|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2013 | Vol. 57 No.2 |
Title: |
SHORT SYSTEMATIC REVIEW ON E-LEARNING RECOMMENDER SYSTEMS |
Author: |
WASEEM M.CHUGHTAI, ALI B.SELAMA, IMRAN GHANI |
Abstract: |
In www (W3), many researchers use recommender systems in e-learning
environmental domain. The recommender system in e-learning is actually used to
suggest resources and relevant learning contents to learners regarding their
required goals. Goal, in the e-Learning recommender system, is an identification
of requirements and achievements of relevant items (learning content) required
by the learner. This paper reviews the landscapes of current state-of-art
recommender systems in e-learning environment. This paper is limited to discuss
four types of filtering approaches, their benefits, limitations and cold-start
problem with respect to recommender systems. The review of domain and previous
research improvement provide timely and useful insight about recommender systems
and cold-start issue in e-learning recommendation system domain. |
Keywords: |
Recommender System (RS), E-learning, Content-based Filtering (CBF),
Collaborative Filtering (CF), Knowledge-based Filtering (KBS), Hybrid Filtering
(HF) |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
POSITIONING TECHNIQUE USING ONE HEARABLE UMTS CELL TO PREDICT ROAD USERS |
Author: |
KEERATPAL SINGH, MAHAMOD ISMAIL, ROSDIADEE NORDIN, ZAHID FARID |
Abstract: |
Timing trilateration requires timing information from three herbal UMTS base
stations to accurately predict the position of mobile users. But, when only the
serving UMTS cell is hearable, the Round Trip Time (RTT) of the cell is used,
along with Telco’s beamwidth information, and a new technique called One Cell
Road Angle Algorithm (OCRAA) to determine the proximity of the mobile users’
location. OCRAA ensures that the stored road point falls within the serving
cell’s coverage based on a pre-calculated variable called Average Beamwidth (Abwt)
for the antenna configuration of all cells covering the map’s road points. For
an urban road in Kuala Lumpur (Malaysia), the simulation results produced
location accuracy error of 65 meters for 95% of the experiment’s data, which is
considered very desirable for navigational services |
Keywords: |
Location Technique, Positioning For Umts, Navigation, Round Trip Time,
Trilateration |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
SEAMLESS MOBILITY IN 4G HETEROGENEOUS WIRELESS NETWORKS |
Author: |
K. KOMALA, Dr. P. INDUMATHI |
Abstract: |
A Heterogeneous Network abbreviated as HetNet is a mix of macrocells,
picocells,femtocells, remote radio heads and relays. A HetNet is a network
consisting of various wireless access technologies and functionalities. The Next
Generation mobility technique called the 4G deals with the multi-access
heterogeneous wireless networks which provide seamless connectivity of
multimedia services at a higher data rate to the end users. There are various
research challenges like self organization, backhauling, handover and
interference for the 4G The various handover mechanisms with respect to
intradomain and interdomain are analyzed. An experimental testbed for the
seamless mobility of heterogeneous wireless techniques such as mobility from
IEEE 802.11 to IEEE 802.16e is considered. The performance results of a seamless
handoff with minimum packet loss and delay proves the efficiency in the mobility
of the HetNets using the Network Simulator (NS-2). |
Keywords: |
HetNets; Mobility; Seamless Handover; 4G Technique; Wireless Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
PEAK SIGNAL-TO-NOISE RATIO BASED ON THRESHOLD METHOD FOR IMAGE SEGMENTATION |
Author: |
FARSHID PIRAHANSIAH, SITI NORUL HUDA SHEIKH ABDULLAH, SHAHNORBANUN SAHRAN |
Abstract: |
Binarization or thresholding is one problem that must be solved in pattern
recognition and it has a very important influence on the sequent steps in
imaging applications. Thresholding is used to separate objects from the
background, and diminish the amount of data alter the computational speed.
