|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
October 2014 | Vol. 68 No.2 |
Title: |
ECC BASED MALICIOUS NODE DETECTION SYSTEM FOR MOBILE ADHOC NETWORK |
Author: |
V. ANJANA DEVI, R.S. BHUVANESWARAN |
Abstract: |
An ad hoc network is a collection of wireless computers (nodes), communicating
among themselves over possibly multihop paths, without the help of any
infrastructure such as base stations or access points. Due to MANET
characteristics, nodes in MANET are easily compromised by the adversaries. In
this paper an innovative scheme is proposed to monitor and detect the malicious
nodes without compromising the network performances. The major contribution is
to alleviate the Watchdog (IDS for MANET) issues such as limited transmission
power, packet dropping, receiver collision and false misbehavior reports
generation. The proposed approach is an acknowledgement based, in which each
acknowledgement packet is digitally signed with an Elliptic Curve Cryptography (ECC)
algorithm for authenticating the acknowledgement packets. Simulation results
demonstrate that the proposed scheme offer more security and improve the network
performances than earlier IDS approaches. The proposed system improves the
packet delivery ratio and also minimizes the routing overhead even in the
presence of 40% malicious nodes in the network. |
Keywords: |
Intrusion detection System, Mobile adhoc Network, Elliptic Curve Cryptography,
Attacks, Acknowledgement. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
REDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS
CLUSTERING AND RANDOM FOREST CLASSIFICATION |
Author: |
SUNDUS JUMA, ZAITON MUDA, WARUSIA YASSIN |
Abstract: |
In recent times, Intrusion Detection systems (IDSs) incarnate the high network
security. Anomaly-based intrusion detection techniques, that utilize algorithms
of machine learning, have the capability to recognize unpredicted malicious.
Unluckily, an essential provocation of this method is to maximize accuracy,
detection whereas minimize false alarm rate. This paper proposed a hybrid
machine learning approach based on X-Means clustering and Random Forest
classification called XM-RF in order to aforementioned drawbacks. X-Means
clustering is utilized to gather whole data into congruent cluster based on
their behaviour whereas Random Forest classifier is utilized to rearrange the
misclassified clustered data to apropos group. The ISCX 2012 Intrusion Detection
Evaluation is used as a model dataset. The experimental result pose that the
proposed approach obtains better than other techniques, with the accuracy,
detection and false alarm rates of 99.96%, 99.99%, and 0.2%, respectively. |
Keywords: |
Intrusion Detection System, Anomaly-based Intrusion Detection, Machine Learning,
X-Means, Random Forest. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
LOAD BALANCING TECHNIQUE TO IMPROVE QoS FOR LIGHTPATH ESTABLISHMENT IN OPTICAL
WDM NETWORKS |
Author: |
M.R.SENKUMAR, Dr.K.CHITRA |
Abstract: |
This paper discusses the issue of providing basic QoS in optical burst-switched
WDM networks. As in WDM networks, end-to-end connection demands are dynamic
routes, it changes the state according to the current network traffic status. In
order to improve the basic QoS, load balancing technique for lightpath
establishment in Optical WDM Networks has been proposed. This approach contains
three phases; initially the network’s traffic is predicted with Hidden Markov
Model (HMM). In the second phase wavelength ordering technique is implemented
where the crosstalk in the network is reduced. In the final phase an objective
function based on GRASP is considered for the predicted traffic load from
phase-1. Through this approach, it is shown in this paper that the Qulaity of
service (QoS) in the optical WDM network can be improved in terms of delay,
throughput and blocking probability. |
Keywords: |
QoS, Optical WDM, Hidden Markov Model, Wavelength Ordering Technique |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
MINING FREQUENT PATTERNS FROM SPATIO-TEMPORAL DATA SETS: A SURVEY |
Author: |
GURRAM SUNITHA Dr. A. RAMA MOHAN REDDY |
Abstract: |
Space and time are implicit in every activity of life. Every real-world object
has its past, present, future and hence is intrinsically tied up with location
and time. Storing spatio-temporal attributes in the databases along with the
thematic attributes enriches the data and the inherent knowledge stored in the
database. Spatio-temporal databases provide description of real-world phenomenon
in a spatio-temporal framework and helps to build information systems and
services that are more comprehensive and intelligent. This paper highlights the
