm. We developed the design of the
proposed algorithm, we generated and simulated the hardware description language
source code using Quartus software tools and finally we implemented the new
algorithm of BCH decoder on FPGA card. |
Keywords: |
FPGA implementation, BCH decoder, add syndromes, iterations, Digital Video
Broadcasting-Satellite-Second Generation |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF LDPC- AND TURBO-CODED OFDM BASED ON DMWCST |
Author: |
SAMEER A. DAWOOD, F. MALEK, M. S. ANUAR, ABADAL-SALAM T. HUSSAIN |
Abstract: |
In this paper, low-density parity-check (LDPC) codes and turbo codes (TCs) are
proposed to improve the bit error rate (BER) performance of a new orthogonal
frequency-division multiplexing (OFDM) system based on discrete multiwavelet
critical-sampling transform (DMWCST). The use of channel coding in an OFDM based
on the DMWCST (OFDM-DMWCST) system is useful in providing the desired
performance at high data rates. The proposed systems have been tested according
to different code rates and mapping schemes over additive white Gaussian noise,
flat fading, and frequency-selective fading channels. The decoding technique
used in the simulation for LDPC codes and TCs was iterative decoding because
this method provides maximum efficiency at high iterations. Simulation results
reveal that the coded OFDM-DMWCST system achieves large coding gain with low BER.
Thus, this system offers a high data rate under wireless communication channels.
Furthermore, the LDPC-coded OFDM-DMWCST system performs better than turbo-coded
OFDM-DMWCST system. |
Keywords: |
OFDM, LDPC codes, turbo codes, multiwavelet critical-sampling transform, data
rate, wireless channels |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
MEL FREQUENCY CEPSTRAL COEFFICIENTS (MFCC) FEATURE EXTRACTION ENHANCEMENT IN THE
APPLICATION OF SPEECH RECOGNITION: A COMPARISON STUDY |
Author: |
SAYF A. MAJEED, HAFIZAH HUSAIN, SALINA ABDUL SAMAD, TARIQ F. IDBEAA |
Abstract: |
Mel Frequency Cepstral Coefficients (MFCCs) are the most widely used features in
the majority of the speaker and speech recognition applications. Since 1980s,
remarkable efforts have been undertaken for the development of these features.
Issues such as use suitable spectral estimation methods, design of effective
filter banks, and the number of chosen features all play an important role in
the performance and robustness of the speech recognition systems. This paper
provides an overview of MFCC's enhancement techniques that are applied in speech
recognition systems. The details such as accuracy, types of environments, the
nature of data, and the number of features are investigated and summarized in
the table combined with the corresponding key references. Benefits and drawbacks
of these MFCC's enhancement techniques have been discussed. This study will
hopefully contribute to raising initiatives towards the enhancement of MFCC in
terms of robustness features, high accuracy, and less complexity. |
Keywords: |
Mel Frequency Cepstral Coefficients (MFCC); Feature Extraction; Speech
Recognition. |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
AN INSIGHT INTO ADAPTIVE NOISE CANCELLATION AND COMPARISON OF ALGORITHMS |
Author: |
M. L. S. N. S. LAKSHMI, P. MICHAEL PREETAM RAJ, RAKESH TIRUPATHI, P. GOPI
KRISHNA, K.V.L. BHAVANI |
Abstract: |
The principle of adaptive noise cancellation is to acquire an estimation of the
unwanted interfering signal and subtract it from the corrupted signal. Adaptive
Noise Cancellation technique is an approach for powerful noise cancellation. In
this paper the noise cancellation is performed using adaptive noise cancellers
using an adaptive finite impulse response (FIR) filter are presented for the
estimation of a transfer function of a noisy channel in a communication link.
Optimizations of the Least Mean Square (LMS) versions and Normalized LMS (NLMS),
Weiner algorithms are also used to adapt the filter coefficients of the
estimated transfer functions in order to minimize the effect of background noise
effectively & analyzed their performances with respect to their estimation of
weights. |
Keywords: |
Finite Impulse Response Filters (FIR), Infinite Impulse Response Filters (IIR),
Least-Mean Square Algorithm (LMS), Normalized Least Mean Square Algorithm (NLMS),
WIENER Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
NATURAL EXTENSIONS: BAT ALGORITHM WITH MEMORY |
Author: |
AHMED MAJID TAHA, SOONG-DER CHEN, AIDA MUSTAPHA |
Abstract: |
Bat Algorithm (BA) has recently started to attract a lot of attention as a
powerful search method in various machine learning tasks including feature
selection. Feature selection is essentially a dimensionality reduction problem
that aims at two key objectives; to shorten the computational time and to
improve classification accuracy. This paper attempts to address the issue of
high computational time in feature selection by proposing a natural extension to
the BA called the Bat Algorithm with Memory (BAM). This algorithm is inspired
from observations that natural bats must rely upon spatial memory in navigating
familiar spaces with dimensions larger than a few meters due to their limited
biosonar operating range. Using the same approach, bats in existing BA is
extended with memory capability to enable them to navigate easily over familiar
locations. To evaluate the proposed algorithm, a series of experiments were
carried out on twelve datasets with different number of objects and attributes.
