|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2015 | Vol. 77 No.1 |
Title: |
MODIFICATION OF NEURAL NETWORK ALGORITHM USING CONJUGATE GRADIENT WITH ADDITION
OF WEIGHT INITIALIZATION |
Author: |
AZWAR RIZA HABIBI, TRISILOWATI, RATNO BAGUS EDY WIBOWO |
Abstract: |
This paper develops neural network (NN) method using conjugate gradient (CG)
with combination of particle swarm optimization (PSO) and genetic algorithm
(GA). The combination of PSO and GA is used for weight initialization to improve
the computational process and minimize the errors. CG method can change every
learning rate of neural network, so that the addition of CG can increase the
rate of convergence. PSO, by its calculation velocity, can get quickly the
solutions and GA act to expand the searching area of PSO solution. This new
algorithm is called CN-PSOGA. There are some criterions used to compare the
CN-PSOGA algorithms with others, i.e. accuracy degree, number of iterations, and
computation time produced by each algorithm. Simulation results show that the
proposed algorithm can increase the accuracy of solution approach. |
Keywords: |
Neural Network, Conjugate Gradient, Particle Swarm Optimization, Genetic
Algorithms. |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
PROCESS DISCOVERY: A NEW METHOD FITTED TO BIG EVENT LOGS |
Author: |
SOUHAIL BOUSHABA, MOHAMMAD ISSAM KABBAJ, FATIMA-ZAHRA BELOUADHA, ZOHRA BAKKOURY |
Abstract: |
Business process discovery is a research field assembling techniques that allow
representation of a business process, taking as input an event log where process
data are stored. Several advances have been made in process discovery, but as
data volume starts to weight considerably, improvement of discovery methods is
crucial to follow up. In this paper, we discuss our new method, inspired from
image processing techniques. Adapted to voluminous data logs, our method relies
on generation of a Petri net using a matrix representation of data. The
principal idea behind our approach consists of using several concepts: partial &
feature blocks, filters as well as the adaptation of combinatory logic concepts
to process mining in the perspective of extracting a business process model from
a big event log. |
Keywords: |
Process Mining, Business Process Management, Process Discovery, Distributed
Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
ON APPLICATION OF GAUSSIAN KERNEL TO RETINAL BLOOD TRACING |
Author: |
MOHD ASYRAF ZULKIFLEY, AIN NAZARI, SITI KHADIJAH, ADHI HARMOKO SAPUTRO |
Abstract: |
Fast disease screening system is becoming very important nowadays as it is
useful in minimizing the pain suffered by the patient. Eye is one of the
important organs used to screen various diseases such as diabetes, pterygium,
glaucoma, stroke and etc. Two popular modalities to capture the visualization
information of the eyes are photographed and fundus images. Photographed image
captures the exterior appearance of the eyes, while fundus image captures the
interior surface of the eye. This study focuses on the fundus image, in which
the objective is to extract the retinal blood vessels. Condition of the vessels
is a good cue for identifying microaneurysm where a sudden jump in vessels
trajectory indicate a blockage in the blood flow. Hence, an edge operator is
used to extract the possible lines. Two removal steps, which are outer ring and
optic disc removal are performed, so that only the vessels are detected. A
filling operation is performed by using gaussian kernel such that areas
surrounding existing edges are analyzed to label it as blood vessel or not. The
proposed technique is then tested on two databases; DRIVE and STARE. Four
performance metrics are calculated based on accuracy, sensitivity, error and
specificity where the best results are 0.880, 0.546, 0.120 and 0.912
respectively, obtained based on DRIVE database. The proposed system also works
well in STARE database with accuracy of 0.860 and error of 0.140. The system can
