|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2014 | Vol. 62 No.2 |
Title: |
STUDY ON THE DELAY OF UAV DATA-LINK BASED ON DARKROOM CALIBRATE-LINK METHOD |
Author: |
HUANG WENZHUN |
Abstract: |
he existing test method for properties of UAV data-link is usually the actual
flight test or field "distance" test, which has long test cycle and difficulty
for the extraction of test data. In view of this situation, we in this work
adopted the data-link semi-physical simulation test platform based on darkroom
calibrate-link method, establishing and analyzing the space natural decline
model, atmospheric environment model, and aircraft attitude angle model that
affecting the transmitting and receiving of signals. Meanwhile, the average
delay from-terminal-to-terminal and the fluctuation of the average delay of the
UAV under different MAC channel access protocols are discussed using the
darkroom calibrate-link method. In order to improve the response characteristics
of the UAV, time delay is compensated using optimal control methods, and the
effectiveness of the compensation method is validated based on and the platform
we built. The simulation results show that, the design of UAV data-link can be
calculated by this theory, and the introduction of the optimal control method
significantly improves the dynamic response characteristics of the UAV. |
Keywords: |
UAV Data-Link; Calibrate-Link Method; Compensation Method |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
MODELLING AND ANALYSIS OF PARALLEL BOOST CONVERTER FOR PHOTOVOLTIC APPLICATIONS |
Author: |
T.AJITH BOSCO RAJ, R.RAMESH |
Abstract: |
The main objective of this paper is to develop a mathematical modelling and
design a high efficient photovoltaic (PV) application with proposed parallel
boost converter. This model is based on mathematical equations and is described
through an equivalent circuit including a PV source with MPPT, a diode, a series
resistor, a shunt resistor and a dual boost converter with active snubber
circuit. This model can extract PV power and boost by using dual boost converter
with active snubber. By using this method the overall system efficiency is
improved and also the switching losses is reduced. |
Keywords: |
MPPT, SEPIC Converter, PV module, Parallel Boost Converter |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
SOLVING THE JOB SHOP SCHEDULING PROBLEM WITH A PARALLEL AND AGENT-BASED LOCAL
SEARCH GENETIC ALGORITHM |
Author: |
LEILA ASADZADEH |
Abstract: |
Job shop scheduling problems play an important role in both manufacturing
systems and industrial process for improving the utilization of resources, and
therefore it is crucial to develop efficient scheduling technologies. The Job
shop scheduling problem, one of the best known production scheduling problems,
has been proved to be NP-hard. In this paper, we present a parallel and
agent-based local search genetic algorithm for solving the job shop scheduling
problem. A multi agent system containing various agents each with special
behaviors is developed to implement the parallel local search genetic algorithm.
Benchmark instances are used to investigate the performance of the proposed
approach. The results show that the proposed agent-based parallel local search
genetic algorithm improves the efficiency. |
Keywords: |
Job Shop Scheduling Problem, Parallel Genetic Algorithms, Local Search, Multi
Agent System |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
SENSORLESS SPEED AND REACTIVE POWER CONTROL OF A DFIG-WIND TURBINE |
Author: |
ADIL BARRA, HAMID OUADI |
Abstract: |
This paper deals with the problem of wind turbine – DFIG (doubly fed induction
generator) speed control. For energy optimization purpose, several optimal
wind-turbine speed control strategies have been proposed. However, these
techniques require the measurement of wind speed and rotor speed which are both
difficult in practice and not very reliable. In this work, sensorless maximum
power point tracking (MPPT) control is developed. The control objective is
twofold: (i) tracking the maximum available wind power; (ii) regulating the DFIG
reactive power. The rotor speed and wind speed are estimated using a nonlinear
observer based on the state space model representing the whole DFIG-wind
turbine. Moreover, using the estimated mechanical variables, a nonlinear control
law is developed with the sliding mode technical to achieve the control
objective. The performances of the proposed regulator are analyzed using tools
from the Lyapunov stability. These theoretical results are validated by
simulation with a wide variation of the wind speed. |
Keywords: |
DFIG, MPPT, Sliding Mode, High Gain Observer, Lyapunov Stability. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
RESOURCEFUL AND SECURE ROUTING PROTOCOL VIA ACTIVE HIERARCHICAL CLUSTERING
MECHANISMS FOR WIRELESS SENSOR NETWORK |
Author: |
SASIKUMAR M , Dr. R. ANITHA |
Abstract: |
Wireless sensor network combine information sensing, wireless communication,
information processing in current years. Two major constraints related to
wireless sensor networks are the dynamic variance of the network caused by
capacity constraint of sensor nodes and uncertainties related to wireless links.
