|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2017 | Vol. 95 No.3 |
Title: |
MULTI CROSS PROTOCOL WITH HYBRID TOPOGRAPHY CONTROL FOR MANETS |
Author: |
PRANAVI.KOLAGANI, K.ADITYA, N.VENKATESH, Dr.K.V.D.KIRAN |
Abstract: |
Gadgets in Mobile Ad Hoc Circuitrys (MANETs) are for the most part fuelled by
clump. Since the clump limit is settled, a few procedures to spare vitality at
the gadget unfluctuating or at the convention stack ought to be connected to
upgrade the MANETs endurance. In this theory, we have proposed a couple vitality
sparing methodologies at the system lamina, and MAC lamina. To start with, we
proposed a directing method, to which the accompanying measurements are
incorporated with: (i) hub endurance, (ii) greatest point of confinement on the
quantity of associations with a goal, and (iii) mercurial hauling power. In this
procedure, we ruminate another outlay cadent which ruminates the remaining clump
force and vitality utilization progression in processing the endurance of a hub.
To miniaturize the overutilization of a hub, an upper obligated is determined to
the quantity of associations that can be built up to a goal. The anticipated
procedure is contrasted and AODV and LER [2]. It beats AODV and LER regarding
system endurance. Next, a strategy called Multi Cross Lamina Placed Topography
Control with Sleep Organizing (MCLBTC) is planned. It utilizes the element of
both topography control accession in which the hauling force of a hub is
diminished, and control administration accession in which hubs are put to rest
contingency. We watched that the system endurance in MCLBTC is ruminatably
improved. |
Keywords: |
Mobile Adhoc Networks, Medium Access Control, Topography Control, Utilization,
Quality Of Associations |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
SUPER-PIXEL BASED SALIENCY IN 3D-IMAGE OBJECT DETECTION USING CONTENT BASED
IMAGE RETRIEVAL |
Author: |
RAKESH Y, DR. K. SRI RAMA KRISHNA |
Abstract: |
Visual attention is an important factor in the Human Visual System (HVS) based
method for the process of Information processing in visual media. Lots of visual
information is provided by the HVS system, from which it would particularly
process the wanted object or simply salient object by adding filtering
techniques and also it lowers the level of complexity in the process of scene
analysis. Content-based image retrieval is one of the major processes in visual
processing technique. CBIR is used to identify the most similar images that are
visually seen in response to the given set of query image from the huge contents
of image database. Many techniques have been introduced so far in saliency
detection of 3D images that are used by various multimedia and CBIR processing
systems. In this paper, an efficient image retrieval algorithm is designed based
on the Super-pixel based saliency detection. This aims at providing a successful
method of saliency detection in 3D objects, which are the major process in CBIR
applications. The Experimental results and verification of object tracking from
this saliency detection method is visibly efficient than the all other methods
as it provides super pixel generation in the objects and its contents. |
Keywords: |
Content Based Image Retrieval (CBIR), Human Visual System (HVS), Region of
Interest (ROI), Simple Linear Iterative Clustering (SLIC). |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
BUILDING AN ASSISTANT MOBILE APPLICATION FOR TEACHING ARABIC PRONUNCIATION USING
A NEW APPROACH FOR ARABIC SPEECH RECOGNITION |
Author: |
BASSEL ALKHATIB, MOUHAMAD KAWAS, AMMAR ALNAHHAS, RAMA BONDOK, REEM KANNOUS |
Abstract: |
The Arabic language is characterized by its vocal variations. Making its
pronunciation a difficult task for Arabic learners. In this paper, we show how
we built a mobile application that can detect mispronounced words and guide the
user to the correct pronunciation. Foreigners and children can learn Arabic
pronunciation in a friendly manner using our application. Our mobile application
is customized to help them learn The Holy Quran recitation in particular.
