|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2014 | Vol. 66 No.1 |
Title: |
INTELLIGENT SELF-TUNING PID CONTROLLER USING HYBRID IMPROVED PARTICLE
SWARM OPTIMIZATION FOR ULTRASONIC MOTOR |
Author: |
ALRIJADJIS, TANAKA KANYA, NAKASHIMA SHOTA |
Abstract: |
Ultrasonic Motor (USM) is a new important actuator that has superior features
than the common electromagnetic motor. But, due to no-accurate mathematical
model and characteristic changes during operation, it is hard to control USM. In
this paper, an Intelligent Self-tuning PID controller using Hybrid Improved
Particle Swarm Optimization (HIPSO) for USM is presented. The proposed HIPSO is
developed to improve PSO by using combination of three strategies, i.e.,
additional part for creating new sharing information, adaptive inertia weight
for obtaining properly balance quickly and mutation operator for maintaining
diversity within particles. Experimental results show that the proposed control
scheme can greatly enhance the performance of USM servo system in term of
convergence speed and position accuracy. |
Keywords: |
Ultrasonic motor (USM), PID controller, intelligent self-tuning, particle swarm
optimization (PSO), swarm intelligence |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
PROACTIVE ROUTING WITH EARLY CONGESTION DETECTION IN MANET |
Author: |
A. MOHAMMED MUNAWAR HUSSAIN, Dr. P. SHEIK ABDUL KHADER, Dr.A.MOHAMED ABBAS |
Abstract: |
Ad hoc mobile networks are composed of mobile nodes communicating through
wireless medium, without any fixed backbone infrastructure. In these networks,
congestion occurs in any intermediate node, when data packets travel from the
source to the destination, and they incur high packet loss and long delay, which
cause the performance degradation of a network. This paper proposes Proactive
Routing with Early Congestion Detection (PRECD) in MANET. Initially PRECD
constructs a non-congested neighbors’ list, and finds a route to a destination.
All the primary path nodes periodically calculate their queue_status at the node
level. While using the early congestion detection technique, the node detects
the congestion that is likely to happen, and sends a warning message to the
nodes. The ancestor node is aware of this situation, and finds an alternative
path to the destination immediately, by applying adaptive path mechanism. Thus,
PRECD improves the performance, in terms of reducing the delay, routing
overhead, and increases the packet delivery ratio without incurring any
significant additional cost. The performance of PRECD was compared with that of
Early Congestion Detection and Adaptive Routing (EDAPR) and Early Detection
Congestion and Control Routing (EDAODV), using the NS-2 simulator. The result
reveals significant improvement over the EDAPR and EDAODV routing schemes. |
Keywords: |
MANET, Proactive Routing, Congestion, EDAPR, EDAODV. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
OPTIMUM PID PARAMETER SELECTION BY PARTICLE SWARM OPTIMIZATION IN
AUTOMATIC VOLTAGE REGULATOR SYSTEM |
Author: |
G.MADASAMY, C.S.RAVICHANDRAN |
Abstract: |
This Paper presents a tuning method based on evolutionary computing approach to
determine the Proportional-Integral-Derivative (PID) controller parameters in
Automatic Voltage Regulator (AVR) system. The main objective is to increase the
step response characteristics and reduce the transient response of AVR systems.
This paper described in details how to employ Particle Swarm Optimization
Technique (PSO) method to determine the optimal PID controller parameters of an
AVR system. The proposed algorithm can improve the dynamic performance of AVR
system. Compared with Ziegler Nichols (Z-N) tuning method, the proposed PSO
method has better control system performance. |
Keywords: |
AVR System, PID Controller, Particle Swarm Optimization (PSO), Ziegler-Nichols
Tuning |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
CONGESTION PREDICTION IN WIRELESS NETWORK USING GENE EXPRESSION
PROGRAMMING TECHNIQUE |
Author: |
Dr. S. KANAGA SUBA RAJA, C.VISWANATHAN, Dr.D.SIVAKUMAR, V. BALAJI |
Abstract: |
Congestion Control is very important in any network to provide a good quality of
service. This paper implementing a Network based Congestion Control technique
using Gene Expression Programming. Congestion is caused when the number of
packets stored at the router buffer exceeds the total capacity of the buffer.
Under this state the additional packets received at the router are lost. In any
Network, the measured Buffer Utilization value can be used to identify
congestion. Whenever congestion occurs there is a drastic loss of data packets.
