|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2015 | Vol. 77 No.3 |
Title: |
AN EMPIRICAL STUDY ON ARCHITECTURE, CHALLENGES, TAXONOMY FOR ENTERPRISE
APPLICATION MODERNIZATION |
Author: |
RAVIKUMAR RAMADOSS, ELANGO N.M, SIDDHARTH KASHIRAMKA |
Abstract: |
In the era of digital space, the enterprise applications should be accessible
from mobile and different channels like SMS, IVR, email and other smart devices.
Modernizing traditional existing applications to meet the demand of the
increasing enterprise growth requires major shift in the focus of adopting
modern technologies. Enterprise are looking for most cost effective way of
modernizing their existing portfolio of application and subsequently looking for
reducing the enterprise costs. Cloud and big data adoption is the must for any
enterprise to do business insight modeling and by keeping their enterprise
innovation strategy at par with their competitors. In order to mitigate the risk
involved and to improve on the Return on Investment (ROI) it needs a systematic
approach and methodology to mitigate the key risks and challenges involved. The
modernization strategy should not be big bang and it should be a phase wise
approach and should bring out all the relevance aspects upfront so that the
modernization can be planned systematically to avoid any risk at later point. We
propose a unique generic approach in doing the enterprise modernization and
discuss about the key challenges, risks involved and also proposing a
consolidated taxonomy for reference. The proposed approach will act as a generic
methodology to perform the enterprise modernization across industry verticals. |
Keywords: |
Enterprise Modernization, Business Insights, Big Data, Channels, Hybrid Cloud |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
VEHICLES CLASSIFICATION BASED ON DIFFERENT COMBINATION OF FEATURE EXTRACTION
ALGORITHM WITH NEURAL NETWORK (NN) USING FORWARD SCATTERING RADAR (FSR) |
Author: |
NUR FADHILAH ABDULLAH, NUR EMILEEN ABD RASHID, ISMAIL MUSIRIN, ZUHANI ISMAIL
KHAN |
Abstract: |
Feature extraction process plays an important role in classifying radar target.
The extracted features will be fed as the input to the classifier. The incorrect
choice of extracted features will cause poor performance of radar classification
system. This paper presents the vehicles classification based on combination of
different feature extraction algorithm with neural network using forward
scattering radar. Hence, the main objective of this paper is to analyze the most
suitable feature extraction algorithm which based on different dimensionality
reduction technique in order to evaluate the performance of classification
system. Three different techniques are used such as the manual and automatic
reduction technique (PCA and Z-score) and neural network as classifier to
classify the vehicles into their groups either medium or large based on their
physical size. The performance of the classification system is determined by the
percentage of classification accuracy. The higher percentage of the
classification accuracy shows the better performance of the classification
system. |
Keywords: |
Neural Network (NN), Forward Scatter Radar (FSR), Principal Component Analysis (PCA),
Z-score,Classification Accuracy (CA) |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
PASSIVITY BASED CONTROLLER FOR DOUBLY FED INDUCTION GENERATOR WITH WIND TURBINE |
Author: |
ADNANI YOUNES, AIT BASSOU AZIZ, EL ALAMI NOUREDDINE, EL ALAMI JAMILA |
Abstract: |
This paper studies the stability of a doubly fed induction generators for wind
turbine, the system is closed loop and it is constructed around the port
controlled Hamiltonian system with dissipation (PCH-D). The control law is based
on the passivity using the principle of interconnection and damping assignment
(IDA PBC). Compared to a nonlinear system, the simulation results confirm the
effectiveness of the proposed method. Indeed, the closed-loop system is
asymptotically stable, during the energy-based design energy function and
transformation into the port-controlled Hamiltonian system. The IDA PBC
technique provides an effective design means compared to the nonlinear control
design. |
Keywords: |
Doubly Fed Induction Generator (DFIG), Interconnection and Damping Assignment
Passivity-Based Control (IDA-PBC), Wind Turbine (WT). |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY ON THE TIME LAG EFFECT OF INVESTMENTS IN INNOVATIVE
INFORMATION SYSTEMS |
Author: |
Gyoo Gun Lim, Dae Chul Lee, Robert E. Cole |
Abstract: |
The IT productivity paradox is a phenomenon in which productivity doesn’t
increase proportionally to IT investments. This discrepancy might be a result of
the lag associated with learning and adjusting to a new technology. Information
systems investment performance improves only after members or users learn and
adapt to it. Nevertheless, many existing performance evaluation models cannot
draw clear conclusions because they do not consider the time lag. This time lag
can cause many problems such as a reduction in investments, change in
informatization plan, or eventually failure of its implementation. Therefore, we
propose a performance evaluation framework considering performance layers and
time lags. We classify time lags into VTL (vertical time lags) and HTL
(horizontal time lags) and classify existing indicators into the two categories.
