|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2013 | Vol. 57 No.3 |
Title: |
THE ROLE OF INFORMATION TECHNOLOGY ON THE GROWTH OF FIRMS: A VALUE ADDED
ONSIDERATION |
Author: |
MOHAMMAD ALI JAMALI, HATRA VOGHOUEI, NOR GHANI MD NOR |
Abstract: |
This paper concentrates on growth; one of the important aspects of firm
behavior, in the Malaysian manufacturing sector between 2000 and 2006. It
attempts to analyze the effects of information technology on firms’ growth in
this period among 185 firms. By employing dynamic panel data and generalized
method of moments (GMM), this work shows that information technology expenditure
displays a positive effect on the growth of firms in the Malaysian manufacturing
sector. The results also show that besides this factor, some elements, such as
minimum efficient scale, productivity, technology, sunk cost, and capital-labor
ratio have an effect on firms’ growth. The findings show that information
technology expenditure could not be an effective tool for enhancing growth for
firms that are under a certain level of productivity. |
Keywords: |
Information Technology, Growth, Malaysian Manufacturing Sector, GMM |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
RECONFIGURABLE FIR FILTER WITH RADIX-4 ARRAY MULTIPLIER |
Author: |
S.KARTHICK, Dr. S. VALARMATHY, E.PRABHU |
Abstract: |
FIR filters are commonly used digital filters which find its major application
in digital signal processing. In conventional FIR filter, the input vector form
is delayed by one sample and then multiplied with filter coefficients which are
subsequently accumulated by the adders. The drawbacks due to this are high
device utilization and high power consumption. In order to compensate these
drawbacks, we propose a reconfigurable FIR filter using radix-4 multiplier. The
major changes in the proposed system are radix-4 multiplier for multiplication
and change in the basic architecture of the FIR filter. In this method, we
combine all the input tap values having similar co-efficient values and then
multiplying those with the respective co-efficient. The proposed design is
simulated and synthesized using Xilinx. The proposed method is compared with the
existing FIR filter. From the results, it is observed that our proposed method
has got better results by having less number of occupied slices and low power
consumption. The power analysis report of a 8-tap FIR filter using the proposed
approach consumes 60µW at 25MHz, 110µW at 50MHz, 170µW at 75MHz and 220µW at
100MHz compared with the existing approach which was implemented on Spartan-3E.
Additionally, the proposed design was also tested for n-tap FIR filter
implemented in Virtex-4 FPGA and compared with the existing technique, which
shows that our approach minimizes the number of slices occupied by the design
and reduces the power consumption. |
Keywords: |
Reconfigurable FIR Filter, Radix 4 Multiplier, Power Consumption, Device
Utilization. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
PALMPRINT AND FACE BASED MULTIMODAL RECOGNITION USING PSO DEPENDENT FEATURE
LEVEL FUSION |
Author: |
M. ARUNKUMAR, S. VALARMATHY |
Abstract: |
Biometrics refers to a scientific discipline which involves automatic methods
for recognizing people based on their physiological or behavioural
characteristics. Biometric systems that use a single trait are called unimodal
systems, whereas those that integrate two or more traits are referred to as
multimodal biometric systems. A multimodal biometric system requires an
integration scheme to fuse the information obtained from the individual
modalities. In this paper, we have designed and developed a technique for
multi-modal biometric recognition using feature level fusion. Initially we
consider two data sets namely face and palmprint. Using multi texton histogram
we extract the features from the face and palmprints directly. We concatenate
the face and palmprint using XOR, AND and OR gate with the help of Particle
Swarm Optimization (PSO) algorithm. In recognition, the concatenated feature is
matched through distance matching and distance score provides recognition
identity of a person. The proposed technique is implemented with the help of
evaluation metrics such as false acceptance rate, false rejection rate and
accuracy. Finally the comparative analysis for the proposed fusion technique
results 40% better accuracy, when compared with the existing techniques. |
Keywords: |
Biometrics, Face, Palmprint, PSO, Feature Extraction, Fusion |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
MULTI LAYER PERCEPTRON FOR WEB PAGE CLASSIFICATION BASED ON TDF/IDF ONTOLOGY
BASED FEATURES AND GENETIC ALGORITHMS |
Author: |
N.VANJULAVALLI, Dr.A.KOVALAN |
Abstract: |
Now a day, Millions of web servers are available to give a huge amount of
electronic content to the end users using the internet. Searching the content
relevant to the need of a user is a challenging task because of the ambiguity in
our natural language. Classification of web pages based on their contents is
useful to the search engines to give appropriate and desired data to the user.
In this paper, an optimized approach is used for classifications of web pages.
Feature extraction and selection of best features play a key role in
classification. In this work, features are extracted from the ontology
representation of content and Inverse Document Frequency (IDF). Then the best
features are selected by using genetic algorithm. Using the selected features by
GA, an Artificial Neural Network (ANN) is trained to classify the web pages.
