|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2014 | Vol. 59 No. 2 |
Title: |
A NOVEL APPROACH TO GENERATE TEST CASES FOR COMPOSITION & SELECTION OF WEB
SERVICES BASED ON MUTATION TESTING |
Author: |
ASHOK KUMAR. P.S, KAARTHICK .B, GOPAL KRISHNA. C |
Abstract: |
Now a day’s Web Service has become a significant part of the web. The importance
of Web Services is to support interoperable and Application – to – Application
interaction over a network with proper URI, so that Web Services provide high
value to online business transactions. Testing (Verification & Validation) is a
critical activity in software product design. Rigorous software testing is not
possible so different software testing techniques are invoked before releasing
the product. Based on Prim’s algorithm we created all possible test cases from
directed weighted graph. Mutation testing is a structural testing method; it
generates software tests and evaluating the quality of software testing by fault
insertion in original code. A case study has been presented here in order to
create the efficacy of our test approach in mutation analysis. |
Keywords: |
Mutants, web service, testing, URI, SRS |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
TOWARDS A NEW ALGORITHM MORE EFFICIENT FOR UPDATING FIREWALL POLICIES |
Author: |
A. KARTIT, Z. KARTIT, M. EL MARRAKI |
Abstract: |
Firewall is one of the most widely utilized component on any network
architecture, since that a deployment is a very important step to turn the
initial policy to a target policy. This policy requires automated tools in order
to create a suitable environment for configuring or deploying safely a policy
target. Most researchers are interested in detection of conflicts or the problem
of optimization of policies firewall while few of them have proposed deployment
strategies for two important types of edition policies. We have already proposed
a correct algorithm for the deployment type I [0]. In this work we study one of
these strategies that falls within the type II edition policies. We show that
the proposed solution of type II edition [1] is not fully correct and lead to
security vulnerabilities, and then we offer a few corrections and improvements
for this type of editing. |
Keywords: |
Security Policy (SP), Firewall Policy Management (FPM),
Security Vulnerabilities (SV), Network Security (NS) |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A MULTI-ASPECT RULE BASED MODEL FOR WEB SERVICES OFFLINE COMPOSABILITY |
Author: |
HAJAR OMRANA, FATIMA ZAHRA BELOUADHA, OUNSA ROUDIES |
Abstract: |
Composition is still one of the most challenging key design goals of Web
services technology. While they are designed to be aggregated and work with each
other, most of existing Web services are developed independently and uses
different standards. Detecting all the incompatibilities of Web services
composability before processing the composition would increase the efficiency
and correctness of this latter considerably. In this direction, we propose a
multi-aspect Web services composability model, aligned with WSDL 2.0, SAWSDL and
WS-Policy 1.5 standards, which addresses a set of functional, non-functional,
contextual, data structure and technical composability rules to check whether to
or more web services operations can concretely interact with each other. |
Keywords: |
Web Services Composability , Dynamic Composition, WSDL 2.0, SAWSDL, WS-Policy |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
CORRECTION POSITION OF COORDINATES FROM DATA GPS LOGGER IN GOOGLE MAPS BY USING
LAGRANGE INTERPOLATION METHOD |
Author: |
NGAKAN MADE SATRYA WIBAWA, I MADE SUKARSA, I KETUT ADI PURNAWAN |
Abstract: |
Development of navigation technologies increase rapidly. People need a GPS to
indicate a location or street. The accuracy of the GPS position is often less
precise. This problem is used as a discussion of issues in the design of GIS to
fix the GPS coordinates to the coordinates of the path using interpolation
polinom lagrange method. This study uses PL/SQL to MySQL engine to perform the
calculations haversine formula and interpolation polinom lagrange. Coordinates
improvements value obtained from the results of these calculations. |
Keywords: |
GPS, GIS, PL/SQL, Correction Coordinate, Interpolation Polinom Lagrange |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
COMPARATIVE STUDY OF DATA MINING MODEL FOR CREDIT CARD APPLICATION SCORING IN
BANK |
Author: |
EVARISTUS DIDIK MADYATMADJA, MEDIANA ARYUNI |
Abstract: |
The growth of credit card application needs to be balanced with the anticipation
of bad credit risk because it does not use security collateral as warranty. The
usage of credit scoring can be used to help the credit risk analysis in
determining the applicant's eligibility. Data mining has been proven as a
valuable tool for credit scoring. The aim of this research is to design a data
mining model for credit scoring in bank in order to support and improve the
