|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2012 | Vol. 35 No.1 |
Paper ID: |
14222
-JATIT |
Title: |
NEURO DIRECT TORQUE CONTROL OF PERMANENT
MAGNET SYNCHRONOUS MOTOR WITH GENETIC ALGORITHM SPEED CONTROLLER |
Author: |
A. EL JANATI El IDRISSI, N. ZAHID,
M. JEDRA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 001 - 006 Vol 35. No. 1 -- 2012 |
Abstract |
In recent years, permanent magnet
synchronous motors (PMSM) have gained variety industrial applications, because
of simple structures, high efficiency and ease of maintenance. But these motors
have a nonlinear mathematical model. To resolve this problem several studies
have suggested the application of vector control (VC) and direct torque control
(DTC) with soft-computing (SC) technique. This paper presents neuro direct
torque control (NDTC) of PMSM using genetic algorithm (GA) speed controller. The
proposed method effectiveness has been verified by computer simulations using
Matlab/Simulink®. These results are compared with the ones obtained with a
classical DTC using PI speed controller. |
Keywords |
Permanent Magnet Synchronous Motor, Neuro
Direct Torque Control, Genetic Algorithm |
Full Text |
|
Paper ID: |
14736
-JATIT |
Title: |
SKIN DETECTION IN PORNOGRAPHIC VIDEOS
USING THRESHOLD TECHNIQUE |
Author: |
HAJAR BOUIROUGA, SANAA EL FKIHI, ABDEILAH
JILBAB, DRISS ABOUTAJDINE |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 007 - 019 Vol 35. No. 1 -- 2012 |
Abstract |
Adult classification of images and videos
is one of the major tasks for semantic analysis of visual content. A modern
approach to this problem is introducing a mechanism to prevent objectionable
access to this type of content. In this paper, we propose a real-time system
that can classify input videos into adult or non-adult videos. First, vidéos
were filtered by skin color model using threshold technique. Then, the output
videos are classified by neural network for taken the decision. We notice that
the detection of an adult video is based on the detection of the adult images
that compose the considered video. The simulation shows that this system
achieved 90% of the true rate. |
Keywords |
Skin Detection, Probabilistic Models,
Neuron Networks, Pornographic Images, Descriptors, Video Filtering. |
Full Text |
|
Paper ID: |
14735
-JATIT |
Title: |
TARGET COVERAGE MANAGEMENT PROTOCOL FOR
WIRELESS SENSOR NETWORK |
Author: |
PURNIMA KHUNTIA, PRASANT KUMAR PATTNAIK |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 020 - 025 Vol 35. No. 1 -- 2012 |
Abstract |
One of the major challenges of Wireless
Sensor Network is Target Coverage Problem which is concerned with random
deployment of sensor nodes for monitoring the specific targets for maximum
duration. These small sized sensor nodes have limited resources in terms of
energy, memory, computational speed and bandwidth; and can’t withstand extreme
environmental conditions. Therefore, more number of sensor nodes are deployed
than the specific requirements in order to improve fault tolerance of the sensor
network. However, this high redundancy of sensor nodes can lead to excessive
energy wastage. Since the nodes have limited energy resources and each sensor
node requires a specific amount of energy to monitor a target, judicious energy
management becomes an important concern of the Target Coverage Problem. In this
paper we propose a protocol for Target Coverage Management with the aim to
minimize consumption of energy. |
Keywords |
Wireless Sensor Network, Target Coverage,
Energy Conservation |
Full Text |
|
Paper ID: |
14546
-JATIT |
Title: |
NONLINEAR MPPT CONTROL OF SQUIRREL CAGE
INDUCTION GENERATOR-WIND TURBINE |
Author: |
M. BENCHAGRA, M. MAAROUFI. M. OUASSAID |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 026 - 033 Vol 35. No. 1 -- 2012 |
Abstract |
This paper presents a nonlinear control
method to track the maximum power point of wind turbine equipped with Squirrel
Cage Induction Generator (SCIG). Since the mechanical power of wind turbine is
function of its shaft speed at a given wind velocity, the proposed controller
provides the desired voltage at the output of Voltage Source Converter (VSC) so
as to control the generator speed and then extracting maximum power from wind.