Recently, interest in multilevel thresholding has been altered. However, when
the levels are altered, the computation time alters so single threshold methods
are accelerated than multilevel methods. Moreover, for every new application,
new methods are is acquired. In this work, a new algorithm which used the gain
signal-to-noise ratio method as an indicator to segment the image is aimed. The
algorithm which is used the DIBCO 2011 in printed and a handwritten image was
tested. This method has a better performance than new methods, such as Kittler
and Illingworth's Minimum Error Thresholding, potential difference and Otsu. |
Keywords: |
PSNR, Single Thresholding, Image Processing, Image Segmentation, Optical
Character Recognition |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
PARTICLE SWARM OPTIMIZATION BASED TOTAL VARIATION FILTER FOR IMAGE DENOISING |
Author: |
JANSI S., SUBASHINI P |
Abstract: |
Denoising of images is an important task in Magnetic Resonance (MR) image
processing and image analysis, and it plays a significant role in modern
applications in different fields, including medical imaging and computer vision.
While many algorithms have been proposed for the purpose of image denoising, the
problem of noise image suppression remains an open challenge, because noise
removal introduces artifacts and causes blurring of the images. In this paper,
Non Local Means, Anisotropic Diffusion, Bilateral, and Total Variation methods
are used to reduce the image artifacts and noise in MRI images. Finally, PSO is
implemented to find the optimal value of the regularization parameter of total
variation method. The experimental results are obtained to show the performance
of the proposed method. The proposed methods are compared and evaluated based on
the error rate and their quality of the image. |
Keywords: |
Medical Image Processing, Image denoising, MRI brain images, Filtering
techniques, Regularization parameter, Particle Swarm Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
MAMMOGRAM MRI IMAGE SEGMENTATION AND CLASSIFICATION |
Author: |
S.PITCHUMANI ANGAYARKANNI, DR.NADIRA BANU KAMAL, DR.V.THAVAVEL |
Abstract: |
This paper presents the mathematical morphological and rough set based approach
in detection and classification of cancerous masses in MRI mammogram images.
Breast cancer is one of the most common forms of cancer in women. In order to
reduce the death rate, early detection of cancerous regions in mammogram images
is needed. The existing system is not so accurate and it is time consuming. MRI
Mammogram images are enhanced and the artifacts are removed using the
Fuzzification technique. The ROI(Region of Interest) is extracted using Graph
Cut method and the Four mathematical morphological features are calculated for
the segmented contour . ID3 algorithm is applied to extract the features which
play a vital role in classification of masses in mammogram into Normal, Benign
and Malignant. The sensitivity, the specificity, positive prediction value and
negative prediction value of the proposed algorithm were determined and compared
with the existing algorithms. Automatic classification of the mammogram MRI
images is done through three layered Multilayered Perceptron .The weights are
adjusted based the Artificial Bee Colony Optimization technique .Both
qualitative and quantitative methods are used to detect the accuracy of the
proposed system. The sensitivity, the specificity, positive prediction value and
negative prediction value of the proposed algorithm accounts to 98.78%, 98.9%,
92% and 96.5% which rates very high when compared to the existing algorithms.
The area under the ROC curve is 0.89. |
Keywords: |
Fuzzification, Gabor Filter, Graph Cut, ID3 And Artificial Bee Colony Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
OPINION MINING AND SUMMARIZATION OF COMPANY REVIEWS |
Author: |
KRITHIKA L.B , ANAND MAHENDRAN |
Abstract: |
In the age of information any process begins with searching for information.
Searching has become an unending syndrome. We search for information on vast
topics and the frequent few topics are on product, opinion about company,
education institution and news over the internet. Search results include indexed
data from review forum, blog, tweet, emotional comment on websites and wiki.
