|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2013 | Vol. 53 No.2 |
Title: |
DESIGN, ANALYSIS AND OPTIMIZATION OF A MICROSTRIP PATCH ANTENNA AT FREQUENCY
3.55 GHZ FOR WIMAX APPLICATION |
Author: |
ALI EL ALAMI, SAAD DOSSE BENNANI, MOULHIME EL BEKKALI, ALI BENBASSOU |
Abstract: |
This article introduces some of the basic concepts of patch antennas. The main
focus will be on optimizing of dimensions of patch antenna for WIMAX application
with resonance frequency of 3.55 GHz. This design is simulated with HFSS program
that based on finite element method. This method gives good impedance bandwidth
of the order of 3.94%, a gain of 7.49 dB, reflection coefficient of -47.23 dB
and a standing wave ratio equal to 1. |
Keywords: |
Antenna patch, WiMAX, HFSS, Design |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
SMART TRANSMISSION POWER ADJUSTMENT ROUTING BASED ON CONNECTIVITY AND COVERAGE
IN MOBILE ADHOC NETWORKS |
Author: |
BHARATHIRAJA.R, S.KARTHIK and V.P. ARUNACHALAM |
Abstract: |
The network connectivity of Mobile Ad hoc Networks (MANETs) is a multifaceted
problem due to the uncertainty of the network topology. Since, wireless links
have significantly limited capacity, they are affected by several errors that
results in degradation of the received signal and consequently lead to the
problem of coverage and connectivity. In this paper, we propose to develop a
smart transmission power adjustment routing technique based on connectivity and
coverage for MANETs. Initially traffic factor is calculated for each node which
is based on the input and output capacity at each node and data generation rate.
Then the path which has minimum transmission power and traffic factor is
selected for transmission. The proposed technique also provides transmission of
data to the node which is outside the coverage area. From the simulation
results, we show that the proposed routing technique provides optimal power
control in MANET by attaining good throughput and reduced energy consumption. |
Keywords: |
Mobile Ad hoc Networks (MANETs), Quality of Service (QoS), Energy Consumption |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
DESIGN OF AN ADAPTIVE DISTANCE-LEARNING HYPERMEDIA BASED ON LEARNER MODELING:
APPLICATION FOR A COURSE IN ELECTRICAL ENGINEERING |
Author: |
AZIZ DEROUICH, KARIM MOHAMMED, DRISS MARJANE, FAYÇAL MESSAOUDI |
Abstract: |
The present article is concerned with the design, modeling and implementation of
an adaptive hypermedia dedicated to distance learning. The architecture of this
system is essentially based on three models: the learner model representing all
data about the user, the domain model representing the pedagogical content to be
taught, and the adaptation model allowing the generation and adaptation of
pedagogical contents to the actual needs of the learner. Experiments in a real
context, in a pilot class of thirty-two students majoring in electrical
engineering, enabled us to assess our system and interpret the behavior of the
learners with this mode of learning. |
Keywords: |
Adaptive Hypermedia, Learner Model, Domain Model, Adaptation Model, UML |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
DETECTION OF HIGH IMPEDANCE FAULT USING A PROBABILISTIC NEURAL-NETWORK CLASSFIER |
Author: |
MARIZAN BIN SULAIMAN, ADNAN H. TAWAFAN, ZULKIFILIE BIN IBRAHIM |
Abstract: |
In this paper, a simple and efficient method for detection high impedance fault
(HIF) on power distribution systems using an intelligent approach the
probabilistic neural network (PNN) combined with wavelet transform technique is
proposed. A high impedance fault has impedance enough high so that conventional
overcurrent devices, like overcurrent relays and fuses, cannot detect it. While
low impedance faults, which include comparatively large fault currents are
easily detected by conventional overcurrent devices. Both frequency and time
data are needed to get the exact information to classify and detect no fault
from HIF. In the proposed method, DWT is used to extract feature of the no fault
and HIF signals. The features extracted which comprise the energy of detail and
approximate coefficients of the voltage, current and power signals calculated at
a chosen level frequency are utilized to train and test the probabilistic neural
network (PNN) for a precise classification of no fault from HIFs. |
Keywords: |
Discrete Wavelet Transform, Fuzzy systems, Power distribution faults,
probabilistic neural network (PNN) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
A DESIGN OF ANALOG VOLTAGE-MODE MULTIPLIER FOR UHF RFID PASSIVE IN 0.18UM CMOS
PROCESS |
Author: |
SMAIL HASSOUNI, HASSAN QJIDAA, MOHAMED LATRACH |
Abstract: |
In this paper a “Low Voltage, Low Power, High Speed and High Linearity-CMOS
Analog Multiplier for Modem ASK is proposed”. The multiplier circuit is
implemented in 180nm CMOS technology. It can be operated even at low Supply
voltage VDD=0.9V. Band width of operation is about 4.10MHz, which is suitable
