|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
| |
|
Journal of Theoretical and Applied Information Technology
30th April 2009 | Vol. 5 No. 4 |
Title: |
UNSUPERVISED TEXTURE CLASSIFICATION |
Author: |
Dr.
G.WISELIN JIJI, Dr.L.GANESAN, Mr. S.SANKAR GANESH |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
We propose a novel unsupervised
classification model which combines colour and texture features. Each feature is
associated to a so called feature vector, where a colour fuzzy texture spectrum
is defined using only the corresponding feature. It interacts with each feature
vector and provides the unsupervised texture classification based on the
combination of different features. The model is quite generic and isn’t
restricted to a particular texture feature. Herein we tested this algorithm
using other texture features. Furthermore, the proposed algorithm automatically
estimates the number of classes. The proposed approach gives good accuracy when
compared with other methods. |
|
Full Text |
|
Title: |
Bi
Directional Associative Memory Neural Network Method in the Character
Recognition |
Author: |
Yash Pal Singh, V.S.Yadav, Amit Gupta, Abhilash Khare |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Pattern recognition techniques are
associated a symbolic identity with the image of the pattern. In this work we
will analyze different neural network methods in pattern recognition. This
problem of replication of patterns by machines (computers) involves the machine
printed patterns. The pattern recognition is better known as optical pattern
recognition. Since, it deals with recognition of optically processed patterns
rather then magnetically processed ones. A neural network is a processing
device, whose design was inspired by the design and functioning of human brain
and their components. There is no idle memory containing data and programmed,
but each neuron is programmed and continuously active. Neural network has many
applications. The most likely applications for the neural networks are (1)
Classification (2) Association and (3) Reasoning. One of the applications of
neural networks is in the field of pattern recognition. The Bidirectional
associative memory does heteroassociative processing in which, association
between pattern pairs is stored. The Bidirectional Associative has capacity
limitations. It can store and correctly recognize only six characters, with the
condition that the characters should be slightly similar in shape. |
|
Full Text |
|
Title: |
GENETIC ALGORITHMS, TABU SEARCH AND
SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS
OF TRANSPOSITION CIPHER |
Author: |
Poonam Grag |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Due to increasing incidents of cyber
attacks, the demand for effective internet security is increasing. Cryptology is
the science and study of systems for secret communication. It consists of two
complementary fields of study: cryptography and cryptanalysis. In this paper, we
propose a cryptanalysis method based on genetic algorithm, tabu search &
simulated annealing to break a transposition cipher. We will also compare and
analyze the performance of these algorithms in automated attacks on a
transposition cipher. A generalized version of these algorithms can be used for
attacking other cipher as well. |
|
Full Text |
|
Title: |
THE IMPACT OF EMERGING RFID TECHNOLOGY IN
THE WIREFREE ENVIRONMENT FOR AUTOMATIC IDENTIFICATION, DATA COLLECTION AND
DEDICATED SHORT RANGE COMMUNICATION |
Author: |
Dr.
S. S.Riaz Ahamed |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Radio Frequency Identification is a
dedicated short range communication (DSRC) technology. With RFID, the
electromagnetic or electrostatic coupling in the RF (radio frequency) portion of
the electromagnetic spectrum is used to transmit signals. An RFID system
consists of an antenna and transceiver, which read the radio frequency and
transfer the information to a processing device (reader) and a transponder, or
RF tag, which contains the RF circuitry and information to be transmitted. The
antenna provides the means for the integrated circuit to transmit its
information to the reader that converts the radio waves reflected back from the
RFID tag into digital information that can then be passed on to computers that
can analyze the data. In RFID systems, the tags that hold the data are broken
down into two different types. Passive tags use the radio frequency from the
reader to transmit their signal. Passive tags will generally have their data
permanently burned into the tag when it is made, although some can be rewritten.
