|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
| |
|
Journal of Theoretical and Applied Information Technology
30th June 2009 | Vol. 5 No. 6 |
Title: |
A New Secure Design for
Mobile Communication |
Author: |
Seifedine Kadry,
Hussam Kassem |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
Mobile handheld device
is a popular device that provides secure, private, authentic, and accurate
communication and exchange of confidential information. In this paper we propose
a technique to solve the authenticity problem in mobile communication. This
technique is mainly based on the usage of the Fingerprint to identify both the
speaker and the sender. This technique is simple, requires less calculation than
other public/private key techniques, assures more authenticity than digital
signature, and eliminates the need for a third party. Moreover, when applied to
mobile phones, this technique resists any forge imposed by another party. |
|
Full Text |
|
Title: |
DEVELOPMENT OF AN
INTEGRATED LOGISTIC MODEL IN AN ORGANIZATION FOR AN AUTOMOTIVE APPLICATION
PROBLEM |
Author: |
MANJUNATHA, 2Dr. H.K.
SHIVANAND, 3DR. T.C. MANJUNATH |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
This paper presents a
novel method of developing an integrated logistics model for an industry /
organization using the supply chain management system, thus providing a greater
visibility of logistic model for an organization & eliminating the drawbacks of
the current integrated logistics models. An algorithm is developed for this
integrated logistics model in this research paper. This concept is being
implemented by using a suitable example with an automobile, thus showing the
effectiveness of the developed method. |
|
Full Text |
|
Title: |
Comparison of Fusion
Techniques applied to Preclinical Images: Fast Discrete Curvelet Transform using
Wrapping Technique & Wavelet Transform |
Author: |
Y. Kiran Kumar |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
The term fusion means
in general an approach to extraction of information acquired in several domains.
The goal of image fusion (IF) is to integrate complementary multi sensor, multi
temporal and/or multi view information into one new image containing information
the quality of which cannot be achieved otherwise. The term “quality”, its
meaning and measurement depend on the particular application. In this paper,
Fast Discrete Curvelet Transform using Wrapper algorithm based image fusion
technique, has been implemented, analyzed and compared with Wavelet based Fusion
Technique. Fusion of images taken at different resolutions, intensity and by
different techniques helps physicians to extract the features that may not be
normally visible in a single image by different modalities. This work aims at
fusion of two images containing varied information. Proposed algorithm takes
care of registration as well as fusion in a single pass. Attempt has been taken
to fuse MRI with CT and MR/MR images of
Preclinical data. In magnetic resonance imaging (MRI), there are three bands of
images ("MRI triplet") available, which are T1-, T2- and PD-weighted images. The
three images of a MRI triplet provide complementary structure information and
therefore it is useful for diagnosis and subsequent analysis to combine
three-band images into one. This fused image can significantly benefit medical
diagnosis and also the further image processing such as, visualization
(colorization), segmentation, classification and computer-aided diagnosis (CAD).
This approach is is further optimized utilizing quantitative fusion metrics such
as the Entropy, Difference Entropy, and Standard Deviation, image quality index
(IQI) and ratio spatial frequency error (rSFe). |
|
Full Text |
|
Title: |
OPTIMAL CONDUCTOR SELECTION
FOR RADIAL DISTRIBUTION NETWORKS USING GENETIC ALGORITHM IN SPDCL, AP –A CASE
STUDY |
Author: |
Dr. A.Lakshmi Devi Ph.D,
Md.Anisa Shereen |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
In any radial
distribution system, the optimal choice of the size of conductor in each branch
of the system, which minimizes the sum of depreciation on capital investment and
cost of energy losses, is important. This paper presents the methodology for the
selection of optimal conductors, in radial distribution systems. The main
objective is to minimize the real and reactive power losses in the system and
also to maximize the total saving in cost of conducting material while
maintaining the acceptable voltage levels. The optimal selections of conductor
sizes are obtained by conventional method and genetic algorithm method. The
conductor, which is determined by conventional method will satisfy not only the
maximum current carrying capacity and maintain acceptable voltage limits. Apart
from this it gives the maximum saving in capital cost of conductor and cost of
energy loss in radial distribution system. The number of computations is more in
conventional method that is why genetic algorithms are employed for the optimal
selections of conductor sizes. The effectiveness of the proposed methods is
tested on the feeders of Andhra Pradesh southern power Distribution Company
limited. |
|
Full Text |
|
Title: |
ADAPTIVE SLOT MANAGEMENT
FOR OFDMA BASED CELLULAR WIRELESS NETWORKS IN TDD MODE |
Author: |
DHANANJAY KUMAR, C.
