|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2011 | Vol. 30 No.2 |
Paper ID: |
14326
-JATIT |
Title: |
A
METHOD FOR QUALITY POWER PROVIDER TO OPERATE IN DISTORTED SUPPLY CONDITION |
Author: |
K.CHANDRASEKARAN, K.S.RAMA RAO |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 66 - 75 Vol 30. No. 2 -- 2011 |
Abstract |
Power Quality is a major concern within power
industry and consumers. Poor quality of supply will affect the performance of
customer equipment such as computers, microprocessors, adjustable speed drives,
power electronic controllers, life saving equipment in hospitals, etc. and
result in heavy financial losses to customers due to loss of production or
breakdown in industries or loss of life in a hospital. The two major power
quality disturbances are voltage sag and harmonic distortion. In this paper, a
Quality Power Provider (QPP) based on voltage source inverter is modeled by
simulation to compensate the power quality disturbances such as voltage sag and
voltage harmonics in the distorted supply condition. The phase locked loop (PLL)
is an important control unit of the QPP control scheme. To obtain accurate phase
information and frequency of the input supply, the dqPLL method has been
proposed. Simulation results based on MATLAB and PSCAD software are presented to
verify the performance of the proposed QPP. QPP has improved the quality of
power supply at the sensitive load end. |
Keywords |
Voltage Sag, Harmonics, PLL, Dqpll, Double
Frequency Component |
Full
Text |
|
Paper ID: |
14267
-JATIT |
Title: |
SOFTWARE ENGINEERING PROCESS: YAAM DEPLOYMENT IN E-BOOKSHOP USE CASE SCENARIO
|
Author: |
Eke B. O., MACM, MCPN, Nwachukwu E. O., Ph.D. FCPN,
FNCS |
Source: |
Journal of Theoretical and Applied
Information Technology pp
76 - 85 Vol 30. No. 2 -- 2011 |
Abstract |
The development of Yet Another Agile Methodology (YAAM)
has added to the list of Agile software processes which is a novel software
development process introduced for use in modern software development. In this
paper, YAAM is deployed in E-Bookshop use case scenario to substantiate the
development benefit claims made during the introduction of the software process.
E-Bookshop Scenario was selected due to its varying complexity concerns which
are suitable in testing various areas that were perceived to be difficult to
handle using other software processes. The deployment is implemented using open
source tools and languages. |
Keywords |
YAAM, Agile, E-Bookshop, Use Case, SE Process |
Full
Text |
|
Paper ID: |
14231
-JATIT |
Title: |
AN
INTELLIGENT TECHNIQUE TO MULTI-SENSOR DATA FUSION IN TARGET TRACKING |
Author: |
ASHRAF ANWAR, SULTAN ALJAHDALI |
Source: |
Journal of Theoretical and Applied
Information Technology pp
86 - 97 Vol 30. No. 2 -- 2011 |
Abstract |
Combining the results of multiple sensors can
provide more accurate information than using single sensor. In this paper, we
develop fuzzy clustering approach to data association and track fusion in
multi-sensor multi-target environment. The proposed approach uses the fuzzy
clustering means algorithm to get the degree of membership of new tracks to
existing tracks. Unlike existing approaches, in which the membership functions
are fixed a priori (determined empirically), we generate optimal membership
functions from the data using the fuzzy clustering means algorithm. More
specifically, the values of the membership functions change according to the
relative positions of the targets with respect to the sensors; this adaptation
to the current state of the environment leads to far better/accurate results.
