|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2012 | Vol. 37 No.1 |
Paper ID: |
14778
-JATIT |
Title: |
THE NEW METHOD OF ADAPTIVE CPU SCHEDULING
USING FONSECA AND FLEMINGS GENETIC ALGORITHM |
Author: |
MEHDI NESHAT, MEHDI SARGOLZAEI, ADEL NAJARAN, ALI ADELI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 001 - 016 Vol 37. No. 1 -- 2012 |
Abstract |
The CPU scheduling is one of the most
important tasks of the operating system. Many algorithms are designed and used
in this regard each having advantages and disadvantages. In this paper a new
algorithm for the CPU scheduling is presented using FFGA (Fonseca and Fleming’s
Genetic Algorithm) multiobjective optimization. Contrary to the classical
algorithms in use, it uses the three parameters of CPU burst time; I/O devices
service time, and priority of process instead of using one parameter of CPU
burst time. The important point is the adaptation of the algorithm which selects
a special process depending on the system situation. The performance of this
algorithm was compared with seven classical scheduling algorithms (FCFS, RR
(equal, prioritized), SJF (preemptive, non-preemptive, Priority (preemptive,
non-preemptive)), and the results showed that the performance of the proposed
method is more optimized than other methods. The proposed algorithm optimizes
the average waiting time and response time for the processes. |
Keywords |
CPU Scheduling, Multiobjective
Optimization, FFGA, Waiting Time, Response Time, Turnaround Time |
Full Text |
|
Paper ID: |
14938
-JATIT |
Title: |
SOFT GENERALIZED CLOSED SETS IN SOFT
TOPOLOGICAL SPACES |
Author: |
K. KANNAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 017 - 021 Vol 37. No. 1 -- 2012 |
Abstract |
In the present paper, we introduce soft
generalized closed sets in soft topological spaces which are defined over an
initial universe with a fixed set of parameters. A sufficient condition for a
soft g-closed set to be a soft closed is also presented. Moreover, the union and
intersection of two soft g-closed sets are discussed. Finally, the new soft
separation axiom, namely soft space is introduced and its basic properties are
investigated. |
Keywords |
Soft Topological Spaces, Soft Closed, Soft
Generalized Closed, Soft Space, Soft T0-Space, Soft T1-Space |
Full Text |
|
Paper ID: |
15855
-JATIT |
Title: |
VEHICULAR SAFETY IN HOSTILE ENVIRONMENT
FOR INTELLIGENT TRANSPORT SYSTEM |
Author: |
DIPAK MONDAL, R.BERA , T.K.DAS, M.MITRA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 022 - 031 Vol 37. No. 1 -- 2012 |
Abstract |
An approach to predict real-time & Matlab
Simulation Technique for realisation of speed, classification, ranging of
different moving and static target in hostile environment using MIMO Radar.LMS &
NLMS Algorithms, TCF are used for unwanted noise & clutter elimination technique
using Matlab Programming. In this context authors are try to make an automated
system that adjust target’s dynamic characteristics on the fly to better match
its changing environment of the entire radar channel and profile. A new test
method of sufficient flexibility is developed to describe most pulse Doppler
radar search systems which can be used to predict the classification of the
target. The object of this section is to predict the detection capability of a
pulse Doppler radar where the Doppler filter bandwidth is much wider than the
bandwidth of each spectral line in the received signal. |
Keywords |
TCF(Time correlation Function),
SISO(Single Input Single Output), LMS, NLMS MIMO(Multiple Input Multiple Output) |
Full Text |
|
Paper ID: |
14887
-JATIT |
Title: |
A SURVEY REPORT ON SPECTRUM SENSING
TECHNIQUES IN COGNITIVE RADIO |
Author: |
HEMALATHA.M, PRITHVIRAJ.V,
JAYALALITHA.S, THENMOZHI.K, BHARADWA J.D GIRISH G.KOUNDINYA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 032 - 038 Vol 37. No. 1 -- 2012 |
Abstract |
A software Radio which exploits unused
spectrum spaces without causing much interference to licensed spectrum users and
thus optimising the use of available radio frequency is, by its virtue of its
intelligence, called Cognitive Radio. By judging the current trends in wireless
technologies it can be predicted that Cognitive Radio will be a critical part of
many future radio systems and networks. Cognitive Radio uses any of the three
techniques – Spectrum Sensing, Spectrum Database and Cognitive Pilot Channel to
acquire information about spectrum usage. Spectrum Sensing is the inherent
ability of Cognitive Radio to autonomously perform required calculations and
detect unused spectrum which can be used for a multitude of purposes. Due to its
advantages many studies have been focussed to improve and implement Spectrum
