|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
May 2014 | Vol. 63 No.1 |
Title: |
AN EFFICIENT INFORMATION RETRIEVAL SYSTEM USING QUERY EXPANSION AND
DOCUMENT RANKING |
Author: |
P.JANARTHANAN, A. KAVITHA, N.RAJKUMAR,4S.P.VICTOR |
Abstract: |
Information retrieval is the process of searching and retrieval of information
from documents that matches user query. The user information requirement is
represented by a query or profile that contains one or more search terms.
Indexing plays important role to retrieve the information. Researchers have been
used indexing techniques only for document indexing and not focused on the speed
up the search and retrieval time. In this paper, an enhanced inverted indexing
technique is proposed to index all root terms of the documents. This approach
maintains the weight of each term connected to the document in index structure.
Multiple query terms are easy to handle using inverted index. After indexing,
the searching and retrieval process is made by matching the query with the
indexed terms. In order to solve the problem of false and null information
retrieval, the proposed system includes query expansion and document ranking
which improves retrieval accuracy. |
Keywords: |
Inverted index, Similarity Measure, Query Expansion, Document Ranking. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
SCHEDULING TECHNIQUES IN ON-DEMAND GRID AS A SERVICE CLOUD: A REVIEW |
Author: |
SHAFI’I MUHAMMAD ABDULHAMID, MUHAMMAD SHAFIE ABD LATIFF,MOHAMMED BAKRI BASHIR |
Abstract: |
The Infrastructure as a service (IaaS) Cloud is a customer oriented cloud
environment that offers user with computing infrastructures on-demand to be used
based on the Cloud computing paradigm of pay-per-use. When the IaaS is now
utilized to build a traditional Grid network within the cloud environment, it is
now called an on-demand Grid as a service (GaaS) Cloud. In the on-demand GaaS
Cloud, a user may use hundred of thousand of Grid nodes to implement a job,
therefore manual scheduling is not a feasible scheduling solution. The main
objective of this review is to study the various concepts and scheduling
algorithms used for the on-demand GaaS Cloud in relation to the scheduling
parameters used by existing researches. We also survey the Cloud
infrastructures, Grid middlewares and the issues addressed by different
researchers in the past within this domain of research. Our contribution will
thus be of assistance in understanding the key scheduling algorithms and
parameters for potential future enhancements in this evolving area of research. |
Keywords: |
Cloud Computing, GaaS Cloud, On-Demand Grid, On-Demand GaaS Cloud, IaaS Cloud,
Virtualization |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
ARTIFICIAL COOPERATIVE SEARCH ALGORITHM BASED LOAD FREQUENCY CONTROL OF
DEREGULATED POWER SYSTEM WITH SMES UNIT |
Author: |
S.RAMESH KUMAR, S.GANAPATHY |
Abstract: |
In this paper, the optimal gain tuning of an Integral controller for the
solution of Load Frequency Control (LFC) problem in a Deregulated power system
is proposed using Artificial Cooperative Search algorithm. Fast acting energy
storage devices can effectively damp the oscillations due to sudden load changes
in the power system. Hence, Superconducting Magnetic Energy Storage (SMES) units
are connected in both areas of the thermal power system for optimal transient
performance in deregulated environment. The Artificial Cooperative Search
algorithm is a new two-population based search optimization algorithm for
optimizing numerical optimization problems. The effectiveness of the proposed
Artificial cooperative search algorithm is demonstrated on a two area
deregulated thermal power system under different contracted scenarios and load
changes. The effect of SMES on LFC operation of deregulated system is also
analyzed. The results of the proposed algorithm are shown for different contract
scenarios and disturbances. |
Keywords: |
Artificial Cooperative Search Algorithm, Deregulated power system, DISCO
Participation Matrix, Load Frequency Control, Superconducting Magnetic Energy
Storage
|
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
FAST FIR ALGORITHM BASED AREA-EFFICIENT PARALLEL FIR DIGITAL FILTER
STRUCTURES |
Author: |
R.P.MEENAAKSHI SUNDHARI, Dr.R.ANITA |
Abstract: |
In digital systems, the filters occupy a major role. This work describes the
design of parallel FIR filter structures using poly-phase decomposition
technique that requires minimum number of multipliers and low power adders.