Active tags are much more sophisticated and have on-board battery for power to
transmit their data signal over a greater distance and power random access
memory (RAM) giving them the ability to store up to 32,000 bytes of data. RFID
is used to describe various technologies that use radio waves to automatically
identify people or objects. RFID is becoming increasingly prevalent as the price
of the technology decreases. |
|
Full Text |
|
Title: |
EFFICIENT CHANNEL ALLOCATION BASED ON THE
WEIGHTS OF VIDEOS USING AGENTS |
Author: |
H S Guruprasad and
Dr. H D Maheshappa |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
This paper proposes a load sharing
algorithm with higher priority given to the videos with higher weights using
agent technology. A mobile agent periodically updates the popularity and the
weight of the videos which is used for efficiently allocating the channels. The
proposed approach reduces the load on the central multimedia server, allocates
more channels for higher weight videos and maximizes the channel utilization
between the neighboring proxy servers and the central multimedia server. The
simulation results prove the load sharing among the neighboring proxy servers
and hence reducing the load on central multimedia server, maximum channel
utilization and more channel allocation for weight videos. |
|
Full Text |
|
Title: |
EVALUATION OF VIRTUAL CLASS APPLICATIONS
IN TERMS OF PRINCIPLES OF MULTIMEDIA DESIGNING AND USE OF VISUALS |
Author: |
Abdullah
Kuzu, Ömer Uysal, Kerem Kılıçer |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Today, the increase in the demand for
higher education has made it necessary for individuals to take professional
development trainings and life-long learning into consideration following their
university education due to the requirements of business life. In addition,
institutions require their personnel to develop their knowledge and skills
constantly. As a result, there has been an increase in virtual education
applications in the world. Especially higher education institutions open online
courses in virtual classes and execute virtual education applications in
accordance with the needs of public and private institutions. However, for the
virtual class applications executed to provide an effective online educational
environment, it is necessary to determine the efficiency of these applications
in terms of principles of multimedia designing. In this respect, this study
evaluates the 42 visuals and 72 multimedia screens – used in virtual class
applications executed in four universities leading online learning - in terms of
principles of multimedia designing and use of visuals. As a result of the
study, it was revealed that not enough visuals were used in instructional
multimedia messages used in virtual class applications executed for educational
purposes at universities, that there was unnecessary use of the scroll-bar, and
that the visuals and the related explanations were not efficiently made free of
cognitive load. In line with the research findings, it is seen that universities
experienced enough in virtual class applications are not able to use multimedia
components functionally. |
|
Full Text |
|
Title: |
ENERGY AWARE NODE DISJOINT MULTIPATH
ROUTING IN MOBILE AD HOC NETWORK |
Author: |
M. BHEEMALINGAIAH, M. M.
NAIDU, D. SREENIVASA RAO, G.VARAPRASAD |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
With the advance of wireless
communication technologies, small-size and high-performance computing and
communication devices like commercial laptops and personal digital assistants
are increasingly used in daily life. After the success of second generation
mobile systems, more interest was started in wireless communications. This
interest has led to two types of wireless networks: infrastructured wireless
network and infrastructureless wireless network, it is also called Mobile Ad-Hoc
Network (MANET). The Mobile Ad Hoc Networks are essentially suitable when
infrastructure is not present or difficult or costly to setup or when network
setup is to be done quickly within a short period. They are very attractive for
tactical communication in the military and rescue missions. They are also
expected to play an important role in the civilian fora such as convention
centers, conferences, and electronic classrooms. The nodes in the MANET are
typically powered by batteries which have limited energy reservoir. Some times
it becomes very difficult to recharge or replace the battery of nodes; in such
situation energy conservations are essential. The lifetime of the nodes show
strong dependence on the lifetime of the batteries. In the MANET nodes depend on
each other to relay packets. The lost of some nodes may cause significant
topological changes, undermine the network operation, and affect the lifetime of
the network. Hence the energy consumption becomes an important issue in MANET.
We proposed an Energy-aware Node-disjoint Multipath Routing (ENDMR) protocol,
which balances node energy utilization to increase the network lifetime, it
takes network congestion into account to reduce the routing delay and increases
the reliability of the packets reaching the destination. |
|
Full Text |
|
Title: |
IMPLEMENTATION OF FM-ZCS-QUASI RESONANT
CONVERTER FED DC SERVO DRIVE |
Author: |
K. NARASIMHA RAO, DR V.C.
VEERA REDDY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
This paper deals with the implementation
of FM-ZCS-QRC fed DC servo drive using micro controller. The salient feature of
QRC is that the switching devices can be either switched on at zero voltage or
switched off at zero current, so that switching losses are zero ideally,
switching stresses are low, volumes are low and power density is high. This
property imparts high efficiency and high power density to the converters. The
output of QRC is regulated by varying the switching frequency of the converter.