be further improved by using better detection scheme because the number of false
negative is relatively high. |
Keywords: |
Gaussian Kernel, Fundus Image, Blood Vessel Detection, Optic Disc Removal, Outer
Ring Removal |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
STRATEGIC PROFILING FOR BEHAVIOUR VISUALIZATION OF MALICIOUS NODE IN MANETS
USING GAME THEORY |
Author: |
BURHAN UL ISLAM KHAN, RASHIDAH F. OLANREWAJU, ROOHIE NAAZ MIR, ASIFA BABA,
BALOGUN WASIU ADEBAYO |
Abstract: |
In Mobile Adhoc Network (MANET), one of the precarious problems is of
identifying the malicious nodes. The identification and later mitigation of the
same becomes an immensely difficult task especially when selfish / erroneous
nodes exist along with normal collaborative nodes in the Regular camp. The
presence of selfish nodes is potentially harmful as similar behaviour can be
imitated by malicious nodes which are the point of concern of many security
aspects. The paper accentuates the use of game theory and probability theory
considering selfish nodes in the regular node camp while modelling the Regular
versus Malicious node game and thereby enhancing the prior mathematical schema
of strategical decision making to accommodate for the same. The framework
effectively represent the various unpredictable actions of node cooperation,
node declination, node attacks, as well as node reporting that can model the
strategic profiling of various mobile nodes. A significant focus is given on
Perfect Bayesian Equilibrium (PBE) strategy which forms as the basis of all the
result analysis. The enhancement is shown in terms of 63% lesser false positives
which favors higher overall network utility (modelled as utility of regular
nodes in the game) with selfish / erroneous nodes existing in the network when
collating the proposed schema with prior work. |
Keywords: |
Mobile Adhoc Network (MANET), Perfect Bayesian Equilibrium (PBE), Malicious
Behaviour, Selfish/Erroneous Behaviour, Security. |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
ROBUST MODEL FOR DOA ESTIMATION AND INTERFERENCE CANCELLATION IN MULTI-SIGNALS
ENVIRONMENT |
Author: |
OMAR KHALDOON A., MD. MIJANUR RAHMAN, R. BADLISHAH AHMAD, ZAID G. ALI, L. A.
HASSNAWI |
Abstract: |
Beamforming algorithms are a digital signal processing algorithm which combined
with uniform array in the smart antenna technology. Minimum Variance
Distortionless Response (MVDR) is one of these algorithms which produce optimal
adaptive complex weight for array’s elements. The overall radiation beam pattern
is generated according to this weight for minimizing the radiation power and
maintains the main beam in the desired direction with unity gain. The resolution
of this method for estimating the signal DOA depends on steering vector, a small
mismatch in this vector leads to degradation on MVDR performance.
This paper presents a new model for enhancing the resolution of MVDR to estimate
signal’s direction based on single Uniform Linear Array (ULA) with two reference
elements. DOA covariance matrix is extracted according to these two references’
matrices. Therefore, steering vector is constructed in actual mode with all
impinging signals information. The null constraint is added to the proposed MVDR
for producing robust weight vector that concern to the interference signals such
as the concern to the desired signals. |
Keywords: |
Beamforming, DOA, MVDR, Smart antenna, Signal estimation, ULA, Null steering |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
IMPLEMENTING ELECTRONIC DOCUMENTATION MANAGEMENT SYSTEM |
Author: |
KHALID ALZUBI |
Abstract: |
This case study examines the possibility of implementing the Electronic
Documentation System (EDMS) in Al-Balqa' Applied University as managing
documents has become an important activity for organizing staff work. Studies
show that people who work with information spend forty percent of their time
finding, preparing, processing, and filing documents. Computerizing the process
has made drastic changes to the efficiency of the services provided..
