|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April 2014 | Vol. 62 No.3 |
Title: |
LINKED OPEN GOVERNMENT DATA AS BACKGROUND KNOWLEDGE IN PREDICTING FOREST FIRE |
Author: |
GURUH FAJAR SHIDIK, AHMAD ASHARI |
Abstract: |
Nowadays with linked open data, we can access numerous data over the world that
more easily and semantically. This research focus on technique for accessing
linked open government data LOGD from SPARQL Endpoint for resulting time series
historical of Forest Fire data. Moreover, the data will automatically uses as
background knowledge for predicting the number of forest fire and size of burn
area with machine learning. By using this technique, LOGD could be used as an
online background knowledge that provide time series data for predicting trend
of fire disaster. In evaluation, mean square error MSE and root mean square
error RMSE are used to evaluate the performance of prediction in this research.
We also compare several algorithm such as Linear Regression, Neural Network and
SVM in different window size. |
Keywords: |
Linked Open Government Data, Forest Fire Prediction, Time Series Data,
Data Mining. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
ON LONG-RANGE-DEPENDENCE SYNTHETIC DATA GENERATION THROUGH HEAVY-TAILED
DISTRIBUTIONS |
Author: |
ABDULLAH S. BALAMASH |
Abstract: |
Comprehensive analysis of the Internet traffic conducted over the last decade
revealed the concept of long-range dependence (LRD) in the collected data
traces. Some of this analysis work proved that this property is a result of the
heavy tailed distribution of the packet inter-arrival time, which is a result of
the heavy tailed distribution of packet size of the traffic sources. In this
paper, we use this fact to build a traffic generator model that is based on
multiplexing sources of heavy-tailed inter-arrival times and then counting the
number of arrivals in the successive periods of length T. To come up with a
parameterized model, we also study the effect of the heavy tailed distribution
parameters (i.e. the Pareto distribution), and the time scale along with the
number of multiplexed sources on the LRD of the generated traffic. Our model is
different from the on/off models proposed in the literature that need to
multiplex a very large number of sources, while we need only a few sources. Our
findings are; 1. The LRD level is higher for sources with heavier tails; 2.
There is a need to multiplex only a few sources; 3. The LRD level is higher for
larger time scales; 4. Fixing the time scale and tuning the tail of the
distribution helps us to come up with a parameterized linear model that only has
one parameter, which is the Hurst parameter. |
Keywords: |
Data generation; Heavy-Tailed Distributions; Long range dependence;
Self-similarity |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
OPTIMIZATION OF TRANSACTION PROCESSING IN CLOUD DATABASES THROUGH A DATACENTER
SYSTEM DESIGN CRACS TO IMPROVE REPLICA CONSISTENCY, AVAILABILITY AND SCALABILITY |
Author: |
R. ANANDHI, DR. K. CHITRA |
Abstract: |
It is obvious that tremendous achievements have been emerged in IT industries at
various sectors. If we have a keen look, all the technologies are revolving
around a single word “DATA”. All techniques are trying to improve the read and
write of data from and to the database. Usually read and write are referred by
common word called “transactions”. Cloud Computing is one of those technologies
that involves execution of Database transactions. This paper provides a system
model called CRACS which maintains atomicity, isolation, consistency and
durability of transactions at NOSQL databases which usually try to deviate from
above said properties of transactions. |
Keywords: |
ACID, BASE, Cloud Computing, Consistency, Datacenter, Transactions. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A MICROCONTROLLER-BASED AUTOMATIC HEART RATE COUNTING SYSTEM FROM FINGERTIP |
Author: |
MAMUN, A. L., AHMED, N., ALQAHTANI, M., ALTWIJRI, O., RAHMAN, M., AHAMED, N.U.,
RAHMAN, S.A.M.M., AHMAD, R.B., SUNDARAJ, K. |
Abstract: |
This article describes the design process of a low cost and portable
microcontroller based heart-rate counting system for monitoring heart condition
that can be implemented with off-the-shelf components. The raw heart-rate
signals were collected from finger using IR TX-RX (Infrared Transmitter and
Receiver pair) module which was amplified in order to convert them to an
observable scale. The inherent noise signal was then eliminated using a low pass
filter. These signals were counted by a microcontroller module (ATmega8L) and
displayed on the LCD panel. An algorithm has been developed which was programmed
into the microcontroller to run the proposed heart rate counting system. The
results obtained using the developed device when compared to those obtained from
the manual test involving counting of heart rate was found satisfactory. The
proposed system is applicable for family, hospital, clinic, community medical
treatment, sports healthcare and other medical purposes. Also, fit for the
adults and the pediatrics. However, presented method in the developed system
needs further investigation and need more functionality, which may be useful to