importance and applications of spatio-temporal pattern mining and provides a
brief survey of key mining techniques for discovering three types of spatio-temporal
patterns – sequential patterns, co-occurrence patterns and cascaded patterns
specifically from event data sets and trajectory data sets. |
Keywords: |
Spatio-Temporal Data Mining, Event, Trajectory, Sequential Patterns,
Co-occurrence Patterns, Cascaded Patterns |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
A TECHNIQUE FOR CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING
OBJECT-BASED SEGMENTATION |
Author: |
ANKAYARKANNI, EZIL SAM LENI |
Abstract: |
Segmentation and classification of satellite imagery are a challenging problem
due to the fact that it is not feasible to execute this task on a pixel-by-pixel
basis.This paper proposes an efficient image classification technique for
satellite images with the aid of KFCM and artificial neural network. The
proposed classification technique is made of four phases namely, pre-processing,
fragmentation and final classification using neural network. In pre-processing
stage, the input image is put to a series of pre-processing phases which
includes mean filtering, contrast adjustment and laplacian filter. The
pre-processing has the effect of modifying the input image into suitable image
for fragmentation. After the preprocessing, the image is fragmented by means of
the kernel based fuzzy c-means(KFCM) clustering algorithm. The resultant image
obtained is segmented into clusters. NN is trained according to the data given.
The resultant image is given as input to the trained NN, which classifies the
satellite images into road, building and vegetation regions according to the
trained data and pixel values.The experimental results have demonstrated the
effectiveness of the proposed classification technique in classifying into road,
building and vegetation regions. The experimentation is carried out using the
satellite images and the analysis ensures that the performance of the proposed
technique is improved compared with k-means clustering algorithm. |
Keywords: |
Segmentation,Classification, KFCM, Satellite image, Neural Network, Road,
Building, Vegetation |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
HARMONIC ELIMINATION IN MULTILEVEL INVERTERS FOR SOLAR APPLICATIONS USING DUAL
PHASE ANALYSIS BASED NEURAL NETWORK |
Author: |
V.J.VIJAYALAKSHMI, Dr.C.S.RAVICHANDRAN, Dr.A.AMUDHA, V.KARTHIKEYAN |
Abstract: |
The objective of the proposed work is to design a multilevel inverter for solar
energy applications so as to reduce the Total Harmonic Distortion (THD) and to
improve the power quality. To obtain the accurate THD values inclusion of higher
order harmonics is essential. A concept of Dual Phase Analysis (DPA) is
introduced in this paper. DPA proposes an accurate method to determine the
harmonics content in the inverters. A novel concept of application of Heuristic
Optimization techniques for estimating the optimum switching angles for the
voltage and harmonic control of cascaded multilevel inverters is performed. In
this work, neural network based on Gradient Descent Optimization is the
preferred Heuristic algorithm. The Neural Network can be trained offline and
online. DPA is used in analyzing the harmonic spectrum of the multilevel
inverter output. In this paper, the performance of seven level inverters for
solar energy application is designed and analyzed. |
Keywords: |
Dual Phase Analysis, Multilevel inverters, Harmonic spectrum, artificial neural
Network, photovoltaic |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN INTEGRATED CLUSTERING METHOD FOR HOLISTIC SCHEMA MATCHING |
Author: |
ADEL A. ALOFAIRI, KAMSURIAH AHMAD |
Abstract: |
Schema matching is an interesting research topic which had been paid
considerable attention by many researchers in the database community. It aims at
identifying semantic correspondences between two schemas. Holistic schema
matching was proposed to match many schemas at the same time. As an active
research topic in the field of schema integration, holistic schema matching
tackles the challenge of matching large scale schema. Matching the complete
input schemas may not only lead into taking a long execution time, but also poor
quality matching results. Therefore, achieving good performance for the schema
matching in a large search space is difficult and challenging process. Recently,
a number of methods were proposed to solve this schema matching using popular
clustering techniques namely k-means or agglomerative hierarchical clustering
techniques. These techniques are usually used to reduce the search space, albeit
with some drawbacks. However, the existing methods still can to be improved. In
