|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2017 | Vol. 95 No.5 |
Title: |
WSN BASED SENSING MODEL FOR SMART CROWD MOVEMENT WITH IDENTIFICATION: AN
EXTENDED STUDY |
Author: |
NAEEM A. NAWAZ, AHMAD WAQAS, ZULKEFLI MUHAMMED YUSOF, ABDUL WAHEED MAHESAR,
ASADULLAH SHAH |
Abstract: |
With the advancement of IT and increase in world population rate, Crowd
Management (CM) has become a subject undergoing intense study among researchers.
Technology provides fast and easily available means of transport and, up-to-date
information access to the people that cause crowd at public places. This imposes
a big challenge for crowd safety and security at public places such as airports,
railway stations and check points. For example, crowd of pilgrims during Hajj
and Ummrah while crossing the borders of Makkah, Kingdom of Saudi Arabia. To
minimize the risk of such crowd safety and security, identification and
verification of people is necessary which caused unwanted increment in
processing time. It is observed that managing crowd during specific time period
(Hajj and Ummrah) with identification and verification became challenge. At
present, many advanced technologies such as Internet of Things (IoT) are being
used to solve the crowed management problem with minimal processing time. In
this paper, we have presented a Wireless Sensor Network (WSN) based conceptual
model for smart crowd movement with optimal verification of cluster members (CMs)
and leads to minimal processing time for people identification. This handles the
crowd by forming groups and provides proactive support to handle them in
organized manner. As a result, crowd can be managed to move safely from one
place to another with group identification. By controlling the drop rate or
unverified CMs rate, the performance of the smart movement can be increased.
This decrease or control of the drop rate will also minimize the processing time
and move the crowd in smart way. |
Keywords: |
WSN, Crowd Management, Smart Movement, IoT, CMs |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
MODELS AND TOOLS FOR AUTOMATIZATION OF THE LINGUISTIC RESEARCH |
Author: |
LAKHNO V.A., NIKOLAIEVSKYI O.Y., SKLIARENKO E.V., LYTVYNENKO L.O. |
Abstract: |
This article is focused on solving problem of building tools for automatization
of linguistic research, particular for the morphological and semantical
multilingual analysis. The results obtained are of great importance for the
development of linguistic research. Developed a procedure for the automatic
creation of dictionary quasi-inflections of wordforms as linguistic components
providing automatic morphological analysis. Developed a system of the automatic
workplace AWP PARADIGM that allows to automate the process of building the
components of lingware for automatic morphological analysis in machine
translation system, as well as to provide functional completeness. Developed
system of AWP EXPERT, which allows you to automate the process of building the
components of lingware for automatic premorphemic analysis and definition of the
semantic information in machine translation system (SMT). The developed software
product support English, Russian and Ukrainian languages. It is proved that the
proposed method of encoding lexical-grammar information and approach to
automatic morphological analysis using quasi-inflections has significant
advantages in comparison with existing methods. |
Keywords: |
Linguistic Information; Natural Language Processing; The Data Processing System;
Quasi-Inflections; Automation Of Morphological Data Processing; Semantic
Information Encoding. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
A NEW METHOD OF FUZZY PN SYSTEM TO MODEL OF AIRCRAFT FLIGHTS THROUGH DIFFERENT
TERRAIN |
Author: |
RAED I. HAMED |
Abstract: |
A novel approach of fuzzy Petri net (FPN) is presented to aircraft terrain
following (TF) through aircraft flights. The FPN controller system as presented
in this paper determine where the aircraft needs to modification its altitude.