for high frequency/high speed applications. This device modulates an analog
carrier signal to encode digital information, and also demodulates such a
carrier signal to decode the transmitted information. The goal is to produce a
signal that can be transmitted easily and decoded to reproduce the original
digital data. |
Keywords: |
Modulator ASK; ASK demodulator; Multiplier; Physical design; radio frequency
identification (RFID) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMPLEMENTATION OF STRONGER AES BY USING DYNAMIC S-BOX DEPENDENT OF MASTER KEY |
Author: |
SLIMAN ARRAG, ABDELLATIF HAMDOUN, ABDERRAHIM TRAGHA, SALAH EDDINE KHAMLICH |
Abstract: |
In this paper we propose and we show a new approach of nonlinear transformation
algorithm for AES SBox to enhance the complexity of the SBox structure,we making
AES stronger by using Dynamic Sbox,with look up table Sbox and Key expansion as
modified when we change the initial key, that effectively providing a high
resistance against differential cryptanalysis and especially the linear
cryptanalysis. The structure of the AES S-box has been expanded and modified to
be accordance with the proposed algorithm and to obtain good nonlinearity of the
Sbox. This has been done without changing the basic operations of AES.The
proposed modifications of the Advanced Encryption and a modified Sbox are
implemented in Cyclone II Dvice by using VHDL language. |
Keywords: |
AES, Dynamic S-box, Master key, FPGA, Vhdl |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
A SURVEY ON VIDEO STREAMING OVER MULTIMEDIA NETWORKS USING TCP |
Author: |
U. RAHAMATHUNNISA, DR. R. SARAVANAN |
Abstract: |
Video Streaming has been used recently for various interactive services. Video
Streaming is playing the content of the video in real time. Today’s research is
focused on video streaming through TCP. Regardless of the retransmission
procedures, researchers focus on TCP Streaming due to its reliable service. This
paper focuses more towards TCP Video Streaming and various congestion control
algorithms used for video streaming |
Keywords: |
TCP, Video Streaming, Congestion Control |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
MEASURING COMPUTER SECURITY AWARENESS ON INTERNET BANKING AND SHOPPING FOR
INTERNET USERS |
Author: |
FATIMAH SIDI, MARZANAH A. JABAR, AIDA MUSTAPHA, NOR FAZLIDA SANI, ISKANDAR ISHAK,
SITI ROZANA SUPIAN |
Abstract: |
Internet banking and shopping are two main e-commerce activities that are
popular among Internet users. However, millions of dollars have lost due to the
compromised bank account of users that have been hacked or intercept by
irresponsible person through the Internet. The increase of threats towards
online banking and shopping has made the study towards the awareness on internet
banking and shopping to be important. In this study, a group of respondents with
different academic background, age and gender responded to a survey that
questions about their awareness of utilizing internet banking and shopping
services. The results are then examined and analyzed by dividing them into group
based on gender and education background. The results also analyzed based on the
category of the questions related to basic and technical awareness towards the
proper usage of internet banking and shopping. The results of the study showed
majority of the users have good awareness especially on the basic Internet
security steps taken while respondents with lower academic background lack
technical awareness on Internet shopping and banking. |
Keywords: |
Awareness study, computer security, Internet banking, Internet shopping |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
SOFTWARE OF PRODUCTION SCHEDULING PLANNING IN MANUFACTURE COMPANIES USING METHOD
OF MAKE TO ORDER |
Author: |
WIRANTO HERRY UTOMO, AJI LESMANA, HENDRO TAMPAKE |
Abstract: |
In a manufacturing company, a method to manage production scheduling system is
highly needed in order to anticipate the needs of future orders. Production
schedule planning using make to order method is the appropriate step to deal
with the calculation of the time needed for production, materials, use of
machinery and men power to achieve job effectiveness in a company. The design of
this production schedule planning applications uses make to order to adjust with
the needs of required work time calculation in PPIC (Product Planning and
Inventory Control) work environment in a textile or garment manufacture industry
based on the classification. |
Keywords: |
Production Scheduling Planning, Make to Order, Product Planning and Inventory
Control |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
INDEX BASED STEGANOGRAPHY: A NEW SECURE APPROACH FOR IMAGE STEGANOGRAPHY USING
TWO IMAGES |
Author: |
B.PERSIS URBANA IVY, P.J.KUMAR , S.SUREKA, G.UMA MAHESWARI |
Abstract: |
Steganography is the way of hiding data in such a way that nobody except the
intended receiver can detect the presence of data and retrieve it. The most
widely used method used for image Steganography is LSB modification method.