Moreover, the problem in wireless sensor networks is the active variance in
topology and provisioning of secure routing. These problems are attributed to
the strict constraint of sensor nodes’ energy and the frequently variation of
wireless channels qualities, which related with the nodes susceptible to energy
failures and higher level of link prone from external interference. Certain
works related to the hierarchical clustering did not address the problems
related to the deployment model, efficiently on heterogeneous wireless sensor
networks. Proposal of this work, introduces, Resourceful and Secure Routing
Protocol (RSRP) for Wireless Sensor Networks based on Active Hierarchical
Clustering mechanism (RSRP-AHC). Resource from the neighboring nodes serves as
the dynamic information for the current network, with which sensor nodes make
forwarding decisions based on energy aware and in a secure manner using RSRP.
RSRP-AHC partition the nodes into clusters and select the Cluster Head (CH)
based on the energy and Non Cluster Head (NCH) nodes join in the specific CH
based on SNR values. Error removal during hierarchical cluster routing is
achieved to avoid end to end error occurrence in network. Security is derived by
isolating the malicious nodes using resourceful based secure routing pattern
analysis. The experimental performance of RSRP-AHC mechanism is evaluated
against Location-Based Pair wise Key Pre distribution model to attain packet
delivery ratio, security level, and improved error recovery rate. |
Keywords: |
Hierarchical Clustering, Cluster Head, Sensor network, Resourceful and Secure
Routing Protocol, Wireless Link |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF FUSION BASED BRAIN IMAGE CLASSIFICATION USING MINIMUM
DISTANCECLASSIFIER |
Author: |
S. ANBUMOZHI, P.S. MANOHARAN |
Abstract: |
Image fusion is well used for medical brain image classification. Wavelet
transform is the most commonly used image fusion method, which fuses the source
images' information in wavelet domain according to some fusion rules. But
because of the uncertainties of the source images' contributions to the fused
image, how to design a good fusion rule to integrate as much information as
possible into the fused image becomes the most important problem. This paper
focused to classify the brain image into normal and abnormal image using minimum
distance classifier algorithm. The proposed methodology consists of spatial
domain filter, fusion, clipping circuit and minimum distance classifier
algorithm. The difference features are extracted from fused image and compared
with trained extracted feature set. The low power architecture for the proposed
brain image classification method is presented in this paper. The proposed
hardware architecture consumes power of 151mW in CMOS 90nm technology. |
Keywords: |
Fuzzy Reasoning, Fuzzy Rules, Image Fusion, Low Power |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
PREDICTION OF SOFTWARE RELIABILITY USING COBB-DOUGLAS MODEL IN SRGM |
Author: |
B.ANNIPRINCY , Dr.S.SRIDHAR |
Abstract: |
Software reliability refers to the likelihood of software to function without
failure for a specified duration of time under few conditions. Software testing
indicates the process that identifies the faults in totality and worth of
developed computer software. Yet, running software testing for a longer period
will not result in bug free software and high reliability. Further, good quality
software will be ensured with an optimum amount of code. The amount of faults
eradicated will not depend on testing time alone. Hence, a two dimensional
software reliability growth model is being proposed, which makes use of Cobb-
Douglas production function that includes testing time and testing coverage
effects on the number of faults removed in the software system. Complete
elimination of faults from software is impossible because of software complexity
and nature of testing team. This event is termed as imperfect debugging. Error
generation is defined as the process in which the faults are imperfectly removed
and additional faults emerge from these existing faults. An S-shaped model with
imperfect debugging and fault generation is being developed in this paper to
provide solutions for the problems associated with software testing. |
Keywords: |
Software Reliability, Two Dimensional, Non-Homogeneous Poisson Process (NHPP),
Testing Coverage (TC), Cobb-Douglas Model, Imperfect Debugging, S-Shaped Model. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
THE IMPLEMENTATION OF ENTERPRISE SERVICE BUS (ESB) IN GRADUATION BUSINESS
PROCESS INTEGRATION |
Author: |
WIRANTO HERRY UTOMO, THEOPHILUS WELLEM |
Abstract: |
ESB is one of SOA pillars besides WS and BPEL. ESB is an infrastructure for SOA
service connection and message exchange. The main function of ESB is routing,
protocol and message or data transformation. Protocol and message transformation
function in ESB help to deal with protocol and data discrepancy. ESB eases
connection, mediation and the re-use of service components. It also simplifies
integration that will later improve integration scalability. This research has
successfully integrated graduation business process that involves some units
including Faculty, Library, Dormitory, Administration and Academic Bureau,
Student Affair bureau, Finance Department, and Laboratory. This integration of
graduation business process uses ESB as integration middleware. Web services
