|
Journal of Theoretical and Applied Information Technology
31st March 2008 | Vol. 4 No.
3 |
Title: |
TEST CASE PRIORITIZATION |
Author: |
Praveen Ranjan Srivastava |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
Test case prioritization techniques
involve scheduling over test cases in an order that improves the performance of
regression testing. It is inefficient to re execute every test cases for every
program function if once change occurs. Test case prioritization techniques
organize the test cases in a test suite by ordering such that the most
beneficial are executed first thus allowing for an increase in the effectiveness
of testing. One of the performance goals i.e. the fault detection rate, is a
measure of how quickly faults are detected during the testing process. In this
paper I present a new test case prioritization algorithm, which calculates
average faults found per minute. I present the results illustrating the
effectiveness of algorithm with the help of APFD metric. The main aim of my
paper is to determine the effectiveness of prioritized and non-prioritized case
with the help of APFD. |
|
Full Text |
|
|
|
Title: |
COMPREHENSIVE PERFORMANCE ANALYSIS OF
UNIFIED COMMUNICATIONS TECHNOLOGY |
Author: |
Dr.S.S.Riaz Ahamed |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
Unified communications encompasses a broad
range of technologies and many potential applications. With unified
communications, subscribers reduce the number of places they must check for
incoming voice, fax, e-mail messages, and other media types. From a single
interface, they can check for all messages. Unified communications encompasses
all forms of call and multimedia/cross-media message-management functions
controlled by an individual user for both business and social purposes. This
includes any enterprise informational or transactional application process that
emulates a human user and uses a single, content-independent personal messaging
channel (mailbox) for contact access. |
|
Full Text |
|
Title: |
STEGANOGRAPHY: A NEW HORIZON FOR SAFE
COMMUNICATION THROUGH XML |
Author: |
Aasma Ghani Memon, Sumbul Khawaja and
Asadullah Shah |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
XML is a universal, platform independent
language that describes the way, information can be stored, transferred and
exchanged electronically. Any user on internet can access these XML documents &
manipulate the information contents. Security is the prime concern in XML
documents. Different security measures can be employed to ensure the integrity &
confidentiality of XML data. Information hiding can be applied in XML documents
which constitutes towards the field of steganography. Steganography is the art
and science of hiding information by embedding messages within other messages so
that unauthorized users can not access the information. This paper provides a
new horizon for safe communication through XML on Internet. XML steganography is
a solution which makes it possible to send news and information without being
altered and without the fear of the messages being intercepted and traced back
to sender. Different steganographic techniques have been designed which ensures
that the integrity and confidentiality of data is maintained in XML documents.
XML files can be secured by applying these techniques separately or by combining
them. |
|
Full Text |
|
Title: |
INTELLIGENT CONTROLLER BASED IMPROVED
FAULT RIDE-THROUGH CAPABILITY OF HVDC SYSTEM CONNECTED TO WEAK AC GRID |
Author: |
Vinod Kumar, R. R. Joshi, R. C. Bansal |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
In the paper, a novel HVDC transmission
system operating with weak ac system has been modeled with speed and precision &
analyses the control strategy & performance of system, which is controlled using
fuzzy. The system can feed a weak or even dead network under fluctuations and
big variations of the input power. The fuzzy logic-based control of the system
helps to optimize the efficiency of the link under various disturbances. This
model provides the basic building blocks found in a typical HVDC system that can
be used to build models for individual users own models. The specific
contributions, in this paper are that a DQ- type of phase-locked-loop for
synchronizing the firing pulses to the HVDC converter has been presented. This
gate-firing unit is capable of a providing a clean sinusoidal synchronizing
voltage from a polluted and harmonic distorted commutation voltage. The
simulations based on PSCAD/EMTDC show that proposed fuzzy logic based HVDC
system can operate steadily, has the capability to restore steadily when short
circuit fault occurs, and obvious in advantages. |
|
Full Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF
POLYHEDRON AS A PRIMITIVE TO REPRESENT 3D SPATIAL OBJECT |
Author: |
Mr.N.Subhash Chandra, Dr. A.Govardhan |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 | ;
Abstract |
Spatial objects of our world have an
intrinsic three-dimensional (3D) nature; 3D data modeling and 3D data management
have been neglected in spatial database systems and Geographical Information
Systems, which map geometric data mainly to two-dimensional abstractions. But
increasingly the third dimension becomes more and more relevant for application
domain like pollution control, water supply, soil engineering, urban planning
and aviation.
