|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2015 | Vol. 81 No.2 |
Title: |
SPECTRUM INVESTIGATION FOR SHARING ANALYSIS BETWEEN BWA SYSTEM AND FSS RECEIVER |
Author: |
ZAID A. HAMID, KANAR R. TARIQ, MOHAMMED B. MAJED, THAREK ABD. RAHMAN |
Abstract: |
In this research, testing the compatibility between Fixed Broadband Wireless
Access (BWA) as a case study for the International Mobile Telecommunication (IMT-Advanced)
and Fixed Satellite Services (FSS) networks in 3400-4200MHz range (C-band) has
been studied and discussed in details. The interference between Fixed Satellite
Service earth station(FSS ES) and Broadband Wireless Access(BWA) is considered
and the aim of the article is to avoid interference between FSS ES and BWA by
using minimum separation distance. Possibility of coexistence and sharing
analysis were obtained by taking into account the detailed calculations of the
most useful formulas for path loss effect and clutter loss by using the existing
parameters of FSS and the BWA base station parameters located in the wireless
communication center, Universiti Teknologi Malaysia (UTM). In-band interference
has been concluded, analyzed and simulated (using Matlab) for several
environments (rural, suburban, urban and densurban) in response to different
clutter altitude. Channel prediction for two scenarios (rural and suburban) as a
trail map was delineated by ATDI software. Simulation results indicate that the
proposed mitigation scheme is highly efficient in terms of reducing the
separation distances. Comparing the measurements with simulated result has also
been done with high percentage of accuracy to show the amount of closeness or
similarity between both results. |
Keywords: |
Coexistence, BWA, Mobile Service, FSS, Propagation Model, Interference,
Separation Distance, And Co-Channel Interference. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
INFLUENCE OF CLASSIFIED AD ON GOOGLE PAGE RANK AND NUMBER OF VISITORS |
Author: |
MUHAMMAD MULTAZAM, BAMBANG EKA PURNAMA |
Abstract: |
One of the media used for promotion was classified ad. The study aimed to find
out whether classified ad can increase search engine rankings and increase the
number of visitors to a website. The study focus on the influence of classified
ad on Google Pagerank line and number of visitors. This research purposes to
find the effect classified ad on Google Pagerank line and number of visitors to
the website with the comparison period and the number of ads with Google
Pagerank change numbers and number of visitors. The benefits of this study is to
produce a solution for the owner and manager of the website to get a higher
index on Google Page and Google Search through media advertising campaign line
to increase the number of visitors. The research result concluded that
advertising line with Autosubmit Software is effective tools to increase the
number of visitors to four times and effectively index the website domain name
on the first page of Google Search engine but is less effective for keywords
search specifically. In addition, classified ad via Google plus effectively
increase search engine ranking in Google, especially for internet users who
connect to the Google plus network. |
Keywords: |
Classified Ad, Search Engine, Google Pagerank, High Visitor |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
HYSTERETIC SYNCHRONIZATION MODELS OF BIOLOGICAL NEURONS |
Author: |
MIKHAIL SEMENOV, EVGENIA KABULOVA, VLADIMIR MIKHAILOV, OLESYA KAN-ISHEVA |
Abstract: |
The article provides a synchronization model of biological neurons based on the
hysteretic properties of metabotropic receptive clusters. We study the
properties of the proposed model and various variants of connections between
individual neurons. The advantage of the proposed model is its ‘ordered’
response to external environment, which is determined by the hysteretic
connection between individual neurons. The described biological neural network
model may find application in the segmentation tasks and classification with
efficiency exceeding standard numerical algorithms of data handling. |
Keywords: |
Neural Networks, Hysteresis, Simulation, Attractor, Delay Differential
Equations. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
SELECTION OF ROBUST FEATURE SUBSETS FOR PHISH WEBPAGE PREDICTION USING MAXIMUM
RELEVANCE AND MINIMUM REDUNDANCY CRITERION |
Author: |
HIBA ZUHAIR, ALI SELAMAT, MAZLEENA SALLEH |
Abstract: |
Phishers usually evolve their web exploits to defeat current anti-phishing
community. Accordingly, that becomes a serious web threat and puts both users
and enterprises at the risks of identity theft and monetary losses day by day.