Hence it is called Frequency modulated Zero current/zero voltage switching quasi
resonant converter. The present work deals with simulation and implementation of
DC Servo motor fed from ZCS-QRC. Simulation results show that the ZCS-QRC’s have
low total harmonic distortion. The ZCS-QRC operating in half wave and full wave
modes are simulated and implemented successfully. The experimental results are
compared with the simulation results. |
|
Full Text |
|
Title: |
Applying Channel Equalization Techniques
to STBC OFDM – CDMA System in the Presence of Multi-path Frequency Selective
Channel Fading |
Author: |
Nelly Muhammad Hussein,
Adel El-Sherif, Abd El-Wahhab Fayez |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
In this paper three systems are joined
together in order to mitigate distortion effect caused by multipath fading.
Those systems are; space time block coding (STBC), code division multiple access
(CDMA), and orthogonal frequency division multiplexing (OFDM). The proposed STBC
OFDMCDMA system has been simulated in the presence of frequency selective fast
multipath fading channel which is considered the worst form of channel fading.
Therefore, system performance depends mainly on channel equalization technique
applied at the receiver. In this paper, a comparison among three channel
equalization schemes was introduced, those schemes are; phase equalizer (PE),
maximal ratio (MR), and minimum mean square error equalizer (MMSE). Those
equalization schemes have been compared under various system conditions and
using different modulation techniques. The main problem of OFDM system is the
relative high peakto-average power ratio (PAR). Therefore, three techniques for
reducing the PAR have been applied into the proposed STBC OFDM-CDMA transmitter.
Channel coding is essential for any wireless communication system especially in
the presence of this bad fading form. This is coming from its ability of error
detection and correction at the receiver. Two types of channel coding,
Hamming and convolutional coding, have been introduced into the proposed system
in order to enhance its performance |
|
Full Text |
|
Title: |
USING A CONFLICT-BASED METHOD TO SOLVE
DISTRIBUTED CONSTRAINT SATISFACTION PROBLEMS |
Author: |
SAMANEH HOSEINI SEMNANI,
KAMRAN ZAMANIFAR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
A broad range of AI and multi-Agent
problems fall in to the Distributed Constraint Satisfaction Problems category.
Many of the problems in this domain are real-world problems. This fact makes
DisCSPs an effective area of research. Considering all of the efforts that have
recently been accomplished for solving these kinds of the problems, the most
successful algorithm proposed is Asynchronous Partial Overlay (APO), which is a
mediation-based algorithm. APO tries to solve the problem first by dividing the
whole problem in to smaller portions and then solving these sub-problems by
choosing some agents as mediators. This paper presents a new and effective
strategy to select these mediators; moreover, it introduces two new expansion
algorithms of APO that use this new strategy. These algorithms are called
MaxCAPO and MaxCIAPO. The chief idea behind this strategy is that the number of
mediators' conflicts (violated constraints) impacts directly on their
performance. Experimental results show that choosing the agents which have the
most number of conflicts as mediators not only leads to a considerable decrease
in APO complexity, but also can decrease the complexity of the other extensions
of the APO, such as IAPO algorithm. The results of using this conflict-based
mediator selection strategy show a rapid and desirable improvement, in
comparison with APO and IAPO, over various parameters such as the message and
runtime complexities. |
|
Full Text |
|
Title: |
MODELING AND SIMULATION FOR VOLTAGE
SAGS/SWELLS MITIGATION USING DYNAMIC VOLTAGE RESTORER (DVR) |
Author: |
ROSLI
OMAR, NASRUDIN ABD RAHIM, MARIZAN SULAIMAN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
This paper describes the problem of
voltage sags and swells and its severe impact on non linear loads or sensitive
loads. The dynamic voltage restorer (DVR) has become popular as a cost effective
solution for the protection of sensitive loads from voltage sags and swells. The
control of the compensation voltages in DVR based on dqo algorithm is discussed.
It first analyzes the power circuit of a DVR system in order to come up with
appropriate control limitations and control targets for the compensation voltage
control. The proposed control scheme is simple to design. Simulation results
carried out by Matlab/Simulink verify the performance of the proposed method. |
|
Full Text |
|
Title: |
FUZZY LOAD MODELING AND LOAD FLOW STUDY
USING RADIAL BASIS FUNCTION (RBF) |
Author: |
C.V.Gopala
Krishna Rao, Dr. V.BapiRaju, Dr.G.Ravindranath |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
In this paper load flow study is carried
out by modeling the load using the concepts of Fuzzy Set Theory (FST).The input
load patterns are generated by adopting Trapezoidal Membership Function(TMF) for
both real and reactive power demands. The NRLF is used to obtain the voltage
magnitudes and phase angle of the buses for different loads obtained by the TMF.