consider advance in future research. |
Keywords: |
Heart Rate, Microcontroller, Finger-Trip, Sensor. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE IMPROVEMENT OF ROBUST CALL ADMISSION CONTROL ALGORITHM FOR QOS
SUPPORT OVER FUTURE GENERATION WIRELESS HETEROGENEOUS NETWORKS |
Author: |
G.NANTHA KUMAR, DR. A.AROKIASAMY |
Abstract: |
Admission Control plays a remarkable role in dealing with lots of wireless
heterogeneous networks which may admit new sessions for a network with most
conquer aspect to supply the requested QoS. To keep off the abjection of QoS
under the low priority sessions here, we nominate a QoS based Robust Call
Admission Control (RCAC) Algorithm. The service classes are assorted into four
major categories on the basis of class of service and type of service, which
could be reacted on the real time and non real time traffics along with handover
and incoming new request. The algorithm concentrates on providing priority based
on transmission and space. This algorithm trying to downplays the blocked
sessions that have been chosen with deficient resources around the network. With
the help of simulated results and graph, we display that our suggested technique
affords improve throughput along with cut down in delay. |
Keywords: |
QoS, Wireless networks, admission control, RCAC (Robust Call Admission
Controller), CAC (Call Admission Control) |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
OPTIMIZATION ALGORITHM BASED H-∞ CONTROL METHOD FOR CONTROLLING SWITCHED
RELUCTANCE MOTOR (SRM) |
Author: |
A.RAJENDRAN, S. PADMA |
Abstract: |
In classical H- Infinity control technique, the uncertainties have parameters
namely model error and variation outer disorder. But, the H-infinity control
technique is an external control technique. The weight of the transfer function
matrix is improved and the system is controlled perfectly by totaling the input
weight noise function matrix value and weight uncertainty. The weight of the
transfer function matrix is changed at different system state. Therefore, an
optimal control weight is needed to make the system robust. The process of
finding optimal control weight is complex because the H-infinity control process
is a closed loop controller. This would result in fall of control accuracy and
also increases the merging time. To overcome these difficulties, in this paper,
an optimal H-infinity control concept is proposed. In the proposed control
procedure, the optimal transfer function matrix weight is obtained by genetic
algorithm (GA) which is an efficient optimization algorithm. The proposed GA
based optimal H-infinity control method is implemented in MATLAB. Also, the
speed of the switched reluctance motor (SRM) is controlled by the proposed
optimal H-infinity control technique and the speed controlling concert is tested
with the straight H-infinity control technique. The weight noise setting is
obtained for every time instant and optimal weight noise is calculated. The
optimal weight noise setting can be attained by H- infinity optimal control
using GA approach. |
Keywords: |
SRM, Speed Control Technique, Optimal H-Infinity Control, Robustness And
Genetic Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
HIGH SPEED AND AREA EFFICIENT FPGA IMPLEMENTATION OF FIR FILTER USING
DISTRIBUTED ARITHMETIC |
Author: |
K.G.SHANTHI, N.NAGARAJAN |
Abstract: |
In this paper, high speed and area efficient multiplier-less architecture for
Finite impulse response filter (FIR) based on distributed arithmetic is
presented. The proposed Lookup table less architecture for FIR filter uses the
speed advantage of Carry save adder. A modification in the shift accumulator
stage yields both high speed and area savings. Furthermore, Memory reduction is
possible since there is no Lookup table of precomputed values and only based on
the input value the needed coefficient values are calculated. The proposed LUT
less architecture was implemented on a Xilinx FPGA device. Number of slices,
minimum period and maximum frequency were the performance metrics obtained for
different filter orders and the results prove that the proposed method yields
higher speed and smaller area when compared with the existing LUT-less
architectures. |
Keywords: |
Finite Impulse Response Filter (FIR), Distributed Arithmetic (DA), Lookup
Table (LUT), Carry Save Adder (CSA), Shift Accumulator (SA). |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A TEST DATA COMPRESSION SCHEME FOR MINIMIZING TEST DATA VOLUME AND SCAN POWER |
Author: |
B. MANJURATHI, R. HARIKUMAR, K.S. GANESH KUMAR, KAREN THANGAM JACOB |
Abstract: |
Testing a system-on-a-chip (SoC), poses serious issues and challenges owing to
the large test data volume and large scan power consumption. To reduce the
volume of test data and scan power, several test data compression techniques
have been proposed. This paper presents a new test data compression scheme,
which simultaneously reduces test data volume and power consumption for the
requirement of testing a system-on-a-chip (SoC). The proposed approach is based
on the use of Hamming Distance based Reordering, MT (Minimum Transition)-fill
technique and Variable Prefix Run-length (VPRL) codes for test data compression.
