|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2014 | Vol. 64 No.2 |
Title: |
DESIGN OF FRACTAL ANTENNA FOR UWB APPLICATIONS |
Author: |
ELIZABETH RUFUS, ZACHARIAH C ALEX, LOKESH B J |
Abstract: |
The aim of this paper is to design an antenna suitable for wireless
applications. A small, low cost fractal antenna is designed, fabricated on a
FR-4 substrate of size 28 mm x 28 mm and tested for this purpose in the
laboratory using the N5230 A Agilent network analyzer. The simulation results
show that the bandwidth achieved is 7.1 GHz. The experimental result of the
fabricated antenna is also presented. |
Keywords: |
Ultra Wide Band (UWB), Fractal Antenna), Microstrip Antenna |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
FPGA IMPLEMENTATION OF COEFFICIENT DECIMATED POLYPHASE FILTER BANK STRUCTURE FOR
MULTISTANDARD COMMUNICATION RECEIVER |
Author: |
P. KALPANA DEVI , R. S. BHUVANESHWARAN |
Abstract: |
Coefficient decimated polyphase FIR filter bank structure implemented for
receiving narrow band channels effectively in multistandard environment.
Reonfigurability in multirate filtering is required to design a prototype filter
bank structure for selecting the distinct polyphase sub filters and taps for
different standards. Coefficient decimation (CD) based filter bank can offer a
good trade-off between reconfigurability and low complexity which satisfy most
of the requirements for SDR receivers. This paper proposed a method of filter
bank technique which reduces the overall complexity of the design. The pro-posed
filter structure has been synthesized on 0.18µm CMOS technology single core
Field programmable gate array. Synthesis report proved the reduced device
utilization for the proposed structure. |
Keywords: |
FIR Filters, Reconfigurabality, Coefficient Decimation, Polyphase Filter,
Multistandard, Channelization |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
FAULT TOLERANT METHOD TO IMPROVING QUALITY OF SERVICE OF BE SLACK TIME ROUTING
IN NOC SYSTEMS |
Author: |
S. RAMANI, Dr. J. SUNDARARAJAN |
Abstract: |
The network on chip (NoC) architectures is being proposed for implementing a
routing performance on the systems for real-time multi-media applications. The
Guaranteed throughput (GT) and best effort (BE) traffic on main working concept
on this system. GT traffic not only lead to under-utilization of communication
links and routers, but also leads to degradation of QoS parameters for BE
traffic. We propose a dynamic routing scheme with using the Slack-Time
management for using to reducing jitter in the latency of BE traffic affected by
the GT traffic. Our results from modeling and simulation indicate that a
significant improvement in jitter can be achieved. The fault tolerant network to
proposed quality of service, our proposed method will reduce the packet dropping
ration from the single queue based data from the network management. Traffic
Aware routing (TAR) to the use improve a performnace of quality services of this
method the important data packet will passed as much soon to the designation due
to the dual queue with the support of priority data droping ration were reduced
here. |
Keywords: |
NOC, AODV, BE, GT, TAR, QOS |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN EXTENSIVE REVIEW OF SIGNIFICANT RESEARCHES ON CHANNEL ESTIMATION IN MIMO-OFDM |
Author: |
Mr. S. LENIN, DR.S.MALARKKAN |
Abstract: |
In communication systems, Multiple-Input Multiple-Output (MIMO) plays a major
role because of its high performance. In MIMO systems, multiple antennas are
used in both transmitter and receiver to improve the communication performance,
whereas the orthogonal frequency division multiplexing (OFDM) is a multicarrier
modulation method. MIMO-OFDM is commonly used for communication systems due to
its high transmission rates and robustness against multipath fading. In
MIMO-OFDM, channel estimation plays a major role and channel estimation is the
estimation of the transmitted signal bits using the corresponding received
signal bits. While designing the channel estimator for wireless OFDM systems,
two main problems will occur. The first problem is the arrangement of pilot
information, in which pilot is the reference signal employed by both
transmitters and receivers, whereas the second problem is the design of an
estimator with both less intricacy and excellent channel tracking ability. In
this paper an extensive review on different channel estimation methods used in
MIMO-OFDM like pilot based, least square (LS) & minimum mean square error method
(MMSE), least mean square (LMS) & recursive least squares (RLS) methods and also
other channel estimation methods used in MIMO-OFDM was discussed with their
achieved results. |
Keywords: |
MIMO. OFDM, channel estimation, LS and MMSE, LS and RLS, blind channel |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPLEMENTATION OF CONFIGURABLE FLOATING POINT MULTIPLIER |
Author: |
GOKILA D, Dr. MANGALAM H |
Abstract: |
Floating point multiplier is widely used in digital signal processing
applications. The performance of Field Programmable Gate Arrays (FPGAs) used for
floating point application is low, because of complexity in operations. This
creates less interest in making FPGAs for use in floating point applications. So
we are going for the reconfigurable floating point multiplier which provides
better utilization of the multiplier in all applications and functions. This
performs double precision operation or single precision operation. The
