|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2014 | Vol. 69 No.1 |
Title: |
PRIORITIZATION OF CENTRALITY MEASURES IN PROTEIN-PROTEIN INTERACTON NETWORK FOR
DISEASE GENE IDENTIFICATION |
Author: |
APICHAT SURATANEE |
Abstract: |
For several years, many studies attempt to discover biological processes of
disease mechanisms. Nevertheless, they are still far from completeness of
understanding. This problem is caused by the complexity of complex diseases. To
solve this problem, many computational methods have been developed to predict
uncovered disease genes. A lot of genetic information from protein interaction
network, gene expression, and genetic sequences has been integrated. With these
approaches, a large number of candidate genes are produced increasingly.
Therefore, a technique that can select only relevant genes is needed. Ranking
techniques have been developed to prioritize the candidate genes. Still, the
results are inconsistent among different methods. These incompatibilities might
be caused from different types of features. In this study, we performed a
prioritization analysis for investigating network topology features for
predicting disease-related genes. Four standard network topological features
were calculated on a protein-protein interaction network and examined with 46
groups of diseases. The features were ranked independently according to their
values for a disease. Then, the performance of disease gene classification with
each feature was calculated. The results showed high classification performance
in three diseases with different network features. The closeness centrality
showed a superior ability to classify disease genes in overall disease groups.
Selecting relevant features can greatly improve the performance in disease gene
classification. |
Keywords: |
Feature Prioritization, Disease Gene Identification, Protein-Protein Interaction
Network, Network Topology Features |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS OF DC-DC CONVERTER WITH MULTIPLIER CELLS FOR HIGH VOLTAGE GENERATION |
Author: |
K.J ANOOP, SAPAM ROSHINI DEVI, Dr. V.RAJINI |
Abstract: |
This paper emphasizes the design of a DC-DC converter to produce high voltage
from a low input DC voltage by using multiplier cells instead of a transformer.
The low input DC voltage is converted to AC with the help of four switches
operating in two different frequencies. Further, this AC voltage is given to the
voltage multiplier cells for desired high output DC voltage. The output DC
voltage produced has high efficiency, high voltage gain, low ripple, low
switching losses and less noise. Two independent frequencies operate in this
system, one is known as modulating frequency and the other is alternating
frequency which work in high level and low level respectively. A prototype of
the proposed model is constructed and the output is compared with the simulated
model. The model is again reconstructed by a feedback control for constant
output with variable input voltages. |
Keywords: |
Voltage Multiplier, Multilevel Inverter, DC-DC Converter, High Voltage Gain,
feedback Controller |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
COST EFFECTIVE SOLUTION FOR OPTIMAL PLACEMENT AND PARAMETER SETTING OF MULTIPLE
UPFC USING PARTICLE SWARM OPTIMIZATION |
Author: |
K. KUMARASAMY, Dr.R. RAGHAVAN |
Abstract: |
The Unified Power Flow Controller (UPFC) is one of the most important Flexible
AC Transmission System (FACTS) device which is used to improve the stability of
the power system. The performance of the UPFC mainly depends upon the location
and parameters setting of this device in the system. In this paper the location
and parameter setting of the UPFC devices are found using Particle Swarm
Optimization (PSO), such as to obtain improved voltage profile, minimal total
system loss, minimal reactive power transfer and maximization of the stability
limit. Further it proposes a cost effective objective function in which the
coefficients of the system parameters in the objective function are so chosen
that they reflect real time cost or penalty value. The effectiveness of the
proposed objective function is tested in IEEE-30 bus test system with multiple
UPFC devices. The results of optimal placement and size of UPFC using PSO with