We identified time lags from the vertical perspective such as input, process,
and output layers and also time lags in each layer from the horizontal
perspective. These time lags might differ slightly across countries, and the
type of system. A comparative study showed that there was a three-year HTL for
WORKNET in Korea, and VTLs of one year for valve companies and one year for
Amazon.com in the U.S. |
Keywords: |
Time-lag effect, Performance evaluation, IT performance, Performance model, IS
investment
|
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
SURVEY ON END TO END CONGESTION CONTROL TECHNIQUES IN DIFFERENT NETWORK
SCENARIOS |
Author: |
USMAN AHMAD, DR. MD ASRI BIN NGADI, DR. ISMAIL FAUZI BIN ISNIN |
Abstract: |
Most of the traffic on the Internet is depend upon the Transmission Control
Protocol (TCP), so the performance of TCP is directly related to Internet. Many
TCP variants are developed and modified according to the environment and
communication needs. Most of current TCP variants have set of algorithms which
control the congestion in critical situations and maintain the throughput and
efficiency of network. Now a day’s TCP is facing fast growth of Internet with
the demands of faster data communication techniques on high speed links. In last
15 years many computer systems and cellular networks become linked together with
protocol stack used in TCP. TCP variants with different congestion control
techniques are working in different operating systems but a very small number of
techniques are able to minimize the congestion in the network. This paper
presents a survey on end-to-end congestion control techniques used in different
TCP versions. The main purpose of this study is to review the characteristics
and behavior of TCP variants with different techniques to control the congestion
in the different network scenarios. |
Keywords: |
TCP Variants, Congestion Control, Internet, High Speed TCP |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
ELLIPTICAL CURVE CRYPTOGRAPHY ALGORITHM FOR SECURE MOBILE ADHOC NETWORK |
Author: |
A.VINODH KUMAR, DR.S.KAJA MOHIDEEN |
Abstract: |
Reducing network traffic and achieving high security are the most significant
task of the Mobile Ad-hoc network (MANET). The beacon-less kNN query processing
methods are utilized for reducing traffic and maintaining high accuracy of the
query result in MANET. The explosion method and spiral method are adopted in
this approach. However, the k-nearest neighbor (kNN) query processing in wired
networks and wireless sensor networks cannot be applied in MANET due to the
movement of mobile nodes and moderate network security. Hence, to overcome the
drawbacks of the kNN query processing technique, this paper proposes the
Elliptical Curve Cryptography Algorithm to improve the security in the Mobile
Adhoc Network. Clustering approach also provides a mechanism to assign node duty
cycles, such that a minimal set of nodes are active to maintain the network
connectivity. The proposed approach includes topology discovery, dynamic cluster
maintenance and cluster path switching, to enhance the energy efficiency of the
network. The data security is monitored and maintained using the Elliptical
Curve Cryptography Algorithm. The Quality of Service is enhanced, to improve the
network performance. Experimental results show that the proposed algorithm can
reduce the delay and achieve high security, when compared with the existing
methods. |
Keywords: |
Elliptical Curve Cryptography Algorithm, Heuristic Algorithm, kNN Query
Processing, Mobile Ad-hoc Network, Security and Top-disc Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF 60 GHZ LOW NOISE AMPLIFIERS USING MULTI-GATE MOSFETs |
Author: |
KARTHIGHA BALAMURUGAN, NIRMALA DEVI M., JAYAKUMAR M |
Abstract: |
Short-channel devices are preferred for realizing millimetre circuits, but these
are affected by the short-channel effects (SCE). Multi-Gate (MG) MOSFET is found
to be an alternative to overcome this drawback. In this paper, study and
analysis of DC and AC parameters of MG MOSFETs have been attempted and small
signal gain (y21) of multi-gate structure is analytically derived. Design of low
noise amplifier (LNA) at 60 GHz using the channel charging resistance model has
been done.Small signal gain and noise figure using the channel charging
resistance model has been derived and analysed. The proposed LNA circuit uses
various multi-gate MOSFET structures and the results are compared with
conventional MOSFET based design. The designed LNA using a Quadruple Gate
structure exhibited the noise figure improvement of 24.4% and 42.79% when
operated at 1 V and 1.5 V respectively. Also the corresponding gain increases by
2.38 times and 4.9 times compared with conventional single gate MOSFET design. |
Keywords: |
60 Ghz, Low Noise Amplifier, Multi-Gate (MG) MOSFET, Small Signal Gain, Channel
Charging Resistance Model |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
A STUDY ON USER PERCEPTION AND AWARENESS RELATED TO ONLINE PRIVACY DURING ONLINE
SHOPPING |
Author: |
RAMAKRISHNAN RAMAN, DHANYA PRAMOD |
Abstract: |
There is an unprecedented growth in the number of people buying products online.
