|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2014 | Vol. 61 No.2 |
Title: |
STRENGTHENING ANTI JAM GPS SYSTEM WITH ADAPTIVE PHASE ONLY NULLING USING
EVOLUTIONARY ALGORITHMS |
Author: |
V.THYAGARAJAN, S.KAJA MOHIDEEN |
Abstract: |
Global Positioning System (GPS) signals are spread spectrum, modulated with very
low average power due to background noise. Adaptive algorithms have shown to
minimize output power of array to 5 dB of background noise. GPS jamming is an
issue in defense and the corporate sector who are satellite-based navigation
dependent for their day to day operations. GPS satellites network provides
precise location information of all places globally, is widely used for asset
tracking by corporates. GPS is vulnerable to jamming, due to its sensitive
receivers as they receive very weak signals from satellites. In this study, a
novel optimization method based on the Artificial Bee Colony algorithm for the
interference cancellation design is proposed which maximizes gain towards the
desired signal and also improve jamming rejection performance. |
Keywords: |
Global Positioning System (GPS), Jamming, Anti-jamming, Artificial Bee Colony
algorithm (ABC) |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
DYNAMIC EFFECT OF KNOWLEDGE MANAGEMENT SYSTEM ON SCHOOL MANAGEMENT |
Author: |
PIN-CHANG CHEN, TIAN-SYUNG LAN, YU-HUA LAN, HUA-YING HSU |
Abstract: |
The main purpose of this study is to investigate the effect of knowledge
management system on school management, as well as to use system dynamics as the
main research method. This study selected a certain elementary school in Miaoli
County in Taiwan as the research subject. This study used students’ sense of
identification, parental satisfaction and teachers’ centripetal force to
investigate the factors affecting school management. According to the research
results, this study verified that innovative knowledge management is very
important to school’s management effectiveness. Innovative knowledge management
makes students more motivated, makes their learning effective better and
increases the sense of identification of classes and schools. This study also
verified that parental satisfaction and parents’ level of interaction have a
mutual effect on each other. In addition, this study verified that, if teachers’
sense of teaching accomplishment is stronger, their centripetal force for school
indeed will be increased. |
Keywords: |
Knowledge Management, System Dynamics, Sense of Identification, Parental
Satisfaction, Centripetal Force. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
FAULT RECOVERY ALGORITHM USING KING SPARE ALLOCATION AND SHORTEST PATH SHIFTING
FOR RECONFIGURABLE SYSTEMS |
Author: |
PRADEEP C, Dr. R. RADHAKRISHNAN, Dr. PHILIP SAMUEL |
Abstract: |
Field Programmable Gate Arrays (FPGAs) have the capability of reconfiguring
in-field and at runtime that helps in fault recovery. FPGAs are used to
implement complex functions in applications such as nuclear systems, space
missions, communication systems etc where system reliability is very critical.
Such systems must be designed with the capability of fault tolerance. A wide
range of fault tolerance techniques have been proposed for FPGAs ranging from
architectural redundancies to fully online adaptive implementations. This paper
presents an algorithm for efficient fault recovery using king spare allocation
technique and Dijkstra’s shortest path shifting. This algorithm can be applied
to any modern FPGA that has partial reconfiguration (PR) capability. PR allows
to modify parts of the design of the operating FPGA without affecting the other
parts. The normal system operation can be ensured in noisy environment using
this algorithm. This fault recovery algorithm is demonstrated using Matlab. |
Keywords: |
Field Programmable Gate Arrays (Fpgas), Fault Tolerance, Transient Fault,
Permanent Fault, Spare, Shifting. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
GRAMAP: THREE STAGE GRAPHICAL PASSWORD AUTHENTICATION SCHEME |
Author: |
S.RAJARAJAN , M. PRABHU , S. PALANIVEL , M.P.KARTHIKEYAN |
Abstract: |
Computer systems employ user authentication as their primary means to protect
system resources from unauthorised users and malicious attacks. Especially when
multiple users share a set of systems and resources, effective authentication is
very much required. Over the years, several authentication methods have been
developed. The most commonly used method is the textual password based
authentication. Users are required to choose a text comprising of alphabets,
numbers and symbols. Once passwords are registered with the system, users need
to recall and submit it each time of their login. Even though textual passwords
are simple, they are vulnerable to many kinds of attacks. They are also
cumbersome to be remembered. There are also biometric schemes that are based on
user’s physical characteristics. They need expensive devices to implement.