Next, the experimental results were compared with the original version of BA.
The results showed that BAM was able to deliver competitive classification
accuracy with increased saving time ranging from 28% up to 95%. The results also
demonstrated that the time saving was attributed to three characteristics, which
are samples number, feature number, and dataset geography. Consequently, BAM is
also more efficient with lower number of features and higher number of samples. |
Keywords: |
Computational Intelligence, Evolutionary Algorithms, Bioinspired Computing,
Feature Selection |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
BIOMETRIC BASED INDUSTRIAL MACHINE ACCESS CONTROL SYSTEM USING FPGA |
Author: |
B.MURALI KRISHNA, G.L.MADHUMATI, M.SIVA RAMA GANESH, Y.BHARGAV, V.MOHAN VAMSEE
KRISHNA, O.MANOJ KUMAR |
Abstract: |
Biometrics has become the widely used technology for enhancing security in most
of the areas like research centers, organizations, hospitals, industries, home
security etc. Biometrics is related to rhythms of human characteristics like
face recognition, fingerprints, retina scan, palm prints etc. Authentication of
biometrics is used for access control and identification of human presence. In
this we propose a new concept called Industrial Machine Access Control System
using Finger Print Recognition. To avoid Unauthorized Access Fingerprint Module
is interfaced with FPGA. FPGAs are the reprogrammable semiconductor silicon
chips with high reliability, less expensive and low power consumption. Xilinx
Platform Studio- Embedded Development Kit(EDK) is used for designing FPGA based
Industrial Machine Access Control System, Xilinx- Software Development Kit(SDK)
is used to develop application program to provide Authorized Machine Access
Control and Impact is used to configure the FPGA. |
Keywords: |
Fingerprint Module, FPGA, Xilinx Platform Studio, EDK, SDK |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING |
Author: |
MOHAMMAD H. NADIMI-SHAHRAKI, FARAMARZ SAFI, ELNAZ SHAFIGH FARD |
Abstract: |
In this decade, grid computing is a well-known solution for applying a large
collection of connected heterogeneous systems and sharing various combinations
of resources. It creates a simple but large, powerful and self-managing virtual
computer, which leads to the problem of load balancing. The main goal of load
balancing is to provide a distributed and low cost scheme that balances the load
across all the processors. In this paper, a new load balancing algorithm named
optimal anti-directed chord is proposed. In this overlay structured network that
load information and processes among nodes have been organized for tradeoffs
(load balancing), reaching time to a particular process or entity is reduced
because of anticlockwise movement. Experimental results show that the proposed
method reduces reaching time by 33% in comparison to simple chord and 16% ABC
method. |
Keywords: |
Load Balancing, Grid Computing, Anti-Clockwise-Direction Chord. |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
EXTENSION OF PACMAD MODEL FOR USABILITY EVALUATION METRICS USING GOAL QUESTION
METRICS (GQM) APPROACH |
Author: |
ASHRAF SALEH, ROESNITA BINTI ISAMIL, NORASIKIN BINTI FABIL |
Abstract: |
Usability measurement is tedious work, particularly for current smart mobile
devices. With an increasing capacity for greater user interactivity through a
range of tasks and in a variety of contexts during time, the importance and
impact of mobile device context-of-use components is of particular interest to
researchers. PACMAD was introduced as comprehensive usability model for mobile
applications to evaluate usability based on usability factor; user, context of
use, and task. PACMAD model identified the usability attributes without
considering related low level metrics which represents each attribute. Thus,
there is a need to be extended to include relative low level metrics in addition
to usability attributes. This motivates us to performed comprehensive literature
revise to collect studies that evaluate mobile applications in order to find
validated usability evaluation metrics based on PACMAD model attributes by
applying Goal Question Metrics (GQM). |
Keywords: |
Usability Evaluation, Usability Metrics, Mobile Usability, GQM, PACMAD |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
A NOVEL APPROACH FOR SIMULTANEOUS GENDER AND HINDI VOWEL RECOGNITION USING A
MULTIPLE-INPUT MULTIPLE-OUTPUT CO-ACTIVE NEURO-FUZZY INFERENCE SYSTEM |
Author: |
SACHIN LAKRA , T. V. PRASAD , G. RAMAKRISHNA |
Abstract: |
Human beings can simultaneously recognize vowels in speech as well as gender of
a speaker inspite of high variability. However, machines have not been able to
simultaneously overcome both gender variability and vowel variability existing
in speech due to gender. This paper uses a Multiple-Input Multiple-Output
Co-Active Neuro-Fuzzy Inference System to recognize both these patterns in
speech simultaneously. The features used as input for the recognition is the
pitch and the set of first three formant frequencies extracted from speech
samples recorded from 70 Indian speakers, 33 male and 37 female. The individual
recognition of either gender or vowel has been achieved at a rate of 68% and
95%, respectively, whereas the simultaneous recognition of both patterns has
been attained upto 66% for the training set. Thus, this combined approach is a
consolidated single-step novel approach which can replace the two-step method in
automatic speech recognition systems where gender recognition is being used as
the first step as part of hierarchical decision tree based vowel recognition.