To overcome this problem this work tries to implement a method where the
congestion is predicted before it occurs and to avoid it. To achieve this, here
a summary of the past and present buffer utilization value and the corresponding
parameters that determine the buffer utilization are collected and this
information is used by the Gene Expression Program to predict the future buffer
utilization value. This value is used to identify the occurrence of Congestion
in the network in the near future. Once Congestion is predicted, less drastic
measures can be taken to avoid it |
Keywords: |
Buffer, Congestion, GEP, ORF, Prediction. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN ADAPTIVE WEB-BASED INTELLIGENT TUTORING USING MASTERY LEARNING AND LOGISTIC
REGRESSION TECHNIQUES |
Author: |
KUNYANUTH KULARBPHETTONG |
Abstract: |
In this paper, we present an Adaptive Web-Based Intelligent Tutoring System
using Mastery Learning, Logistic Regression and rule-based Techniques. To create
a model for analysis programming skills in each level as specified in the
curriculum, Logistic Regression approach was used to predict the probability of
pass or the probability of fail of student enrolling in a JAVA Programming
Language Course. According to the level of student knowledge, the main function
of the system is the ability to automatically adapt and change content by the
ability of the learner and also to organize learning contents in order to suit
with the learner until he/she can have in terms of required skills. The
experimental results showed that rule-based and Logistic Regression approaches
can help student learning and reduce time consuming. To evaluate the preliminary
prototype system, Black Box Testing and questionnaires were used to measure
system performance and user satisfaction respectively. The results were
satisfactory as followed: Means for teacher and students were 4.15 and 4.23, and
standard deviations were 0.64 and 0.71. |
Keywords: |
Adaptive; Tutoring System, Mastery Learning Technique, Logistic Regression And
Rule-Based Technique |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ALGORITHMS FOR MAGIC LABELING ON GRAPHS |
Author: |
NISSANKARA LAKSHMI PRASANNA , NAGALLA SUDHAKAR |
Abstract: |
This article deals with the labeling of vertices and edges of a graph. The kind
of labeling we have applied is Magic Labeling. Again Magic Labeling is expressed
in-terms of Vertex Magic Total Labeling (VMTL), Edge Total Magic Labeling (EMTL)
and Total Magic Labeling (TML). We have studied existing approaches for Magic
Labeling and we found some improvements can be done over existing VMTL
algorithms and we design algorithm to find EMTLs. We propose new and enhanced
algorithms for VMTL, EMTL and TML. We applied these algorithms on different
kinds of graphs like cycles, wheels, fans and friendship graphs. We found the
number of such distinct labelings. Also we made comparative study of these
algorithms over existing. |
Keywords: |
Magic Labeling, Vertex Magic Total Labeling, Edge Total Magic Labeling, Total
Magic Labeling, Cycles, Wheels, Fan, Friendship graphs. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
THE EFFECTIVENESS OF AUTOMATED THAI DOCUMENTS CATEGORIZATION BASED ON MACHINE
LEARNING |
Author: |
SATIEN JANPLA |
Abstract: |
The purpose of this research was to test the effectiveness of the Thai language
document categorization model by using the features of reduction and machine
learning techniques. The experimental results showed that the support vector
machine algorithm used to classify Thai documents did so with a highest
efficiency of 93.06%, followed by naïve-bayes and decision tree at 86.80% and
76.51% respectively. Considering the parameter that had the best efficiency,
support vector machine algorithm with 7000 features had the best performance at
93.90%. The features could be reduced significantly without affecting the
performance of categorization. |
Keywords: |
Model, Categorization, Machine Learning, Effectiveness, Automated |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
MODEL ORDER REDUCTION OF INTERVAL SYSTEMS BY POLE CLUSTERING TECHNIQUE
USING GA |
Author: |
V.G.PRATHEEP, DR. K.VENKATACHALAM, DR. K.RAMESH |
Abstract: |
A mixed method is proposed for the order reduction of an interval system using
pole clustering technique and simple mathematical manipulation process.
kharitonov polynomial is employed in the interval system before the model order
reduction technique is come into the approximation process. The pole clustering
technique is used to obtain the reduced order denominator polynomial and the
corresponding numerator polynomial is obtained through cross multiplication of
transfer function polynomials. Genetic Algorithm is employed in the model order
reduction process by which reduced order system parameters can be adjusted. The
stability of the interval system is analyzed through the Routh-Hurwitz stability
criterion. |
Keywords: |
Pole Clustering, Integral Squared Error (ISE), Kharitonov Polynomial, Genetic
Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
A SURVEY ON SECURED SEARCHING TECHNIQUES FOR EFFECTIVE DATA UTILIZATION IN
PUBLIC CLOUD |
Author: |
M.SHYAMALA DEVI, C.ARUN |
Abstract: |
Recent technology advances have made the success of cloud computing by acquiring
the infrastructure, platform and software from the third party vendor. The
promising benefit of cloud computing is data service outsourcing, by which the
data owners stores their data in the public data centers by economically saving
their capital investment towards data management. Cloud Storage provide users
with abundant storage space and make user friendly for immediate acquiring of
data, which is the foundation of all kinds of cloud applications. However, data
outsourcing in the commercial public cloud also raise the problem for
unauthorized data access and the cloud storage does not make sense if the
outsourced data is not effectively utilized. The practical challenge is on how
to make effective data access in the public cloud storage aiming at improvement
of various searching techniques for increasing the data utilization. In this
paper, an attempt is made to survey various searching techniques towards
effective data utilization in cloud storage and is discussed in detail. |
Keywords: |
Cloud Storage, Data Outsourcing, Effective Data Utilization (EDU), Cloud Server
(CS) |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
A NEW MODELING OF THE PEDESTRIANS EVACUATION IN PANIC SITUATIONS BASED ON VICSEK
MODEL |
Author: |
KHALID ZINE-DINE, ABDELLAH MADANI |
Abstract: |
Nowadays, evacuation problem is critical since it is used in many applications.
