|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2016 | Vol. 83 No.3 |
Title: |
ANALYSIS OF EFFECTIVENESS OF USING SIMPLE QUEUE WITH PER CONNECTION QUEUE (PCQ)
IN THE BANDWIDTH MANAGEMENT (A CASE STUDY AT THE ACADEMY OF INFORMATION
MANAGEMENT AND COMPUTER MATARAM (AMIKOM) MATARAM) |
Author: |
RAMADHAN ALI AKBAR AMIN, RICHARDUS EKO INDRAJIT |
Abstract: |
To obtain the information from the internet, a good internet network is required
so that the users can search for information comfortably and easily. One of the
problems is that there is no bandwidth management and the connection is bad and
slow due to the users who are downloading or streaming. Downloading and
streaming required a large banwidth so that the users can get good connection.
In managing bandwidth, Simple Queue and Per Connection Queue on mikrotik because
they have similarity. However, they also have the difference on the
effectiveness with configuration and result. |
Keywords: |
Bandwidth Management, Internet, Mikrotik, PCQ, Simple Queue, Questionnaire. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
IMPROVING THE PERFORMANCE OF OUTLIER DETECTION METHODS FOR CATEGORICAL DATA BY
USING WEIGHTING FUNCTION |
Author: |
NUR ROKHMAN, SUBANAR, EDI WINARKO |
Abstract: |
Outliers are uncommon events in real life. For a database processing, outlier
means unusual records comparing to the remaining records. An outlier can be
caused by a damage of a system. A new fact in a system can also cause outliers.
Outlier detection is an important task to find an exceptional data.
Outlier detection methods for categorical data such as AVF, MR-AVF, AEVF, NAVF,
OPAVF, WDOD, and FuzzyAVF work base on the attribute value data frequency. These
methods start the outlier detection process by calculating the data of attribute
value frequency on each attribute. Then, many complicated calculations based on
the various mathematical background are carried out to find the outlier by using
the data of attribute value frequency.
All the methods above do not take into account on the sparseness of each
attribute. In this paper, weighting functions is used to take into account the
sparseness of each attribute. AVF and WDOD methods are modified by using
weighting function. The performance of these modified methods is observed based
on the detected outlier of UCI Machine Learning datasets. The experiment shows
that weighting function can improve the performance of AVF and WDOD on the
outlier detection in Adult, Mushroom, and Nursery datasets. |
Keywords: |
Outlier Detection, Categorical Data, Weighting Function. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
AN EFFICIENT CLOUD BASED KEY AGGREGATE DATA SHARING |
Author: |
P.SRINIVAS KUMAR, Dr.B.THIRUMALA RAO |
Abstract: |
Cloud Infra contains a gathering of capacity servers, giving a fantasy of
boundless stockpiling what's more, getting to. Security is one of the basic
segments of such a framework. Putting away information at a remote outsider's
cloud framework is continually bringing on genuine worry over information
classification and survivability. Numerous encryption plans secure information
trustworthiness, however they constrain the usefulness of the information
proprietor particularly concerning disavowal on the grounds that a solitary key
based assurance plans are utilized for encoded information. So we propose
another cryptosystems that can create a settled estimated information securing
keys such that an information appointment occasion requires allocating an
arrangement of irregular keys to arbitrary customers as decoding rights for
particular arrangement of figured substance. An fascinating element is that one
can total numerous arrangement of mystery keys from single mystery solidarity
and at the same time making them as reduced as could be allowed simply like
their guardian single solidarity, yet at same time pressing the force of the
considerable number of keys being collected that can interestingly allocated to
a client. The JSON Web Algorithms (JWA) detail registers cryptographic
calculations and identifiers to be utilized with the JSON Web Signature (JWS) [JWS],
JSON Web Encryption (JWE) [JWE], and JSON Web Key (JWK)[JWK] particulars. It
characterizes a few IANA registries for these identifiers. Every one of these
details use Java Script Object Notation (JSON) based information structures.
