|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December
2010 | Vol. 22. No.1 |
Paper ID: |
1518 -JATIT |
Title: |
A
PARALLEL ALGORITHM FOR COMPUTATION OF 2D IMAGE MOMENTS |
Author: |
WAFA KHADER ALDABABAT, MOHAMMAD HJOUJ BTOUSH, ADNAN I. ALRABEA |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
Moment functions of the two dimensional
image intensity distributions are used as descriptors of shape in a variety of
applications. In this work, an improvement on the moment computation time is
considered by providing the design and implementation of a parallel algorithm
that will speedup moment computation |
Keywords |
Third Order Moments, Parallel Algorithm,
Digital Filter, Moment Invariants |
Full
Text |
|
Paper ID: |
1560 -JATIT |
Title: |
SEMANTIC WEB SECURITY AND PRIVACY |
Author: |
N K PRASANNA ANJANEYULU ANNA, SHAIK NAZEER |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
The Semantic Web aims at enabling
sophisticated and autonomic machine to machine interactions without human
intervention, by providing machines not only with data but also with its meaning
(semantics). In the Semantic Web, any two strangers can interact with each other
automatically and therefore this assumption does not hold. In this setting,
traditional security mechanisms are not suitable anymore. Hence, a semantically
enriched process is required in order to regulate an automatic access to
sensitive information. Policy-based access control provides sophisticated means
in order to support protecting sensitive resources and information disclosure.
This paper provides an introduction to policy-based security and privacy
protection, by analyzing several existing policy languages. Furthermore, it
shows how these languages can be used in a number of Semantic Web scenarios. |
Keywords |
Semantic Web, Security, Privacy,
Machine Internacitons |
Full
Text |
|
Paper ID: |
1554 -JATIT |
Title: |
APPLICATION
OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE
|
Author: |
YAROSLAVTSEV A.F., 2Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
We present the structured queuing
network as effective mathematical model of telecommunication sys-tem; this model
is oriented on the analysis of delay in telecommunication networks. A set of
special com-ponents are identified for providing structurization of such models.
QoS parameters: the average delivery time and the utilization coefficient are
calculated for MPEG video LAN implementing structured queuing model. In this
paper, we propose the use of structured queuing networks to model high speed
communication networks, which is more adequate than conventional analytical
models, and expends less computational time than simulation models. |
Keywords |
QoS; Modeling; Structured Queuing
Networks; Closed Heterogeneous Queuing Networks |
Full
Text |
|
Paper ID: |
1562 -JATIT |
Title: |
A NOVEL ULTRA WIDE BAND YAGI MICROSTRIP ANTENNA FOR WIRELESS APPLICATIONS |
Author: |
MAMDOUH GOUDA 2MOHAMMED Y. M. YOUSEF |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
This paper presents an Ultra Wide
Band Microstrip Yagi antenna with very good performance at four main operating
frequencies (0.85, 2.4, 3.5 and 5.2) GHz. Numerical simulation results of our
design show more than (-20 to -40) dB return loss at the bands of (0.85, 2.4,
3.5, 4.5 and 5.2) GHz and VSWR less than 1.7 at these frequencies. The
simulation method based on finite element method (FEM) was applied by using HFSS
simulator to obtain the optimized parameters in order to find the best design
for this antenna. The antenna bands can be varied to be suitable for various
wireless applications. Finally a fabrication to the final design has been
implemented, and then a measurement performed to compare the actual results with
those simulated. Measured return loss and VSWR of this antenna are presented to
validate the results of simulation so that it give (0.85, 2.4, 2.75, 3.6, 4.2
and 5.3) GHz for the measured return loss results and the antenna VSWR ≤ 1.5 at
(2.4, 3.5, 4.5 and 5.2) GHz. |
Keywords |
Microstrip Yagi Antenna, Wide Band,
Ultra Wide Band. |
Full
Text |
|
Paper ID: |
1542 -JATIT |
Title: |
A DECENTRALIZED COALITION FORMATION ALGORITHM AMONG HOMOGENEOUS AGENTS |
Author: |
LEILA KHALOUZADEH, DR.NASER NEMATBAKHSH, DR.KAMRAN ZAMANIFAR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
In a multi-agent environment, the
accomplishment of a task may necessitate the co-operation of a number of agents.