cost effective objective function and conventional objective function are
compared. The cost effective objective function provides better results as
compared to conventional solution. |
Keywords: |
FACTS, UPFC, Particle Swarm Optimization (PSO), Stability, Loadability |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
MULTI-HOP UNIFIED ROUTING ALGORITHM FOR ENERGY-CONSTRAINED NETWORKS |
Author: |
C.R.SAKTHIVEL AND DR.S.KARTHIKEYAN |
Abstract: |
The routing and scheduling policies suggest that do not necessitate clear
knowledge of the information of the energy harvesting or the traffic generation
processes, and are able to dynamically learn and adapt to time variations in the
physical and network environments, so as to deliver data rates that are optimal
in the long term. This research acquire hops on ability of the energy storage
devices at the individual nodes that is simply required for getting maximum
throughput in the network and also to calculate the fraction of the throughput
area is reached when the energy storage competence is under limit. Since energy
is a limited resource, various energy-aware routing algorithms have been
suggested to develop network performance. Thus, this research contributed here
to develop a unified routing algorithm known as the Energy-efficient Unified
Routing (EURo) algorithm that contains several combinations of these exceeding
key elements and adjusts to varying wireless environments. |
Keywords: |
Multi-hop Routing, Wireless Ad-Hoc Networks, Energy Constrained,
Energy-Efficient Unified Routing (EURo) |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT IMAGE PROCESSING METHODS FOR MAMMOGRAM BREAST CANCER DETECTION |
Author: |
B.MONICA JENEFER, V.CYRILRAJ |
Abstract: |
Nowadays it is immediate need for best pre-screening tool to identify the
abnormality of the mammogram images in the earlier stage itself. In this paper
it is discussed about a tumor segmentation and classification algorithm from
mammogram. The proposed approach concentrates on the result of two issues. One
is the way to recognize tumors as suspicious regions may be very weak contrast
to the background and the next is the way to concentrate properties which
classify tumors. The proposed technique follows step by step procedures such as
(a) Image Enhancement (b) Tumor Segmentation. (c) The extraction of properties
from the segmented tumor region. (d) The utilization of SVM classifier. The
improvement could be characterized as change of the image originality to a
superior and more reasonable level. The mammogram enhancement can be obtained by
removing the noise and improve the quality of the image using speckle noise
removal and EM algorithm respectively. The most well-known division technique
utilized is Modified Watershed Segmentation method. The features are extracted
from the segmented tumor region and classify the regions utilizing the SVM
classifier. The technique was tried on 100 mammographic images using MIAS and
Apollo hospital based images. The system attained an Accuracy of 98%. |
Keywords: |
Mammogram, MIAS Database, Cancer Detection, Benign, Malignant, Mammogram
Segmentation. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
NEIGHBORHOOD-BASED SEGMENTATION OF BIOMEDICAL IMAGES USING BINOMIAL CLASSIFIER
TREE |
Author: |
A. MOHAMED ANWAR, Dr. C. NELSON KENNEDY BABU |
Abstract: |
Manual segmentation by individual specialists on medical image dataset is
time-consuming, expensive, and suffers from considerable inter and intra rater
inconsistency. In addition segmentation is hard for the individual expert to
combine the information from numerous portions and various channels when multi
spectral data has to be examined. Unsupervised segmentation images as occlusions
of textures, designed based on local histogram is well-suited to a broader class
of images. The model proved that the local histograms were approximately the
convex combinations of the value distributions of its component textures but did
not provide with a richer characterization of textures and the pixel wise
labeling consumed more time. Texture classification of images with multinomial
latent model used a mixture density to obtain spatially smooth class segment.
