|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2014 | Vol. 61 No.3 |
Title: |
FRAUD DETECTION IN CARD NOT PRESENT TRANSACTIONS BASED ON BEHAVIORAL PATTERN |
Author: |
RENUGA DEVI T, RABIYATHUL BASARIYA A, KAMALADEVI M |
Abstract: |
Rapid advancements in technology have imperative effect on consumerism.
Technological advancements change the way the world operates. The shifting of
customer buying patterns is made viable and sustainable through credit cards.
Internet merchants are skeptical on Card Not Present transactions. Every
advancement has its own intrinsic worth and frailties. Millions of credit card
transactions are processed each day. Increases in online shoppers in turn
provide more opportunities for credit card usage, which is directly proportional
to commit deception. The dearth of tracking fraudulent credit card transactions
is due to the increase in white-collar criminals. The way out to this problem is
tracked by the behavioral pattern of the customer by implementing the
Classifiers Naïve Bayesian and Random Forest to predict the legitimate and
fraudulent patterns. The proposed method builds personalize and aggregate model
to predict deceitful transactions. Since individual’s transactional behavior
varies from one another, there comes the need for personalize and aggregate
model. The aggregate model performs better than personalized model. Naive
Bayesian approach attains best results for personalized model and Random Forest
attains best results for aggregate model. |
Keywords: |
Transactional Behaviour, Fraud Patterns, Naive Bayesian Classifier, Random
Forest Classifier, Accuracy, Card Not Present Transactions (CNPT). |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
MDP: A PARADIGM FOR COMMUNICATION AND COMPUTATION IN MOBILE CLUSTER |
Author: |
AGHILA RAJAGOPAL, M.A. MALUK MOHAMED |
Abstract: |
The proposed work explores the interprocess communication across communicating
parallel tasks in a mobile cluster. The process which is linked with specific
mobile or static nodes will not be resilient to the changing conditions of the
mobile cluster. The proposed Mobile Distributed Pipes (MDP) model enables the
location independent intertask communication among the processes executing in
static and mobile nodes. This novel approach enables the migration of
communicating parallel tasks during runtime, which occurs according to the
context and location requirements. A transparent programming model for a
parallel solution to Iterative Mobile Grid Computations (IMGC) using MDP is also
proposed. The proposed model is resilient to the heterogeneity of nodes such as
static or mobile and the changing conditions in the mobile cluster because of
mobility. The design of runtime and functional library support for the proposed
model is also presented. |
Keywords: |
Location-independent(LI)communication, Mobile Grid Computation Problem (MGCP),
Mobile Grid Computation Task (MGCT), Iterative Mobile Grid Computation (IMGC),
Iterative Mobile Grid Module(IMGM), and Mobile Distributed Pipes (MDP). |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMAGE FUSION TECHNIQUES FOR IRIS AND PALMPRINT BIOMETRIC SYSTEM |
Author: |
S.ANU H NAIR, Dr.P.ARUNA |
Abstract: |
Image Fusion is a process of integrating multiple images into a single
image.Biometric features are used to provide authentication and security of
systems. This paper deals with a new work that implements fusion of biometric
features like iris and palmprint. The iris and palmprint are transformed into
the set of features independently. The extracted modalities are fused by
different fusion algorithm techniques like the pyramid based algorithms and
wavelet based algorithms. The quality of fused images is assessed using metrics
such as Visual information fidelity, Qabf, Peak Signal Noise Ratio, Mutual
Information, Mean Square Error, Normalized Absolute Error, Normal Correlation
Coefficient, Cross entropy and Relative Warp. Comparative evaluation of fused
images is a critical step to evaluate the relative performance of different
image fusion methods. The fused template can be further used in applications
like watermarking,person identification system. |
Keywords: |
Biometrics, Feature extraction,Fusion metrics, Image fusion, Peak Signal Noise
Ratio(PSNR), Mutual Information(MI), Mean Square Error(MSE), Standard
Deviation(SD), Root Mean Square Error(RMSE) |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN APPROACH OF OPTIMISATION AND FORMAL VERIFICATION OF WORKFLOW PETRI NETS |
Author: |
OUTMAN EL HICHAMI, MOHAMMED AL ACHHAB, ISMAIL BERRADA, RACHID OUCHEIKH, BADR
EDDINE EL MOHAJIR |
Abstract: |
In this paper, we are interested in the verification of Workflows (WF). WF are
increasingly used for modeling and improving the quality of business processes
(BP). In fact, the BP are becoming more complex because of the process nature
which can be decomposed into sub-processes that run in parallel and/or
