|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2015 | Vol. 73 No.1 |
Title: |
RANKING THE INFLUENCE USERS IN A SOCIAL NETWORKING SITE USING AN IMPROVED TOPSIS
METHOD |
Author: |
A. MURUGANANTHAM, DR. G. MEERA GANDHI |
Abstract: |
With the wide spread popularity of social networking sites (SNS), enterprise
organizations have started to explore the business opportunities in SNS such as
Facebook to conduct targeted marketing and reputation management. Customers or
users tend to trust the opinion of other customers or users, especially those
with prior experience of a product or service, rather than company marketing.
One of the important challenges to these enterprises is to conduct
cost-effective marketing and reputation management on SNS through influencing
users. When it comes to marketing, the users’ influence is associated with a
certain topic or field on which people have different levels of preference and
expertise is called homophily. In order to identify and predict influential
users in a specific topic/subject more effectively, this paper introduces a new
method to effectively identify the most influence users, who can generate the
maximum of total benefit with respect to specific topics or business situations.
This method uses homophily characteristics along with the technique for order
preference by similarity to ideal solution (TOPSIS). Using this improved TOPSIS
method, influencing users are identified and ranked on a Facebook dataset and
compared against with TOPSIS method with no homophily. The experimental results
show that how well the proposed technique precociously identify and rank
influential users based on a certain topic or business situation. |
Keywords: |
Influence Users, Betweenness Centrality, Closeness Centrality, Eigenvector
Centrality, Homophily, TOPSIS |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
USER ACCEPTANCE OF BANKING TECHNOLOGY WITH SPECIAL REFERENCE TO INTERNET BANKING |
Author: |
Y. AYSHA FATHIMA, DR. S. MUTHUMANI |
Abstract: |
How to attract customers to use internet banking technology in a country like
India, where use of such technologies by the customers in banking services is
still moderately slow? Is indeed an enormous task for the service providers to
build strategies to promote usage of internet banking. In this study, researcher
has tried to identify few predominant factors and their influence on behavioural
intention to adopt internet banking technology. This empirical study proposes
nine research hypotheses derived from previous other studies made on users of
banking technology. A survey was conducted among 319 users of Internet banking
and the data was further analyzed using statistical tools. Multiple regression
analysis was done to identify the predominantly influencing factors on user
acceptance. The results of the study are identified perceived usefulness, trust,
perceived credibility and perceived ease of use as the most influential factors
for user acceptance of internet banking technology. Based on the results,
managerial implications were made. |
Keywords: |
User Acceptance, Technology Diffusion, Banking Technology, Internet Banking. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
A PERSONALIZED FOOD ADVISORY SYSTEM FOR CHRONIC DISEASE PATIENTS |
Author: |
HMOOD AL-DOSSARI, AMR SALAH MAHMOUD |
Abstract: |
Chronic diseases, such as diabetes, heart disease and stroke, are the leading
cause of mortality in the world. Recent studies show that 382 million people
have diabetes in 2013 and the number will rise to 592 million by 2035. To
mitigate the effect of chronic diseases, patients are advised to follow strict
nutritional rules. However, with the widespread of processed food, it is hard
for the chronic disease patients to recognize what kind of food that must be
avoided. In this paper, we present a personalized food advisory system that can
be used by chronic disease patients to manage and control their food intake. The
proposed system evaluated by using interview approach with 15 experts from
medical domain. The preliminary result confirms the importance of having such
system to assist chronic diseases patients to follow the nutritional rules.
Almost all the participants are willing to recommend the proposed system to
their patients. |
Keywords: |
Mobile Application, Chronic Diseases, Food Ingredients, Recommendation |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
AN ANALYTICAL WAY TO IMPROVISE TEST EXECUTION AND REVIEW OF SOFTWARE METRICS FOR
THE SOFTWARE QUALITY |
Author: |
CHANDU P.M.S.S |
Abstract: |
The escalating density of today’s software products, combined with
ever-increasing costs of software breakdown have pushed the need for testing to
new peaks. The successful execution of the control over software quality
requires software metrics. Using effective software metrics we can monitor
requirements, predict development resources, tracking development progress and
minimize the maintenance cost. The main objective is to improvising the
performance of testing with various attributes connection with metrics for
gaining low cost and high quality Software.