Results were compared with the classification methods based on neural networks
with IDF based feature extraction, neural networks with ontology based feature
extraction, neural networks with combined IDF and ontology based feature
selection and other three methods are based on applying genetic algorithm to
select the best features to classify the web pages. The parameters such as a
percentage of accuracy, precision, recall and root mean square error are
considered for performance evaluation. Numerical results showed that hybrid
classifier trained by multilayer neural network with GA for selecting IDF and
ontology based features gave 93% of accuracy, high precision and recall and
lowest RMSE when comparing to all other methods. |
Keywords: |
Web page classification, Inverse Document Feature, Ontology, Neural network
classifier, Genetic Algorithms |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
MOBILE SECURITY: DESIGNING A NEW FRAMEWORK LIMITING MALWARE SPREAD IN THE MOBILE
CLOUD COMPUTING |
Author: |
MOHAMED GHALLALI, ABIR EL MIR, BOUABID EL OUAHIDI , BOUCHAIB BOUNABAT,
NORELISLAM EL HAMI, BADR ELMIR |
Abstract: |
Our study is primarily interested in limiting the spread of malwares via SMS/MMS,
and Emails. It describes the steps leading to identify, analyze and secure
traffic in mobile networks. For this purpose, a Framework MPSS has been used to
be part of the network of the mobile network operator. MPSS aims to increase the
level of information security across the telecom provider network in order to
resolve the problems of the limited hardware and software resources on those
mobiles devices. Finally, a new study based on MPSS Framework limitations, has
driven a designing of a new Framework called MPSS2 based in the private Mobile
Cloud Computing of the ISP. In addition, with the approach of MCC, the proposed
security takes the form of a service provided by the mobile network operator (SaaS:
Security as a Service). Therefore MPSS2 has the main objective to limit the risk
of losses of personal and professional user’s data. |
Keywords: |
Mobile Security, Framework, Spread of Mobile Malwares, Mobile Cloud Computing,
Mobile Network Operator. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
LPSO-WNN DENOISING ALGORITHM FOR SPEECH RECOGNITION IN HIGH BACKGROUND NOISE |
Author: |
LONGFU ZHOU, YONGHE HU1, SHIYI XIAHOU, WEI ZHANG, CHAOQUN ZHANG ZHENG LI, DAPENG
HAO |
Abstract: |
This paper introduces an intelligent evaluation method based on improved PSO-WNN
(partiele swarm optimization-wavelet neural network) for speech denoising in
high background noise. Firstly, by using Lyapunov stability theory, convergence
conditions of a single particle is discussed and based on the result, a new
strategy is introduced to improve the performance of the PSO algorithm. Then,
the improved PSO algorithm is used to optimize the parameter of the WNN and the
LPSO-WNN is introduced. Finally, the trained LPSO-WNN is used to identify and
recognition the speech signal in high background noise. Experimental results
show that the new method is high efficient and practicable for filtering the
high background noise and recognition the speech signal. |
Keywords: |
LPSO, WNN, Speech Recognition, High Background Noise, Denoise |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
ROBUST CONTROL OF ADAPTIVE SINGLE INPUT FUZZY LOGIC CONTROLLER FOR UNMANNED
UNDERWATER VEHICLE |
Author: |
ARAS, M.S.M, ABDULLAH, S.S , SHAH, H.N.M., RASHID, M.Z.A, AZIZ, M.A.A |
Abstract: |
In this paper the investigation of Adaptive Single Input Fuzzy Logic Controller
(ASIFLC) as robust control of an Unmanned Underwater Vehicle (UUV). Robust
control methods are designed to function properly with a present of uncertain
parameters or disturbances. Robust control methods aim to achieve robust
performance and stability in the presence of bounded modeling errors. The UUV
applied in this research is a Remotely Operated Vehicle (ROV). Three ROV model
will be used to apply ASIFLC such as ROV model was developed by UTeRG Group, ROV
Model “Mako” was developed by Louis Andrew Gonzalez and RRC ROV- unperturbed
with 6 DOF was developed by C.S. Chin. The simulation of controlling ROV by
ASIFLC focused on depth control (heave motion). The ASIFLC for depth control of
the ROV was successfully tested in simulation and real time by UTeRG Group. The
simulation uses MATLAB Simulink and the performances of system response for
depth control of Adaptive Single Input Fuzzy Logic Controller for Unmanned
Underwater Vehicle will be discussed. It is proved the Adaptive Single Input
Fuzzy Logic Controller is the robust control for different model of the ROV. |
Keywords: |
Robust Control; Adaptive Single Input Fuzzy Logic Controller; Remotely Operated
Vehicle |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
USE OF ARTIFICIAL INTELLIGENCE IN AUTOMATION OF SEQUENTIAL STEPS OF SOFTWARE
DEVELOPMENT / PRODUCTION |
Author: |
SENTHIL JAYAVEL, S ARUMUGAM, BRIJENDRA SINGH, PRASHANT PANDEY, AKASH GIRI,
AKSHAY SHARMA |
Abstract: |
Software development is a sequential process where the allied steps in the
development lifecycle involve planning and modularization, requirement
engineering, analysis of product viability, profits estimation, strategic
decision making, maintenance strategies etc. Often, most of these phases are
pretty complex and thereby, extremely difficult to handle solely through human
intervention, mainly due to the size of the project, the number of factors to be
taken into consideration at each modular level and the rapidly changing external
environment.
In this paper we aim to provide an intuition on using Artificial Intelligence
(AI) in the different phases of the software development lifecycle. Our paper
focuses on a specific software development example for clarity and precision,
but most of the techniques are highly general and scalable to any software
development process. |
Keywords: |
Software Engineering; Artificial Intelligence; Machine Learning |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
A HIGHLY ADAPTIVE FAULT TOLERANT ROUTING PROTOCOL FOR ENERGY CONSTRAINED MOBILE
AD HOC NETWORKS |
Author: |
P. MANICKAM, Dr. D. MANIMEGALAI |
Abstract: |
In Mobile Ad hoc Network (MANET), mobile nodes dynamically set up a wireless
network without the presence of fixed infrastructure. In MANET, each node acts
as router to send and receive the information in a multi hop fashion. Since
nodes are in random movement and operated on battery power, the network topology
may change frequently. Moreover, nodes are operated by limited battery power and
nodes exhaust their energy by overhearing the information even if node is in
idle state. In order to extend the life time of network, routing protocols
consider the residual power of nodes while selecting a route and distribute the
load to all nodes in the network. So, designing an efficient routing protocol to
route the information in MANET is a challenging task. In this paper, we have
proposed a new protocol AODV-Energy Based Routing (AODV-EBR) protocol for energy
constrained mobile ad hoc Networks. This protocol optimizes Ad hoc on demand
distance vector routing protocol (AODV) by creating a new route for routing the
data packets in the active communication of the network. The proposed protocol
efficiently manages the energy weakness node and delivers the packets to
destination with minimum number of packets dropped. The proposed scheme have
simulated using Network Simulator (NS-2.34) tool and compared with AODV routing
protocol. The results show that the new proposed protocol has better performance
over AODV routing protocol by improving packet delivery ratio and control
packets dropping during the communication. |
Keywords: |
AODV, Hello Packet, Node Energy, Sequence Number, Upstream Node |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
LEARNING MEDIA BASED ON GAME BASED LEARNING TO LEARN DIGITAL TECHNIQUES |
Author: |
I.G.P. ASTO BUDITJAHJANTO |
Abstract: |
A computer as a learning medium has been used for many years lately. Yet, a
computer game that is used as a learning medium not so many researches to
measure the validity for a learning medium. Therefore the objective of this
research is to measure the validity of computer game as a learning medium and
the student’s response after using the computer game.
