|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2013 | Vol. 58 No.2 |
Title: |
SIMULATION OF MPC BASED SPEED CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR
DRIVE |
Author: |
S.SIVARANJANI, Dr.R.RAJESWARI |
Abstract: |
This paper describes the implementation of an optimal control strategy used for
speed control of Permanent Magnet Synchronous Motor (PMSM) drive. Since several
decades Power Electronics and Drives deals with cascaded control, which provides
easy implementation and robust in operation. A serious drawback of requiring
fast operating inner loop looks forward a strong candidate to eliminate the
drawback. The Model Predictive Controller cost function enables a simple,
flexible and improved performance controller for the drive. The basic concepts,
operating principles, control diagrams, and results are used to provide a
comparison between the different control strategies. Several key aspects related
to this methodology are, in depth, presented and compared with conventional
control technique. The performance of the motor drive with the proposed
controller results is found to be prominent. |
Keywords: |
Speed Control, PMSM, MPC, PWM Inverter |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
CASCADED H-BRIDGE THREE-PHASE MULTILEVEL INVERTERS CONTROLLED BY MULTI-CARRIER
SPWM DEDICATED TO PV |
Author: |
ABDELAZIZ FRI, RACHID EL BACHTIRI, ABDELAZIZ EL GHZIZAL |
Abstract: |
Generally, electrics devices need alternating current. But PV generators provide
direct current. So, it is necessary to use inverters. Multilevel inverters seem
very suitable for this task. In this paper, we present a comparative study
between three multilevel inverters: 3 levels, 5 levels and 15 levels. These
inverters have the same topology and are controlled by the same law: Sinusoidal
Pulse Width Modulation multi-carrier (SPWM). Our interest concerns the magnitude
and the quality of generated voltage. The 15L multilevel inverter supplied by
36V PV gives a 230V AC voltage. So it’s the most suitable for supplying normal
electric equipments. Simulation with Matlab/Simulink of the inverters operation
shows that: THD is independent of the value of PV voltage; the greater the
number of levels is, the less THD becomes. |
Keywords: |
Three-Phase Multilevel inverters, H-Bridge, SPWM Multi-Carrier, THD. |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
BIOMETRIC BASED STRONG REMOTE USER AUTHENTICATION USING SMART CARD |
Author: |
S.RAMESH, DR.V.MURALI BHASKARAN |
Abstract: |
Remote user authentication is one of the major issues in the rapid growing
internet era. In this paper we propose a biometric based remote user
authentication scheme using smart cards. The existing methods failed to be safe
in remote user authentication as the secret values in either end of the
communication could be guessed by the intruder. In our scheme we introduce an
addition security at the user side as an extra nonce by which the intruders will
be unable to guess the users secret data. Hence our proposed scheme proves to
provide a strong authentication and non-repudiation even in an insecure
communication by sending and receiving messages with timestamps. |
Keywords: |
Biometrics, Smart card, Cryptography, Authentication, Security |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE MIGRATION OF DATA FROM A RELATIONAL DATABASE (RDB) TO AN OBJECT RELATIONAL (ORDB)
DATABASE |
Author: |
MOHAMED BAHAJ, ALAE ELALAMI |
Abstract: |
The present article deals with the passage of migrating data from a relational
database to an object relational database, by developing methods of selection
and insertion which is based on optimizing the extraction of information in a
predefined data model, which deals with the transition from relational to object
relational, which fits to any situation processing . The migration handles the
majority of the object concept including inheritance.