Furthermore, our proposal can handle different types of information without
excessive computation; indeed, it reduces considerably the computational
complexity compared to existing schemes. |
Keywords |
Distributed Sensors, Information Fusion,
Intelligent Tracking, And Multi-Sensor- Multi-Target Tracking |
Full
Text |
|
Paper ID: |
14278
-JATIT |
Title: |
A
COMPARISON OF BLOOD DONOR CLASSIFICATION DATA MINING MODELS |
Author: |
SHYAM SUNDARAM, SANTHANAM T |
Source: |
Journal of Theoretical and Applied
Information Technology pp
98 - 101 Vol 30. No. 2 -- 2011 |
Abstract |
This study uses decision trees derived from data
mining modeling techniques to examine the blood donor classification. The
primary goal of this classification model is provide the capability to determine
voluntary blood donorship based on blood donation patterns. In specific a
comparison is made of two models (one based on a specific donation drive versus
the regular voluntary donor patterns) based on a standard data set for blood
transfusion. The enhancement of attributes that help enable the determination of
voluntary donorship is also a suggested value addition The paper discusses
comparison of donorship models using the classification algorithms of data
mining which enable representation as decision trees. The analysis provides
insight into the development of donor classification which enable blood banks to
determine the kinds of donor profiles and manage blood donorship related
activities like recruitment and campaigns for blood donations. |
Keywords |
Blood Bank, Blood Transfusion, Blood Donor, Data
Mining, Classification Algorithms |
Full
Text |
|
Paper ID: |
14238
-JATIT |
Title: |
THREE PHASE CONTROL FOR PWM-SWITCHED AUTOTRANSFORMER VOLTAGE-SAG COMPENSATOR
BASED ON PHASE ANGLE ANALYSIS |
Author: |
MUHAMAD MANSOR, NASRUDIN ABD. RAHIM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 102 - 108 Vol 30. No. 2 -- 2011 |
Abstract |
Enhancing compensating capability is essential in a
voltage-sag compensator. It involves two main aspects, first, sag detection
technique and second, voltage sag compensator. Many detection techniques have
been introduced to measure and to detect voltage sag, such as RMS-Value
Evaluation and Peak-Value Evaluation. Unfortunately, most of the techniques
require a delay for sag to be detected then compensated, whereas immediate sag
detection is vital to improvement of transient performance. Presented is a
three-phase PWM-switched autotransformer voltage-sag compensator that is based
on AC-AC converter and that uses the proposed three phase controller based on
Phase Angle Analysis as the detection technique. The significant advantage of
this detection technique is the detection time. It is capable of detecting and
compensating voltage sag the moment sag occurs without delay. Its effectiveness
and capability were verified via MATLAB/Simulink simulation |
Keywords |
Voltage Sag, Voltage Sag Detection, Voltage Sag
Compensator, RMS Detection, Peak Detection |
Full
Text |
|
Paper ID: |
14375
-JATIT |
Title: |
FEASIBILITY STUDY OF USING WIND TURBINES WITH DIESEL GENERATORS OPERATING AT ONE
OF THE RURAL SITES IN JORDAN |
Author: |
DR ATEF.S. AL-MASHAKBEH |
Source: |
Journal of Theoretical and Applied
Information Technology pp
109 - 114 Vol 30. No. 2 -- 2011 |
Abstract |
Jordan is one of the countries, which suffer from
energy resources shortage. Therefore, it is entirely dependent on imported oil,
form neighboring countries. The exploitation of green sources is encouraged to
reduce the environmental pollution and combat the global warming of the planet.
