|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2014 | Vol. 67 No.2 |
Title: |
A HYBRID METHOD OF LINGUISTIC APPROACH AND STATISTICAL METHOD FOR NESTED NOUN
COMPOUND EXTRACTION |
Author: |
HAMED AL-BALUSHI, MOHD JUZIADDIN AB AZIZ |
Abstract: |
Arabic noun compound extraction has become a challenging issue in the field of
NLP. Several approaches have been proposed in terms of extracting Arabic noun
compounds. Some of them have used linguistic-based approach, other have used
statistical methods and the rest have used a hybrid between them. This research
proposed a hybrid method of linguistic-based approach and statistical method in
order to solve the extraction of nested Arabic noun compound. The dataset has
been collected from online Arabic newspaper archive from Aljazeara.net and
Almotamar.net. Several pre-processing steps have been carried out on the data
including transformation, normalization, stemming and POS tagging. After that,
the n-gram model has generated bi-gram, tri-gram, 4-gram, and 5-gram candidates
of noun compound. Then three association measures which are NC-value, PMI and
LLR have been used in order to rank the candidates. The evaluation has been
performed using the n-best method with a human annotation (manual selection by
expertise). NC-value has outperformed PMI and LLR in terms of extracting nested
noun compounds. |
Keywords: |
Multi-Word Expressions, Noun Compound, Nested Noun Compound, Statistical Method,
POS Tagging |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
CERTAIN INVESTIGATIONS ON VIDEO STREAMING AND FRAME RATE CLASSIFICATION FOR
MULTIMEDIA APPLICATIONS |
Author: |
K.VIDYAVATHI, R.S.SABEENIAN |
Abstract: |
One of the fundamental challenges in deploying multimedia systems, such as
telemedicine, education, space endeavors, marketing, crisis management,
transportation, and military, is to deliver smooth and uninterruptible flow of
audio-visual information, anytime and anywhere. A multimedia system may consist
of various devices (PCs, laptops, PDAs, smart phones, etc.) interconnected via
heterogeneous wire-line and wireless networks. In such systems, multimedia
content originally authored and compressed with a certain format may need bit
rate adjustment and format conversion in order to allow access by receiving
devices with diverse capabilities (display, memory, processing and decoder).
Thus, a video coding mechanism is required to make the content adaptive to the
capabilities of diverse networks and client devices. In addition, a video coder
can change the coding parameters of the compressed video, adjust spatial and
temporal resolution, and modify the video content and/or the coding standard
used.
This research paper aimed to provide and suggest suitable video coding
techniques and some of the related research issues. Also, by this work, it is
planned to introduce some of the basic concepts of video coding, then review and
contrast various approaches while highlighting critical research issues. |
Keywords: |
HDTV, Temporal Redundancy, AWGN Channel, Frame Split And Matching Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
A SECURED DATA TRANSMISSION METHOD USING ENHANCED PROACTIVE SECRET SHARING
SCHEME TO PREVENT BLACK HOLE ATTACKS IN MANETS |
Author: |
K.SELVAVINAYAKI , DR. E. KARTHIKEYAN |
Abstract: |
Mobile Ad hoc Networks consist of mobile nodes which are running randomly. Nodes
communicate with each other without any access point. Due to mobility of nodes,
network is easily affected by several types of attacks. In particular black hole
attack cause packet dropping, misrouting the information from source to
destination. To reduce the effect of this attack, we propose a New Enhanced
Proactive Secret Sharing Scheme (NEPSSS) to detect the black hole nodes and to
ensure the data confidentiality, data integrity and authenticity. In first phase
of the proposed algorithm, the detection of black hole attack is achieved using
trust active and recommendation of the nodes. In second phase of the work,
Enhanced
Proactive secret sharing scheme is used to provide the data authentication and
integrity. The simulation results shows the proposed algorithm achieves the
better packet delivery ratio, misbehaviour detection efficiency, fewer packets
overhead and low end to end delay than the existing schemes. |
Keywords: |
MANET, Black Hole Attack, Enhanced Proactive Secret Sharing Scheme, End to End
delay, Control overhead, Misbehaviour Detection Efficiency and Delivery ratio. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
TRACKING MANUALLY SELECTED OBJECT IN VIDEOS USING COLOR HISTOGRAM MATCHING |
Author: |
S.BHUVANESWARI, T.S.SUBASHINI |
Abstract: |
Tracking a moving object over time is a challenging task. In this paper object
to be tracked is manually selected by the user in one video frame and it is
tracked in all subsequent frames of the given input video sequence. The work is
carried out in two steps. First the object is detected using 64bin colour
histogram matching and the object positions in all the video frames is
determined to obtain a temporal sequence of coordinates. Next the object is
tracked by calculating Euclidean distance between tracked objects and manually
selected reference object. The proposed method is compared with KLT tracker
which is a kernel based tracking method and it is found that 64 bin colour
histogram matching method can be used to track objects effectively. The results
show that the colour histogram features are very efficient in tracking objects,
in small and medium length video sequences. |
Keywords: |
Object selection, histogram features, histogram matching, object tracking |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
SWIFT COMPRESSED DOMAIN RESIDUE CALCULATION IN I4X4 MODE DECISION BASED ON
INTEGER TRANSFORM IN H.264 ENCODER |
Author: |
P. ESSAKI MUTHU, Dr. R M O GEMSON |
Abstract: |
H.264 encoder has to evaluate exhaustively all the mode combinations of intra
4x4 predictions for deciding coding mode to achieve the minimum coding bits and
high video quality. An Integer Transform-based Intra 4x4 Prediction method is
proposed here to reduce the computational complexity of Intra 4x4 mode decision.
