|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
31st August 2014 | Vol. 66 No.3 |
Title: |
EDUCATIONAL MODELLING IN CLOUD COMPUTING USING IMS LEARNING DESIGN |
Author: |
Sara OUAHABI , Ahmed EDDAOUI , El Houssine LABRIJI , Elhabib BENLAHMAR , Kamal
EL GUEMMAT |
Abstract: |
Cloud Computing is a major evolution of computing. It changes the way we produce
and consume IT and actually evolved the positions of all the players in the
computer. This technology is also considered a major step forward for digital
development of higher education and research, response to these developments, a
large volume of educational resources is produced across many universities in
the cloud.
First and foremost is the use of educational modelling languages and
instructional engineering methods to help decide how to aggregate learning
objects in learning and knowledge management environments.
This paper presents our contribution in the educational modelling consists of
learning units involved in educational cloud using IMS Learning Design, the new
approach that we followed focuses on keeping interoperability between e-Learning
content and facilitate the task of identification , reuse, sharing ,adapting
teaching and learning resources in the Cloud |
Keywords: |
E-Learning, IMS-LD, Interoperability, Cloud, Modelling. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
SURVEY ON ADAPTIVE JOB SCHEDULERS IN MAPREDUCE |
Author: |
MAEDEH MOZAKKA, FARAMARZ SAFI ESFAHANI, MOHAMMAD H. NADIMI |
Abstract: |
In recent years the adaptive job schedulers became an attraction point to many
researchers, but despite many efforts that have been made, there are still many
challenges in this area. The aim of this paper is to provide a better
understanding of adaptive job schedulers in MapReduce and identify important
research directions in this area. In this paper, adaptive job schedulers in
MapReduce are classified in four categories. The techniques used in them are
described briefly, we present advantages and disadvantages of different adaptive
schedulers and then their features and the application of each category of the
schedulers are expressed. Finally, we will discuss some current challenges and
future works. |
Keywords: |
Adaptive Job Scheduler, Cloud Computing, Hadoop, Job Scheduling, MapReduce. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
N-CRYPT: A HIGHLY SECURED DATA TRANSMISSION FOR WIRELESS SENSOR NETWORK |
Author: |
S.GOPALAKRISHNAN, Dr.P.GANESHKUMAR |
Abstract: |
Mulling over of any system the defenselessness of malevolent movement influences
the information straight forwardly or by implication. The principle destination
of this paper is to transmit the information in a multi bounce WSN in a secured
way. On the off chance that a modest segment of information could be recuperate
by a malevolent node then a malignant node can ruin the whole information
throughout the information transmission. To conquer this issue and enhancing the
information level security in this paper N-Crypt methodology is presented for
giving high security to information while information transmission. N-Crypt is a
cyclic procedure of Encryption, Decryption on the information from Source Node
to Destination Node in the WSN. N-Crypt is having two modules N-Crypt-I for
Encryption at every node and N-Crypt-II for Decryption at Destination node where
it can maintain a strategic distance from clashes on the procedure of Encryption
and Decryption. The Simulation result indicates that the execution of N-Crypt is
superior to the current methodologies. |
Keywords: |
Security in Wireless Networks; Malicious Node; Intrusion Detection; N-Crypt. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
MODELLING AND SIMULATION OF SWITCHING FREQUENCY CONTROLLED REGULATED
DISCONTINUOUS CONDUCTION MODE BOOST RECTIFIERS |
Author: |
B.K.SHOBANA, DR.P.RENUGA |
Abstract: |
Regulated one switch boost rectifiers operating at a boundary of continuous and
discontinuous modes is modelled. Proposed PWM and variable frequency control
technique is used to reduce harmonics in the source current and also to regulate
the output voltage. Small signal modeling is done for the design of boost
rectifier and also for its control technique. The proposed control technique had
the main advantage of reduced THD. The simulation is performed using MATLAB/SIMULINK
software for the control methods. |
Keywords: |
Boost rectifiers, Switching frequency, DCM, Duty cycle, Small signal Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
AUTOMATIC SEGMENTATION AND CLASSIFICATION OF HARD EXUDATES TO DETECT
MACULAR EDEMA IN FUNDUS IMAGES |
Author: |
S.VASANTHI, Dr.R.S.D WAHIDA BANU |
Abstract: |
Detection of the presence of hard exudates in fundus images of diabetic patients
is very important. If hard exudates are present in the macular region of retina,
it will lead to Diabetic macular edema. Diabetic Macular Edema disease leads to
vision loss problem in Diabetic patients. Early detection of Macular Edema in
diabetic patients paves a path for prevention from blindness. Diabetic Macular
Edema (DME) occurs when blood vessels in the retina of patients with diabetes
begin to leak into the macula region of eye. These leakages cause the macula to
thicken and swell, progressively leads to vision loss. The automatic detection
of Diabetic Macular Edema and classification of DME severity is done in this
paper. The Hard Exudates (HE) presence in macula region is detected and the
features are extracted. The extracted features are fed as input to Adaptive
Neuro Fuzzy Inference System (ANFIS) and Extreme Learning Machine (ELM)
classifier to classify the images as normal and abnormal. ANFIS and ELM
classifiers performances are evaluated in terms of the parameters such as
Sensitivity, Specificity and Accuracy whose values are 100%, 90% and 96.49% for
ANFIS classifier and 94.28%, 100% and 96.49% for ELM classifier respectively. |
Keywords: |
Diabetic Macular Edema, ELM classifier, Hard Exudates, Features, Severity level |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
A COMPARATIVE AND ANALYSIS STUDY OF VANET ROUTING PROTOCOLS |
Author: |
ABD AL-RAZAK TAREQ RAHEM, MAHAMOD ISMAIL, ARIFF IDRIS, AYMEN DHEYAA |
Abstract: |
Vehicular Ad Hoc Network (VANET) is a kind of mobile ad hoc networks. VANET is
used to endow wireless communication between vehicles and vehicle to road side
equipments. The communication between vehicles is used for safety, placate and
for entertainment as well. The performance of communication depends on the
performance of routing in the network. Routing of data is dependent on the
routing protocols used in network.
