|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2013 | Vol. 55 No.2 |
Title: |
INTEGRATION OF MOBILE AND WEB APPLICATION: AN IMPLEMENTATION OF DIABETIC
MANAGEMENT SYSTEM |
Author: |
M.A. JABAR, M.F. AZMI, F. SIDI |
Abstract: |
Rapid development and high mobile devices penetration around the globe has
impacted wireless and flexibility usage that promotes usability of technology at
anytime and anywhere. Wireless technology has turned out to be the major medium
in communication. One of the best-known examples of wireless technology is the
mobile phone that can help to create solutions faster and easier than earlier
days. However, designing and implementing these types of information systems can
be highly challenging and difficult as user interaction with such technologies
will be continuous and pervasive. Therefore, we propose a solution on how to
deliver and share information in an ubiquitous environment. A prototype of
diabetes monitoring system that support both mobile and web platform were
implemented and evaluated. An evaluation based on expert judgment technique was
used to validate the prototype. This study has shown that integration with
mobile and web to access information on the internet can be a paradigm to
promote ubiquitous information access and sharing. |
Keywords: |
Integration, Mobile, Web Application, Diabetic Management, Ubiquitous |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
A SURVEY ON MITIGATING ATTACKS RELATED TO SHORTCOMINGS OF ANDROID PERMISSION
FRAMEWORK |
Author: |
IMAN KASHEFI, MAZLEENA SALLEH |
Abstract: |
Today Smartphones are the closest user assistants since they offer a wide range
of functionalities to users. Although there are many applications developed in
the market which facilitate the day-to-day user activities and provide a
comprehensive means to entertain users, the number of malicious applications
which misuse the users’ personal data or overcharge them are increased
accordingly. These applications are granted privileges legitimately while they
may not use them in a proper way. The aim of this paper is to address attacks
related to the shortcomings of Android permission framework, which further are
categorize to attacks result from applications with excessive privileges,
confused deputy, and collusion attacks. This work compares the ability of
existing approaches in mitigating these attacks since any improvement in current
mechanisms or proposing novel methods to impede these types of attacks would not
be achieved unless a comprehensive study on the current approaches takes place. |
Keywords: |
Android Security, Privilege Escalation Attack, Collusion Attack, Confused Deputy
Attack |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR |
Author: |
HAIROL NIZAM MOHD SHAH, MOHD ZAMZURI AB RASHID, NUR MAISARAH MOHD SOBRAN,
ROZILAWATI MOHD NOR, ZALINA KAMIS |
Abstract: |
This project related to develop and implementation of autonomous vision based
mobile robot following human based on clothes color. There have two part are
involve which is mobile robot platform and classification algorithms by color.
The core of the classification of color are comprise into two process; offline
and online. An offline process consists of the training of the static image,
using deference input sources that depend on the application. An online process
consists of the matching process and the result of the clothes color position.
Then classification algorithm is applied to find the centroid of the human. This
centroid is then compared with the center of the image to get the location of
the human with respect to the camera, either at the left or right of the camera.
If the human is not in the center of the camera view, then corrective measures
is taken so that the human will be in the center of the camera view. Data for
the centroid of human is shown through the Graphical User Interface (GUI). One
of the unique advantages in this project, the detection of human by color only
uses image processing that generated by the algorithms itself without additional
sensor like sonar or IF sensor. |
Keywords: |
Classification Algorithms, Mobile Robot, Wireless Camera, Graphical User
Interface (GUI) |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
PREVENTION OF WORM HOLE AND BLACK HOLE ATTACKS IN SECURE VBOR FOR MOBILE AD HOC
NETWORKS |
Author: |
T. PEER MEERA LABBAI, V. RAJAMANI |
Abstract: |
In Mobile ad hoc networks, security is the main among the challenges to be
considered. There are various types of attacks such as passive attacks and
active attacks. Active attacks are more harmful than passive attacks. Some of
the active attacks are more dangerous in mobile ad hoc networks since there is
no central authority in MANETs. Examples of these attacks are: Worm hole attack,
Black hole attack and Distributed Denial of Service (DDoS) attack and etc., In
this paper, Secure VBOR is taken as our base paper. In Secure VBOR, groups are
formed based on the residual energy of the node. Then the keys are exchanged
among the user inside the group. Gateway members are playing the main role in
group formation and preventing these attacks. |
Keywords: |
MANET, Wormhole Attack, Blackhole Attack, VBOR, Energy Consumption, Delivery
Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
SERVICE ORIENTED REAL-TIME BUFFER MANAGEMENT FOR QOS ON ADAPTIVE ROUTERS |
Author: |
SARAVANAN.K, R.M.SURESH |
Abstract: |
To increase the quality of service in adaptive routers, this paper proposes a
service oriented buffer management algorithm. This paper use different buffers
