|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2010 | Vol. 19. No.2 |
Paper ID: |
1296 -JATIT-2K10 |
Title: |
RETRIEVING USE CASE DIAGRAM WITH CASE-BASED REASONING APPROACH |
Author: |
B. SRISURA, Dr. J. DAENGDEJ |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
Due to the difficulty of recalling the semi-structure form of use case diagram,
applying reusing approach to the requirement analysis process has been being
concerned as a complex task. Despite of this fact, there are relatively little
attentions found in the research community. Therefore, this paper proposes how
Case-Based Reasoning (CBR) – an approach solves new problem from recalling
experiences, can be effectively applied to support the use case diagram reuse.
In this research, the diagram retrieval method is designed to match the use case
diagram by considering two dimensions: use case and actor dimension and
relationship dimension. However, in order to present the significant accuracy
and practicality of the proposed method, a tool and five comparative sets–
including four various dimensional weights and one commercial tool were
carefully set up to test in an experiment. |
Keywords |
Diagram-Based Retrieval, Use Case Diagram Retrieval, Use case Reuse |
Full
Text |
|
Paper ID: |
1425 -JATIT-2K10 |
Title: |
ON ENERGY EFFICIENT DATA DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MOBILE
SINKS |
Author: |
NATARAJAN MEGHANATHAN, SUGAM K. SHARMA, GORDON W. SKELTON |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
We illustrate the effectiveness of using mobile sinks to obtain potential energy
savings for the sensors during data dissemination in wireless sensor networks.
The entire wireless sensor network is divided into two layers: the
resource-constrained sensor nodes forming the bottom layer and a mobile ad hoc
network of resource-rich sink nodes forming the top layer. Each sink node is
assigned a particular cluster of sensors to monitor and collect data. A sink
node moves to the vicinity of the sensor nodes (within a few hops) to collect
data. The collected data is exchanged with peer mobile sinks and can also be
transferred to a control center through multi-hop sink-to-sink data propagation.
The energy loss due to multi-hop data propagation in disseminating the data from
a sensor to the control center can be accounted to the sinks and not to the
sensors. We also illustrate the effectiveness of using just one mobile sink to
reduce energy consumption at the sensors in scenarios where one cannot afford to
use multiple mobile sinks. In such scenarios, the mobile sink directly transfers
the collected data to the control center. |
Keywords |
Energy Consumption, Mobility, Sensor Networks, Two-layer Architecture,
Simulation, Mobile Sinks |
Full
Text |
|
Paper ID: |
1434-JATIT-2K10 |
Title: |
COMPARITIVE STUDY ON VOLTAGE SAG COMPENSATION UTILIZING PWM SWITCHED
AUTOTRANSFORMER BY HVC |
Author: |
T. DEVARAJU, DR.M.VIJAYA KUMAR , DR.V.C.VEERA REDDY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
Custom Power devices like Dynamic voltage restorer and STATCOM are normally
employed as a solution for mitigation of power quality problems like voltage sag
and swell. In this paper new voltage sag compensators based on an
autotransformer and an IGBT switched by PWM technique and Hysteresis Voltage
Control (HVC) method are compared. These two schemes are able to recognize the
voltage sag condition quickly, and it can correct the correct the voltage by
boosting the input voltage during voltage sag events. Different voltage sag
events have been simulated by MATLAB/Simulink software. The results of
simulations verify the ability of both methods to mitigate voltage sag events. |
Keywords |
DVR, STATCOM, PWM Switching, Hysterisis Voltage Control, Voltage Sag |
Full
Text |
|
Paper ID: |
1433-JATIT-2K10 |
Title: |
DRY SLIDING WEAR BEHAVIOUR ANALYSIS OF NITRIDED 316LN GRADE AUSTENITIC STAINLESS
STEELS USING GAS NITRIDING PROCESS |
Author: |
RAM.SUBBIAH, Dr.R.RAJAVEL |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
The paper presents the results of an investigation into wear behaviour of gas
nitrided stainless steel. Stainless steel has a good corrosion resistance, where
they possess a low hardness, wear resistance. By case hardening the stainless
steel, the hardness can be increased. Surface hardness can be increased by
diffusion of carbon or nascent nitrogen. The gas nitriding is done at 450 – 5400
C for three different specimens. Nitriding is done in which hard complex
nitrides are formed which improves the surface hardness. Non treated austenitic
stainless steel specimen was used as a reference material. Wear test were also
carried out for comparision. The layers were characterized by optical
microscope, scanning electron microscope and XRD. Wear test were conducted to
characterize the tribological wear behaviour. |
Keywords |
Wear, Nitriding, Surface hardness, Stainless Steel, X-Ray diffraction |
Full
Text |
|
Paper ID: |
1435-JATIT-2K10 |
Title: |
A NEURO FUZZY CONTROLLER FOR INDUCTION MACHINES DRIVES |
Author: |
SRINIVASA RAO JALLURI , Dr.B.V. SANKER RAM |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
With the advent of recent power semiconductor technologies and various
intelligent control algorithms, an effective control method based on vector
control technology can be fully implemented in real-time application. DC motor
drives being the most widely used technique is slowly being replaced by
vector-control based high-performance IM drives. Over the last two decades
researchers have been working to apply AIC for induction motor drives in order
to contribute to this novel development we present a neuro fuzzy controller (NFC)
for the IM motor drive, which has the advantages of both FLC and ANN, is
presented in this paper |
Keywords |
Nfc, Im Drives, Induction Motor (Im), Low/Zero-Speed Operation, Sensorless
Control. |
Full
Text |
|
Paper ID: |
1295-JATIT-2K10 |
Title: |