The transition of migration is done in an automatic way, without the
interference of the human factor, a prototype is already created that proves the
effectiveness of this approach. |
Keywords: |
Data Migration, RDB, ORDB, Prototype, Automation |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NOVEL EFFICIENT DISCRIMINANT COMPONENT ANALYSIS ALGORITHM FOR FACE RECOGNITION |
Author: |
R.RAJALAKSHMI, DR.M.K.JEYAKUMAR |
Abstract: |
Face recognition is the process of categorizing a person in an image by
evaluating with a known face image library. The pose and illumination variations
are two main practical confronts for an automatic face recognition system. This
paper proposes a novel face recognition algorithm known as EDCA for face
recognition under varying poses and illumination conditions. The main aim of
this paper is to reduce the feature vector size. The intensity of a face image
is normalized to get an illumination normalized image. This EDCA algorithm
overcomes the high dimensionality problem in the feature space by extracting
features from the low dimensional frequency band of the image. It combines the
features of both LDA and PCA algorithms. The experiments were performed on both
the Extended Yale B datasets. The experimental results show that the proposed
algorithm produces a higher recognition rate than the existing LDA and PCA based
face recognition techniques. |
Keywords: |
Face Recognition, Histogram Equalization, LDA And PCA |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
A NEW CORNER DETECTION METHOD FOR OMNIDIRECTIONAL IMAGES |
Author: |
OMAR EL KADMIRI, LHOUSSAINE MASMOUDI |
Abstract: |
Recently, many robotic applications adopted omnidirectional vision sensors. The
achievement of those applications is usually based on computer vision algorithms
by means of visual indices extraction from the acquired images, such as edge,
region, and interest points detection. The use of classical image processing
algorithms for omnidirectional images proved its limitations. Some new methods
which take into account the special geometrical properties of omnidirectional
images have been developed and used with success. Along these lines, this paper
proposes a new corner detector more adequate for this class of images. The
method is based on a virtual spherical electrostatic model for edge detection
and the standard Harris corner detector. Experimental results and quantitative
assessments affirm the performance of the proposed approach against several
image degradations. Confrontation to other classical methods is provided. |
Keywords: |
Omnidirectional Vision, Corner Detection, Virtual Electrostatic Model, Harris
Corner Detector, Visual Servoing |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
MEMORY LESS Z PATH ELIMINATED VERY LOW POWER CORDIC BASED FFT PROCESSOR |
Author: |
A. YASODAI, Dr.A.V.RAMPRASAD |
Abstract: |
A complex number can be interpreted as a vector in imaginary plane. The vector
rotation in the x/y plane can be realized by rotating a vector through a series
of elementary angles. These elementary angles are chosen such that the vector
rotation through each of them may be approximated easily with a simple shift and
add operation, and their algebraic sum approaches the required rotation angle
.This can be exercised by CORDIC algorithm in rotation mode. In this paper, we
have proposed a pipelined architecture by pre computation of direction of
rotation , radix-4 number representation, and the angle generator which has been
processed in terms of hardware complexity , iteration delay and memory
reduction. This CORDIC algorithm is implemented using signed digit arithmetic
for the efficient implementation of rotational radix-4 CORDIC algorithm,
eliminating z-path completely. Comparison of the proposed architecture with the
available radix-2 and conventional radix-4 architectures is elaborated. The
proposed algorithm also exercises an addressing scheme and the associated angle
generator logic in order to eliminate the ROM usage for bottling the twiddle
factors. The approached architecture for radix-4, 16-bit precision and N-point
FFT was implemented on FPGA platform virtex 4 and is simulated and synthesized
to validate the results (Xilinx ise 10.2.i). This contributes in the
minimization of the dynamic power consumption of the proposed system to 28.52mW
at 100MHz and 5.70mW at 20MHz for 16 point radix 4 FFT. |
Keywords: |
CORDIC, memory less systems, FPGA, latency, Radix-4, speed, throughput, twiddle
factor., FFT |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
IDENTIFICATION OF INRUSH CURRENT AND INTERNAL FAULT CURRENTS IN A TRANSFORMER
USING SELF ORGANIZING MAPS |
Author: |
L.UMASANKAR, N.KALAIARASI |
Abstract: |
Differential protection of a transformer is used in protecting the transformer
windings against internal faults based on the simple property that the ratio of
currents entering and leaving the transformer is equal to the inverse of the
transformation ratio. This ratio is affected by either internal faults or inrush
currents during transformer magnetization. In order to avoid mis-operation of a
transformer differential protection relay due to inrush current, a distinction
must be made between the inrush current and internal fault currents. This paper
aims at using Self Organizing Maps to distinguish between the currents without
delving into the particular differences in the properties of the 2 currents. |
Keywords: |
Inrush Currents, Internal Fault, Self Organizing Maps, Transformers, Kohonen Map |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
COMPUTATIONAL PROBLEM SOLVING ARCHITECTURAL DESIGN BASED ON MULTI - AGENT |
Author: |
MARYAM RAJABI, TEH NORANIS MOHD ARIS, MD. NASIR SULAIMAN |
Abstract: |
The application of problem solving methods is seemed to be difficult for novice
students in computer programming field. Hence, majority of them prefer to go
straight to the last stage to collect information by analyzing source code.