Normally multipliers consume more power and large area than the adders. For
reducing the area, this filter structure uses adders instead of multipliers
since the adder requires low power and less area than the multipliers. Moreover,
number of adders does not increase along with the length of parallel FIR filter.
Finally the proposed parallel FIR filter structures are beneficial in terms of
hardware cost and power when compared to the existing parallel FIR filter
structure. |
Keywords: |
Digital Signal Processing (DSP), Fast Finite-Impulse Response (FIR) Algorithms (FFAs),
Symmetric Convolution |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
MINING FAQ FROM FORUM THREADS: THEORETICAL FRAMEWORK |
Author: |
ADEKUNLE ISIAKA OBASA, NAOMIE SALIM |
Abstract: |
Frequently Asked Questions (FAQ)’s tag is becoming more popular on websites.
Research activities have been concentrated on its retrieval rather than
construction. FAQ construction can be achieved using a number of sources.
Presently, it is mostly done manually by help desk staff and this tends to make
it static in nature. In this paper, a comprehensive review of various components
that can guarantee effective mining of FAQ from forum threads is presented. The
components encompass pre-processing, mining of questions, mining of answers and
mining of the FAQ. Besides the general idea and concept, we discuss the
strengths and limitations of the various techniques used in these components. In
fact, the following questions are addressed in the review. What kind of
pre-processing technique is needed for mining FAQ from forum? What are the
recent techniques for mining questions from forum threads? What approaches are
currently dominating answer retrieval from forum threads? How can we cluster out
FAQ from question and answer database? |
Keywords: |
FAQ, Forum thread, Question answering, mining FAQ, Internet forum |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NEW SCHEDULING BASED ENERGY EFFICIENT SCHEME FOR WSNS |
Author: |
S.SAIRA BANU , DR.R.DHANASEKARAN |
Abstract: |
In recent years, Wireless Sensor Networks are the most popular networks among
the other networks. It is a collection of sensor nodes where it contains
infrastructure or no infrastructure. It is widely used in military, search and
rescue operations etc. Due to the mobility of nodes, packets are dropped without
organizing scheduling priority. So, the performance of the networks is totally
degraded. To overcome this issue, we proposed New Scheduling based Energy
Efficient Scheme (NSEES). It attains both throughput and network connectivity
while keeping the nodes moving in dynamic manner. The scheme consists of 4
phases. In first phase, we propose the mobility model where the nodes are moving
in a rectangular lattice. In second phase, the multipath routing is used to
provide load balancing to improve the throughput. In third phase, the scheduling
algorithm was proposed. Here the sensor nodes are assigned with the constant
codewords and different time slots. In fourth phase, we proposed new packet
format. It consists of scheduling status and connectivity status. We also
introduced the energy conservation model to attain minimum energy level to the
sensor nodes. By using the extensive simulation results using the discrete event
simulator, the proposed NSEES achieves higher packet delivery ratio,
connectivity ratio, less overhead and delay than the existing scheme like NMRA,
SBYaoGG and AFTMR. |
Keywords: |
Wireless Sensor Networks)WSN, New Scheduling based Energy Efficient Scheme (NSEES),
Smart Boundary Yao Gabriel Graph(SBYaoGG), Adaptive Fault Tolerant Multipath
Routing (AFTMR), Scheduling priority, , end to end delay, and mobility model.