The process of the application compares the user sound (sound signal) of a
single word with the set of correct recordings of this word pronunciation. This
paper proposes the use of MFCC features to extract features from the speech
signal. It also demonstrates the use of a modified version of DTW algorithm to
compare the features of the user and the teacher. |
Keywords: |
Mispronunciation Identification System, Mel-Frequency Cepstrum Coefficients,
Dynamic Time Warping, Speech recognition. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
HOW SIGNIFICANT IS THE INDIVIDUAL DIFFERENCES IN FINGER BASED GESTURES ON
SMARTPHONES TOUCH-SCREEN FOR USER IDENTIFICATION? |
Author: |
SULEYMAN AL-SHOWARAH |
Abstract: |
This paper analyses the variations in the identification power among set of four
features, namely Signature Precision (SP), Finger Pressure (FP), Movement Time
(MT), and Speed that were extracted from finger gesture of touch-screens. The
differences across users were studied using the above features individually and
combined for the purpose of user identification based on the Euclidean distance
and the k-nearest neighbour classifier. The paper investigates the performance
variations across users using a dataset of 50 users, and concludes that the
discrimination power of different feature is heavily user dependant i.e. while
some features achieve 100% identification accuracy for some users, they perform
poorly for others. On small smartphone 19% and on mini-tablet 42% of the users
have unique FP compared to other features. We concluded that FP could be used
alone to perfectly identify users for 100% accuracy. |
Keywords: |
User Identification, Security Of Touchscreen Patterns Based Unlock Systems,
Smartphones. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
DESIGN MODEL INTEGRATION AND SYNCRONIZATION BETWEEN SURVEILLANCE UNITS TO
SUPPORT DATA WAREHOUSE EPIDEMIOLOGY |
Author: |
SLAMET SUDARYANTO NURHENDRATNO., FIKRI BUDIMAN, SUDARYANTO |
Abstract: |
Data monitoring outbreaks of disease in a region and specific populations
(epidemiology) requires the support of an integrated data from all related
surveillance unit. The integration of data between surveillance units (health
centers, polyclinics, hospitals) must be design and good properly managed so as
to enable health leaders and analysts to acquire, integrate, analyze and monitor
the data (cases of the disease) from different data sources. The source data
comes from a heterogeneous system, in this case the data source is a
distribution surveillance units. To facilitate the management of surveillance
data will be in the design of the data center in the model epidemiological data
warehouse so as to form an integrated surveillance system (ISS). The problem
faced is related to interoperability, ie the ability to integrate and
synchronize data from different systems platforms (heterogeneous). Thus we need
a methodology of integrating data in XML model into the epidemiological data
warehouse. Since XML becomes a standard for data exchange over internet,
especially in the B2B and B2C communication is needed integration system with
the model XML data into the data warehouse. In this study we describe the design
of a model of integration and synchronization between surveillance unit in the
method SOA-based web services architecture. Metode yang digunakan adalah XML Web
Services, sebuah metode yang dapat mengintegrasikan aplikasi dan pertukaran data
dalam format XML (Extensible Markup Language). Exchange data in XML format using
the technology SOAP (Simple Object Access Protocol) and WSDL (Web Services
Description Language) and using the library NuSOAP. |
Keywords: |
Epidemilogy, Data Warehouse, Integration, Synchronization, XML,SOA, WebServices. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
HYBRID ZIGBEE RFID FOR DETECTION OF ACTIVE TAGS AND ENERGY MINIMIZATION |
Author: |
S.BAGIRATHI, Dr.SHARMILA SANKAR, Dr.SANDHYA |
Abstract: |
Radio Frequency Identification (RFID) is the wireless use of electromagnetic
fields to transfer data for the purpose of automatically identifying and
tracking tags attached to objects. These tags contain electronically stored
information and each tag has a unique identification number. RFID can support
automatic information tracing and management during the identification process
in many fields. Minimization of energy in RFID active tags plays a vital role in
RFID management system. We propose a hybrid method for energy minimization using
Zigbee integrated with RFID. The combination of RFID and ZigBee can be done with
a very simple set up and it can manage all the data transmissions with very few
bytes. Zigbee is used because it is a low power device and operates in beacon
mode. Zigbee coordinator is responsible for managing and controlling the entire
system. It transmits the data received by one reader to another thus eliminating
redundant tag information from all the readers. Collision among tags is
minimized thus increasing the throughput of the system. |
Keywords: |
RFID, Zigbee, coordinator, beacon, slotted aloha, collision. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
A SELF ADAPTIVE BASED CONTENTION WINDOW FOR ADVANCED INFRARED CSMA/CA MAC
PROTOCOL FOR WIRELESS LANS |
Author: |
D.SRINIVAS, E.V PRASAD |
Abstract: |
Advanced Infrared (AIr) is a suggested framework for Infrared Data Association
(IrDA) for interior infrared LANs. Advanced Infrared (AIr) is the standard MAC
prototype for wireless infrared LANs and is capable to assist point to multiple
point transaction although it is not precisely constructed for such prototypes.
