|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2010 | Vol. 16. No.2 |
Paper ID: |
1292 -JATIT-2K10 |
Title: |
Coherency of Classes to Measure the Quality of Object Oriented Design: An
Empirical Analysis |
Author: |
M.
V. VIJAYA SARADHI, B.R.SASTRY |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
Software engineering is
an expensive venture to undertake mainly due to not knowing exactly where to
focus the reengineering efforts. This is where coupling and cohesion play an
important role. Both the metrics, especially cohesion metric, are a potential
identification tools that can also measure progress. The current cohesion
metrics for classes overlook the characteristics of indirect usage of the
instance variables that are so often applicable in a class. Therefore, they are
not an ideal reflection of the cohesiveness of the class. Nevertheless, when the
variability factor is taking into consideration, the class cohesion factor has
not been quantitatively studied. In this paper, we will propose the updated
cohesion metrics based on the role of indirect usage of the instance variables.
This updated version of cohesion and coupling relation can be used as an
indicator to measure changeability. In this paper, we present an approach for
remodeling the cohesion metrics by analyzing the characteristics of the indirect
instance variable usage in an object-oriented program that can be used as a
quality indicator in terms of changeability. |
Keywords |
Cohesion metrics ;
Instance Variable ; Changeability; LCOM; Co; Coh, TCC; LCC; CBMC |
Full
Text |
|
Paper ID: |
1328 -JATIT-2K10 |
Title: |
USING DATA MINING TECHNIQUES FOR DETECTING TERROR- RELATED ACTIVITIES ON THE WEB |
Author: |
MAHESH S, MAHESH T R, M VINAYABABU |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
An innovative
knowledge-based methodology for terrorist detection by using Web traffic content
as the audit information is presented. The proposed methodology learns the
typical behavior of terrorists by applying a data mining algorithm to the
textual content of terror-related Web sites. The resulting profile is used by
the system to perform real-time detection of users suspected of being engaged in
terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows
that this methodology can outperform a command based intrusion detection system. |
Keywords |
Data Mining, User
Modeling, Terrorist Trend Detection, Anomaly Detection, Activity Monitoring. |
Full
Text |
|
Paper ID: |
1288 -JATIT-2K10 |
Title: |
CALCULATION OF INFERENCE IN AD-HOC NETWORK
|
Author: |
POOJA GROVER, NEHA GUPTA, RANJIT KUMAR |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
In this paper we
propose a new model to calculate inference levels in wireless multi-hop ad-hoc
networks. This model computes the expected value of carrier to inference ratio(C/I)
by taking into account the number of nodes, density of nodes, radio propagation
aspects, multihop characteristics of the network and amount of relay traffic.
For the performance evaluation and determination of the capacity in any wireless
network, it is important to have good calculation model to estimate interference
power statics to our best knowledge till now there has been no accurate
calculation model to estimate the expected interference power and its
distribution function in adhoc network and sensor networks with realistic
assumptions regarding radio propagation.