sequentially. In this paper, we are particularly interested in verifying a class
of properties known as response properties. Our second aim is to optimise the
verification process of complex WF. Therefore, we first propose a method to
compute and extract WFφ which is a part of WF concerned with the property φ to
verify, and second we apply an abstraction method which optimises the size of
WFφ. This optimisation is interesting so that the verification process can be
done just on the optimise WFφ, and we deduce the preservation of the
satisfaction of φ in WF. |
Keywords: |
Workflow Petri nets, response properties, abstraction, formal methods |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
MINIMIZING THE ROUTE REDISCOVERY PROCESS IN MANET |
Author: |
R. SENTHIL KUMAR, Dr. C. SURESHKUMAR |
Abstract: |
Mobile ad hoc networks (MANET) are characterized by dynamic topology without any
static infrastructure. Now a day’s mobile devices are connected as a wireless
node. Due to changes in topology and mobility in MANET, it is suitable to use in
environment that need of on fly set-up. The design of energy efficient on-demand
routing protocol is a very difficult task in mobile ad hoc networks. Ad hoc
On-demand Distance Vector Routing Protocol (AODV) for manet were employed on the
route discovery process to establish routes between two mobile nodes. The link
break problem may be occurring by the nodes due to mobility in ad hoc routing
protocol. In a network when nodes establishing the connection utilize more
energy in route discovery process, then the node will be out of energy. In this
paper, we proposed a novel method to Minimizing the Route Rediscovery Process
based Protocol (MRRP) by scheming the RREQ packet to select the more stable
route and reduce the link break. The proposed protocol has two schemes, Received
Signal Strength(RSS) based to minimizing the route rediscover process and the
optimization of flooding process , based on Time-to-Live (TTL) value , reducing
route rediscovery process solution to accomplish the link failure. Simulation
was done on ns-2.34 platform and compared with the original AODV. By verifying
the results, it improves the effectiveness and network performance of Quality of
Service (QoS). |
Keywords: |
MANET, MRRP, RREQ, RSS, TTL |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT IMAGE DOWNSAMPLING TECHNIQUE USING GENETIC ALGORITHM AND DISCRETE
WAVELET TRANSFORM |
Author: |
N.JAGADEESAN, Dr.R.M.S PARVATHI |
Abstract: |
Digital images are used everywhere and it is easy to manipulate and edit because
of availability of various image processing and editing software. Resizing the
image to a lower resolution can alter the appearance of an image. It is useful
at times to create a downsampled version of the image that gives the same
impression as the original. There are many methods for image downsampling. In
this paper, an efficient thresholding technique is used for image downsampling
based on Discrete Wavelet Transforms and Genetic Algorithm. We have combined
Genetic Algorithm (GA) with Discrete Wavelet Transform (DWT) to make the image
down sampling faster and to get adequate results. First the length of the
histogram is reduced by using DWT. Using this reduced histogram, the number of
thresholds and threshold value are determined by applying Genetic Algorithm.
From the analysis of results, it can be concluded that the proposed method is
fast and accurate. |
Keywords: |
Image Downsampling, Genetic Algorithm (GA), Discrete Wavelet Transform (DWT),
Motion Filter, Soft Thresholding. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN AND ANALYSIS OF ELIMINATION OF HARMONICS USING WIND ENERGY CONVERSION
SYSTEMS |
Author: |
Dr.S.K.PURUSHOTHAMAN |
Abstract: |
In this paper we describe design and analysis of elimination of harmonics using
wind energy conversion systems. Distortion of the voltage waveforms i.e.
harmonics may cause overheating of neutral conductors and electrical
distribution transformers, the malfunction of electronic equipment and the
distortion of communication systems. Doubly Fed Induction Generator (DFIG)
applied to wind energy conversion system (WECS) using variable speed operation
is being used more frequently in wind turbine application. Variable speed
systems have several advantages over the traditional method of operating wind
turbines, such as the reduction of mechanical stress and an increase in energy
capture. AC-DC converter is used to convert variable voltage from the DFIG to DC
voltage, thereby producing DC power. The DC is converted back to AC that is
appropriate for electrical utilizations in the grid. However, the use of
converters introduces high intensity of low frequency current harmonic content
into the power system. This leads to reduction in efficiency in WECS and also
decreases the life span of the generator. A case study on a 9 MW wind turbine is
used to explain Harmonic Mitigation in Wind Turbine Energy Conversion Systems.
