|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines encompassing the most basic research to the most innovative technologies. Please submit your papers electronically to our submission system at http://jatit.org/submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal identifiable information in the manuscript before submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January
2012 | Vol. 35. No.2 |
Paper ID: |
14783 -JATIT |
Title: |
ONTOLOGY MAPPING FOR INTEROPERABILITY
REPRESENTATIONS IN HOTEL DOMAIN |
Author: |
A. JUARNA, R. REFIANTI, A.B. MUTIARA, D.I.
PRATIWI |
Source: |
Journal of Theoretical and Applied
Information Technology pp 135 -
140 Vol 35. No. 2 -- 2012 |
Abstract |
With the development of information
technology today is the nature of today's information is also experiencing
growth. These developments encourage a more dynamic source of information,
autonomy, variety and large. Diversity occurs not only at the technical level
but also at the level of representation of information. This difference can
occur at syntactic, schematic and semantic level. This diversity also occurs in
the hotel domains that do not have a standard that refers to the tourism domain.
The existing traditional methods have not been able to overcome the problem of
diversity to achieve interoperability in heterogeneous data sources. So with
this method the obtained results are not necessarily relevant to the user
wishes. One of the most viable approaches is the creation “Query Rewriting”
based on ontology and mapping. As a mapping approach it is used GLAV
(Global-Local-As-View) which is a combination of approaches GAV (Global-As-View)
and LAV (Local-As-View). While the diversity of existing terminology in each
source of data for specific domains basically state the same meaning as defined
in the common ontology. In this paper it will be explained the illustrations of
“Query Re-writing” and the steps to create mappings for the hotel domain using
the Protege 3.4 as tool. |
Keywords |
Interoperability, Mapping, Common
Ontology, Semantic web, Query re-writing |
Full Text |
|
Paper ID: |
14730 -JATIT |
Title: |
AN EFFICIENT METHOD TO IMPROVE THE SPATIAL
PROPERTY OF MEDICAL IMAGES |
Author: |
M.MALINI DEEPIKA, Dr.V.VAITHYANATHAN |
Source: |
Journal of Theoretical and Applied
Information Technology pp
141 - 148 Vol 35. No. 2 -- 2012 |
Abstract |
Now a days clinical diagnosis is emerging
with digital images. In this paper we have dealt with computed tomography (CT),
positron emission tomography (PET) and Magnetic Resonance Image (MRI). Where CT
is rich in denser tissue with less distortion. PET with border of anatomical
structure are blurred. MRI image has the complementary property, which provides
better information on soft tissues but with more distortion. By combining any of
these two complementary images we end up with new image which contains denser
tissue with lesser distortion. For this process we use Nonsubsampled Contourlet
Transform to decompose the images and Pulse Coupled Neural Network is used to
motivate the lower frequency pixels. Thereby the fused image’s spatial property
is improved. The exact edges of the fused images are found by applying it to a
canny edge detection method to find tumour present in the FUSED image. |
Keywords |
Computed Tomography (CT), Magnetic
Resonance Image (MRI), Nonsubsampled Contourlet Transform (NSCT), Pulse Coupled
Neural Network (PCNN) |
Full Text |
|
Paper ID: |
14434 -JATIT |
Title: |
A MODIFIED CRYPTO SCHEME FOR ENHANCING
DATA SECURITY |
Author: |
MANIKANDAN.G, RAJENDIRAN.P, CHAKARAPANI.K,
KRISHNAN.G, SUNDARGANESH.G |
Source: |
Journal of Theoretical and Applied
Information Technology pp
149 - 154 Vol 35. No. 2 -- 2012 |
Abstract |
On considering the current scenario, Most
of the existing systems which offer security to a network or web or to a data
are vulnerable to attacks and they are breached at some point of time by
effective cryptanalysis, irrespective of its complex algorithmic design. In
general, today’s crypto world is restricted to a practice of following any one
single encryption scheme and that too for a single iteration on a single file
basis. This is evident in the 99% of the encryption-decryption cases. So, A need
for “practically strong and infeasible to get attacked” technique becomes vital.