credibility of our multiplier is tested using a standard bench mark circuit
namely 4 tap FIR filter. The implementation shows a better performance with
respect to delay. |
Keywords: |
Double Precision, Single Precision, Reconfigurable, Floating Point Multiplier
(FPM), FIR Filter. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
APPLICATION OF SPECTRUM EXPRESSION AND INDEPENDENT COMPONENT ANALYSIS IN
COMPOSITION ANALYSIS OF MIXED PIGMENT |
Author: |
GONGMING WANG, ZHIYONH LIU |
Abstract: |
Reflectance spectroscopy (RS) is suitable for the composition analysis of mixed
pigment, because the corresponding basic pigment can be determined by
calculating the spectrum similarity. However, the spectrum similarity between
known pigment and mixed pigment may be not the one between known pigment and the
most similar basic pigment, and the known pigment with the largest spectrum
similarity may be not the highest proportion of mixed pigment, due to the
possible relationship among the basic pigments. Thus, it is easy to affect the
accuracy of composition analysis. In this study, a composition analysis method
of mixed pigment based on spectrum expression and independent component analysis
(ICA) is proposed. First of all, the spectral information of mixed pigment is
obtained with spectrometer, and is expressed as the mixed signal. After that,
the independent signal (spectrum of basic pigment) is generated with ICA. Then,
the type of basic pigment is determined by calculating the spectrum similarity
between basic pigment and known pigment. Finally, the percentage of basic
pigments is obtained by solving Kubelka-Munk equation system. To validate this
method, the 4, 5, 6 simulated spectrums were mixed from four spectrums of
Munsell color card, and the experiments were carried out in two aspects. On the
one hand, the composition analysis of three groups of original simulated
spectrums was executed. On the other hand, each group was mixed with one
disturbance spectrum in order to test the anti-interference performance of this
method. The separated curve is very similar to the original curve. The average
similarity is 96.29%, and the maximum one can reach to 98.37%. The calculated
percentage of basic pigment closes to the original one. It can be seen that this
method is suitable for composition analysis of mixed pigment. |
Keywords: |
Color, Composition Analysis, Spectrum, Similarity, Independent Component
Analysis, Munsell |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
ONTOLOGY AND RULE-BASED MODEL FOR EXTRACTING SEMANTIC CONTENT IN VIDEOS |
Author: |
KARTHIK GANESH.R, Dr.R.KANTHAVEL, ALEXANDRIYA CELIN.V |
Abstract: |
As a large amount of video based applications becomes widely available, there is
a need to extract the semantic data in videos. Manual techniques, which are
inefficient and subjective and costly in time, bound querying capabilities and
bridge gap between low-level representative feature and high level semantic
content. For the deeper understanding apart from the raw data and low-level
features, the content at semantic level is required. The existing periodicity
mining was based on audio retrieval which cannot be applied to the video.
Optical flow algorithm is used to track the direction of the spatial movements
between two image frames. Ontology provides a vast domain applicable rule
production set that allows the user to construct the domain. Rule based model
use the spatial/temporal relations to extract the definitions. The moving
regions are extracted by the Graph-Based Visual Saliency (GPVS) algorithm and it
detects the temporal locations. The phase correlation method is a well-known
image mining technique in multimedia data which has main application in
coordination of frames. |
Keywords: |
Spatial Movement, Ontology, Spatial/Temporal Relation, Rule Based Model, Phase
Correlation. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
ORGANIZATIONAL FACTORS AFFECTED BY SOA ADOPTION: A CRITICAL OVERVIEW (2008-2013) |
Author: |
NAGHMEH NIKNEJAD, IMRAN GHANI, AB RAZAK CHE HUSSIN |
Abstract: |
Service-Oriented Architecture (SOA) adoption is known as an evolutionary
process. In this process of adoption, a number of areas in an organization are
affected. However, there are a limited number of researches that focus on the
effects of SOA adoption in an organization. This study investigated the
significant organizational factors affected by SOA adoption during the last six
years. The study focused on factors such as governance, strategy, complexity,
Return on Investment (ROI), business and IT alignment etc. The findings of this
study show SOA governance and cost issues are known as critical success factors
in the most studies. |
Keywords: |
Service Oriented Architecture, SOA Adoption, Potential Factors, Influential
Factors, Organizational Factors, Survey. Review |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN APPROACH BASED ON BAND TO PREDICT FAULT LOCALIZATION IN CLOUD ENVIRONMENT |
Author: |
NETHAJI , CHANDRASEKAR |
Abstract: |
Despite the advancement in software tools and processes, bugs are prevalent in
many systems. There is a need to develop a system with automated means to help
reduce software debugging cost. One important confront in debugging is to
restrict the root cause of program failures. GenProg uses an extensive structure
of genetic programming to develop a program variant that retains essential
functionality but it is not vulnerable to a known deficiency. The existing
software testing suite identifies program faults in cloud environment.
