|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2012 | Vol. 41 No.1 |
Title: |
AN IMAGE ENCRYPTION APPROACH USING STREAM CIPHERS BASED ON NONLINEAR FILTER
GENERATOR |
Author: |
BELMEGUENAÏ AÏSSA, DEROUICHE NADIR, REDJIMI MOHAMED |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 001 - 010 Vol. 41. No. 1 -- 2012 |
Abstract |
In this work a novel image encryption scheme using stream cipher algorithm based
on nonlinear filter generator is considered. In this work a novel image
encryption scheme is proposed based on stream cipher algorithm using
pseudorandom generator with filtering function. This algorithm makes it possible
to cipher and decipher images by guaranteeing a maximum security. The proposed
cryptosystem is based on the use the linear feedback shift register (LFSR) with
large secret key filtered by resilient function whose resiliency order,
algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s
bounds. This proposed scheme is simple and highly efficient. In order to
evaluate performance, the proposed algorithm was measured through a series of
tests. Experimental results illustrate that the scheme is highly key sensitive,
highly resistance to the noises and shows a good resistance against brute-force,
statistical attacks, Berlekamp-Massey Attack, algebraic attack. |
Keywords |
Cryptosystem, Decryption, Image correlation, Image encryption, key Stream,
Nonlinear Filter Generator, Stream Cipher |
Full Text |
|
Title: |
USER ENGAGEMENT ATTRIBUTES AND LEVELS IN FACEBOOK |
Author: |
FIRDAUS BANHAWI, NAZLENA MOHAMAD ALI, HAIRULIZA MOHD JUDI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 011 - 019 Vol. 41. No. 1 -- 2012 |
Abstract |
This paper describes our work in performing a Factor Analysis (FA) to measure
engagement attributes in Facebook and performing a Discriminant Analysis (DA) to
determine the relationship between engagement levels and Facebook activities. We
adapted the measuring user engagement scales from previous works that were
performed in an online shopping environment. By using factor analysis, we
discovered four attributes of engagement while interacting with social network
applications, namely Focus Attention, Novelty & Endurability, Perceived
Usability, and Aesthetics. We also adapted social networking activity scales
from other previous works, in order to connect with engagement levels (recoded
from the four engagement attributes) using a discriminant analysis. Results
indicated that Social Connection was the most engaging activity, followed by
Photographs, Status Updates, Social Investigation, Social Network Surfing, and
Contents. Over a two week period, 103 Facebook users responded to the
administered questionnaires. The findings also showed that respondents preferred
using full access devices, compared to limited access devices, to access and
interact with social network applications. |
Keywords |
User Engagement, Social Networking Application, Factor Analysis, Discriminant
Analysis |
Full Text |
|
Title: |
AN OVERVIEW OF COGNITIVE RADIO ARCHITECTURE:A REVIEW |
Author: |
S.VENKATESWARI, R.MUTHAIAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 020 - 025 Vol. 41. No. 1 -- 2012 |
Abstract |
Cognitive Radio (CR) is a technique which is used to improve the utilization of
the radio spectrum. It is a software controlled radio that senses the unused
frequency spectrum at any time. The main problem in cognitive radio is spectrum
sensing. In this paper, the comparison of different techniques for spectrum
sensing and transceiver from different perspectives is presented and a new
architecture is suggested, which can give a better hardware resources
utilization and also spectrum sensing time can be reduced. |
Keywords |
Cognitive Radio, Spectrum Sensing, OFDM, Transciever |
Full Text |
|
Title: |
SURVEY ON IMAGE PROCESSING IN THE FIELD OF DE-NOISING TECHNIQUES AND EDGE
DETECTION TECHNIQUES ON RADIOGRAPHIC IMAGES |
Author: |
B.THAMOTHARAN, M.MENAKA, SANDHYA VAIDYANATHAN, SOWMYA RAVIKUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 026 - 034 Vol. 41. No. 1 -- 2012 |
Abstract |
Digital Image Processing is the processing on digital images by means of
different algorithms. The important steps of image processing are de-noising and
edge detection. Images captured by cameras /video cameras have noise due to the
electromagnetic and other geographic ,atmospheric conditions, incorrect photo
count. Hence removing noises from an image is a challenging task in image
processing. Second, edge detection is one of the first steps of feature
extraction. Edge detection characterizes the boundaries in the image and thus
reduces the amount of data and also filters out the unnecessary information from
the image and provides the structural properties of the image. There are many
algorithms for both de-noising and edge detection on images. This paper
discusses the mean and median filter for de-noising the radiographic images and
the different edge detection techniques on radiographic de-noised images and
compared them. |
Keywords |
Cold Trap, PSNR , MSE , Filters, De-noising Spatial and frequency domain,LoG
Operator
|
Full Text |
|
Title: |
SOFTWARE ENGINEERING REQUIREMENTS PROBLEMS AN INVESTIGATION STUDY IN JORDANIAN
CONTEXT |
Author: |
MOHAMMAD TARAWNEH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 035 - 044 Vol. 41. No. 1 -- 2012 |
Abstract |
This paper presents an overview of the field of requirements engineering (RE).