order to improve the matching efficiency and clustering process, this paper aims
at finding an effective method for holistic schema matching in terms of reducing
the searching space. The combination of clustering techniques was proposed. To
achieve the main objective, the methodology includes two phases: pre-processing
and clustering. The findings of the study revealed that the matching method
proposed in this study reduced the searching space by using an integrated
clustering technique that rapidly groups the most correspondences attributes in
the same clusters. The results of the study prove that this method is effective
and promising in holistic schema matching. |
Keywords: |
Holistic Schema Matching, Clustering, Search Space Reduction. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF HYBRID CONTROLLER BASED LOAD FREQUENCY CONTROLLER FOR MULTI AREA HYDRO
THERMAL SYSTEM |
Author: |
UMA PAPA GARIMELLA , Dr.K.RAJAN |
Abstract: |
This article presents the design of hybrid controller (proportional double
integral controller (PDIC) plus fuzzy logic controller (FLC)) in load frequency
control (LFC) for multi area hydro thermal system (MAHTS). In this case, two
control areas connected through the tie line and each area consists of both the
hydro and thermal power system. The conventional controllers are incapable of
stabilizing the frequency deviation as well as the power oscillation of it at
load variations conditions. In order to stabilize the frequency deviation and
improve the dynamic performance of MAHTS, a PDIC plus FLC is developed. The
complete model with various controllers is implemented in MATLAB/Simulink. The
performance of designed controller is validated at various operating state in
comparison with a conventional controllers. The simulation results are indicated
that the designed controller more superior than the conventional controllers. |
Keywords: |
Multi Area Hydro Thermal System, Fuzzy Logic Controller, Proportional Double
Integral Controller, Load Frequency Control, MATLAB Simulink |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
GRID INTERFACE OF A PMSG BASED WIND ENERGY CONVERSION SYSTEM WITH POWER QUALITY
IMPROVEMENT FEATURES |
Author: |
R.KARTHICK, S.MANOHARAN, S.RAJKUMAR |
Abstract: |
Renewable Energy Sources are nowadays rapidly growing popularity at the
distribution level which employs power electronic converters, which ensures
reliable operation to customers. Among the RES, wind energy is now firmly
established as a mature technology for electricity generation. This paper
discusses the role of ac/dc/ac power converter for grid interface of wind
energy. The generator side converter incorporates the maximum power point
tracking algorithm to extract maximum energy from wind turbine system. The grid
side converter plays a dual role of interfacing the wind energy to grid as well
as to supply reactive power as demanded by the non-linear load connected at the
PCC. A simple model of the proposed system is developed and simulated in MATLAB
environment. The effectiveness of the system is validated through extensive
simulation results. |
Keywords: |
Permanent Magnet Synchronous Generator (PMSG), Maximum Power Point Tracking (MPPT),
Dc-Dc Converter, Grid Side Inverter, Power Quality. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
SPEED CONTROL OF SINUSOIDALLY EXCITED SWITCHED RELUCTANCE MOTOR USING FUZZY
LOGIC CONTROL |
Author: |
P.KAVITHA,, B.UMAMAHESWARI |
Abstract: |
This paper presents the speed control of SRM which is directly fed from an AC
supply through a simple R dump converter. The controller uses fuzzy logic
control (FLC) for switched reluctance motor (SRM) speed. The FLC performs a
PI-like control strategy, giving the current reference variation based on speed
error and its change. The performance of the drive system was evaluated through
digital simulations through the toolbox Simulink of Matlab program. Merits and
demerits of the proposed control algorithm are brought out. |
Keywords: |
Switched Reluctance Motor, R Dump Converter, Sinusoidal Excitation, Speed
Control, Fuzzy Logic Control. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
ROBUST FEATURE SELECTION FROM MICRO ARRAY DATA USING LINEAR KERNEL SVM-RFE
ALLIED WITH BOOTSTRAPPING |
Author: |
G.VICTO SUDHA GEORGE, Dr. V.CYRIL RAJ |
Abstract: |
In biomedical applications of computational biology, feature selection is
considered to be an important issue as succeeding biological validations may be
influenced by the robustness of the selected features significantly. More over a
robust set of features may strengthen an expert’s confidence in the result of a
selection method. But the stability or robustness of the selection algorithms
has received attention lately.