Depending on the concepts of real-time system applications the decision-maker
(i.e. Terrain-Following Radar (TFR)) will be promising notwithstanding for hard
terrains in expression of shape and features. The implementation process for
terrain following collaborative design is fuzzily dedicated by the algorithm of
FPN. The FPN approach employs special connections among existing Slope, Height,
and Spacing of the terrain with aircraft flights velocity overhead the ground to
construct appropriate FPN rules. Settling on knowledge implies a basic decision
making over passing across or over a terrain. Slope angle of terrain (Sl1 and
Sl2), spacing is the ratio of the largest and smallest peak-to-peak terrain (Sp1
and Sp2) and height of vehicle (He1 and He2), and the main system is the
velocity (Sl, He and Sp) is output all the inputs and outputs are linguistic
variables. The case study of aircraft flights show the effectiveness of the FPN
approach as compared to other existing approaches. Based on the FPN approach the
results illustrate a perfect chasing while using four models with a number of
fuzzy rules equal to 200 rules will causes an optimal results. While a suitable
height of an aircraft flights above the ground is substantial this given us good
motivation to develop a new approach in maintaining the height of aircraft.
Finally, the presented method is applied with low-level flight to be
authenticity be applied for such applications. |
Keywords: |
Aircraft Terrain Following Flights, Fuzzy System, Terrain Following, Fuzzy Petri
Net, Decision Making. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
PRESENTING STRUCTURED EVALUATION FRAMEWORK TOWARDS E-LEARNING ADAPTION IN
JORDANIAN UNIVERSITIES – THE USE OF CBAM-SOC FRAMEWORK |
Author: |
NASIM MATAR |
Abstract: |
This paper presents a continuous work related to defining the concern of
adopting e-learning system by faculty members in Jordanian universities. The
previous research (Evaluating E-Learning System Use by CBAM-Stages of Concern
Methodology in Jordanian Universities, 2015) has managed to outline the stages
of concern using CBAM framework for faculty members in 12 Jordanian Universities
with a total participation of 138-faculty members. After an engagement with
e-learning systems for almost a year, this research continued the investigation
for the use of CBAM-SoC in order to define and measure the change in stages of
concern with respect to the defined challenges of adapting e-learning practices
in the Jordanian higher educational system. Jordanian Universities can adopt the
output of this research in order to provide an evaluation strategy for measuring
the concern towards e-learning, which will reflect positively on universities
practices and policies towards e-learning. |
Keywords: |
CBAM, Evaluation, E-learning, Jordanian Universities, Stages of Concern |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
TEXT INTERPRETATION USING A MODIFIED PROCESS OF THE ONTOLOGY AND SPARSE
CLUSTERING |
Author: |
IONIA VERITAWATI, ITO WASITO, T. BASARUDDIN |
Abstract: |
Many texts in online media consist of various information that need an
appropriate way to extract and interpret them clearly. For better understanding
of the content in the text collected from any online media, a proper methodology
for the interpretation of useful information must be developed. This study
offers a modified process of the text interpretation consisting of four stages
with a preliminary stage of the text preprocessing and key phrase extraction
using the annotated suffix tree (AST) technique and secondary stage of
developing sparse clustering method named as iterative scaling of fuzzy additive
spectral clustering (is-FADDIS) combined with a sharpening technique for
grouping key phrases from the text. An ontology as the “knowledge base” was
developed combining with is-FADDIS method as the third stage. Interpretation
from the input text was carried out as the final stage of the text
interpretation. The performances of is-FADDIS clustering combined with
sharpening technique as high as 96 and 78% were verified for some modeled sparse
data and two specific real sparse data from two corpus, respectively, and could
be better when comparing with Nonnegative Matrices Factorization (NMF) and
K-means. The text interpretation of using the ontology gives a clear graph
visualization on the relationship among key phrases even though it has a low
correlation with content of the text. The result findings of this study
potentially help us in ensuring an automatic process to be used for the
interpretation of any topic information collected from online media. |
Keywords: |
Annotated Suffix Tree, is-FADDIS, Ontology, Sparse Clustering, Text
Interpretation |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
DESIGN OF AXIAL FLUX BRUSHLESS DC MOTOR BASED ON 3D FINITE ELEMENT METHOD FOR
UNMANNED ELECTRIC VEHICLE APPLICATIONS |
Author: |
H. SURYOATMOJO, R. MARDIYANTO, G. B. A. JANARDANA, M. ASHARI |
Abstract: |
The research in order to find an optimal, efficient, and reliable design of
brushless dc motor increase significantly. The compact design with high power to
weight ratio will support the application of motor drive in electric vehicle.