In this paper, we propose a Software tool which involves Cryptographic
enciphering and deciphering along with File Splitting and Merging mechanisms. We
used modified Blowfish algorithm for Encryption and Decryption of data. Though
we use only one algorithm, we differentiate the cryptographic scheme by varying
the key for varying file slices. Our results clearly justifies that our tool
serves as a better solution both in terms of performance as well as security. |
Keywords |
Cryptography, File Slicing, Modified
Blowfish Algorithm, Security |
Full Text |
|
Paper ID: |
14555 -JATIT |
Title: |
A NOVEL APPROACH TO GENERATE WATERMARKS
USING AUDITORY FEATURES FOR AUDIO WATERMARKING |
Author: |
TRIBHUWAN KUMAR TEWARI, VIKAS SAXENA,
J.P GUPTA |
Source: |
Journal of Theoretical and Applied
Information Technology pp
155 - 162 Vol 35. No. 2 -- 2012 |
Abstract |
The increasing number of problems related
to the ownership protection of the multimedia content & its authentication due
to digital revolution had lead to evolution of digital watermarking techniques.
Digital watermarking provides a viable solution in minimizing this problem and
boosting the confidence among multimedia content i.e. text, image, video, audio
providers to make available there content on a public domain. But the watermarks
used in most of the watermarking methods are not personalized or unique because
of which the problem of ambiguity arises if same watermark is used by two
individuals. In this paper we propose a novel method to generate a unique
personalized watermark which can act as authenticating information for any
watermarking algorithm specially targeting an audio. The watermarks are
generated through feature vectors extracted from the speech of an individual
which are unique for a particular person. The uniqueness of the watermark is
shown through exhaustive experiments. |
Keywords |
Intellectual Property Rights (IPR), Audio
Watermarking, Digital Right Management (DRM), Feature Extraction, Personalized
Watermarks, Security) |
Full Text |
|
Paper ID: |
14650 -JATIT |
Title: |
A THEORETICAL PREDICTION OF USERS IN WCDMA
INTERFERENCE |
Author: |
JRAIFI ABDELOUAHED |
Source: |
Journal of Theoretical and Applied
Information Technology pp163
- 168 Vol 35. No. 2 -- 2012 |
Abstract |
The major problem that we are faced too in
wireless systems is the interference. This problem contributes in limiting the
performance of cellular networks. In 3G, Wide Code Division Multiple Access (WCDMA)
techniques play an important role. WCDMA is defined as a digital cellular
wireless technique that uses the method of spread spectrum to convert a digital
narrow radio signal to a wide radio signal. Among the popular civilian
techniques that use spread spectrum communications, we find Code Division
Multiple Access (CDMA). In this paper, we study the cochannel interference that
affects the system performance. Also,the different causes of interference are
identified. By adopting microzoning architecture, we have developed an
analytical expression of the ratio Signal to Noise (SNR). Then, we used this
result to predict some parameters. By fixing the SNR variable to a specific
value, we extract easily information on the optimal numbers of users. |
Keywords |
WCDMA, Interference, Wireless Systems,
Cellular System, 3g. |
Full Text |
|
Paper ID: |
14729 -JATIT |
Title: |
PATTERN VISUALIZATION ON METEOROLOGICAL
DATA FOR RAINFALL PREDICTION MODEL |
Author: |
S. MEGANATHAN , T.R. SIVARAMAKRISHNAN |
Source: |
Journal of Theoretical and Applied
Information Technology pp169
- 174 Vol 35. No. 2 -- 2012 |
Abstract |
Regional rainfall forecast is an important
task for meteorologists. While statistical methods are usually in vogue, for
this, the concept of data mining is applied to see the efficacy. The objective
of this work is to develop a forecast method for the rainfall of the Northeast
(NE) season over the Cauvery delta region of South India. There are three main
parts in this work. The first part is in loading the meteorological data into
centralized server so that it can be extracted and filtered according to our
needs. Secondly, graphical visualization has been applied by using gnuplot. And
finally the association rules have been mined from those former outputs. From
these results we can assess the monthly and seasonal rainfall for the future.