In this paper, harmonic voltage and current measurements performed at different
points of a wind farm comprising six DFIG wind turbines are analyzed and their
most important characteristics are discussed. It presents a comparative
simulation study between with and without three phase harmonic filters applied
to power system model connected to wind farm. |
Keywords: |
Harmonics, Wind Energy, Inverter, Voltage, Filters, Rectifiers |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
HUMAN SKIN DETECTION METHOD FOR SECRET IMAGE SHARING |
Author: |
Mr. N.SIVANESAN, Dr.S.MURUGAVALLI |
Abstract: |
This paper proposes a new data hiding technique which is based on the human skin
segmentation and for that a reliable human skin detection method that is
adaptable to different human skin colors and illumination conditions is
essential. Even though several human skin detection methods have been
successfully applied, but they are prone to false skin detection and are not
able to cope with the variety of human skin colors across different ethnic. High
computational cost is required for existing methods. A skin classifier defines a
decision boundary in the color space based on a training database of skin-color
pixels. A 2-D histogram with smoothened densities and a Gaussian model are used
to model the skin and non skin distributions respectively. This is for the first
time to employ fusion strategy for this purpose. The main objective of this
proposed approach is to secure the data based on skin region. Secret data is
embedded within skin region of image and that too in the high frequency sub
bands that will provide an excellent secure location for data hiding.
Additionally secret data embedding is performed using frequency domain approach
- IWT (Integer Wavelet Transform), IWT outperforms than DCT (Discrete Cosine
Transform). Cropping results into an enhanced security because cropped region
works as key at decoding side. Embedding is done based on singular value
decomposition. And also satisfactory PSNR (Peak- Signal-to-Noise Ratio) is
obtained. |
Keywords: |
2D-Histogram, Gaussian model, IWT, SVD, PSNR. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENERGY BASED ROUTING ALGORITHM FOR MOBILE AD HOC NETWORKS |
Author: |
DR.A.RAJARAM, S.KANNAN |
Abstract: |
An ad hoc network is an indivisible part of the networks. It is an
infrastructureless network. Whenever node wants to communicate with neighborhood
node, it does not depend on the centralized infrastructure. Ad hoc is dynamic in
nature. Due to the open structure, node can be easily impersonated by the
several attacks like Denial of Service (DoS) attack, Wormhole attack, black hole
attack and Packet forwarding attack etc. In the presence of the attack, the
energy consumption of the network can be increased unlimitedly. In this research
work, we have considered three factors like node mobility, malicious behavior
and unauthenticated node, in order to minimize the energy consumption of the
node. By limiting these factors, the node consumes less energy. For that, we
have developed the Energy Based Routing Algorithm (EBRA) which is integrated
into the Dynamic Source Routing (DSR) protocol to ensure the minimum energy
consumption rate. The proposed scheme consists of three phases. In first phase,
nodes energy consumption is limited with the high mobility. In second phase, the
effect of malicious behavior is reduced to avoid the replaying of packets. In
third phase, the unauthenticated node is identified using the digital signature
verification. By simulation results the proposed scheme achieves less energy
consumption rate, more energy efficiency, better throughput, less overhead and
delay in the presence of the malicious nodes than the existing schemes. |
Keywords: |
Ad Hoc Network, Dos Attack, Blackhole Attack, Wormhole Attack, Energy Efficiency
, Energy Consumption Rate , Throughput, Delay And Overhead. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT SECURE TOPOLOGY CONTROL PROTOCOL FOR AUTHENTICATION IN MANET |
Author: |
T.S.ASHA, DR.N.J.R.MUNIRAJ |
Abstract: |
Mobile Ad hoc Network consists of mobile nodes without any access point. Due to
that, nodes are easily compromised by means of attackers. Attackers totally
degrade the performance of network. Several researches focused the solution for
security issues. In this research work, we propose Efficient Secure Topology
Control Protocol (ESTCP) to make the balance between interference and security
in order to improve the reliability of networks. It consists of four phases In
first phase, we propose the efficient topology control approach which consists
of minimal weight estimation and exchanging information, topology estimation. In
second phase, Cluster is formed and cluster head is chosen. In third phase,
multipath is deployed to improve reliability. In fourth phase, messages are
encrypted and decrypted using RS codeword. By using the extensive simulation
results using Network Simulator (NS3), the proposed scheme NCTC achieves better
network lifetime, packet delivery ratio, less overhead and end to end delay than
the existing schemes. |
Keywords: |
MANET, Interference, multipath routing, secure encryption and decryption,
cluster formation, network connectivity, network lifetime, packet delivery
ratio, end to end delay, overhead. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
3D BASED REMOTE SENSING IMAGE CONTRAST ENHANCEMENT USING SVM |