Indeed, introducing an efficient solution for this problem will help them to
figure out programming problems properly as well as saving time. Nevertheless,
computational problem solving systems are not as applicable as enough to be
contributed to complex problems craving intelligent analysis. So, intelligent
agents tie with problem solving methods to conquer the mentioned issue. Here, a
new system mapped by prometheus design tool (PDT) has been introduced. Likewise,
the textualized problem to be given to the system and then problem analysis
chart (PAC), input process output (IPO) chart, flowchart and algorithm will be
produced. The designed problem solving system in this work comprises five
agents, namely GUI, PAC, IPO, flowchart and algorithm agents interacting with
the environment by percepts and actions. Additionally, there exists extraction,
transformation and module number generation processes covering with three
scenarios: ‘Extract Scenario, ‘Transform Scenario’ and ‘Generate Module Number
Scenario’. The system specification, the architectural design and the detailed
design are produced based on the analysis overview diagram and the scenario
diagram. |
Keywords: |
Computational problem solving, Problem solving method, Intelligent Agents,
Prometheus design tool (PDT) |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
FULL ON-CHIP CMOS LOW DROPOUT VOLTAGE REGULATOR WITH -41 dB AT 1 MHZ FOR
WIRELESS APPLICATIONS |
Author: |
ZARED KAMAL, QJIDAA HASSAN, ZOUAK MOHCINE |
Abstract: |
A high PSRR full on-chip and area efficient low dropout voltage regulator (LDO),
exploiting the nested miller compensation technique with active capacitor (NMCAC)
to eliminate the external capacitor and improve the high performance. A novel
technique is used to boost the important characteristic for wireless
applications regulators PSRR. The idea is applied to stabilize the Low dropout
regulator. The proposed regulator LDO works with a supply voltage as low as 1.8
V and provides a load current of 50 mA with a dropout voltage of 200 mV, the PSR
of LDO is -60 dB at a frequency of 60 KHz and -41dB at a frequency of 1 MHz. It
is designed in 0.18 µm CMOS technology and the active area on chip measures
0.043 mm2. |
Keywords: |
Low Dropout Regulator (LDO); MOSCAP; NMCAC; Active Feedback; High PSR; System On
Chip |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
SOMA METHOD IN MODELING BUSINESS PROCESS AUTOMATION OF THESIS PROPOSAL
SUBMISSIONS (CASE STUDY: SWCU – PSYCHOLOGY FACULTY) |
Author: |
MELDA MANUHUTU, EKO SEDIYONO, WIRANTO HERRY UTOMO |
Abstract: |
SOA is a framework that integrates business processes and supports IT
infrastructure, so it becomes possible to integrate between several Information
Systems in an organization, especially in tertiary educational institutions. The
goal of this research is to analyze and devise business process automation
checking the completeness of proposal submissions using Service Oriented
Modeling Architecture (SOMA) in the Psychology Faculty of Satya Wacana Christian
University, Salatiga, as well as compare the business processes of checking the
completeness of thesis proposal submissions before and after being integrated.