|
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
AUTOMATIC MUSIC GENRE CLASSIFICATION USING DUAL TREE COMPLEX WAVELET
TRANSFORM AND SUPPORT VECTOR MACHINE |
Author: |
RINI WONGSO, DIAZ D. SANTIKA |
Abstract: |
A fast and accurate automatic method for music genre classification is needed to
manage a huge number of digital music currently available. However this is a
non-trivial task because musical genres remain poorly defined concepts due to
subjective human perception. In this experimental study, an attempt to combine
Dual Tree Complex Wavelet Transform (DTCWT) based feature and Support Vector
Machine (SVM) as classifier is proposed. The study focused on classifying four
genres of music i.e. pop, classical, jazz, and rock by using strong features
such as mean, standard deviation, variance, and entropy. Data used in the study
is obtained from GTZAN Collection Data Sets. Based on the experimental results,
the proposed approach produces 88.33% accuracy, which is higher than several
previous methods that could only obtain accuracy up to 86.4%. |
Keywords: |
Music Genre, Classification, DTCWT, Dual Tree, Wavelet, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
MARKER TEXTBOOKS FOR AUGMENTED REALITY ON MOBILE LEARNING |
Author: |
TOUFAN D TAMBUNAN, HERU NUGROHO |
Abstract: |
Variations learning media in school is to help students understand the material
& content being studied. Media like simulation reality can be used as a learning
tool to provide learning experiences for students in understanding something
that is being studied. In this paper, a design proposed technique will be made
learning simulation using mobile augmented reality. The research conducted on
learning materials physics and motion at high school. Aims to facilitate
students understanding of physics concepts of motion by giving an example of a
virtual simulation on mobile applications. Augmented Reality technology used
combines a virtual object or 2D and 3D into a real object environment and
projecting the virtual objects in real time. We propose the design of an
augmented reality system using the student textbook for detecting marker-less
augmented. Technique marker-less can simplify the implementation of Augmented
Reality applications on textbooks student and implemented in mobile devices. The
proposal is expected to learning simulations to help students understand the
concept physics and motion through a technology that is easy to use. |
Keywords: |
Augmented Reality, Marker, Mobile Learning, and Simulation. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
A REFERENCE MODEL OF SECURITY REQUIREMENTS FOR EARLY IDENTIFICATION AND
MEASUREMENT OF SECURITY AWARENESS PROGRAM |
Author: |
Ali Maqousi , Tatiana Balikhina, Kenza Meridji , Khalid T. Al-Sarayreh |
Abstract: |
In practice, at software/system requirements assembly stages, the focus is
regularly on the software security requirements as usually described at the
system level this may lead to explicit security-related product which may be
implemented as both in system and software. According to the ECSS standards
internal security awareness is restricted to avoid illegal access to the
software system and confidential data while the external security requirements
related awareness is failing to put off the leak of secure output data awareness
and illegal processes. In European, ISO 25021 a amount of terms are afforded to
describe many types of aspirant security awareness requirements. This paper
accumulates and systematizes these security awareness-related requirements into
a standards-based reference model of the software security awareness; In the
absence of such a model, such security awareness requirements are definitively
assigned at software system testing time, stakeholders find out that a number of
Security awareness requirements are neglected and additional efforts should be
added to implement such awareness’s. Moreover, the proposed model may also be
used for identify the functional size of security awareness programs using the
ISO 19761 standard. This size may be used for estimation purposes. |
Keywords: |
Security Requirements, Security Awareness Program, ISO 25021, IEEE-830. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
TRANSIENT STABILITY ENHANCEMENT OF TNEB 400 kV TRANSMISSION NETWORK WITH
SVC |
Author: |
Er.S.SUJATHA, Dr.R.ANITHA, Dr.P.SELVAN, Er.S.SELVAKUMAR |
Abstract: |
Modeling of the TNEB 400 kV transmission network with SVC using ETAP simulation
software is presented in this paper. The system is analyzed under severe
disturbance to study the transient behavior by simulating three phase to ground
fault at various buses. To enhance the transient stability of the system, SVC
are inserted and tested to show the effect of the same on the transient
