|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2014 | Vol. 65 No.1 |
Title: |
EFFECT OF FATIGUE ON SSVEP DURING VIRTUAL WHEELCHAIR NAVIGATION |
Author: |
HACHEM A. LAMT , MOHAMED MONCEF BEN KHELIFA, ADEL M. ALIMI , PHILIPPE GORCE |
Abstract: |
The goal of this study is to investigate the influence of fatigue on Steady
State Visual Evoked Potential (SSVEP) during virtual wheelchair navigation. For
this purpose, an experimental environment was set based on modifiable parameters
(luminosity, number of obstacles and obstacles velocities). A correlation study
between SSVEP and fatigue ratings was conducted by the mean of spectral
analysis. Finally, the best correlated parameters are presented for a
classification using three algorithms which are MLP (Multi Layer Perceptron),
LDA (Linear Discriminate Analysis) and SVM (Support Vector Machine). Those
findings can help us in order to design suitable gaze/brain based wheelchair
navigation. |
Keywords: |
SSVEP, Mental Fatigue, Virtual Navigation, Wheelchair |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
MODIFIED UNIVERSAL SHIFT REGISTER BASED LOW POWER MULTIPLIER ARCHITECTURE |
Author: |
S. P.VALAN ARASU, Dr.S. BAULKANI |
Abstract: |
In this article, a low power 8x8 shift-add multiplier architecture called
Universal Shift Register (USR)-Multiplier is proposed. The proposed shift-add
multiplier architecture concentrates on minimizing the switching activities of
partial products in conventional shift-add multiplier. The switching activities
are minimized by bypassing the multiplication operations of Zero’s (‘0’) in
Multiplier (A) with Multiplicand (B). This technique of bypassing reduces power
consumed by the multiplier architecture. The proposed low power 8x8 multiplier
adopts a Universal Shift Register (USR) with clock control unit such that the
bypassing of zero’s in ‘B’ is realized. Our proposed multiplier is designed and
simulated using Xilinx ISE tools and compared with the power consumption of the
conventional Shift-and Add multiplier, BZ-FAD shift-and add multiplier and ET
shift-and add multiplier for the 8-bit multiplication results. Also, our
multiplier is designed and simulated using Xilinx ISE tools and compared with
the power consumption of the existing Booth multiplier, Wallace multiplier,
Vedic Multiplier, BZ-FAD Shift-and add multiplier for the 16-bit multiplication
results.
Advantages- Results show a reduction in switching activity and a reduction of
more than 41% of the total power consumption comparing with conventional
Shift-and Add multiplier. |
Keywords: |
Universal Shift Register, Shift-Add Multiplier, Switching activity, Partial
product, BZFAD (Bypass Zero Feed A Directly). |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NOVEL SYNTAX CLASS BASED ADAPTIVE ENCODING TECHNIQUE FOR CONTRAST
STRETCHED MULTISPECTRAL IMAGES |
Author: |
DEEPA.S, V.SADASIVAM |
Abstract: |
Multispectral images are images with high spatial and spectral resolution.
Efficient multispectral image compression plays a key role in most of the
geographical applications. The three important phases involved in the proposed
adaptive technique are contrast stretching, clustering and encoding based on the
resultant clusters. The contrast stretching results in a very clear image and
the image is then clustered into smooth and textured regions based on K means
algorithm. The spatial orientation tree (STW) wavelet algorithm and the wavelet
difference reduction (WDR) algorithm are applied to the smooth and textured
regions respectively. The results are compared using the Compression ratio, Peak
Signal to Noise Ratio (PSNR) and Structural Similarity (SSIM) Index metrics. It
reflects the quality of the proposed work as betterment than the existing state
of art techniques with very high compression ratio and minimum image distortion. |
Keywords: |
STW, WDR, Contrast Stretching, K-Means, PSNR, SSIM |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
IMPACT OF RADIO PROPAGATION MODEL AND MOBILITY IN ON-DEMAND ROUTING
PROTOCOL OF MANET |
Author: |
SUKANT KISHORO BISOY, PRASANT KUMAR PATTNAIK |
Abstract: |
Accuracy of routing protocol performance in mobile ad hoc network (MANET)
depends on many parameters. Besides many parameters propagation model and node
velocity are the two among them. Node mobility is responsible for network
topology and propagation model for calculating signal strength at receiver. In
wireless network MANET suffers a huge loss in performance due to obstacle
between transmission and variation in signal strength at receiver. Many routing
protocols are proposed based on which neglect the effect of fading and path
loss. So it is important to find the effect of fading and node velocity for
accurate estimation and analysis of performance of routing protocols in MANET.