A back off approach is a methodology for the wireless system MAC layer protocol
to resolve a collision whenever the network is shared with two or more nodes.
Since for small networks, the throughput of the existing model degrades and
propagation, transmission delay increases due to large contention window size
with the augmented number of empty CAS that resulting in a significantly lower
consumption than optimal. This paper provided a flexible and self-adaptive
contention window back off methodology that greatly enhances the throughput by
adjusting the optimum CW updating aspect rendering to the hypothetical study.
This approach efficiently diminishes the number of collisions and enhances the
network consumption. In AIr MAC CSMA/CA protocol, the simulation result showed
that the novel back off approach efficiency is much improved compared to the
existing Linear Adjusting CW back off approach. |
Keywords: |
Wireless LANS, Advanced Infrared, Infrared Data Association, Contention Window
Size, Back-off Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
CLOUD BASED SOFTWARE ENGINEERING LEARNING ENVIRONMENT: GUIDELINES TO HOST
SOFTWARE ENGINEERING TOOLS ON THE CLOUD |
Author: |
MUHAMMAD EHSAN RANA, OMAR S. SALEH, OSMAN GHAZALI |
Abstract: |
Cloud computing is one of the latest trends in IT; its values have been proven
effectively in various sectors. Education is one of these sectors. In the 21st
century, the students can no longer be restricted to the traditional teaching
methods, an example of which is the lecturer lecturing and the student listening
in the classroom. However, this claim is still true for Software Engineering
majors.
This motivated the author to study the current status of Cloud computing in
Education and how its values can be captured to enhance the learning environment
of Software Engineering. This can happen through utilizing the value of Cloud
computing to host the Software Engineering tools of the laboratory courses on
the Cloud.
Data collection took place to answer the questions and to achieve the aim which
is to utilize Cloud computing for better Software Engineering learning
environment. To achieve this, 325 software engineering students of three
universities and other overseas friends whom are software engineering students
were chosen to participate in the questionnaire. Six software engineering
lecturers and three IT leaders of three universities were interviewed as well.
The results obtained were that SE students are facing some difficulties related
to the availability of labs and tools; software engineering lecturers are also
facing the same problems. The students and the lecturers were happy to see the
tools made available on the Cloud to be used anytime and anywhere without any
constraints. The lecturers were ready to accept the changes to enhance the
learning environment. The IT leaders thought that Cloud computing would aid the
software engineering students, help the university to eliminate some of issues
and enhance the students outcome, but there are no tools available yet on the
Cloud for the students and lecturers in the universities that have been
interviewed. Thus, guidelines to host tools on the Cloud were created. Three
experts assessed the guidelines and they approved its effectiveness. |
Keywords: |
Cloud Computing, Software Engineering, Learning Environment, E-Technologies in
Education, New Trends in Education |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
PROPOSED MABC-SDAIR ALGORITHM FOR SENSE-BASED DISTRIBUTED ARABIC INFORMATION
RETRIEVAL |
Author: |
ALIA KARIM ABDUL HASSAN , MUSTAFA JASIM HADI |
Abstract: |
Information Retrieval (IR) is the field of computer science that deals with the
storage, searching, and retrieving of the documents that satisfy the user need.