This method calculates the transform domain residues in three steps, 1)
calculating predicted coefficients directly 2) performing transform on input
original coefficients and 3) finds the tranform domain residue coefficients by
subtracting the transform domain predicted coefficients from transform domain
original coefficients. The experimental results demonstrate that proposed method
reduces at least 40% of computational complexity without compromising the coding
efficiency (bitrate) and performance (quality). |
Keywords: |
H.264/AVC, Mode decision, Transform domain Intra 4x4 Prediction, Computational
Complexity |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
PROVIDING DYNAMIC AUDIT SERVICES USING HOMOMORPHISM AUTHENTICATORS IN CLOUD
INFRASTRUCTURE |
Author: |
SATHIYA MOORTHY SRINIVASAN, Dr. C CHANDRASEKAR |
Abstract: |
Cloud storage enables client to access the data from anywhere at any time. Cloud
based outsourced storage helps the clients to manage and conserve the data on
self-sufficient platform. Probabilistic query and periodic verification on cloud
zone provide public auditing but the cloud storages do not offer the clients
with proof for verifying the integrity of the user. The authentication system
based on Merkle Hash Tree construction is an efficient data dynamics system, yet
not effective in improving storage. To improve the verification process on the
cloud audit data services, Homomorphism Authenticators using Sphere Shaped
Marker (HASSM) mechanism is proposed in this paper. HASSM mechanism develops a
dynamic group and audits the integrity of stored data in the cloud services
using the extendable dynamic hash structure. The sphere shaped marker signature
verifies the information and subsequently audit the integrity of the shared
data. With HASSM mechanism, the identity of the marker on each block stored data
is kept private from a Third Party Auditor (TPA). TPA correctly detects any
unauthorized users in HASSM for accessing the cloud files by applying KeyGener,
SphereSign and SphereVerify algorithm to perform the process. TPA uses HASSM
mechanism to validate the integrity of stored information without retrieving the
whole file, so that the computational cost is reduced. HASSM Mechanism provides
the approximately 9.188 % better verification result with lesser computational
cost. Experiment is conducted in the Cloudsim platform on the factors such as
auditing time, read/write efficiency on cloud services, and bandwidth
utilization for data auditing. |
Keywords: |
Data Homomorphism Authenticators, Cloud Storage, Sphere Shaped Marker, Data
Service, SphereSign, Integrity, SphereVerify |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ENHANCEMENT OF A SILICON MEMS PIEZORESISTIVE SINGLE AXIS
ACCELEROMETER WITH ELECTROPLATED GOLD ON A PROOF MASS |
Author: |
R.VARATHARAJAN , A.ANGELIN PEACE PREETHI |
Abstract: |
This paper presents realization of MEMS piezoresistive single axis accelerometer
with electroplated gold on the proof mass. The piezoresistive accelerometer
shows very high sensitivity and good linearity. But performance behavior of the
system shows precise effect due to cross axes sensitivity. Performance
enhancement is achieved by electroplating a gold mass on top of the proof mass
of dimension 2500µm X 2500µm X 30µm. This paper explains the simulation analysis
using ANSYS11® and design optimization of the accelerometer structures without
gold, with electroplated gold on top of the proof mass and with electroplated
gold on bottom of the proof mass. From these structures, prime axis stress
sensitivity, cross axes stress sensitivity and displacement of the structures
have been analyzed. Test result of these devices shows that the prime axis
stress sensitivity of electroplated gold with top of the proof mass is increased
by 53% and the structure with top of the proof mass is increased by 49% as
compared to the structure without gold. Cross axes stress sensitivity of the
structure with gold on top of the proof mass along the X, Y axis is reduced by
17% and 15% with the structure without gold. |
Keywords: |
MEMS piezoresistive accelerometer; sensitivity; linearity; ANSYS software |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
SAVING ENERGY IN WIRELESS AD HOC NETWORK WITH NEAREST COMPONENT CONNECTOR
ALGORITHM |
Author: |
S.K. MANJU BARGAVI, Dr. G. P. RAJAMANI |
Abstract: |
Wireless ad hoc networks generate many challenging research problems as they
basically have many special characteristics and some inevitable limitations,
compared with other wired or wireless networks. An important requirement of
these networks is that they should be self-organizing, that is, transmission
ranges and data paths are dynamically modernized with changing topology. Energy
conservation and network performance are probably the most critical issues in ad
hoc wireless networks, because wireless devices are usually powered only by
batteries and have limited computing capability and memory. In this paper we
introduce an enhanced receiver centric interference model protocol with Nearest
Component Connector algorithm to calculate the energy levels in wireless ad hoc
networks. The new protocol guarantees to build a valid topology for transfer
data from Source to Destination. Simulation and experimental results are
combined to show that collision-free and energy consumption by the new model. |
Keywords: |
Battery, Collision, Component Connector, Energy, Topology. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
NOVEL TECHNIQUE TO ENHANCE SECURITY OF RECONFIGURABLE CIRCUITS |
Author: |
BINU K. MATHEW, Dr. K. P. ZACHARIA |
Abstract: |
FPGAs are used in various applications like aero-space, automotive, military etc
which require them to operate in different types of environments. Security of
FPGA based system is a big concern as the system developed after lot of research
can be stolen very easily. Nowadays, a lot of research is going on, considering
various security aspects of FPGAs as the primary concern. Several cryptographic
systems are available which can be used to protect FPGA bit-streams.
