|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
October 2014 | Vol. 68 No.3 |
Title: |
ENERGY AWARE GRID RESOURCE ALLOCATION BY USING A NOVEL NEGOTIATION MODEL |
Author: |
R.SURENDRAN, B.KEERTHI SAMHITHA |
Abstract: |
The grid resource allocation is the important aspect of the grid computing. They
are used to meet user requirements in the resource sharing grid environment. In
this paper we review literature on market based resource allocation by using
novel negotiation model in the grid environment. The negotiation model is the
gain percentage between the bilateral or multi lateral agents in the grid
computing. In grid computing, computational grid resource allocation is a major
problem. To address this problem, a new novel negotiation model is innovated by
using energy aware process in grid computing. This paper is mainly guided by 7
factors in energy aware using new novel negotiation model in grid computing.
They are as follows (1) The number of negotiator trading partners (2) Number of
negotiator competitors or job schedulers (3) Negotiator time preferences (4)
Availability in the negotiator resource brokers (5) Negotiator proposal
deviation from the average of its cluster usage (6) Previous concession behavior
of negotiator trading partner (7) Energy aware resource allocation process by
using new novel negotiation model. |
Keywords: |
Grid computing, Resource allocation, Energy aware process, Resource sharing,
Grid lets, Negotiation process. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
ANTENNA DESIGN FOR WIMAX APPLICATIONS USING ARTIFICIAL BEE COLONY ALGORITHM |
Author: |
KANTIDA PREETHI RATNA CHRISTY PRIMSON, DR. R.ANITA |
Abstract: |
In wireless communication system, antenna plays as an important component for
radiating and receiving the radio waves, where at transmission end and receiving
end, respectively. Particularly, the microstrip antennas, which are in the form
of integrated circuit, are decisive one to possess the major characteristics of
antenna. In this work, a novel design for microstrip antenna is proposed. The
design is determined by optimal selection of dimensions, which represent the
length and width, of the antenna structure. To optimize the dimensions,
Artificial Bee Colony algorithm is proposed in our work. The designed antenna is
suitable for the WLAN and WiMAX applications. The experimental results
demonstrated that the designed antenna gives ideal radiation characteristics
over the operating bands. Subsequently, the performance is compared in detail
with the existing designs. |
Keywords: |
Microstrip Antenna, Parameter Optimization, Neural Network, Artificial Bee
Colony Algorithm, Wimax. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NOVEL APPROACH FOR SEGMENTING COMPUTER TOMOGRAPHY LUNG IMAGES USING ECHO STATE
NEURAL NETWORKS |
Author: |
DR.Z. FAIZAL KHAN, DR. S. VEERAMALAI, DR.G.NALINI PRIYA, M.RAMESH KUMAR, A.
NARESH KUMAR. 6DR A. KANNAN |
Abstract: |
Segmentation is an important step for finding out the different portions of an
image. Existing segmentation algorithms have involved many stages like
elimination of blood vessels, tissues and finally showing the nodule in the
segmented image. This paper proposes new segmentation technique using recurrent
Echo State Neural Network (ESNN) method on computer tomography (CT) lung image.