This is utilized to produce comparable script picture era for handling effective
capacity in distributed computing. Our trial results show proficient execution
environment on assessing script picture partaking in cloud. |
Keywords: |
Cloud Computing, Attribute Based Encryption, Scalable And Reliable Data
Encryption And Decryption, Secure Hashing. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
ACHIEVING QOS REQUIREMENTS USING EVOLUTIONARY COMPUTATION SCHEDULING SCHEMES IN
802.16 NETWORKS |
Author: |
UMMITI SREENIVASULU, DR. PV. NAGANJANEYULU , DR. MN. GIRIPRASAD |
Abstract: |
The exponential growth observed in the arena of wireless access technologies
predominantly in the IEEE 802.16 networks put forth’s a large overhead in the
uplink scheduling schemes particularly when rendering real time services. This
paper introduces an evolutionary computation based uplink scheduling scheme (ESS)
with Quality of Service (QoS) gurantee. A service threshold time is introduced
in the ESS scheme to meet the QoS requirements and it determines the adaptive
weights assigned to the service. The base station based on the weights
ascertains the modulation scheme required to evade QoS violation and constructs
the scheduling set. In addition of the adaptive weights the channel interference
parameters is also considered to construct the scheduling set. The scheduling
set is optimized to achieve the desired QoS parameters utilizing evolutionary
computation techniques. The performance of ESS scheduling scheme is evaluated
and the results obtained not only prove higher slot success rates, higher system
throughput but also prove its QoS provisioning competence and its efficiency
over an existing scheduling scheme. |
Keywords: |
MIMO, OFDMA, IEEE 802.16, Evolutionary Computing, Quality of Service (QoS),
Uplink (UL), Uplink Scheduling, Adaptive weights, Service Threshold Time,
Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
A NON-BLIND ROBUST WATERMARKING APPROACH FOR 3D MESH MODELS |
Author: |
OLA M. EL ZEIN, LAMIAA M. EL BAKRAWY, NEVEEN I. GHALI |
Abstract: |
This paper presents non-blind and robust watermarking approach for
three-dimensional (3D) mesh models using K-means clustering technique. K-means
clustering technique is used to cluster 3D mesh vertices into suitable or
non-suitable watermark carrier based on feature vector. Then the watermark is
inserted in the selected vertices for being carrier watermark that come out from
K-means clustering technique and the other vertices are ignored. The watermark
insertion is done by modifying the vertex position without causing perceptible
distortion to 3D mesh models. Experimental results show that our watermarking
approach is imperceptible and robust against different geometric attacks such as
noise addition, cropping and mesh smoothing. |
Keywords: |
Digital Watermarking, K-Means Clustering Technique, 3D Mesh, Feature Vector,
1-Ring Neighborhood |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
FORECASTING THE CASE OF TRAFFIC ACCIDENTS THROUGH THE GEOGRAPHIC INFORMATION
SYSTEM (GIS) APPLICATION METHOD WITH DOUBLE EXPONENTIAL SMOOTHING AND ANALYTICAL
HIERARCHY PROCESS (AHP) IN CITY OF JAYAPURA-PAPUA |
Author: |
CHALEB O.L. PANYUWA, EKO SEDIYONO, ADE IRIANI |
Abstract: |
Traffic accidents is a problem that needs great attention from all parties, both
government and society. Traffic accidents has high cases in Indonesia can caused
by various factors, namely: environmental factors (nature), the driver and the
road. The aim of this study is to provide constructive advice to Traffic Officer
of Jayapura to facilitate the countermeasures of cases Traffic Accident in the
City of Jayapura with the presentation of accurate data information so that, it
can be set the right solution to fight and prevent cases of Traffic Accident in
the City of Jayapura. Double Exponential Smoothing methods used to forecast the
vulnerable data to Traffic Accident and AHP is used to determine the dominant
criteria. The results of AHP in visualized in the form of GIS. Through the
application of WebGIS Traffic Officer can present the accurate data to support
the process of countermeasures and prevention the cases of Traffic Accident in
the City of Jayapura, so as to provide good performance for Traffic Officer in
Jayapura. |
Keywords: |
Traffic Accidents, Double Exponential Smoothing, Analytical Hierarchy