These applications include sites where masses of people gather such as sporting
events, transportation centers, and concerts. A relevant objective is how to
consider the mobility of pedestrians in a room in order to improve evacuation
times. In this paper, we realistically simulate how human communication affects
the behavior of individuals’ pedestrians using a modified Vicsek model. The
considered modifications of the original model are achieved by introducing more
features and parameters into the original model. The simulation results show
that evacuation time is greatly affected by several factors, such as, number of
pedestrians (density), the panic situation and the chance to find an appropriate
exit and escape paths |
Keywords: |
Evacuation, Mobility Pedestrians, Panic Situation, Vicsek Model, Discrete And
Continuous-Space |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
A POWER AWARE TRANSMISSION SCHEME SELECTION WITH DATA AGGREGATION FOR WIRELESS
SENSOR NETWORKS |
Author: |
I.S.AKILA , Dr.R.VENKATESAN |
Abstract: |
Many sensor applications today demand the need of extended lifetime. Among the
most popular approaches which address this issue, Multiple Input Multiple Output
(MIMO) and Single Input Single Output (SISO) techniques explore
environment-specific performance constraints of achieving this target. Under a
constant bit error rate, MIMO saves a considerable transmit power and then
increases the lifetime. However, the increased overhead imposed on MIMO favors
the choice of non-cooperative SISO in some sensor applications. To combine the
merits of both of these approaches, this paper employs selection mechanism which
suggests a suitable approach. A transmission scheme is modeled through a
non-transferable coalition formation game which is destined towards prolonging
network lifetime. Along with the existing scenario, we also ensure fairness of
the power distribution using the centralized data-aggregation scheme in our
proposed methodology. The simulation results demonstrate the improved
performance of our approach in a Wireless Sensor Network application. |
Keywords: |
Coalition Formation, MIMO, SISO, Centralized Data Aggregation, Wireless Sensor
Networks |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ADAPTIVE CONTROLLER FOR DRIVE SYSTEM PMSG IN WIND TURBINE |
Author: |
G.BALAJI, I.GNANAMBAL, M.ABINAYA |
Abstract: |
This paper proposes adaptive Maximum Power Point Tracking (MPPT) controller for
Permanent Magnet Synchronous Generator (PMSG) wind turbine and direct power
control for grid side inverter for transformer less integration of wind energy.
PMSG wind turbine with two back to back voltage source converters are considered
more efficient, used to make real and reactive power control. The optimal
control strategy has introduced for integrated control of PMSG Maximum Power
Extraction, DC link voltage control and grid voltage support controls.
Simulation model using MATLAB Simulink has developed to investigate the
performance of proposed control techniques for PMSG wind turbine steady and
variable wind conditions. This paper shows that the direct driven grid connected
PMSG system has excellent performances and confirms the feasibility of the
proposed techniques. While the wind turbine market continues to be dominated by
conventional gear-driven wind turbine systems, the direct drive is attracting
attention. PM machines are more attractive and superior with higher efficiency
and energy yield, higher reliability, and power-to-weight ratio compared with
electricity-excited machines. |
Keywords: |
DC-Link Voltage Control, Direct Power Control, Grid Voltage Support Control,
Maximum Wind Power Extraction, Optimal Control, Permanent Magnet Synchronous
Generator (PMSG) Wind Turbine. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF STANDARDIZATION ENGINE FOR SEMANTIC WEB SERVICE SELECTION |
Author: |
S. MAHESWARI , G.R. KARPAGAM , S. MANASAA |
Abstract: |
Proliferation of web services opens the research arena of ontology based
approach for selection of the appropriate web service(s) that satisfies the
users’ requirements with high accuracy. Real world ontologies tend to be large
as they contain thousands of concepts and several web services are associated
with them; further, several services provide similar functionalities. In such a
scenario, the discovery and selection of the suitable service(s) among the
equivalent services, requires a standardized approach, emphasizing on both
functional and non-functional aspects. This paper proposes a Standardized Engine
that incorporates a layered approach. The first layer, lexicon search, performs
semantic matching using word net; second layer Concepts based refiner, is
responsible for comparing the concepts available in the domain ontology; the
third layer, QoS (Quality of Service) based refiner, performs a statistical
analysis using QoS parameters namely response time, throughput and availability.