The Game Based Learning (GBL) method is used in this research. It has
input-process output model of instructional games and learning that appropriate
for development a game as a learning medium. By playing a game, GBL method can
give enjoyment and experience for the players (students).
The validation results of GBL as a learning medium shows significant outcome.
The validation results come from three experts to assess three aspects such as:
game aspects, the material of the problem and the construction of the problem.
These aspects have criteria very valid for all the criteria of the instrument.
Furthermore, we also measure responses from twenty students to appraise the
aspects of computer game. These aspects consist of two aspects such as: the
attractiveness of the computer game and the aspect of understanding of the
material. These aspects also have criteria very valid for all the criteria of
the instrument. |
Keywords: |
Game Based Learning, Computer Game, Validity, Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
USING Z FORMAL SPECIFICATION FOR ENSURING CONSISTENCY IN MULTI-VIEW
MODELING |
Author: |
KHADIJA EL MILOUDI, YOUNES EL AMRANI, AZIZ ETTOUHAMI |
Abstract: |
Consistency between different UML diagrams is an important challenge in object
oriented modeling but UML lacks any mechanism to rigorously check consistency
between the models. This paper presents the first formal semantics of UML
sequence diagram using Z notation. The main focus of our approach is to
guarantee consistency between sequence and class diagram in multi view modeling
context. By means of a representative example, we show how our approach is used
for the detection of inconsistencies. |
Keywords: |
Z, UML, Formal Methods, Sequence Diagram, Multi-view Modeling, Consistency
Checking |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
DESIGN CONSIDERATIONS FOR CLUSTERING LOCALIZATION TECHNIQUE IN AN INDOOR
WIRELESS NETWORK |
Author: |
SITI ZAKIAH HASAN, ROSDIADEE NORDIN |
Abstract: |
Indoor positioning technique, also known as localization is an application that
can benefit from the Wireless Local Area Network (WLAN) infrastructure and WLAN
enabled devices. This paper discusses implementation of an indoor wireless
localization network by using the existing WLAN infrastructure based on a novel
clustering technique. Design criteria and parameters involved to form a cluster
group has been defined and presented. The preliminary results from this study
indicates the proposed clustering technique able to perform indoor localization,
whereby total of 17 cluster groups have been generated from the 82 anchor points
in an indoor area. Several proposal enhancements also presented in order to
enhance the accuracy and improve the selection criteria of the clustering
method. |
Keywords: |
Cluster, Indoor Localization, Positioning Technique, RSS, WiFi, WLAN |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
A STUDY ON VARIOUS BIO-INSPIRED COMPUTING MODELS |
Author: |
ANAND MAHENDRAN , RAMYA GOVINDARAJ |
Abstract: |
Natural computing is the field of research that investigates various computing
models and computational techniques which are inspired from nature. It is an
interdisciplinary field that nudges the natural sciences with computing science
and attempts to understand the world around us in terms of information
processing. In the last few decades, natural computing which includes
biologically inspired computing is an area being pursued with a great deal of
interest. In this paper, we make an attempt to explore the working nature,
applications, variants and generative power of various bio-inspired computing
models such as membrane computing, insertion-deletion systems, Watson-Crick
automata, splicing systems and sticker systems. |
Keywords: |
Bio-Inspired Computing, Membrane Computing, Watson-Crick Automata, Splicing
System, Sticker System |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
FACE LOCALIZATION-BASED TEMPLATE MATCHING APPROACH USING NEW SIMILARITY
MEASUREMENTS |
Author: |
GHASSAN MARWAN ABDULFATTAH, MOHAMMAD NAZIR AHMAD |
Abstract: |
In this paper, a number of similarity measurements have been developed, namely:
Sum of Absolute Difference (OSAD), Sum of Square Difference (SSD) and Normalized
Cross Correlation (NCC) in order to measure the correlation between the input
image and the template image. In addition, two metrics were proposed,
specifically: Sum Square T-distribution Normalized (SSTN) and Chi-Square
distribution (Chi2) by which to measure matching between the two images. The
result showed that optimized measurements overcome any drawbacks of NCC.
Moreover, our results show SSTN and Chi2 as having the highest performance
compared with other measurements. Sets of faces including: Yale, MIT-CBCL, BioID,
Indian and Caltech were used to evaluate our techniques with success
localization accuracy of up to 100%. |
Keywords: |
Face Localization, Template Matching, Similarity Measurements |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
INTRODUCING THE OPEN SOURCE METAMODEL CONCEPT |
Author: |
AHMED MOHAMMED ELSAWI1, SHAMSUL SAHIBULDIN, ABDELHAMID ABDELHADI |
Abstract: |
The Model Driven Architecture (MDA) is a model centric software engineering
methodology that aiming to enhance software productivity, reusability,
maintainability and quality by focusing on models and metamodels in place of
conventional code. By adopting the separation of concern these models defined in
different levels of abstraction where each model syntactically conforms to a
particular metamodel. Under the MDA context this work presents a novel approach
for representing models and metamodels. Benefiting from the knowledge
representation capability and the open structure of the Entity Attribute Value (EAV)
model, we represent metamodels and its instance models in a single EAV designed
repository in to support of model transformations and introducing a new concept
of what we call it an Open Source Metamodel. Also this work demonstrate an
integration between UML static and behavioral models. |
Keywords: |
Metamodel Representation, Model Representation, Entity-Attribute-Value, EAV,
Open Source Model, MDA |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
OPTIMISING ONTOLOGY INTEGRATION THROUGH INTERMEDIATE ONTOLOGIES |
Author: |
V. RAJESWARI, Dr. DHARMISHTAN K. VARUGHESE |
Abstract: |
The semantic web is increasingly being seen as a solution to manage knowledge
content among heterogeneous and distributed information on the internet.