Recently images based graphical password schemes have received the attention of
researchers. Human being’s ability to remember images is well established. So in
this paper, a new graphical password scheme based on geographical maps is
proposed. The proposed scheme has got three stages of authentication. Depending
upon the level of security desired, users could opt for one or two or three
stages. After the initial password creation, users could increase or decrease
the number of stages at any time and they could also change the selected
password in any particular stage. User studies were conducted on the proposed
system to test its usability and memorability. |
Keywords: |
Authentication, Textual Passwords, Image Password, Graphical Passwords |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
A METHOD TO RISK ANALYSIS IN REQUIREMENT ENGINEERING THROUGH OPTIMIZED GOAL
SELECTION TROPOS GOAL LAYER |
Author: |
K.VENKATESH SHARMA, DR P V KUMAR |
Abstract: |
The requirement engineering is a field, in which software are modeled according
to the requirements of the user. The software developed under requirement
engineering will satisfy the users mostly on their perspective. So, recent
researches are concentrating on the software development and analysis based on
requirement engineering. The requirement engineering processes are also
challenged by the risks in developing the software. So an efficient risk
analysis system and risk management system is inevitable for the software
development process under requirement engineering. In the proposed approach, an
effective node selection approach for grouping the nodes in tropos goal model is
plotted. The tropos goal model uses three layers for the risk analysis. Usually
all the attributes regarding domain is used to plot the goal model. In the
proposed approach, the goal model will be constructed in specific to attributes
that will have the chances of raising risk. This process will reduce the time in
terms of risk analysis and could help in prioritizing the risk as there are
limited numbers of attributes considered in the three different layers. The goal
risk model will be modified and used in the proposed approach. The experimental
analysis will be conducted to analyses the relevance and effectiveness of the
proposed approach. |
Keywords: |
Requirement Engineering, Tropos Goal model, Candidate solutions, Goal layer,
Event layer |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS |
Author: |
FAKHRELDEEN ABBAS SAEED, ELTYEB E. ABED ELGABAR |
Abstract: |
The web application security has currently become a very significant area of
scholarship, the best way to deal with it is to use web application security
scanner to discover the architectural weaknesses and vulnerabilities in the web
application. A standard has been constructed by OWASP which lists common risks.
The goal of this paper is to use OWASP Top 10 to compare and contrast the Open
Source Web Application Security Scanners, and then determine the best of them.
The study shows that W3AF 1.2, arachniv0.4.0.3 and Skipfish 2.07 are the most
suitable ones because they have 0.863826, 0.79922, and 0.781676 averages
respectively. So the web developer or administrator can use them together,
choose one, or modify it by adding the missing feature and make his/her own
application. |
Keywords: |
Open Source, Web Application Security Scanner, OWASP, Evaluation |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
DEFECT INSPECTION SYSTEM FOR SHAPE-BASED MATCHING USING TWO CAMERAS |
Author: |
MARIZAN SULAIMAN, HAIROL NIZAM MOHD SHAH, MOHAMAD HANIFF HARUN, MOHD NOR FAKHZAN
MOHD KAZIM |
Abstract: |
This research is regarding the application of a vision algorithm to investigates
various approaches for automated inspection in of gluing process using
shape-based matching application in order to control the decision making
concerning jobs and work pieces recognition that are to be made during system
operation in real time. A new supervised defect detection approach to detect a
class of defects in gluing application is proposed. Creating of region of
interest in important region of object is discussed. Gaussian smoothing features
in determining better image processing is proposed. Template matching in
differentiates between reference and tested image are proposed. This scheme
provides high computational savings and results in high defect detection
recognition rate. The defects are broadly classified into three classes: 1) gap
defect; 2) bumper defect; 3) bubble defect. A new low-cost solution for gluing
inspection is also included in this paper. The defects occur provides with
information of height (z-coordinate), length (y-coordinate) and width
(x-coordinate). This information gathered from the proposed two camera vision
system for conducting 3D transformation. |
Keywords: |
Gaussian Smoothing, Recognition Rate, Region of Interest, Shape Matching,
Template Matching. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
LOW POWER IN NANO-SCALE CMOS MEMORY |
Author: |
LABONNAH F. RAHMAN, F. B. ARITH, M. I. B. IDRIS, M. B. I. REAZ, MOHD.