CHELLAPPAN |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
The next generation of
networks is expected to support real-time multimedia applications with different
classes of traffic and diverse bandwidth requirements. The Orthogonal Frequency
Division Multiple Access (OFDMA) system with time division duplex mode,
employing asymmetric slot allocation between uplink and downlink, is a good
solution for mixed realistic traffic. In this paper, we investigate and discuss
the effect of slot and subcarrier management strategy in an OFDMA system, in
which each cell can adaptively control the resource allocation as per its
prevailing traffic load. Considering traffic direction in home and neighbor
cell, a total of four cases for interference pattern has been analyzed here. The
simulation result shows that a 9dB of Signal to Noise Ratio (SNR) is enough in
all four cases to bring the Bit Error Rate (BER) in acceptable limit. We also
analyze the effect of change in distance ratio on BER. |
|
Full Text |
|
Title: |
LOAD FLOW SOLUTION FOR
ILL-CONDITIONED POWER SYSTEMS USING RUNGE- KUTTA AND IWAMOTO METHODS WITH FACTS
DEVICES |
Author: |
S.Suresh Reddy,
S.Sarat kumar, Dr. S.V.J.Kumar |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
This paper presents a
load flow calculation method using Runge-Kutta and IWAMOTO methods for ill
conditioned power systems with facts devices like SVC, TCSC, STATCOM, and UPFC.
This paper shows that there is formal analogy between Newton’s method and a set
of autonomous ordinary differential equations. This analogy suggests that
numerical integration method i.e., Runge-Kutta formulae can be used for solving
the power flow problem. This paper uses the concept of optimal multiplier for
solving the ill conditioned power systems with modification to the normal
Newton-Raphson method in Iwamoto’s method. To examine the effectiveness of
proposed methods 13 bus ill conditioned system along with the steady state
modeling of the devices (SVC,TCSC,STATCOM,UPFC) with their functional
capabilities are observed. |
|
Full Text |
|
Title: |
AUTOMATIC DETECTION OF
BREAST CANCER MASS IN MAMMOGRAMS USING MORPHOLOGICAL OPERATORS AND FUZZY C
–MEANS CLUSTERING |
Author: |
S.Saheb Basha, Dr.K.Satya
Prasad |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
Breast cancer is one
of the major causes of death among women. Small clusters of micro calcifications
appearing as collection of white spots on mammograms show an early warning of
breast cancer. Primary prevention seems impossible since the causes of this
disease is still remain unknown. An improvement of early diagnostic techniques
is critical for women’s quality of life. Mammography is the main test used for
screening and early diagnosis. Early detection performed on X-ray mammography is
the key to improve breast cancer prognosis. In order to increase radiologists
diagnostic performance, several computer-aided diagnosis (CAD) schemes have been
developed to improve the detection of primary signatures of this disease: masses
and micro calcifications. Masses are space-occupying lesions, described by their
shapes, margins, and denseness properties. A benign neoplasm is smoothly
marginated, whereas a malignancy is characterized by an indistinct border that
becomes more speculated with time. Because of the slight differences in X-ray
attenuation between masses and benign glandular tissue, they appear with low
contrast and often very blurred. Micro calcifications are tiny deposits of
calcium that appear as small bright spots in the mammogram. This paper presents
a research on mammography images using Morphological operators and Fuzzy c –
means clustering for cancer tumor mass segmentation. The first step of the
cancer signs detection should be a segmentation procedure able to distinguish
masses and micro calcifications from background tissue using Morphological
operators and finally fuzzy c- means clustering (FCM) algorithm has been
implemented for intensity – based segmentation. The proposed technique shows
better results |
|
Full Text |
|
Title: |
SPACE VECTOR ANALYSIS IN
ELECTRICAL DRIVES FOR SINGLE-PHASE INDUCTION MOTOR USING MATLAB/SIMULINK |
Author: |
Anggun Anugrah, Marizan bin
Sulaiman, Rosli Omar |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
Space Vector Pulse
Width Modulation (SVPWM) has become the successful techniques to construct
three-phase sine wave Voltage Source Inverter (VSI) parallel to control
three-phase motor using vector control. In this paper we present the analysis of
SVPWM to construct two-phase sine wave VSI for single-phase induction motor. We
also describes the modulation technique refer to dq components of main and
auxiliary windings of single-phase induction motor. The VSI have four legs for
this single-phase induction motor, and the four switching sequences had
simulated in MATLAB and SIMULINK. The simulation result shows the feasibility of
the proposed modulation techniques to drive single-phase induction motor. |
|
Full Text |
|
Title: |
APPLICATION OF REMOTE
SENSING IN THE AGRICULTURAL LAND-USE ASSESSMENT |
Author: |
Hojat Ahmadi, Kaveh
Mollazade |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
The calculation of
Normalized Difference Vegetation Indices (NDVI) can be very useful in the
generation of a land-use/land-cover classification. Calculation of a vegetative
index (VI) from remotely sensed data can be used to quantify the amount of
vegetation on the Earth's land surface. Numerous VI's exist, however the most
commonly used VI is the NDVI. To detect the land- use and land- cover, the long
term monitoring by the satellite images is useful as a big heritage. In this
paper, the land-use assessment was investigated by using of the satellite
images. After processing and exploitation of the data, the relation between
bands was estimation and NDVI index were calculated. Then NDVI index with
ground-related information was compared. Results showed that satellite images
could detect the land-use changes in the local scale and vegetation index was
suitable to estimate the land-use classification. |
|
Full Text |
|
Title: |
PERFORMANCE EVALUATION OF
MULTI USER DETECTION FOR UPLINK WIRELESS COMMUNICATIONS WITH VARIOUS MULTIPLE
ACCESS SCHEMES |
Author: |
S.Tamil Selvi , K.Ramar |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
The growing demand for
capacity in wireless communications is the driving force behind improving
established networks and the deployment of new worldwide mobile standard.