In the literature, most computational efforts were dedicated to justify
well-performed phishing detection against evolving phish exploits. However,
facets like exploration of new and predictive features, selecting minimal and
robust features compactness still raise as key challenges to optimize the
detection scenarios over vast and strongly interrelated web. In this study, we
proposed a set of new hybrid features, and refine it as few, maximum relevant,
minimum redundant, and robust features as possible. In the presence of a machine
learning classifier and some assessment criteria that recommended for this
purpose, the reported results experimentally demonstrated that our remedial
scenario could be used to optimize a phish detection model for any anti-phishing
scheme in the future. |
Keywords: |
Hybrid Features, Maximum Relevance, Minimum Redundancy, Goodness, Stability,
Similarity. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
AUTO-RATE ADAPTIVE MECHANISM FOR TRAFFIC-CONTROL IN SENSOR NETWORK |
Author: |
K V UMASHANKAR , DR.C.CHANDRASEKAR |
Abstract: |
Each sensor node in wireless network comprises of different processing ability
with multipath energy sources, resulting in traffic while performing routing.
Control of traffic through multipath routing in sensor network poses a serious
challenge during packet transfer due to different characteristics of sensor
nodes like beam, temperature and seismic sensors minimizing the desired
throughput. If multi-hop traffic occurred on wireless network, the percentage of
delay is also increased and fails in achieving robustness with inefficient
packet transfer rate. In order to achieve the desired reliability during packet
transfer over wireless network, a new mechanism is proposed in this paper. The
mechanism Traffic-control using Auto-rate Adaptive with Medium Access Control (TAAd-MAC)
is designed to improve the efficiency of packet transfer rate on sensor network.
Initially, TAA-MAC creates a route with instantaneous transmission queue length
and identifies the traffic level of nodes in wireless sensor network. The
traffic level of nodes is identified using Fuzzy Markovian Queue based Random
Node Distributed Traffic point. Next to increase the robustness of packet
transfer in sensor network by controlling the traffic, Auto-Rate Adaptive MAC
mechanism is designed. Auto-Rate results in achieving higher throughput
according to the changes observed in the network behavior. Finally, TAA-MAC
mechanism uses the Auto-rate Distributed Contingency Algorithm to reduce the
delay on multipath packet transfer in wireless network. Auto-rate Distributed
Contingency algorithm also helps to reduce the traffic on emergency dynamic
routing on sensor network zone. Experiment is conducted on factors such as
traffic-control routing effectiveness, average delay time on multipath routing
sensor network, and throughput rate. |
Keywords: |
Medium Access Control, Auto Rate, Distributed Contingency Algorithm, Wireless
Sensor Network, Traffic-Control, Fuzzy Markovian Queue |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
INVESTIGATION OF KNOWLEDGE RETRIEVING CHALLENGES IN UNIVERSITIES ENVIRONMENT |
Author: |
ZAINAB AMIN AL-SULAMI, ZAINUDDIN BIN HASSAN, ALI TAHA Al-OQAILY |
Abstract: |
Organizations of various industries linked to education have adopted Knowledge
Management System (KMS) in order to enhance businesses operations to better
provide competitive advantages of services and products. Knowledge Retrieval is
a crucial component of knowledge management. Retrieving focused and valuable
knowledge from explicit sources such as scientific articles is of vital
importance to better serve academic staff of universities so as to enable them
to accomplish their researching and teaching activities more effectively.