The evaluation of the standardized engine is performed using the metrics
precision, recall and f-measure. |
Keywords: |
Ontology, Web services, Quality of Services, Lexicon, Standardization |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS OF PULSE DEFORMATION INDUCED BY PDL ON PROPAGATION OF CHIRPED
SUPERGAUSSIAN PULSE IN SMF WITH AND WITHOUT PMD |
Author: |
S.VINAYAGAPRIYA, A.SIVASUBRAMANIAN |
Abstract: |
In this paper the effect of Polarization Mode Dispersion, Polarization Dependent
Loss on the Chirped Super Gaussian pulse is analyzed and Pulse broadening in the
presence and absence of PMD for up chirped and down chirped pulses in highly
birefringent optical link at 1550nm is investigated by numerical simulation.
Also maintaining PMD and PDL, the input light signal is launched at different
States of Polarization such as Linear, Circular and Elliptical. It is found that
the pulse broadening can be controlled by choosing an appropriate SOP of the
input signal. Results show that pulse width increases for Linear SOP and it
reduces when the input is launched at Circular and Elliptical State of
Polarization. |
Keywords: |
Polarization Mode Dispersion(PMD) , Polarization Dependent Loss(PDL), Nonlinear
Schrodinger Equation(NLSE), Split Step Fourier Method (SSFM), State of
Polarization(SOP). |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
GRAPH BASED RATIONAL TEXT CLUSTERING USING SEMANTIC ONTOLOGY |
Author: |
S. SUBBAIAH, C. CHANDRASEKAR |
Abstract: |
Text clustering methods have been discussed with various factors. We have the
goal and problem of making decision with rationality factors about how much
information is available or how complete the document about the knowledge. We
propose a new rational text clustering algorithm using the semantic ontology.
The documents are processed to extract the key terms as feature vectors.
Semantic frequency SF and inverse semantic frequency ISF are computed for each
document. Using computed SF and ISF we compute semantic weight for each document
towards various categories, based on which the document is identified to a class
or category. The proposed method produces more accurate clusters with reduced
overlap. |
Keywords: |
Semantic Ontology, Clustering, Text Mining. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
DEVELOPMENT OF COVERAGE BASED CELL SELECTION ALGORITHM FOR WIMAX |
Author: |
P. KAVITHA, DR.R.UMA RANI |
Abstract: |
Fourth generation (4G) mobile systems focus on effortlessly incorporating the
existing wireless technologies like GSM, wireless LAN, and Bluetooth. This
contrasts with third generation (3G), which simply focuses on developing new
standards and hardware. WiMAX have been rapidly emerging in the last few years.
The mobile subscriber and traffic volume have been largely increased in WiMAX.
During the stage of network planning, a cell capacity and size are typically
fixed depends on the calculation of peak traffic load. Cell planning is one of
the most basic problems in network design. In this paper, a development of
Coverage Based Cell Selection (CBCS) algorithm for 4G is introduced. The
proposed model utilizes the cell selection algorithm. The best coverage base
station can be selected based on three criteria: i.e. demand, profit and
capacities. The performance of the proposed CBCS algorithm is compared with the
four existing approaches like greedy algorithm, Bounded Greedy Weighted
Algorithm (BGWA), Call Admission Control (CAC) and Joint Scheduling & Resource
Allocation (JSRA). The proposed CBCS algorithm results better network throughput
and also provides better bandwidth consumption ratio than the existing
approaches. |
Keywords: |
Base Station, Capacities, Cell Selection, Demand, Fourth Generation (4G),
Network Planning, Profit and WiMAX |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
DISTRIBUTED AND SECURED DYNAMIC PSEUDO ID GENERATION FOR PRIVACY
PRESERVATION IN VEHICULAR AD HOC NETWORKS |
Author: |
Y. BEVISH JINILA, K. KOMATHY |
Abstract: |
Safety applications in Vehicular Ad hoc Networks (VANET) needs to be handled
with at most care such that no adversary will be allowed to intrude the privacy
of the user. Replacement of original IDs with pseudo IDs makes this possible.