performance of the credit analyst job. The proposed model applies classification
using Naïve Bayes and ID3 algorithm. The accuracy of Naïve Bayes classifier is
82% and ID3 is 76%. So we can conclude that Naïve Bayes classifier has better
accuracy than ID3 classifier. |
Keywords: |
Credit Scoring, Data Mining, Credit Card, Bank, Naïve Bayes,
ID3, Classification |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
MULTI-LEVEL TRUST ARCHITECTURE FOR MOBILE ADHOC NETWORKS BASED ON CONTEXT-AWARE |
Author: |
A.RAJESH, DR. N. MOHAN KUMAR |
Abstract: |
Mobile ad hoc networks (MANETs) are not favorable to centralized trust
architecture and literature review provides several security framework and
solutions for trust management. However, there is no unified architecture for
MANET to exploit deployed security models based on trust. This study presents
compelling trust architecture in which a trust based security model is
superimposed with three trust models such as a low-level trust model, a
medium-level trust model, and a high-level trust model based on context-aware
security. The low-level trust model meets the necessary security requirements
using direct observations. The medium-level trust model ensures medium security
level using direct observations and recommendation messages. The high-level
trust model provides a highly secured system with high complexity and
computational cost. The proposed work is formulated based on the application
context to determine the trust-level in geographic routing protocol. The
proposed trust is fully distributed and application context dependent and
dynamic in nature. The proposed multi-level trust model is integrated with
Position based Opportunistic Routing (POR) Protocol that selects the trusted
next hop in the routing path. The correctness of the proposed scheme is analyzed
using network simulator (NS-2). Proposed work increases packet deliver ratio and
throughput significantly. |
Keywords: |
Mobile Ad Hoc Networks, Geographical Routing, Trust Management, Context-aware
Trust, Trust based Security |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
INVESTIGATION OF SUPPORT VECTOR MACHINE CLASSIFIER FOR OPINION MINING |
Author: |
K.SARASWATHI, Dr. A.TAMILARASI |
Abstract: |
Complicated text understanding technology which extracts opinion, and sentiment
analysis is called opinion mining. Building systems to collect/examine opinions
about a product in blog posts, comments, and reviews/tweets is sentiment
analysis. Product reviews are the focus of existing work on review mining and
summarization. This study focuses on movie reviews, investigating opinion
classification of online movie reviews based on opinion/corpus words used
regularly in reviewed documents. |
Keywords: |
Opinion Mining, Classification Accuracy, Sentiment analysis, Movie reviews,
Support Vector Machine, Bagging |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A ROBUST METHOD FOR DIGITAL IMAGES WATERMARKING BASED ON COMBINATION OF SVD, DWT
AND DCT USING OPTIMAL BLOCK |
Author: |
MOHAMED RADOUANE, TARIK BOUJIHA, ROCHDI MESSOUSSI, RAJA TOUAHNI |
Abstract: |
With the growth of the Internet, development of digital media technologies and
computer network, the change and the protection of copyright have become very
important. To protect multimedia data against illegal recording and
retransmission, the integration of a signal (digital signature, watermark) has
become an obligation without modifying quality of the original image, the goal
of this operation is to identify the owner and protect his intellectual
property. Digital watermarking has been proposed as a solution to solving the
copyright problem by introducing invisible data (watermark) into original image.
In this paper, we propose a robust method for digital images watermarking. This
method is achieved by searching the optimal block that can be used to insert the
watermark in original image by modifying the singular value decomposition (SVD)
in DWT (discrete wavelet transform) combined with DCT (Discrete Cosine
Transform) . The experimental results show that this imperceptible method
combines the advantage of three transformations to ensure robustness against
most attacks. |
Keywords: |
Watermarking, DWT, SVD, DCT, Entropy |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
FUZZY VAULT FUSION BASED MULTIMODAL BIOMETRIC HUMAN RECOGNITION SYSTEM WITH
FINGERPRINT AND EAR |
Author: |
R.VINOTHKANNA, Dr.AMITABH WAHI |
Abstract: |
Human Recognition is one of the admired tasks over the world for recognizing a
person using biometrics by determining physical or behavioral characteristics of
that person. In our existing work, we have already worked out a multimodal
biometric recognition system with fingerprint, palm print and hand vein. For
getting more accurate recognition of our biometric system, in this work, we use
ear as one of the modalities with the fingerprint. In order to improve the clear
visible of input image databases, pre-processing of images is initially done.
