|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
October 2011 | Vol. 32 No.1 |
Paper ID: |
14357
-JATIT |
Title: |
SPANNING TREES RECURSIONS FOR CROSSES MAPS |
Author: |
DOUNIA LOTFI, MOHAMED EL MARRAKI, DRISS
ABOUTAJDINE |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 01 - 07 Vol 32. No. 1 -- 2011 |
Abstract |
It is known that Kirchhoff Matrix Theorem
computes the number of spanning trees in any graph G by taking a determinant; so
far, many works derived a recursive function to calculate the complexity of
certain families of maps specially Grid map. In this paper we give the major
recursive formula that counts the number of spanning trees in the general case
of grid graph, then we propose some spanning trees recursions for families of
planar graphs called crosses maps such as the cross grid and the cross
ocotogonal map by using the spanning tree theorem and we give a new algorithm to
count the complexity of some particular maps such as the kite map. |
Keywords |
Planar Graph, Map, Complexity,
Spanning Tree, Grid Graph |
Full Text |
Paper ID: |
14448
-JATIT |
Title: |
IMPROVED BICLUSTERING ALGORITHM FOR GENE EXPRESSION DATA |
Author: |
SADIQ HUSSAIN, PROF. G.C. HAZARIKA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 08 - 14 Vol 32. No. 1 -- 2011 |
Abstract |
Biclustering algorithms simultaneously cluster both
rows and columns. These types of algorithms are applied to gene expression data
analysis to find a subset of genes that exhibit similar expression pattern under
a subset of conditions. Cheng and Church introduced the mean squared residue
measure to capture the coherence of a subset of genes over a subset of
conditions. They provided a set of heuristic algorithms based primarily on node
deletion to find one bicluster or a set of biclusters after masking discovered
biclusters with random values. The mean squared residue is a popular measure of
bicluster quality. One drawback however is that it is biased toward flat
biclusters with low row variance. In this paper, we introduce an improved
bicluster score that removes this bias and promotes the discovery the most
significant biclusters in the dataset. We employ this score within a new
biclustering approach based on the bottom up search strategy. We believe that
the bottom-up search approach better models the underlying functional modules of
the gene expression dataset. |
Keywords |
Bicluster, Gene expression Data, Clustering,
Pattern Recognition |
Full Text |
Paper ID: |
14455
-JATIT |
Title: |
GRAY CODE AND HAMMING DISTANCE FOR GRAPH OF Sn(123,132) |
Author: |
A. JUARNA, A.B. MUTIARA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 15 - 19 Vol 32. No. 1 -- 2011 |
Abstract |
As we noted that an isomorphism between two
combinatorial classes is a closeness preserving bijection between those classes,
that is, two objects in a class are closed if and only if their images by this
bijection are also closed. Often, as in this paper, closeness is expressed in
terms of Hamming distance. Isomorphism allows us to find out some properties of
a combinatorial class X (or for the graph induced by the class X) if those
properties are found in the pre image of the combinatorial class X; some
mentioned properties are hamiltonian path, graph diameter, exhaustive and random
generation, and ranking and unranking algorithms. Simion and Schmidt showed in
1985 that the cardinality of the set Sn(123,132) length n permutations avoiding
the patterns 123 and 132, is 2n-1, but in the other side 2n-1 is the cardinality
of the set Bn-1 = {0,1}n-1 of length (n-1) binary strings. Theoretically, it
must exist a bijection between Sn(123,132) and Bn-1. In this paper we give a
constructive bijection between Bn-1 and Sn(123,132); we show that it is actually
an isomorphism and illustrate this by constructing a Gray code for Sn(123,132)
from a known similar result for Bn-1. |
Keywords |
Pattern-Avoiding Permutations; Binary
Strings, Constructive Bijection; Hamming Distance; Combinatorial Isomorphism |
Full Text |
Paper ID: |
14443
-JATIT |
Title: |
A
MULTI ROUTING ALGORITHM FOR AD-HOC NETWORKS |
Author: |
Mehdi Bahrami, Mohammad Bahrami |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 20 - 27 Vol 32. No. 1 -- 2011 |
Abstract |
Ad hoc networks are a new wireless networking
paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc
networks do not rely on any fixed infrastructure. In this network, this
topologies, allowing people and devices to seamlessly internetwork in areas with
no pre-existing communication infrastructure, e.g., disaster recovery
environments. Each node acting as both a host and a router moves arbitrarily and
communicates with others via multiple wireless links. The primary application
for ad hoc networks has been for military operations. In this paper we propose
new routing algorithms for path energy as an additional metric for routing. The