Structural differencing algorithms and delta debugging minimizes the
dissimilarity among variant and the original program in terms of minimum repair.
GenProg are not more sophisticated with the localization technique and ranking
are not performed with different acceptable patches in software testing.
Subsequently, Fault Localization based on Band (FLB) mechanism is introduced to
overcome the faults and rank the different acceptable patches. Fault
Localization based on Band outputs an ordered list of program elements sorted
based on their likelihood. Based on the likelihood, the root cause for a set of
failures is identified in cloud environment. Band based fault localization
extracts the number of features in standard cloud that are potentially
associated to the usefulness of fault localization in software testing. It
builds machine learning process and these feature values discover out a
discriminative model that is significant to predict the fault localization and
effectiveness in ranking. An experimental evaluation is carried out with the
Amazon EC2 dataset to estimate the performance of the proposed FLB mechanism
with GenProg. Performance metric for evaluation of FLB is measured in terms of
CPU utilization, percent time overhead, communication cost, average auditing
time, normalized throughput and performance counter. |
Keywords: |
Fault Localization, Amazon EC2 dataset, Genetic programming, Software Testing,
Machine Learning process, Discriminative model, Structural Differencing
Algorithms. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
PARALLELIZED HIERARCHICAL EXPECTED MATCHING PROBABILITY FOR MULTIPLE SEQUENCE
ALIGNMENT |
Author: |
KEDHAR M, DR. M. RAJASEKHARA BABU, MAYANK G, ABHINIVESH M |
Abstract: |
Sequence alignment of two or more than two biological sequences such as protein,
DNA (Deoxyribonucleic acid) or RNA (Ribonucleic acid) is called MSA (Multiple
Sequence Alignment). Sequence homology can be inferred from the resulting MSA.
Existing System uses dynamic programming technique which suffers from
exponential growth of time as the sequence grows. A Hierarchical Expected
Matching Probability (HEP) Matrix scoring technique improves accuracy but it
consumes more time. This paper presents an implementation of HEP on GPU’s to
speed up the Multiple Sequence Alignment (MSA). The experiment results shown
that there is 25% accuracy of MSA and also 4% of speedup. |
Keywords: |
Multiple Sequence Alignment, Hierarchical Expected Matching Probability, Protein
Residue Conservation, Scoring Matrix, Protein And DNA Sequence, Heterogeneous
Environment |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE AND ANALYSIS OF DIFFERENTIAL MODE NOISE SEPERATION FOR POWER
SUPPLIES |
Author: |
G.THIAGU, Dr.R.DHANASEKARAN |
Abstract: |
In switching power circuits, due to the rapid switching of high current and high
voltage, interference emission is created a serious problem. With the increase
in switching frequency, possibility of interference also increases. When the
interference is strong enough, then it can affect the normal working of
associated circuits also. Electric and magnetic fields exist in any operating
electric circuit. The current flowing in the circuit generates a magnetic field.
For such a current to flow, there must be a potential difference, which produces
an electric field. These fields can exist in any substance, including a vacuum.
If they are strong enough, they make it possible for one electrical device to
affect another. When this occurs unintentionally, it is known as electromagnetic
interference, commonly abbreviated as EMI and often simply called as ‘noise’. |
Keywords: |
Differential mode noise, Common mode noise, LISN, switch mode power supply,
EUT,EMC |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY AND LOAD AWARE STABILITY ROUTING FOR MOBILE AD HOC NETWORK |
Author: |
P. SRINIVASAN, S.P.SHANTHARAJAH |
Abstract: |
Due to mobility, the topology of a mobile ad hoc network (MANET) changes
frequently, making it more difficult to find routes that last for the entire
duration of data transfer. Energy awareness and congestion control is becoming a
crucial factor in the design of routing protocols. Satisfying both stability and
energy constraints is a complex task. In this paper, we propose a novel, Energy
and Load Aware Stability based Routing (ELSR-AODV) protocol that integrates
energy and load metrics into stability routing to alleviate congestion and
improve the performance of the network through cross layer approach. This model
computes the reliability factor based on the link stability and the residual
energy of the intermediate nodes, where load balancing mechanisms is
incorporated to sustain the network functionality. It is simulated using ns2,
under different mobility conditions. This protocol is compared with other
similar routing protocols: LAER, PERRA. Our experimental results show better
performance in terms of Packet Delivery Ratio, Control Overhead and Network
Lifetime. |
Keywords: |
MAN ET, Reliable Routing, Route Stability, Energy-aware routing, Congestion
Control. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
A TRIANGULAR MATRIX ROUTING TABLE REPRESENTATION FOR EFFICIENT ROUTING IN MANET |
Author: |
ABD AL-RAZAK TAREQ RAHEM, MAHAMOD ISMAIL, AWS SAAD |
Abstract: |
To improve the routing efficiency of a MANET, two issues need to be
investigated: routing table size and path selection from source to destination.