ESNN has been chosen in this work since it reduces the number of steps in
segmentation to identify the presence of nodules in the CT lung image. The
performance of ESNN segmentation has been shown to be the best when compared
with other conventional segmentation algorithms like ‘Sobel’, ‘Prewitt’, ‘Robertz’,
‘Log’, ‘Zerocross’, ‘Canny’ and Contextual clustering. Matlab regionprops
function has been used as one of the criteria to show the performance of
segmentation algorithms. From this research work, it has been observed that the
segmentation accuracy of the proposed algorithm has been achieved to 84.40%. |
Keywords: |
Echo State Neural Network, Contextual Clustering, Segmentation Performance, CT
Lung Image. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN INNOVATIVE ALGORITHM FOR FEATURE SELECTON BASED ON ROUGH SET WITH FUZZY
C-MEANS CLUSTERING |
Author: |
T.SRIDEVI, K.SHYAMALA , A.MURUGAN |
Abstract: |
Feature selection is a fundamental problem in data mining, especially for high
level dimensional datasets. Feature selection is a process commonly used in
machine learning, wherein subsets of the features from the original set of
features are selected for application of a learning algorithm. The best subset
contains the minimum number of dimensions retaining a suitably high accuracy on
classifier in representing the original features. The objective of the proposed
approach is to reduce the number of input features thus to identify the key
features of breast cancer diagnosis using fuzzy c-means clustering (FCM),
K-nearest neighbors (KNN) and rough set. The results show that the hybrid method
is able to produce more accurate diagnosis and prognosis results than the full
input model with respect to computational complexity and classification
accuracy. |
Keywords: |
Machine Learning, Pattern Recognition, Feature Selection, FCM, Outlier
Detection, Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
ADAPTIVE NEURO FUZZY INFERENCE SYSTEM FOR MONTHLY GROUNDWATER LEVEL PREDICTION
IN AMARAVATHI RIVER MINOR BASIN |
Author: |
G. R. UMAMAHESWARI, Dr. D. KALAMANI |
Abstract: |
Adaptive Neuro Fuzzy Inference System (ANFIS) approach is employed in this
present study to observe its applicability on Prediction and Forecasting of
monthly Groundwater level Fluctuation in the study area (Amaravathi River Minor
Basin). Study area encompasses of heavy abstraction of groundwater due to
domestic, industrial and irrigation prospects which will leads in abrupt
depletion of groundwater and crises on groundwater utility in future. The
specific objectives are developed in the present study is to study the condition
of groundwater pattern in the study area though it concern with many practical
constraints. ANFI system is one of the developing powerful tools to predict such
heavy constrained problem with time series analysis by hybrid technique. First
part of the study is to identify the best ANFIS model which will replicate the
exact behavior of groundwater system through tuning of parameters by fuzzy
subset relationship and satisfying five Statistical measures (RMSE, R2, CE, COC
and MBE) during training and testing processes for the duration of 2005-13.
Second part of the study is to forecast the groundwater fluctuation for next one
year (2014) from the identified ANFIS model. |
Keywords: |
Groundwater Modeling, Groundwater fluctuation, ANFIS, Training, Statistical
measures, RMSE, Forecasting |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
MULTI-OBJECTIVE CROSS-LAYER BASED MULTIPATH ROUTING PROTOCOL IN MANET |
Author: |
M.ANURADHA , Dr.G.S.ANANDHA MALA |
Abstract: |
Mobile Ad Hoc Networks (MANETs) have unique challenges in the routing protocols
like selecting a high energy efficient route to transmit the data packets
between the nodes. To overcome these challenges in the paper we have proposed an
approach Multi-Objective Cross-layer based Multipath Routing in MANET. In this
approach the routes for the transmission of data packets are selected using
hybrid routing. Also a cross-layer metric is been derived based on the Expected
Transmission Time (ETT), Residual Energy and Load Balancing Factor. This
cross-layer metric is combined with the hybrid routing protocol in order to find
an optimum route based on the cross-layer metric. |
Keywords: |
MANETs, Hybrid Routing, Expected Transmission Time, Residual Energy and Load
Balancing Factor. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
BRAIN TUMOR DETECTION AND CLASSIFICATION OF NORMAL, ABNORMAL IN MRI IMAGES |
Author: |
R.KARUPPATHAL, Dr.V.PALANISAMY |
Abstract: |
The brain is the foremost most a piece of the focal sensory system. The area of
tumors in the brain is one of the elements that figure out how a mind tumor
impacts an individual's working and what manifestations the tumor causes.
Preparing of attractive thunder images (MRI) is one among the parts of the
picture transforming in restorative field, which is the most rising field from
past few days. Manual division of mind tumor is lengthy and testing assignment.
The tumor discovery is frequently a preparatory stage to take care of the
division issue. In this paper, it is described that the detection of the brain
tumor using Image Binary Operations. The segmented tumor can be classified using
SVM classifier according to the feature values extracted from the segmented
image to find performance of proposed approach. Picture division gets more
critical while ordinarily managing medicinal images. The proposed procedure
could be proficiently connected to discover and concentrate the brain tumor from
MRI images acquired from patient's information base. It ends up being convenient
instrument for the doctors working in this field. The simulation results show
that the proposed approach gives better result than the existing approach such
as SOM based image segmentation. |
Keywords: |
Brain Tumor; MRI; Binary Operators; Image Segmentation; SVM Classifier. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT DICOM IMAGE RETRIEVAL METHOD BASED ON FEATURES AND NEURAL NETWORK
CLASSIFICATION |
Author: |
B. DARSANA, Dr.G. JAGAJOTHI |
Abstract: |
In latest years, Bio medical image retrieval hasturn into an interesting area of
research in medical fields because of the accessibility large image
databases.For the analysis of diseases, medical research and for education,
these images continue as an essential sthece of functional and anatomical
information.Due to the accessibility of a huge amount of images in the database,
exact retrieval of the query image seems to be a little complicated on the other
hand. Therefore a great number of retrieval techniques have been executed with
the motto of offeringcompetent and efficient multimodal DICOM image retrieval.