We investigate the effect of propagation model (both non-fading and fading) and
mobility on the performance of the ad hoc routing protocol such as Ad hoc On
Demand Distance Vector (AODV), Dynamic Manet On Demand (DYMO) and Dynamic Source
Routing (DSR) and present the results gathered from simulation using NS2. The
result shows that propagation model and mobility has strong impact on the
performance of MANET routing protocol. |
Keywords: |
MANET; AODV; DYMO; DSR; Propagation Model; Mobility Model. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
DOMINATING SET BASED GEOCAST WITH TEMPORAL STABILITY FOR WIRELESS MOBILE ADHOC
AND SENSOR NETWORKS |
Author: |
SELVI RAVINDRAN, NARAYANASAMY PALANISAMY, VETRISELVI VETRIAN |
Abstract: |
Geocast is a variant of a location based multicast where a packet is delivered
from a source to all nodes specific to a geographic area interested by the
source. The objective here is to 1.Efficiently utilize the energy; this can
reduce the void formation. 2. Reduce the transmission cost and the delay for
delivering the packet. The existing geocast protocols are either multicast or
flooding based whose transmission cost and overhead of maintenance are quite
high. The proposed concept of Dominating Set based Geocast for Mobile adhoc and
sensor network (DSGM) protocol, chooses a dominating set (DS), based on the
stability factor by predicting its location and connectivity of link existing
between two neighboring node. The DS formed in distributed way guarantees the
delivery of the message and even keeps the transmission cost to the minimal. We
use a simple location prediction concept, which improves the packet delivery
ratio and makes geocasting efficient for mobile nodes. The existing geocast
protocol assumes the node to be static while performing geocast, thus
restricting the mobility of a node. This paper describes a technique of how a
simple prediction can bring significant improvement in the reliability of
geocast protocol. Simulation results show that the DSGM improves the message
delivery in a mobile environment than the existing protocol with minimal
transmission cost. |
Keywords: |
Geocast, Sensor networks, Dominating set, Location prediction. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
DEEP ENCODING WITH CLUSTERING TECHNIQUE FOR PROGRAMMABLE MBIST |
Author: |
NURQAMARINA BINTI MOHD NOOR, AZILAH SAPARON |
Abstract: |
As latest trend in designing processors and system-on-chips (SoCs), they require
more RAMs than logics. These embedded RAMs contribute to the high percentage of
yields for these processors and SoCs. To ensure high percentage of yield is
achieved, a built-in self-test (BIST) is utilized to test these RAMs. The memory
BIST applies various test algorithms such as MARCH tests to detect various RAM
faults. Numerous design objectives such as programmability, low area overhead,
at-speed/full-speed test and multiple RAMs target are proposed in the BIST
designs. These objectives must be achieved to provide best fault detection in
these embedded RAMs. A technique called clustering which is applied to other
architectures such as VLIW processor and FPGA architecture is utilized in this
study to achieve low area programmable memory BIST (P-MBIST). The synthesis
results justify that the cluster technique provides low area overhead for the
programmable memory BIST controller at optimum performance. |
Keywords: |
P-MBIST, MARCH Test, Cluster, Low Area, FPGA |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NOVEL DESIGN OF FINGER VEIN RECOGNITION FOR PERSONAL AUTHENTICATION AND
VEHICLE SECURITY |
Author: |
V.RAMYA, P.VIJAYA KUMAR, B.PALANIAPPAN |
Abstract: |
In this paper, a real time embedded finger vein recognition system for personal
authentication and vehicle security is proposed. Vein patterns are different for
each finger and for each persons and as they are hidden underneath the skin’s
surface, forgery is extremely difficult these unique aspects of finger vein
patterns recognitions set it apart from previous forms of biometrics and have
led to its adoption in various security technology, the proposed system is
implemented in MATLAB platform and equipped with a novel finger-vein recognition
algorithm. The proposed system consists of four module image acquisition module,
finger vein matching model, embedded main board and communication module. The
image acquisition module is used to collect a finger vein image and is a low
cost device. Feature extraction is important for finger vein recognition
algorithm and a HAAR classifier is used to extract the features. The finger vein
image is matched by calculating the Euclidean distance. Embedded control unit
comprises of AT89C51microcontroller and is programmed using Embedded C and has a
GSM for alerting a message about the unauthorized person. The proposed system
takes only 0.5 seconds to verify one input finger vein sample and the expected
error rate (ERR) of 0.06. |
Keywords: |
Finger Vein Recognition Algorithm, Image Acquisition, Haar Transform,
Microcontroller, Gsm |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
TWO-WAYS DATABASE SYNCHRONIZATION IN HOMOGENOUS DATABASE MANAGEMENT SYSTEM WITH
BINARY LOG APPROACH |
Author: |
GEDE HADI SURYA, I MADE SUKARSA, I GUSTI MADE ARYA SASMITA |
Abstract: |
Nowadays, there are several researches conducted about design from Database for
the real-time application. A real-time Database system is usually defined as a
Database system in which the transaction is correlated with the deadline, right
when their transactions are done. Along with the developing of the Database
system these days, there are many theories emerged which combines the real-time
system with the distributed Database and it is called Distributed Real-time
Database System (DRTDBS). One of the foremost utilization of DRTDBS is using