The propose research work is to identify the possible measuring attributes of
software test execution and test review processes. This work introduces a novel
framework called vector space model, to recognize software metrics related to
test execution and test review phases also to identify the support of such
metrics for the measurable attributes. Moreover, it is important to analyze the
assumptions in the calculation of the metrics. The metrics studied against each
attribute needs to be assessed for their practicality in terms of project’s
context and benefits to the testing team. |
Keywords: |
Software metrics, Vector Space Model (VSM), software testing life cycle,
Software complexity, Software Test Execution and Test Review |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
THE ACCURACY OF TIME-BASED HYBRID LOCALIZATION TECHNIQUE IN HETEROGENOUS
WIRELESS NETWORK |
Author: |
SABARIAH BOHANUDIN, MAHAMOD ISMAIL, MARDINA ABDULAH |
Abstract: |
Localization of mobile users is very important feature that has been studied in
location-based service (LBS). The accuracy of the estimation of mobile user’s
position through wireless communication services is the main issue especially in
the case of emergency. The main goal of this work is to analyze the accuracy of
Hybrid Localization Determination Technique (HLDT) based on Time Difference of
Arrival (TDOA) and Time of Arrival (TOA) in localizing of the mobile user which
is located in the vicinity of area with the availability of heterogeneous
network that consist of GSM, Wideband Code Division Multiple Access (WCDMA),
WiMAX and Long Term Evolution (LTE) system. This localization method was chosen
as the user equipment (UE) often experiences enough hearability for the
trilateration method in urban area. Several drive tests have been observed in
urban area sample from Shah Alam to Kuala Lumpur, Malaysia. Data from drive test
of Received Signal Code Power (RSCP) of Node Bs have been used to simulate by
using the simulation model with fixed input parameters. Then we proceed with
analyze the data to gain the estimation of the localization by using time-based
HLDT method. The accuracy of location estimation of mobile user has been
observed and it resulted that at 67% and 95% of CDF plot shows the performance
of localization with improving and fulfill the requirements of E911. |
Keywords: |
Location Based Service, Heterogeneous Network, Hybrid LDT, Hearability, Location
Error |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
THE EFFECT OF HYBRIDIZING LOCAL SEARCH ALGORITHMS WITH HARMONY SEARCH FOR THE
VEHICLE ROUTING PROBLEM WITH TIME WINDOWS |
Author: |
ESAM TAHA YASSEN, MASRI AYOB and MOHD ZAKREE AHMAD NAZRI |
Abstract: |
Harmony search algorithm is relatively a recent nature inspired algorithm that
mimics the musical improvisation process in seeking agreeable harmony. It has
been used to solve various optimization problems and shown to produce good
results for many problems. However, harmony search algorithm has slow
convergence that might decrease its efficiency in producing good quality
solutions for constrained optimization problems. In order to overcome this
shortcoming, we propose a hybrid harmony search algorithm that integrates a
local search algorithm and harmony search algorithm to increase its exploitation
process and to further improve the generated solution. Three well-known local
search algorithms: hill climbing, simulated annealing, and reactive tabu search
are hybridized with the harmony search algorithm. The proposed algorithm is
tested on the standard public Solomon’s vehicle routing problem with time
windows benchmark set. The computational experiment shows that each of the three
hybrid algorithm produced good quality solution for certain instances only.