Spatial-DBMSs were chosen to store spatial data, because they could guarantee
the safety of the data (in 2D). But with the arrival of applications depending
upon correct 3D data, the present techniques do not suffice. The solution for
this problem is to implement a real 3D primitive, including functions that e.g.
return the volume or the distance between objects in 3D and validation
functions. This improves the maintainability of 3D Spatial-datasets .3D Spatial
objects are stored with the polyhedron as (3D) primitive. The proposed primitive
is easy for users to model objects, can easily validated, because the algorithms
are not too difficult to implement and still result in realistic objects. |
|
Full Text |
|
Title: |
OPTIMAL CAPACITOR PLACEMENT USING
FUZZY AND REAL CODED GENETIC ALGORITHM FOR MAXIMUM SAVINGS |
Author: |
M. Damodar Reddy |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
This paper presents a new methodology
using fuzzy and Real Coded Genetic Algorithm (RCGA) for the placement of
capacitors on the primary feeders of the radial distribution systems to reduce
the power losses and to improve the voltage profile. A two-stage methodology is
used for the optimal capacitor placement problem. In the first stage, fuzzy
approach is used to find the optimal capacitor locations and in the second
stage, Real Coded Genetic Algorithm is used to find the sizes of the capacitors.
The sizes of the capacitors corresponding to maximum annual savings are
determined. The proposed method is tested on 15-bus, 34-bus and 69-bus test
systems and the results are presented. |
|
Full Text |
|
Title: |
PERFORMANCE ANALYSIS OF PIEZORESISTIVE
MEMS FOR PRESSURE MEASUREMENT |
Author: |
M. Z. Shaikh, Dr. S.F. Kodad, Dr. B. C.
Jinaga, |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
The paper describes the performance
analysis and of design piezoresistive pressure sensorusing simulation technique.
The piequ resistors are arranged in the wheat stone bridge configuration to
achieve higher voltage sensitivity and low temp sensitivity The MFMS has been
designed and simulated using MATLAB.This paper also discuses the simulations and
the response from the MEMS. |
|
Full Text |
Title: |
EVALUATION OF STEGANOGRAPHY FOR URDU
/ARABIC TEXT. |
Author: |
Jibran Ahmed Memon, Kamran Khowaja,
Hameedullah Kazi |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
Establishing hidden communication and conveying information secretly has been of
interest since long past ago. One of the methods introduced for establishing
hidden communication is steganography. Methods of steganography have been mostly
applied on images, audios, videos and text while the major characteristic of
these methods are to change in the structure and features so as not to be
identifiable by human users. Text documents have been widely used since very
long time ago. Therefore, different methods of hiding information in texts (text
steganography) are witnessed from the past to the present. In this paper a new
approach for steganography in Arabic and Urdu texts is introduced. Considering
the existence of harakaat/Araabs i.e. Fatha, Kasra, and Damma in Arabic and Urdu
phrases, in this approach, by using Reverse Fatha, information is hidden in the
texts. This approach can be categorized under feature coding methods. This
method can be used for Arabic/Urdu Watermarking. |
|
Full Text |
Title: |
HOTTEST SPOT AND LIFE EVALUATION OF
POWER TRANSFORMER DESIGN USING FINITE ELEMENT METHOD |
Author: |
Ankireddypalli S. Reddy, Dr M. Vijaykumar |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
Power transformers represent the largest
portion of capital investment in transmission and distribution substations. In
addition, power transformer outages have a considerable economic impact on the
operation of an electrical network. One of the most important parameters’
governing a transformer’s life expectancy is the hot-spot temperature value. Due
to under estimation of stray losses in power transformer hot spots are formed.
So the stray loss evaluation is an essential aspect to calculate hot spot
temperature. The stray losses in transformer is caused by the time variable
leakage flux which induces emf’s & circulates eddy currents in the winding
conductors and other conducting parts of transformer like tank wall, core,
clamps etc.. Evaluation of stray losses can be done more accurately by Finite
Element Method (FEM). This paper presents the new and more accurate temperature
calculation methods taking into account the above mentioned findings to estimate
life of transformer form hot spot temperature. |
|
Full Text |
Title: |
ALIGNING TECHNOLOGY WITH BUSINESS AN ANALYSIS OF THE IMPACT OF SOA ON
OUTSOURCING |
Author: |
BENAZEER Md. Shahzada; VERELST Jan;
GREMBERGEN Van Wim; MANNAERT Herwig |
Source: |
Journal of Theoretical and Applied
Information Technology 2008 |
Abstract |
Business related IS / IT innovation is
changing very rapidly. There are so many new technologies introduced by the
academic and practitioner community that the business community is very puzzled
and it is very difficult for them to decide, which one to accept and which one
to reject. We think that SOA architectural design has all the characteristics
which the business community desires for long. We also think that SOA is a
solution which can align the technology with business objectives. Adopting SOA,
can bring uniformity in IS / IT department which can also lead to enhanced
outsourcing. |
|
Full Text |
|
|
|
|