Distributed Arabic Information Retrieval (DAIR) is a model enables a user to
access many searchable Arabic documents reside in different locations. DAIR is
more complex than the centralized Arabic IR (AIR) because it requires addressing
two significant additional problems that are the resource selection and the
results merging. The Arabic language is a rich in multiple meanings (senses) in
a lot of words and the tasking to find the appropriate meaning is a key demand
in most of the AIR applications. This paper aims to improve the efficiency of
the DAIR systems through using an algorithm belong to the swarm intelligence
called Artificial Bee Colony (ABC) algorithm and to improve the result quality
through using the query expansion. The MABC-SDAIR algorithm is the search
approach used in this work. It aims to search the most relevant documents while
at the same time it searches the best synonyms for the query expansion process.
The experimental results exhibit the performance superiority of the proposed
system over the traditional DAIR system that has a non-expanded query. |
Keywords: |
Arabic Information Retrieval; Distributed Arabic Information Retrieval;
Artificial Bee Colony; Query Expansion. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
SARIMA-EGARCH MODEL TO REDUCE HETEROSCEDASTICITY EFFECTS IN NETWORK TRAFFIC
FORECASTING |
Author: |
INDRA HIDAYATULLOH, ISNA ALFI BUSTONI |
Abstract: |
Difference needs in bandwidth allocations have not been accommodated by static
bandwidth allocations that leads to ineffective bandwidth use. There are several
previous researches about bandwidth allocations which have been conducted, such
as the use of Seasonal Autoregressive Integrated Moving Average (SARIMA) method.
However, SARIMA method is not able to overcome various kinds of error problems
or heteroscedasticity. Therefore, this research proposes the application of
SARIMA-EGARCH (Exponential Generalized Autoregressive Conditional
Heteroscedastic) method to generate the more accurate model that is able to
overcome heteroscedasticity on the needs of bandwidth forecasting. In addition,
this research compares the result of SARIMA to SARIMA-EGARCH examinations. It
shows that SARIMA (1,0,1) (3,1,1)7 has 11,38% Mean Absolute Percentage Error (MAPE)
and SARIMA-EGARCH (1,0,1)(3,1,1)7(1,1) has only 9,20%. The comparison shows that
applying EGARCH increase the accuracy to 19,15%. |
Keywords: |
Forecasting, Bandwidth, Heteroscedasticity, SARIMA, EGARCH |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
RECENT APPROACHES ON NO- REFERENCE IMAGE QUALITY ASSESSMENT FOR CONTRAST
DISTORTION IMAGES WITH MULTISCALE GEOMETRIC ANALYSIS TRANSFORMS: A SURVEY |
Author: |
ISMAIL T. AHMED, CHEN SOONG DER, BARAA TAREQ HAMMAD |
Abstract: |
The study of Image Quality Assessment (IQA) in digital image and video
processing is challenging due to the existences of numerous types of distortions
such as blur, noise, blocking, contrast change, etc. Nevertheless, it is
interesting to devise a metric system in order to determine the quality of an
image quantitatively. Currently, most of the existing No Reference(NR)-IQA
metrics focus on the quality evaluation of distorted images due to compression,
noise and blurring. The related work performed in the area of NR-IQA for
Contrast Distortion Images (CDI) is quite limited unfortunately. Also, most of
the existing NR-IQA metrics are designed in spatial domain and very little of
them are devised based on Multiscale Geometric Analysis (MGA) Transforms.
Therefore, in this paper, NR-IQA metrics are classified into two groups, i.e.
NR-IQA Metrics for general purpose and NR-IQA Metrics for CDI. Due to the fact
that our main focus is contrast distortion, NR IQA metrics have been overviewed
in both spatial and transform domains. We classify the transform domain into
traditional transform and MGA transform then focusing on MGA Transforms.