The most importantaim of this research is to devise an efficient and competent
image retrieval approach which is prone to be fault free. The suggested method
is a classification based multimodal DICOM image retrieval where the
classification done regarding the features extracted. With the assist of
improved neural network, the classification of the images is made where
optimization process is integrated for theight calculation which morehelps in
efficient classification of images. They have moreoverutilized the relevance
feedback system for superior classification results. The RF based similarity
method is offered where for each iteration the feature the weights are revised.
The high level attributes are extracted so that it can produceautomatic
relevance feedback to the system which moredevelops the retrieval process. |
Keywords: |
Bio Medical Image, DICOM Image Retrieval,
RF Based Similarity Method |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NOVEL MICROARRAY GENE RANKING AND CLASSIFICATION USING EXTREME LEARNING
MACHINE ALGORITHM |
Author: |
T.REVATHI , DR.P.SUMATHI |
Abstract: |
The research studies the suitability of Extreme Learning Machines (ELM) for
resolving bioinformatics and biomedical classification problems. It is used for
some direct multicategory classification to solve those problems. The cancer
diagnosis has three benchmark microarray datasets for evaluated the
multi-category classification performance of ELM. In order to test their overall
performance, an experimental study is presented based on three gene microarray
datasets found in bioinformatics and biomedical domains. This research work use
this ELM for quick performance and it is better accuracies. The result can be
produces with minimum time compared to artificial neural networks methods. This
method shows promising classification accuracy for all the test data sets. It
also shows the relevance of the selected genes in terms of their biological
functions. |
Keywords: |
Cancer classification, DNA microarray gene expression data, Extreme learning
machine. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
SLEEP & WAKEUP TECHNIQUE BASED CLUSTERING PROTOCOL-PERFORMANCE EVALUATION IN
WIRELESS SENSOR NETWORK |
Author: |
Dr.M.SENTHIL, Dr.P.SIVAKUMAR, T.C.INDHUMATHI |
Abstract: |
In order to achieve data information, the Sensor Node’s should form into small
groups as clusters in wireless sensor network. In Multi-hop sensor network, the
Base-Station (sink) is might not be considered. That is why, the hot-spot
problem may occur in this network. In this paper, we analyze the sleep & wakeup
approach, in order to avoid the hot spot (WLAN) problem, which aims to increase
the network lifetime using energy conservation as well as increasing packet
delivery ratio (PDR). In this technique, C-H (cluster-head) has been selected
based on energy level & Base-Station distance. Using this technique, we can
improve the energy conservation & PDR up to 63%, when compare to that of FCA
(fuzzy clustering algorithm) according to their parameters of FND (First Node
Dead) and HNA (Half of the Node Alive) parameter for each algorithm. Our
simulation results shows that the sleep & wakeup approach is better and energy
efficient clustering protocol based on their parameters. |
Keywords: |
WSN; clustering; FCA; Sleep & Wakeup Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
LABVIEW BASED TUNING OF PI CONTROLLERS FOR A REAL TIME NON LINEAR PROCESS |
Author: |
M.KALYAN CHAKRAVARTHI, NITHYA VENKATESAN |
Abstract: |
The phenomenal growth that has been evidently seen in the last two decades has
brought a multifold development in the process industry. The experts have always
focused upon the control of the level and other process parameters. In this
paper we have chosen a real time Single Spherical Tank Liquid Level System (SSTLLS)
for our investigation. The aim of this paper is to compare the design and
implementation of Ziegler-Nichols (ZN) and Skogestad’s tuning based PI
controllers for the SSTLLS using LabVIEW and NI-DAQmx 6211 data acquisition
card. The real time model identification and Graphical User Interface (GUI) are
discussed and their PI Controller implementation using LabVIEW are outlined. |
Keywords: |
Single Spherical Tank Liquid Level System (SSTLLS), Graphical User Interface
(GUI), PI Controller, Z-N Method, Skogestad’s Method, LabVIEW. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
MEMS POWER SWITCH IMPLEMENTATION USING SUGAR SIMULATOR |
Author: |
S. KRISHNAVENI, DR. S. RAVI |
Abstract: |
In this work, a study of MEMS (Micro electro mechanical system) and SUGAR
simulator is presented. A MEMS power switch is implemented and the insertion
loss, return loss with respect to frequency and ON and Off states of these loss
