|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2015 | Vol. 72 No.3 |
Title: |
BRAIN COMPUTER INTERFACE BASED ROBOT DESIGN |
Author: |
Dr V PARTHASARATHY, Dr G SARAVANA KUMAR S SIVASARAVANA BABU, Prof. GRIMM
CHRISTOPH |
Abstract: |
Electro Encephalo Gram based Brain-Computer Interface mobile robots can help as
powerful support for severely disabled people in their regular activities,
especially to aid them to move voluntarily. This paper proposes and implements a
brain signal controlled robot to yield four different directional movements. The
schemes uses a single electrode pair acquisition scheme, ARM controller based
driving unit and robot module. This paper uses three performance metrics to
validate the effectiveness of the scheme. It also exhibits good results in
generating different navigational directions in accordance with the driving
signal. |
Keywords: |
Electro Encephalo Gram, Brain-Computer Interface, ARM controller, Robot |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
CLUSTERING AND NEURAL NETWORK APPROACHES FOR AUTOMATED SEGMENTATION AND
CLASSIFICATION OF MRI BRAIN IMAGES |
Author: |
MRS.P.MUTHUKRISHNAMMAL, DR.S.SELVAKUMAR RAJA |
Abstract: |
Nowadays the application of image processing for medical imaging is increasing
enormously and the most common medical images such as Ultrasound, x-ray, CT,
digital mammography, and MRI are that are stored and represented in soft-copy.
An MRI can give different grey levels for different tissues and various types of
neuropathology and its analysis involves: Data acquisition, processing, and
visualization stages. Medical image segmentation plays a very important role in
most of the computer-aided diagnostic tools [1]. Brain tumor detection is one of
the most difficult and important for medical diagnosis. Even by an expert
physician it consumes a lot of energy and time to get the accurate location of
the tumor.These tools could save clinicians’ time by simplifying complex
time-consuming processes. The main part of these tools is to design an efficient
segmentation algorithm. Mostly the medical images contain noise whose behaviour
is not predictable, in-homogeneities, and complex structures. Therefore,
segmentation of medical images is a very challenging and complicated task. In
this paper we propose new approach wherein the features of MR images are
extracted using curvelet transform via wrapping based method in combination with
the Haralick parameters. The features which are obtained from the coefficients
of curvelet transform is used as the database for the further classification
stage which is neural network based (PNN) classifier for the classification
stage and it categorizes the brain tumour that belong to benign and malignant
types. Finally the K-Means clustering based segmentation algorithm is used for
segmenting the abnormal brain tumour region which is the region of interest
which can be used for further diagnosis process by the oncologists. |
Keywords: |
MRI, Classification, Segmentation, Curvelets, K-Means Segmentation, PNN
classifier |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
DISCRETE PENGUINS SEARCH OPTIMIZATION ALGORITHM TO SOLVE THE TRAVELING SALESMAN
PROBLEM |
Author: |
ILYASS MZILI, MOHAMMED ESSAID RIFFI |
Abstract: |
The traveling salesman problem (TSP) is an NP-hard combinatorial optimization
problem that can be solved by finding optimal solutions. In this work we present
an adaptation of the metaheuristic “Penguins Search Optimization Algorithm” (PeSOA)
depending on the Penguins hunting strategies. The results show that the proposed
adaptation which is favorably compared with the methods proposed in the
literature, gives very good results in a reasonable time. |
Keywords: |
Metaheuristic, Traveling Salesman Problem, PeSOA, Combinatorial Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
CONTEMPORARY SEMANTIC WEB: THE PRIMARY SOCIAL AND TECHNICAL CHALLENGES |
Author: |
SENDURU SRINIVASULU, SAKTHIVEL P |
Abstract: |
The web is all about connecting, storing and retrieving documents .In this
internet era the data is growing with a rapid speed and the technology to
process this data has to face many challenges to catch the same phase. The web
is huge collection of unstructured and scattered data all around the globe in
numerous formats .The need to explore and exploit the information from this
unstructured web is in raise. The semantic web is the solution to explore the
information from such unstructured web. This paper explores the evolution of the
web and various factors that influenced the conceptualization of the Semantic
Web. It analyzes these social and technical challenges based on research data
from established industry experts, semantic web community and other online
resources. Key among these challenges are the lack of established standards and
specifications, deficit in trust and resulting privacy issues are some of the
challenges which have hindered this technology from gaining traction in the web
world. Its widespread acceptance among general public and corporate is dependent
on how these challenges are tackled over the next few years. |
Keywords: |
Semantic web, challenges, RDF, Structured Data, Ontology |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE
APPLICATION LEVEL |
Author: |
KARIM ABOUELMEHDI, AHMED BENTAJER, LOUBNA DALI, NACER SEFIANI |
Abstract: |
Classification of web attacks is the focus of cyber security nowadays.