The controllers exploit the backstepping scheme to calculate the required
converter’s control to eliminate the instantaneous errors of mechanical speed
and flux. The proposed control laws are derived from the Lyapunov approach which
is well suited for this nonlinear system. Finally, the simulation results verify
the stability and effectiveness of the control strategy proposed. |
Keywords |
Wind Power, SCIG, VSC, Nonlinear Control,
Backstepping Controller, Lyapunov Approach, MPPT |
Full Text |
|
Paper ID: |
14695
-JATIT |
Title: |
A SOFTWARE APPLICATION FOR UNIVERSITY
STUDENTS RESULTS PROCESSING |
Author: |
EYO O. UKEM, FRANCIS A. OFOEGBU |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 034 - 043 Vol 35. No. 1 -- 2012 |
Abstract |
The end-of-course grades assigned by
lecturers are intended to convey the level of achievement of each student in the
class. These grades are used to make a multitude of decisions. Unless a
sufficiently accurate and efficient method is used for the grading, the grades
are apt to convey misinformation and lead the decision-maker astray. In itself,
the processing of results is found to be rather tedious, especially when carried
out manually, and when the number of students is large. It is time-consuming and
error prone. The process, however, becomes a lot easier and much more accurate
when carried out with a computer running a suitable software application. To
find a sufficiently fast and accurate method of carrying out this processing is
a problem that is both challenging and interesting. In this work, a computer
software application was developed to facilitate the automated processing of the
results. The software was developed in Java programming language in the form of
a database, employing MYSQL Relational Database Management System. The developed
software performed well and produced expected results on completion. With it, it
was possible to compute Grade Point Average and Cumulative Grade Point Average
for each student based on examination scores entered. |
Keywords |
Examination Scores, Automated Processing,
Cumulative Grade Point Average, Software Application, Results Grading, Database |
Full Text |
|
Paper ID: |
14731
-JATIT |
Title: |
HARMONIC REDUCTION IN HYBRID FILTERS FOR
POWER QUALITY IMPROVEMENT IN DISTRIBUTION SYSTEMS |
Author: |
T. NAGESWARA PRASAD, V. CHANDRA
JAGAN MOHAN, DR. V.C. VEERA REDDY |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 044 - 055 Vol 35. No. 1 -- 2012 |