Evolution of the semantic web is linked to a great extent to the evolution of
various domain ontologies. It is necessary to formally define the mapping
between ontologies to enable interoperability between applications in
heterogeneous distributed information systems. The authors, in this paper
illustrate how the fundamental problem of mapping between the global ontology
and the local ontologies can be addressed, primarily through a newly developed
WeGO algorithm. A mapping system for OWL-DL ontologies, where mappings are
expressed as correspondences between conjunctive queries over ontologies, forms
the core of this research work. The algorithm finds the semantically equivalent
terms in local ontologies and uses them to build an intermediate ontology. The
intermediate ontologies form the building block for a global ontology that will
encompass the salient elements of the various local ontologies. It is further
shown how the mapping system proves effective for the task of ontology
integration through illustrative queries. Experimental data show that the query
results obtained from the local ontology and global ontology match the results
obtained from the intermediate ontology. |
Keywords: |
Data Integration, RDF, OWL, Semantic Web, Heterogeneous Data, World Wide Web,
Local Ontology, Global Ontology, Intermediate Ontology, Mapping, Merging |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
FINGERPRINT-FACE FEATURE MATCHING USING MULTI-MODALITY SYSTEM BY AGGLOMERATIVE
MULTI-CLUSTERING |
Author: |
V.LATHA JOTHI, Dr.S.ARUMUGAM |
Abstract: |
The biometric authentication is an effective alternative for traditional
authentication techniques. Because biometric data cannot be easily restored or
revoked, it is significant that biometric templates used in biometric
applications must be built and stored in a secure way, such that attackers could
not be able to falsify biometric data easily even when the templates are
negotiated. Researches in this area prove that multi-modal biometric systems
perform better than single mode. The fundamental idea of multi-modal biometrics
is the integration of the different biometric data. This paper presents a
multi-modality system, which integrates a function of fingerprint features and
face features. The template matching is done using agglomerative
multi-clustering process. Presented Multi-Modality System (MMS) considers
fingerprint features including pores, incipient ridges, dots, and ridge edge
protrusions and face features including eyebrows, eyes, mouth, nose, ears and
face border for matching with template. It consists two feature enrollment
modules for acquiring the fingerprints and faces into the system and two feature
extractors for obtaining the feature sets of fingerprint and face biometrics.
The final identification is then performed using a agglomerative
multi-clustering process (AMP) which is fast and effective. We evaluate the
effectiveness of our system using real fingerprints and face images from
publicly available sources. Experimental results demonstrate that Multi-Modality
System proposed here have higher security and matching performance compared to
Single-Modality System. |
Keywords: |
Fingerprint, Face, Multi-Cluster, Multi-modality, Agglomerative Multi clustering |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
EFFECTIVE AND EFFICIENT RULE MINING TECHNIQUE FOR INCREMENTAL DATASET |
Author: |
KAVITHA J.K, MANJULA D, KASTHURI BHA J.K |
Abstract: |
This paper presents an effective and efficient rule mining technique for
incremental dataset. One of the most important challenge is discovering the
frequent patterns , if the dataset is incremental in nature , this may cause
some existing rules becomes invalid and some new rules becomes valid. In this
paper, the Efficient Incremental Rule Mining (EIRM) Algorithm is proposed as a
solution to this problem. In the proposed algorithm only a single scan to the
database is needed. Instead of itemsets, the Transaction Identifiers (TIDs) are
stored for discovering promising and unpromising item sets and relevant support
count are also maintained. This helps to find all frequent patterns of an
updated dataset efficiently and reduces execution time. The simulation results
show that the proposed algorithm has good performance. |
Keywords: |
Frequent patterns, Association Rules, Data mining, Incremental mining |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
CODE STRATEGY ALGORITHM FOR ONLINE POWER QUALITY MONITORING OF ELECTRICAL
EQUIPMENT USING WSN UNDER TINY-OS ENVIRONMENT |
Author: |
A . VIJAYALAKSHMI , P. VANAJA RANJAN |
Abstract: |
Minimization of energy consumption is one of the most vital objective for
Wireless Sensor Network (WSN) based applications. The rate of the node’s energy
consumption is based on the sampling rate of the sensors in wireless sensor
networks (WSNs), since most of the energy is used in sampling and transmission.