This can prove significant in enhancing the performance of an automated speech
recognition system by eliminating an additional step. |
Keywords: |
Formant Frequency, Co-Active Neuro-Fuzzy Inference System, Gender Recognition,
Vowel Recognition. |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
INDOOR GLOBAL PATH PLANNING BASED ON CRITICAL CELLS USING DIJKSTRA ALGORITHM |
Author: |
SANI IYAL ABDULKADIR, SYED ABDULLAH FADZLI, AZRUL AMRI JAMAL, MOKHAIRI MAKHTAR,
MOHD KHALID AWANG, MUMTAZIMAH MOHAMAD, FATMA SUSILAWATI |
Abstract: |
Path planning has been implemented in various robotics systems, and the results
checked. This paper proposes global path planning based on grids representation
in an indoor environment using Dijkstra algorithm. The algorithm uses floor plan
of any environment discretized to some equal-sized square grids. Cells that
contained doorways, corner, curve and junction are considered as critical cells.
These critical cells are used as the vertices to the Dijkstra algorithm, with
distances between two successive cells as edges between them, and the shortest
path between a set of predefined points within the terrain can then be
calculated. Simulations results show that the proposed algorithm enhances
performance and speed compared to the traditional Dijkstra’s algorithm. |
Keywords: |
Global path planning, Grid-based environment, Dijkstra algorithm, Robotics |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
MODEL DRIVEN ARCHITECTURE A REVIEW OF CURRENT LITERATURE |
Author: |
AHMED MOHAMMED ELSAWI, SHAMSUL SAHIBUDDIN, ROSLINA IBRAHIM |
Abstract: |
Among different Model Driven Engineering (MDE) approaches, the Object Management
Group (OMG) adopted the Model Driven Architecture (MDA). The MDA approach is
aiming to automate the software develop process by using models instead of
conventional coding and bases on the separation of concern concept. In June
2014, the OMG released the second version of the MDA guide trying to realize the
fundamental principles and to support the first MDA guide issued in 2003 with
more detailed specifications. A gap of 11 years makes researchers from their own
perspective and background come up with different interpretations of the MDA
terms. The thing that generates a confusion of what is beyond and what is within
the MDA scope. By strictly referring to the MDA standard (not to model-driven
engineering in general), we provide in this work a review of the current MDA
literature. We also shed the light on the MDA research directions, specifically
on the automations of the MDA development process and its targeted platforms. |
Keywords: |
MDA, MDE, OMG, Model Driven Architecture, Literature Review |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
CHARACTERISTICS OF DUAL-CORE PHOTONIC CRYSTAL FIBER BY FD-BPM |
Author: |
HICHAM CHIKH-BLED, BOUMEDIENE LASRI, MOHAMMED EL-KEBIR CHIKH-BLED |
Abstract: |
We present results related to the numerical method based on Finite Domain Beam
Propagation Method (FD-BPM). It allows to characterize microstructured fibers
Air / Silica (FMAS) with a good approximation. We also show how optogeometrical
parameters (d: diameter of the holes, Λ: spacing between the air holes) can
influence the propagation characteristics for applications in optical networks
Telecommunications. |
Keywords: |
Finite domain beam propagation method (FD-BPM), Modeling, Microstructured fibers
Air/Silica (FMAS), Diagrams of dispersion, Couplers, mode coupling. |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
MAPPING OF A PLATFORM SPECIFIC MODEL TO A PARTICULAR PLATFORM USING AN EAV
DESIGNED PLATFORM MODEL |
Author: |
AHMED MOHAMMED ELSAWI, SHAMSUL SAHIBUDDIN |
Abstract: |
The Model Driven Architecture (MDA) aimed to produce applications that support
multiple platforms using models instead of the conventional coding with less
cost and time. The MDA development process separated to Platform Independent
Model (PIM) and Platform Specific Model (PSM). Both, PIM and PSM are standing in
different level of abstraction. The PIM focused on the business rules definition
with no concern about the platform environment. It is the PSM role to emphasis
on the implementation environment of the targeted platform. Although, the PSM
models holding some technical implementation details about the targeted
platform, but it’s still considered too abstract to be executed in a run-time
platform environment. The degree of abstraction can be controlled by the model
mapping, given the MDA standard Platform Model (PM). The PM can be described as
a platform’s system manual that provides model mapping with a specific technical
details required by the targeted run-time environment. In this work we
explicitly employed a Platform Model (PM) designed by the Entity-Attribute-Value
(EAV) concept to support the model mapping from PSM to Java platform. A case
study provided as proof of concept to generate executable Java code that