Abstract |
A flexible and versatile solution to
voltage quality problems is offered by active power filters. Currently they are
based on PWM converters and used to connect to low and medium voltage
distribution system in shunt or in series. Active power filters can perform one
or more of the functions required to compensate power systems in improving power
quality. Hybrid Filter, which is a combination ofan active series filter and
passive shunt filter is quite popular because the solid-state devices used in
the active series part can be of reduced size and cost (about 5% of the load
size) and the major part of the hybrid filter is made of the passive shunt L-C
filter used to eliminate lower order harmonics. It has the capability of
reducing voltage and current harmonics at a reasonable cost. To provide high
power quality at the Point of Common Coupling (PCC) of power distribution
systems, elimination of the harmonics is indispensably necessary. The power
quality and allowable Harmonic levels in power system are defined by
International standards (like IEEE-519-1992, IEC-61000). Hence, it is invariably
necessary to design filters meeting the said International standards. Harmonics
in hybrid filters can be reduced by using multilevel inverter. A seven level
cascaded multilevel is used in the present work to mitigate the harmonics in
Hybrid filter. The simulation results of the same are presented in this paper
for a distribution system of voltage 11KV. |
Keywords |
Hybrid Filters, Harmonic Reduction, Multilevel Inverter, Power
Quality, Cascaded Multilevel Inverter |
Full Text |
|
Paper ID: |
14565
-JATIT |
Title: |
ON THE THREE LEVELS SECURITY POLICY
COMPARISON BETWEEN SVM AND DECISION TREES |
Author: |
A. RADI, A. KARTIT, D. ABOUTAJDINE, B.
REGRAGUI, M. EL MARRAKI, A.RAMRAMI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 056 - 068 Vol 35. No. 1 -- 2012 |
Abstract |
The omnipresence of the computer system
tools intensified every year in all companies. They integrate equipments, data
and services that constitute a wealth to protect. Lot of mechanisms have been
developed to assure the computer systems security. Conventional intrusions
detection systems “IDS” have shown their insufficiencies and limits. To improve
computer systems security approach, in our previous articles, we have proposed
an exact algorithm for the deployment of security policies for single computer
systems [1] and an enhanced three levels security policy for complex computer
systems [2], However, manual analysis of the huge volume of data generated,
audit data, is usually impractical. To overcome this problem and evaluate our
system proposed in [2], we use Support Vector Machines (SVM) which becomes one
of the most important techniques for anomaly intrusion detection due to their
good generalization nature and the ability to overcome the curse of
dimensionality [3, 4] with applications involve large number of events as well
as large number of features.
Experimental analysis and comparison shows that our proposed system in [2]
outperformed other recent systems [5, 6] in precision, computation time, false
positive and false negative rate. |
Keywords |
Intrusions Detection, Security Policy,
Support Vector Machine, Principal Component, Feature Selection, False Negative,
False Positive |
Full Text |
|
Paper ID: |
14719
-JATIT |
Title: |
ANALYSIS AND IMPLEMENTATION OF ALGORITHM
CLUSTERING AFFINITY PROPAGATION AND K-MEANS AT DATA STUDENT BASED ON GPA AND
DURATION OF BACHELOR-THESIS COMPLETION |
Author: |
R.REFIANTI, A.B. MUTIARA, A. JUARNA, S.N.
IKHSAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 069 - 076 Vol 35. No. 1 -- 2012 |
Abstract |
Effectiveness and accurate results from an
algorithm has always been a basic reference for every step taken in the use and
utilization of algorithm, which is expected to achieve optimal results both in
quality and quantity. In order to realize the level of accuracy and
effectiveness from the program, it would require an algorithm that can minimize
error and faster in data processing rate compared with existing algorithm In
this paper, we have compared two algorithms, namely Affinity Propagation and
K-Means, at data student based on GPA and Duration of Bachelor-Thesis
Completion. The results show that Affinity propagation gives the result of data
cluster more accurate and effective than K-Means, it can be seen from the
testing table which showing that the value of affinity propagation exemplar has
not changed at all after five trials. While K-Means, gives values of its
centroid are different after five trials. And at the data students itself, it
show that there is a relationship between GPA and Duration of Bachelor-Thesis
completion in Gunadarma University students, it can be seen from the results of
data clustering, that is for student who have GPA above 3 to 4 have a tendency
to finish their Bachelor-Thesis faster, which is less than 1 until 2 semesters.