Process, Geographic Information System. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
ANALYSIS AND IMPROVEMENT ON STATISTICAL NATURALNESS MEASURE |
Author: |
NUR HALILAH BINTI ISMAIL, SOONG-DER CHEN |
Abstract: |
Although Statistical Naturalness Measure (SNM) can rate the naturalness of
image’s contrast relatively well, but it suffers from the problem of
inconsistent rating across different spatial resolution; ratings for images with
identical content and contrast level but different spatial resolution might be
significantly different. The statistical model SNM was developed upon sample
images with certain spatial resolution and the contrast was defined using a
specific block size. This paper suggests that the problem is due to the
computation of contrast using fixed block size regardless of the spatial
resolution of the input image. It is proposed to rescale the block size based on
the spatial resolution of input image to keep the ratio of block size to image
size similar to those of the sample images used in developing the statistical
model of SNM. The proposed method is tested and proven statistically to be
effective in reducing the inconsistency in the ratings of images across
different spatial resolution such there is no significant difference among them. |
Keywords: |
Naturalness, Contrast, Statistical Naturalness, Contrast, Image Quality
Assessment Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
AN EMPIRICAL STUDY ON SUCCESS FACTORS TO ENHANCE CUSTOMER TRUST FOR MOBILE
COMMERCE IN SMALL AND MEDIUM-SIZED TOURISM ENTERPRISES (SMTES) IN JORDAN |
Author: |
SALEH ALQATAN, NOOR MAIZURA MOHAMAD NOOR, MUSTAFA MAN, ROSMAYATI MOHEMAD |
Abstract: |
Even though mobile technologies and wireless communication are growing at a very
rapid phase all over the world, still the development of mobile commerce is
hindered by a lot of aspects. Researchers all over the world are actively
studying on this domain to understand the factors that affect the acceptance of
M-commerce. A lot of studies have recognized that 'trust' is an crucial factor
that impacts the acceptance of M-commerce in a lot of domains, including the
Small and Medium-sized Tourism Enterprises (SMTEs). Nevertheless it is not an
easy task to make the customers to trust M-commerce for various reasons.
Furthermore, trust has been identified as a major obstacle of mobile commerce
applications. Drawn from previous literatures on trust in the information system
and M-commerce, this study proposed a new model for investigating trust in
M-commerce acceptance by SMTEs in developing countries, which focused on Jordan.
The study distributed the questionnaire to 361 respondents employed in Jordanian
SMTEs. The trust factors were investigated to assess their influence on user’s
trust in M-commerce applications for SMTEs via descriptive and inferential
statistical analysis. Results of the analysis revealed that all factors, except
for ‘structural assurance’ and ‘calculative-based trust’, affect the user’s
trust in such applications. The study provides a clear understanding of decision
maker’s perception about M-commerce acceptance in their businesses. This study
is important in a global context, as SMTEs in Jordan are going for exporting
their product in the global marketplace. |
Keywords: |
Customer Trust, M-Commerce, Smtes, Jordan, Trust Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
CLASSIFICATION OF GENES FOR DISEASE IDENTIFICATION USING DATA MINING TECHNIQUES |
Author: |
P M BOOMA, DR.S.PRABHAKARAN |
Abstract: |
Scientists are nowadays providing great awareness about microarray gene
expression dataset. Researches tell that data mining fails to recognize the most
important biological associations between genes. Recently biological information
mining using clustering techniques were used for the analytical evaluation of
gene expression. There are many challenges exist in the existing methods.
Optimization Algorithm for multi dimensional search space does not provide
relational optimization result on varying gene expressional problems. The
existing method solves the clustering problem, but bi-cluster based gene
expression information was not extracted. A key point on existing work was to
handle multi modal structure optimization problems with effective searching
process, but it does not offer relational sequence optimized result on the
associated gene data.