But better segmentation was not achieved for speckle noisy biomedical images and
the texture classification of images increased the computational cost. To
overcome the poor categorization of texture on medical images, the incorporation
of neighborhood-based segmentation and binomial classifier tree-based sorting
(NS-BCTS) is applied to demonstrate its utility in detecting the noisy speckle
biomedical images in medical imagery. To start with, the neighborhood-based
segmentation displays the features of rich set in terms of shape, position,
color and neighborhood relations. The features extracted are then given as input
to the binomial classifier tree-based sorting, with the data label obtained from
the experts to minimize the time consuming process. The binomial classifier
tree-based sorting examines each collective feature and labels it across the
range to determine the computational cost. The experiment is conducted on
biomedical image (i.e.,) lung cancer dataset with the factors such as time
consumption, computational cost, running time, accuracy and feature
categorization efficiency. |
Keywords: |
Segmentation, Neighbourhood-based segmentation, Binomial classifier tree-based
sorting, Feature Categorization, Local value histograms, Medical imagery. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
A FRAMEWORK FOR EDUCATIONAL DATA WAREHOUSE (EDW) ARCHITECTURE USING BUSINESS
INTELLIGENCE (BI) TECHNOLOGIES |
Author: |
AZWA ABDUL AZIZ, JULAILY AIDA JUSOH, HASNI HASSAN, WAN MOHD RIZHAN WAN IDRIS,
ADDY PUTRA MD ZULKIFLI, SHAHRUL ANUWAR MOHAMED YUSOF |
Abstract: |
Business Intelligence (BI) is the process of getting the right information to
the right decision makers at the right time and in the right format. It is a
platform that supports analysis, reporting and decision making. Educational
Business Intelligence (EduBI) architecture utilizes BI technologies to integrate
various sources of academic data into a single repository (Educational Data
Warehouse – EDW). BI is a useful tool since it reinforces the process of
performance and analysis evaluation that is required within all levels of
educational environment. Nowadays, there are various BI products ranging from
simple reporting technologies to sophisticated BI platforms. Selection of a BI
tool deemed appropriate for a particular task may turn out to be difficult;
hence careful considerations must be made in the selection process. This paper
proposed an EDW architecture that employs the integration of proprietary and
open source BI tools. |
Keywords: |
Data Warehouse, Educational Business Intelligence, ETL, Educational Intelligence |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
DDOS AND DOS PARALLEL ATTACK TRACEBACK BY SPATIAL MARKING TECHNIQUE |
Author: |
PERIYASAMY.S, DURAISWAMY.K |
Abstract: |
The usage of internet is increased day by day when compared to past days.
Because of this increased internet usage, the possibility of loss of data and
cause for providing security to the information in the system is increased. It
leads to the blocking of services results in Distributed Denial of Service (DDoS)
attack. It is identified as the very harmful threat to internet user and
information server. But the router and routing mechanism available in the
network makes the trace back process very difficult. Till now, no paper deals
with efficient trace back of source of attack for DDoS attack. In this paper, we
propose a spatial marking trace back scheme for finding DDoS intruders based on
geographical landscape identification information. The information’s identified
are utilized for the efficient routing of the packets. Also, a comparison with
existing trace back methodology like Geographical Divisional Traceback and
Directed Geographical Traceback is also proposed. |
Keywords: |
DDoS, Spatial marking, Network Security, IP Traceback, Divide and Conquer. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
LEARNING RESOURCES RECOMMENDATION FRAMEWORK USING RULE-BASED REASONING APPROACH |
Author: |
SAOWALUK THAIKLANG, NGAMNIJ ARCH-INT, SOMJIT ARCH-INT |
Abstract: |
Current e-learning systems present instruction in a "one-size-fits-all" style
that provides the same learning resources to each student. In fact, each learner
has a different learning style or different individual needs, so many learners
may have difficulty gathering the most suitable learning resources for
themselves. To help solve this problem, this paper presents a learning resources
recommendation framework using rule-based reasoning approach which allows
teachers and learners to create learning resources in the form of learning
objects based on ontology for searching and reusing learning objects. This paper
presents the experiment of recommendation system to provide learning resources
that are appropriate to the learning style of each student by designing learner
profiles and learning styles in the form of ontology. This system expresses the
Web Ontology Language. (OWL), and relies on rule-based reasoning engine to
identify the optimized learning resources. With the evaluation of experiments,
the results showed that the learning resources recommendation based on
rule-based approach retrieved the strong selection of the relevant resources. |
Keywords: |
Ontology, Learner Profile, Learning Styles, Learning Resources, Semantic Search,
Rule-Based Reasoning |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
HAND GESTURE ACTIVITY BASED SIGN LANGUAGE RECOGNITION MODEL DEVELOPMENT USING
SKIN PATCHES COLOUR DISTRIBUTION HISTOGRAM APPROACH |
Author: |
DR. DEEPAK ARORA , ASMITA DIXIT |
Abstract: |
The advent of modern sciences has played a pivotal role in exploring other, if
not better, avenues like the vision based hand interface techniques instead of
the more traditional means of those of keyboard, mouse, pen etc, wherein the
former has attained a higher relevance because of its natural and efficient
outcomes. Through this paper an attempt has been made at developing an algorithm
capable of intercepting the hand moments and locating its centroid. The proposed
method tabulates the corresponding feature attributed to a gesture, after
analyzing and intercepting the distance between the finger tips, their count,
