|                                                                                 
                                                             
                                                  
                                                                               
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
       
November 2011 | Vol. 33  No.1  |  
 			
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14348  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FULL RELATIONSHIP AMONG E-SATISFACTION, 
E-TRUST, E-SERVICE QUALITY, AND E-LOYALTY: THE CASE OF IRAN E-BANKING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 SOHEILA GHANE, M. FATHIAN, M. R. 
GHOLAMIAN |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 01 - 06    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 Customer e-loyalty is an important issue 
in the very competitive environment of e-banking. Different studies show that 
e-loyalty is influenced by e-satisfaction, e-trust and e-service quality. 
However, little attention has been given in the literature to fully understand 
the full relationships among them. The purpose of this study is to empirically 
investigate the impacts of e-satisfaction, e-trust and e-service quality on 
e-loyalty, in e-banking as an aspect of B2C e-commerce context. Data was 
collected to test the model from faculties and students of Tehran universities 
as respondents, and empirical analyses were performed using SEM. The analytical 
results indicate that although service quality, e-satisfaction, and e-trust have 
strong direct effect on e-loyalty, impacts of indirect effects (with 
e-satisfaction and e-trust playing mediating roles) are more significant. 
Additionally, this study represents a framework that indicates the full 
relationship among the three factors and their (direct and indirect) effects on 
e-loyalty, a phenomenon that has not previously been explored. |  
|  									
			
  									
			
Keywords  | 
 									
			
E-Satisfaction, E-Service Quality, 
E-Loyalty, Relationship, E-Banking, IRAN |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14347  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A DETAILED STUDY OF MOBILITY MODELS IN 
WIRELESS SENSOR NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 VASANTHI.V, ROMEN KUMAR.M, AJITH SINGH.N, M.HEMALATHA |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 07 - 14    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 Wireless sensor networks (WSN) is 
emerging technology finds variety of applications in military, movement 
tracking, industries and medical fields. WSNs are self configurable, self 
healing networks. This paper is a survey of mobility models that are used in the 
simulations of sensor networks. I describe several mobility models that 
represent mobile nodes whose movements are independent and dependent of each 
other respectively. The goal of this paper is to present a number of mobility 
models and their advantage and disadvantages over here to overcome with future 
model. With this model researchers get choices when they are deciding upon a 
mobility model to use for my future performance evaluations. |  
|  									
			
  									
			
Keywords  | 
 									
			
Sensor Network, Mobility Models, Group, 
Models |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14339  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A TASKS ALLOCATION ALGORITHM FOR 
DISTRIBUTED SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 MOSTAPH ZBAKH, MOHAMED DAFIR EL 
KETTANI |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 15 - 21    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 In this paper, we complete and implement 
the general problem of tasks allocation. The theoretical part of this work is 
developed in our previous work [14] and here we focus our research on the 
practical aspect.  
The problem is modelled as a non-cooperative game between several players. For 
this game, we adopt the Nash equilibrium structure and on the basis of this 
structure, we draw a distributed tasks allocation algorithm that can find this 
equilibrium. We implement this algorithm by using the MPI environment and a 
system of 10 computer sources that generate the tasks and 10 processing 
computers. The theoretical and numerical results show that the tasks allocation 
strategy obtained leads to a good load balancing of computers |  
|  									
			
  									
			
Keywords  | 
 									
			
Tasks Allocation, Game Theory, 
Non-Cooperative Game, Nash Equilibrium, Distributed Algorithm, MPI Environment |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14418  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
COMPARISON OF PULSED ELECTRIC FIELD 
GENERATION TECHNIQUES FOR MICROBIAL INACTIVATION APPLICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 HANIFAH JAMBARI, NAZIHA AHMAD AZLI, 
MOHAMED AFENDI MOHAMED PIAH |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 22 - 31    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 This paper presents a comparative study 
on various pulsed electric field (PEF) techniques for liquid food sterilization 
applications. Pulsed Electric Field (PEF) is an alternative method compared to 
the conventional food pasteurization method in removing harmful bacteria 
contained in liquid food products. A Cascaded Multilevel Inverter (CHMI) is 
proposed as a PEF generator to produce a higher output voltage without using a 
transformer to inactivate microbial in liquid food. It will reduce the power 
losses of the system while yielding better sterilization effectiveness as well 
as reduce cost. The CHMI has been simulated using MATLAB/Simulink software to 
analyze the performance of the circuit. The simulation results demonstrate that 
the CHMI can produce both bipolar and unipolar square wave output pulses. This 
in turn contributes to the flexibility of the CHMI in testing the effectiveness 
of the PEF produced on liquid food sterilization compared to the conventional 
method and other power electronics circuits that have been used for similar 
application. |  
|  									
			
  									
			