To find a mathematical formula for expected interference in adhoc networks, we
have simplified the reality of adhoc networks in three aspects:
1. We have used the path loss radio propagation model,
2. We have chosen for a specific arrangement of nodes on a two dimensional
hexagonal lattice resembling a honey grid(which explains the name given to our
model: the honey grid model),
3. We have simplified the rules of the MAC protocol. |
Keywords |
Wireless Communication,
Path Loss Exponent ,MAC Protocol, Lognormal Summation Method |
Full
Text |
|
Paper ID: |
1250 -JATIT-2K10 |
Title: |
TASKS ALLOCATION PROBLEM AS A NON
-COOPERATIVE GAME |
Author: |
MOSTAPHA ZBAKH, SAID EL HAJJI |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
We present the problem of tasks allocation
in its general form as a non-cooperative game between players. For this game, we
give the Nash equilibrium structure and on the basis of this structure, we draw
a distributed tasks allocation algorithm that can find this equilibrium. |
Keywords |
Tasks Allocation, Game
Theory, Non-Cooperative Game, Nash Equilibrium, Distributed Algorithm |
Full
Text |
|
Paper ID: |
1290 -JATIT-2K10 |
Title: |
A NOVEL APPROACH OF CRYPTOGRAPHY AND
WATERMARKING USING TO PROTECT GIS DATA |
Author: |
G. RAMASWMAY, VUDA. SRINIVASARAO |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
Cryptography is the
study and practice of scrambling information in a manner that is difficult to
unscramble, and making scrambled information intelligible. It is used as the
basis of much computer security, in that it can be used to keep information
confidential, and also preserve the integrity if data, particularly when being
stored or being transmitted. Most Geographic Information System (GIS) data
providers have a problem protecting their data from being copied and accessed by
unauthorized users. Most of the researches in this area focus on how to
copyright the GIS data using the concept of digital watermarking. However,
watermarking has a lot of limitations and if it is used alone, it will not able
to achieve the goal. In this paper, we will introduce a new mechanism to protect
the GIS data by combining the RC6 and hash functions cryptography algorithms
with watermarking techniques. This mechanism can be applied to both raster and
vector GIS data. |
Keywords |
RC6, GIS, Encryption,
DTEDPM |
Full
Text |
|
Paper ID: |
1245 -JATIT-2K10 |
Title: |
MODEL OBJECT OF RM-ODP STANDARD IN DYNAMIC
DISTRIBUTED DATABASES |
Author: |
JALAL LAASSIRI, SAID EL HAJJI, YOUSSEF
BALOUKI, GHIZLANE ORHANOU, MOHAMED BOUHDADI |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
Distributed databases
have invested considerable effort and system resources in the development and
adoption of dynamic distributed databases services. In order to sustain the
quality of their services, Business process management need to solve the problem
of efficient and secure electronic exchange and processing of system database. A
major difficulty in this distributed deployment is the fact that these
interconnected systems are heterogeneous and they may operate in multiple
organizational domains. This paper demonstrates how the ISO/RM-ODP standard
offers a general framework to design and develop an open distributed system
attuned to dynamic distributed databases environments.
The purpose of the RM-ODP is to define such a framework. The Reference Model for
Open Distributed Processing (RM-ODP) provides a framework within which support
of distribution, inter-working and portability can be integrated. It defines: an
object model, architectural concepts and architecture for the development of ODP
systems in terms of five viewpoints. However, RM-ODP is a meta-norm, and several
ODP standards have to be defined. In this paper, we report on the definition and
address of the syntax and semantics for a fragment of ODP object concepts
defined in the RM-ODP foundations part and in the information language. These
concepts are suitable for describing and constraining dynamic distributed
databases information specifications. |
Keywords |
RM-ODP, dynamic
distributed database (DDB), Meta-modeling Semantics, UML/OCL |
Full
Text |
|
Paper ID: |
1289 -JATIT-2K10 |
Title: |
A USER-CENTERED APPROACH TO VISUALIZING
ALGORITHM BEHAVIOUR FOR REAL-TIME DATABASES |
Author: |
OLUSEGUN FOLORUNSO, ADIO TAOFIKI AKINWALE,
LATEEF YUSUF |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
Real Time Database
Systems (RTDBS) designers are charged with systems that produces results in a
timely and consistent fashion. Therefore, the design of this kind of databases
needs user requirements to support both data structures and the dynamic
behaviours of the database algorithms using visualization technique. In this
paper, we present a user-centered visualization based on our understanding of
the work RTDBS and the needs of designers derived from the first significant
user study of RTDBS. The tool presents RTDBS designers with both �at a glance�
understanding of algorithm behavior, and low-level details. The overall
satisfaction mean score was 4.83 (std. dev. = 1.27), with mean satisfaction
score for the visualization component being 5.17 (std. dev. = 1.11). Users rated
the ease of learning a mean score of 4.42 (std. dev. = 1.44). Also, users
