Journal of Computing and Information Technology (J Comput Inform Tech)

Publisher: Sveučilište u Zagrebu. University Computing Centre

Journal description

The aim of the international Journal of Computing and Information Technology (CIT) is to present original scientific and professional papers, as well as review articles and surveys, covering the theory, practice and methodology of computer science and engineering, modelling and simulation, and information systems.

Current impact factor: 0.00

Impact Factor Rankings

Additional details

5-year impact 0.00
Cited half-life 0.00
Immediacy index 0.00
Eigenfactor 0.00
Article influence 0.00
Website Journal of Computing and Information Technology website
Other titles Journal of computing and information technology (online), CIT
ISSN 1330-1136
OCLC 64201834
Material type Periodical, Internet resource
Document type Internet Resource, Journal / Magazine / Newspaper

Publications in this journal

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Many statistical and MOLAP applications use multidimensional arrays as the basic data structure to allow the efficient and convenient storage and retrieval of large volumes of business data for decision making. Allocation of data or data compression is a key performance factor for this purpose because performance strongly depends on the amount of storage required and availability of memory. This holds especially for data warehousing environments in which huge amounts of data have to be dealt with. The most evident consequence of data compression is that it reduces storage cost by packing more logical data per unit of physical capacity. And improved performance is a net outcome because less physical data need to be retrieved during scan-oriented queries. In this paper, an efficient data compression technique is proposed based on the notion of extendible array. The main idea of the scheme is to compress each of the segments of the extendible array using the position information only. We compare the proposed scheme for different performance issues with prominent compression schemes
    Preview · Article · Jun 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Congestion control and energy consumption in Wireless Multimedia Sensor Network is a new research subject which has been ushered in through the introduction of multimedia sensor nodes that are capable of transmitting large volume of high bit rate heterogeneous multimedia data. Most of the existing congestion control algorithms for Wireless Sensor Networks do not discuss the impact of security attacks by the malicious nodes in network congestion. Sensor nodes are prone to failure and malicious nodes aggravate congestion by sending fake messages. Hence, isolation of malicious nodes from data routing path reduces congestion significantly. Considering that, we have proposed a new Trust Integrated Congestion Aware Energy Efficient Routing algorithm, in which malicious nodes are identified using the concept of trust. The parameter Node Potential is computed, on the basis of the trust value, congestion status, residual energy and the distance of the node from the base station, using Fuzzy Logic Controller. The source node selects the node with the highest potential in its one hop radio range for data transmission which is light weight as well as energy efficient. Finally, merits of the proposed scheme are discussed by comparing them with existing protocols and the study exhibits 25% improvements in network performance.
    Preview · Article · Jun 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Capacitated Vehicle Routing Problem (CVRP) is among transportation problems that are of the foremost concerns in logistics. Ensuring an effective product distribution over a large distribution network while reducing the required costs represents the scope of the present work. A synergic and interactive environment of parallel meta-heuristics is developed using a generalized island model to deal with large instances of CVRP. In the proposed model, cooperative meta-heuristics, namely genetic algorithms (GA) and ant colony optimization algorithms (ACO), are organized into archipelagoes. They communicate synchronously, globally and locally by exchanging solutions. In order to handle properly the migration of solutions, either between archipelagoes or between islands within the same archipelago, appropriate selection and replacement policies are adopted. Furthermore, the proposed approach uses other new features including a new binary solution representation and different optimization process (i.e GA, ACO) on each island. To prove the efficiency of the present work, tests over the well-known set of benchmarks, comparative studies and experimental analysis have been conducted.
    Preview · Article · Jun 2015 · Journal of Computing and Information Technology
  • Source