Keywords  | 
 									
			
Pulsed Electric Field, Conversional 
Method, Cascaded H- Bridge Multilevel Inverter, Simulation |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14422  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SHARP-EDGES METHOD IN ARABIC TEXT 
STEGANOGRAPHY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 NUUR ALIFAH ROSLAN, RAMLAN MAHMOD, 
NUR IZURA UDZIR |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 32 - 41    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 One of the issues that arise in the text 
steganography is the capacity of hiding secret bit. Focusing in Arabic text 
steganography we propose a sharp-edges method to encounter the issue. This new 
method will hide the secret bits in the sharp-edges for each character in the 
Arabic text document. The main processes involved are identifying sharp-edges in 
the cover-text, secret message preparation to be hidden as a binary string and 
lastly, the bit hiding process. The experiments show that the capacity 
percentage used to hide the secret bit was increased up to 37.8%, resolving the 
capacity issue. The stego-text for this method has high invisibility, and 
therefore it is possible to be published publicly. We introduce keys to 
determine the possition of the secret bit randomly. This method utilizes the 
advantages of the Arabic text for steganography and can also be implemented to 
the same text scripting of languages such as Jawi, Persian or Urdu. |  
|  									
			
  									
			
Keywords  | 
 									
			
Steganography, Text Steganograpy, Arabic 
Text Steganography, Arabic Character, Sharp-Edges. |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14437  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A COMPARATIVE SURVEY OF DATASHARING 
APPROACHES AND THEIR APPLICATIONS IN DISTRIBUTED COMPUTING ENVIRONMENTS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 SOFIEN GANNOUNI, HASSAN MATHKOUR, 
MUTAZ BERAKA |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 42 - 57    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 The Internet or distributed computing has 
evolved from a simple file sharing mechanism to data source sharing and dynamic 
services. This evolution has made data source sharing an urgent necessity at the 
present time. Therefore, we should benefit from distributed data sources that 
are spread across a network and address current data sharing challenges, which 
include masking the heterogeneity between data sources, and between disparate 
clients and different communication protocols and formats. In the recent past, 
efforts have been made by researchers and private companies to propose 
approaches for accessing remote, heterogeneous and autonomous data sources to 
share them across a network. Other efforts are looking at these approaches and 
concepts with the aim of developing applications in both centralized and 
decentralized environments to provide uniform access to and sharing of data 
sources. In this paper, we review four data sharing approaches that have been 
proposed, namely Transaction Processing Monitors, Tuplespace, Resource 
Description Framework and Data Service Approach. For each approach, we will 
present its architecture, limitations and problems, as well as applications that 
have been developed based on its concepts. Moreover, the most important open 
problems related to datasharing systems are briefly highlighted. |  
|  									
			
  									
			
Keywords  | 
 									
			
Data Sources, Data Sharing Approaches, 
Transaction Processing Monitor, Tuplespace, Resource Description Framework, Data 
Service Approach, Open-Source Applications, Proprietary Applications. |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14496  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
USERS EXPECTATIONS FEEDBACK CONSISTENCY AS 
A FIRST STEP FOR A BETTER DATA QUALITY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 L. BRADJI , M. BOUFAIDA |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 58 - 68    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 User feedback is a new direction employed 
to assist users in building data integration systems and to improve their 
quality. We claim that the first step to the efficient data quality improvement 
in a data integration system is the consistency of user’s expectations feedback 
because user(s) can have multiple expectations of the quality of the value and 
the content of the query results at the same time. Therefore, in this paper we 
propose an approach that allows one to detect user’s expectations quality 
problems, especially inconsistency, and so their improvement before their use 
for determining the data quality issues at the data sources in the second step. 
This approach takes a set of queries from the log file and the user’s 
expectations relative to the results of each query to identify and prioritize 
the inconsistencies of user’s expectations values. Thus, to accomplish this, 
three algorithms are proposed. The first algorithm manages the user’s 
expectations inconsistency related to the same query. The second algorithm 
divides queries into groups of similar attributes by using the clustering 
technique of data mining. As the rerun of the queries is time consuming, the 
approach takes samples of data to determine the queries results interactions. 
The quality of these samples is determined in advance in order to ensuring the 
correctness of queries results interactions. The third algorithm takes both the 
queries results interactions and the user’s expectations to address the 
inconsistency between the user’s expectations of queries results interactions. 
To detect the user’s expectations inconsistencies, we have established a set of 
user’s expectations axioms and inference rules, which are used by the algorithm 
to deduce an automatic expectation value. This algorithm introduces a solution, 
which is inspired from the axioms systems of Logic, to solve the inconsistency.  |  
|  									
			
  									
			