motive behind this effort is to study the effect of the added metric on
improving the lifespan of the Ad-Hoc communication network and the corresponding
effect on the overall network performance. |
Keywords |
Ad-Hoc Networks, Network Routing, Route
Discovery |
Full Text |
Paper ID: |
14397
-JATIT |
Title: |
PERFORMANCE EVALUATION OF A CLOUD BASED LOAD BALANCER SEVERING PARETO TRAFFIC |
Author: |
AYMAN G. FAYOUMI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 28 - 34 Vol 32. No. 1 -- 2011 |
Abstract |
Cloud resources represent an unforeseeable
breakthrough in ITC industry. Load balancer is a key element in resource
provisioning for high available cloud solutions, and yet its performance depends
on the traffic offered load. We develop a discrete event simulation to evaluate
the performance with respect to the different load points. The performance
metrics were the average waiting time inside the balance as well as the number
of tasks. The performance study includes evaluating the chance of immediate
serving or rejecting incoming tasks. Pareto traffic was considered for the
offered traffic. |
Keywords |
Cloud Computing, Load Balancer, Pareto
Distribution, Self-Similar Traffic, Discrete-Event Simulator |
Full Text |
Paper ID: |
14451
-JATIT |
Title: |
EVALUATIN
OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS |
Author: |
ALOK KUMAR JAGADEV, BINOD KUMAR PATTANAYAK,
AJIT KUMAR NAYAK,
MANOJRANJAN NAYAK |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 35 - 45 Vol 32. No. 1 -- 2011 |
Abstract |
Wireless ad hoc network is a collection of mobile
nodes interconnected by multi-hop communication paths forming a temporary
network without the aid of any centralized administration or standard support
services regularly available as in conventional networks. The topology of the
network changes dynamically as mobile nodes join or depart the network or radio
links between nodes become unusable. To accomplish this, a number of ad hoc
routing protocols have been proposed and implemented, which include Destination
Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR) and Ad hoc
On-demand Distance Vector (AODV) routing protocols. In this paper, these
protocols are evaluated by a set of parameters such as throughput, delay, packet
loss, etc., and we analyze the Quality of Service (QoS) parameters from the
network perspective looking into two different TCP/IP layers: transport layer
and network layer. The impacts of node loads on different QoS metrics in both
layers are evaluated too. As the simulation results suggest, AODV demonstrates
the best performance even in the networks with moving mobile nodes. The
on-demand protocols, AODV and DSR perform better than the table driven DSDV
protocol. Although DSR and AODV share similar on-demand behavior, the
differences in the protocol mechanisms can lead to significant performance
differentials. The performance differentials are analyzed using varying network
load, mobility and network size. In transport layer, because of UDP’s
connectionless nature, it does not need any confirmation for receiving data,
which makes UDP protocol suitable in critical time applications (real time
applications) in comparison with other transport layer protocols such as TCP |
Keywords |
AODV, DSR, DSDV, Delay, Throughput |
Full Text |
Paper ID: |
14450
-JATIT |
Title: |
A
ROBUST MULTISTAGE ALGORITHM FOR CAMERA SELF-CALIBRATION DEALING WITH VARYING
INTRINSIC PARAMETERS |
Author: |
ADNANE EL-ATTAR, MOHAMMED KARIM, HAMID TAIRI,
SILVIU IONITA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 46 - 54 Vol 32. No. 1 -- 2011 |
Abstract |
We present a practical algorithm for camera
self-calibration dealing with varying parameters. Given a projective
reconstruction, we retrieve the calibration matrices for each frame by
minimizing a non-linear least square. We firstly start the minimization
procedure by a stage of initialization to get a first estimation of the focal
lengths, then, we start the estimation of the camera intrinsic parameters in a
multistage algorithm, in each stage a parameter is estimated assuming some
constraints on the other parameters. In the final stage a refinement of all
parameters is done at once to allow them to vary freely. The robustness and
accuracy of the algorithm are shown in the experiments on both synthetic and
real data. |
Keywords |
Camera Self-Calibration, Multistage
Algorithm, Varying Intrinsic Parameters, Least Square Minimization |
Full Text |
Paper ID: |
14351
-JATIT |
Title: |
A
NOVEL EMBEDDING SCHEME BASED ON WALSH HADAMARD TRANSFORM |
Author: |
HOUDA JOUHARI, EL MAMOUN SOUIDI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 55 - 60 Vol 32. No. 1 -- 2011 |
Abstract |
The purpose of steganography is to send secret
message by embedding data into some innocuous cover objects such as digital
images. The data hiding method used until now is the syndrome coding method.