From here, the advantages will be found from the services that are implemented
in the completion checking system of thesis proposal submissions. When the
system has been integrated, it can help in the thesis proposal management
process, so that it can facilitate all related parties. |
Keywords: |
SOA, SOMA, Information systems, Integration |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY OF MPPT TECHNICAL BASED ON FUZZY LOGIC AND PERTURB OBSERVE
ALGORITHMS FOR PHOTOVOLTAIC SYSTEMS |
Author: |
R. EL GOURI, M. BEN BRAHIM, L. HLOU |
Abstract: |
Maximum power point trackers (MPPT) play an important role in photovoltaic (PV)
power systems because they maximize the power output from a PV system for a
given set of conditions, and therefore maximize the array efficiency. The
maximum power point tracking methods proposed in this study are two algorithms:
Perturb and Observe (P&O) and Fuzzy Logic Control (FLC). The numerical modeling
of the PV system shows the MPPT interest and then the MPPT algorithms are
highlighted. In this paper, a PV system based on a boost converter as MPPT
device is considered. The proposed algorithms were simulated in Matlab/Simulink
environment for comparing the performances of P&O and fuzzy logic MPPT methods. |
Keywords: |
MPPT, Fuzzy Logic, Hill Climping, Solar Panel |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
FLOW-BASED CONCEPTUAL REPRESENTATION OF PROBLEMS |
Author: |
SABAH AL-FEDAGHI |
Abstract: |
Well-structured problem-solving involves a stage of (external) representation of
the problem to provide a structure that serves as a shareable object of thought
for studying the behavior of the underlying system. A dominant problem-solving
methodology involves state-based representation with an initial state, a goal
state, and a set of transactions. In addition, object-oriented methodology and
Unified Modeling Language (UML) are increasingly utilized for drawing
descriptions of a problem space. Petri nets attract designers (e.g., software)
with its formal depictions modeling the behavior of a system. Nevertheless, each
of these methodologies of problem representation has its own weaknesses,
especially with regard to incorporating the features of understandability and
simplicity. This paper proposes a different flow-based representation that has
advantages for describing certain types of problems. The resultant description
is characterized by uniform application of the basic structure of a flow system.
The new methodology is demonstrated through sample toy problems, such as the
problem of the dining professors. |
Keywords: |
Conceptual Model, Dinning Philosophers, Problem Representation, Problem Solving,
State-Based Representation, System Behavior, UML |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
SURVEY OF SIP AUTHENTICATION MECHANISMS |
Author: |
HANANE BELAOUD, JAMAL EL ABBADI , AHMED HABBANI |
Abstract: |
In recent years Voice over Internet Protocol (VoIP) has become a popular NGN
(Next Generation Network) technology. As this technology is built on internet
protocol it is affected by a critical security problems . The Session Initiation
Protocol (SIP) is considered as the most used signaling protocol for calls over
the Internet for establishing, maintaining and terminating VoIP calls.
The security of SIP is becoming more and more important. The prime security
service required by SIP is authentication. This paper focuses on the SIP
security mechanisms of authentication. We survey the newly proposed methods of
authentication then we proceed to evaluate these methods in view of security
efficiency and computational cost. |
Keywords: |
NGN, VOIP, SIP, Authentication |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
ADAPTIVE TEACHING AND LEARNING USING ONTOLOGY |
Author: |
T. PAKIR MOITHEEN, DR. P. SHEIK ABDUL KHADER |
Abstract: |
The emergence of World Wide Web has provided more electronic resources to the
learners in the e-learning field. The users are overloaded with electronic
resources for a specific topic or domain. This research proposes a tool using
ontology to evaluate the e-content and make the content adaptive to the need of
the learner by generating concept maps for the electronic content. The tool also
identifies the strength and weakness of the e-content by comparing with expert
ontology. The tool is effectively used to personalize the content based on the
knowledge level of the learner. The tool generated concept maps are 60% in
accordance with expert ontology. |
Keywords: |
Adaptive Learning, E-Learning, Ontology And Personalization |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
ENERGY EFFICIENT DOUBLE CLUSTER HEAD SELECTION ALGORITHM FOR WSN |
Author: |
D. SURESH, Dr. K. SELVAKUMAR |
Abstract: |
In wireless sensor networks (WSN), the current cluster based routing techniques
may result in increased network workload, energy consumption and
re-transmissions. In order to overcome these issues, in this paper, we propose
an energy efficient double cluster head selection algorithm for wireless sensor
network. In this technique, two cluster heads namely main and sub-ordinate
cluster heads are selected based on the parameters such as residual energy,
minimum average distance from the member, nodes timer and node degree using
particle swarm optimization technique. In this technique, each cluster member