Multiple Access Interference (MAI) and Inter Symbol Interference (ISI) limit the
capacity of the system. The conventional approaches for wireless communication
may not be good in many ways. Here, a proposal has been given to show that the
problems in conventional approaches may be avoided, if the proposed Parallel
Interference Cancellation (PIC) multi user detection with feedback (PICF MUD) is
adopted in various multiple access schemes. In DS-CDMA system using PIC receiver
with four stages, the Eb/No required to achieve a BER performance of 10-3 is 8
dB, whereas the single stage PIC receiver with feedback approach requires only 2
dB to achieve the same BER. The proposed PICF MUD is extended in various
multiple access systems to provide better BER performance. |
|
Full Text |
|
Title: |
AN INCREASED PERFORMANCE OF
CLUSTERING HIGH DIMENSIONAL DATA THROUGH DIMENSIONALITY REDUCTION TECHNIQUE |
Author: |
P. VALARMATHIE, DR MV
SRINATH, K. DINAKARAN |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
With the incredible
growth of high dimensional data such as microarray gene expression data, the
researchers are forced to develop some new techniques rather than using existing
techniques to meet their requirements. Microarray is a mechanism of measure the
expression level of tens of thousands of genes simultaneously as a result, the
data generated is very large. There must be an efficient technique to handle
this huge amount of data thereby the researchers can able to do analyze and
interpret them. The accuracy of the resultant value perhaps not up to the level
of expectation when the dimensions of the dataset is high because we cannot say
that the dataset chosen are free from noisy and flawless. So it is required to
reduce the dimensionality of the given dataset in order to improve the
efficiency and accuracy. Moreover the running time of an algorithm certainly has
to be minimized to achieve the desired results. This is being done by apply the
same data set to a same clustering technique with and without performed the
dimensionality reduction technique principal component analysis on original
data. The results of the two approaches are compared and it is proved that the
results of clustering using PCA are more accurate, easy to understand and above
all the time taken to process the data was substantially reduced. |
|
Full Text |
|
Title: |
OPTIMAL ELECTRICITY NODAL
PRICE BEHAVIOUR: A STUDY IN INDIAN ELECTRICITY MARKET |
Author: |
S. B. Warkad, Dr. M. K.
Khedkar, Dr. G. M. Dhole |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
In the past decades,
electricity markets have significantly restructured in developing countries. The
electricity nodal pricing has emerged as an efficient tool under it. Recently,
the incorporation of High Voltage Direct Current (HVDC) link in AC network
brought significant techno-commercial changes in the electricity markets in
developing countries. This paper aims at (1) the motivation and need to study
electricity nodal pricing, (2) optimal nodal price formulation with
incorporation of HVDC link in a AC transmission system, (3) testing of the
methodology on IEEE 30-bus system and computation of nodal prices for real
transmission network of India and (4) to assess the combined impact of
transmission investment, incorporation of DC link, generation addition on
electricity nodal prices. Paper concludes that the nodal prices are reduced with
the incorporation of DC link and generation addition is one of the requirements
to encourage competition in the wholesale electricity market. |
|
Full Text |
|
Title: |
IMAGE RETRIEVAL BY SEMANTIC
INDEXING |
Author: |
CH.GANAPATHI REDDY, Dr. G.