Data required for information lays all over flooded and piled with mix of
unique, duplicate, custom generated, false portrait, broken sentence and
multiple language. These data are unauthentic, meaningless and noisy. This paper
work focus on extracting review comment data of company from review forums,
reduce noise, group them and give meaning full summarized information and
cumulative review rating of company’s features to the user. |
Keywords: |
Natural Language Processing, Opinion Mining, Feature Based Summarization, User
Review, Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
EFFICIENT AND SECURE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS -RESULTS AND
DISCUSSIONS |
Author: |
S.GANESH, DR.R.AMUTHA |
Abstract: |
Advances in Wireless Sensor Network Technology (WSN) has provided the
availability of small and low-cost sensor with capability of sensing various
types of physical and environmental conditions, data processing and wireless
communication. One of the most challenging issues so far is the extension of
network lifetime with regards to small battery capacity and self-sustained
operation. Endeavors to save energy have been made on various frontiers, ranging
from hardware improvements over medium access and routing protocols to network
clustering and role changing strategies. In addition some authors studied
failures in communication regarded as error detection. Yet, only weak attention
has been paid to the detection of malicious nodes and its potential for lifetime
extension. In this paper, we proposed a cluster based security protocol named as
Efficient and Secure Routing Protocol (ESRP). The goal of ESRP is to provide an
energy efficient routing solution with security features for clustered WSN.
Extensive investigation studies using Network Simulator (NS-2) shows that the
proposed scheme helps to achieve balanced energy consumption and increases the
throughput. |
Keywords: |
Wireless Sensor Networks, Routing Protocol, Energy Efficiency, Intrusion
detection, Throughput enhancement, NS-2 |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN SOA APPROACH FOR MEASURING ALIGNMENT BETWEEN ENTERPRISE REQUIREMENTS AND ERP
SYSTEM |
Author: |
BENGOUD KENZA, BENMOUSSA RACHID, SAIB SARA, ABD ACHRAF |
Abstract: |
The implementation of Enterprise Resource Planning (ERP) system within companies
is increasingly current. Despite the potential benefits that ERP systems
provide, these projects are risky. In fact, many ERP integration projects fail
because the system is not aligned to adopting organization’s requirements. This
paper proposes criteria and metrics that allow measuring alignment between
enterprise requirements and ERP functionalities in order to quantify the extent
of the fit between the business and the ERP system. We used SOA (service
oriented architecture) formalism to model both the ERP system and the enterprise
requirements. We illustrate how to derive service oriented business process
model and service oriented ERP process model from business process model and ERP
process model, respectively. This derivation is essentially deduced from a set
of rules based on the concepts of the business process meta-model and SOA
meta-model. On the other hand, we used the pair of resulting SOA models as
inputs for the alignment measurement process. Finally, we illustrate our
proposals with a case study. |
Keywords: |
Alignment Relationship, Business Processes, ERP, Measure, Metric, SOA |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
METADATA BASED HIGH QUALITY IMAGE/VIDEO STREAMING USING CURVELET TRANSFORM |
Author: |
P.EPSIBA, S.SUBATHRA, N.SARDAR BASHA, G.SURESH, N.KUMARATHARAN |
Abstract: |
Today’s revolution is mobile communication revolution, which enables us to
connect each other worldwide. Due to the enhancement of multimedia and video
surveillance services people are more sophisticated. Because of bandwidth
requirements and resolution mismatch the designers still striving to provide
robust coding technique. In mobile, web applications scalable video coding plays
a vital role to integrate network providers with their clients. Generally,
visual artifacts introduced in the existing video up/down sampling and to bridge
the resolution gap between video streaming and display devices a new curvelet
based architecture is introduced. Specifically, the proposed method up samples
video frames by decoding the lower resolution (LR) video together with necessary
features extracted from high resolution (HR). In this paper edge extraction and
profile generation is provided as metadata by using curvelet transform. This
proposed metadata based video streaming using curvelet transformation structure
enhancing the video quality during LR to HR scheme and it provides good solution
commercially. |
Keywords: |
Curvelet Transform, Up/Down Sampler, Resolution, SVC |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
NEW COMPRESSION FUNCTION TO SHA-256 BASED ON THE TECHNIQUES OF DES. |
Author: |
ZAKARIA KADDOURI, FOUZIA OMARY, ABDOLLAH ABOUCHOUAR, MOHSSIN DAARI, KHADIJA
ACHKOUN |
Abstract: |
In this paper, we propose a new hash function based on the SHA-256 diagram and
techniques of DES, that we call SHA-SBOX. This proposed hash function produces a
256-bit fingerprint exactly like the classic version. Its effectiveness in the
resistance to differential and linear attacks is widely comparable to SHA-256.