Replication. With Replication, all of the data will be sent from the original
place to the destination place in real-time. On the other hand, Replication has
many shortcomings, either from the consistency of the network or when the
network is not working properly. This paper will discuss about how a DRTDBS
application is built with the Client-Server concept by utilizing Replication and
Binary Log from MySQL. This approach will contribute a new alternative and new
concept on the process of synchronization Database in real-time with Binary Log
file processing. It is also expected to give contribution in developing DRTDBS
in the future. |
Keywords: |
Database Synchronization, Real-Time Database Systems, Replication, Binary Log |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
OPTIMIZATION OF NANO ADHOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL IN
MANET |
Author: |
T GANESAN, DR N RAJKUMAR |
Abstract: |
Recent development of mobile adhoc networks , ensembles the nano molecular
communication components in order to improve network performance by using
transmitter nano machine (TN) and receiver nano machine (RN). The previous model
nano adhoc on demand distance vector routing NAODV has the problem higher
latency ratio, which claims the lifetime of the network. We propose a new
optimized nano adhoc on demand distance vector routing protocol (O-NAODV), which
uses the residual energy of mobile nodes while selecting a route. In
conventional AODV routing protocol, source node forwards RREQ (Route Request)
packet to find out path to the destination node. The packets are forwarded by
the intermediate nodes which have lower value of residual energy and lifetime ,
so that even if a node forwards the route request packet , it cannot forward the
route reply RREP packet successfully on the reverse direction towards source
node. This makes the source node to rebroadcast the RREQ packet to the
destination, which affects the Packet Delivery Ratio (PDR) as well as
throughput. Solution to above problem is given in this paper, by Optimized NAODV
routing protocol where the node does not forward RREQ unless there is sufficient
energy and until the node density in its surrounding exceeds a particular
threshold. Optimized NAODV analyzes these node density and residual energy
parameters, when implementing routing discovery, and avoid the unnecessary
rebroadcasts. We have compared the performance of NAODV with different
simulation parameters and the proposed method has produced higher efficient
results compare to others with increased throughput. |
Keywords: |
MANET, AODV, NAODV, O-NAODV |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
A HYBRID AND NOVEL OPTIMIZATION FRAMEWORK FOR DENOISING AND CLASSIFICATION
OF MEDICAL IMAGES USING DTCWP AND NEURO-FUZZY CLASSIFIERS |
Author: |
A.VELAYUDHAM, R.KANTHAVEL, K.MADHAN KUMAR |
Abstract: |
Computed tomography (CT) images are usually corrupted by several noises from the
measurement process complicating the automatic feature extraction and analysis
of clinical data. To attain the best possible diagnosis it is very vital that
medical images be clear, sharp, and free of noise and artifacts. In this
research paper, we propose a robust technique to denoise, detect and classify
the tumour part from CT medical images. Our proposed approach consists of four
phases, such as denoising, region segmentation, feature extraction and
classification. In the denoising phase Dual Tree Complex Wavelet Packets and
Empirical Mode Decomposition are used for removing noise. Here, histon process
is used in order to surmount the smoothing filter type and it will not affect
the lower dimensions. We have taken into consideration two noises, Gaussian and
salt & pepper for proposed technique. The performance of the proposed technique
is assessed on the five CT images for the parameters, PSNR and SDME. In the
segmentation process K-means clustering technique is employed. For the feature
extraction, the parameters contrast, energy and gain are extracted. In
classification, a modified technique called Cuckoo-Neuro Fuzzy (CNF) algorithm
is developed and applied for detection of the tumour region. The cuckoo search
algorithm is employed for training the neural network and the fuzzy rules are
generated according to the weights of the training sets. Then, classification is
done based on the fuzzy rules generated. From the obtained outcomes, we can
conclude that the proposed denoising technique have shown better values for the
SDME of 69.9798 and PSNR of 25.4193 for salt & pepper noise which is very
superior compared to existing methods. Moreover our proposed technique has shown
an accuracy of 96.3% which is very better than the existing methods. |
Keywords: |
CT, EMD, DTCWP, PSNR, SDME, CNF, Contrast, Energy, Entropy, K-Means,
Sensitivity, Specificity, Accuracy |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
A SURVEY ON WATERMARKING TECHNIQUES, REQUIREMENTS, APPLICATIONS FOR
MEDICAL IMAGES |
Author: |
R.LAKSHMI PRIYA , V.SADASIVAM |
Abstract: |
Medical images are often transmitted over insecure channel. Telemedicine enables
medical diagnosis and patient care using modern medical equipments. These
equipments generate huge volume of data every day. Hence protection of medical
image is very crucial. Many approaches like encryption, digital signature,
watermarking etc are spotted in the literature. Watermarking in medical images
is commonly used for content authentication, effective data distribution and
management, storage, security, safe archiving, controlled access retrieval and
captioning. The objective of this paper is to present a survey and compare
emerging techniques for protection of medical images through watermarking.
Various aspects of medical image watermarking are discussed in this paper
including classification and performance measures used in recent research.