These VPRL codes can efficiently compress the data stream of test patterns, that
are composed of both runs of 0s and 1s. Experimental results for ISCAS’89
benchmark circuits supports and proves the proposed approach, better to the
other existing techniques, by reducing test data volume and scan power
consumption. |
Keywords: |
Hamming distance, MT-Fill, VPRL code, Test data compression, Compression
ratio, Average power, Peak power. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NOVEL HYBRID APPROACH BASED ON GEOMETRIC WAVELETS FOR EFFICIENT IMAGE
COMPRESSION |
Author: |
REHNA. V. J, DR. JEYA KUMAR. M. K |
Abstract: |
A novel hybrid algorithm based on geometric wavelets for efficient compression
of digital images is proposed. The presented work combines the recent
segmentation based binary space partition scheme with the popular geometric
wavelet coding method to capture the edge singularities in a more effective way
and to provide the sparse representation of the image. The BSP scheme uses polar
co-ordinate representation of straight line for partitioning the image domain.
This improved the choice of bisecting lines available for partitioning thereby
enhancing the probability of reducing the cost functional. A new pruning
algorithm is tried to optimize the rate distortion curve and achieve the desired
bit rate. A new “geometric” context modeling scheme combined with arithmetic
coding is designed to boost the performance of the algorithm. The
signal-to-noise ratios are compared with state-of-the-art wavelet coders; recent
segmentation based algorithms as well as the original geometric wavelet coding
algorithm and found that the results outperform the existing methods. The
results report a gain of 2.19 dB over the EZW algorithm and 1.35 dB over the
SPIHT algorithm at the bit-rate 0.0625 bpp. The presented algorithm shows a gain
of 1.01 dB over the original GW algorithm at the compression ratio of 128 for
the Lena test image. But for the high computational complexity and hence
increased time complexity, the algorithm gives remarkable results in terms of
rate-distortion compression. |
Keywords: |
Binary Space Partition, Geometric Wavelets, Hybrid Coding, Rate-Distortion
Compression, Signal-to-Noise Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
CDMA BASED SECURITY FOR WARM-HOLE ATTACKS IN UNDERWATER WIRELESS SENSOR NETWORK
SYSTEM |
Author: |
K.DURGA DEVI, M.MENAKA |
Abstract: |
Regular activity of the human is being extended to marine and sub-marine
regions. Invention of war activity and marine research on minerals and
bio-diversity is leading to install wireless sensor devices in deep underwater
system. The underwater sensors and network areas are applied through a number of
applications like research, water games, self-defense against enmity, finding of
minerals and study of the effect of soil erosion, bio-diversity, and greenhouse
effect. Marine weather is having a strong impact on the transmission system.
Marine weather imposes highly corrosion, multipath fading, high delay, limiting
bandwidth, multi-path fading on the transmission system. Worm-hole is one of the
multi paths fading error in underwater sensor technology. A wormhole is caused
by the mirror image effect of transmission system from one device to another
device. Wormhole causing serious problem like fading of important data, adverse
effect on the neighbor devices present in underwater system, illegal data
transmission and using valuable bandwidth. To avoid the warm - hole effect on
under water network system this method proposes a CDMA based transmission which
is having a numbering system for every device present in the network, every node
is having a controller which can detect it through calculation method. This
technique is an efficient error detecting technique without any overload of
extra hardware device and complex protocol. |
Keywords: |
Underwater Sensors, Worm-Hole, CDMA Technology, And Authentication Check |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NOVEL APPROACH FOR DYNAMIC CLOUD PARTITIONING AND LOAD BALANCING IN CLOUD
COMPUTING ENVIRONMENT |
Author: |
SUGUNA R, DIVYA MOHANDASS, RANJANI R |
Abstract: |
Cloud Computing is an attracting technology in the field of computer science.
Cloud Computing involves sharing of resources. In the event of processing many
jobs, the load balancing becomes essential for efficient operation and to
improve user satisfaction. This paper introduces the strategic model that
performs load balancing as well as dynamic partition of the nodes of different
cloud. Different Load balancing strategy is applied for different situations.
The algorithm applies game theory to load balancing strategy to improve the
efficiency in the cloud environment |
Keywords: |
Load Balancing; Dynamic Partition, Game Theory, Cloud Partitioning |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFECT OF CROSSOVER AND MUTATION OPERATORS ON HAMMING DISTANCE OF THE
OFF-SPRINGS IN GENETIC ALGORITHM |
Author: |
FARHAD NADI, AHAMAD TJUDIN KHADER |
Abstract: |
Crossover and mutation operators are the only operators that change the values
of the loci in genetic algorithm. New solution would be generated using this two
operators and with the aid of selection operators the search will be directed
towards the promising solutions. The resulted solutions of these operators are
highly dependent on their parameters. Crossover operators take two parent
solutions as input and create two new offspring solutions which will be resulted
from mixing the parent solutions. Mutation operator however, is a unary operator
that takes a solution and randomly change the values of some of the loci. The
resulted offspring would have different distances from their original parents.