Subsequently, the MGA transform which is suitable for the design of NR-IQA
metric used to predict the quality of CDI is proposed. The presented survey will
to keep up-to-date the researchers in the field of image quality assessment
especially for CDI. Also, this survey provides an outlook for future work using
many combinations among MGA Transforms to access to new IQA metric for CDI. |
Keywords: |
Image Quality Assessment (IQA), Contrast Distortion Images (CDI), No-Reference
Image Quality Assessment Algorithm (NR-IQA), Multiscale Geometric Analysis (MGA)
Transforms. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
INFORMATION SUPPORT OF UNMANNED AERIAL VEHICLES NAVIGATION USING PSEUDOLITES |
Author: |
YURIY YURIEVICH GROMOV, IGOR NIKOLAEVICH ISHCHUK, VALERY NIKOLAEVICH TYAPKIN,
VLADIMIR VITALEVICH ALEKSEEV, VJACHESLAV MIKHAILOVICH TYUTYUNNIK |
Abstract: |
The paper focuses on developing mathematical tools for solving the problem of
joint information processing of various sensors of UAVs using pseudolites. These
tools are the basis of information support of complex navigation system. The
authors found mathematical dependencies establishing an unambiguous link between
the errors of the navigation output parameters and those of the navigation
model, as well as equivalent errors in the measurement sensors for a given
movement of the aircraft. |
Keywords: |
Complex Navigation System, Unmanned Aerial Vehicle, Pseudolite, Inertial
Navigation System, Satellite Navigation System. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
MALICIOUS NODE DETECTION AND RECONSTRUCTION OF NETWORK IN SENSOR ACTOR NETWORK |
Author: |
KRISHNA CHOWDARY , K.V.V. SATYANARAYANA |
Abstract: |
The advancement of Technology growth has developed various types of private and
public applications in WSN. By the introduction of Actor node in WSN, which has
an operation battery sensor, high speed computing operations is added, data
processing and various components of communications. WSAN should have the
capability of detecting outage of node and also have the capability to change
dynamically the route with variant efficiently for providing a reliable end
point to end point communication between communication nodes in a dynamic
topology change network. The proposed work should have the capability of
identifying and detecting of malicious node and removal of it in WSAN. Our work
is to design a framework for detection of malicious nodes in WSAN and
elimination of Node in actor nodes by creating a topological structure dynamical
by preparing a connectivity point of peer to peer and point to point
communications. The possibility of the above is done by adding a command in
actor node of WSAN for better efficiency and reliability in a network. |
Keywords: |
Malicious, Attacks, Packet, Actor, WSN |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
INTEGRATION OF DISTRIBUTED GENERATION TO UPQC WITH UNIT VECTOR THEORY |
Author: |
N. C. KOTAIAH, K. CHANDRA SEKHAR |
Abstract: |
Power system quality is very much important in present days due to increasing
non-linearity in the system. Many compensating devices were developed to improve
power quality in the power system. Unified power quality conditioner is one of
the FACTS devices that can effectively improve power quality. This paper
discusses the integration of distributed generation (DG) to Unified Power
Quality Conditioner (UPQC). DG delivers power to system and also stabilizes the
DC link capacitor in UPQC. Unit vector control strategy was used to control the
UPQC. While transferring active power to the system, DG integration gives
stability to power system. Results were given when DG was not integrated to the
system and when DG was integrated to the system. Results were also shown if DG
was integrated to the system with variable load condition. THDs were shown for
source current and load current showing how effective the UPQC works for
improving power quality. |
Keywords: |
UPQC, Power Quality, Distributed Generation, Integration, DC Link. |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
A UNIFIED SOCIAL MEDIA FRAMEWORK DESIGN AGINST FLOODS THREATS - THE CASE OF
BOSNIA AND HERZEGOVINA |
Author: |
NASIM MATAR, SADI MATAR |
Abstract: |
The use of social media services are providing solutions and new opportunities
for innovative use during flood crisis events. The different tools provided by
