|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
| |
|
Journal of Theoretical and Applied Information Technology
October 2009 | Vol. 8 No. 1 |
Title: |
HARDWARE IMPLEMENTATION OF DIGITAL SIGNAL CONTROLLER FOR THREE PHASE VECTOR
CONTROLLED INDUCTION MOTOR |
Author: |
Soheir M. A. Allahony, Dr.
A.A.Aboumobarka, Dr. M. A. Koutb, Dr. H. Mousa |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
The primary objectives of this paper is to design, develop, implement and test a
simplified switching inverter topology suitable for three phase induction motor
drives. The simplified topology is presented and the principle of operation is
described in detail. A modified time switching is used instead of the standard
pulse width modulation techniques. The suggested motor controller increases the
power delivered to the motor from a given dc voltage supply , reduces the losses
due to high frequency switching and increases the efficiency of the motor by
decreasing the distortions of voltages and currents at high powers. The results
of the described approach indicate the efficiency and reliability in driving
power switches |
|
Full Text |
|
Title: |
OVERVIEW AND CHALLENGES OF ROUTING PROTOCOL AND MAC LAYER IN MOBILE AD-HOC
NETWORK |
Author: |
Jyoti Jain Mehajabeen Fatima Dr.
Roopam Gupta Dr. .K.Bandhopadhyay |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
Mobile Ad-hoc Network (MANET) are a new paradigm of wireless wearable devices
enabling instantaneous person-to-person, person-to-machine or machine-to-person
communications immediately and easily .In this paper an overview and history of
MANET is given .We discuss the issues which should keep in mind for designing of
MAC layer and Routing protocols at Network layer. All these issues can be taken
into consideration for the improvement of MANET performance.
In mobile ad hoc networks, several interesting and difficult problems arises due
to shared nature of the wireless medium, limited transmission power, limited
transmission range, node mobility, and battery limitations, bandwidth limitation
etc. The limited transmission range of wireless network coupled with the highly
dynamic routing infrastructure need extra care. Mobility also create a lot of
concerns. For communication, issues such as dynamic routing, efficient channel
access and quality-of-service (QoS) support, bandwidth, synchronization,
distributed nature, lack of central coordination should be considered. In this
paper broadly we will discuss the above mentioned challenges at Network layer
and MAC LAYER in mobile ad-hoc networks. |
|
Full Text |
|
Title: |
CONTROL OF THREE LEVEL INVERTER BASED DYNAMIC VOLTAGE RESTORER |
Author: |
S.LEELA, S.S.DASH |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
This paper deals with modelling and digital simulation of three level inverter
based Dynamic Voltage Restorer(DVR). The control of DVR that injects a voltage
in series with a distribution feeder is presented. DVR is a power electronic
controller that can protect sensitive loads from disturbances in supply system.
It is observed that DVR can regulate the voltage at the load. Circuit model is
developed and the same is used for simulation studies. |
|
Full Text |
|
Title: |
DETECTION, CLASSIFICATION LOCALISATION, AND CONTROLLING OF VOLTAGE SWELLS USING
IUPQC THROUGH WAVELET BASED NEURAL NETWORKS |
Author: |
Dr. M.SUSHAMA, Dr G.TULASI RAM DAS,
Dr. A. JAYA LAXMI |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
Vast spread of sensitive loads in power systems results in increasing
susceptibility to power quality problems, which makes fast detection and
classification and localization algorithms a necessity. A new approach for power
quality event detection using Wavelet Multi Resolution analysis (MRA)is
presented in this paper.
