|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
November 2014 | Vol. 69 No.3 |
Title: |
I/O MATCH (I/O MAT) AND BEHAVIORAL MATCH (BEH MAT) BASED SEMANTIC WEB SERVICE
DISCOVERY |
Author: |
J.UMA MAHESWARI, Dr.G.R.KARPAGAM |
Abstract: |
Discovery is one of the central reasoning tasks in SOA systems, concerned with
the detection of usable Web services for a specific request or application
con-text. Aiming at the automation of this task, most existing works on
semantically enabled Web service discovery focus on the degree of match of two
services based merely on their I/O pairs. Another approach for matchmaking in
Semantic Web Services (SWS) that considers each service as a sub-graph of the
semantic network of the ontology formed by inputs, outputs, pre and
post-conditions with contribution of syntactical information such as keywords
and textual descriptions. The similarity between services is defined as the
similarity between these graphs (Behavior Graphs). This paper presents the
detailed description of both approaches and it also analyses the advantages,
disadvantages and retrieval effectiveness of these two matchmaking systems (I/O
Mat, BEH Mat) and proposes new algorithm for semantic match making. |
Keywords: |
Semantic Web, Web Services, Matchmaking, Bipartite Graph, Behaviourally Correct
Path, Critical Elements |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
HYBRID OPTIMIZED LIST SCHEDULING AND TRUST BASED RESOURCE SELECTION IN CLOUD
COMPUTING |
Author: |
V.SURESH KUMAR, Dr. ARAMUDHAN |
Abstract: |
Cloud computing is computing service delivery over the Internet. Cloud services
allow people and businesses to use software/hardware managed by third parties in
remote locations. Cloud computing ensures access to information and computer
resources from wherever a network connection is available. Task scheduling is
fundamental to achieving cloud computing efficiency. But, it is a challenge to
efficiently schedule algorithm design and implement it, as general scheduling is
a NP-complete problem. Most task-scheduling cloud computing methods consider
task resource requirements for CPU and memory, and not bandwidth requirements.
This paper proposes to optimize scheduling using BAT-Gravitational hybrid
algorithm with resources being chosen on trust. |
Keywords: |
Cloud Computing, Trust based resource selection, Scheduling, BAT algorithm,
Gravitational Search algorithm (GSA) |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS |
Author: |
AWNI ITRADAT |
Abstract: |
The conventional high level synthesis techniques target DSP algorithms onto
architectures using basic functional units such as adders or multipliers. In
this paper, a scheme for the partitioning of the data flow graph of a DSP
application for a high-level synthesis aimed at a design using multi-modules is
proposed. In the propose scheme, the regularity characteristics of DSP
application are exploited. Moreover, in order to reduce the number of distinct
modules, the near-isomorphism sub-graphs represents the modules are merged
together by multiplexing them in time to produce a single adaptable module. This
merging process enables the reuse of the adaptable modules by partially
reconfiguring them at run time to realize different modules during the running
of the DSP data flow graph. Furthermore, a novel reconfigurable multiplier
multiplier is incorporated in the proposed synthesis technique. It is seen that
a small overhead in terms of the architecture’s controller is needed by the
modules in order for them to be adapted to perform different computations
(multi-modes). |
Keywords: |
Architectural Synthesis; Reconfigurable Multimodule; Time Scheduling,
Reconfigurable Processing Units |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
CDMA BASED SECURE CROSS LAYER FRAMEWORK FOR AUTHENTICATION AND SCHEDULING IN
MANET |
Author: |
B.BERIL DANIEL ROSARIO, Dr.A.RAJARAM |
Abstract: |
In MANET, mobile nodes are connected without any centralized administration. Due
to that, a mobile node is easily affected by means of several attacks. Due to
these attacks, network is totally partitioned and more packet congestion occurs.
Because of improper scheduling, congestion level of network will get increase
unlimitedly. To provide an authenticity of data packets and avoiding more
congestion, there is a need of secure and scheduling mechanism in networks. In
this research paper, we developed a CDMA based Secure Cross layer framework for
authentication and scheduling. Here the cross layer is introduced to improve the
quality and lifetime of nodes as well as links. The scheduling procedure is
proposed to reach the packets in a time slot manner. In authentication phase, we
proposed the modified concept of RSA scheme. Here the asymmetric key is chosen.