stability under severe disturbances. The study compares the results and
effectiveness of SVC for enhancing the transient stability of the system through
the critical clearing time using ETAP software. The fault clearing time is
increased up to the critical clearing time to test the robustness of the system
and the effectiveness of the SVC. Simulation is performed to study the transient
behavior of the system. Results show that coordinated modification of exciters,
installation of FACTS devices to enhances the stability of the grid to great
extent |
Keywords: |
Power Quality, SVC, Exciter, FACTS, TNEB 400 Kv Transmission Network, Transient
Stability |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
PATTERN BASED CLASSIFICATION FOR TEXT MINING USING FUZZY SIMILARITY
ALGORITHM |
Author: |
V.SHARMILA, I.VASUDEVAN, Dr.G.THOLKAPPIA ARASU |
Abstract: |
Pattern mining is an important research issues in data mining with few kinds of
applications. Many text mining methods have been proposed for mining useful
pattern in text documents. It is mainly focuses to approximately identify the
different entities such as terms, phrases and pattern. We use the feature
evaluation to reduce the dimensionality of high dimensional text vector. Then
the system assigns the frequency to each word, all the weight of the document is
used for pattern clustering. Pattern clustering is one of the favorable methods
for feature extraction in text classification. In this paper we propose a fuzzy
estimated and similarity - based self generating algorithm for text
classification. It overcomes the low frequency problem, and also calculates the
similarity between the different pattern and word in effective manner.
Experimental on RCV1 data collection and TREC topics implement that the proposed
result achieves better performance |
Keywords: |
Text Mining, Feature Clustering, Text Classification, Feature Extraction,
Pattern. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
NONRETINOTOPIC PARTICLE FILTER FOR VISUAL TRACKING |
Author: |
ALEXANDER A S GUNAWAN, ITO WASITO |
Abstract: |
Visual tracking is the problem of using visual sensor measurements to determine
location and path of target object. One of big challenges for visual tracking is
full occlusion. When full occlusions are present, image data alone can be
unreliable, and is not sufficient to detect the target object. The developed
tracking algorithm is based on bootstrap particle filter and using color feature
target. Furthermore the algorithm is modified using nonretinotopic concept,
inspired from the way of human visual cortex handles occlusion by constructing
nonretinotopic layers. We interpreted the concept by using past tracking memory
about motion dynamics rather than current measurement when quality level of
tracking reliability below a threshold. Using experiments, we found (i) the
performance of the object tracking algorithm in handling occlusion can be
improved using nonretinotopic concept, (ii) dynamic model is crucial for object
tracking, especially when the target object experienced occlusion and maneuver
motions, (iii) the dependency of the tracker performance on the accuracy of
tracking quality threshold when facing illumination challenge. Preliminary
experimental results are provided. |
Keywords: |
Visual Tracking, Full Occlusion, Bootstrap Particle Filter, Color,
Nonretinotopic, Tracking Quality Threshold |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
KEYLESS CRYPTOGRAPHY IN GRID COMPUTING USING CYCLIC SHIFT TRANSPOSITION
ALGORITHM |
Author: |
S. GOMATHI, DR.D.MANIMEGALAI |
Abstract: |
Grid computing involves in the process of forming dynamic virtual organizations
and associated resources in which the security is an important factor.Grid
computing, is a distributed computing model in which new kind of systems are
combined to form a heterogeneous computational resources such as computers,
storage space, sensors, and experimental data. The grid can seamlessly,
transparently and dynamically supply the computing and data resources when a
user wants to request them. In recent years, security issues has become an
important concern for grid computing. A strong mutually encrypted and decrypted
methodology is needed for user and to prevent the grid resources from being
illegally visited. Many cryptographic schemes have been proposed in recent
periods for solving the security issues.However, most of them are not ideal for
the grid computing technologydue to its computational overhead and the standard
of encryption. In this paper, we proposed a keyless Cyclic Shift Transposition
Algorithm(CSTA) which uses a combination of shifting and transposition without
public or private key to secure the data in the grid computing system.
