|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2011 | Vol. 33 No.2 |
Paper ID: |
14573
-JATIT |
Title: |
LANGUAGE INTERPRETER FOR THE DEAF CORE
USING A VIRTUAL REALITY DATA-GLOVE |
Author: |
OLGUÍN-CARBAJAL MAURICIO, 2ZÁRATE-RIVERA
ISRAEL, 3PIMENTEL-CRUZ JESÚS |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 135 - 141 Vol 33. No. 2 -- 2011 |
Abstract |
This project paper addresses the
suitability of a low cost Data-Glove for virtual reality as a tool for reading
the hand movements as help for translating sign language for deaf people. The
objective is the development and programming of a software interface capable of
reading the data provided by the Data-Glove in USB interface for interpretation
of the letters of the alphabet in sign language and presentation of its
corresponding letter on the computer screen. This is the first stage, the
development and test for the Data-Glove communication function, and the test
with few alphabet letters. |
Keywords |
Language, Interpreter, Deaf Core, Data
Glove, Mexican Sign Language (MSL) |
Full Text |
|
Paper ID: |
14372
-JATIT |
Title: |
HETEREGENEOUS PARAMETERS FOR ACCURACY
THREAT |
Author: |
DERIS STIAWAN, MOHD. YAZID IDRIS, ZOHAIR
IHSAN, KHALID HUSSAIN, ABDUL HANAN ABDULLAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 142 - 154 Vol 33. No. 2 -- 2011 |
Abstract |
In this paper, we propose a new approach
for increasingly accuracy and precision detection/prevention threat and
exploratory phase correlation event in parameters to comprehensive scanning with
multiple threat collection. First, we collect data from parameters which we
observed previously. Second, find the best method through literature review to
integrate the different parameters of collecting information from different
structure, label, and variable of data. Finally, we present parameters threat
correlation using data mining approach to respond and protect against threat
more quickly and updated. Expectation from this research is to obtain a
recognition mechanism suspicious threat to be identified before entering and
damaging the network. |
Keywords |
Parameters Security Violation,
Behavior-Based Detection, Intrusion Prevention System, Misuse-Based Detection. |
Full Text |
|
Paper ID: |
14570
-JATIT |
Title: |
SCHEDULING JOBS ON GRID COMPUTING USING
FIREFLY ALGORITHM |
Author: |
ADIL YOUSIF, 1ABDUL HANAN ABDULLAH,
SULAIMAN MOHD NOR, ADIL ALI ABDELAZIZ |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 155 - 164 Vol 33. No. 2 -- 2011 |
Abstract |
Scheduling jobs on computational grids is
identified as NP-complete problem due to the heterogeneity of resources; the
resources belong to different administrative domains and apply different
management policies. This paper presents a novel metaheuristics method based on
Firefly Algorithm (FA) for scheduling jobs on grid computing. The proposed
method is to dynamically create an optimal schedule to complete the jobs within
minimum makespan. The proposed method is compared with other heuristic methods
using simple and different simulation scenarios. The results show that, the
firefly scheduling mechanism is more efficient than Min-Min and Max-Min
heuristics in many scheduling scenarios. |
Keywords |
Computational Grid, Scheduling, Resource
Management, Optimization Algorithm, Min-Min, Max-Min And Firefly Algorithm. |
Full Text |
|
Paper ID: |
14409
-JATIT |
Title: |
DTC CONTROL BASED ARTIFICIAL NEURAL
NETWORK FOR HIGH PERFORMANCE PMSM DRIVE |
Author: |
BADRE BOSSOUFI, MOHAMMED KARIM, SILVIU
IONITA, AHMED LAGRIOUI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 165 - 176 Vol 33. No. 2 -- 2011 |
Abstract |
In this paper, we propose an approach
intelligent artificial technique for improvement of Direct Torque Control (DTC)
of Permanent Magnet Synchronous Motor such as artificial neural network (ANN),
applied in switching select voltage vector and estimator flux and torque. This
intelligent technique was used to replace, on the one hand the conventional
comparators and the switching table in order to reduce torque ripple, flux and
stator current. The effect of the speed estimation error is analyzed, and the
stability proof of the control system is also proved. The simulations results
are presented to show the validity and efficiency of the proposed system. |
Keywords |
Permanent Magnet Synchronous Machine, ANN,
Direct Torque Control, DTC_ANN |
Full Text |
|
Paper ID: |
14498
-JATIT |
Title: |
AN EVOLUTIONARY APPROACH TO IMPROVE THE
LIFE TIME OF THE WIRELESS SENSOR NETWORKS |
Author: |
B.BARANIDHARAN, B.SANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 177 - 183 Vol 33. No. 2 -- 2011 |
Abstract |
Energy efficiency in the wireless sensor
networks is the major factor which determines its usability in applications like
military surveillance, environmental monitoring, and health care monitoring.
