|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February
2011 | Vol. 24. No.1 |
Paper ID: |
1589 -JATIT |
Title: |
HARMONY SEARCH ALGORITHM BASED 0-1 INTEGER
PROGRAMMING FOR GENERATION MAINTENANCE SCHEDULING IN POWER SYSTEMS |
Author: |
ABDOLVAHHAB FETANAT, GHOLAMREZA SHAFIPOUR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
This paper presents a Harmony Search
Algorithm to seek the optimal solution of the unit maintenance scheduling. For
the maintenance scheduling, cost reduction is as important as reliability. The
objective function of this algorithm considers the effect of economy as well as
reliability. Various constraints such as spinning reserve, duration of
maintenance crew are being taken into account. We apply the Harmony Search which
is a music-inspired meta-heuristic algorithm on a power system with six
generating units. We obtain one optimal solution. Numerical results reveal that
the proposed algorithm can find better and faster solutions when compared to
other heuristic or deterministic methods. |
Keywords |
Harmony Search Algorithm, Integer
Programming, Maintenance Scheduling, Optimization |
Full
Text |
|
Paper ID: |
1567 -JATIT |
Title: |
UNKNOWN INPUT SLIDING-MODE OBSERVER DESIGN
FOR A DRUM-TYPE¬ BOILER |
Author: |
A. A. MODARRES, H. MOMENI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
In this paper we propose a gain matrix
selection procedure for a class of full order unknown input observers (UIO).
These kinds of observers employ sliding-mode principles to force the observation
error into the sliding surface. Then, the error starts a sliding motion along
the surface until it asymptotically converges to zero. Although this method
exhibits good performance, there is not any explicit and direct method to
compute the observer gains. In our approach, we consider the problem of finding
the observer gains in the terms of linear matrix inequalities (LMIs). The
simulation results for an industrial drum type boiler demonstrate the
effectiveness of the proposed approach. |
Keywords |
Sliding Mode Observer, Unknown input,
Boiler, LMIs. |
Full
Text |
|
Paper ID: |
14062 -JATIT |
Title: |
REQUIREMENT ANALYSIS FOR DISTANCE LEARNING
MANAGEMENT SYSTEM STUDENTS IN MALAYSIAN UNIVERSITIES |
Author: |
IBRAHIM ABOOD ALMRASHDEH, NORAIDAH SAHARI,
NOR AZAN MAT ZIN, MUTASEM ALSMADI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
The importance of the evaluation and
assessment is to introduce the changes on the existing LMS and to address the
need of distance learning students and updating the current system by a new
technologies which will increase the students interactions with the LMS and that
will led to achieve the learning goal. The assessment of the LMS for distance
learning in particular is significant for every university and from here come
the idea of gather a new requirements for the learning management system (LMS)
in distance learning institutions. This study aim to gather a requirements for
the LMS and that because the technology always change over time and hence
different LMS will be needed at different opportunity in order to provide a
desired functionalities. This study discussed the students requirements for the
LMS based on the questionnaire conducted for the distance learning students
using Hard copy and online questionnaire, the collected data analyzed using the
Statistical Package for the Social Sciences (SPSS). This study found out that it
was important for the students to include the new feature in the future LMS such
s plagiarism checker, Short Message Service (SMS), online survey, online journal
and RSS. |
Keywords |
Distance Learning, Requirement
elicitation, Learning Management System |
Full
Text |
|
Paper ID: |
14092-JATIT |
Title: |
FROM GRAPHICAL USER INTERFACE TO DOMAIN
CLASS DIAGRAM: A REVERSE ENGINEERING APPROACH |
Author: |
MOHAMMAD I. MUHAIRAT, RAFA E. AL-QUTAISH,
BELKACEM M. ATHAMENA |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
The Graphical User Interfaces (GUIs) of
software products are extensively used by researchers and practitioners in
Software Engineering field. For Example, they are used for testing, measuring
usability, and many other purposes. This paper describes a new reverse
engineering approach to transform the GUI into class diagram. However, the
correctness of such transformation process is essential for the corrected
execution of the overall software. To assure this correctness, the interpreted
Petri nets models will be implemented on the proposed transformation processes
(i.e. capturing, normalization, and translation processes) |
Keywords |
Class Diagram, Graphical User Interface -
GUI, Optical Character Recognition – OCR, Petri Nets – PNs, Reverse Engineering,
Software Design, UML |
Full
Text |
|
Paper ID: |
14094 -JATIT |
Title: |
ADAPTIVE TECHNIQUES BASED HIGH IMPULSIVE
NOISE DETECTION AND REDUCTION OF A DIGITAL IMAGE |
Author: |
MOHAMMED GHOUSE, Dr. M. SIDDAPPA |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
As reducing impulse noise in a digital
image is a very active research area in image processing, this paper proposes a
novel algorithm for digital image impulsive noise detection and reduction based
on adaptive nonlinear techniques which seems to be a boom in digital image
restoration process. The main objective of this algorithm is to consider a
particular digital image as input and make the preprocessing to remove the
impulsive noise content by employing suitable adaptive nonlinear filter after
identifying the impulsive noise of overall image. The proposed algorithm
consists of two parts. First, identifying the type of noise present in the image
as additive, multiplicative or impulsive by analysis of local histograms and
secondly, denoising the detected impulsive noise by employing adaptive nonlinear
filtering technique which comprises a process of adaptive noise identification
of a corrupt pixel and filtering it by employing adaptive nonlinear filter. In
this paper, a new adaptive noise identification and adaptive nonlinear filtering
algorithm is described to detect and remove the impulsive noise. Noise present
in the digital image should be removed in such a way that the important
information of image should be preserved. A decision based nonlinear algorithm
for elimination of impulsive noise in digital images has been described in this
paper. In order to improve the performances of classical median filter, an
adaptive nonlinear filter is proposed and results obtained have been compared.