Experimental results shows that the proposed algorithm prevents not only known
attacks but also maintains the integrity of data. |
Keywords: |
Grid Computing, Authentication, Encryption, Decryption, Cipher Text, CSTA. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
RECONSTRUCTION 4D OF BLOOD FLOW MR IMAGING ON ABDOMINAL AORTIC ANEURYSMS
WITH THROMBUS SIGNAL |
Author: |
C. M. KARYATI1, S. WIDIYANTO1, S. MADENDA2, J. HARLAN3, A. B. MUTIARA4 |
Abstract: |
Cine MRI (amplitude image and phase contrast image) has been used to represent
the blood flow velocity on the aortic aneurysm. Acquisition of images taken
perpendicular to the abdominal aorta is done in free breathing and breath hold
at the specified location as needed. Active Contour method or Snake (Deformable
Model) has been used to perform automatic contour on amplitude image to detect
the surface of the aorta and obtain the required parameter values. Furthermore,
image reconstruction is performed on the object's surface from several slices of
image segmentation that results with Scalar Volume Data technique (isosurface)
in order to obtain the value of blood flow volume. The method has been developed
and can represent animation of aortic aneurysm with blood flow velocity on each
category of thrombus. |
Keywords: |
Abdominal Aortic Aneurysm, Deformable Models, Scalar Volume Data, Blood Flow
Velocity, Blood Flow Volume |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
SEVERITY SCORING OF SYMPTOMS ASSOCIATED WITH CARPAL TUNNEL SYNDROME BASED
ON RECALL OF COMPUTER GAME PLAYING EXPERIENCES |
Author: |
NURUL HIDAYAH MAT ZAIN, AZIZAH JAAFAR, FARIZA HANIS ABDUL RAZAK |
Abstract: |
The purpose of the present study was to investigate the severity scoring of
symptoms that are often associated with carpal tunnel syndrome (CTS). The
symptoms were identified based on participants’ recalled experiences of computer
game playing, specifically on desktop computer platforms. We conducted the
assessment among Malaysian university students by using the Boston Carpal Tunnel
Questionnaire. The data were collected from 120 students in the age range of
18-25 years. The results indicated that the mean score for symptom severity was
1.59, the standard deviation was 0.49 and most of the cases were mild (N = 88,
73.3%). Meanwhile, the mean score for functional severity was 1.33, the standard
deviation was 0.52 and half of the participants described having hand functions
affected (N = 62, 51.7%). The same participants were also required to answer
questions pertaining to their perceptions of desktop computer gaming. The
results showed the participants’ agreement with the proposition that a user
interface for special needs, such as the needs of hand-impaired users, should be
designed (75.0%). There was a significant association between students who were
less interested in computer game playing and a feeling of hand discomfort (p <
0.001). This study shows that even though the incidence of symptoms associated
with CTS among students is predominant, the symptom severity is in the mild
category. |
Keywords: |
Carpal Tunnel Syndrome (CTS), Boston Carpal Tunnel Questionnaire (BCTQ),
Computer-Game Playing, Computer Game, University Students |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
SURVEY ON GAP FILLING ALGORITHMS IN LANDSAT 7 ETM+ IMAGES |
Author: |
ASMAA SADIQ ABDUL JABAR, GHAZALI SULONG, LOAY EDWAR GEORGE |
Abstract: |
In remote sensing images the gapping is a known phenomenon. There are several
reasons for image gaps, e.g. shadowed area for SAR data sets, cloud coverage for
optical imagery and instrument errors such as SLC-off failure. On May 13, 2003
the Scan Line Corrector (SLC) of Landsat 7 Enhanced Thematic Mapper Plus (ETM+)
sensor failed permanently causing around 20% of pixels per scene not scanned
which become an obstacle and limitation for scientific applications of Landsat