Improving Energy efficiency through evolutionary computing algorithms is the
latest research phenomena for wireless groups all around the world. Mostly, due
to the dense deployment of sensor motes in a monitoring area redundant data will
be given to the sink nodes. In the recent works done in this NP-hard problem
routing activity is only concentrated much to conserve the energy within the
network. Here in our proposed work genetics operators are applied in such a way
to reduce the redundant information to the sink station and conserve its energy
reserves. |
Keywords |
Sensor, Energy Efficiency, Clustering,
Genetic Algorithm, Life Time |
Full Text |
|
Paper ID: |
14561
-JATIT |
Title: |
DESIGN OF MICROSTRIP ANTENNA FOR WIRELESS
COMMUNICATION AT 2.4 GHZ |
Author: |
A.B. MUTIARA, R.REFIANTI, RACHMANSYAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 184 - 192 Vol 33. No. 2 -- 2011 |
Abstract |
The paper presents a broadband micro-strip
patch antenna for wireless communication. In its most basic form, a micro-strip
patch antenna consists of a radiating patch on one side of a dielectric
substrate which has a ground plane on the other side. The patch is generally
made of conducting material such as copper or gold and can take any possible
shape. A rectangular patch is used as the main radiator. There are several
advantages of this type of broadband antenna, such as planar, small in size,
simple in structure, low in cost, and easy to be fabricated, thus attractive for
practical applications. This rectangular micro-strip patch antenna is designed
for wireless communication application that works at 2.4 GHz with gain 11 dB for
outdoor place. It also has a wide angle of beam in its radiation pattern. The
results obtain that micro-strip patch antenna can be used as client antenna in
computer and workable antenna for wireless fidelity. |
Keywords |
Micro-strip Antenna, Wireless Fidelity,
Frequency |
Full Text |
|
Paper ID: |
14548
-JATIT |
Title: |
IMPROVING EFFICIENCY OF TEXTUAL STATIC WEB
CONTENT MINING USING CLUSTERING TECHNIQUES |
Author: |
R. MANIKANDAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 193 - 196 Vol 33. No. 2 -- 2011 |
Abstract |
There are several efficient methods for
the discovery or mining of various types of data, methods devised for mining
textual static web content have always been proved less efficient due to the
data's ambiguous , unclassified, unstructured or un-clustered nature. Various
association rule mining algorithms like Generalized pattern algorithm are being
implemented to mine the web content but again due to the above setbacks the
efficiency expected from the algorithm is not obtained. Since the dip in the
efficiency of these algorithms is amounted to the nature of the textual web
content, an algorithm which may deal with , if not all the anomalies at least
the un-clustered nature of the content may increase the efficiency drastically.
