|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2016 | Vol. 91 No.1 |
Title: |
A NOVEL APPROACH TO GENERATE DISTRIBUTED GLOBAL AND LOCAL USE CASES: A NEW
NOTATION |
Author: |
MOHAMMAD I. MUHAIRAT, AKRAM ABDELQADER, MOHAMMAD AL RAWAJBEH |
Abstract: |
Requirements analysis is very important phase of the software development life
cycle (SDLC). It is used to build domain or conceptual models from requirements
analysis. These models are helpful for defining stakeholders and functional
requirements. Also, these functional requirements are easy to define for local
systems, but they are very difficult to define for distributed stakeholders or
systems. In this paper, we proposed a new approach to generate integrated
requirements for a distributed system. This approach is composed of four steps:
The first one is to generate an event table with a proposed template that
suitable for requirements collection. This event table will be filled for each
department and branch. The second one is to generate a normalized event table
for all departments and branches. The third one is building and analyzing an
integrated table to define the redundancy of functional requirements for all
departments and branches. The final one is to generate and propose a new UML
notation for distributed functional requirements. This approach is applied to a
real ERP system as a case study and shows a significant result. |
Keywords: |
Analysis Models, Distributed requirements, Transformation, Distributed Global
Use Case, Distributed Local Use Case, Event Table, Use Case Notation. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
SINGLE CHANNEL SPEECH ENHANCEMENT USING IDEAL BINARY MASK TECHNIQUE BASED ON
COMPUTATIONAL AUDITORY SCENE ANALYSIS |
Author: |
ABRAR HUSSAIN, KALAIVANI CHELLAPPAN, SITI ZAMRATOL M |
Abstract: |
Single channel speech enhancement is necessary where the multichannel speech
enhancement is not feasible due to space constraints in the intended device and
cost-effectiveness. However, the problem of having limited information from
single channel sound signal mixtures or unavailability of the speech source
signals makes it more difficult to separate the target speech from the
background maskers in the acoustic environment of low signal to noise ratio, in
various background noises and in less temporal duration of speech signals. To
address these problems, computational auditory analysis became popular from the
last decade as a new concept for speech enhancement. In this paper, ideal binary
mask which is inspired by the computational auditory analysis is used to analyze
and synthesize the input speech signals and masker signals in the time-frequency
domain, where all the signals usually overlap. Synthesized signals are evaluated
for speech quality measurement in terms of segmental signal-to-noise ratio. This
study uses Malay language based speech as input speech signals. These input
speech signals vary in duration due to their word structure. Large crowd babble
speech and two talker competing speech are employed as masker signals. The input
signal-to-noise ratio is varied from -5 dB to +15 dB in steps of 5 dB to vary
the difficulty level of acoustic environment. Results show that ideal binary
mask algorithm reconstructs the target speech signals efficiently from the
degraded and noisy speech signals. This is signified by the high segmental
signal-to-noise ratio even in the lowest input signal-to-noise ratio. This type
of high noise reduction is necessary to lessen the burden of elderly listener’s
listening effort in noisy environment. |
Keywords: |
Speech Enhancement, Ideal Binary Mask, Time-Frequency Masking, Computational
Auditory Scene Analysis, Speech Quality |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
COMPACT FRACTAL MONOPOLE ANTENNA WITH DEFECTED GROUND STRUCTURE FOR WIDE BAND
APPLICATIONS |
Author: |