Online shopping is a fast growing phenomenon in India. Indian youngsters are not
only buying and selling shares online, but also buying electronic gadgets,
books, air tickets, footwear and clothing. Even vegetables and groceries are
being purchased online. While many Indians are certainly concerned about their
privacy and would never want anyone to eavesdrop, more often they do not take
precautionary measures to protect their privacy during online shopping. Many
web-retailers and e-commerce portals mention about their privacy policy, but it
is always in fine print on the home page and the link for the same is kept at a
place which is not prominently seen by user when he or she lands on their
webpage for shopping. When a person goes with online shopping he or she gives
several information including personal information like name, credit card
number, mobile number, age, mail address, email address etc. This makes it
necessary to understand if users are aware of the privacy issues and privacy
policies of the web-retailers and e-commerce portals. This study attempts to
understand, if youngsters in the age group of 20 to 30 years, who shop online
are aware of the privacy issues associated with online shopping, and also
understand the user’s perception on online privacy during their online shopping
experience. The study explores to find if there is a significant difference in
the perception of online privacy during online shopping between youngsters who
are Information Technology (IT) graduates and others from non-IT education
background and also between genders. |
Keywords: |
Online Privacy, Online Shopping, Managing Privacy Setting Online, Privacy
Statement, Perception of Privacy |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
DESIGN OF A CONTINUOUS REAL TIME DIGITAL INTEGRATOR FOR A MAGNETIC COIL SIGNAL
USING STELLARIS LAUNCH PAD |
Author: |
A.NANDHINI, V.KANNAN |
Abstract: |
The essential of an integrator is arises from the interest of finding out the
displacement of the structures from its measured acceleration and the
measurement of magnetic flux through the coil. It is really a big task to find
the integration of continuous real time magnetic coil signal due to its offset
induced drift. In this paper, a digital integration technique has been proposed
to find out the magnetic measurements of toroidal magnetic coil. This
integration has been free from dc offset and noise problem which usually occurs
in analog integrators. This integrator has been designed and implemented using
stellaris launch pad. The designed integrator has only the microvolt range of
offset. |
Keywords: |
Drift, Integrator, Offset, Toroidal coil. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
PARADIGM SHIFT TO GREEN CLOUD COMPUTING |
Author: |
TAMANNA JENA, J.R. MOHANTY, RAMAKRISHNA SAHOO |
Abstract: |
Objective of this paper is to propose a multi-dimensional pricing model cloud
providers can adopt to have long run sustainability in the market along with
server/ job request consolidation leading paradigm shift to Green Cloud
Computing. Energy spent on cooling cloud infrastructures is causing alarming
high carbon emission. We present auto scaling of servers depending on the number
of job-requests waiting in the queues, interactive transparent pricing strategy
by using reward and penalty in accordance to timing of job request and impact of
sharing resources among multiple job-requests to attain high server utilization.
Job-requests are profiled in detail while registration with the cloud provider.