MARUFUZZAMAN |
Abstract: |
Future technologies required nano-scale CMOS memory to be operating in low power
consumption. The minimum operating voltage of the nano-scale CMOS played as a
main factor to reduce the power consumption. Consequently, there are some
limitations and obstacles to achieve the objective for several design, material
and novel structural solutions, which are promising and reliable. In this
research, the noticeable limits, possible annexes and applications of CMOS
technologies in the nanometer regime is discussed. This paper mainly describes
the limitations that conventional MOSFET is faced. In addition, the solutions to
low power in nano-scale CMOS memory are presented. Therefore, analysis of the
attainable performance and potential restrictions of CMOS technologies from the
point of design, material and structural solution techniques are illustrated. |
Keywords: |
Nano-Scale, CMOS, Low Power, Memory |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
THE WEB NAVIGATION BARRIERS FACING BY BLIND USERS IN SOCIAL NETWORKING SITES |
Author: |
BAVANI RAMAYAH, AZIZAH JAAFAR, NOOR FAEZAH MOHD YATIM |
Abstract: |
Social Networking sites (SNS) are increasingly attracting attention of everyone
including blind users. However, some navigation barriers make them to stay away
from SNS. A preliminary study was conducted to understand and to explore blind
users’ navigation barriers in SNS. In this study, ten blind users who are using
screen reader were interviewed and their activities on their favorite social
networking web sites are discussed. This study revealed that complexity of web
pages, CAPTCHA, AJAX in SNS become the main factors of their web navigation
barrier. Based on findings from qualitative survey, a comparative analysis was
performed with Web Content Accessibility Guidelines (WCAG) 2.0. |
Keywords: |
Social Networking Sites, Navigation, Blind, Screen Reader, WCAG |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
(CBCDR)CLUSTER BASED CYCLIC DIVERSIONARY ROUTING: ENERGY EFFICIENT ROUTING
STRATEGY FOR LOCATION PRIVACY |
Author: |
C. NAVANEETHAN, M. BABAJAN, G. VINOD KUMAR, P. SARATH REDDY |
Abstract: |
A Wireless Sensor Networks (WSNs) is a network of sensors which sense the
surroundings and communicates the information gathered from the monitored field
through the virtual medium. The system designed for communication should utilize
less energy. Sensors in the field are very small and can utilize the energy for
constraints like receiving, transferring, and data processing. Based on the
contextual information during data transmission, the location of monitored
objects and sinks has been disclosed to an adversary. So that protecting the
location from strong adversary is an important task.In general providing
location privacy from a strong adversary will consumes high energy and also
reduction in network lifetime. This paper aims at reducing energy consumptions
by using the clustering technique. For this, we use hotspots generating routing
paths in areas away from sink which balances energy consumption in overall
network. The analysis and simulation upshot that the cluster based Cyclic
Diversionary Routing (CDR) can significantly increase the security for location
by reducing the energy consumption without effecting the network lifetime. |
Keywords: |
WSNs, CBCDR, Source-Location privacy, Energy, Network Lifetime. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NOVEL STEERABLE FILTERS BASED FUZZY UNSHARP MASKING SCHEME FOR DOCUMENT IMAGES
ENHANCEMENT |
Author: |
E. BALAMURUGAN1, DR. P. SENGOTTUVELAN , K. SANGEETHA |
Abstract: |
Document image sweetening is to focus on the texts, handwritten characters and
images in the Document. Problem with most of the document image analysis system
is images with low contrast not able to produced optimal results. In this paper,
a steerable filters based fuzzy unsharp masking algorithmic rule is given to
improve the contrast of the document image. In this method we introduce the
fuzzy set theory into the unsharp masking scheme. Moreover, in this proposed