This paper emphasizes the same point, making the assumptions that the web
content is static and there is at least one common pattern found in the given
datasets. |
Keywords |
Textual Web Content, Un-clustered Nature,
Generalized Pattern Algorithm, Datasets, Clustering Algorithm |
Full Text |
|
Paper ID: |
14574
-JATIT |
Title: |
MAMMOGRAM CLASSIFICATION USING MAXIMUM
DIFFERENCE FEATURE SELECTION METHOD |
Author: |
R.NITHYA, B.SANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 197 - 204 Vol 33. No. 2 -- 2011 |
Abstract |
This paper developed a CAD (Computer Aided
Diagnosis) system based on neural network and a proposed feature selection
method. The proposed feature selection method is Maximum Difference Feature
Selection (MDFS). Digital mammography is reliable method for early detection of
breast cancer. The most important step in breast cancer diagnosis is feature
selection. Computer automated feature selection is reliable and also it helps to
improve the classification accuracy. GLCM (Gray Level Co-occurrence Matrix)
features are extracted from the mammogram. The extracted features are selected
based on a proposed MDFS method. Experiments have been conducted on datasets
from DDSM (Digital database for Screening Mammography) database. Several feature
selection methods are available. The accuracy of the model depends on the
relevant feature selection. The proposed MDFS method selects only essential
features and eliminates the irrelevant features. The experiment results show
that neural network based model with proposed feature selection method improved
the classification accuracy. |
Keywords |
Artificial Neural Network (ANN), Breast
Cancer, GLCM, Mammogram, Feature Selection |
Full Text |
|
Paper ID: |
14456
-JATIT |
Title: |
THE USE OF ELECTRIC STIMULATION AS A
DIAGNOSTIC TOOL TO ASSESS FRACTURE HEALING AND NEW BONE FORMATION |
Author: |
S.KUMARAVEL, S.SUNDARAM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 205 - 213 Vol 33. No. 2 -- 2011 |
Abstract |
Repeated x-rays are required to confirm
healing of fractures. Clinical assessment is also difficult in patients treated
with Ilizaro rings. Electrical stimulation was earlier tried to speed the
fracture union whereas it has not been tried as a method to diagnose healing of
fracture. In this study we have tried electric stimulation as a method to
monitor fracture healing. There is a comparative group followed with traditional
method of x-rays and clinical assessment only. |
Keywords |
Electrical Stimulation, Direct Current
(DC), Fracture Healing, Monitoring, Radiation Hazard |
Full Text |
|
Paper ID: |
14428
-JATIT |
Title: |
DESIGN OF A SIGNAL CONCENTRATING ANTENNA
FOR A LAP-TOP |
Author: |
C. AQUINO , I. RIVERA , S. A. GARCÍA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 214 - 219 Vol 33. No. 2 -- 2011 |
Abstract |
The use of wireless nets actually offers a
great amount of services that operate through the internet and to be able to
connect to one of them it is necessary to be within a delimited zone in order to
obtain an optimus signal reception, but you can’t always be in the same place
and mobility causes a decrease in the intensity of the signal, that is why this
work, proposes to design an antenna that will capture, concentrate and redirect
the signal toward the tablet or net card of a laptop increasing and improving
the signal reception. |
Keywords |
Antenna, Fractal, Laptop, Signal
Intensity, Net Card And Coupling |
Full Text |
|
Paper ID: |
14217
-JATIT |
Title: |
COMPARATIVE STUDY ON FEATURE EXTRACTION
METHOD FOR BREAST CANCER CLASSIFICATION |
Author: |
R. NITHYA, B. SANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 220 - 226 Vol 33. No. 2 -- 2011 |
Abstract |
This paper presents an evaluation and
comparison of the performance of three different feature extraction methods for
classification of normal and abnormal patterns in mammogram. Three different
feature extraction methods used here are intensity histogram, GLCM (Grey Level
Co-occurrence Matrix) and intensity based features. A supervised classifier
system based on neural network is used. The performance of the each feature
extraction method is evaluated on Digital Database for Screening Mammography (DDSM)
breast cancer database. The experimental results suggest that GLCM method
outperformed the other two methods |
Keywords |
Artificial Neural Network (ANN), Breast
Cancer, GLCM, Histogram, Intensity, Feature |
Full Text |
|
Paper ID: |
14552
-JATIT |
Title: |
IMPLEMENTATION AND OPTIMIZATION UNDER
MATLAB CODE OF A HV POWER TRANSFORMER FOR MICROWAVE GENERATORS SUPPLYING TWO
MAGNETRONS |
Author: |
M.OULD.AHMEDOU, M.FERFRA, N.EL GHAZAL,
M.CHRAYGANE, M.MAAROUFI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 227 - 238 Vol 33. No. 2 -- 2011 |
Abstract |
The design of this new power supply uses a
HV single phase leakage flux transformer supplying two cells, composed each one
of a capacitor and a diode, which multiplies the voltage and stabilizes the
current. Each cell supplies in turn a single magnetron. This paper treats
firstly, a new modeling of this transformer with shunts of HV power for N=2
magnetrons. This model is based on the determination of analytical expressions
of nonlinear storable inductances, from the fitting of the magnetization curve
B(H) of the material used. The resulting model will be implemented for the first
