|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
December 2014 | Vol. 70 No.1 |
Title: |
AN EFFICIENT SUPER PEER SELECTION ALGORITHM FOR PEER-TO-PEER (P2P) LIVE
STREAMING NETWORK |
Author: |
NARAYANAN.M, ARUN.C |
Abstract: |
Peer-to-Peer (P2P) computing is the fast emergent overlay network distribution
system, the main gains of P2P is each peer in the network can act autonomous.
Super peer network representation is an advancing design of centralized topology
embedded in a decentralized system in the Peer-to-Peer system. Super peer
overlay helps to improve the performance of P2P applications such as live
streaming. To avoid the risk of super peer node failure in the network
communication model, this paper proposes the gossip communication based
established protocol and firefly algorithm to select the fail over super peer
node from a cluster of peers in order to maintain the reliability, scalability
and robustness of the network. We simulated this network model in peersim
simulator to accomplish great performance. |
Keywords: |
Convergence Time, Distributed Network, Firefly Algorithm, Gossip, Super peer
overlay |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF TCP CONGESTION CONTROL ALGORITHMS THROUGHPUT FOR CVE
BASED ON CLOUD COMPUTING MODEL |
Author: |
ABDULSALAM YA’U GITAL, ABDUL SAMAD ISMAIL, HARUNA CHIROMA |
Abstract: |
Collaborative Virtual Environment (CVE) is becoming popular in the last few
years; this is because CVE is designed to allow geographically distributed users
to work together over the network. Currently, in the development of CVE Systems,
Client server architectures with multiple servers are used with TCP as update
transmitting transport protocol because of its reliability. With the increasing
number of collaborators, the transport protocol is inadequate to meet the system
requirements in terms of timely data transmission. The transport protocol (TCP)
throughput deteriorates in the network with large delay which leads to
unsatisfactory consistency requirement of the CVE systems.We proposed a cloud
based architectural model for improving scalability and consistency in CVE in an
earlier study. The current paper aims at evaluating and comparing the
performance of different TCP variants (Tahoe, Reno, New Reno, Vegas, SACK, Fack
and Linux) with the cloud based CVE architecture to determine the suitability of
each TCP variant for CVE. A comparative analysis between the different TCP
variants is presented in terms of throughput verses elapse time, with increasing
number of users in the system. TCP Vegas with the cloud based model was found to
be effective for CVE systems based on Cloud Computing . |
Keywords: |
CVE Architecture, Cloud Computing, TCP Variants (Congestion Control
Algorithm). |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF PID CONTROL BASED BABY INCUBATOR |
Author: |
ADHI KSATRIA THEOPAGA, ACHMAD RIZAL, ERWIN SUSANTO |
Abstract: |
The birth in early pregnancy and the lack of pregnancy nutrition can lead to
birth problems and premature birth so that the baby easily induces hypothermia.
Therefore, these babies require an incubator as a means of heating with standard
temperatures between 32-37°C to help babies survive and to be able to adapt to
the outside temperature. Nowadays, baby incubator on the market is using on-off
control on the heating system. This condition has the disadvantage because the
transient response time of the position of living long enough to off or
conversely. This process certainly requires a large enough power to turn on and
turn off the heater continuously. Therefore, we need a technology that is
capable of controlling temperature conveniently. To overcome these problems we
apply temperature control technique using Proportional-Integral-Derivative (PID).