To save the energy in WSNs and thus prolong the network lifetime, this paper
presents a novel approach based on Event-Driven Algorithm (EDA) with code-driven
strategy. In this algorithm, energy efficient wireless sensor network has been
developed and code driven protocol for data forwarding which minimize the
transmission power of sensor node has been designed. The proposed algorithm has
shown 68% increase of network lifetime in Event-Driven Algorithm (EDA) and 79%
increase in Code-Driven Algorithm (CDA) when compared with a continuous
monitoring algorithm. The performance of the proposed protocol is analyzed
experimentally using Crossbow IRIS motes under TINY OS environment and results
are discussed. |
Keywords: |
Energy Efficient, Event-Detection, Power Quality Monitoring, Power Control,
Smart Grid |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
MUTUAL MODULE BASED PARAMETERIZATION APPROACH FOR DWT AND FFT ALGORITHM |
Author: |
J.VENKATESH, R.RANI HEMAMALINI |
Abstract: |
In Embedded and wireless communication systems, the use of DWT (Discrete Wavelet
Transform) and FFT (Fast Fourier Transform) algorithms based modules has been
significant. Of late, in a system if various module designs for distinct
algorithms exist then the parameterization/reconfiguration techniques are
becoming an effective implementation idea of research. And so, in this paper,
parameterization technique is approached which takes advantage of the mutual
modules present in the two distinct algorithms popularly used in the Embedded
and wireless communication systems applications. Significance of this paper is
to introduce a mutual module for the lifting DWT and FFT butterfly such that it
contributes to reduction in area and power consumption. The advantage of this
mutual module implementation in the parameterization approach is that the
achieved power consumption is 253mW at 100MHz and the area required is 242
slices. Therefore, the power reduction for 8point FFT and 9/7DWT system under
test is almost 40 % and for the same system under test the area reduced is 48%. |
Keywords: |
DWT-lifting, FFT-butterfly, Mutual Module, Parameterization. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
MEDICAL IMAGE AUTHENTICATION WITH ENHANCED WATERMARKING TECHHNIQUE THROUGH
VISUAL CRYPTOGRAPHY |
Author: |
UMAAMAHESHVARI ANNAMALAI, THANUSHKODI K |
Abstract: |
Technological evolution has increased the insecurity of the biomedical images
produced day to day. Avoidance of the database hacking and preserving the
privacy of digital biometric data stored in the central database has become of
paramount importance. In order to preserve the security of the database, an
enhanced visual cryptographic technique is proposed in this paper. Cryptographic
technique allows information to be encrypted in such a manner that decryption
cannot be handled by the non-legitimate user. The proposed method allows a
secret sharing scheme, where an image is broken up into two shares and then
overlaid in such a way that an unauthenticated person cannot reveal this secret
image. The partitioned image is compared with all the images in the target using
Hausdorff Distance metric algorithm. When both the images match, the
authentication is provided. This paper also focuses on outsourcing data to an
untrusted client to predict the category of the image without getting any
information about the image itself and the final result of the classification.
The experimental results show that our proposed method is efficient over the
existing methods. |
Keywords: |
Authentication, Hausdorff Distance Metric, Privacy Preserving And Visual
Cryptography |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
IMPACT OF MISBEHAVIOR ON MODIFIED AODV PROTOCOL |
Author: |
MANI P., KAMALAKKANNAN P |
Abstract: |
Mobile Ad hoc Networks (MANETs) is a collection of mobile nodes forming the
network dynamically for exchange of information using the multi-hop wireless
communications. It is difficult to find the optimal route between source and
destination due to the changing topology and dynamic nature of the mobile nodes.
Routing protocols for mobile ad hoc networks are designed with an assumption
that the nodes will cooperate in packet forwarding to establish communication
between distant nodes using multi-hop communication. The cooperation between
nodes does not exist always. In order to save scarce resources like battery
power, bandwidth etc., the nodes may misbehave. A particular misbehavior, called
malicious behavior, severely affects the performance of the ad hoc routing
protocols. The malicious attack is carried out as a two phase attack launched by
one or more malicious nodes. In the first phase, the malicious nodes try to lure
legitimate node to send packets via them by participating in the network. In the
second phase, these nodes drop all the data packets send via them thereby
affecting the overall communication. In this paper, we have simulated the
malicious behavior in Ad hoc On-demand Distance Vector (AODV) routing protocol
using NS-2 and studied the impact of it on the performance of the mobile ad hoc
networks with and without malicious behavior. The analysis was carried out using
various metrics like packet delivery ratio, normalized routing load, average
end-to-end delay and percentage of packet loss. Based on the analysis, we
conclude that the steps have to be taken to thwart the malicious behavior
otherwise it would be difficult to find routes longer than one or two hops. |
Keywords: |
Mobile Ad Hoc Networks, Malicious nodes, AODV, Malicious Behavior, NS-2 |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
OLSR WITH OPTIMIZED HYBRID PARTICLE SWARM OPTIMIZATION AND INVASIVE WEED
OPTIMIZATION |
Author: |
S. MEENAKSHI SUNDARAM, DR. S. PALANI, DR. A. RAMESH BABU |
Abstract: |
MANETs are multi-hop ad-hoc wireless networks where nodes move arbitrarily in
topology. The network has no infrastructure and can be established easily in any
environment. The Optimized Link State Routing (OLSR) protocol is a route
management protocol which is used for such mobile ad hoc networks. The paper
presents a hybrid algorithm based on Invasive Weed Optimization (IWO) and
Particle Swarm Optimization (PSO), named IW-PSO. IWO is a relatively new
numerical stochastic optimization algorithm. By incorporating the reproduction
and spatial dispersal of IWO into the traditional PSO, exploration and
exploitation of the PSO can be enhanced and well balanced to achieve better
performance. In this paper, it is proposed to modify OLSR using Hybrid Particle
Swarm Optimization Invasive Weed Optimization which reduces the end to end delay
and also improves the throughput in the network. |
Keywords: |
Optimized Link State Routing (OLSR), Invasive Weed Optimization (IWO),Ad hoc
Network, Particle Swarm Optimization (PSO) |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
KEY PRE-DISTRIBUTION SCHEME FOR RANDOMIZED SECURED ROUTING IN WIRELESS SENSOR
NETWORKS |
Author: |
U.SENTHIL KUMARAN & ILANGO PARAMASIVAM |
Abstract: |
In wireless sensor networks (WSN’s), majority of its applications necessitate
the confidentiality of information they transmit. This can be achieved through
secure key management schemes. In this paper, a key pre-distribution scheme for
randomized secured routing is proposed for WSN. Initially, the sink utilizes the
one hop neighbor information of nodes to predistribute keys. It randomly chooses
(n/2) nodes and distributes with (k+m) keys and other nodes obtain (k) keys.