    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source

    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper attempts to mine the hidden individual behavior pattern from the raw users' trajectory data. Based on DBSCAN, a novel spatio-temporal data clustering algorithm named Speed-based Clustering Algorithm was put forward to find slow-speed subtrajectories (i.e., stops) of the single trajectory that the user stopped for a longer time. The algorithm used maximal speed and minimal stopping time to compute the stops and introduced the quantile function to estimate the value of the parameter, which showed more effectively and accurately than DBSCAN and certain improved DBSCAN algorithms in the experimental results. In addition, after the stops are connected with POIs that have the characteristic of an information presentation, the paper designed a POIBehavior Mapping Table to analyze the user's activities according to the stopping time and visiting frequency, on the basis of which the user's daily regular behavior pattern can be mined from the history trajectories. In the end, LBS operators are able to provide intelligent and personalized services so as to achieve precise marketing in terms of the characteristics of the individual behavior.
    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source

    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Relay selection has been regarded as an effective method to improve the performance of cooperative communication system. However, frequent operation of relay selection can bring enormous control message overhead and thereby decrease the performance of cooperative communication. To reduce the relay selection frequency, in this paper, we propose a relay selection scheme to choose the best relay with considering successive packets transmission. In this scheme, according to the length of data packet, data transmission rate and the estimated channel state information (CSI), the best relay is selected to maximize the number of successive packets transmission under the condition that the given symbol-error-rate (SER) is kept. Finally, numerical results show that the proposed relay selection scheme can support the operation of successive packets transmission in cooperative wireless networks and that the maximum number of successive packets transmission is affected by the different network parameters, i.e., data transmission rate, packet length and Doppler frequency at one relay node.
    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The construction of reliable and stable routes in a mobile ad hoc network is one of the primary research issues in equipping each device to continuously maintain the information required to properly route traffic. Mobility of nodes often leads to link failures and hence requires route reconstruction to resume the communication between the nodes. The stability factor of a route can reduce the number of times the route is changed or reconstructed. This paper presents a novel idea for discovering a stable set of routes using the metrics from multiple layers rather than depending on network layer along with a finite set of parameters to qualify a link or connecting to a node. The link stability factor and link received signal strength are considered as the main metrics to qualify the stability of a route, derived from the physical and data link layer based on bit or packet error rate, retrieved from the soft output decoder. The simulation results based on the analysis of the proposed algorithm prove to be more efficient in terms of discovering stable routes, reducing frequent reconstruction of routes and hence improving the overall performance of the network.
    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: As has been explained in the paper "A Survey of Communications and Collaborative Web Technologies" in this special issue the web started as a more or less one-way information system, allowing engineers at CERN to share new results in physics world-wide easily. As it developed, it becamemore and more a two-way (or more precisely a multi-way) communication tool, allowing to collaboratively work in many ways. This has, as it has been described in the aforementioned paper, not just changed how information is created and provided easy ways of communication, but has also allowed the growth of social networks as first tools to tie together the power of brains, changing how we work, think, do research, form new circles of people we are interested in. This on its own would have been a major change in how society works, yet it turned out soon that the technologies available would allow to set up completely new business models, and threaten some existing ones. Among the hundreds of million applications found on the web today, many set up to make money, or at least pay for themselves by providing excellent ways of advertisements. There is no person who could know all the applications available on the web, and there is no way to even list a tiny percentage of them. However, what we are trying in this paper is to classify applications and discuss their commercial or societal impact.
    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The traditional information retrieval technologies are based on keywords, and therefore provide limited capabilities to capture the conceptualizations associated with user needs and contents. As a new technology of information retrieval, semantic retrieval can retrieve information resource fully and precisely based on the knowledge understanding and knowledge reasoning. Ontology, which can well represent and reason about the domain knowledge, is proved to be very useful in the semantic retrieval. On this basis, in this paper, we propose a complete ontology-based semantic retrieval approach and framework for education management system. Firstly, we present some rules for constructing domain ontology from the education management system; Then, a semantic annotation method of the constructed ontology is given; Further, the ontologybased semantic retrieval algorithmis proposed; Finally, a complete framework is developed and some experiments are done. Conducted experiments show that our semantic retrieval model obtained comparable and better performance results than the traditional information retrieval technology for education management system.
    Preview · Article · Jan 2015 · Journal of Computing and Information Technology
  • Source

    Preview · Article · Jan 2015 · Journal of Computing and Information Technology