relative distance between the finger tips and their distance from the centroid,
which eventually adds up to creation of the histogram of an image through the
substantial and collateral information received through the hand gestures. The
proposed technique works against a yellow background with interception of
gestures of the front and the back side of hand. In an attempt of enhancing the
robustness of the processing in consideration of the environmental impact
through noise, the HSV format is taken into use. This method works on
intercepting dedicated gestures of fingers to identify different alphanumeric
characters followed by tracking of hand using motion and color cues. We have
investigated the application of the method in sign language recognition by
dedicated hand gestures feature learning. Through the instant method a proposal
to an approach for recognition of sign language having usage in machine learning
problem is being made which undoubtedly would be extremely helpful for deaf
people to interact with others who are unaware of or don’t understand Sign
Language. |
Keywords: |
Machine Learning, American Sign Language (ASL), Skin Detection, Gesture
Recognition, Image Tracking, Histogram. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
TWITTER SENTIMENT MINING (TSM) FRAMEWORK BASED LEARNERS EMOTIONAL STATE
CLASSIFICATION AND VISUALIZATION FOR E-LEARNING SYSTEM |
Author: |
M.RAVICHANDRAN, G.KULANTHAIVEL |
Abstract: |
E-learning is becoming the most influential and well-liked standard for learning
through web based education. It is very important to categorize the online
feedback of the learners emotion in e-learning system. Learning usually refers
to teaching skills propagated with the help of computers to communicate
knowledge in a web based classroom environment. It is very difficult to identify
the learner’s emotional state whether they are satisfied with the online
courses. The twitter sentiment mining framework helps to find about the learners
who are frequently interacting with the e-learning environment. Twitter has
become the most popular micro-blogging area recently. Millions of users
frequently share their opinion on the blogs. Twitter is referred as a right
source of information to perform sentiment mining. This research presents a new
method for sentiment mining in twitter based messages written by learners,
initially helps to extract information about learners sentiment polarity
(negative, positive), and to model the learners sentiment polarity to identify
the change in their emotions. A model has been constructed from the training
data of the sentimental behaviors of the e-learners using Naďve Bayesian
approach. The model constructed has been tested through the test data during the
prediction process of discovering the emotional states of e-learner. The results
were compared against the other famous classification algorithms like support
vector machines and maxentropy techniques. This information can be effectively
used by e-learning system, by considering the learners' emotional state when
recommending learner’s the most appropriate activity each time. The learner’s
sentiment, emotional state towards the online course can provide feedback for
e-learning systems. The experimental outcome show that our proposed research
work outperforms recent supervised machine learning algorithms on accuracy
findings of learner’s emotional state classification. |
Keywords: |
e-learning, sentiment analysis, classification, visualization, |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN INTELLIGENT –AGENT BASED FRAMEWORK FOR LIVER DISORDER DIAGNOSIS USING
ARTIFICIAL INTELLIGENCE TECHNIQUES |
Author: |
H.RATNAMALA KIRUBA,, Dr.G.THOLKAPPIA ARASU |
Abstract: |
Artificial intelligence is an emerging area of modern research that aims at
infusing machine intelligence through computational techniques. Data mining (DM)
enables efficient knowledge extraction from large datasets, in order to discover
hidden or non-obvious patterns in data. Our motivation for using DM was based on
the hypothesis that the application of the appropriate DM technique on patient
records could form a suitable mechanism for the knowledge extraction
representing the correlation between patient symptoms and disease. The extracted
knowledge was then used for the provision of personalised recommendations to
patients in collaboration with the agent-based framework developed. The agent –
based system developed interacts with different modules of the overall
integrated system developed to support liver disease diagnostic system. This
research work aims at exploring the impact of machine learning techniques in
liver disorder detection on two different datasets comprising of more than 900
patient records acquired from the University of California, Irvine, Machine
Learning Repository . The findings revealed that C4.5 decision tree algorithm
and the Random Tree algorithm produced 100 percent accuracy in classification of
the liver disorders and we believe implementation of the proposed intelligent
agent-based system will raise a precise and accurate diagnostic system for
clinical ailments of diverse kind. To the best of our knowledge, this is the
first attempt to explore this large collection of supervised machine learning
techniques in the design of intelligent agent-based clinical systems for
diagnostic purposes. |
Keywords: |
Artificial intelligence, Intelligent Agents, Supervised learning, Data mining,
Clinical diagnosis, Liver Disorder detection |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
TIME COMPLEXITY OF ALGORITHMSAND ITS DIFFERENCE EQUATION REPRESENTATION |
Author: |
M.RAJU, B.SELVARAJ, M.THIYAGARAJAN |
Abstract: |
The fundamental problem encountered in all applications of computer science, can
be classifiedintothe area of searching, merging and sorting. In the analysis of
large class of algorithms, we have to discuss the solution of general
recurrences based on divide and conquer algorithms. Graph algorithms are studied
on the building block heap and disjoint data structure. We investigate the
complexity of both time and space in the implementation of these algorithms.