for different service packets and the buffer controller maintains the buffer
size according to flow of incoming packets. The buffer controller increases or
decreases the buffer size at each input and output port by monitoring the rate
of incoming packets and the size of buffer is fixed based on a flow threshold
which is dynamic one. The value of flow threshold is computed using dynamic flow
approximation algorithm. The proposed system reduces the packet dropping rate
and increases the throughput. |
Keywords: |
Adaptive Routers, Buffer Management, Packet dropping, QoS |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPTIMIZING OF SVM FOR CT CLASSIFICATION |
Author: |
N.T.RENUKADEVI, Dr.P.THANGARAJ |
Abstract: |
An automated classification of Computerized tomography (CT) images method uses
Coiflet wavelets to extract features as input for the classifiers. Support
Vector Machine (SVM) module is used to classify the images into different
classes. Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used
to optimize the parameters C and gamma of the RBF kernel in SVM. Parameter
selection is thought of as an optimization problem where search techniques are
used to maximize SVM performance. The observed results are considerably better
than the results achieved by employing Support Vector Machine. |
Keywords: |
Image Classification, Computed Tomography (CT), Coiflet wavelets, Support Vector
Machine (SVM), Radial Basis Function (RBF), Particle Swarm Optimization (PSO),
Genetic Algorithm (GA) |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
A TEXT-BASED IMPLEMENTATION MODEL FOR REUSABLE ASPECT MODELS |
Author: |
ABID MEHMOOD, DAYANG N.A. JAWAWI |
Abstract: |
Model-Driven Engineering utilizes modeling to provide abstraction techniques in
order to effectively manage the complexity inherent in software systems
development for a problem domain. Further, it emphasizes the use of models as
primary development artifacts, and encourages researchers and professionals to
develop ways that can lead to obtaining executable systems from models. Reusable
Aspect Models is a multi-view modeling approach, which combines existing
aspect-oriented approaches to modeling class, sequence and state diagrams, into
a single approach. These models can serve as an effective design notation to
provide abstraction for a given domain. Moreover, these models may be used as
input to a model-driven engineering process to obtaining an executable system,
by transforming them into aspect-oriented code. However, when investigating
different ways of transforming models into code, an important technical issue is
to determine a formal (and semantically equivalent) computer-understandable,
text-based implementation of the graphical model. Here, a text-based model for
Reusable Aspect Models has been presented. To make sure that the text-based
model captures all relevant concepts of the notation, a conceptual reference
model for Reusable Aspect Models has been presented first, and later implemented
through the use of XML schemas. |
Keywords: |
Aspect-Oriented Modeling, Code Generation, Model-Driven Engineering |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
LEACH-EMMR: AN IMPROVED CLUSTER BASED MULTIHOP ROUTING ALGORITHM FOR VEHICLES
MONITORING NETWORKS IN MWSN |
Author: |
R.U.ANITHA, Dr.P.KAMALAKKANNAN |
Abstract: |
Due to rapid increase of vehicle accessibility and usage, traffic and
overcrowding on the highways will produce an unsafe and inefficient to drive the
vehicle. Vehicle Monitoring Network (VMN) is a Mobile Wireless sensor network
based real-time system, which collects, transmits, analyzes and process the
Vehicle Monitoring parameters in a testing area. Even though sensor networks are
primarily designed for monitoring and reporting events, they are application
dependent. A single routing algorithm cannot be sufficient in energy efficiency
for mobile sensor networks in all applications. The cluster based methods and
energy saving approaches are plays an important role on designing network
routing protocols for the VMN. Thus this paper proposes an enhanced description
of LEACH-Mobile algorithm called LEACH-Enhanced Mobile by Multihop routing
(LEACH-EMMR) algorithm for the VMN. Simulation results shows that the LEACH-EMMR
can reduce the energy consumption of nodes, decrease the process of clustering
and prolong the network lifetime in the VMN. |
Keywords: |
Mobile WSN, LEACH-Mobile Protocol, Cluster head, Vehicle Monitoring, residual
Energy, Distance |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
A JOINT DESIGN OF ROUTING AND RESOURCE ALLOCATION USING QOS MONITORING AGENT IN
MOBILE AD-HOC NETWORKS |
Author: |
P. SENTHILNATHAN, C. KALAIARASAN |
Abstract: |
In MANETs, mobile nodes can join and leave or change their position inside the
network, so its topology can change anytime in unpredictable ways. So
maintaining the QoS for the resource allocation is crucial for MANETs. In this
paper, we propose a joint design of routing and resource allocation using QoS
monitoring agent in MANETs. In this joint design, depending on the bandwidth
request, a QoS monitoring agent checks the available bandwidth and allocates the
resources temporarily for the real-time flows. In case of QoS changes or route
breakages, the monitoring agent sent a feedback to the source, which contains
the estimated amount of resources to be reserved or the route failure
information. The sender adaptively adjusts the reservations or data rate when