Generating and storing a set a pseudo IDs by the trusted authority in the tamper
proof device of each vehicle and changing them at fixed intervals paves way for
an adversary to trace the original ID of the vehicle. And, the space required
for storing all the generated pseudo IDs in the tamper proof device of each
vehicle is huge. In this paper, we propose a novel approach where pseudo IDs are
generated dynamically based on the location information when an event is to be
reported and verified by the distributed Traffic Management System (TMS). If a
safety message send by a vehicle is detected to be malicious by the TMS, the
safety message is forwarded to the Trusted Authority (TA) to map the original ID
for the corresponding pseudo ID. The mapped original ID is forwarded to the TMS
to take necessary action. Since pseudo ID generation is based on the password
provided for driver authentication, in addition a distributed password
preservation method is introduced, which preserves the password even when a TA
is compromised. Experimental analysis shows that this scheme provides better
privacy and conditional traceability compared to existing approaches. |
Keywords: |
Pseudo ID, Privacy, Trusted Authority, Password, Vehicular Ad hoc Network |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
DESIGN OF LOW POWER MULTIPLIER USING COMPOUND CONSTANT DELAY LOGIC STYLE |
Author: |
S. DARWIN, A. BENO, L. VIJAYA LAKSHMI |
Abstract: |
High performance, energy efficient logic style is a popular research topic in
the field of very large scale integrated (VLSI) circuits. A complex constant
logic style is used to implement a logic expression to achieve high speed
operation. This logic style is well suited for arithmetic circuit where critical
path comprises of large cascaded inverting gates. Multiplication is a most
utilized arithmetic operator that forms a part of filters, convolvers, and
transforms processors in digital signal processing applications. This paper
focuses on the design of the Wallace tree multiplier, Baugh wooley and Array
multiplier using static logic style, dynamic logic style and compound constant
delay logic style .The performance of energy delay product of Wallace tree
multiplier, array multiplier and Baugh wooley multiplier using compound constant
delay logic style is reduced considerably while compared to static and dynamic
logic style. |
Keywords: |
Wallace Tree multiplier, Array multiplier, Carry Skip adder, Cadence and Baugh
Wooley Multiplier |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT HYBRID FEATURE DESCRIPTOR FOR CONTENT BASED IMAGE RETRIEVAL |
Author: |
BHUVANA S, Dr. RADHAKRISHNAN R, Dr. TAMIJE SELVY P, SUBHAKALA S |
Abstract: |
In recent days the content-based image retrieval plays an important role in
image retrieval and has achieved great development. This paper proposes a novel
diagonal direction feature descriptor for content based image retrieval (CBIR).
In Existing Local Tetra pattern, the relationship between the referenced pixel
and its neighbors are encoded using first order derivatives only in vertical and
horizontal direction. The image retrieval results are further improved by
considering diagonal pixels for derivative computation in addition to vertical
and horizontal direction. The proposed system includes the following phases 1)
Pre-processing of an image using resize method and calculation of the direction
of a pixel by computing the first order derivatives along with , and 2)
Derivation of Local Octa Pattern from the direction 3) Construction of Magnitude
Pattern using magnitude of first order derivatives 4) Calculation of feature
vector on combining LOP and magnitude pattern and then similarity is measured.
Experimental results show the proposed method is capable of effectively
retrieving relevant images thus providing superior performance than several
existing approaches. |
Keywords: |
Feature Vector, Local Tetra Pattern (LTrP), Local Octa Pattern (LOP), Local
Binary Pattern. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
IMPROVEMENT OF ALGORITHM FOR UPDATING FIREWALL POLICIES |
Author: |
Z.KARTIT, H.KAMAL IDRISSI, A.KARTIT, M.EL MARRAKI |
Abstract: |
Security issues are becoming more critical in network systems. Firewalls offer
an important defense and protection for network, permit to strengthen security
aspect. Firewalls are network devices or programs which enforce an
organization's security policy, permit to control and monitor the traffic flow
of network; they are installed between networks or hosts that employ differing
security postures. Generally firewalls were deployed at network perimeters in
order to provide some measure of protection for internal hosts. Different
firewalls support different policy editing commands. The set of policy editing
commands that a firewall supports is called its policy editing language. In [1],
the authors provide deployment algorithm for type II language. This paper aims
to develop an efficient algorithm for the updates of the security policy. Our
proposal is considered improved type II edition policies algorithm. Although the
proposed algorithm in [1] gives correct results, but it has severe shortcomings
of security in the implementation of the new policy of security, in addition,
this algorithm has a high degree of complexity. We will propose an algorithm
that will address these two weaknesses of the old algorithm, which allows us to
gain in terms of security and complexity. |
Keywords: |
Firewall, Security Policy, Policy Deployment, Network Security. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF DYNAMIC SOURCE ROUTING UNDER BLACK HOLE ATTACK |
Author: |
RAJESHKUMAR.G, Dr.K.R.VALLUVAN |
Abstract: |
Mobile Ad hoc Network (MANET) is a network that does not have a fixed
infrastructure and have the ability to manage its network independently. It
consists of a collection of “peer” mobile nodes that are capable of
communicating with each other. Nodes within each other's radio range,
communicate directly via wireless links, while those that are far apart use
other nodes as relays in a multi-hop routing fashion. Since mobile ad hoc
networks make it possible for the devices to join or leave the domain without
required permission, nodes in the domain cannot be completely trusted. This
makes MANET susceptible to attacks from malicious nodes. In this work, the
impact of black hole attack on MANET is evaluated. In this work, the impact of
black hole attack on MANET is evaluated. Simulations were carried out using
Dynamic Source Routing (DSR) for network without malicious nodes and with 10%
malicious nodes. Simulation results show that the throughput degrades by 45.44 %