Results are expressed in terms of functions of number of steps along with the
data structure. We give in this paper the different expressions for these
complexity arguments appearingas solutions of specific types of difference
equation expressions. |
Keywords: |
Second Order Difference Equations, Forward Difference, Asymptotic And
Oscillatory Behaviors, Algorithms,Complexity, Numerical Data. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
ENHANCEMENT OF QOS IN MOBILE MULTIMEDIA APPLICATIONS DURING VERTICAL HANDOFF IN
HETEROGENEOUS NETWORK |
Author: |
I. CHANDRA, K. HELENPRABHA |
Abstract: |
Multimedia applications in wireless communication have been increased in recent
years. A variety of wireless access technologies are introduced for various
needs. The abundant increase in mobile computing devices and different
networking systems leads to the support of user’s mobility in Heterogeneous
Wireless Networks (HWN).This paper addresses a Scheduling Based Vertical
Handover Management Scheme (SBVHM) when a user migrate between WLAN and WiMAX
for seamless and ubiquitous access. Various wireless technologies such as
wireless LAN, WiMAX and 3GPP are interlaced to support many wireless services in
global environment. In addition QoS has become more significant in many
applications where wireless network resources are utilized. The proposed
scheduling based vertical Handover management scheme analyses the QoS
enhancement of the mobile user in a Heterogeneous network. Our simulation
results show that by introducing proper scheduling, the QoS parameters such as
Reauthentication delay and Signalling Cost are reduced significantly. The
algorithms Genetic Queuing, Proportionally Fair Queuing and WiMAX QoS Aware Load
Balancing are proposed in the scheduling process during handover. The simulation
is implemented using NS-2 and the experimental results are obtained for the
proposed algorithms and compared with the standard scheme. |
Keywords: |
Heterogeneous Network, Quality of Service, Reauthentication Delay, 3GPP,
Signalling Cost. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
RECOGNIZING SELF-CITATIONS VIA CITATION QUALITY ANALYSIS |
Author: |
M. RAJA AND T. RAVICHANDRAN |
Abstract: |
Self citations have so far been excluded from citation count. It is widely
believed that such self citations do not have any significance than merely to
increase the citation count of the article and improve the prestige of the
author through citation count.
Self citations should not always be avoided as the article may have been cited
for genuine reasons. Analysis of self-citations helps in evaluating continuing
research as well.
