|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2014 | Vol. 64 No.3 |
Title: |
KNOWLEDGE EXTRACTION METHOD USING STOCHASTIC APPROACHES IN GOOGLE MAPS |
Author: |
PARIVALLAL R, NAGARAJAN B |
Abstract: |
Develop a system to extract knowledge from real images are challenging research
work. To extract knowledge from the Google map first authors apply the image
analysis technique to the Google maps. Authors develop a system to extract
knowledge from Google map image, by using this system any user can locate the
place and can identify number of objects in an image. By applying image
segmentation technique, partitioning or subdividing an image into multiple
meaningful regions or sets of pixels with respect to a particular application.
In image analysis system, Image segmentation is an important component. There
are many image segmentation techniques; one of the most important techniques is
marking techniques. This method transform original image into mark segmented
image. After marking the object find centroids points for the each identified
object then in the result apply into the spatial data mining technique to
extract knowledge. In this paper, define a stochastic approach for image
analysis to object identification from Google map using Matlab. |
Keywords: |
Image Analysis, Image Segmentation and Marking |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
SEMI-SUPERVISED INTERACTIVE IMAGE RETRIEVAL METHOD BASED ON AVERAGE
ABSOLUTE DEVIATION |
Author: |
K. VENKATASALAM, Dr. P. RAJENDRAN |
Abstract: |
Content Based Image Retrieval has recently gained more attention because of its
number of applications in Image Management, Medical databases and Web search. A
wide range of solutions based on relevance feedback technique have been
implemented in the recent past to handle various issues in CBIR. All the
existing feedback technique gives privilege to user’s view point for semantic
analysis of the Image. Semantic Analysis of the Image can also be done by
quantifying the lower level features. In this paper, we propose a statistical
based method known as Average Absolute Deviation is used to quantify the gray
scale information in the ROI image. The acquired image has been processed to
extract two different feature vectors, one consisting of gray scale image and
other one consisting of Gabor image of the gray scale intensity. The extracted
ROI image from the acquired image is divided into arbitrary number of parts
according to the size of the image. This AAD method quantifies the feature
information of the sub image of
the both ROI image and filtered ROI image. Matching between Query Image and
Reference Image is done based on Euclidean distance. The performance evaluation
of this proposed method is analyzed by comparing it with the existing methods in
the literature to show the achievement in terms of accuracy and processing
speed. |
Keywords: |
Image Retrieval, Deviation, ROI, ADD, Accuracy, Processing Speed |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
SECURE EMBEDDED WEBSERVER WITH INTERNET CONTROL MESSAGE PROTOCOL |
Author: |
J.JAYACHANDRA BENSAM, Dr.T.JAYASINGH, Dr.S.RAVI |
Abstract: |
Embedded system based real time process control and monitoring requires several
critical issues to be intrinsically taken care to avoid fatal error. Issues of
concern include avoiding OS crash, avoiding fragmented frames, place proper
section of code in critical section, implement the different activities as
tasks, etc. In this paper, an embedded webserver using LPC1768 is implemented
using Internet Control Message Protocol (ICMP) and the algorithms are written
such that, OS crash due to ICMP echo message limit violation, is avoided. The
ICMP frame length is monitored and only unfragmented frames are received. |
Keywords: |
ICMP, Secure Transmission, Network Speed, Error Reduction, Ping of Death |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
PAPR REDUCTION TECHNIQUES IN OFDM SYSTEMS USING DCT AND IDCT |
Author: |
S. SUJATHA P. DANANJAYAN |
Abstract: |
Orthogonal frequency division multiplexing (OFDM) has gained much popularity in
the field of wireless communication because of its ability to transfer the data
at higher rate, high bandwidth efficiency and its robustness to multipath. Since
OFDM has high Peak to Average Power Ratio (PAPR) as major limitation, many
techniques were proposed to reduce it. In this paper, a DCT based modified
selective mapping (SLM) technique is proposed to reduce the PAPR of the
transmitted signal and its PAPR reduction performance compared with that of IFFT
based modified SLM technique, IDCT based modified SLM technique and IDST based
modified SLM technique. The proposed technique for PAPR reduction grants an
improvement over the existing IFFT. |
Keywords: |
OFDM, PAPR, Selective Level Mapping, Discrete Cosine Transform, IDCT, IDST |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
FUSION AFFINE MOMENT INVARIANTS AND WAVELET PACKET FEATURES SELECTION FOR
FACE VERIFICATION |
Author: |
K. MEETHONGJAN, M. DZUlKIFLI, PHILL KYE REE, Mi Yong Nam |
Abstract: |
Face recognition under changing lighting conditions is a challenging problem in
computer vision. The effect of pose and illumination on face images result in a
low accuracy rate in the face verification system. In this paper, we proposed a
new framework for solving the above problem and increase the recognition rate of
the system. This framework performed on a two dimensional (2D) grayscale face
dataset based on the combination scheme that consists of the Voronoi diagram
(VD), wavelet packet transform (WPT), affine moment invariants (AMIs) and radial
basis function (RBF). The preprocessing technique consists of square
