|                                                                                 
                                                             
                                                  
                                                                               
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
                 
June 2012 | Vol. 40  No.1  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
 SOCIAL KNOWLEDGE NETWORK AS AN ENABLING FACTOR FOR ORGANIZATIONAL LEARNING 
	 |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 ADEL AL-HASHEM, AMIN SHAQRAH 
	 |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
  			
									
Journal of Theoretical and Applied 
Information Technology              
pp 001 - 008    Vol. 40. No. 1 -- 2012  |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
 Organizational learning is a set of processes by which organizations improve 
their performance. Learning processes furthermore require that the organization 
anticipates and attends to feedback, creates knowledge from that feedback, and 
takes action based on that knowledge. The relationships among people can be 
modeled as social knowledge networks in which network nodes represent people and 
network graph represent relationships for sharing opinions, experiences, 
insights, perceptions, and various media, including photos, videos, and music, 
with each other. Social knowledge networks play supportive role for 
collaborative knowledge management phases -creation, capture, codify, 
communicate, and capitalize knowledge. 
	 |  
|  									
			
  									
			
Keywords  | 
 									
			
 Social Knowledge Network, Organizational Learning, Collaborative Knowledge 
Network 
	 |  
|  									
			
  												
	
 Full Text  | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MINING DATA TO REDUCE SHRINKAGE IN ORGANIZED RETAIL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
G.PAVITHRA, R.S.SARANYA, P.S.RAMESH |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 009 - 014    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Shrinkage is a reduction in inventory due to shoplifting, employee theft, paper 
work errors and supplier fraud. If the shrinkage amount is large for a company 
obviously it will result in the net profit deterioration. In this paper we 
propose a model to reduce shrinkage in a retail industry using data mining. The 
barcode of a product is taken as the primary key. The access to this key should 
be with one trusted party and the remaining database can be accessed by anyone. 
Maintaining barcode for the product types such as stationery, groceries will 
solve this problem. This is done by using the data mining tool and presented in 
a pictorial representation. For instance, in the observed pattern if the 
quantity of the barcoded product exceeds the quantity of the product available, 
it can be identified as a shoplifted item. Using the tool the data pattern 
extracted from the dataset will contain the information of that particular item. 
Thus the theft can be identified and prevented. The reliability of our model 
lies in the trust of the administrator who can access the primary key. |  
|  									
			
  									
			
Keywords  | 
 									
			
Data Mining Tools, Primary key, Shrinkage, Clustering |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DETECTION OF ELECTRICAL FAULTS IN INDUCTION MOTOR FED BY INVERTER USING SUPPORT 
VECTOR MACHINE AND RECEIVER OPERATING CHARACTERISTIC |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DIAN R. SAWITRI, I. KETUT E. PURNAMA, MOCHAMAD ASHARI |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 015 - 022    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Fault in induction motor is crucial problem in industrial processes. This paper 
presents the system for electrical fault detection in induction motor fed by 
inverter. Current spectrum with different frequency is used to fault monitoring. 
Faults observed includes variation of frequency, unbalance voltage, and inter 
turn short circuits. Through an experiment, the fault was fired and the current 
spectrum recorded at steady state condition. Preprocessing is performed before 
the identification process. It includes noise reduction using wavelet analysis 
and feature extraction with Principal Component Analysis (PCA). Both processes 
are intended to eliminate the noise, reducing the dimension of feature, and 
retrieve components of the optimal features for classification. Strength of 
identification capability using Support Vector Machine (SVM) is 83.51%. Based on 
the ROC (Receiver Operating Characteristic) analysis, the SVM classifier has a 
good enough performance. This is indicated by the sensitivity is 74.31%, 
specificity is 47.30% and G-Mean is 1.1028. |  
|  									
			
  									
			
Keywords  | 
 									
			
Electrical Fault Detection, Induction Motor, Principal Component Analysis (PCA), 
Receiver Operating Characteristic (ROC), Support Vector Machine (SVM). |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
QUERIES SNIPPET EXPANSION FOR EFFICIENT IMAGES RETRIEVAL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ROOH ULLAH, J. JAAFAR |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 023 - 028    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Technological and dynamic growths of digital media have increased volume of the 
multimedia corpus. Due to this growth, it is strongly urged for a system that 
can efficiently and effectively compiles the user demand, and retrieving the 
relevant images. Keyword based system retrieves an image on syntactic matching, 
i.e. string matching not concept. Content Based Image Retrieval (CBIR) systems 
retrieve the image based on low level features and still exist a gap is called 
semantic. This paper discussed snippet technique that covers the semantic gap as 
well as Word Sense disambiguation problems. It extracts user queries for 
expansion with the help of Knowledgebase WordNet and ConceptNet. Experiments 
performed on the open benchmark image dataset LabelMe. A substantial improvement 
has been achieved in terms of precision and recall. Remarkably outperformed of 
Results and showed 84% corrects. |  
|  									
			