Though SVM-RFE is proved to be one of the most successful feature selection
methods, it selects features using the gene expression data only without using
any other biological information of the genes. Hence there is no guarantee that
the selected features will have biological relevance. To overcome this issue, a
framework for reliable feature selection has been proposed in this paper which
illustrates that bootstrapping and leave-one-out cross-validation when used
along with SVMRFE, increases its robustness significantly . |
Keywords: |
Feature Selection; Biomarker Detection; Stability; Machine Learning,
Bootstrapping. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
A VIDEO SYNCHRONIZATION APPROACH FOR COHERENT KEY-FRAME EXTRACTION AND OBJECT
SEGMENTATION |
Author: |
S.VIGNESWARAN, DR.A.LEELEMANI, K.DIVYA |
Abstract: |
In this paper we discuss a new video frame synchronization approach for coherent
key-frame extraction and object segmentation. As two basic units for
content-based video analysis, key-frame extraction and object segmentation are
usually implemented independently and separately based on different feature
sets. Our previous work showed that by exploiting the inherent relationship
between key-frames and objects, a set of salient key-frames can be extracted to
support robust and efficient object segmentation. This work furthers the
previous numerical studies by suggesting a new analytical approach to jointly
formulate key-frame extraction and object segmentation via a statistical mixture
model where the concept of frame/pixel saliency which is introduced and also
this deals with the relationship between the frames. A modified Expectation
Maximization algorithm is developed for model estimation that leads to the most
salient key-frames for object segmentation. Simulations on both synthetic and
real videos show the effectiveness and efficiency of the proposed method. |
Keywords: |
Key frame Extraction, Synchronization, Object Segmentation, Multimedia, and
Coherency. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
RISK MANAGEMENT IN INFORMATION TECHNOLOGY USING FACILITATED RISK ANALYSIS
PROCESS (FRAP) (CASE STUDY: ACADEMIC INFORMATION SYSTEMS OF SATYA WACANA
CHRISTIAN UNIVERSITY) |
Author: |
JAKSON PETRUS MANU BALE, EKO SEDIYONO, MARWATA |
Abstract: |
This paper describes a risk management on information technology to support the
sustainability of academic information system at the university. The purpose of
this study was to identify and quantify risks of application of information
technology in academic information system at the university level, with cases in
SWCU (SIA-SAT), prioritizing information technology risks are found, and
determining how the risks can be controlled or reduced. The methodology used was
a qualitative method, the data collected through library research and field
study: interviews, observation and analysis method Facilitated Risk Analysis
Process (FRAP). The result achieved was the discovery of risks, namely the risk
that mainly service availability, security and integrity of data, as well as the
service policy. Handling the risk then carried through the stages of FRAP, the
form control list for each risk, determining suitable control through cross
reference sheet, and recommendations for action that can be performed in an
action plan. |
Keywords: |
FRAP, Information System, Risk Management, Academic |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NOVEL IDENTITY BASED CRYPTO LOGICAL APPROACH FOR CLUSTER EMPLOYED SECURE
WIRELESS SENSOR NETWORKS |
Author: |
A.JEGATHEESAN, DR.D.MANIMEGALAI, G.THANUSHA |
Abstract: |
Wireless sensor network (WSN) is a network system comprised of spatially
distributed devices using wireless sensor nodes. Due to the resource-limited
sensor nodes, customary network security mechanisms are not suitable for WSNs.
In this paper, we present a security mechanism, in which along with Mote Sec an
Identity-Based digital Signature (IBS) scheme is employed on the network layer
for WSNs with focus on secure network protocol and data access control. The
IBCLA scheme uses IBS as identifiers for a node in the network to ensure
concealment of its true identifier (ID).IBCLA can be embedded into any Wireless
Sensor Network (WSN) routing protocol to ensure anonymity and privacy during
node discovery, routing and data delivery in the network. The scheme is mostly
engaged for Cluster founded network therefore boost the security of the system.