Results show that overall accuracy of this approach is satisfactory. |
Keywords |
Association Rule, Data Mining, Rainfall
Prediction, Gnuplot. |
Full Text |
|
Paper ID: |
14734 -JATIT |
Title: |
A HYBRID SCHEMA ZONE-BASED KEY MANAGEMENT
FOR MANETS |
Author: |
THAIR KHDOUR, ABDULLAH AREF |
Source: |
Journal of Theoretical and Applied
Information Technology pp
175 - 183 Vol 35. No. 2 -- 2012 |
Abstract |
As various applications of wireless ad hoc
network have been proposed, security has become one of the big research
challenges and is receiving increasing attention Securing communications in
resource constrained, infrastructure-less environments such as Mobile Ad Hoc
Networks (MANETs) is very challenging. Cryptographic techniques are widely used
for secure communications in wired and wireless networks. Most cryptographic
mechanisms, such as symmetric and asymmetric cryptography, often involve the use
of cryptographic keys. However, all cryptographic techniques will be ineffective
if the key management is weak. The purpose of key management is to provide
secure procedures for handling cryptographic keying materials. The tasks of key
management include key generation, key distribution, and key maintenance. In
MANETs, the computational load and complexity for key management are strongly
subject to restriction by the node's available resources and the dynamic nature
of network topology. A number of key management schemes have been proposed for
MANETs. In this paper, we present a survey of the research work on key
management in MANETs according to recent literature then we propose a zone based
variant of the recently proposed cluster-based hybrid schema, with an attempt to
keep the advantages of the hybrid schema. |
Keywords |
Mobile Ad Hoc Networks (MANETs), Key
Management, Zone-Based Key Management, Hybrid Schema. |
Full Text |
|
Paper ID: |
14721 -JATIT |
Title: |
BANDWIDTH ENHANCEMENT TECHNIQUES
COMPARISON FOR ULTRA WIDEBAND MICROSTRIP ANTENNAS FOR WIRELESS APPLICATION |
Author: |
MAMDOUH GOUDA MOHAMMED Y. M. YOUSEF |
Source: |
Journal of Theoretical and Applied
Information Technology pp
184 - 193 Vol 35. No. 2 -- 2012 |
Abstract |
Since the release by the Federal
Communications Commission (FCC) of a bandwidth of 7.5GHz (from 3.1GHz to
10.6GHz) for ultra-wideband (UWB) wireless communications, UWB is rapidly
advancing as a high data rate wireless communication technology. As is the case
in conventional wireless communication systems, an antenna also plays a very
crucial role in UWB systems. However, there are more challenges in designing a
UWB antenna than a narrow band one. A suitable UWB antenna should be capable of
operating over an ultra-wide bandwidth as allocated by the FCC. At the same
time, satisfactory radiation properties over the entire frequency range are also
necessary. To choose an optimum antenna topology for ultra wideband (UWB)
design, several factors must be taken into account including physical profile,
compatibility, impedance bandwidth, radiation efficiency, and radiation pattern.
The main challenge in UWB antenna design is achieving the very broad bandwidth
with high radiation efficiency and small in size. Accordingly, many techniques
to broaden the impedance bandwidth of small antennas and to optimize the
characteristics of broadband antennas have been widely investigated in many
published papers as listed in this article. Planar monopole antennas are good
candidates owing to their wide impedance bandwidth, omni-directional radiation
pattern, compact and simple structure, low cost and ease of construction.