self-rated performance was strongly correlated to ease of learning (Pearson,
0.84, p<0.001), mirroring the desire for the tool to be easily learnable for
success. Also, the user rated the ease of searching and of seeing patterns and
anomalies in the data with a mean score of 5.25 (std. dev. = 0.96) and 4.42
(std. dev. = 1.56), respectively. Results from preliminary usability testing of
a case study show that users performed better and found easier those RTDBS
tasks. |
Keywords |
Information
visualization, RTDBS, User-Centered design, Usability testing |
Full
Text |
|
Paper ID: |
1229 -JATIT-2K10 |
Title: |
VENDOR SELECTION IN SUPPLY CHAIN USING
RELATIVE RELIABILITY RISK EVALUATION |
Author: |
RUPA SUNIL BINDU, B. B. AHUJA |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
Vendor is an important
constituent in the supply chain and supply chain management is truly vendor
management. Performance evaluation based vendor selection is a decision of
strategic importance to an industry. This paper introduces the concept of
relative reliability risk assessment especially for new vendors, where
information availability is inadequate to calculate reliability. The paper deals
with multiple attributes of vendor to which Analytical Hierarchy Process is
applied using verbal assessments for relative measurements. The technique used
for assigning weights is the entropy method. Final value of Relative Reliability
Risk Index (R3I) is calculated. The concept of Alternatives Functionality Graph
is introduced. A real life case study considering Multiple Attribute Decision
Making (MADM) with proposed method is illustrated. |
Keywords |
Reliability, Analytical
Hierarchial Process (AHP), Relative Reliability Risk Index (R3 I), Alternative
Functionality Graphs (AFGs), Multiple Attribute Decision Making (MADM), Win-Win
type of relationship |
Full
Text |
|
Paper ID: |
1320 -JATIT-2K10 |
Title: |
AN ENHANCED GENETIC ALGORITHM FOR DYNAMIC
ROUTING IN ATM NETWORKS |
Author: |
SUSMI ROUTRAY |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
The recent advancements
in the telecommunication industry have brought forth many changes in the field.
One of the most important is a shift towards the wireless communication
scenario. Wireless ATM is fast becoming a solution in this direction. With WATM
gaining momentum it is very important that the underlying ATM network is well
laid out. One of the most important research issues in the ATM scenario is the
optimized usage of bandwidth. In this paper we have proposed an Enhanced Genetic
Algorithm (EGA) algorithm approach based solution for optimization of bandwidth
through dynamic routing in ATM network. Previous research work shows that
traditional optimization heuristics result in sub-optimal solution. In this
paper we have explored non-traditional optimization technique specifically EGA.
The results obtained thus prove that EGA can become a potential solver algorithm
for obtaining optimized bandwidth. The optimized bandwidth could mean that some
attractive business applications would become feasible such as high speed LAN
interconnection, teleconferencing etc. We have also performed a comparative
study of the selection mechanisms in GA and listed the best selection mechanism
and a new initialization technique which improves the efficiency of the EGA. |
Keywords |
Asynchronous Transfer
Mode (ATM), Wireless ATM (WATM), Genetic Algorithm (GA), Enhanced Genetic
Algorithm (EGA) |
Full
Text |
|
Paper ID: |
822 -JATIT-2K10 |
Title: |
Business Process Modeling in Production and Distribution Processes by ensuring
Information Integrity |
Author: |
Reema Khurana, Poonam Garg |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 16. No. 2 -- 2010 |
Abstract |
The paper aims to
discuss the Information Integrity issues in the wake of increasing business
integration on account of increasing ICT usage. It goes further to suggest an
analytical solution and illustrate the same by applying it to Production and
Distribution Management In order to do the above the paper defines information
integrity and suggests a model of Information Base Management System with an
acquisition and utilization cycle attached. The model rests on an Information
Topology Plane. The model also suggests a mechanism to originate the information
in the acquisition and utilization cycle with a view to preserve information
integrity. Business integration is on the rise on account of increased usage of
information technology systems. In wake of this situation the key issue is no
more information manipulation, it is to ensure the accuracy, consistency and
reliability i.e. information integrity. The paper adds authentic value as it
suggests the need for information integrity in the wake of uncertainties arising
in industrial management systems on account of increased automation and
information technology usage. In order to do this it suggests a unique
Information Base Management System and information origination mechanism for the
same. An illustration of implementation of the model is shown using a lucid
example of Production and Distribution Management |
Keywords |
Information Systems,
Uncertainties, Business Environment, Acquisition Cycle, Utilization Cycle,
Enterprise Development |
Full
Text |
|
|
|