integration reveal the role of ESB in routing and message and protocol
transformation. |
Keywords: |
SOA, ESB, BPEL, integration, web service |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
COMPUTATIONAL INTELLIGENCE TECHNIQUES FOR EFFICIENT POWER DISTRIBUTION AND
CONSUMPTION: A SURVEY |
Author: |
M.SHEEBA SANTHA KUMARI, A.P.SHANTHI, V.UMA MAHESWARI |
Abstract: |
Affordable and reliable electricity plays a major role in shaping the world
economy as a nation’s growth in the gross domestic product (GDP) can be tracked
to its growth in electricity. The consumption of electricity has gained critical
attention as it acts as a production factor for corporations and welfare factor
for societies. Smart grid or intelligent electricity grids that use information
and communication technologies are currently deployed to offset the increasing
energy pressure. These smart grids are driven by the state of the art IT
solutions like artificial intelligence, machine learning and data mining
techniques. The techniques empower producers and suppliers of electricity for
efficient power planning and distribution. It also enables consumers to save
electricity and cut off costs through intelligent consumption. The main
objective of this paper is to provide a contemporary look at the usage of these
techniques intelligently, to monitor, control and forecast electricity usage. |
Keywords: |
Computational Intelligence Techniques, Electricity Data Analysis, Intelligent
Power Distribution and Consumption |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
CROSS LAYER DESIGNS TO OPTIMIZE THE POWER CONSUMPTION IN WIRELESS SENSOR
NETWORKS |
Author: |
K.LAKSHMISUDHA, Dr.C.ARUN |
Abstract: |
Wireless sensor networks are characterized by limited resources in terms of
memory, computation power, and energy. As WSN nodes are powered by batteries,
they have hard energy constraints therefore, efficient use of energy is one of
the main design considerations in Wireless sensor networks. Since all layers of
protocol architecture influence the energy consumption, exploiting synergies
between these layers by a cross layer design will result in an efficient energy
utilization of the system. In this paper we have discussed about the importance
of Cross Layer Design and the comparative analysis of the various cross Layer
Design protocols. |
Keywords: |
Sensor, Energy efficiency, Open system Interconnection(OSI) Model,Cross layer
design, delay, network lifetime, Cross Layer Frame work. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE |
Author: |
MOHAMMED SABBIH HAMOUD AL-TAMIMI , GHAZALI SULONG |
Abstract: |
Today’s modern medical imaging research faces the challenge of detecting brain
tumor through Magnetic Resonance Images (MRI). Normally, to produce images of
soft tissue of human body, MRI images are used by experts. It is used for
analysis of human organs to replace surgery. For brain tumor detection, image
segmentation is required. For this purpose, the brain is partitioned into two
distinct regions. This is considered to be one of the most important but
difficult part of the process of detecting brain tumor. Hence, it is highly
necessary that segmentation of the MRI images must be done accurately before
asking the computer to do the exact diagnosis. Earlier, a variety of algorithms
were developed for segmentation of MRI images by using different tools and
techniques. However, this paper presents a comprehensive review of the methods
and techniques used to detect brain tumor through MRI image segmentation.
Lastly, the paper concludes with a concise discussion and provides a direction
toward the upcoming trend of more advanced research studies on brain image
segmentation and Tumor detection. |
Keywords: |
Brain Tumor, Magnetic Resonance Image (MRI), Preprocessing and Enhancement,
Segmentation, Feature Extraction, Classification |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
TWO LEVEL CLUSTERING APPROACH FOR DATA QUALITY IMPROVEMENT IN WEB USAGE MINING |
Author: |
YUHEFIZAR, BUDI SANTOSA, I KETUT EDDY P., YOYON K. SUPRAPTO |
Abstract: |
Web Usage Mining (WUM) is a term related to the extraction of knowledge from web
log data. Web log data has a lot of irrelevant data to proceed WUM. Therefore,
it requires several steps to get a good quality of data, because the final
result of WUM depends on the quality of the input data. Therefore, in this paper
we propose a new approach to overcome these problems, hence, it is called the
two level clustering approach. The first level clustering is performed on the
data in the form of access frequently and use non-hierarchical cluster method,
followed by a second level clustering on the web log data in the form of user
access. At the second level clustering, it combines cluster hierarchical and
non-hierarchical methods. From the experiments, 90.78% on web log data quality
is reached |
Keywords: |
Data Quality Improvement, Two Level Clustering, Web Log Data, Web Mining, Web
Usage Mining |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN ENHANCEMENT OF FRAMEWORK SOFTWARE RISK MANAGEMENT METHODOLOGY FOR SUCCESSFUL
SOFTWARE DEVELOPMENT |
Author: |
ABDELRAFE ELZAMLY, BURAIRAH HUSSIN |
Abstract: |
Despite much research and progress in the area of software project management,
many software projects have a very high failure rate. This risk is not always
avoidable, but it is controllable. The aim of this paper is to propose the new
framework software risk management methodology for successful software project.