Sensing effectively in Cognitive Radio and this lead to development of many
spectrum sensing schemes. This paper provides an insight into various Spectrum
Sensing technologies and also analyses the advantages and drawbacks of each. |
Keywords |
Cognitive Radio, MIMO, Spectrum Sensing,
Spectrum Sharing, Dynamic Allocation |
Full Text |
|
Paper ID: |
14910
-JATIT |
Title: |
DETERMINISTIC AND PROBABILISTIC MODELS ON
VLSI CELL PLACEMENT-A SURVEY |
Author: |
R.MANIKANDAN, M.THIYAGARAJAN ,
P.SWAMINATHAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 039 - 045 Vol 37. No. 1 -- 2012 |
Abstract |
General VLSI Cell placement has gone
through different versions depending upon the particular applications. The area
under modern challenges of VLSI desgin throw light on Power minimization,
Thermal capacity and Area occupation. Thus Utility function, Renewal reward and
Hypergraph setup are utilized in our discussion. A brief review is given in this
paper |
Keywords |
VLSI Cell Placement, Renewal Reward
Process , Utility Function, Hypergraph |
Full Text |
|
Paper ID: |
14897
-JATIT |
Title: |
3G MOBILE TEST ASSET DEVELOPMENT |
Author: |
DINAH PUNNOOSE, K. CHAKRAPANI, P.
SWAMINATHAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 046 - 051 Vol 37. No. 1 -- 2012 |
Abstract |
As mobile services and applications are
becoming more pervasive with the increasing adoption of 3G networks and devices,
verifying the different quality attributes in all parts of the system is
important. This describes a testing platform for 3G User Equipment (UE) that
allows effective testing of UE devices and applications in a laboratory
environment. By simulating parts of the network, the platform provides a
realistic yet controlled environment for testing. Using this platform, we have
executed a number of tests on 3G UEs and applications. Based on our experiences
we describe the specific challenges encountered in testing in a 3G network in
contrast to testing in a more traditional environment.
As the worldwide3G network deployment is scheduled for next upcoming years,
mobile testing industry strives to supply test equipment with sufficiently good
features to meet the needs .The biggest challenge is not only in customizing the
new features quickly but also in making sure of the stability and robustness of
the product. The test applications covered in this includes protocol conformance
testing. Through practical experience, 3GPP has decided that the most efficient
and cost-effective way to reach this goal is to create a certification system
for mobile terminals.
A certified mobile is tested to an agreed and continuously updated set of test
cases. All test cases are developed, maintained and delivered by 3GPPand
validated by a certification agreement group, such as the Global Certification
Forum (GCF) or the Personal Communication System Type Certification Review Board
(PTCRB)… The agreement group has the responsibility to ensure that each test
case is performed on a range of commercially available test equipment, providing
compatibility between test facilities. This paper describes an Automated
Test-Bench Application for Mobile phones. |
Keywords |
3G (Third Generation), GCF Global
(Certification Forum), PTCRB (Personal Communication System Type Certification
Review Board), 3GPP (3rd Generation Partnership Project) |
Full Text |
|
Paper ID: |
14894
-JATIT |
Title: |
PROTOTYPE OF WATER LEVEL DETECTION SYSTEM
WITH WIRELESS |
Author: |
S. JATMIKO, A. B. MUTIARA, M. INDRIATI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 052 - 059 Vol 37. No. 1 -- 2012 |
Abstract |
Water level detection system is designed
to facilitate human in collecting water levels data that can be performed in
real-time. Ping sensor is used as a distance sensor for detecting water level by
measuring distance between sensor and water surfaces. The system consists of two
modules, transmitter and receiver. Transmitter module performs water level
detection and transmits it to the receiver module as a data collector. Receiver
module then displays the data on the screen. This system can be used as a part
of the system that need the water level detection which can be collect remotely,
such as, flood control system |
Keywords |
Ping Sensor, Interface, Detector,
Wireless, Water Level Detection |
Full Text |
|
Paper ID: |
14850
-JATIT |
Title: |
MULTI OBJECTIVE FDR PARTICLE SWARM
ALGORITHM FOR NETWORK RECONFIGURATION OF DISTRIBUTION SYSTEMS |
Author: |
K.KIRAN KUMAR, Dr.N.VENKATA RAMANA,
Dr.S.KAMAKSHAIAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 060 - 069 Vol 37. No. 1 -- 2012 |
Abstract |
This paper proposes a novel particle swarm