After the pre-processing of these images only, the features from the fingerprint
and ear modalities are extracted clearly for the further processes. In the
fingerprint images, the minutiae features are extracted directly and from the
ear, the shape features are extracted using Active Appearance Model (AAM). Then,
a grouped feature vector point is gained using chaff points and these two
extracted feature points. After acquiring the grouped feature vector points, the
secret key points are attached with the grouped feature vector points to
formulate the fuzzy vault. Finally, test person’s grouped vector is matched up
to the fuzzy vault data base to the accurate recognition of the correct person.
Our proposed work is effectively evaluated in Matlab with the evaluation metrics
FAR, FFR, GAR and Accuracy by changing the secret key size at every time. The
results of our proposed work facilitate very better values for the recognition
of persons with the fingerprint and ear modalities. Moreover, our existing work
is also compared with our proposed work for proving that our proposed work is
good. In addition to this, other existing work papers are also taken for our
comparison work, which clearly proves that our proposed work outperforms other
techniques by providing very much better recognition accuracy. |
Keywords: |
Recognition, Multimodal biometric system, Minutiae Extraction, Bifurcation,
Ridges, Active Appearance Model, Chaff points, Fuzzy Vault |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
EMPLOYING DATA MINING ON HIGHLY SECURED PRIVATE CLOUDS FOR IMPLEMENTING A
SECURITY-AS-A-SERVICE FRAMEWORK |
Author: |
G. Thippa Reddy, K. Sudheer, K Rajesh, K. Lakshmanna |
Abstract: |
Cloud computing is rapidly gaining popularity. However, like any new system,
cloud computing is facing some significant challenges. The most significant
challenge faced by cloud adopters is related to legal compliance, security
controls, privacy and trust. This paper proposes a novel security management
framework by employing data mining to detect, contain and prevent attacks on
cloud computing systems. Given that the security frameworks and related controls
on cloud computing are still evolving, this research may prove to be a useful
piece of contribution in enhancing the theoretical foundation established by
existing studies. |
Keywords: |
Cloud Computing, Data Mining, Security-as-a-service, OPNET, Positivism and the
Interpretivism |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A MULTI-AGENT BASED DISTRIBUTED INTRUSION PREVENTION SYSTEM AGAINST DDOS
FLOODING ATTACKS |
Author: |
A. SAIDI, A. KARTIT, M. EL MARRAKI |
Abstract: |
Denial of service (DoS) attacks is a simple and very annoying type of
intrusions. This kind of attacks attempts to make unreachable at least a service
of equipment like it can stagnate the whole of a network. To launch a DoS
attack, we have, nowadays, often tools to succeed. Some of these tools try to
send a compromised network load to corrupt their targets by flooding it with SYN,
UDP or ICMP packets [1],[2]. Our paper describes the conception of a
multi-agent-based intrusion prevention system (IPS) that can apprehend these
flooding attempts in a distributed way. |
Keywords: |
DoS Attacks, Intrusion Prevention, Multi-agent System, Distributed System |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
FORECASTING EARNINGS PER SHARE FOR COMPANIES IN IT SECTOR USING MARKOV PROCESS
MODEL |
Author: |
M.P. RAJAKUMAR , V. SHANTHI |
Abstract: |
Investors rely growth on earnings per share (EPS) which is the net income less
dividends on preferred stock divided by the number of outstanding share for
measuring the financial soundness of a company as it represents the
profitability of a common stock. Many investors select stocks on the basis of
earnings forecast, cost of capital and the particular company’s profitability
compared to other companies. As this seems to be the base for any development
phase, market analysts spend ample time in evaluating and refining EPS
estimates. In this work Markov process model is applied for forecasting the
subsequent quarter EPS for companies in information technology (IT) sector. Two
models namely two state basic model and extended state interval model with time
independent transition probability matrices are applied to analyze and predict
the EPS for subsequent quarter of HCL infosystem, Reliance, Infosys and Wipro.