Traditional methods of knowledge retrieval are time consuming. Academic staff
members have often exhausted valuable time and effort in their attempts to
extract a precise need of knowledge i.e. expertise. The main aim of this paper
is to analyze the challenges faced daily by academic staff members of
universities in their working environment pertaining to knowledge retrieval. A
questionnaire survey with 50 academic staff members from two Malaysian
universities was conducted to analyze knowledge retrieval challenges as well as
to highlight solutions to these challenges. |
Keywords: |
Knowledge Management, Knowledge Retrieval, Universities, Scientific Articles,
Academic Staff |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN ADVANCED PRODUCT RECOMMENDATION FRAMEWORK BY USING MULTIPLE PRODUCT FEATURE
ANALYTICS |
Author: |
MR.T.SUBHA MASTAN RAO, DR.G.RAMA KRISHNA |
Abstract: |
Online store plays a vital role for product analysis using automatic recommended
system to the new customers. Since purchase patterns of traditional approaches
considered the overall product rating and website preferences in the
recommendation process. Commercial ecommerce recommended system use machine
learning techniques to make appropriate decision rules for the customers during
real-time sessions. Also, various machine learning techniques depend on the type
of product and the number of transactions. It also depends on the customer
purchase history whose purchase rules are close to that of new customers.
Conventional recommendation techniques generate recommendation patterns similar
to products that the target user has computed recommendation by analyzing the
products purchased by the customers who are identical to the target customers.
In this proposed work, an improved multi-feature based product recommendation
system was built on the real time ecommerce sites. In this proposed
architecture, multiple web based products are analyzed and ranked by using
multi-product based recommender system. In this system, multiple products from
different vendors are taken with multiple product features. The proposed work
gives the best solution to the users who are interested in comparing the
different vendors' products for product purchase. Experimental results show that
proposed multi-product system give better user product recommendation compared
to traditional single site product recommendation systems. |
Keywords: |
Online Store, Product Analysis, Automatic Recommendation, Multi Feature |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
A NOVEL PRODUCT FILTERING AND PRODUCT RECOMMENDATION SYSTEM TO OPTIMIZE THE
SEARCH SPACE AND SPARSITY IN REAL TIME ECOMMERCE ENVIRONMENT |
Author: |
MR.T.SUBHA MASTAN RAO, DR.G.RAMA KRISHNA |
Abstract: |
Online Product recommended system is the most effective prediction system in the
e-commerce websites. Customized/Automated recommendation systems can assist the
users to find relevant products within short time in large e-commerce databases.
Several recommendation techniques have been proposed to filter the user
interested products and to optimize e-commerce sales from different vendors.
With the tremendous increase in the products and customers in e-commerce
systems, the time taken to search the required product using traditional
recommended techniques increases due to the large number of products features
and its specifications. With the tremendous growth in the products and customers
information however, the traditional systems encounter two key issues, enhanced
response time and minimized recommending quality. New Qualitative recommended
systems are essential to handle. The traditional techniques can’t implement
search space optimization when the item-space changes; on the other hand, the
overall efficiency of the recommendation system will decrease as the items grow
into a large amount. Sparsity of the product is the most significant basis which
minimizes the inadequate quality. In this paper, a new product filtering and
product recommended system is proposed to optimize the search space and sparsity.
Product filtering can be used to filter the relevant products from the web using
the conditional probability and similarity values. Product prediction based
recommended system is proposed to predict the products ranking based on the
products features as well as calculated predicted probabilities. Experimental
results show that proposed filtering based recommended system outperforms well
on web applications like e-bay in terms of search space and ranking are concern. |
Keywords: |
Online, Product Filtering, Qualitative, Sparsity, Product Filtering |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
REDEFINING ICT GOVERNANCE FOR MALAYSIAN PUBLIC SECTOR |
Author: |
ROSIDA AB RAZAK, MOHAMAD SHANUDIN ZAKARIA |
Abstract: |
The automation of government services using ICT began in 1997, with the
commencement of E-government in Malaysia. The E-government gained it momentum in
early 2000 to satisfy the public insatiable appetite for such services. Later,
we have reached a threshold where some service provisions failed to live up to
public‘s expectation. Clearly, this illustrates the failure of optimizing
existing resources and minimizing risks from which the provisions are expected
to deliver value to public. Businesses took serious view on ICT Governance (ICTG)
to align their strategies, optimize resources, and minimize risks and, above
all, to deliver value. Public sector needs to put effective ICTG into practice.
We contented that Malaysian Public Sector (MPS) still elude a proper ICTG
definition.
Thus, this research is an effort to formulate a specific ICTG definition that
suit MPS but framed within the present and acceptable definition of ICTG for
businesses. The Delphi Method was adopted as a qualitative approach for the
validation process. Where, the validation and refining process is to obtain
experts’ consensus for the proposed definition.