In the proposed protocols, BS initially distributed secure keys and public
parameters to all sensor nodes, which overcomes the key escrow problem recounted
in ID-based crypto-systems. Secure communication in Identity founded digital
signature relies on the ID-based cryptography, in which, user public keys are
their Identity information. Therefore, sensor nodes can get the corresponding
personal keys without auxiliary data transmission, which is effective in
connection and saves energy. |
Keywords: |
Wireless sensor network (WSN), Identity-Based digital signature, key escrow
problem, secure network protocol, data access control |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ENHANCEMENT OF HIGH VOLTAGE GAIN TWO PHASE INTERLEAVED BOOST
CONVERTER USING MPPT ALGORITHM |
Author: |
A.RAMESH BABU, Dr.T.A.RAGHAVENDIRAN |
Abstract: |
This paper proposes the simulation and implementation of performance enhancement
of two phase interleaved boost converter using Maximum Power Point Tracking (MPPT)
algorithm to achieve maximum power for Photo Voltaic ( PV) application. The
output current is divided by two phase since current stress on each switch is
reduced. Each switch is turn on by same frequency with phase difference of π.
The output of PV panel is affected by temperature and insulation level, Hence
conversion efficiency is very low. To improve the efficiency, additionally the
MPPT controller is used in our proposed converter to efficiently draw the
maximum power from the solar panel. The maximum power point is identified using
Perturb &Observe (P&O) algorithm. The Perturb &Observe algorithm suitably to
track the maximum power output of two phase interleaved boost converter with
proper duty ratio. This paper present simulation and implementation procedure
for two phase Interleaved Boost Converter with MPPT algorithm. The simulation
results are obtained by using MATLAB/SIMULINK. The simulation results for
non-isolated two stage interleaved high voltage gain boost converter were
compared with and without MPPT. The MATLAB/simulink simulation results are
presented to validate proposed converter. The hardware prototype of 12volt input
102 volt output has been developed. |
Keywords: |
PV, MPPT P& O algorithm, Coupled Inductor, Two phase, Voltage multiplier cell. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT ENERGY BASED MULTIPATH CLUSTER ROUTING PROTOCOL FOR WIRELESS SENSOR
NETWORKS |
Author: |
A.P.SRIDEVI, Dr.A.RAJARAM |
Abstract: |
Wireless sensor networks consist of sensor nodes that have limited processing
capability, small memory and low energy source. These nodes are deployed
randomly and often densely in the environment. In monitoring applications,
sensor nodes sense data from the environment periodically and then transmit them
to a base station which is called sink node. Thereby data transmission consumes
node’s energy based on transmission distance. In most wireless sensor networks,
the energy source of the node is limited and cannot be minimized. Here, we have
proposed the Efficient Energy based Multipath Cluster Routing Protocol for
minimizing the energy consumption in WSNs. It consists of four phases. In this
cluster formation, cluster head records all the cluster members. In multipath
routing, network is organized as a group of networks. It provides load balancing
and increased throughput to the network. In last two phases, both energy
consumption model and condition for minimizing average energy consumption was
proposed. The proposed scheme attains balance end to end delay, delivery rate
and energy efficiency in WSNs. By simulation results, the proposed EEMCRP
achieves better data delivery ratio, improved network lifetime, less end to
delay and energy consumption in terms of mobility, time, throughput, simulation
time and number of nodes than the existing scheme. |
Keywords: |
Wireless Sensor Network, Cluster formation, Multipath routing, energy
consumption model, , network lifetime, end to end delay, energy consumption,
throughput and delivery ratio. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
CROSS LAYER ENHANCED SECURE ROUTING SCHEME FOR AUTHENTICATION IN MOBILE AD HOC
NETWORKS |
Author: |
C.SIVAMANI, Dr.P. VISALAKSHI |
Abstract: |
In recent years, mobile ad hoc networks provide new challenges and goals in
fault tolerant computing area. Mobile nodes are communicated without any access
point. In previous research works, fault tolerance has been achieved with or
without the knowledge of checkpoint scheme. Due to high mobility of nodes in
MANETs, there is always possibility of attacks among the agents which would
result in performance degradation of the networks and damages the whole network
connectivity. In this paper, a Cross Layer enhanced Secure Routing Scheme (CLSRS)
is introduced for achieving fault tolerance level and authentication rate. Cross
layer is deployed to improve the network lifetime and network performance.