with respect to frequency is studied. Ultra low ON state insertion loss, high
off state isolation and high RF signal power handling characteristics are
achieved .Many of the inherent problems associated with the more traditional
switches is overcome with this power MEMS switch. The SUGAR simulator is used to
obtain the performance analysis of the MEMS power switch. |
Keywords: |
MEMS, Power Switch, SUGAR Simulator, |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
CLUSTER BASED NEIGHBOR COVERAGE ROUTING SCHEME FOR MANET |
Author: |
DR.A.RAJARAM, SHAJAN JOSEPH |
Abstract: |
Mobile Ad hoc Network is the indivisible part of wireless network. In the past
few years, the popularity of MANET grows unlimitedly. Due to the presence of
mobility and infrastructure less topology, the vulnerability of ad hoc networks
is introduced unconditionally. In this research work, it is developed that cross
layer based multipath neighbor routing protocol to attain network connectivity
and load balancing among the mobile nodes. In this phase, multipath routing is
deployed to overtime the failures and breakages of links and paths. For reducing
energy consumption, the energy consumption model has been proposed to keep
maximum energy efficiency of mobile nodes. It is also calculated that the
rebroadcast delay and rebroadcast probability of the proposed protocol. It uses
the upstream coverage ratio of an RREQ packet received from the previous node to
calculate the rebroadcast delay, and use the additional coverage ratio of the
RREQ packet and the connectivity factor to calculate the rebroadcast probability
in our protocol, which requires that each node needs its 1-hop neighbourhood
information. By using the experimental result this work achieves more
connectivity, lifetime and less overhead than the existing schemes NCPR and DPR
and AODV. |
Keywords: |
Multicast, Stability Ratio, Malicious Attackers, Detection Ratio, Delivery
Ratio, Communication Overhead, End To End Delay, Threshold Value, Node
Familiarity And Node Proposal. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
FACE RECOGNITION WITH SINGLE SAMPLE PER CLASS USING CS-LBP AND GABOR FILTER |
Author: |
A.USHA RUBY, DR.J.GEORGE CHELLIN CHANDRAN |
Abstract: |
In face recognition Local appearance based methods has achieved greater
performance. In this paper, we have proposed single sample per class using
Center Symmetric Local Binary Pattern and Gabor Filter. Gabor Filter extracts
the textual feature and generates a binary face templat and the binary face
template acts like a mask to extract local texture information using Center
Symmetric Local Binary Pattern. Face features which are evaluated from CS-LBP
has better performance. |
Keywords: |
Face Recognition, Center Symmetric Local Binary Pattern (CS-LBP), Principle
Component Analysis (PCA), Linear Discriminate Analysis (LDA), and Independent
Component Analysis (ICA), Binary Face Template, Single Sample Problem. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMPLEMENTATION WITH MULTITHREADING PROCESS USING EMBEDDED SYSTEM |
Author: |
K R JAYACHITRA, Dr. L C SIDDANNA GOWD |
Abstract: |
In Embedded system based applications, the evolution of multicore architectures
offers many performance enhancements like speed, concurrency, real-time
implementation support etc. However, design issues like critical section
handling, selecting optimal number of threads, racing condition avoidance,
concurrent tasks handling etc. needs to be addressed. In this work, these issues
are implemented for multicore architecture using openMP tool. Barrier region
limitations are removed to exploit concurrency and demonstrated applications
include are, (i) array filling multitasking (ii) sorting of number, and (iii)
sorting of strings. In all the above examples, the performance of multicore is
enhanced compared to single core. |
Keywords: |
Multicore, Openmp, Racing, Multithreading, Embedded System. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF LOW POWER DISCRETE TIME SIGMA-DELTA MODULATOR FOR ANALOG TO DIGITAL
CONVERTER |
Author: |
RADHOUANE LAAJIMI |
Abstract: |
Modulator is one of the most significant building-blocks in integrated discrete
time component used in Sigma-Delta (ΣΔ) analog to digital converter. In this
paper a novel structure of a switched-capacitor discrete time first order
modulator Sigma-Delta is implemented at a supply voltage of 3 V. In addition,
our design uses a Miller operational transconductance amplifier topology for low
power consumption. The designed modulator has a resolution of 8 bits at a
sampling frequency of 10.24 MHz. Eventually the modulator consumes only 1.16 mW
of power under 3V. The core chip size of the modulator without bonding pads is