For Classification, Wavelet transform is utilized to extract feature vectors for
various PQ disturbances based on the Multi Resolution Analysis (MRA). These
feature vectors then are applied to the Neural Network system. For the
compensation of the Voltage Swell an Interline Unified Power Quality
Conditioner(IUPQC) was employed. The complete was carried out using MATLAB/
Simulink. |
|
Full Text |
|
Title: |
RECONSTRUCTION OF DIGITAL IMAGES BY COMBINING MULTIPLE GRADIENTS |
Author: |
S. VIJAYA KUMAR, A.OBULASU, DR.L.S.S.
REDDY, C. NAGARAJU |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
Up to now, many algorithms have been introduced for computing reconstruction in
grayscale images. But the execution time is required by the known grayscale
reconstruction algorithms make their practical use rather cumbersome on
conventional computers. A new algorithm is introduced to bridge this gap and
reconstruct the image in better way. This is based on the notion of regional
maxima, regional minima, most significant value in the region and regional
sorted Meddle values and uses different gradient algorithms constructed based on
regional maxima, regional minima and regional sorted Meddle values for
reconstruction. The existing study shows that the watershed by foreground
markers is able to segment real and simple images containing few irregularities
in a better way than the standard watershed segmentation algorithms. This method
is based on markers and simple morphology, which allows a regularization of the
watersheds. But it is not a flexible approach for further optimization
parameters. The algorithm is able to segment or extract desired parts of only
simple gray-scale images. To overcome these draw backs here new method is
propose for real and multiple scale images by combining multiple gradient
operators |
|
Full Text |
|
Title: |
A NOVEL INFORMATION HIDING TECHNIQUE FOR SECURITY BY USING IMAGE STEGANOGRAPHY |
Author: |
M. SITARAM PRASAD, S.
NAGANJANEYULU, CH. GOPI KRISHNA, C. NAGARAJU |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
In this paper a novel method is proposed to provide more security for the key
information with the combination of image compression and data encryption
method. This method requires less memory space and fast transmission rate
because of image compression technique is applied. Steganography plays an
important role in information security. Since the rise of the Internet one of
the most important factors of information technology and communication has been
the security of information. It is the art of hiding the fact that communication
is takes place, by hiding information in other information. Many different file
formats can be used, but digital images are the most popular because of their
frequency on the Internet. For hiding secret information in images, there exist
a large variety of steganographic techniques some are more complex than others
and all of them have respective strong and weak points. Many applications have
different requirements of the steganography technique used. Some applications
may use absolute invisibility of the secret information, but others require a
larger secret message to be hidden. This method has been implemented and tested
on varies images and data. It provides better security for encrypted data and no
distortion in the image quality. |
|
Full Text |
|
Title: |
PATTERN RECOGNITION ALGORITHMS FOR EAR BIOMETRICS |
Author: |
RAMESH KUMAR, K.NAGESWARA RAO |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
In this article we present geometrical Parameter algorithms for ear Biometrics
by representing the Ear image as contours, feature extraction and recognition.
The proposed algorithms were developed for ear biometrics, but they can be
applied in other contour image processing applications. Firstly we present
mathematical and algorithmic foundations of geometrical feature extraction
methods. We also discuss their application and the achieved results for ear
contour image analysis and recognition. The human ear is a perfect source of
data for passive person identification in many applications. In the growing need
for security in various public places, ear biometrics seems to be a good
solution, since ears are visible and their images can be easily taken, even
without the examined person’s knowledge. The robust feature extraction method
can be applied to determine personality of individuals. The growing interest in
ear biometrics can be evidenced by many publications over the last few years.
More importantly research groups developed different approaches to a problem of
feature selection and extraction for ear biometrics. |
|
Full Text |
|
Title: |
USER ASSISTED KEYWORD SEARCH ON RSS SYHTHESIZER FOR RELEVANT WEBLOGS
|
Author: |
TEH PHOEY LEE, DR. AZIM A.A.G., DR
HAMIDAH I., DR RODZIAH A. |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
Information transfers through web has plays a significant role in the
utilization of its resources. The major parts that involve in information
transfer recently are through sharing and publishing weblogs. Weblogs that
normally published in chronological order by bloggers mostly attracts the
frequent returned blogs readers unless it is shared in a public new feeds or
perhaps reach from the other platforms. Although RSS aggregators able to
aggregate the latest update in timely manner, weblogs that was written in
chronological order by multiple bloggers have caused the conflicting of result
aggregated from different weblogs ended up an irrelevant or unrelated lists of
weblogs collection. It is refers mainly due to the ambiguity of synonym
(different but similar meaning) and polysemous (similar but multiple meaning)
words used by different bloggers. The orientation of this paper is at first to
review the techniques used on the weblogs search options, or any other available
assistants to reach a weblog over the internet. Continue with an explanation on
the ambiguity problem among the weblogs. Next, identify if any RSS aggregator
comes with a solution. Besides reviewing the available techniques on relevancy
measurement, an experiment is performed to test if user assisting in keyword
search able to improve the aggregated results to a more relevant of collection.