Nodes with more shared keys are considered as high resilient nodes. During data
transmission, high resilient nodes are preferred to other normal nodes and the
next hop is randomly selected from the secured minimum hop neighbors. When there
is more than one secure minimum hop links, then a weight function is assigned
and the best path is elected. The proposed scheme is simulated in NS-2 and it is
shown that it provides high resilience and delivery ratio with reduced energy
consumption. |
Keywords: |
Wireless Sensor Network (WSN), Key Management, Security, Pre-distribution. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
GENETIC OPTIMIZATION FOR PRIVACY PRESERVING IN DATAMINING |
Author: |
J. PARANTHAMAN, Dr. T ARULDOSS ALBERT VICTOIRE |
Abstract: |
Data mining needs accurate input for meaningful results, but privacy issues
could influence users into providing fictitious information. To preserve client
privacy in data mining various Anonymization techniques is used, one of the most
common being k-anonymity. This converts data into an equivalence classes set
with each class having a set of K- records indistinguishable from others. In
this paper, k-anonymity is used for preservation of privacy when data mining
algorithms are applied. A mushroom data set anonymized to varied levels to
preserve privacy and genetic algorithm (GA) for optimization is used in
evaluation. Experiments prove that the new method achieves good results. |
Keywords: |
Privacy Preserving Data Mining, K-Anonymity, Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
VIDEO-SURVEILLANCE SYSTEM FOR TRACKING A PERSON BY ESTIMATING THE TRAJECTORY |
Author: |
BOUTAINA HDIOUD, RACHID OULAD HAJ THAMI, MOHAMMED EL HAJ TIRARI |
Abstract: |
This paper we propose a simple and efficient video surveillance system which
detects and tracks a person in a video stream. Object detection is the most
important and crucial step for any video surveillance system. In this paper, we
separate foreground and background by using the statistical model of Gaussian
Mixture (GMM). Interests points are identified in the detected regions
(foreground) using the Harris detector. The analysis of connected components
detected by subtracting the background allows grouped the pixels of moving
objects in order to extract the center of gravity. Then, a boundary box is used
to limit the area of connected components in order to detect the coordinates of
the gravity center of the moving person. Finally, by projection in Euclidean
plan we can get the trajectory of the person in motion and compute the Euclidean
distance crossed in the scene. |
Keywords: |
GMM model, Connected Component, Boundary Box, Video analysis, Harris detector,
Trajectory estimation. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
MALWARE DECTION USING IP FLOW LEVEL ATTRIBUTES |
Author: |
AHMED ABDALLA, HAITHAM A. JAMIL, HAMZA AWAD HAMZA IBRAHIM, SULAIMAN MOHD NOR |
Abstract: |
Although the task of malware detection in network traffic had been done
successfully through Deep Packet Inspection (DPI) in the last two decades, this
approach is becoming less efficient due to the continuous increasing of network
traffic volumes and speeds and concerns on user’s privacy. The recent
alternative approach is the flow-based detection which has the ability to
inspect high speed and backbone network traffic because it significantly
aggregates and reduces the inspected data. However, the capability of this
approach to detect packet-based attacks such as viruses and trojans is
questionable because of the absence of the actual data at the payload level. In
this paper we proof through experiments the ability to detect network flows that
contain malicious packets that had been previously marked as malicious by Snort
using only flow level attributes using several Machine Learning (ML)
classifiers. We created our dataset from captured traces of a subnet of our
university’s network. The detection accuracy is found to be 75% True Positive (TP)
with almost zero False Negative which we consider as a verification of the
capability of flow-based approach to detect malware. This finding is encouraging
for future researches where it can be combined with more traditional detection
methods to form more powerful NIDSs. |
Keywords: |
Network Intrusion Detection System (NIDS), Flow level network traffic
inspection, Snort, Malware Detection, Machine Learning, NetFlow |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
DESIGN, MODELLING AND SIMULATION OF UPQC IN FOURTEEN BUS SYSTEM |
Author: |
P. KANNAN, V. RAJAMANI |
Abstract: |
This work deals with design, modelling and simulation of UPQC in Fourteen bus
system to improve the power quality in a multi bus system. The UPQC system is
modelled using the elements of Simulink and it is simulated using MATLAB. A sag
is created by applying a heavy load at the receiving end. The sag is compensated
by using the UPQC. The harmonics required at the receiving end are supplied by
the inverter part of UPQC. The DC required by the UPQC is supplied by Solar cell
and Boost converter system. The simulation results of fourteen bus system are
presented in time domain. |
Keywords: |
FACTS, MATLAB, UPQC, SOLAR CELL |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
CLUSTER BASED BEE ALGORITHM FOR VIRTUAL MACHINE PLACEMENT IN CLOUD DATA CENTRE |
Author: |
AJITH SINGH. N, M. HEMALATHA |
Abstract: |
The utilization of cloud data centres in combination with Virtualization
technology has advantages of running more than one virtual machines in a single
server. The data centres is a collection of many servers, allocation of VM to
Host is known as VM placement. VM placement problem was examined in this paper
with focus for maximum utilization of the resources and energy reduction.