In this research the distance of the parent solution and their offspring will be
studied. It has been shown that mutation operator could reduce the distance
between parent and the off-springs. |
Keywords: |
Genetic Algorithms, Parameter Control, Parametric uniform crossover,
Exploration, Exploitation |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
3-D INTERFACE DESIGN OF THE VIRTUAL WORLD IN E-LEARNING |
Author: |
BENS PARDAMEAN , ALIF WIJAYAKUSUMAH |
Abstract: |
Digital applications in teaching and learning are becoming more essential. It is
believed that an online learning system can significantly improve the quality of
education since it transcends time and space, a desirable trait in today’s
fast-paced and Internet-laden world. Nowadays, the 3D interface system used as a
medium of online learning has further improved the 2D interface system. However,
what kind of 3D interface system should be designed to increase students’
interaction and engagement with the system? This paper details a 3D interface
design that can meet the demands of interactivity and engagement for the system.
By applying the Qualitative-Interactive approach, data were collected through
literature study and interviews with several experienced practitioners in the
field of online learning. Based on the results of data analysis, it was
concluded that there were two key features that should be included in the 3D
interface design, namely avatar and environment. The presence of both features
is expected to increase students’ interactivity and engagement within an online
learning system. A prototype design was created to depict a more concrete
picture on the benefits and the ease of 3D interface system usage, equipped with
both avatar and environment features. |
Keywords: |
E-Learning, 3D Environment, Avatar, 3D Virtual World, Learning Management
System, Gesture Animation |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERSONALIZED WEB SEARCH METHODS – A COMPLETE REVIEW |
Author: |
J.JAYANTHI, DR.S.RATHI |
Abstract: |
Internet’s foremost information retrieval service is the World Wide Web. It
serves as a platform for retrieving variety of information that are associated
with research, education , marketing, sports, games, politics, Finance, etc. The
utter volume of information growth leads to the information overload on the
Internet. Search engines are the collection of programs that facilitates
information retrieval from the Internet. Even though the search engines do a
good job of retrieving content from the Internet, users often feel disoriented
about the result retrieved. Hence, no matter who the user of the search engine
is, if the same query is provided as input to the search engine, the results
returned will be exactly the same. The need to provide users with information
tailored to their needs led to the development of various information
personalization techniques. Personalization aims to provide users with what they
need either by asking explicitly or implicitly. Web Personalization is
conventionally defined as the process of tailoring web pages to satisfy the
individual user needs by adapting different approaches. Several personalized web
search models were developed based on web link structure, web contents, user
queries, user profiles, browsing history etc. A Personalized Web Search has
various levels of effectiveness for different users, queries, contexts etc.
Personalized search has been a most important research area and many techniques
have been developed and tested, still many issues and challenges are yet to be
explored. This paper concentrates on the analysis, comparison and application of
many personalized web search approaches that are being widely used today .Hence
the motivation of this survey is directed towards to understand the web
personalization processes, benefits, limitations and future trends. |
Keywords: |
Data Preprocessing, User Modeling, Page Ranking Strategies, Learning
Methods,Personalization. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY OF MULTI ATTRIBUTE RANKING MECHANISMS FOR P2P NETWORKS |
Author: |
SWAMINATHAN B, SHEILA ANAND |
Abstract: |
P2P systems are distributed, decentralized networks that enhance resource
sharing. The decentralized, open and anonymous nature of P2P systems can raise
serious concerns for a peer. There is no control or accountability on the
content or resources that a peer can share on the network. Hence, the process of
selecting the right peer for collaboration and its decision making process
becomes difficult. This paper discusses the implementation of three methods of
Multi Criteria Decision Making (MCDM) models Analytic Hierarchy Process (AHP),
Preference Ranking Organization Method for Enrichment Evaluations (PROMETHEE)
and ELimination and Choice Translating REality (ELECTRE). A detailed comparative
study of the three models was performed and the results are presented. From the
results it can be inferred that while the execution time for AHP method is
higher than that of the other two methods, it has the optimal selection of the
given alternatives according to the requirement. PROMETHEE AND ELECTRE support
the selection of best choice among the alternatives. |
Keywords: |
AHP, PROMETHEE, ELECTRE, Collaborate, Decision Making |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGNING AN EMBEDDED COMMUNICATION AID FOR SPEECH IMPAIRED USING XBEE AND GSM |
Author: |
V. RAMYA, B. PALLANIAPPAN |
Abstract: |
The speech impaired communicates with normal people in everyday life and they
use sign language for communication, but they find difficulty in communicating
with others who do not understand sign language. And often they need a support
for effective communication and this work aimed to lower this barrier in
communication. It is based on the need of developing an electronic device that
can translate sign language into speech and text, in order to make the
communication take place between the mute communities with the general public.