M V GIRIDHAR, T V RAMAKRISHNA, B T P MADHAV, K V L BHAVANI, M V REDDIAH BABU, V
SAI KRISHNA, G V KRISHNA, S S MOHAN REDDY |
Abstract: |
This letter presents a novel fan wing shaped uniform one dimensional fractal
pattern antenna. The proposed antenna consisting of different inverted L-shaped
elements to form a fan wing shaped structure. The design model achieved huge
bandwidth characteristics with average gain of 4 dB. The simple structure of the
proposed antenna with light weight makes it appropriate for many wireless
communication applications. The simulated results on HFSS and measured results
on ZNB 20 Vector Network Analyzer show that the proposed antenna has very good
performance in impedance bandwidth and radiation pattern. |
Keywords: |
Compact, Fractal Monopole Antenna, Wide bandwidth, Defected Ground Structure (DGS)
Wireless Communications. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
REAL-TIME FACE DETECTION AND RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS (PCA)
– BACK PROPAGATION NEURAL NETWORK (BPNN) AND RADIAL BASIS FUNCTION (RBF) |
Author: |
NAWAF HAZIM BARNOUTI, SINAN SAMEER MAHMOOD AL-DABBAGH, MUHAMMED HAZIM JAAFER AL-BAMARNI |
Abstract: |
Face Recognition is one of the most important and fastest growing biometric area
during the last several years and become the most successful application in
image processing and broadly used in security systems. A real-time system for
recognizing faces using mobile device or webcam was implemented. Face detection
is the first basic step of any face recognition system. Viola-Jones method is
used to detect and crop face area from the image. Feature extraction considered
as a main challenge in any face recognition system. Principal Component Analysis
(PCA) is efficient and used for feature extraction and dimension reduction. Back
Propagation Neural Network (BPNN) and Radial Basis Function (RBF) are used for
classification process. RBF is considered the result of BPNN output layer as
input. The system is tested and achieve high recognition rates. Information
about individuals was stored in a database. |
Keywords: |
Face Detection, Face Recognition, Feature Extraction, Biometrics, Neural
Network, PCA, BPNN, RBF |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
OFDMA-BASED NETWORKS CAPACITY IMPROVEMENT USING ENHANCED FRACTIONAL FREQUENCY
REUSE SCHEME |
Author: |
OMAR M. ESHANTA, MAHAMOD ISMAIL, ROSDIADEE NORDIN, NOR FADZILAH A |
Abstract: |
OFDMA as a broadband technology is intended to offer high data rate services. In
cellular networks, a Frequency Reuse (FR) principle has been used to maximize
the Signal to Noise-plus-Interference Ratio (SINR), which in turn allows high
data rates and spectral efficiency to be achieved. Earlier FR schemes used in 2G
and 3G networks are known as Integer Frequency Reuse (IFR) schemes, and were
able to improve the global SINR of the system but not the interference at cell
edge. Fractional Frequency Reuse (FFR) schemes have been proposed in OFDMA based
networks (WiMAX forum 2006) to combat the low SINR at cell edge and gain more
amount of spectrum per cell. The tradeoff between interference mitigation using
IFR schemes and the extra cell BW gained from FFR scheme needs to be considered.
There is a need for the analysis and optimization of FFR key parameters which
control the system performance to ensure the highest data rate and spectral
efficiency. In this paper, we propose a new FFR-based scheme called Enhance FFR
(EFFR), deriving its analytic model and using simulations to evaluate its
performance along with different FR schemes and patterns, including IFR and FFR
(classified into Hard, HFFR and Soft, SFFR). The effective SINR (SINReff) and
Cell Data Rate (DRcell) are used as performance criteria. Further, the optimum
values of SINRth and power ration ψ have been defined for all FR patterns.