Therefore, it is still infancy, but like the cyber security, is evolving
constantly. Therefore, classification needs to be properly organized in order to
choose the best tests, to better choose the fixtures, for web security systems.
The goal of this paper is to classify the web attacks using the classification
of OWASP, the Open Web Application Security Project, which deals with the top
ten security web attacks.
We present and describe a classification method that assists to figure out the
growth of web attacks. The particularity of our approach is not only it gives
relevant information about the current web attacks but also can predict and
estimate the likely future attacks. Our method is tree based classification. |
Keywords: |
Web Attacks, Attacks Categories, Web Security Tools, Classification Tree |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
ENHANCED FEATURE EXTRACTION OF HANDWRITTEN CHARACTERS AND RECOGNITION USING
ARTIFICIAL NEURAL NETWORKS |
Author: |
MOHAMED ABAYNARH, HAKIM EL FADILI, LAHBIB ZENKOUAR |
Abstract: |
This paper presents an unconstrained system for off line handwritten Amazigh
character recognition based upon Legendre moments and neural networks. Legendre
moments are used in features extraction phase and optimized by maximum entropy
principle. Neural networks methods are chosen due to their natural flexibility
and the extent of parallel processing they allow. The performance rate of our
proposed scheme is strongly influenced positively upon the feature extraction
algorithm that has been applied in this work. The method is robust to different
styles of writing, different levels of smoothing and insensitive to the nuances
of characters. Also it is performing to the translation, scale invariance. The
performance of the proposed method is examined in terms of Legendre moments
order and neural networks size and architecture. Features like pixel density
features and Euclidean distance features are extracted from the normalized
characters. The two features are applied to two different neural networks. A
comparison of these techniques and our method is made. Through comparison with
cited methods, the proposed method has significantly advanced and the
recognition rate reaches 97.46%. |
Keywords: |
Offline character recognition, Features extraction, Legendre Moments, Neural
Networks, Multilayer Perceptron |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
AUTOMATIC GLAUCOMA DETECTION BASED ON THE TYPE OF FEATURES USED: A REVIEW |
Author: |
ANINDITA SEPTIARINI, AGUS HARJOKO |
Abstract: |
Glaucoma is an eye disease that is the second most common cause of blindness in
worldwide. The characteristic of glaucoma are high eye pressure, loss of vision
gradually which can cause blindness and damage to the structure of retina. The
damages which may occur for example are structural form changes of the Optic
Nerve Head (ONH) and Retinal Nerve Fiber Layer (RNFL) thickness. The observable
part of ONH which is the features of glaucoma such as disc, cup, neuroretinal
rim, Parapapillary atrophy and blood vessels. The structure of the retina can be
observed through a retinal image, where the image is produced from several types
of equipment such funduscopy, Confocal Scanning Laser Ophthalmoscopy (CSLO),
Heidelberg Retina Tomograph (HRT) and Optical Coherence Tomography (OCT). This
paper discusses about the automatic feature extraction technique in retinal
fundus images which can be used for detection or classification of glaucoma. The
technique is divided into two groups, namely morphological and non-morphological
based on the type of features used. This grouping aims to determine what type of
features extraction technique can be used to represent the glaucoma
characteristic. |
Keywords: |
Glaucoma, Detection, Classification, Feature Extraction, Retinal Image |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
COMPARISON OF HARDWARE AND NIOS II BASED-SOFTWARE IMPLEMENTATION OF MLP ON THE
FPGA PLATEFORM |
Author: |
BOUSSAA MOHAMED, ATOUF ISSAM, ATIBI MOHAMED, BENNIS ABDELLATIF |
Abstract: |
The artificial neural networks provide optimal and satisfactory solutions for
most applications of image and signal processing requiring complex mathematical
operations. This often leads to implement these artificial neural networks in
platforms that retain their performance (computational efficiency, speed of
execution). This article presents, in a first stage, two implementation methods
of artificial neuron network MLP types: hardware and software based on the