In light of recent attacks on MD4, MD5, SHA-0 and SHA-1, there is a great need
to consider other strategies to design hash functions. We present a new
compression function for SHA-256 with an internal structure based entirely on
the techniques of DES. |
Keywords: |
SHA-256, Permutation, Substitution, Linear Attacks, Differential Attacks |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
PARALLEL GRASP ALGORITHM WITH DELAY AND DELAY VARIATION FOR RENDEZVOUS POINT
SELECTION IN PIM-SM MULTICAST ROUTING |
Author: |
YOUSSEF BADDI, MOHAMED DAfiR ECH-CHERIF El KETTANI |
Abstract: |
Many multicast routing protocols has proposed to support efficient multimedia
application, PIM-SM protocol remains the most used multicast routing protocol;
they propose using a Shared Rendezvous Point Tree SRPT to forward multicast
packets. The prime problem concerning SRPT construction is to determine an
optimal multicast router in the network as root; this problem is called RP
selection. This problem influences the multicast routing tree structure, and
therefore influences performances of the multicast session and multicast routing
scheme. Determination of a best RP position is an NP complete problem, first
proposed by Wall, which needs to be solved with a heuristic algorithm. In this
paper we propose a new RP selection algorithm based on Parallel GRAS Procedure.
2DV-PGRASP-RP selects RP by considering cost, delay and delay variation
functions and can be easily integrated to bootstrap RP protocol used by PIM-SM.
Simulation results show that good performance is achieved in multicast cost. |
Keywords: |
2DV-PGRASP-RP; PIM-SM; Multicast IP; SRPT; RP; GRASP; BootStrap RP |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
HASHSORT - A NOVEL HASHING FUNCTION BASED ON SORTING TECHNIQUE TO RESOLUTE
COLLISION |
Author: |
S. MUTHUSUNDARI , R.M. SURESH |
Abstract: |
Hash tables are extensively used in data structures to implement tables that
associate a set of keys to a set of values, as they provide O(1), to perform
operations such as query, insert and delete operations. However, at moderate
collisions are quite frequent which not only increases the access time, but also
decrease the performance in the deterministic. Due to this deterministic
performance, the hash table degrades. In some systems, it is very difficult to
keep the hash operations more deterministic. In recent trends, more research
papers have been proposed, which employs a new and fast hash functions to
implement hash tables and to avoid collisions. In this paper, we propose a novel
hash table implementation called Hashsort function, which reduces the Collisions
occur in the hash table. The basic idea of this paper is to reduce the
collisions, such that automatically it increases the access time. High
performance can be obtained by reducing the collisions in the hash table.
Hashsort, makes an easy choice for the implementation of hash table in data
structure. |
Keywords: |
Collision, Hashsort, Hash table, Sorting, Data structures. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
A LOW POWER MULTIPLIER USING ENCODING AND BYPASSING TECHNIQUE |
Author: |
PRABHU. E, Dr.MANGALAM.H, S.KARTHICK |
Abstract: |
In this paper, a low power Encoding and Bypassing technique based shift-add
multiplier is presented. The proposed architecture is derived from simple way to
reduce power consumption and area of the multiplier in VLSI design architecture
level model. The proposed architecture maximum reduces the power consumption and
area compared to the other conventional multiplier. The modification to the
multiplier includes proposed Encoder design for Modified Radix-4 recording
rules, removal of zero partial products using bypassing technique (decoder). A
decoder instead of bypass and feeder register is utilized for the removal of
zeros (bypassing) and selecting the current partial product value to be stored
in register. In this paper, encoder and decoder selector circuit has been used
in the proposed model work. Low power consumption and low area occupied
multiplier architecture model is proposed. The simulation result for the
encoding process and bypassing technique using decoder generated using Xpower
analyzer in Xilinx 10.1 ISE (integrated software environment) represents the
dynamic power consumption is reduced to almost 50%. When the power consumed by
the proposed multiplier using Spartan-2 is 6.28mW, the Virtex-4 device is
6.89mW. The proposed multiplier is mainly applicable for designing low power
VLSI circuits and high speed switching techniques. |
Keywords: |
Modified Radix-4 Recording Rules, Encoding, Bypassing, Decoder, Switching
Activity, Partial Product. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
A SUB-OPTIMAL PTS ALGORITHM BASED ON BACTERIAL FORAGING OPTIMIZATION TECHNIQUE
FOR PAPR REDUCTION IN MIMO-OFDM SYSTEM |
Author: |
R.MANJITH, M.SUGANTHI |
Abstract: |
A suboptimal partial transmit sequence (PTS) based on bacterial foraging
optimization (BFO) algorithm is presented for the low computation complexity and
the reduction of the peak-to-average power ratio (PAPR) of a multiple input
multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system.