This paper argues that self-citations must not be blindly excluded in citation
counts when evaluating prestige value of a research paper/author. Experiments
conducted on researcher’s self-citation dataset reveal that most self-citations
show marginal improvement thus establishing researcher progress in the
respective area of research. |
Keywords: |
Citations, Self Citations, Impact Factor, Citation Index, h-index |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN ENSEMBLES FRAMEWORK FOR BRAIN COMPUTER INTERFACE |
Author: |
SANOJ. C. S, S. CHITRA |
Abstract: |
Brain Computer Interface (BCI) is a control and communication system independent
of the brain’s neuromuscular output channels. BCIs carry an expectation of the
future, as a device connecting the brain to a computer. One can control
equipment through thoughts. Though current reality is practical, many
accomplishments have been achieved in the last 20 years and BCIs are here to
stay. In this study, Brain Computer Interface IIIa dataset is used to test the
proposed system. Features are extracted using Discrete Cosine Transform (DCT)
and Common Spatial Patterns (CSP). Features are selected using Correlation based
Feature Selection (CFS) and classified using meta-classifiers. |
Keywords: |
Brain Computer Interface (BCI), IIIa dataset, Common Spatial Patterns (CSP),
Discrete Cosine Transform (DCT), Correlation based Feature Selection (CFS),
Rotation Forest Ensemble. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
TECHNOLOGY ACCEPTANCE MODEL AND ONLINE LEARNING MEDIA: AN EMPIRICAL STUDY OF
ONLINE LEARNING APPLICATION IN A PRIVATE INDONESIAN UNIVERSITY |
Author: |
MAYA SULISTIYANINGSIH, JOHAN J.C TAMBOTOH, ANDEKA ROCKY TANAAMAH |
Abstract: |
Flexible learning is an online learning media that reshapes the roles of
lecturers and students and provides information required for teaching/ learning
activities. Indeed, various factors influence the extent of users’ participation
in adopting flexible learning. Therefore, it is necessary to investigate what
factors affect the extent of users’ participation in accepting and adopting
flexible learning. Consequently, this article uses Technology Acceptance Model
(TAM) as the theoretical base to understand the factors that influence the
acceptance and adoption of flexible learning by lecturers and students as users
of the system. In order to make the empirical analysis, we distribute
questionnaire topurposively selected 100 students and lecturers from a private
Indonesian university (Satya Wacana Christian University) who have fully used
flexible learning system in the university (the so-called F-Learn). Using
Structural Equation Modeling (SEM) to analyze the data, we find that perceived
usefulness, perceived ease of use,and attitude on use of flexible learning
significantly affect the extent of flexible learning usage in online learning
activities. |
Keywords: |
Online Learning, Technology Acceptance Model, Purposive Sampling, Structural
Equation Modeling. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
DRPGAC: DETECTING AND PREVENTING MALICIOUS ACTIVITIES IN WIRELESS SENSOR
NETWORKS |
Author: |
A. THOMAS PAUL ROY, Dr.K.BALASUBADRA |
Abstract: |
One of a most familiar countermeasure against Network attacks is an efficient
Intrusion Detection System. In order to improve efficiency of the intrusion
detection system and prevention using various methods, techniques and procedures
are discussed in the earlier studies. Many procedures generally try to assuage
specific weaknesses of intrusion detection. The main objective of this paper is
to decrease the malicious activities by providing prevention in terms of
Identity based Authentication. In the existing system LBIDS system is applied to
detect the malicious node in WSN where the IDS are deployed in the leader. If
the malicious node occur far from leader’s place then it is difficult to detect
the malicious activity. In this paper DRPGAC- [Dynamic Random Password
Generation and Comparison] approach is proposed for detecting and preventing
malicious activities in each stage of the network functionality. DRPGAC is a
pre, post-processing solution for malicious activities. A sequence of DRP is
generated automatically and assign to the network users. Whenever the users
enter into the network, while data transmission and communication should be
start to each other, their password is verified and validated to check the user
is an innocent or malicious. The DRPGAC approach has been simulated and tested
using a set of nodes deployed in Network Simulator Environment and the result
shows better performance comparatively than the existing approaches. |
Keywords: |
Intrusion Detection System; Wireless Networks; Random Password Generation;
Malicious Activities; Prevention; Attacker Node. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