processor Nios II and, secondly, comparing their performance in terms of
execution time and material resources consumed. The two implementations have
been done in the FPGA platform DE2-70 Altera that offers performance in terms of
flexibility, efficiency and very remarkable speed. |
Keywords: |
MLP, NIOS II, FPGA, hardware resource, Execution time. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
KNOWLEDGE EXPLORATION: SELECTED WORKS ON QURAN ONTOLOGY DEVELOPMENT |
Author: |
FAROOQUI N.K., Dr. MOHAMMAD FAUZAN NOORDIN |
Abstract: |
This paper presents key features and challenges ahead for the development and
knowledge retrieval of Quran ontology. Recent studies have made significant
advances towards the development of Quran ontology. In the recent past, there
have been numerous studies conducted on the application of semantic technologies
on Quran. Contribution of this paper is its focus on finding the direction of
knowledge exploration in Quran. Several studies on Quran ontology development
help us in analyzing its linguistic features. Another dimension where Quran
excels is the Knowledge of it. There are few studies that concentrate on
retrieval of knowledge from Quran. In this literature review, we have included
studies that can help us in developing semantic application for knowledge
exploration from Quran. This paper devises challenges mainly focusing towards
exploration of knowledge in the Quran and summaries research in this area,
discuss key features and open research issues. |
Keywords: |
Islam, Knowledge management, Ontology, Semantic web, Semantic technologies,
Quran. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
UNIT COMMITMENT SOLUTION USING GENETIC ALGORITHM BASED ON PRIORITY LIST APPROACH |
Author: |
SARJIYA, ARIEF BUDI MULYAWAN, ANDI SUDIARSO |
Abstract: |
This paper presents the completion of unit commitment (UC) problem using genetic
algorithm based on priority list (GABPL) approach. The UC problem is divided
into two sub problems. The problem of unit scheduling is solved by using GABPL
method. The lambda iteration method is used for solving the economic load
dispatch problem. The proposed method is tested on 10-units-system case study as
well as its duplication. The priority list which is used in this paper can make
genetic algorithm to converge faster and better. The results of the proposed
method are compared to other methods referred in this paper. |
Keywords: |
Unit Commitment, Economic Dispatch, Genetic Algorithm, Priority List, Lambda
Iteration |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE MAGNETIZING CHARACTERISTIC IN THE AIR GAP OF THE SEIG USING RUNGE KUTTA
METHOD AND CORRECTION FACTOR |
Author: |
RIDWAN GUNAWAN, FERI YUSIVAR , BUDIYANTO YAN |
Abstract: |
The Self Excitated Induction Generator (SEIG) is very popular now as a generated
alternating power. In this research the induction machine is approached in the
physically and mathematically approximated which then transformed from
three-phase frame abc to two-axis frame dq using the Park and Clark
transformation. Based on the reactive power demand and capacitor mounted on the
stator of the induction machine then do the physical and mathematical approach
of the system to obtain a state space model. Under known relationships,
magnetization reactance and magnetizing current is not linear, so do
mathematical approach to the magnetization reactance and magnetization currents
characteristic curve to obtain the magnetic reactance equation used in the
calculation. Obtained state space model and the magnetic reactance equation is
simulated by using Runge Kutta method of fourth order in the exponent equation
with correction factor. The influence of the stator current in q axis i_qs, is
very strong and the equation of this current is non power-invariant then , using
take the stator current reference i_qs^ref is (2⁄3) I_base . The correction
factor K4 has done the magnetizing inductance Lm and also the output terminal
voltage of SEIG more precision than before. |
Keywords: |
Induction Machine, Self Excitated Induction Generator, dq0
Transformation, State Space, Magnetization Characteristic of Induction Machine,
Runge Kutta.Method, Correction Factor. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
DEVELOPING A WORKFLOW MANAGEMENT SYSTEM FOR ENTERPRISE RESOURCE PLANNING |
Author: |
RIYANARTO SARNO, CHAIRAJA ALMAS DJENI, IMAM MUKHLASH, DWI SUNARYONO |
Abstract: |
The company generally requires an application that can be easily configured.