0.008 mm2 (76 µm x 110 µm) by using the AMS 0.35 µm CMOS technology. |
Keywords: |
Sigma-Delta modulation, CMOS technology, switched-capacitor circuits,
Analog-to-digital (ADC), Analog circuit design. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
EVALUATION ON THE EFFECTIVENESS OF THE WEB TECHNOLOGY USAGE IN PROMOTING AND
MARKETING INDONESIA TOURISM |
Author: |
SUROTO ADI |
Abstract: |
One indicator of success in tourism is reflected in the number of foreign
tourists visiting Indonesia. Although the number and type of tourism objects in
Indonesia is higher than the neighboring countries, the number of visits to
Indonesia is far below the neighboring countries such as Malaysia, Singapore,
and Thailand. The usage of websites in Indonesia tourism has been widely used,
but the results are not satisfactorily yet, especially in supporting tourism
promotion and marketing. The study aimed to evaluate the use of websites to
support promotion and marketing Indonesia tourism which are carried out by
tourism provincial and district offices, travel agencies, hotels and tourist
destinations. The methodology used to determine the performance of website is
mBSC (modified Balanced Scorecard), whereas to analyze the aspects needed to be
strengthened in accordance with the functions of office and business tourism is
descriptive statistical method. The data were taken from websites from offices
of tourism, travel agencies, hotels, and tourist destinations. The results of
the research are proposed to assess and formulate model of integrated website
application development for promoting and marketing Indonesia tourism business. |
Keywords: |
Tourism, Integrated Website, Promotion And Marketing |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
DC- DC BOOST CONVERTER FOR SOLAR POWER APPLICATION |
Author: |
P.MUTHUKRISHNAN, R.DHANASEKARAN |
Abstract: |
A Conventional Boost Converter is not capable for obtain a high voltage gain
even extreme duty cycle maintain the triggering circuit diagram. In order to
increase the voltage gain for the new Boost converter from the solar power
application. In this paper boost converter specialty is achieved 10 times that
of input voltage and more than 10 times of input voltages is possible from
output side by using coupled inductor and parallel capacitor. The proposed boost
converter output voltage is obtained 600V from source input of 60V and output
power is 900 watts. The output voltage is high and voltage stress across the
active switch is minimized and output ripples also minimized. In this paper the
high power rating from low input voltage rating of the input source and also
capable to go for AC power application whenever adding the inverter circuit to
the main circuit diagram. |
Keywords: |
Boost Converter, Coupled Inductor, Parallel Capacitor, High Voltage Gain, Soft
Switching. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
GA CONTROLLER BASED CUK CONVERTER IN SWITCHING LOSS REDUCTION FOR PHOTO VOLTAIC
ENERGY SYSTEMS |
Author: |
K. KAVITHA , DR. K. KRISHNAMOORTHI |
Abstract: |
To overcome the conduction and switching losses generated by earlier
converter designs, we propose a new genetic algorithm based Cuk converter design
which increases the performance of photovoltaic system. The objective is to
produce high-efficiency, voltage and current of a PV system with help of GA
Controller. The requirement of continuous and controlled flow of voltage has met
with the support of GA controller and the capacitors present with the schematic
design helps this requirement to be met in an efficient way. The MOSFET controls
the voltage in bi-direction and the capacitors help to supply the voltage in a
steady flow. The capacitors get charged both in serial and parallel execution of
the circuit and the MOSFET controls the flow of voltage. The conduction losses
are reduced by using GA controller in closed loop condition which reduces the
switching losses and increases the output energy. |
Keywords: |
DC-DC converter, Genetic Algorithm, MOSFET, Switching Loss, Photovoltaic energy |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
HUMAN ACTIVITIES RECOGNITION VIA FEATURES EXTRACTION FROM SKELETON |
Author: |
GHAZALI SULONG, AMMAR MOHAMMEDALI |
Abstract: |
Human activities recognition (HAR) enabling the understanding of basic human
actions from still images has overriding importance in computer vision and
pattern recognition for sundry applications. We propose a novel method for HAR
by taking out the skeleton from the image for extracting useful features. This
approach comprised of two steps namely (i) an automatic skeletal feature
extraction and partitioning into two parts as block that determines angles
between terminals and (ii) HAR by using non-linear Support Vector Machine (SVM).