Finally the paper reviews and remarks about the state of the art and compare
some recent works on watermarking. |
Keywords: |
Medical Image Watermarking, DICOM, Electronic Patient Record, Integrity,
Authentication, Security, Tamper Localization |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
WEB SERVICES BILLING AND ACCOUNTING |
Author: |
MUTHULAKSHMI, SHEILA ANAND |
Abstract: |
Accounting, according to the definition of IETF is the process of collecting the
resource usage information for the purpose of billing, trend analysis etc. This
paper presents an integrated billing, accounting and charging system for web
service accounting. The ability to generate revenue based on differentiated
services is critical to the future business success for service providers.
Current AAA architectures, protocols, and implementations are unable to cope
with heterogeneous application scenarios and requirements related to different
provisioning of services. The proposed system aims to automate the process of
billing and accounting for web services. Charging and accounting policies have
been used to specify the pricing and accounting options for different services
and users. Standard IPDR format has been proposed to define the bill and payment
formats. The proposed design has been implemented and tested with a sample
application. |
Keywords: |
Web service Accounting, Web service Audit, Web service bill, IPDR format |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
SENSORLESS SLIDING MODE CONTROL OF INDUCTION MOTOR BASED ON LUENBERGER
OBSERVER USING FUZZY LOGIC ADAPTATION MECHANISM |
Author: |
A. BENNASSAR, A. ABBOU, M. AKHERRAZ, A. ESSALMI, M. BARARA, H. MAHMOUDI |
Abstract: |
Many industrial applications require high performance speed sensorless operation
and demand new control schemes in order to obtain fast dynamic response. In this
paper, we present a speed sensorless sliding mode control (SMC) of induction
motor (IM). The sliding mode control is a powerful tool to reject disturbances.
However, the chattering phenomenon presents a major drawback for variable
structure systems. To decrease this problem, a saturation function is used to
limit chattering effects. A Luenberger observer based on fuzzy logic adaptation
mechanism is designed for speed estimation. Numerical simulation results of the
proposed scheme illustrate the good performance of sensorless induction motor
and the robustness against load torque disturbance. |
Keywords: |
Sliding Mode Control, Induction Motor, Luenberger Observer, Fuzzy Logic,
Adaptation Mechanism. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
EFFECTIVENESS OF SHEPWM TECHNIQUE FOR PARALLEL CURRENT SOURCE INVERTERS
USING ARTIFICIAL BEE COLONY ALGORITHM |
Author: |
D.TAMILARASI, T.S.SIVAKUMARAN |
Abstract: |
Now a days multilevel inverters are gaining popularity due to reduced voltage
stress and low Total Harmonic Distortion (THD) output voltage waveform. This
paper proposes a new concept of H-bridge based parallel current source inverter
(CSI), used for grid application. In this paper five, seven and nine level
inverter response/waveforms are analysed for sinusoidal pulse width modulation (SPWM)
and Selective Harmonic Elimination (SHE). Effectiveness of Proposed SHE PWM
technique using optimal switching angles found using bee colony algorithm for
current source inverters are verified using MATLAB/Simulink software. |
Keywords: |
Parallel current source inverter, SHEPWM, SPWM, Total Harmonic Distortion. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NOVEL APPROACH FOR RANKING ONTOLOGIES BASED ON THE STRUCTURE AND
SEMANTICS |
Author: |
R.SUBHASHINI, DR.J.AKILANDESWARI |
Abstract: |
Semantic web is based on knowledge representation which contains a large number
of ontologies. The increasing demand for ontology had triggered a growing number
of usable ontology in web. This is mainly used for ontology merging, ontology
mapping, and for reusing purpose. In order to get a solution for this problem,
ontology search results need to be ranked. This ranking method increases the
scope of the knowledge searching in ontology-driven searches. At present many
ranking techniques are available. By exploring the advantages and weakness of a
AKTive ranking algorithm in the semantic web , this paper proposes a new ranking
algorithm named Onto-DSB ranking based on the semantic web link and the internal
structure of ontology , the way which is achieved by introducing new measures
based on its relation set. Experimental results indicate that this algorithm is
more effective and satisfies the needs of the user. |
Keywords: |
Semantic Web, Ontology Merging, Ranking Algorithm, Reusable Ontology, Onto-DSB
Ranking Technique, Internal Structure, Semantic Web Link. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
SOFTWARE DEVELOPMENT FOR THREE DIMENSIONAL VISUALIZATION OF LUNG ON
COMPUTED TOMOGRAPHY SCANS USING ACTIVE SHAPE MODEL AND VOLUME RENDERING |
Author: |
SRI WIDODO, WIJIYANTO |
Abstract: |
Lungs are respiratory apparatus in humans and some animals. Lung specialists and
radiologists usually only see image of Computer Tomography Scans (CT Scans) with
naked eye to detect abnormalities of lungs. This procedure is considered to be
ineffective. Purpose of this research is to develop applications for 3-D
visualization of lungs on CT Scans. This study is divided into two steps. The
first is lung segmentation using active shape model (ASM). Second is a 3-D
visualization of lung using volume rendering. Results of our study show that
segmentation approach with an Active Shape Model has accuracy 96.8%, sensitivity
88.2% and specificity 99.1%. |
Keywords: |
Active Shape Model, Computer Tomography (CT), Volume Rendering. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
CLASSIFYING NORMALITY, ABNORMALITY OF DIABETIC RETINOPATHY FUNDUS IMAGES
BY DETECTING AND ANALYZING THE OD AND VASCULAR |
Author: |
C.A.SATHIYAMOORTHY, Dr.G.KULANTHAIVEL |
Abstract: |
The Assessment of the Blood Vessels in a Retinal Image is one of the significant
jobs for diagnosing the ophthalmic pathology. The main objective of this paper
is to classify the normal and abnormal images in diabetic retinal fundus images.