Both encryption and decryption phases are used to validate the cipher text and
manipulate the plaintext according the given message. By using extensive
simulation, the proposed scheme achieves better throughput, packet delivery
ratio, low end to end delay and overhead than the existing schemes. |
Keywords: |
MANET, Security, Cross Layer, Scheduling Time Slot, Authentication, Delivery
Ratio, Packet Loss, Congestion Status, Packet Integrity And End To End Delay. |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT TRACE ORIENT CLUSTER HEAD SELECTION FOR ADAPTIVE CLUSTER BASED
ROUTING IN MANET’S |
Author: |
A. BAJULUNISHA, J.WILLIAMS |
Abstract: |
To minimize the overheads of routing and to reduce energy loss on mobile nodes,
various routing strategies has been adapted in literature for Manet. Most of the
methods, suffers with cluster head selection problem and which generates energy
holes in the co-operative routing. To overcome the problem of energy holes and
cluster head selection, we propose a trace oriented approach for cluster head
selection problem which selects based on various parameters like movement trace,
mobility speed, and earlier transmissions. We also focus on the selection of
co-operative nodes, where the energy efficiency has to meet to overcome the
energy holes in the boundary. For given cluster Ci, the selection of cluster
head CH is performed based on node weight which is computed using above said
parameters and a set of co-operative nodes Co is selected according to boundary
closure measure and energy constraints. The proposed approach has minimized the
overhead of cluster head selection by Nlog102 and overall throughput has been
increased. |
Keywords: |
Manet’s, Cluster Based Routing, Mobility Trace, Chs, Energy Holes |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
USER INTERACTIVE MULTI-VARIANT FEATURE GRAPH BASED ENERGY ESTIMATION TECHNIQUE
FOR IMAGE SEGMENTATION |
Author: |
S. SASIKANTH, Dr. S. SURESH KUMAR |
Abstract: |
Image segmentation techniques are discussed earlier which uses color, intensity,
pixel values and etc, and suffers with the problem of overlapping and grouping
efficiency. We propose a novel method for image segmentation, using multi
variant feature based energy estimation technique and works with interactive
mode. Unlike other methods, the proposed methodology computes the feature energy
of each pixel. The Feature energy represents the propagation of feature from one
pixel to another and energy transition occurred at each of the neighbor pixel.
The energy estimation is performed using various features of each pixel and its
neighbors. An each pixel becomes the member of a group only if it carries same
set of energy level or same set of features with possible little changes and
comes within the energy threshold. The features used to compute the energy level
are pixel values like red, green, blue and the number of neighbors and their
values. The computed value is used to perform segmentation process, and produces
higher rate of segmentation. The process will be performed iteratively still the
user gets satisfied and provides new energy threshold value. |
Keywords: |
Image Segmentation, Multi-Variant Features, Energy. |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
ARABIC WRITER IDENTIFICATION: A REVIEW OF LITERATURE |
Author: |
AHMED ABDULLAH AHMED , GHAZALI SULONG |
Abstract: |
In this paper we present a survey of the literature on Arabic writer
identification scheme and up-to date techniques employed in identification. The
paper begins with an overview of the various writer identification schemes in
Arabic and Persian languages. After that, an attempt is made to describe the
complex character of Arabic strokes. Previous studies have used a number of
Arabic datasets comprised of handwritten text samples that have been used over
the years aimed to support handwriting recognition. In automated writer
identification, two methods of identification are available text independent and
text dependent methods. These are the key focus of this paper. For evaluation
purposes we have analyzed the Arabic writer identification scheme by comparing
the recognition rate of different methods. |
Keywords: |
Text independent, text dependent, writer identification, feature extraction,
dataset |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS OF EMR USER INTERFACE REQUIREMENT BY MEDICAL STUDENT |
Author: |
SHATILAH ZAKARIA, MOHD KHANAPI ABD GHANI |
Abstract: |
The aim of this study is to analyse user interface requirement for electronic
medical record (EMR) system. This study is done through semi-structured
interview with final year medical student. A participatory design approach was
used to collect EMR user interface requirement from one of medical school in
Malaysia. The scopes of analysis involve identifying the layout usage of user
interface, navigation menu, navigation menu arrangement, user interface
components and screen colour. The input collected from the study will be used to
develop EMR user interface model. |
Keywords: |
EMR, user interface design, user requirement, survey, HCI |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
FUZZY LOGIC CONTROLLER PLUS PROPORTIONAL INTEGRAL CONTROLLER BASED LOAD
FREQUENCY CONTROL OF HYBRID GENRATOR NETWORK |
Author: |
GARIMELLA UMA PAPA, Dr. S. BASKAR Dr.K. RAJAN |
Abstract: |
This paper is a study on the design of fuzzy logic controller plus proportional
integral (FLC plus PI controller) based load frequency control (LFC) for hybrid
generator network (HGN), which is the combination of the diesel generator and
the solar PV panels. The different variations are considered as a step to the
solar PV panels. The transfer function models of the HGN and the PV are
simulated at first and then they can be linked with each other through Tie-Line.
