|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2012 | Vol. 36 No.2 |
Paper ID: |
14913
-JATIT |
Title: |
LOW-SPEED SENSORLESS CONTROL OF PMSM MOTOR
DRIVE USING A NONLINEAR APPROACH BACKSTEPPING CONTROL: FPGA-BASED IMPLEMENTATION
|
Author: |
BADRE BOSSOUFI, MOHAMMED KARIM, SILVIU
IONITA, AHMED LAGRIOUI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 154 - 166 Vol 36. No. 2 -- 2012 |
Abstract |
This paper presents a novel speed control
technique for a permanent magnets synchronous (PMSM) drive based on newly
nonlinear backstepping technique. We design a not adaptive speed regulator for a
permanent-magnet synchronous motor (PMSM). In this paper, we present a new
contribution of FPGAs (Field-Programmable Gate Array) for control of electrical
machines. In this paper a robust continuous approach nonlinear not adaptative
Control strategy for permanent-magnet synchronous motor (PMSM) drive systems is
presented. This control scheme is based on an adaptive pole placement control
strategy integrated to a Backstepping control scheme. The overall stability of
the system is shown using Lyapunov technique. The simulation results clearly
show that the proposed not adaptive scheme can track the speed reference. A
bench test was realized by a prototyping platform, the experimental results
obtained show the effectiveness and the benefit of our contribution and the
different steps of implementation for the control FPGA. |
Keywords |
Not Adaptive Backstepping control,
Backstepping Design Technique, FPGAs, Permanent Magnet Synchronous Machine (PMSM),
Lyaponov Stability, Robust Adaptive Control, FPGA-Based implementation |
Full Text |
|
Paper ID: |
14853
-JATIT |
Title: |
IMPROVING INFORMATION RETRIEVAL USING DOCUMENT CLUSTERS AND SEMANTIC SYNONYM
EXTRACTION |
Author: |
G.BHARATHI, D.VENKATESAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 167 - 173 Vol 36. No. 2 -- 2012 |
Abstract |
Document clustering has been investigated for use in a number of different areas
of text mining and information retrieval. Initially, document clustering was
investigated for improving the precision or recall in information retrieval
systems and as an efficient way of finding the nearest neighbors of a document.
More recently, clustering has been proposed for use in browsing a collection of
documents or in organizing the results returned by a search engine in response
to a user’s query. This paper presents a new semantic synonym based correlation
indexing method in which documents are clustered based on nearest neighbors from
the document collection and then further refined by semantically relating the
query term with the retrieved documents by making use of a thesaurus or ontology
model to improve the performance of Information Retrieval System (IRS) by
increasing the number of relevant documents retrieved. Results show that the
proposed method achieves significant improvement than the existing methods and
may generate the more relevant document in the top rank. |
Keywords |
Document Cluster, Information Retrieval, Semantic Similarity, Correlation
Preserving Indexing (CPI) |
Full Text |
|
Paper ID: |
14849
-JATIT |
Title: |
FDR PARTICLE SWARM ALGORITHM FOR NETWORK RECONFIGURATION OF DISTRIBUTION SYSTEMS |
Author: |
K.KIRAN KUMAR, DR.N.VENKATA RAMANA, DR.S.KAMAKSHAIAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 174 - 181 Vol 36. No. 2 -- 2012 |
Abstract |
This paper proposes a novel particle swarm optimization algorithm for
reconfiguration of distribution system named Fitness Distance Ratio Particle
Swarm Optimization Algorithm (FDR-PSOA) to reduce the power loss of the system.
In Conventional PSO all the solutions damps towards local pbest and thoroughly
ignore other pbest points due to the convergence criteria and targets mainly on
local optima than global optima. The proposed FDR-PSOA in contrast, considers
local pbest points as well as neighbouring pbest values before arriving to gbest.
This method thoroughly avoids premature convergence as well as convergence
towards global optima. The effectiveness of the proposed method is demonstrated
through IEEE 16 and 33 bus standard test systems. |
Keywords |
FDR-PSO, Reconfiguration, Distribution Systems, Power loss |
Full Text |
|
Paper ID: |
14845
-JATIT |
Title: |
COMPARATIVE APPROACH FOR RANKING BY SCRUTINIZING THE WEB OPINION USING SDCA |
Author: |
N.DEEPTHI, R.SEETHALAKSHMI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 182 - 189 Vol 36. No. 2 -- 2012 |
Abstract |
Web opinions are available for the social sites due to the advancement in the
technology. The web opinion acts as an interface between the internet users and
web. It allows internet users to communicate and express their opinions. But
analyzing and clustering of the web opinion is a challenging task. The
clustering of the typical document differs from clustering of the web opinion.