This can happen if the application is supported by the Workflow Management
System (WFMS). WFMS which built serves to store a variety of common workflows
and varied. In addition to working as a storage place, WFMS also has the ability
to generate an event log that can be analyzed with the application process
workflow mining and semantic search. Semantically workflows searching are e by
annotated workflow metadata using the Ontology Web Language for Services
(OWL-S). The capabilities of workflows searching are using SPARQL Query WordNet
database. SPARQL query is used to extract data from OWL-S and database WordNet
is used in calculating the value of keywords and data semantics of OWL-S.
Results of the testing showed that the WFMS can do a search workflow with high
accuracy from a variety of business processes in Enterprise Resource Planning (ERP).
The results of the testing also show the event log generated can be analyzed
using the technique of mining process. |
Keywords: |
Workflow Management System, OWL-S, process mining, ERP |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW |
Author: |
SUNDUS JUMA, ZAITON MUDA, M.A. MOHAMED, WARUSIA YASSIN |
Abstract: |
Intrusion detection is considered as one of the foremost research areas in
network security, the challenge is to recognize unusual access that could lead
to compromising the interconnected nodes. Anomaly-based intrusion detection
system, that utilizes machine learning techniques such as single classifier and
hybrid classifier have the capability to recognize unpredicted malevolent. In
this paper, we examine different machine learning techniques that have been
proposed for detecting intrusion by focusing on the hybrid classifier
algorithms. The objective is to determine their strengths and weaknesses. From
the comparison, we hope to identify the gap for developing an efficient
intrusion detection system that is yet to be researched. |
Keywords: |
Intrusion Detection, Anomaly Detection, Machine Learning, Hybrid Classifier,
Single Classifier |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
SOFTWARE REUSABILITY: A FRAMEWORK USING SOFTWARE COMPONENTS AND REUSABLE ASSETS |
Author: |
A.RAVI, DR.K.NIRMALA |
Abstract: |
As everything becomes computerized, more and more software have to be evolved.
As the software grows rapidly, many problems have to be emerged in terms of
software development and maintenance. So the Software developers have to learn
more and new information in terms of their process in different areas. This
information has to be managed for long time to make it use in various software.
This kind of using the same information for multiple processes is termed as
Reuse. In Software Engineering, this concept of reuse has been implemented very
much to reduce the implementation cost and for efficient maintenance.
Reusability is termed as a part or a segment of source code can be used again in
order to develop new functionalities with slight or no modification. Software
Reusability is the process of developing new software from existing software
with slight modification in the existing one in order to adopt it for new one.