  									
			
Keywords  | 
 									
			
Query Expansion, Semantic Gap, LabelMe, WordNet, ConceptNet |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
NEW MODEL FOR TEACHING AND LEARNING TRADITIONAL CRAFT COURSEWARE: ANALYSIS AND 
DESIGN PHASE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SALYANI OSMAN, NOR AZAN MAT ZIN, NORAIDAH SAHARI, YUHANIS OMAR, RATNA ZUARNI 
RAMLI, NORAZIMAH AWANG |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 029 - 038    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
This research seeks to look into a design process of the development of a model 
for teaching and learning traditional craft courseware called CDTC model. 
Specifically, this research focuses on analysis and design phase. The model was 
developed according to an established methodology and it is relied upon a 
conceptual framework consisting of four development phases starting from 
Analysis, Design, Development and Evaluation. The research begins with the 
preliminary analysis to look into the problems in conventional traditional 
apprenticeship method for teaching and learning traditional craft by looking at 
students and craft instructors' perceptions. Various weaknesses were identified 
in acquiring the craft skills taught to students especially when instructors 
need to teach a group of students. The results of analysis helps to suggest and 
determine a practical way to map out the suitable teaching environment and 
strategy that would best serve for teaching and learning traditional craft. As a 
result from initial analysis, the proposed CDTC model for educational courseware 
development for teaching and learning traditional craft was developed consisting 
of two main components. In Design phase, the proposed CDTC model's components 
was evaluated by selected craft instructors through initial validation process 
in order to verify its' components. The results from initial validation among 
instructors help in establishing and designing a preliminary version of the 
model. |  
|  									
			
  									
			
Keywords  | 
 									
			
Model development, Traditional craft courseware, Web-based learning, Craft 
Education |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A REVIEW ON WEP WIRELESS SECURITY PROTOCOL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUHAMMAD JUWAINI, RAED ALSAQOUR, MAHA ABDELHAQ, OLA ALSUKOUR |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 039 - 043    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE 
(The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP 
is widely used in telecommunication field. In daily usage, it had been 
phased-out by IEEE since 2005 to be replaced by WPA/WPA2 (Wi-Fi Protected 
Access). WEP encryption algorithm can be easily cracked because of its widely 
documented weaknesses. Nevertheless, WEP is still has been used extensively as a 
research topic in the academic field. Certain enterprises still using WEP due to 
lack of security consciousness, economical constraint or because it is difficult 
to replace the legacy communication devices in which WEP is already bulged. In 
this paper, we give a review on WEP wireless security protocol in terms of its 
history, weaknesses, improvements, and current alternative approaches to 
overcome its weaknesses regarding the protocol in ICT (Information and 
Communication Technology) field. This research aims to address WEP protocol in 
its current versions and to give a spirit future direction research to enhance 
its security mechanism. |  
|  									
			
  									
			
Keywords  | 
 									
			
Rivest Cipher 4 (RC4), Wired Equivalent Protocol (WEP), Wireless Security |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
INTRUSION PREVENTION SYSTEM: A SURVEY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DERIS STIAWAN, ALA  YASEEN IBRAHIM SHAKHATREH |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 044 - 054    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
For the last few years, the Internet has experienced tremendous growth. Along 
with the widespread evolution of new emerging services, the quantity and impact 
of attacks have been continuously increasing. Defence system and network 
monitoring has become an essential component of computer security to predict and 
prevent attacks. This article presents a survey, open issues on early detection, 
and response toward prevention network intrusion. Roadmap of intrusion 
prevention of current approach is also presented. Furthermore, relevant issues 
and challenges in this field are subsequently discussed and illustrated. This 
research is expected to obtain learning phase. Finally, this work concludes with 
an analysis of the challenges that still remain to be resolved. |  
|  									
			
  									
			
Keywords  | 
 									
			
Intrusion Detection - Prevention System, Heterogeneous Parameter |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
STUDY OF ONTOLOGY OR THESAURUS BASED DOCUMENT CLUSTERING AND INFORMATION 
RETRIEVAL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
G.BHARATHI,  D.VENKATESAN |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 055 - 061    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Document clustering generates clusters from the whole document collection 
automatically and is used in many fields, including data mining and information 
retrieval. Clustering text data faces a number of new challenges. Among others, 
the volume of text data, dimensionality, sparsity and complex semantics are the 
most important ones. These characteristics of text data require clustering 
techniques to be scalable to large and high dimensional data, and able to handle 
sparsity and semantics. In the traditional vector space model, the unique words 
occurring in the document set are used as the features. But because of the 
synonym problem and the polysemous problem, such a bag of original words cannot 
represent the content of a document precisely. Most of the existing text 
clustering methods use clustering techniques which depend only on term strength 
and document frequency where single terms are used as features for representing 
the documents and they are treated independently which can be easily applied to 
non-ontological clustering. To overcome the above issues, this paper makes a 
survey of recent research done on ontology or thesaurus based document 
clustering. |  
|  									
			