The model performance is evaluated using three available challenging datasets
such as INRIA, KTH and Willow-action all with seven activities and each
possessing eight scenarios. The images are normalized in (64x128) pixels format
from digital silhouette via circle algorithm. Our method efficiently achieves a
recognition rate as much as 86% with excellent features. The proposed model
being highly promising compared to the existing one may contribute towards the
development of computer vision architecture. |
Keywords: |
HAR, Features, Skeleton, Support Vector Machine, Still Image. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
HARMONIC CURRENT SUPPRESSION BY SHUNT ACTIVE POWER FILTER USING FUZZY LOGIC
CONTROLLER |
Author: |
AZIZ BOUKADOUM, TAHAR BAHI |
Abstract: |
Harmonic current is known to be source of several problems in electrical power
system due to the intensive use of the non-linear loads such as AC/DC
converters. The harmonic current and reactive power consumed cause poor power
factor and distort the supply voltage at the common coupling point or customer
service point. Passive filters have been used as a solution to solve harmonic
current problems, but they present several disadvantages, such as resonance
affecting the stability of the system. The alternative solution, are an active
power filters (APfs) that provides an effective solution for harmonics
suppression and reactive power compensation. The performance and effectiveness
of the active power filters depends upon different control strategies. In order
to eliminate harmonics current generated in the power supply system by
three-phase full-bridge diode rectifier converter and to provide a unitary power
factor in the system. This paper present a novel compensation method based on
fuzzy logic controller for shunt active power filter (SAPF). The principle of
the Instantaneous Reactive Power Algorithm is applied for extracting the
reference compensating currents of the shunt power converter. The fuzzy logic
controller (FLC) is applied to regulate the DC capacitor voltage in order to
improve the dynamic of the active power filter and to ensure sinusoidal main
supply currents, confirmed to the international standards recommendation of IEEE
519 on harmonics levels. The simulation results are presented and interpreted. |
Keywords: |
Harmonic, Fuzzy logic controller, Hysteresis, Shunt active power filter, Power
quality. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
AUTONOMOUS ROBOT HOME SECURITY SURVEILLANCE USING ATMega 2560
MICROCONTROLLER |
Author: |
C.YAASHUWANTH |
Abstract: |
The primary concern of every household when they leave their home is safety of
the home as well as its protection. This paper deals with creating a solution
for such a situation in the form of a small robot that can take care of the
security in the home. The system uses several sensors that are mounted on it as
well as in the home so that it can detect any breach in security or any abnormal
situation in the household and inform the owners immediately as well as raise an
alarm so that those nearby can take effective actions. The system can be used in
cost efficient manner and can handle multiple operations. The main feature of
the system is when it detects obstacles it avoids the obstacle, after avoiding
the obstacle it again finds the black line path and returns to the original
path. The robot uses an ATMega2560 as its microcontroller since it provides
higher transmission rate and higher clock speed with more memory in terms of RAM
and Flash. This enables the system to respond faster when compared to using
other microcontrollers. |
Keywords: |
Sensors, ATMega2560, Robot, Security, Microcontrollers) |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
COMPARATIVE STUDY OF SMOOTHING TECHNIQUES ON INDONESIAN AND ENGLISH LANGUAGE
MODELS |
Author: |
ISMAIL |
Abstract: |
Indonesian language is one of Austronesia languages. It differs from English
language, which is one of isolating languages. For Indonesian language, there
has been no study of smoothing effect in its language model. Although from
mathematical point of view, language model has no direct dependency to specific