Cryptographic techniques are used to encrypt the FPGA bit-streams. It is not
feasible to use FPGAs in small circuit as it increase cost of the system under
consideration. This paper proposes a technique which makes a digital system
secure by using look-up tables. Behavior of a look-up table is based on its
configuration bit. Look-up tables can be used to replace a digital circuit
either fully or partially. If a look-up table replaces the whole circuit, then
it can be called as fully incomplete and if the look-up table replaces only a
part of a digital circuit, then that circuit can be called as partially
incomplete. Digital systems can be made secure by fully incomplete design or
partially incomplete design. Fully incomplete design can be used in the case of
small circuits and for complex circuits a portion of the design can be made
incomplete, in the case of partially incomplete digital circuits. This paper
proposes a novel technique to enhance security of reconfigurable circuit. An
authorized user completes the design of the circuit at run time by entering the
configuration bits of the look-up table. |
Keywords: |
FPGAs, Secure devices, Volatile devices, Look-up Table, Multi-functional chips |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF HIGH SPEED VEDIC MULTIPLIER WITH PIPELINE TECHNOLOGY |
Author: |
Y. NARASIMHA RAO, DR. GSVP RAJU, PhD, Prof. PENMETSA V KRISHNA RAJA, PhD |
Abstract: |
In many digital computers multipliers plays vital role to improve the
performance of the system. The speed of the processor greatly depends on high
speed multipliers. On the other hand pipeline technology plays an important role
in present parallel computers in improving the speed of the computer. In the
present paper high speedVedic multiplier is designed and analysed by inserting a
pipeline in the process of computation.The computation speed is considerably
improved with pipeline when compared with conventional Vedic multiplier. The
proposed pipelined Vedic multiplier was implemented in TSMC 65nm CMOS Technology
consumes 57mWatts power when operated at 100MHz. |
Keywords: |
Pipeline, Vedic Multiplier, Throughput, High Speed, |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
A COMBINED CONGESTION MANAGEMENT TECHNIQUE FOR RESCHEDULING OF OPTIMAL ACTIVE
POWER OF GENERATOR UNITS |
Author: |
N. CHIDAMBARARAJ, Dr. K. CHITRA |
Abstract: |
In paper, a combined technique proposed for solving transmission congestion
problem in deregulated power system. For improving the congestion management
performance of cuckoo search (CS) algorithm, the artificial neural network (ANN)
is combined with CS algorithm. Here, the CS is optimized the real power changes
of the generator while transmission congestion is occurred. Thus, the ANN is
used to predict the generator reschedule real power according to the
transmission congestion. Hence, the computational performance of CS algorithm is
enhanced. Then, the congestion management cost and power loss of the proposed
method is minimized by the CS algorithm according to the transmission
congestion. Proposed method is implemented in MATLAB working platform and the
real power rescheduling, congest management cost, and power loss are evaluated.
The congestion management performance of the proposed method (ANN-CS) is
compared with CS and PSO algorithm. |
Keywords: |
Transmission Congestion, Real Power, Reschedule, Combined Algorithm, ANN-CS
Algorithm, Cost, Power Loss. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE
WATERMARKING |
Author: |
NADIA IDRISSI, AHMED ROUKHE |
Abstract: |
During the last few years, the copyright in multimedia world is becoming a real
concern especially with the increase in transfer files, documents over networks.