However, all of them outperformed standard harmony search algorithm. Thus, it
can be concluded that the integration of the local search with harmony search
algorithm does improve its capability in producing good quality solutions. |
Keywords: |
Vehicle Routing Problem; Meta-Heuristics; Hybrid Algorithm; Hill Climbing;
Simulated Annealing; Reactive Tabu Search; Harmony Search Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
IMPLEMENTATION OF RANDOMIZED TEST PATTERN GENERATION STRATEGY |
Author: |
DR.T.PREM JACOB |
Abstract: |
Software testing involves running a piece of software on selected input data and
checking the output for correctness. In order to test the software units
randomized testing will be effective. Thoroughness depends on certain parameters
settings like relative frequency on which the method are being called. This
system that uses genetic algorithm for finding the parameters that optimize the
test coverage of random unit testing. For designing the GA we have used the
feature subset selection tool for accessing the content representation and the
size within genetic algorithm. The proposed system ensures that all
possibilities of errors in the code are randomly checked. It is an effective
system to detect possibility of runtime errors. The randomized testing using
genetic algorithm will call the test cases in a random manner. They will provide
the inputs for testing also automatically and it starts testing by calling a
test case of random length it will stop the working when it finds any error it
can be viewed using minimization. It is faster than conventional testing methods
and it is effective in finding the error in the code effectively. |
Keywords: |
Randomized Testing, Genetic Algorithm, Test Case, Unit Testing, Test Pattern. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
RADIOLOGY DATA WAREHOUSE DEVELOPMENT AS A MEANS OF EDUCATION, RESEARCH, AND
QUALITY ASSURANCE |
Author: |
VINA GEORGIANA, DANIEL KARTAWIGUNA, INDRAJANI |
Abstract: |
Today almost all of the data in the radiology department is already in digital
form because it is one of the hospital departments that use many computerized
systems. The data contains information that is essential for the development of
health care. Data warehouse (DW) development has been widely used in business,
but it also can be used in health care. The objective of this study is design a
model of data warehouse that can be implemented in radiology department so it
can be a source of knowledge of radiology science. The research method used on
this study are 1) data collection through literature review, forum group
discussion with radiologist, and observations; 2) design method of data
warehouse using the fourth stages of data warehouse design methodology Kimball
and Ross (2013). Through this research we will design a radiology data warehouse
so the radiologist or researcher can analyze report requirement from case study
of patient historical record and assess the accuracy of diagnosis by comparing
the results of radiological diagnosis with laboratory test results and other
medical record from anamneses, medical procedure, medical treatment, or patient
questionnaire. |
Keywords: |
Radiology Data Warehouse |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
ANALYTICAL ANALYSIS OF BLOOD SPATTER TRAJECTORY FOR CRIME SCENE INVESTIGATION |
Author: |
NUSRAT JAHAN SHOUMY, SHAHRUL NIZAM YAAKOB, PHAKLEN EHKAN |
Abstract: |
This paper presents a noble theoretical method followed by an algorithm for
analyzing the trajectory path of linear blood spatter drop in motion base on
image of a crime scene. Linear blood spatter drop has some specific pattern with
moderate droplet size (Reynolds number, Re >= 1) and elliptical or circular
shaped stain. Their free flight trajectories are non-linear such as parabolic
motion or motion with drag. So far, works been done using Stokes’ law only for
blood-droplet free flight trajectory of motion with drag, which is suitable for
very small droplet (Reynolds number, Re << 1), like mist. However, it is not
suitable for moderate droplet size. Hence, we introduce two regions of the drag
force working on the droplet, Stokes’ law and Newton’s law region depending on
their size, velocity and Re values. It also takes into consideration the
perturbed path for the droplet’s movement, given room for a small error, δ, for
the angle and speed. Hence, more realistic reconstruction of trajectory path
along with angle and speed of blood spatter drop compared to available ones. The
proposed method could be very helpful for blood spatter image analysis for crime
scene investigation in near future. |
Keywords: |
Newton’s Law, Stokes’ Law, Reynolds’ Number, Trajectory Construction, Blood
Spatter Image Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
SOFTWARE QUALITY MEASUREMENT AND IMPROVEMENT USING REFACTORING AND SQUARE METRIC
METHODS |
Author: |
FEBY ARTWODINI MUQTADIROH, HANIM MARIA ASTUTI, ARTHA PATRA PRADANA |
Abstract: |
Software requirement is one of critical factors in a successful software
development. Based on some existing researches, a good or poor design of
software relies heavily on the quality of software requirements as a definition
of software requirements is certainly an early stage in software development. In
an IT project, such as a development of School of Social Network (SSN), some
problems concerning software quality requirements may occur any time. The
changes occurring in the software requirements and the mismatch among the needs,
designs, and final result of the project, can lead to poor quality of the
software produced. To minimize the problems, it is necessary to measure the
quality of software requirements based on SQuaRE Metrics using Refactoring.
First, it is to determine the characteristics of software quality requirements.