DESIGN AND ANALYSIS OF LOW NOISE AMPLIFIER USING CADENCE |
Author: |
M. I. IDRIS , N. YUSOP , S. A. M. CHACHULI , M.M. ISMAIL FAIZ ARITH AND N.
SHAFIE |
Abstract: |
Low Noise Amplifier also known as LNA is one of the most significant component
for application in wireless communication system. It is a very important part in
RF receiver because it can reduce noise of gain by the amplifier when the noise
of the amplifier is received directly. The low noise amplifier has been designed
to get the better performance by follow the requirement in this new era consists
of high gain, low noise figure, lower power consumption, small chip area, low
cost and good input and output matching. In this research, a LNA schematic
consists of three stages which are common gate amplifier, common drain amplifier
and active inductor is designed to mitigate this constraint. Common gate and
common drain are used for input and output stages in every LNA. Both are also
used for excellent input and output matching and have a potential to get a lower
noise whereas for active inductor, it is used to obtain the lower power
consumption and to reduce the chip size in layout design. The results show that
the proposed LNA is able to achieve the best performance with a simulated gain
of 14.7dB, extremely lower power consumption of 0.8mW, noise figure of 7dB and
small chip area 0.26mm˛. Consequently, this modified LNA is appropriate for
low-voltage applications especially in wireless communication system. |
Keywords: |
Low Noise Amplifier, inductor, cadence, RF receiver and high gain. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
NEW RE-ROUTING AND RETRANSMISSION TIMEOUT POLICY THROUGH REAL TIME WEB
PERFORMANCE ANALYSIS |
Author: |
M.S.GANESH , DR. S.RAMKUMAR |
Abstract: |
Most important performance metrics quantifies TCP retransmission timeouts (RTOs)
is the Round Trip Time (RTTs), which create havoc on network and application
performance by introducing huge amount of retransmission packet over the
internet routing. This paper tries to locate various means of non-fair RTOs
using real-time web-based internet domain server access procedure. The impact is
identified through Wireshark tool, Tracert, windows Application Programming
Interface (APIs) procedure and other parameters of internet connection such as
bandwidth, time of access, traffic intensity time zone with respect to routing
parameters. The experiment is to collect packet parameters on the internet on
various factor and analyze the same for the impact. Through the study the need
for the fine tuning on Retransmission along with Round trip time is identified
.The study also provide the new re-routing strategy to improve the overall
performance of routing and retransmissions suing simple communication agent
architecture on TCP level. |
Keywords: |
Transmission control protocol, Retransmission Timeouts, Round Trip Time, Web
domain, Routing,Wireshark |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
TRUST MODEL BASED ON BAYESIAN STATISTICAL METHOD FOR AOMDV IN MANET |
Author: |
Mrs.S.GEETHA, Dr.G.GEETHA RAMANI |
Abstract: |
Mobile Ad Hoc Networks (MANETs) present a dynamic environment in which data can
exchange without help of a centralized server , provided that nodes cooperate
with neighbor nodes for routing. In this environment, the security of data
established route to its destination is a challenging issue in the existence of
malevolent nodes. This paper proposes a data security approach in MANETs that
uses a trust based multipath AOMDV routing combined with Bayesian statistical
method called Trust based adhoc multipath distance vector (TB-AOMDV) protocol.
This protocol is also capable to discover multiple loop-free paths in route
discovery. These routes are evaluated by three aspects: hop counts and route
trust and node trust values. Furthermore, the routing protocol describe the
procedures for identification of the trusted routes and. Simulation results show
that TB-AOMDV improves packet delivery ratio, end-to-end delay, packet overhead
when compared to the AOMDV. |
Keywords: |
MANETs, Data Security, TB-AOMDV, Packet Delivery Ratio, End-To-End Delay, Packet
Overhead |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
EVM & ACP ANALYSIS OF LMS FILTER FOR SALEH MODEL PA LINEARIZATION IN DIFFERENT
PHASE SHIFT KEYING MODULATIONS |
Author: |
J.N.SWAMINATHAN, P.KUMAR |
Abstract: |
The Power Amplifier plays the major role in boosting the message signal
strength. The Memoryless non linearity nature of the Power amplifier varies
according to its output power function. The nature of the amplifier can be
difined by diffrent models. By this factor, PA has been classified in to
diffrent types. Here we choosed Saleh model PA which is best suited for TWT type
amplifers. To linearize the PA, Pre-distortion is one of the method used. Here
we are going to use NLMS algorithm in Predistorter and evaluates its error
estimating capability for saleh power amplifier model using diffrent Phase shift
key modulation methods like BPSK, QPSK, 8-PSK,16-QAM. We measured ACP and EVM
for the above modulations using Matlab software. |
Keywords: |
NLMS- Normalized Least Mean Square, PA- Power Amplfier, QAM- Quadrature
Ampliture Modulation, BPSK- Binary Phase Shift Keying, QPSK- Quadrature Phase
Shift Keying, PSK- Phase Shift Keying, TWT- Travelling Wave Tube, ACP – Adjacent
Channel Power EVM – Error Vector Magnitude. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
ENERGY CONSUMPTION AND QoS PERFORMANCES TO COMPARE COMBINED ROUTING PROTOCOL AND
MOBILITY MODEL FOR CBR TRAFFIC IN MANET |
Author: |
Said EL KAFHALI, Mohamed HANINI and Abdelkrim HAQIQ |
Abstract: |
A Mobile Ad-hoc Network (MANET) has the property to be formed dynamically by a
system of mobile nodes which are connected via wireless links with no
centralized administration. All nodes can be mobile resulting in a possibly
dynamic network topology. Two of the major problems in this network are energy
consumption and Quality of Service (QoS) related to traffic requirements.