Most of the existing systems are image based gesture recognition system and
hence highly expensive, whereas this work has developed a low cost Glove based
system. The developed system is a complete portable communication aid for the
speech impaired which includes converting the sign language in to speech and
text, sending the same as message through GSM and controlling the home
appliances through hand gesture. In which a hand glove with a 3 axis MEMS and
Flex sensor is connected to the ADC channels of the LPC 2138 Microcontroller
(M1). The output values from the MEMS and Flex sensor are transmitted to another
LPC 2138 microcontroller (M2) at the receiver section through the XBee module.
At the receiver section there are two modes namely, teach and play mode and the
desired mode is selected through the switch, which is interfaced with the
microcontroller. The first mode is the teach mode, in which the microcontroller
stores the sign values in EEPROM corresponding to a letter or word, along with
an address and the corresponding voice is recorded in voice IC (APR6016). The
second one is the play mode, in which the microcontroller recognizes the sign
for the corresponding letter/word and plays back the sound values from the voice
IC. The letter or word is then displayed on the LCD and a SMS (Short Message
Service) is sent through the GSM modem. The device connected to the relay can be
turned ON / OFF as per the sign values stored in the teach mode. is the teach
mode, in which the microcontroller stores the sign values in EEPROM
corresponding to a letter or word, along with an address and the corresponding
voice is recorded in voice IC (APR6016). The second one is the play mode, in
which the microcontroller recognizes the sign for the corresponding letter/word
and plays back the sound values from the voice IC. The letter or word is then
displayed on the LCD and a SMS (Short Message Service) is sent through the GSM
modem. The device connected to the relay can be turned ON / OFF as per the sign
values stored in the teach mode. |
Keywords: |
APR6016; ASL; Communication aid; GSM; MEMS; XBee |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF PASSIVE FILTERS FOR REDUCING HARMONIC DISTORTION AND CORRECTING POWER
FACTOR IN TWO PULSE RECTIFIER SYSTEMS USING OPTIMIZATION |
Author: |
D.MAHESWARAN, N.RAJASEKAR, L.ASHOK KUMAR |
Abstract: |
This work presents a method capable of designing passive filters to reduce
harmonic distortion and correct the power factor in two pulse Rectifier system.
The optimization process considers the discrete nature of the size of the
element of the filter. This new formulation is a combinatorial optimization
problem with a non-differentiable objective function. In addition a solution
methodology based on an optimization technique Genetic Algorithm (GA) is
proposed to determine the size of filters. The steps involved in GA are clearly
explained. Simulation and experimental results for GA based design are
presented. |
Keywords: |
Filters, Optimization, Power System Harmonics, Power Quality, Total Harmonic
Distortion. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A FUZZY LOGIC APPROACH TO TROPICAL CYCLONE EYE LOCATION (TCEL) USING INDIAN
GEOSTATIONARY METEOROLOGICAL SATELLITE IMAGERY |
Author: |
R. SENTHILKUMAR Dr.K. PORKUMARAN |
Abstract: |
This paper presents the applications of image processing specifically using
Indian meteorological satellite imageries. The eye is the very important
characteristics of a mature Tropical cyclone (TC) and realization their location
is very difficult for weather forecast. In order to improve the objectivity and
precision of the location of TC, a novel intelligent and automatic system frame
work will be proposed to locate the tropical cyclone center, based on Indian
Geostationary Meteorological satellite imageries. In this paper, a Fuzzy logic
based algorithm presented for extraction of tropical cyclones eye location from
geostationary meteorological satellite imagery. As the shapes and features of
the atmospheric systems observed in satellite imagery are inherently ambiguous,
fuzzy logic seems an appropriate tool for feature extraction. The proposed
computing methodology produced in this paper was applied in experimental cyclone
forecasting by the joint typhoon warning center (JTWC). The probability of
detecting the system is effective and the performance errors are well quite
acceptable for actual practical implementation. |
Keywords: |
Tropical Cyclone, Eye, Center Location, Satellite Cloud Image, TCEL, VHRR, VIS,
TIR, WV. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
SECURITY ENHANCEMENT IN VIDEO WATERMARKING USING WAVELET TRANSFORM |
Author: |
B.SRIDHAR, C.ARUN |
Abstract: |
Video watermarking distinguishes to make clear the issue of unlawful control and
conveyance of information. Watermarking is the knowledge of concealment the
information into host such that the embedded data is imperceptible. In our
system, the secret color information is divided into notable pieces and conceals
selected frames under the wavelet domain. Consequently the watermark is arranged
properly in accordance with the human visual framework which makes them
unobservable. Additionally the position of the secret data is settled on the
cover image, and flows along with moving objects, thus the motion artifacts can
be avoided. The different watermarked frame extraction guarantees that the
watermark might be effectively recovered from a quite short fragment of video.