node sends the data to main cluster head. The aggregated data from the main
cluster head is transmitted to sink through sub-ordinate cluster head. An energy
efficient routing protocol is also developed based on the parameters expected
number of retransmissions and link failure probability. By simulation results,
we show that the proposed technique enhances the network lifetime and reduces
the network overload. |
Keywords: |
WSN, Cluster Based Routing, Energy Efficient, Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
LINK-UTILITY-BASED IMPROVED BACKOFF COOPERATIVE MAC PROTOCOL WITH FAIR
SCHEDULING FOR MANET |
Author: |
R.MANIKANDAN, Dr.K.SELVAKUMAR |
Abstract: |
In this paper, we propose a Link-Utility-Based Improved Backoff Cooperative MAC
Protocol for MANET with fair scheduling algorithm. In this fair scheduling
algorithm, a priority queue is used to fairly allocate the resources. The
priority queue consists of number of slots allocated for each flow, optimal
transmission rate of flow and optimal transmission power of flow. We implement
the new improved link-utility function that uses the optimal transmission rate
and optimal transmission power.After getting the input priority queue, the fair
scheduling algorithm is applied. This fair scheduling algorithm thus fairly
allocates the resources to the nodes. Simulation results show that the proposed
algorithm improves the throughput and fairness of the flows. |
Keywords: |
Link Utitlity, Scheduling, MANET, MAC Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
GENERATION OF A NEW HYBRID SUBCARRIER MULTIPLEXING–SAC-OCDMA SYSTEM BASED ON FSO |
Author: |
HUSSEIN SAAD MOHAMMED, S. A. ALJUNID, HILAL A. FADHIL, THANAA HUSSEIN ABD,
RASHID A. FAYADH, A. K RAHMAN |
Abstract: |
This paper proposes hybrid Subcarrier Multiplying-Spectral Amplitude
Coding-Optical Code Division Multiple Access system (SCM-SAC-OCDMA) based on the
Free Space Optic (FSO) using Multi Diagonal (MD) code is. The proposed hybrid
system is used to evaluate the contribution of different haze conditions of
Malaysia as a tropical weather country as well as evaluating the effects of
different noise types such as shot noise, thermal noise and Inter-Modulation
distortion. This system has been evaluated numerically and by simulation
analysis. The results of the simulation analysis that the proposed system can
transmit 1 Gb/s for 2.5 km for heavy haze under the transmission power of 6dBm
at BER 10-10. |
Keywords: |
Subcarrier Multiplexing (SCM), SAC-OCDMA, Multi Diagonal (MD) code, Radio
Frequency (RF), specific haze attenuation (αspec). |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
ANALYSIS OF RADIAL DISTRIBUTION SYSTEM OPTIMIZATION WITH FACTS DEVICES USING
HYBRID HEURISTIC TECHNIQUE |
Author: |
S.VIJAYABASKAR, T.MANIGANDAN |
Abstract: |
Distribution networks transport electric energy to the end user from
distribution substations. Power utilities are looking for improved power
delivery performance. The performance of the delivery system is measured by the
power loss of the system. The increase in power loss increases the operating
cost of the distribution system. This paper presents an algorithm to minimizing
the power loss of the distribution system. Self Adaptive Hybrid Differential
Evolution (SaHDE) technique combined with sensitivity factors has been practiced
to find the optimal location and the size of FACTS devices to reduce the
operating cost of Radial Distribution System (RDS). The locations of the FACTS
devices are located by the sensitivity factors. The amount of reactive power
component generation/absorption by the FACTS devices at the identified locations
has been calculated through SaHDE. The effectiveness of the proposed technique
is validated through 10-bus, 34-bus and 85-bus radial distribution systems. |
Keywords: |
Distribution Systems, FACTS, Loss Reduction, Loss Sensitivity Factors, SaHDE |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
CONGESTION MANAGEMENT USING HYBRID FISH BEE OPTIMIZATION |
Author: |
S. THANGALAKSHMI, P. VALSALAL |
Abstract: |
Congestion management is a task performed by Independent System Operator (ISO)
to ensure the operation of transmission system within limits. In an emerging
electric power market, congestion management is highly important and inefficient
management can be a barrier to electricity trading. To minimize congestion, it
is required to maximize transmission line generation and decrease its cost. A
Hybrid Fish Bee Swarm Optimization based algorithm to manage congestion is
proposed to achieve this objective. The Fish Bee Swarm Optimization is based on
two algorithms namely Artificial Bee Colony (ABC) and Fish School Search (FSS)
methods. The proposed algorithm is validated on an IEEE 30 bus system. Results
show the performance of the proposed optimization technique decreases
congestion. |
Keywords: |
Congestion Management, Hybrid optimization, Artificial Bee Colony (ABC), Fish
School Search (FSS) |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
A REVIEW OF RESOURCE ALLOCATION TECHNIQUES FOR THROUGHPUT MAXIMIZATION IN
DOWNLINK LTE |
Author: |
M.A. GADAM, L. MAIJAMA’A, I.H. USMAN |
Abstract: |
Long Term Evolution (LTE), by third generation project partnership (3GPP) is one
of the radio access technologies used for delivering broadband mobile services.
