|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January
2011 | Vol. 23. No.1 |
Paper ID: |
1550-JATIT |
Title: |
REAL
TIME WARNING SYSTEM DESIGN FOR WEB DEFACE BASED ON SHORT MESSAGE SERVICE |
Author: |
ERI PRASETYO WIBOWO, FITRAH ELLY FIRDAUS, METTY MUSTIKASARI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
Currently the internet is becoming more
important in many aspects of human life. The number of people who use the
internet in daily activities is also increasing. The rapid growing of computer
networks and the interconnection among them has entailed some security problems.
There are a growing number of bad-intentioned people trying to take advantage of
the security problems. In the manner of existence problem, then needed a certain
warning system which can prevent or give warning for crime possibility in the
web. This paper proposes a system design to protect system from intruders and
develop warning system via short messages service. |
Keywords |
Agent systems, Short Message
Service, Warning System, Intrusion Detection System |
Full
Text |
|
Paper ID: |
1557 -JATIT |
Title: |
INFORMATION SYSTEM FOR MODELING THE GRAIN SIZE DISTRIBUTION |
Author: |
SAŠA PUŠICA, , ZORAN NIKOLIĆ, VELIMIR ŠĆEKIĆ |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
Grain size distribution is very important
characteristic of primary and secondary materials, but also for the material in
pharmacy, agriculture, chemical industry and in many other branches of science.
Usually is presented with graphical methods. In the middle of last century,
several authors have proposed several different models of analytical
presentation of grain size distribution, which are based on the principle of
graphical determination of these models. Using computer science, statistical
analysis and information technology, we can improve the development of these
models and this paper will show the method for development of information system
for modeling the grain size distribution. |
Keywords |
Information System, Modeling, Grain
Size |
Full
Text |
|
Paper ID: |
1587 -JATIT |
Title: |
COMPREHENSIVE
ANALYSIS OF COMPLEX DATA STRUCTURES FOR GRAPH DATA MINING |
Author: |
K RAJENDRAN, Dr.T.VENUGOPAL, Dr.A.RAMA MOHAN REDDY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
Various methods and techniques are
prevailing for processing data to extract useful knowledge; nevertheless they
are accounted for business transaction databases. Much data exists in
non-business domains also, where there is an ardent need of extracting
knowledge. Knowledge is useful for understanding data concisely or comprehending
the concepts in a precise manner. Relational characteristics in data complicate
the representation, and can be eased through graph structures. As one of the
most general forms of data representation, the graph easily represents entities,
their attributes, and their relationships to other entities. Envisioning the
scope of the problems related to graph data, a collection of representations in
graph data mining leads to the development of reference framework. In this paper
we propose an integrated analytical reference framework with a comprehensive
study and empirical evaluation. |
Keywords |
Graph Data Mining, Information
Theory, Knowledge Engineering |
Full
Text |
|
Paper ID: |
1592 -JATIT |
Title: |
CORRELATION COEFFICIENT MEASURE OF MULTIMODAL BRAIN IMAGE REGISTRATION USING
FAST WALSH HADAMARD TRANSFORM |
Author: |
D.
SASIKALA, R. NEELAVENI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
A bundle of image registration procedures
have been built up with enormous implication for data analysis in medicine,
astrophotography, satellite imaging and little other areas. An approach to the
problem of multimodality medical image registration is proposed, with a
fundamental concept Correlation Coefficient, as a matching measure. It measures
the statistical dependence or information redundancy between the image
intensities of corresponding voxels in both images. Maximization of CC is a very
broad and dominant norm. As no assumptions are made regarding the nature of this
dependence and no limiting constraints are imposed on the image content of the
modalities involved. The accuracy of the CC criterion is validated for rigid
body registration of computed tomography (CT), and magnetic resonance (MR T1 and
T2) images by comparison with the registration solution. Experimental results
prove that subvoxel accuracy with the reference solution can be achieved
completely automatically without any preprocessing steps that make this process
ensemble for medical applications. |
Keywords |
Image Registration (IR), Multimodal
Brain Images (MBI), Walsh Transform (WT), Fast Walsh Hadamard Transform (FWHT),
Correlation Coefficient (CC). |
Full
Text |
|
Paper ID: |
1510 -JATIT |
Title: |
NEW WAVELET-BASED TECHNIQUES FOR EDGE DETECTION |
Author: |
YAHIA S. AL-HALABI, HESHAM JONDI ABD |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
Image segmentation and edge detection are
of great interest in image processing prior to image recognition step.