Given that routing performance depends on routing table size, which is
determined by the number of nodes, a detailed table representation is required.
In this study, we propose a triangular routing table representation to improve
routing performance. By using a low triangular matrix, routing information can
be transferred between nodes more efficiently by using a smaller memory size
than the memory size used by conventional routing tables. The proposed routing
representation is validated by simulating 25 MANET nodes that are generated
randomly by shortest path selection. The simulation shows that the proposed
approach significantly reduces the memory size in transfer routing information.
Besides, it is proved through using 255 nodes that they require only 3.95 KB of
memory size, which does not monopolize the throughput of a network. |
Keywords: |
Routing protocol, Routing table, Topology, Triangular matrix, Routing Triangular
Matrix RTM. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
GA AND ACO TECHNIQUES FOR THE ANALOG CIRCUITS DESIGN OPTIMIZATION |
Author: |
BACHIR BENHALA, OMAR BOUATTANE |
Abstract: |
In this paper we propose a comparison between two population-based metaheuristic
techniques, the Genetic Algorithm (GA) and the Ant Colony Optimization (ACO), to
make easier the sizing of analog circuits with optimal objective functions. The
paper details the corresponding algorithms and highlights the optimal design of
a positive second generation current conveyor (CCII+) and an active filter
circuit. The computing time and robustness of both algorithms are checked. SPICE
simulation is used to validate the obtained sizing/performances. |
Keywords: |
Metaheuristic, Ant Colony Optimization, Genetic Algorithm, Current Conveyors,
Second Order Low-pass Filter. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
FUZZY RULE SET BASED FETAL HEART RATE DETECTION AND SEPARATION USING WAVELET
SIGNAL ANALYSIS UNDER VARIOUS PSYCHOLOGICAL MOMENTS |
Author: |
M.SENTHIL VADIVU, DR.S.PALANI |
Abstract: |
The maternal heart rate detection becomes more important in medical solutions
where the human ECG consists of different a component which represents different
activity of heart rooms. The fetal heart rate has to be monitored at different
situations of maternal activity. The human heart wave differs with different
psychological and physical changes also affects the heart rate of the fetal
also. We propose a heuristic approach which detects and separate the fetal heart
rate from the mother using wavelet analysis and fuzzy rule set. The rules set
consist of variety of rules for different psychological moments which represent
the possible heart rate and values of different components of ECG. Using the
rule set maintained, the fetal heart rate can be easily identified at different
situations of the patient, which supports the medical practitioner to go through
the medical procedures. The proposed method has produced higher rate of
detection accuracy which makes the separation process an easier one. |
Keywords: |
Fuzzy Systems, Rule Sets, ECG, Wavelet Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
QOS BASED COST EFFICIENT RESOURCE ALLOCATION IN CLOUD |
Author: |
S.P.JENO LOVESUM, DR.K.KRISHNAMOORTHY, BLESSED PRINCE. P |
Abstract: |
Resource allocation is one of the important challenges in cloud computing
environment. It depends on how to allocate the resource to the particular task.
Resource allocation can be done by two methods. One of the method statically
allocates the resources and other dynamically allocates the resources. Two
methods are having advantages and disadvantages according to its processing
environments. In this paper we are considering the QOS parameters specified by
the user to allocate the resource so that the resource allocation can be done in
a cost effective manner. As cost is an important factor we try to minimize the
memory wastage which is taken as a QOS factor and the algorithm tries to
allocate the resource in such a way that there is minimal memory wastage. Most
of the previous methods consider only cost and time as QOS parameters. But in
our method we have considered memory wastage, throughput, response time, cpu
utilization, as the QOS parameters which has to be satisfied for the users. So
our method handles multi QOS requirement tasks efficiently. |
Keywords: |
Cloud, VM, Resource, QOS, Memory |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
TEXT MINING ALGORITHM DISCOTEX (DIS-COVERY FROM TEXT EXTRACTION) WITH
INFORMATION EXTRACTION |
Author: |
Dr.T..LALITHA, S.MEENAKSHI |
Abstract: |
Text mining concerns looking for patterns in unstructured text. The related task
of Information Extraction (IE) is about locating specific items in
natural-language documents. This paper presents a framework for text mining,
called DISCOTEX (Discovery from Text EXtraction), using a learned information
extraction system to transform text into more structured data which is then
mined for interesting relationships. The initial version of DISCOTEX integrates
an IE module acquired by an IE learning system, and a standard rule induction
module. In addition, rules mined from a database extracted from a corpus of
texts are used to predict additional information to extract from future
documents, thereby improving the recall of the underlying extraction system.
