|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2011 | Vol. 34 No.2 |
Paper ID: |
14655
-JATIT |
Title: |
FLUX-WEAKENING CONTROL OF PERMANENT MAGNET
SYNCHRONOUS MACHINES |
Author: |
H. MAHMOUDI , A. LAGRIOUI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 110 - 117 Vol 34. No. 2 -- 2011 |
Abstract |
In this paper, a robust flux-weakening
control scheme of PM synchronous machines is studied. Based on a novel current
control concept, a speed/flux-weakening controller (SFWC) is proposed for the
flux-weakening control of PMSM. Comprehensive analysis is conducted on the
operations of PMSM controlled by SFWC in the flux-weakening region. Small-signal
method is used to investigate the flux and torque controllability of SFWC. The
current vector trajectories are modeled and illustrated in the rotor reference
frame, with special attention to SPM motors. Efficiency-optimized design is
performed on the selection of a newly introduced voltage constant. The
Simulation results are provided to demonstrate the feasibility of the proposed
control concept. |
Keywords |
Speed/Flux-Weakening Controller (SFWC),
permanent magnet synchronous machine (PMSM) Matlab/Simulink. |
Full Text |
|
Paper ID: |
14280
-JATIT |
Title: |
COMPARISON OF FULL BRIDGE AND TWO INDUCTOR
BOOST CONVERTER SYSTEMS |
Author: |
G. KISHOR, D.SUBBARAYUDU, S. SIVANAGARAJU |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 118 - 124 Vol 34. No. 2 -- 2011 |
Abstract |
The DC-DC converter topologies have
received increasing attention in recent years for high power and high
performance applications. The advantages of DC-DC boost converters include
increased efficiency, reduced size, reduced electromagnetic emission, faster
transient response, and improved reliability. The front end inductors in a boost
converter are magnetically coupled to improve electrical performance and reduce
size and weight. It features several merits such as multiple-output capability
with one shared choke, single-stage energy processing and good input current
shaping ability. This paper compares conventional boost converter and two
inductor boost converter designed for high voltage and high power applications.
Results of conventional boost converter are compared with two inductor boost
converter. |
Keywords |
Comparison, Power Factor, Two Inductor
Boost Converter, Bridge |
Full Text |
|
Paper ID: |
14341
-JATIT |
Title: |
MOBILE LEARNING TECHNOLOGY: A NEW STEP IN
E-LEARNING |
Author: |
Dr. TAYSEER ANDRAWES SALEEM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 125 - 137 Vol 34. No. 2 -- 2011 |
Abstract |
The objective of the current study was to
develop a cognitive system, in which the characteristics of mobile learning
technology, its nature, context and benefits are presented. The majority of
previous literature has an agreement that mobile learning is one form of
teaching learning processes possessing similarities and differences with e-
learning. It is mainly based on the concept of wire and wireless communication
technologies, as the individuals learner can access the learning material,
lectures and seminars whenever he desires and wherever he was, whether inside
the classroom or outside it. This creates therefore a new learning environment
in the context of the different learning settings. Such settings are based on
the interactive cooperative learning, the facility to share information within
the individual learners, and between the learners and the lecturer or teacher.
It was found that the main challenges hindering the implementation of mobile
learning in education range between the access to protection technologies for
the learning content, the availability of adequate devices to perform the tasks
targeted by the use of mobile learning, their storage capacity, their loadings,
in addition to other educational challenges mainly concerned with the designing
the educational programs able to meet the requirements of mobile learning and
able to consider the individual differences between the individual learners.