Although it is a simple technique, but the probability of detecting the hidden
data is high since the present Steganalysis algorithms are capable enough to
detect not only the alteration in image but also the secret data hidden in
image. The linear plain text hidden in an image can easily be detected. In this
paper we proposed a new secure method of implementing image Steganography.
Instead of using a single image for Steganography, we are using two images. In
this method we are hiding the data without altering the image containing the
actual data. Thus it provides more security than other methods of hiding data in
the image. The proposed method can also efficiently hide large amount of data
which was difficult to hide in other Steganographic methods. |
Keywords: |
STEGNOGRAPHY, INFORMATION HIDING, SECURE STEGNOGRAPHY, INDEX BASED STEGNOGRAPHY |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
ADAPTIVE CONTROL USING MULTIPLE MODELS WITHOUT SWITCHING |
Author: |
HAISEN KE, WENRUI LI |
Abstract: |
The multiple models adaptive control based on switching or switching and tuning
have been developed extensively during the past twenty years, which can adapt
rapidly to any unknown but constant operating environment. However, the
stability of the system with multiple models cannot be easily established.
Towards this goal, this paper proposes a novel multiple models adaptive
controller. Unlike the prior results, the controller developed here do not
require a switching scheme to guarantee the most appropriate model to be
switched into the controller design. So the analysis of the stability of the
closed-loop can be established easily. Besides, the N identification models are
fixed, which is superior to the all adaptive identification models. Simulation
results proposed to illustrate the effectiveness of the developed multiple
models adaptive controller. |
Keywords: |
Robust adaptive control, Multiple model control, Nonlinear system, Transient
performance, Stability |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
NEURO-GENETIC SENSORLESS SLIDING MODE CONTROL OF A PERMANENT MAGNET SYNCHRONOUS
MOTOR USING LEUNBERGER OBSERVER |
Author: |
H. MAHMOUDI, A. ESSALMI |
Abstract: |
The principal aim of this paper is a study and improves of sensorless vector
control (VC) of a permanent magnet synchronous motor (PMSM). We interested
mainly of the Luemberger observer. This method is based on a representation of
the state of the dynamic model of the motor. In order to optimize the
performance of the drive system, the genetic algorithm is proposed as an
intelligent technique applied to the system of the observer to determine the
values of its matrix gains to improve its dynamic performance. In a first stage
we describe the modeling of PMSM and the principle of VC with a sliding mode
controller. In the second stage, we insert the Luenberger observer with genetic
algorithm in vector control block of PMSM. |
Keywords: |
Permanent Magnet Synchronous Motor (PMSM), Vector Control, Genetic Algorithm
(GA), Observer Of Luenberger, Sliding Mode Controller |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF ROUTING PROTOCOLS IN LARGE-SCALE MOBILE AD HOC
NETWORKS |
Author: |
JAMALI ABDELLAH, NAJA NAJIB, EL OUADGHIRI DRISS, BENAINI REDOUANE, ZYANE
ABDELLAH |
Abstract: |
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes
communicating with each other using multi-hop wireless links without any
existing network infrastructure or centralized administration. Efficient routing
protocols can provide significant benefits to mobile ad hoc networks, in terms
of both performance and reliability. Many routing protocols for such networks
have been proposed so far. Amongst the most popular ones are Dynamic Source
Routing (DSR), Ad hoc On-demand Distance Vector (AODV), Destination-Sequence
Distance-Vector (DSDV), Temporally-Ordered Routing Algorithm (TORA, ) and
Location-Aided Routing (LAR). Research efforts have not focused in evaluating
the performance of these protocols when applied to large-scale wireless
networks. In this paper we present our observations regarding the behavior of
the above protocols, in large-scale mobile ad hoc networks (MANETs). We consider
wireless mobile terminals spread over a large geographical area, and we perform
extensive simulations, using NS-2 simulator. |
Keywords: |
Mobile Ad-hoc Network (MANET), Routing Protocols AODV (Ad-hoc on demand distance
vector), DSDV (Destination Sequenced distance vector), DSR (Dynamic Source
Routing) |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
RULE-BASED REASONING ALGORITHM FOR INTUITIONISTIC FUZZY PETRI NETS |
Author: |
ARUNDHATI LENKA, DR.CHAKRADHAR DAS |
Abstract: |
Looney’s fuzzy reasoning algorithm supported by Fuzzy Petri Net(FPN)is further
