Journal of Computing and Information Technology (J Comput Inform Tech )

Publisher: Sveučilište u Zagrebu. University Computing Centre

Journal description

The aim of the international Journal of Computing and Information Technology (CIT) is to present original scientific and professional papers, as well as review articles and surveys, covering the theory, practice and methodology of computer science and engineering, modelling and simulation, and information systems.

Current impact factor: 0.00

Impact Factor Rankings

Additional details

5-year impact 0.00
Cited half-life 0.00
Immediacy index 0.00
Eigenfactor 0.00
Article influence 0.00
Website Journal of Computing and Information Technology website
Other titles Journal of computing and information technology (online), CIT
ISSN 1330-1136
OCLC 64201834
Material type Periodical, Internet resource
Document type Internet Resource, Journal / Magazine / Newspaper

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we present a parallel hyper-heuristic approach for two-dimensional rectangular strip-packing problems (2DSP). This is an island model with a special master-slave structure, and in all of the islands, we run a memetic algorithm-based hyper-heuristic (HH). The basic technique of this HH is a memory-based evolutionary technique, the “extended virtual loser” (EVL). The memory-based technique memorises the past events, e.g., past successes of the evolutionary process or bad values of the variables; thus, we can influence the operations of the evolutionary algorithms using this memory. The EVL technique learns the bad values of the variables based on the worst solutions of the population and computes probabilities to control the mutation steps. With the help of the EVL technique, we can use a mutation-omitting recombination operator and obtain a learning mechanism for the selection of heuristics. In the HH, the selection of the low-level heuristics is modified with mutations based on the EVL technique using a local search. The island model achieved good performance. The test instances show that the proposed algorithm is efficient for the rectangular strip-packing problem.
    Journal of Computing and Information Technology 12/2014; 22(4):251-266.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The paper offers an experience-based viewpoint on two key phases of the development of an Information and Communication Technologies (ICTs)-based system: the defini-tion of requirements and the identification of related criteria and methodology for its evaluation. In doing so, it refers to the unique context of the i-Treasures EU project, which deals with the development of an innovative integrated platform to support the learning and transmission of Intangible Cultural Heritage (ICH). The i-Treasures inte-grated platform is conceived to support both traditional learning approaches and innova-tive and active learning processes, based on extensive use of sensor-technologies. In this light, during the development process, particular attention has been devoted to the defi-nition of requirements with specific reference to sensor- mediated Human Computer In-teraction (HCI) issues and the evaluation process was designed accordingly, in coher-ence with the specific advanced features of the integrated platform. The paper offers a view of the complexity of the design of ICT-based tools supporting the preservation and transmission of ICH and also provides an insight (and this could have a broader impact) into the methodology adopted to harmonize the requirements and the evaluation phases which are key pillars for the construction of any educationally effective ICT-based learning system.
    Journal of Computing and Information Technology 01/2014; 22(4):277-292.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Journal Content Search Search Scope Browse By Issue By Author By Title Other Journals Information For Readers For Authors For Librarians Journal Help Home About Login Register Search Current Archives Announcements Home > Vol 22, No 3 (2014) > Seddari Using of DEVS and MAS Tools for Modeling and Simulation of an Industrial Steam Generator Noureddine Seddari, Mohammed Redjimi, Sofiane Boukelkoul Abstract Complex systems are made of many elementary components in interaction. To model such systems, it is generally more convenient to decompose them into subsystems that are simpler to handle. This new division is to be made in a methodical way, by identification and complete definition of the various structures, actions and interactions of those sub-systems. In this work, the decomposition of the overall system into sub-systems is based primarily on the use of the Discrete EVent System Specification (DEVS) formalism. The obtained atomic and coupled models are formally verified and validated. Then, we use the Multi-agent Development KIT (MAD-KIT) Multi Agent Systems (MAS) operational tools to implement an industrial simulator. This simulator is used by beginner operators in the petroleum field to ameliorate the process of training and learning without stopping the real processes. The advantage of this approach is its adaptability as well as its possibilities of extension (addition of new functionalities). Moreover, the decomposition into sub-systems reduces significantly the complexity of the elements being implemented and therefore, allows a greatmodularity and a better legibility to the system. Our work is realised in collaboration with the production department of natural gas liquefaction (GL1/K Skikda), one of the principal hydrocarbons poles from SONATRACH complex in Algeria.
    Journal of Computing and Information Technology 01/2014; 22(3):171–189.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Recent literature reports the growing interests in data analysis using FormalConceptAnalysis (FCA), in which data is represented in the form of object and attribute relations. FCA analyzes and then subsequently visualizes the data based on duality called Galois connection. Attribute exploration is a knowledge acquisition process in FCA, which interactively determines the implications holding between the attributes. The objective of this paper is to demonstrate the attribute exploration to understand the dependencies among the attributes in the data. While performing this process, we add domain experts’ knowledge as background knowledge. We demonstrate the method through experiments on two real world healthcare datasets. The results show that the knowledge acquired through exploration process coupled with domain expert knowledge has better classification accuracy.
    Journal of Computing and Information Technology 01/2013; 21(2).
  • [Show abstract] [Hide abstract]
    ABSTRACT: Combining transmission of both voice and data on the same network infrastructure was a challenging task which required an advanced network architecture which needs to be scalable and simple. This resulted in a new approach for Ethernet systems where Differentiated Service (Diff-Serv) was introduced to respond to this need and in addition, improve Quality of service (QoS) as a way of providing class of services for different end users. Therefore, optimizing the use of the network available bandwidth is a primgoal of this work which is focused on investigating the impact of implementing a fuzzy logic controller of the crucial factors affecting the performance of the network. These external or internal factors will be controlled by the developed Fuzzy Logic system that will act as bandwidth broker (BB) to provide each user with his optimal Code Point (CP). Within the scope of this work, the CP will not only involve packet loss rate as an external factor to check the network congestion, but in addition, it will consider the internal factors; which are a combination of both service-level agreement (SLA) and the type of user application used, as external factors as well. The Code Point will be marked in the transmitted packets, where it will be possible to the router to check it, and will treat it as per the agreement between the user and the administrator.
    Journal of Computing and Information Technology 01/2013; 21(1):1-11.
  • Journal of Computing and Information Technology 01/2013; 21:1-11.