Further detail on various bandwidth enhancement techniques will be discussed in
this paper. This paper focuses on UWB planar printed circuit board (PCB) antenna
design and analysis. Extensive investigations are carried out on the development
of UWB antennas from the past to present. First, the planar PCB antenna designs
for UWB system is introduced and described. Next, the special design
considerations for UWB antennas are summarized. State-of-the-art UWB antennas
are also reviewed. Finally, a new concept (case studies) for the design of a UWB
antenna with a bandwidth ranging from 3GHz-8GHz is introduced, which satisfies
the system requirements for S-DMB, WiBro, WLAN, CMMB and the entire UWB . |
Keywords |
Microstrip antenna, Wide Band, Ultra Wide
Band. |
Full Text |
|
Paper ID: |
14722 -JATIT |
Title: |
SATELLITE TIME CODE FORMAT GENERATION AND
INTERFACING TO COMPUTER WITH RS-232 USING UART DEVELOPED IN VHDL |
Author: |
DUDDU PRADEEP KUMAR, A.V.V. PRASAD, S.
YUGANDHAR REDDY, R. SEETHA LAKSHMI, P. SWAMINATHAN |
Source: |
Journal of Theoretical and Applied
Information Technology pp
194 - 200 Vol 35. No. 2 -- 2012 |
Abstract |
National Remote Sensing Center (NRSC)