Next, in order to control the created disturbance of the network, a FLC plus PI
controller is developed. The performance of complete model with FLC plus PI
controller is verified at transient region through the computer simulation with
help of the MATLAB/Simulink software platform. In comparison with the PI
controller and the FLC, the simulation results are clearly evident that the
designed controller is proficient over the PI controller and the FLC. |
Keywords: |
Hybrid Generator Network (HGN), Solar PV panels, Fuzzy Logic Controller (FLC),
Proportional Integral (PI) controller, Load Frequency Control (LFC) |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENHANCED SECURITY FRAMEWORK FOR AUTHENTICATION AND INTEGRITY (ESFAI) IN CDMA
NETWORKS |
Author: |
V.VIJAYA KUMAR, Dr.R.SAMSON RAVINDRAN |
Abstract: |
Universal Mobile Telecommunications System is the third generation mobile
communications system. It was built on the concepts of GSM and it is the
starting point in the development of the fourth generation network. This paper
proposes enhancements for the initial identification and for the Authentication
and Key Agreement (AKA) protocols that solve two known vulnerabilities of UMTS
security: identity catching and secret key exposure. It protects the messages
exchanged during the Authentication and Key Agreement protocol. Considering the
CDMA communications drawback, this paper proposes a two phased solution. The
first phase of the solution consists of a secure key generation. The secure key
generation phase is called AKA (Authentication and Key Agreement) -phase. The
second phase of the solution is able to solve the problem of redirection
attacks, man-in-the-middle attack, sequence number depletion attack, and roaming
attack. This phase includes a User Confidentiality for UMTS (EMSUCU) protocol.
This proposed solution is able to solve the problems, vulnerabilities through
eliminating it and the solution is able to improve the security and efficiency.
The enhanced SHAI technique proposed is able to solve redirection attacks,
man-in-the-middle attack, sequence number depletion attack, and roaming attack. |
Keywords: |
Master Server (MS), AKA (Authentication And Key Agreement), User Confidentiality
For UMTS (EMSUCU) Protocol |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
NEW SOLAR-CELL COATING TO ENABLE BOOST IN EFFICIENCY |
Author: |
J.MANJU, DR.S.JOSEPHJAWHAR |
Abstract: |
These days Solar Energy is discriminatingly required to satisfy the human needs.