The RBF neural network is trained to learn the features of the load to estimate
the bus bar voltage and angles. The ANN is used to instantly recall the output
for an untrained set of inputs without going through the conventional iteration
procedure. The RBF’s are easy to train and the training time required is
observed to be less. The load flow study of that forecasted data is carried out
on an IEEE -14 bus test system. The Recall response of RBFN for untrained set of
load is close agreement with the standard Newton-Raphson Load Flow (NRLF)
algorithm. |
|
Full Text |
|
Title: |
DETERMINATION AND INVESTIGATION OF
INFORMAITION TECHNOLOGY PARAMETERS EFFECTIVE TO FOOD INDUSTRY DEVELOPMENT |
Author: |
Hojat
Ahmadi, Kaveh Mollazade |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Information Technology (IT) parameters are
very important to develop of food industry. In this research IT parameters that
are effective to food industry development have been determined. Also the food
industry indexes and effect of information technology indexes on each it have
been investigated. IT parameters that have been considered were eCRM, MRP, MRP
II, ERP, eSCM, Data Base Application, DSS, SIS, MIS, Networking, and EDI.
Results can help the managers of food industry to planning for improve their
industries.
According to the results: ERP can apply magic affect to the major food industry
processes. CRM helps food industries to use technology and human resources to
gain insight into the behaviors of customers and the value of those customers.
SCM can cut costs substantially, since you no longer need to pay to produce and
store excess goods. MRP can computerized approach to inventory planning,
manufacturing scheduling, supplier scheduling, and overall corporate planning.
MRP II improves the best using of resources and can control the equivalent
distribution of resources. DSS can help manager to take a good decision about
quality of production and also improve electronic industry management. SIS is
benefit for make strategic plan in huge company. MIS is affecting on integrate
financial information, manufacture inventory, and integrate customer order
information, respectively. EDI allows for the ability to send and receive
information at any time thereby tremendously improving an organizations ability
to communicate quickly and efficiently. Internet is most effective on food
industry development parameters. Data base application is more useful to
integrate financial information. And networking is very effective on speed up
manufacturing processes. |
|
Full Text |
|
Title: |
PROMOTING AUTONOMOUS COMPUTER ASSISTED
LANGUAGE LEARNING |
Author: |
Samiullah Paracha, Mohammad H. Mohamad,
Sania Jehanzeb, Osamu Yoshie |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Basic Kanji is a graphical kanji learning tool originally
designed to provide necessary information about each kanji. It takes into
consideration the target audience, autonomous learners, by including features
that may promote the learners use of strategies. The software displays kanji
compounds in correct stroke order, meanings with audio pronunciations as well as
a number of their usages to provide autonomous learners with tools for studying
on their own without formal instruction. Experimental evaluation that used the
Motivated Strategies for Learning Questionnaire, indicated significant
improvements in students' motivation and autonomous language learning
strategies. |
|
Full Text |
|
Title: |
POWER AWARE ROUTING FOR MOBILE AGENT
IN AD-HOC NETWORKS |
Author: |
S ARVIND, DR.T.ADILAKSHMI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 5. No4. -- 2009 |
Abstract |
Wireless networks allow a more flexible
model of communication than traditional networks since the user is not limited
to a fixed physical location. Unlike cellular wireless networks, an ad hoc
wireless network does not have any fixed communication infrastructure. For an
active connection, the end host as well as the intermediate nodes can be mobile.
Therefore routes are subject to frequent disconnections. In such an environment,
it is important to minimize disruptions caused by the changing topology for
critical application such as voice and video. This presents a difficult
challenge for routing protocols, since rapid reconstruction of routes is crucial
in the presence of topology changes. By exploiting non-random behaviors for the
mobility patterns that mobile users exhibit, we can predict the future state of
network topology and perform route reconstruction proactively in a timely
manner. Moreover, by using the predicted information on the network topology, we
can eliminate transmissions of control packets and thus reduce overhead. This
paper proposes a methodology of routing protocol for misbehaving network called
RMP-ANT (Route Management Protocol for Ad Hoc Network) with a power management
scheme called as MARI (Routing Intelligent Mobile Agent) protocol, and discusses
about the various schemes to improve routing protocol performance by using
mobility prediction. The protocol used here enables nodes to detect misbehavior
by observing the status of the nodes. The paper also proposes distributed
reputation system that can cope with false information and effective utilization
of the power. |
|
Full Text |
|
|
|