In particular, a proposed definition acknowledges the gulf of differences
between the functions of public services and businesses. Therefore, indirectly
it helps ICTG practitioner in handling ICTG goings-on in their organization, and
to be used as a standard reference in strengthening ICTG practices for MPS |
Keywords: |
ICT Governance, Public Sector, Definition, CSFs, Validation |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
A REVIEW OF FACE SKETCH RECOGNITION SYSTEMS |
Author: |
SALAH EDDINE LAHLALI, ABDELALIM SADIQ, SAMIR MBARKI |
Abstract: |
Police sketching techniques are nevertheless a routine part of law enforcement
investigation and often used to identify suspects from an eye witness memory.
This classic technique of identifying is generally slow and fastidious and may
not conduct to arrest the right offender. Therefore an automatic face sketch
recognition systems that determine efficiently the perpetrator’s appearance from
gallery of face images is required. Such technology design is open challenging
research because faces and sketches are generated from distinct sources and have
different gaps to overcome in low and high levels. Although many methods have
been proposed, we are unaware of any surveys on this particular topic. For this
reason we wrote this paper for reviewing the different researches on recognizing
face from forensic sketch by analyzing their approaches and identifying their
limitations. We also discuss relevant issues such as benchmarking datasets and
evaluation protocols. After, we conclude with several promising directions for
future research. |
Keywords: |
Face Sketch Recognition, Gap, Feature Extraction, Matching Methods, Machine
Learning, Evaluation Protocol, Datasets. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
CURRENT ISSUES IN ENSEMBLE METHODS AND ITS APPLICATIONS |
Author: |
NURA MUHAMMAD BABA , MOKHAIRI MAKHTAR , SYED ABDULLAH FADZLI , MOHD KHALID AWANG |
Abstract: |
This paper reviewed the current state-of-the-art of optimization of ensemble
methods so as to provide us with a better direction of how we will conduct our
research in the future. The primary aim of ensemble method is to integrate a set
of models that are used for solving different tasks so as to come up with
enhanced composite global model, which produces higher accuracy and reliable
estimate than what can be achieved through a single model. Diversity,
combination strategies, number of based classifiers, types of ensemble, and
performance measures are the key factors to be considered in the build of
committees. When the numbers of base classifiers become huge, ensemble methods
incurred high storage space and computational time, selective ensemble is
proposed by most literatures to solve these problems. In terms of optimization
techniques, multi-objectives techniques have become the better ones to use due
to their efficiency in terms of optimization process and they provide a set of
near optimal solution instead of just a single solution. When comparing the
performance of ensemble methods, most of the time, accuracy alone cannot
differentiate which classifiers perform best; for this reason, other performance
measures such as AUC, F-measure, TPR, TNR, FPR, FNR, RMSE were used. Based on
the reviewed literatures, we concluded that in our proposed methodology we would
come up with a new method for comparing and searching for relevant classifiers
from a collection of models that would be used as a model for predicting the
quality of water to achieve higher performance rate than other previous work. |
Keywords: |
Ensemble Method, Classification Model, Diversity Measures, Performance Measures |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN AUTOMATIC HUMAN GAIT RECOGNITION SYSTEM BASED ON JOINT ANGLE ESTIMATION ON
SILHOUETTE IMAGES |
Author: |
ALI SAADOON, MD JAN NORDIN |
Abstract: |
Gait recognition as a biometric attribute has the capability to be recognized in
monitoring systems. In this paper, a method based on joint angle estimation of
body motion for gait recognition is proposed. The representation of gait feature
for the motion angles of upper and lower of body part is investigated and joint
angle is calculated using Fourier, radon and Gabor features. Based on the joint
angles estimation, we build a histogram of the feature individually. In the
measurement stage of distance, x2 function is used to measure the
similarity between these histograms. After that, a classifier is built to
implement the stage of classification. Experiments were tested on CASIA (B)
Database to demonstrate that proposed method can attain a high-quality
recognition performance. |
Keywords: |
Gait Recognition, Silhouette, Joint Angle, Skeletonization, SVM |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
RDB2XSD: AUTOMATIC SCHEMA MAPPING FROM RDB INTO XML |
Author: |
LARBI ALAOUI, OUSSAMA EL HAJJAMY, MOHAMED BAHAJ |
Abstract: |
Extensible Markup Language (XML) is nowadays one of the most important standard
media used for exchanging data on the internet. Massive data is still however
treated, transferred and stored using relational database systems (RDBs).