optimization algorithm for Multi-Objective reconfiguration of distribution
system named Multi-Objective Fitness Distance Ratio Particle Swarm Optimization
Algorithm (MOFDR-PSOA) for minimization of power loss, voltage drop and to
maintain better thermal limits of feeders with respect to their loading
capabilities. In Conventional PSO all the solutions damps towards local pbest
and thoroughly ignore other pbest points due to the convergence criteria and
targets mainly on local optima than global optima. The proposed MOFDR-PSOA in
contrast, considers local pbest points as well as neighbouring pbest values
before arriving to gbest. This method thoroughly avoids premature convergence as
well as convergence towards global optima. The effectiveness of the proposed
method is demonstrated through IEEE 16 and 32 bus standard test systems. |
Keywords |
MOFDR-PSO, Reconfiguration, Distribution
Systems, Power loss |
Full Text |
|
Paper ID: |
14890
-JATIT |
Title: |
SIMULATIVE INVESTIGATIONS OF CONDUCTIVE
EMI PERFORMANCE ON DIFFERENT CONVERTER TOPOLOGIES |
Author: |
C.KRISHNA KUMAR, Dr.A.NIRMALKUMAR,
M.SATHIS KUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 070 - 079 Vol 37. No. 1 -- 2012 |
Abstract |
This paper discusses a passive method of
suppressing conducted electromagnetic interference (EMI) on various pulse width
modulation (PWM) DC/DC converters. Snubbers are circuits which are placed across
semi conductor devices for protection and to improve performance. In this paper,
passive snubber such as RLD and RCD snubber is experimented and a new combined
snubber is proposed. The combined snubber is designed to support the buck,
boost, buck boost and cuk converters. The common mode noise (CM) and
differential mode noise (DM) is simulated using PSPICE version 9.0 software. The
conducted noise is measured for with and without connecting the RLD, RCD and the
proposed snubber. The simulated results were compared to recommend low emission
converter among the various DC/DC converter topologies. |
Keywords |
Electromagnetic Interference, Snubber
Circuits, Switching Frequency, Duty Cycle, Common Mode Noise, Differential Mode
Noise |
Full Text |
|
Paper ID: |
14893
-JATIT |
Title: |
RADIOGRAPHIC IMAGES DATA MODEL FOR
CONTENT-BASED RETRIEVAL |
Author: |
LILAC A. E. AL-SAFADI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 080 - 089 Vol 37. No. 1 -- 2012 |
Abstract |
With the advance of multimedia
technologies in general and diagnostic images technologies specifically, the
number of radiographic images is constantly escalating in the biomedical field.
This field demands sophisticated systems for management and effective search and
retrieval of the radiographic images produced. This paper presents a semantic
content-based radiographic image retrieval system that focuses on the semantic
content of radiographic image documents to facilitate semantic-based
radiographic image indexing and a retrieval system suitable for the radiographic
image-on-demand style applications. The paper addresses a model developed for
describing the semantic content of a radiographic image document and providing
information about this content. It develops a sophisticated semantic
radiographic image model that expresses the underlying semantic structure of
radiographic images and retrieves content from different levels of details. The
proposed semantic model is an extension of the traditional conceptual model
which would be applied to the radiographic image domain. The proposed model
would divide a radiographic image document, based on its semantic content, and
would be converted into a logical structure or a semantic structure. The logical
structure represents the overall organization of information. The semantic
structure, which is bound to logical structure, is composed of semantic objects
with interrelationships in the various spaces in the radiographic image. |
Keywords |
Semantic Indexing, Content-Based
Retrieval, Radiographic Images, Data Model |
Full Text |
|
Paper ID: |
14986
-JATIT |
Title: |
LOAD BALANCING AS A STRATEGY LEARNING TASK |
Author: |
K. KUNGUMARAJ, T. RAVICHANDRAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 090 - 095 Vol 37. No. 1 -- 2012 |
Abstract |
A distributed system consists of
independent workstations connected usually by a local area network. Load
Balancing system puts forward to a new proposal to balance the server load in
the distributed system. The load balancing system is a set of substitute buffer
to share the server load, when their load exceeds its limit. The proposed
technique gives an effective way to overcome the load balancing problem. Serving
to more number of client requests is the main aim of every web server, but due
