1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jait@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

Guest Editorial——Special Issue on Ubiquitous Computing

Neeraj Kumar Nehra1 and Pranay Chaudhuri2
1. School of CSE, SMVD University, Katra (J&K), India
2. Department of CSE, JUIT, Waknaghat (H.P.), India
    Ubiquitous computing is an important and fast growing research area but the development of ubiquitous computing is still in its infancy, although a few ubiquitous services have been developed and deployed in our daily lives, such as mobile audio/video streaming, mobile e-learning, and remote video surveillance. This fast growing field will emerge as a new research field in near future having interaction with the outer world with the development of numerous interesting ubiquitous applications.
   The main aim of this special issue was to collect original research papers that present recent advances and future directions in Ubiquitous environment from theoretical as well as practical point of view. This special issue is a collection of research papers from all aspects of this new emerging field e.g. design, implementation and future aspects as well as challenges and constraints in this field. This special issue contains a diverse collection of high-quality papers authored by eminent academicians and researchers in the field.
   In the first paper, Kamal et. al. propose a Location dependent Connectivity guarantee Key management scheme for heterogeneous wireless sensor networks (LOCK) without using deployment knowledge. A pair-wise, group wise and cluster key is generated efficiently for participating nodes. LOCK provides dynamicity by two ways; one by not completely depending upon pre deployed information and other by not completely depending upon location. Scheme is proved to support largest possible network using smallest storage overhead as compared to existing key management schemes.
   In the second paper, Rahat et. al. have developed a multi-user location-awareness system by following a user-centred design and evaluation approach. The authors discuss the development of the system that allows users to share informative feedback about their current geographical location. Also the proposed system can be used by various users, for example family members, relatives or a group of friends, in order to share the information related to their locations and to interact with each other.
   In the next paper, Sanjay et. al., propose to get the knowledge about the software systems in software reengineering. In the proposed approach, the mapping of domain to the code using the information retrieval techniques and linguistic information, such as identifier names and comments in source code has been used. Moreover, concept of Semantic Clustering has been introduced in this paper and an algorithm has been provided to group source artifacts based on how the synonymy and polysemy is related. Based on semantic similarity automatic labeling of the program code is done after detecting the clusters, and is visually explore in 3-Dimension for discrete characterization.
   In the next paper, Manpreet et al. propose resource allocation on grid using ant colony algorithm. The major objective of resource allocation in grid is effective scheduling of tasks and in turn the reduction of execution time. For efficient resource allocation an Ant colony algorithm is proposed, which is one of the heuristic algorithm suits well for the allocation and scheduling in grid environment.
   In the next paper, author proposes a channel allocation algorithm for hot spot cells in wireless networks. The proposed scheme presents a new hybrid channel allocation algorithm in which the base station sends a multi-level hotspot notification to the central pool located at Mobile Switching Station (MSC) on each channel request that cannot be satisfied locally at the base station. This notification will request more than one channel be assigned to the requesting cell, proportional to the current hot-spot level of the cell. When a call using such a borrowed channel terminates, the cell may retain the channel depending upon its current hot-spot level.
   In the next paper, Meenu Kumari et. al. propose a JPEG Compression Steganography & Cryptography using Image- Adaptation Technique. Authors have designed a system that allows an average user to transfer text messages by hiding them in a digital image file using the local characteristics within an image. This paper is a combination of steganography and encryption algorithms, which provides a strong backbone for its security. The proposed system not only hides large volume of data within an image, but also limits the perceivable distortion that might occur in an image while processing it.
   In the next paper, Shalini et. al. provides an exhaustive review of machine learning approaches used for Web Services discovery and frameworks developed based on these approaches. A thorough analysis of existing frameworks for semantic discovery of Web Services is also provided in this paper.

Copyright © 2013-2016 Journal of Advances in Information Technology, All Rights Reserved
E-mail: jait@etpub.com