In this study we investigated about various ad hoc routing methods so as to
select suitable method for different kinds of network in VANET. The main aim of
our study was identification of the ad hoc routing method that has better
performance in highly mobile environment of VANET. Comparing on the basis of
throughput and packet drop, it seems that position based routing method of VANET
as better performance as compared to the traditional ad hoc topology based
routing. However, it is not easy to provide any universal routing protocol that
can deal with all the cases of VANET. The selection of a single routing protocol
is not easy in VANET because the performance of the protocol depends on speed of
the vehicle, driving environment etc. These factors may vary from one
environment of network to another. |
Keywords: |
VANET, Routing protocol, Wireless,Performance |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENHANCING CLASSIFICATION ACCURACY WITH FREQUENT POSITIVE AND NEGATIVE RULES |
Author: |
ANIS SUHAILIS ABDUL KADIR, AZURALIZA ABU BAKAR, ABDUL RAZAK HAMDAN |
Abstract: |
Associative classification has been proven to be more accurate than the
state-of-the-art classification algorithms, such as C4.5. The rules known as
class association rules (CARs) are used to build the classifier. Initially,
positive association rules were generated to build associative classifiers.
However, more recently, negative association rules have been recognized for
their ability to enhance associative classification accuracy. Literature shows
that the knowledge obtained from negative association rules is considered unique
and surprising compared to the positive association rules. We propose to mine
the quality of negative association rule from frequent positive and negative (FPN)
itemset approach. The FPN approach will be embedded in an Apriori algorithm for
mining negative association rules and later, integrated with a CBA algorithm for
the construction of the classifier. This approach presents challenges in the
search space and selecting quality CARs in order to enhance the classification
accuracy. An experiment was conducted with UCI datasets to evaluate the
classifier’s performance and the results demonstrated that the FPN managed to
produce competitive classifier. |
Keywords: |
Associative classification, negative association rule. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
SURVEY ON RECENT DIGITAL IMAGE STEGANOGRAPHY TECHNIQUES |
Author: |
SUHAD SHAKIR JABER, HILAL ADNAN FADHIL, ZAHEREEL I. ABDUL KHALIB, RASIM AZEEZ
KADHIM |
Abstract: |
Steganography is the science of hiding information that involves all the
techniques used to exchange the secret message with low distortion of the cover
medium. Many different cover medium formats such as (image, audio, video, and
text) can be used to hide the secret message. Image files are mostly used
because of their frequency on the Internet. Some of the old techniques used
schemes to hide information are: invisible ink, null ciphers, micro-codes, and
pink-pricks. Modern Steganography has gained a lot of attention for the last two
decades because of the rapid growth of communication technologies such as
Internet and the need of a secure channel to transmit the important information.
In this paper, a concept of image steganography is explained and a review of
recent image steganography methods and its applications is presented. |
Keywords: |
Discrete cosine transform, Ddiscrete wavelet transform, Least significant bit,
Vector quantization, Steganography. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
SVM BASED AUTOMATIC MEDICAL DECISION SUPPORT SYSTEM FOR MEDICAL IMAGE |
Author: |
JOSEPHINE SUTHA.V, Dr.P.LATHA |
Abstract: |
An approach for automatic classification of Magnetic Resonance Image (MRI) is
presented in this paper. In modern hospitals a vast amount of MR images are
produced in the day to day life. So, an input image based automatic medical
image retrieval system is now a necessity. In this paper, extracted features are
classified using Support Vector Machine (SVM) with Radial Basis Function (RBF).