Therefore, there is a need for an integrated method that deals with database
migration from RDB schema to XML schema. In this paper we provide and develop a
new solution called RDB2XSD that migrates the conceptual schema of RDB into XSD
through a MA (multidimensional array) model. This solution takes an existing RDB
as input and extracts its metadata with as much constraints as possible, creates
the MA model to capture the semantics of the relational database and applies our
mapping algorithm to generate the hierarchical XSD schema. For the
implementation of our approach we developed a tool based on java and tested it
using Oracle and Mysql databases. Our experimental results based on this tool
show that our mapping strategy is feasible and efficient. |
Keywords: |
XML, XSD, Relational Database RDB, Schema Conversion, MA Model |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS |
Author: |
MARWAN ALSHAR’E, ABDULLAH MOHD ZIN, ROSSILAWATI SULAIMAN, MOHD ROSMADI MOKHTAR |
Abstract: |
A number of previous researchers have discussed the vulnerability of TPM to
physical attack and have proposed a number of solutions to solve these issues.
Investigation have shown a number of flaws that these solutions suffers from.
Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was
proposed and evaluated to overcome major safety issue that TPM found to be
vulnerable to. A system prototype based on TPM-UAM was developed to prove the
TPM-UAM ability to protect trusted computers protected by TPM. Expert review
method depends on the understanding that experts are able to provide clear
judgment and opinions from their experience and knowledge in their fields. The
evaluation process consists of three sections, functionality evaluation, ‘can
you break it?’ test and usability evaluation. Three experts in an individual
expert review method were asked to evaluate the system prototype in order to
confirm the system correctness of design and implementation and also to evaluate
the prototype as a reflection of the TPM-UAM and confirm the model ability to
protect trusted computers protected by TPM. The evaluation process was conducted
as planed and the system prototype was successfully evaluated. The results
confirmed on the system’s correct design and implementation, also confirms the
correct imitation and representation of the TPM-UAM model in a software
prototype, as well as the system efficiency and ability to secure TPM. This
paper describes the expert evaluation of software prototype based on TPM-UAM
model. Three experts in the field of trusted computing and information security
evaluated the system prototype individually in three evaluation sections
includes functionality evaluation, ‘can you break it’ test and usability
evaluation. The evaluation results confirms the system correct design, ability
to protect TPM and the reflection of the TPM-UAM model that the prototype system
intended to represent. |
Keywords: |
TPM, Expert Evaluation, Individual Expert Review, Heuristic Evaluation,
Functional Evaluation. |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF MIMO-OFDM RECEIVER USING MODIFIED PTS TECHNIQUE |
Author: |
M. THANIGASALAM, P. DANANJAYAN |
Abstract: |
Partial Transmit Sequence is one of the distortionless methods to reduce the
peak-to-average power ratio (PAPR) in Orthogonal Frequency Division Multiplexing
(OFDM) systems. It is an attractive method since it provides PAPR reduction
without any degradation in bit error rate (BER) performance. PTS has high
computational complexity which increases exponentially with increase in
subblocks. But modified PTS technique of PAPR reduction has decreased this
computational complexity by using a neighbourhood search algorithm for finding
the optimum set of phase factors required for independent phase rotation of the
symbols in each subblock. The potential capability of the modified PTS technique
is explored in MIMO-OFDM systems for PAPR reduction and its performance is
evaluated. In this paper, the performance of MIMO-OFDM system employing modified
PTS technique is investigated by using Least Square (LS) and Minimum Mean Square
Error (MMSE) channel estimation methods. The performance of the system is
evaluated in terms of mean square error (MSE) and bit error rate (BER) for
different subblock sizes and different subcarriers. The simulation results
depict improved BER performance with PAPR reduction by increasing the subblocks.