It describes the main areas of RE practice. When requirements practices is good
this may lead to accelerate the development of software. The process of defining
business requirements birds the stakeholders with shared goals, vision and
expectations. In order to increase the accuracy of requirements you have to
involve substantial user in establishing and managing the changes to agree upon
requirement so emphasizing that the functionality built which enable users make
the important business tasks. |
Keywords |
Requirements Engineering, Requirements analysis, Requirements Management |
Full Text |
|
Title: |
PUZZLE FAST RANDOM BIT ENCRYPTION TECHNIQUE FOR JOINT VIDEO COMPRESSION AND
ENCRYPTION |
Author: |
K. JOHN SINGH, R. MANIMEGALAI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 045 - 050 Vol. 41. No. 1 -- 2012 |
Abstract |
Major issues in video data transfer over the internet are security and speed.
For fast transmission over the network, the video data should be compressed
before transmission. Joint compression and encryption algorithms employ
compression before encryption for secured and fast data transfer over the
internet. In this paper, a joint compression and encryption algorithm, Puzzle
Fast Random Bit Encryption (PFRBE) algorithm, is proposed. As the proposed
solution employs multi-level encryption along with key encryption, it is more
secured than existing algorithms. Results obtained are compared with some
popular joint compression and encryption algorithms such as Video Encryption
Algorithm (VEA) and Real-time Video Encryption Algorithm (RVEA). Our analysis
shows that the proposed solution, PFRBE, takes less CPU time and consumes less
memory when compared to existing joint compression and encryption algorithms. |
Keywords |
Video Encryption Algorithm (VEA), Puzzle Fast Random Bit Encryption (PFRBE),
Real-time Video Encryption Algorithm (RVEA), Bit Padding |
Full Text |
|
Title: |
A COMPARATIVE STUDY ON ALGORITHMS FOR MOBILITY IN WIRELESS SENSOR NETWORK |
Author: |
V.VIOLET JULI, J.RAJA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 051 - 059 Vol. 41. No. 1 -- 2012 |
Abstract |
The economical use of sensor network for its maximum coverage depended on the
effective location of the sensors with respect to their desired locations.
Normally adapted random deployment of the sensors would not result in achieving
the objective. Some guided methodology should be incorporated to place the
sensors at their intented locations. The algorithms namely Genetic Algorithm and
Voronoi Vertex Averaging Algorithm for the above purpose were suggested by the
authors which were, in this paper, being reviewed for the performance. |
Keywords |
Sensor, Network, Deployment, Algorithm, Coverage |
Full Text |
|
Title: |
ANALYSIS OF RELIABILITY OF THE MATHEMATICAL MODEL OF THE SRM |
Author: |
A. BERDAI, V.VLASENKO , V.TITJUK. , A.EL MOUDDEN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 060 - 067 Vol. 41. No. 1 -- 2012 |
Abstract |
Switched reluctance motors are of simple construction. Along with salient pole
stator systems, they include a rotor without conductor or magnet and are
therefore the simplest of all electric motor rotors. Its simplicity makes the
SRM inexpensive and reliable, along with its capacity at high speed and high
torque in relation to inertia. Mathematical modelling of SRMs still constitutes
the only real means of studying them in the fields of scientific research and
design. In this article, we propose the combined method, which brings together
the field-theoretical method approach used for calculation of the magnetic
systems of commutated reluctance motors (SRMs) and analysis of electromagnetic
processes in electric drive systems using the electrical circuits theoretical
method. We then present a few results of the experiment with a type 8/6 SRM in
order to validate the simulation method developed. |
Keywords |
Switched Reluctance Motor, Powersys , Simulink , Combined Method, Experimental
Study |
Full Text |
|
Title: |
EMERGING TRENDS IN TRIPLE-PLAY ENABLED INTELLIGENT DSLAM |
Author: |
V.HARIHARAN, B.ELANGOVAN , M.HEMALATHA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 068 - 074 Vol. 41. No. 1 -- 2012 |
Abstract |
The need for value added and differentiated services such as video-telephony,
internet TV .etc in the broad-band access hardware continue to increase rapidly
nowadays, so we need to analyze the capabilities of the broad band access
network architecture whether it can meet the design challenges for providing
triple –play services (e.g. video on demand, voice IP).these services generally
consumes very high bandwidth, highly delay sensitive and requires efficient
hardware.