In this prototype, a designed baby incubator inside there is a two-piece box
(top and bottom). Top box is used to put sensors and sensor display. While the
bottom one is used to put electronic circuits, heater, and fan. The temperature
sensor used is a room temperature sensor SHT11, while the temperature sensor for
baby is NTC type. Baby incubator temperature changes and can be seen in the form
of the temperature display on the display device. PID values are obtained by
using the Ziegler-Nichols 1st method. Plant was fed by a unit-step input and the
output response is obtained from the values of Kp = 13,827, Ki = 0,576, and Kd =
82,962. Each value is used into the heating system and the obtained time
achievement is 4 minutes 44 seconds with set point at 32°C. Hopefully, in the
future this system can be very useful for nurses and hospitals, as well as it
can be redeveloped for enhancement purposes |
Keywords: |
Baby Incubator, PID Controller, Ziegler-Nichols |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A SURVEY OF COPY-MOVE FORGERY DETECTION TECHNIQUES |
Author: |
SALAM A.THAJEEL, GHAZALI SULONG |
Abstract: |
Copy-Move forgery is one of the significant image manipulations, where some
image parts are copied and pasted in original image. In this survey, we firstly
review about digital image forensics and its types. The brief discussion about
current research presented here with an analysis of the existing approaches for
detect image tampering, which are classified into block-based method and key
point-based method. Then we demonstrate the popular techniques of two methods
and analysis of several techniques. Finally, the all techniques advantages and
disadvantages summarized and some future research directions were pointed out. |
Keywords: |
Block Matching, Digital Image, Forgery Detection, Copy-Move Forgery, |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ONE DIMENSIONAL WITH DYNAMIC FEATURES VECTOR FOR IRIS CLASSIFICATION USING
TRADITIONAL SUPPORT VECTOR MACHINES |
Author: |
AHMAD NAZRI ALI , MOHD ZAID ABDULLAH |
Abstract: |
This paper proposes an iris classification for small and imbalance dataset
employing traditional Support Vector Machine classifier. A technique from the
combination of modified conventional moving average and histogram equalization
are proposed to produce the figurative and interpretability iris texture. In
doing so, the smooth effect of the iris texture will take place for feature
extraction. This study also proposed one-dimensional features with dynamic
vector which are extracted by manipulating the global mean and intensity
variation on the un-normalized iris image. The uniqueness of the proposed
feature extraction technique is where eyelid, eyelashes and lighting effect will
be merged together in the calculation in order to produce the feature vector.
Therefore, this study has not considered the noise removal method, and this
differs compared to most previous works, which have implemented noise removal
method for eliminating the eyelid and eyelashes information. The images from
CASIA Version 1 and Version 4-Interval are used to assess the proposed method.
The results obtained on these data sets reveal the effectiveness of the
suggested method. |
Keywords: |
Iris Classification, Support Vector Machines, Global Mean, One-dimensional |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NOVEL DATA MINING METHOD FOR MALWARE DETECTION |
Author: |
HAMID REZA RANJBAR, MEHDI SADEGHZADEH, 3AHMAD KESHAVARZ |
Abstract: |
Losses caused by malware are irrecoverable. Detection of malicious activity is
the most challenge in the security of computing systems because current virulent
executable are using sophisticated polymorphism and metamorphism techniques. It
make difficult for analyzers to investigate their code statically. In this
paper, we present a data mining approach to predict executable behavior. We
provide an Application Programming Interface (API) which provides sequences
captured of a running process with the aim of its predicting intention. Although
API calls are commonly analyzed by existing anti-viruses and sandboxes, our work
presents for the first time that using an API and the number of iteration as a
countermeasure for malware detection in the API. The experiments have shown the
effectiveness of our method on polymorphic and metamorphic malware by achieving
an accuracy of 93.5% while keeping detection rate as high as 95%. |
Keywords: |
Malware, Polymorphic, Metamorphic malware, Data Mining, API calls. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
MULTIOBJECTIVE OPTIMIZATION OF INFORMATION SYSTEM QUALITY ENHANCEMENT |
Author: |
ABIR ELMIR, NORELISLAM EL HAMI, BADR ELMIR, BOUCHAIB BOUNABAT RACHID ELLAIA,
MHAMED ITMI |
Abstract: |
Organizations have to efficiently manage efforts they deploy in order to enhance
and ensure information system quality. Unlike other research works addressing
this issue, the present proposal handle quality characteristics, such
interoperability and security, by taking into account the subsisting
complementarity between the different quality factors, their interactions and
mutual effects. This paper considers the use of multiobjective optimization
techniques in order to plan effectively quality evolution in inter
organizational context. To ensure this effectiveness goal, this paper proposes
initially a model to represent quality evolution and planning. Quality degrees