Accordingly, more institutions have now shifted to the implementation of an
Electronic Document Management System (EDMS). This study provides a survey of
the most important concepts of implementing an EDMS. The study is composed of
several distinct groups of 120 employee selected randomly on four level. The
tools of the study include questionnaire survey, and interview with the output
gathered into an SPSS and Excel sheet for examination. After analyzing the
overall case our findings show that the implementation need a strategic decision
that must be made by the upper -chain management to effect a change in the work
inside the Al-Balqa' Applied University that may include a reengineering process
for some sector. Human Resources staff in the Al-Balqa' Applied University
welcome the new technology as the information technology infrastructure in the
Al-Balqa’ Applied University was felt to be in need of more development. |
Keywords: |
Al-Balqa' Applied University, Document, EDMS, Implementation. |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
CONTRASTIVE SUMMARIZATION: COMPARING OPINIONS OF CZECH SENATORS |
Author: |
MICHAL CAMPR, KAREL JEŽEK |
Abstract: |
In this paper, we present a novel approach to contrastive summarization, i.e. a
specific type of summarization, which aims to compare two documents (or groups
of documents) on semantic and also sentiment level. The final output of
contrastive summarization is a pair of summaries, depicting what topics are most
often discussed with the largest difference in opinions of the authors. We
explore the possibilities of combining the latent semantic information with the
information about the opinions of the authors. First, we describe related works,
which show, that this problem can be approached from many different directions.
Next, we present our own algorithm, based on Latent Semantic Analysis, which
computes scores for excerpts of the original text and based on these, it chooses
best excerpts that should be included into the final summaries. Finally, we
present the evaluation of our algorithm, using speeches from Czech senate. |
Keywords: |
Contrastive Summarization, Semantic Analysis, Sentiment analysis, LSA,
Classification |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
REVIEW OF ACOUSTIC ECHO CANCELLATION TECHNIQUES FOR VOICE OVER IP |
Author: |
SABRI M. HANSHI, YUNG-WEY CHONG, ADEL NADHEM NAEEM |
Abstract: |
Acoustic Echo Cancellation (AEC) has become a necessity in today’s conferencing
system in order to enhance the audio quality of hands-free communication
systems. In recent years, many researchers and manufacturers have developed
various AEC algorithms for telecommunication solutions in order to improve the
quality of service. Many factors influence the design of an AEC system, such as
computational complexity, memory consumption etc. The aim of this work is to
review the most recent acoustic echo cancellation techniques and their
applicability for current hands free applications. Therefore, this paper
presents AEC systems challenges and comparison between these techniques is also
presented. |
Keywords: |
Adaptive Filter, Acoustic Echo Cancellation, Noise Reduction, Voice Over
Internet Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
USING HYBRID ROUTING PROTOCOL FOR IMPROVING PRIVACY IN VANETS’ ROUTING:
IMPROVING PRIVACY FOR CRITICAL VEHICLES |
Author: |
HAMED SAYYADI, ALI SHARIFARA |
Abstract: |
Nowadays, one of the most interesting areas in Ad Hoc networks is VANET.
Although, security in VANETs’ routing increased a lot during these years, it is
not happened for privacy. Usually, improving privacy in routing protocols is in
conflict with security. In this research, we improve the privacy compliant
secure routing in VANETs by using hybrid protocol called as PIDP. |
Keywords: |
VANET, Security, Routing, Privacy |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
A ROBUST HUMAN FACE DETECTION ALGORITHM BASED ON SKIN COLOR SEGMENTATION AND
EDGE DETECTION |
Author: |
ALI SHARIFARA, MOHD SHAFRY MOHD RAHIM, HAMED SAYYADI |
Abstract: |
Automatic face detection is one of the interesting and challenging tasks in the
field of computer vision. Face detection is the first and main step in many
applications, especially in surveillance systems. In the present paper, a hybrid
method is proposed to detect human face under different lighting conditions and
complex backgrounds of color images. The proposed method have used skin color
segmentation methods as well as edge detection to detect face in color images.