This paper presents the design and analysis of axial flux Brushless DC motor. To
analyze the electrical parameters of brushless dc motor such as torque,
efficiency, looses, and electric field strength which is modeled and simulated
through the Finite Element Analysis Method (FEM). The proposed design is proved
with the simulation software with the product of axial flux brushless dc motor
with the size of 220 cm using 12 stator slots and 10 rotor poles, generates
output power about 27 kW, with a speed of 2388 RPM and torque 109 Nm. This motor
has a DC voltage rating of 400 V and the input current to the motor of 101 A. |
Keywords: |
Axial Flux BLDC Motor, Finite Element Method |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
WAVELET DATA PROCESSING IN THE PROBLEMS OF ALLOCATION IN RECOVERY WELL LOGGING |
Author: |
ABDIAKHMETOVA Z.M |
Abstract: |
Methods of Geophysical Research (GRM) are widely used in order to construct
valid models of oil and gas fields. The essence of these methods is the process
of logging sounding, that means the following: in the oil well falls instrument
for measuring various characteristic values, then these findings are processed.
One of the commonly used methods are the method of high-frequency induction
logging isoparametric sounding (HILIS) and the method of lateral logging
sounding (LLS). General interpretation of the scheme used in these systems, as
follows: in the first stage well logs analyzed, the data is processed and
allocated beds - areas with homogeneous characteristics of the signal. Then, in
the resulting layers are determined value of the electric resistance. These
models are then visualized in the GUI.
To ensure proper construction of models and acceptable computing speed is a very
important task of the initial treatment, as in the results of measurements is
often present apparatus and geological noise, complicating analysis. This noise
is a high frequency signal fluctuations, which often tend to smooth out the
filtration transformation curve. In the same class of problems includes the
correct alignment of the geological formations. Correctness is defined geo
electric theory and empirical experiences geophysics specialists who often
produce alignment layers boundaries manually, based on the image of the curves
in the diagram.
The paper was presented to data processing algorithm based on the wavelet
transform signal. Main research questions are define digital signal of well and
processing methods for considered signals. This work is aimed at optimizing the
transfer of digital signals in an oil well logging. Prior to that, the process
was carried out by other methods, but the method presented me wavelet applied to
this problem for the first time.The basic idea was to minimize the sent data -
signals for subsequent processing. These results indicate that the proposed
algorithm ensures real efficiency in processing signals for the primary task
allocation layers [1]. |
Keywords: |
Wavelet Processing, Well Logging, HILIS, GRM, Transformation,
Horizontally-Layered Medium |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
WASTE COLLECTION VEHICLE ROUTING PROBLEM BENCHMARK DATASETS AND CASE STUDIES: A
REVIEW |
Author: |
ZANARIAH IDRUS, KU RUHANA KU-MAHAMUD, AIDA MAUZIAH BENJAMIN |
Abstract: |
Waste collection vehicle routing problem (WCVRP) is one of the most studied
areas and has received high interest from the modern society today. This
corresponds to the cost efficiency, population growth, and environmental
concerns. The growth of the WCVRP awareness is the result of continuous supports
from government and private organizations. This paper reviews several
established benchmark datasets and successful real-life case studies.
Respectively billions of dollars have been saved from the operational costs. The
current trend for benchmark datasets presented and case studies are accordingly
grouped by countries and continents, thus revealing the need for WCVRP.
Investigation on objectives, constraints and algorithms are also discussed.