There are 5 main phases such as identification risk, risk analysis and
evaluation, risk treatment, risk controlling, risk communication and
documentation for software development life cycle. Indeed, our approach focuses
on identifying software risk factors, and risk management techniques and on how
to manage software risk factors with statistical and mining techniques. Our
framework derived data from questionnaires and historical data from software
companies. Successful software project risk management methodology will greatly
improve the probability of software project success. |
Keywords: |
Software Project Management, Risk, Software Risk Management Methodology,
Software Development Lifecycle, Software Risk Factors, Risk management
techniques, Statistical and mining techniques |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT ROAD TRACKING FROM AERIAL IMAGES BY MEANS OF FILTER METHODS |
Author: |
K.MADHAN KUMAR , R.KANTHAVEL |
Abstract: |
To many geographic systems (GIS) application scheme such as urban planning and
navigation, updating road network database is critical problem. Rapidly changing
urban environments accelerate the need for frequent updates or revisions of road
network databases. With the advent of high-resolution satellite images, there
has been a resurgence of research interest in road extraction techniques.
However, due to the extreme complexity of an urban scene, automatic road network
extraction continues to be challenging research topic. In this paper, we have
proposed a road map extraction system with two efficient filters using satellite
images. Here, Unscented Kalman filter (UKF) is used in combination with Gauss-Hermite
Kalman Filter (GHKF) to trace and identify various connected road paths and to
avoid obstacles under diverse conditions. Unscented Kalman filter (UKF)
component is responsible for tracing axis coordinates of a road region until it
comes to a severe obstacle or an intersection. Then, the Gauss-Hermite Kalman
Filter (GHKF) module takes the control of the road extraction process and
regains track of the road or possibly road branches on the other side of a road
junction or obstacle. From the results, we ensure that the proposed road
extraction technique outperformed the existing approach by achieving the
accuracy of 98.452% in cluster 10. |
Keywords: |
Unscented Kalman Filter (UKF) And Gauss-Hermite Kalman Filter (GHKF), Satellite
Image, Road Extraction, |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
AN APPROACH FOR DESIGN AND IMPLEMENTATION OF SECURE VIDEO STREAMING USING SRTP |
Author: |
P. IYYANAR, DR. M. CHITRA |
Abstract: |
Video streaming is one of the most important and growing application in
multimedia communication due to reduction of storage and increase in high speed
network access for any environment. Real-time live video or stored video is the
predominant part of the real-time multimedia networking. In the streaming
technology, the video file need not be downloaded in full, but is being played
out while the content of the video file are being received and decoded. This
paper proposes secure video streaming using SRTP protocol. The video formats of
the RTP transmission are .MPG, .AVI video container. The value of the prototype
system is to provide an effective transmission across the Internet with
quality-guaranteed manner while using RTP and RTCP protocol on un-trusted
Client–Server networks. |
Keywords: |
Video Streaming, RTP, RTCP, SRTP |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
AUTOMATIC ENLARGEMENT OF SPEECH CORPUS BY USING DIFFERENT TECHNIQUES |
Author: |
MANSOUR ALSULAIMAN |
Abstract: |
Development of the speaker recognition system with high recognition rates is
still an active area for the researchers. Stochastic model based speaker
recognition requires a large data for the training; otherwise poor recognition
rates are obtained. This research deals with the problem of speaker recognition
when only a few samples are available for training of the system. To avoid the
low recognition rate caused by small speech corpus, automatic techniques for the
enlargement of speech corpus are proposed in this paper. The reliability of the
new enlarged corpus is evaluated by using it to train a GMM speaker recognition
system. The system is trained by using different combinations of the new
generated speech samples, which are obtained by applying the proposed
enlargement techniques on the original training. We test these methods when
there is only one sample and when there are two samples. Each approach has
various groups and every group has a different combination of the new generated
samples. The results of the experiments are satisfactory. The obtained
recognition rate with one sample is 89.39% for male speakers and 97.76% for
female speakers. When there are two original samples the highest recognition