social media have proved providing many benefits in relation to protection and
rescue services for governmental and civil protection. Social media services
provide broader prospects for all affected by the flood threats to engage in
warning and informing in reaction to flood crisis events. The use of social
media in different crisis events proved to be faster medium for spreading
information and alerts among public in compare to traditional use of media. This
paper presents the design of a unified social media framework that has been used
for research purposes by governmental officials and the public in Bosnia and
Herzegovina against flood threats that affected the country in recent years. The
system design is unique as it was built with consideration for diversity and
non-centralized governmental structure in Bosnia and Herzegovina. |
Keywords: |
Bosnia and Herzegovina, Crisis, Floods, Framework, Social Media |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
INFORMATION SUPPORT OF FINDING A SOLUTION THE PROBLEM OF HIDDEN OBJECTS |
Author: |
YURIY YURIEVICH GROMOV, IGOR NIKOLAEVICH ISHCHUK, VLADIMIR VITALEVICH ALEKSEEV,
VALERIY EVGENEVICH DIDRIKH, VJACHESLAV MIKHAILOVICH TYUTYUNNIK |
Abstract: |
We developed a new approach to heat transfer processes, based on the formulation
and solution of a new class of inverse heat conduction problems, which differs
from previously known methods in the use of qualitative information. The authors
propose an approach based on the relevant account of a priori information about
the unknown quantities, which can be represented by the application of the
theory of fuzzy sets, in particular, by the use of LR-type fuzzy numbers or
fuzzy functions. The solution of the inverse heat conduction problem by infrared
images obtained with the UAV allowed detecting objects by similar thermal
parameters; image segmentation of thermal tomogram allowed identifying objects
invisible on the original IR images. |
Keywords: |
Inverse Heat Conduction Problem; IR Image; Thermal Physical Parameters; Thermal
Tomogram |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
DEVELOPMENT OF REMOTELY OPERATED BOMB DISPOSAL ROBOT EQUIPPED WITH OBJECT WEIGHT
AND POSES ESTIMATIONS |
Author: |
RONNY MARDIYANTO, MUHAMMAD QOMARUZZAMAN, HERI SURYOATMOJO |
Abstract: |
The paper presents development of the prototype of remotely operated bomb
disposal robot equipped with object weight and pose estimation. The main mission
of the prototype of remotely operated bomb disposal robot is how to move the
bomb to safe area. The key issue here is how the robot can safely evacuate the
bomb with minimum risk. In order to avoid gripped object detached from the grip,
the robot needs to know the objects weight and pose. In this paper, we also
present methods for estimating object’s weight and pose. We estimate the
objects weight by utilizing linear regressions and measuring currents flowing
into servomotors. The increasing current flow that goes into servomotors are
monitored to estimate the objects weight. We estimate the object’s pose by
using several image processing steps such as color conversion from RGB to HSV,
color filter, edge detection, and hough transform. The methods have been
implemented in proposed system that consists of several processing units
(Raspberry Pi 3, Arduino Mega, Arduino Uno), Brushless Electronic Speed
Controller, Robot Arm, Video Sender, Analog Multiplexer, 3DR telemetry,
Ardupilot Mega with GPS and compass, and SkyZone 3D Googles. We have tested the
proposed system under laboratory condition. It succeeded to lift object up to
257.4 gram of weight. Such ability equal to lift small bomb like C-4 or small
IED. The robots payload could still be possible to be developed while
maintaining robots dimension. The maximum distance of the robot to be operated
remotely is 236 meter. The robot also succeeded to follow the saved waypoints
and passed the rock with maximum diameter of 12 cm. The robot can estimate the
object weight with accuracy of 27.25% and object pose with average error of
92.3%. By implementing the proposed system under real condition, the risk during
bomb evacuation process can be minimized. |
Keywords: |
Bomb Disposal Robot, Robot Arm, Object Weight estimation, Object Poses, Hough
Transform, Linear Regression |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
IMAGE ORIENTATION BASED WATERMARKING TECHNIQUE IN COPYRIGHT PROTECTION |