Encouraging results are presented on applying these techniques to a corpus of
computer job announcement postings from an Internet newsgroup. |
Keywords: |
Knowledge Discovery, Data Mining,Text mining,Information Extraction,Discovered
Knowledge |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
CERTAIN INVESTIGATIONS ON REMOTE SENSING BASED WAVELET COMPRESSION TECHNIQUES
FOR CLASSIFICATION OF AGRICULTURAL LAND AREA |
Author: |
R.KOUSALYADEVI, J.SUGANTHI |
Abstract: |
Remote sensing data is highly useful for creating or updating base maps and
detecting the major changes in land use and land cover. Usually there are lots
of differences between Toposheet and RS images. Change in land use pattern can
be analysed by RS images. Conversion of land cover into land use can be
monitored by subsequent follow up of RS images and depending upon the land
classes like forest, agriculture and desert, the updating may vary. This image
contains huge volume of data. Instead of using the entire data for land use land
cover mapping, the compressed images can also be used for mapping purposes. In
this paper the Landsat5 agricultural image is compressed using discrete wavelet
transform and the quality has been analysed using the parameters compression
ratio, peak signal to noise ratio and digital number values. Using the digital
number values the spectral signature graph is drawn. Finally Coif3 wavelet is
selected for land use and land cover mapping of agricultural area based on high
CR, PSNR and minimum cumulative error of the digital number values. |
Keywords: |
Compression Ratio (CR), Peak Signal to Noise Ratio (PSNR), Digital Number (DN),
Image Classification, Error Matrix. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
GENETICALLY OPTIMIZED PRECODERS FOR HIGHER TRANSMIT DIVERSITY IN SINGLE USER
MIMO |
Author: |
P.SATYANARAYANA, DR.S.SRIGOWRI, 3 DR.B.PRABHAKARARAO |
Abstract: |
Wireless communications depends on multiple-input-multiple-output (MIMO)
techniques for high data rates. Feedback of channel information can be used in
pre-coding to use the strongest channel mode and improve MIMO performance. This
paper proposes genetic algorithm to optimize codebook for Alamouti and OSTBC
pre-coding technique to enhance the Performance of MIMO system. The Simulation
and Result shows that proposed optimized codebook provides improved bit error
rate than the conventional rotating codebooks. |
Keywords: |
MIMO, Alamouti, OSTBC, Genetic Algorithm, Pre-coded Alamouti, Pre-coded OSTBC,
CSIT |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
ASSEMBLER DESIGN TECHNIQUES FOR A RECONFIGURABLE SOFT-CORE PROCESSOR |
Author: |
SANI IRWAN MD SALIM, HAMZAH ASYRANI SULAIMAN, NOR RAHIMAH JAMALUDDIN, LIZAWATI
SALEHUDDIN, MUHAMMAD NOORAZLAN SHAH ZAINUDIN, YEWGUAN SOO |
Abstract: |
The reconfigurable processor design which utilizes platform such as Field
Programmable Gate Array (FPGA) has offered several advantages in minimizing the
non-recurring engineering cost and to reduce the time-to-market for
processor-based products. However, when any modification is made to the
processor architecture, the same information needs to be relayed to the
assembler in order to generate the correct object files. This paper presents the
assembler design techniques for a reconfigurable reduced instruction set
computer (RISC) processor called UTeMRISC03. The processor is a soft-core
processor, which is described in Verilog and its instruction set architecture
(ISA) has been expanded to include a custom instruction. Thus, the assembler
would have to adjust according to the changes being made to the ISA. One-pass
and two-pass techniques have been adopted during the construction of the
assembler and the generated object files are used as the initialization files
during the FPGA implementation of the processor core. The assembler has been
successfully developed by using both techniques and the object files are
verified by executing the processor core in the Xilinx Spartan-3A FPGA chip. For
comparisons, the assembling execution times for both techniques have been
recorded and the one-pass technique has been able to complete the assembling
process in half of the time it took for two-pass technique. The design
techniques adopted in this paper will serve as the base platform with the aim of
establishing a full-customizable assembler for reconfigurable soft-core
processor in the near future. |
Keywords: |
Assembler, Reconfigurable Processor, FPGA |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
A STUDY OF BLOGGERS’ EMOTIONAL CONTAGION AND TRAVEL INTENTION |
Author: |
YI-CHIH LEE, WEI-LI WU, CHIA-KO LEE |
Abstract: |
Theme parks have become a mainstream of development in the leisure
industry in Taiwan. This study chose bloggers as research subjects in order to
study the correlation between bloggers’ emotional influences and the allure of
their blogs, and to further examine whether these blogs stimulate tourists’
behavioral intention to visit theme parks. The results revealed that bloggers’
perception while they are reading blog information is susceptible to the
influence of emotional contagion. In addition, blog usefulness, blog appeal, and
brand appeal of theme parks all cast an influence on the public’s behavioral
intention to visit theme parks. |
Keywords: |
Emotional Contagion, The Attractiveness Of Blogs, Blog Usefulness, The
Attractiveness Of Brands, Behavioral Intention |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT MULTIRESOLUTION IMAGE DENOISING USING SMOOTHING SPLINE ESTIMATION |
Author: |
G.M. RAJATHI, DR.R. RANGARAJAN |
Abstract: |
The image data is normally corrupted by additive noise during acquisition. This
reduces the accuracy and reliability of any automatic analysis. For this reason,
denoising methods are often applied to restore the original image. The
effectiveness of image denoising depends on the estimation of noise variance of
noisy image. In this paper, the Discrete Wavelet Transform(DWT) is used, which
offers simultaneous localization in time and frequency domain and the noise
variance is estimated using Smoothing Spline Estimation method. Multiresolution
bilateral filter is the extension of bilateral filter. Bilateral filter is a
nonlinear filter that does spatial averaging without smoothing out the edges.