In this paper, we present an improved data hiding scheme defined by boolean
functions. Using some properties of Boolean functions we construct a new
steganographic scheme in which we can hide more information compared to the
scheme based on syndrome coding. |
Keywords |
Walsh Hadamard Transform, Error Correcting
Codes, Matrix Encoding, Boolean Functions, Reed Muller Codes, Embeding Efficient |
Full Text |
Paper ID: |
14385
-JATIT |
Title: |
A
SHUNT ACTIVE POWER FILTER CONTROLLED BY FUZZY LOGIC CONTROLLER FOR CURRENT
HARMONIC COMPENSATION AND POWER FACTOR IMPROVEMENT |
Author: |
HAMZA BENTRIA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 61 - 70 Vol 32. No. 1 -- 2011 |
Abstract |
This paper describes work that is being done
in the design of a three phase shunt active filter for electrical power quality
purposes. This type of filter is able to compensate the harmonic current caused
by the non-linear loads.
The main objective of this work is the study and the comparison of two types of
control algorithms applied on this shunt active filter. These two types of
control are the notch filter and the synchronous reference algorithms, they used
to generate the references current of the compensator, the last one algorithm is
based on two types of voltage controller, the classical controller PI
(proportional-integral) and the fuzzy logic controller , they used for the DC
voltage regulation. The hysteresis band method is employed to derive the
switching signals of the compensator.
A series of simulation by MATLAB/SIMULINK environment are presented and
discussed in this paper to show the performance and the effectiveness of these
control strategies. |
Keywords |
Shunt active filter, Voltage regulation,
hysteresis control, Fuzzy logic controller, PI controller |
Full Text |
Paper ID: |
14400
-JATIT |
Title: |
SARON MUSIC TRANSCRIPTION USING LPF-CROSS CORRELATION |
Author: |
YOYON K SUPRAPTO, DIAH PUSPITO WULANDARI,
ARIS TJAHJANTO |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 71 - 79 Vol 32. No. 1 -- 2011 |
Abstract |
Nowadays, mining of traditional music attracts
people’s interests in several aspects since the importance of archiving national
heritage is emphasized. Unfortunately, there have been very few researches which
analyzed traditional music instruments and their performances. Gamelan, one of
Indonesia’s traditional music instruments, has uniqueness in terms of its
hand-made construction which in turn induces variations in frequency, amplitude,
and resonance. These conditions have detained the exploration and development of
gamelan music itself.
