|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2013 | Vol. 57 No.1 |
Title: |
A DOUBLE GUARD HILL CIPHER SUITABLE FOR WIRELESS SENSOR NETWORKS |
Author: |
C.BENNILA THANGAMMAL , P.RANGARAJAN , J.RAJA PAUL PERINBAM |
Abstract: |
A Classical Hill cipher breaks the plaintext into blocks and multiplies each
block to a key matrix to obtain the cipher text. But it inclines to known
plaintext. To strength the Hill cipher , a novel modification is performed in
this paper. A double protection has been given for the Hill cipher with a single
private key matrix. First protection is given by modified key matrix Km ,
obtained from the private key matrix with some arithmetic operation and the
second protection is given before transmitting the cipher text with respect to
the ‘t’ matrix. Without the private key matrix and the modified key matrix,
cipher text cannot be decrypted. The proposed Double Guard Hill cipher is
suitable for Wireless Sensor Networks as it is capable of encrypting 128 ASCII
values. |
Keywords: |
Encryption, Decryption, Modulo-128 inverse, Private Key matrix and Modified Key
matrix. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
SEGMENTED FUZZY LOGIC CONTROLLER FOR VEHICLE FOLLOWING WITH OPTIMISED RULE BASE |
Author: |
S. PAUL SATHIYAN, DR. S. SURESH KUMAR, DR. A. IMMANUEL SELVAKUMAR |
Abstract: |
Vehicle automation for rear end collision avoidance during vehicle following is
an area of research for the past few decade. For Adaptive cruising of vehicles,
various controllers have been developed like PI, PID, Model predictive, Sliding
mode control, which depend upon the system mathematical model. Designing such a
mathematical model for nonlinear system with multiple parameters may not be
easy. A controller which can emulate the behaviour of the human, and mimics
their reaction which does not require the mathematical modeling of the system
may be of high repute. One such controller is Fuzzy Logic controller (FLC). FLC
does not need an exact mathematical representation of the system which is to be
controlled. The performance of the FLC depends upon how well the fuzzy rule base
is framed. The problem with FLC-based system is that, the number of rules used.
The rule increases exponentially with the increase of the number of membership
values that involve in the rules. This increase, leads to the rise in the
computation time of the controller. However the performance of the FLC system
highly relies upon the number of membership values and the rules. The crisp
output of the FLC does not depend upon the best rule rather it depends upon the
entire rule which gets qualified. In-order to have the best rule fired, Genetic
Algorithm (GA) is used to optimise the rule base of FLC. Whenever Genetic
Algorithm (GA) is used in real time optimisation of fuzzy rule base, the time
for reaching the optimised value, depends upon the population size (number of
rules in the fuzzy rule base). Hence for a time crucial application like
Adaptive cruise control (ACC), offline tuning of fuzzy rule base is performed.
In this paper new approach of segmented / divided fuzzy logic based controller
is proposed where all the FLC used in ACC is tuned offline using GA and the
performance comparison is made. |
Keywords: |
Adaptive Cruise Control, Fuzzy rule base optimisation, Genetic algorithm,
Vehicle following |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
TESTING THE ACCURACY AND WORKING PROCEDURE OF BRAILLE HAND GLOVE USING A
STATISTICAL TOOL |
Author: |
Dr.B.L.SHIVAKUMAR, M.RAJASENATHIPATHI |
Abstract: |
This paper presents a development of a system for English text to Braille code
conversion in software and implemented as vibration in Braille hand glove. Also
the accuracy and working procedure of Braille Hand is tested using IBM SPSS
tool. This has been developed for the benefit of deaf and blind people, who
prefer to work in computer environment. This invention covers all Braille
symbols to equivalent vibrations and produces a new communication media between
visual and blind person. |
Keywords: |
Braille, Vibration, Blind And Deaf, Hand Glove, Motor |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
STATE OF ART FOR NETWORK RECONFIGURATION METHODOLOGIES OF DISTRIBUTION SYSTEM |
Author: |
K.KIRAN KUMAR, Dr.N.VENKATA RAMANA, Dr. S. KAMAKSHAIAH, NISHANTH P M |
Abstract: |
Radial Distribution is the most popular and existing type of power transmission
network in the distribution system. Losses minimizations, maintenance of good
voltage profile and feeder current levels minimum are the three objectives for
the distribution engineer. For the past two and half decades researchers
proposed different methodologies that includes heuristic and intelligent
methods. This paper explores existing popular methodologies to mitigate the
problem. Research publications in the popular journals, conferences and
symposiums are the main source for collecting data. Popular journals like IEEE
transactions, Elsevier etc., are referred. More than 300 publications are