The results also show that there is a slight degradation in BER with increase in
number of subcarriers. |
Keywords: |
Channel Estimation, Modified PTS, Multiple-Input Multiple-Output Orthogonal
Frequency Division Multiplexing, Peak-to-Average Power Ratio, Bit Error Rate |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
BACKSTEPPING ADAPTIVE CONTROL OF DFIG-GENERATORS FOR WIND TURBINES
VARIABLE-SPEED |
Author: |
Hassan MAHMOUDI, Madiha EL GHAMRASNI, Ahmed LAGRIOUI, Badre BOSSOUFI |
Abstract: |
In this paper, we present a new contribution for control of wind turbine energy
conversion system. A new observer Backstepping control of DFIG-Generators for
Wind Turbines Variable-Speed is developed.
A new control technique for wind systems is presented. This control scheme is
based on an adaptive pole placement control strategy integrated to a
Backstepping control scheme. The overall stability of the system is shown using
Lyapunov technique. The performance and robustness are analyzed and compared by
simulation using Matlab / Simulink software. |
Keywords: |
Wind-Turbine, Double-Fed asynchronous generator (DFIG), MPPT, Adaptive Control
Backstepping, Matlab / Simulink |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
DEVELOPMENT OF LINEAR ENVELOPED SURFACE ELECTROMYOGRAPHY CIRCUIT BASED ON
FOREARM MUSCLE |
Author: |
MUHAMMAD ALIF NORIZAN, FARIZ ALI, NORAFIZAH ABAS, HERMAN JAMALUDDIN, WAN MOHD
BUKHARI, MUHAMMAD ANAS BORHAN, MOHAMAD FAIZAL BAHAROM, ARFAH SYAHIDA MOHD NOR |
Abstract: |
A linear enveloped circuit for processing of EMG signal has been designed and
presented in this paper. The circuit acquires EMG signals from forearm muscle
namely Flexor Digitorum Superficialis (FDS) using surface electrode and
processed in into linear enveloped form. EMG can be defined as the electrical
potential produced due to the contraction of muscle. EMG signal requires
processes of preamplification, band limiting, rectification and smoothing in
order to gain output signal in enveloped form. The output signal can be used for
application in robotic such as prostheses or exoskeleton. |
Keywords: |
EMG, Flexor Digitorum Superficialis, Signal Processing, Preamplifier, Driven
Right Leg, Band pass filter, CMMR, Linear Enveloped EMG Signal, Sallen Key |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
EMPIRICAL PERFORMANCE EVALUATION OF PUCRN AND CBRP-CRN PROTOCOL IN COGNITIVE
RADIO AD-HOC MESH NETWORKS |
Author: |
T. PAVAN KUMAR, E.SURESH BABU, K.RAJASEKHARA RAO, V.SRIKANTH |
Abstract: |
Now a day’s Wireless communication plays an important role in many of the user
applications. Many of these applications follow either unicast or multicast
routing protocol for their communication. In wireless mesh networks multicast
routing protocol is mostly adopted as we can send more data packets to multiple
places at the same time. So it is more important to understand and evaluate
routing protocols in wireless mesh networks as it provides more reliability,
efficiency with less bandwidth than in any other networks. In this paper we have
simulated, examined and analysed two important routing protocols namely Primary
user in cognitive radio network (PUCRN) and cluster based routing protocol in
cognitive radio network (CBRP-CRN) which are models of mesh based routing
protocols in wireless mesh networks. To better evaluate these routing protocols
we have made required changes in the fields like change in number of nodes,
pause time, traffic pattern and other parameters. We have used performance
metrics like end to end delay, throughput and packet delivery ratio to evaluate
the performance of PUCRN and CBRP-CRN in cognitive radio wireless mesh networks.
Our scope of work will help you to compare and evaluate these two routing
protocols using NS2. |
Keywords: |
Wireless Mesh Networks, Routing protocol, CBRP-CRN, PUCRN |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN ADAPTIVE-TRIANGLE METHOD FOR BINARY IMAGE CONTOUR DATA APPROXIMATION |
Author: |
MAJDI FARAG MOHAMMED EL BIREKI, RUQIYA M ALBAHI ALI, ALI ABDRAHMAN M UKASHA, M.