rates is 100%. |
Keywords: |
Speaker Recognition, Corpus enlargement, Speech lengthening, Limited sample
corpus, HMM, GMM |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPLEMENTATION OF FLOATING POINT MAC USING RESIDUE NUMBER SYSTEM |
Author: |
DHANABAL R, SARAT KUMAR SAHOO,, BARATHI V, NAAMATHEERTHAM R SAMHITHA, NEETHU
ACHA CHERIAN, PRETTY MARIAM JACOB |
Abstract: |
This paper presents the design and implementation of 16-bit floating point RNS
Multiply and Accumulate (MAC) unit. Residue Number System (RNS) gained
popularity in the implementation of fast arithmetic and fault-tolerant computing
applications. Its attractive properties such as parallelism and carry free
computation have speed up the arithmetic computations. Floating Point can be
represented as where is Mantissa, is the Exponent and is the Base. The MAC unit
consists of three units - Floating-point multiplier, Conversion unit and an
Accumulator. The floating-point multiplier makes use of Brickell’s Algorithm,
the conversion unit makes use of a parallel conversion for the forward
conversion and the Chinese Remainder Theorem for reverse conversion and the
accumulator includes an adder unit which can make use of any of the conventional
adders that depends on the moduli of the RNS being used. The input takes form of
half-precision format where there is 1-bit for sign, 5-bits for exponent and
10-bits for mantissa. The design is coded in Verilog HDL and the synthesis is
done using Cadence RTL Compiler. |
Keywords: |
MAC, Residue Number System (RNS), Floating point, Moduli |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMPLEMENTED OF SUPERVISED TABLE SPIHT ALGORITHM IN VLSI PROCESSOR FOR IMAGE
TRANSMISSION |
Author: |
S.HARSHAVARDHAN NAIDU, Dr. K. SIDDAPPA NAIDU |
Abstract: |
Image coding is to represent an image with as few bits as possible while
preserving the level of quality and intelligibility required for the given
application. In this project we use the Supervised Table Set-Partitioning In
Hierarchical Trees (STSPIHT) algorithm. In which the lookup table is supervised
for the transmission of images to preserve the brightness and contrast. Approach
supports progressive transmission which makes maximum use of all previously
transmitted data. With progressive transmission, one can have a rough picture of
the image transmitted and access it before the end of the transmission. When
this algorithm is implemented in the VLSI processor the number of gate levels is
reduced. The processing speed for the transmission is increased by 85% when
compared to the existing methods. |
Keywords: |
Refinement Pass, Lookup tables, Significant Pixels, Insignificant Pixels, SPIHT. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
PROTECTION OF FREE ROAMING MOBILE AGENTS USING CUSTOMIZED ROOT CANAL ALGORITHM
AGAINST MALICIOUS HOST ATTACKS |
Author: |
GEETHA G, JAYAKUMAR C |
Abstract: |
Mobile agent plays an important role in developing applications of open,
distributed and mixed environments, such as the internet. As an agent travels do
execution in different environment in different host or servers, the agent are
in need of protection themselves and their data from various types of attacks.
Providing security to the mobile agent (static code) and it data (dynamic code)
is emergence need in Mobile agent Technology. The main issue of free roaming
mobile agent in data collection is colluded truncation attack. In this paper,
the Customized Root Canal (CRC) Algorithm is used to protect the code and data
of the agent through code and data integrity. To overcome colluded truncation
attack CRC algorithm immediately return collected data to the originator |
Keywords: |
Mobile Agents, Free Roaming, Protection, Attacks, Data Security, Code Integrity,
Data Integrity |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS OF WIRELESS AD HOC SENSOR NETWORK FOR SELECTION COMBINING AND
THRESHOLD-HYBRID SELECTION/MAXIMAL RATIO COMBINING |
Author: |
NAGESH K. N, SATYANARAYAN D, M.N GIRI PRASAD |
Abstract: |
The presented paper discusses and presents the analytical as well as simulated
performance analysis allied with network connectivity and key problems of
network coverage in Wireless Sensor Networks (WSN). The issue of network
connectivity may be considered as one of the most significant problem in
wireless network. The connectivity issue or coverage problem significantly
influences the network capability and overall network efficiency. In the
presented paper, we propose a research work oriented towards computation of node
isolation probability and to perform analysis of network connectivity in the
presence randomness in channel behavior, while considering of fading effects
like Rayleigh fading of threshold-based hybrid selection/maximal-ratio combining
(T-HS/MRC). In this paper, the analysis of selection combining has been done