  									
			
Keywords  | 
 									
			
Ontology, Thesaurus, Document Clustering, Intelligent Information Retrieval, 
Semantics, Wikipedia, WordNet. |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AUTOMATIC PATIENT MONITORING SYSTEM USING SCATTERNET FOR CRITICAL CARE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SIVARANJANI A, VIGNESH KUMAR K, SATHYA S, SANTHI B |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 062 - 066    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Wireless sensor network provides a useful method to acquire and monitor the 
physiological signals of a patient. Bluetooth has a wide variety of applications 
in the medical field. Previously in a patient monitoring system, the 
physiological signals of a patient are transferred by using piconet. And it has 
some drawbacks such as limited number of nodes and limited communication range. 
To overcome these drawbacks, we proposed a system using Bluetooth scatternet. In 
this proposed model three piconets are interconnected to form Scatternet Sensor 
Network. The first and second piconet consists of one master node (local nurse) 
and five slaves nodes (patients). The third piconet consists of one master node 
(Chief nurse) and three slave nodes (Chief Doctors). Chief nurse act as a bridge 
node, which interconnect three piconets. The patients are at 24×7 critical care. 
If anything critical occurs, the Chief Doctor receives the data and sends 
acknowledge to the concerned patient. Furthermore, with the help of this system, 
medical personnel can take care of a few patients simultaneously, and thus, the 
personnel expenses can be reduced. |  
|  									
			
  									
			
Keywords  | 
 									
			
Bluetooth, Scatternet Network, Piconet, Physiological Signals |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PERFORMANCE ANALYSIS OF WOUND ROTOR INDUCTION MOTOR BY DSP BASED ROTOR DYNAMIC 
CAPACITOR CONTROL |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
K.RANJITH KUMAR, S. PALANISWAMI, M.MANIKANDAN |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 067 - 077    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
The paper presents a novel secondary reactance control technique in the rotor 
circuit of a three phase wound rotor induction motor (WRIM). The problem 
associated with the conventional rotor capacitive reactance control is the 
demand of exceptionally large capacitance requirement for enhancing the 
performance of the motor in wide operating range. In the proposed technique, a 
three phase bridge rectifier with a dynamic capacitor is used in the rotor 
circuit. The dynamic capacitor is H-bridge circuit with a capacitor in which the 
duty cycle of switching elements is varied for emulating the capacitance value 
dynamically and to be used as capacitive reactance control. A TMS320F2407 
Digital Signal Processor (DSP) controller is used for delivering Pulse Width 
Modulation (PWM) pulses for appropriate switches. The performances such as 
speed, torque, power factor, efficiency, harmonics of the motor are analyzed for 
different speed and loading conditions. The feasibility of the proposed system 
is verified by simulation and experimental results. |  
|  									
			
  									
			
Keywords  | 
 									
			
Wound Rotor Induction Motor (WRIM), DSP Controller, Dynamic Capacitor (DC), 
Secondary Reactance Control, Rotor Capacitive Reactance Control (RCRC), Pulse 
Width Modulation (PWM). |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN INTEGRATED APPROACH TO RAPID AUTOMATED SERVICE DISCOVERY OF SEMANTIC WEB 
SERVICE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MICHAEL RAJ T.F |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 078 - 082    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
The development of Web services has transformed the World Wide Web into a more 
application-aware information portal. Web services are interoperable and 
extensible and there are possibilities for simple services to be clustered to 
build complex ones. To improve the automation of web services selection a lot of 
techniques and technologies are recommended. Web service selection in a web 
service group is an emerging research topic. In this paper we propose an 
integrated model for web service selection and clustering can be done from a web 
service group. The proposed model builds up a lightweight integrated model. |  
|  									
			
  									
			
