|
Journal of Theoretical and Applied Information Technology
30th September 2008 | Vol. 4 No. 9 |
Title: |
POSTURE RECOGNITION USING
CORRELATION FILTER CLASSIFIER |
Author: |
Nooritawati Md Tahir, Aini
Hussain, Salina Abdul Samad and Hafizah |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
In this paper, we described
an innovative methodology of recognizing four main postures namely standing,
sitting, bending and lying position using correlation filter particularly
Unconstrained Minimum Average Correlation Energy (UMACE). Initial results prove
the UMACE filters offer significant potential in posture recognition task. The
filter was subjected to a challenging task to recognize human posture without
any restriction on the gender, clothing and posture variations. Classification
outcome confirm the UMACE filter performs remarkably well with an average
accuracy of 85%. |
|
Full Text |
|
Title: |
Implementation of Neural Network in Energy Saving of Induction Motor Drives
with Indirect Vector Control |
Author: |
A. K. Sharma, R. A. Gupta,
Laxmi Srivastava |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
Induction motors are
extensively used in industrial and household appliances consume about 54% of the
total consumed electrical energy. The need for energy conservation is increasing
the requirements for saving the electrical energy. It is therefore important to
optimize the efficiency of motor drive systems if significant energy savings are
to be obtained. This paper proposes a new control scheme based on artificial
neural networks taking advantage of Nola theory which states that at a certain
torque and speed operating point there exist only one set of voltage amplitude
and frequency that operates the machine at optimum efficiency |
|
Full Text |
|
Title: |
OCATLO: AN ONLINE COURSE
AUTHORING TOOL USING LEARNING OBJECTS |
Author: |
Salah Hammami and Hassan
Mathkour |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
This paper presents the
development of bilingual e-learning system and reports on its usability on a set
of computing courses according to a specific e-content development methodology.
The system is organized into five layers. The selection of layers and their
inter-dependencies is intended to make the functional responsibility clearer and
to cover all of the e-learning functional components. The tool is equipped with
a tracking system to observe users' learning activities in real-time by
monitoring the major possible number of behavioral aspects. The tool can be used
for Arabic or English e-contents, or a mix of the two languages. It has been
used in various computing courses where it has been proven helpful to students
and teachers alike. |
|
Full Text |
|
Title: |
GENETIC ZONE ROUTING
PROTOCOL |
Author: |
Sateesh Kumar, S.
Ramachandram |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
Zone Routing Protocol (ZRP)
is a most promising and widely accepted and well proved hybrid routing protocol
in Mobile Ad-hoc Networks (MANETs) for its performance when compared with
table-driven and on-demand protocols. Our study is based on using the concept of
genetic algorithms to provide a set of available paths to the destination in
order to load balance the network. This gives us the reduction in overhead and
better delivery of packets. We call this new routing protocol as Genetic Zone
Routing Protocol (GZRP). |
|
Full Text |
|
Title: |
SOME CLUSTERING ALGORITHMS
TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM |
Author: |
Mrutyunjaya Panda,
Manas Ranjan Patra |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
Most current intrusion
detection systems are signature based ones or machine learning based methods.
Despite the number of machine learning algorithms applied to KDD 99 cup, none of
them have introduced a pre-model to reduce the huge information quantity present
in the different KDD 99 datasets. Clustering is an important task in mining
evolving data streams. Besides the limited memory and one-pass Constraints, the
nature of evolving data streams implies the following requirements for stream
clustering: no assumption on the number of clusters, discovery of clusters with
arbitrary shape and ability to handle outliers. Traditional instance-based
learning methods can only be used to detect known intrusions, since these
methods classify instances based on what they have learned. They rarely detect
new intrusions since these intrusion classes has not been able to detect new
intrusions as well as known intrusions. In this paper, we propose some
clustering algorithms such as K-Means and Fuzzy c-Means for network intrusion
detection. The experimental results obtained by applying these algorithms to the
KDD-99 data set demonstrate that they perform well in terms of both accuracy and
computation time.
|
|
Full Text |
|
Title: |
SOM BASED STOCK INDEX
PERFORMS BETTER THAN NSE-50 INDEX |
Author: |
Asif Ullah Khan, T. K.