are evaluated using ratio metrics taking into account all operational assessment
aspects. In a second stage, a Multi Objective Particle Swarm optimization (MOPSO)
algorithm is used as a heuristic optimization technique to obtain the best
efforts distribution in collaborative networks. |
Keywords: |
Information system quality, Project planning, Effort dispatching, Multi
objective optimization, Particle Swarm optimization |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ROTATION AND SCALE INVARIANT FEATURE EXTRACTION FOR MRI BRAIN IMAGES |
Author: |
NAVEEN KISHORE GATTIM, V RAJESH |
Abstract: |
Texture classification of images with varied orientations and scale changes is a
challenging and considered to be important in image analysis. Feature extraction
can be used to increase the efficiency of texture classification using log polar
wavelet energy signatures. For the image to be rotation and scale invariant two
major steps are applied which involves applying log polar transform and adaptive
row shift invariant wavelet transform. Log polar transform eliminates the
rotation and scale effects and causes a row shifted log polar image, which
undergoes adaptive row shift invariant wavelet transform to remove the row shift
effects. Finally they obtained output wavelet coefficients are rotation and
scale invariant. The complexity of O (n log n) is efficient with adaptive row
shift invariant wavelet packet transform. From the log polar wavelet energy
signatures a feature vector is generated which are extracted from each sub band
of wavelet coefficients. In the experiments the features are extracted for
images considering different orientation and scale changes and simultaneously
experiment is simulated for few wavelet families. The experiment results show
the efficiency of few wavelets in extracting the features of a given image. The
overall accuracy rate for this approach is 87.05 percent representing that the
extracted energy signatures are effective rotation and scale invariant features. |
Keywords: |
Log polar transform, Row shift invariant wavelet transform, Rotation and
scale invariance, Feature extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
FEATURE EXTRACTION IN SEGMENTED WORDS FOR SEMI-AUTOMATIC TRANSCRIPTION OF
HANDWRITTEN ARABIC DOCUMENTS |
Author: |
NOUREDDINE EL MAKHFI AND RACHID BENSLIMANE |
Abstract: |
Scanning is a widely used solution for the preservation of ancient manuscripts.
However, this solution gives masses of document images which content is not
easily exploitable. In this work, we propose a new method that reduces
considerably the manual transcription. The aim is to explore the content of
digitized manuscripts. The proposed method is based on two main phases: the
first one consists to segment the digitized manuscripts on words, while the
second searches in a database of image words and their equivalent in text mode
the corresponding text words of each image word if it exists. This search phase
is based on a matching operation between features extracted words and those
stored in the database. To characterize each word, we use SIFT (Scale Invariant
Feature Transform) algorithm as a feature extractor for interest words points.
The results of the comparison provide a set of words in text mode which helps
transcription of Arabic manuscripts |
Keywords: |
Semi-Automatic Transcription; SIFT; Interest Points; XML; TEI; Word
Segmentation; Image / Text; Arabic Manuscripts. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
COOPERATIVE INTRUSION DETECTION SYSTEM FRAMEWORK USING MOBILE AGENTS FOR CLOUD
COMPUTING |
Author: |
HICHAM TOUMI, AHMED EDDAOUI, MOHAMED TALEA |
Abstract: |
Cloud computing improves collaboration, flexibility, scaling, and availability,
and provides the potential for cost reduction through optimized and efficient
computing. Cloud computing allows the use of a collection of services,
applications, information, and infrastructure composed of group of compute,
network, information, and storage resources. In brief, the Cloud Computing is
undergoing an incontestable success, which could be indeed compromised by
concerns about the risks related to potential misuse of this model aimed at
conducting illegal activities. To address these problems, a framework of
cooperative Hybrid intrusion detection system (Hy-IDS) and Mobile Agents is
proposed. This framework allows protection against the intrusion attacks. Our
Hybrid IDS is based on two types of IDS, the first for the detection of attacks
at the level of virtual machines (VMs), the second for the network attack
detection and Mobile Agents. After the collection of malicious data from
infected sources (VMs) via the first category of IDS; the second category of IDS
is also used for the generation of new signatures from the collected data based
on a signature generation algorithm. However, these new signatures are used to
update the database of the IDS itself. The mobile agents play an important role
in this collaboration. They are used in our framework for investigation of
Hosts, transfer data malicious and transfer update of a database of neighboring
IDS in the cloud. With this technique, the neighboring IDS will use these new
signatures to protect their area of control against the same type of attack. By
this type of close-loop control, the collaborative network security management
system can identify and address new distributed attacks more quickly and
effectively.