morphological, Gaussian low-pass filter, median filter, and histogram
equalization, which is applied to solving the problem of pose and illumination
on facial images. The face crop is obtained with an arbitrarily window template
that is designed by using the distance of eyes, nose, and mouth. All face images
reduced the information by transformation with the WPT. The AMIs were applied to
select the unique features that are used to classify and verify on the RBF
neural network. This work was used on the bed face dataset for experimental use,
which yielded good recognition rates and was easily implemented when compared
with another technique. The result showed the efficiency of the wavelet
coefficient and affine moment invariant features that can be used to verify an
image lacking illumination. |
Keywords: |
Face Recognition; Voronoi Diagram; Wavelet Packet Transform; Affine Moment
Invariants: Feature Selection |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMPACT OF SHOPPER MARKETING ON PURCHASE DECISIONS OF INFORMATION
TECHNOLOGY DEVICES FOR PERSONAL USE BY INDIAN CONSUMERS |
Author: |
D.DAVID WINSTER PRAVEENRAJ, J.ASHOK |
Abstract: |
The main objective of this study is to analyze the impact of shopper marketing
elements on the purchase decisions of the Indian consumers in purchase of
Information Technology Devices. The study focuses on the purchase behvaiour of
Indian consumers in the purchase of domestic hardware devices like desktops,
laptops, Smart phones and Tablets. This study has also taken into consideration
about the purchase of peripherals like printers, modems etc Consumer behavior is
an important consideration by any marketer when constructing a marketing plan.
The important phase of purchase behavior exhibited by consumers about which
every marketer would be eager to know and influence is the purchase decisions
made by them. This article is discusses the impact of some of the elements of
shopper marketing on purchase decisions made by Indian consumers in purchase of
Information Technology Devices. 250 respondents which visited a retail outlet
were interviewed about the role the elements like store atmospherics, in-store
promotions and the sales persons played on influencing their purchases. Personal
interview method was adopted using a structured questionnaire as a tool for data
collection. A model was proposed and validated through Structural Equation
Modeling. The result of the study shows a direct causal relationship of these
shopper marketing elements on the purchase decisions of the consumers. |
Keywords: |
Information Technology products, Sales persons, In-store Promotions,
Atmospherics, Structural Equation Modeling |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
ASSESSMENT OF INNOVATION VALUE CHAIN IN ONE OF MALAYSIA PUBLIC RESEARCH
INSTITUTES AND GOVERNMENT AGENCIES |
Author: |
ISHAK,I.S., ALIAS,R.A., ABU HASSAN,R., BASARUDDIN,S., SURADI,Z |
Abstract: |
Innovation has long been recognized as an important driver and cultivator for
organization growth and production of quality new product and services. There
are several innovation measurement models or frameworks that can be used to
assess innovation. Innovation value chain is one of the assessment tools that
can be used to assess innovation process in a given organization. The innovation
value chain assessment finding can be used to help organization identify the
weaknesses of the innovation process in the organization. This paper presents
the status of innovation value chain in one of Malaysia Public Research
Institutes and Government Agencies and proposes guidance on how to improve on
the identified weaknesses. A survey questionnaire was sent to 140 staffs in an
organization representing one of Malaysia Public Research Institutes and
Government Agencies. The finding of the study shows that there existed an
innovation culture in the selected organization which promotes innovation within
the organization. However, they need to improve on some of areas related the
processes along the idea generation, conversion and diffusion phase. The result
of this research shows that there existed weaknesses and recommends a guidance
that could be beneficial for organization that have same problem scenario. |
Keywords: |
Innovation, Innovation Value Chain, Innovation Management Improvement, Research
Institutes, Government Agencies |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
CONTENT-BASED SEMANTIC WEB SERVICE DISCOVERY, AN EMPIRICAL ANALYSIS WITH
IMPLEMENTATION |
Author: |
A.GNANASEKAR, R.M.SURESH |
Abstract: |
Web Service discovery and composition is one of the key objectives of Service
Oriented Architecture (SOA) which provides a loosely-coupled environment and
enables flexible assembly of existing web services. Service discovery plays a
vital role in the overall process of the service discovery and composition. The
Web Ontology Language for Services (OWL-S) has emerged as the de facto standard
for implementing business process from existing semantic web services. The
semantic discovery is a challenging problem and attracts much attention both
from industry and academia. This work focuses on the semantic web service
discovery using empirical analysis. |
Keywords: |
Semantic Web Services, Service Discovery, Ontology, Service Oriented
Architecture, OWL-S |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
SECOND PRICE AUCTIONING FOR EFFECTIVE UTILISATION OF GRID RESOURCES |
Author: |
THIRUNAVUKKARASU, G.K.S. KARUPPASAMI |
Abstract: |
In dynamic environments, if the number of users gets increased, then the
workload increases thereby making the management of resources a tedious task.