This paper carry out the sequence of processes (i) detect Optic Disc, (ii)
Extract the Blood vessels and (iii) classify whether the DR is normal or
abnormal due to the stages of Optic Disc and Blood Vessels. The investigational
results of an automated method for image-based classification of diabetic
retinopathy have been presented. The process is divided into three stages: Image
Pre-processing, Image-Segmentation & Extraction, feature extraction and then
image classification. In the first stage two image processing techniques are
used in order to enhance their features. Then, the second stage reduces the
dimensionality of the images and obtains features using the statistical method
of principal component analysis. Finally, in the third stage the images are
classified using SVM classifier as normal or abnormal. The suggested algorithm
is checked on the database DRIVE and the average value of sensitivity is about
83% with the average value of accuracy reaching 98%. Huge number of vessels is
differentiated by a standard Thresholding for their good contrast and
brightness. Then some thin vessel segments are identified with bad contrast and
brightness. This proposed method reduces the more computational complexity and
hand simulation work. |
Keywords: |
Optic Disc; Blood Vessels; Diabetic Retinopathy; Vascular;
Normality–Abnormality; Detection and Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
ASSESSING THE FACTORS THAT AFFECT ADOPTION OF SOCIAL RESEARCH NETWORK SITE
FOR COLLABORATION BY RESEARCHERS USING MULTI-CRITERIA APPROACH |
Author: |
MARYAM SALAHSHOUR RAD, , HALINA MOHAMED DAHLAN, NOORMINSHAH A.IAHAD, MEHRBAKHSH
NILASHI, ROZANA ZAKARIA |
Abstract: |
Collaboration in research continuously gains importance. Recent developments in
online collaboration technology, namely social research network sites (SRNS),
specifically aim to support research collaboration. SRNS allow researchers to
present themselves, to network, to communicate, and to collaborate. Acceptance
of this technology by researchers has received little academic attention.
Understanding the relationships between a user’s intention and the utilization
of SRNS is an essential step in engaging the SRNS as an educational tool.
Previous research focused on explaining user adoption from technology
perceptions such as perceived usefulness, perceived ease of use, interactivity,
and relative advantage. However, current research models for technology
acceptance can hardly explain the impact on the intention of using SRNS from the
perspective of technology fit due to the lack of social constructs. However,
users’ adoption is determined not only by their perception of the technology but
also by the task technology fit. In other words, even though a technology may be
perceived as being advanced, if it does not fit users’ task requirements, they
may not adopt it. This study examines the impact of Performance Expectancy,
Effort Expectancy, social influence, facilitating condition, user resistance,
individual, technology, task and social characteristics on users’ intentions in
using SRNS by integrating the unified theory of acceptance and usage of
technology (UTAUT), task-technology fit (TTF) model and social capital theory.
In addition, we applied the technique for order preference by similarity to
ideal solution (TOPSIS) for ranking aforementioned factors. The TOPSIS, one of
the multi-criteria decision making methods (MCDM), is developed to solve
real-world decision problems that has continued to work satisfactorily across
different application areas. Accordingly, we develop a new hierarchy model for
TOPSIS using the aforementioned factors to assess their importance on adoption
of social research network site for collaboration by researchers. |
Keywords: |
Assessing, Social Research Network Site (SRNS), Unified Theory of Acceptance and
Usage of Technology (UTAUT), Task-Technology Fit (TTF), Technique for Order
Preference by Similarity to Ideal Solution (TOPSIS) |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
OPTIMAL PILOT-SYMBOL PATTERNS FOR MIMO OFDM SYSTEMS UNDER TIME VARYING
CHANNELS |
Author: |
MY ABDELKADER YOUSSEFI, JAMAL EL ABBADI |
Abstract: |
This paper presents a new approach to achieve optimal training sequences (OTS)
in terms of minimizing the mean-square channel estimation error for spectrally
efficient MIMO OFDM systems. It is shown that the OTS are equi-powered, equi-spaced
and position orthogonal. However, in special cases we can find that required
conditions to achieve optimal pilot design are not satisfied, this means the
optimum pilot is unachievable. In this paper, an algorithm is proposed to
achieve suboptimum pilot design under time varying channels. To offer high
throughput gains, we propose an adaptive pilot scheme in order to optimally use
pilot tones over time varying channels. |
Keywords: |
Differential evolution (DE), OFDM, MIMO, Mobile multipath channel. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
RECENT DEVELOPMENTS IN IMAGE QUALITY ASSESSMENT ALGORITHMS: A REVIEW |
Author: |
K.R. JOY, E. GOPALAKRISHNA SARMA |
Abstract: |
Image Quality Assessment (IQA) has become a subject of intense research interest
in the recent years. The demand for accurate, consistent, computationally simple
and easy-to-use quality assessment tools that can be used to measure, control,
and improve the perceptual quality of images and video is increasing day by day.