studied which are short listed to around 50. Redundancy is thoroughly avoided
before short listing the paper. This paper is useful for the researchers working
in this area. |
Keywords: |
Reconfiguration, Distribution Systems, Power loss, Heuristic methods,
Optimization methods |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
AUTOMATIC ISOLATED-WORD ARABIC SIGN LANGUAGE RECOGNITION SYSTEM BASED ON TIME
DELAY NEURAL NETWORKS: NEW IMPROVEMENTS |
Author: |
FERAS FARES AL MASHAGBA, EMAN FARES AL MASHAGBA , MOHAMMAD OTHMAN
NASSAR |
Abstract: |
This research presents an improved automatic isolated-word recognition system
for the Arabic sign language (ArSL) for the Jordanian accent. Our proposed
system requires that the signer wears two gloves with different colors, he also
should wear another colored mark on his head, this mark should have different
color than the colors used in the gloves. In this paper the video for each sign
is converted to a sequence of static images; each image is segmented for three
colored regions and outlier according to the mean and covariance of each color
region using the multivariate Gaussian Mixture Model (GMM) on the
characteristics of the the Hue Saturation Lightness Model (HSL) color space.
Tracking the hand motion trajectories of the right and left hand over time is
conducted . Finally we identify a list of features to be used as an input to the
time delay neural networks (TDNN) for the recognition step. Two different test
collections were used in this research, the first data collection is used to
prove that when using the head of the signer to determine the position of the
centroid for the right and left hand instead of using the center of the upper
area for each frame as reference can improve the recognition rate. The
experimental results shows an improvement in the recognition rate from 70% to
71.66%. finally we used the second data collection to prove that our proposed
categorization for the Arabic signs into four categories according to the
overlap existence between head and hands can improve the recognition rate. The
experimental results based on data collection number two shows an improvement in
the recognition rate for the testing set, where the recognition rate increased
to reach 77.43%. |
Keywords: |
Sign Language Recognition Systems; Isolated-Word based system; video based
system; TDNN; Arabic signs; Jordan accent. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
CERVICAL CANCER DIAGNOSTIC SYSTEM USING ADAPTIVE FUZZY MOVING K-MEANS ALGORITHM
AND FUZZY MIN-MAX NEURAL NETWORK |
Author: |
ANAS QUTEISHAT, MOHAMMAD AL-BATAH, ANWAR AL-MOFLEH, SHARHABEEL H. ALNABELSI |
Abstract: |
Pap smear screening is the most successful attempt of medical science and
practice for the early detection of cervical cancer. Manual analysis of the
cervical cells is time consuming, laborious and error prone. This paper presents
a Neural Network (NN) based system for classifying cervical cells as normal,
low-grade squamous intra-epithelial lesion (LSIL) and high-grade squamous
intra-epithelial lesion (HSIL). The system consists of three stages. In the
first stage, cervical cells are segmented using the Adaptive Fuzzy Moving
K-means (AFMKM) clustering algorithm. In the second stage, the feature
extraction process is performed. In the third stage, the extracted data is
classified using Fuzzy Min-Max (FMM) NN. The empirical results show that the
proposed method can achieve acceptable results. |
Keywords: |
Cervical cancer; Pap smear; Adaptive Fuzzy Moving K-means clustering algorithm;
Fuzzy Min-Max Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
WIRELESS INDOOR MIMO CHANNEL PROPAGATION PREDICTION BASED ON A 3-D RAY TRACING
TECHNIQUE |
Author: |
MOHD NAZRUL HANIF NORDIN, ROSDIADEE NORDIN |
Abstract: |
This paper presents a wireless Multiple Input Multiple Output (MIMO) radio wave
propagation prediction technique based on the results generated from the
software package known as the Site Specific Indoor Propagation Prediction. This
study is motivated by the proposed IEEE 802.11ac standard, which supports MIMO
spatial streams and is expected to be introduced sometime in early 2014. The
results presented here are based on 2×2 MIMO antenna configurations. The indoor
MIMO channel measurement is based on the propagation environment at Level 3, the
administration building of the Faculty of Engineering & Built Environment (FEBE)
at the Universiti Kebangsaan Malaysia (UKM). The operating frequencies
considered in this study are the 2.4 GHz and 5 GHz frequency bands, which are
representative of the proposed 802.11ac standard. In addition, measurements of
on-site activity levels are presented. All of the simulation and visualization
results are analyzed to measure the spatial correlation among the MIMO antennas
(to reduce the effect of MIMO spatial interference), power delay profile,
predicted path loss, power density, and ray paths, as well as the predicted
signal strength and signal coverage. Comparisons are carried out with different