Multiresolution bilateral filtering is applied to the approximation sub bands of
the transformed noisy image and thresholding is applied to the detailed sub
bands which uses the estimated noise variance. With this process, a better PSNR
is achieved. |
Keywords: |
Denoising, Smoothing Spline Estimation, Multiresolution Bilateral Filter, Noise
Variance, Thresholding, Discrete Wavelet Transform. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
RECOGNITION AND CORRECTION OF FLEXIBLE ERROR USING MULTI-LEVEL REDUNDANT RESIDUE
NUMBER SYSTEM IN WIRELESS SENSOR NETWORKS |
Author: |
MOHANNA FARZIN, HAMED BARANGI, HOSSEIN BAKHSHIZADEH, RAMTIN BIDAR |
Abstract: |
The application of wireless sensor networks is inevitable in today’s life. Here,
we can refer to some challenges of designing wireless sensor networks
containing: high error rate in sending the information, high throughput, low
speed and low security of these networks. In this paper, we used the residue
number system in order to solve these problems and improve system performance.
Evaluations show that our proposed method has higher speed and lower throughput
and it has the capability of recognizing and correcting more errors in
comparison with previous proposed systems. |
Keywords: |
Redundant Residue Number, Chinese Remainder Theorem, Multi-level Redundant
Residue Number System |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
ANONYMOUS WEB BROWSING AGAINST TRAFFIC ANALYSIS ATTACKS BY REUSING THE CACHE
MEMORY |
Author: |
JEEVAA KATIRAVAN , N.DURAIPANDIAN |
Abstract: |
Anonymous web browsing is a hot topic with many potential applications for
privacy reasons. However, there are few such systems which can provide high
level anonymity for web browsing. The reason is the current dominant dummy
packet padding method for anonymization against traffic analysis attacks. This
method inherits huge delay and bandwidth waste, which inhibits its use for web
browsing. In this paper, we propose a predicted packet padding strategy for the
case of infinite cache size to replace the dummy packet padding method for
anonymous web browsing systems. The proposed strategy reduces the delay and
bandwidth waste. We therefore present the same predicted packet padding
algorithm for the case of finite cache size. We formulated the traffic analysis
attack and defense problem, and defined a metric, cost coefficient of
anonymization (CCA), to measure the performance of anonymization. We thoroughly
analyzed the problem with the characteristics of web browsing and concluded that
the proposed strategy is better than the current dummy packet padding strategy
in theory. |
Keywords: |
Anonymous Web Browsing, Predicted Packet Padding and Finite Cache Memo |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMAGE RETRIEVAL USING COLOR-SIZE MOMENTS AND WAVELET FEATURES |
Author: |
MR.N.PUVIARASAN, DR.R.BHAVANI, MS.T.S.ARTHI |
Abstract: |
The rapid growth of digital imaging techniques and versatility among the images
has motivated the development of Content Based Image Retrieval (CBIR). CBIR is
the application of computer vision techniques which uses the visual contents to
retrieve relevant images from large databases according to user’s interests. The
visual contents (color, texture, shape etc) serve as the features for the
images. Features are measurements of extreme interest analysed from an image.