Results showed the increased interest of researchers in using benchmark datasets
as well as the case studies and some of the constraints that should be
considered in WCVRP. It also suggested that environmental or quality of service
issues can be integrated into the common objectives of minimizing cost and
distance travelled. Methods used in WCVRP are exact methods and approximate
methods. Results showed that approximate methods have the capability in
providing good results for large-scale data. Conclusively, this study analyzes
the gap and provides recommendations for researches. |
Keywords: |
Waste Management, Approximate & Exact Algorithms, Benchmark Datasets, Vehicle
Routing Problem |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
FINGERPRINT BIOMETRIC IDENTIFICATION WITH GEOMETRIC MOMENT FEATURES |
Author: |
BAYAN OMAR MOHAMMED, ZANA AZEEZ KAKARASH, SHAKAR HUSSEIN SALIH |
Abstract: |
The use of biometric in recognizing individuals is now a phenomenon in today’s
world. As there is security need within wide array of applications including
transactions security across computer networks, PIN (personal identification
number) replacement in retail business and banking, high-security wireless
access, televoting as well as restricted areas’ admission, biometric is more and
more a subject of interest. The traditional mode of personal identification
verification is grounded on possession (ID card) or knowledge (secret code) but
ID cards could be stolen or lost while codes could be forgotten. These problems
could allow opportunity to criminals to steal someone’s identity. As such, using
features that are uniquely belonging to a person would decrease fraud
possibility. Also, in many situations, the use of biometry is convenience. This
is because biometry can take over the use of codes, keys and cards. Also,
fingerprint is regarded as biometric that is most practical. With regard to
performance, applications of pattern recognition mostly rely on extraction of
feature and classification or learning scheme, the extraction and selection of
meaningful features. This generates major problem in identification of
fingerprint; how to attain features in numerous fingerprint styles so that the
right individual could be reflected. Geometric Moments is proposed by this paper
for feature extraction with identification of fingerprints and analyze its
performance. |
Keywords: |
Biometric, Global Feature, Fingerprint, Identification, Individuality, Geometric
Moment Invariant, Uniqueness Presentation |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
EARLY DETECTION OF ALTERNARIA BLIGHT DISEASE IN BITTER GOURD LEAVES USING IMAGE
PROCESSING |
Author: |
SAM ABRAHAM, T. S BALASUBRAMANIAN, D. DHANASEKARAN |
Abstract: |
Detection of Alternaria blight disease in bitter gourd leaf can be done early by
applying Image Processing Techniques. The growth of the plant is categorized
into five stages. Images are acquired separately for healthy, diseased and test
leaves. Histogram analysis is done at each stages for the identification of
healthy and diseased leaves. The images are pre-processed and the colour
characteristics are analysed using RGB, HSV and HSI model. The values of healthy
and diseased leaves at each stages are stored. These values are used for
checking with value of test leaves for the early detection of disease in the
leaves of bitter gourd plant. This extensive experiment helps the early
detection of the disease. Neural network pattern recognition tool is used to
find the accuracy of results obtained for healthy and disease leaves at each
stages. |
Keywords: |
RGB, HSV, HSI, Neural network |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
HARMONIC LOAD IDENTIFICATION BASED ON FAST FOURIER TRANSFORM AND LEVENBERG
MARQUARDT BACKPROPAGATION |
Author: |
INDHANA SUDIHARTO, DIMAS OKKY ANGGRIAWAN, ANANG TJAHJONO |
Abstract: |
One of the most important power quality problems in power system is harmonic
distortion. Due to an increase of non-linear loads as harmonic sources, the
identification of harmonic loads becomes important concern in the power system.