Wind is a natural renewable source energy that has a significant potential in
Jordan. This paper introduces a feasibility study of integrating wind energy
with diesel plant for a rural site in a remote southern of Jordan called "Rass
Alnaqab". The data concerning the load, the national grid, the price of energy
and the average wind speed at that site are calculated. The Weibull distribution
technique was then used to analyze the wind data. A simple calculation was done
to illustrate the visibility of integrating wind energy with diesel sets. The
environmental factors have been calculated. |
Keywords |
Feasibility Study, Wind Turbines, Load, Price of
Energy, Environmental Factors Calculations |
Full
Text |
|
Paper ID: |
14352
-JATIT |
Title: |
PERFORMANCE EVALUATION OF HASH ALGORITHMS FOR INTEGRITY IN DATABASE ARCHIVES |
Author: |
AIHAB KHAN, MALIK SIKANDER HAYAT KHIYAL, MUHAMMAD
IQBAL, ASMA ARSHAD |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 115 - 121 Vol 30. No. 2 -- 2011 |
Abstract |
The concept of digital archives to store long
term data has readily increased in past few years. Many social, business and
government organizations store their data in digital archives for long time span
with many challenges along with its advantages. One of the major and most common
problem is to ensure the integrity of data stored in digital archives. Usage of
hash algorithms is solution to provide integrity in digital archives. Lots of
hash algorithms are available now days but the problem is that usually the
organizations are short of resources especially time and memory, so they always
look for such algorithm that consumes the least amount of resources providing
the security at maximum. So in this work the most commonly used hash algorithms
are evaluated for their performance on the basis of time, memory and efficiency
with variable data object size. SHA-1, MD-5, RIPEMD-160 and HAVAL-256 are
evaluated for performance, being the most commonly used hash algorithms. Results
show that MD-5 consume least amount of resources with somewhat questionable
security, SHA-1 and RIPEMD-160 are more consistent in behavior with a
compromising amount of resource usage and security and HAVAL-256 provides best
security with high rate of resource usage. |
Keywords |
Hash Algorithms, Integrity, Secure Hash Algorithm (SHA),
Message Digest (MD), RACE Integrity Primitives Evaluation Message Digest (RIPEMD),
Digital Archives |
Full
Text |
|
Paper ID: |
14315
-JATIT |
Title: |
CALCULATION OF SOME TOPOLOGICAL INDICES OF GRAPHS |
Author: |
MOHAMED ESSALIH, MOHAMED EL MARRAKI , GABER EL
HAGRI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 122 - 127 Vol 30. No. 2 -- 2011 |
Abstract |
In this paper, we give some theoretical results,
for the index WienerW, degree distance DD and the hyper-Wiener index WW of a
graphG, according to d_G (k)(The number of pairs of vertices of G that are at
distance), and the diameter of G. We accomplish this by firstly, giving another
proof of the inequality for the planar graphs with nvertices:W(En)≤W(Cn)≤W(Pn)[6],
with E_n is a maximal planar graphC_n is a planar graph and P_n is a path planar
graph. Secondly, we will apply the theoretical results for some graphs with
diameter equals two, as Fan planar graphF_n, Wheel planar graph W_n, maximal
planar graph E_n and the butterfly planar graph B_n, and some particularly
graphs with diameter greater than two, as the cycle planar graphC_n and the
Sunflower planar graph S_n |
Keywords |
Graph, Index Hyper-Wiener; Index Wiener, Index
Degree Distance, Index First Zagreb |
Full
Text |
|
Paper ID: |
14310
-JATIT |
Title: |
STATE OF ART IN OPTIMAL POWER FLOWSOLUTION METHODOLOGIES |
Author: |
R.V.AMARNATH, Dr. N. V. RAMANA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 128 - 154 Vol 30. No. 2 -- 2011 |
Abstract |
This Paper explores the existing methodologies for
the solution of the most complex Optimal Power Flow problem of large size power
system. The survey covers exhaustive review of literature available over the
past five decades published by the Pioneers, Experts & Researchers working in
this field. It includes publications in standard international journals like
IEEE, IEE, ELSEVIER etc, popular text books and proceedings of prominent
international conferences. The OPF methods are broadly grouped as Conventional
and Intelligent. The conventional methodologies include the well known
techniques like Gradient method, Newton method, Quadratic Programming method,
Linear Programming method and Interior point method. Intelligent methodologies
include the recently developed and popular methods like Genetic Algorithm,
Particle swarm optimization, Fuzzy Logic and Neural Networks. This paper
summarizes salient features, merits and demerits of, as well as contributions
made by research scholars and experts on each of the OPF method based on
detailed review and critical examination of various methods, The contents of
this paper provide ready-to-refer and ready to use information for the
researchers working in the field of Optimum Power Flow. |
Keywords |
Optimal Power Flow, Newton Method, Interior Point
Method, Genetic Algorithms and Particle Swarm Optimization |
Full
Text |
|
|
|