Applications of IQA include machine vision, medical imaging, multimedia
communication, entertainment and other image processing activities. Systems
embedded with IQA algorithms can replace humans for evaluating image quality in
real-time applications and hard-to-reach environments. As most of the images are
ultimately viewed by human observers, the best method to assess the quality of
an image is by subjective tests by human observers. However, subjective tests
are expensive, time consuming and difficult to perform in real-time
applications. Therefore, these tests are done objectively using computer
algorithms. These algorithms attempt to evaluate the quality of the image in the
same way as how humans perceive image quality. In this article we present an
up-to-date review on IQA research and its future trends, the principles and
methodologies used in popular Full Reference IQA algorithms, the methodologies
and parameters used for evaluating the performance of IQA algorithms and
performance comparison of important IQA algorithms. |
Keywords: |
Image Quality Assessment, FR-IQA, NR-IQA, RR-IQA, HVS |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN EXTENDED ARTIFICIAL IMMUNE SYSTEM FOR VOLTAGE PROFILE OPTIMIZATION USING
UNIFIED POWER FLOW CONTROLLER |
Author: |
K.A. RANI FATHIMA , T.A. RAGHAVENDIRAN |
Abstract: |
Unified Power Flow Controller (UPFC) is a most versatile device to control the
power flow in transmission lines efficiently by injecting active and reactive
voltage components in series with transmission lines using power converter
modules and dependent on an external dc-link voltage. This proposed novel method
is capable of minimizing the overall system losses and simultaneously improves
the voltage stability, by effectively controlling the power flow. These multiple
constraints are satisfied by tuning the UPFC parameters using optimization
algorithm. In this paper the EAIS-[Extended Artificial Immune System technique]
is used to optimise the parameters of the unified power flow controller in order
to improve the voltage profile. EAIS is a novel approach with minimum iterations
that combines partial solution to reach the final solution. In this study, EAIS
optimization engine is developed , where the control variables of the Unified
power flow controller is embedded into the system’s data. This algorithm is
implemented in MATLAB environment and tested in IEEE-30 BUS system. The Extended
Artificial Immune System gives comparatively promising results than the existing
techniques of AIS. |
Keywords: |
FACTS, Power Control, Power Systems, Power Optimization, Transmission Lines,
UPFC, VP. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
ENHANCED TECHNIQUES FOR ASSOCIATION RULE CLASSIFICATION IN LARGE DATASETS |
Author: |
MNI.T.V, Dr.R.NEDUNCHEZHIAN |
Abstract: |
Associative classification performs knowledge discovery by combining the tasks
of the Knowledge Discovery in Databases (KDD), association rule mining and
classification. It is a promising method that improves classification in terms
of accuracy when compared with traditional classification methods. The major
issues with associative classification are its inability to work efficiently
with huge datasets and the huge number of association rules generated. In this
paper, these issues are addressed through the use of hierarchical partitioning
with Frequent Pattern List and multiple projections of pruning algorithms with
optimized rule selection procedure. Experimental results prove that these
solutions provide the advantage of able to work with both small and large sized
datasets without degrading the classification accuracy. The proposed algorithm
shows an average efficiency gain of 47.90% with respect to reduction in number
of rules, while showing a notable improvement in the classification accuracy. |
Keywords: |
Association Rule, Classification, Large Datasets, Frequent Pattern List,
Hierarchical Partitioning. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT POWER ALLOCATION FOR HYBRID-ARQ RELAY NETWORKS |
Author: |
ALI KAMOUCH, ZOUHAIR GUENNOUN |
Abstract: |
Spatial diversity is an inherent nature of wireless communications. This nature
can be exploited to make communications more reliable by
Multiple-Input-Multiple-Output (MIMO). However the use of multiple co-located
antennas is constrained by the dimensions of modern devices. To overcome this
drawback cooperative relaying shares antennas between different network nodes
thus realizing a Virtual antenna arrays (VAA). In this paper we study a single
user relay network aided Hybrid-ARQ (H-ARQ) type I consisting of a source, a
relay and a destination. We provide the closed form expressions for the outage
probability and delay. We use a numerical method based on relative distance
between nodes to estimate the optimum amount of power to be allocated to source
and relay. The numerical results show the accuracy of our analytical
expressions. In addition proposed allocation strategy outperforms the equal
power allocation. |
Keywords: |
Spatial Diversity, Relaying Networks (RN), Virtual Antenna Arrays (VAA),
Multiple-Input-Multiple-Output (MIMO), H-ARQ Optimal Power Allocation. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
AUTOMATIC GRIDDING METHOD FOR MICROARRAY IMAGES |