The performance of SVM for varying parameters is investigated. Proposed system
showed high classification accuracies (on an average > 99%) for all the datasets
used in the experiments. Experimental results and performance comparisons with
state-of-the-art techniques show that the proposed scheme is efficient in brain
MR image classification. |
Keywords: |
Magnetic Resonance Image, SIFT, Tumor, Support Vector Machine, |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE CORELATION BETWEEN BUSINESS STRATEGYAND INFORMATION SYSTEM STRATEGIES
FOR EDUCATION INSTITUTION: CONCEPT AND DESIGN |
Author: |
TANTY OKTAVIA |
Abstract: |
The strategic planning for information systems is part of the most important
aspects in order to specify the objective in the organization. With a proper
strategic planning, the business process of an organization can keep along with
the vision and mission that has been decided in the beginning. Strategic
planning for education institution has a substantial part to aligning the goals
which to be achieved by that institution. Nowadays, a rivalry in education
industry is very tight, institutions be charged to have a proper strategic
planning of each division that influenced againts business process. According to
this condition, the study aimed to evaluate business strategy with information
system strategy in order to map competitiveness value of institution compared to
the competitor. This study begins with analyse data collection by conducting
surveys and questionnaires to several sample education institutions in
Indonesia. After that, all of data were simulated into strategic information map
to show the relationship from many derived variable perspective. As a result, it
creates a blueprint model to solve common problems that exist in general
education institutions. In summary, education institution can establish a
positive contribution to the development and achievement the goal in the
institution particularly by implementing a good governance of strategic planning
of information systems. |
Keywords: |
Strategic Planning, Information System Strategy, Educational Institution |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
MODIFIED SWARM FIREFLY ALGORITHM METHOD FOR DIRECTIONAL OVERCURRENT RELAY
COORDINATION PROBLEM |
Author: |
M.H. HUSSAIN, I. MUSIRIN, A.F. ABIDIN, S.R.A. RAHIM, |
Abstract: |
Computational intelligence method such as Nature Inspired Algorithms (NIA) or
meta-heuristic algorithms based optimization methods known to be successful in
coordination of directional overcurrent relay. It has also been reported that it
outperformed the conventional approach. Due to its advantages, it has gained
more popularity among the researchers. Some of the conventional optimization
techniques such as linear programming method and non-linear programming method
were proposed but these methods is time consuming and complex to achieve optimal
solution. Thus, a search for better optimization technique to reduce computation
burden has become urgency. This paper presents the implementation of Modified
Swarm Firefly Algorithm (MSFA) in solving directional overcurrent relay
coordination problem. The effect of population sizes were considered to
investigate the performance of MSFA technique. The coordination of directional
overcurrent relays is formulated as linear programming problem and the objective
function is introduced to minimize the operating time of the primary relay.
Operating time of the relay depends on time setting multiplier (TSM) which leads
to no miscoordination between relay pairs. The proposed method have been applied
and tested successfully on 8-Bus test system and 9-Bus test system. The results
revealed that MSFA outperformed Particle Swarm Optimization (PSO) in terms of
computation time. |
Keywords: |
Directional Overcurrent Relay (DOCR) Coordination, Modified Swarm Firefly
Algorithm (MSFA), Particle Swarm Optimization (PSO), Time Setting Multiplier,
Computation Time |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT AND CONNECTIVITY BASED CLUSTERING SCHEME FOR MULTICAST
ROUTING IN WIRELESS SENSOR NETWORKS |
Author: |
E. MARIAPPAN, Dr.B.PARAMASIVAN |
Abstract: |
Wireless sensor networks s(WSNs) are the key technology for monitoring and
communicating with the physical environment. Data aggregation is the key
challenge to make energy constraints of sensor node to increase network life
time. Since sensor nodes are densely deployed, redundant data may occur.
Clustering the network provides effective solution for such issues and is an
important way of managing large number of sensor nodes. We proposed a new Energy
Efficient and Connectivity based Clustering scheme for multicast routing in
wireless sensor networks named as E2C4. In E2C4, the cluster heads are elected
by a probability based on the ratio between ensemble energy consumption of each
node and the average energy of the network. The cluster-heads’ period will be
different according to their initial and consumption energy rate. The nodes with
high initial energy and less energy consumption rate will have more chances to
be the cluster-heads than the nodes with low initial energy and high energy
consumption. In the conclusion, the experimental result shows that E2C4 achieves
longer lifetime and more effective messages than current important clustering
protocols like LEACH and HEED |
Keywords: |
Clustering algorithm, Data aggregation, Efficient energy consumption, Multicast
routing, Wireless sensor networks |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
WAVELET VISIBLE DIFFERENCE MEASUREMENT BASED ON HUMAN VISUAL SYSTEM
CRITERIA FOR IMAGE QUALITY ASSESSMENT |
Author: |
NAHID MOHAMMED, BAJIT ABDERRAHIM, ZYANE ABDELLAH, MOHAMED LAHBY |
Abstract: |
A reliable quality measure is a much needed tool to determine the type and
amount of image distortions. To improve the quality measurement include
incorporation of simple models of the human visual system (HVS) and
multi-dimensional tool design, it is essential to adapt perceptually based
metrics which objectively enable assessment of the visual quality measurement.