Segmentation process has an important application in Military, Biomedical,
space, and environmental applications. In this paper, we applied the spatial
domain methods, Thresholding and Edge based methods (Roberts operator, Sobel
operator, Prewitt operator, and Laplacian operator). In this research, we found
that using Fourier Transform in edge detection applications yields to a bad
results and has a serious drawback. Wavelet transform plays a very important
role in the image processing analysis, for its fine results when it is used in
multi-resolution, multi-scale modeling. Unlike Discrete Cosine transforms or
Fourier transforms, wavelet transform offers a natural decomposition of images
at multiple resolutions. The resulting representation of wavelet transform
provides an attractive tradeoff between spatial and frequency resolution where
the human visual system can be better exploited. Also, wavelet transform reveals
another important feature unfound in the conventional transforms in the sense
that its basis function can be designed to exactly fit a given problem.. New two
wavelet-based edge detection techniques have been presented in this paper. The
first one is called RC-Algorithm and the second one is called RCD-Algorithm.
These two techniques have proved better results than other old techniques. Edges
extracted using RC-Algorithm and RCD-Algorithm, are sharpen more than edges
extracted using other techniques. RCD-Algorithm gave better results than
RC-Algorithm in most cases. The RC-Algorithm and RCD-Algorithm respond best even
on low transitions. The RCD-Algorithm can handle noisier images better than
other techniques. |
Keywords |
Thresholding, Segmentation, Wavelet,
Roberts operator, Sobel operator, Prewitt operator, and Laplacian operator,
RC-Algorithm and RCD-Algorithm, Fourier Transform, |
Full
Text |
|
Paper ID: |
14097 -JATIT |
Title: |
AN
ENHANCED THREE LEVELS SECURITY POLICY |
Author: |
A.
RADI, A. KARTIT, B. REGRAGUI, M. EL MARRAKI, 5A. RAMRAMI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
Design and implementation of intrusion
detection systems remain an important research issue in order to maintain proper
network security. Despite the undeniable progress in the area of computer
security there is still much to be done to improve security of today’s computer
systems and so many mechanisms have been developed to assure its security.
These systems are vulnerable to attacks from both non-authorized users
(outsider’s attacks) as well as attacks from authorized users (insiders’
attacks) who abuse their privileges. Many researches have proved that more than
60% of the attacks come from the inside of the computer systems.
In the previous article [1], we have proposed an exact algorithm for the
deployment of security policies for single computer systems but in this paper,
we will propose an approach for complex computer systems, base on a three levels
security policy. Each level will protect the computer system from both
outsiders’ attacks and insiders’ attacks. This global security policy will allow
the administrator of the security systems not only to detect attacks, but also
to warn him about this intrusion and forbid access to the whole networks. |
Keywords |
Security Policy, Intrusions
Detection, Scenario, Alerts Correlation, Data Fusion, Attack Prevention. |
Full
Text |
|
Paper ID: |
1555 -JATIT |
Title: |
BEST TARGET PLATFORM FOR APPLICATION MIGRATION |
Author: |
MAHDI MALEKI , SHUKOR ABD RAZAK |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 23. No. 1 -- 2011 |
Abstract |
This paper aims on finding common key
factors between different platforms that must be considered in cross-platform
application migration and the assigning of weight to each of individual factors.
These are achieved through two surveys. This paper will propose a standard
method /.for compatibility ratio measurement regarding the origin/source and
destination platforms to help system administrators and IT managers to choose
the best platform in migration projects. |
Keywords |
C++, Application Migration,
Cross-Platform, Migration Issue, Legacy Application |
Full
Text |
|
|
|