The determination of quality characteristics of SSN is based on an expert
experience and eventually sets 4 attributes of software quality requirements
that are considered very important, namely: Correctness, Completeness,
Consistency and Non-Ambiguity. Second, it is to give a weight on each quality
characteristic to obtain the IRQ value. Third, the process of refactoring is
conducted to improve the use-case scenarios. And the last step is to re-measure
the quality of re-factored software requirement. The early measurements showed
that the quality requirements of the SSN reached 39%. Through refactoring
process, the improvement of software requirements caused an increase of 6 use
cases. And after repair by using refactoring, it increased the quality of the
requirements of SSN by 62%. Refactoring is definitely helpful for enhancing the
understanding on software requirements without changing the software business
process. |
Keywords: |
Software Requirements, Use Case Scenario, Software Quality, SQuaRE Metrics,
Refactoring |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
AN AUTONOMOUS SOFTWARE APPROACH TO ENHANCE INFORMATION SHARING IN UNIVERSITY
COURSE TIMETABLE PLANNING |
Author: |
NAJLAA ATEEQ MOHAMMED DRAIB, ABU BAKAR MD SULTAN |
Abstract: |
One of the major activities of university departments at the beginning of an
academic semester is creating a course timetable. During course timetable
creation, a department usually needs to book one or more courses from other
departments. In order to book courses, a department needs to send request to
another department that offers that course and exchange relevant information
with it. This information is essential for the department in order to assign the
academic provider resource to appropriate timeslot in its own courses timetable
which has to satisfy specific conditions. Information sharing during timetable
planning in academic departments still faces difficulties due to the low level
of cross-department information sharing. These issues seriously restrict and
delay the process of collaborative timetabling planning. In order to automate
the information sharing between academic providers in timetabling planning we
present a prototype of an autonomous and efficient information sharing tool. The
aim of this tool is to reduce communication gaps among the departments. The
proposed approach is applied on timetable planning for the department of
Computer Science (CS) and Software Engineering (SE) at the Universiti of Putra
Malaysia (UPM) |
Keywords: |
Information Sharing, University Course Timetabling, Sharing Academic Resources,
Autonomous Software, Web-Based Decision Making Supporting Tool |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
ANALYTICAL TOOLS FOR VISUALISATION OF INTERACTIONS IN ONLINE E-LEARNING
ACTIVITIES ON LMS AND SEMANTIC SIMILARITY MEASURES ON TEXT |
Author: |
YAHYA AL-ASHMOERY , ROCHDI MESSOUSSI , RAJA TOUAHNI |
Abstract: |
This paper aims to build an analytical tools system for Learning Management
Systems (LMS) that will aid and support teachers and administrators to
understand and analyse interaction patterns and knowledge constructions of the
participants involved in ongoing online interactions. Most LMS commercial or
open source software does not include any tools for comprehensive access
tracking and log analysis capabilities They also lack the support for many
aspects specific to evaluating participation level , analysing interactions ,
visually representing ongoing interactions , analysing of the content of
messages Semantic .It is difficult and time consuming for the teachers and the
educationalists to determine the number of participants, non-participants and
lurkers in ongoing discussion. Our analytical tools take a novel approach of
using Web log data generated by Learning management systems (LMS) to help
instructors become aware of what is happening in distance learning classes. The
measure of semantic similarity between texts used in our system, to find out the
degree of relation between the messages. It gives the value of relevance in
numerical format. The semantic similarity of text utilises WordNet as an
underlying ontology for calculating semantic similarity. WordNet is a lexical
database for English Language. It is organized as a network which consists of
concepts or terms called Synsets (list of synonyms terms) and the relationship
between them. There are different types of relationship existing in WordNet such
as; is-a, part-of, synonym and antonym. The proposed methods can be used in a
variety of applications that involve text knowledge representation and
discovery. |
Keywords: |
Learning Analytics ,Virtual Learning Environments, Log Analysis ,Semantic
Similarity, Wordnet |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
WINTERS EXPONENTIAL SMOOTHING AND Z-SCORE, ALGORITHMS FOR PREDICTION OF RAINFALL |
Author: |
KRISTOKO DWI HARTOMO, SUBANAR, EDI WINARKO |
Abstract: |
The detailed rainfall forecasting to districts in Indonesia are limited. The
researches related to the rainfall forecasting are needed in order to support
the development in different fields including agricultural areas. There is no
one model or system integrating climatic classifications and the weather