While other students who have GPA less than 3 have a longer time to finish their
Bachelor-Thesis, within a period of 2 until more than 4 semesters. |
Keywords |
Data Clustering, Affinity Propagation, K-Means, GPA, Thesis, Gunadarma
University |
Full Text |
|
Paper ID: |
14740
-JATIT |
Title: |
NETWORK MOBILITY (NEMO) SECURITY: THREATS
AND SOLUTIONS |
Author: |
M. DINAKARAN, Dr. P. BALASUBRAMANIE |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 077 - 082 Vol 35. No. 1 -- 2012 |
Abstract |
The success of mobile communication, shows
that the interest in users to access the Internet or their official networks on
the move. This mobility support may be needed for a single user or group of
nodes called as movable sub networks. Network Mobility (NEMO) protocol developed
by IETF enables the mobile nodes and networks to maintain connectivity to their
network or Internet by change their point of attachment to from one access
network to another. NEMO is an extension of Mobile IPv6, this works based on
tunneling the data from home agent to mobile router. The Quality of Service
provided by the NEMO is measured based on the routing mechanism it operates,
hand off latency and the way of secured data transfer. Though the tunneling
process ensures the security of data, the various nodes involved in NEMO are
vulnerable as the network is wireless without a proper infrastructure. This
article presents a survey on possible threats and solutions for NEMO protocol
and its extensions. |
Keywords |
Network Mobility (NEMO), MIPv6, Security |
Full Text |
|
Paper ID: |
14754
-JATIT |
Title: |
ECONOMIC IMPACT OF HYBRID DISTRIBUTED
GENERATION IN AN ELECTRICAL DISTRIBUTION SYSTEM |
Author: |
J.A.BASKAR, R.HARIPRAKASH, M.VIJAYAKUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 083 - 091 Vol 35. No. 1 -- 2012 |
Abstract |
Distributed generation (DG) systems have
attracted increased interest due to ever increasing energy consumption, rising
public awareness of environmental protection, and steady progress in power
deregulation. Different renewable energy sources in the distribution system are
integrated through an AC bus. Dynamic models for the main system components,
namely, wind energy conversion system (WECS), PV energy conversion system (PVECS),
fuel cell, electrolyzer, power electronic interfacing circuits, battery,
hydrogen storage tank, gas compressor and gas pressure regulator, are developed
earlier. Based on the dynamic component models, a simulation model for the
proposed hybrid energy system has been developed using HOMER (Hybrid
Optimisation Model for Electric Renewables). The overall energy management
strategy for coordinating the power flows among the different energy sources is
presented with cost-effective approach. |
Keywords |
Distributed Generation, Hybrid Energy
System, Electrical Distribution System, HOMER |
Full Text |
|
Paper ID: |
14728
-JATIT |
Title: |
THE APPLICATION OF INTERPRETIVE STRUCTURAL
MODELING METHOD TO DEVELOP VERITY DESIGN SOLUTION OF CASE HOST PREFERENCE-BASED
PRODUCTS: A CASE STUDY OF RAZOR |
Author: |
CHUNWEI CHEN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 092 - 099 Vol 35. No. 1 -- 2012 |
Abstract |
The purpose of this study is to test the
feasibility of applying an interpretive structural modeling (ISM) method for
case hosts to develop verity design solution of case host preference-based
products. In the early design concept stage of the product development,
designers often need to create many ideas as the case of products for the main
idea of what case the host wants. Hence, a conversion approach that can provide
multiple design solutions meet case host’s requirements is needed. This study
presents an ISM method for developing verity design solution of case host
preference-based products. A razor will be used as the test case. The
experimental results from this study provide product designers with a new design
approach for developing verity design solution of case host preference-based
product. |
Keywords |
User Requirements, User-Centered Design,
Product Design, ISM |
Full Text |
|
Paper ID: |
14726
-JATIT |
Title: |
DEVELOPMENT MOBILE ROBOT CONTROL
ARCHITECTURE WITH INTEGRATED PLANNING AND CONTROL ON LOW COST MICROCONTROLLER |
Author: |
SITI NURMAINI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 100 - 111 Vol 35. No. 1 -- 2012 |
Abstract |
This paper presents new hybrid control
architecture-based interval type-2 nuro-fuzzy (IT2NF) for embedded mobile robot
navigation where event-driven control is used to handle the dynamically changing
of the environment. The proposed hybrid control architecture combining
behavior-based reactive navigation and model-based environmental classification
has been developed. Weightless neural network (WNNs) in charge of environmental
classification, this strategy does not only enable the mobile robot to avoid
local minimum points but also eliminates the requirement for prior detailed
modeling of the environment. Then, IT2FLC based reactive behavior is utilized to
perform mobile robot navigation task use environmental pattern classification.