and the end to end delay increases by 38.3 % due to the presence of malicious
nodes in the network. |
Keywords: |
MANET, Dynamic Source Routing (DSR), Routing, Attacks in MANET, Blackhole Attack |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
SYNCHRONOUS SEQUENTIAL CIRCUIT BASED CASCADED MULTILEVEL INVERTER |
Author: |
RATHINAM ANGAMUTHU, RAMANI KANNAN, KARTHIKEYAN THANGAVELU, JIBIN JOSEPH |
Abstract: |
This paper is focused on the practical and designing aspects of a cascaded
multilevel inverter using synchronous sequential circuits. The performance of
the inverter has been improved by using a digital logic algorithm for required
pulse width modulation. The digital logic algorithm has been exposed to give the
superior performance in load voltage and total harmonic distortion. The
synchronous sequential circuit based multilevel inverter offer several
advantages like simple structure, easy to identify the fault, cost-effective,
improved functional performance and low power consumption. The output voltage
performance of proposed strategy has been confirmed through simulation and
hardware investigations. |
Keywords: |
Digital Logic Control (DLC), Synchronous Sequential Circuits (SSC), Total
Harmonic Distortion (THD), Cascaded Multilevel Inverter (CMLI), Pulse width
modulation (PWM). |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
SECURED SMART HOME ENERGY MONITORING SYSTEM (SSHEMS) USING RASPBERRY PI |
Author: |
Dr. S. KANAGA SUBA RAJA, C. VISWANATHAN, Dr. D. SIVAKUMAR, M.VIVEKANANDAN |
Abstract: |
This paper deals with the design and implementation of Secure Home Automation
using Raspberry Pi for mobile devices that leverage mobile technology to provide
essential security to our homes and associated control operations. The proposed
home security solution hinges on our novel integration of cameras and motion
detectors into web application. Raspberry Pi operates and controls motion
detectors and video cameras for remote sensing and surveillance, streams live
video and records it for future playback, and finally manages operations on home
appliances, such as turning ON/OFF a television or microwave. For instance, when
motion is detected, the cameras automatically initiate recording and the
Raspberry Pi device alerts the homeowner of the possible intrusion. Raspberry Pi
has two main components interacting with each other: the Web application that
executes on the mobile device's browser and server-side scripts that run in a
cloud which will be operated by the Raspberry Pi hardware tool component |
Keywords: |
Buffer, Home automation , Motion detectors.PIR sensor ,Raspberry Pi, Relay |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
MOBILITY AND ENERGY EFFICIENT MECHANISM FOR 6LOWPAN DEVICES TO SUPPORT
GLOBAL HEALTHCARE SYSTEM |
Author: |
DHANANJAY SINGH |
Abstract: |
The enhancement of existing electronics healthcare (e-health) has used
internet-based embedded sensing biomedical devices. The biomedical devices are
capable to interact with other mobile applications to deliver healthcare
services on a global scale. The Internet Engineering Task Force (IETF) working
group has introduced IPv6 over wireless personal area networks (6LoWPAN). The
6LoWPAN technology has capability to support Internet over wireless sensor
networks (WSN). This paper has introduced the convergence of mobility and energy
consumption mechanism to support global healthcare communications services with
the use of 6LoWPAN based biomedical sensors. The energy management mechanism
helps to increase the lifetime of IETF-6LoWPAN devices during the movement of
patient’s in personal area networks (PAN). In this system, several biomedical
sensors fixed on the patient’s body area networks with the association of
6LoWPAN technology to support global communication. We have presented a smart
hospital scenario for global healthcare monitoring applications such as ECG,
PPG, Blood-pressure, Temperature etc. |
Keywords: |
6LoWPAN, WSN, Energy Consumption, Smart Hospital |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ERROR MINIMIZATION IN LOCALIZATION OF WIRELESS SENSOR NETWORKS USING
DIFFERENTIAL EVOLUTION WITH MOBILE ANCHOR POSITIONING (DE - MAP) ALGORITHM |
Author: |
S.SIVAKUMAR, Dr.R.VENKATESAN |
Abstract: |
Sensor Node Localization is considered to be one of the most critical issues in
a Wireless Sensor Network (WSN). The objective of localization is determination
of physical co-ordinates of a group of sensor nodes. The location information
plays a vital role for coverage, deployment of sensor nodes and rescue
operations. Many applications such as routing and target tracking are all
location dependent. This work aims at determining the location of the sensor
nodes with high precision. The initial part of this work is carried out by
localizing the nodes using Mobile Anchor Positioning (MAP), a range-free
localization method. As the anchors move through the network, they broadcast
their location as beacon packets. The sensor nodes use the location information
of beacon packets obtained from mobile anchors as well as the location packets
from neighbouring nodes to calculate their location. Our proposed algorithm used
for Localization is Differential Evolution with Mobile Anchor Positioning (DE -
MAP). We have incorporated DE – MAP algorithm over the results of MAP to enhance
the location accuracy. The idea is to compare the performance of DE-MAP
algorithm to Genetic Algorithm with Mobile Anchor Positioning (GA - MAP). Root
Mean Square Error (RMSE) has been used as a performance measure to compare
between the two approaches namely, DE-MAP and GA-MAP. Simulation results
demonstrate the fact that our proposed Differential Evolution with Mobile Anchor
Positioning (DE-MAP) algorithm is effective in bringing down the localization
error when compared to GA-MAP algorithm. |
Keywords: |
Localization, Range-free, Mobile Anchor, Differential Evolution, Genetic
Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
HIGH PERFORMANCE SEVEN LEVEL ACTIVE SHUNT FILTER FOR HARMONIC MITIGATION |
Author: |
S.LEELA, S.S.DASH |
Abstract: |
This paper deals with the simulation of a shunt active filter using seven level
cascaded H-bridge multilevel inverter. The proposed active filter topology can
also produce seven voltage levels, which significantly reduces the switching
current ripple and the size of passive components. The seven level active shunt
filter provides compensation of load power factor and current harmonics. For
compensation current extraction, synchronous detection method has been used. The
harmonic reduction is achieved in source currents as well as source voltages.
