|                                                                                 
                                                             
                                                  
                                                                     
          
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
        
 
 
 February 2015 | Vol. 72  No.2  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SECRET DATA HIDING BY OPTIMIZING GENERAL SMOOTHNESS DIFFERENCE EXPANSION-BASED 
METHOD |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MUHAMMAD HOLIL, TOHARI AHMAD |  
|  			
									
Abstract: | 
 			
									
Computer network has made it easy to exchange data; however, there is a security 
challenge raising from it. This is because the transmitting data can be 
intercepted by an attacker. Steganography can be used to prevent an attacker 
from exploring the information in the intercepted data. There are three common 
problems in the steganography, those are: obtaining both secret data and cover 
data from stego data, capacity of the secret data and the quality of the stego 
data. In this paper we propose a method which works on those problems based on 
the smoothness difference expansion. The experimental result shows that the 
proposed method is able to extract both secret and cover data, to increase both 
capacity and quality of the stego data. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Difference Expansion, Block Smoothness, Steganography, Data Hiding, Data 
Security |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MULTIPLE-HYBRID CASE-BASED REASONING APPROACH FOR UNIVERSITY COURSE TIMETABLING 
PROBLEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HONG SIAW THENG, ABU BAKAR BIN MD SULTAN, NORHAYATI MOHD ALI |  
|  			
									
Abstract: | 
 			
									
The University Time Tabling problem (UCTP) is an allocation process to schedule 
courses with available time slots for suitable lecture halls, classes or rooms 
in every semester. The academic time tables design has become a very complex 
issue and difficult task as such it is classified as NP-hard problem. The 
objectives of this paper is to achieve higher accuracy for time tabling plotting 
as well as improve the effectiveness while generating academic courses time 
tables. With the aim to improve timetabling solution, we investigate into a new 
algorithm which is based on Case-based Reasoning (CBR) retrieval function. The 
idea proposed is known as Human Preference Adaptable Retrieval Approach – HPARA 
and is separated in three parts, with the combination of different 
functionality: Prioritized Attributes, Frequency Grouping, and Value Difference 
Measurement. The CBR retrieval is a strategy to retrieve similar cases from 
previous time tabling for generating new time tables. Retrieved cases will then 
filtered with the according functionality: Prioritized Attributes, Frequency 
Grouping, and Value Difference Measurement too seek for the most suitable 
components. The proposed CBR algorithm is tested with the database of Faculty of 
Computer Science and Information Technology for the past five years compared 
with Genetic Algorithm (GA). Experimental results show promising improvement for 
both accuracy and effectiveness with the proposed CBR algorithm to generate UCTP. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Timetabling, Case-based reasoning, Case-based retrieval, Multiple-hybrid, HPARA |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DEVELOPING AND EFFECTIVENESS OF THE COMPUTER ASSISTED INSTRUCTION IN PROGRAMMING 
LANGUAGES BASE ON ANDROID TABLETS DEVICES. |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SATIEN JANPLA |  
|  			
									
Abstract: | 
 			
									
The Objective of this research was to develop and study the effectiveness of the 
computer assisted instruction in programming languages base on android tablets 
devices. The example of this research is first year students in computer science 
department, faculty of Science and Technology, Suan Sunandha Rajabhat 
University. The research methodology is experimental research by using One-Group 
Pretest-Posttest Design. The results of this research showed that the computer 
assisted instruction in programming languages has an efficiency, the students 
had Posttest scores higher than Pretest scores in significance at .05 and the 
computer assisted instruction on programming languages subject has the highest 
satisfaction towards the use of instruction. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Computer assisted instruction, Programming Languages, Tablets Devices |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MODEL OF WIRELESS TRANSMISSION OF BIOMEDICAL PARAMETERS FOR THE MONITORING OF 
PATIENTS IN INTENSIVE CARE UNITS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
K. ROJAS, P. ROMERO, C. ROMERO |  
|  			
									
Abstract: | 
 			
									
The present study aimed to design a model for monitoring and transmission of 
biomedical parameters based on wireless technology. This responds to a latent 
need in terms of improving the efficiency of the operation of the intensive care 
units (ICU), so progress in wireless transmissions, provides an emerging 
alternative to the medical-care personnel can monitor the condition of a patient 
in that unit. The methodology corresponds to a Feasible Project, developed 
through five stages: a) analysis of the situation under study, b) 
characterization of biomedical signals, c) establishing requirements and 
transmission monitoring system, d) design model and, e) model evaluation. As a 
result the model monitoring and transmission of biomedical parameters based on 
wireless technology is presented. In addition, the study failed to prove its 
feasibility by simulation in MatLab Software, establishing in a virtual 
environment system transmitter performance, through the calculated parameters. |  
|  			
									