The EPS data obtained from Bombay stock exchange (BSE) are used to test the
proposed prediction model. The experimental results declare that two companies’
show optimistic sign of success, one company strikes a balance and the other
company provides state of loss. The outcome of the prediction process is
consistent in the real situation. |
Keywords: |
Markov process model, earnings per share, forecasting, IT sectors |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
GOVERNANCE AUDIT OF APPLICATION PROCUREMENT USING COBIT FRAMEWORK |
Author: |
GUSTI AYU THERESIA KRISANTHI, I MADE SUKARSA, I PUTU AGUNG BAYUPATI |
Abstract: |
The audit of information system is conducted to check the level of readiness of
the organization in managing Information Technology (IT) governance. Measurement
of level of maturity in procurement of application in one of the universities in
Indonesia using framework COBIT 4.1 toward several IT processes related with
procurement applications process by mapping the identification of business
goals, information technology goals and information technology process COBIT
4.1. Best practice is given using ITIL V3 standard which is obtained by mapping
IT process of COBIT 4.1. Results of audit that has been conducted show the
current maturity level index is in 2.85 which means in 3-defined of maturity
level with the readiness level of expectation at the level of 5-optimized. This
shows the readiness gap, thus, needs to be given improvement strategies that
contain the steps to achieve the expected level of maturity. |
Keywords: |
Audit of Information System, IT Governance, COBIT, Maturity Level, ITIL |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK USING
NEURAL NETWORK |
Author: |
SYEDA GAUHAR FATIMA,Dr.SYED ABDUL SATTAR, Dr.K ANITHA SHEELA |
Abstract: |
In wireless sensor network (WSN), the existing intrusion detection techniques
rarely consider energy consumption for judging the node state. Also there is
need for increased detection rate. Hence in this paper, we propose an energy
efficient intrusion detection system for WSN. Initially the nodes deployed in
the network are analyzed for malicious activity based on their residual energy.
If the energy consumption of a node is greater than a predicted threshold, it is
considered as malicious and the packets emerging from these nodes are said to be
abnormal. The abnormal packets are passed through the Back Propagation Network (BPN)
to analyze the data misinterpretation. In case, the output of BPN is found to be
abnormal, then the attack detection is confirmed and attack type is estimated.
By simulation results, we show that the proposed technique is more energy
efficient. |
Keywords: |
WSN, Intrusion Detection, Wnergy Efficient, Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NOVEL APPROACH FOR MITIGATION OF HARMONICS AND INTERHARMONICS IN VARIABLE
FREQUENCY DRIVES |
Author: |
PROF.VIJAYAKUMAR.A, DR.MAHENDRA BABU. T.K |
Abstract: |
Interharmonics are non-integer multiples of the fundamental frequency that
causes several undesirable effects. Variable frequency drives are main sources
of interharmonics. Also interharmonics are generated when the inverter load is
unbalanced or the inverter is operating in overmodulation. In this study,
adjustable speed drive employing diode bridge rectifier and voltage source
inverter with load unbalance is considered. Propogation of interharmonics in the
supply side due to load unbalance is analysed and a novel method for mitiating
interharmonics is proposed. The proposed method employs an active filter in
supply side which is simulated using PSIM . With the proposed active filter the
compensation effectiveness is significantly improved and allows the elimination
of passive filters thereby reducing cost and space required. |
Keywords: |
Interharmonics, Power Quality, Adjustable Speed Drive, Active Filter,
Interharmonics Mitigation |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
MAPPING THE RESEARCH PRODUCTIVITY OF BANARAS HINDU UNIVERSITY: A SCIENTOMETRIC
STUDY |
Author: |
R. BALASUBRAMANI, R. PARAMESWARAN |
Abstract: |
The study presents the growth and the contribution of research carried out by
the scientists of Banaras Hindu University (BHU). The pattern of communications
of authors and scattering of their research output in different journals,
analysis the strong and weak areas of university research. The data for the
study was taken from the Web of Science online database published by Institute
for Scientific information (ISI). The study shows that there was a gradual
growth of publications during 2000 - 2011. The annual average research output of
BHU was 578 records and the research output of the scientists is fairly
collaborative. “Current Science” is one of the most preferred journals of the
authors of BHU. The Institute of Technology leads in publications productivity
with 1482 (21.3%) articles. The authors of BHU have been collaborated with the
foreign authors for their research work. |
Keywords: |
Scientometrics Analysis, Scientometrics Study, Bibliometircs, Research
Productivey, Banaras Hindu University, Scientfic Research-University. |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
EXPLOITING IPV6 ROUTING HEADERS TYPE 0/2 IN DIFFERENT IP WIRELESS NETWORKS:
ATTACK SCENARIO & ANALYSIS |
Author: |
BASSAM NAJI AL-TAMIMI, RAHMAT BUDIARTO, MOHD. ADIB OMAR, KAMAL M. ALHENDAWI |
Abstract: |
Mobile IP is an open standard protocol designed by IETF to allow users to move
from one network to another while maintaining their own permanent IP addresses.