These data are actually very easy to hack: information becomes vulnerable to
interception, copying, tampering or corruption. To meet this need, digital
watermarking is a method of signal processing which inserted into a digital
document an invisible watermark, containing a code robust against any attack
that can affect the watermarked data. In this paper we presented a method of
digital image watermarking based on contourlet transform and maximum entropy. |
Keywords: |
Contourlet Transform; Entropy; PSNR; NC |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE ENHANCEMENT OF CBS ALGORITHM USING FSGP AND FEAT ALGORITHM |
Author: |
IMAM MUKHLASH, MUHAMMAD IQBAL, HANIM MARIA ASTUTI, SUTIKNO |
Abstract: |
Classification and prediction in temporal data is one of important tasks of data
mining which are used in various fields such as financial data forecasting,
meteorological data prediction, geographic data processing, and biomedical data
analysis. A number of methods have been developed based on learning models such
as decision tree, neural network or using other data mining task such as
clustering, association rule and sequence pattern mining. One of the
classification algorithms based on sequential mining is Classify-by-Sequence
(CBS) algorithm. CBS algorithm is a combination of sequential pattern mining
with probabilistic induction. However, this algorithm has a drawback regarding
its computational time which is quite inefficient. This paper proposes an
improvement of CBS algorithm to solve the computational time’s inefficiency. The
enhancement is conducted by improving the pruning part using FGSP and FEAT
algorithm. These algorithms produce classifier that will use to classify testing
data. The quality of classifier is then measured using 〖covacc〗_t parameter
which is the combination of coverage and accuracy. To achieve the purpose of
this research, we use meteorological data to classify rain or dry season. The
simulation result show that the computational time of modified CBS algorithm
with FGSP algorithm is faster than the modification using FEAT algorithm with
the same level of accuracy. |
Keywords: |
Temporal Data, Classify by Sequence, Pruning Strategy, FEAT, FGSP. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
DEVELOPMENT OF FACE RECOGNITION SYSTEM AND FACE DISTANCE ESTIMATION USING STEREO
VISION CAMERA |
Author: |
EDY WINARNO, AGUS HARJOKO, ANIATI MURNI ARYMURTHY, EDI WINARKO |
Abstract: |
The research of face recognition and face distance estimation is a study that is
being developed nowadays. This research proposes a model of face recognition by
combining wavelet decomposition, PCA and Mahalanobis distance. This method will
provide a better of recognition rate and will improve the computation time of
face recognition. We also develop the measurement of distance between the face
and the camera on the proposed face recognition system. We propose real-time
distance estimation on face recognition system using stereo vision camera. We
calculate the distance using stereo vision camera based on stereo triangulation
method using two lenses. The two lenses of stereo vision camera are used to
capture a face image and to determine the 3 dimensional points projected from 2
dimensional points. The calculation of distance is determined by the projection
from stereo vision camera. The proposed system is capable to calculate the
distance beetween face and camera on the proposed of face recognition. This
research also suggests a correlation between recognition rate and the distance
estimation beetween face and camera. The recognition rate of the proposed of
face recognition can work well in the range of 50-350 cm in real-time
conditions. |
Keywords: |
Face recognition, face distance estimation, stereo vision, wavelet, PCA,
Mahalanobis |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
STRATEGY TO INTEGRATE ACADEMIC DATA USING WEB SERVICES AND PL SQL (CASE STUDY
TELKOM UNIVERSITY) |
Author: |
TORA FAHRUDIN |
Abstract: |
Established in 17 July 2013, Telkom University was formed from various faculties
from Telkom Education Foundation, such as Faculty of Engineering (TES), Faculty
of Management (TEBS), Faculty of Applied Sciences (TASS) and the Faculty of
Creative Industries (TCIS). Each faculty has the Academic Information Systems.
When it became a university, problems faced is how to do the integration
strategy of academic data from the different data structure and data sources of
academic information system at each faculty into one new scheme of University
database. The challenge is the old academic system is still running for one
semester, which means the data will still moving. Therefore, this study focuses
on both strategic and technical concepts to integrate academic data base on that
condition. A major strategy is using web services for data interchange and PL
SQL Scheduler to process transaction data which still moving. Meanwhile, master
data is loaded only once with flat files format. The conclusions obtained from
this research are 1) to integrate academic data, logic data needed to be split
into master data and transaction data, 2) the strategy for integrate master data
are loaded only once with flat files format, meanwhile the transaction data is
loaded many times via web services (JSON), 3) transaction data from web services
will be loaded and mapping into destination database using JSON PL SQL package
which run periodically. |
Keywords: |
Academic Data Integration; Web Services; JSON; PL SQL; DBMS Scheduler |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
USING HYBRID ARTIFICIAL BEE COLONY ALGORITHM AND PARTICLE SWARM OPTIMIZATION FOR
TRAINING FEED-FORWARD NEURAL NETWORKS |
Author: |
WAHEED ALI H. M. GHANEM, AMAN JANTAN |
Abstract: |
The Artificial Bee Colony Algorithm (ABC) is a heuristic optimization method