to some unexpected load, the server performance may degrade. To overcome these
issues, network provides an efficient way to distribute their work with the sub
servers which is also known as proxy servers. Allocating work to the sub server
by their response time is the proposed technique. The secure socket layer with
Load balancing scheme has been introduced to overcome those server load
problems. Storing and serving effectively and securely is more important so that
desired algorithm is going to implement for load distribution and security
enhancement named as Secure Socket Layer with Load Balancing and RSA Security
algorithm respectively. Calculating response time of each request from the
clients has been done by sending an empty packet over the networking to all the
sub servers and response time for each sub server is calculated using the
Queuing theory. In this Load Balancing system, the SSL based load distribution
schemes has been introduced for better performance. |
Keywords |
Load Dispatcher, IP Spraying, Load
Prediction, Latency Time, Throughput, Load Reduction |
Full Text |
|
Paper ID: |
14950
-JATIT |
Title: |
DESIGNING AND IMPLEMENTING INDIVIDUAL
IDENTIFICATION SYSTEM BASED ON IRIS COLORS |
Author: |
A. RAMADONA NILAWATI, SARIFUDDIN
MADENDA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 096 - 104 Vol 37. No. 1 -- 2012 |
Abstract |
Currently, a number of biometric
identification having been implemented as components of a variety of security
system are fingerprint, palm geometry, face, facial thermo-graph, hand vein,
signature, speech, eye iris and retina. It has been identified that the iris of
the eyes has unique pattern/texture and color characteristics for every single
individual, so that it has now been used as a component of a biometric system. A
number of iris identification algorithms have been developed and applied in
security systems; however, because such algorithms have only been based on the
iris pattern characteristics, the results have not yet been optimum. This is
caused by the fact that the result of extracting iris patterns is quite
susceptible to the changes of light intensity and the movement of position in
the process of iris image acquisition. This paper proposed a new model of
identifying an iris based on an iris color with the aid of a 3-dimension color
bin histogram. The advantage of using iris colors is that they are not quite
sensitive to even small changes of light intensity and position. This kind of
model has successfully been implemented as a system prototype by integrating a
number of algorithms developed in the research. The trial run has been carried
out by the use of a database containing 1877 iris images and 322 samples of test
images. The analysis result indicates that the accuracy level of the developed
system is relatively very good with the error rate of around 8 %. |
Keywords |
Iris, Color, Identification, System,
Recognition, Individual, Security, Biometrics, Eye |
Full Text |
|
Paper ID: |
14505
-JATIT |
Title: |
NEURO-GENETIC INPUT-OUTPUT LINEARIZATION
CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR |
Author: |
A. ESSALMI, H. MAHMOUDI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 105 - 111 Vol 37. No. 1 -- 2012 |
Abstract |
By rapid development of semiconductor and
commands strategies as vector control (VC), direct torque control (DTC) and
input-output linearization (IOL) a permanent magnet synchronous motors (PMSM)
have gained variety industrial applications. This paper combines the application
of neuro-genetic (NG) with input-output linearization techniques to control the
PMSM. The use of a genetic algorithm is particularly appropriate to find the
optimal values of placing pole. The neuro space vector modulation is also used
to prove more the performance of soft computing. A comparative study between
intelligent VC with a proposed approach shows that not only these techniques has
been improved but also IOL control reduces speed, flux and stator current
ripples |
Keywords |
Permanent Magnet Synchronous Motor,
Inputs-Outputs Linearization, Neuro Space Vector Modulation, Genetic Algorithm. |
Full Text |
|
Paper ID: |
14924
-JATIT |
Title: |
DE-NOISING ULTRASONIC TOFD SIGNALS: A
COMPARATIVE STUDY OF WAVELET PACKET METHOD USING SURE WITH SSP TECHNIQUE |
Author: |
S. MUTHUMARI, ANURAG SINGH,
AKSHAYA PRAKASH SHARMA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 112 - 115 Vol 37. No. 1 -- 2012 |
Abstract |
The signals obtained from a system
generally contain a number of unwanted information, termed noise, which needs to
be removed during the pre-processing of the signals, for further analysis.