In this paper, the existing IDS and Mobile Agents technology are studied. Then
we develop a collaborative approach based on Hy-IDS and Mobile Agents in Cloud
Environment, to define a dynamic context which enables the detection of new
attacks. |
Keywords: |
Cloud Computing, Hy-IDS, Mobile Agents, Collaborative, Signatures. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
WIRELESS MACHINE TO MACHINE HEALTH CARE SOLUTION USING ANDROID MOBILE DEVICES IN
GLOBAL DEVICES |
Author: |
Dr.P.CHANDRASEKAR , A.RAJASEKAR , VINOTH JOHN PRAKASH ,K.PRABU4, N.UDHAYARAJ,
K.SENTHILKUMAR |
Abstract: |
The research and design of embedded pulse monitoring instrument overcome the
shortcoming of traditional pulse diagnosis system. The instrument has simple
structure stable and reliable operation, high accuracy, low power consumption,
good portability full featured function, and extensive application occasion. The
real time monitoring system for cardiac patient physical state is based on
wireless transceiver module technology. It can be taken by patient and keep the
patient moment intact because it is miniature and portable .The system can
monitor and record the physical states and moment parameters real time, and the
provide auxiliary means for the correct diagnosis of doctor. With intelligent
transceiver module, the sign of acute disease for patient can be found early,
and then the patient can be helpe in time, the sudden death of patient can be
avoid. The wireless transceiver module technology can be suite for short
distance communication, and the transmission distance is limit only about 10
meters, and then it can be suitable for in- patient monitoring. |
Keywords: |
Wireless Transceiver, Wpan, Temparature Sensor, Data Acquisition System |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING AND K MEAN BASED ON ANDROID
APPLICATION |
Author: |
KUNYANUTH KULARBPHETTONG, SUNISA SOMNGAM, CHOLTICHA TONGSIRI, PATTARAPAN
ROONRAKWIT |
Abstract: |
The objective of this research is to develop the diamond recommendation system
by using K-Means and Collaborative Filtering techniques. The prototype system
suggests users automatically in order to maximize users’ satisfaction. The
system design and development will be in the form of Android (android operating
system). We illustrate the methodologies and experimental results of this
system. In this project, it was divided the result by the research purposes into
2 parts: developing the Mobile application for diamond recommender users and
evaluating and testing the system. The results showed that the experts and users
are satisfied with the system at a good level. The guide to buying diamonds
actually works. |
Keywords: |
Recommendation system; K-Mean; Collaborative filtering; Android |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
THE EVALUATION OF LOGISTIC INFORMATION SYSTEM PERFORMANCE AT UNIVERSITY USE
FRAMEWORK COBIT 4.1 DOMAIN MONITORING AND EVALUATE (STUDY CASE: SATYA
WACANA CHRISTIAN UNIVERSITY) |
Author: |
IMANUEL SUSANTO, AGUSTINUS FRITZ WIJAYA, ANDEKA ROCKY TANAAMAH |
Abstract: |
Information technology develops rapidly. It makes all the existing business
processes in an organization cannot be separated from the use of computers. One
of the existing business processes in an organization that use the benefits of
IT is logistic department. Logistics system of an organization is always related
to the inventory management process. One of the organizations that use logistics
system is Satya Wacana Christian University Salatiga. The use of Logistics
Information System still found many obstacles such as; management of transaction
data that is not on the time and discrepancy information data items that are
shown in the Information System. One of the standards in evaluating the
InformationSystem’s performance is using the COBIT framework as one of the major
frameworks with the goal of providing clear policies and best practices to
assist the organization in achieving its business objectives. Performance
evaluation of LogisticsInformation System in Satya Wacana Christian
University(SWCU) is to use one of the domains in COBIT 4.1, domains about
Monitoring and Evaluate. The achievement of the research can be used as a
reference for Logistics Department in SWCU to improve the performance of the
organization so that it can compete with other universities that can improve
competitive advantage of SWCU Salatiga. |
Keywords: |
Logistics Information Systems, Performance, COBIT 4.1, Monitoring and Evaluate,
Competitive Advantage. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
WALL-FOLLOWING USING A KINECT SENSOR FOR CORRIDOR COVERAGE NAVIGATION |
Author: |
MUHAMMAD FUAD, DJOKO PURWANTO |
Abstract: |
Navigation system based on Kinect sensor for wall-following robot that operated
in stright corridor environment consist of two problems, visual perception to
get the distance to border of the corridor, and velocity control of the robot.