In general, PTS technique can improve the PAPR statistics of a MIMO- OFDM
system. However, it will come with an exhaustive search over all combinations of
allowed phase weighting factors and the search complexity increasing
exponentially with the number of subblocks. In this paper, we work around
potentially computational intractability; the proposed bacterial foraging
optimization (BFO) scheme exploits heuristics to search the optimal combination
of phase factors with low complexity. Simulation results show that the BFO
technique can effectively reduce the computation complexity, PAPR reduction and
BER performance of MIMO - OFDM system. |
Keywords: |
MIMO-OFDM, Partial Transmit Sequence, Peak-To-Average Power Ratio, Bacterial
Foraging Optimization, Bit Error Rate. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
DATA MINING IN NETWORK SECURITY - TECHNIQUES & TOOLS: A RESEARCH PERSPECTIVE |
Author: |
D.ASIR ANTONY GNANA SINGH, E.JEBAMALAR LEAVLINE |
Abstract: |
This paper presents recent trends and practices in data mining to handle the
rising risks and threats in the area of Network security in today’s digital age
and discusses the various data mining tools for data analysis and prediction,
network tools for sniffing and analyzing the networks. This paper proposes a
supervised learning based Intrusion Detection System (IDS) to identify the
intruders, attackers in a network and covers the most significant advances and
emerging research issues in the field of data mining in network security. This
will be beneficial to academicians, industrialists and students who incline
towards research and development in the area of data mining in network security. |
Keywords: |
Learning, Intrusion detection, Supervised Learner, Data Mining, Network Security |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
END USER PREFERENCES ON HOSPITAL WEBSITES IN NIGERIA |
Author: |
SHAKIRAT.O.RAJI, MURNI MAHMUD, ABU OSMAN TAP, ADAMU ABUBAKAR |
Abstract: |
This paper presents a Usability study of the Nigerian Hospital websites, through
usability testing of some sample hospital websites in Nigeria. The study aims to
provide better understanding of the design features and content that offers an
easier way of enquiring for some medical advice. Selected participants for the
usability testing were given tasks to locate and find specified information in
the websites and were evaluated based Nielsen usability heuristics in order to
gather the users’ opinion about the websites. The accessibility and availability
were also evaluated and the findings indicate huge discrepancies between what
people do and what the website are meant for. Each website has its own strengths
and weaknesses, but in terms of interactions, our findings reveal that users
misunderstand the important of reading instructions provided in websites and
prefer direct interaction than by following instruction. |
Keywords: |
Usability, Usability Study, Usability Testing, Hospital Websites, Usability
Heuristics |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
A MODEL OF THE REUSE OF THE PROFILES OF LEARNERS |
Author: |
ADIL JEGHAL, LAHCEN OUGHDIR, HAMID TAIRI, ANAS EL AFFAR |
Abstract: |
The use of learner profiles is one of the ways to adapt learning to the
learners’ specifics, as the computing environments for Human Learning (EIAH)
allow users to view the learner profiles and perform activities on their
visualizations. We are interested in the reuse of heterogeneous profiles coming
from different platforms. Our goal is to propose models and tools to enable or
to allow the reuse of external profiles. In this article we present a state of
the art on the existing models and our proposed model. |
Keywords: |
CSCW Profiles, EIAH, Online Learning, IMS LIP, PAPI Learner, FOAF |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
AN INTELLIGENT ARCHITECTURE FOR GENERATING EVOLUTIONARY PERSONALIZED LEARNING
PATHS BASED ON LEARNER PROFILES |
Author: |
JABER EL BOUHDIDI, MOHAMED GHAILANI, ABDELHADI FENNAN |
Abstract: |
In this paper we present a solution that is a continuation of work done in the
field of adaptive educational systems. It is an approach oriented objectives
based on ontologies, multi-agent system and Bayesian networks to generate
dynamically personalized learning paths. The dynamic aspect is essential for
each learning session in the context of this solution, because the learning
paths meet the objectives formulated by the learners will be generated to
measure and after formulation the specific request. The operation consists of
searching, filtering and composing dynamically hypermedia units of learning
responding to the learner profile.
