|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April
2011 | Vol. 26. No.1 |
Paper ID: |
14080-JATIT |
Title: |
A NEW HYBRID METHOD FOR MEDICAL IMAGE SEGMENTATION |
Author: |
NASSIMA MEZHOUD, FELLA HACHOUF |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
The present work is an attempt to measure the efficiency of a region method in
segmenting a Medical imaging. To accomplish our study, we conceive a new hybrid
clustering method which combines a neural network and a genetic training, in
order to realize a fuzzy learning, and adapt a new tool for clustering called
ACE (Alternating Cluster Estimation). The ACE is a new clustering model
constituted of two update equations which, in contrast to classical models, are
user specified and are not necessary relating to an objective function. The used
neural network is composed of five layers each one, except the first,
corresponds to a step of the fuzzy learning. The values optimised by the genetic
training algorithm are the weights which represent the centres of membership
functions characterizing linguistic terms. System input and output will be
respectively, colorimetric components and cluster centres. Image data
segmentation using colors space can be a valuable tool to visually assess and
quantify the loss of neural. The HSV color space is used in order to, partly,
get rid of the RGB space correlation. The experimental results obtained using
the proposed method are encouraging. |
Keywords |
Fuzzy, clustering, ACE, Neural networks, Genetic training, The HSV color
space,Medical image segmentation |
Full
Text |
|
Paper ID: |
14144 -JATIT |
Title: |
AN IMPLEMENTATION OF ODBC WEB SERVICE |
Author: |
SEIFEDINE KADRY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
Web applications built using .NET technologies usually access relational
databases via ODBC API. This requires a database system specific ODBC driver to
be installed on the application side. On the other hand, a paradigm shift is
taking place in web application architectures. Future web applications will be
built around Service-Oriented Architectures (SOA) where applications will be
assembled using remote “web services” components. These newly assembled
applications will provide functionalities using remote web services components
over Internet via XML messages. Same paradigm shift will eventually apply to the
data communication between applications and databases. Future applications will
utilize standard “database web services” for data storage and querying
requirements. Here we propose a new architectural model and present a prototype
“database web service” for relational database systems. In our model, web
applications do not need to deal with database drivers but leave the
driver-oriented communication to a database web service. Our database web
service eliminates the need for installation, maintenance, and other issues
involved in maintaining ODBC drivers in distributed web application development. |
Keywords |
Web services, SOAP, ODBC, distributed databases |
Full
Text |
|
Paper ID: |
14132-JATIT |
Title: |
THE DIRECTS IMPACT TO PRE-FILTERING PROCESS TO WEATHER DATASET |
Author: |
WA’EL JUM’AH AL_ZYADAT, RODZIAH BINTI ATAN, Hamidah Ibrahim, Masrah Azrifah Azmi
Murad |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
Monitoring through of data near real-time (dynamic data), in this paper, we
address the issue of efficiently monitoring the satisfaction of sequential
process to receive on the way to data storage. The research question then we is
answer is how is it possible to monitor and efficiently fulfill the requirement
of data storage by receiving a streaming of weather data? We propose a
monitoring structural Algebra representing. We adapt the concept of data
similarity in acclimated data from environment constraint a weather data from
Malaysia. This enables contribute and construction of filtering data to doing
the data meaningful and relevance. These performance enhancing techniques have
general applicability. |
Keywords |
Algorithm, Monitoring Data, Storage Data, Structural Data, Pre-Filter Data. |
Full
Text |
|
Paper ID: |
14134 -JATIT |
Title: |
MODIFIED NEW ALGORITHM FOR SEED FILLING |
Author: |
MALIK SIKANDAR HAYAT KHAYAL, AIHAB KHAN, SABA BASHIR, FARHAN HASSAN KHAN, SALMA
ASLAM |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
Seed filling is basic technique of image morphology. The goal of the seed
filling operations is to find the seed point and fill the object contours
starting from that seed point. In image processing area, the main and most
important problem is region filling. This technique is used for image analysis.
There are many algorithms for filling but the proposed algorithm can be used to
find seeds dynamically. Moreover, proposed algorithm is more efficient as
compared to existing techniques. Seeds are found very fast. During filling
process the whole region is filled inside the contour and the proposed algorithm
does not cross the boundary of contour |
Keywords |
CONTOUR FILLING, IMAGE PROCESSING, IMAGE MORPHOLOGY, SEED FILLING |
Full
Text |
|
Paper ID: |
14011-JATIT |
Title: |
SINGLE REPOSITORY FOR SOFTWARE COMPONENT SELECTION (SRSCS): A REUSABLE SOFTWARE
COMPONENT SELECTION TECHNIQUE |
Author: |
YOUNAS WAHAB, MUHAMMAD IMRAN BABAR, SHAHBAZ AHMED |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
This work contributes a novel approach for selection of reusable components
based on Functional Requirements using SRSCS (Single Repository for Software
Component Selection) mechanism. Different repositories are available for
reusable components and to select the best qualifying component from those
repositories, customers must visit all those one by one and will select the best
qualifying component based on their requirements. SRSCS selects the reusable
component based on the Functional Requirements, and as it is a black box process
so the source, based on which the component is qualified, is the description of
the component provided by the Owner Organization. SRSCS’s main purpose is to
provide a single point of the access to the customers from where they can select
their required component instead of visiting all the repositories one by one.