In response to this need, This paper proposes a new model of image quality
measurement called the Modified Wavelet Visible Difference Predictor MWVDP based
on various psychovisual models, yielding the objective factor called Probability
Score (PS) that correlates well with visual error perception, and demonstrating
very good performance. Thus, we avoid the traditional subjective criteria called
Mean Opinion Score (MOS), which involves human observers, are inconvenient,
time-consuming and influenced by environmental conditions. Widely blurriness or
blockiness. Besides the PS score, the model MWVDP provides a map of the visible
differences VDM (Visible Difference Map) between the original image and its
degraded version. To quantify human judgments based on the mean opinion score
(MOS), we measure the covariation between the subjective ratings and the degree
of distortion obtained by the probability score PS. |
Keywords: |
JPEG and JPEG2000 Image Compression, Visual Perception, Luminance and Contrast
Masking, Mean Opinion Score MOS, Objective and Subjective Quality Measure. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE COMPARISON OF PARTITIONING PTS BASED PAPR REDUCTION OF OFDM
SYSTEMS UNDER DIFFERENT MODULATIONS TECHNIQUES |
Author: |
ZEYID T. IBRAHEEM, BMD. MIJANUR RAHMAN, CS. N. YAAKOB, |
Abstract: |
Partial Transmit Sequence (PTS) technique is widely employed to mitigate the
peak-to-average-power ratio (PAPR) in orthogonal frequency division multiplexing
(OFDM) systems without any distortion. The crucial step in any PTS system is
partitioning of the OFDM frame into disjoint sub-blocks. Adjacent partitioning
(AP) is a rather simple partitioning scheme achieving attractive PAPR reduction
performance in trade-off between cost and performance. In this paper, Finite
Radon Transform (FRAT) is implemented as a modulation technique for data mapping
and a comparative analysis of the performance of FRAT is carried out against
that of ordinary data mapping techniques such as phase shift keying (PSK) and
quadrature amplitude modulation (QAM). The research objective is to find the
most appropriate modulation scheme for OFDM system with PTS scheme. In order to
perform the comparative analysis, the FRAT as well as PSK and QAM modulation
techniques was implemented for the purpose of data mapping. Another dimension
for comparative analysis was PTS partition length variability. Adjacent PTS
scheme was implemented for both fixed length and variable length partitioning
for the aforesaid modulation techniques. The results obtained for all the
scenarios were investigated. These modulation schemes were also tested for the
case of interleaved PTS scheme. Simulation results with different partitioning
scenarios showed that the ordinary mapping for any types of techniques (PSK or
QAM) had better PAPR reduction performance compared with FRAT. |
Keywords: |
Orthogonal frequency division multiplexing (OFDM), peak-to-average power ratio (PAPR),
partial transmit sequences (PTS), sub-block partitioning, Finite Radon Transform
(FRAT) |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
EEG SIGNAL IDENTIFICATION BASED ON ROOT MEAN SQUARE AND AVERAGE POWER SPECTRUM
BY USING BACKPROPAGATION |
Author: |
HINDARTO , MOH. HARIADI , MAURIDHI HERY PURNOMO |
Abstract: |
The development of user interface for game technology has currently employed
human centered technology researches in which EEG signal that utilizes the brain
function has become one of the trends. The present research describes the
identification of EEG Signal by segmenting it into 4 different classes. The
segmentation of these classes is based on Root Mean Square (RMS) and Average
Power Spectrum (AVG), employed in feature extraction. Both Root Mean Square (RMS)
and Average Power Spectrum (AVG) are employed to extract features of EEG signal
data and then used for identification, by which a BackPropagation method is
employed. The experiment,done with 200 tested signal data file, demonstrates
that the identification of the signal is 91% accurate. |
Keywords: |
Root Mean Square, Average Power Spectrum, BackPropagation, EEG signal. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
HARDWARE-SOFTWARE PARTITIONING ALGORITHM BASED ON BINARY SEARCH TREES AND
GENETIC ALGORITHM TO OPTIMIZE LOGIC AREA FOR SOPC |
Author: |
SONIA DIMASSI, MEHDI JEMAI, BOURAOUI OUNI, ABDELLATIF MTIBAA |
Abstract: |
This paper presents an approach based on hardware/software partitioning to
minimize the logic area of System on a Programmable Chip (SOPC) while respecting
a time constraint. Our contribution focuses on introducing a new
hardware/software partitioning algorithm. This algorithm is based on the
principle of Binary Search Trees (BST) and genetic algorithms. It aims to define
the tasks that will run on the Hardware (HW) part and those that will run on the
Software (SW) part. The proposed algorithm will determine the best partition
that will reduce the number of tasks used by the HW and increase the number of
tasks used by the SW and thereafter the area will be reduced. The results show
that our algorithm significantly reduces the logic area compared to other well
known algorithms. |
Keywords: |
Logic area, Hardware/software partitioning algorithm, Binary search trees,
Genetic algorithms, SOPC. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EXPERT SYSTEM TO DETECT CAR DAMAGE BY USING CART METHOD |
Author: |
PRATIWI KUSUMA PUTRI, I KETUT GEDE DARMA PUTRA, NI MADE IKA MARINI MANDENNI |
Abstract: |
The information of car fault by car breakdown symptoms is the important thing to
note. In this study created on expert system to detect damage to the car by
using Classification And Regression Tree (CART) Method. CART method is a method
of classification with decision tree modeling. The input from this study is the
data derived from the expert. This study includes three main processes, namely
the identification of the input stage. Stage of learning and classification
stage. The learning stage produces the decision tree output as a rules detection
of car damage. The classification stage produces the output in the form of car
damage detection results based on the symptoms that entered by the users. |
Keywords: |
Expert System, CART, Detection of Damage , Decision Tree, Car Damage. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
A GENERAL FISH CLASSIFICATION METHODOLOGY USING META-HEURISTIC ALGORITHM
WITH BACK PROPAGATION CLASSIFIER |
Author: |
USAMA A. BADAWI AND MUTASEM K. ALSMADI |
Abstract: |
Problem statement: One challenging research area nowadays is pattern
recognition. Many applications lay under the field of pattern recognition such
as face and iris recognition, speech recognition, texture discrimination and
optical character recognition. A system that recognizes isolated pattern of
interest is called pattern recognition. The pattern under consideration could be
an image. During the process of image recognition, many problems could occur
such as noise, distortion, overlap, errors in the segmentation results and
obstruction of objects in the image. Several approaches to handle and solve
pattern recognition problems have been developed. Examples of such approaches
are neural networks (NN), Contour matching, texture and color signature.