Simulation results show that the highest DRcell was obtained from the proposed
EFFR 1x3x3, followed by SFFR 3x1x1, at 137.85 Mbps and 111.33 Mbps,
respectively. |
Keywords: |
OFDMA, Fractional Frequency Reuse FFR, Frequency Reuse Schemes, Spectral
Efficiency |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
EXPLORING THE USE OF SOCIAL MEDIA TOOLS AMONG STUDENTS FOR TEACHING AND LEARNING
PURPOSE |
Author: |
NUR SHAMSIAH ABDUL RAHMAN, MOHD SHAHIZAN OTHMAN, WALEED AL-RAHMI |
Abstract: |
Social media network is a fairly recent word used to define a form of learning
that can be performed via websites online learning. The exploring of the
potential use of social media tools and impact of contingent factors on the
relationship between three predictors was investigated. A total of 235 valid
responses were received from undergraduate students Faculty of Computing,
Universiti Teknologi Malaysia (UTM) in the study. Several factors have been
found to correlate with social media use, active learning both to affect
teaching and learning. The researchers made use of the structural equation
modelling (SEM) method with the SmartPLS program to shed a light on the adoption
process. The results show that the use of social media positively and
significantly relates to active learning, which in turn affect teaching and
learning. |
Keywords: |
Social Media, Teaching and Learning, Higher Education, Active Learning |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
A SCALED WEIGHTED VARIANCE S CONTROL CHART FOR SKEWED POPULATIONS |
Author: |
ABDU.M. A. ATTA, MAJED. H. A. SHORAIM, SHARIPAH. S. S.YAHAYA, ZAKIYAH. ZAIN,
HAZLINA. ALI |
Abstract: |
This paper proposes a new S control chart for monitoring process dispersion of
skewed populations. This control chart, called Scaled Weighted Variance S
control chart (SWV-S) hereafter, this new SWV-S control chart is an improvement
of the Weighted Variance S control chart (WV-S) proposed by Khoo et al. [11].
The proposed control chart reduces to the Shewhart S control chart when the
underlying distribution is symmetric. The proposed SWV-S control chart compared
with the Shewhart S and WV-S control charts. An illustrative example is given to
show how the proposed SWV-S control chart is constructed and works. Simulations
study show that the proposed SWV-S control chart has the lower false alarm rates
than the Shewhart S control chart and WV-S control chart when the underlying
distributions are Weibull, lognormal and gamma. In terms of the probability of
detection rates, the proposed SWV-S control chart is closer to S control chart
with the exact method than those of the Shewhart S and WV-S control charts. |
Keywords: |
Control Chart, Weighted Variance, Scaled Weighted Variance, False Alarm Rates,
Skewed Populations |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
CATENATED OFDM MODULATION SCHEME COLLABORATIVE WITH VLC FOR UPLINK LIFI SYSTEM |
Author: |
N. M. NAWAWI, ANUAR M. S., M. N. JUNITA, A. K. RAHMAN, S. A. ALJUNID |
Abstract: |
This paper focus on performance of a new modulation approach which is known as
catenated orthogonal frequency division multiplexing (C-OFDM) integration with
visible light communication (VLC) system suggested for uplink LiFi system. OFDM
based network modulation and demodulation have a huge comparative advantages
over other modulation including reduced frequency selectivity fading, provision
for a higher number of subcarriers, high data rate and higher spectrum
efficiency. By using simulation, the proposed system based on novel C-OFDM gives
a good bit error rate (BER) performance (10-9 and below) with 16-quadrature
amplitude modulation (16-QAM). In term of spectral efficiency, the system is
compared with presence dense wavelength division multiplexing (DWDM) technique
when varied the number of users. The result reveals that proposed C-OFDM is
feasible for multiband modulation system and the scheme also effects on high
spectral efficiency with spectral offset of more than 1 bps/Hz compared to
conventional method. |
Keywords: |
Catenated OFDM (C-OFDM),Visible Light Communication (VLC), OFDM, Modulation
Technique, Multiband Modulation |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
CLASSIFICATION, EVALUATION AND ASSESSMENT OF SERIOUS GAMES IN BUSINESS FIELD |
Author: |
BAKKALI YEDRI OTHMAN, SLIMANI ABDELALI, BELAHBIB AMINE, EL AACHAK LOTFI, EL
OUAAI FATIHA, BOUHORMA MOHAMED |
Abstract: |
The teaching manners have been improved and becoming more interactive with the
technological progress that the educational field has known, and especially with
the integration of the video games in the learning process. However, in order to
promote their business, several companies are keeping the challenge by using
some existing games, trying to develop their own serious games. In this paper we
hope to present the art of state of several works corresponding to the business
field. This paper resumes the analysis of the existing study of serious game for
business process. However, they raise many challenges into different sectors.