forecasting aiming at determination of the ideal cultivating season. This
rainfall forecasting was developed by processing the previous rainfall data
using the combination of Z-Score model, transformation function, and the Winters
Triple Exponential Smoothing. The data resulted from the forecasting was used to
determine the spatial-based climatic classification in Boyolali, Central Java,
Indonesia using Oldeman method. The proposed model is able to predict the
weather using climatic classification. The rainfall data resulted from the
proposed forecasting model can be used for climatic classification using Oldeman
method in the research area. |
Keywords: |
Climatic Classification, Forecasting, Model, Oldeman, Transformation, Winters,
Z-Score |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
TSHIFTCOLUMN: A NEW TRANSFORMATION IN 128-BIT RIJNDAEL KEY EXPANSION TO IMPROVE
SECURITY REQUIREMENTS |
Author: |
ZAITON MUDA, SALASIAH SULAIMAN, SHARIFAH MD YASIN, RAMLAN MAHMOD |
Abstract: |
Evolvement in technology has resulted in a large number of new proposals done on
Rijndael block cipher. Even though there are many developments done on the
enhancement of block cipher algorithm, the industry still requires more as long
as security requirements are met. In this paper, we present a new approach
called TShiftColumn transformation which is added to the original Rijndael key
expansion algorithm to improve security requirements. This new approach follows
the green cryptography concept through recycling the existing algorithm by
enhancing and improving its security requirements. The TShiftColumn
transformation has been tested with two types of tests for security measurement;
confusion and diffusion tests. This new transformation has passed the security
requirement with better result compared to original Rijndael key expansion
algorithm. |
Keywords: |
Green Cryptography, TShiftcolumn, Rijndael Key Expansion, Confusion, Diffusion |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
A FRAMEWORK TO SUPPORT EVALUATION OF PROJECT IN-HAND AND SELECTION OF SOFTWARE
DEVELOPMENT METHOD |
Author: |
DAYA GUPTA, RINKY DWIVEDI |
Abstract: |
A Large numbers of software projects fail during their development phases due to
high reliance of inappropriate software development methods. It is not advisable
to start with a randomly chosen software development methodology for successful
completion of a project within budget and target time. All the development
methodologies whether belongs to agile or non-agile domain have their merits and
demerits. Traditional plan-based software development methods works extremely
well if the requirements are static whereas for frequently changing project
requirements these methodologies are often considered as slow and insensitive.
Agile methods on the other hand are considered as light-weight methods that
don’t produce requirement and design documentation needs but requires intensive
communication between the developers and users. Here, we present a complete
framework, Development Method Selection Framework (DMSF) that provides an
overall context in terms of software project parameters for exploration of
project-in-hand and selection of software development method. |
Keywords: |
Software Development Methodology, Impact Of Project Characteristics On Software
Method Selection, Agile Software Development, Neural Network Approach For
Methodology Selection. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
INTEGRATED AND EFFICIENT ATTENDANCE MANAGEMENT SYSTEM BASED ON RADIO FREQUENCY
IDENTIFICATION (RFID) |
Author: |
DEDY RAHMAN WIJAYA, IBNU ASROR |
Abstract: |
Mostly companies or organizations need systems to record their employee
attendance. Employee attendance data is very important for companies as one of
the parameters to assess performance and discipline of their employees.
Nowadays, there are a variety of attendance recording mechanism from manual
system to biometrics systems. In this study will be discussed about attendance
management system based on Radio Frequency Identification (RFID) technology.
RFID is one of enabler technology for Internet of Things (IoT) which is
currently being developed. That application of IoT concept can provide solution
for many problems that occur in the society, one of them is attendance
management system. That system is part of Human Resource Management System (HRMIS)
which is the system has been developed has high flexibility to integrate with
another system, has transaction processing speed better than biometrics system,
and requires an efficient investment for devices. Currently, attendance
management system based on RFID has been deployed and running in the production
environment and widely used in the Telkom University. |
Keywords: |
Internet of Things, Radio Frequency Identification, Attendance Management System |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT METHOD FOR SEGMENTATION OF CT-SCAN IMAGE USING MULTIRESOLUTION
ANALYSIS (MRA) |
Author: |
M.NIVAS, Dr.M.RAMAKRISHNAN |
Abstract: |
Classification of the cancer region from the human organs by means of shape or
gray-level information is a demanding task; organs shape varies throw diverse
portions in medical heap and the gray-level intensity overlie in soft tissues.