model includes the new methods to replace a high pass filter with manageable
filters in unsharp masking scheme. Contrast enhancement is achieved through the
open membership performance is projected to rework the output of steerable
filters into fuzzy domain. The experimental results clearly show that the
proposed methodology not slowly improves the image quality however will get a
far better recognition performance. |
Keywords: |
Document Image Enhancement, Steerable Filters, Unsharp Masking, And Fuzzy Set
Theory, Unsharp Masking (UM) |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF LOW POWER LINEAR FEEDBACK SHIFT REGISTER |
Author: |
MOHD. MARUFUZZAMAN, H. N. B. ROSLY, M. B. I. REAZ, L. F. RAHMAN, H. HUSSAIN |
Abstract: |
Chip manufacturing technologies have been a key to the growth in all electronics
devices over the past decades, bringing added convenience and accessibility
through advantages in cost, size, and power consumption. Linear feedback shift
register (LFSR) is key component to provide self-test of an integrated circuit
(IC). This research is implemented LFSR until layout level which will be a key
component for low power application. The research explores the LFSR as well as D
flip flop using different architecture in a 0.18μm CMOS technology so that the
layout area will be minimized as well as the power consumption will be lower.
Three types of architectures are implemented into LFSR, which are NAND gates,
pass transistor and transmission gates. Mentor graphics tools are used for
comparing those LFSR design in terms of CMOS layout, hardware implementation and
power consumption. The research showed that, pass transistor has smallest power
consumption which is 3.1049 nano watts. Moreover, it required smallest number of
transistor and layout area, which is 74 and 1137.76 micro square meter
respectively. |
Keywords: |
LFSR, NAND Gate, Pass Transistor, Transmission Gate, CMOS |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF NOVEL SECURITY ARCHITECTURE FOR MANET FOR TRUSTING AND AUTHENTICATION |
Author: |
Mr. J. CHANDRA SEKHAR, DR. R. SIVARAM PRASAD |
Abstract: |
In MANETs, providing the security for routing and data packets is a big
challenge. To overcome those drawbacks in this paper we design Novel security
architecture for MANET for trusting and authentication. It provides routing
security against jamming attacks, detects stealthy packet dropping attacks, a
trust based reputation management system and certificate based authentication
system. In first phase, multiple paths are determined based on AOMDV and the
end-to-end packet success rate is sent as feedback to the source by the
destination. In second phase, based on the method for trust and reputation
management is then applied. In third phase, a standard authentication scheme for
MANETs is proposed using Threshold Secret Sharing to provide security inside a
network allowing only the legitimate users to utilize the network. By simulation
results, we show that the proposed architecture reduces the drops due to attack
and increases the packet delivery ratio. |
Keywords: |
Mobile Ad hoc network(MANET),Threshold Cryptography, Secret Sharing, Certificate
Authority, Reputation Index. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
ANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS |
Author: |
MR. S. PASUPATHY, AND DR. R. BHAVANI |
Abstract: |
Software plays an important role in this today’s fast moving world. As
everything being computerized, each and every activity must be programmed to
lead a successful life. In business environment, to maintain the successful
path, many new techniques and technologies have been implemented. Of those,
programming for business needs, many new kinds of technologies have been
emerged. One of the most useful and easiest technologies to implement is OOAD
(Object-Oriented Analysis and Design).
OOAD is most powerful and easy, since the program developed in this
object-oriented environment seems to be simple and performs better compared to
any other programming language. Object-Oriented technology is becoming
increasingly popular in industrial software development environments.