Schema, scenario, methods, and experiments to answer those problems using only a
single sensor was explained in this publication. |
Keywords: |
Visual Navigation, Kinect Sensor, Wall-Following, Stright Corridor. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
INCORPORATION OF REDUCED 09, 0B, 0D AND 0E STRUCTURES INTO INVERSE MIX COLUMNS
FOR AES-128 TECHNIQUE |
Author: |
M.SENTHIL KUMAR, Dr.S.RAJALAKSHMI |
Abstract: |
Cryptography technique plays a vital role in Signal Processing, Wireless
Communication, Satellite Communication, Cellular Mobile Communication and Wi-Max
for high security features. AES Encryption is performed to convert plain text
into cipher text, and AES Decryption is used to retrieve the original
information through some secure Key. Encryption process is divided into
Sub-Bytes, Shift-Rows, Mix-Column and Add Round key. Decryption process is split
into Inverse Sub-Bytes, Inverse Shift-Rows, Add Round Key and Inverse
Mix-Columns. Conventional AES Mix-Columns and Inverse Mix-columns are designed
using X-Time unit. X-time unit is used to perform shift and XOR operation more
than one time. Hence it consumes more area, delay and power. To overcome this
problem, Inverse Mix-Columns unit is designed using reduced 09, 0B, 0D and 0E
structures which perform 3 shift operations directly than XOR with fixed
coefficient 1B. Number of Shift and XOR operation is reduced in proposed Inverse
Mix-Columns structure. Hence reduced Inverse Mix-Columns based AES decryption
provides less area, delay and power than conventional X-Time based AES
decryption process. Simulation is performed by ModelSim6.3c and Synthesis is
carried out Xilinx10.1. Implementation is performed on FPGA Spartan3 device. |
Keywords: |
Cryptography, X-Time unit, Reduced Inverse Mix-Columns, Modified 09, 0B, 0D and
0E structures FPGA. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A PERSPECTIVE OF AUTOMATED PROGRAMMING ERROR FEEDBACK APPROACHES IN PROBLEM
SOLVING EXERCISES |
Author: |
S. SUHAILAN, S. ABDUL SAMAD and M.A BURHANUDDIN |
Abstract: |
Programming tools are meant for student to practice programming. Automated
programming error feedback will be provided for students to self-construct the
knowledge through their own experience. This paper has clustered current
approaches in providing automated error programming feedback to the students
during problem solving exercises. These include additional syntax error
messages, solution template mismatches, test data comparison, assisted agent
report and collaborative comment feedback. The study is conducted based on
published papers for last two decades. The trends are analyzed to get the
overview of latest research contributions towards eliminating programming
difficulties among students. The result shows that future direction of automated
programming error feedback approaches may combine agent and collaborative
feedback approaches towards more interactive, dynamic, end-user oriented and
specific goal oriented. Such future direction may help other researchers fill in
the gap on new ways of assisting learners to better understand feedback messages
provided by automated assessment tool. |
Keywords: |
Programming Language, Automated Programming Error Feedback, Computer Aided
Learning System, e-Learning |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ANALYSISING OF DNA MICROARRAY DATA USING PRINCIPLE COMPONENT ANALYSIS (PCA) |
Author: |
BAYAN M. SABBAR , MENA R. SULYMAN |
Abstract: |
In DNA analysis, Microarray technology is a new tool that can automate the
diagnostic task and improve the accuracy of the traditional diagnostic
techniques. With microarrays, it is possible to examine the expression of
thousands of genes in the same time. In this paper is used the Principle
Component Analysis (PCA) to extract the feature using BAC (Bayan –Anas Criteria)
algorithm that reduce the high dimensionality of data without losing the
important information that needed to identify Human DNA feature And to Diagnosis
specific disease. |
Keywords: |
Principle Component Analysis, DNA ,Diagnosis disease , Microarrays , Feature
extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NEW STATIC RESOURCE AND BANDWIDTH UTILIZATION APPROACH USING WIMAX 802.16E
FRACTIONAL FREQUENCY REUSE BASE STATION |
Author: |
M. K. Salman, R. B. Ahmad, Muayad S. Al-Janabi, A. Munam O |
Abstract: |
This paper proposed a new Static Resource Assignment (SRA) approach to enhance
resource and bandwidth utilization in traditional Fractional Frequency Reuse (FFR)
WiMAX Base Station (BS) which widely used in cellular network deployment to
overcome the inter-cell interference. The new SRA FFR efficiently tackled the
wastage of resources and bandwidth in traditional FFR. The work aimed to enhance
the resource exploitation in the downlink subframe of WiMAX BS by using Partial
Usage of Sub-channel (PUSC) mode and Orthogonal Frequency Division Multiple
Access (OFDMA). Four cases were designed modeled as a trade-off study to specify
the best way of exploiting BS resources in traditional FFR technique.