based on the foraging behavior of honey bees. It has been confirmed that this
algorithm has good ability to search for the global optimum, but it suffers from
the fact that the global best solution is not directly used, but the ABC stores
it at each iteration, unlike the particle swarm optimization (PSO) that can
directly use the global best solution at each iteration. So the hybrid of
artificial bee colony Algorithm (ABC) and PSO resolved the aforementioned
problem. In this article, Hybrid ABC and PSO is used as new training method for
Feed-forward Neural Networks (FFNNs), in order to get rid of imperfections in
traditional training algorithms and get the high efficiencies of these
algorithms in reducing the computational complexity and the problems of Tripping
in local minima, also reduction of slow convergence rate of current evolutionary
learning algorithms. We test the accuracy of our proposal using FFNNs trained
with ABC, PSO, and Hybrid ABC and PSO. The experimental results show that ABCPSO
outperforms both ABC and PSO for training FFNNs in terms the aforementioned
Imperfections. |
Keywords: |
Artificial Intelligent (AI); Swarm Intelligence (SI); Feed-forward Neural
Network (FFNN); Artificial Bee Colony Algorithm (ABC); Particle Swarm
Optimization (PSO). |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
PROBABILISTIC DISTRIBUTED ALGORITHM FOR MINIMUM SPANNING TREE CONSTRUCTION |
Author: |
ISMAIL HIND, EL MEHDI STOUTI, ABDELAAZIZ EL HIBAOUI, ALI DAHMANI |
Abstract: |
In this paper we introduce and analyze a probabilistic distributed algorithm for
minimum spanning tree construction. Our algorithm is based firstly on the
handshake algorithm that produces firstly k sub-spanning trees, where k is the
size of the maximal matching produced. Secondly, the merged step of our
algorithm is executed in a distributed manner and following some roles to reduce
the total number of those sub-spanning from k to 1. We proof that the residual
graph is acyclic and all vertices belong to it. A detailed analysis of the
number of exchanged messages is carried on to validate the effectiveness of our
algorithm. |
Keywords: |
Distributed Algorithms, Randomized Algorithm Analysis, Handshake, Maximal
Matching, Minimum Spanning Tree Construction. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
EVALUATION OF STATCOM FOR GRID CONNECTED PV SYSTEM |
Author: |
R.GANESH, DR. V. SENTHIL KUMAR |
Abstract: |
Demand in electricity makes the passion for renewable energy. The renewable
energy can be effectively utilized when it is grid connected. In this paper
Photo Voltaic (PV) power system is proposed for grid connected applications.
Important factors to be considered in grid connection are quality of power,
stability of the voltage and reliability. The quality and stability of voltage
in a grid connected PV system can be improved by a STATCOM. Many researchers
analyzed the performance of STATCOM with balanced grid voltage dips. Under
unbalanced grid voltage dips, the negative sequence voltage causes poor power
quality of power. In this paper, grid connected PV system with a STATCOM is
proposed with balanced and unbalanced voltage sags and swells. The positive and
the negative sequence voltage compensation by a STATCOM is proposed to improve
the stability and quality of voltage. The entire system is analyzed by
simulation using MATLAB/ Simulink. |
Keywords: |
Photo Voltaic (PV) system, STATCOM, Incremental conductance Maximum Power Point
Tracking (MPPT), balanced/unbalanced load. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
GOAL PRIORITIZATION AND PRELIMINARY USABILITY EVALUATION: AN APPROACH TO ASSIST
NOVICE DESIGNER |
Author: |
HOO MEEI HAO, AZIZAH JAAFAR |
Abstract: |
The usability engineering process has indicated the importance of setting
usability criteria. In specifying a usability goal, usability attributes or
criteria need to be identified in order to achieve this. This paper presents a
quantitative basis for selecting and prioritizing usability goals, thereafter
selecting the best prototype relative to usability goals. The proposed method
consists of two main phases. These are namely: the prioritizing goals phase and
the user evaluation phase. Quantitative analysis uses an analytic hierarchy
process (AHP) to determine the rank of the goals. The level of importance of
usability attributes assists designers to decide which alternative designs meet
the most important usability characteristics. This approach appropriate to train
the novice designers to bear their collaborative design goals in mind and select
the best prototype based on users’ quantitative assessment result. |
Keywords: |
Usability Goal, Usability Evaluation, Quantitative Approach, Analytic Hierarchy
Process (AHP), Novice Designer |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
COST EFFECTIVE SOLUTION FOR OPTIMAL PLACEMENT AND SIZE OF MULTIPLE STATCOM USING
PARTICLE SWARM OPTIMIZATION |
Author: |
K. KUMARASAMY, Dr.R. RAGHAVAN |
Abstract: |
The optimal placement of STATic synchronous COMpensator (STATCOM) for voltage
stability improvement in power system is the important optimization problem.
There are so many research works are carried out in the optimal placement of
STATCOM to achieve the various objectives using Particle Swarm Optimization (PSO).
In conventional optimization technique the weight-age of objective functions are
chosen in such a way that all the objectives values are comparable in magnitude
or weight-age given is based on the importance of the objectives. In this paper
a cost effective objective function has been proposed and the optimisation using
PSO optimizes the location and size of STATCOM devices as economical as
possible. The Objective function incorporates important system parameters,
namely, voltage profile, system losses, reactive compensation and loadability.