frequencies and locations in the building. The results indicate that the 3-D ray
tracing technique is able to predict the propagation characteristics of the MIMO
wireless channel in an indoor environment. It is also found that the minimum
spacing between the MIMO antenna elements should be at least 0.8λ as a practical
design consideration |
Keywords: |
Channel Model, Indoor Propagation Prediction, Multiple Input Multiple Output (MIMO),
3-D Ray Tracing, Wireless |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
HYBRID COMPOSITE EDGE DETECTION ALGORITHM FOR PET SCANNER IMAGES |
Author: |
SNEHA NAGABHYRU, ABHISHEK GUDIPALLI, RAMASHRI TIRUMALA, |
Abstract: |
Image enhancement is a core concept of Digital Image Processing that ensures
that any disturbances in the original image are eliminated thereby enhancing the
quality of the image. Furthermore conversion of an image from one color space to
another ensures that there is minimal data loss in the processing of the image.
There are many existing algorithms and several image enhancement techniques have
been developed, such as histogram equalization, contrast stretching, bit plane
slicing, averaging, etc. In this paper, we considered edge detection as one of
the technique and the evaluation metrics such as SSIM (Structural Similarity
Index) and VIF(Visual Information Fidelity) has been applied to the images to
measure the image quality. In this paper are Positron Emission Tomography(PET)
images, which have extensive application in biomedical field. In the present
work evaluation metrics are applied to the original image and edge detected
image, thus from experimental results it is observed that the proposed algorithm
works well for measuring the quality of spatial resolution enhanced hyper
spectral images. |
Keywords: |
Edge detection, PET scanner images, Color models, SSIM, VIF |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE RELATIONSHIP OF INFORMATION SECURITY KNOWLEDGE (ISK) AND HUMAN FACTORS:
CHALLENGES AND SOLUTION |
Author: |
ROHANA MOHAMAD RASHID, OMAR ZAKARIA, MOHD NABIL ZULHEMAY |
Abstract: |
Information, knowledge, and information security are indispensable in an
organisation to ensure the effectiveness of an organisation. An organisation
needs people who have adequate information and knowledge to run a business. Lack
of knowledge especially in information security may jeopardise the organisation
such as the increase of internal security incidents. Human factors will also
influence the effectiveness of an organisation. Therefore, adopting the right
behaviour in daily work routines may increase the effectiveness of the
organisation. There is a need to educate everybody in the organisation regarding
information security and security awareness, training, and education programme
in cultivating good behaviours in the organisation. The relationship between
human factors, information security, knowledge, and knowledge management can be
encompassed by the term ‘information security knowledge’. This paper has
developed a clear definition of information security knowledge so that it can be
used to guide employees in implementing information security practices within
the organisation. Applying information security knowledge in the organisation
may help decrease the internal security incidents that are posed by humans hence
will lead to the organisational information security effectiveness. |
Keywords: |
Human Factor; Knowledge; Information Security; Information Security
Effectiveness; Information Security Knowledge; Knowledge Management |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
A COMPREHENSIVE STUDY OF CMMI BASED FRAMEWORK FOR COLLABORATIVE SOFTWARE
MAINTENANCE |
Author: |
HANEEN AL-AHMAD, RODZIAH ATAN, ABDUL AZIM ABD GHANI, MASRAH AZMI MURAD |
Abstract: |
Software maintenance (SM) environment is a highly complex area, knowledge-driven
and collaborative. Therefore, Capability Maturity Model Integration (CMMI) is a
process improvement approach that provides organizations with the essential
elements of effective processes that ultimately improve their performance. We
propose a new framework of CMMI based on Multi-Agent System (MAS) to identify
the process measurement of SM. The proposed MAS architecture includes three
types of agents: Personal Agent (PA), Maintenance Agent (MA) and Key Process
Area Agent (KPAA). In order to verify our proposed CMMI framework based on MAS
architecture, a pilot study is conducted using a questionnaire survey. Rasch
Model is used to analyze the pilot data. Item reliability is found to be poor
and a few respondents and items are identified as misfits with distorted
measurements. |
Keywords: |
Capability Maturity Model Integration, Software Maintenance, Software
Maintenance Process, Multi Agent System and Rasch Model |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
THE QUALITY DETERMINATION OF COCONUT WOOD DENSITY USING LEARNING VECTOR
QUANTIZATION |
Author: |
IGN. NGESTI YUWONO, RICARDUS ANGGI PRAMUNENDAR, PULUNG NURTANTIO ANDONO, RN.