while considering the independent communication paths and even with correlated
paths. On the basis of predetermined normalized threshold parameter a T-HS/MRC
combiner selects the combined branches and it finds the potency of the instant
signal-to-noise ratio (SNR) of individual network branch. Consequently, the
number of combined branches is always a random variable, to a certain extent
than a predetermined number, as in conformist hybrid selection mechanism/
maximal-ratio combining (H-S/MRC) technique. The present analytical and
simulated work motivates to design more practical and reliable system. |
Keywords: |
Ad-hoc Network, Hybrid Selection, Maximal-Ratio Combining, Rayleigh Fading,
Selection Combining. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
ONLINE DATABASE OF QURANIC HANDWRITTEN WORDS |
Author: |
MUSTAFA ALI ABUZARAIDA, AKRAM M. ZEKI, AHMED M. ZEKI |
Abstract: |
In this paper, an online Arabic handwritten words database is presented to be
the first online Quranic handwritten words dataset. The dataset was collected
naturally using Acer computer tablet 1.5 GHz core i3 by writing the words on a
smooth touch screen using a special pen stylus. Here, a platform interface was
designed to collect the handwritten words using Matlab environment. Handwritten
words were chosen as the most common words repeated in the holly Quran. The
initial version of (Quranic Handwritten Words) QHW database includes 120
handwritten words and divided equally into two sets to be written by 200 writers
in total. The QHW database contains 12000 sample including more than 42,800
characters and 23,300 sub words. Handwritten words were mainly written by
variety of people aged between 6 and 50 years from several countries. The main
aim of creating this database is to be used in an online Arabic recognition
system and make it available to other researchers while there is no public
database can be use nowadays. Also, Some preprocessing steps those applied to
standardize the all words of this database are presented in this paper. |
Keywords: |
Quran, Arabic Language, Handwriting Recognition, Online Words Database. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
TOUCH GESTURE AUTHENTICATION FRAMEWORK FOR TOUCH SCREEN MOBILE DEVICES |
Author: |
ALA ABDULHAKIM ALARIKI, AZIZAH ABDUL MANAF |
Abstract: |
With the increased popularity of touchscreen mobile phones, touch gesture
behavior is becoming more and more important. Increasing demand for safer access
in touch screen mobile phones, ancient strategies like pins, tokens, or
passwords fail to stay up with the challenges conferred. Most of the current
touch gesture authentication schemes facing problem with accuracy based on score
classifiers of EER, FAR and FRR. In addition, collecting touch duration feature
only may not be able to achieve the desired authentication accuracy and
robustness. However, gathering more touch features such as finger pressure,
finger size and acceleration would help to get a better authentication accuracy
and verification performance. These efforts have allowed us to provide a
comprehensive summary of recent work on touch behavior authentication and a
frame work to implement the system. Finally, we conclude the future work in this
topic which is implement and test the framework of touch gesture gesture-based
behavioral biometrics and obtain more accuracy and robustness authentication
system. |
Keywords: |
Behavioral Biometrics, Gesture authentication, Touch Behavioral, Touch
Authentication. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS OF DYNAMIC PERFORMANCE COMPARISON OF DIFFERENT PWM TECHNIQUES INVERTER
FED INDUCTION MOTOR DRIVES |
Author: |
S.DINESH KUMAR, R.VENKATESH, R.SRIRANJANI, S.JAYALALITHA |
Abstract: |
PWM Inverter fed induction motor drive plays a major role in industrial
application such as drilling mills, crane, hoist etc. The major problem in Pulse
Width Modulation(PWM) inverter is torque ripple, fluctuation in stator current
and transient response of the speed. This paper deals with the modelling and
simulation of dynamic performance of various PWM inverter fed induction motor
drives in stationary frame. The Induction motor is modeled and stimulated in
Stationary frame theory. The steady state and transient response of drive under
dynamic load condition is studied and compared with different types of PWM
techniques. Space vector modulation fed induction motor drive is compared with
various PWM fed inverter drive and the performance is analyzed in MATLAB/Simulink. |
Keywords: |
Pulse width Modulation, Torque, Induction motor, MATLAB/ Simulink. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
FL2440 HARDWARE BASED NEURAL DATA SECURITY USING POLARIZATION ENCRYPTION (EP)
APPROACH |
Author: |
KULDEEP CHOUHAN, DR. S. RAVI |
Abstract: |
Encryption scheme is widely used in the field of communication network security.