It is mainly influenced by high data rates, minimum delay and the capacity due
to scalable bandwidth and its flexibility. The downlink LTE employs orthogonal
frequency division multiple access (OFDMA) as a multiple access technique. The
conventional resource allocation method in OFDMA employed different modulation
and coding scheme (MCS) on allocated subcarriers to achieve good throughput.
But, in the downlink LTE, all scheduling blocks at a given transmission time
interval (TTI) to user must adopt same MCS and these brings about constraints in
the system and as a result degrade system performance. This paper reviewed
several resource allocation schemes for throughput maximization in LTE downlink.
In each of the schemes considered, the sub-optimal solution shows a significant
performance improvement compared to the optimal solution. A quality of service (QoS)
guaranteed RB allocation achieves high throughput compared to other schemes
considered in this article. |
Keywords: |
Scheduling Blocks, Throughput, Resource allocation, Harmonic Mean, Modulation |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
NOVEL HARMONIC ELIMINATION TECHNIQUE FOR CASCADED H-BRIDGE INVERTER USING
SAMPLED REFERENCE FRAME |
Author: |
VEERAKUMAR,NIRMAL KUMAR , SATHISHKUMAR, RAJESH |
Abstract: |
This paper proposes SWARM Intelligence based algorithm for selective harmonic
elimination using SSVPWM in modified H-bridge multilevel inverter. This
algorithm uses sampled reference frame to generate reference sine signal. The
computation time is less as compared to that of sector identification
algorithms. Also, SWARM intelligence based algorithm doesn’t require any look-up
table potentiometer connected to ADC channel of this dsPIC which decides the V/F
ratio and the keypad connected to PORT C which decides the harmonic order that
has to be eliminated. The hardware setup for the proposed method for 5-level
inverter has been developed successfully for 2.2Kw Induction motor. The
experimental result shows that this method can effectively reduce the selective
harmonic in modified cascaded H-Bridge Multilevel inverter. |
Keywords: |
Swarm Space Vector Pulse Width Modulation (SSVPWM), Artificial Neuro Fuzzy
Inference System (ANFIS), Selective Harmonic Mitigation Pulse Width Modulation (SMHPWM),
Selective Harmonic Pulse Width Modulation (SHPWM), Total Harmonic Distortion (THD),
Fast Fourier Transform (FFT),Interrupt Service Subroutine (ISR). |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
SOUTH INDIAN TAMIL LANGUAGE HANDWRITTEN DOCUMENT TEXT LINE SEGMENTATION
TECHNIQUE WITH AID OF SLIDING WINDOW AND SKEWING OPERATIONS |
Author: |
SUNANDA DIXIT, Dr.H.N.SURESH |
Abstract: |
In document image analysis, Text line segmentation is one of the key components.
The segmentation logic presents essential information about skew correction,
zone segmentation, and character recognition. The method of document image
segmentation into text lines for printed text has seen numerous contributions
from fellow research scholars, yet there is scope for tremendous improvement.