  										
			
Keywords:  | 
 			
									
System; Monitoring; Wireless; Biomedical Signals |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPLEMENTING PROCESS MINING TO IMPROVE COBIT 5 ASSESSMENT PROGRAM FOR MANAGING 
OPERATIONS (CASE STUDY: A UNIVERSITY BLOG) |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
KURNIATI, IMELDA ATASTINA |  
|  			
									
Abstract: | 
 			
									
ISACA’s COBIT is widely used to assess the maturity of process capability in 
many enterprises. It’s last version is COBIT 5, which proposes a process 
assessment as a part of a process improvement initiative or as part of a 
capability determination approach. Two important steps of the COBIT 5 assessment 
process are data collection and data validation. This paper proposes process 
mining as a method to improve the traditional data collection and validation. An 
internal blog of a private university in Indonesia is analyzed as a case study 
to implement the model being proposed. The result shows that this model is 
proven as implementable in a real case of managing operations of a university 
blog. The resulted findings of the process mining can be combined with the 
findings of other assessment methods to enhance the result of the assessment 
program.ANGELINA PRIMA  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Process Mining, COBIT 5, Assessment Program, Data Collection, Log Data |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CRUDE OIL PREDICTION USING A HYBRID RADIAL BASIS FUNCTION NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
Dr S. KUMAR CHANDAR , Dr. M. SUMATHI , Dr S. N. SIVANANDAM |  
|  			
									
Abstract: | 
 			
									
In the recent years, the crude oil is one of the most important commodities 
worldwide. This paper discusses the prediction of crude oil using artificial 
neural networks techniques. The research data used in this study is from 1st Jan 
2000- 31st April 2014. Normally, Crude oil is related with other commodities. 
Hence, in this study, the commodities like historical data’s of gold prices, 
Standard & Poor’s 500 stock index (S & P 500) index and foreign exchange rate 
are considered as inputs for the network. A radial basis function is better than 
the back propagation network in terms of classification and learning speed. When 
creating a radial basis functions, the factors like number of radial basis 
neurons, radial layer’s spread constant are taken into an account. The spread 
constant is determined using a bio inspired particle swarm optimization 
algorithm. A hybrid Radial Basis Function is proposed for forecasting the crude 
oil prices. The accuracy measures like Mean Square Error, Mean Absolute Error, 
Sum Square Error and Root Mean Square Error are used to access the performance. 
From the results, it is clear that hybrid radial basis function outperforms the 
other models.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Crude oil prices, Standard & Poor’s 500 Stock Index, hybrid radial basis 
function, Particle Swarm Optimization. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
VIDEO OBJECT SEGMENTATION APPLYING SPECTRAL ANALYSIS AND BACKGROUND SUBTRACTION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
RURI SUKO BASUKI, MOCH. ARIEF SOELEMAN, RICARDUS ANGGI PRAMUNENDAR, AURIA 
FARANTIKA YOGANANTI, CATUR SUPRIYANTO |  
|  			
									
Abstract: | 
 			
									
This study proposes an approach to segment video object semi-automatically. The 
issue of this study is the lack of semantic information on video object 
segmentation. Manual segmentation by human is not effective if the video has a 
large size. For initialization, we use scribble-based technique to differentiate 
between foreground and background. After the separation object from the 
background, the subtraction operation between the current and subsequent frame 
was performed by applying a background subtraction algorithm. Spectral analysis 
and background subtraction for video object segmentation becomes effective. The 
evaluation of this study is measured by Mean Square Error. Experiment results 
demonstrate the high precision of object segmentation. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Segmentation, Alpha Matting, Background Subtraction |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
HOTELLING’S T^2 CHARTS USING WINSORIZED MODIFIED ONE STEP M-ESTIMATOR FOR 
INDIVIDUAL NON NORMAL DATA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
F. S. HADDAD, J. L. ALFARO, MUTASEM K. ALSMADI |  
|  			
									