The network systems are focus on reliability, service and functions, which
provided end-to-end service to protect encrypted data node. It enables to
interconnect the various functional levels to interact and communicate with each
other. An interconnected group of nodes use a computational model for data
processing, which is based on a node connections approach. In this work, data
are transmitted from ‘n’ inputs as packets (e.g. 1 byte), through hardware based
EP, shows polarized output after checking bits. Similar, process is followed to
make sure for encrypted data for another in node clusters is proposed. An
experimental setup is done with python based polarised NN output to check
whether testing phase of bits is enable to check an error during training
process is also presented. |
Keywords: |
Data Security, Polarization Encryption, FL2440 Hardware Board, Cluster Of Nodes |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY BALANCE OF OPTIMIZED THREE-PHASE HIGH VOLTAGE POWER SUPPLY FOR MICROWAVES
GENERATORS WITH N MAGNETRONS BY PHASE (TREATED CASE N=1) |
Author: |
M.BASSOUI, 1M.FERFRA, M.CHRAYGANE, M.OULD AHMEDOU, N.ELGHAZAL, B.BAHANI,
A.BELHAIBA |
Abstract: |
This original work deals with the calculation of the power and the performance
of optimized three-phase high voltage power supply for industrial microwaves
generators with N magnetrons by phase (Treated case N=1). The design of this
power supply is composed of three π quadruple models equivalents of new
three-phase transformer with magnetic shunts of each phase; every one supplies
at its output a voltage doubler cell composed of a capacitor and a diode that in
its output supplies only one magnetron. In this work we will validate under
Matlab Simulink the functioning of this new three-phase power supply and we will
calculate its performance .The results obtained from this simulation compared
with those obtained by experimental and simulated of conventional power supply
using a single phase transformer for one magnetron are in good conformity.
Following that, we will apply an optimization strategy that aims to reduce the
volume of the three-phase transformer while respecting the constraints
recommended by the manufacturer concerning the current flowing in each magnetron
(Imax <1.2 A, IAv ≈ 300 mA). Based on the selected solution from optimization,
we will validate the functioning of the power supply by calculating its
performance that must be identical to that treated for the reference case. |
Keywords: |
Optimization, Power Supply, Performance, Modeling, Energy Balance, Average Power |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
ARTIFICIAL BEE COLONY (ABC) AND NEURAL NETWORK BASED OPF TECHNIQUE WITH FACTS
CONTROLLER |
Author: |
M.KARTHIKEYAN, P.AJAY-D-VIMAL RAJ |
Abstract: |
In the paper, hybrid technique for solving optimal power flow problems that
occur in power systems. The proposed hybrid technique is the combination of
artificial bee colony (ABC) algorithm and artificial intelligence (AI)
technique. The purpose of the ABC algorithm is used to optimize the optimal
operating range of generation limits. So, the fuel cost and the emission of the
power generation system is maintained economically. Because, the ABC is an
optimization algorithm based on the intelligent foraging behaviour of honey bee
swarm. Here, the artificial neural network (ANN) is used as an AI technique. ANN
is one of the AI techniques which used for determining the optimal injected
voltage magnitude and voltage angle of UPFC. The optimal placement of UPFC is
depends on the power flow deviation and the combination of the power system
buses. Using the propose hybrid OPF technique, the optimal power flow of the
power system is maintained. The proposed hybrid technique is implemented in
MATLAB working platform and the power flow parameters are evaluated. The
performance of the hybrid technique is compared with ABC algorithm. |
Keywords: |
OPF, Hybrid Technique, FACTS Controller, UPFC, ABC Algorithm, AI Technique, ANN,
Power Loss. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
QUANTUM SEGMENTATION APPROACH FOR VERY HIGH SPATIAL RESOLUTION SATELLITE IMAGE:
APPLICATION TO QUICKBIRD IMAGE |
Author: |
SALAH EDDINE MECHKOURI, RACHID ZENNOUHI, SALEH EL JOUMANI, LHOUSSAINE
MASMOUDI, JAVIER GONZALEZ JIMINEZ |
Abstract: |
Through previous studies on the extraction of information for the land use and
land cover, and the segmentation for the Very High Spatial Resolution Satellite
Images –VHSRSI– have shown satisfaction, such as the unsupervised classification
(ISODATA and KMEANS) and the hierarchical analysis of the 2D-histograms.