Cluster heads are chosen using trust threshold value based on signal strength
and remaining energy level. Finally, digital signature generation and
verification procedure is also proposed to authenticate packet as well as mobile
agents. This scheme is integrated with diskless checkpoint protocol to achieve
high fault tolerance rate. By using extensive simulation results, the proposed
protocol CLSRS is observed to attain better performance when compared with
approaches like Hybrid Cluster enhanced Stable Link Routing (HCSLR) and
Cluster-based Certificate Revocation with Vindication Capability (CCRVC). |
Keywords: |
Cross Layer, Diskless Checkpoint, Cluster Head Election, Digital Signature
Generation And Verification, Fault Tolerant Rate, Authentication Rate. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NOVEL MULTIUSER INTERFERENCE CANCELLATION METHOD FOR MULTICARRIER DIRECT
SEQUENCE CDMA SYSTEM USING MAXIMUM LIKELIHOOD SEQUENTIAL DECODING |
Author: |
S.PRAVEEN CHAKKRAVARTHY, N.NAGARAJAN, V.ARTHI |
Abstract: |
It is well known that sequential decoding techniques such as Enhanced Maximum
Likelihood sequential decoding (EMLSD) technique can obtain significant
performance improvement over conventional decoding techniques in multicarrier
direct sequence Code Division Multiple Access (MC-DS-CDMA) systems. Due to its
simplicity and usefulness the EMLSD has received significant attention for
several years. In this proposed work, three contributions are done for
evaluation of the performance of the Multicarrier CDMA receiver. An expression
is derived for Bit Error Rate (BER) with arbitrary spreading gain and Signal to
Noise Ratio (SNR) requirements. The performance of maximum likelihood decoder
under various ordering criteria is then examined based on spreading, path loss
and SNR/BER requirement. A set of frequencies is then obtained using a multiuser
interference cancellation algorithm. These subcarrier frequencies are very near
the optimum in terms of minimizing error rate, thereby increasing the number of
users. |
Keywords: |
EMLSD (Enhanced Maximum Likelihood Sequential Decoding), MUSIC (Multiple
Successive Interference Cancellation) |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
PATTERN MINING TECHNIQUES FOR PRIVACY PRESERVING TRANSACTIONAL DATASETS USING
ATTRIBUTE IMPACT MATRIX |
Author: |
VIJAYKUMAR, DR.T.CHRISTOPHER |
Abstract: |
Privacy preservation being studied well in recent days of data publishing where
the sensitive items have to be hidden without spoiling the originality of data.
We propose a new approach for privacy preservation of data items while
publishing transactional data sets. The proposed approach generates
transactional patterns using input data set, for each item set I to N , the
proposed approach generates pattern set Ps. From generated pattern set ps, we
compute support and profit values to select most frequent pattern set Mps.