Finally, other obstacles such as lack of computer literacy between both the
teachers and students populations, their underestimation to the value of such
learning technology, the high cost for the inputs of such learning technology,
lack of appropriate integrated educational strategies to ensure the adoption of
such learning technology were all some of the main obstacles hindering the
implementation of such technology in the different educational domains. The
study concluded with the need to reconsider the inputs of the teaching process
and the methods used in it to be better able to absorb the technological and
cognitive revolution in communities, and thus be able to address the different
needs of students' populations and to keep abreast with the modern communities
we all live in nowadays. |
Keywords |
Leaning technology, E-Learning, Mobile
Learning, Wireless Learning Environment, Wireless Revolution |
Full Text |
|
Paper ID: |
14369
-JATIT |
Title: |
USING INFORMATION THEORY IN PATTERN
RECOGNITION FOR INTRUSION DETECTION |
Author: |
MEYSAM. MADANI, ALIREZA. NOWROOZI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 138 - 142 Vol 34. No. 2 -- 2011 |
Abstract |
There are so many methods of pattern
recognition for a dataset, but some datasets are special! KDDCUP 99 dataset have
some properties that can help us to do a better pattern recognition. For example
there are many unused future that can be omitted in some manner, moreover when
we want to do pattern recognition for a particular goal such as finding attacks
we can find the relevant futures for any attack by information theory and just
use these futures to detect attacks. we do pattern recognition for any attack by
a simple way and after all we combine these results to deduce the final result. |
Keywords |
Intrusion Detection Systems (IDS), Pattern
Recognition, Partitioning, Kddcup99 |
Full Text |
|
Paper ID: |
14806
-JATIT |
Title: |
THE PERSPECTIVES, MOTIVATORS AND
CHALLENGES OF OFFSHORE SOFTWARE DEVELOPMENT |
Author: |
FARRUKH SHAHZAD AHMED, SHAHBAZ AHMED,
AMMAD ASLAM, FALAK SHER |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 143 - 150 Vol 34. No. 2 -- 2011 |
Abstract |
Software project offshoring is a rapidly
growing trend. With this rapid growth, the software engineering research
community is facing many challenges like cultural differences, linguistic
problem etc because offshore software development is largely different from
co-located software development OSD. This variance in software development
nature has introduced many challenges. One of them is communication gap between
client and offshore vendor. The literature evidences indicate that many problems
like time delays, over budgeting etc are directly rooted from this communication
gap and some new risks are also introduced by poor communication in OSD offshore
software development [5, 7]. In this paper we have highlighted different
perspectives, and motivators of OSD. We have emphasized on the significance of
some OSD challenges and especially focused on communication problems between
client and offshore vendor along with suggested future work. |
Keywords |
OSD, Offshore Communication, Offshoring,
Offshore Outsourcing, Client-Vendor, Offshore Vendor |
Full Text |
|
Paper ID: |
14579
-JATIT |
Title: |
DESIGN AND ANALYSIS OF SECURED ELECTRONIC
VOTING PROTOCOL |
Author: |
KALAICHELVI V , Dr.RM.CHANDRASEKARAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 151 - 157 Vol 34. No. 2 -- 2011 |
Abstract |
Electronic Voting can play a really vital
role in the democracy of our life. In this paper, we propose an electronic
voting protocol. Our scheme does not require a special voting channel and
communication can occur entirely over the current Internet. This method
integrates the Internet convenience and cryptology. This paper analyzes the
various existing protocols such as simple protocol, Two Agency protocol, Blind
Signature Protocol and Sensus Protocol. In the existing protocol the Tallier has
to wait until the decryption key is received from the voter. So it will consume
lot of time. Instead of getting the decryption key value from the voter, the
Tallier maintains the key information securely in the database. So,
comparatively the proposed protocol consumes less time. This paper also analyzes
the various security issues involved in an electronic voting like security,
privacy, authentication, anonymous, uniqueness, accuracy, fairness, efficiency
and enforcibility. |
Keywords |
E-voting, Security, Privacy, Anonymity and
Internet |
Full Text |
|
Paper ID: |
14581
-JATIT |
Title: |
ONTOLOGY-BASED CONTEXT MODELING FOR
VEHICLE CONTEXT-AWARE SERVICES |
Author: |
MOHCINE MADKOUR, ABDELILAH MAACH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 158 - 166 Vol 34. No. 2 -- 2011 |
Abstract |
Computing becomes increasingly mobile and
pervasive today; these changes imply that applications and services must be
aware of and adapt to their changing contexts in highly dynamic environments.
Now a days, vehicles have become an increasingly important and exciting test bed
for ubiquitous computing (UbiComp), however, context-aware vehicle service to
enable high adaptation of service to driver, vehicle or even road in ubiquitous
environment is still little addressed in the literature. The context management
in pervasive computing environments must reflect the specific characteristics of
these environments, e.g. mobility, resource-constrained devices, or
heterogeneity of context sources. Although a number of context models have been
presented in the literature, none of them supports all of these requirements to
a sufficient extent at the same time. This paper focuses on building an ontology
modeling approach for Context Management in Intelligent Pervasive Middleware for
Context-Aware Vehicle Services. To support context-awareness, we embed
capabilities of context modeling and context reasoning in an ontology-based
context system, which focuses on management of the context and generates a
consistent model which promises the common information representation and
facilitates a development of context-aware services. |
Keywords |
Intelligent Vehicle, Intelligent
Transportation Systems, Ontology modeling, Ubiquitous Computing, Context-aware
service |
Full Text |
|
Paper ID: |
14594
-JATIT |
Title: |