The coefficients of the system parameters in the objective function are so
chosen that they reflect real time cost or penalty value. Thus the objective
function proposed is a cost effective objective function. The effectiveness of
the proposed objective function is tested for IEEE-30 bus test system with
multiple STATCOM devices. Optimization of various parameters so as to obtain
improved voltage profile, minimal total system loss, minimal reactive power
transfer and maximum stability limit have been achieved using PSO. This paper
provides the details of the results obtained on the IEEE-30 bus test system,
using PSO for multiple STATCOM application for voltage stability improvement and
establishes the effectiveness of the proposed objective function. |
Keywords: |
FACTS, STATCOM, Particle Swarm Optimization (PSO), Stability, Loadability. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFECTIVE LIGHTWEIGHT TRUST DECISION MAKING SCHEME FOR WIRELESS SENSOR NETWORKS |
Author: |
M.BALAMURUGAN, Dr.R.POONGODI |
Abstract: |
A sensor network is composed of a large number of sensor nodes, which are
densely deployed either inside the phenomenon or very close to it. The position
of sensor nodes need not be pre-determined. This allows random deployment in
inaccessible terrains or disaster relief operations. On the other hand, this
also means that sensor network protocols and algorithms must possess
self-organizing capabilities. In this research work, a lightweight trust
decision making scheme (LTDMS) for attaining balance between malicious nodes and
energy conservation in networks. In first phase, multicast route is integrated
to ensure network connectivity and avoid node failures. In second phase, key
based authentication to provide integrity. Here four types of iterations are
used during integrity phase. In third packet format is proposed for monitoring
integrity and energy saving status. So the efficient secure multicast route can
be chosen to improve the network performance. By simulation results, the
proposed LTDMS achieves better data delivery rate, improved network lifetime,
high packet integrity rate, less end to end delay and overhead in terms of
mobility, pause time, throughput, and number of nodes than previous schemes
namely HDTMP. |
Keywords: |
Wireless Sensor Networks, Malicious Nodes, Energy Saving, LTDMS, Packet Delivery
Ratio, End to end delay, packet integrity rate and overhead. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
OPTIMIZED PRUNE BASED DATA MINING (OPBDM) FOR DISTRIBUTED DATABASES: AN ADAPTIVE
APPROACH |
Author: |
G.PARTHASARATHY , Dr.D.C.TOMAR |
Abstract: |
Data mining is a vital solution approach for applications such as text based
mining; web based mining, supporting data analysis, data visualization and data
design tasks. It serves as primary, as well as major roles in various domains
and plays a complementary role in others by increasing traditional data mining
techniques from numerical data analysis, data statistics and machine learning.
Modern mining algorithm concentrates mainly on developing, building and using
specific cross platforms, domain driven algorithms and models. In such cases
various algorithms are designed in which very few are repeatable in real time.
Countless outlines are mined and major proportion of them is of no specific
interest for business use. The end user generally cannot easily predict or
understand to take them over for business values and daily use. Thorough efforts
are mandatory for promoting the act of knowledge discovery in real world
decisions and decision supports. An optimized method has been proposed for
pruning based data mining to handle the issues stated above. In optimized prune
based data mining (OPBDM), Knowledge intelligence is incorporated into mining
process along with models and a problem solving system is framed as the gallery
for incorporating knowledge discovery, decision making, data pruning and
delivery. Based on related work(Prune tree), this paper presents an overview of
deriving prunes for multiple data sets, decisions and decision supports,
theoretical framework for pruned data(OPBDM)techniques, case studies and open
issues. Experimental results and future work enhancement have been demonstrated. |
Keywords: |
Data Mining, Knowledge Intelligence, Knowledge Discovery, Pruning, Decision
Making |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
MATRIX BASED SEQUENTIAL INDEXING TECHNIQUE FOR VIDEO DATA MINING |
Author: |
D.SARAVANAN V.SOMASUNDARAM |
Abstract: |
Due to the technology development digital media play very vital role in
information technology Availability of increasing volumes of non-text
information such as audio, image and video, on web it increases the accuracy of
the search process. Video data mining plays an important role in efficient video
data management for information retrieval. Gaining and storage of video data is
an easy task but retrieval of information from video data is a challenging task.