Author: |
R.KATHIRVEL, DR.J.SUNDARARAJAN |
Abstract: |
A satellite image is full of noisy information thus it faces many problems just
to get a clear view of a location. Various image enhancement techniques are used
to remove the unwanted data from the satellite image. Existing techniques fail
to clear noise from the satellite image enough to be used for real time
purposes. To overcome this problem we propose SVM which has two significant
parts. The first one is the interior point method and second one is boundary
value selection. The majority of color histogram equalization methods do not
yield uniform histogram in gray scale. Contrast of the converted image is worse
in 1D and 2D, to overcome this we move on to 3D. The new satellite image
contrast enhancement technique is based on the discrete wavelet transform (DWT)
which decomposes the input image into the four frequency sub bands by using DWT
and estimates the singular value matrix of the low- low sub band image, and,
then, it reconstructs the enhanced image by applying inverse DWT. |
Keywords: |
Support Vector Machine, Interior Point Method, Boundary Value Selection, DWT
With 3D. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
REPETITIVE TRUST MANAGEMENT AND ADVERSARY DETECTION FOR DELAY TOLERANT NETWORKS |
Author: |
C.ASHOK BABURAJ, DR. K. ALAGARSAMY |
Abstract: |
Delay Tolerant Networking (DTN) program is an emerging technology that can
facilitate access to information when secure end-to-end paths cannot exist. DTNs
may be turn into vulnerable during the legitimate nodes may compromise and the
attacker modifies or alters the delivery constraints of the node. DTN makes use
of persistence within the network nodes along with the mobility strategy to
overcome the delay for connectivity. The existing trust management protocols are
not an effective approach to handle the security attacks. In this paper, an
efficient approach termed as a Repetitive Trust Management (RTM) and Adversary
Detection is proposed to handle the Byzantine attacks in DTNs. It takes into
consider the reputation values among the nodes participated in the data
transmission. Bipartite graph is utilized to represent the subset of the nodes
participate in the network. Trust Based Management Classifiers is presented
which uses the Bloom filter to check the hash functionalities between the nodes.
Here, threshold mechanism is used to enhance the secure communication in DTNs.
The experimental results proves that the proposed scheme detects the malicious
nodes and recovers the message within short duration of time. |
Keywords: |
Adversary Detection, Bipartite graph, Bloom filter, Byzantine attacks, Delay
Tolerant Networks (DTNs), Multi hop transmission, and Repetitive Trust
Management (RTM) |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE STATIC SECTORIZATION OF AIRSPACE VIA GENETIC ALGORITHM APPROACH |
Author: |
KAIDI RACHID, ELMOUTAOUAKIL KARIM, ETTAOUIL MOHAMAD |
Abstract: |
The sectorization of airspace has become one of the most important problems of
operational research; saturation and non-optimality of this system are the main
reasons behind a new sectorization. The objective of SAP is to minimize the
workload coordination between adjacent sectors and the controller’s workload
which is balanced among the sectors. The main purpose of this work is to suggest
a new method to solve the SAP problem. The proposed method is divided into two
steps: the first one involves modeling the SAP problem in terms of 0-1 quadratic
programming model subject to linear constraints. The second one concern solving
this model via the Genetic Algorithm approach. Finally, some experimental
results are introduced. |
Keywords: |
Sectorization of Airspace Problem (SAP), Air Traffic Control (ATC), Operational
Research (OP), Quadratic Programming Problem (QPP), Genetic Algorithm (GA) |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
FORAGING OPTIMIZATION FOR CLUSTER HEAD SELECTION |
Author: |
G. KAVITHA, Dr. R. S. D. WAHIDABANU |
Abstract: |
Wireless sensor networks (WSN) are popular as they are potentially low cost
solutions to various real-world challenges. WSNs consist of autonomous nodes to
monitor an environment. WSN developers face challenges from communication link
failures, memory/computational constraints, and limited energy. Many WSN issues
are formulated as multidimensional optimization problems and solved through
bio-inspired techniques. Clustering divides a network into interconnected
substructures, called clusters with each cluster having a cluster head (CH) as
coordinator in the substructure. Each CH is a temporary base station in its
zone/cluster communicating with other CHs. This study proposes an improved
cluster head selection for efficient data aggregation in sensor networks. The
proposed algorithm is based on LEACH incorporated Bacterial Foraging
Optimization (BFO). |
Keywords: |
Wireless sensor networks (WSN), Clustering, Data-Aggregation, Localization,
Optimal Deployment, Bacterial Foraging Optimization (BFO) |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
TACIT KNOWLEDGE ELICITATION THROUGH CONCEPT LATTICE |
Author: |
K.KALAISELVI, ARAVIND GOVINDARAM, G.V.UMA |
Abstract: |
The main objective of this proposed work is to prove that knowledge
dissemination can be better done through concept lattice. The database
management system learning content is stored in the formal concept analysis (FCA).