extended for representing the fuzzy production rules in a knowledge based system
which is provided with fuzzy reasoning ability of fuzzy systems . In
intuitionistic fuzzy sets(IFS)there is an extension of Zadeh Fuzzy sets that
possess a new additional attribute function i,e non membership and intutionistic
index take into account with stronger expression ability to deal with uncertain
information. In this paper a rule based reasoning algorithm is presented for
intuitionistic fuzzy petrinets. intuitionistic fuzzy members are used to
represent the confidence degree and threshold of the transition along with token
values of each place. A generalized fuzzy petri net to intuitionistic fuzzy
petri net and vice versa is presented in an effective way . Some new features
are added to take care of the generalization of the intuitionistic nature of the
fuzzy petri nets. |
Keywords: |
Intuitionistic Fuzzy Set, Intuitionistic Fuzzy Petri Nets, Fuzzy Reasoning,
Fuzzy Relations, Intuitionistic Fuzzy Numbers |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
VM CONSOLIDATION TECHNIQUES IN CLOUD DATACENTER |
Author: |
T.R.V.ANANDHARAJAN, DEEPAK BHARGAVAN, M.A. BHAGYAVENI |
Abstract: |
The crunch in resources and ability to serve the interest of customers with
maximum efficiency and minimum resources has led to a wide range of research in
cloud resource management. Various cloud service providers currently in the
market are testing several algorithms to manage their resources and has not been
able to strike a balance between service quality and energy management. Through
our paper we intend to strike a deal between energy and quality by maintaining
both within preferred limits. We proposed an Efficient Energy Aware (EEA)
analysis by introducing RHO (Ram based Host Overloading detection) algorithm. It
has shown significant improvements over existing power aware host overloading
detection algorithms like IQR (inter quartile range). This algorithm gave 37.26%
improvement in terms of energy and 70% improvement in PDM (Performance
degradation due to migration) over IQR. |
Keywords: |
Distributed System, Cloud Computing, Datacenter, Green IT |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
PALMPRINT FEATURE REPRESENTATION USING FRACTAL CHARACTERISTICS |
Author: |
DARMA PUTRA |
Abstract: |
This paper introduced some new techniques to extract the palmprint features
based on fractal codes and fractal dimension. Four new techniques based on
fractal, namely FDFC (fractal dimension from fractal codes), FDIFC (fractal
dimension image from fractal code), DIFC (distance image from fractal code), and
AIFC (Angle image from fractal code) are proposed.. The main idea of these
methods is the forming palmprint image representation by using fractal code
parameters. There are three parameters of fractal codes are used namely position
of range block, position of domain block, and size of range block. Those methods
have been applied for palmprint verification system. The system has been tested
by using database of 1050 palmprint images, are generated from 5 samples from
each of the 210 persons randomly selected. Experiment results show that our
proposed methods can achieve an acceptable accuracy rate. |
Keywords: |
Biometrics, Fractal Codes, Fractal Dimension, Feature Extraction, Palmprint
Recognition |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
IMPLEMENTATION OF VIRTUALIZATION IN DATA CENTERS TO INCREASE PROFICIENCY AND
PERFORMANCE |
Author: |
MUEEN UDDIN, ASADULLAH SHAH, RAED ALSAQOUR |
Abstract: |
A traditional data center is used to host computer systems and associated
components. Electricity usage has become an increasing fraction of the total
cost of ownership for data centers. It is difficult to reduce the electrical
consumption of tier level data centers through appropriate design of the
network-critical physical infrastructure and through the design of the IT
architecture. This paper explains how virtualization can be implemented in data
centers to increase proficiency and productivity. The paper is a guideline for
data center managers to properly design and implement virtualization at
different levels in data centers. It helps to achieve sustainable energy
efficient data centers to ensure that electrical consumption contributes
exceedingly little to the overall emission of greenhouse gases and implementing
sustainable businesses. |
Keywords: |
Data Centers; Data Center Performance; Energy Efficiency; Server Consolidation;
Virtualization Implementation |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
ENERGY-AWARE NODE PLACEMENT IN WIRELESS SENSOR NETWORK USING ACO |
Author: |
RABINDRA KU JENA |
Abstract: |
The recent popularity of applications based on wireless sensor networks (WSN)
provides a strong motivation for pursuing research in different dimension of WSN.