This demands the utilization of economical grid computing model for effective
allocation of resources. In the proposed work, a second price auction mechanism
is considered to employ a pricing mechanism that is incentive compatible. Such
mechanisms ensure that the users’ self-interests are maximized when they
honestly reveal their preferences to the allocation mechanism. It can further
provide powerful guarantees about optimal user behavior and can deliver highly
efficient allocations. The method is very efficient and also it elicits honest
information from the participants thereby successfully managing the resource
allocation in the Grid environment. A Gossip based mechanism is also considered
in the proposed work in order to reduce the overheads caused by the waiting
queues |
Keywords: |
Auction, Grid, Economic Model, Resource Scheduling, Gossip. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENERGY BASED SPECTRUM SENSING, POWER SPECTRUM ESTIMATION AND PAPR ANALYSIS
FOR COGNITIVE RADIO NETWORKS |
Author: |
B. SUSEELA, D.SIVAKUMAR |
Abstract: |
An electro magnetic spectrum is the source for all wireless communication.
However, communication in this medium is often interrupted by complications such
as hidden terminal problem. noise uncertainty and channel uncertainty. In order
to provide an efficient solution, in this paper, we propose an energy based
spectrum sensing, power spectrum estimation and analysis for cognitive radio
networks. In this technique, two hypothesis are used to identify the presence
and absence of primary users in the channel. When the channel is not used by
primary users the slots are allocated for secondary users. Further, power
spectrum is estimated by means of five different methods. Finally, PAPR analysis
is performed using the complementary cumulative distribution function (CCDF).
The proposed technique is simulated in MATLAB. |
Keywords: |
Electro Magnetic Spectrum, CCDF, PAPR, Wireless Communication, Power Spectrum |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
SENSITIVITY ANALYSIS OF CREW SKILL TO MAINTENANCE COST AND RELIABILITY FOR
MAIN ENGINE SUPPORT SYSTEMS USING SYSTEM DYNAMICS |
Author: |
DIDIET SUDIRO RESOBOWO, LAHAR BALIWANGI, KETUT BUDA ARTANA, AAB DINARIYANA |
Abstract: |
System operation and maintenance always depends on system components’
characteristic. Further, components which build a system yield unique system
behaviors beside the components operation and maintenance condition. The
objective of paper presented here is to identify and understand behavior of
component and as well behavior of system under various operation and maintenance
policies and to understand the sensitivity of crew skill in determining the
reliability and maintenance policy. The model developed here can be directed to
give maintenance policy options to the management as decision maker and further,
to provide picture on impacts of those options. This work presents a user
friendly and easy model to simulate the effect of various operation and
maintenance plans to the system reliability, operation cost, and maintenance
cost, as well as the sensitivity of crew skill in affecting the maintenance
schedule and the system reliability. For each plan of operation and maintenance,
this simulation models failure rate, time to maintain, decision whether to
maintain or not, degree of how good maintenance done, effect of component after
maintenance to the system, maintenance cost, and operation cost. A case study of
main engine cooling system is presented using previous works data [1]. The
simulation shows prognostic results for a given scenario of system
configuration, operation, and maintenance plan. |
Keywords: |
System Dynamic, Ship Maintenance, Crew Skill, Reliability, Maintenance Cost |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN ANALYSIS FOR A CLUSTER TREE ZIGBEE TOPOLOGY |
Author: |
DR.MAYYADA HAMMOSHI, DR.AWNY SAYED |
Abstract: |
ZigBee or IEEE 802.15.4 is considered as a unique communication standard
developed for wireless personal area network. Zigbee is a low-rate (LR)
communication network which provides flexibility, very low power consumption,
ease of installation, reliable data transfer, short range operation, acceptable
battery life, low data rate in an ad hoc self-organizing network among
inexpensive fixed, and portable moving devices. It is developed for applications
with relaxed throughput requirements which cannot handle the power consumption
of heavy protocol stacks.
Zigbee can be embedded in a wide range of products and applications across
consumer, commercial, industrial and government markets.
Zigbee can be considered as a promising technology which has a strong impact of
the development of Wireless Sensor Network since this technology is taking care
of the power energy and the communication overhead.
In this paper, a cluster tree topology for 3 PAN coordinators supported by OPNET
17.5 is implemented.