However, the seamless connectivity in different IP networks has introduced new
security vulnerabilities. One of the most critical concerns with the IPv6 is
IPv6 routing header. IPv6 routing header can be used by an IPv6 source to list
one or more intermediate hosts to be visited on the way to a packet’s
destination. Nevertheless, the feature of IPv6 routing header which has serious
vulnerability can be used by attacker to bypass security policies applied on
filtering devices such as firewall. This study analyzes the IPv6 routing header
feature which can be exploited by attackers to access the protected
hosts/networks. Thus, the current study provides a comprehensive view regarding
the scenario of attackers within the different IP wireless networks which in
turn provide the researchers and practitioners with the threats of attackers.
The scenario analysis also leads to developing new mechanisms for covering the
security problem of routing header type 0/2 which is still under investigation. |
Keywords: |
MIPv4; MIPv6; MN; IPv6 Routing Header, Different wireless IP networks |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
NTRU ENCRYPTION USING HUFFMAN COMPRESSION |
Author: |
M.N.M. PRASAD , DR. MOHAMMED ALI HUSSAIN, DR. C.V. SASTRY |
Abstract: |
NTRU Labs have proposed a scheme for secure transmission using ring of truncated
polynomials in Zq(x) / (xn -1). We have proved in this paper that a
pre-processing the data to be transmitted greatly decreases the time of
transmission. We have used a matrix version of NTRU Cryptosystems. |
Keywords: |
Truncated, Transmission, Polynomials, Ring, Secure, Number Theory Research Unit
(NTRU) |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
HYBRID GENETIC ALGORITHM WITH GREAT DELUGE TO SOLVE CONSTRAINED OPTIMIZATION
PROBLEMS |
Author: |
NABEEL AL-MILLI |
Abstract: |
In this paper, a new hybrid optimization algorithm based Genetic Algorithms (GAs)
is proposed to solve constrained optimization engineering problems. A hybrid
Genetic Algorithms (GA) and great deluge algorithm are used to solve non-linear
constrained optimization problems. The algorithm works on improving the quality
of the search speed of GAs by locating infeasible solutions (i.e. chromosomes)
and use great deluge to return these solutions to the feasible domain of search;
thus have a better guided GA search. This hybridization algorithm prevents GAs
from being trapped at local minima via premature convergence. The simulation
results demonstrate a good performance of the proposed approach in solving
mechanical engineering systems. |
Keywords: |
Genetic Algorithm, Great deluge, Welded Beam Design, Pressure Vessel |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF OPTIMIZATION TECHNIQUES FOR MEDICAL IMAGE RETRIEVAL |
Author: |
Ms. N. T. RENUKADEVI, Dr. P. THANGARAJ |
Abstract: |
The computer-aided diagnosis systems (CAD) are widely used for clinical
diagnosis and treatment. Content-based image retrieval (CBIR) of medical images,
according to its domain specific image features, is a valuable tool for
physicians. A method for automatic classification of computed tomography (CT)
images of different types is presented in this paper. The proposed method has
three major steps: 1. Feature are extracted from the CT images using Coif let
wavelets; 2. The features extracted are classified using Support Vector Machine;
3. The parameters of the SVM are optimized using Particle Swarm Optimization (PSO),
and modified PSO with a genetic algorithm |
Keywords: |
Content-based image retrieval, Computed Tomography, Coif let wavelets, Particle
Swarm Optimization, Genetic algorithm, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
SOLVING MAXIMAL COVERING PROBLEM USING PARTITIONED INTELLIGENT FISH ALGORITHM |
Author: |
AMIN JULA, ELANKOVAN SUNDARARAJAN, NARJES KHATOON NASERI, REZA ABIAT |
Abstract: |
NP-Complete optimization problems are a well-known and widely used set of
problems which surveyed and researched in the field of soft computing. Nowadays,
because of the acceptable rate of achieving optimal or near-optimal solutions of
the mentioned issues, using of nature-inspired algorithms are increasingly
considered. One of the familiar problems in the field of NP problems is Maximal
Covering Problem which has various applications of pure mathematics to determine
the location of mobile network antennas or police stations. In this paper, we
introduced a heuristic algorithm called Partitioned Artificial Intelligent Fish
Algorithm which using artificial fish-search algorithm, logical partitioning of
the search space of this algorithm to several sub-space and change in motor
functions in fishes, deals with the suitable, innovative and fast solution of
maximal covering problem. The results of implementing this algorithm and
comparing it with the performance of some the best known algorithms for solving
NP problems will be represented by a very good performance of the proposed
algorithm. |
Keywords: |
Artificial Fish Algorithm, Maximal Covering Problem, NP-hard problem |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
E-BANJAR BALI, POPULATION CENSUS MANAGEMENT INFORMATION SYSTEM OF BANJAR IN BALI
BY USING FAMILY TREE METHOD AND BALINESE CULTURE LAW |
Author: |
I GUSTI BAGUS ARI PINATIH, A.A. KOMPIANG OKA SUDANA, I KETUT ADI PURNAWAN |
Abstract: |
This paper describes how population census in Balinese traditional village i.e.