time under MATLAB-SIMULINK® tool where we compare the results from this model to
those obtained from the old model validated by EMTP. In a second step, using the
programming tool MATLAB, we discussed an optimization strategy of this new HV
power supply for the microwave generators with N=2 magnetrons, to envisage the
possibility of obtaining gains in section, space, and weight, and to reduce the
transformer cost, and therefore that of all the installation, while respecting
the conditions recommended by the constructor: Ipeak < 1.2 A, Imean ≈ 300 mA. |
Keywords |
Electromagnetic Transient Program (EMTP);
magnetic circuit ; magnetron ; MATLAB-SIMULINK ; microwaves; modeling ;
optimization ;high voltage (HV). |
Full Text |
|
Paper ID: |
14558
-JATIT |
Title: |
COUNTER HACKING MECHANISM IN CLUSTERED
ROUTING TO PROVIDE QUALITY OF SERVICE IN MOBILE AD HOC NETWORKS |
Author: |
B.SREEDEVI, Y.VENKATRAMANI,
T.R.SIVARAMAKRISHNAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 239 - 249 Vol 33. No. 2 -- 2011 |
Abstract |
In ad hoc networks, each node is connected
instantaneously, wireless without a central control. Its challenge lies with
dynamic topology and limited battery energy. Its instant infrastructure poses a
greater dispute in routing. Since the medium is wireless and no central control,
there are lots of chances of attack by intruders. The impact of hackers attack
and the process to overcome from those attacks have been discussed. The
consequence made by the hackers is analyzed in terms of packet loss, throughput
and delay. At the same time, the performance is also measured after overcoming
from the attack process. The analysis and performance are done using ns2 tool. |
Keywords |
Intruder, Attack, Packet Loss, Throughput,
Delay. |
Full Text |
|
Paper ID: |
14566
-JATIT |
Title: |
SELECTING THE RIGHT STAKEHOLDERS FOR
REQUIREMENTS ELICITATION: A SYSTEMATIC APPROACH |
Author: |
ROZILAWATI RAZALI, FARES ANWAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 250 - 257 Vol 33. No. 2 -- 2011 |
Abstract |
Requirements elicitation is the most
critical phase in software development as it captures the required functionality
of a software system. The elicitation process is indeed resource intensive. It
involves a number of dedicated stakeholders who are deliberately gathered to
confer and stipulate software requirements. The effectiveness of the process is
greatly influenced by the credibility and suitability of the stakeholders
involved. Correct and complete requirements could only be achieved if they are
gathered from the right stakeholders. Therefore, there is a need of systematic
approach that could help in identifying and choosing the appropriate
stakeholders. As stakeholder participation can be enormous, the approach should
also embrace prioritization. This study addresses this issue by collating
important elements that contribute to an effective selection of stakeholders for
requirement elicitation purposes. The elements were identified through reviews
of related work, which were analyzed by using content analysis. The elements
were then integrated as a conceptual framework that consists of a step-by-step
procedure. The framework can be used by practitioners to execute the selection
process. To researchers, the study proposes several mechanisms to support the
approach as a guide for future research. |
Keywords |
Requirements Elicitation, Stakeholder
Identification, Stakeholder Selection, Stakeholder Prioritization |
Full Text |
|
Paper ID: |
14568
-JATIT |
Title: |
ON-LINE MONITORING AND ANALYSIS OF FAULTS
IN TRANSMISSION AND DISTRIBUTION LINES USING GSM TECHNIQUE |
Author: |
Prof. M. S. SUJATHA, Dr. M VIJAY KUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 258 - 265 Vol 33. No. 2 -- 2011 |
Abstract |
Increase in demand of electricity for
entire applications in any country, need to produce consistently with advanced
protection system. Many special protection systems are available based on volume
of power distributed and often the load changes without prediction required an
advanced and special communication based systems to control the electrical
parameters of the generation. Most of the existing systems are reliable on
various applications but not perfect for electrical applications. Electrical
environment will have lots of disturbance in nature, Due to natural disasters
like storms, cyclones or heavy rains transmission and distribution lines may
lead to damage. The electrical wire may cut and fall on ground, this leads to
very harmful for human beings and may become fatal. So, a rigid, reliable and
robust communications like GSM technology instead of many communication
techniques used earlier. This enhances speed of communication with distance
independency. This technology saves human life from this electrical danger by
providing the fault detection and automatically stops the electricity to the
damaged line and also conveys the message to the electricity board to clear the
fault. An Embedded based hardware design is developed and must acquire data from
electrical sensing system. A powerful GSM networking is designed to send data
from a network to other network. Any change in parameters of transmission is
sensed to protect the entire transmission and distribution. |
Keywords |
Global System For Mobile Communication (GSM),
Special Protection System (SPS), Embedded Systems |
Full Text |
|
|
|