Author: |
JONNADULA HARIKIRAN, B.AVINASH, DR.P.V.LAKSHMI, DR.R.KIRANKUMAR |
Abstract: |
A cDNA microarray is a powerful tool in biotechnology providing useful
information in analyzing thousands of gene expressions simultaneously. The
analysis of microarray images allows the identification of gene expressions to
draw biological conclusions for applications ranging from genetic profiling to
diagnosis of cancer. The DNA microarray image analysis includes three tasks:
gridding, segmentation and intensity extraction. The gridding process is usually
divided into two main steps: sub-gridding and spot detection. Most existing
gridding algorithms are semiautomatic requiring human intervention and parameter
presetting. Each spot is associated with a gene and contains the pixels that
indicate the level of expression of that particular gene In addition, improper
gridding will affect image analysis in extracting intensity values from each
spot that represents gene expression level. In this paper, a fully automatic
approach to sub-gridding and spot detection is presented. After gridding, the
image is segmented using fuzzy c-means clustering algorithm for separation of
spots from the background pixels. The result of the experiment shows that the
method presented in this paper is accurate and automatic without human
intervention and parameter presetting. |
Keywords: |
Microarray, Mathematical Morphology, Gridding, Image Processing |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT QOS WITH MULTIPLE CONSTRAINTS FOR EPIGENOMIC SCIENTIFIC WORKFLOW
MODEL IN SAAS CLOUD |
Author: |
SUBAMATHI SIVARAJ, Dr. MUNIRAJ N J R |
Abstract: |
In cloud computing, Service Level Agreement (SLA) will be executed between the
user and the cloud provider before the start of the application or using the
cloud. SLA defines user’s essential Quality of Service (QoS) parameter in terms
of execution cost and time. The QoS can be measured by many factors viz.
Execution time, User deadline, Cost and Reliability etc. SC-PCP algorithm is
used to improve the QoS, by using cost and time for satisfying user defined
deadline. In this paper, an attempt has been made to enhance the SC-PCP
algorithm and thereby to improve the QoS by including the several other
parameters viz. Reliability, Scalability and Throughput. The user requirement is
obtained with higher efficiency in short duration for considering of multiple
parameters as QoS contrain. The performance of the enhanced SC-PCP algorithm has
been simulated and analyzed using CloudSim to validate the results. |
Keywords: |
Throughput, Stability, Reliability, CloudSim, SAAS(Software as a Service),
QoS(Quality of Service), Cloud Computing, Distributed Computing |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
THE PROTOTYPE DESIGN ACADEMIC INFORMATION FOR MANAGEMENT OF EXAMS QUIZ
UNIVERSITY STUDENTS BASED ON SMS GATEWAY |
Author: |
JUNITA JUWITA SIREGAR, RUBIL |
Abstract: |
The need for quick and cheap real time information becomes a must for every
higher education institution in organizing the education. The need for a web for
every teacher or lecturer in building multi-channel learning process is a
challenge of building the advanced education itself. The objective of this
research is to create a web application design with the use of Information
Technology and Telecommunication (ICT) or SMS Gateway of academic information.
The method of the research used by the author is Field Research, where data
collection was done through direct observation on the users in order to obtain
as much information as possible from the users to learn what the users want in
the making of SMS Gateway information system. Meanwhile, the methodology of the
software development is using the Rapid Application Development (RAD) or
Prototype model approach. For the design analysis of the academic information
SMS Gateway system, the author used the Object Oriented Analysis Design (OOAD)
approach using the Use Case Diagram, Sequence Diagram, Class Diagram and web
application implementation using PHP and MySql software as well as SMS Gateway
software with Gammu. The conclusion of this research is that the use of academic
information SMS Gateway on college or university students is very effective for
the learning activity process and institution service quality improvement as
well as for helping the lecturers to obtain information of their students’ quiz
score real time. The result of this research is that the mastery of science and
technology through the academic information SMS Gateway application prototype
creation. |
Keywords: |
Sms Gateway, ICT, RAD, Academic, OOAD, PHP. |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
DYNAMIC DIFFICULTY ADJUSTMENT IN GAME BASED ON TYPE OF PLAYER WITH ANFIS
METHOD |
Author: |
KURNIAWAN SUTANTO, SUHARJITO |
Abstract: |
The purpose of this research is to measure the accuracy and effectiveness of
Adaptive Neuro Fuzzy Inference System (ANFIS) when it implemented as Dynamic
Difficulty Adjustment, to manage the difficulty of a game according to the
player's behavior, as the main problem is players need to switch the difficulty
level manually, and it will be annoyed them. The inputs are the amount of
enemies defeated and hero taken damages. There are five levels of difficulty.