Author: |
HEND MUSLIM JASIM, ZAITON MUDA, MOHD TAUFIK ABDULLAH |
Abstract: |
As a means of copyright protection, the use of watermarking has still not
reached a significant level of reliability in applications to resolve
infringement claims in the courts. This is because of two main obstacles. The
first raises the need to consider original image quality as the main evidence
over any other clues whereas the second denotes the lack of an adequate common
measure that prove the superiority of one technique over another and then
prevent improvement on efficiency and quality of algorithms. In seeking to
address this problem, this research proposes a new image orientation
watermarking technique based on the possession of the highest quality of the
original image as the main evidence in copyright disputes and proposes a generic
measure capable of scoring the performance of the different proposals. This
design benefits Principal Component Analysis and Blind Noise Level Estimation to
resemble a set of image transitions over resizing operations in response to
owner signature. To deduce copyright, watermarked image besides its original
coordinates are incorporated in copyright issues with the aid of two formulated
parameters; Protection Requirement (PR) and Distance Decision (D) that are to
serve as a protection requirement measure and a resolving parameter
respectively. The design along its obtained results shows convincing validity
results that are further explicated using ANOVA and linearity testing. |
Keywords: |
Digital Right Management Techniques, Image Copyright Protection, Watermarking
Principal Component Analysis, ANOVA |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
OPTIMIZATION TECHNIQUE FOR PRIME NUMBER LABELING OF DIRECTED ACYCLIC GRAPHS |
Author: |
JINHYUN AHN, DONG-HYUK IM, TAEWHI LEE, HONG-GEE KIM |
Abstract: |
Directed Acyclic Graphs (DAGs) are widely used data structures. Labeling schemes
have been proposed to accelerate reachability query processing over DAGs. Among
such schemas, prime number labeling has attracted researchers because of its
simplicity: a division operation is sufficient for answering reachability
queries. However, the limitation of existing prime number labeling algorithms is
that they generate huge label sizes. Minimizing the label size is an important
issue because query-processing performance depends on it. In this paper, we
propose techniques for generating prime number labels that are much smaller than
those made by existing algorithms. In order to reduce the overall label size,
some heuristics are suggested for sorting the vertices to which prime numbers
are assigned. Experiments over real-world and synthetic DAG datasets show that
the proposed approach produces smaller labels than existing approaches, and the
labeling time is also reduced. |
Keywords: |
Directed Acyclic Graph, DAG, Prime Number Labeling, Label Assignment Order,
Label Size |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
CESSATION OF OVERLOADED HOST BY INCREASE THE INTER-MIGRATION TIME IN CLOUD DATA
CENTER |
Author: |
TAMILVIZHI.T, PARVATHA VARTHINI.B |
Abstract: |
The user in distributed environment using the datacenter in extreme manner which
results in host overloading and lacking of energy efficiency in data centers. In
this paper the computing nodes in the cloud datacenter are reduced by migration
method. The idle use of virtual machine consumes extreme electricity and emits
Carbon-di-oxide which results in harmful environment. To overcome the host
overloading we introduce the Inter-Migration method which switch between both
active and sleeping nodes in data centers. The proposed system overcome the time
variation and system mismatch in reallocate VMs by switching of deactivates and
reactivates computing nodes. The nodes in the data centres are spited by cloud
broker. The cloud broker change the data center from cloud node if shortage
occurs, it limits the application from activate node to sleeping node. It acts
as an intermediate between the consumer and provider in VM environment. The
consumer directly request for service. VM placement algorithms are introduced to
execute the multiple nodes of data center in replication environment. While
executing the VM placement algorithm continuous exchange of information between
global and local manager required to manage the host overload. |