The aim of the study is to tests mobility, nodes leaving a network, and nodes
joining a new network by measuring number of performance factors. The measured
factors are: throughput, delay, load, data traffic received, end to end delay,
number of hops and data traffic sent. The results showed that the PAN 2 behaved
as the best tree among the cluster tree topology when compared with the other
PAN s networks. The other studied issue is the mobile nodes behavior and moving
among the PANs. |
Keywords: |
ZigBee, WPAN, Tree, Mesh, Star, cluster tree, WSN |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
INTELLIGENT USER INTERACTIVE MODEL FOR REAL TIME TEXT-GRAPHIC GENERATION |
Author: |
S.DEEPA, Dr.P.KUMAR |
Abstract: |
Real-time graphic generation from text inputs has visited by various researchers
and many methods have been proposed earlier in this decade to simplify the task
of graphic generation. But still the problem of providing sophisticated and
accurate has not been met with any of the solution provided. We propose an
intelligent interactive framework to generate graphics by processing the text
input and the text processor interactively acquires the necessary parameters of
the object to be generated on graphics which supports the user on generating
quality graphics. The presented model has three components namely interactive
text processor, Hybrid Property Manager and Graphics Generator. The hybrid
property manager maintains multi object properties in hybrid nature using which
the text processor acquires the necessary values for the properties of any
object mentioned. Upon receiving a text input the interactive text processor
identifies the set of objects mentioned in the input, and for each object
provided it requests the level by level property value acquisition using hybrid
property manager. The acquired values of object properties will be given for the
graphic generator, which generates graphics based on object properties. The
proposed model has produced higher accurate results and supported user, to make
graphics easier. |
Keywords: |
Text to Scene, Story Visualization, Graphic representation, Hybrid Object
Properties |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NEGATIVE ASSOCIATION RULES FOR WEB USAGE MINING USING NEGATIVE SELECTION
ALGORITHM |
Author: |
R. GOBINATH, M. HEMALATHA |
Abstract: |
The immense capacity of web usage data which survives on web servers contains
potentially precious information about the performance of website visitors.
Pattern Mining involves applying data mining methods to large web data
repositories to extract usage patterns. Due to the emerging reputation of the
World Wide Web, many websites classically experience thousands of visitors every
day. Examination of who browsed what can give necessary approach into the buying
pattern of obtainable customers. Right and timely decisions made based on this
acquaintance have helped organizations in accomplishing new heights in the
market. The aim of discovering rules in Web log data is to obtain information
about the navigational behavior of the users. This can be used for marketing
purposes, dynamic creation of user profiles, finding user pattern navigation,
etc. This suggested study, particularly focuses on examining an efficient
algorithm for mining negative association rules from the clustered weblog
navigational patterns. The algorithm indicates traditional association rules to
include negative association rules to be an alternative for using positive
association rule itself. When mining negative association rules take place, the
same minimum support vestibule is used to mine frequent negative item sets. The
rules gathered in such a manner are bridged by applying a negative selection
algorithm, which helps in discovering all convincing negative association rules
quickly and solves some of the limitations in traditional association rule
mining.The experimental result reveal the proposed work to be highly effective. |
Keywords: |
Data Mining, Web mining, Web Usage Mining, Association Rule Mining, Negative
Selection Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
FACE RECOGNITION USING SEMI DISCRETE DECOMPOSITION AND FLDA FOR SINGLE
TRAINING IMAGE PER PERSON |
Author: |
C.RAJAKUMAR , DR.K.R.SHANKAR KUMAR |
Abstract: |
PCA and FLDA are mainly used in face recognition and feature extraction. PCA
uses eigen vector and FLDA uses within class scatter matrix and between class
scatter matrix. When within class matrix becomes singular, it cannot be
evaluated. A new method called semi-discrete decomposition is used in single
image per person problems. The performance of this method is tested on 4-data
bases, namely ORL, UMIST, Poly u-NIR, YALE. The proposed method performs better
than SVD based approach and QRCP based approach in terms of recognition rate
with training times in two times higher than QRCP. |
Keywords: |
Face recognition, Fisher Linear Discriminant Analysis, Semi Discrete
Decomposition, Singular Value Decomposition. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
VLSI DESIGN OF FLOATING POINT ARITHMETIC & LOGIC UNIT |
Author: |
DHANABAL R , BHARATHI V, G.SRI CHANDRAKIRAN , BHARATH BHUSHAN REDDY .M |
Abstract: |
In most modern general purpose computer one or more Floating Point Units are
integrated with the CPU, however many embedded processors, especially older
designs, do not have hardware support for floating point operation. In this
paper, the design of DSP module such as floating point ALU is presented. The
functions performed are handling of floating point data and converting data to
IEEE 754 format and can perform arithmetic operations like Addition, Subtraction
Multiplication and Division. The Simulation tool used is Model Sim for verifying