Switching off the idle server or in sleep mode can save energy consumption
highly wasted in data centres. Technique for solving Virtual machine placement
problem is implemented with the HoneyBee algorithm with hierarchical clustering
in order to minimize energy consumption in servers. Cluster formation with the
HoneyBee algorithm supports easy relocation of Virtual Machine migration and
reduces the network latency. Further, simulation work with PlanetLab workload
was experimented and revealed that the proposed HCT algorithm reduced energy
consumption significantly while reducing the SLA and VM migration. |
Keywords: |
Virtual Machine, Cloud Computing, Live Migration, Server Consolidation, HoneyBee
Algorithm, hierarchical Cluster |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
IMPROVING WEB QUERY PROCESS USING CONTEXT CYCLIC METHOD |
Author: |
M.MANIKANTAN, Dr.S.DURAISAMY |
Abstract: |
The advent of internet besides the sophisticated and advanced web technologies
have edified themselves to be a panacea for solving the complications in the
process of information retrieval from various data sources like local, regional
and other organizational information. Even though the utility of search engines
is prevalently observed, the web users still encounter problems in fixing or
retrieving the requisite information for their web queries. Accuracy and
appropriateness of data-retrieval through web queries witness a great demand in
the current scenario. This paper is an effort to elucidate the enhancement of
the accuracy and appropriateness of the data-retrieval for the web queries
posted by the users. A context sensitive model is proposed in this article to
enhance the web query processing through intelligent tag assignment graph
approach. The aspiration of this research is to provide a successful
demonstration of the use of existing knowledge sources to enhance the content of
web queries. |
Keywords: |
Web Query Processing, Information Retrieval, Tag Assignment, Search Engine,
Context Mapping Model. |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
A NOVEL ADAPTIVE FUZZY INFERENCE SYSTEM FOR MOBILE ROBOT NAVIGATION |
Author: |
J. HOSSEN, S. SAYEED, A. HUDAYA, M. F. A. ABDULLAH, I. YUSOF |
Abstract: |
The Fuzzy hybridization technique for intelligent systems have become of
research interests in a variety of research areas over the past decade. There
are limitations faced by all popular fuzzy systems architectures when they are
applied to applications with a large number of inputs (more than three). The
present paper proposes a novel adaptive fuzzy inference system for multi-sensors
mobile robot navigation. A novel fuzzy inference system is constructed by the
automatic generation of membership functions (MFs) and formed a minimal numbers
of rules using hybrid fuzzy clustering algorithm (Combination of Fuzzy C-means
and Subtractive clustering algorithm) and the modified apriori algorithm,
respectively. A modified apriori algorithm is utilized to count the number of
common elements from the clusters and to obtain a minimal set of decision rules
based on input-output datasets. The generated modified adaptive fuzzy inference
system is then adjusted by the least square method and the gradient descent
algorithm towards better performance with a minimal set of rules. The proposed
algorithm is able to reduce the number of rules which increases exponentially
when more input variables are involved. The performance is compared with other
existing approaches in an application of mobile robot navigation and shown to be
very competitive and improved results. |
Keywords: |
Apriori algorithm, Fuzzy C-means, Subtractive clustering, and TSK |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
ANALYZING BIOLOGICAL PROCESS ON GENE EXPRESSION DATASETS USING HEURISTIC SEARCH |
Author: |
P M BOOMA, DR.S.PRABHAKARAN |
Abstract: |
Mining micro-array gene expression data is an imperative subject matter in
bioinformatics with extensive applications. Bio informative knowledge discovery
from DNA microarrays become more essential in various disease diagnosis, drug
development, genetic functional interpretation, gene metamorphisms etc.,
Recently biological information mining using clustering techniques were used for
the analytical evaluation of gene expression. The expression of Nnumerous genes
can be scrutinized concurrently using DNA micro-array technology. To develop the
massive quantity of information enclosed in gene expression data, revision of
existing work presented a biclustering algorithm, which presents local
structures from gene expression data set. However, traditional single cluster
model unable to mine precise information from large, and heterogeneous
collection gene expression data. So the development of a new computational
method is presented in this work to improve the analysis of gene expression data
sets. In this work we first introduce the heuristic search for the standard
biological process on physiological data of the gene expression. The
physiological data consists of both physical and logical patterns of the gene
expression datasets and the biological process of physical and logical pattern
of gene expression datasets are analyzed through Heuristic search. Experimental
evaluations are conducted for our heuristic search based analysis of biological
process on physiological data with standard benchmark gene expression data sets
from research repositories such as UCI in terms of size of gene expression
datasets. |
Keywords: |
Gene Expression Datasets, Physiological Data, Biological Process, Heuristic
Search |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
RIPENESS LEVEL CLASSIFICATION FOR PINEAPPLE USING RGB AND HSI COLOUR MAPS |
Author: |
BADRUL HISHAM ABU BAKAR, ASNOR JURAIZA ISHAK, ROSNAH SHAMSUDDIN, WAN ZUHA WAN
HASSAN |
Abstract: |
An image processing technique is used to evaluate the level of ripeness of fresh
pineapple. The classification of the fruit will be judged by the colour change
on the skin of the pineapple. A sample image is taken using a digital
single-lens reflex camera under a controlled environment. An algorithm is
developed using MATLAB software to evaluate features based on an image of the
pineapple. Features from the image are segmented according to RGB and HSI colour
maps. This paper will introduce a technique to distinguish between unripe, ripe
and fully ripe fruit. The maturity index varies from Index 1 through Index 7
where Index 1 is an unripe pineapple and Index 7 is a fully ripe pineapple. By
using fuzzy logic classification, the result shows that 100 % accuracy for the
fully ripe and 85 % for unripe and ripe level can be achieved. |
Keywords: |
Pineapple, Maturity index, Ripeness, Image processing, Fuzzy logic |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
TOWARD THE MATURITY OF SOFTWARE ENGINEERING: UNIVERSAL, FORMAL, AND MATHEMATICAL
DEFINITION FOR VALUE AND OPERATION AS TWO BASIC CONCEPTS OF COMPUTING |
Author: |
BERNARIDHO I HUTABARAT, KETUT E PURNAMA, MOCHAMAD HARIADI |
Abstract: |
The presence of informal and redundant definitions of basic concepts of
computing / programming prohibits the advances of software engineering. This
problem is not addressed by all literatures of software engineering about formal
methods. A paper by the present authors have provided partial solution by
establishing Type and Object as two (out of four) disjoint basic concepts of
computing and programming. This paper proposes the remaining two of the four
basic concepts.