ETM+ data. Therefore, reconstruction of gap regions is an important issue in
remote sensing image processing. This paper presents an inclusive review of
methodologies that have been used to recover the gaps in Landsat7 ETM SLC-off
images and the studies have been performed in this area. Then, the paper
presents the derived conclusions and the directional to more efficiently
researchs on Landsat7 SLC-off reconstruction. |
Keywords: |
Satellite Image, Gap Filling, Landsat7 SLC-Off, Image Reconstruction. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
IAPI QUAD-FILTER: AN INTERACTIVE AND ADAPTIVE PARTITIONED APPROACH FOR
INCREMENTAL FREQUENT PATTERN MINING |
Author: |
SHERLY K.K, Dr. R. NEDUNCHEZHIAN, Dr. M. RAJALAKSHMI |
Abstract: |
Association rule mining has been proposed for market basket analysis and to
predict customer purchasing/spending behaviour by analyzing the frequent
itemsets in a large pool of transactions. Finding frequent itemsets from a very
large and dynamic dataset is a time consuming process. Several sequential
algorithms have contributed to frequent pattern generation. Most of them face
problems of time and space complexities and do not support incremental mining to
accommodate change in customer purchase behaviour. To reduce these complexities
researchers propose partitioned and parallel approaches; but they are
compromising on anyone of these. An interactive and adaptive partitioned
incremental mining algorithm with four level filtering approaches for frequent
pattern mining is proposed here. It prepares incremental frequent patterns,
without generating local frequent itemsets in less time and space complexities
and is efficiently applicable to both sequential and parallel mining. |
Keywords: |
Frequent Pattern Mining; Association Rule; Partitioned Database; Parallel
Mining; Interactive Mining; Incremental Mining
|
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
A SKETCH BASED IMAGE RETRIEVAL : A REVIEW OF LITERATURE |
Author: |
HUDA ABDULAALI ABDULBAQI , GHAZALI SULONG , SOUKAENA HASSAN HASHEM |
Abstract: |
This survey paper reviews the development of Content Based Image Retrieval (CBIR)
field and especially the sketch based image retrieval (SBIR) as a core issue. An
image is retrieved from the database in several ways in user queries. SBIR is
one of the efficient and important methods which are not necessary to have a
high skill to draw the query sketch. First, we review the feature extraction,
features based matching, and indexing which represents the base of recall
images. We also present in the concluding section general limitations of how the
methods deal with the image retrieval and our views in image retrieval based on
sketch query, which is also the future direction. |
Keywords: |
SQbs, Content Analysis And Indexing, Indexing methods, Image Descriptors, Sketch
Based Retrieval |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
PLAGIARISM DETECTION ALGORITHM USING NATURAL LANGUAGE PROCESSING BASED ON
GRAMMAR ANALYZING |
Author: |
ANGRY RONALD ADAM, SUHARJITO |
Abstract: |
Plagiarism has become one of the most concerned problems since there are several
kinds of plagiarism that are hard to detect. Extrinsic plagiarism is now being
handled well, but intrinsic plagiarism is not. Intrinsic plagiarism detection is
being distracted by the mixed up structure and the using of another word which
have the same meaning. Several methods have been research to handle this
problem, not only using the pattern reading but also parsing the sentences, but
still couldn’t give one more accurate way to detect it. In this research, we
propose to use Natural Language Processing (NLP) to create the new way to detect
plagiarism. Begin with using syntactic parsing method to parse the suspicious
document and find the list of words which have the same meaning with it while
considering the Part-Of-Speech (POS) element of that word (semantic parsing).