language, Whittaker [1] showed that, for Russian and English, there are
differences in smoothing effect for those languages. In this paper, we studied
various smoothing techniques in language model for Indonesian language and
compared it to that of English language. Our experiments showed that smoothing
effects for statistical Indonesian language model have better perplexity
reduction than that of English language. We showed our results in terms of
cross-entropy differences among various techniques relative to Katz smoothing. |
Keywords: |
Smoothing Techniques, Language Model, English and Indonesian Languages, SRILM |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
LATERATION TECHNIQUE FOR WIRELESS INDOOR POSITIONING IN SINGLE-STOREY AND
MULTI-STOREY SCENARIOS |
Author: |
LEE CHIN VUI, ROSDIADEE NORDIN |
Abstract: |
The focus of this research is to develop a technique for indoor localization for
tracking activity using Wireless Local Area Network (WLAN). The research is
conducted by studying the characteristic of the
WiFi signal propagation inside a multi-storey building during static condition
and compare with walking conditions to compare the accuracy of the tracking
technique. The results show the characteristic of the graph pattern from the
Received Signal Strength Indicator (RSSI) measurement between static and walking
conditions around the considered building area. The result shows the RSSI
pattern is statistically anomaly and proven that this technique can be applied
for wireless indoor localization applications such as hospitalization, logistic
tracking, shopping recommendation and future smart house. |
Keywords: |
Indoor Localization, Lateration, RSSI, Wireless, WLAN, |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
CORRELATIVE ANALYSIS ON ENHANCED DESCENDENTS OF LEACH PROTOCOL FOR WIRELESS
SENSOR NETWORKS |
Author: |
R.M.DILIP CHARAAN, Dr.R.RAMESH |
Abstract: |
Wireless sensor networks (WSN) consist of a collection of sensor nodes sensing
and storing data. In the WSN, the sensor nodes have limited transmission power
and processing capability due to the limited energy resources. Infrastructure
creation and data dissemination process in the Wireless sensor networks have
been conventionally treated as the independent problems. Cluster Head selection
plays a vital role in design of routing protocols. In this routing protocol
individual and random mobile nodes are connected with the solar panel. Though we
have many number of mobile hosts in the wireless network, connected with solar
equipped system are capable to act as Cluster Head. To reduce the computational
and communication costs we invoke an on-demand Cluster Head selection. However,
the challenge is about to choose the Cluster Head among solar connected nodes
and also various hierarchical routing protocol that are derived from Low Energy
Adaptive Clustering Hierarchy (LEACH) have been analysed and surveyed. This
paper also highlights the advantages and drawbacks of various Hierarchical
routing protocols. The performance is evaluated using Network Simulator-2 and
the results are shown. |
Keywords: |
Wsn,Routing,Hierarchical,Cluster Formation,Leach,Alive Nodes,Packet Delivery
Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
A LOW LATENCY ENERGY AWARE GTS ALLOCATION SCHEME FOR WIRELESS NODES IN ROAD
TRANSPORTATION NETWORKS |
Author: |
Ms. RAMYA, Dr. UMA RAJARAM Dr. S.RAVI |
Abstract: |
Past studies in WSN have concentrated on data routing, energy efficiency, data
latency and protocol development. In this paper, a low latency guaranteed time
slot MAC protocol based on data priority with a bias for low energy nodes is
proposed. The intelligent sensors collect event based data and polled data in a
target area. The reduction in data latency is based on forwarding data packets
which have a higher priority in a wireless network. DP-MAC has been designed to
address the data latency problem to ensure that emergency and hazardous events
in a transportation network are reported with minimum delay. The design of such
a scheme is based on the collision free TDMA mechanism. The data priority is
determined based on the type of event and the node lifetime energy information.