Keywords  | 
 									
			
Data Integration Systems, Data Quality, 
Consistency, User Feedback, User Expectation, Query Results, Clustering, Quality 
Of Value, Queries Interactions. |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14501  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SEARCH FOR CYTOLOGY PATTERNS USING THE 
GENETIC ISLAND MODEL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 JESÚS ALVAREZ-CEDILLO, ISRAEL 
RIVERA-ZARATE,JUAN C. HERRERA-LOZADA |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 69 - 75    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 Island model deals with a species which 
is subdivided into a number of discrete finite populations, races or subspecies, 
between which some migration process occurs. If the number of populations is 
small, an assumption of equal rates of migration between each pair of 
populations may be reasonable approximation. In this paper we shown a general 
solution is given for the process of population divergence under this model 
following subdivision of a single parental population, expressed in terms of the 
observed average frequency of cells and explains how to find a zone in an image 
that is representative and small enough to optimize the later analysis of the 
image in general whether manual or automatic. This diagnostic method will 
analyze the behavior of a group of special cells (could be Cancer) |  
|  									
			
  									
			
Keywords  | 
 									
			
Cytology Patterns, Genetic Island Model, 
Population Divergence, Diagnostic Method |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
14319  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MEAN AND DIFFRENTIAL TORQUE CONTROL USING 
HYSTERESIS CURRENT CONTROLLER FOR DUAL PMSM DRIVES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 JURIFA MAT LAZI, ZULKIFILIE IBRAHIM, 
MARIZAN SULAIMAN |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 76 - 82    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 The dual motor drives fed by a single 
inverter are purposely designed to reduce size and cost with respect to single 
motor drives fed by a single inverter. This paper presents the speed responses 
behavior of Dual Permanent Magnet Synchronous Motor (PMSM) driven by Mean and 
Differential Torque Control technique. The drive is simulated by using 
Hysteresis Current Controller. MATLAB/Simulink is chosen as the simulation 
tools. The performance of speed, current and torque responses for Dual Motor 
PMSM fed by a single inverter is presented. The applied technique shows 
satisfactory speed regulation for a wide range of speed either with load, no 
load or variation of load. |  
|  									
			
  									
			
Keywords  | 
 									
			
Dual Motor Drives, Single Inverter, 
Hysteresis Current Control |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14490  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
APPLICATION OF ANFIS SYSTEM IN PREDICTION 
OF MACHINING PARAMETERS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 MOSTAFA REZAZADEH SHIRDAR, 
MEHRBAKHSH NILASHI, KARAMOLLAH BAGHERIFARD, OTHMAN IBRAHIM, S.IZMAN, HOSSEIN 
MORADIFARD, NASIM JANAHMADI, MEHDI BARISAMY |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                     
pp 83 - 92    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 Since cutting conditions have an 
influence on reducing the production cost and time of machining process and also 
the quality of a final product the prediction of output machining parameters 
such as surface roughness and tool life criteria for different cutting speed, 
feed rate, depth of cut and tool geometry is one of vital modules in process 
planning of metal parts. In this study with use of experimental results on 
machining of ST-37 and subsequently, ANFIS system, importance of each parameter 
was studied. These parameters were considered as input in order to predict the 
surface finish and tool life criteria, two conflicting objectives, as the 
process performance. In this paper ANFIS system was applied to predict output 
parameters of machining. Results show that amount of input influence on the 
outputs parameters. By using ANFIS input parameters entered to ANFIS system then 
all training data was trained with 300 epochs. After training the value of error 
which is 1.039e−006 was calculated. |  
|  									
			
  									
			
Keywords  | 
 									
			
Cutting Parameters, Surface Roughness, 
Tool Life Criteria, ANFIS System, Fuzzy Logic, Intelligent System |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14413  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
APPLYING ISM AND ANN TECHNIQUES IN THE 
DEVELOPMENT OF USER EXPECTED COMMAND LOCATION PREDICTING APPROACH |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 CHUNWEI CHEN |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                   pp 
93 - 103    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 The purpose of this research is to 
develop a method for obtaining information on user’s expected command location 
and to verify its effectiveness in improving the inconsistency between the 
command locations of the software application tools and those expected by the 
users. This method proposed in this research is called User Expected Command 
Location Predicting Approach (UECLPA). It is defined as an approach to 
deconstructing user’s expected idea of the command location and transform it 
directly to a treelike command element structure. This forecast method for 
user’s idea of the command location is characterized with real-time modification 
of the predicting results of user’s command locations. These two features are 
achieved by Interpretive Structural Modeling (ISM) and Artificial Neural Network 
(ANN). In terms of command locations, the inconsistency problem between the 
software application tools and the user’s expectation is quite common in current 
software application tools. This often causes the users to have bad impressions 
on the product or even affect the success of the product. The interface 
designers should pay attention to this problem. In this study, users were 
invited to operate the old and new interfaces of a software application tool to 
verify the effectiveness of UECLPA. Results from the experiment indicated that 
there did exist differences between users and designers in the command location 
of software application tools. Moreover, UECLPA proposed in this study proved 
effective in improving the inconsistency problem between user’s expectation and 
the ready-made command location in the software application tool. Therefore, it 
is, suggested that before organizing the command locations of software 
application tools, the interface designers should understand the users’ ideas 
and demands. Last but not least, the application of UECLPA in the planning of 
command locations in software application tools will help decrease the 
inconsistency problem of software application tools. |  
|  									
			