Inserted watermark is less detectable as well as robust against regular video
processing attacks with much lower unpredictability. |
Keywords: |
Video Watermarking, Information Hiding, Wavelet transform, Selective frame
Embedding, Watermark Extraction. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
TOWARDS DEVELOPING AN EFFECTIVE TECHNIQUE TO COMPRESS MEDICAL IMAGES |
Author: |
K.GOPI, The images play an important role in many of the applications. There are
several techniques to compress these images in order to reduce the size of the
image without any loss of data. This paper proposes an effective technique to
compress the medical images using an improved ridgelet transform. This improved
technique replaces the discrete wavelet transform in the ridgelet transform with
the slantlet transform. This slantlet transform is an orthogonal DWT and has two
zero moments with improved time localization. In this proposed technique the
medical image is compressed using the improved ridgelet transform and then we
apply thresholding and quantization methods to the ridgelet coefficients of the
compressed medical image. Also the proposed technique requires only minimum
number of coefficients for reconstructing the medical image without any loss of
data. Comparison is made between the ridgelet transform and the proposed
improved ridgelet transform in terms of SDME and this technique assures to
provide higher signal to noise ratio.Dr.T.RAMASHRI |
Abstract: |
Ridgelet Transform, Discrete Wavelet Transform (DWT), Slantlet Transform (SLT),
Thresholding, Quantization. |
Keywords: |
|
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN ENERGY SAVING SET ASSOCIATIVE CACHE ALGORITHM WITH IMPROVED PERFORMANCE |
Author: |
S.SUBHA |
Abstract: |
Enabling one way in set associative cache during operation is proposed in
literature. However, this architecture degrades the average memory access time.
This paper proposes an algorithm to map to certain way in set associative cache
improving the performance. The address is mapped to certain way by certain
transformations involving XOR'ing and shifting and bit selection. The line is
accessed or placed/replaced in the mapped way. One way is enabled during this
operation. A mathematical model is developed for the proposed model. Conditions
for energy saving and performance improvement are derived. Simulations with
SPEC2K benchmarks are performed. Energy improvement of 38% with performance
improvement of 20% is observed for the chosen parameters. |
Keywords: |
Average Memory Access Time, Cache Algorithm, Cache Performance, Energy Saving,
Set Associative Cache |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A SECURE BIOMETRIC BASED APPROACH FOR PROVIDING SECURITY SERVICES IN
RESOURCE-AWARE DISTRIBUTED COMPUTING ENVIRONMENT |
Author: |
T. HEMALATHA, G. ATHISHA |
Abstract: |
In recent years there is a need for a security infrastructure for our ubiquitous
digital life without using Public key infrastructure and shared session key
cryptography algorithms. Since the system scales up, the peer to peer approach
is attractive to Distributed Computing Environment due to increase in large
amount of resources. The resources in such environment possess different
characteristics. The need for security services for such resource restricted
environment is a challenging issue. Hence, in this paper a novel algorithm is
proposed that uses the macro feature of the fingerprint biometric of the sender
and the receiver to generate key(s). The proposed technique provides different
security services like Authentication, Non repudiation and Confidentiality. In
this work a novel key generation algorithm is proposed to generate unique set of
keys by using both sender and receiver’s fingerprint biometrics. These keys are
shared between the sender and the receiver by using the underlying concrete
S-MIME protocol. Several samples are collected and the macro features are
extracted using Finger print feature extraction algorithm. Out of ‘n’ ridges, a
ridge is selected and plotted on the x-y axis. Plotting is done as per the
sender’s choice. A set of points are selected and the key is generated. The
proposed algorithm is implemented in C# DotNet and MATLAB and the results are
tested and verified by taking a set of samples. The results of the proposed
algorithm are compared with the existing PKI based algorithm with respect to the
encryption time, decryption time and memory required. |
Keywords: |
Biometric, Finger Print, Key Generation, Security, Ubiquitous |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
AGENT BASED SOLUTION OF SYSTEM DYNAMICS SIMULATION MODELING: A CASE OF RICE
STOCK BY THE NATIONAL LOGISTIC AGENCY OF INDONESIA |
Author: |
TOGAR ALAM NAPITUPULU |
Abstract: |
Because of its trategic role in the economy of Indonesia, managing trading of
rice nationwide has been assigned as one of the main function of the State Owned