Anyway amid the energy conversion [sunlight into Current] the measure of
transformation is not sufficient and it is less because of sun powered shaft
reflection on the surface of the solar panel.This strategy never surpasses 34%
for a solitary advanced semiconductor intersection. The current framework
utilized aqueous strategy, and the nanoparticles arranged are Zn + Mg co-doped
TiO2 and the immaculate TiO2 and the transformation proficiency arrive at up to
9.07%. The main objective of this paper is to improve the energy conversion rate
in terms of reducing the Reflection. In the past studies in photovoltaic [PV]
cell, if one proton thumps then one electron detached in the PV material. In
this paper another system is presented where in a PV cell, every photon can
rather thump two electrons detached by changing the semiconductor as 'n-type-
semiconductor' and which gets to be Group-V components. This makes the process
significantly more productive than the current methodologies. In a standard
cell, any overabundance energy conveyed by a photon is squandered as high
temperature, although in the new framework the additional energy goes into
handling two electrons rather than one. The resultant current is very nearly
straightforwardly corresponding to the force of the light. |
Keywords: |
Solar Cell; Photovoltaic; Energy Efficiency; Photon; Electron. |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF OPTIMUM PID CONTROLLER FOR NONLINEAR PROCESS USING EVOLUTIONARY
ALGORITHMS |
Author: |
VIJAYAKUMAR KALIAPPAN, MANIGANDAN THATHAN |
Abstract: |
In past decades, PID controller was mostly preferred because of its robust
behavior in a spread over range of operating conditions. However the
conventional PID tuning procedure is not suitable for getting the optimized
controller parameters under the identified operating regions. Therefore, an
optimum Particle Swarm Optimization (PSO) based Proportional-Integral-Derivative
(PID) controller is proposed for controlling the nonlinear process with
optimized PID parameters settings. The PSO computation technique has many
advantages like high quality solution, less computation time and good
convergence characteristics. The tuning of PID parameters through optimization
algorithms provides high quality solution for nonlinear processes. The
performance indices such as ISE, IAE and ITSE were studied to evaluate the
proposed controller performances. The proposed PID controller is presented to a
nonlinear Continuous Stirrer Tank Reactor (CSTR) process for controlling the
concentration by manipulating its feed flow rate. From the results, it is
observed that the PSO-PID provides better control accuracy than other methods
such as Simulated Annealing (SA) and Genetic Algorithm (GA) based controllers. |
Keywords: |
PID, Genetic Algorithm, Simulated Annealing, Particle swarm optimization, CSTR |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
MODELING AND SIMULATION OF CNTFET FOR PROSTATE CANCER DETECTION |
Author: |
B.N. SHOBHA, N.J.R. MUNIRAJ |
Abstract: |
Prostate cancer is the major cancer affecting men and is growing at a very
significant rate. One of the major challenges in treatment of prostate cancer is
its detection in early stages. The use of Prostate Specific Antigen (PSA)
testing has aided the prediction of prostate cancer. It is important to develop
an ultrasensitive and selective biological sensor for PSA detection. An
ultrasensitive biological detection system that allows the early detection of
prostate cancer is expected to improve preventative healthcare. The most
widespread techniques for detecting prostate cancer are based on the
enzyme-linked immunosorbent assay (ELISA). Recently, biomolecule sensors based
on quasi one-dimensional semiconductor nanostructures like nanotubes, nanowires
and nanobelts have attracted considerable attention because of their distinct
electrical, optical and magnetic properties. Hence, this paper analyzes the
device properties of Carbon Nano Tubes (CNT) such as mechanical properties,
optical and electrical properties and its relevance as prostate cancer detector
or PSA detector. The comparison of MOSFET inverter with CNTFET is also carried
out and found that CNTFET has same performance as that of MOSFET with less
complexity. |
Keywords: |
Prostate Specific Antigen, CNTFET Biosensor, CNFET Inverter, CNT-pFET, Low Power
Devices |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
CONSTRUCTION OF A NOVEL ONLINE DATA WAREHOUSE ARCHITECTURE USING STORAGE AREA
NETWORK WITH FIBRE CHANNEL FABRIC |
Author: |
M. SARAVANAMUTHU, Dr. G. M. KADHAR NAWAZ |
Abstract: |
The major issues of data warehouse architecture are higher cost, lower
performance and limited access. The reasons for these problems focus the
architectural design. The solutions are proposed with the new modified data
warehouse design say online data warehouse architecture with the recent
technological support from cloud computing say storage area networks through the
use of high speed fibre channel based storage devices with fibre channel
switches. Finally the benefits and advantages of proposed design were discussed
with the cost, performance and access analyses. |
Keywords: |
Data Warehouse Architecture, Cloud Computing, Storage Architecture, Storage Area
Network, Network Storage, Fibre Channel Protocol, Fibre Channel Switch/Fabric. |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE NEW APPROACH OF VISUAL CRYPTOGRAPHY SCHEME FOR PROTECTING THE GRAYSCALE
MEDICAL IMAGES |
Author: |
S.MANIMUURGAN, C.NARMATHA, K.PORKUMARAN |
Abstract: |
Transferring an image from one place to another or storing an image in a
particular place in a secure manner has become a challenge. In order to face
this challenge, a new Visual Cryptography (VC) scheme for grayscale medical
images has been proposed. Generally, the VC method has a few problems or rather,
short comings. For instance, when the pixels are expanded, the level of security
applied will be high but the quality of reconstructed image will be low.