banjar are managed. This kind of information system is known as e-Banjar Bali. A
case study was conducted in Banjar Padang Tegal Tengah, a banjar in Ubud, Bali
regarding to the information system. This population information system uses
website as its basis. The study was done to find an easier population census
management. Managing family tree, calculating total population, indigenous and
non-indigenous people, active and non-active population, natality and mortality
are inclusive in the census. Additional feature included as a part of this
information system is management upon banjar organizational data and information
spreading among the society. This particular information system is expected to
minimize the use of paper or manual execution of population census. |
Keywords: |
Banjar, Population, Management, Family Tree, Balinese Culture Law |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
FACTOR INFLUENCING THE USE OF SMART PHONE BY MALAYSIAN’S ELDERLY |
Author: |
NAIM CHE PEE, ZULISMAN MAKSOM, AZIR REZHA NORIZAN |
Abstract: |
The smart phone has become essential part of personal and business life across
all age boundaries. The smart phone usage can potentially play a significant
role in assisting the elderly in many ways especially in terms of maintaining
social relationship, providing a sense of safety and accessibility. However,
elderly seems to be the neglected user group in the design of recent smart phone
interface and the penetration of the technology to the elderly are very low.
Hence this paper attempt to report issues that are related to why this
particular group of user aged 40 years old and above was influenced to own the
smart phones and the data gathering was done specifically in Malaysia context.
This research used an interview and survey instrument to obtain the data from
the intended target group of user whom are using smart phones. The result
indicates three main factors that influence the respondents to own their smart
phone which is family encouragement, the use of mobile internet and social
networking. |
Keywords: |
Interface Design, Elderly, Smartphone, Influencing Factors, And Technology
Penetration |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
BASIP A VIRTUAL MACHINE PLACEMENT TECHNIQUE TO REDUCE ENERGY CONSUMPTION IN
CLOUD DATA CENTRE |
Author: |
AJITH SINGH. N, M. HEMALATHA |
Abstract: |
Infrastructure as a Service (IaaS) in cloud computing provides Infrastructure as
a service for the demand of user from small instance to large instance in pay
per use model. The services include like computer resource, networking and data
storage. An API (Application Programming Interface) is used to access the
infrastructure and a dashboard to control the server and to create and manage
different Virtual Machines in the cloud data centre. Multiple cloud users access
the service simultaneously. Due to continuous access of the services, a deadlock
can happen, and it may lead to a system crash, although cloud computing is
designed to overcome such problem, a proper Virtual Machine Placement Technique
is needed for implementation to rule out such incidences. Deadlock can occur in
cloud computing as the system is inherited from distributed computing and
virtualization. A Virtual Machine Placement Technique known as BASIP is proposed
to overcome the issue of deadlock by using a banker algorithm with Stochastic
Integer Programming. Further, the proposed algorithm is being simulated with
hundreds of servers and thousands of virtual machines. The proposed algorithm
was simulated with different overload detection and VM selection algorithm. The
BASIP algorithm is experimented with 800 servers with 1024 Virtual Machines.
From the experimental results, BASIP algorithm reduces energy significantly. |
Keywords: |
Virtual Machine, Cloud Computing, Live Migration, Bankers and Stochastic Integer
Programming, Deadlock Avoidance, Resource Allocation, Energy, Cloud Data Centre,
Minimum Utilization Rank, Polynomial Regression, BASIP |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE OF MIMO MC-CDMA SYSTEM WITH CHANNEL ESTIMATION AND MMSE EQUALIZATION |
Author: |
N. TAMILARASAN, L. NITHYANANDAN |
Abstract: |
The quality of a wireless link can be described by three basic parameters,
namely transmission rate, transmission range and transmission reliability. With
the advent of multiple-input multiple-output (MIMO) assisted Multicarrier code
division multiple access (MC-CDMA) systems, the above-mentioned three parameters
may be simultaneously improved. The MC-CDMA combined with the MIMO technique,
has become a core technology for future mobile radio communication system.