R. BABU, Dr. P. V. D.SOMASEKHAR |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
Image retrieval is
analogous to conventional text-based querying of databases except that both the
query and the retrieved data are in the form of images. For example, a query
image of a mountain must retrieve images of mountains from a database of images.
Such matches are done using features easily extracted from images such as
colour, texture, shape and geometry. The major challenge facing the researchers
is that humans measure similarities between images based on the objects found
therein whereas a computer based system uses “low-level” features listed above.
Humans, looking at an image of an elephant, would retrieve images of elephants
from a database while a computer-based system would “look for” images containing
gray regions of certain size and shape. The result is a serious mismatch between
human expectation and the system performance and is called the “semantic gap” in
literature |
|
Full Text |
|
Title: |
Business Integration
generating a need for Information Integrity
An example -Supply Chain Management |
Author: |
Reema Khurana |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
The paper aims to
discuss the Information Integrity issues in the wake of increasing business
integration. It goes further to suggest an analytical solution and illustrate
the same by applying it to Supply Chain Management
Design/ Methodology/Approach – In order to do the above the paper defines
information integrity and suggests a model of Information Base Management System
with an acquisition and utilization cycle attached. The model rests on an
Information Topology Plane. The model also suggests a mechanism to originate the
information in the acquisition and utilization cycle with a view to preserve
information integrity.
Findings-Business integration is on the rise on account of increased usage of
information technology systems. In wake of this situation the key issue is no
more information manipulation, it is to ensure the accuracy, consistency and
reliability i.e. information integrity. In order to achieve this Information
Base Management System may be used, which encompasses an acquisition cycle,
utilization cycle, Information Topology Plane and a method to originate
information with a view to achieve information integrity.
Research Limitations- The research needs to be carried out further to
crystallize the information integrity computation mechanisms. This paper goes up
to identifying the method of generating Information Base Management System. The
IBMS may further be used to compute an information integrity standard for each
decision in a business process. This can be done using the error information
base, which identifies the gap between the information base in the system and
the environment as a basis for information integrity analysis.
Originality/Value- The paper adds authentic value as it suggests the need for
information integrity in the wake of uncertainties arising in industrial
management systems on account of increased automation and information technology
usage. In order to do this it suggests a unique Information Base Management
System and information origination mechanism for the same. An illustration of
implementation of the model is shown using a lucid example of Supply Chain
Management. |
|
Full Text |
|
Title: |
EFFICIENT METHOD OF AUDIO
STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND STRONG ENCRYPTION KEY WITH ENHANCED
SECURITY |
Author: |
R Sridevi, Dr. A Damodaram,
Dr. SVL.Narasimham |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
In the current
internet community, secure data transfer is limited due to its attack made on
data communication. So more robust methods are chosen so that they ensure
secured data transfer. One of the solutions which came to the rescue is the
audio Steganography. But existing audio steganographic systems have poor
interface, very low level implementation, difficult to understand and valid only
for certain audio formats with restricted message size.
Enhanced Audio Steganography (EAS) is one proposed system which is based on
audio Steganography and cryptography, ensures secure data transfer between the
source and destination. EAS uses most powerful encryption algorithm in the first
level of security, which is very complex to break. In the second level it uses a
more powerful modified LSB (Least Significant Bit) Algorithm to encode the
message into audio. It performs bit level manipulation to encode the message.
The basic idea behind this paper is to provide a good, efficient method for
hiding the data from hackers and sent to the destination in a safer manner.
Though it is well modulated software it has been limited to certain
restrictions. The quality of sound depends on the size of the audio which the
user selects and length of the message. Though it shows bit level deviations in
the frequency chart, as a whole the change in the audio cannot be determined. |
|
Full Text |
|
Title: |
ASSESSMENT OF STRESSES ON
INDUCTION MOTOR UNDER DIFFERENT FAULT CONDITIONS |
Author: |
B.ARUNA KUMARI, K.NAGA
SUJATHA, K.VAISAKH |
Source: |
Journal of Theoretical and
Applied Information Technology
Vol 5. No6. -- 2009 |
Abstract |
This paper presents an
assessment of stresses produced in an induction motor when the motor is allowed
to run under open-circuit and short-circuit conditions. A generalized dynamic
model of a three-phase squirrel cage induction motor has been developed using d
and q variables in a synchronously rotating reference frame. This model can
predict performance of the motor during open-circuit and short-circuit
conditions. The simulation results are obtained from two squirrel cage induction
motors, sized 3 hp and 2250 hp. |
|
Full Text |
|
|
|