The web opinions are taken from the social networks. Analyzing the social
network helps in preventing the crimes, terrorists activities etc. The scalable
density based algorithm enables the identification of themes within discussions
in web social networks and their development. The predefined set for clustering
is useful in web opinion clustering. The ranking methods that are being used for
clustering are the XMLTF*IDF and Bin Ranking |
Keywords |
Clustering, Scalable Density Based Clustering, Web opinion, Ranking, DBSCAN |
Full Text |
|
Paper ID: |
14842
-JATIT |
Title: |
AN EFFICIENT MEDICAL IMAGE DIAGNOSIS SYSTEM USING SOFT COMPUTING TECHNIQUES |
Author: |
V.SIVAKRITHIKA, S.SENGOLE MERLIN, K.SUGIRTHA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 190 - 198 Vol 36. No. 2 -- 2012 |
Abstract |
In this paper, we aim at presenting the process of building up of an accurate
data mining architecture for detecting cancer at very early stages to enhance
the probability of successful cure. Existing Computer Aided Diagnosis (CAD)
systems make use of the association rule-based classification that suffers from
some problems inherited from the Association Rule Mining (ARM) such as handling
of continuous data and the support/confidence framework. Such problems lead to
impreciseness in its operation and uncertainty about the results. The proposed
method is a hybrid system that combines the principles of soft computing
techniques such as Fuzzy Discretization, Genetic Network Programming (GNP) and
GNP based Classification. Application of Fuzzy Discretization on the extracted
features of the image makes it feasible to identify the potential cancer forming
cells of tumors even at initial stages of their development. GNP is used for the
Rule mining as it optimizes the rule extraction process and make the system
autonomous and self-learning. This method of diagnosis of cancer based on Fuzzy
Discretization and Rule Mining using GNP provides more accurate results in
identifying the images in a tumor to be Malign (cancerous cell), Benign (not
cancerous) |
Keywords |
Medical Image Diagnosis, Cancer Diagnosis, Soft Computing Techniques, Fuzzy
logic, Genetic Network Programming ,Texture Feature Extraction, Fuzzy
Discretization, Genetic Network Programming Based Rule Mining |
Full Text |
|
Paper ID: |
14823
-JATIT |
Title: |
AUTOMATIC DETECTION OF CRACKS IN PAVEMENTS USING EDGE DETECTION OPERATOR |
Author: |
B.SANTHI, G.KRISHNAMURTHY, S.SIDDHARTH, P.K.RAMAKRISHNAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 199 - 205 Vol 36. No. 2 -- 2012 |
Abstract |
Crack detection in pavements and objects has been a constant field of research
in pavement management. Conventionally, humans were engaged to detect cracks in
the pavements and they used to present report sheets based on their assessment.
But, this process was a time consuming one and was costlier too. So, researchers
were trying for some alternate method that would detect cracks, hence minimizing
the human involvement and at the same time detecting the cracks precisely. This
gave way to numerous automated techniques for the detection of cracks. In this
paper, an automated technique to detect cracks in pavements by means of digital
image processing is proposed. This technique detects the horizontal, vertical
and diagonal cracks on buildings, pavements, soils, roads, objects, etc. Some
conditions such as complex texture, bad illumination, and non-uniform background
in images may influence the accuracy of the automatic system. So, a lot of work
has been made to overcome these hardships and to provide a well-organized method
for crack detection. First, the images are processed by gray scale morphological
processing. Subsequently, the final result is obtained by filtering the images
(Butterworth filter) and then applying the edge detection operators (canny). By
visual inspection, contented detection results are obtained through this method |
Keywords |
Butterworth Filter, Automated Crack Detection, Canny Edge Detection Operator,
Gray Scale Morphology |
Full Text |
|
Paper ID: |
14822
-JATIT |
Title: |
ROBUST FEATURES FOR NOISY TEXT-INDEPENDENT SPEAKER IDENTIFICATION USING GFCC
ALGORITHM COMBINED TO VAD AND CMN TECHNIQUES |
Author: |
E. B. TAZI, A. BENABBOU, M. HARTI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 206 - 216 Vol 36. No. 2 -- 2012 |
Abstract |
A major problem of most speaker identification systems is their unsatisfactory
robustness in noisy environments. The performance of automatic speaker
identification systems degrade drastically in the presence of noise and other
distortions, especially when there is a noise level mismatch between the
training and testing environments. In this experimental research we have studied
a recently robust front-end algorithm based on Gammatone Frequency Cepstral
Coefficients GFCC associated to Voice Activity Detector VAD and Cepstral Mean