F. L. ABDULLAH |
Abstract: |
This paper presents a new efficient algorithm for contour approximation and
compression. The single step parallel contour extraction (SSPCE) method will be
used in this work to achieve Cartesian representation of the object. We also
discuss the main idea of the analyzed approach to obtain contour approximation
and we will compare it with the Ramer and Trapezoid methods of contour
approximation. For comparison, we are going to use the mean square error and
signal-to-noise ratio criterions. Experimental results are obtained both in
terms of image quality, compression ratios and speed. The main advantages of the
analyzed algorithm are the short computational time of operations and good
quality of approximation. |
Keywords: |
Contour Representation, Contour Compression, Polygonal Approximation, Ramer,
Triangle and Trapezoid Methods |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT BATIK IMAGE RETRIEVAL SYSTEM BASED ON COLOR AND TEXTURE FEATURES |
Author: |
RIMA TRI WAHYUNINGRUM, INDAH AGUSTIEN SIRADJUDDIN |
Abstract: |
Research in batik image retrieval is still challenging today. In this paper, we
present an efficient system for batik image retrieval that combine color and
texture features. The proposed approach is based on color auto-correlogram
method as color feature extraction method and Gray Level Co-occurrence Matrix (GLCM)
method as texture feature extraction method. Firstly, HSV (Hue Saturation Value)
color space but only the hue component is quantized into 18 color categories and
continued in the process of color auto-correlogram. Secondly, converts the batik
image from RGB color space to grayscale to obtain texture features using GLCM
(Gray Level Co-occurrence Matrix). Finally, the integration of the color and
texture features provide a robust feature set for batik image retrieval with
calculates the similarity measure. Precision and recall are used as the accuracy
measure in our proposed research, then the results are compared with the
well-known existing approaches. The experimental results show that the proposed
batik image retrieval is more accurate and efficient in retrieving the user
interested images. |
Keywords: |
Feature Extraction, Color Auto-Correlogram, Gray Level Co-Occurrence Matrix (GLCM),
Image Retrieval |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
INITIAL VALIDATION OF PERSUASIVE MODEL FOR WEB-BASED LEARNING |
Author: |
NOR AZIAH DAUD, NORAIDAH SAHARI , ZURINA MUDA |
Abstract: |
Web-based learning (WBL) has many advantages and its usage has extended from
time to time. However, WBL also has its limitations, thus an innovative design
should be provided to complement the existing design. This research proposes the
appropriate persuasive features of WBL. Those features are then adapted into WBL
to encourage adult learners to engage and use the WBL approach in Islamic
education (WBL-IE). In prior work, an initial persuasive model for Islamic
education was constructed. Experts in the appropriate domains of expertise were
identified to evaluate the persuasive features, and the Delphi technique (DT)
was used to implement the verification process. Therefore, this paper also
discusses the Delphi process and analyses the results. The process began by
establishing preliminary priorities among the persuasive features that include
dimensions, components and elements. To accomplish the process, an instrument in
the form of a questionnaire based on five levels of agreement was created. The
questionnaire was used by the Delphi experts to evaluate the persuasive features
and the median score of the evaluation was analyzed using median score
determination. The results from the first cycle of the Delphi process showed
that all three dimensions, 23 components and most of the proposed elements
should be accepted as persuasive features in the WBL design. The features were
further discussed in depth in the second cycle of the Delphi process. The
discussion covered comments and suggestions from experts regarding the agreed
features. The redundancy of components and support elements when applied in a
Web environment were identified. The experts concluded that three dimensions
should remain in the model and only 18 components together with appropriate
support elements should be included in the persuasive design model for WBL-IE.