WELD DEFECT DETECTION IN RADIOGRAPHY BASED
ON PROJECTION PROFILE AND RST INVARIANT BY USING LVQ |
Author: |
Dr.V. VAITHIYANATHAN, Dr.B. VENKATARAMAN,
ANISHIN RAJ M.M |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 167 - 172 Vol 34. No. 2 -- 2011 |
Abstract |
X-ray radiography is commonly used in (NDT)
Non-destructive Testing, for identifying defects in weld. When the X-ray is
passed through the weld object, the area where the defects are occurred will be
having different intensity profile, than the nearby pixels. Most of the X-ray
radiographic images will be having some forms of noise components embedded in
it. Median filter is applied for noise removal, followed by gamma correction for
image enhancement which made the image more operative. For the segmentation of
the weld defect, watershed method is performed. Through watershed segmentation
process, the defective regions are segmented out, without oversegmentation
problem. Standard derivation and mean of the Projection Profile of the
radiographic image along with RST invariants features are used for feature
extraction. In this work, we fed the feature extracted to a Learning Vector
Quantization (LVQ) for training, with four different output classes, where each
class corresponds to different classes or types of weld defects like Cluster
Porosity, Slag inclusions, Lack of Penetration (LOP) and Burn-Through. The
result shows that the proposed system is highly efficient in classifying
different types of weld defects. |
Keywords |
Weld defects, Radiography, Learning Vector
Quantization (LVQ), Watershed, RST invariant |
Full Text |
|
Paper ID: |
14675
-JATIT |
Title: |
ASSOCIATION RULE MINING AND CLASSIFIER
APPROACH FOR QUANTITATIVE SPOT RAINFALL PREDICTION |
Author: |
T.R. SIVARAMAKRISHNAN, S. MEGANATHAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 173 - 177 Vol 34. No. 2 -- 2011 |
Abstract |
Rainfall prediction is usually done for a
region but spot quantitative precipitation forecast is required for individual
township, harbours and stations with vital installation. A methodology using
data mining technique has been tried for a coastal station, Cuddalore in East
Coast of India and the results are presented here. The method gives good result
for the prediction of daily rainfall 24 hours ahead. There are three main parts
in this work. First, the obtained raw data was filtered using discretization
approach based on the best fit ranges. Then, association mining has been
performed on dataset using Predictive Apriori algorithm. Thirdly, the data has
been validated using K* classifier approach. Results show that the overall
classification accuracy of the data mining technique is satisfactory. |
Keywords |
Predictive Apriori Algorithm, K*
Algorithm, Classification, Association Mining, Rainfall Prediction |
Full Text |
|
Paper ID: |
14670
-JATIT |
Title: |
AN OVERVIEW OF PREPROCESSING OF WEB LOG
FILES FOR WEB USAGE MINING |
Author: |
C.P. SUMATHI, R. PADMAJA VALLI , T.
SANTHANAM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 178 - 185 Vol 34. No. 2 -- 2011 |
Abstract |
With the Internet usage gaining popularity
and the steady growth of users, the World Wide Web has become a huge repository
of data and serves as an important platform for the dissemination of
information. The users; accesses to Web sites are stored in Web server logs.
However, the data stored in the log files do not present an accurate picture of
the users; accesses to the Web site. Hence, preprocessing of the Web log data is
an essential and pre-requisite phase before it can be used for
knowledge-discovery or mining tasks. The preprocessed Web data can then be
suitable for the discovery and analysis of useful information referred to as Web
mining. Web usage mining, a classification of Web mining, is the application of
data mining techniques to discover usage patterns from clickstream and
associated data stored in one or more Web servers. This paper presents an
overview of the various steps involved in the preprocessing stage. |
Keywords |
Web Server, Data Cleaning, User
Identification, Session Identification, Path Completion |
Full Text |
|
Paper ID: |
14677
-JATIT |
Title: |
EMPLOYING PERFORMANCE COUNTERS AND
SOFTWARE WRAPPER FOR MEASURING QOS ATTRIBUTESOF WEB SERVICES |
Author: |
BAHAREH SADAT ARAB, ABDUL AZIM ABD GHANI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 186 - 194 Vol 34. No. 2 -- 2011 |
Abstract |
Web services have got popular for
developing Service-Oriented Architectures recently. As several web services are
available to execute the same function, Quality of Service (QoS) turns into a
discriminative factor which is significantly considered in service selection and
service composition approaches. In different approaches, monitoring of services
is used for evaluating QoS attributes. Custom Windows Performance Counters (CWPC)
is one of the approaches for monitoring performance of services at server-side.
However, it has some limitations and it needs to access and change a service
implementation which is not always possible in practice. In this paper, CWPC
along with software wrapper is employed for measuring different QoS attributes
such as response time, throughput and reliability in order to overcome current
limitations. Additionally, it discusses how the proposed monitoring mechanism
can be employed to optimize the service provider performance. The results show
that the proposed monitoring approach is accurate in measuring QoS attributes. |
Keywords |
SOA, Web Service; Monitoring; Quality Of
Service; Qos Measurement; Performance Counter; Software Wrapper |
Full Text |
|
Paper ID: |
14733
-JATIT |
Title: |
FUSION USING QUASILINEARIZATION TECHNIQUE
FOR THE LIKELIHOOD RATIO BASED T2TA IN MULTI RADAR DATA FUSION |
Author: |
J.VALARMATHI, D.S.EMMANUEL, S.CHRISTOPHER |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 195 - 201 Vol 34. No. 2 -- 2011 |
Abstract |
Data fusion techniques combine data from
multiple sensors, and related information from associated databases, to achieve
improved accuracies and more specific inferences than could be achieved by the
use of a single sensor alone. This paper presents the fusion using the
generalized quasilinearization technique to obtain a monotone sequence of
iterates, converging uniformly for the tracks, obtained after association.