End-user gets to decide for its budget for the service, extent of multitenancy,
and reward for the job. Multiple attributes are identified in the profile which
carries different weights towards service charge. Probability of returning
customers is also predicted. |
Keywords: |
Green Cloud Computing Green, Pricing Model, Multi-tenancy, Virtualization,
Queuing |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
DETERMINANTS OF THE INTENTION TO USE CORPORATE PORTALS: A PERSPECTIVE FROM AN
INDONESIAN STATE-OWNED ENTERPRISE |
Author: |
MUHAMMAD RIFKI SHIHAB, MOEHAMMAD ARIEF FURQON ACHMAD NIZAR HIDAYANTO |
Abstract: |
This research was intended to empirically determine the antecedents of users
utlization of an internal portal. Factors found within the Unified Theory of
Acceptance and Use of Technology (UTAUT), DeLone and McLean Information Systems
Success Model, as well as the Technology Acceptance Model (TAM) were used as the
basis to build the underlying research model. This research gathered 200
questionnaiers from users of an internal portal in a state-owned enterprise in
Indonesia. To test the hypothesis, the data obtained were tested using
Structural Equation Modeling (SEM) aided by SmartPLS 2.0 software. This research
showed that information quality, systems quality, facilitating conditions,
social influence, and job relevance were factors that affected users’ intention
in using a portal. |
Keywords: |
Portals, Acceptance, DeLone & McLean, UTAUT, TAM, Structural Equational
Modeling, SEM, PLS; |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
BLUETOOTH BASED WIRELESS HOME AUTOMATION SYSTEM USING FPGA |
Author: |
B. MURALI KRISHNA, V. NARASIMAHA NAYAK, K. RAVI KISHORE REDDY, B. RAKESH, P.
MANOJ KUMAR, N.SANDHYA |
Abstract: |
With the increasing development of modern technology and Smartphone, smart way
of living has turned out to be a major part in the present era of human life.
Due to rapid growth in Technology, Bluetooth has brought a revolutionary change.
Bluetooth technology, which aims to exchange data wirelessly within a range of
short distance by providing a necessary platform to create convenience and
controllability. Being wireless, it has wide range of applications. In this
paper we presented one of its day to day application i.e.., Home automation,
which is controlled by using Android Smart Phone. A Bluetooth module (HC-05) is
used to control the home appliances that are connected to FPGA board. The home
appliances that we need to control are connected to the Input / Output ports of
the FPGA board and communication is established between the FPGA board and
Bluetooth device using Serial Communication. Home automation not only helps to
reduce human efforts but is also energy efficient and time saving. The main
objective of home automation is to help handicapped and old aged people that
will enable them to control home appliances and alert them in some immediate
situations. |
Keywords: |
Smartphone, Bluetooth (BT), FPGA, Home automation, Serial Communication |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
CRAMER RAO BOUNDS FOR PRIMARY USER LOCALIZATION USING HYBRID TOA/DOA TECHNIQUE
IN COGNITIVE RADIOS |
Author: |
C.S.PREETHAM, Dr. M SIVA GANGA PRASAD, A.SUSMITHA, S.PRASANTH, M.R.KISHORE,
A.ESWAR |
Abstract: |
Cognitive Radio (CR) is of great interest to technologists because of
significantly increasing the spectrum efficiency. The Secondary user (SU) which
is the unlicensed user must constantly study the actions of Primary user (PU),
which is the licensed user. The location information of PU can enable several
key functions of CR networks, such as aiding spectrum policy enforcement,
intelligent location aware routing, and better spatial temporal sensing. Time of
Arrival, Directions of Arrival and Received Signal Strength are three categories
of research that is being done previously in the field of passive localization.
These categories are done based on how the sensors obtain location estimation
and on the type of measurements shared between the sensors. Cramer-rao bound
establishes the lower limit on how much information about an unknown probability
distribution parameter can a set of measurement carries. In this paper we obtain
the Cramer-rao bounds for a novel hybrid Direction of arrival (DOA)/Time of
arrival (TOA) based algorithm in cognitive radios networks and the performance
is analyzed and compared for various primary user location estimation techniques
such as RSS-CRB, Joint-CRB optimal, and Joint-CRB music. |
Keywords: |
PU Localization; Cognitive radio network; Cramer-Rao bounds; DOA; TOA. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
A QOS-BASED SCHEDULING ALGORITHM IN VANETS |
Author: |
MARYAM ASGARI, MOHAMMAD SHAHVERDY , MAHMOOD FATHY |
Abstract: |
Vehicular Ad hoc Network (VANET)is a kind of mobile Ad Hoc networks (MANETs)that
is applied for progress of intelligent transportation system (ITS).Vehicles get
various types of data from road-side units (RSUs)including voice, video and
emergency data. Since the number of vehicles as well as the number and size of
files are potentially large and with regard to the types of files can be
various, QOS-based scheduling is a challenge. We inquire the scheduling
algorithm problems of file distribution from RSUs to vehicles in an urban
environment and propose a new scheduling scheme which considers the types of
data and improved the performance of network. Request of vehicles are inserted
in to 4 queues: 1) Data-queue 2) voice-queue 3) video-queue 4) emergency-queue.