Indeed, the comparative study of some existing games will describe some
characteristics used to classify all surveyed games and present them into graphs
and charts with their corresponding discussion. |
Keywords: |
Serious Games, Business, E-Training, Assessment, Classification |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
ROAD EXTRACTION IN A VERY HIGH RESOLUTION IMAGE BASED ON HOUGH TRANSFORMATION
AND LOCAL BINARY PATTERNS |
Author: |
ZAAJ IBTISSAM, BRAHIM EL KHALIL CHAOUKI , LHOUSSAINE MASMOUDI |
Abstract: |
Recently, many approaches have been presented for automatic urban road
extraction. Most of these approaches are based on line detecting algorithms.
This paper present a new method of road extraction from high resolution image in
urban areas, based on Hough Transformation and Local Binary Patterns. The Hough
Transformation method has proven important results to straight line extraction,
but it still not sufficient to distinguish between road and others objetcs are
similar spectral reflectance (building, parking lots, square and other built-up
areas) making road extraction intrinsically difficult. However the Local Binarry
Patterns (LBP) seems to be a promising method, it compare the luminance level of
a pixel with the levels of its neighbors. This therefore reflects information on
regular patterns in the image what is called a texture. The main contribution of
this work is using the LBP operator in the road extraction.
We applied our system on a set of satellite imagery, the combination of the LBP
operator and Hough transformation provide empirical results illustrating the
effectiveness of our approach.
Furthermore, we compared the proposed method with other existing method in the
literature.
We conclude that the proposed method can provide an effective means for
extracting roads over densely populated urban areas from VHR satellite images. |
Keywords: |
Road detection, Local Binary Patterns, Hough transformation, Contour. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
FEATURE-BASED PHISHING DETECTION TECHNIQUE |
Author: |
XIN MEI CHOO, KANG LENG CHIEW, DAYANG HANANI ABANG IBRAHIM, NADIANATRA MUSA, SAN
NAH SZE, WEI KING TIONG |
Abstract: |
Phishing is an Internet fraud to entice unsuspecting victims. The tactic of
phishing is to impersonate the trusted entities by employing both social
engineering and technical subterfuge. Moreover, phishing is a form of online
identity theft that creates a fake copy of popular site. There are many types of
anti-phishing techniques available. However, they are mostly still in the
infancy stage which may give false alarm to the user. Therefore, this research
aims to develop a feature-based phishing detection technique to overcome the
limitation. The proposed method involves aggregating new features with several
existing features to form a sensitive features set. Based on the features set,
the proposed method will utilise support vector machine to perform the
classification. The experimental results show convincing performance with 95.33
percent of accuracy. |
Keywords: |
URL Features, Website Features, Phishing Detection, Anti-Phishing, Feature
Extraction, Classification |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
A PRELIMINARY STUDY ON REWARD MANAGEMENT SYSTEM MODEL FOR ENCOURAGING EMPLOYEE’S
KNOWLEDGE SHARING BEHAVIOR |
Author: |
NUUR ASRAM KAMAR NORDIN, NOREEN IZZA ARSHAD, KHAIRUL SHAFEE KALID |
Abstract: |
Research in the IS areas has shared many views on technology and reward in
organizations that support knowledge sharing behavior. However, these researches
have not clearly mentioned how technology and reward system could be the enabler
that would encourage and sustain knowledge sharing. By adopting the Theory of
Reason Action and Social Exchange Theory, this paper develops a theoretical
model that provides guidance on how organizations could embed reward systems as
a part of their larger knowledge management systems. With this model, business
and IT managers could ensure that their reward system has the mechanisms (i.e.
IT Support, Quality Evaluation) that support knowledge sharing intention. It is
hoped that the intrinsic rewards (i.e. reciprocity, self-efficacy, recognition,
and enjoyment) gained from the reward management system could then drives a
sustainable knowledge sharing behavior. |
Keywords: |
Knowledge Sharing Behavior, Reward Management System (RMS), Intrinsic Rewards,
Theory of Reasoned Action (TRA), Social Exchange Theory (SET) |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
AN ADAPTIVE PERSONNEL SELECTION MODEL FOR RECRUITMENT USING DOMAIN-DRIVEN DATA
MINING |
Author: |
MUHAMMAD AHMAD SHEHU, FAISAL SAEED |
Abstract: |
To support organizations in structuring personnel selection strategy for
recruitment, various researches have been conducted using data mining
approaches, and selection models containing selection rules were developed.