Similarly, if the extent of pixel expansion is reduced, its security is lowered
and quality of the image is retain. Hence, to achieve high security as well as
to get a good image quality, the proposed Tailored Visual Cryptography Scheme (TVCS)
for grayscale medical image is ideal. Some of the VC leads to loss while
reconstructing the image but this proposed algorithm which has been developed
for medical image, will not provide any loss and the result has been
experimented and proved by measuring CC. The main advantage of this proposed
method is to provide good quality for the images with reliable security without
any pre or post processing. In the proposed algorithm, two types of processes
are taking place: Tailored Visual Cryptography Encryption (TVCE) and Tailored
Visual Cryptography Decryption (TVCD). The TVCE process provides an encrypted
image and in order to get this encrypted image, Splitting Process, Converting
Process, Pixel Process and Merging Process are performed. Simultaneously
Segregation Process, Inverse Pixel Process, 8-bit into Decimal Conversion
Process and Amalgamate Process are involved to retrieve the original medical
image from the TVCD process. In the experimental part, many medical images have
been tested and the result is also provided. In order to check the security
properties like Confidentiality, Integrity and Availability (CIA), the CC has
been calculated. From these experimentations, the proposed algorithm provides
better result than the existing algorithms. |
Keywords: |
Visual Cryptography, Correlation Coefficient, Gray scale medical image |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
ROBUST ANALYSIS OF THE ROCK TEXTURE IMAGE BASED ON THE BOOSTING CLASSIFIER WITH
GABOR WAVELET FEATURES |
Author: |
C.VIVEK, S.AUDITHAN |
Abstract: |
In this paper, the new novelty method in the digital image analysis technique
for geology applications is proposed. It analyzed the series of raw rock images
from the mineralogy database of various classes. It initially enhanced for the
intensity equalization through HSI model and then the Gabor filter extract the
textures of different sizes and orientation in a two dimensional form such as
horizontal and vertical directions. The extract features are decomposed through
SVD matrix model to achieve better extraction features. The decomposed image
features are transformed through the wavelet series and finally, it features are
measured using strong boosting classifiers. The experimental results yields
better result that compared with other image transformation methods. This
proposed method show better classification results for various rock texture
images and it cross validated through the confusion matrix and it shows low
computational complexity with low error of misclassification. |
Keywords: |
Rock Texture, HSI, Gabor Wavelet Features, Boosting Classifier and Texton
Co-occurrence Matrix |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
RANDOMNESS TEST OF CRYPTOGRAPHIC ONE-TO-MANY REVERSIBLE MAPPING FOR IPV6 ADDRESS
GENERATION |
Author: |
NASHRUL HAKIEM, MOHAMMAD UMAR SIDDIQI, SIGIT PUSPITO W. JAROT, AKHMAD UNGGUL
PRIANTORO |
Abstract: |
This paper presents simulation results on randomness test of a cryptographic
one-to-many reversible mapping between user space and the IPv6 address space. A
one-to-many reversible mapping mechanism is developed which may be embedded into
a DHCPv6 (Dynamic Host Configuration Protocol for IPv6) server in the stateful
mode within an enterprise local area network (LAN). Each time a user accesses
the network, the DHCPv6 server is able to assign a dynamic IPv6 address. The
dynamic address (obtained through one-to-many mapping) is to protect the user
from unwanted behavior analysis exploiting IPv6 addresses, thus protecting user
privacy. However, the dynamic address can be uniquely linked to the user