functional simulation. The tool for synthesis and power analysis is Quartus II |
Keywords: |
XOR, Full adders, XNOR, PTL, XOR-XNOR |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMPLEMENTATION OF DATAWAREHOUSE, DATAMINING AND DASHBOARD FOR HIGHER
EDUCATION |
Author: |
RUDY, EKA MIRANDA, ELI SURYANI |
Abstract: |
Today, most of the higher education institutions have been supported by
integrated information systems for all activities, such as lecturer recruitment,
marketing, student admission, student registration, academic operations, and
alumni system. Higher education information system generates many transactional
data; and the amount of those data is increased day by day, but the use of data
has not been explored optimally. Each data stored at data storage media is
issued for separate purposes. On the other hand, a higher education organization
needs to gain overall knowledge from all data. Based on these conditions,
organization needs an analytical tool to extract information and discover
valuable knowledge from huge amount of data. These processes require more
processing time and more complex process. The purpose of this research was to
design the data warehouse model and dashboard for analytical tool and use data
mining technique for higher education institutions. The research method began
with designing the knowledge needs; designing and developing transformation
model to data warehouse; using data mining techniques and designing dashboard
for analytical tool. The obtained result was the model of data warehouse, data
mining and analytical tool for higher education institution that will improve
institution’s performance, and help them to improve analytical and decision
making process. |
Keywords: |
Datawarehouse, Data Mining, Analytic Tools, Higher Education, Dashboard |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
LOW POWER AND AREA- EFFICIENT HALF ADDER BASED CARRY SELECT ADDER DESIGN
USING COMMON BOOLEAN LOGIC FOR PROCESSING ELEMENT |
Author: |
R DHANABAL, DEEPIKA SRIVASTAVA, BHARATHI V |
Abstract: |
Carry select adder is the one among the fastest adder used in the data
processing element however conventional carry select adder(CSLA) are still
area-consuming due to multiple pair of Ripple carry adder structure. This
proposed work is solely dedicated to develop a low power and area efficient half
adder based carry select adder architecture (CSLA) using common Boolean logic (CBL).
It only needs one Half-adder to perform summation operation for carry zero and
common Boolean logic (CBL) for carry one respectively. Half adder has been
designed using one XOR gate and one AND gate. CBL needs only one OR gate and one
NOT gate. Through the multiplexer, we can select the correct output in the final
stage according to the logic state of the carry-in- signal. Based on this
modification 8-bit, 16-bit, 32-bit, 64-bit square root carry select adder (SQRT
CSLA) architecture has been developed and compared with the regular SQRT CSLA
structure and modified SQRT CSLA has been developed using binary to excess-1
converter (BEC). This proposed design on an average reduces area by 53.77%,
power consumption by 93% and power-delay product (PDP) by 75.71%, but with some
amount of increase in the delay as compared with regular SQRT CSLA architecture.
The result analysis shows that the proposed CSLA architecture achieves better
performance in term of area, power and power-delay product than the regular and
modified SQRT CSLA structure. |
Keywords: |
ASIC, CSLA, RCA, BEC, Boolean-logic, Area-efficient, Low power. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
SECURE KEY EXCHANGE IN NEW MULTI-PARTY IDENTITY-BASED AUTHENTICATED KEY
AGREEMENT PROTOCOL |
Author: |
P.R.VIJAYALAKSHMI , K. BOMMANNA RAJA |
Abstract: |
Today’s computing environments such as internet conferencing, distributed
simulation, multi-user games, and many more applications involve dynamic peer
groups. Communication among dynamic peer groups must be secure and, at the same
time, fast and cost effective. In an internet conference, all participants
together establish a common conference key to enable multi-party and secure
exchange of messages. The proposed protocol is executed by considering the basic
login issues, session validation and formulated key generation with balanced
multiple tables. The secret information of a user cannot be determined from the
corresponding public information, therefore ensures privacy. Also, computing
using bilinear mapping imposes a greater computational cost on a protocol, to
improve the efficiency the bilinear mapping is utilized only during the session
key computation. |
Keywords: |
Conference Key, Dynamic Peer Groups, Secure Communication, Bilinear Mapping |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
FROM A LITERATURE REVIEW TO A CONCEPTUAL FRAMEWORK FOR AUTOMATION
KNOWLEDGE ACQUISITION IN SUPPLY CHAIN MANAGEMENT |
Author: |
MOHAMMAD ZAYED ALMUIET, JUHANA SALIM |
Abstract: |
In supply chain management, both academic and corporate interest concerning
knowledge acquisition has shown an increasing trend in the past few years. This
is evidenced by the significant amount of research written and published in
journal special issues. In response to this trend, the present study has two
objectives – first, it offers to provide an overview of literature concerning
knowledge types and knowledge acquisition in the context of supply chain
management discussed in 47 papers from the years 2001 to 2013. Second, it
develops a conceptual framework that summarizes this field of research into four
parts. Initially, knowledge types and AI techniques are highlighted, which leads