Based on the methodology used, researches conducted were categorized as method –
driven and domain–driven data mining approach of which domain–driven was
discovered the preferred due to its model applicability in the real world.
However, with the occasional changes in organization selection strategy, the
models developed cannot adapt to these changes due to the static nature of the
rules contained in the models. This research aims at developing an adaptive
personnel selection model to support personnel selection for recruitment and
adapt to the changes in personnel selection strategy. The framework used in
developing the model involves Federal University Lokoja Nigeria recruitment
dataset usage for extraction of selection rules to support personnel selection
process using decision tree method of classification, generation of adaptive
rules to handle the changes in personnel selection strategy using frequent and
non-frequent pattern of data mining and domain expert’s validation of each rule
developed. The result of the implementation of the proposed model was ranked the
highest after comparing it with selection models developed using four decision
trees. |
Keywords: |
Human resource management, recruitment, personnel selection, data mining,
method–driven data mining, domain-driven data mining. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
BIG DATA FOR ACCREDITATION: A CASE STUDY OF SAUDI UNIVERSITIES |
Author: |
ARWA IBRAHIM AHMED |
Abstract: |
Big data and its analysis are one of the most prominent technological trends
amongst academia and business as it allows treat massive, varied and complex
structure of data sets from numerous sources to gain deeper insights and greater
values from these data analytics. This study explore the factors necessary for
Big Data implementation and provide understanding how enhance these factors in
higher education accreditation using qualitative case study of Saudi
universities. This found six key factors are essential for big data
implementation in higher education accreditation in Saudi universities, are
security issues, preserving privacy, analytical skills, IT infrastructure, top
management support and collaborative information-sharing projects. |
Keywords: |
Big Data, Higher Education, Accreditation, Analytics and Key Factors |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
SONG STRUCTURE IDENTIFICATION OF JAVANESE GAMELAN MUSIC BASED ON ANALYSIS OF
PERIODICITY DISTRIBUTION |
Author: |
D. P. WULANDARI, Y. K. SUPRAPTO, M. H. PURNOMO |
Abstract: |
In a song played by multiple instruments, there is distribution of periodicities
that comes from different playing patterns among groups of instruments. We
propose a visualization of this distribution for analyzing song structure of
Javanese gamelan music. A predefined number of periodicities along with their
confidence levels are obtained using comb filter resonator. The filter is
applied to the auto-correlation function of overlapping analysis frames of the
musical track. We cluster the distribution based on the proximity of two
parameters, which are periodicity and confidence level. In this way, we assume
that each cluster center represents the periodicity of a group of instruments.