This paper proposes a novel combined Color-Size and texture features for CBIR
system. A new type of visual feature named Color-Size feature which integrates
the information of both color and size of the image in terms of number of
segments is proposed. To implement the system, initially the images are
segmented using Watershed segmentation approach. Different images would yield
different number of segments that has to be taken into account for the
extraction of features. From the segmented image the Color-Size features are
extracted using Color-Size Moments. Gabor filter and Haar wavelet are employed
to extract texture features. Then the combination of color-size and texture
features is formed. The feature extraction process is accomplished for both the
query image and images stored in database. Finally, the relevant images are
retrieved for the given user’s query image. |
Keywords: |
Computer vision, Content Based Image Retrieval, Color-Size Moments, Visual
features, Watershed approach |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE OF TCP TAHOE AND SACK OVER LOOP-FREE MULTIPATH REACTIVE ROUTING
PROTOCOL IN MANET |
Author: |
M.SYED MASOOD, DR.P.SHEIK ABDUL KHADER, DR.A.MOHAMED ABBAS |
Abstract: |
A few numbers of packets are locked in the network for random time periods may
occur due to the mobility of nodes in Mobile Ad hoc networks, “This problem may
leads to packet drop, as it stays longer time period in the loop than the
allowable Time to Live (TTL) value”. The objective of the paper is to provide
Loop-Free Multipath routing to reduce the packet drop and hence the network
performance will be enhanced. In this paper, our proposed work of “Loop-free
Multipath Probabilistic Scheme based AODV (LMPSAODV)” is simulated using network
simulator NS-2.34 to evaluate network performance and the results are presented
on various scenarios in terms of packet delivery ratio (PDR), total dropped
packets, routing overhead, end-to-end delay and retransmission rate. The
performance will be measured with two different TCP variants namely TCP Tahoe
and SACK. Each TCP variant uses different ways of congestion control algorithm.
The simulation result shows that “the performance of LMPSAODV with TCP SACK
performs better to the changing network sizes”. |
Keywords: |
Loop-Free Multipath, TCP Tahoe, TCP SACK, Packet Delivery Ratio and Routing
Overhead. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT DATA HIDING USING HEXADECIMAL SUDOKU FOR STEGANOGRAPHY |
Author: |
PREMAMAYUDU BULLA, RAGHUNATH AKKINENI, SUBBA RAO PERAM, NAGABHUSHANAM DASARI |
Abstract: |
This paper proposed an improved data hiding steganographic scheme using Sudoku
puzzle, which can be utilize to identify least distortion pixel value of
selected pixel from the digital image with respect to secret digit. The scheme
calculates three components for the selected pixel from the Sudoku puzzle based
on the secret digit. The proposed scheme does not affect the visual quality of
the stego-image. This work is simulated in the MAT LAB and presented results.
The performance of scheme is compared with the existing methods with respect to
image distortion. The quality of the steg-image is also verified using image
assessment parameters PSNR and MSE. |
Keywords: |
Image Steganography, Data Hiding, Steganalysis, Sudoku Solution, Stego-image. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN ENHANCED TRUST AUTHORIZATION BASED WEB SERVICES ACCESS CONTROL MODEL |
Author: |
R.JOSEPH MANOJ, A.CHANDRASEKAR |
Abstract: |
With the increasing tendency among business organizations to move around the web
services platform, Web services paradigm creates new security challenges which
can only be realized by developing effective access control models. Now a day
service provider’s big challenge is detecting and preventing malicious
requesters or behaviours. In order to evade malicious requesters or behaviors,
the service providers who allows service requester to access the web services,
requires development of access control models that can capture relevant
information about a service requester at the time of access request and
incorporate this information for making effective access control decisions. This
proposed system provides an enhanced approach to detect and prevent IP address
spoofing, SQL injection to avoid unauthorized users and capture relevant
information such as network conditions, frequency of access, timeout, success
rate, failure rate etc., about a service requester and establish trust value.
Based on the trust value the honest and active users will be allowed to access
the service otherwise their trust value will be decreased and not be allowed to
access the service. So this method would control malicious requesters to access
the web services and make the authorization process effective. This paper also
compares existing system and proposed system and verifies the performance and
correctness of the proposed work based on simulation results from a prototype
implementation. |
Keywords: |
Web Services, Trust based Access Control, Access model for service requester,
Trust Authorization Model |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF COOPERATION AND NON COOPERATION OF RELAY NODES IN
COGNITIVE RADIO AD HOC NETWORKS - A GAME THEORETIC APPROACH |
Author: |
A.BABIYOLA , V.CYRIL RAJ |
Abstract: |
Cognitive radio (CR) technology is a solution to solve the problems in wireless
networks resulting from the limited available spectrum and the inefficiency in
the spectrum usage by exploiting the existing wireless spectrum
opportunistically. CR networks, equipped with the intrinsic capabilities of the
cognitive radio, will provide an ultimate spectrum aware communication paradigm
in wireless communications. In cognitive radio ad hoc networks (CRAHN’s), the
relay selection with user cooperation could be advantageous to both primary and
secondary transmissions. This paper deals with both cooperative and non
cooperative relay node games. In cooperative games, players collaborate with
each other to jointly maximize the total utility of the game. In non-cooperative
game, each player selfishly maximizes its own stationary utility function to
reach the best response Nash equilibrium strategies. The Non co operation of
Relay nodes can be converted into co operative nodes based on Markov Process.