Likelihood ratio based cost for association with kinematic information [1] is
used for track-to-track association (T2TA). These associated tracks and the
fused track are smoothened using Kalman filter (KF). Simulated results through
MATLAB are compared with the state vector fusion technique. The main advantage
of the proposed method is that fusion follows the actual track where as
conventional method results are based on the Kalman estimates. |
Keywords |
Quasilinearization Technique, Likelihood
Ratio, T2TA, Kalman Filter |
Full Text |
|
Paper ID: |
14743
-JATIT |
Title: |
LIGHTNING STRIKE MAPPING FOR PENINSULAR
MALAYSIA USING ARTIFICIAL INTELLIGENCE TECHNIQUES |
Author: |
M.K.HASSAN, R. Z. ABDUL RAHMAN, A..CHE .SOH.,
M.Z.A..AB KADIR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 202 - 214 Vol 34. No. 2 -- 2011 |
Abstract |
This research focuses on artificial
intelligence (AI) techniques on mapping the lightning strike area in Peninsular
Malaysia. Three AI techniques such as fuzzy logic, neural network and neuro-fuzzy
techniques are selected to be explored in classifying the characteristics of
lightning strike which are based on; level of strike (high, medium, low) and
category of lightning (positive cloud-to-ground, negative cloud-to-ground,
flash). Nine predefined areas in Peninsular Malaysia were chosen as a case
study. The analysis was carried out according to twelve months lightning data
strikes which had been made available by Global Lightning Network (GLN). All
three AI techniques have successfully demonstrated the ability to mapping and
classify lightning strikes. Each technique has shown very good percentage of
accuracy in term of determining the area and characterizing the lightning
strikes. The finding of this research can be made use in risk management
analysis, lightning protection analysis, township planning projects and the
like. |
Keywords |
Lightning Strike, Classification, Fuzzy
Logic, Neural Network, Neuro-Fuzzy |
Full Text |
|
Paper ID: |
14681
-JATIT |
Title: |
THE DESIGN OF BLOCK-BASED MASHUP TOOL FOR
END-USERS MASHUP APPLICATIONS DEVELOPMENT |
Author: |
RODZIAH LATIH, 2AHMED PATEL, 3ABDULLAH
MOHD. ZIN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 215 - 225 Vol 34. No. 2 -- 2011 |
Abstract |
A mashup application is a web application
that combines contents from several sources into an integrated web experience A
mashup tool is a software tool to assist users in developing web mashup
application. Most of these tools are developed by employing end-users
development approaches such as scripting, wire, widget, spreadsheet, and
Programming by Demonstration. However, although these tools are based on
end-users development approaches, they are still difficult to be used by most of
end-users since they require end-users to have some programming background. In
this paper, we present the design of Whip mashup tool. The aim of this mashup
tool is to allow end-users to develop web mashup application easily by using
Block-Based Software Development approach. This development approach enables
end-users to develop software or web applications by combining several
programming blocks together. |
Keywords |
Web Mashup, Block-Based Software
Development, End User Development, Web Services Aggregation |
Full Text |
|
Paper ID: |
14634
-JATIT |
Title: |
A FUZZY-FAULT CLASSIFIER SYSTEM FOR
MALFUNCTION TRAFFIC LIGHT SYSTEM CLASSIFICATION |
Author: |
AZURA CHE SOH, MOHD KHAIR HASSAN, RIBHAN
ZAFIRA ABDUL RAHMAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 226 - 240 Vol 34. No. 2 -- 2011 |
Abstract |
The fuzzy-fault classifier (FFC) is a
method which is employed as a subsystem in fault detection system. The system is
normally utilized in a large and complex traffic light management system. This
paper proposes a FFC system to classify the level of seriousness for traffic
light failure based on two criteria which is faulty indication and road user
manners. The system has been designed using 2-stage fuzzy approach techniques
with two module classifications. The seriousness of the traffic light failures
are classified to four conditions such as normal, non-critical, critical and
highly-critical and a signal will be sent to the contractor and authority
department via Short Message Service (SMS) for further action. The system has
been testified using simulation and successfully implemented in Kuala Lumpur.
|
Keywords |
Classification, Malfunction Of Traffic
Light, Fuzzy-Fault Classifier, Fuzzy Technique |
Full Text |
|
|
|