In order to allocate a task to a group of agents, methods of coalition formation
in multi-agent systems can be used. In multi-agents systems, the formation of an
optimal coalition is one of the main challenges to be overcome. With increase in
the number of agents, the number of possible coalitions potentially capable of
carrying out a specific task increases exponentially. Determining the value of
each potential coalition in order to choose the best option involves an excess
of time and memory usage. Some algorithms have solved the problem by
distributing the calculation among the agents. Considering the fact that the
agents are mobile the distance between the agents and the task is significant
and that certain capabilities are required for any one task to be carried out we
have presented a new algorithm for coalition formation. Here, the optimal
coalition is determined without having had to ascertain the value of each
potential coalition beforehand. Another advantage of this new algorithm is that
there is no need for any connection between agents in the coalition formation
stage. Moreover, the result of simulation and comparison show that this novel
algorithm saves agents transfer time and cost. |
Keywords |
Task allocation, Coalition Cormation,
Multi-agent System, Mobile Agent |
Full
Text |
|
Paper ID: |
1509 -JATIT |
Title: |
A
COMPARATIVE STUDY ON MANUAL AND AUTOMATED SYSTEM FOR WIRELESS NETWORKS |
Author: |
G.SURESH REDDY , P.V. SIVA KUMAR, Dr.C.KIRANMAI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
VNR Vignana Jyothi Institute of
Engineering and Technology- have an existing network of outdated equipment
purchased on an as-needed basis with limited planning and support. A portion of
the outdated equipment was reaching end-of-life (EOL). The network was unmanaged
& a lot of its equipment was outdated and underperforming, however, the
college�s rapid growth and subsequent increase in network traffic, was creating
a demand for more network applications and updated hardware. Before deploying a
wireless network, it needed to update its network to boost bandwidth capacity
and resiliency and tighten security controls. In addition to supporting its
communications and applications. The college�s vision was to build a facility
that provided the students, faculty and staff with the most up-to-date IP
network that would enable secure delivery of data over Wired as well as Wireless
Network. |
Keywords |
Network, Switches, Security,
Wireless |
Full
Text |
|
Paper ID: |
1558 -JATIT |
Title: |
INFORMATION EXTRACTION AND AD HOC ANAPHORA ANALYSIS |
Author: |
A.SURESH BABU, DR P.PREMCHAND, DR A.GOVARDHAN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
Anaphora is the prominent
linguistic element that defines the contextual coreference. It is very essential
to apprehend and reason out large texts for the discovery of summary and forms
of knowledge. Methods and Techniques are available for specific contextual
elements that frame out as summaries and forms of knowledge. Important
information which have keen actionability is sometimes not possible to extract
using methods and techniques that are approved from available research. And,
this is a task which shall be requisite for text detection and extraction to
find out reasonable inferences from a huge corpus of non domain texts. We
propose Ad Hoc Anaphora Analysis as the novel method introduced in this work to
structure and build the framework that implement for a large non domain text
corpus. |
Keywords |
Linguistic Analysis, Coreference,
Anaphora, Ad Hoc Modeling, Uncertainty Models. |
Full
Text |
|
Paper ID: |
1599 -JATIT |
Title: |
SOFTWARE RISKS AND MITIGATION IN GLOBAL SOFTWARE DEVELOPMENT |
Author: |
QADEEM KHAN1, SHAHBAZ GHAYYUR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 22. No. 1 -- 2010 |
Abstract |
The Global Software Development is
becoming so much complex and challengeable as the scope of the problem domain of
the user increases day by day advancement. In today�s modern world of
engineering development, almost all projects suffer from some unwanted threats
called risks which can seriously affect the quality, cost and schedule of the
projects and hence could have a large negative impact on a project. Even many
projects are cancelled due to catastrophic risks so it is very much important
for a good project management to identify, monitor, plan and control the
potential risks so that it is ensured that the project completes according to
the satisfaction of all stakeholders interested in the project. The risks occur
in GSD are much more different than those risks that in Local Software
Development. Even sometime a tinny risk becomes a serious catastrophic risk in
GSD. This paper provides some necessary information regarding the potential
risks that can occur in the GSD, their consequences on the projects, and some
useful guidelines of handling these risks. |
Keywords |
GSD, Offshore, Outsourcing, Risks,
Software Project Management |
Full
Text |
|
|
|