Approach: The aim of this study is to develop a system to recognize isolated
fish object in the image based on a combination between significant extracted
features using anchor points, texture and statistical measurements. A generic
fish classification could then be performed using a hybrid meta-heuristic
algorithms (genetic algorithm with iterated local search) with back-propagation
algorithm (GAILS-BPC), to classify the images of fish into dangerous and
non-dangerous families, and to recognize the dangerous fish families into
Predatory and Poison fish family, and recognize the non-dangerous fish families
into garden and food fish family. Conclusion and Results: A prototype to deal
with the problem of fish images classification is presented in this research
work. The proposed prototype has been tested based on 24 fish families, each
family contains different number of species. The proposed prototype has
performed the classification process successfully. The experimental tests have
been performed based on 320 distinct fish images. The 320 distinct fish images
were divided into 220 images for training phase and 100 images for testing
phase. An overall accuracy recognition rate is 80.5% that was obtained using the
proposed GAILS-BPC. |
Keywords: |
Feature Extraction, Anchor Measurements, Gabor filter, statistical measurements,
Fish Images, Back Propagation Classifier, Iterated Local Search and Genetic
Algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
A PRAGMATIC APPROACH TO SECURE DSR PROTOCOL FROM SINKHOLE ATTACK IN AD HOC
ENVIRONMENT |
Author: |
DEVI. P, KANNAMMAL. A |
Abstract: |
Mobile Ad Hoc Networks (MANETs) have the most challenging network infrastructure
from the security perspective. Attacks on routing protocols, especially internal
attacks will cause the damage to MANETs. Sinkhole attack is a kind of internal
attack, creates fabricated route discovery request packet, convinces other
normal neighboring nodes, intrudes into the network, sniffs confidential
information and finally spoils the network. This routing protocol attack
exhausts the network if it is not caught earlier in the stage. In this paper, we
design and evaluate the Secure Efficient DSR Protocol (SEDP), which recognizes
the presence of sinkhole node from packet flow information between nodes,
prepares Suspected Node List, filters particular harmful node from the list and
lastly isolates it from the network. Our Intrusion Detection System incorporates
IDS nodes, assumed as inner layer of MANET is closely monitoring the route cache
of nodes and detects compromised nodes. We have evaluated the performance of the
proposed system using NS2, in terms of detection rate, detection time, routing
overhead, and false positive rate. Results prove the consistency and
effectiveness of our intrusion detection method. |
Keywords: |
Mobile Ad hoc NETwork(MANET), sinkhole attack, DSR Protocol, security and
protection, malicious node detection, Intrusion Detection System (IDS), Secure
Efficient DSR Protocol (SEDP) |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
PREMATURE INFANT INCUBATOR ALERT SYSTEM VIA SMS |
Author: |
N.S. SALAHUDDIN, R. H. HANDOKO, S. POERNOMO SARI, M. HERMITA, A. B. MUTIARA |
Abstract: |
To make security and comfort for babies, parents of babies, and hospital
personnel when the premature baby in the incubator room, Premature Infant
Incubator Alert System via SMS has been made. The system would stabilize the
temperature and relative humidity when the value is not in accordance with a
predetermined value and immediately sends a warning message to the destination
mobile number. The time taken by the system to send a warning message to the
destination mobile phone number is 8 to 25 seconds. The system uses sensors
SHT11, light bulbs, fans, GSM modem, and ATmega8535 microcontroller. |
Keywords: |
Incubator, Premature Baby, SHT11 Sensor, GSM Modem, microcontroller ATmega8535. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENHANCED MINIMUM SECURED ROUTING PATH FOR MOBILE AD-HOC NETWORKS |
Author: |
K.LAKSHMINARAYANAN, Dr. S. PAVAIMADHESWARI |
Abstract: |
The EMSR-path algorithm develops a new routing path from source to the
destination based on the ascending order of the edge, the ascending order edge
is get connected, in order to avoid congestion in routing path in Mobile Ad-Hoc
networks. The routing is to reduce the congestion when it gets connected based
on the priority and the path is secured by secured routing protocol. The
discovery of route and secured transmission of routing path is EMSR-path
algorithm. |
Keywords: |
Path, Networks, Protocol, Ad-Hoc,Congestion |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
ASSOCIATION RULE MINING FOR IDENTIFYING OPTIMAL CUSTOMERS USING MAA
ALGORITHM |
Author: |
G. BABU , DR. T. BHUVANESWARI |
Abstract: |
Identifying customers which are more likely potential for a product and service
offering is an important issue. In customers identification data mining has been
used extensively to predict potential customers for a product and service.