(through many-to-one reversible mapping) if the need arises. The randomness of
the dynamic address (one-to-many mapping) for IPv6 address assignment is
evaluated based on uniformity using monobit (frequency) test, and avalanche
effect is evaluated using Hamming distance tests. Simulation results show that
the randomness in terms of uniformity (occurrence of 1's or 0's are around 50%)
and the Hamming distance (the difference between Interface IDs at approximately
50%) are accepted. The decision rule of randomness is set at the 1% significance
level with the Pvalue of monobit (frequency) test, and the Pvalue in Hamming
distance tests is taken to be more than 0.01. IPv6 addresses generated by a
one-to-many reversible mapping mechanism are considered to be random with a
confidence level of 99%. |
Keywords: |
Ipv6 Address, Randomness, Uniformity, Avalanche Effect, Monobit, Hamming
Distance, P-Value. |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
FREQUENCY BASED AUDIO FEATURE EXTRACTION FOR RAGA BASED MUSICAL INFORMATION
RETRIEVAL USING LPC AND LSI |
Author: |
Ms.P.KIRTHIKA , Dr. RAJAN CHATTAMVELLI |
Abstract: |
This paper introduces the Audio Feature Extraction for classifying the music
based on Raga which plays a major role in Music Information Retrieval (MIR)
systems. The backbone Indian Classical Music is its Raga. A Raga is a particular
blend of notes which follows specific laws. The existing MIR systems and audio
search engines concentrate on content based audio mining and also the searches
are made by Meta Data which needs human effort for tagging. The existing MIR
systems also do not concentrate on Ragas . In this paper, we propose how the
frequency can be used to determine a raga by using Linear Predictive Coding(LPC).
We also propose a method to identify the Raga of the input audio clip using
Latent Semantic Indexing(LSI). |
Keywords: |
Musical Information Retrieval, Swara, Formants, LPC, LSI |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
HARDWARE-SOFTWARE SYSTEM FOR MALICIOUS LOGIC DETECTION IN HARDWARE
INFRASTRUCTURE OF CARS |
Author: |
NIKOLAY KALINTSEV, DMITRY MIKHAYLOV |
Abstract: |
Electronics control almost all vehicle systems. Such systems have a serious
vulnerability problem at the hardware level and can be subjected to unauthorised
actions by an attacker. This paper deals with the issue of security of car
infrastructure. The article gives the basic information about Controller Area
Network bus system, describes security problems of embedded automotive systems
and the “bug” capable of intercepting driving that was developed as an example
of the hardware attacks described in the paper. To solve the problems caused by
the bug the special hardware-software complex was designed to detect the bug in
the onboard vehicle system that can be insert for example during tech
inspection. There are two main options for detecting and protecting against
unauthorised connection: monitoring of resistive and capacitive condition of
buses and blocking commands, which introduce one or more blocks in the service
mode. The article presents an algorithm of this defence mechanism. The
effectiveness of the proposed hardware-software complex was proved
experimentally. |
Keywords: |
Vehicular Networks, Networked Control Systems, Data Buses, Car Data Security |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
DATA CLUSTERING BASED ON HYBRID OF FUZZY AND SWARM INTELLIGENCE ALGORITHM USING
EUCLIDEAN AND NON-EUCLIDEAN DISTANCE METRICS: A COMPARATIVE STUDY |
Author: |
O.A. MOHAMED JAFAR, R.SIVAKUMAR |
Abstract: |
Data mining is a collection of techniques used to extract useful information
from large data bases. Data clustering is a popular data mining technique. It is
the task of grouping a set of objects into classes such that similar objects are
placed in the same cluster while dissimilar objects are in separate clusters.