Most of the service provider based broad band access network has a DSLAM which
is a high end network multiplexer; a DSLAM should be completely analyzed based
on the following design challenges such as bandwidth scalability, packet
scheduling with less complexity, quality of service (QoS) assurance and a good
application support. Because implementing triple service in a network needs an
intelligent access hardware which adopts itself to meet the requirements. So the
ultimate aim of this paper is to focus on the design challenges and the emerging
recent trends in triple-play service deployment and how Intelligent DSLAM
facilitates itself to meet the challenges in terms of selecting appropriate
network processor and aggregation network migration. |
Keywords |
DSLAM- Digital Subscriber Line Access Multiplexer, Triple-Play Service, Quality
Of Service, Network Processors, Aggregation Network, Bandwidth Scalability |
Full Text |
|
Title: |
COMPREHENSIVE ONTOLOGY COGNITIVE ASSISTED VISUALIZATION TOOLS—A SURVEY
(2008–2011) |
Author: |
V. SWAMINATHAN, R. SIVAKUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 075 - 081 Vol. 41. No. 1 -- 2012 |
Abstract |
Comprehensive Ontology is used in different contexts with different authors.
Ontology comprehension is a collection of techniques that facilitate the
understanding of ontologies. These tools are being applied for further
development in various disciplines for better understanding knowledge. These
tools commonly use six methods, namely, Indented List, Node-link and tree,
Zoomable Visualization, Space-filling, Focus + context or distortion and 3D
Information landscapes. The purpose of the work is to present a study on
application of these six methods in the development of different kinds of
Comprehensive visualization Ontology tools and categorize their characteristics
so that it assists in method selection and promotes further future research in
the area of ontology visualization. This paper overviews different technology
for ontology visualization. It is an attempt to summarize existing literature
related to ontology visualization and provide comprehensive cataloguing of
existing method characteristics as well as record their strong points and
weaknesses in relation with user tasks. |
Keywords |
Comprehensive Ontology, Ontology Visualization Technique, Cognitive Support,
Human Agents |
Full Text |
|
Title: |
EXPERIMENTS OF ZERNIKE MOMENTS FOR LEAF IDENTIFICATION |
Author: |
ABDUL KADIR, LUKITO EDI NUGROHO, ADHI SUSANTO, P. INSAP SANTOSA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 082 - 093 Vol. 41. No. 1 -- 2012 |
Abstract |
So far, plant identification has challenges for several researchers. Various
methods and features have been proposed. However, there are still many
approaches could be investigated to develop robust plant identification systems.