The formal concept analysis helps to construct the concepts together through
which the information drawn quickly. The concepts are built in the form of
concept lattice. The subject matter experts (SME) can append the learning
content using the incremental method on formal concept analysis. The proposed
work helps to impart the knowledge to the learners in quick time. The learner’s
knowledge can be observed and evaluated using the Bloom’s taxonomy parameters.
The proposed system helps in the reusability of information. |
Keywords: |
Concept Lattice, Formal Concept Analysis, Concept Analysis, Knowledge
Extraction, Knowledge Transfer |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
A HYBRID CLUSTER ENHANCED SECURE MULTICAST ROUTING SCHEME FOR MANET |
Author: |
GEETHA G, DR.N.J.R.MUNIRAJ, |
Abstract: |
Mobile Ad hoc networks consist of mobile node without having any centralized
access point. Due to dynamic nature, lack of Network integrity and
authentication may likely to occur. To avoid this, several approaches have
focused on authentication. In this research work, hybrid cluster enhanced Secure
Multicast Routing Scheme is proposed to make network more secure. The main of
the proposed work is to protect mobile nodes and its packets against attackers.
In the presence of network attackers, performance will be degraded. The proposed
scheme consists of three phases i.e. Cluster based Multicast routing, cluster
head election and secret sharing scheme. The multicast routing is proposed to
avoid misbehavior and route failures. Cluster head election is performed based
on characteristics and behaviour of mobile nodes. Secret sharing scheme is used
to provide node integrity and authentication. By using simulation results, HCSMR
achieves better performance in terms of packet delivery ratio, delay, overhead,
network lifetime, network integrity rate than the existing method EESMR, PLSS
and LAER schemes. |
Keywords: |
MANET, Multicast Routing, Cluster Head Election, Secret Sharing Scheme,
Authentication, Integrity, Mobility, Packet Delivery Ratio, Network Lifetime,
Number Of Nodes, Throughput, Overhead And End To End Delay. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF MOBILE ADHOC NETWORKS USING GENETIC ALGORITHM |
Author: |
PUSHPAVALLI M, NATARAJAN A M |
Abstract: |
Now- a-days finding a path from source to destination for practical multimedia
applications by satisfying QoS requirement is a biggest challenge. Achieving
quality of service in a mobile adhoc network is a NP complete problem due to its
dynamic nature of the network and limited resources availability. In this paper
we propose a new qos module which uses genetic algorithm based approach to find
an optimal path from source to the destination. An optimal path is selected by a
suitable encoding scheme where the possible paths are in the form of strings.