This research initiates gamelan sound extraction for music transcription as part
of traditional music analysis. Spectral density model was constructed to extract
the sound of an instrument from the gamelan ensemble performance by using LPF
cross correlation (LPF-CC). The extracted sound was analyzed to generate
notations. The experiment demonstrates 5-16% note error rate. |
Keywords |
Saron Time And Frequency Model, LPF
Cross-Correlation, Saron Extraction, Music |
Full Text |
Paper ID: |
14417
-JATIT |
Title: |
PSEUDO GENETIC AND PROBABILISTIC-BASED FEATURE SELECTION METHOD FOR EXTRACTIVE
SINGLE DOCUMENT SUMMARIZATION |
Author: |
ALBARAA ABUOBIEDA M. ALI, NAOMIE SALIM, RIHAB
ELTAYEB AHMED, MOHAMMED SALEM BINWAHLAN, LADDA SUANMALI, AHMED HAMZA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 80 - 87 Vol 32. No. 1 -- 2011 |
Abstract |
Text features, as a scoring mechanism, are
used to identify the key ideas in a given document to be represented in the text
summary. Considering all features within same the level of importance may lead
to generate a summary with low quality. In this paper, we present a feature
selection method using (pseudo) Genetic probabilistic-based Summarization (PGPSum)
model for extractive single document summarization. The proposed method, working
as features selection mechanism, is used to extract the weights of features from
texts. Then, the weights will be used to tune features’ scores in order to
optimize the summarization process. In this way, important sentences will be
selected for representing the document summary. The results show that, our
PGPSum model outperformed Ms-Word and Copernic summarizers benchmarks by
obtaining a similarity ratio closest to human benchmark summary. |
Keywords |
Summarization, Text Features, Genetic,
Probabilistic, Similarity, Sentence Score, Features Weights, Binary Selection |
Full Text |
Paper ID: |
14419
-JATIT |
Title: |
OBJECT-ORIENTED PROGRAMMING SEMANTICS REPRESENTATION UTILIZING AGENTS |
Author: |
TEH NORANIS MOHD ARIS |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 88 - 98 Vol 32. No. 1 -- 2011 |
Abstract |
Comprehending Object-Oriented Programming
(OOP) is not an easy task especially by novice students. The problem occurs
during the transition from learning fundamental programming language concept to
OOP concept. It is very important to handle this problem from the beginning
before novices learn more advanced OOP concepts like encapsulation, inheritance,
and polymorphism. Learning programming from source code examples is a common
behavior among novices. Novices tend to refer to source codes examples and adapt
the source codes to the problem given in their assignments. To cater the
problems faced by these novices, a novel agent-based model have been designed to
assist them in comprehending OOP concepts through source codes examples. The
instructor needs to provide two related source codes that are similar but in
different domain. Generally, these source codes go through the preprocessing,
comparison, extraction, generate program semantics and classification processes.
A formal algorithm that can be applied to any two related Java-based source
codes examples is invented to generate the semantics of these source codes. The
algorithm requires source codes comparison based on keyword similarity to
extract the words that exist in the two related source codes. Three agents
namely SemanticAgentGUI, semanticAgent and noviceAgent are designed in the
proposed model. The running system shows an OOP semantic knowledge
representation by intelligent agents. |
Keywords |
OOP Semantics, Source Codes Comparison, Keyword
Similarity, Extraction, Classification |
Full Text |
Paper ID: |
14439
-JATIT |
Title: |
POSITION CONTROL OF DC SERVO MOTORS USING SOFT-CORE PROCESSOR ON FPGA TO MOVE
ROBOT ARM |
Author: |
A. Z. MANSOOR, M. R. KHALIL, O. A. JASIM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 99 - 106 Vol 32. No. 1 -- 2011 |
Abstract |
A new method of controlling position of DC Servo
motor using PicoBlaze soft-core processor on Field Programmable Gate Array (FPGA)
is adopted. The soft processor is used to generate the PWM required to create
motor motion and direction. The soft processor hardware system is build using
VHDL, while the processor is programmed using assembly language. The type of
control board used is XILINX FPGA SPARTAN-3E (XC3S500E). The system performance
is debugged using chipscope technique and oscilloscope. The real time operation
performance is done with five DC servo motors that are joined for testing motion
of the robot arm. The results show that the position of the servo motors set was
controlled efficiently. |
Keywords |
Field Programmable Gate Array (FPGA),
Soft-core processor, Very High Speed Integrated Circuit Hardware Description
Language (VHDL), Pulse Width Modulation (PWM) |
Full Text |
|
|