Object-Oriented Metrics are the measurement tools adapted to the Object Oriented
Paradigm to help manage and foster quality in software development.
In this research paper, we investigate several object oriented metrics proposed
by various researchers. Based on the investigation, we propose a new methodology
to determine the program efficiency and the quality. Our proposed methodology
will produce the result based on the measurement carried out in the programming
section. |
Keywords: |
Business Environment, Object-Oriented environment, Object-Oriented Metrics, OOAD,
Software. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
SAG VOLTAGE IDENTIFICATION ON 30 KV SYSTEMS AFFECTED BY ELECTRIC ARC FURNACE
USING WAVELET TRANSFORMATION METHOD |
Author: |
WAHYUNI MARTININGSIH, M. ASHARI, ADI SOEPRIJANTO, DIAN SAWITRI |
Abstract: |
This paper presents sag voltage identification on 30 kV system with electric arc
furnace load. The identification of disturbance using wavelet transformation.
The proposed method can precisely identify sags caused by 3 disturbances:
single-phase, two-phase, and three-phase short circuits, which occur in
internally process of an electric arc furnace (EAF). The identification
procedure consists of 3 steps: preparation, wavelet energy calculation, analysis
for identification. The types of short circuit are detected from the amount of
energy during the EAF operation. The highest energy required indicates a
three-phase short circuit; however the lightest is for single-phase short
circuit. Simulation results from a typical data show that a sag voltage in
0.55-0.75 pu for 0.201 seconds, containing wavelet energy average 0.434733, is
caused by 3 types of short circuit in certain subsequent time. |
Keywords: |
Power Quality, 30 kV System, Electric Arc Furnace, Short Circuit disturbances,
Wavelet transformation |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN ENERGY EFFICIENT ENHANCED ERROR NODE REGAINING ALGORITHM FOR A WIRELESS
SENSOR NETWORK |
Author: |
Mrs. M. KARPAGAM, DR. N. NAGARAJAN, MS. J. ABIRAMIATHAVI |
Abstract: |
This paper proposes an enhanced error node regaining algorithm to prolong the
lifespan of a wireless sensor network when some of the sensor nodes power down.
This algorithm is mainly based on the genetic algorithm. The efficiency of the
energy can be enhanced by the sparse or compressive sensing feature. Our results
show that compact sensing prolongs the network lifespan and is more useful for
wireless sensor networks with a smaller coverage area. |
Keywords: |
Genetic Algorithm (GA), Energy Efficiency, Compressive Sensing, Network
Lifetime, Wireless Sensor Networks (WSN). |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS |
Author: |
M.KARPAGAM, DR.N.NAGARAJAN, K.VIJAIPRIYA |
Abstract: |
One of the main challenges of wireless sensor network is maximization of the
lifetime of the sensor node since the energy efficiency determines the lifetime
of a sensor node, power consumption of the sensing device should be minimized.
To conserve power, sensor node should shut off the power supply when not in use.
In this paper, we present some energy efficient algorithms to enhance the
network lifetime. By introducing sink mobility into wireless sensor networks,
the network performance including lifetime, energy efficiency and end-to-end
delay can be enhanced. Further, by increasing the number of sleep nodes using
smack sets, the network performance can be greatly improved. The
Energy-efficient Fixed-sink Clustering Algorithm (EFCA) and Energy-efficient
Mobile-sink Clustering Algorithm (EMCA) have been simulated in the NS-2.32
surroundings. |
Keywords: |
EFCA, EMCA, Residual Energy, Smack Set, WSN. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
FPGA IMPLEMENTATION TO MINIMIZE TORQUE RIPPLES IN PERMANENT MAGNET SYNCHRONOUS
MOTOR DRIVEN BY FIELD ORIENTED CONTROL USING FUZZY LOGIC CONTROLLER |
Author: |
B.ADHAVAN , Dr.C.S.RAVICHANDRAN |
Abstract: |
The Permanent Magnet Synchronous motor is a rotating electrical machine where
the stator produces a sinusoidal flux density distribution in the air gap and
the rotor has permanent magnets. A substantial air gap magnetic flux generated
by permanent magnet makes it reliable to design highly efficient motors.