Multiresolution analysis based segmentation united with thresholding as pre- and
post-processing steps permit accurate detection of ROIs. Curvelet transform is a
newest extension of wavelet and ridgelet transforms which focuses on compacting
with exciting experiences taking place along curves. This paper focuses on
developing an automatic image segmentation method for classifying region of
interest (ROI) in medical images which are achieved from various medical
scanners such as PET, CT or MRI. The proposed segmentation system utilizes
wavelet, ridgelet and curvelet transforms based Multiresolution analysis (MRA).
Results attained for curvelet, wavelet and ridgelet transforms experimented on
medical data sets are evaluated. Comparison results demonstrate that exploiting
curvelet significantly develops the classification of abnormal tissues in the
scans and diminish the adjacent noise. |
Keywords: |
Multiresolution Analysis, Thresholding, Wavelet Transforms, Ridgelet Transforms,
Curvelet
Transforms,Wrapping |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
A MEDICAL VOLUME SEGMENTATION TECHNIQUE USING 3D DISCRETE WAVELET TRANSFORM (DWT) |
Author: |
M.NIVAS, Dr.M.RAMAKRISHNAN |
Abstract: |
3D medical image segmentation focuses at separating the voxels into 3D objects
(sub-volumes) which show considerable physical entities. MRA permits for the
preservation of an image based on specific levels of resolution or blurring. The
superiority of this system makes it important in image compression, de-noising,
and classification or segmentation. This paper aims at the implementation of a
medical volume segmentation based on 3D MRA methods. Therefore, 3D discrete
curvelet transform is proposed and evaluated with the discrete wavelet transform
(DWT). An assessment study has been executed to evaluate 2D and 3D techniques
which unveil that 3D approaches can exactly locate the region of interest in
both phantom and real data. |
Keywords: |
A3D Image processing, Segmentation, Multi-Resolution Analysis,Discrete Wavelet
Transform, Discrete Curvlet Transform. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
FRAMEWORK FOR SELECTION OF TEST CASES USING AN ETCS APPROACH |
Author: |
Dr. A. PRAVIN |
Abstract: |
Inorder to authorize the application after reconstruction Regression Testing is
conducted. A horde of analysts worked on this activity to upgrade this process.
The regression test is time consuming and the cost involved is high. Our goal is
to upgrade the value of fault detection and to diminish the time consumption.
This can be done by selecting few test cases and are processed accordingly. The
selection process automatically detects the fault during the earlier stage
itself. In this paper a method based on the analysis that is carried out on the
execution of each application .The analysis is done to find out how far the
methods communicate with other and the result is captured. Based on the result
obtained the test cases are selected from the set. The proposed Effective Test
Case Selection method (ETCS) selects the test case once the application has been
modified. The Effective Test Case Selection method will in turn increases the
fault detection ratio by detecting faults earlier in the testing process. |
Keywords: |
ETCS, Regression Testing, Method analysis, Test Case, Test Behavior Extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
Title: |
FACE SKIN DISEASE RECOGNATION USING FUZZY SUBTRACTIVE CLUSTERING ALGORITHM |
Author: |
ABDUL HARIS RANGKUTI, ZULFANY ERLISA RASJID, MUHAMMAD IMADUDDIN, ARIE SURYA
CHANDRA, DENNY CHANCRA |
Abstract: |
Face skin is the most sensitive part of the body compared to other parts of the
body and therefore need special attention. Face skin problems such as acne,
comedo or wrinkles causes people to be insecure as well as a health hazard if it
is not treated. This research is related to face skin disease, such as acne,
blackheads or comedo, skin infection etc. In general, those diseases can become
dangerous if it is not handled immediately. This research will facilitate user
to determine the recommended treatments for this skin disease based on the
symptoms, and the recommended medicines to treat the disease. The research
include the analysis method through surveys, including interviews with several
specialists who specializes in skin treatments and diseases. The data processing
of patients’ is using fuzzy subtractive clustering algorithm to provide
recommendation of treatments for the skin disease. After clustering and a series
of inputs of symptoms, this research is able to provide an introduction of skin
disease at the precision close to 100 percents and able to recommend correct
treatments which is mostly the same as the treatment by a dermatologist. |
Keywords: |
Skin Disease, Skin Infection, Medicine, Fuzzy Subtractive Clustering,Skin
Treatments |
Source: |
Journal of Theoretical and Applied Information Technology
10th March 2015 -- Vol. 73. No. 1 -- 2015 |
Full
Text |
|
|
|