there is a QoS change or selects another efficient route when there is a route
or link failure. By simulation, we show that our proposed joint design framework
improves the throughput and bandwidth utilization. |
Keywords: |
Mobile ad-hoc networks (MANETs), Quality of Service (QoS) |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
VLSI DESIGN OF EFFICIENT ARCHITECTURE IN RECURSIVE PSEUDO-EXHAUSTIVE TWO-PATTERN
GENERATION |
Author: |
G. SUDHAGAR, Dr. S. SENTHIL KUMAR |
Abstract: |
The aim of built in self-test is to make the machine to test by itself. The best
method among the built in self-test is pseudo exhaustive two pattern generation
produces the output according to the input given with 16bit generator. The main
drawback that occurs in this test pattern generation is maximum delay. It occurs
in the carry generator module. In this paper, the method proposed with recursive
pseudo exhaustive two pattern generator to reduce the delay is that mixing the
block of carry generator and adder in order to minimize the delay that produced
while in testing process. A method of approaching the testing problem at the
chip level is to appropriate built-in self-test capacity that present inside a
chip. In exhaustive testing number of test vector are more which is decreased in
pseudo exhaustive testing. Built in self-Test pattern generators are commonly
discerned into one-pattern and two-pattern generators. |
Keywords: |
Built In Self-Test, Two Test Pattern Generator, Carry Generator, Recursive, And
Pseudo-Exhaustive Generator |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND
AUTHENTICATION IN MANET |
Author: |
Y.V.S.SAI PRAGATHI, S.P. SETTY |
Abstract: |
In mobile ad hoc networks (MANETs), the existing anonymous routing protocols
result in increased overhead as the network size increases. Also, increased
delay and inaccuracies are caused when the nodes deployed in the network lags
the topology information in prior. In order to overcome these issues, in this
paper, we propose a Hybrid Anonymous Location-Aided Routing Protocol (HALARP)
for MANETs. This technique utilizes both proactive and reactive mode of
anonymous location based routing. The proactive method is applied for the nodes
within the pre-defined radius and reactive method is applied for nodes outside
the pre-defined radius. When the source wants to transmit the data to the
destination, it is executed using suitable encryption technique in secured
manner with the help of topology information. By simulation results, we show
that the proposed technique offers minimized overhead and delay and increased
accuracy. |
Keywords: |
Mobile Ad Hoc Networks (MANETs), Routing Protocol, Authentication |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE COMPARISON OF DYNAMIC MULTICAST GROUPS BASED ON MOBILITY SPEED |
Author: |
USHA DEVI G, ANUSHA K, RAJYALAKSHMI GV |
Abstract: |
Mobile Ad-hoc Networks (MANETs) have group of mobile users over a shared medium
that can also offer group communications. In group-oriented communications,
multicasting plays an important role. The combination of multicast services with
ad-hoc environment introduces new challenges towards security issues. Clustering
is an effective technique for group communication. Cluster formation involves
election of a node as cluster head and it controls other nodes in the newly
formed cluster. The joining or association and leaving or dissociation of nodes
to and from clusters disturbs the stability of the network topology. This paper
analyses the effect of mobility in dynamic multicast clusters, in which nodes
uses multicast ODMRP routing protocol to collect its neighbours to form
clusters. Simulation results show the performance in terms of throughput and
average end-end delay under various network conditions. |
Keywords: |
Multicast Dynamic Groups, ODMRP, Group Communication, Throughput, Average
End-End Delay |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
A PREDICTIVE TRUST MODEL FOR E-COMMERCE APPLICATIONS |
Author: |
USHA DEVI G, SUTANU NANDI , ANUSHA K, RAJYALAKSHMI GV |
Abstract: |
E-business systems are growing exponentially in present days. Trust is essential
for e-business systems and it is a part of modern e-commerce system. In this
paper, we proposed a new algorithm to predict the trust value which is a
transaction based feedback of peers for e-commerce applications. Before
interacting with an unknown peer, it is rational to doubt its trustworthiness.
Therefore, it makes the new transaction more secure by enabling trust evaluation
prior to interacting with an unknown peer. A peer to peer e–commerce needs
reputation for the knowledge of other peers. |
Keywords: |
Predictive Trust, Malicious Peer, Reliable Peer, Feedback Score |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
CHANNEL ESTIMATION OF MIMO-OFDM USING CUCKOO SEARCH ALGORITHM |
Author: |
K.VIDHYA, Dr.K.R.SHANKAR KUMAR |
Abstract: |
In wireless communication, Multiple Input Multiple Output-Orthogonal Frequency
Division Multiplexing (MIMO-OFDM) plays a major role because of its high
transmission rate. Channel estimation and tracking have many different
techniques available in OFDM systems. Among them, the most important techniques
are least square (LS) and minimum mean square error (MMSE). In least square
channel estimation method, the process is simple but the major drawback is it
has very high mean square error. Whereas, the performance of MMSE is superior to
LS in low SNR, but its main problem is it has high computational complexity.