To overcome the above issues, the proposed research is developed. The objective
of the proposed research is to extract the biological information and identify
the relational sequences on gene expression to identify abnormal genes. The
proposed techniques like biological process on physiological data, PCPHC and
Bi-clustered Ant Optimized Feature Relational Sequencing extract the biological
process information from gene expression datasets. These techniques are tested
on various bench marked datasets called Cancer Gene Expression datasets Broad
Institute repository for experimental evaluation of the proposed method with an
existing method, which identifies and extracts the hidden information from
datasets. Finally, the gene patterns were verified as normal or abnormal on the
basis of simple pattern matching process. |
Keywords: |
Gene Expression Datasets, Heuristic Search, Hierarchical Clustering Model,
Feature Relational Sequencing |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
AN ANALYSIS OF IMAGE QUALITY ASSESSMENT ALGORITHM TO DETECT THE PRESENCE OF
UNNATURAL CONTRAST ENHANCEMENT |
Author: |
NUR HALILAH BINTI ISMAIL, SOONG-DER CHEN, LIANG SHING NG, ABD RAHMAN RAMLI |
Abstract: |
Image contrast enhancement purposely aim the visibility of image to be
increased. Most of these problems may happen after contrast enhancement:
amplification of noise artifacts, saturation-loss of details, excessive
brightness change and unnatural contrast enhancement. The main objective of this
paper is to present an extensive review on existing Image Quality Assessment
Algorithm (IQA) in order to detect the presence of unnatural contrast
enhancement. Basically, the IQA used produced quality rating of the image while
consistently with human visual perception. Current IQA to detect presence of
unnatural contrast enhancement: Lightness Order Error (LOE), Structure Measure
Operator (SMO) and Statistical Naturalness Measure (SNM). However, result of
current IQA evaluation shows it may not giving consistent quality rating with
human visual perception. Among three IQAs, SNM demonstrate better performance
compared to LOE and SMO. But, it suffers with consistent rating for different
spatial image resolution in same image content. Thus, an improvement suggested
in this paper to overcome such problem occurred. |
Keywords: |
Contrast Enhancement, Unnatural Enhancement, Contrast Naturalness, Naturalness
Quality |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
CENTRALIZED AVAILABILITY ASSURANCE FOR DISTRIBUTED ELECTRONIC MEDICAL RECORD
DATA |
Author: |
YB DWI SETIANTO, SHINTA ESTRI WAHYUNINGRUM |
Abstract: |
Many developed countries have started to adopt Electronic Medical Records (EMR)
to improve their health care system. In the implementation of EMR, security and
privacy factors are of great concern, and one of the main aspects of access
security assurances is the assurance of data availability when they are needed.
Thus, it is very important to be able to provide a valid EMR data availability
assurance for the patients when it is needed. However, in our country,
nationally centralized availability assurances have not been available yet. This
paper proposed a system of centralized EMR data availability assurance utilizing
the checksum data generated from the hash function. |
Keywords: |
Electronic Medical Rrecord, Security ,Availabiliy Assurance, Health Network |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
SPEED CONTROL OF THE DOUBLY FED INDUCTION GENERATOR APPLIED TO A WIND SYSTEM |
Author: |
HALA ALAMI AROUSSI, ELMOSTAFA ZIANI, BADRE BOSSOUFI |
Abstract: |
This paper presents a nonlinear control of doubly fed induction generator (DFIG)
integrated with a wind system. Initially, we propose a model of wind turbine and
generator in order to apply the Field Orientation Control (FOC) approach. The
Vector Control is still the most commonly used for the control of power and
reactive powers, as well as in many industrial systems especially in production
of electrical energy. Next, the synthesis of a proportional-integral regulator
(PI) is presented. Subsequently, a technical control for wind energy systems is
developed. The principle of this control is to direct the flux vector to make
the doubly fed induction machine similar control standpoint to a separately
excited DC machine. The performance’s system is analyzed and compared with a
validation on the environment Matlab / Simulink. |
Keywords: |
DFIG, Vector Control, Wind Energy, PI Controller |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
A NEW SOFT COMPUTING TECHNIQUE FOR EFFICIENT RULE MINING |
Author: |
SIJI P D , DR.M.L.VALARMATHI , S.MOHANA |
Abstract: |
This paper proposed a prediction model based on Fuzzy Association Rule (FARs).