Quantitative measurements (Case 1 and Case 3) illustrated that the SRA FFR model
had an advantage over traditional FFR technique in various metrics, where the
study concluded with two optimal solutions: The number of served users and slots
utilization are reached to 87.77% and 85.89% respectively of the full DL
subframe capacity when Case 3 is considered. In contrast, the data rate (8.611
Mbps), subcarrier efficiency (3.210 b/subcarrier/burst), and spectral efficiency
(1.395 bps) were improved more when Case 1 was applied. The spectral efficiency
increased more than twice in SRA FFR that due to exploitation all the available
BW in DL subframe. The new SRA FFR succeeded in solving the problems related to
user’s rejection as a result of a lack of resources and inefficient use of the
bandwidth in cellular network. Therefore it can be considered a strong candidate
in cellular networks deployment. |
Keywords: |
Bandwidth Utilization, FFR, Resource Utilization, Static Resource Assignment
(SRA), WiMAX |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ACTIVE VORTEX INDUCED VIBRATION CONTROLLER AND NEURO IDENTIFICATION FOR MARINE
RISERS |
Author: |
MOHAMMED JAWAD MOHAMMED, INTAN Z. MAT DARUS |
Abstract: |
In this work, a vortex induced vibration controller within discrete time has
been investigated on marine cylinder pipe risers which represented by using
nonlinear neuron identification models namely NARX and NAR. Input-output data
have been extracted from the experimental rig of vortex induced vibration marine
riser. A proposed work in this paper is to create the nonlinear system
identification model undergoing for vortex induced vibration of marine riser
depends on Neural Network which didn’t represented before this time in this
application and using PID controller to suppress the vibration. Two nonlinear
system identification methods used to represent the models which are: Neural
Network based on Nonlinear Auto-Regressive External (Exogenous) Input (NARX) and
Neural Network based on Nonlinear Auto-Regressive (NAR). Also, the best model
has been chosen based on the lowest value of Mean Square Error (MSE) between
actual and predicted response. While, PID controller has been used to suppress
the oscillation of pipe cylinder for all models and the comparison of the
controller’s performance on each model by tuning the controller parameter (KP,
KI and KD) using heuristic method. Finally, the outcomes show that the NARX
model performed better than the NAR model to predict the dynamic response of the
system. On the other hand, PID controller has been managed to reduce the pipe
cylinder fluctuation for all models specially the NARX model. Using particle
swarm optimization (PSO) to improve the stability for marine riser on the
parameters of PID controller are planned for future work. |
Keywords: |
Neuro Identification, NARX Model, NAR Model, PID Controller, Vortex Induced
Vibration |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
MULTI-CORE FRAMEWORKS INVESTIGATION ON A REAL-TIME OBJECT TRACKING APPLICATION |
Author: |
MEI CHOO ANG, AMIRHOSSEIN AGHAMOHAMMADI, KOK WENG NG, ELANKOVAN SUNDARARAJAN,
MARZIEH MOGHARREBI, TECK LOON LIM |
Abstract: |
The current computer vision-based systems (CVS) are becoming computationally
demanding due to the improvement of their functionalities that is difficult to
be achieved with single-core frameworks. Such deficiencies of the single-core
frameworks have led to the introduction multi-core frameworks to meet the
required performance of their functionalities. However, in order to obtain good
performance for CVS on multi-core frameworks, it is crucial to utilise
parallelism tools efficiently. These parallelism tools need to be utilised on
hotspots (most time-consuming functions in algorithm) in order to minimise
development time and to reduce application development costs. This is a
challenging task and requires an in-depth investigation of multi-core
frameworks. This research work investigates the utilisations of multi-core
frameworks capability for a real-time object tracking application problem using