Normalization CMN techniques. Our system using a Gaussian Mixture Models GMM
classifier are implemented under MATLAB®7 programming environment. An
Expectation Maximization EM algorithm was used to maximize the sum of Gaussian
densities until convergence was reached. Evaluation is carried out on our own
database containing 51 mixed Arabic speakers. All test utterances are corrupted
by a multilevel White Gaussian Noise WGN. Our aim is to study the performances
of the suggested architecture and make a comparison with the conventional Mel
Frequency Cepstral Coefficients MFCC method which we have successfully
implemented and tested in the previous work. The obtained experimental results
confirm the superior performance of the proposed method over MFCC and outperform
it in different noisy environments. The evaluation results based on the
recognition rate accuracy show that both MFCC and the proposed features
extractor have perfects performances in low-noise environments when Signal per
Noise Ratio SNR is greater than 35 dB (practically 100% in all cases). But when
the SNR of test signal changed from 0 to 40 dB, the average accuracy of the
MFCCs methods is only 52.14%, while the proposed GFCCs features extractors
associated to VAD and CMN techniques still achieves an average accuracy of
57.22%. |
Keywords |
Cepstral Mean Normalisation (CMN); Gammatone Frequency Cepstral Coefficients (GFCC);
Gaussian Mixture Models (GMMs); Mel Frequency Cepstral Coefficients (MFCC);
Robust speaker identification; Voice Activity Detector (VAD); White Gaussian
Noise (WGN) |
Full Text |
|
Paper ID: |
14800
-JATIT |
Title: |
THE INTEGRATION OF THE SPEED OF MOBILITY IN THE SELECTION OF MPR TO IMPROVE THE
QOS IN AD HOC NETWORKS |
Author: |
N. LAKKI, A. OUACHA, A. HABBANI, J. EL ABBADI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 217 - 226 Vol 36. No. 2 -- 2012 |
Abstract |
Many of the threats (security, energy, bandwidth and routing problems) facing
mobile networks. All these threats are related to high mobility nodes. It is
here that our work gives great importance to mobility. This work consists of two
parts: The first part is to propose a new way to measure the mobility of nodes,
one way is based on two principles: the number of nodes incoming and outgoing
from a neighborhood and speed, use the formula to calculate the mobility of
nodes in the Mob-OLSR. The second part attempts to improve network performance
by the integration of a new version of OLSR protocol (Speed-OLSR). This work
also aims to examine the impact of mobility and pause time on the behavior of
different versions of OLSR: the standard OLSR, the Mob-OLSR, the Mob-2-OLSR and
Speed-OLSR. |
Keywords |
Ad hoc Network, Routing, OLSR, Mob-OLSR, Mob-2-OLSR, Speed-OLSR, Mobility,
Wireless Networks, Quality of Service, Speed and Speed of Mobility |
Full Text |
|
Paper ID: |
14798 -JATIT |
Title: |
APPLICATION OF COARSE TO FINE LEVEL SET
SEGMENTATION IN SATELLITE IMAGES |
Author: |
DEEPA VARGHESE, P. SELVARANI, Dr. V.
VAITHIYANATHAN, R. D. SATHIYA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 227 - 233 Vol 36. No. 2 -- 2012 |
Abstract |
Segmentation of vegetated areas is
inevitable in precision agriculture and has high importance in urban area with
social and environmental aspects. This paper addresses the segmentation of fused
high resolution multispectral satellite images into distinct regions such as
vegetation, buildings and barren land. Even though the IHS based fusion of
satellite imagery improves the visual interpretation, it results in color
distortion which can be nullified using vegetation indexes(VI).The vegetated
area can be depicted using high resolution normalized vegetation index and to
detect the distribution of vegetated area, soil classes, buildings and barren
land. For that the coarse-to-fine level set method is used. Undecimated wavelet
transform is adopted to separate focused areas from the background. Homogeneity
metric is used to measure the variation inside and outside the contours. The
weight distribution ratio is proposed to adaptively tune the relative weight of
the features. Based on the homogeneity metric and the weight distribution ratio,
a novel energy functional is developed to solve the contour extraction problem
and a coarse-to-fine scheme is applied to progressively extract contours in
finer scale which also reduces the computational burden |
Keywords |
Contour Extraction, Homogeneity Metric,
Level Set Methods, Intensity-Hue-Saturation (IHS) Transform, Vegetation
Enhancement |
Full Text |
|
Paper ID: |
14797 -JATIT |
Title: |
AN AUTOMATED SUPPORT FOR EVALUATING
ALTERNATIVE DESIGN DECISIONS |
Author: |
ADIL A.A. SAED, WAN M.N. WAN KADIR,
HENTABLI HAMZA, ADIL YOUSIF |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 234 - 246 Vol 36. No. 2 -- 2012 |
Abstract |
In recent years, there have been increasing interests in using Component-Based
System Development (CBSD) approach to develop large and complex applications.