In addition, a template matching process is applied based on a linear
transformation in order to detect face for the selected regions. Thus, the
process can be helpful in reducing false selected regions, which have same color
as face. |
Keywords: |
Human Face Detection, Skin-Color Face Detection, Edge Detection, Image Color
Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
OBJECT LOCALIZATION AND PATH OPTIMIZATION USING PARTICLE SWARM AND ANT COLONY
OPTIMIZATION FOR MOBILE RFID READER |
Author: |
MOHD ZAKI ZAKARIA , MD YUSOFF JAMALUDDIN |
Abstract: |
Optimization for an RFID reader is an important technique to reduce the cost of
hardware; we need to define the location of the RFID reader to ensure the node
will be fully covered by the reader. It is also essential to find the best way
to place the nodes in a given area that guarantees 100% coverage with least
possible number of readers. In this paper, we propose a novel algorithm using
particle swarm and ant colony optimization techniques to achieve the shortest
path for an RFID mobile reader, and at the same time, ensure 100% coverage in
the given area. For path optimization, the mobile reader traverses from one node
to the next, moving around encountered obstacles in its path. The tag reading
process is iterative, in which the reader arrives at its start point at the end
of each round. Based on the shortest path, we use an algorithm that computes the
location of items in the given area. After development of a simulation
prototype, the algorithm achieves promising results. Experimental results with
benchmarks having up to 150 nodes show that the ant colony optimization (ACO)
method works more effectively and efficiently than particle swarm optimization (PSO)
when solving shortest path problems. |
Keywords: |
RFID, Path Optimization, PSO, ACO |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
TRUST BASED DYNAMIC SOURCE ROUTING PROTOCOL FOR MANET AGAINST ROUTING ATTACKS |
Author: |
K.MAHAMUNI, DR.C.CHANDRASEKAR |
Abstract: |
Devices themselves are the network in adhoc networks allowing seamless
communication, at low cost, in a self-organized fashion and also easy
deployment. Freedom and self-organizing capabilities make Mobile Adhoc Networks
(MANETs) completely different from other networking solution. MANETs highly
dynamic nature leads to changes and network topologies unpredictability, adding
difficulty and complexity to mobile node routing within the network. This study
proposes a new, secure, Dynamic Source Routing (DSR) protocol for MANETs based
on trust and reputation to mitigate black hole attack. Trust metric is based on
data packets, control packets forwarded and routing protocol execution.
Communication nodes are selected based on a reputation based trust mechanism. |
Keywords: |
Mobile Adhoc Network (MANET), Dynamic Source Routing (DSR), Routing, Attacks in
MANET, Trust and Reputation |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
CONTENT-BASED IMAGE RETRIEVAL FOR ASSET MANAGEMENT BASED ON WEIGHTED FEATURE AND
K-MEANS CLUSTERING |
Author: |
JUMI , AGUS HARJOKO , AHMAD ASHARI |
Abstract: |
Assets have different shapes, colors and textures. A shape feature is the main
characteristic, which distinguishes each type of asset in addition to the other
features, i.e. the color and the texture. The value of features in the
image-based asset information retrieval is used as the key field by comparing
the similarities between the images. These similarities can be determined based
on the differences in the feature values of query images and the images in the
database. The closer to zero the difference, the higher the degree of
similarities. The degree of similarities will affect the accuracy level of the
image retrieval. In this research, image retrieval accuracy and computing time
measurement were analyzed. The retrieval accuracy could improve using the
property-weighting scheme of weighted features. Moment invariants, color moments
and statistical texture are selected to representation shape, color and texture
feature. Preprocessing before extraction was done through grayscale, resizing,
edge enhancement, histogram equalization. Image asset data clustering was done
using K-Means clustering. The research findings suggest that the retrieval
accuracy with a total of 400 asset-image data is more than 95% for weighting
scheme of Ws (weighted shape) = 50%, Wc (weighted color) = 30%, Wt (weighted