receives data from different remote satellites like IRS-P6, IRS-P5, Cartosat-2,
Cartosat-2a, etc., and processes it depending on the user requirements. The
satellite data received in X band is in a particular data format. This data has
to be frame synchronized using a special hardware. This hardware needs time
information in a special format. This time information is added in every line by
the frame synchronization hardware. In the proposed project VHDL code has been
developed for the generation of time in days, hours, minutes, seconds,
milliseconds, microseconds structure in a BCD format. Computer will provide the
start time. This time will be interfaced to the developed hardware using the
UART developed within the ALTERA EPLD. The time increments will be displayed on
HP display devices. The developed hardware will continuously increment from the
start time provided by the computer at an interval of 1micro second. This
project has been implemented and tested using the ALTERA EPLDs. This needs RS232
settings like baud rate, parity, start bits, stop bits, etc., must be programmed
as per the requirement. The hardware required for this has been implemented on
the wire-warp board. |
Keywords |
Very High Speed Integrated Circuit
Hardware Description Language (VHDL), Binary Coded Decimal (BCD), Universal
Asynchronous Receiver and Transmitter (UART), Electrically Programmable Logic
Device (EPLD) |
Full Text |
|
Paper ID: |
14747 -JATIT |
Title: |
DEVELOPMENT OF SMART FIREWALL LOAD
BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL
RULE SET |
Author: |
R. BALA KRISHNAN, Dr. N. K. SAKTHIVEL |
Source: |
Journal of Theoretical and Applied
Information Technology pp
201 - 207 Vol 35. No. 2 -- 2012 |
Abstract |
Firewalls are the devices that we are used
to protect data. It might be configured to allow certain devices or applications
to access our network. The Firewalls are termed as stateful devices. Traditional
firewalls typically need to inspect each packet to ensure that it adheres to the
policy that has been configured or not, and then perform the necessary action
associated to that particular rule. There are various actions and they are
typically allow, deny, or even NAT the packet. Many Personal Computer Operating
Systems include software-based Firewalls to protect against threats from the
public Internet. Existing Firewall Technologies such as Cisco PIX Firewalls and
Checkpoint FireWall-1 provide various software tools that allowing firewalls as
Clustered or Grouped and these Configured Firewalls will share their loads. The
main objectives of these existing technologies are to improve the Resource
Utilization along with performance and Security. But however these techniques
fail to achieve higher performance while focusing resource utilization. This is
one of the serious issues. To address this problem, our research work is
developed and implemented an efficient Adaptive Scheduler, which improves the
network performance in terms of Resource Utilization, Delay and Throughput. This
work also introduced Firewall Reduction Policy, which reduces firewall rules
without compromising Security. From our Experimental results, it is established
that this proposed technique reduces the computational cost, which leads to
higher performance. |
Keywords |
Firewall, Adaptive Scheduler, Resource
Utilization |
Full Text |
|
Paper ID: |
14746 -JATIT |
Title: |
DEVELOPMENT OF AN EFFICIENT DATA MINING
CLASSIFIER WITH MICROARRAY DATA SET FOR GENE SELECTION AND CLASSIFICATION |
Author: |
A. SUMATHI, S. SANTHOSHKUMAR, Dr. N. K.
SAKTHIVEL |
Source: |
Journal of Theoretical and Applied
Information Technology pp
208 - 214 Vol 35. No. 2 -- 2012 |
Abstract |
Microarray sample classification has been
studied extensively using classification techniques in machine learning and
pattern recognition. In a microarray chip, the number of genes available is far
greater than that of samples, which is a serious problem and the gene expression
reduction, is important one. Prior to sample classification, it is important to
perform gene selection and more interpretable genes to be identified as
biomarkers, so that a more efficient, accurate, and reliable performance in
classification can be achieved. For this purpose, a hybrid scheme was proposed
and this scheme is called as Single Filter – Single Wrapper Classifier (SFSW).
In this technique, the Filter approach is used to select the data sets from the
large Microarray and the Wrapper approach is used to classify the gene
expressions from the selected data sets. From the available statistical report,
it is revealed that the Filter method has a fast dimensionality reduction step
for selecting a small set of genes at the cost of accuracy and the Wrapper
method used for improving classification accuracy on this small set of genes at
the cost of computational delay. However this approach also has some problems
such as different filtered subset leads to complex evaluation. Hence an
Efficient Hybrid Classifier called “Multiple-Filter-Multiple-Wrapper Technique”
has been proposed with improved performance of SFSW. The use of Multiple Filters
with different filter metrics ensures that useful biomarkers are unlikely to be
screened out in the initial filter stage. The use of Multiple Wrappers is
intended to optimize the reliability of the classification by establishing
consensus among several classifiers. However, in this research work, we have
identified that the Classification Accuracy of MFMW is poor due to the
consideration of Indecisive Prediction Status. Hence, this Research Work is
introduced an efficient classifier called ICS4-MFMW, which is focusing both the
dimensionality reduction and Indecisive Status. This work is demonstrated its