It’s believed that satisfying quality attributes is an essential factor for the
success of such systems. This paper introduces a novel approach to support the
right decisions on selecting design alternatives decision at the early stage of
component-based system development. In this approach, we implement Particle
Swarm Optimization (PSO) algorithm, as the selected Intelligent Swarm (IS)
optimization technique, to explore the design space for optimal design that
satisfies the quality requirements. A case study from the Embedded System (ES)
domain is used to demonstrate the applicability of the approach. The objectives
of this paper are, to aid architects to decide on the level of redundancy within
each subsystem based on reliability, and to make trades-off between reliability
and performance based on the technical and cost preferences. The results of some
preliminary experiments indicate the potentiality of the approach. |
Keywords |
Optimization algorithm, metaheuristic,
Intelligent Swarm (IS), Particle Swarm Optimization (PSO), Reliability,
Redundancy, Design Decision, Embedded System (ES) |
Full Text |
|
Paper ID: |
14767 -JATIT |
Title: |
DESIGN AND FDTD MODELING OF MILLIMETER
WAVE ANTENNA FOR WIRELESS SENSOR NETWORKS |
Author: |
K. SHAMBAVI, ZACHARIAH C ALEX |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 247- 251 Vol 36. No. 2 -- 2012 |
Abstract |
This paper presents the design and finite
difference time domain (FDTD) modeling of millimeter wave aperture coupled
microstrip antenna that can be realized as a on chip antenna in wireless sensor
nodes. At millimeter wave frequency, antenna form factor is very low and hence
integration of this antenna with the transceiver components as a single system
on-chip, minimizes power consumption and system cost. Off-chip antenna increases
the size of the sensor node and raises the system cost. The proposed antenna
contributes impedance bandwidth of 3 GHz (59 GHz – 62 GHz) and maximum gain of
6.8 dBi. The proposed antenna occupies an area of 1500 μm × 2000 μm on a RT
Duroid substrate of dimension 3000 μm × 3000 μm × 1500 μm. Due to very low
antenna form factor, the proposed antenna along with the transceiver and sensor
components can be integrated into a single system on chip with less system cost
for wireless sensor networks |
Keywords |
Finite difference time domain (FDTD),
Microstrip Antenna, Sensor nodes, Ultrawideband, Wireless Sensor Networks (WSN) |
Full Text |
|
Paper ID: |
14748 -JATIT |
Title: |
PRACTICAL IMPLEMENTATION OF FSC OF A 400KV
TRANSMISSION LINE-CASE STUDY |
Author: |
Mr. N.M.G. KUMAR, Dr.P.SANGAMESWARA RAJU,
Mr.P.VENKATESH, Ms.N.NEHA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 252 - 262 Vol 36. No. 2 -- 2012 |
Abstract |
This paper presents a case study of
practical implementation of fixed series compensation (FSC) for reliable and
effective power flow in the specified line. The method for adjusting the line
reactance as parameters by TCSC (Thyristor Controlled Series Compensator) in
load flow studies. Proper adjustment of transmission line reactance as a
parameter to regulate the required power flow in a desired line to the specified
value. The ability to regulate power flow through certain paths in a power
system networks is of particular importance, especially in deregulated
electricity market. The proposed approach is a rigorous model without any
approximations. It does not demand any extra row or column in Jacobian matrix of
NR (Newton-Raphson) for accounting the adjustments of the line reactance is
placed in required lines. The proposed technique has been tested on IEEE 30 bus
system. The results are very accurate and method converged without any numerical
convergence problems. The proposed method can be used to estimate the required
level of compensation in a single line, multiple numbers of lines and group of
line. Here power flow and optimum power flow is per formed for reduced fuel cost
and total losses in the system |
Keywords |
Thyristor Controlled Series Compensator ,Thyristor
Controlled Phase Shifter, Newton - Raphson, Optimal Power Flow |
Full Text |
|
Paper ID: |
14864 -JATIT |
Title: |
ANALYSIS OF INTERNET METAPHORS: CASE FOR
INFORMATION TECHNOLOGY STUDENTS |
Author: |
MEHMET FIRAT, Işil KABAKÇI YURDAKUL |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 263 - 273 Vol 36. No. 2 -- 2012 |
Abstract |
The purpose of this study is to determine
the Internet-related metaphors used by Information Technology students and
examine these metaphors in terms of their class, gender, daily internet use,
internet use experiences and internet use proficiencies. This exploratory
research seeks to answer four specific questions in line with determining the
internet metaphors of IT students. A questionnaire developed by the researchers
was used for data collection. The questionnaire included a total of 13 items, 10
of which are multiple choice and three of which are open-ended. Based on the
findings obtained in the study, the Information Technology students were found
to use their own internet metaphors besides the widespread internet metaphors.