SRSCS extract information about the reusable component from different
repositories, transform the description provided by the owner organization in
order to classify information and remove the redundant information and store it
on the single place i.e. SRSCS repository. SRSCS process consists of Extraction,
Transformation, Loading and Component selection steps. In “Extraction” step
information is extracted from the Owner Organization. In Transformation step,
information is transformed, redundancy is removed and components are classified
based on Type of the components. In Loading step the extracted information is
loaded into the single SRSCS repository, and in the Component Selection step,
customer sets the priorities of all information provided and the component is
selected totally on the customer’s choice. SRSCS has made the selection easy
with improved time efficiency as compared to other approaches. All the
components are available in one place and the results are accurate. |
Keywords |
Extraction, Transformation, Loading, Component Selection Process, MultiLoad,
FastExport |
Full
Text |
|
Paper ID: |
14153-JATIT |
Title: |
PERFORMANCE EVALUATION OF PAGE REMOVAL POLICIES |
Author: |
DR. K A PARTHASARATHY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
Web caching is an important technique to scale the Internet. One important
performance factor of Web caches is the page replacement policies. Due to
specific characteristics of the World Wide Web, there exist a huge number of
proposals for cache replacement. Furthermore, the article discusses the
importance of cache replacement strategies in modern proxy caches and outlines
potential future research topics. In this paper we analyze effectiveness of LFU-K
replacement policy for the purposes of caching on proxy servers and give the
results of traces analysis taken from real proxy servers to reveal a set of
properties of network traffic. On the basis of the analysis we have drawn a
conclusion about expediency of usage of LFU-K policy which uses information
about dynamic change of document popularity, for Web caching. The scheme of LFU-K
policy is given as well as results of experiments aimed to compare its
effectiveness with the most popular replacement algorithms. |
Keywords |
Web Caching, Proxy, Client, Server, Replacement Policy, LRU, LFU and GDS |
Full
Text |
|
Paper ID: |
14085 -JATIT |
Title: |
INTEGRATING ICT WITH EDUCATION: DESIGNING AN EDUCATIONAL COMPUTER GAME FOR
TEACHING FUNCTIONS IN UNDERGRADUATE MATHEMATICS |
Author: |
ROSE W. MWANGI, RONALD WAWERU, CECILIA W. MWATHI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
This research seeks to look into the design process that promotes the
development of an educational computer game that supports teaching and learning
processes. The research specifically looks at the design of an educational
computer game for teaching and learning of the topic of functions. The topic is
essential in the teaching and learning of Mathematics courses such as Discrete
Mathematics, Real Analysis and Calculus among others at Jomo Kenyatta University
of Agriculture and Technology (JKUAT) Kenya. The computer game was developed
using the Basic Unified process (BUP) which is a streamlined version of the
rational unified process (RUP). This is an Object Oriented methodology mostly
used for small projects with few end users. Due to the few numbers of end users
we used interview method of data collection to gather requirements for the
computer game. A paper prototype was used to validate the requirements. Use
cases were used for both analysis and design of the game while Class diagrams
and activity diagrams were purely used for the design of the game. Owens’ six
top level design anatomy aided in the design of the computer game. The overall
computer game design was based on Craw fords’ computer game design sequence
model. The well designed and developed game met all its user requirements and
was able to facilitate the teaching and learning of Functions to Bachelor of
Science in Mathematics and Computer Science students who were taking Discrete
mathematics in their first year of study at JKUATs’ Taita/Taveta campus.
Development of heuristics for measuring interest, fun and motivation are
recommendations given to aid in the evaluation of user satisfaction of
educational computer games. |
Keywords |
ICT, Educational Computer Games, Computer Game Design, Functions |
Full
Text |
|
Paper ID: |
14070 -JATIT |
Title: |
RECENT TRUST MODELS IN GRID |
Author: |
P. SURESH KUMAR, P. SATEESH KUMAR, S. RAMACHANDRAM |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 1 -- 2011 |
Abstract |
A grid is a framework providing services to access and manage distributed
hardware and software resources. A thorough authentication is required before
any requested access or operation is allowed on any resource of the grid. In
particular, much risk is involved when the grid is used for e-commerce where it
is necessary to share resources with unknown parties. It is difficult for a
resource user on the grid to identify the quality of the resource providers.
Trust is one mechanism with which one can identify the quality of the resource
provider. Various models are proposed in the literature on the use of trust
mechanisms in grid. This paper presents a survey on various models proposed
recently on trust management in grid computing. |
Keywords |
Grid, Security, Trust, Grid Computing, Trust Models, Recommendation Trust,
Behavior Trust. |
Full
Text |
|
|