The analytical and simulation results are presented in this scheme and a
comparison is made with a network that treats all the nodes and their data
packets without bias. The improvement in data latency for prioritized messages
specifically for emergency information in automotive land based networks is
presented. |
Keywords: |
Wireless Sensor Network (WSN), Data Priority MAC protocol (DP-MAC), SIFS, TDMA. |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
REDUCING STUDENT’S LEARNING DURATION ON ENGINEERING FINAL PROJECT BY
IMPLEMENTING FINK’S TAXONOMY ON E-LEARNING |
Author: |
SRI SUNING KUSUMAWARDANI, LUKITO EDI NUGROHO, ADHI SUSANTO, AMITYA KUMARA,
HUTOMO SURYO WASISTO, ULISES CORTÉS |
Abstract: |
In this work, a developed e-learning system for the final project of engineering
undergraduate students is evaluated as a miniature of engineering education in
one of the Indonesian universities (i.e., Universitas Gadjah Mada). Several
challenges faced during the system realization have been accommodated by
involving the use of both learning materials and experiences. For its
problem-solving approach, Fink’s taxonomy has been combined in a system with
semantic technology, based on the ontology method. Therefore, the results of
ontology design can then be integrated to the learning management system (LMS)
of Moodle, which allows semantic resource queries. By means of the e-learning
experimental results with six components of Fink’s taxonomy as the measurement
aspects, it is obviously shown that the e-learning system has significantly
influenced the application, learning how to learn, integration, and foundational
knowledge aspects. Moreover, it provides a strong indication that the realized
system can assist engineering undergraduate students to reduce the required
duration of their final projects. |
Keywords: |
Project Based Learning, Significant Learning, Engineering Education, Evaluation
E-Learning, Final Project |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
SAIVMM: SELF ADAPTIVE INTELLIGENT VMM SCHEDULER FOR SERVER CONSOLIDATION IN
CLOUD ENVIRONMENT |
Author: |
S.SURESH , S.SAKTHIVEL |
Abstract: |
Cloud computing is an on-demand resource provisioning technology and server
virtualization act as a driving force of cloud. Virtualization consolidates
multiple physical machines into one machine, thereby cut cost and improves
efficiency of data center. However, as all virtual machines (VM) share the same
physical resources, contention for shared resources cause significant variance
in observed system response time and throughput. Diverse and unpredictable
workloads in cloud environments, needs resource allocations to be continuously
optimized to ensure the hosted services meet their service level objectives (SLO).
However, the current VMM algorithms are more oriented with providing fair access
to the VMs; Lack the ability to adaptively determine the effects of changing
resource allocations on the performance of the hosted IT services. Furthermore,
as hardware getting evolved and multi core processor technology has increased
density of processor cores in a computer at a faster rate, effective usage of
the resources becomes a great challenge to software. This is a major bottleneck
in cloud applications where performance plays a vital role for user acceptance.
Taking this all into account, the paper propose a novel system using
meta-heuristic combinatorial search techniques that automatically regulates the
VMM CPU scheduler related to the applications on-the-fly with dynamic changes in
the environment to maximize throughput and minimize response time. We used this
resource allocation algorithm in an evaluation, consist of various scenarios
with synthetic workloads. Simulation based results indicate that proposed model
improves CPU utilization and make the best tradeoff between resource utilization
and performance by 2% on average and up to 6% compared to the default VMM
scheduler configurations. The proposed model discussed in this paper can readily
be extended to a multi-tier cloud computing environment applications to reduce
the overall performance delay. |
Keywords: |
Cloud computing, Virtualization, VMM Scheduling, Workload, Simulation |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
Title: |
PRIVACY PRESERVING COLLABORATIVE DATA MINING USING STEGANOGRAPHY AND ENCRYPTION |
Author: |
HARE RAM SAH, G.GUNASEKARAN |
Abstract: |
Data collection is an essential step in data miningprocess. Collecting data of
varying nature and still preserving privacy is essential for many applications.
Privacy concerns maypreventdirect sharing of data andhow multipleparties
collaboratively conduct data mining withoutbreaching data privacy presents a
challenge.Cryptography involves converting a message text into anunreadable
cipher and steganography embedsmessage into a cover media and hides its
existence.Both these schemes are effectivelyimplemented in image files. In this
paper an advanced system of encrypting datathat combines the features of
cryptography and steganography along with privacy preservation is presented.A
case study with medical image is also presented. The details of the person’s
medical image along with clinical interpretation is encrypted, stegano and
stored in the database. Key based retrieval technique is used to recover the
hidden details. The advantage of this scheme is that the stegano can operate on
encrypted texts also and hence offers a double layer data protection.
|
Keywords: |
Privacy Preserving, Data mining,Steganography,Image Encryption |
Source: |
Journal of Theoretical and Applied Information Technology
31st October 2014 -- Vol. 68. No. 3 -- 2014 |
Full
Text |
|
|
|