Keywords: |
Cloud Node, Data Center, Virtual Machine (VM), Migration, Cloud Broker |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
A HYBRID PARALLEL HASH MODEL BASED ON MULTI-CHAOTIC MAPS FOR MOBILE DATA
SECURITY |
Author: |
B. MADHURAVANI, Dr. D.S.R MURTHY |
Abstract: |
Today, with the advancement of internet and technology security of information
has become the prime concern in mobile and online applications. Extensive amount
of research have been carried out since years to provide secure and reliable
hash functions for information interchange. Chaos based hash functions have
gained a lot of attraction by the researchers due to its non-linearity,
randomness and unpredictable results. Various chaotic based hash functions have
been implemented in the past decade to achieve confidentiality, integrity and
authentication. But, most of the traditional chaos based hash functions are
processed in sequential approach with a single dimensional map, which restricts
their execution speed and performance in the mobile computing applications. To
overcome these problems, a novel parallel chaotic hashing model is proposed in
this paper. This model integrates multiple chaotic maps as a single chaotic
system to generate an n-bit hash value for a given input message. This model
provides more security, high computation speed, limit memory resources and less
computation overhead in the standalone and mobile applications. Experimental
results show that proposed model has high computational speed, bit variation and
collision resistance as compared to traditional parallel chaotic models. |
Keywords: |
Parallel chaotic , Hash fucntion, Mobile computing, Integrity, Authentication |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
IDENTIFICATION OF MALARIA DISEASE AND ITS STADIUM BASED ON DIGITAL IMAGE
PROCESSING |
Author: |
RIKA ROSNELLY, SRI HARTATI, EDI WINARKO, SRI MULATSIH |
Abstract: |
Malaria is one of the public health problems that could cause death, especially
in infants, toddlers, pregnant women. Malaria is still a health problem not only
in Indonesia but also in some countries in the world. Microscopic testing is the
gold standard to malaria disease diagnosis. However, the level of accuracy
depends on the level of microbiological expertise and experience. Microscope
testing also time consuming and requires extensive equipment. This study built a
texture of feature extraction and morphology model that can be used to identify
the type of malaria parasites along with the stadium on the image of a thin
blood smear. Samples are a number of preparations that have been given
indications of malaria and have given a Giemsa staining. Image acquisition
process is done by using a digital microscope with 1000 times of magnification.
The process of segmentation used thresholding method of Otsu. Selection feature
used sequential forward selection (SFS). Classification technique used
artificial neural network of learning vector quantization (LVQ) with K-fold
cross validation to identify patterns of types of parasites and their life
stages in order to get different types and stages of malaria disease. The
results used a combination of texture with morphological traits to get the
values of accuracy. |
Keywords: |
Malaria Disease, Texture Of Feature Extraction And Morphology, SFS, LVQ, K-Fold
Validation |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
Title: |
HIGHLY NONLINEAR RIGID FLEXIBLE MANIPULATOR STATE ESTIMATION USING THE EXTENDED
AND THE UNSCENTED KALMAN FILTERS |
Author: |
MOHAMMED BAKHTI, BADR BOUOULID IDRISSI |
Abstract: |
This paper focuses on the highly nonlinear rigid-flexible manipulator state
estimation using the Extended Kalman Filter and the Unscented Kalman Filter. The
Hamiltons principle is used to derive the manipulator equations, the
Euler-Bernoulli assumption is considered to model the flexible link, and the
elastic movement is approximated using the assumed modes method. The simulation
study compares the efficiency of the state estimation quantified by the
estimation mean squared error and the time required by the filters to converge. |
Keywords: |
Extended Kalman Filter, Rigid-Flexible Manipulator, Nonlinear Filtering, State
Estimation, Unscented Kalman Filter |
Source: |
Journal of Theoretical and Applied Information Technology
15th February 2017 -- Vol. 95. No. 3 -- 2017 |
Full
Text |
|
|
|