Abstract: | 
 			
									
Hotelling T2 control chart is one of the most important chart used to 
statistical quality control in the manufacture processes. However, this chart is 
sensitive to the non normal data and therefore, must be modified to improve its 
behavior with this kind of data. In this paper, we propose two new alternatives 
charts based on change the usual mean and covariance estimator by robust 
location and scale matrix. Thus, we use the winsorized mean and winsorized 
covariance matrix, respectively. Concretely, the robust scale estimators with 
highest breakdown points namely MADn and Sn are used to suit the criterion in 
the modified one step M-estimator (MOM). The control limits for these robust 
charts are calculated based on simulated data and the assessment of these new 
alternatives charts is based on the false alarm and the probability of detection 
out of control observation with non normal data. The results show in general 
that the performance of the alternatives robust Hotelling’s T^2charts are better 
than the performance of the traditional Hotelling’s〖 T〗^2chart.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Non Normal Data (NND); Winsorized MOM (WM); Robust Estimators (RE); Hotelling’s〖 
T〗^2 Control Chart (HCC). |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
REQUIREMENTS AND CHALLENGES IN BODY SENSOR NETWORKS: A SURVEY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
VAHID AYATOLLAHITAFTI, MD ASRI NGADI, AND JOHAN BIN MOHAMAD SHARIF |  
|  			
									
Abstract: | 
 			
									
Recent advances in wireless sensor networks have provided many opportunities for 
researchers on wireless networks around the body such as Body Area Network (BAN) 
or Body Sensor Network (BSN). A BSN allows health monitoring of patients whereby 
caregivers receive feedback from them without disrupting their normal 
activities. This monitoring requires the employment of the low-power sensor 
nodes implanted in or worn on the human body. This paper presents a discussion 
of BSNs, communication standards and their characteristics. Energy, quality of 
service and routing are among the crucial requirements and challenges facing 
BSNs which are studied. The paper also provides an investigation of many 
existing solutions and technologies for the challenges and requirements at 
physical, MAC, network, transport, and application layers. Finally, some open 
research issues and challenges for each layer are discussed to be addressed in 
further research.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
BSN, energy, QoS, routing. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CAT SWARM OPTIMIZATION TO SOLVE FLOW SHOP SCHEDULING PROBLEM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDELHAMID BOUZIDI, MOHAMMED ESSAID RIFFI |  
|  			
									
Abstract: | 
 			
									
Flow shop problem is a NP-hard combinatorial optimization problem. Its 
application appears in logistic, industrial and other fields. It aims to find 
the minimal total time execution called makespan. This research paper propose a 
novel adaptation never used before to solve this problem, by using computational 
intelligence based on cats behavior, called Cat Swarm Optimization, which is 
based on two sub modes, the seeking mode when the cat is at rest, and the 
tracing mode when the cat is at hunt. These two modes are combined by the 
mixture ratio. The operations, operators will be defined and adapted to solve 
this problem. To prove the performance of this adaptation, some real instances 
of OR-Library are used. The obtained results are compared with the best-known 
solution found by others methods. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Flow Shop, Scheduling, Makespan, Computational Intelligent, Cat Swarm 
Optimization. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A CLUSTERING ALGORITHM BASED ON NODES TRUST |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MOHAMED DYABI , ABDELMAJID HAJAMI , HAKIM ALLALI |  
|  			
									
Abstract: | 
 			
									
A mobile ad hoc network (MANET) is a wireless network without the support of any 
fixed infrastructure. Security is one of the main challenges in ad hoc network 
due to dynamic topology and mobility of nodes. Clustering is one of the main 
techniques that are used to increase the scalability of MANETs, but without any 
security considerations clustering is prone to various security attacks. Some 
cryptographic-based schemes have been proposed to secure the clustering process, 
but they are unable to handle the internal attacks. To defend against insider 
malicious nodes, trust and reputation management systems should be used. This 
work proposes a trust based clustering algorithm which forms a cluster around 
the trustworthy nodes. The Criteria used to select the CH is the trust value of 
a node. Our algorithm gives major improvements regarding the number and the 
trust value of elected cluster heads. Analysis and simulation results are used 
to show the performance of our algorithm, compared with other clustering 
algorithms in literature. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Ad Hoc , Trust, Clustering, Olsr |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
RELIABILITY AND VALIDITY OF A QUESTIONNAIRE TO EVALUATE DIABETIC PATIENTS' 
INTENTION TO ADOPT HEALTH INFORMATION TECHNOLOGY: A PILOT STUDY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
BARROON ISMA'EEL AHMAD, ABD RAHMAN AHLAN |  
|  			
									