Identified pattern set is used to compute the attribute impact matrix , which
represent the sanitized data set where the sensitive items are represented with
impact measure of different number of item sets. Published data could be used to
infer some knowledge but they could not back track the personal information from
the sanitized data base. The proposed method is a simpler one which reduces the
time and space complexity. |
Keywords: |
Privacy Preservation, Knowledge Hiding, Transactional Data Set, Attribute Impact
Matrix. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
MEDICAL DECISION SUPPORT SYSTEM TO IDENTIFY GLAUCOMA USING CUP TO DISC RATIO |
Author: |
A.MURTHI, M.MADHESWARAN |
Abstract: |
ARGALI is an Automatic cup-to-disc Ratio measurement system for Glaucoma
AnaLysIs Using level-set image processing. The parameters such as rim volume,
cup/disc area ratio, cup area and volume, disc area and volume have been
estimated and considered for general classification of Glaucoma. The developed
method aims to exploit the advantages of ARGALI and for automated glaucoma risk
assessment. The developed approach achieves a better CDR (Cup-to-Disc Ratio)
value using novel techniques discussed in this paper. The level of Glaucoma
influence for the patients has been estimated from the CDR values and it has
been observed that the glaucoma level is independent of the age and dependent on
the physical dimension of the eyes. Finally, it has been observed that the
estimated values are very close to the clinical values and the correctness of
the estimation have been verified with a team of Doctors and has been
appreciated by them about its clinical usefulness. |
Keywords: |
Cup to Disc Ratio, Optic Nerve Head, Optical Coherence Tomography, Convex Hull,
Region of Interest |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
INTERNAL THREATS ON INFORMATION SYSTEM SECURITY IN IRAQ HOSPITALS |
Author: |
MOHAMMED H. SHABAN, NOR HIDAYATI ZAKARIA |
Abstract: |
Managing security of medical information is currently experiencing significant
challenges. "People issue" and "organization issue" have been identified as the
most important challenges in this field. An organization internal threats have
been considered as a serious danger which arise when the insiders commit fraud
or steal sensitive information for personal monetary gain or to seek revenge.
The organization is vulnerable to such attacks when the employees are
compromising the organization’s security to get jobs done. On top of them, human
resource managing is a daunting task especially when the organization has
consultants, management personnel, partners, and other types of employees as
well as a complex operational infrastructure. Insider attacks incur unfathomable
losses to the organization through loss of revenue, reputation, intellectual
property, and even human life. As such, it is vital that the information
system’s security management is secured and maintained regardless of the
multitude of human factors involved. This paper analyze the internal
organizational human factors that could cause an information security breach in
Iraq hospitals. We collected 301 samples from internal officers of 5 major
publicly held hospitals in Iraq to examine the malicious human factors (MHF)
that threatening the patients’ personal information and measure the (MHF) to
identify the most influential factors. |
Keywords: |
Health Care Information System, Information Security, Insider Threats, Malicious
Human Factors |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
CORRELATIVE ANALYSIS ON ENHANCED DESCENDENTS OF LEACH PROTOCOL FOR WIRELESS
SENSOR NETWORKS |
Author: |
R.M.DILIP CHARAAN, Dr.R.RAMESH, |
Abstract: |
Wireless sensor networks (WSN) consist of a collection of sensor nodes sensing
and storing data. In the WSN, the sensor nodes have limited transmission power
and processing capability due to the limited energy resources. Infrastructure
creation and data dissemination process in the Wireless sensor networks have
been conventionally treated as the independent problems. Cluster Head selection
plays a vital role in design of routing protocols. In this routing protocol
individual and random mobile nodes are connected with the solar panel. Though we
have many number of mobile hosts in the wireless network, connected with solar
equipped system are capable to act as Cluster Head. To reduce the computational
and communication costs we invoke an on-demand Cluster Head selection. However,
the challenge is about to choose the Cluster Head among solar connected nodes
and also various hierarchical routing protocol that are derived from Low Energy
Adaptive Clustering Hierarchy (LEACH) have been analysed and surveyed. This
paper also highlights the advantages and drawbacks of various Hierarchical
routing protocols. The performance is evaluated using Network Simulator-2 and
the results are shown. |
Keywords: |
Wsn,Routing,Hierarchical,Cluster Formation,Leach,Alive Nodes,Packet Delivery
Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN IMPROVISED APPROACH TO GENERATE SIGNIFICANT ASSOCIATION RULES FROM CUSTOMER
TRANSACTION DATABASE- EMPIRICAL ANALYSIS |
Author: |
ARCHANA SINGH, AJAY RANA, JAYANTHI RANJAN |
Abstract: |
There are techniques available in order to remove redundant and irrelevant
association rules from transactional database. This paper emphasizes on
identifying the significant rules from pool of rules generated using an
improvised approach of the algorithm. A score model is proposed to find
essential rules out of many rules. An attempt is made to find significant rules
by using a proposed algorithm RuleGenerator which is based on an approach of
adjacency lattice and depth first search to generate association rules. The
proposed algorithm is less complex as compared to the existing one and generates
rules in less number of edges. The empirical research analysis is done on the
customer transaction database using Maruti Suzuki cars, it results in the vital
customer choices and rules. The application in automobile sector, cars results
in rules which help the Organization in identifying the segment of cars
preferred by the certain category of customers. The study also focuses on the
implication in detail, the usage of significant rules in various decision making
activities. |
Keywords: |
Association Rules; Data Mining Algorithm; Significant Rule Value; Adjacency
Lattice Structure; Decision Making |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
NMULET: IMPROVING THE QOS IN TERMS OF SECURITY FOR WIRELESS SENSOR NETWORKS |
Author: |
M.RAJENDIRAN, Dr.C.NELSON KENNEDY BABU |
Abstract: |
WSNs are infrastructureless framework and pass on by method for remote medium.