The measurement of accuracy done by Mean-Squared Error, meanwhile the
measurement of effectiveness done by comparing the value of Mean-Squared Error
to the Artificial Neural Network's. The result is ANFIS has better performance
on accuracy and effectiveness, as the value of MSE is 0.010592338 compared to
0.026847068 of ANN, so it can be conclude that ANFIS has good accuracy and
effectiveness when it implemented as Dynamic Difficulty Adjustment. |
Keywords: |
Dynamic Difficulty Adjustment, Game, ANFIS, Accuracy, Effectiveness |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
FRAMEWORK FOR AUDITING IN CLOUD COMPUTING ENVIRONMENT |
Author: |
SUNEETA MOHANTY, PRASANT KUMAR PATTNAIK, GANGA BISHNU MUND |
Abstract: |
Cloud Computing is an emerging field in the era of internet where information
and Physical resources can be provided to cloud users according to their needs
in pay-per-go basis. Security and privacy are the major concerns in Cloud
Computing Environment(CCE). To achieve these issues all the physical resources
like computing resources, sensitive user data and processes are got managed by
the Third Party Service Provider. Audit in CCE provides the way for Cloud
Service Provider to make their performance and security data available for the
Cloud user readily. Hence to maintain data confidentiality, privacy, integrity
and availability, auditing is introduced within Third Party Service Provider.
This paper aim to study various issues in auditing that has been in practice and
also intended to propose a framework that helps the designer to incorporate
auditing aspects in CCE. |
Keywords: |
Cloud Computing Environment(CCE), Cloud Service Provider(CSP), Third Party
Auditing Service(TPAS), Auditing |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT FPGA-BASED INVERSE PARK TRANSFORMATION OF PMSM MOTOR USING
CORDIC ALGORITHM |
Author: |
ANIS SHAHIDA MOKHTAR, MAMUN BIN IBNE REAZ, MOHD ALAUDDIN MOHD ALI |
Abstract: |
A real-time field programmable gate array (FPGA) debugging system design is
presented in this work. Inverse Park Transformation, which is an important
module in Field Oriented Control (FOC) focuses on fast computation with good
accuracy. The integrated system designed in this work provides a precise and
highly accurate performance. It contributes to optimal efficiency and stability
of permanent magnet synchronous motor (PMSM). The result shows that the
performance of the proposed system is 142 ns execution time with 20 MHz
frequency and 0.04% of error. This result shows significant improvement compared
to other recent similar researches. |
Keywords: |
CORDIC, FOC, Inverse Park transformation, PLL, PMSM |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
CYBERCRIME PREVENTION IN THE KINGDOM OF BAHRAIN VIA IT SECURITY AUDIT
PLANS |
Author: |
AMNA ALMADHOOB, RAUL VALVERDE |
Abstract: |
Implementing cybercrime preventing technologies is critical in today’s connected
world. As companies continue to rely on critical infrastructure, they should
also address the risk and threats imposed by the use of these technologies.
Bahrain is no different from anywhere else in the world when comes to
cybercrimes, however, due to the lack of regulations and laws for the cyber
world, small and medium companies were left to navigate their way through the
cyber world. To understand how to assist small and medium organizations and the
Bahrain cyber risk levels, a survey was designed to solicit Bahraini
organization feedback with regards to four cybercrimes (Denial of services, web
hacking and defacement, malware, spam and phishing). An audit plan was designed
based on a set of proposed critical control objectives. The critical objectives
ensure that organizations are well aware about their assets and the risks they
are exposed to , build a solid boundary defence, secure configurations and
applications, continues to monitor the environment and close any vulnerabilities
and most importantly; to be vigilant and prepared to handle and respond to cyber
incidents. The audit plan was tested with the help of a case study located in
Bahrain and its use to prevent cyber attacks demonstrated in this research. |
Keywords: |
Cybercrime, IT Audits, Risk Management, Audit plans, Cyber Attack Prevention,
Financial Systems |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
Title: |
ZIGBEE BASED REALTIME PLANT MONITORING SYSTEM USING µC/OSII |
Author: |
M.SUJITHA, Dr. V.KANNAN |
Abstract: |
This paper describes a realtime transformation for an existing non realtime
process control system. The proposed system combines realtime scheduling with
ZigBee wireless communication and Monitoring. This paper implements the
effective handling of multiple tasks using RTOS concepts to suit critical
applications and concurrent task handling in realtime environment. Priority
based preemptive task scheduling algorithm is used to protect shared data and to
achieve task synchronization. Thus the reliability and processing ability of the
system are improved greatly by adding the µC/OS-II operating system. |
Keywords: |
ZigBee, µC/OS-II, Task, Nonlinear Process, Real-Time Transformation, Priority
Scheduling |
Source: |
Journal of Theoretical and Applied Information Technology
10 July 2014 -- Vol. 65. No. 1 -- 2014 |
Full
Text |
|
|
|