Modern companies and organizations efficiently implement a CRM strategy for
managing a company interactions and relationships with customers. CRM systems
have been developed and designed to support the areas of marketing, service
process and sales. Many literature studies are available to preserve the
customer relationship but small drawbacks occur in the existing methods. One
method to maintain the customer relationship is frequency based method i.e., The
Company will give declination to the customer based on the historical data that
is the customers how many times come to that company. These methods are not
effective. Because the customers give revenue to that company is less. So the
company revenue is affected. In the data mining field, association rules have
been researched for more than ten years ; however, the degree to which the
support threshold effectively discovers interesting association rules has
received little attention. Most of the research effort in the scope of
association rules has been oriented to simplify the rule set and to improve
performance of the algorithm. With the recent advancement of Internet and Web
Technology, web search has taken an important role in the ordinary life. To
discover interesting patterns or relationship between data in large database
association rule mining is used. Association rule mining can be an important
data analysis method to discover associate rules in CRM. The Apriori algorithm
is a proficient algorithm for determining all frequent customers in CRM. But
these are not the only problems that can be found and when rules are generated
and applied in different domains. Troubleshooting for them should also take into
consideration the purpose of association model and the data they come from. Some
of drawbacks like non interesting rules, low algorithm performance arts are
found in the algorithm. Several past studies addressed the problem of mining
association rules with different Supports will not be appropriate in large
dataset and they cannot generate more useful rules. This paper suggests a new
framework of algorithm MAA that overcomes the limitations associated with
existing methods and enables the finding of association rules based on Apriori
Algorithm among the presence and/or absence of a set of items without a preset
minimum support threshold and Minimizing Candidate Generation. The proposed work
is an efficient algorithm for generating frequent itemsets and is optimized to
takes less time compare to the existing algorithms. The main aim of this
algorithm is to reduce execution time and memory utilization as compared to the
existing algorithms. The framework has been tested on several datasets.. The
result obtained shows that the proposed algorithm takes 25% less time compared
to the Apriori algorithm in all instances. The performance of the algorithm is
influenced by the dimensions of the data set and support factor and it is
compared with performance of FP-growth and DynFP-Growth algorithms. The
algorithm used to discover coherent rules which has been used in CRM model
.Then, the mined information is used to calculate the company profit and
frequency (the number of times the particular customer visit the company). By
using association rule mining, the profit and frequency value of each customer
is computed. Based on the mining result, the companies provide offers to
customer using swarm intelligence technique known as particle swarm
optimization.. This offer does not affect the company revenues as well as
satisfying the customers. This process will make a good relationship between the
customers and organizations and to satisfy the customers forever with company’s
rules. |
Keywords: |
CRM, PSO, Data Mining, Association Rule Mining, Algorithm, DynFP-Growth |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
MAPPING OF LAKE SURFACE COVERS USING PIXEL INTENSITIES FOR MONITORING
SEASONAL ICE DEVELOPMENT |
Author: |
DR.M.KRISHNAVENI, DR.P.SUBASHINI,3 M.POOVIZHI |
Abstract: |
Due to the dramatic change of air temperature, the ice layer expands
significantly in the lake region. To monitor and to predict the ice conditions
occurred in Ice Lake over seasonal basis, the pixel based classification method
is evaluated and experimented. Research in classification of lake ice
concurrently takes the history of ice information and structure of the ice
cover. In this paper, based on the fundamental information, a methodology is
proposed to classify ice from other surfaces based on pixel intensities. By
applying Color based segmentation using K-Mean Cluster the intensity of
different classes are extracted according to the respective ranges. The pixel
intensity ranges are taken as a feature value for the KNN Classification. With
that pixel intensity range three classes are identified as ice, water and sand.
Experimental results show that the growth rate of the ice is estimated with the
classified ice region in the lake area .The accuracy rate of ice classification
from other classes in an image is high using KNN. This examination explores and
proves the expansion of the ice cover according to the seasonal duration using
image analysis methodology. |
Keywords: |
Lake Ice, Image analysis, pixel intensity, K-Mean Cluster, KNN classification |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
METHOD OF IDENTIFICATION AND DIAGNOSTICS OF PULSED SYSTEMS USING DISCRETE
SIGNAL CONVOLUTION |
Author: |
S.I. SIVKOV, L.G. NOVIKOV, D.M. MIKHAYLOV |
Abstract: |
The present paper is devoted to development of the method of pulsed systems
identification and diagnostics using discrete signal processing. Authors
consider types of synchronous logical convolution and elementary synchronous
logical convolutions, namely: synchronous disjunctive convolution, synchronous
conjunctive convolution, synchronous conjunctive convolution with delayed
variable inversion, synchronous conjunctive convolution with input variable
inversion as well as synchronous conjunctive modulo two. Creation of new
technical means on the basis of described logical convolution of PZ-signal
indicates the possibility of developing new principles of logical and discrete
signal processing, and devices. |
Keywords: |
Logical Signal Convolution Operator, Synchronous Pulsed PZ-Signal, PZ-Series. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
A 50-50 PACKET TRADE MODEL IN MANET TO DETECT MISBEHAVING NODES BY ZKP
AUTHENTICATION PROTOCOL |
Author: |
S.NEELAVATHY PARI, D.SRIDHARAN |
Abstract: |
Mobile Ad hoc Network (MANET) is an emerging technology and hence is an active
area of research. The ease of deployment and defined infrastructureless feature
these networks find applications in a variety of scenarios ranging from
emergency operation and disaster relief to military service and task force.