This algorithm also includes creating the new structure of the object before
comparing them. The result of this research presents the accuracy comparison
between Ferret, WCopyFind, and this algorithm. This algorithm gives the
significant way to detect the plagiarism which is proven by T-Test. |
Keywords: |
Plagiarism Detection, Natural Language Processing, Intrinsic Plagiarism,
Syntactic Parsing, Semantic Parsing, Ferret, WCopyFind, Part-Of-Speech. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
SCHEDULING CASE SIMULATION TO PERFORMANCE EVALUATION OF HOSPITAL
PRODUCTIVITY |
Author: |
FIRDAOUS BENNIS, MUSTAPHA AMGHAR, NAWAL SBITI, ABDELMAJID ELOUADI |
Abstract: |
The block is a strategic and complicated system in the hospital. It uses
diversified and expensive human resources, material and information flow. In
this field which investments are very expensive, simulation is a tool for
decision-making to analyze the operation and detect malfunctions for
dimensioning the system and obtaining the performance. We develop in this
article a C++ simulation with a theory of queues based on the optimum of the
proposed scheduling model. This model consists of a new approach. For scheduling
model, we propose a new production model related to the hybrid flow shop
hierarchy manufacturer. We solve the scheduling problem using the discrete
particle swarm optimization with travelling salesman problem approach. The case
study of our approach applied to the national Institute of Oncology in RABAT,
Morocco, allowed us to measure the maximum of patients that can be accepted in a
day and the allocation of the three machines queues stretchers, Operating rooms
and beds among the scheduled elements involved. |
Keywords: |
Case Simulation, Hospital, Scheduling, Production Model, Hybrid Flow Shop
Hierarchy Manufacturer |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
HYBRID OPTIMIZATION MODEL OF VIDEO STEGANOGRAPHY TECHNIQUE WITH THE AID OF
BIORTHOGONAL WAVELET TRANSFORM |
Author: |
Dr.M. MARSALINE BENO, Dr.ALOYSIUS GEORGE, VALARMATHI I.R, SWAMY S. M |
Abstract: |
In this contemporary world of ours, a lot of people have tried to store their
multimedia datasets as a contour of binary waves. During transmission, if a
prohibited course of action occurs during an intermittent stage of transmission
it could lead to delay in accessing data for individuals who have been provided
authorization. In order to eliminate this undesired course of action, an
efficient method has been adopted. Steganography is an efficient technique that
can eliminate this undesired course of action and can be utilized for writing an
eclipse missive. In this paper we have proposed an efficient optimal robust
video steganography technique using the Biorthogonal Wavelet Transform (BWT)
that has been incorporated with a hybrid model of the Artificial Bee Colony
(ABC) with Genetic Algorithm (GA).The BWT is utilized to split the image into
Low-Low (LL), Low-High (LH), High-Low (HL) and High-High (HH). The optimization
technique ABC and GA are then utilized to attain best fitness values in the
embedding and extraction processes. Analysis on the proposed technique is
carried out with respect to the Peak signal to Noise ratio (PSNR) and the
Normalized Correlation (NC). Experimental results show that the proposed
technique can achieve good imperceptibility and robustness for an image. |
Keywords: |
Steganography, Biorthogonal Wavelet Transform, Artificial Bee Colony, Genetic
Algorithm, Peak Signal To Noise Ratio, Normalized Correlation. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
SERVICE DIFFERENTIATED CALL ADMISSION CONTROL IN NEXT GENERATION WIRELESS
NETWORKS |
Author: |
CH. SREENIVASA RAO, K.CHENNA KESHAVA REDDY AND D. SRINIVASA RAO |
Abstract: |
In wireless network, real time flows are prioritized over non-real time flows.
Because of this prioritization, non-real time flows endures starvation.
Furthermore, real time flows are handled quite generally as no specification is
given to emergency flows. To consider all these difficulties, we propose a
service differentiated call admission control mechanism for next generation
wireless networks. Initially, flows are classified into Transmission Priority
flow (TP) and Bandwidth Priority flow (BP) using DiffServ model. TP flows denote
real time flows and BP belongs to non-real time flows. Further, both TP and BP
flows are again categorized into sub flows based on delay and bandwidth
constraints respectively. TP flows are controlled by RIO-C queuing mechanism and
BP flows are handled by Time Sliding Window (TSW) algorithm. RIO-C assigns
different dropping level for each sub flows and operates independently. On the
other hand, TSW manage the BP flows by controlling their packet-sending rate.