Therefore, this paper proposes a Levenberg Marquardt Backpropagation (LMBP)
Neural Network to identification of harmonic load. Data of harmonic load are
gathered from a low cost microcontroller with Fast Fourier Transform (FFT)
method as analysis of the input current waveform in the presence of multiple
devices to obtain the harmonic value. LMBP is trained using harmonic as input
with combination of 14 different types of load. The performance of LMBP is
implemented with several of the different training and test data to validate the
accuracy and efficiency of the proposed algorithm. The results show that the
proposed algorithm has high accuracy to determine the presence of loads based on
their harmonic signature. |
Keywords: |
Levenberg-Marquardt Backpropagation (LMBP), Harmonic, Fast Fourier Transform (FFT),
load identification, low cost microcontroller |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
A MATLAB-BASED PROGRAM FOR THE PARAMETRIC STUDY OF DISTILLATION COLUMN IN A
BINARY MIXTURE SYSTEM: EFFECT OF REFLUX RATIO, FEED COMPOSITION AND FEED QUALITY |
Author: |
LUIS F. ARRIETA, LUIS G. OBREGON, GUILLERMO E. VALENCIA |
Abstract: |
This paper presents the application of a GUI developed in Matlab® for a binary
distillation column simulation, where the diameter, height, tray number, feed
tray location and the heat flux in the condenser and reboiler were calculated
for a given operational condition set by the user, like the feed condition,
distillation and bottom molar fraction, reflux ratio, top, bottom and subcooling
temperature of distillate. The program, called DTMB-UA v1.0 (Design of a
distillation Tower for Binary Mixture-Universidad del Atlántico), uses the
combination of material and energy balances, experimental equations of phase
equilibrium and constant relative volatility, reported in the literature. The
general procedure to calculate the outputs in the program start by selecting the
type of phase equilibrium curve calculation, between the constant volatility and
the experimental data; in the case of constant volatility, the vapor and liquid
mean temperature, mean tower pressure and densities are estimated based on a set
of empirical equations for the column diameter, column height, theoretical tray
numbers, and energy requirement on the condenser and reboiler. The same steps
are applied when using experimental data for the equilibrium curve, consisting
in inputs of temperatures and molar fractions of the component with higher
volatility in the liquid and the vapor phase. The last step is to select a
binary mixture from the given by the software. The material balance is
represented as the operation lines on the x-y diagram according to the
McCabe-Thiele method. It was found the exact composition of the bottom molar
fraction, the effect of reflux ratio on the distillation molar fraction under
different tray numbers and the effect of feed quality variation on condenser and
reboiler duties under different reflux ratio. |
Keywords: |
Distillation column, Reflux ratio, Distillation feed composition, Graphical user
interface, Engineering education. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
THE ArcVIEW AND GeoDa APPLICATION IN OPTIMIZATION OF SPATIAL REGRESSION ESTIMATE |
Author: |
SCOLASTIKA MARIANI, WARDONO, MASRUKAN , FATKHUROKHMAN FAUZI |
Abstract: |
ArcView is a geographic information system software product produced by and
GeoDa is a software tool developed to implement techniques for exploratory
spatial data to the analysis (ESDA) on a lattice of data (points and polygons).
There were spatial diversity between the regions on the human development index
(HDI) variable. This research would look for the best spatial regression model
for the HDI in Central Java, Indonesia. Testing spatial effects were done by
looking at the value Moran`s I, there were five variables with positive
autocorrelation, and a negative autocorrelation variable is unemployment. The
next test with the test Lagrange Multiplier (LM), only Lagrange Multiplier
(error) which is included in the admission criteria, then the regression model
used is the Spatial Error Model (SEM). In this study used two kinds of weighting
matrix, i.e. rock contiguity and queen contiguity. The next step research was
comparing the value of R-Square and the value of Akaike Info Criterion (AIC) and
then obtained best regression model i.e.Spatial Error Model (SEM) with weighting
rock contiguity with the value of R-Square is 99.8119 % and the smallest Akaike
Info Criterion (AIC) was 4.6362. The spatial regression equation was : HDI=4.5565+0.4176
LE+0.8445 HPS+1.4262 ALS+0.0011 PCS with HDI : human development index, LE :
life expectancy, HPS : hope and period school, ALS : average length of school,
PCS : per capita spending.. |
Keywords: |
Arcview, Geoda, Optimization, Spatial Regression Estimate |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY |
Author: |
HARFOUSHI, OSAMA |
Abstract: |
Cloud computing is becoming more and more important for different types of
organizations. However, one of the main challenges that face Cloud Computing is
Trust. This study developed a User Trust Model to increase the usage of Cloud
Computing. A self-administered questionnaire was distributed online to selected
cloud user’s groups and communities. The items used in this study model are
Availability, Data location, Data protection and Confidentiality. The results
obtained from the data analysis proved that the presence of availability,
confidentiality, data location, and data protection affects users’ trust levels
of cloud services and in turn their willingness to move into the clod in a
positive way. |
Keywords: |
Cloud Computing, User Trust Model, Availability, Confidentiallity, Data
Location, Data Protection |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
SCTTM – SECURE CLUSTER BASED TRUSTWORTHY TOPOLOGY MANAGEMENT SCHEME FOR WIRELESS
SENSOR NETWORKS |
Author: |
T.SENTHIL, DR. B. KANNAPIRAN |
Abstract: |
Lifetime enhancement of Wireless Sensor Networks (WSN) is the hottest research
topic. As the lifeblood of network is the battery backup of sensor nodes, it is
necessary to conserve the available energy. Security is another important
requirement of WSN. This work addresses the two issues such as security and
energy conservation by presenting a Secure Cluster based Trustworthy Topology
Management (SCTTM) scheme. The target of the work is achieved by partitioning
the network area into several grids, which is populated by equal number of
sensor nodes. The BS reaches each and every grid for eagle eye observation and
computes the trust point. The cluster leader and the working nodes are selected
by taking the trust point into account. The BS is vigilant against selective
forwarding, replay, snooze and impersonation attacks. Finally, the performance
of SCTTM is analysed by varying working nodes to check the network lifetime and
energy consumption pattern. Additionally, the attack detection rate is also
measured. The experimental results prove the efficacy of SCTTM. |
Keywords: |
Lifetime enhancement, WSN, Topology management, Security. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
SIMPLE IMAGE ENCRYPTION FOR MOBILE PHONES |
Author: |
MANAL ABDULLAH AL-SHMRANI, ABDUL RAOUF KHAN |
Abstract: |
People generally save pictures in mobile phones or transmit to one another using
several mobile applications. However, privacy of such images and pictures are of
some importance to many people. Generally, for common people the threat to the
privacy of the pictures may be very low; however, people prefer to have a
certain level of security. In this paper, a simple encryption technique, based
on two-dimensional cellular automata has been proposed. The local neighborhood
pixel values of an image are used as part of the encryption key to encrypt the
image, based on certain cellular automata rules. The quality of encryption
technique and Peak Signal to Noise Ratio has been calculated and reported in
this paper. A hardware architecture has been proposed to implement the scheme in
mobile phones. |
Keywords: |
Image Encryption, Cellular Automata, Two Dimensional CA, Mobile Phone security ,
Privacy |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
BAG-OF-SHAPES DESCRIPTOR USING SHAPE ASSOCIATION BASED ON FREEMAN CHAIN CODE |
Author: |
EMA RACHMAWATI, IPING SUPRIANA, MASAYU L. KHODRA |
Abstract: |
A novel bag-of-shapes descriptor constructed using shape association is
presented in this paper. We believe that shape association has significant
impact in constructing better shape representation of object, for the purpose of
object recognition. In our proposed model, shape association is represented in
the set of representative prototypes, which is generated through K-medoids
clustering based on association likelihoods. The association likelihood is
obtained through pairwise distance computation using Needleman-Wunsch algorithm,
as the shape is represented in sequence of code of Freeman Chain Code. We
evaluate our method on a set of 32 fruit subcategories captured in multi
viewpoint. We show that our approach can reliably classify the shape of
multi-class fruit with average accuracy of 82.96 % using nearest neighbor
classifier. |
Keywords: |
Bag-of-Shapes, Freeman Chain Code, Shape Association, K-medoids clustering,
Needleman-Wunsch Algorithm, Nearest Neighbor Classifier |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
DWT BASED OFDM WITH INDEX MODULATION FOR PERFORMANCE ENHANCEMENT IN THE PRESENCE
OF CFO |
Author: |
ASMA BOUHLEL, ANIS SAKLY, SALAMA IKKI |
Abstract: |
Inspired by the high spectral efficiency improvement of the Spatial Modulation
(SM), Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM)