Bandopadhyaya, Sudhir Sharma |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
It is always a difficult
task to select stocks that are suitable for a portfolio. The main aim of every
investor is to earn maximum possible returns on investment. There are many
criteria behind picking stocks like, price-earnings ratio, price book ratio,
price sales ratio, price cash flow ratio, and market capitalization. The main
issue with any approaches is the proper weighting of criteria to obtain a list
of stocks that are suitable for a portfolio. This paper proposes an improved
method for stock picking using self-organizing maps. The best of the portfolio
constructed by self-organizing maps outperformed the NSE-50 Index by about
14.88% based on one and half month of stock data. |
|
Full Text |
|
Title: |
REVIEW AND IMPLICATIONS OF
TIME DIVISION MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ENVIRONMENT SERVICES AND
APPLICATIONS |
Author: |
Dr.S.S.Riaz Ahamed |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
Time division multiple
access (TDMA) is a channel access method for shared medium (usually radio)
networks. It allows several users to share the same frequency channel by
dividing the signal into different timeslots. The users transmit in rapid
succession, one after the other, each using his own timeslot. This allows
multiple stations to share the same transmission medium (e.g. radio frequency
channel) while using only the part of its bandwidth they require. TDMA is used
in the digital 2G cellular systems such as Global System for Mobile
Communications (GSM), IS-136, Personal Digital Cellular (PDC) and iDEN, and in
the Digital Enhanced Cordless Telecommunications (DECT) standard for portable
phones. It is also used extensively in satellite systems, and combat-net radio
systems. TDMA is the only technology that offers an efficient utilization of
hierarchical cell structures (HCSs) offering pico, micro, and macrocells. HCSs
allow coverage for the system to be tailored to support specific traffic and
service needs. By using this approach, system capacities of more than 40-times
AMPS can be achieved in a cost-efficient way.Because of its inherent
compatibility with FDMA analog systems, TDMA allows service compatibility with
the use of dual-mode handsets. |
|
Full Text |
|
Title: |
THE EFFECTS OF GLOBAL
POSITIONING SYSTEM FOR RELIABLE POSITIONING, NAVIGATION AND TIMING SERVICES |
Author: |
Dr.S.S.Riaz Ahamed. |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
The Global Positioning
System (GPS) is a U.S. space-based radionavigation system that provides reliable
positioning, navigation, and timing services to civilian users on a continuous
worldwide basis -- freely available to all. GPS provides specially coded
satellite signals that can be processed in a GPS receiver, enabling the receiver
to compute position, velocity and time. Basically GPS works by using four GPS
satellite signals to compute positions in three dimensions (and the time offset)
in the receiver clock. GPS provides accurate location and time information for
an unlimited number of people in all weather, day and night, anywhere in the
world. Anyone who needs to keep track of where he or she is, to find his or her
way to a specified location, or know what direction and how fast he or she is
going can utilize the benefits of the global positioning system. Everyday
activities such as banking, mobile phone operations, and even the control of
power grids, are facilitated by the accurate timing provided by GPS. |
|
Full Text |
|
Title: |
Wireless Security: A comparative Analysis for the Next generation networks |
Author: |
D.V. Chandra Shekar, V.V.
Jayarama Krishnaiah, Suresh Babu Yalavarthi
|
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
New wireless technologies
such as WiMAX, NFC and ZigBee are rapidly being adopted, along with existing
wireless standards such as Bluetooth, Wi-Fi, GSM and other cellular
technologies. Bluetooth and Wi-Fi have already become notorious for severe
security shortcomings during their relatively brief existence. New
vulnerabilities and exploits are reported and demonstrated every week on live
public networks. The credibility of these wireless technologies has been damaged
by security incidents, stemming from fundamental problems in requirement
gathering, implementation quality and protocol design. Despite boasts of
hardened security measures, security researchers and black-hat hackers keep
humiliating vendors. On the other hand, GSM and various descendant technologies
have been almost 100 percent free of security incidents. What can be done to
avoid making the same mistakes all over again with new emerging wireless
technologies such as WiMAX? What is the anatomy and evolution behind security
problems, and why have some cellular technologies been almost problem-free? This
paper draws from the past and current state of existing wireless technologies
and reflects experiences with emerging technologies. It describes how
robustness-testing techniques can be used to assess the security of the
available implementations and give statistics about the current state of affairs
of Bluetooth and Wi-Fi. Quality and reliability improvements in these
implementations will lead directly to decreased development and deployment
costs, as well as increased public acceptance and faster adoption. |
|
Full Text |
|
Title: |
THE EFFECTIVENESS OF
INTERACTIVE INSTRUCTION CD DESIGNED THROUGH THE PRE-SCHOOL STUDENTS |
Author: |
Suzan Duygu Eristi |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
The current study focuses on
the effectiveness of interactive instruction CDs which was designed for
pre-school students. Sixty-seven second grade students who were taking “Computer
Teaching in Pre-School Education” at Anadolu University, Education Faculty, and
Department of Pre-school Education participated in the current study. The data
were collected in the fall semester of 2006. The data collection procedure
lasted for 14 weeks. “Computer Aided Instructional Tool Evaluation Scale” was
developed to analyze the current data. The aim of the scale instrument is to
determine the effectiveness of interactive instruction CDs designed for the
pre-school students. Descriptive survey was used to examine the resulting
opinion of the students. For the research question, Arithmetic Mean (X),
Frequency (f) and percentage (%) scores was used. |
|
Full Text |
|
Title: |
ONTOLOGY-DRIVEN ANNOTATION
AND ACCESS OF PRESENTATION VIDEO DATA |
Author: |
Aijuan Dong, Honglin Li |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
The tremendous growth in
video data calls for efficient and flexible access mechanisms. In this paper, we
propose an ontology-driven framework for presentation video annotation and
access. The goal is to integrate ontology into video systems to improve users’
video access experience.