However, the main disadvantage is the non-uniform variance in the developed
torque. These torque ripples causes speed oscillations and vibrations and
perverts the system performance. Since the construction of permanent magnet
synchronous motor lacks rotor coil which will provide mechanical damping during
transient conditions, these motors are inefficient with open-loop V/Hz control
and rely on Vector Control for better dynamic response. Fuzzy logic controllers
which does not requires any modeling of a system based on mathematics and are
they are working on the linguistic rules. It also improves the performance of PI
controllers which are affected by load turbulence, parameter variations and
speed disturbances. This project presents the Fuzzy logic approach for a vector
controlled PMSM drive for minimizing torque ripples. Also, Space vector
modulation is employed to overcome the periodic torque pulsations generated by
hysteresis controllers. The design analysis and the hardware control are
implemented by using FPGA controller and discussions on the hardware results are
done. |
Keywords: |
Permanent Magnet Synchronous Motor (PMSM), Field Oriented Control (FOC), PI
controller, Fuzzy Logic Controller (FLC), Field Programming Gate Array (FPGA),
Space Vector Pulse Width Modulation (SVPWM). |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
PREDICTION OF STUDENTS’ SUCCESS BY APPLYING DATA MINING ALGORITHAMS |
Author: |
EDIN OSMANBEGOVIĆ, HARIS AGIĆ, MIRZA SULJIĆ |
Abstract: |
In education, an intelligent data analysis includes data mining methods which
are applicable in different areas of education as a way of discovering implicit,
previously unknown, and useful knowledge out of existing data with a sole goal,
and it is, to make quality decisions. One of the classification methods in
educational environment is prediction of students' success at the end of the
second term. In this paper, we have shown survey results for a sample of 907
students who in 2011/2012 school year have attended secondary school in Tuzla
Canton. We have analyzed three different models of students' success (Decision
Tree, Naive Bayes and Multilayer Perceptron). We have also taken in account
estimation of the variables which have influenced the students' success and we
have checked them through four different filters. Cross validation is the method
we used in the estimation of the classifications. To avoid unbalanced
distribution of the class variable values in generating models of prediction, we
have used SMOTE function and analyzed models generated from resampled data. It
is possible, in our future researches, to include a greater number of input
variables and increase the number of samples so it would be possible to create a
more successful model, which can be the base for development of the support
decision system at the secondary education level. |
Keywords: |
Classification, Data mining, Making decision, Secondary school education |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF FEATURE EXTRACTION AND FEATURE SELECTION FOR
CLASSIFICATION OF LUNG DISEASES |
Author: |
C.BHUVANESWARI, Dr.P.ARUNA, Dr.D.LOGANATHAN |
Abstract: |
In this paper, investigations to evaluate various feature extraction and
selection methods for classification of lung images are conducted. Widespread
screening by CT or MRI is not practical, ensuring that chest radiology is the
most common procedure for diagnosis of lung disease. The term lung disease
refers to the disorders that affect the lungs such as asthma, COPD and
infections like influenza, pneumonia, tuberculosis, lung cancer, and many other
breathing problems. This study classifies Lung images automatically as Pleural
effusion, Emphysema, Bronchitis and normal lung scan. Features extraction is
through Gabor filter, Walsh hadamard transform. Feature selection is through
Correlation based Feature Selection (CFS), Principal component analysis (PCA).
Classification is through use of Naïve Bayes, J 48, K- Nearest Neighbour (KNN)
and Multi-Layer Perceptron Neural Network. The results of the performance ensure
that the PCA with multi layer perceptron provides above 81% of accuracy. |
Keywords: |
Classification, Feature Extraction, Performance, Radiology, Selection |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN ANALYSIS ON SOURCE-FILTER MODEL BASED ARTIFICIAL BANDWIDTH EXTENSION SYSTEM |
Author: |
G.GANDHIMATHI , S.JAYAKUMAR |
Abstract: |
To minimize transmission bandwidth in speech based communication systems such as
telephone systems, narrowband representation of the signal is generally used.