was recently proposed and expected to be one of the key technologies of 5G
systems. This novel transmission technique incorporates the index of active
subcarriers to convey additional information. Similar to conventional OFDM,
Carrier Frequency Offset (CFO) is considered as a dominant performance degrading
cause of OFDM-IM system. In this paper, Discrete Wavelet Transform (DWT) based
OFDM-IM is announced to improve the performance of the conventional OFDM-IM
affected by CFO. To this purpose, DWT based OFDM-IM performance in terms of Bit
Error Rate (BER) is compared to the original OFDM-IM based on Fast Fourier
Transform (FFT) in the presence of CFO. Simulation results are provided to prove
the performance enhancement of our proposed system over Rayleigh fading channel. |
Keywords: |
Orthogonal Frequency Division Multiplexing with Index Modulation, Carrier
Frequency Offset, Discrete Wavelet Transform, Bit Error Rate. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
SLIDING MODE OBSERVER FOR A CLASS OF BIOCHEMICAL PROCESS |
Author: |
AMEL BARHOUMI, TAOUFIK LADHARI, SALIM HADJ SAID, FAOUZI M’SAHLI |
Abstract: |
In this paper, a design of Sliding Mode Observer (SMO) of a class of biochemical
processes is proposed. Indeed, nonlinear observers for the estimation of the
substances are presented and the estimation of non-measured states in waste
water treatment process is addressed. The proposed observers are very successful
in accurately estimating states variables. Specifically, sliding mode observer
has been investigated for this class of nonlinear systems. Moreover, they are
very easy to implement and to calibrate in order to estimate non measurable
state. The sliding mode observer is compared with High Gain Observer (HGO) and
Extended Kalman Filter (EKF). The performance of the sliding mode observer is
illustrated through numerical simulations. The simulation results for the
bioreactor application demonstrate the effectiveness of the proposed observer. |
Keywords: |
Sliding mode observer, biochemical process, nonlinear systems, wastewater
treatment, High gain, EKF. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS |
Author: |
V.LAKSHMAN NARAYANA , Dr.C.R.BHARATHI |
Abstract: |
MANETs (Mobile Ad Hoc Networks) are facing the common problems in providing
security in all aspects. Their natural characteristics make them vulnerable to
passive and active attacks, in which misbehaving nodes can eavesdrop or delete
packets, modify packet contents. The Identity-based cryptography system to MANET
mainly concentrates on deal out the responsibility of consistent ability among
the multiple nodes in a network. Cryptographic technique which uses public key
is the mechanism considered in this regard. Secret sharing mechanism is adopted
by many existing systems which involves secret sharing of keys to a trusted node
among nodes in a network which increases security level. Here we propose
threshold cryptography which makes the authority more robust against network
disasters and harder to negotiation. Identity-based cryptography, where any
identity may assist as a public key, makes certificates and certificate
distribution superfluous. The authority distributing private keys corresponding
to identities is called a Private Key Generator (PKG). The proposed method
deliberates distributing a PKG towards the nodes in the MANET. It shows the
security properties of the base IBC systems are preserved when this distributed
PKG is used instead of the original. |
Keywords: |
Cryptography, key generation, public key, MANET, private key generation (PKG) |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
AN AUTOMATED USE CASE DIAGRAMS GENERATOR FROM NATURAL LANGUAGE REQUIREMENTS |
Author: |
MALEK ZAKARYA ALKSASBEH, BASSAM A. Y. ALQARALLEH, TAHSEEN A. ALRAMADIN, KHALID
ALI ALEMERIEN |
Abstract: |
Use case modeling is an important requirements engineering technique which plays
an important role in describing the systems specifications and facilitating
systems development. The use of linguistic representations of system
requirements as a source of information for generating use case models is a
challenging task and can be considered relatively a new field. This paper has
tackled the problem of extracting the required elements that are needed to
automatically generate use case diagrams from specification documents which are
written in common natural language. Therefore, we have developed an automated
system which employs the Natural Language Processing (NLP) techniques to parse
specifications syntactically based on a predefined set of heuristic rules.
Furthermore, our system incorporates the capability of analyzing and
understanding the English text as a semantic unit to infer some important
linguistic features such as reference, comparing and additive cohesive devices.