to two specific perspectives: (1) supply chain knowledge, and (2) automation of
knowledge acquisition for supply chain management. Companies’ practitioners and
academics may avail of the review as it provides an overview of the fundamental
research streams in the area. It then explains certain features of knowledge
acquisition in the context of supply chains and the existing research
limitations which could lead to future studies. |
Keywords: |
Knowledge Acquisition, Characteristics of Knowledge, Supply Chain Knowledge,
Knowledge Types, Artificial Intelligent Techniques |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE DESIGN OF KNOWLEDGE MANAGEMENT SYSTEM MODEL FOR SME (UKM) |
Author: |
YULIANA LISANTI, DEVYANO LUHUKAY |
Abstract: |
Studies on knowledge management showed that the knowledge management plays an
important role to improve SME’s performance, as knowledge or Information is one
of innovation driver that will support the SME competitiveness. Therefore, in
this study, together with KOPWANI UKM (SME) the team has designed a solution to
manage the SME knowledge, called as SME Portal, which is a Knowledge Management
System for SME. Furthermore, we also combined the Knowledge management system
with social networking capability, as SME Portal members will get more benefit
from the system namely to promote their products, to open business opportunities
by extending their business networking, to find solution of their business
problems. |
Keywords: |
Knowledge Management, Information, SME, Innovation, Knowledge Management
System, SME Portal, networking |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
METAL LINE DETECTION: A NEW SENSORY SYSTEM FOR LINE FOLLOWING MOBILE ROBOT |
Author: |
M.Z.A RASHID, H.N.M Shah, M.S.M Aras, M.N.Kamaruddin, A.M. Kassim,
H.I.Jaaafar |
Abstract: |
This paper presents a new type of line following robot that uses metal sensor to
detect metal line and maneuver around based on that line. The paper focused on
developing the hardware model of automated guide vehicle (AGV) system and
integrating it with metal detection sensor. The system performance is measured
in a straight line movement and when the robot turns at specific degrees.The
metal line following robot can be used to move objects in daily life operation,
warehouse operations or manufacturing facility to any desired location
automatically. A metal line with certain length can be placed on the desired
floor to indicate the path that the robot requires to move. Based on the
experimental studies, it showed that the mobile robot can maneuver and track the
metal line that is attached on the floor by utilizing three inductive proximity
sensor located in front of the robot. This sensory system can be used as
alternative sensor instead of using line following sensor which normally based
on the infrared proximity detector. The line following robot that operates based
on the metal line capable to overcome the problem of different light intensity
reflection. |
Keywords: |
Mobile Robot,Metal Line Detection System, Inductive Proximity Sensor,Line
Following. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENHANCED SCENARIO-BASED EXPERIMENTS TO OVERCOME BYZANTINE ATTACKS IN MANET |
Author: |
G.MURUGABOOPATHI, D.RAJALAKSHMI, R.JAYANTHAN |
Abstract: |
MANETs are unplanned, self-configuring network composed of mobile nodes that
utilize mesh networking principles for inter-connectivity. MANETs are IP
networks made up of a collection of wireless and mobile nodes communicating via
radio links that can temporarily form a network whenever they coexist in the
same neighbourhood without any fixed infrastructure such as base stations for
mobile switching and no centralized administration. Generally the nodes have a
limited transmission range, such that each node seeks some assistance of its
neighbouring nodes to forward packets. The main problem in MANETs is the
security which is because of the open nature and no fixed topology of the MANET
environment. One of the primary goals of designing secure routing protocols is
to prevent a compromised node from disrupting the route discovery and
maintenance mechanisms. However, this added security comes at the cost of
performance. This paper evaluates the performance of a secure routing protocol
to overcome byzantine attacks using scenario-based experiments. |
Keywords: |
Mobility, Ad-hoc, Security, Routing, Cryptography, MANET |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
HARMONIC OPTIMIZATION IN CASCADED MULTI LEVEL INVERTER USING FIREFLY
ALGORITHM |
Author: |
TAMILSELVAN R, PADMATHILAGAM V |
Abstract: |
This paper presents the elimination of selected harmonics in a Cascaded
Multilevel Inverter (CMLI) considering the non-equality of separate DC sources
and by using Firefly Algorithm. As these equations are non-linear, asymmetric
and transcendental in nature, there may exist simple, multiple or even no
solution for some modulation indices │M│. Solving a non-linear transcendental
equation set describing the harmonic elimination problem with non-equal DC
sources using the conventional methods reaches the limitation of contemporary
computer algebra software tools. The approach proposed in this paper using
firefly algorithm can be applied to solve the problem in simpler manner even
when the number of switching angles is increased when the determination of these
angles using the conventional approach is not possible. To find feasible
switching angle for all modulation Indices, to get quality output voltage by
reducing the parameters like Total Harmonic Distortion (THD), Harmonic
Distortion (HD), Crest Factor (CF) and Distortion Factor (DF) and to reduce the
analysis time Firefly algorithm is used. The results are shown graphically for