AMONG SUBANDI |
Abstract: |
Coconut wood is one of the wood species used in Indonesia as a material for
furniture and building construction. Coconut wood quality in terms of strength
and durability is determined by many factors, such as a vascullar bundle density
pattern on the wood.
Currently the quality determination of coconut wood were done visually by the
expert by looking at the pattern density vascullar bundle on coconut wood.
The coconut wood qualities visually were classified into patterns of low
density, low quality coconut wood; patterns of medium density, medium quality
coconut wood; patterns of high density, high quality coconut wood.
The classification of coconut wood density pattern could be done by applying
intelligent technique, such as Learning Vector Quatization (LVQ). The LVQ model
is a classification method thah uses a competitive supervised learning
algorithm.
The experimental result showed that the accuracy was 65.7% with kappa value of
0.481. the obtained result had a sufficient congruence between assessment and
appraisal target density using LVQ. |
Keywords: |
Coconut Wood Density, LVQ |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
A REVIEW OF SOFTWARE PRODUCT LINE ADOPTION |
Author: |
M.A JABAR, ZAREI M.B., SIDI F, N.F.M SANI |
Abstract: |
Software Product Line was proposed in 2000 as a systematic approach toward
reuse. Although benefits of this strategy is totally well known but there are
still uncertainties between organizations about how they can apply SPL to their
software product. This review tries to study articles in which adoption models
and their properties were discussed in order to get a clear perspective about
SPLs implementations and adoption strategy. This study is conducted as a
Systematic Literature Review which was used to identify important characteristic
which should be considered for product line adoption. 22 primary studies from
different sources were evaluated to answer 2 research questions. The research
identified more than 30 paper on this study but only 21 of them was precisely
relevant in the field of SPL adoption. This research provides a general
guideline for organization which wants to use SPL in their company. Our
preliminary study conclude that in order to choose an appropriate adoption model
organizations should identify their needs and choose best way according to that. |
Keywords: |
Software Product Line, Adoption, Adoption Model, Adoption Strategy |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
COOPERATIVE COMMUNICATION AND COOPERATION TECHNIQUES IN SENSOR NETWORKS |
Author: |
BENSLIMANE MOHAMED, ABDELALI IBRIZ, HARTI MOSTAFA |
Abstract: |
The wireless sensor networks have been around for a decade beneficing the
progress of miniaturization of electronic and control of wireless communications
that helped decrease significantly the production costs.