Analysis is done for a proactive protocol(OLSR) and for a reactive protocol(AODV)
and the comparison between them was given as OLSRGA and AODVGA. To achieve QoS
(Quality of Service) in the network we have taken link state information such as
delay and bandwidth in the network. |
Keywords: |
QoS, Genetic Algorithm, MANET,OLSRGA,AODVGA |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
SWARM INTELLIGENCE BASED DYNAMIC SOURCE ROUTING FOR IMPROVED QUALITY OF SERVICE |
Author: |
N.UMAPATHI, N.RAMARAJ |
Abstract: |
Ad hoc networks are wireless mobile hosts collections forming a temporary
network without any infrastructure/centralized administration. So a mobile host
is required to enlist the help of other hosts to forward packets to destination
because of each mobile host’s limited range of wireless transmission. The paper
presents a protocol for routing in ad hoc networks using Dynamic Source Routing
(DSR) and Swarm Intelligence based on Ant Colony Optimization (ACO) to optimize
the node pause time. The simulation results shows that the improved performance
of routing in the network. |
Keywords: |
MANET, Routing Protocols, Dynamic Source Routing (DSR), Ant Colony Optimization
(ACO), Swarm Intelligence (SI) |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
OPTIMAL SIZING AND PLACEMENT OF DISTRIBUTED GENERATORS IN DISTORTED DISTRIBUTION
SYSTEM BY USING HYBRID GA-PSO |
Author: |
D.KAVITHA, Dr.P.RENUGA, S.MUTHAMIL PRIYA |
Abstract: |
In this paper, an approach using Hybrid Genetic Algorithm and Particle Swarm
Optimization Search (HGAPSO) is presented for placing Distributed Generators (DGs)
in distorted distribution system. The objective is to minimize the loss and
average voltage total harmonic distortion (THDv) of the distorted distribution
system. A detailed performance analysis is carried out on IEEE 18 bus system to
express the effectiveness of the proposed method. |
Keywords: |
Distributed Generation (DG), Genetic Algorithm (GA), Multi Objective
Optimization, Harmonic Distortion, Non Linear Programming. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
INVESTIGATING ADAPTIVE ASEAN CULTURAL DIVERSITY THROUGH USERS’ MENTAL MODELS FOR
USER INTERFACE DESIGN |
Author: |
ASLINA BAHARUM, AZIZAH JAAFAR |
Abstract: |
Nowadays, the Web has become the main gateway for organisations as well as
making information accessible through the World Wide Web. Previous usability
studies have focused on the development and user-centered design of websites.
The location of objects through the use of a mental model is able to help users
to navigate the Web and access information easily. The rationale for developing
a mental model through an experimental study is to protect the high investment
necessary for Web development through adaptive cultural diversity. The specific
environment of a different country can inter-operate in the context of
adaptation and needs to account for adaptive support in the context of
collaborative activities. This study investigates cultural adaptivity with
respect to ASEAN countries by identifying a mental model through the location of
Web objects via a website user interface.
Almost half of the located Web objects are found to be consistent with previous
studies that examined user expectations regarding the location of general
websites, e-commerce websites and library websites. There were, however,
diversities among the studies involving the location of various Web objects. In
this study, another three Web object elements are included, namely, “Language”,
“Content” and “Calendar”. It is of interest to note that the participants from
all the geographical locations in the ASEAN countries included in this study had
similar expectations for certain Web objects. It is therefore possible that the
influence of multinational websites and cross-regional Web browsing has
significantly shaped the website layout expectations of typical Web users. |
Keywords: |
Adaptivity, Cultural Diversity, User Interface, Web Objects, Mental Model |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE NEXT GENERATION DATABASE LANGUAGE WITH BASE PROPERTIES |
Author: |
G.SEKAR, DR. N.M. ELANGO |
Abstract: |
“Not Only SQL” is popularly known as NOSQL, the new buzz word in the world of
database technology. It really means that the database is not a relational
database. Early, it is called as “No SQL-NoSQL”, (i.e.) a system represents
totally an alternative to SQL. Since it is inevitable to use SQL, later it is
renamed as NOSQL. This paper brings out the properties, various flavours,
examples, advantages and also some limitations of NOSQL database technology. |
Keywords: |
NOSQL, ACID, BASE, Key-Value store, Eventual Consistency |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN ALTERNATIVE DESIGN OF COLLABORATIVE VIRTUAL ENVIRONMENT ARCHITECTURE BASED ON
CLOUD COMPUTING |
Author: |
ABDULSALAM YA’U GITAL, ABDUL SAMAD ISMAIL |
Abstract: |
Collaborative Virtual Environment (CVE) systems allow the sharing of virtual
space, and each participant is represented by an entity in the CVE. Resources
are consumed when interaction among several users occurs. The resources are
consumed as a result of updating its own state, and the communication resources
required to distribute the update of counterpart users in the CVE. The
Peer-to-Peer (p2p) and Client Server (CS) architecture in CVE has the limitation
of scaling to large number of users while maintaining consistency in the virtual
world. This paper identifies the basic requirements of CVE systems, proposed a
model based on cloud computing to improve the performance of the traditional CVE
systems to evade the limitations of the p2p and CS. The design of the cloud
computing-based CVE architecture proposes in our research consist of three
layers namely, infrastructure, platform, and application. The potential benefits
of the CVE architecture presented in this paper indicated a performance
improvement over the traditional CVE. The proposed architecture with little
modification can easily be implemented in real life applications to improve the
performance of collaborative virtual applications. |
Keywords: |
Collaborative Virtual Environment (CVE), Cloud Computing, CVE Architecture,
Platform, Application, Infrastructure |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
ANOMALY BASED INTRUSION DETECTION IN WLAN USING DISCRIMINATION ALGORITHM
COMBINED WITH NAÏVE BAYESIAN CLASSIFIER |
Author: |
P.KAVITHA, M.USHA |
Abstract: |
The role of Intrusion Detection System (IDS) has been inevitable in the area of
Information and Network security – especially for building a good network
defense infrastructure. Due to the wide popularity of Wireless Networks
tremendous applications are emerging and Wireless Local Area Network (WLAN) has
gained attention by both research and industry communities. The wide spread
deployment of WLAN has also brought new challenges to security and privacy. We
need to distinguish anomalies that change the traffic either abruptly or slowly.