Subsequently, the result concluded a satisfactory list of weblogs collected
after benchmarking the list of weblogs collected from Feed Demon. Paper ends
with the future works. |
|
Full Text |
|
Title: |
DOES EXTERNAL KNOWLEDGE ENHANCE COMPETITIVE ADVANTAGE?
A RESEARCH AGENDA ON IT OUTSOURCING PRACTICES |
Author: |
BENAZEER Shahzada; VERELST Jan;
GREMBERGEN Van Wim; MANNAERT Herwig; VEN Kris |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
Since last two decades offshore outsourcing gaining fast momentum and now this
new evolution of business process has achieved its maturity. Standardization of
manufacturing sector is almost matured and now this sector is on the automation
mode. Western firms in the service sector are very much eager to standardize
their process and for multiple reasons, they are seeking external partner to
achieve their goal. Modularity is the basic principle of standardization because
standardization can not deliver any value if it is not flexible and agile.
Modular, flexible and agile standardized systems can lead us towards the next
stage of business process evolution which is, ‘automation’. Automation in
service sector is envisaged since long but now it seems a reality due to the
rapid advances in information technology. It seems very encouraging that the
western firms are heading towards right direction in achieving competitiveness
but question remains, if this achieved competency is sustainable? Is the
achieved cost saving in short term, in any way over shadowing the long term and
sustainable benefits? How well these western firms are prepared to face the
turbulent business environment with out external help? This research will try to
explore all the relevant venues to find the real situation on the ground.
This study is aimed to focus on the knowledge transfer process between Indian
service providers and western service consumers. In short and mid-term, probably
companies in western countries are achieving competitive advantage by
off-shoring their IS / IT activities but this research will focus on long-term
strategies. Will the service consumers continue to depend on service providers
or will they adopt strategies to enhance their own capabilities through
knowledge exchange? This research will try to uncover the short-term, mid-term
and long-term strategies concerning IS off-shoring practices, adopted by the
service consumer organizations in western countries. This research will further
dig-in to evaluate consistency of those adopted strategies to economic theories.
This research will be conducted in two phases. The first phase will be an
exploratory and qualitative research. Data will be collected through the
interviews of executives from both organizations: service consumer and service
provider. The second phase will be a confirmatory and quantitative research.
Data will be collected from the executives of service consumer and service
provider through survey. This collected data will be matched by the previous
qualitative data and finally after analyzing those data a conclusion can be
derived. |
|
Full Text |
|
Title: |
PHARMACOINFORMATIC APPROACH FOR SARS |
Author: |
Sivakumar.G, Seenivasagam.R,
Muthukrishnan.N, Niranjan.V |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
SARS is a respiratory disease caused by corona virus, it is produced the flu
like symptoms and severe bronchial constriction ,alveoli inflammation it’s leads
to death fever, myalgia, lethargy, gastrointestinal symptoms, cough, sore throat
and other non-specific symptoms. , The rapid transmission and high mortality
rate made SARS a global threat for which no efficacious therapy was available
and empirical strategies had to be used to treat the patients. New insights into
the field of the SARS-CoV genome structure and pathogenesis revealed novel
potential anti-Corona virus targets. Several proteins encoded by the SARS-CoV
could be considered as targets for therapeutic intervention.pharmacoinformatic
approach of SARS gave new opportunities for the development of therapeutics, an
extensive analysis of the SARS proteins including modeling of its structure may
prove useful in designing a drug for SARS treatment. Further comprehensive work
on this protein will leads to a new milestone in SARS research |
|
Full Text |
|
Title: |
PERISTALTIC PUMPING OF A FLUID OF VARIABLE VISCOSITY IN A
NON-UNIFORM TUBE WITH PERMEABLE WALL |
Author: |
K.VIJAYARAJ, G. KRISHNAIAH, M.M.
RAVIKUMAR |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 8. No. 1 -- 2009 |
Abstract |
Peristaltic pumping of a fluid of variable viscosity in a
non-uniform tube / channel lined with porous material is investigated. The flow
in the tube is governed by Navier- Stokes equation and the permeable boundary is
described by Darcy law. It is observed that larger the permeability of the
porous medium, greater the pressure rise against which the pump works, so the
increase of permeability of the wall causes less frictional force and also
observed that the frictional force shows opposite behaviour to that of pressure
rise in peristalsis. |
|
Full Text |
|
|
|