This band-limited signal can able to represent the vowel sounds without much
distortion, but it is not suitable for representing consonant sounds, mostly
fricative consonants ( th /, sh/, / Isl /, xl/ ch, /, etc). Artificial Band
Extension (ABE) techniques are used to generate a wideband signal from the
narrowband signal. Since most of the high frequency components and the fricative
consonants were absent in the narrowband representation of the sound, it is a
challenging task to create those missing components in the wideband equivalent
signal. In this work, implemented a source-filter model based ABE system .The
spectral envelope extension is carried out using classified codebook approach
method and evaluated its performance with suitable metrics. |
Keywords: |
Speech enhancement, Artificial bandwidth Extension , Speech codec , Linear
prediction |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
BASED ON CLUSTERING ENERGY EFFICIENCY ALGORITHM |
Author: |
ELAHMADI CHEIKH, CHAKKOR SAAD, BAGHOURI MOSTAFA, HAJRAOUI ABDERRAHMANE |
Abstract: |
The major challenge for wireless sensor networks is energy consumption
minimization. Wireless transmission consumes much more of energy. In the
clustered network, a few nodes become cluster heads which causes the energetic
heterogeneity. Therefore the behavior of the sensor network becomes very
unstable. Hence, the need to apply the balancing of energy consumption across
all nodes of the heterogeneous network is very important to prevent the death of
those nodes and thereafter increase the lifetime of the network. DEEC
(Distributed Energy Efficient Clustering) is one of routing protocols designed
to extend the stability time of the network by reducing energy consumption. A
disadvantage of DEEC, which doesn’t takes into account the cluster size and the
density of nodes in this cluster to elect the cluster heads. When multiple
cluster heads are randomly selected within a small area, a big extra energy loss
occurs. The amount of lost energy is approximately proportional to the number of
cluster heads in this area. In this paper, we propose to improve DEEC by a
modified energy efficient algorithm for choosing cluster heads that exclude a
number of low energy levels nodes due to their distribution density and their
dimensions area. We show by simulation in MATLAB that the proposed approach
increases the number of received messages and prolong the lifetime of the
network compared to DEEC. We conclude by studying the parameters of
heterogeneity that proposed technique provides a longer stability period which
increases by increasing the number of nodes which are excluded from the cluster
head selection. |
Keywords: |
Wireless Sensor Networks, Clustering Algorithm, Multi-Level Heterogeneous
Networks, Energy-Efficiency, DEEC Protocol, Network Lifetime. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
STABILITY ANALYSIS AND PARAMETER DESIGN OF BLDC DRIVE UTILIZING ROOT-LOCUS
APPROACH |
Author: |
M MURUGAN, R JEYABHARATH, P VEENA |
Abstract: |
The demands for BLDC motor drives in industrial applications are rapidly
increasing due to its high efficiency, high power factor and lower maintenance.
Therefore, it is necessary to design a stable control system for BLDC drive
system to achieve a quality performance. The stability is a major problem in the
closed loop BLDC drive system which may cause oscillations of constant or
changing amplitude. This paper spotlights the movements of characteristic roots
of the drive system on s-plane with the variation of system parameter gain ‘k’.
