Journal of Research and Practice in Information Technology (J RES PRACT INF TECH )

Publisher: Australian Computer Society, Australian Computer Society Inc


The Journal of Research and Practice in Information Technology is an international quality, peer reviewed journal covering innovative research and practice in Information Technology. Until 2000 it was titled the Australian Computer Journal, and has been published by the Australian Computer Society continuously since November 1967. The Journal has a dual emphasis and contains articles that are of interest both to practicing information technology professionals and to university and industry researchers. In particular, it encourages papers that report on activities that have successfully connected fundamental and applied research with practical application. The journal thus publishes papers relating to both emerging research and to professional practice. The Journal of Research and Practice in Information Technology (the JRPIT) encourages submission of innovative and original articles in all areas of Information Technology including Computer Science, Software Engineering, Information Systems, Computer Systems and Information Engineering and Telecommunications.

  • Impact factor
    Show impact factor history
    Impact factor
  • 5-year impact
  • Cited half-life
  • Immediacy index
  • Eigenfactor
  • Article influence
  • Website
    Journal of Research and Practice in Information Technology website
  • Other titles
    Research and practice in information technology
  • ISSN
  • OCLC
  • Material type
    Periodical, Internet resource
  • Document type
    Journal / Magazine / Newspaper, Internet Resource

Publisher details

Australian Computer Society Inc

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Creative Commons Attribution-NonCommercial-NoDerivs 2.5 License
    • Publisher copyright and source must be acknowledged
  • Classification
    ​ green

Publications in this journal

  • Journal of Research and Practice in Information Technology 01/2013;
  • [Show abstract] [Hide abstract]
    ABSTRACT: Large amount of water in irrigated agriculture is wasted due to poor water management practices. To improve water management in irrigated areas, models for estimation of future water requirements are needed. In this study, we prepare a data set containing information on suitable attributes. The data are obtained from three different sources namely water delivery statements, meteorological data, and remote sensing images. In order to make the prepared data set useful for demand forecasting and pattern extraction we pre-process the dataset using a novel approach based on a combination of irrigation and data mining knowledge. We then evaluate the effectiveness of five different data mining methods and a traditional method based on Evapotranspiration (ETc), in water requirement prediction. Our experimental results indicate the usefulness of the proposed data pre-processing technique and the effectiveness of data mining methods (such as SysFor). Among the six methods we used, SysFor produces the best prediction with 97.5% accuracy. Keywords: Irrigation water demand forecasting, Data mining, Decision tree, ANN, Decision Forest and Water management.
    Journal of Research and Practice in Information Technology 01/2013;
  • [Show abstract] [Hide abstract]
    ABSTRACT: Systems that facilitate automation in the evaluation of learning tasks are usually domain dependent. Furthermore, they usually do not allow users to specify new tasks which are described by the users themselves. Therefore, the development of activities in which work is done in the higher levels of Bloom’s Taxonomy is limited. In this article, we introduce a proposal made up by a series of guidelines to develop educational software that allow users to specify their own learning activities, to add alternative solutions and to receive an evaluation from the system so that they are guided in their learning process. This proposal is based on the use of formal languages to specify activities and their solutions, and also on the use of language processors for such languages, so that it is possible to build a computable model that solves the activities and analyzes the solutions. The proposal results from the lessons learned from real experience with the Proletool application, a tool designed for teaching syntax analysis techniques in the subject Language Processors.
    Journal of Research and Practice in Information Technology 08/2012;
  • [Show abstract] [Hide abstract]
    ABSTRACT: Educational software should be designed by development teams with actual teachers. Thus, implementations of this type of software would be able to cover most teaching requirements and to adjust to different teaching principles. Moreover, some more work should be done to abstract common patterns in educational software so that software engineering methods can be adapted to suit educational needs. We propose an abstraction of system users by defining a role hierarchy which fits web-based collaborative educational systems. This proposal, which can significantly improve software adaptability and usability, has been used to develop Tutor, a web-based educational software system to promote a blended learning environment in Higher Education.
    Journal of Research and Practice in Information Technology 05/2012; 44(2):223-242.
  • Journal of Research and Practice in Information Technology 01/2012; 44(2):151.
  • Journal of Research and Practice in Information Technology 01/2012; 44(1):17-41.
  • [Show abstract] [Hide abstract]
    ABSTRACT: As the Web is increasingly used not only to �nd answers to speci�c information needs but also to carry out various tasks by the means of Web services, enhancing the capabilities of current Web search engines with e�ective and e�cient techniques for Web service discov- ery becomes an important issue. In this paper, we propose a semantic and QoS-aware broker, namely SemQoS, that enables users to discover Web services based on both functional and non-functional criteria. The SemQoS broker relies on a semantic canonical description meta-model that allows describing services in terms of functional and non-functional properties. First, SemQoS discovery approach selects a set of services matching a discovery query with di�erent degrees of approximate match- ing. The approach relies on deductive reasoning to relax the discovery query's constraints based on semantic service descriptions and domain knowledge. As second step, the SemQoS broker re�nes the set of selected services to generate a set of service clusters based on their QoS attributes values. This step allows to prune the search space of a discovery query and determine the best sub-set (cluster) of Web services satisfying user's constraints. We evaluate our approach experimentally using a real Web services dataset.
    Journal of Research and Practice in Information Technology 01/2012; 44(4):323-335.
  • Source
    Journal of Research and Practice in Information Technology 01/2011; 43:23-40.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Software systems have become highly distributed and complex involving independent components working together towards achieving systems' goals. Meanwhile, security attacks against such systems have increased to become more sophisticated and difficult to detect and withstand. In this paper, we argue that the collaboration of a system's constituent components is a better way to detect and withstand this new generation of security attacks including multi-phased distributed attacks and various flooding distributed denial of service attacks. In order to achieve the collaborative intrusion detection and defenses in distributed environments, the system and its constituent components should have a common mechanism to share the collected knowledge about security attacks and counter measures. Thus, we develop and apply security ontologies that will serve as the common vocabulary that is understandable for both humans and software agents to share and analyse the received information. In particular, several security ontologies are introduced including the security attack ontology, the defence ontology, the asset-vulnerability ontology, the algorithm-standard ontology, and the security function ontology. In conclusion, we demonstrate the applicability of our approach with a case study illustrating the Mitnick attack.
    Journal of Research and Practice in Information Technology 03/2010; 42.

Related Journals