However, possible potential gain in spectral efficiency is challenged by the
receiver’s ability to accurately detect the symbol due to inter symbol
interference (ISI). Multipath propagation, mobility of transmitter, receiver and
local scattering cause the signal to be spread in frequency, different arrival
time and angle, which results in ISI in the received signal. This will affect
overall system performance. The use of MC-CDMA mitigates the problem of time
dispersion. However, still it is necessary to remove the amplitude and phase
shift caused by channel. To solve this problem, a multiple antenna array can be
used at the receiver, not only for spectral efficiency or gain enhancement, but
also for interference suppression. This can be done by the, efficient channel
estimation with strong equalization. This paper proposes MIMO MC-CDMA system,
Minimum mean square error (MMSE) equalization with pilot based channel
estimation. The simulation result shows improved Bit error rate (BER)
performance when the sub carrier (SC) and antenna configuration were increased. |
Keywords: |
MC-CDMA, ISI, MMSE Equalization And Pilot Based Channel Estimation |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT TWO STAGE CHAIN ROUTING PROTOCOL (TSCP) FOR WIRELESS SENSOR
NETWORKS |
Author: |
HUSAM KAREEM, S.J. HASHIM, SHAMALA SUBERAMANIAM, ADUWATI SALI |
Abstract: |
Wireless sensor nodes are mostly used in extreme environments, especially at
remote and hostile areas including battlefield, volcanoes and underwater. Thus,
it is difficult to replenish the energy source of the sensor node once it is
installed. In order to prolong the lifetime of the nodes, we propose a new
routing algorithm that can achieve significant energy conservation in WSNs,
known as Two Stage Chain Routing Protocol (TSCP). The main objectives of TSCP is
to minimize the total energy consumption, achieve more load balancing and
increase the network lifetime with more stability compared with other routing
algorithms, for examples Chain-Cluster based Mixed routing (CCM) and Chain-Chain
Based Routing Protocol (CCBRP). TSCP algorithm divides the sensor network into
multiple chains and work within two stages. The first stage is dividing the
nodes to horizontal chains that include all sensor nodes within the same row and
the second stage is forming a vertical chain that includes all chain heads. The
mechanism for selecting the heads in each row is sequentially chosen with all
the heads belong to the same column. In the second stage, the node with maximum
residual energy amongst the chain heads will be the main head that functions as
a gateway to the base station. Simulation results show that TSCP outperforms CCM
and CCBRP in overall energy conservation, network lifetime and stability. |
Keywords: |
Wireless Sensor Network, TSCP, CCM, CCBRP, Chain Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NEW DENSITY BASED PROBABILISTIC COUNTER SCHEME FOR SOLVING BROADCAST STORM IN
MOBILE AD HOC NETWORKS |
Author: |
A. SENTHIL KUMAR, K.S. RAMASWAMI |
Abstract: |
Broadcasting is a fundamental data dissemination mechanism for route detection,
address resolution and many other network related services in Mobile Ad hoc
Networks (MANETs). Although flooding is the simplest mechanism for broadcasting,
where each node retransmits every individually received message exactly once, it
is usually expensive and results in rigorous redundancy, contention and
collisions in the network. These problems are widely referred to as the
broadcast storm problem. Hence an effective broadcasting scheme is essential in
MANETs to transmit a data packet from the sender to the rest of the network
nodes. This work introduces a new counter-based broadcasting scheme to achieve
efficient broadcasting by adaptive threshold with a predetermined forwarding
probability ‘p’ which can be fixed based on the local density information. The
counter identifies nodes with duplicate data packet using threshold values and
node removes the redundant message. Probabilistic schemes do not require global
topological information of the network to make a rebroadcast decision. As such
every node is allowed to rebroadcast a message. The proposed work also adapts
the random assessment delay (RAD) value to network congestion level and uses
packet origination rate as an indicator of network congestion by keeping track
of the number of packets received per second at each node. The extensive
simulation results show that the new scheme outperforms the existing schemes in
term of saved-rebroadcast, reachability and throughput. |
Keywords: |
Manets, Flooding, Counter-Based, Broadcast Storm Problem, Throughput,
Reachability |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF ADAPTIVE BACKSTEPPING WITH GRAVITATIONAL SEARCH ALGORITHM FOR
NONLINEAR SYSTEM |
Author: |
SAHAZATI MD. ROZALI, MOHD FUAA’D RAHMAT, ABDUL RASHID HUSAIN, MUHAMMAD NIZAM
KAMARUDIN |
Abstract: |
Adaptive backstepping controller is designed for tracking purpose of nonlinear
system with unknown parameter is injected to it. Gravitational search algorithm