better understanding and to prove the effectiveness of the method. An
eleven-level cascaded multilevel inverter is simulated in MATLAB and presented
to validate the computational results. |
Keywords: |
Cascaded Multilevel Inverter, Firefly Algorithm, Selective Harmonic Elimination
(SHE). |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
MODELING AND SIMULATION OF SHUNT APF WITH HYSTERISIS AND FUZZY LOGIC
CONTROLLER WITH AND WITHOUT FAULTS |
Author: |
BHARATH KUMAR NARUKULLAPATI, P.V.S.SOBHAN, CH.N.NARSIMHA RAO,
A.SRIHARIBABU |
Abstract: |
Active power filtering constitutes one of the most effective proposed solutions
for solving the harmonics problem in electric power systems. A shunt active
power filter that achieves low current total harmonic distortion THD, reactive
power compensation, and power factor correction is presented in this paper. The
topology is based on IGBT's VSI, intended to damp harmonics produced by a diode
rectifier. The notch filter method, consisting solely of two serial band-pass
filters, is used for reference current calculation, and the application of
hysteresis band controller and fuzzy logic controller for better active filter
current control accuracy. The compensation process is based on sensing line
currents only, an approach different from conventional methods, which require
sensing of harmonics or reactive power components of the load. Simulation works
of the studied model, using SIMULINK under MATLAB software, revealed satisfying
results in transient and steady states. |
Keywords: |
Shunt Active Power Filter (SAPF), Voltage Source Inverter (VSI), Fuzzy Logic
Controller, Hysteresis Band Controller, Total Harmonic Distortion (THD), Notch
Filter. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN & DEPLOYMENT OF TESTBED BASED ON ICMPv6 FLOODING ATTACK |
Author: |
REDHWAN M. A. SAAD, 1SELVAKUMAR MANICKAM, ESRAA ALOMARI, MOHAMMED ANBA,
PARMINDER SINGH |
Abstract: |
One of the important protocols in IPv6 implementation is ICMPv6 which is used
for neighbor and router discovery. However, this protocol also could be used by
attackers to deny network services like ICMPv6 flood attacks which network
decreases performance.
In ICMPv6 flooding attacks detection, behavioural-based approaches, particularly
suffer from the unavailability of the benchmark datasets. This can lead to the
lack of precise results evaluation of ICMPv6flooding attack detection systems,
comparison, and deployment, which originates from the deficiency of adequate
datasets. Most of the datasets in the IPv6 field are from local environment and
cannot be used on a large scale due to privacy problems and do not reflect
common trends. They also lack some statistical features. Therefore, there is not
any available benchmark dataset infected by ICMPv6-based foods for performing a
Denial of Service (DoS) attacks against Web servers by using ICMPv6 flooding
method. In addition, there is no Web access log infected by ICMPv6-based flood
available for researchers.
This paper presents the ICMPv6-based flooding attacks testbed to study the
behaviour of ICMPv6 flooding attack as well as evaluating different solutions
proposed for detecting ICMPv6-based flood of DoS attacks by various researchers. |
Keywords: |
ICMPv6 flooding attacks, Denial of Service attacks, IPv6 testbed Network. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN ENHANCED HOMOGENEITY MEASURE BASED SIGNAL VARIANCE ESTIMATION FOR
SPECKLE REMOVAL IN ULTRASOUND IMAGES |
Author: |
NIRMALADEVI PERIYASAMY, ASOKAN RAMASAMY |
Abstract: |
Estimation of signal variance in noisy environment is a critical issue in
wavelet based image denoising algorithms. As the estimation of signal variance
involving all the coefficients in a sub-band is computationally inefficient, an
adaptive homogeneity measure based on maximum likelihood approach is used to
determine the weighted estimate of the signal variance. This estimation is
carried out by exploiting the intra scale and inter scale dependencies that
exist among the wavelet coefficients in the same scale and at adjacent scales. A
novel inter scale dependency measure is proposed in this paper. This measure is
multiplied with the noisy detail subbands. The resulting subband matrix is used
for signal estimation. An adaptive thresholding function instead of soft
thresholding function with a subband adaptive Bayesian threshold is used. The
adaptive thresholding function removes the fixed bias that results from soft
thresholding operation between the denoised and original coefficients, thus
preserving the original features effectively. Thus the proposed approach
improves the denoising performance by using an adaptive threshold estimated via
a locally estimated signal variance. Various performance measures are
experimentally calculated and compared with several filters. |
Keywords: |
Homogeneity Measure, Inter And Intra Scale Dependencies, Wavelet Thresholding,
Speckle Noise, Ultrasound Images |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
A SUPPORT VECTOR SIGNAL PROCESSING MODEL FOR HEART MURMUR BASED
CLASSIFICATION WITH HARDWARE IMPLEMENTATION |
Author: |
P.S.RAJAKUMAR, S.RAVI , R.M. SURESH |
Abstract: |
A prototype of a simple and non-invasive system for remotely monitoring the
heart sounds (improved phonocardiography) that includes heart auscultation
monitoring /hearing is discussed. The frequency and component analysis are
integrated with classification schemes to identify the normal and pathological
heart sound patterns. The monitoring of the heart sound is an area of research
and if interpreted effectively can be useful for clinical interpretation along
with cardiac diagnosis like ECG, Phonocardiography and other similar techniques.