Abstract: | 
 			
									
All the efforts put in developing questionnaire by a researcher are in vain if 
it measures what is not intended to measure. A questionnaire can only be useful 
if it produces meaningful and trustworthy data. The aim of this study was to 
develop and assess the validity and reliability of an instrument to measure the 
perception and attitude of diabetic patients toward acceptance of Health 
Information Technology (HIT). An extended Technology Acceptance Model (TAM) 
based questionnaire was distributed to a sample of 80 diabetic patients. The 
content validity was assessed by experts, while Exploratory Factor Analysis (EFA) 
was used to measure the construct validity. Cronbach's alpha was used to measure 
the internal consistency of the questionnaire. The response rate of the 
questionnaire was 93%. In the exploratory factor analysis, seven factors that 
correspond with the constructs were extracted using principal component 
analysis. The factors examined using varimax rotations explained 72.15%, 74.21%, 
72.67%, 80.84%, 72.72%, 74.22% and 74.84% variance in the respective constructs. 
Construct validity was measured using convergent and discriminant validity. Most 
of the variables load in the range of 0.60 - 0.98, which shows a good convergent 
validity, and the significant loading of the variables on one factor without 
cross-loadings is an evidence of the discriminant validity. Similarly, the 
average Cronbach's alpha coefficient of the seven extracted components was 0.822 
indicating a good internal consistency or reliability. This study presents the 
result of reliability and validity of the extended TAM based instrument for 
assessing the perception and attitude of diabetic patients toward acceptance of 
HIT. The findings of this study showed the feasibility of using the 
questionnaire, since it has high reliability and validity. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Health Information Technology (HIT), Technology Acceptance Model (TAM), 
Developing Countries, Diabetic Patients, Questionnaire |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EFFECTIVE APPROACH OF IMAGE RETRIEVAL USING SCALABLE IMAGE ENCRYPTION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
K.SRILATHA |  
|  			
									
Abstract: | 
 			
									
The encryption has a comprehensive scheme for providing confidentiality of 
security such as privacy, reliability and authentication of information. This 
paper proposes a unique scheme of scalable coding of transmitting and receiving 
images in an extreme protected way using Absolute Moment block truncation coding 
(AMBTC). The gray level pixel of image has compressed by AMBTC then encrypted 
image is acquired by adding compressed AMBTC pixel value that has masked by a 
modulo-256 addition with PRNG (Pseudo Random Number Generator) that has derived 
from a secret key Subsequently encrypted image data into a down sampled sub 
image and some data groups using a multiple-resolution creation, an encoder 
gives the quantized sub image and the Harr coefficients of all data set to 
reduce the data. Then, the data of quantized sub image and coefficients are held 
as a set of bit streams transmitted. At the receiver side, although a sub image 
is decrypted to give the rough information of the original image, the quantized 
coefficients are used to reconstruct the original image with an iterative 
procedure. Due to the hierarchical mechanism, the original image with higher 
resolution reconstructed by decompressing the decrypted pixel value using AMBTC.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Scalable Coding, Harr Transform, Image Compression, Image Encryption/Decryption, 
Absolute Moment Block Truncation Coding (AMBTC)  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MODIFICATION OF STRAPDOWN INERTIAL NAVIGATION SYSTEM ALGORITHM FOR ROCKET FLIGHT 
TEST |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 ROMI WIRYADINATA, OYAS WAHYUNGGORO, WAHYU WIDADA, SUNARNO, M. IMAN SANTOSO |  
|  			
									
Abstract: | 
 			
									
Specification, type, and IMU utilization on the INS algorithm influences rocket 
performance. Improvement could be done by hardware errors minimization that 
optimize algorithm and matrix transformation on the processor. Pitch angle (θ) 
on the Euler transform matrix have singularity on 90 degree. This paper modifies 
INS algorithm to solve that singularity. A novel control of rocket flight test 
with a modified algorithm which combines INS Euler and Quaternion method has 
been conducted. The modifications of INS algorithm proves that the proposed 
method can be used for flight test rocket that has a high-speed and rapid data 
alteration. |  
|  			
									
  										
			
Keywords:  | 
 			
									
INS Algorithm, Strapdown IMU, Euler, Guided Rocket |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EVALUATE DYNAMIC KMEANS ALGORITHM FOR AUTOMATICALLY SEGMENTED DIFFERENT BREAST 
REGIONS IN MAMMOGRAM BASED ON DENSITY BY USING SEED REGION GROWING TECHNIQUE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDELALI ELMOUFIDI, KHALID EL FAHSSI, SAID JAI ANDALOUSSI, ABDERRAHIM SEKKAKI |  
|  			
									