(GSA) is integrated with the designed controller in order to automatically tune
its control parameters and adaptation gain since the tracking performance of the
controller relies on these parameters. Performance evaluation is observed based
on the tracking output and the tracking error between reference input and the
system’s output. The effectiveness of the adaptive backstepping controller is
verified by looking at the lowest amount value of Sum of Squared Error (SSE)
attained from the simulation process. The results show that the system’s output
follow the reference input given with remarkably small tracking error. |
Keywords: |
Adaptive Backstepping, Tracking Error, Gravitational Search Algorithm, Sum of
Squared Error, Disturbance |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A REVIEW ON WIRELESS SENSOR NETWORKS ROUTING PROTOCOL: CHALLENGES IN MULTIPATH
TECHNIQUES |
Author: |
ABDULALEEM ALI ALMAZROI, MA NGADI |
Abstract: |
A sensor network basically comprises of low cost sensor nodes which gather data
from the environment and transmit them to sink, where they will be afterward
processed. Owing to the high density of sensor nodes and restricted
communication range, packet forwarding in sensor networks is regularly achieved
throughout the multi-hop data transmission. Consequently, routing in wireless
sensor networks has been counted a significant field of research over the past
decade. Thus, we present an inclusive review and present classification on the
current routing sensor protocols, which are particularly designed for wireless
sensor networks. We emphasize the main motivation behind the development of each
routing protocol category and clarify the operation of different protocols in
detail related to energy issues, with emphasis on their advantages and
disadvantages. Moreover, the current multipath routing approach is broadly used
in wireless sensor networks in order to improve network performance such as load
balancing, reliability, fault tolerance, bandwidth aggregation and QoS
Improvement. Therefore, in this paper we highlight the notion of the multipath
routing approach and its essential challenges, additionally the basic
motivations for utilizing this technique in wireless sensor networks. In
addition, we contrast and review the state-of-the-art multipath routing
protocols that based on energy aware method, fault tolerance and QoS multipath
routing. At the end of this paper, a characterized comparison has been forwarded
on these methods based on the analysis outcome. |
Keywords: |
Wireless Sensor Networks, Routing Protocols, Energy Efficiency, Fault Tolerance,
Qos, Multipath Routing |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
A STUDY OF TSUNAMI MODEL FOR PROPAGATION OF OCEANIC WAVES |
Author: |
E.SYED MOHAMED, S.RAJASEKARAN |
Abstract: |
The enormous destruction of tsunami and the increased risk of their frequent
occurrences enhance the need for the use of more sturdy and accurate models that
predict the spread of catastrophic oceanic waves accurately. This paper tries to
study this phenomenon that shows a considerable amount of uncertainty. To model
the spread of tsunami waves, the initial wave can be considered as a continuous
two dimensional closed curve. Each point in its parametric representation on the
curve will act as a point source which expands as a small ellipse. The
parameters of each ellipse depend on many factors such as the energy focusing
effect, travel path of the waves, coastal configuration, offshore bathymetry and
the time step. Using Huygens’ wavelet principle, the envelope of these ellipses
describes the new perimeter. Further, overlapping and traversing of the wave
front are detached and efficiently clipped out |
Keywords: |
Huygens’ Wavelet, Tsunami Propagation, Simulation, Curvature, Convex |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
Title: |
FAST AND SECURE HANDOVER AUTHENTCATION SCHEME IN MOBILE WiMAX |
Author: |
H. F. ZMEZM, S.J. HASHIM, ADUWATI SALI |
Abstract: |
Handover is one of the essential elements that can affect the Quality of Service
(QoS) and capacity of Mobile Broadband Networks. The next generation of
broadband wireless networks including the IEEE802.16e standard, allow users to
roam seamlessly and securely over the network. Unfortunately the current design
suffers from lengthy delay between breaking of previous connection and making of
next connection. This delay might not be tolerated by some of the real-time
applications such as VoIP and video streaming. Therefore the need for fast and
secure handover design becomes an urging necessity. This paper proposes a new
handover mechanism enables fast and secure handover with minimum delay suitable
for real-time applications. It should be pointed that this proposed handover
protocol guarantees a forward and backward secrecy. We conducted our research
using ns-2 simulation tool. |
Keywords: |
EAP-Authentication, Hard Handover, Mobile WiMAX, NS-2 |
Source: |
Journal of Theoretical and Applied Information Technology
January 2014 -- Vol. 59. No. 2 -- 2014 |
Full
Text |
|
|
|