In this research, frequency, spatial, dimensional data reduction
analysis/combined with popular classifier schemes to identify normal and
pathological heart sound. The objective of the research work is to provide
interpretation, which is of great use to the medical experts. In our research
work, the audio part happening in the cardiac cycle is extracted. Hardware
implementation with linux kernel is also presented. |
Keywords: |
Mermur Recognition, Vector Signal Processing, Heart Sound, Hardware
Implementation. |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT FLOATING-POINT MULTIPLIER DESIGN USING COMBINED BOOTH AND
DADDA ALGORITHMS |
Author: |
DHANABAL R, BHARATHI V, NAAMATHEERTHAM R SAMHITHA, 4PAVITHRA S, PRATHIBA
S, JISHIA EUGINE |
Abstract: |
This paper includes the design of efficient double precision floating-point
multiplier using radix-4 Modified Booth Algorithm (MBE) and Dadda Algorithm.
This hybrid multiplier is designed by using the advantages in both the
multiplier algorithms. MBE has the advantage of reducing partial products to be
added. Dadda scheme has the advantage of adding the partial products in a faster
manner. Our main objective is to combine these two schemes to make the
multiplier design power efficient and area efficient. The floating-point
multiplier is designed using Verilog HDL. The design is simulated using Altera
ModelSim and synthesized using Cadence RTL compiler in TSMC 45 nanometre
technology. It is found that multiplier has reduced power and area and it
consumes 4619.23 and 34880 . |
Keywords: |
Floating Point Multiplication, Dadda Reduction, Modified Booth, Computer
Arithmetic |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EXPLORATION OF CHANGE DETECTION TECHNIQUES FOR IMAGES |
Author: |
SANTWANA SAGNIKA, SAURABH BILGAIYAN, SUBHASHREE MISHRA, BHABANI SHANKAR
PRASAD MISHRA |
Abstract: |
Change detection refers to recognizing dissimilarities arising in the
characteristics of an object, over a period of time. Widespread application of
change detection in areas like remote sensing, machine vision, video
compression, military reconnaissance, etc. has made it demanding area of
research. In image processing, detecting changes is an essential and crucial
component. Several techniques like image differencing, principal component
analysis, object based methods, visual analysis, etc. have been applied
successfully and some new techniques like clustering, probabilistic change
detection, hyperspectral detection, etc. are currently under active research.
This paper analyses various traditional and emerging techniques that efficiently
detect changes in different kinds of images and explores the suitability of each
method for respective areas. |
Keywords: |
3D Images, Change Detection, Hyperspectral Images, Image Processing,
Multispectral Images, Object-Based Change Detection, SAR Images |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NEW APPROACH TO TRUST EVALUATION FOR CLUSTER BASED MANETS |
Author: |
RAJKUMAR MYLSAMY, SUBRAMANIAN SANKARANARAYANAN |
Abstract: |
A Mobile Ad hoc NETwork (MANET) is a pool of independent, dynamic, wireless
devices that forms a network, devoid of no permanent infrastructure. This
inherent features and wireless nature of mobile ad hoc networks makes them
vulnerable to a wide variety of attacks. To discover routes with trusted nodes,
we propose an approach for constructing a route without malicious nodes. To
forward packets through trusted nodes, this protocol evaluates various trust
parameters of neighboring nodes. To prevent a node from same attack, a weight is
calculated and assigned dynamically. Simulations are done using NS2 simulator.
Our proposed approach has been analyzed and evaluated for performance metrics
such as packet delivery ratio, control overhead, packet drop ratio, jitter and
end to end delay. Dynamic weight assignment of individual trust parameters
reduces end to end delay and control overhead resulting in less packet drop
ratio and high packet delivery ratio. We compare our work with other clustering
algorithms, which are CBTRP and 2ACK. Our analysis and simulation result
clarifies that, the proposed work effectually identifies and isolates malicious
nodes and it outperforms the other algorithms. |
Keywords: |
Mobile Ad hoc Network, Clustering, Network security, Privacy, Routing protocol |
Source: |
Journal of Theoretical and Applied Information Technology
30 June 2014 -- Vol. 64. No. 3 -- 2014 |
Full
Text |
|
|
|