The key challenges for handwritten document are due to writer movement, the
inter-line distance changeability and incoherent distance between the components
that may differ. These may be directly by segments, or curved. The area of
handwritten segmentation has seen few models; very few of the research paper are
proposed for Text line skew segmentation model and hence the stimulus of
handwritten south Indian languages. Consequently, a better text line
segmentation technique for south Indian Tamil language is proposed in this
paper. The processing of Tamil language is very crucial factor because the Tamil
letters are in crucial shapes and it is harder to segment the touching lines and
letters from the Tamil image documents. The challenges present in Tamil language
process and the existing text line segmentation methods has been improved by our
proposed method, which utilizing two major techniques namely, sliding window and
adaptive histogram equalization. Our proposed text line segmentation technique
initially performs the preprocessing process and these preprocessed document
images are given to the adaptive histogram equalization. During the histogram
equalization process, the document images text characters are enhanced to view
the characters more accurately. The enhanced image text lines are segmented by
utilizing the sliding window operation. For accurate line segmentation, the
skewing operation is performed on the line segmented result images. The
implementation result shows the effectiveness of proposed technique, in
segmenting the handwritten text lines from the input document. The performance
of the proposed technique is evaluated by comparing the result of proposed
technique with the conventional text line segmentation technique. The result
shows that our proposed technique acquires high-quality text line segmentation
DR, RA and F-Measure values for the number of testing documents in comparison
with the conventional technique. |
Keywords: |
Line Segmentation, Sliding Window, Optical Character Segmentation, Adaptive
Histogram, Skewing |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
MANET ROUTING: OPTIMIZATION BY GENETIC AND FUZZY LOGIC APPROACH |
Author: |
N.K. KUPPUCHAMY R.MANIMEGALAI |
Abstract: |
Mobile Ad hoc network is a collection of self configurable mobile nodes with no
fixed infrastructure. Since all nodes are in roaming, the topology of MANET is
dynamic. Therefore, routing is the highly challenging task when node mobility is
high. Different types of routing protocols are proposed in literature, and each
has some advantages and limitations. This work proposes fuzzy logic and genetic
approach to select optimal routes to satisfy QoS required by applications using
MANETs. Fuzzy rule based system is formed by the linguistic variables actual end
to end delay (Ae), number of times the node leaves the network (Nl), number of
packets dropped (Nd) and number of Rrep generated (Nr). Simulations are
conducted with the proposed method. Numeric results show that fuzzy genetic
approach for routing improves the performance than existing AODV routing
protocol. |
Keywords: |
Mobile Ad Hoc Network (MANET), Fuzzy Logic Routing, Genetic Algorithms. |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
NETWORK LAYER SPECIFIC DATA TRANSMISSION FOR INTEGRATED NEXT GENERATION NETWORKS |
Author: |
S.ANANDA KUMAR, Dr.K.E .SREENIVASA MURTHY |
Abstract: |
Being digitized the communication system, channels are having a severe workload
in the current scenario. The internet and 4G services available in the global
world are able to provide good service to both stationary and moving devices.
Huge number of devices can be introduced in a specific region of the network.
Devices can be operated in any layer of the network. Most of the challenges are
faced in cross platform based service during handoff. For these kinds of handoff
problems, this paper proposes a technology, which includes a variety of header
formats in IP-v6 header format and a suitable protocol for cross layer handoff.