a parallel software tool known as Intel© Parallel Studio XE tool. In the
investigation, two established multi-core frameworks, namely, Threading Building
Blocks (TBB) and Open Multi-Processing (OpenMP) were implemented at identified
hotspot functions of the tracking algorithm. The performances of these two
multi-core frameworks were then evaluated and compared based on computed
speedup, efficiency and scalability. The results from this investigation
demonstrated that the processing time of real-time object tracking was improved
by using hotspots identification. In addition to that, multi-core frameworks
could make the tracking algorithm explicitly faster when compared to single-core
frameworks and OpenMP outperformed TBB. |
Keywords: |
Multi-core Frameworks, Parallel Programming, Image Processing, Real-time Object
Tracking, OpenMP, Threading Building Blocks (TBB), Intel® Parallel Studio XE |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ENERGY REALIZATION FISHEYE STATE ROUTING ALGORITHM FOR MOBILE ADHOC
NETWORKS |
Author: |
R. HEMALATHA, Dr.R.S.BHUVANESWARAN |
Abstract: |
Energy consumption is prominent and critical issue faced by mobile adhoc
network. Maximum energy is consumed when the data is send from one node to
another node. Therefore energy efficient routing mechanisms are required. In
this paper, a routing scheme based on the fisheye state routing with two groups
of selection of nodes are achieved. One group of nodes having maximum energy and
another group of nodes having minimum energy. According to the number of packet
received the particular group of nodes are selected to send the data from the
source to the sink. In this way the energy is utilized efficiently in the data
sending process. This gives the reduction in the overall energy consumption of
the network. This scheme is named as Energy-Realization Fisheye State Routing
(ER-FSR). The parameters of FSR and ER-FSR are compared. Results show that the
proposed algorithm effectively utilizes the energy to all nodes. For comparison
various parameters like end-to-end delay average, Jitter and throughput have
been considered. |
Keywords: |
Fish eye state routing, Mobile ad-hoc network, Energy, Throughput, Jitter, End
to end delay |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A CRITICAL EVALUATION OF LITERATURE ON ROBOT PATH PLANNING IN DYNAMIC
ENVIRONMENT |
Author: |
MOHAMMAD NAIM RASTGOO, BAHAREH NAKISA, MOHAMMAD FAIDZUL NASRUDIN, MOHD ZAKREE
AHMAD NAZRI |
Abstract: |
Robot Path Planning (RPP) in dynamic environments is a search problem based on
the examination of collision-free paths in the presence of dynamic and static
obstacles. Many techniques have been developed to solve this problem. Trapping
in a local minima and maintaining a Real-Time performance are known as the two
most important challenges that these techniques face to solve such problem. This
study presents a comprehensive survey of the various techniques that have been
proposed in this domain. As part of this survey, we include a classification of
the approaches and identify their methods. |
Keywords: |
Path Planning, Dynamic Environment, Real-Time Performance, Local Minima. |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
A STUDY ON THE PSO MODEL BASED QUICK TOTAL PRODUCTIVE MAINTENANCE FOR
SMALL AND TINY ENTERPRISES |
Author: |
G.ANANTH, B.K VINAYAGAM |
Abstract: |
The Significance of Total Productive Maintenance (TPM), its applicability in
small and tiny enterprises (STEs), the condition of the STEs, their survival
problems, lack of any modern management/maintenance methodology that helps
improve the productivity are what the driving forces of this work. A fast track
version is designed, considering Critical Success Factors (CSF) and it can be
called as Quick Total Productive Maintenance (Q-TPM), without diluting the
essence of original TPM, in this study. The study is also an attempt to develop
a mathematical model called Particle Swarm Optimization (PSO) specifically for
the STEs. Thus, the model developed can be handled/extrapolated /interpolated in
various manners, so that selective parameters may be altered to improve