Circuit model is developed and the same is used for simulation studies. The
effectiveness of the proposed control technique is verified by the simulation
results. |
Keywords: |
Matlab simulink, Pulse Width Modulation, Seven level inverter, Shunt active
filter, Total Harmonic Distortion. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ROBUSTNESS OF LOCALIZATION ACCURACY FOR WIRELESS SENSOR NETWORKS UNDER
PHYSICAL ATTACKS |
Author: |
AHMED ABDULQADER HUSSEIN, THAREK A. RAHMAN, CHEE YEN LEOW |
Abstract: |
Wireless sensor network localization is an important area that attracted
significant research interest. This interest is expected to grow further with
the proliferation of wireless sensor network applications. As localization is
becoming popular, many attacks on the localization process are also on a rise.
These attacks confuse the localization process and cause location estimation
errors. Range based methods like received signal strength indication (RSSI) is
affected a lot by physical attacks. This paper proposes a solution based on
multi frequency multi power antenna to provide robust and accurate localization
technique . In addition this paper proposes a grid coloring algorithm to detect
the signal hole map in the network which is refer to the attack prone regions in
order to take a corrective actions . The simulation results showed improvement
in the localization accuracy in the presence of barrier attacks through
detecting , filtering and eliminating the effect of these attacks. |
Keywords: |
Wireless Sensor Networks WSNs, Robust Localization, Received Signal Strength
Indication(RSSI) algorithm, Physical Attacks. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
PID CONTROLLER FOR NARX AND ANFIS MODELS OF MARINE PIPE CYLINDER UNDERGOES
VORTEX INDUCED VIBRATION |
Author: |
MOHAMMED JAWAD MOHAMMED, INTAN Z. MAT DARUS |
Abstract: |
PID controller discrete time on marine cylinder pipe risers which represented
based on system identification models under vortex induced vibration (VIV) has
been verified in this work. Input-output data have been provided from the
experimental setup of previous paper. Two System identification methods used to
create models which are: Neural Network based on Nonlinear Auto-Regressive
External (Exogenous) Input (NARX) and Adaptive Neuro-Fuzzy Inference System (ANFIS).
NARX and ANFIS models have selected based on Mean Square Error (MSE) technique.