We observe four features of the visualization, namely the width and the average
height of periodicity distribution, the pattern of dominant periodicities, and
the fluctuation of the most dominant periodicity. Those features implicitly give
us information regarding the strength applied to the notes, the estimated number
of instruments, and the accent of song according to those features, from which
we make an inference about the structure. We provide the experiment with a
database of thirty Javanese gamelan songs and compare the analysis of lancaran,
ladrang, and ketawang song structures. The results show that using this method,
lancaran received the highest performance, which is 0.94 F-measure, followed by
ketawang and ladrang with F-measure of 0.90 and 0.75 respectively. |
Keywords: |
Comb Filter Resonator, Confidence Level, Periodicity Distribution, Song
Structure Analysis, Javanese Gamelan Music |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
IDENTIFYING SIMILAR BUSINESS PROCESS MODELS |
Author: |
YEDILKHAN D., BEKTEMYSSOVA G.U |
Abstract: |
Large organizations experience shows that repositories of business process
models contain lots amounts of duplication. For example, this duplication arises
when the repository covers multiple variants of the same processes. This article
studies the problem of identifying similar business process models. The article
proposes technique for detecting clusters of approximate duplications based on
well-known clustering algorithm, such as DBSCAN. |
Keywords: |
Business Process Model, Duplication Models, Standardization, BPM |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
ADAPTIVE BACKSTEPPING CONTROL FOR WIND TURBINES WITH DOUBLY-FED INDUCTION
GENERATOR UNDER UNKNOWN PARAMETERS |
Author: |
MOHAMMED RACHIDI, BADR BOUOULID IDRISSI |
Abstract: |
This paper deals with an adaptive, nonlinear controller for wind systems
connected to a stable electrical grid and using a doubly-fed induction machine
as a generator. The study focuses on the case wherein the aerodynamic torque
model and winding resistances of the generator are unknown and will be updating
in real time. Two objectives were fixed; the first one is speed control, which
allows us to force the system to track the optimal torque-speed characteristic
of the wind turbine to extract the maximum power, and the second deals with the
control of the reactive power transmitted to the electrical grid. The
mathematical development, both for the model of the global system and the
control and update laws, is examined in detail. The control design is
investigated using a backstepping technique, and the overall stability of the
system is shown by employing the Lyapunov theory. The results of the simulation,
which was built on Matlab-Simulink, confirm when compared with control without
adaptation, the validity of this work and the robustness of our control in the
presence of parametric fluctuations or uncertainty modeling. |
Keywords: |
Wind power generation, doubly-fed induction generator, unknown winding
resistances, unknown aerodynamic torque, adaptive control, backstepping control,
Lyapunov theory. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
T2WSN: TITIVATED TWO-TIRED CHORD OVERLAY AIDING ROBUSTNESS AND DELIVERY RATIO
FOR WIRELESS SENSOR NETWORKS |
Author: |
T. Peer Meera Labbai, S.Jothi Prasanna |
Abstract: |
Wireless Sensor Network (WSN) is the embryonic field of research in the past few
years due to its appealing applications in need of mobility. The efficiency of
message transfer gets a noteworthy amendment if mobility is assimilated in
certain applications. Bettering some performance metrics improves applicability
of the applications in several sporadic scenarios like military and disaster
surveillance, industrial product line monitoring, agricultural and wildlife
observation and health care. In this article, the subsisting C2WSN for static
nodes is amended with a periodic light weighted CREIDO packet to improve the
robustness and packet delivery ratio in the two-tiered chord overlay for
wireless sensor networks. The simulated experiments also show that an
improvement in robustness leads to increase in packet delivery ratio. |
Keywords: |
Overlay, CREIDO, Chord, Sensor, PDR. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
PERFORMANCE IMPROVEMENT OF TRANSMISSION SYSTEM USING TCSC WITH FIRING ANGLE
CONTROL |
Author: |
Mr.A.HEMA SEKHAR, Dr.A.LAKSHMI DEVI |
Abstract: |
In todays highly complex and interconnected power systems, mostly made up of
thousands of buses and hundreds of generators, there is a great need to improve
electric power utilization maintaining reliability and security. Available power
generation, usually not situated near a growing load center, is subject to
regulatory policies and environmental issues. The majority of the losses are
occurred at the transmission level. So by controlling or managing the
transmission system with FACTS the losses will be reduced. Although the voltage
constraints are within limits but the reactive power losses are majorly high in
transmission system. So by suitable placement of series FACTS devices i.e TCSC
at the transmission system the reactive power losses are controlled. In this
paper the concept of firing angle control for the series compensating device is
introduced for flexible control of the device at transmission system. Simulation
results are carried out on IEEE 14, 30, 57,118 bus test systems. |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
SENTIMENT ANALYSIS OF SMARTPHONE PRODUCT REVIEW USING SUPPORT VECTOR MACHINE
ALGORITHM-BASED PARTICLE SWARM OPTIMIZATION |
Author: |
MOCHAMAD WAHYUDI, DINAR AJENG KRISTIYANTI |
Abstract: |
Nowdays, social media gives the very large effect to the digital improvement in
terms of global communications. It can be seen from the increasing of consumers
opinion and review about smartphone product that they write on various social
media. So that can be recognized various sentiments about the product either
positive, negative or neutral. Sentiment analysis is a computational study of
the opinions, behaviors and emotions of people toward the entity. The entity
describes the individuals, events or topics. That topics generally could be the
review of diverse datasets, one of it is a product review. www.gsmarena.com is
one of the website that provides information of smartphone products review.