Providing security in such scenarios is critical. Zero Knowledge Protocol (ZKP)
help a prover convince a verifier that he /she holds some knowledge (usually
secret), without leaking any information about the knowledge during verification
process (zero knowledge).This paper briefly state the zero knowledge protocol to
authenticate nodes in MANET and explore the game based approach for the
detection of misbehaving nodes using 50-50 packet trade model, which ensures the
selfish node to cooperate and detect maliciousness with low probability error.
The simulation results have proved the effectiveness of the proposed Malicious
Node Detection using Trade model (MNDT) with improved throughput, packet
delivery ratio, and end-to-end delay as compared with existing protocols. |
Keywords: |
Mobile Ad hoc Networks (MANET), Zero Knowledge Protocol (ZKP), authentication,
packet trade model, malicious nodes |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
A TEMPERATURE AWARE Z-CURVE BASED ONLINE TASK PLACEMENT ALGORITHM FOR PARTIALLY
RECONFIGURABLE FPGAs |
Author: |
SENOJ JOSEPH, Dr. K.BASKARAN |
Abstract: |
Partially runtime reconfigurable FPGA’s allow hardware tasks to be placed and
removed dynamically at runtime. A fast and efficient algorithm for finding empty
area is necessary for online placement algorithms. This paper deals with online
scheduling and placement of tasks onto partially reconfigurable FPGAs in which
CLB are labeled using Z-curve. The free space can be described easily using one
dimensional run length based coding thereby making addition and deletion of task
as simple as inserting entries into the run length list. Simulations indicate
that the proposed methods produce better placement with 10% less task rejection
when compared with related approaches Nowadays temperature distribution on the
FPGA is a major issue. Hence the work is extended to develop a novel temperature
aware model. This algorithm divides the entire surface of the FPGA into several
clusters. Task are allocated to each cluster based on parameters like
temperature, stress, fragmentation etc. The proposed model achieves lower
temperature distribution with slight increase in rejection rate. |
Keywords: |
Partially Reconfigurable FPGA, Online Placement, Space Filling Curves,
Reconfigurable Computing, Very Large Scale Integrated Circuits, Temperature
Management |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
A LOCAL TOPOLOGY RECONFIGURATION MECHANISM TO IMPROVE THE ENERGY
EFFICIENCY IN WIRELESS SENSOR NETWORK |
Author: |
P.K.POONGUZHALI V.S.JAYANTHI |
Abstract: |
A wireless sensor network (WSN) is a self organizing wireless network system
consists of number of energy limited sensor nodes. Since sensor nodes are
battery powered devices, they have limited processing and transmission power and
with limited communication ability. In order to transmit sensing data to
receiver effectively, it is necessary to design an energy efficient routing
protocol for WSNs. The nodes with greater signal strength will have more
communication link and result in faster energy consumption as a whole network
cannot always work under the same topology structure. A topology reconnecting
mechanism of the cluster head rotation algorithm is needed. This paper presents
an Enhanced Forward Aware Factor -Energy Balanced Routing Method (EFAF-EBRM)
based on the selection of appropriate cluster head to improve the energy
efficiency . In this technique the sensor node may prefer to select cluster head
that makes the total energy consumption least.This proposed cluster formation
strategy decreases the communication overhead and increses the packet delivery
ratio.More over this technique over come the problem in the existing rouitng
method FAF-EBRM when local topology reconfiguration is needed. In this method an
optimal solution for cluster head selection is proposed .The sensor nodes in the
proposed algorithm pick out their appropriate cluster heads rather than the
nearest for the sake of energy efficiency The newly proposed cluster formation
strategy reduces the delay even for the long distance link. Simulations results
also prove that the proposed cluster formation strategy is better performance
compared with FAF-EBRM and LEACH in terms of Energy balanced factor, Network
lifetime, communication over head and delay. |
Keywords: |
Forward Aware Factor(FAF), Cluster Formation ,Communication Over Head ,Wireless
Sensor Networks(Wsns). |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE COMPARISON OF INTEGER CODED CUCKOO AND LEVY FLIGHTS ALGORITHM
APPLIED TO UNIT-COMMITMENT PROBLEM |
Author: |
J.CHITRA, DR. C.S.RAVICHANDRAN |
Abstract: |
Optimal use of generated power using the Unit Commitment (UC) has been a of
research interest for decades. Even though there were lots of optimization
techniques tested on the Unit Commitment problem in the past the research is
still on because of the newer optimization techniques. With this motivation new
algorithms like the Cuckoo Search Algorithm (CSA) using Levy Flights Algorithm (LFA)
is implemented on the Unit Commitment problem and compared with the Shifted Frog
Leap Algorithm (SFLA). The parameters under study for performance comparison are
the execution time, speed of convergence, search area and total number of
iterations. MatlabTM based UC problem simulation is carried on a ten-unit system
for a 24-hour load demand with the SFLA and CSA algorithm and the performance