texture) = 20% and 10 clusters with the average computing time of 5 millisecond. |
Keywords: |
Weighted, Feature, Retrieval, Moment, K-Means |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
A WATER FLOW-LIKE ALGORITHM FOR CAPACITATED VEHICLE ROUTING PROBLEM |
Author: |
SUHAILA ZAINUDIN, MOKHTAR MASSOUD KERWAD, ZULAIHA ALI OTHMAN |
Abstract: |
The goal of the capacitated vehicle routing problem (CVRP) is finding a useful
vehicle route which is a fundamental issue of logistic management. CVRP consists
of finding the optimal routes for distributing various items between customers
and depot by a fleet of vehicles at a minimum traveling distance without
exceeding the capacity of each vehicle. Among many proposed schemes,
meta-heuristic algorithm is a well-known optimization method for solving
non-deterministic polynomial-time problems. The population-based meta-heuristics
has shown the ability to obtain an excellent solution in many domains but
consumes time. This is due to the nature of the algorithms that have fixed a
number of the solutions, so they suffer from high computation times to reach the
solution. In this paper a new approximation algorithm named Water Flow-like
Algorithm (WFA) is proposed to tackle CVRP. It is inspired by the natural
behavior of water flowing from a higher to a lower level, which is self-adaptive
and dynamic based on population sizes and parameter settings. The performance of
the proposed algorithm is evaluated using 14 benchmark datasets. The result
shown performance of the proposed algorithm is comparable with other recent
enhanced algorithms. Therefore, it indicates that WFA is a potential alternative
to solve the CVRP using other enhancement on the algorithm. |
Keywords: |
Combinatorial Optimization, Vehicle Routing Problem, Meta-heuristics, Dynamic
solution, Water Flow-like Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
A HYBRID MULTI-ATTRIBUTE DECISION MAKING FOR ELECTRICIAN SELECTION BASED ON AHP,
SAW AND TOPSIS |
Author: |
WIWIEN HADIKURNIAWATI, RETANTYO WARDOYO |
Abstract: |
Human resources is one of the important elements that affects the continuity of
infrastructure development in Indonesia. Human resources competence is a
prerequisite which can not be ignored. Quality competence results in an ability
(competency) of an electrical expert. This study discusses the AHP (Analytic
Hierarchy Process), SAW (Simple Additive Weighting) and TOPSIS (Technique for
Order Preference by Similarity to Ideal Solution) in order to make the selection
of experts decision on electrician through a competency test. These three
methods are used to determine the highest priority of alternative electrical
expert who has knowledge and ability in the field of medium voltage network that
best fits the given parameters. The use of this hybrid method is expected to
help and to provide the best decision in the selection of electrician |
Keywords: |
Multi-Attribute Decision Making, AHP, SAW, TOPSIS, Electrician |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
Title: |
CLASSIC APRIORI: IMPLEMENTATION OF MODIFIED APRIORI ALGORITHM IN MATLAB FOR
PADDY CROPS DISEASE PREDICTION USING DATA MINING TECHNIQUES |
Author: |
S.A.RAMESH KUMAR, Dr. K.RAMESH KUMAR |
Abstract: |
Automation of essential processes in agriculture is becoming widespread,
especially when fast action is required. However, some processes that could
greatly benefit from some degree of automation have such difficult
characteristics, that even small improvements pose a great challenge. This is
the case of paddy disease diagnosis, a problem of great economic, social and
ecological interest. Difficult problems like this often require a
interdisciplinary approach to be tackled properly, as multifaceted issues can
greatly benefit from the inclusion of different perspectives. In this context,
this paper presents the most recent advances in research subjects such as data
mining algorithm applied to paddy disease diagnosis, and give the solution, and
discusses how those advances may be combined to support future developments
towards more effective diagnosis tools. The paper finishes suggesting a possible
solution to increase the degree of automation of paddy disease diagnosis tools. |
Keywords: |
Classification, Association Set Rules, K-Nearest Neighbor, Apriori Algorithm
Artificial Neural |
Source: |
Journal of Theoretical and Applied Information Technology
10th July 2015 -- Vol. 77. No. 1 -- 2015 |
Full
Text |
|
|
|