Present a two model; it is the integration of the Fuzzy C-Means (FCM) and
Multiple Support Apriori (MS apriori). Even though, enhancing the knowledge from
the large dataset, give large amount of data. So reduce some amount of data
through hybrid approach of Genetic algorithm (GA) with Particle Swarm Optimation
(PSO), both useful for the fuzzy association rule. Extraction of knowledge
process is performed thorough betathalesemia Dataset. FCM and MSapriori model is
used to extract the FARs. experimental result proves the proposed model of
hybrid feature reduction with FCM-MS apriori model is effectively predict the
knowledge from the large database compared to other prediction model. |
Keywords: |
Association Mining, Fuzzy Rule, Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
NEW VARIABLE NEIGHBORHOOD SEARCH METHOD FOR A TWO LEVEL CAPACITATED LOCATION
ALLOCATION PROBLEM |
Author: |
A.AIT BASSOU , M.HLYAL , A.SOULHI, J. EL ALAMI |
Abstract: |
The distribution network design is placed as strategic choice that have an
influence either in the commercial issue as the tactical action or in
operational management of the supply chain. Numerous economical decision
problems concern selecting and or locating certain facilities to satisfy,
efficiently, a given demands points. This article aims to provide a resolution
for a facility location allocation problem in a distribution network. We focus
on the choice of stores locations. These are designed to meet customer demands.
Indeed, we consider the majority of economic parameters to fulfill a model of
the distribution network, similar to a Two Level Capacitated Location Allocation
Problem TLCLAP. A new Variable Neighborhood Search approach is proposed to
resolve the problem. |
Keywords: |
Variable Neighborhood Search, Supply Chain Management, Location-Allocation
Problem |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
AUTOMATED SERVICE IDENTIFICATION FRAMEWORK (ASIF) |
Author: |
ALI TAEI ZADEH, MURIATI MUKHTAR, SHAHNORBANUN SAHRAN, ZAHRA LOTFI |
Abstract: |
Service oriented architecture (SOA) has been used to achieve business-IT
alignment in industries for recent years. Service identification represents the
first phase in service modeling, a necessary step in SOA. Reviewing existing
service identification methods (SIMs) reveals the lack of business alignment,
automation, and quality of services as challenging issues. Hence, the main aim
of this research is to propose a service identification framework (ASIF) that
results in the automated identification of business aligned services which
satisfy service quality factors such as cohesion, coupling and reusability. ASIF
relies on business aligned entities based on business processes and business
goals as unique sources of inputs to guarantee delivery of business aligned
services. The proposed ASIF will serve as a comprehensive guideline for service
identification that spans from scope determination to refinement of service
candidates. In order to achieve this goal, it is necessary to firstly identify
and select suitable SIM input types and secondly, to determine appropriate
techniques to extract services automatically. Subsequently, the proposed
framework is then validated and finally an ASIF tool to support automation is
developed. |
Keywords: |
SOA, service identification, AHP, Business-IT alignment, automated tool, BPMN,
KAOS |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
PLAYABILITY AND SOCIAL EXPERIENCES: AN ACCEPTANCE STUDY OF INTERACTIVE VIDEO
PUZZLE TECHNOLOGY IN PRESCHOOL SETTING |
Author: |
LIEW TZE HUI, LAU SIONG HOE, HISHAMUDDIN ISMAIL, AFIZAN AZMAN, TEOH KUNG KEAT |
Abstract: |
Interactive Video Puzzle Based Learning solution is designed to better utilize
children's strengths and creativity to solve “unstructured” problems in an
entertaining ways. Any interactive learning technology will not be a success
without acceptance and usage by the target population. The interactive video
puzzle prototype was tested using interactive playability and social usability
attributes. Interactive playability explain the capability of video puzzle game
to provide enjoyment for children player, while social usability is used to
explain the predictors that will improve the ease of children-computer-children
interactions.
In this paper, we employed interactive playability and social usability
attributes in explaining interactive video puzzle learning technology acceptance
in preschool setting. Interactive Video Puzzle Acceptance Model had been
employed to evaluate the acceptance of video puzzle technology. Results
indicated that interactive playability and social usability does matter to
children. The feedbacks from the study highlighted that the fact children’s
preference is for fun in video puzzle learning activities, which is no surprise.