To realize ontology-driven video annotation, the first and foremost step is
video segmentation. Current research in video segmentation has mainly focused on
the visual and/or auditory modalities. In this paper, we investigate how to
combine visual and textual information in the hierarchical segmentation of
presentation video data. With average F-scores over 0.92, our experiments show
that the proposed segmentation procedure is effective.
After a video is segmented, video annotation data can be extracted. To extract
annotation data from a video and its segments, and to organize them in a way
that facilitates video access, we propose a multi-ontology based multimedia
annotation model. In this model, a domain-independent multimedia ontology is
integrated with multiple domain ontologies. The goal is to provide multiple,
domain-specific views of the same multimedia content and, thus, better address
different users’ information needs.
With extracted annotation data, ontology-driven video access explores domain
knowledge embedded in domain ontologies and tailors the video access to the
specific needs of individual users from different domains. Our experience
suggests that ontology-driven video access can improve video retrieval relevancy
and, thus, enhance users video access experience. |
|
Full Text |
|
Title: |
PERFORMANCE ANALYSIS OF
18-PULSE AC-DC CONVERTER FED VECTOR CONTROLLED INDUCTION MOTOR DRIVE (VCIMD) |
Author: |
R.A.Gupta, Rajesh Kumar,
Bharat Bhushan Jain |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
In this paper, design of
novel autotransformer based 18-pulse Ac-Dc Converter fed vector controlled
induction motor drive is discussed and its Matlab/Simulink model is also given.
The design procedure for proposed autotransformers shows the flexibility in the
design for making it a cost effective replacement suitable for retrofit
applications, where presently a six-pulse diode bridge rectifier is used. Using
the above designs we can capable to suppress harmonics up to 13th in 18-pulse
configuration of the VCIMD. Various simulation results are given for
autotransformer and VCIMD in topology C and D. THD analysis at No load and Load
is also done. |
|
Full Text |
|
Title: |
A MULTIPLATFORM CONTENT
MANAGEMENT SYSTEM FOR CURATORS TO PROVIDE TEACHING MATERIALS IN ASTRONOMY
EDUCATION |
Author: |
Mayu Kondo, Katsuhiro Mouri,
Takami Yasuda |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
Since it is difficult for
curators who are not information field specialists to provide teaching materials
on the Internet, we built a content management system to support the delivery of
teaching materials on the Internet. Specifically, our system, which allows
correspondence between various platforms, considers the distribution method of
teaching materials in cooperation with an actual planetarium program. As a
result, curators effectively utilized the Internet and distributed teaching
materials. To clarify the usefulness of this research, the curators of the
Nagoya City Science Museum used and evaluated the system. |
|
Full Text |
|
Title: |
An Enhanced and Secure
Protocol for Authenticated Key Exchange |
Author: |
M.V.Siva Prasad Dr. A.Vinaya
Babu G.Satyanarayana |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
An enhanced authentication
key exchange protocol was proposed to exchange multiple session keys between two
participants at a time. This paper shows that this enhanced protocol is insecure
under the known session key attack, known long-term private key attack,
signature forgery attack, and replay attack. This paper also proposes an
enhanced and secure key agreement protocol for exchanging multiple session keys
in one run of the protocol. The protocol is secure against the attacks mentioned
above. Besides, a formal proof is given to guarantee the security of the
proposed protocol under other potential attacks. |
|
Full Text |
|
Title: |
A PROPOSED EXPERT SYSTEM FOR
GUIDING FRESHMAN STUDENTS IN SELECTING A MAJOR IN AL-AZHAR UNIVERSITY, GAZA |
Author: |
Samy S. Abu Naser, Mohammed
H. Baraka, AbdulRahman Baraka |
Source: |
Journal of Theoretical and
Applied Information Technology 2008 |
Abstract |
In this paper we will
present the design and development of a proposed expert system that aims to
improve the method of selecting the best suitable faculty/major for student
planning to be enrolled in Al-Azhar University. The basic idea of our approach
is designing a model for testing and measuring the student capabilities like
intelligence, understanding, comprehension, mathematical concepts and others,
and applying the module results to a rule-based expert system to determine the
compatibility of those capabilities with the available faculties/majors in Al-Azhar
University. The result is shown as a list of suggested faculties/majors that are
most suitable with the student capabilities and abilities. |
|
Full Text |
|
|
|
|