Anomaly based intrusion detection technique is one of the building blocks of
such a foundation. In this paper, the attempt has been made to apply correlation
coefficient based learning approach for detecting anomalies in wireless Local
area network. While a good amount of research has been done for fixed wired
networks, not much research has been done in this area for wireless networks due
to lack of a good dataset. Hence we developed a discrimination algorithm using
correlation coefficient to detect anomalies combined with Naïve Bayesian
classifier in the Wireless traffic and demonstrated the effectiveness using
Kyoto 2006+ datasets. An experiment is carried out in order to evaluate
performance based on accuracy, detection rate and false positive rate of the
classification scheme. Results and analysis shows that the proposed approach has
enhanced the detection rate with minimum false positive rates. |
Keywords: |
Intrusion Detection, Anomaly Detection, Correlation Coefficient, Naïve Bayesian
Classifier, Wireless Network. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
RESIDENTIAL SITE SELECTION BY COMBINING GIS AND FUZZY DATABASE QUERY ON ANDROID
DEVICE |
Author: |
SUKMANA PRADIBTHA, I NYOMAN PIARSA, PUTU WIRA BUANA |
Abstract: |
Residential sites are a crucial means for the survival of a family life in which
currently the residential sector development increased. The increasing number of
existing residences makes people difficult to determine the location of the
residences in accordance with the needs of each individual. Geographic
Information Systems (GIS) is an application that can overcome the problems of
people in choosing the location of new residential sites accordance with the
consideration of various aspects. Residential search options are provided by its
location. However, if the residential data was not found then the users are
recommended to change the criteria or choose higher priority criteria.
Android-based Geographic Information Systems can be one of the major tools of
interactive mobiles. The presence of GIS will describe the location of
residential areas in real conditions on the map from the mobile phone. An
analysis and visualization will be obtain to be used as a reference for users. |
Keywords: |
GIS, Fuzzy Database Query, Site Selection, Google Maps, Android Device |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN AND ANALYSIS OF ANALYTICAL MODEL OF NOVEL ENERGY CONSTRAINED COOPERATIVE
MAC PROTOCOL FOR AD-HOC NETWORKS |
Author: |
ELLAMMAL C, SUDHA SADASIVAM G |
Abstract: |
Relay assisted cooperative wireless communication has been shown to have
significant performance gains over the legacy direct transmission scheme for
Ad-hoc network. An efficient cooperative Medium Access Control Scheme (MAC) is
needed to solve the difficulties induced by relaying and cooperative computing.