The proposed algorithm has been simulated on MATLAB GUI. A simulation result
shows that the proposed algorithm effectively identifies and removes the high
impulsive noise by preserving image originality compare to standard median
filter. |
Keywords |
Impulsive noise, Additive Noise,
Multiplicative Noise, Adaptive Noise Identification, Adaptive Nonlinear Filter. |
Full
Text |
|
Paper ID: |
14097 -JATIT |
Title: |
AN ENHANCED THREE LEVELS SECURITY POLICY |
Author: |
A. RADI, A. KARTIT, B. REGRAGUI, M. EL
MARRAKI, A. RAMRAMI, D. ABOUTAJDINE |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
Design and implementation of intrusion
detection systems remain an important research issue in order to maintain proper
network security. Despite the undeniable progress in the area of computer
security there is still much to be done to improve security of today’s computer
systems and so many mechanisms have been developed to assure its security.
These systems are vulnerable to attacks from both non-authorized users
(outsider’s attacks) as well as attacks from authorized users (insiders’
attacks) who abuse their privileges. Many researches have proved that more than
60% of the attacks come from the inside of the computer systems.
In the previous article [1], we have proposed an exact algorithm for the
deployment of security policies for single computer systems but in this paper,
we will propose an approach for complex computer systems, base on a three levels
security policy. Each level will protect the computer system from both
outsiders’ attacks and insiders’ attacks. This global security policy will allow
the administrator of the security systems not only to detect attacks, but also
to warn him about this intrusion and forbid access to the whole networks. |
Keywords |
Security policy, Intrusions detection,
scenario, alerts correlation, data fusion, attack prevention |
Full
Text |
|
Paper ID: |
14106-JATIT |
Title: |
DEVELOPING A E-LEARNING MODEL FOR TRACKING
THE CONTINUOUS ATTENDANCE OF THE STUDENTS |
Author: |
MOHSEN KHADEMI DEHNAVI , SAYED MEHRAN
SHARAFI , NASER NEMATBAKHSH |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
In the past decade, significant advances have been gained in e-learning systems;
nonetheless, learning management systems are not free of difficulties. As the
most important of these problems it can be pointed out that there is no guaranty
whether the actual student is present in the virtual classroom or not and also
there is no way to track the students' attendance continually during class time.
The main purpose of this paper is to present a new e-learning model based on web
applications with attendance control ability. The presented multimodal biometric
based model is used for identification, authentication and tracking the users.
In this model two behavioral biometric characteristics (mouse movements and
keystroke dynamics) and a physical one (face features) are used. A new algorithm
is presented to demonstrate use of these three biometrics technologies. As the
experiments' results show, in verification and attendance control processes the
proposed solution needs a lower level of students' collaboration. After the
implementation of this model it can be added to the existing LMS and become
compatible with it. Therefore, this model can be used to track the continuous
attendance of the users in sensitive stages of e-learning process. |
Keywords |
E-learning, Multimodal Biometric,
Authentication, Attendance, Detection |
Full
Text |
|
Paper ID: |
14110 -JATIT |
Title: |
USING OBJECTIVE ONLINE TESTING TOOLS TO
ASSESS STUDENTS’ LEARNING:POTENTIALS AND LIMITATIONS |
Author: |
RADDOUANE CHIHEB, RDOUAN FAIZI, ABDELLATIF
EL AFIA |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 1 -- 2011 |
Abstract |
In this paper we argue that objective
online assessment tools, mainly based on multiple choice questions, have various
practical benefits. In fact, they are widely used to measure knowledge,
comprehension and application of learning outcomes. However, this evaluation
method is considered less effective in enhancing students' learning. Given this
limitation, we believe that the assessment process is an activity in which a
wide range of assessment styles and formats should be involved. Therefore, new
mechanisms should be put forward to encounter potential problems. |
Keywords |
E-learning, Objective Assessment,
Formative Assessment, Summative Assessment |
Full
Text |
|
|
|