MULTI LAYER INFORMATION HIDING -A BLEND OF STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY |
Author: |
JITHESH K , Dr. A V SENTHIL KUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
This study combines the notion of both steganography [1] and visual cryptography
[2]. Recently, a number of innovative algorithms have been proposed in the
fields of steganography and visual cryptography with the goals of improving
security, reliability, and efficiency; because there will be always new kinds of
threats in the field of information hiding. Actually Steganography and visual
cryptography are two sides of a coin. Visual cryptography has the problem of
revealing the existence of the hidden data where as Steganography hides the
existence of hidden data. Here this study is to suggest multiple layers of
encryption by hiding the hidden data. Hiding the hidden data means, first
encrypting the information using visual cryptography and then hide the
share/s[3] into images or audio files using steganography. The proposed system
can be less of draw backs and can resist towards attacks. |
Keywords |
Stenography, Visual Cryptography, Share, Discrete Cosine Transform(DCT) |
Full
Text |
|
Paper ID: |
1446-JATIT-2K10 |
Title: |
AN IMAGE ENCRYPTION APPROACH USING CHAOS AND STREAM CIPHER |
Author: |
ALIREZA JOLFAEI, 2ABDOLRASOUL MIRGHADRI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
In this paper, a novel image encryption scheme is proposed based on combination
of pixel shuffling and W7. Due to sensitivity to initial conditions, chaotic
maps have a good potential for designing dynamic permutation map. So a chaotic
Henon map is used to generate permutation matrix. An external secret key is used
to derive the initial conditions for the chaotic map and W7 secret key. Pixel
shuffling is performed via vertical and horizontal permutation. Shuffling is
used to expand diffusion in the image and dissipate the high correlation among
image pixels. In order to evaluate performance, the proposed algorithm was
measured through a series of tests. Experimental results illustrate that the
scheme is highly key sensitive and shows a good resistance against brute-force
and statistical attacks. |
Keywords |
Shuffling, W7, Henon Map, Permutation Matrix, Test |
Full
Text |
|
Paper ID: |
1451 -JATIT-2K10 |
Title: |
COMPETITIVE EQUILIBRIUM APPROACH FOR LOAD BALANCING A COMPUTATIONAL GRID WITH
COMMUNICATION DELAYS |
Author: |
K SHAHU CHATRAPATI, J UJWALA REKHA, DR. A. VINAYA BABU |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
Computational grids interconnect hundreds of heterogeneous computing resources
from geographically remote sites, designed to meet the large demands of many
users from scientific and business domains. A job initiated at one site can be
executed by any of the computing resources. Therefore, response time of a job
includes processing delay at the site of execution and communication delay for
transferring the job from the site of initiation to the site of execution. Load
balancing is allocation of jobs to available resources so as to optimize a given
objective function. The objective can be achieving a system optimal solution,
which tries to minimize the mean response time of all users or an individual
optimal solution which tries to minimize each user’s response time. Previous
works on load balancing either considered only system optimal objective or
individual optimal objective. This paper introduces competitive equilibrium
solution, a pricing mechanism for load balancing that independently and
simultaneously achieves both system optimal objective and individual optimal
objective. |
Keywords |
Computational Grid, Competitive Equilibrium, Nash Equilibrium, Cooperative Load
Balancing, Non Cooperative Load Balancing |
Full
Text |
|
Paper ID: |
1464-JATIT-2K10 |
Title: |
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER
TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS |
Author: |
JAMES SIMS, NATARAJAN MEGHANATHAN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
A mobile ad hoc network (MANET) is a network of mobile devices that continuously
restructure their topology due to mobility. Proposals on tree-based routing
versus mesh-based routing protocols have shown that mesh-based multicast routing
gives improved results for MANETs. The main reason for this is because trees are
highly susceptible to failure due to frequent mobility. This paper will look at
the developing a mesh from two different structures: a shortest path tree and a
minimum Steiner tree. In each of the two cases, we extend a tree to a mesh by
incorporating edges, which exist in the network graph, between any two
constituent nodes of the tree. The goal is to look and determine how the
implementation of these two structures can affect the overall performance of the
multicast mesh and derive theoretical |
Keywords |
Keywords: Mobile Ad hoc Networks, Shortest Path Trees, Minimum Steiner Trees,
Stability, Multicast, Mesh |
Full
Text |
|
Paper ID: |
1478-JATIT-2K10 |
Title: |
RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY |
Author: |
M. AYMAN AL AHMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 19. No. 2 -- 2010 |
Abstract |
Software development methodology is a formalized approach that is used to plan
and manage the process of developing a software system. Since there are many
software development methodologies, one of the challenges faced by software
developers is to decide which methodology to apply in a software project. This
paper presents the modeling and development of a prototype expert system that
helps software project managers and software engineers in selecting the
appropriate software development methodology. The developed system is
successfully designed as rule based expert system supported with object oriented
modeling. The user interaction with the system is based on a user-friendly
graphical interface. |
Keywords |
Software Development Methodology, Expert System, Rule Based Expert System,
Object Oriented Modeling |
Full
Text |
|
|
|