However, in various situations, closed areas are classified as homogeneous. We
believe that the quantum mechanics theory which is connected with information
theory in communication and digital image processing, could take into account
more information about pixels classification process and permits to distinguish
between closed distinct areas. Based on this theory, we develop a new image
segmentation algorithm for Very High Spatial Resolution Satellite Images. Pixels
classification is performed by unsupervised classification method via the
hierarchical analysis of the 2D-histograms which is constructed using the
wavefunction. The proposed approach has been tested on synthetic image, and
applied to urban environment classification for Quickbird data of a selected
urban zone of the region of Rabat-Sale-Zemour-Zayer, prefecture of
Skhirat-Temara, Morocco. |
Keywords: |
Classification, 2D-histogram, Wavefunction, Quickbird image, Segmentation
|
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
A STUDY ON THE SATISFACTION WITH SERVICE-ORIENTED WEDDING CATERING PLANNING
SYSTEM |
Author: |
HUNG-TENG CHANG |
Abstract: |
Due to the change of social atmosphere and the decreasing population, the
wedding catering industry in Taiwan is facing increasingly fierce pressure of
market competitiveness. Moreover, due to the increased popularity of information
technology and the application of service-oriented architecture (SOA)
information system to marketing and management procedures, the use of planning
system has also become a strategy to attract young consumers and increase
consumer willingness. This study selected a certain wedding catering industry
operator in the northern Taiwan who commissioned the development of a wedding
catering planning system as the research object, and selected the customers who
actually used and completed consumer behavior as the subjects, in order to
understand whether SOA-based wedding catering planning information system meets
the needs of customers. Firstly, this study collected and arranged the studies
concerning information system and customer satisfaction. Secondly, this study
used the IS Success Model proposed by DeLone and McLean as the basis, took into
account the applicability and purpose of this study and referred to the studies
and questionnaires of relevant scholars to design the questionnaire of this
study. Thirdly, this study distributed questionnaires via mail or interviews to
assess the results and complete the arrangement of raw data. Lastly, this study
performed statistical analyses on the data according to the research methods and
hypotheses. The empirical results of this study are as follows: (1) the
subjects’ overall actual assessment on the system met the expected level of this
study. Therefore, the developed system was viewed as a successful set of
planning system which could effectively meet consumer satisfaction and market
needs; (2) system quality affects willingness to use and consumer satisfaction;
(3) information system affects willingness to use and user satisfaction; (4)
willingness to use and user satisfaction affects net benefits. The
aforementioned findings and results can be provided as reference for wedding
catering enterprises in Taiwan to introduce relevant systems. |
Keywords: |
Service-Oriented Architecture, Is Success Model, Information Quality, System
Quality, User Satisfaction |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
KEY-DEPENDENT S-BOX IN LIGHTWEIGHT BLOCK CIPHERS |
Author: |
SUFYAN SALIM MAHMOOD ALDABBAGH, IMAD FAKHRI TAHA AL SHAIKHLI, MUHAMMAD REZA ZABA |
Abstract: |
This paper introduces new methods of how to generate a suitable key-dependent
substitution boxes (S-boxes) for use in lightweight block ciphers. An S-box is
commonly used in block ciphers to provide the crucial property of nonlinearity.
And one of the advantages of using key-dependent S-boxes is that it is difficult
for an attacker to perform attacks such as differential cryptanalysis on the
cipher since the S-boxes are unknown. However, implementing such S-box incurs
costs, which is one of the criteria that a lightweight block cipher has to
minimize. It is therefore important to have a key-dependent S-box method which
always outputs a cryptographically strong S-box and has a small footprint. In
this paper, we propose novel methods on how to generate s-boxes based on the
value of the secret key. Moreover, this research showed the intensive analysis
for cost and security for each method. |
Keywords: |
S-Box, PRESENT Lightweight Block Cipher, Key Dependent S-Box, Linear
Cryptanalysis And Differential Cryptanalysis |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
Title: |
A MULTIPLE CLICK BASED GRAPHICAL AUTHENTICATION SYSTEM |
Author: |
S. YAMINI, Dr. D. MAHESWARI |
Abstract: |
Authentication is possible in several ways namely textual, graphical,
bio-metric, 3D password and third party authentication. In this paper, the
authentication system is presented by introducing the multi-level authentication
technique which generates the password in multiple levels to access the
services. The details of proposed multilevel authentication techniques are
presented along with data flows, algorithms. In today’s scenario, graphical
password is the alternative in network security to replace text-based password
in which users interact with images for authentication rather than input
alphanumeric strings. In general, the image-based authentication can be classified
into two categories, i.e, click-based graphical password and choice-based
graphical password. However, each of them is having several limitations. In this
paper, a multiple Click based graphical authentication system (MC-GAS) is
proposed with the purpose of improving the image-based authentication in both
security and usability by combining the above two techniques with alpha numeric
password. |
Keywords: |
Graphical Password, Multi-level Authentication, Secured Remote Accessibility,
Network Security, Multiple Clicking. |
Source: |
Journal of Theoretical and Applied Information Technology
20 April 2014 -- Vol. 62. No. 2 -- 2014 |
Full
Text |
|
|
|