In our paper, we have to implement this software reusability concept with
efficient methodology and algorithm. We have to propose a methodology to develop
a software component that act as a Reuse Asset which can be used to develop
various software with less cost. |
Keywords: |
Reusability, Reuse Asset, Software Component, Software Development, Software
Engineering, Software Reusability. |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
CUT DETECTION DUE TO ENERGY FAILURE IN WIRELESS SENSOR NETWORK USING CLUSTER
BASED APPROACH |
Author: |
E. Anna Devi |
Abstract: |
The major disadvantage of the wireless sensor network is that its efficient
performance may be seriously degraded due to the death of the sensor nodes. When
attempted to study and discover the various causes for the failure of the sensor
nodes, there are many factors like atmospheric factors, technical factors,
environmental factors, mechanical factors, natural calamities etc,. Here, the
failure of the sensor node due to energy failure is considered. In this paper, a
different kind of challenge for the wireless sensor networks is addressed. It is
discovered that there is a need to monitor the sensor network itself and to
detect when the network has suffered any ill situation. The task of cut
detection does not end up consuming a large part of the network resources. In
the proposed work the base station is able to check the energy level of the
sensor nodes present in the network at considerable number of information
exchange so that the base station can come to know whenever problems occur with
the sensor nodes. |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
QUALITATIVE EVALUATION OF QUANTUM ENHANCEMENT FOR EDGE DETECTION OF MEDICAL
IMAGES |
Author: |
A.B. MUTIARA, R. REFIANTI, M.C. KAMU |
Abstract: |
In recent years, quantum mechanics has been connected with computer science,
information theory in communication and digital signal processing. Developing
new computing methods and signal processing algorithms by borrowing the
principle of quantum mechanics is a very interesting and new research topic. In
this research, a quantum digital image processing algorithms will be presented
and compared to five other edge detection algorithms, such as Roberts, Sobel,
Prewitt, Laplacian of Gaussian, and Canny. Therefore an edge detection method
comparison using MATLAB is done in order to find the best edge detection method
for qualitative evaluation, namely sensitivity and specificity. From all the
comparisons process, the best edge detection method for sensitivity and
specificity is known. For the sensitivity, Canny’s edge detection algorithm
without quantum enhancement is the best method with sensitivity value amount
83.33% and for the specificity, Roberts edge detection algorithm using quantum
enhancement is the best method with specificity value amount 83.33%. |
Keywords: |
Image processing, Edge Detection Algorithm, Quantum Signal Processing, Qubit |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE ROLE OF INFORMATION TECHNOLOGY TO IMPROVE LECTURER PERFORMANCE |
Author: |
MARISA KARSEN, SISWONO, WIDIANTY |
Abstract: |
Information technology (IT) has important roles in education industry,
especially to improve teaching and learning process. The existence of internet
as an information provider has opened the horizon about the growth of IT.
Nowadays, students already know about the latest technology and how to use it,
but the problem is some of lecturers still don’t update about technology,
especially to improve teaching and learning process, such as multimedia,
animation, etc. By using IT, lecturer can perform in better way to delivery
materials to the students. This paper discusses several tools of IT that have
been used and haven’t use by lecturers in class and to interact with students
outside class. This study conducted by interview and survey to several lecturers
at some private universities in Jakarta to know about IT implementation in
universities and come up with the alternatives of IT tools and training to
improve lecturers performance that can help the learning process as well as the
overall faculty performance. If lecturers understand how to use IT tools
optimally, they and can create new trend as technological advances in education
industry. The conclusion is that information technology has huge impact to
improve lecturer performance in delivering materials to the students that can
improve the quality of the students. |
Keywords: |
Information Technology, Universities, Lecturer Performance |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE CONTINUED USE OF E-LEARNING SYSTEM: AN EMPIRICAL INVESTIGATION USING UTAUT
MODEL AT THE UNIVERSITY OF TABUK |
Author: |
DR. MOEZ BELLAAJ, DR. INES ZEKRI, DR. MOTEB ALBUGAMI |
Abstract: |
Despite the increase of Internet users and the development of the IT
infrastructure, e-learning in developing countries is not yet largely diffused
compared with the developed regions. Building on past studies related to UTAUT
applications in the e-learning environment, the objective of this paper is to
focus on the student continued use of a virtual learning system of the
University of Tabuk in Saudi Arabia. The findings reveal that performance
expectancy, and effort expectancy determine the intention of continued use of
e-learning system. With stronger Internet experience, the effect of performance
expectancy increases, and the influence of effort expectancy decreases. In
addition, the effect of social influence on intention of continued use is seems
to be stronger for women than for men. The theoretical and managerial
implications of these results are discussed. |
Keywords: |
Unified Theory Of Acceptance And Use Of Technology (UTAUT), E-Learning System,
Technology Use, Performance Expectancy, Effort Expectancy, Social Influence |
Source: |
Journal of Theoretical and Applied Information Technology
28th February 2015 -- Vol. 72. No. 3 -- 2015 |
Full
Text |
|
|
|