The previous study show that embedded controller on low cost microcontroller is
difficult to design due to hardware and software constraints. In this paper, the
hybrid control architecture uses hierarchical structure of IT2 fuzzy sets
(IT2FS) to avoid the huge rule base due to the embedded platform and modular
structure of WNNs to reduce the computational cost and increases processing
speed of the controller. Technologies to address these limitations are
integrated into hybrid controller architecture to be carried out, thus the
autonomous mobile robot navigation system can be executed successfully.
Flexibility and performance of the proposed control architecture is validated
through experiments on the real embedded mobile robot in a variety of
environmental condition. The experimental results show that, the proposed
architecture-based IT2NF has dealt in real environment with uncertainties
present in the changing and unstructured environments can avoid obstacles at the
desired safe distance, follow the desired trajectory in smooth movement and
produces minimal computational resources. |
Keywords |
Mobile Robot, Control Architecture, Soft Computing, Low Cost |
Full Text |
|
Paper ID: |
14756
-JATIT |
Title: |
MATHEMATICAL MODEL AND CALCULATION OF SS7
RELIABILITY |
Author: |
THUNEIBAT S. A. |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 112 - 118 Vol 35. No. 1 -- 2012 |
Abstract |
In this paper, a mathematical model of
signaling system seven (SS7) reliability over packet transmission system is
developed. The error control model is presented and the SS7 events, states and
probabilities are also explained. An expression is derived for all modeled
probabilities using transition probability matrix. The reliability parameters
are calculated with respect to the derived probabilities of the model and
results are critically analyzed and presented for the same. |
Keywords |
Mathematical Modeling, SS7 Signaling,
Error Control, Reliability, SS7 Probabilities and states |
Full Text |
|
Paper ID: |
14727
-JATIT |
Title: |
PRINTED TAPERED COMPACT UWB ANTENNA WITH
SINGLE BAND NOTCH CHARACTERISTICS |
Author: |
D.THIRIPURASUNDARI, D.S.EMMANUEL |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 119 - 125 Vol 35. No. 1 -- 2012 |
Abstract |
A simple and compact microstrip line -fed
ultrawideband planar monopole antenna with single band-notch characteristics is
presented. Wide impedance bandwidth is achieved by inserting two rectangular
slots on both sides of the microstrip feed line on the ground plane. Band
notching is achieved by embedding a half wavelength C shaped slot on the
radiator. The antenna is investigated numerically and validated experimentally
for impedance matching, frequency notch characteristics and radiation
performance. The designed antenna has a compact size of 18 19 mm2 and operates
over the frequency band between 3.1-12 GHz for VSWR < 2 while demonstrating band
rejection performance in the frequency band of 5 to 6 GHz. The antenna exhibits
omni directional characteristics with average gain of 2.26 dB. |
Keywords |
Compact, Microstrip Line Feed, Slot, UWB
Antenna |
Full Text |
|
Paper ID: |
14393
-JATIT |
Title: |
SPACE VECTOR MODULATION & FUZZY PID SPEED
CONTROLLER FOR DIRECT TORQUE CONTROL INDUCTION MOTOR DRIVE |
Author: |
CHANDRA SEKHAR O, CHANDRA SEKHAR K |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 126 - 134 Vol 35. No. 1 -- 2012 |
Abstract |
This paper shows the application of fuzzy
PID control technique to reduce torque ripple in an induction motor employing
Direct Torque Control (DTC). The performance of the proposed drive system is
evaluated through digital simulation using MATLAB-SIMULINK package. The
simulation results clearly depict the superiority of devised method over the SVM
- DTC. |
Keywords |
Fuzzy Logic Control (FLC), Direct Torque Control, Induction
Motor, Membership Function, Space Vector Modulation |
Full Text |
|
|
|