Reexamination of smartphone product review by classifiying it into positive and
negative class is the good way to find out the consumers response of the
products quickly and properly. From some techniques of classifications, the most
often used is Support Vector Machine (SVM). SVM are able to identify the
sparated hyperplane which maximize margin two different classes. However SVM is
lack of electing appropriate parameters or features. Election features and
setting parameter at SVM significantly affecting the results of accuracy
classifications. Therefore, in this research used the merger method election
features, namely Particle Swarm Optimization in order to increase the
classifications accuracy Support Vector Machine. This research produces
classifications text in the positive or negative of smartphone products review.
The evaluation was done by using 10 Fold Cross Validation. While the measurement
accuracy is measured by Confusion Matrix and ROC curve. The result showed an
increasing in accuracy SVM of 82.00% to 94.50%. |
Keywords: |
Particle Swarm Optimization, Review, Sentiment Analysis, Support Vector
Machines, Text Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF MF-MB CANCELLATION DETECTION IN TRANSMISSION OF
PHYSICAL LAYER NETWORK |
Author: |
B.SUNEELA, E.V.KRISHNA RAO, K.CH..SRI KAVYA |
Abstract: |
Today’s Wireless networks have become more and more prevalent to promise global
digital connectivity, and wireless devices have quickly evolved into multimedia
smart phones, which run applications that demand high-speed data connections.
MU-MIMO (Multi-User Multiple-Input-Multiple-Output) wireless method has received
considerable attention as a way to meet such demand by achieving high
efficiency. In this paper consider a Physical-layer Network Channel and proposed
a less difficulty of MF-SIC (Multiple Feedback Successive Interference
Cancellation) strategies with multi-branch (MB) processing for achieving higher
detection diversity order. Additionally, LDPC (Low-Density Parity-Check) coded
are used for makingproper detection and performance at low complexities which
are used towards removing the inter-symbolinterference, as well as spatial
effects to large dimension of delay spreads with MIMO channel. The experimental
results show that these new detection systems considerably beat the previous SIC
receivers as well as moderate the singularity of propagation error with low
processing delay. |
Keywords: |
PNC, MU-MIMO system, Error control code, Multi-Branch Processing, Successive
Interference Cancellation |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
Title: |
FPGA IMPLEMENTATION OF MIMO METAHEURISTIC MAXIMUM-LIKELIHOOD ALGORITHM HISD-ML |
Author: |
ABDESSALEM TRIMECHE, ANIS SAKLY, ABDELLATIF MTIBAA |
Abstract: |
In many wireless communication systems, the detection comes down to solving an
optimization problem of a combinatorial system of the form y = Hx + w. In the
general case, it’s known that ML is "NP-Hard". In this paper, to solve this
problem, a new algorithm called HISD suboptimal (hyperplane Intersection and
Selection Detector) is proposed. This algorithm is based on a geometric
approach. Compared with existing algorithms, the HISD has three very attractive
features for implantation into real systems. The first relates to its
performance in terms of BER which are close the optimum (ML) limit. Its
complexity in terms of calculation is small and its structure is inherently
parallel, which makes its hardware implementation easier. The puropose of our
research is to develop a near optimal detector that performs a similar
performance ML with a polynomial computational complexity. Indeed, we adopt an
approach based on the methods of operational research in real time and
especially meta-heuristics. Indeed, the developed method is composed of two
complementary techniques: the intensification and diversification .In this
paper, we propose a hardware implementation of the HISD algorithm in FPGA for
MIMO (Multiple Input Multiple Output) systems. |
Keywords: |
MIMO, HISD, FPGA, ML, BER, SNR… |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2016 -- Vol. 90. No. 1 -- 2016 |
Full
Text |
|
|
|