Node placement is an important task in wireless sensor network and is a
multi-objective combinatorial problem. A multi-objective ACO (Ant Colony
Optimization) algorithm based framework has been proposed in this paper. The
framework optimizes the operational modes of the sensor nodes along with
clustering schemes and transmission signal strengths. |
Keywords: |
Network Configuration, Sensor Placement, Wireless Sensor Networks, ACO |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
THE MISSILE TARGET EXTRACTION IN ULTRAVIOLET IMAGES WITH NOISE AND BURST
INTERFERENCES |
Author: |
GAO QINA, ZHU YIING, ZOU PING |
Abstract: |
Though ultraviolet warning systems are working at sun-blind wave-band, while
this paper reveals that in the ultraviolet (UV) images of the systems for
missile approaching, there exist strong noise and burst interferences coming
from UV CCD electronic sensors and high gain amplifiers. The CCD interferences
can not be effectively removed by classical 2-D filtering algorithms, while they
will influence the detection of the missile target in the ultraviolet images. To
solve the problem, unchanging the current hardware structure of UV CCD
electronic sensors, this paper develops a 3-D filtering algorithm for imaging
sequence based on a 3-D recursive filter, which is stable and it extracts the
missile target clearly. The proposed 3-D recursive filter composes of a 2-D
spatial-filtering IIR and 1-D time-filtering IIR, both are stable. The stability
test algorithms are provided. The proposed 3-D recursive filter is of much less
computation amount UV image sequences and it can realize fast and real-time
image filtering. Simulation experiments of UV image processing have shown that
the proposed 3-D filtering and related algorithms are correct effective and
pragmatica1. |
Keywords: |
Ultraviolet Image; Burst Interference; 3D Recursive Filtering; Missile Target
Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
AUTOMATIC SELECTION OF FILTERING DEVICES IN A DISTRIBUTED INTRUSION PREVENSION
SYSTEM |
Author: |
ELMEHDI BENDRISS, BOUBKER REGRAGUI |
Abstract: |
We presented in a previous article [1] a distributed intrusion prevention system
based on honeypots for collecting malicious data. Among important questions to
handle there is the choice of filtering device on which a filtering rule has to
be applied. In this paper we propose a solution which will allow automatic
selection of filtering device in the distributed IPMS platform. These devices
will be configured to block unauthorized traffic. This solution must ensure full
integration with the IPMS architecture |
Keywords: |
Intrusion Prevention System (IPS), Distributed System, Network Sensors, Network
Filtering |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
Title: |
EFFICIENT TECHNIQUE FOR THE CLASSIFICATION OF SATELLITE IMAGES USING FUZZY RULE
CLASSIFIER |
Author: |
S.PRABHU, DR.D.TENSING |
Abstract: |
The proposed technique is used classify the satellite image into barren land,
vegetation area, building area and road area. Initially, the satellite image is
pre-processed and then is then segmented to have segments of barren land,
vegetation area, building area and road area. The featuresof the segmented area
are extracted and then final classification is carried out using fuzzy rule
classifier. In the result section, classified output satellite images obtained
are shown and proposed technique is evaluated by means of accuracy parameter.
The accuracy obtained is high having an average of 92.56%. We also compare to
normal graph cut and from the results, it is proved that our proposed technique
using modified graph cut have obtained better results. |
Keywords: |
Remote sensing, Multispectral satellite image, Clustering, Classification,
Modified Graph cut segmentation, Fuzzy Classifier. |
Source: |
Journal of Theoretical and Applied Information Technology
July 2013 -- Vol. 53. No. 2 -- 2013 |
Full
Text |
|
|
|