While, PID controller has been applied to overcome on the pipe cylinder
oscillation for all models. Also, the controller performance has been compared
on each model during from tuning the controller parameter (KP, KI and KD)
depending on the heuristic method and validation the gain values based on Mean
Square Error (MSE) technique. Finally, the consequences demonstrated that the
ANFIS model better than the NARX model to forecast the dynamic behavior of the
system. By contrast, PID controller has been managed to decrease the pipe
cylinder fluctuation for all models specially the NARX model system
identification. |
Keywords: |
System Identification, NARX Model, ANFIS Model, PID Controller, Vortex Induced
Vibration |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ARTIFICIAL BEE COLONY OPTIMIZATION FOR FEATURE SELECTION IN OPINION MINING |
Author: |
T. SUMATHI, S.KARTHIK, 3M.MARIKKANNAN |
Abstract: |
Opinion mining, a sub-discipline of information retrieval and computational
linguistics concerns not with what a document is about, but with its expressed
opinion. Feature selection is an important step in opinion mining, as customers
express product opinions separately according to individual features. Earlier
research on feature-based opinion mining had many drawbacks like selecting a
feature considering only grammatical information or treating features with same
meanings as different. However this led to a large corpus which subsequently
affected the classification accuracy. Statistical techniques like Correlation
Based Feature (CFS) have been extensively used for feature selection to reduce
the corpus size. The selected features are sub optimal due to the Non Polynomial
(NP) hard nature of the technique used. In this work, we propose Artificial Bee
Colony (ABC) algorithm for optimization of feature subset. Naïve Bayes, Fuzzy
Unordered Rule Induction Algorithm (FURIA) and Ripple Down Rule Learner (RIDOR)
classifiers are used for classification. The proposed method is compared with
features extracted based on Inverse Document Frequency (IDF). Hence, this method
is useful for reducing feature subset size and computational complexity thereby
increasing the classification accuracy. |
Keywords: |
Opinion mining, Feature selection, Artificial Bee Colony (ABC), IMDb dataset,
Inverse Document Frequency (IDF), Naive Bayes, Fuzzy Unordered Rule Induction
Algorithm (FURIA), Ripple Down Rule Learner (RIDOR) |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ARIMA MODEL-BASED RTT ESTIMATION FOR CONGESTION AVOIDANCE MECHANISM IN
ASYMMETRIC NETWORKS |
Author: |
JEYASEKAR A., KASMIR RAJA S.V., ANNIE UTHRA R |
Abstract: |
The delay-based congestion control mechanism performs well over the
bandwidth-symmetric network rather than bandwidth-asymmetric network. The
upstream and downstream link of asymmetric network has different bandwidth ie
high bandwidth in the downstream link and low bandwidth in the upstream link.
Therefore mostly the bottleneck link is the upstream link, not the downstream
link. Therefore even if the downstream link of data flow is uncongested,
congestion in the upstream link can disrupt the acknowledgement flow. Even if
ACKs are smaller in size than data packets, the upstream link is unable to carry
the high rate of ACKs. The congestion in the upstream link increases the
round-trip-time of a packet and causes loss of ACKs. The increase in
round-trip-time triggers the congestion avoidance mechanism and slows the window
growth which reduces the throughput performance. Therefore we propose a
congestion avoidance mechanism which uses RTT estimation based on Auto
Regressive Integrated Moving Average model (ARIMA). It provides better
performance than the delay-based TCP in the asymmetric network and also
symmetric network. The simulation results show that the proposed congestion
algorithm achieves 39% to 400% throughput improvement than the delay-based TCP. |
Keywords: |
Network Protocol, TCP-Vegas, ARIMA Model, RTT Estimation, Backlog Packets
Estimation, Congestion avoidance, Asymmetric Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
ENHANCED MINIMUM SECURED ROUTING PATH FOR MOBILE AD-HOC NETWORKS |
Author: |
K.LAKSHMINARAYANAN, Dr. S. PAVAIMADHESWARI |
Abstract: |
The EMSR-path algorithm develops a new routing path from source to the
destination based on the ascending order of the edge, the ascending order edge
is get connected, in order to avoid congestion in routing path in Mobile Ad-Hoc
networks. The routing is to reduce the congestion when it gets connected based
on the priority and the path is secured by secured routing protocol. The
discovery of route and secured transmission of routing path is EMSR-path
algorithm. |
Keywords: |
Path, Networks, Protocol, Ad-Hoc,Congestion |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
Title: |
AN OPTIMIZED QOS BASED COST EFFECTIVE RESOURCE SCHEDULING IN CLOUD |
Author: |
S.P.JENO LOVESUM, DR.K.KRISHNAMOORTHY, BLESSED PRINCE. P |
Abstract: |
Cloud is a type of parallel and distributed system consisting of a collection of
inter-connected and virtualized computers that are dynamically provisioned and
presented as one or more unified computing resources based on service-level
agreements established through negotiation between the service provider and
consumers. Resource scheduling, which is a part of resource management is an
important process that takes place in storage cloud which falls under IaaS
cloud, so that the available resources may be properly allocated to the
requesting tasks in a best fit manner so that no resources are wasted. As most
of the scheduling techniques do not consider the minimum memory wastage in our
work we have considered this factor as a QOS since most of the users of cloud
resource are concerned about their cost and as memory usage plays a major role
is calculating the cost we try to schedule the jobs among the available VMs so
that minimum memory wastage is taken into account while allocating the VMs to
complete the task. In this paper a QOS model for optimized task scheduling is
used to minimize task completion time and task response time and minimum memory
wastage. The task manager checks all the virtual machine and assigns the task to
proper virtual machine which will have least memory wastage. Here the task is
taken as storing a file in cloud storage. A QOS algorithm based on PSO is used
to provide an optimal solution for resource scheduling. The simulation results
show that the proposed method has the ability to find optimal trade-off
solutions for task scheduling problems that represent the best possible
compromises among the conflicting objectives. |
Keywords: |
Cloud, Optimized, Scheduling, Storage Cloud, IAAS |
Source: |
Journal of Theoretical and Applied Information Technology
10 August 2014 -- Vol. 66. No. 1 -- 2014 |
Full
Text |
|
|
|