Another challenging issue is the extension of network lifetime of an Ad-hoc
network with regards to small battery capacity and self sustained operation. So,
designing energy constrained cooperative MAC for improving the network lifetime
is a challenging task. Yet, only less attention has been paid for cooperative
MAC scheme and its potential for lifetime extension. In this paper, we propose a
novel Energy Constrained Cooperative MAC protocol namely ECC-MAC for Ad-hoc
networks with the objective of maximizing the network lifetime and achieving
high throughput. Furthermore, we presents an analytical model for network
lifetime aware cooperative MAC scheme which identify the best possible relay
based on both residual energy and data rate. We show that the proposed model
seeks to optimize the tradeoff between network lifetime and throughput. |
Keywords: |
Cooperative Communication, Medium Access Control, Ad-Hoc Network, Throughput,
Network Lifetime. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
MIDDLEWARE ARCHITECTURE FOR NATIONAL ELECTRONIC ID CARD: THE CASE OF E-KTP IN
INDONESIA |
Author: |
DEDY RAHMAN WIJAYA |
Abstract: |
Since a few years ago Indonesian government began to perform the application of
the concept of the internet of things (IoT). Application of the IoT by the
Indonesian government aims to provide ease in identification of people or
objects and their attributes so it can be used as reference data in their policy
or implement some rules. Some programs have been implemented such as e-KTP (e-ID
Card) program, subsidized fuel control system using Radio Frequency
Identification (RFID) technology, and electronic ticketing system for electric
railways. Start from 2011, Indonesia Government has been implementing RFID
technology for e-Identification. This program is called e-KTP which aims to
realize single ID and establish complete and accurate demographic database.
Indonesian e-KTP card store demographic data consisting of biographical data,
signature, photograph, biometrics, and other data related to aspects of data
security and card management. e-KTP refers to the standard ISO/IEC 14443A/B that
works at a frequency 13,56 MHz. However, utilization of the e-KTP card is still
not optimal because its utilization is not much different from the conventional
ID card. This study will be discussed regarding the design and implementation of
e-KTP middleware. This middleware architecture can be adopted by government or
private agencies to improve their services by conduct the data collecting of
customer transactions by linking the e-KTP card with the enterprise database
with the specific rules. Thus the Indonesian people have truly single ID that
can be used for many purposes such as for health care system, attendance
management system, electronic payment system, and so on. |
Keywords: |
Internet of Things, Radio Frequency Identification, e-KTP, Middleware, Single ID |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ENHANCEMENT BY AN ENERGY ADEPT PE-AODV WITH LINK FAILURE PREDICTION |
Author: |
M. SAKTHIVEL, Dr. V. PALANISAMY |
Abstract: |
Mobile Ad hoc Network (MANET) is a wireless network which has dynamic nature
with infrastructure less without a central administration. In MANETs link
failure occurs due to topological changes of mobile node which causes high data
loss and delay, so the performance is enhanced by predicting the link break in
prior. The most challenging fact in the routing process is affording the energy
proficiency and load balancing with Quality of Service(QoS), Ad-hoc On Demand
Vector protocol (AODV) possess load balancing but to get QoS metrics a new
protocol with Energy Adept AODV is embarked. The protocol is intended to quest
the overloaded, variable nodes by considering the interface queue length
compared with a threshold value. Performance Enhanced Ad-hoc On Demand (PE-AODV)
is used for predicting the link failure prior and forwarding the data packets in
an alternate route which reduces end to end delay and increases Packet Delivery
Ratio (PDR). Finally energy proficient load balancing is obtained by engulfing
packet delivery ratio, end to end delay, load distribution and node energy as
major parameters with a performance enhanced PE-AODV is obtained. |
Keywords: |
AODV, LINK BREAK, MANET, PE-AODV, QoS. |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
Title: |
PROPAGATION MODELS FOR V2V COMMUNICATION IN VEHICULAR AD-HOC NETWORKS |
Author: |
Prof. VAISHALI D. KHAIRNAR, Dr. KETAN KOTECHA |
Abstract: |
There is lot of research work going in the area of vehicular ad-hoc networks (VANETs).
Because these systems often comprise several tens, hundreds or even thousands of
vehicle nodes, a real world test is very costly and time consuming operation.
Vehicular Ad-hoc Networks (VANETs) research is carried out using different
mobility and network simulators like MOVE, SUMO, TraNS, NS2 version 2.34 etc.,
because it allows for fast and cheap evaluation of protocols and applications in
a controllable and reproducible manner. Simulation study helps us to use models
in order to make a judgment on real-world problem viability. Models should
reflect reality using radio propagation model for vehicle-to-vehicle
communication, hence accuracy is an important requirement for propagation
models. |
Keywords: |
VANETs, V2V Communication, Propagation models, Simulations |
Source: |
Journal of Theoretical and Applied Information Technology
31 March 2014 -- Vol. 61. No. 3 -- 2014 |
Full
Text |
|
|
|