For structuring and modeling information managed by our architecture, we used
ontologies of Semantic Web. We designed the ontology of learners using the
standard IMS-LIP to represent the learner profiles, some fields are added to
include, in the model of the learner, learning styles according to the model of
Felder and Silverman. And for representation of resources we designed the
ontology of resources based on the LOM standard. Furthermore, the architecture
is divided into three layers; each layer is managed by a number of agents.
Agents exploit the Bayesian model and ontologies to provide learners with
personalized learning paths. |
Keywords: |
Personalized Learning Paths, Learning Styles, Ontologies, Multi-agent system,
Bayesian Networks |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE INVESTIGATION OF PHOTOVOLTAIC GRID CONNECTION FOR SHUNT ACTIVE POWER
FILTER WITH DIFFERENT PWM GENERATION |
Author: |
ZULKIFILE IBRAHIM, AHMAD SHUKRI ABU HASIM, MD HAIRUL NIZAM TALIB, JURIFA MAT
LAZI, SITI NOORMIZA MAT ISA, RAIHANA MUSTAFA |
Abstract: |
In this paper, photovoltaic (PV) system at maximum power point tracking is
connected to a three phase grid incorporating with shunt active power filter (APF)
is presented. The PV system used to generate power from the sun array and
feeding to the grid while shunt APF used to improve power quality of the
photovoltaic generation based on d-q theory. Two pulse width modulation (PWM)
techniques namely; hysteresis and space vector have been applies and studies the
effects of both techniques to the system performance. The simulations has been
carry-out and demonstrate using MATLAB/Simulink (MLS) environment shows that the
proposed system offers improvement on power quality and power factor correction.
Almost 80% to 90% improvements of the THD with unity power factor are expected
in the result obtained. |
Keywords: |
Photovoltaic (PV), Shunt Active Power Filter (APF), Grid Connected System |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
Title: |
RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON
PREDICTION |
Author: |
M.AMSAVENI S.MALATHY |
Abstract: |
The available bandwidth must be efficiently utilized by the mobile user, because
the mobile users are increasing gradually nowadays. The main goal of the channel
reservation is to reduce the call dropping probability. An efficient channel
allocation scheme can significantly reduce call dropping probability. Large
number of channel assignment and allocation policies has been proposed. In this
paper, the Prediction Based Channel Reservation (PBCR) algorithm is proposed.
The PBCR algorithm allows the reservation of a channel for users in target cell
before the user moves into that cell. Pre reservations are made when the users
are within some distance of the new cell boundary. Channel Borrowing scheme and
Queuing scheme are used in this PBCR algorithm for allocating the channel to
predicted regular and irregular users. In channel borrowing scheme, free
channels are selected from the central pool and optimally allocated to regular
user. For irregular user, queuing scheme is applied. These schemes are used to
reduce the call dropping probability and utilize the channel bandwidth
effectively. So the performance of PBCR algorithm is better when compared to
other existing algorithms. |
Keywords: |
Channel Borrowing, Channel Reservation, Hand off calls, PBCR Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 2 -- 2013 |
Full
Text |
|
|
|