Thus, our mechanism lessens the starvation of non real time flows and handles
emergency calls effectively. By simulation, we prove the efficiency of our
mechanism. |
Keywords: |
Wireless Network, Transmission Priority flow (TP), Call Admission Control (CAC),
Quality of Service (QoS). |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
EFFORT RATE ON USE CASE POINT METHOD FOR EFFORT ESTIMATION OF WEBSITE
DEVELOPMENT |
Author: |
SHOLIQ , TEGUH SUTANTO , ARIFIN PUJI WIDODO3 , WAHYU KURNIAWAN |
Abstract: |
The purpose of this research is to gain Effort Rate (ER) on the Use Case Point
method (UCP) for estimating effort of the website development. The Effort
estimation is an activity that is carried out to predict how amount of effort
required to complete a software development project. Effort estimation is very
important be know before the project is executed to determine how resources
should be spent to complete the project. In this context, resources include the
work hours and expenses. Commonly UCP was one of method used to estimate
software development effort.
The studies that have been conducted by several researchers carried out to
estimate the regular software development. Until now, it is not found research
using UCP to estimate effort for the website development project. The UCP that
is used to estimate the effort of website development projects requires
different ER from the ER for regular software project. Effort is obtained by
multiplying the value of UCP and ER. The ER value proposed by some researchers
varies between 18 to 36 staff-hours per UCP, while ER proposed by Karner was 20
staff-hours per UCP.
The final results of this study obtain ER value of 4.41. This value is smaller
than the value proposed earlier researchers. Decline of the ER values can
decrease value of effort estimation, furthermore decline of value effort
estimation will decrease resources that it will be required for software
development. This may be due to the website development project which can use
Content Management System (CMS) as component or framework that facilitate the
development of a website project easier. |
Keywords: |
Effort Rate, Use Case Points, Website Development Effort |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
PRINCIPAL COMPONENT ANALYSIS COMBINED WITH SECOND ORDER STATISTICAL FEATURE
METHOD FOR MALARIA PARASITES CLASSIFICATION |
Author: |
IIS HAMSIR AYUB WAHAB, ADHI SUSANTO, P. INSAP SANTOSA, MAESADJI TJOKRONEGORO |
Abstract: |
The main challenge in detecting malaria parasites is how to identify the subset
of relevant features. The objective of this study was to identify a subset of
features that are most predictive of malaria parasites using second-order
statistical features and principal component analysis methods. Relevant features
will provide the successful implementation of the overall detection modeling,
which will reduce the computational and analytical efforts. The results showed
that the combination of the principal components of the feature value the
correlation to the ASM, and the contrast to the correlation can separate classes
of malaria parasites. |
Keywords: |
Features, PCA, Identify, Classification, Malaria |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF HARMONIC REDUCTION BY SHUNT ACTIVE POWER FILTER
USING DIFFERENT CONTROL TECHNIQUES |
Author: |
R. VENKATESH, S.DINESH KUMAR, R.SRIRANJANI, S.JAYALALITHA |
Abstract: |
In modern day power systems the introduction of harmonics due to the presence of
non-linear load such as inverters, rectifiers, saturation transformer,
electromagnetic interference etc., affects the power quality in distribution
systems. This paper is aimed at improving the power quality using shunt active
power filter (SAPF). Active filters implemented with the different control
techniques under different load conditions are simulated by MATLAB-SIMULINK and
their performances are compared. |
Keywords: |
Harmonics, Power Quality, Active Filter, Non-Linear, Matlab-Simulink. |
Source: |
Journal of Theoretical and Applied Information Technology
10 May 2014 -- Vol. 63. No. 1 -- 2014 |
Full
Text |
|
|
|