With the substitution test, this paper shows that informality and redundancy of
concepts in the widely referenced publications have led to another problem: the
circularity of concept. Our proposed concepts have the opposite properties:
formal, unique, and non-circular. The definitions are independent toward
programming paradigms.
The solution requires the formal definition for expression and operand, a
semi-formal definition for statement; and the removal of synonyms like invoke,
invocation, parameter and argument. Current standard of software engineering has
five synonyms for operation, two synonyms for value, and two synonyms for
operand. This paper proposes unique terms, proposes semi-formal and formal
definitions for two basic concepts: operation and value. It gives way to
advancing the software engineering as a mature discipline. |
Keywords: |
Basic Concept, Value, Operation, Expression, Statement |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
WIRELESS NETWORK USING OPTIMIZED COOPERATIVE SCHEDULING |
Author: |
D. ROSY SALOMI VICTORIA, S. SENTHIL KUMAR |
Abstract: |
In wireless networks for cooperative relaying, some nodes eavesdrop on the data
send from the sender node relay it to the receiver node. We increase the
capability of the network by optimizing relay node choosing and decreasing the
count of hops. The topology control problem is then prepared as a distinct
stochastic optimization trick that is decided using a stochastic estimation
method. The existing systems effects in time delay in choosing alternative node
due to node crash and inadequate ability to transfer the file. But each node in
our proposed system encrypts and decrypts the file according to node capability
to evade node crash. We choose the best node to transfer the file by assessing
its impartial task and making the intervention set of the chosen relay node. The
outcomes divulge that that our suggestion achieves better in the system
connectivity, time factor and correct relay node choice than the multi hop
communication. The performance of multi hop scheduling and Optimized Cooperative
Scheduling (OCS) are compared in terms of probabilities, end to end delay,
losses occurred and network capacity. |
Keywords: |
Wireless Networks, Optimization, Network Topology, Signal To Noise Ratio,
Reliability |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
AN APPROACH TO OPTIMIZE WORKFLOW SCHEDULING FOR CLOUD COMPUTING ENVIRONMENT |
Author: |
P. KUMAR, SHEILA ANAND |
Abstract: |
Cloud computing is a model for enabling convenient, on-demand network access to
a shared pool of distributed computing resources. Workflow scheduling is one of
the key issues in the management of workflow execution. The scheduling process
maps and manages the execution of the inter-dependent tasks on the distributed
resources. Scheduling of workflows is a challenging task especially when many
workflows are considered. Scheduling algorithms are required to implement the
workflow scheduling strategies and also for automating the process of
scheduling. Proper scheduling can have significant impact on the performance of
the system and the user’s service requests have to be provisioned with minimal
management effort or service provider interaction. This paper presents workflow
scheduling for cloud environment based on Artificial Bee Colony algorithm. The
objective is to achieve optimization of server utilization and overall
computation time to arrive at an efficient scheduling of tasks and services. The
proposed work was implemented and tested and the results are presented. |
Keywords: |
Workflow, Workflow Scheduling, Cloud, Optimization, ABC |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
OPTIMAL DESIGN OF POWER SYSTEM STABILIZERS CONTROL FOR MONOMACHINE AND
MULTIMACHINE USING INTELLIGENT CONTROL TECHNIQUES -FUZZY LOGIC- |
Author: |
OUISSAM BELGHAZI , MOULAY RACHID DOUIRI , MOHAMED CHERKAOUI, MOHAMMED TAALABI |
Abstract: |
The stability of power electrical networks is a key factor for the delivery of
high quality energy. A power system stabilizer (PSS) is designed to deliver a
supplement excitation signal to a synchronous machine, to limit frequency
oscillations. Frequency oscillations are consequences of either modifying the
functioning point, or short circuits. Since power systems are highly non-linear
systems, with configurations and parameters that change with time, the
Conventional power system stabilizers (CPSS) are designed for a single
functioning point. Their performances decrease when the functioning point is
modified.
In this paper, a fuzzy expert system (fuzzy power system stabilizer: FPSS) is
designed to limit frequency oscillations of a power electrical network. Only 25
rules (comparatively to 49 rules of other works) were used to assure better
performances than CPSS. Simulation tests include varying functioning points and
short circuits. |
Keywords: |
Fuzzy expert system, Synchronous machine, Electrical power network, Power system
stabilizer |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
Title: |
BELBIC BASED HIGH PERFORMANCE IPMSM DRIVE FOR TRACTION |
Author: |
A.SHAKILABANU, Dr.RSD.WAHIDABANU |
Abstract: |
This paper proposes a brain emotional learning based intelligent controller (BELBIC)for
Interior Permanent magnet synchronous motor (IPMSM) drives used for traction
application. The IPMSM is a suitable motor for traction because of its
brushless, wide constant speed-power region and low power-loss operation. The
operation of the BELBIC is based on the emotion processing mechanism in the
brain. This intelligent control is stimulated by the limbic system of the
mammalian brain. Dual feedback and online tuning of emotional controller assures
enhanced performance of the drive system. Dual loop adjustable speed drive
system is proposed in this paper for traction application. The conventional PI
controller controls the speed but does not guarantee the stability of the
machine during the load variation. PI controller makes the system unstable by
windup action. In this paper novel methods such as the Fuzzy PI controller and
BELBIC are proposed to improve stability. Current is controlled by PI controller
and speed is controlled by Fuzzy PI controller and BELBIC. Speed and torque
performance of the machine is improved by the Fuzzy PI controller and BELBIC
compared to conventional PI controller in the IPMSM drive system. |
Keywords: |
PI, IPMSM, PWM, Fuzzy PI controller and BELBIC |
Source: |
Journal of Theoretical and Applied Information Technology
November 2013 -- Vol. 57. No. 3 -- 2013 |
Full
Text |
|
|
|