Furthermore, the children perceived that their teacher would choose the
interactive video puzzle learning solution on how good it was for their
learning. In particular, this paper is aimed to introduce an initial attempt to
test the interactive playability and social usability attributes to predict
children’s acceptance of interactive video puzzle in preschool setting. |
Keywords: |
Video Puzzle, Interactive Playability, Social Usability, Video Puzzle Based
Learning, Problem Solving Kit |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF COOPERATIVE COMMUNICATION SYSTEMS USING WIRELESS OPEN
ACCESS RESEARCH PLATFORM FOR INDOOR AND OUTDOOR ENVIRONMENT |
Author: |
SUWADI, TITIEK SURYANI, IDA ANISAH |
Abstract: |
Effect of multipath fading can decrease the performance of wireless
communication systems. The multi-input multi-output (MIMO) technique, which uses
multiple antennas, often used to overcome multipath fading. This technique is
one of the diversity techniques. Some wireless devices have limitation about the
size, cost, and hardware complexity, so there can not implement a multiple
antenna. Then, new technique has been developed to overcome these limitations,
there was called cooperative communication systems. Although the cooperative
communication system has been widely studied, but it was not much researcher
already implemented this system. Therefore, this study will be conducted a
simulation and implementation of cooperative communication system on Wireless
Open Access Research Platform (WARP) module using Demodulate and Forward
relaying techniques with Maximum Ratio Combining (MRC) and Selection Combining
(SC). In this research will compare the performance of cooperative communication
system with non-cooperative communication system, i.e. Single Input Single Ouput
(SISO) and multi-hop to evaluate the BER performance as function of the transmit
power and distance variation. At the first scheme of BER measurement, the
distance between the source and the destination was fixed as 6 meters, relay was
right in the middle, and the transmit power be varied from -39.67 dBm to -11.47
dBm. In the second scheme, the transmit power was be adjusted -39.67 dBm, the
distance between the source and destination in a variation of 1 meter to 6
meters. The results of measurement showed that cooperative communication system
with MRC better than SISO communication systems, multi-hop communication and
cooperative communication system with SC for indoor or outdoor environment. |
Keywords: |
Cooperative Communication System, Relay, Demodulate And Forward, MRC, SC, WARP |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
Title: |
A NOVEL LOW-COMPLEXITY SUB-BLOCK NLMS-DRMTA ALGORITHM FOR BLIND MULTIUSER
DETECTION IN WCDMA SYSTEMS |
Author: |
RAED S.H. AL-MUSAWI |
Abstract: |
In this paper, we present a novel adaptive beamforming algorithm for multiuser
detection in wideband code division multiple access (WCDMA) systems. The
algorithm is based on a new sub-block normalized least mean squares optimization
in conjunction with the despread-respread technique. We denote this new
algorithm using the acronym Sub-Block NLMS-DRMTA, which stands for sub-block
normalized least mean squares despread-respread multitarget array. A novel
adaptive step size rule has been proposed based on the variance of the array
input signal, which has resulted in enhanced robustness to estimation errors and
very low computational complexity. The proposed algorithm has been benchmarked
against exiting block-based and sample-based DRMTA algorithms. The bit error
rate (BER) performance of our algorithm outperformed the performance of the
block-based least squares despread-respread multitarget constant modulus array
(LS-DRMTCMA) algorithm by a wide margin. In comparison to the sample-based
(Sample NLMS-DRMTA) algorithm, the proposed algorithm achieved superior or
similar BER performance at a markedly reduced computational complexity and
significantly faster convergence. In addition, the proposed algorithm exhibited
significantly better robustness compared to that of the sample-based recursive
least squares (Sample RLS-DRMTA) algorithm at low signal-to-noise ratio (SNR)
and/or high number of users. Moreover, the proposed algorithm has substantially
lower complexity than the Sample RLS-DRMTA algorithm. Thus, the Sub-Block
NLMS-DRMTA algorithm represents a viable approach for achieving both improved
BER performance and fast convergence at very low computational complexity. |
Keywords: |
DRMTA, Smart Antennas, NLMS-DRMTA, CDMA Systems, Computational Complexity |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2016 -- Vol. 83. No. 3 -- 2016 |
Full
Text |
|
|
|