This paper aims to explore the performances of the combination of routing
protocol and mobility model in terms of QoS relating to CBR traffic and to
network lifetime. Hence, simulations have been performed to evaluate the
performance of AODV, DSR and DSDV routing protocols under various mobility
models. The mobility models used in this work are Random Waypoint, Reference
Point Group and Manhattan Grid. Obtained results show that the best combination
protocol/mobility depends on the average speed of nodes. |
Keywords: |
MANET, Routing Protocols, Mobility Models, CBR Traffic, Energy Consumption, QoS
Parameters, NS-2. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
MULTI OBJECTIVE TEST CASE MINIMIZATION COLLABORATED WITH CLUSTERING AND MINIMAL
HITTING SET |
Author: |
R.BEENA, Dr.S.SARALA |
Abstract: |
Software testing aspires to explore and validate the attribute and potentiality
of a program to authenticate and cross-verify the requisite results obtained.
The broader bifurcation of testing is Precision Testing and Reliability Testing.
Regression testing is part of reliability testing as it testifies the changes or
modifications pursued to the software have not curtailed the functionality of
the software by introducing any bugs. It is a kind of quality assurance to the
modifications carried out. The pivotal role of regression testing is
comprehended whenever modification towards development of software takes place.
Re-execution of large test suites is perhaps an enigma many a times due to the
paucity of resources. Here arises the need for a novel technique to minimize the
test suite in order to remove the redundant test cases. With this focus to
provide an innovate and time-effective strategy to remove the redundant test
cases, this paper presents a multi-objective test suite minimization by
considering maximum statement coverage and minimum execution time. This article
also concentrates on incorporating a multi objective minimization technique
using clustering approach and minimal hitting set. Here, the identification of
appropriate clusters is achieved, through the weighted distance function for
mixed variable type and the minimal hitting set is obtained using HS_DAG
(Hitting Set Directed Acyclic Graph) algorithm. The results of this experiment
exhibit that the algorithm proposed works with adequate efficacy in minimizing
the test cases. |
Keywords: |
Regression Testing, Test Case Minimization, Similarity, Minimal Hitting Set,
Clustering, HS_DAG algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NEW CREATION OF MASK FROM DIFFERENCE OPERATOR TO IMAGE ANALYSIS |
Author: |
S.KALEESWARI, B.SELVARAJ and M.THIYAGARAJAN |
Abstract: |
A general theorem on a mth order difference equation is presented. Specific
illustration is given to support our claim. This leads to a creation of noise
removal operator which can remove additive and multiplicative noises presenting
in any digital image. Samples are shown to explain this new creation of mask in
the field of image analysis and machine vision. |
Keywords: |
Mask, Entropy, Sobel, Difference Equation, Functional, Nonlinear, Oscillation,
Image Analysis. |
Source: |
Journal of Theoretical and Applied Information Technology
10th November 2014 -- Vol. 69. No. 1 -- 2014 |
Full
Text |
|
|
|