Unprocessed ultrasonic welding defect signals, which contain noise, are not
easily identified for the type and pattern of flaws they contain. Especially
with TOFD welding defect signals which is often mixed with noise, distinction
between grain noise and small flaws is not always easy. Presence of larger grain
noise makes it difficult to interpret the defect result and noise. Thus, it is
of great importance to de-noise the ultrasonic welding defect signal before
classification of defect is carried out. This paper mainly focuses on the use of
wavelet packet method using Stein’s Unbiased Estimation of Risk(SURE) to
de-noise the TOFD welding defect signals and the results has been compared with
that of Split Spectrum Processing (SSP) with Polarity Thresholding algorithm
(PT) for de-noising of the same. |
Keywords |
Split Spectrum Processing (SSP) Technique,
Time of Flight Diffraction (TOFD), Wavelet Packets, Signal to Noise Ratio (SNR) |
Full Text |
|
Paper ID: |
14844
-JATIT |
Title: |
CONSULTANCY SERVICES TO ERP SYSTEMS: CASE
STUDIES FROM SAUDI ARABIA |
Author: |
NOURA A. ALHAKBANI, MOHAMMED A.
ALNUEM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 116 - 124 Vol 37. No. 1 -- 2012 |
Abstract |
Rapid change in business environment have
compelled the world class organizations to implement integrated software
solution to all their functional processes, the most typical solution is ERP.
For this, organizations are striving to hire ERP consultants to line up their
resources. However, it is evident from literature that organizations spend a lot
of resources on hiring consultants. Likewise, Saudi Companies are also
implementing ERP systems for the same purpose and thereby hiring ERP
consultants. However, the role of hiring consultants is also crucial in Saudi
Companies and they are spending plenty of resources on them. In this paper we
have investigated the roles, characteristics, responsibilities, scope of work
and identify the reasons for and against hiring ERP consultants specifically in
Saudi Arabia. No study has been conducted to investigate the consultants’ roles
in such systems in Saudi Arabia. For this purpose we have considered two case
studies of ERP projects in Saudi Arabian well known organizations Dr. Abdul
Rahman Al-Mishari Hospital (AMH) and eXtra an electronic appliances
organization, after a thorough literature review |
Keywords |
Internal/External Consultants, ERP,
Strategic Guidance, Technical Guidance, KSA |
Full Text |
|
Paper ID: |
14951
-JATIT |
Title: |
FFQI-FAST FORMULATION QUERY INTERFACE FOR
DATABASES |
Author: |
R.SHOBANA, D.VENKATESAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 125 - 131 Vol 37. No. 1 -- 2012 |
Abstract |
We present a new query formulation
interface called FFQI (Fast Formulation Query Interface) which is based on a
semantic graph model. The query formulator allows the users with limited IT
skills to query and explore the data source easily and efficiently. Here the
user inputs are formulated based on the graph search algorithm by using the
probabilistic popularity measure. The query ambiguity has been resolved through
the ranking technique. We formulated the SELECT-PROJECT-JOIN queries using the
aggregate functions. In additional to that we also implemented a formulation
technique for image databases. Thus this interface allows user to interact with
relational graph-type databases in an effective and easier way. |
Keywords |
Query Formulation, Semantic Graph,
Relational Database, Select-Project-Join (SPJ) Queries |
Full Text |
|
Paper ID: |
14940
-JATIT |
Title: |
DETERMINING FACTORS INFLUENCING
INFORMATION SECURITY CULTURE AMONG ICT LIBRARIANS |
Author: |
MOHD SAZILI SHAHIBI, ROHANA MOHAMAD
RASHID, SHAMSUL KAMAL WAN FAKEH, WAN AB KADIR WAN DOLLAH, JUWAHIR
ALI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 132 - 140 Vol 37. No. 1 -- 2012 |
Abstract |
The purpose of this study is to examine
information security culture among and to investigate the factors that
contribute to the information security culture among ICT librarians. The study
uses the quantitative research method to analyze the responses to open-ended
questions by 56 ICT librarians in private colleges. An empirical study is
presented of an information security culture assessment instrument, which is a
questionnaire, thereby providing a valid and reliable tool that can be used by
organizations (libraries) to assess the in-house level of the information
security culture. The evidence suggests that principles significantly influence
the information security culture among ICT librarians. The developed statements
in the information security culture assessment instrument are not categorized to
be answered by different audiences in an organization. This could be useful as
not all employees would, for instance, be in a position to answer management and
strategic questions. Practitioners should understand the factors influencing the
information security culture in order to develop a good culture and at the same
time to protect their information assets in organization. |
Keywords |
Information Security, Information Security
Culture, Organizational Culture, Corporate Culture |
Full Text |
|
|
|