Abstract: | 
 			
									
This paper presents a method for segment and detects the boundary of different 
breast tissue regions in mammograms by using dynamic Kmeans clustering algorithm 
after evaluate it by using Seed Based Region Growing (SBRG) techniques. Firstly, 
the K-means clustering is applied for dynamically and automatically divides 
mammogram into homogeneous regions according to the intensity of the pixel. From 
where automatically selected of seeds point and determined the threshold value 
for each region. Secondly, the region growing algorithm is applied with 
previously generated seeds point and threshold values as input parameter of SBRG. 
The main goal of this study is to evaluate the dynamic k-means clustering 
algorithm in the detection and segmentation of different breast tissue regions, 
which correspond to the density in mammograms. Segmentation of the mammogram 
into different mammographic densities is useful for risk assessment and 
qualitative or/and quantitative evaluation of density changes. In order to 
evaluate our proposed method, we used the well-known Mammographic Image Analysis 
Society (MIAS) database. The obtained qualitative and quantitative results 
demonstrate the efficiency of this method and confirm the possibility of its use 
in improving the computer-aided detection / diagnosis. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Breast Density; Breast Segmentation; Medical Image Processing; Kmeans Clustering 
Algorithm; Region Growing Technique |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ARTIFICIAL DNA HYBRIDIZATION TO PULSE-WIDTH MODULATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
JUAN C. HERRERA-LOZADA, RODRIGO CADENA-MARTINEZ, JESUS A. ALVAREZ-CEDILLO, 
MAURICIO OLGUIN-CARBAJAL, MIGUEL HERNANDEZ-BOLAÑOS, ISRAEL RIVERA-ZARATE, JACOBO 
SANDOVAL-GUTIERREZ |  
|  			
									
Abstract: | 
 			
									
The analysis and design of a Pulse-width modulation (PWM) embedded unit as an 
alternative to convert digital signals to analog signals is presented herein, 
extrapolating the biological principle of DNA hybridization. The biological 
hybridization process is a binding event between two complementary DNA single 
strands that leads to the formation of a double-stranded helix. The proposed 
technique to detect the hybridization is based on direct comparison of data, 
allowing a high degree of parallelism in the Bio-inspired Architecture, it was 
specially designed to regulate the light intensity of LED lamps as a home 
automation application. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Five Pulse-widht Modulation, Artificial DNA Hybridization, LED Lamp, 
Bio-inspired Architecture, Digital- Analogic Converter |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
 DESIGNING A DISTRIBUTION NETWORK USING A TWO LEVEL CAPACITY LOCATION 
ALLOCATION PROBLEM: FORMULATION AND EFFICIENT GENETIC ALGORITHM RESOLUTION WITH 
AN APPLICATION TO A MOROCCAN RETAIL COMPANY |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
M.HLYAL, A.AIT BASSOU, A.SOULHI, J. EL ALAMI, N. EL ALAMI |  
|  			
									
Abstract: | 
 			
									
Distribution network design as a strategic decision has long-term effect on 
tactical and operational supply chain management. In this research, a supply 
chain design problem based on a two level capacity location allocation problem (TLCLAP) 
is presented. A product must be transported from a set of seaport to meet stores 
demands, passing out by intermediate warehouses. The objective is to locate the 
warehouses, allocate warehouse to seaport in the first distribution network 
level and allocate stores to warehouse for in the second one. The finality is to 
minimize the global cost of the underlying two-level costs thereby satisfying 
store demand and warehouse capacity constraints. In this study, a new 
mathematical model for the two-level capacitated facility location allocation, 
with restrictions in the real-world environments of logistics distribution is 
given. In order to solve the model, an efficient Genetic Algorithm (GA) for 
TLCLAP in distribution logistic network has been developed for optimal 
distribution network design. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Distribution network, Genetic Algorithm, Location-allocation decisions, 
Logistics network, Mathematical modeling. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
USING COMBINATION METHODS FOR AUTOMATIC RECOGNITION OF WORDS IN ARABIC |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AHLAM MAQQOR, AKRAM HALLI, KHALID SATORI, HAMID TAIRI |  
|  			
									
Abstract: | 
 			
									
In this paper, we propose an analytical approach for an off-line Arabic 
handwritten recognition system. The system is based on combining methods of 
decision fusion approach. The proposed approach introduces a methodology using 
the HMM-Toolkit (HTK) for a rapid implementation of our designed recognition 
system. First, a pre-processing phase is done toprepare the image of the 
introduced text (eliminate or reduce noise, thresholding, screening, detection 
of the inclination angle and the segmentation of the image of the text line). 
The obtained images are then used for features extraction with Sliding window 
technique. These features are modeled separately using Hidden Markov Models 
classifiers. The combination of the multiple HMMs classifiers was applied by 
using the different methods of decision fusion approach. The proposed system is 
evaluated using the IFN/ENIT database. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Hmms, Sliding Window Technique, Hough Transform, Horizontal Projection, Decision 
Fusion Approach, HMM Toolkit (HTK), VH2D. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  February 2015 -- Vol. 72. No. 2 -- 2015  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
 |     	 
 |