The root locus and root contours of the BLDC drive system are portrayed in this
paper which focuses the complete dynamic response of the system. Finally, the
steady-state performance of the BLDC drive system has been investigated by
calculating its steady-state error to various standard test signals. These
analyses help a designer to easily visualize the effects of varying various
system parameters on root locations. These analyses give good potential design
specifications for the control engineers. The Matlab software package is used to
analyze the results. |
Keywords: |
Brushless DC (BLDC) Motor Drives, Root Locus, Root Contour; Parameter Design,
Stability, Steady-State Error. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
RESIDUAL SHARING ALGORITHM FOR DYNAMIC SCHEDULING OF RESOURCES TO MULTIPLE USERS
ACROSS HETEROGENEOUS GRID ENVIRONMENT |
Author: |
K. M. NASIMUDEEN, T. ARULDOSS ALBERT |
Abstract: |
This article proposes a method called residual fair sharing algorithm for
scheduling of tasks in a heterogeneous grid environment. The proposed Residual
Fair Sharing scheduling scheme is fairer and exploit the available
multiprocessor Grid resources with less sensitive to processor capacity
variations than max-min sharing scheme. The simulations have been conducted by
thousands of tasks of varying size and workload variance, submitted to a
multiprocessor computing system comprising of hundreds of processors of varying
capacity. The experimental study revealed that the residual sharing algorithm
performs better with respect to max min algorithm especially; there is a
noticeable reduction in the time complexity between the two algorithms. However,
in all conditions, the proposed Residual algorithm is more effective and
outperforms max min algorithm. |
Keywords: |
Dynamic Scheduling, Heterogeneous GRID Environment, multiprocessor computing
system Residual Sharing Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
MIH BASED QOS-AWARE ALGORITHM FOR EFFICIENT HANDOFF IN WIFI/WIMAX INTEGRATED
NETWORKS |
Author: |
E.PRINCE EDWARD, DR.V.SUMATHY |
Abstract: |
In future the wireless networks will be heterogeneous and a mobile user has to
roam between different access technologies. Achieving efficient vertical handoff
(VHO) with guaranteed Quality of Service (QoS) in such heterogeneous environment
still remains as an unsolved issue. VHO occurs when a mobile user changes his
point of attachment from one type of wireless access network to another during
an active communication session. Several VHO algorithms based on Received Signal
strength (RSS), Signal to Interference Noise Ratio (SINR) and bandwidth have
been proposed in literature which are inadequate to provide QoS for real-time
applications. Hence we propose a Media Independent Handover(MIH) based QoS-aware
VHO Decision Algorithm(QAVHA) which measures congestion in the target network in
addition to SINR and bandwidth to provide always best connected service with
guaranteed QoS. Our algorithm mainly focuses on reducing handoff delay and
unnecessary handoffs to provide efficient handoff. We have chosen IEEE 802.11e
and IEEE 802.16e heterogeneous environment. We have simulated these scenarios
using NS2 and the performance characteristics are studied. When compared with
the conventional VHO algorithm our proposed algorithm performs better during
vertical handoff from WiFi to WiMax and vice-versa providing guaranteed QoS. |
Keywords: |
WiFi, WiMax Heterogeneous Wireless Networks, Congestion, Vertical Handoff. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
Title: |
A HYBRID CAC SCHEME FOR EFFECTIVE RESOURCE ALLOCATION IN IEEE 802.16 WIRELESS
NETWORKS |
Author: |
CHANDRASEKARAN V , NAGARAJAN N |
Abstract: |
Call admission control (CAC) plays a vital role in providing the desired Quality
of Service (QoS) in broadband wireless networks. The aim of this paper is to
propose an efficient Greedy Shaper based Call Admission Control (GSCAC) scheme
for WiMAX networks to manage the number of admitted user connections and
maximize the utilization of the wireless resources. The proposed algorithm is
based on bandwidth reservation and greedy shaper concepts. It has been developed
considering the problem of “busy hour” in communications traffic variation
during a typical day. The success of the proposed scheme depends on the revenue
it generates to the service providers and service quality it provides to its
subscribers. The proposed scheme is evaluated and compared to a traditional CAC
scheme using OPNET simulator. |
Keywords: |
IEEE 802.16; CAC; Throughput; QOS; Bandwidth Utilization; Greedy Shaper. |
Source: |
Journal of Theoretical and Applied Information Technology
20 March 2014 -- Vol. 61. No. 2 -- 2014 |
Full
Text |
|
|
|