This paper reports several experiments in using Zernike moments to build foliage
plant identification systems. In this case, Zernike moments were combined with
other features: geometric features, color moments and gray-level co-occurrence
matrix (GLCM). To implement the identifications systems, two approaches has been
investigated. First approach used a distance measure and the second used
Probabilistic Neural Networks (PNN). The results show that Zernike Moments have
a prospect as features in leaf identification systems when they are combined
with other features. |
Keywords |
Zernike Moments, Leaf identification system, GLCM, PNN, City block |
Full Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF COMPUTER CONTROLLED AIRCRAFT (CCA) PROTOTYPE |
Author: |
JOHN B. OLADOSU AND SAMUEL AJIBOYE |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 094 - 097 Vol. 41. No. 1 -- 2012 |
Abstract |
A Computer Controlled Aircraft (CCA) is controlled from a microprocessor with
its control and timing circuitry on a single integrated chip. Microprocessor
control has been used virtually in all facets of human endeavour. This work
builds a prototype CCA as a demonstration of how this type of system is designed
and built. A unique feature of this work is the use of a remotely located
Software system to control the aircraft, a deviation from the conventional
hardwired circuitry in this type of design. The prototype was built from locally
made materials. The control software was coded in a high level visual
programming language in Windows platform. The unlicensed radio frequency
spectrum was used in order to avoid the cost of licensing the operation of the
prototype. Our prototype was constructed and subjected to series of test-runs in
the presence of our University’s principal officers. The merit of this work is
to serve in training |
Keywords |
Computer Controlled Aircraft, Microprocessor Controlled, Software Aircraft
Control, Prototype of Aircraft System |
Full Text |
|
Title: |
AN APPROACH TOWARDS REDEFINING GRANULARITY OF LEARNING OBJECTS FOR EFFECTIVE AND
ADAPTIVE PERSONALIZATION |
Author: |
V.SREE DHARINYA, Dr.M.K.JAYANTHI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 098 - 102 Vol. 41. No. 1 -- 2012 |
Abstract |
Learning Objects (LO) have been used for designing e-learning paradigms.
Granularity of learning objects is related with the concept of reusability. The
reused learning objects are henceforth used for effective personalization
.Personalization based on the learner’s intuitiveness is preferred using
preference based and correlation based algorithms. Based on the user preference
and learning style with domain ontology, the effective personalization can be
attained. The performance measures and evaluation aids in deciding the learner’s
effective personalized experience of the system. |
Keywords |
Learning Objects, E-learning, Learning object repository, Ontology, Granularity,
Personalization |
Full Text |
|
Title: |
DESIGN AN OPTIMIZED FUZZY CLASSIFIER SYSTEM FOR URBAN TRAFFIC NETWORK |
Author: |
EHSAN AZIMIRAD, JAVAD HADDADNIA |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 103 - 110 Vol. 41. No. 1 -- 2012 |
Abstract |
Traffic control in large cities is a difficult and non-trivial optimization
problem. This paper presents a optimized classifier system using fuzzy logic for
recognize and traffic signal control in a single intersection. Also this paper
presents preliminary work into designing an intelligent local controller
primarily for distributed traffic control systems by fuzzy logic. The idea is to
use a classifier system with a fuzzy rule representation to determine useful
control rules within the dynamic environment. Results show that the performance
of the proposed traffic controller is best and error is very low. |
Keywords |
Fuzzy Classifier; State-Space Equations; Traffic Signal; Fuzzy Controller |
Full Text |
|
Title: |
FREQUENT ITEMSET MINING WITH BIT SEARCH |
Author: |
N. VENKATESAN, RAMARAJ |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 111 - 121 Vol. 41. No. 1 -- 2012 |
Abstract |
Computer systems are often used to store large amounts of data from which
individual records must be retrieved according to some search criterion. Thus
the efficient storage of data to facilitate fast searching is an important
issue. Frequent pattern mining was first proposed by Agrawal et al. for market
basket analysis in the form of association rule mining. It analyses customer
buying behavior by finding associations between the different items that
customers place in their shopping baskets. Researchers have proposed several
algorithms for generating frequent itemsets. Frequent itemsets are found from
the dataset through several searching algorithmic approaches. The novel bit
search technique is implemented in the existing association rule mining
algorithms. Frequent itemsets are generated with the help of apriori based bit
search technique is known as Bit Stream Mask Search and eclat based bit search
technique is branded as Sparse Bit Mask Search. These two algorithms are
implemented in six datasets namely T10100K, T40I10100K, Pump, connect-4,
mushroom and chess. These six datasets again run in AprioriTrie and FP-Growth
algorithms. All the algorithms are executed in 5% to 25% support level and the
results are compared. Efficiency is proved through performance analysis. |
Keywords |
Association Rules, Frequent Itemset Mining, Bit Search, Bit Stream Mask Search,
Sparse Bit Mask Search |
Full Text |
|
|
|