Keywords  | 
 									
			
Semantic Web Services(SWS),Clustering Web Services, Ontologies |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FEATURE EXTRACTION TECHNIQUE FOR HANDWRITTEN INDIAN NUMBERS CLASSIFICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SALAMEH A. MJLAE , SALIM A. ALKHAWALDEH , SALAH M. AL-SALEH |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 083 - 088    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
In this paper, we propose a recognition technique for handwritten Indian 
numbers. Due to the variations in shapes and sizes of handwritten Indian 
numbers, image representation, smoothing, skeletonization and localization 
processes are applied to further improve the classification performance. We 
employ five efficient classifiers RNN, DROP 1, DROP 2, DROP 3 and DROP 4 in our 
technique. New feature extraction method that divides the image of the 
handwritten Indian number into 16 sub blocks and 24 partition lines is proposed. 
For this feature extraction, a vector set is built with 41 attributes 
representing 16 sub blocks, 24 partition lines and one for the possibility of 
getting closed loop. Simulation results show that the above classifiers with the 
new proposed feature extraction improve the recognition accuracy with acceptable 
subset size. It is noted that DROP 3 method has the highest classification 
accuracy with good reduced memory size compared to other methods. |  
|  									
			
  									
			
Keywords  | 
 									
			
Feature Extraction, Pre-processing, Classification, Pattern Attributes, Indian 
Numerals |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN AUTOMATIC APPROACH FOR GENERATING TABLES IN SEMANTIC WIKIS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LULUAH AL-HUSAIN,  SAMIR EL-MASRI |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 089 - 097    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Wiki is well-known content management systems. Semantic wikis extends the 
classical wikis with semantic annotations that made its contents more 
structured. Tabular representations of information have a considerable value, 
especially in wikis which are rich in content and contain large amount of 
information. For this reason, we propose an approach for automatically 
generating tables for representing the semantic data contained in wiki articles. 
The proposed approach composed of three steps (1) extract the semantic data of 
Typed Links and Attributes from the wiki articles and call them Article 
Properties (2) cluster the collection of wiki articles based on extracted 
properties from the first step, and (3) construct the table that aggregates the 
shared properties between articles and present them in two-dimensions. The 
proposed approach is based on a simple heuristic which is the number of 
properties that are shared between wiki articles. |  
|  									
			
  									
			
Keywords  | 
 									
			
Clustering, Semantic wikis, Resemblance Metric Wiki |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN IMPROVED APPROACH IN FLOODING WITH PACKET REACHABILITY IN FSR (FISHEYE STATE 
ROUTING) PROTOCOL USING MANET |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S. NITHYA REKHA, Dr.C.CHANDRASEKAR |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 098 - 104    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Packet Reach ability and Broadcasting in Mobile Ad Hoc Networks (MANETs) is a 
fundamental data dissemination mechanism with a number of important 
applications, e.g., route discovery, address resolution. However broadcasting 
induces what is known as the ‘‘broadcast storm problem’’ which causes severe 
degradation in network performance due to excessive redundant re- transmission, 
collision, and contention. Broadcasting in MANETs has traditionally based on flooding, 
which simply swamps the network with large number of rebroadcast messages in 
order to reach all network nodes. Although probabilistic flooding has been one of 
the earliest suggested schemes to broadcasting, there has not been so far any 
attempt to analyze its performance behavior in a MANET environment. In an effort 
to fill this gap, this paper investigates using extensive NS-2 simulations the 
effects of a number of important system parameters in a typical MANET, including 
node speed, pause time, and node density on the performance of probabilistic flooding. 
The results reveal that most of these parameters have a critical impact on the 
reach ability and the number of saved rebroadcast messages achieved by 
probabilistic flooding |  
|  									
			
  									
			
Keywords  | 
 									
			
MANET, FSR (Fisheye State Routing) Protocol, Broadcasting, Flooding Probability, 
Saved Broadcasting, Packet Reach Ability, Node Speed, Pause Time, Mobility, NS2 |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
BE AGILE: PROJECT DEVELOPMENT WITH SCRUM FRAMEWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SOUMYADIPTA PAUL, K. JOHN SINGH |  
|  			
									
  										
			
 								
					
Source:  | 
 			
									
Journal of Theoretical and Applied 
Information Technology              
pp 105 - 112    Vol. 40. No. 1 -- 2012 |  
|  									
			
  										
			 								
					
 								
					
			Abstract  | 
 			
									
Today IT companies are facing the toughest competition to deliver their products 
with high quality within time. The rapid changes of the behavior of the industry 
and all new inventions of technologies in different fields, it becomes really 
challenging to develop and deliver a large software product within time with 
full customer satisfaction. Over all the industry is getting very spry in 
nature. On other hand software is something we cannot see unless it is fully 
working or providing some output. Now human cannot predict the future or plan 
for uncertain changes in distant future. So to support the flexibility of the 
market the development process of such project also needs to be more flexible, 
more agile. Therefore agile software development methodology helps to develop a 
project in iterative and incremental way and scrum is one of the frameworks 
which help to implement agile methodology in a software project development. |  
|  									
			
  									
			
Keywords  | 
 									
			
Agile Methodology, Scrum, Iterative and Incremental Development |  
|  									
			
 Full Text | 
 
 		
										
  						
							 |    		
							
 |     	
  	
  |