It was concluded that the students produced metaphors emphasizing the sharing of
and access to information for the internet and that among widespread internet
metaphors, they used the network metaphor most and among the metaphor families,
they used the “open space” metaphor family most. This finding revealed that
sharing of and access to information and networks was most important factors for
the students’ use and perception of the internet. In addition, it was also
revealed that there was a significant difference between the frequencies of the
information technology students’ use of the metaphor families with respect to
the class. Based on the results of metaphor analysis, required recommendations
were presented related to inform students about the scope and features of the
internet in their courses. |
Keywords |
Internet; Metaphor; Internet Metaphors;
Internet Metaphor Families; Information Technology Students |
Full Text |
|
Paper ID: |
14848 -JATIT |
Title: |
LINK BASED CLUSTERING OF WEBPAGES IN
INFORMATION RETRIEVAL |
Author: |
SARASWATHY.R, SEETHALAKSHMI.R |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 274 - 278 Vol 36. No. 2 -- 2012 |
Abstract |
Recently, web search engine plays a vital
role in information retrieval. This is the most common tool used for information
retrieval on web.However current status of web search engine is far from
satisfaction. The results obtained does not contain needed information.To
enhance the performance of web search engine, in this paper,Link based search
engine for information retrieval using hierarchal clustering of web pages is
introduced. In traditional search engine the results obtained is based on
ranking mechanism.In link analysis, the relevance of web pages is obtained based
on the occurrence of each inlink and outlink of particular web page. Then the
web pages are grouped by filtering out irrelevant pages to increase the
relevance rate and to reduce the computational time. The experiments of results
show that the link analysis along with cluster of web search results is
promising. |
Keywords |
Web Pages, Link Analysis, Hierarchal
Cluster, Information Retrieval, Web Search Engine. |
Full Text |
|
Paper ID: |
14861 -JATIT |
Title: |
OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT
GENERATION WIRELESS SYSTEMS |
Author: |
N.AMUTHA PRABHA, V.MANIKANDAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 279 - 283 Vol 36. No. 2 -- 2012 |
Abstract |
This paper proposes a Multi-Code
Multi-Carrier CDMA, best suited for multi-rate services using multi-code schemes
and multi-carrier services used for high rate transmission as required for the
Universal Telecommunication Mobile Systems (UMTS) Long Term Evolution (LTE). The
system performance has been analyzed and evaluated by means of signal-to-noise
plus interference ratio and bit error rate under a selective fading channel. The
throughput of the system signifies more superior than the conventional CDMA,
Multi-Code CDMA and Multi-Carrier CDMA systems. It has been widely adopted due
to its high performance rate and low sensitive to impulse noise and multipath
channels |
Keywords |
Multi-Code Multi-Carrier CDMA, Universal
Telecommunication Mobile Systems, Long Term Evolution, Multiple Access
Interference |
Full Text |
|
Paper ID: |
14764 -JATIT |
Title: |
A NEW APPROACH TO INTRUSION DETECTION
SYSTEM |
Author: |
A. KARTIT, A. SAIDI, F. BEZZAZI, M. EL
MARRAKI, A. RADI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 284 - 290 Vol 36. No. 2 -- 2012 |
Abstract |
The design and implementation of intrusion
detection systems (IDS) remain an important area of research in the field of
security of information systems. Despite the undeniable progress, much remains
to be done to improve the security of computer networks today. For this, many
mechanisms have been developed {[1], [2]}. In general, these systems are
vulnerable to attack from unauthorized users (external attacks) as well as
attacks by authorized users (internal attacks) who abuse the privileges granted
to them. In this paper, our contribution consists of the design of an intrusion
detection system based on security policy at three levels. This approach, very
interesting even for complex information systems, allows administrators of
information systems and responsibles of network security, the protection from
external attacks and internal attacks. |
Keywords |
Security Policy (SP), Intrusion Detection
System (IDS), Alerts Correlation (AC), Data Fusion (DF), Network Security (NS) |
Full Text |
|
|
|