This work is done on a layer wise handoff and dual communication with two base
stations when handoff occurs. Multiple header format supports reliable,
uninterrupted and delay avoidance in the communication system. The authorization
and authentication are enhanced with two control units. |
Keywords: |
Authentication, Authorization, Handoff, Signal Strength. |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
DATA REPLICATION USING MODIFIED D2RS IN CLOUD COMPUTING FOR PERFORMANCE
IMPROVEMENT |
Author: |
S.KIRUBAKARAN, Dr.S. VALARMATHY, C.KAMALANATHAN |
Abstract: |
In cloud computing environments failures are normal rather exceptional. To
advance the system availability, the frequently used data should get replicated
to multiple locations to make the users to access from the nearby site. To
decide a reasonable number and right location of replicas is a challenging task
in cloud computing. Here, we recommend a Modified Dynamic Data Replication
Strategy (MDDRS) to decide a reasonable number and right location of replicas
and we compare both the modified dynamic data replication strategy and Dynamic
Data Replication Strategy (DDRS). The DDRS has three different stages which are
the identification of data file to replicate, number of replicas to be created
and placing new replicas. We modify the popularity degree in the first stage of
normal dynamic data replication strategy and the other two stages are similar to
the normal dynamic data replication strategy. In addition we incorporate the
synchronous and asynchronous updation of replica data file when we update the
main data center. |
Keywords: |
Cloud Computing, Data Replication, Popularity Degree |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN EFFICIENT ALGORITHM FOR PRIVACY PRESERVING TEMPORAL PATTERN MINING |
Author: |
S.S.ARUMUGAM, Dr.V.PALANISAMY |
Abstract: |
Pattern mining increases extra awareness due to its practical relevance in many
fields, such as, biology, medicine and so on. Recently, a few researches have
been presented in the literature about the mining of privacy preserving
patterns. There are more number of data mining techniques developed to find out
important information, yet the way of mining the data from the database is not
concerned about the privacy. In this paper, we have selected the medical
database and created the privacy on the patient’s medical database while the
hospitals share their data to other organizations. In case of sharing the
medical data, preserving the privacy of the data is also of importance as it may
lead to violation of individual (patient) highly personal information. Based on
the organizational need, the hospital can make the privacy on particular datum
alone, say on type diseases. In that respective way, a choice is given to the
hospital to where to make the privacy and this may vary depending on the
organization. Here, we have made the privacy on four different types of diseases
grouped as sensitive diseases, frequent diseases, seasonal diseases and
geographical diseases. Privacy of the patient records are obtained by modifying
the original database. Here, Prefix span algorithm was used for mining important
diseases from the database. The result of mining was not worthy comparing the
result with the original medical database. Finally the experimentation was made
with the synthetic dataset and an analyzes on the difference among the four
types of diseases while make the privacy in terms of the execution time, memory
usage, was done. |
Keywords: |
Privacy Preserving, Medical Database, Prefix Span, Sensitive Diseases, Frequent
Diseases, Seasonal Diseases And Geographical Diseases. |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
Title: |
QUALITY OF SERVICES ROUTING FOR MOBILE AD HOC NETWORKS |
Author: |
ABDESSADEQ FETTOUH, ABDELAZIZ EL FAZZIKI, NAJIB EL KAMOUN |
Abstract: |
The field of ad hoc networks is very promising since it allows the spontaneous
creation of a network without any infrastructure. An ad hoc network consists
simply of user terminals that can communicate together without intermediate.
Simple and intuitive way of designing ad hoc networks is to consider that they
correspond to the ultimate generalization of wireless networks because they
limit the maximum role of fixed infrastructure. This generalization is achieved
by improving the connectivity capabilities of wireless LANs. The limited scope
of the terminals requires the presence of a routing protocol for communication
between distant entities. Several routing protocols have been proposed in the
MANET group. They allow finding the shortest paths in terms of number of hops.
As Quality of Service (QoS) is an important issue in all networks (IT and
telecom) , it seems interesting to study ways to introduce this concept in
mobile ad hoc networks ( MANETs ) where the terminals are in movement relative
to each other . In fact, multimedia applications that we know today require QoS
guarantees more or less important that it would be good proposed in such still
experimental networks. QoS can be provided at different levels: application
layer, transport layer, network layer, MAC layer, etc. In this article, we focus
on routing solutions to ensure a certain quality of service in mobile ad hoc
networks at the network layer. To achieve this goal, many practical issues are
considered with proposed solutions. We provided Quality of services of ad hoc
networks by analyzing performance of different routing protocols. Different
scenarios with the Network simulator OPNET are performed. The test-bed is first
described, followed by the results and analysis. We concluded the paper with a
summary of the key results of the work. |
Keywords: |
Quality Of Services, Ambient Networks, MANET, AODV, OLSR, TORA |
Source: |
Journal of Theoretical and Applied Information Technology
December 2013 -- Vol. 58. No. 2 -- 2013 |
Full
Text |
|
|
|