Due to this rapid development and increasing demand of users, indexing process
must be automated, from the collection of information. Indexing associated with
this type of files differ from normal indexing techniques. With the help of that
user can find and retrieve the relevant information effectively. Many successful
data mining indexing techniques have been developed through academic research
and industry .This paper describes the sequential indexing technique and the
experimental result verifies that the proposed technique is better than the
existing technique. |
Keywords: |
Data Mining, Information Retrieval, Knowledge Extraction, Video data mining,
Indexing, Clustering, Sequential Indexing, Image Data |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT VIEW CLASSIFICATION OF ECHOCARDIOGRAM USING MORPHOLOGICAL
OPERATIONS |
Author: |
G.N.BALAJI ,DR.T.S.SUBASHINI , DR.A.SURESH |
Abstract: |
In this paper an efficient cardiac view classification of echocardiogram is
proposed. A cardiac cycle consists of two phases systolic and diastolic. The
systolic is the contraction and diastolic is relaxation and filling. From the
given video sequences only the diastolic frames are extracted and it is utilized
for determining the view of the echocardiogram. The Echocardiogram image are
first prepared to reduce noise and to enhance the contrast of the image then
mathematical morphology is used to highlight the cardiac cavity before
segmentation using Connected Components Labeling (CCL) is carried out. We
classify three standard cardiac views namely parasternal short axis (PSAX),
apical two chamber (A2C) and four chamber (A4C) views. Experiments over 200
echocardiogram images show that the proposed method ascertains 94.56% of
accuracy in cardiac view classification. |
Keywords: |
Connected Components Labeling (CCL), Apical two Chamber (A2C), Apical 4 Chamber
(A4C) and Parasternal Short Axis (PSAX). |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
GENERATION OF REAL WORLD TRAFFIC USING NS2 TRAFFIC AGENTS |
Author: |
SAMI ABBAS NAGAR, SULAIMAN MOHD NOR, MOHAMED SAAD BOBA |
Abstract: |
There has been substantial interest from researchers in the development and
contribution of modules in NS2. One of the challenges in NS2 modeling is to
seamlessly integrate real world traffic data into the NS2 network model.
Normally the traffic in NS2 is generated from the traffic agents such as TCP and
UDP agents whose parameters are based on certain statistical distribution. The
aim of this paper is to demonstrate how traffic agents in NS2 simulator are used
to generate different types of traffic based on real traffic network. In this
work, a modified sniffer program was used to capture real traffic data from a
production network and output to a traffic text file. This traffic test file is
then used by the NS2 traffic agents in the simulated network model representing
the real production network. To validate that the simulation works accurately,
the output trace file of NS2 after simulation is compared with the traffic
generated at the destinations of the production network. Error percentage and
t-test data analyses were conducted. It was found, based on comparisons that the
difference was nearly zero for traffic captured for duration of around 15
minutes simultaneously generated from four different production sites. |
Keywords: |
NS2 Simulator, Traffic Agents, TCP, UDP, Real World Traffic Generator, Sniffer,
T Test Validation. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
A CONSTRUCTIVE DISTANCE-BASED BOUNDARY DETECTION APPROACH WITH NUMERIC VARIABLES |
Author: |
A. ANITHA, DR. E. KANNAN |
Abstract: |
Existing Data Mining techniques, concentrates mainly on finding patterns in
large datasets and it also focuses on concepts such as classification,
association rules and clustering. Very few work aims on finding Boundary values
in classification. Boundary values are the small subset of the data set which
contains critical information useful for predicting accurate class labels for
the new instances. This paper describes technique for detecting boundary records
using different distance based approach during classification task and computes
the computational time for extracting the instances using different distance
metrics. The records isolated as boundary region of the specified class, can
contain domain-specific information which is useful for finding critical records
to improve the classification accuracy. This information is useful for further
decision making in classification. Experiments are carried out for numeric data
set and results shows that only subset of the data set are found to be boundary
set and compares the computational time for extracting the boundary region using
the distance metrics. |
Keywords: |
Classification, Outliers, Boundary Region, Euclidean, Manhattan, Minkowski,
Chebychev |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT SCHEDULER AND MULTI THREADING FOR RESOURCE AWARE EMBEDDED SYSTEM |
Author: |
KARTHIKEYAN.V, Dr.S.RAVI |
Abstract: |
In embedded system applications the processor is connected to different segments
of the hardware and each hardware is associated with software called task. The
scheduler is the part of the software that determines which task will run next
and its implementation is a difficult process in RTOS. Existing scheduling
methods fail to suit real time system requirements. The purpose of this research
work is to design a efficient scheduler in real time. In the proposed method a
new round robin scheduling algorithm approach is presented in µC/OS-II operating
system and LPC 1768 environment. µC/OS-II provides two API's that lets user to
enable and disable scheduler within a task. Although it is not advised to use
this API's as it is against the concept of Real time priority scheduling, it may
be required in certain situations. The scheduler designed handles scheduling of
multiple tasks efficiently and an analysis of scheduler performance using
threading and non threading approach is made. The experimental result shows
improved performance over the existing methods in terms of various performance
criteria. The implication of this research work is that the scheduler designed
can execute tasks based on priorities within the allotted time. |
Keywords: |
Scheduler, multi threading, Alphabet and number sorting, LPC 1768 |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
EMPIRICAL FACTORS FOR ROBUSTNESS OF SENSOR NODES ON ENERGY EFFICIENCY |
Author: |
Prof. T.P. JAYAKUMAR , Dr. N. GUNASEKARAN |
Abstract: |
Sensors are the devices which are used to measure the temperature of their
surroundings and inform it to the base station through central heads which forms
large scale networks, have become more in number. These sensors can act
individually by using small hardware devices and it can be embedded into the
devices like mobile phones, laptops, iPods, or in combination of these in Mobile
Ad-hoc Networks (MANETs) more battery power is needed for the measurement of
temperature. Depending on the rate of battery power consumption, more research
works are being focused on the influence of data processing and communication
network as these sensors are tiny and they cannot withhold larger batteries. The
problem arises when the sensors are treated as either tiny stand alone devices
or particularly used when it is embedded with robust devices. It is necessary to
make research work on embedded devices. Even though the literature shows the
effectiveness of energy consumption by sensors, studies on the embedded devices
robustness are seen rarely. It is being pointed out by architectural design of
sensor networks which is different according to their applications and
constraints. In order to address these issues, this paper try to arrive at
certain coefficients called as factors that are empirically determined by
involving series of experiments in the NS 2.0 environment. High, Medium, Low are
the three scales of robustness which are suggested for the factor and also the
three scales are immense to be used in the deployment of sensors in manets.