  									
			
Keywords  | 
 									
			
Interface of Software Application Tools, 
Command Location Layout, Human-machine Interface, Interpretive Structural 
Modeling (ISM), Artificial Neural Network (ANN) |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
 14427  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EFFICIENT AUTOMATED SYSTEM FOR GLAUCOMA 
DETECTION USING FUNDUS IMAGE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 K.NARASIMHAN, Dr.K.VIJAYAREKHA |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                 pp 
104 - 110    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 This paper proposes a new method for the 
detection of glaucoma using fundus image which mainly affects the optic disc by 
increasing the cup size is proposed. The ratio of the optic cup to disc (CDR) in 
retinal fundus images is one of the primary physiological parameter for the 
diagnosis of glaucoma. The K-means clustering technique is recursively applied 
to extract the optic disc and optic cup region and an elliptical fitting 
technique is applied to find the CDR values. The blood vessels in the optic disc 
region are detected by using local entropy thresholding approach. The ratio of 
area of blood vessels in the inferior-superior side to area of blood vessels in 
the nasal-temporal side (ISNT) is combined with the CDR for the classification 
of fundus image as normal or glaucoma by using K-Nearest neighbor , Support 
Vector Machine and Bayes classifier. A batch of 36 retinal images obtained from 
the Aravind Eye Hospital, Madurai, Tamilnadu, India is used to assess the 
performance of the proposed system and a classification rate of 95% is achieved. |  
|  									
			
  									
			
Keywords  | 
 									
			
Glaucoma, K-Means Clustering, Thresholding, 
Fundus Image, CDR, ISNT,K-Nearest Neighbor, Support Vector Machine, Bayesian 
Classifier |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
14508   
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DIVERSITY ANALYSIS IN WIFI SYSTEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 M.HEMALATHA, V.PRITHVIRAJ, 
S.JAYALALITHA, K.THENMOZHII |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                
pp 111 - 118    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 Wi-Fi, a Wireless Local Area Network 
technology has solely conquered the arena of short range wireless broadband 
systems. To support the existing system and to further enhance the measure of 
performance in multipath fading environment, Wi-Fi technology is intertwined 
with space diversity technique which is implemented using Alamouti coding and is 
then introduced with interleaving/scrambling technique to take the benefit of 
time diversity. Diversity technique has been an essential factor in improving 
the quality of the wireless system’s operation by providing performance almost 
equivalent to that of the least distorted path among various multi paths at any 
given time and thereby accounting for the fading effect caused in corruptive 
communication channels. This paper discusses the performance of space diversity 
techniques in Wi-Fi by comparing their Bit Error Rate (BER). Various channel 
models are taken into account to simulate the real time scenario of a noisy 
unreliable wireless environment. |  
|  									
			
  									
			
Keywords  | 
 									
			
WiFi, WLAN, MIMO, MISO, Diversity, STBC |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
Paper ID:  | 
 									
			 
  									
			 
14497  
-JATIT  |  
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
KEY MOTIVATORS FOR IRANIAN E-SHOPPING: A 
NEURAL NETWORKS BASED APPROACH |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 MARYAM GHASEMAGHAEI, BAHRAM 
RANJBARIAN, S. AMIRHASSAN MONADJEMI |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology                
pp 119 - 134    Vol 33. No. 1 -- 2011  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 There has been a significant growth in 
Internet shopping over the last few years in Iran. However, there is a little 
awareness of the effective factors which attract consumers to purchase online. 
It has been predicted that the city of Isfahan in Iran will experience a sharp 
increase in the Internet usage in the next decade. However, the factors affect 
the local e- shopping of different types of products and the demographic 
characteristics of the local Internet consumers have received a little direct 
research so far. The present study aims to consider the effective factors on 
consumer e-shopping behavior and the role of each personal characteristic on 
these factors for different types of products. The data were obtained from 412 
volunteers who have had the Internet shopping experience, and were analyzed 
using MLP neural networks and logistic regression per product. Then, after 
comparing the accuracy of these methods, the most essential factors which 
motivate the consumers to buy online were determined by a trained neural 
network. Finally, a regression analysis was performed to assess the significant 
difference between variables of each demographic characteristic per factor.  |  
|  									
			
  									
			
Keywords  | 
 									
			
Consumer Behavior, Artificial Neural 
Networks, Internet Shopping, E-Commerce, Regression. |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
 |     	
  	
  |