The results reveal, the summation of node utilities in cooperation nodes is
always greater than non-cooperative relay nodes and the relay node should be
selected and configured according to the system requirements in order to improve
the performance of cooperative cognitive radio ad hoc networks |
Keywords: |
Cognitive Radio Adhoc networks, Nash Equilibrium, Markovian processes, Ergodic
process |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
A FRAMEWORK OF INFORMATION SECURITY CULTURE CHANGE |
Author: |
AREEJ ALHOGAIL, DR. ABDULRAHMAN MIRZA |
Abstract: |
Establishing information security culture within an organization may include
transformation of how employees interact with the information assets which may
be challenged with resistance, fear or confusion. Change management skills could
assist organization members to smoothly adapt to the new culture. The use of
change management in information security culture has been rarely investigated
in the literature and very few models have been offered. This paper reviews the
available change management models that have been used in information security
management. Then it integrates a set of change management principles that were
proposed in the literature and combine them to a comprehensive multistep
framework that support and guide the transition in information security culture
change within organizations. Moreover, the principles will be the base of
suggestion of the appropriate guideline to support the effective implementation
of change in information security culture. The framework provides guidance to
information security professionals and academic researchers in taking proactive
steps and measures to facilitate the culture change. |
Keywords: |
Change management, Information security culture, Culture change. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
CATEGORIZATION OF ICT ROLE FOR SERVICE-BASED SMALL AND MEDIUM ENTERPRISES |
Author: |
NADHMI GAZEM, AZIZAH ABDUL RAHMAN |
Abstract: |
Information and communications technology (ICT) has a high impact on small and
medium-sized enterprises (SMEs) business. It enhances SMEs capacity for
innovation and adds greater value to their service in order to attract more
customers and produce greater returns to the company. The purpose of this paper
is to categorize ICT available in the market for SMEs according to its roles.
The study used different examples from the literature review and from the
authors’ observation of ICT solutions in the market. The output of this study
developed new ICT categories such as automating devices, knowledge
dissemination, business productivity systems, contacting, entertaining,
marketing, storage, tracking, and transactions technology. Moreover, in order to
demonstrate the usability of these categories, the authors have conducted
preliminary integration of ICT categories with different service types. The
findings of this integration offer managers different ways to think about the
existing services and choose the most suitable ICT categories that can help to
improve services operations or create new services. |
Keywords: |
Small and Medium-sized Enterprise (SME), Information and Communications
Technology (ICT), Service Sector, Customers Service, Services Redesign. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
COMPUTER AIDED DIAGNOSIS SYSTEM FOR BRAIN TUMOR DETECTION AND SEGMENTATION |
Author: |
A.LAKSHMI, Dr.T.ARIVOLI |
Abstract: |
Abnormal cell growth leads to tumor in the brain cells. Earlier detection,
diagnosis and proper treatment of brain tumor is essential to prevent human
death. An effective brain tumor segmentation of MR image is an essential task in
medical field. In this paper, a computer aided development of diagnosis system
for brain tumor detection is proposed. The proposed work consists of four stages
namely preprocessing, feature extraction, ANFIS Classifier and morphological
operations to detect, segment and diagnose the brain tumor regions. Before going
to segmentation the preprocessing is carried out since preprocessing makes the
image ready for further segmentation. The performance of tumor segmentation are
analyzed with the following factors similarity index (SI), extra fraction (EF),
overlap fraction (OF) and accuracy, whose values are obtained as 0.78, 0.0098,
0.723 and 99.4% respectively. The results obtained in this paper shows that the
proposed work is superior over the other state- of- art-techniques. |
Keywords: |
Brain tumor, classifier, diagnosis system, similarity index, Extra fraction and
overlap fraction. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
Title: |
DECENTRALIZED PI CONTROLLER DESIGN FOR NON LINEAR MULTIVARIABLE SYSTEMS BASED ON
IDEAL DECOUPLER |
Author: |
D.ANGELINE VIJULA, Dr.N.DEVARAJAN |
Abstract: |
This paper presents a multivariable controller design based on ideal Decoupler
with high closed-loop system performance and robustness. The method is effective
despite the values and positions of the right half plane zero. The validity of
the proposed multivariable control system design and controller tuning is
confirmed through simulation results using a benchmark four tank system, which
is a Two input Two output (2x2) process and a real time boiler turbine system
which is a Three-Input Three-Output (3x3) process. |
Keywords: |
Multivariable control, Ideal decoupler, Quadruple tank system, Boiler Turbine
System, Decentralized PI controller. |
Source: |
Journal of Theoretical and Applied Information Technology
20 June 2014 -- Vol. 64. No. 2 -- 2014 |
Full
Text |
|
|
|