Robustness on the consumption of energy of the sensor embedded devices in
networks is indicated by the factors considered. The experimental work is
delimited in its scope with energy consumption due to the computing process. The
work is delimited to comparative studies on hierarchal and flat algorithms.
Concluding remarks have been drawn out of these experimental studies. |
Keywords: |
Manets, Central Head, Wireless Sensors, Robustness, Routing |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
VISION BASED INDIAN SIGN LANGUAGE CHARACTER RECOGNITION |
Author: |
ASHOK KUMAR SAHOO, KIRAN KUMAR RAVULAKOLLU |
Abstract: |
Sign language recognition is helpful in communication between deaf or mute
people with people who don't even know sign language. This has wide applications
in communication at various public places. A system for computer-human interface
of Indian Sign Language recognition in the domain of characters is proposed.
This paper describes a system for automating recognition of Indian sign language
static single handed and double handed character signs, in which a regular
camera is used to capture the gestures. The system is designed to recognize
isolated signs, i.e. each input image contains exactly one ISL character sign.
To recognize images in real environment, two data sets are created, which
contains 2600 images for single handed characters and 2340 gestures of double
handed characters (A-Z). Structural features, local histogram features and
direct pixel values of gray scale images extracted from these gestures are used
as input to the recognition system. After extracting features from images, kNN
classifier and neural network classifier are used to classify the gestures. In
single handed data set 95.30% recognition rates are achieved, and in double
handed data set 96.37% accuracy rates are achieved. |
Keywords: |
Indian Sign Language, Neural Network Classifier, kNN Classifier, Local
Histogram Feature, Structural Feature, Direct Pixel Value Feature. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
ARTIFICIAL IMMUNE SYSTEM BASED OPTIMAL LINEAR CAPACITY MAXIMIZATION PRECODER FOR
MIMO-OFDM WIRELESS COMMUNICATIONS |
Author: |
RAMESH.S, Dr. R. SESHASAYANAN |
Abstract: |
At present different enhancement calculations is utilized within different
provisions in diverse fields. Late days Artificial Immune framework is utilized
within the streamlining of multi client in MIMO – [MU-MIMO] correspondence
framework for enhancing the execution of the channel usage, slip remedies.
Direct Precoding is utilized in MU-MIMO correspondence framework to enhance the
limit of the framework and to decrease the intricacy in the beneficiary side.
The prior investigates takes a shot at enhancement calculation, the PSO proposed
to build the framework limit and appraisal the channel slip. In this paper, the
Artificial Immune System– [AIS] is utilized to discover the upgraded Precoding
lattice, with that, the Precoder intended to amplify the limit of the framework
by considering the channel estimation failure. The recreation results indicate
that the framework limit execution of the proposed Precoder which considers
channel estimation blunder outflanks the long ago proposed Precoder. |
Keywords: |
MIMO; AIS; MMSE; SNR; BER; Optimization; Channel Communication; Artificial
Immune System. |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
Title: |
A COMPARATIVE STUDY OF EVOLUTIONARY ALGORITHMS FOR SCHOOL SCHEDULING PROBLEM |
Author: |
DANIEL NUGRAHA, RAYMOND KOSALA |
Abstract: |
The scheduling problem is one of the combinatorial optimization problems that
are common in the real world. Evolutionary algorithms, such as Genetic Algorithm
and the Bees Algorithm have been used in the literature to solve this problem.
In this paper, we apply the Genetic Algorithm, Bees Algorithm, and the
combination of these two algorithms, which is Hybrid GA-Bees, to solve school
scheduling problem. The algorithms to solve the school scheduling problems were
implemented using the object-oriented paradigm and tested to create actual class
schedules at a middle school in Jakarta. Our study concludes that the Hybrid
GA-Bees can produce better solutions compared to the solutions generated by the
Genetic Algorithm and Bees algorithm. |
Keywords: |
Genetic Algorithm, Bees algorithm, Hybrid GA-Bees algorithm, school scheduling |
Source: |
Journal of Theoretical and Applied Information Technology
30 September 2014 -- Vol. 67. No. 3 -- 2014 |
Full
Text |
|
|
|