The extracted information is then mapped into actors and use cases, which are
the basic elements of use case diagrams. Our proposed approach was evaluated
using both recall and precision performance measurements. The experiments
revealed that our system has an average of 96% recall and 84% precision. |
Keywords: |
Use case diagrams, Natural Language Processing, User requirements analysis,
Automatic Diagrams Generation, Information Extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
MODIFIED AGGLOMERATIVE CLUSTERING WITH LOCATION QUOTIENT FOR IDENTIFICATION OF
REGIONAL POTENTIAL SECTOR |
Author: |
TB AI MUNANDAR, AZHARI, AINA MUSDHOLIFAH, LINCOLIN ARSYAD |
Abstract: |
Clustering studies, especially on the hierarchical agglomerative cluster (HAC)
have proliferated over the recent years. Many studies used several HAC
techniques to identify the proximity of one object of a data with another
objects to find correlations between both for specific needs. Some studies in
regional economics field utilizied this technique for to identify gaps of
development by observing the proximity of achievements of development among
regions. But there have been a few discussion related to identifying potential
sectors owned in certain regions regarding using this technique. This research
was conducted to develop a hybrid algorithm between HAC with Location Quotient (LQ)
for potential sectors owned by a certain region. Data on sector of PDRB / GDRP
in 31 regencies in Central Java province in 2012 are used to test the developed
algorithms. The result showed that 279 of Sector Data of PDRB / GDRP were
divided into two main group, i.e. the cluster LQ > 1 reaches as many as 125
Sector data from different regencies (as a potential sectors of a region). The
remaining 154 sector data were classified into into cluster LQ <1(as a
non-potential sectors of a region). |
Keywords: |
GDRP, HAC, LQ, MACLoQ, Potential Sector |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
TOWARDS ENERGY EFFICIENCY IN AN INTEGRATED HEALTH CARE INFRASTRUCTURE BASED ON
THE CLOUD |
Author: |
ABDESSELAM OUARDI, ABDERRAHIM SEKKAKI, DRISS MAMMASS |
Abstract: |
The need for storage and instant access to personal data (patient or
professional) in Moroccan healthcare is exponential. Thus, the access needs of
health professionals to different health information necessitate continuity of
care, hence an architecture based on the concept of the cloud proves necessary.
Considering the increasing demands placed on healthcare providers for
infrastructure, systems and support, cloud computing will be the appropriate
solution to meet the needs for care coordination, collaboration and
communication between the different actors in the field Of health. Cloud
Computing represents an evolution of information systems. Cloud computing brings
a new approach to computing, a different way of using computer resources. This
development has given existence to several providers offering multiple services.
Then, Cloud end users are faced with the choice of the appropriate provider in
terms of supported technologies, security and access rules. So, the sector aims
to create a solution that works for all types of medical facilities, be it
hospitals, health centers, clinics, private health care providers. In this
paper, we propose a solution based on the use of a cloud broker in an
inter-cloud environment in order to allow the technological renewal of our
infrastructure while reducing the time of access to the services requested by
the users, the dissipation of the energy And the number of physical servers
installed. Evaluation results demonstrate that our architecture achieve good
performance. |
Keywords: |
Cloud Computing; Cloud Broker; Data Center; VM Migration; Interoperability;
CompatibleOne; CloudSim. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
Title: |
A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND
KEY-DEPENDENT DATA TECHNIQUE |
Author: |
MAHER A. ALSARAYREH , MOHAMMAD A. ALIA , KHULOOD ABU MARIA |
Abstract: |
Steganography is defined as the art of hiding secret information. It is used to
guarantee information accessibility only by authorized parties. The
least-significant bit (LSB) approach is one of the most important scenarios in
steganography. However, the existing LSB approaches apply some changing in the
image’s pixels values, which make the image suspected by intruders and hackers.
This paper proposed an image steganography system based on the exact matching
between the image’s pixel values and the secret data. As well as, a random
key-dependent data (RKDD) is generated without performing any changes on the
image’s pixel values. Moreover, the proposed system has been tested successfully
on many images giving promising results. These significant results can be
perceived in terms of fast searching time, great number of matches, reduced key
size, achieving steganography performance criteria, invisibility, payload/
capacity and robustness. |
Keywords: |
Steganography, Cryptography, Encryption, Information Hiding, Exact Matching
Algorithm, Image, Secret message, LSB, and Key-Dependent Data Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
15th March 2017 -- Vol. 95. No. 5 -- 2017 |
Full
Text |
|
|
|