Fuzzy c-means (FCM) is one of the most popular clustering algorithms. However,
it has some limitations such as sensitivity to initialization and getting struck
at local optimal values. Swarm intelligence algorithms are global optimization
techniques and are recently successfully applied to solve many real-world
optimization problems. Constriction Factor Particle Swarm Optimization (cfPSO)
algorithm is a population based global optimization technique which is used to
solve data clustering problems. Euclidean distance is a well known and commonly
used metric in most of the literature. Some drawbacks of this distance metric
include blind to correlated variables, not robust in noisy environment, affected
by outlier data points and handle data sets with only equal size, density and
spherical shapes. But real-world data sets may exhibit different shapes. In this
paper, a Fuzzy based Constriction Factor PSO (FUZZY-cfPSO-FCM) algorithm is
proposed using Non-Euclidean distance metrics such as Kernel, Mahalanobis and
New distance on several benchmark UCI machine learning repository data sets. The
proposed hybrid algorithm makes use of the advantages of FCM and cfPSO
algorithms. The clustering results are also evaluated through fitness value,
accuracy rate and failure rate. Experimental results show that proposed hybrid
algorithm achieves better result on various data sets. |
Keywords: |
Data Clustering, Fuzzy c-means (FCM), Swarm Intelligence (SI), Constriction
Factor Particle Swarm Optimization (cfPSO), Euclidean Distance Metric,
Non-Euclidean Distance Metrics |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT DELAY AWARE ROUTING PROTOCOL FOR REAL TIME SYSTEMS IN WIRELESS
SENSOR NETWORK |
Author: |
GHUFRAN ULLAH, ABDUL HANAN ABDULLAH, ROHANA YUSOF |
Abstract: |
Many of Applications have got much attraction of Wireless Sensor Networks (WSNs)
due to its multi features with low cost and are getting more and more
advancements. Usually in WSN, nodes are deployed in a region to sense the events
and send the sensed data towards the sink(s) or a base station through
single/multi-hop communications. However, real time systems have its specific
QoS requirements which are different from usual WSN applications as the data
packets must be delivered in time deadline. In this study we propose an
efficient delay aware routing protocol (EDARP) in order to enhance the QoS
parameters and to satisfy the end to end delay and reliability requirements of
real time WSNs applications. Delay-aware routing protocol (DARP) sustains a
continuous speed of data delivery to provide the best communication in
real-time. The proposed protocol is compared with state of art protocols for
different simulation scenarios and the results show that EADRP has got better
performance in terms of end to end delay and reliability. |
Keywords: |
Wireless Sensor Network, Real Time, Reliability, Routing Protocol, QoS |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
Title: |
E-READINESS: A NOVEL APPROACH FOR INDICATORS MEASUREMENTS ESTIMATION AND
PREDICTION |
Author: |
NAJIB BELKHAYAT ZOUKKARI, ABDELAZIZ DOUKKALI, BOUBKER REGRAGUI |
Abstract: |
E-Readiness is an assessment process for the ICT (Information and Communication
Technologies) availability and use in a country. It consists in the calculation
of a composite indicator based on a conceptual framework related to ICT aspects.
The assessment report is used in E-Strategy to formulate action plans for
e-Readiness index development. Several approaches are used for e-Readiness since
the end of nineties; these approaches lack flexibility and require frequent and
precise measurements. Thus, two issues are addressed in this paper: the missing
measurements estimation problem and the lack of e-Strategy formulation
assistance and simulation tools and approaches. Indeed, we propose in this paper
an approach to define the transition matrix of the e-Readiness state equation
based on a layered model. This construction leads to a state model related to
the e-Readiness dynamic system and then is used with KALMAN Filter to cover the
two addressed issues. Indeed, the commands variables are indicators that can be
manipulated by e-Strategy stakeholder and the KALMAN filter estimation and
prediction functions are used as a simulator. For validation, we constructed a
model based on the I2010 e-Readiness initiative and we tested the convergence of
the model and its prediction function. Results are encouraging since the tested
model prediction function converges in 24 cases out of 27 (89%). |
Keywords: |
E-Readiness - E-Strategy, Index, Missing Data, Dynamic Systems, Kalman Filter |
Source: |
Journal of Theoretical and Applied Information Technology
30th November 2014 -- Vol. 69. No. 3 -- 2014 |
Full
Text |
|
|
|