Some scheduling policies are used to choose one queue and serve the vehicles.
Furthermore, we gave high priority to some requests such as video and emergency
data to achieve high quality. In this regard, Simulation results indicate that
the proposed approach provides required performance and quality of service. |
Keywords: |
Vehicular Ad Hoc Network (Vanet); Scheduling Algorithm; Quality Of Service (QOS);
Jitter ; De |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE RECOGNIZE OF MALWARE CHARACTERISTICS THROUGH STATIC AND DYNAMIC ANALYSIS
APPROACH AS AN EFFORT TO PREVENT CYBERCRIME ACTIVITIES |
Author: |
YUDI PRAYUDI, SYARIF YUSIRWAN |
Abstract: |
A lot of Malware used to carry and conceal the crime even included as a crime
toolskit. This is forcing digital forensics investigators to perform malware
forensics activities, namely to identify and analyze unknown malware before.
Knowing the characteristics of malware will be one of the solutions from the
prevention of cybercrime activity. One method that can be used is the
combination of static and dynamic analysis to get a complete information about
malware characteristics. In this study both the method used to analyze malware
TT.exe, as well as handling solutions. The results obtained show that the use of
both of these methods can provide a complete information about the
characteristics of malware TT .exe. This research also has given a solution that
can be done to prevent the spread of malware TT .exe |
Keywords: |
Malware Analysis, Static and Dynamic Analysis, Cybercrime |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
YOKING OBJECT ORIENTED METRICS THROUGH MUTATION TESTING FOR MINIMIZING TIME
PERIOD RAMIFICATION |
Author: |
Chandu P.M.S.S., Dr.T.Sasikala |
Abstract: |
Object Oriented Programming largely depends on the testing processes. Testing is
of vital importance and is being carried out at three levels namely system, unit
and integration verification. The three approaches Structural, black-box,
error-driven approach is normally considered as efficient approaches. In the
proposed system, we probe into object-oriented metrics which are forcefully
yoked through mutation testing processes using Selenium tool and the primary
focus is on checking the time consumption in the effective evoking of results.
However maximizing the effectiveness of software has been principle objective of
the proposed work. To derive a non-existing software test case and to ascertain
quality of programs Mutation method is used. Selenium an automatic tool through
open source technology is implemented in this process which provides various set
programming equipments. Each and every equipment evokes an unique mode of
support testing being generated by the tool. In this proposed system the
mutation mode of testing the objects is carried out by means of selenium tool. |
Keywords: |
Testing, Implementing, Metrics, Automation, Mutation |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE EFFECT OF ROUTING ON DATA TRAFFIC CONTROL IN ENVIRONMENTAL EVENT MONITORING
USING WIRELESS SENSOR NETWORKS |
Author: |
Omar Fouad Mohammed, Burairah Hussin, Abd Samad Hasan Basari |
Abstract: |
Wireless sensors networking is a promising technology for a wide range of useful
applications in many areas including civilian and military areas. Thanks to the
sensing capabilities of Wireless Sensor Networks (WSNs), they become a prominent
choice for certain applications such as environmental monitoring. The
distributed sensors collectively realize the evolution of physical and
operational phenomenon and predict its effect on mission execution and then
trigger control actions that perform high-level mission procedures. However,
efficiency, reliability and performance are the main challenges in deploying and
utilizing WSNs especially in harsh environments conditions. This paper studies,
the event tracking issues and identifies the reasons behind the deficiency of
reliable transfer of the data traffic under abnormal situations or scenarios
where WSN characteristics and performance may differ significantly. It
investigates the performance issues related to routing protocols in WSN such as
Low-Energy Adaptation Clustering Hierarchy (LEACH) and Directed Diffusion by
using a simulation model in which represents a variety of sensor networking
environments and examine their suitability for the WSN environment in terms of
data traffic control. It was found that LEACH routing protocol outperforms
Directed Diffusion due to its hierarchical nature, but suffers from several
issues such as scalability, adaptability, utilization, latency, and throughput. |
Keywords: |
Event Tracking, Wireless Sensor Networks (WSN), Routing Protocols, Traffic
Control, LEACH, Directed Diffusion. |
Source: |
Journal of Theoretical and Applied Information Technology
31st July 2015 -- Vol. 77. No. 3 -- 2015 |
Full
Text |
|
|
|