|
Keywords: |
Persuasive, Web-Based Learning (WBL), Delphi Technique, Initial Persuasive
Mode,L Islamic Education |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
DATA SYNCHRONIZATION BETWEEN MOBILE DEVICES AND SERVER-SIDE DATABASES: A
SYSTEMATIC LITERATURE REVIEW |
Author: |
ABDULLAHI ABUBAKAR IMAM, SHUIB BASRI, ROHIZA AHMAD |
Abstract: |
It is progressively important for mobile device databases to achieve additional
coordination of diverse computerized operations. To do so, many research works
have been conducted to attain more companionable solutions that can be used to
synchronize data between the mobile device and the server side databases. The
objective of this study is to survey the state of the art in various aspects of
mobile devices with respect to data sharing and synchronization between mobile
device databases and server-side databases as opposed to the server-to-server
synchronizations. To achieve this feat, 5 different electronic databases were
used to identify primary studies using the relevant keywords and search terms
related to mobile data synchronization classified under journals, conferences,
symposiums and book chapters. The study produced interesting results in
different areas such as data synchronization, data processing, vendor
dependency, data inconsistency and conflicts resolutions where 19 primary
studies were selected from the search processes. In our conclusion, mobile data
synchronization has been significantly discussed in the domain of databases. In
general however, it was discovered that, existing synchronization solutions
suffer from a number of limitations such as lack of consistency among data,
resolving conflicts, data processing responsibility, vendor dependency, data
type, bandwidth utilization and network fluctuation during data transmission.
Also the applicability of the existing solutions has not been reported yet. |
Keywords: |
Data Synchronization, Mobile device, Mobile Databases, DBMS, SLR, Heterogeneous |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
CAMERA-BASED TODDLER FALL DETECTION SYSTEM BY USING KALMAN FILTER |
Author: |
LOW HAN LEONG, AINI BT HUSSAIN, MOHD ASYRAF ZULKIFLEY, WAN MIMI DIYANA WAN ZAKI |
Abstract: |
Monitoring a toddler is a tedious job, yet a very important one. Fall down is
the most common risk that leads to injury during the process of learning to
walk. Thus, this paper proposed an algorithm to detect automatically the event
of toddler fall down to assist the supervision process by alerting the caretaker
if necessary. This system comprises of a background subtraction module to detect
region of interest, a tracking module using Kalman filter to track toddler
movement and a decision module through decision tree process to determine the
toddler state. System performance is evaluated based on three metrics, which are
accuracy, sensitivity and specificity. The proposed algorithm works well with a
low error performance. Further research should be done to improve the robustness
of the system for real life environment implementation. |
Keywords: |
Fall Down, Toddler Monitoring, Kalman Filter, Decision Tree Process and
Background Subtraction Module |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD
COMPUTING ENVIRONMENT |
Author: |
SOUVIK PAL, PRASANT KUMAR PATTNAIK |
Abstract: |
Cloud brokering service is an intermediate service which enables the
producer-consumer business model enforcing the easy access to cloud services
from Cloud Service Providers (CSPs). Cloud broker is to provide a platform where
broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and
modeling the data across all the components or units of the cloud services. This
paper deals with designing criteria and issues of cloud broker, system activity
of broker, and sequence diagram of system design with implementation procedure. |
Keywords: |
Cloud computing, cloud broker, Virtualization, Virtual Machine |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
Title: |
ARTIFICIAL NEURAL NETWORKS MODELS OF TETRAHEDRAL FINITE ELEMENTS FOR SOLVING
ANTENNA RADIATION PROBLEMS |
Author: |
EYAD AL-ZURAIQI |
Abstract: |
Abstract. In this work, an Artificial Neural Network (ANN) model of Finite
Element Method (FEM) is developed and presented. The proposed method uses
Hopfield NN that is able to efficiently represent the tetrahedral Finite Element
(FE) functional that is formulated to interpolate the field radiation of a
microstrip patch antenna. This study provide a robust method to combine NN with
tetrahedral FE to provide a highly-reconfigurable memory-saving method, that
help in reducing computational complexity of antenna radiation problems, and
build a real-time analyzer of a reconfigurable antenna system implemented in a
remote area. The proposed method shows a good match with the measured data and
the analytical solutions. |
Keywords: |
Artificial Neural Network, Finite Element Method, Microstrip Patch Antenna |
Source: |
Journal of Theoretical and Applied Information Technology
20th November 2015 -- Vol. 81. No. 2 -- 2015 |
Full
Text |
|
|
|