Company, BULOG. In helping to manage this commidity, a system dynamics model was
built. Agent based model can also be built to facilitate decision making
activities in rice economy. It is shown and argued that both modeling approach
would generate the same result. It is further argued that agent based model
could be more powerful and general to capture a more complex structure and
dynamics. Furthermore, it enable construction of models in the absence of the
knowledge about the global interdependencies at aggregate level. |
Keywords: |
System Dynamics Modeling, Agent Based Modeling, Government Rice Stock Policy |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
A SURVEY OF STATE OF THE ART: HIERARCHICAL ROUTING ALGORITHMS FOR WIRELESS
SENSOR NETWORKS |
Author: |
HUSAM KAREEM, S.J. HASHIM, A. SALI, SHAMALA SUBRAMANIAM |
Abstract: |
Generally, any device that has the ability to sense the surrounding environment
can be considered as a sensor node. A wireless sensor network is a group of
sensor nodes that cooperate with each other, it may contain a few numbers of
sensors or it can consist of thousands of sensors. Wireless sensor networks can
be used in wide range of applications such as measuring temperature, humidity,
pressure, noise level, monitoring the vehicular movement, military applications
and health applications. One of the main crucial issues can face the operation
and the surveillance of wireless sensor networks is energy consumption. Energy
in wireless sensor networks mostly powered by battery and the greatest share of
this energy is consumed during data transmission. Many researches have been done
to solve this problem or at least find a solution to decrease the energy
consumption. One of those solutions is using efficient routing algorithm. The
most efficient type of algorithms that can be used for WSNs in large areas is
hierarchical routing algorithms. In this article, we will present a review for
the state of the art for recent hierarchical algorithms. Moreover, we will use
criteria to classify the hierarchical algorithms that never used before in any
article, which is the mechanism that implemented in the hierarchical algorithm
such as clustering, chaining, or hybrid between cluster and chain. |
Keywords: |
Wireless Sensor Networks, Hierarchical Routing Algorithms, Clustering Routing
Algorithms, Chain Routing Algorithms, PEGASIS, LEACH. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
LOW POWER FEED FORWARD FFT ARCHITECTURES USING SWITCH LOGIC |
Author: |
DHANABAL R, BHARATHI V, SUJANA D.V., SHRUTHI UDAYKUMAR, JOHNY S RAJ, ARAVIND
KUMAR V.N |
Abstract: |
The computation of FFT has become necessary in almost all DSP based applications
and image processing applications. The radix-22 feed forward (MDC) FFT
architecture originated for the systems which require high performance. The
architecture uses both trivial and non trivial rotators for the computation of
FFT. This paper proposes a switch logic in place of trivial rotators thereby
reducing computational complexity. The compilation, elaboration and simulation
of the design is done using NC launch tool. The design has been synthesized with
130 nm, 90nm, 45nm CMOS technologies using Cadence RTL compiler. The timing,
power and area savings are of 26.2, 66, 23.4 percentage respectively for the
proposed design. Therefore this design could be used for the systems which
demand reduced area, low power and high performance |
Keywords: |
Fast Fourier Transform (FFT), Switch logic, Cooley tukey algorithm, Trivial and
Non Trivial Rotators, Data shufflers. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
HYBRID FUZZY PSO ALGORITHM FOR DYNAMIC ECONOMIC LOAD DISPATCH |
Author: |
P.SIVARAMAN, D.GUNAPRIYA, K.PARTHIBAN, S.MANIMARAN |
Abstract: |
The Dynamic Economic Load Dispatch (DELD) is the major problem in power system
operation and control. The main objective of DELD is to minimize the total fuel
cost of the generators while satisfying all the operating constraints. Premature
convergence is the major problem of DELD in large power system. Conventional
methods took long time to converge the DELD. To handle the DELD problem, an
efficient hybrid approach is proposed. Combination of Fuzzy and PSO algorithm is
called FPSO which is effectively to solve the DELD problem. This algorithm is
tested in 6 and 15 units thermal system. |
Keywords: |
Dynamic Economic Load Dispatch, Power System Operation, Operating Constraints,
Fuzzy Adaptive Particle Swarm Optimization, Power Demand |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMPLEMENTATION OF PANORAMA 360O FOR VIRTUAL TOURING AT TUGU PAHLAWAN MUSEUM
SURABAYA |
Author: |
MUHTADIN, I KETUT EDDY PURNAMA, AHMAD ZAINI, SURYA SUMPENO, DYAH KARTIKAWATI |
Abstract: |
Introduction to historical sites is one of education subject that less
interested by the student and the public. One of historical sites is museum.