efficiency in terms of classification accuracy with Sensitivity and Specificity.
From the result, it is revealed that our proposed work perform better as
compared with the existing MFMW Classifier. |
Keywords |
Microarray, Pattern Recognition, Filter,
Wrapper, Classifier, Sensitivity and Specificity |
Full Text |
|
Paper ID: |
14607 -JATIT |
Title: |
IMPROVEMENT OF SPATIAL REUSE AND
THROUGHPUT USING OCSMA PROTOCOL IN WIRELESS ADHOC NETWORKS |
Author: |
T.SHANKAR,
R.DHANABAL, A.KARTHIKEYAN, Dr. S. SHANMUGAVEL,
V. BHARATHI |
Source: |
Journal of Theoretical and Applied
Information Technology pp
215 - 224 Vol 35. No. 2 -- 2012 |
Abstract |
In wireless ad hoc networks (WANets),
multihop routing may result in a node knowing the content of transmissions of
nearby nodes. This knowledge can be used to improve spatial reuse in the
network, thereby enhancing network throughput. This paper is to develop
overlapped transmission techniques based on this idea and analyze several
factors affecting their performance. Then develop a MAC protocol based on the
IEEE 802.11 standard to support overlapped transmission in a WANet. The
resulting overlapped carrier-sense multiple access (OCSMA) protocol improves
spatial reuse and end-to-end throughput in a random network scenario. |
Keywords |
Adhoc
Networks, Carrier Sense, Overlapped Transmission |
Full Text |
|
Paper ID: |
14744 -JATIT |
Title: |
TECHNIQUES AND CHALLENGES OF AUTOMATIC
TEXT EXTRACTION IN COMPLEX IMAGES: A SURVEY |
Author: |
C.P. SUMATHI, T. SANTHANAM, N. PRIYA |
Source: |
Journal of Theoretical and Applied
Information Technology pp
225 - 235 Vol 35. No. 2 -- 2012 |
Abstract |
Text extraction in images and video has
been developing rapidly since 1990s and is an important research field in
content-based information indexing and retrieval, automatic annotation and
structuring of images. Extraction of this information involves detection,
localization, tracking, extraction, enhancement, and recognition of the text
from a given image. However, variations of text due to differences in size,
style, orientation, and alignment, as well as low image contrast and complex
background make the problem of automatic text extraction extremely difficult and
challenging job. A large number of techniques have been proposed to address this
problem and the purpose of this paper is to classify and review these
techniques, discuss the applications and performance evaluation, and to identify
promising directions for future research. |
Keywords |
Text Extraction, Text Detection, Text
Localization, Text Tracking, Text Enhancement |
Full Text |
|
Paper ID: |
14739 -JATIT |
Title: |
EFFICIENT TRUST ESTABLISHMENT MECHANISMS |
Author: |
S.DELIGHT MARY, K.S.RAVICHANDRAN |
Source: |
Journal of Theoretical and Applied
Information Technology pp
236 - 241 Vol 35. No. 2 -- 2012 |
Abstract |
The extensive use of the Internet, for
exchanging information, requesting and offering services make us to interact
with unknown entities. Human use trust to facilitate interaction and accept the
risk, when complete information is unavailable. In such situations, trust
establishment mechanisms enable establishment of trust between unknown entities.
Trust is a complex concept to define stringently due to its multifaceted nature.
This paper presents the characteristics of trust observed from various views and
types of trust the automated trust establishment mechanisms need to model for
the future. The confidence in the identity of the entity and the trust in that
entity are the facilitator of trust for the proposed trust establishment
mechanism. Finally, the objectives of the trust model, to be used by the future
trust establishment mechanism are highlighted. |
Keywords |
Trust, Trust Establishment, Continuum Of
Trust, Identity, Credential, Negotiation, Attributes Of Identity/Credential,
Trust Model, Privacy |
Full Text |
|
Paper ID: |
14720 -JATIT |
Title: |
A DECADE OF PRODUCTIVE FPGA UTILIZATION
WITH GENETIC ALGORITHMS |
Author: |
BHARATHI NAVANEETHAKRISHNAN, NEELAMEGAM P |
Source: |
Journal of Theoretical and Applied
Information Technology pp
242 - 249 Vol 35. No. 2 -- 2012 |
Abstract |
Genetic algorithms are one of the best
ways to deal with the optimization problems. They are precisely suitable for
mixed combinatorial problems. As genetic algorithms find the solution by
producing more number of population generations based on selection, crossover,
mutation etc.,it can be further improved by exploiting computation power of
Field programmable gate arrays. The FPGAs are highly used reconfigurable
hardware, which increase the speed of genetic algorithms. In this paper, the
exploitation of FPGA to implement genetic algorithm based optimization problems
in different frontiers for the past decade is studied. |
Keywords |
Field Programmable Gate Array(FPGA),
Genetic Algorithm(GA), Selection, Mutation, Crossover, fitness function,
Chromosome mapping |
Full Text |
|
Paper ID: |
14738 -JATIT |
Title: |
SIMULATION OF FUEL CONSUMPTION AND ENGINE
POLLUTANT IN CELLULAR AUTOMATON |
Author: |
A. MADANI, N. MOUSSA |
Source: |
Journal of Theoretical and Applied
Information Technology pp
250 - 257 Vol 35. No. 2 -- 2012 |
Abstract |
Among the aspects that require a major
interest in the field of traffic modeling is the simulation of the fuel
consumption and engine emissions. In this paper, we study the fuel consumption
and gas emissions caused by traffic in the Nagel and Schreckenberg (NaSch)
model, and some of its variants, with closed boundary conditions. The behavior
of the consumption and the emissions in different models are analyzed and
compared. The influences of the presence / absence of traffic lights are also
investigated. |
Keywords |
Cellular Automata Models, Fuel
Consumption, Gas Emissions, UML |
Full Text |
|
|
|