Furthermore on account of the eminent attributes and characteristics of WSN they
are used as a piece of climbing procurements like surveillance checking, center
and military, remote zone. Generally sensor nodes are having adaptability lead
the correspondence around the nodes happen by method for multi-bounce without
any stipulations. It makes some piece of possible conclusions for distinctive
feeble ambushes in WSN. In the current framework MULET computation was proposed
for encoding and translating plain substance by mapping the characters clearly
to the Unicode and it could be recognized by the aggressors successfully. The
main objective of this paper is to provide a high security to improve the
quality of service of WSN in terms of security. In this paper NMULET-[Novel
Multi Language Encryption Technique] approach based estimation is exhibited for
secure key time for encoding and unscrambling the data transmitted around center
points. NMULET helps SOUTH-INDIAN languages based Key period and for more
efficacies a gathering of Cryptographic strategies [md5, SHA-1, and CSHA-1] are
given to customer choice. The examination conclusions show that NMULET gives
more secured data transmission in WSN. Quality of Service in terms of Security
is improved without affecting the network characteristics using NMULET is proved
in this paper. |
Keywords: |
Wireless Adhoc Networks; Energy Efficiency; Novel Clustering Approach;
Clustering. |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
STUDY OF PV PANELS AND ANALYSIS OF VARIOUS MPPT TECHNIQUES |
Author: |
R.KARTHIKEYAN, DR.A.K.PARVATHY |
Abstract: |
The paper provides an in-depth study concerning the photovoltaic (PV) types,
factors affecting the solar array efficiency and effective methodology for
selecting a right Maximum Power Point Tracking (MPPT) algorithm for desired
application. The paper provides numerous factors to be considered during choice
of MPPT to the PV panels and also compares the normally used MPPT technique.
This paper should serve a reference guide for selecting type of panels and
choice of MPPT technique for future analysis and applications. |
Keywords: |
Photovoltaic Cell, MPPT, Direct Current, Fuzzy Logic, Neural Network |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
Title: |
A METHOD FOR EXTRACTING INFORMATION FROM THE WEB USING DEEP LEARNING ALGORITHM |
Author: |
J.SHARMILA, A.SUBRAMANI |
Abstract: |
Web mining related research are getting more important now a days because of the
reason that large amount of data are managed through internet. The web usage is
increasing in an uncontrolled manner. A specific system is needed for
controlling such large amount of data in the web space. The web mining is
classified into three major divisions that are web content mining, web usage
mining and web structure mining. In this paper, we propose a web content mining
approach based on a deep learning algorithm. The deep learning algorithm
provides the advantage over Bayesian networks because Bayesian network is not
following in any learning architecture like proposed technique. In the proposed
approach, three features are considered for extracting the web content. The
features used are concept feature, deals with the semantic relations in the web,
format feature, deals with format of the content and title feature, deals with
the web tittle. The above listed feature produces some model parameters, which
is given as the input to the deep learning algorithm. The experimental analysis
showed that, the proposed approach is efficient in web content extraction. The
average precision, recall and f-measure values are updated as 83.875%, 78.3% and
80.83% respectively. |
Keywords: |
Web Mining, Uncontrolled Usage, Deep Learning Algorithm, Content Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
20th October 2014 -- Vol. 68. No. 2 -- 2014 |
Full
Text |
|
|
|