While comparing with LS and MMSE method individually, the combined LS and MMSE
method using evolutionary programming can greatly reduce the error. If the error
is reduced to a very low value, then an exact signal will be received. Thus, we
propose a hybrid technique that includes cuckoo search algorithm performs the
conventional LS and MMSE channel estimation followed by enabling a fine tuning
on the obtained channel model. The result shows the performance of the proposed
method is better than LS and MMSE method in all the mutation & crossover values
and also in all the iterations computed. We illustrate the performance of OFDM
systems using propose technique can be observed from the imitation and relative
results. |
Keywords: |
OFDM, Channel estimation, cuckoo search algorithm, LS, MMSE |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
ON SOFT GENERALIZED CLOSED SETS IN SOFT TOPOLOGICAL SPACES |
Author: |
ŞAZİYE YÜKSEL, NAİME TOZLU, ZEHRA GÜZEL ERGÜL |
Abstract: |
In this paper, we continue the study of soft generalized closed sets in a soft
topological space introduced by Kannan [1]. Firstly, we give a representation of
soft sets and soft topological spaces. Secondly, we investigate behavior
relative to soft subspaces of soft generalized closed sets. We show that a soft
generalized closed set in a soft compact (soft Lindelöf, soft countably compact)
space is also soft compact. Then, we show that a soft compact set in a soft
regular space is soft generalized closed and disjoint soft g-closed sets in a
soft normal space generally cannot be separated by soft open sets. Finally, we
investigate some properties of soft generalized open sets. |
Keywords: |
Soft Sets, Soft Topological Space, Soft Generalized Closed (Open) Sets. |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
STUDY OF COMBINED WEB PRE-FETCHING WITH WEB CACHING BASED ON MACHINE LEARNING
TECHNIQUE |
Author: |
K R BASKARAN, DR. C.KALAIARASAN, A SASI NACHIMUTHU |
Abstract: |
High bandwidth utilization, reduced load on the origin server, high access speed
are possible by combining Web caching and pre-fetching techniques. Pre-fetching
is the process of fetching few Web pages in advance which will be assumed to be
needed by the user in near future and those pages are cached in the memory. Lots
of work has been reported for caching and pre-fetching of Web pages in the
literature. In this paper, pre-fetching using clustering technique is combined
with SVM (Support Vector Machine) – LFU algorithm, a machine learning technique
for Web proxy caching .By using real dataset it will be shown that the SVM
technique will be better than clustering based pre-fetching technique using
caching policy like LFU considering bandwidth utilization and access latency. |
Keywords: |
Classification, Least Frequently Used (LFU), pre-fetching, Support vector
machine (SVM) |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
Title: |
A PERSPECTIVE MATHEMATICAL MODEL FOR WEAPON TO TARGET ALLOCATION PROBLEM USING
RANDOMIZED TECHNIQUE |
Author: |
K. HARIHARAN, R. PARAMESHWARAN, C. MANIKANDAN, R. SATHIYAPRIYA, D. SABITHA,
Dr. V. VAITHIYANATHAN |
Abstract: |
TUT concentrates on ease of allocating a group of Weapon to a group of Targets.
The problem of allocating weapon to a set of targets is typical an optimization
problem with the aim of increasing the probability of hitting all targets by the
weapon using Ant Colony Optimization. TUT model is designed in such that it
maximizes the probability of mapping a set of most defensive weapon against a
set of most attacking targets, to cause maximum destruction. TUT model is
designed, mainly for war scenario of weapon coordination, the problem statement
can be formulated based on six types of limiting factor, containing all defence
information of entry angle, intercept angle ,states potential , power , resource
(i.e., weapon constraints), frequency allocation constraints, as an factor to
the TUT model.To make it definite, we concentrate on a platform to work with TUT
and TUR by sending information from TUT to TUR with certain allocated frequency
and power level. To accomplish that a set of Weapon are chosen against a set of
Targets for allocation based on Ant Colony Optimization. We initially started
with ant colony algorithm and compare the results with branch & bound technique
on that we found, than ACO algorithm the branch and bound performs well. This
enhances the accuracy of weapon to hit allocated Target. This improves the
performance of overall BMD. |
Keywords: |
Tut (Target Update Transmitter),Tur (Target Update Receiver),Bmd (Ballastic
Missile Defence) ,Mcc (Mission Control Center) |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 2 -- 2013 |
Full
Text |
|
|
|