supports desktop and mobile platform. |
Keywords: |
MDA, PSM, Platform Model, Mapping to Java Platform, EAV |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
AVOIDING BOUNDARY ARTIFACTS IN IMAGE USING DECONVOLUTION TECHNIQUE |
Author: |
S. MARY IMMACULATE |
Abstract: |
Deconvolution is the process used to reverse the effects of convolution on
image.The concept of deconvolution is popular used in the techniques of signal
processing and image processing.It is the process of separation of blurred image
from the original image. The objective is to find the original image from the
observed blurred image which is degraded by an additive Gaussian noise and blur
kernel.The noise from the given input image is found by using Fourier domain
deconvolution.We can retain the spatial information of the image using Fourier
domain.To remove the artifacts from the image without excessive slow down in
computation,iterated shrinkage deconvolution technique used.With these results
will be improved in both visual quality and mean square error. In fact, the
wiener filter method is used for deconvolution.Its purpose to decrease the
amount of blur available in the image by comparison with an estimation of the
desired noiseless image.This technique gives proper solution for multiple images
by removing artifacts without excessive slow down.This algorithm can
computationally be improved by providing very low complexity. To apply the
MATLAB edge taper function is to smooth the transition between the opposite
sides of the images(part of the Image Processing Toolbox). |
Keywords: |
Deblurring, Deconvolution, Image Processing, Image Restoration, Iterated
Shrinkage Thresholding, Primal-Dual Methods, Sparsity, Wiener Filter. |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
MOBILE CLOUD COMPUTING & MOBILE’S BATTERY EFFICIENCY APPROACHES: A REVIEW |
Author: |
MUSHTAQ ALI, JASNI MOHD ZAIN, MOHD FADLI ZOLKIPLI, GRAN BADSHAH |
Abstract: |
Today, millions of users world¬wide experience pervasive email and Web access
through IPhones, Black Berries, Windows Mobile, and other mobile devices
(Laptops, PDAs). After information at the fingertip, energy efficiency of these
devices is paramount which makes the devices first choice of communication for
the new generation. On the other hand, Mobile Devices, especially smartphones
has limited resources such as, storage, network bandwidth, processor’s
performance and battery life. Moreover multiple sensors and wireless interfaces
drain battery swiftly, thus reducing the operational time. Therefore, extending
battery life of these devices has become of crucial research importance at
hardware and software levels, both alike. This paper provide an overview of the
software side by summarizing the background, techniques of battery augmentation,
and on-going research on computational offloading to remote servers (Cloud);
sending heavy computation to remote servers and receiving the result back on
mobile screen. At the end, summary of the previous research work on
computational offloading discussed with a critical analysis. Moreover,
suggestions and opinions related to energy efficiency of SIDs given, based on
the comparative studies. |
Keywords: |
Mobile Cloud Computing, Mobile Computing, Cloud Computing, Augmentation
Techniques, Context-Awareness |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
Title: |
A NOVEL APPROACH TO EFFICIENT EXPLORATION AND MINING OF STUDENTS’ DATA |
Author: |
ADELEKE RAHEEM AJIBOYE, RUZAINI ABDULLAH ARSHAH, HONGWU QIN |
Abstract: |
Several undergraduate students most especially the new students do have an
unacceptable Grade Point Average (GPA) at the end of their first year. Research
has shown that during this period, stress by this set of students sometime
responsible for their poor performance as they are faced with many challenges.
Having knowledge about their previous academic knowledge can bring about a
workable solution to prevent this trend. In this paper, a novel approach that
efficiently explores students’ data for the prediction of their performance
based on their historical data is proposed. A prediction system is designed in
line with the concept of the Unified Modelling Language (UML) and it is
implemented using PHP; while MySQL serves as the back-end. The developed model
is tested and a more satisfactory result is achieved when compared with similar
models emanated from using machine learning techniques. The resulting outputs of
this study unveil the academic achievement of each student prior to their first
registration in the university. The model developed is also found to be useful
for efficient planning and quick decision making that can ensure a sustainable
educational growth. |
Keywords: |
Educational Data Mining, UML, Predictive Model, Student’s Achievement, Data
Exploration |
Source: |
Journal of Theoretical and Applied Information Technology
10th September 2015 -- Vol. 79. No. 1 -- 2015 |
Full
Text |
|
|
|