Based on the data from Indonesian Tourism found that the number of visitors has
decreased. It has been made several efforts to increase the number of visitors
by displaying information such as text and image of the museum, but it cannot
increase the number of visitors because of the image do not show the whole
museum. In this research proposed one of the way to solve the problem by making
virtual touring of Tugu Pahlawan Surabaya museum by using the 360o panorama. The
making of panoramic image by combining 2D image by determining control point
which connected each other. In this research obtained the result that more
complex the existing object on the panoramic location the control point which is
used more complex too. For running the virtual touring application, the size
panoramic image which is used between 2700x1350 to 5927x2964 pixels because if
we used panoramic’s image that has high resolution it will make the virtual
touring application hard to run. |
Keywords: |
Virtual Touring, Panoramic 360o, Image Panoramic. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
WORD LEVEL FINITE FIELD MULTIPLIERS USING NORMAL BASIS |
Author: |
B.SARGUNAM, Dr.R.DHANASEKARAN |
Abstract: |
Finite field multipliers are widely used in elliptic curve cryptography as a
basic building block. Normal basis is the most suitable for representation of
binary field elements since squaring operation can be done by simple cyclic
shift of its binary digits. In this paper, efficient word level multipliers
using normal basis and reordered normal basis in Galois field is proposed, where
Reordered Normal Basis (RNB) is referred to as certain permutation of optimal
normal basis type- II. These architectures provide a better area and power
efficiency when compared to the existing Word Level finite field multiplier
using Normal Basis (WLNB) and Reordered Normal Basis (WLRNB). WLNB and WLRNB are
coded in VHDL and simulated in Modelsim10.0b. Area and Power reports are
obtained using Xilinx ISE 9.1i. |
Keywords: |
Finite Field Multiplier, Normal Basis, Reordered Normal Basis, Cryptography,
Galois Field |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENERGY-EFFICIENT SUB-CLUSTERING WITH OPTIMIZED PROCESSOR SPEED (ESOPS) IN
WIRELESS SENSOR NETWORKS |
Author: |
G.RAJESH , DR.B.VINAYGASUNDARAM |
Abstract: |
A wireless sensor network consists of sensor nodes to monitor the physical and
environmental conditions. In certain applications like habitat monitoring, where
sensor nodes are randomly deployed in manually inaccessible environment that
operates with a limited battery power. This battery constraint reduces the
network lifetime. The sensor nodes consist of a micro-processor for sensing,
computation and communication purposes. The node processor consumes more energy
when operated at higher speeds. Varying the processor speed (by adjusting the
processor speed and voltage through operating system) improves energy efficiency
but reduces the performance of the processor. Hence a proper trade-off is
required between energy efficiency and performance. In order to achieve this,
here proposed is an Energy-efficient Sub-clustering with Optimized Processor
Speed (ESOPS) algorithm. This algorithm is simulated in Omnett++ 4.0 and
parameters like energy gain, energy loss, performance gain and performance loss
of the system under different processor voltage and processor speed are measured
and analysed. |
Keywords: |
Dynamic Voltage Scaling, Energy Efficiency, Wireless Sensor Networks, sub
clustering, Optimal Processor Speed. |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF DIRECT TORQUE CONTROL OF 3-PHASE INDUCTION MOTOR |
Author: |
A.PANDIAN, Dr.R.DHANASEKARAN |
Abstract: |
The Induction Motors are widely used in industrial applications that require
rapid speed and torque response at high performance operation. The Direct Torque
Control (DTC) based Induction Motor (IM) with PI controller performance is not
appreciable one under load disturbance and transient conditions. To improve the
dynamic performance of the IM drive with new method of speed and torque control
can be done by Anti-Windup PI controller is proposed and presented in this
paper. A complete simulation of DTC based IM drive using Anti-WindUp PI
controller is implemented using Matlab/Simulink. In this Anti-Windup PI
controller scheme closed loop saturation technique is included between input and
output of speed controller. The effectiveness of the proposed systems is
verified by simulation process based on Matlab. Therefore, the Anti-Wind Up PI
controller has better Performance compared to the conventional PI controller
during change of state conditions like load changing will leads to less
overshoot percentage, less settling time, speed drop due to change in load with
percentage and settling time after load changes done. |
Keywords: |
Induction Motor (IM), Direct Torque Control (DTC), Anti-Wind Up PI(AWPI) |
Source: |
Journal of Theoretical and Applied Information Technology
30 April 2014 -- Vol. 62. No. 3 -- 2014 |
Full
Text |
|
|
|