productivity and Synthetic Data Generation (SDG) may be done for further
enhancement. |
Keywords: |
TPM, Q-TPM, CSF, STEs, SDG, PSO, Mathematical Model, Productivity |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ONTOLOGY KNOWLEDGE MAP FOR ENHANCING HEALTH CARE SERVICES: A CASE OF EMERGENCY
UNIT OF SPECIALIST HOSPITAL |
Author: |
MAHDI ALHAJI MUSA , MOHD SHAHIZAN OTHMAN , WALEED MUGAHEED AL-RAHIMI |
Abstract: |
In developing countries, the health care spending has been constantly increasing
in the last decades, and statistics has shown a lot of lapses in the running of
the affairs of the health care systems. As a result, there is serious need to
introduce new and innovative way of doing certain transaction in the hospitals
in order to improve the total efficiency of the hospitals. To address this, we
propose a method based on Ontology knowledge map to locate the unnecessary
transactions that must be redesigned to improve the healthcare management. We
carefully choose this methodology to address the problem statement because it
tend to gives a better understanding of the general and dynamic situation of the
Hospital emergency unit (EU), and at the same time provides a good alignment
between the operation and enterprise design. The method was tested in the EU of
the state specialist Hospital Damaturu, where we have succeed in locating some
transactions that can be redesign or removed. Evaluation of this methodology was
done by means of observations, interviews and feedback from practitioners. . A
result shows that there are a lot of unnecessary process in the emergency unit
which we are able to removed/redesign, it is also observe that there is also
need for the hospital to deploy Electronic Health Record (EHR) to reduce error
due to manual recording and reduce time response as well. |
Keywords: |
Ontology, Knowledge map, Heath care, Emergency unit (EU), Design Science
Research Methodology (DSRM) |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
Title: |
ETHICAL BEHAVIORS IN E-TENDERING PROCESS FOR CONSTRUCTION PROJECT IN
MALAYSIA |
Author: |
ROZANA ZAKARIA, LEE ZHI KWONG, MEHRBAKHSH NILASHI, MUHD ZAIMI ABD. MAJID, OTHMAN
IBRAHIM, ROSLI MOHAMAD ZIN |
Abstract: |
Nowadays, application of electronic commerce is increasing in commercial fields;
this includes procurement process which introduced e-Tendering in construction
industry. e-Tendering concept is to engage lesser paperwork and provide higher
transparency in every transaction of procurement process. The aim of this paper
is to study ethical issues related e-Tendering in Malaysia construction
industry. This paper reviewed previous and recent literature in order to
identify the ethical issues and risk of corruption encountered in electronic
commerce. Questionnaire survey was used to identify the current situation of
e-Tendering involving ethical issues and factors that contributed to these
issues. This study proposed potential initiatives to resolve the issues of
procurement transparency that improve ethical behavior of parties in managing
and bidding tender. This study utilized Average Index method and ideal solution
(TOPSIS) for data analysis. TOPSIS which is one of the multi-criteria decision
making methods for ranking the factors contributed to ethical issue in
e-tendering and the potential initiatives for improvement. Results of TOPSIS
showed that the most critical factor that contributed to the ethical issue in
e-Tendering was cronyism, followed by lack of meritocracy, collusion,
unpublicized process, long-term relationship, human greed and transparency
feature of e-Tendering. In addition, from the result, it was concluded that the
initiative that was known to be most potential in enhancing e-Tendering process
was the features of the e-Tendering system and the ethical awareness among
tendering authorities. |
Keywords: |
TOPSIS, Ranking, Ethical behavior, E-Tendering, Procurement process,
Construction industry |
Source: |
Journal of Theoretical and Applied Information Technology
10th December 2014 -- Vol. 70. No. 1 -- 2014 |
Full
Text |
|
|
|