We begin with a brief overview of sensor networks and their applications. We go
through the following presentation of the cooperative communication and
technical cooperation. The following sections are devoted to the introduction of
technical MRC (Maximal Ratio Combining) used a combination of signals received
from the same package. |
Keywords: |
Network Sensors, ZigBee ZigBeef, Body Area Wireless Network (WBAN), Maximal
Ratio combining (MRC), Media Access Control (MAC), Cooperation |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
POWER FLOW STABILITY IN TRANSMISSION LINE USING UPFC BY NEURO FUZZY LOGIC
CONTROLLER |
Author: |
LAKSHMANAN.P, RAMESH.R, PANNEERSELVAM.M.A |
Abstract: |
In this paper a matrix converter based unified power flow controller (UPFC) is
designed with the application of the intelligent techniques such as a
combination of neural network and fuzzy logic. In conventional UPFC two voltage
source inverters (VSI), operated from a common DC link provided by a DC storage
capacitor. One is for static synchronous compensator and another one for static
synchronous series compensator. Ratings of this DC link capacitor bank will have
a significant impact on the cost and physical size of the UPFC. To overcome
these limitations, a matrix converter (MC) is employed. To analyze the
performance of the UPFC neuro-fuzzy controller is used. In fuzzy logic
controller the membership cannot be adapted with respect to the system
operations. To show the performance of proposed scheme simulation is done in MAT
lab. Finally the results of neural fuzzy-SVPWM based UPFC is compared with space
vector modulation based UPFC in terms of active and reactive power flows in the
line and active, reactive power flows at the bus to analyze the performance of
UPFC. |
Keywords: |
Unified Power Flow Controller (UPFC), Matrix converter (MC), Artificial Neuro
Fuzzy Inference System (ANFIS), Static Synchronous Compensator (STATCOM) and
Static Synchronous Series Compensator (SSSC). |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
METHODOLOGIES TO IMPROVE THE PERFORMANCE OF A BITTORRENT LIKE PEER TO PEER
NETWORK |
Author: |
M.PADMAVATHI , R.M.SURESH |
Abstract: |
In a Peer-to-Peer (P2P) network there is a lack of clear distinction among
client and server nodes. Each and every network node (or peer) requires network
resources and contributes resources to the network. This arrangement gives a
clear representation that when more number of peers enter in to the network,
additional resources such as CPU, storage, and bandwidth will be available for
all the peers in the network. BitTorrent is a most popular and predominant peer
to peer file distribution mechanism due to its scalability and ability to
distribute large files quickly and expeditiously without devastating the server
capacity. The Study of bittorrrent performance helps in understanding the
characteristics and improvements in certain areas of the BitTorrent. This paper
proposes new strategy to study and evaluate BitTorrent and its core mechanisms ,
the performance factor including uplink/ downlink utilization and fairness |
Keywords: |
Peer-to-Peer network, BitTorrent, Uplink Utilization , Downlink Utilization ,
Fairness |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
CONTRIBUTION OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IN COUNTRY’S
H-INDEX |
Author: |
MARYAM FARHADI, HADI SALEHI, MOHAMED AMIN EMBI, MASOOD FOOLADI, HADI FARHADI,
AREZOO AGHAEI CHADEGANI, and NADER ALE EBRAHIM |
Abstract: |
The aim of this study is to examine the effect of Information and Communication
Technology (ICT) development on country’s scientific ranking as measured by
H-index. Moreover, this study applies ICT development sub-indices including ICT
Use, ICT Access and ICT skill to find the distinct effect of these sub-indices
on country’s H-index. To this purpose, required data for the panel of 14 Middle
East countries over the period 1995 to 2009 is collected. Findings of the
current study show that ICT development increases the H-index of the sample
countries. The results also indicate that ICT Use and ICT Skill sub-indices
positively contribute to higher H-index but the effect of ICT access on
country’s H-index is not clear. |
Keywords: |
Information and Communication Technology (ICT) development, H-index, Middle East |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SURVEY ON SEMANTIC QUERY EXPANSION |
Author: |
R.JOTHILAKSHMI, N.SHANTHI, R.BABISARASWATHI |
Abstract: |
The ease of use of a large quantity of information source has spurred a great
amount of attempt in the growth and enhancement of Information Retrieval
techniques. Users’ information needs are expressed in the form of natural
language and keyword queries. The successful retrieval is very much dependent on
the effective communication of the intended purpose. The relative
ineffectiveness of information retrieval systems is mostly caused by the
inaccuracy of a query formed by a few keywords. The well known method to
overcome this limitation is the Query Expansion (QE), in which the user entered
queries are augmented with new concepts with similar meaning. In this paper we
discuss about various Query Expansion approaches with some of the case studies.
Finally we discuss the issues related to Information Retrieval (IR) and further
research directions towards the effective Information Retrieval. |
Keywords: |
Information Retrieval, Ontology, Query Expansion
|
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 1 -- 2013 |
Full
Text |
|
|
|