comparison is tabulated. The CSA algorithm gives overall improvement in the
performance compared to the SFLA method of UC solution. |
Keywords: |
Cuckoo Search Algorithm, Unit Commitment, Shuffled Frog Leap Algorithm,
Meta-Heuristic Search Algorithms, Optimization techniques. |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
POWER OPTIMIZED CLOCK GATED ALU FOR LOW POWER PROCESSOR DESIGN |
Author: |
L.RAJA, Dr.K.THANUSHKODI |
Abstract: |
Arithmetic and Logic Unit (ALU) is one of the frequent and the most fundamental
component in low power processor design. Besides Power consumption due to clock
gated ALU can be significant in high performance systems. In general the
functionality of ALU is a mixture of arithmetic and logic operations which are
realized by means of combinational circuits. In this research work the power
flow analysis of clock gated ALU circuits is analyzed and optimization of clock
gated ALU power supply unit is done through special handing technique. The
proposed design which controls the power supply unit of ALU via Clock Gated
Double Edge Triggered (CGDET)flip-flop technique which outperforms the
traditional Clock Gated Single-Edge-Triggered (CGSET) flip-flop and it reduces
the power consumption by 2.2% while keeping the same data rate. In contrast with
existing techniques the proposed method has simpler structure, lower delay time,
condensed Power Delay Product (PDP), Energy Delay Product (EDP) and Static
current has been tabulated. The work suggests that clock gated double edge
triggering provides optimized power management for ALU design. |
Keywords: |
Clock Gated Single-Edge-Triggered (CGSET) Flip-Flop, Clock Gated Double- Edge
-Triggered (CGDET) Flip-Flop, Power Delay Product, Energy Delay Product,
Arithmetic And Logic Unit |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN ASSESSMENT ON THE PASSWORD PRACTICES AMONG STUDENTS |
Author: |
MOHD ZALISHAM JALI, SHAHARUDIN ISMAIL, ZUL HILMI ABDULLAH |
Abstract: |
User authentication can be defined as the process of proving the user’s
identity. Three typical categories of user authentication are based on users’
knowledge (i.e. PIN and Passwords), users’ possession (i.e. Smart Card and
Token) and users’ characteristics (i.e. Iris and typing pattern). This paper
presents an extensive review related to password-based authentication and then
reports the latest experimental study conducted to evaluate the password
practices among students within the authors’ institution. Participants within
the study were given a scenario where their accounts were hacked and
straightforwardly, they were asked to create new passwords according to three
conditions; namely C1 (i.e. having at least one upper, lower, number and special
character), C2 (i.e. contains at least three words) and C3 (i.e. combination of
C1 and C2 respectively). After a week time, they were again invited to
participate by writing down their passwords to investigate memorability.
Overall, the study managed to recruit 380 students, having a total of 1140
passwords. From the analysis covering password memorability, password creation
and password perception, it could be reported that the three tested conditions
have both positive and negative outcomes, thus authors suggest that ‘a second
look’ should be considered if these conditions to be implemented in real
setting. |
Keywords: |
User authentication, Memorability, Password, Knowledge-based Authentication,
Vulnerabilities |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
DEVELOPMENT OF KNOWLEDGE REPOSITORY SYSTEM AT DIVISION OF INFORMATION
TECHNOLOGY IN PT XYZ (A CASE STUDY APPROACH) |
Author: |
OHANNES KURNIAWAN, FLORENCIA IRENA, FELICIA RATNA CHANDRA DEWI, IRENE STEPHANIY |
Abstract: |
PT. XYZ realizes that knowledge is one of the truly valuable asset for the
company. Therefore, PT. XYZ wants to build knowledge repository system as a tool
to support the knowledge capture process and management, also the knowledge
sharing between employees. The purpose of this writing is to design a knowledge
repository system at PT. XYZ so we can recommend the concept and design of
knowledge repository system that will be developed in the future. Design methods
used here are data collection method from interview, literature study, and also
system analysis and design method based on object according to Bennett. Results
to be achieved are the concept and design, also the prototype of knowledge
repository system. From this writing we can summarize that with the automated
storage and search structure, it is expected to bring ease for the employees in
searching the required knowledge. This recommendation of storage system is
useful to keep all knowledge from every PT. XYZ employee. Nevertheless, the
content management is required to ensure the accuracy of the stored knowledge. |
Keywords: |
Knowledge Management, Application, Information Technology |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
DEEP EXTREME TRACKER BASED ON BOOTSTRAP PARTICLE FILTER |
Author: |
ALEXANDER A S GUNAWAN, MOHAMAD IVAN FANANY, WISNU JATMIKO |
Abstract: |
Visual tracking in mobile robots have to track various target objects in fast
processing, but existing state-of-the-art methods only use specific image
feature which only suitable for certain target objects. In this paper, we
proposed new approach without depend on specific feature. By using deep
learning, we can learn essential features of many of the objects and scenes
found in the real world. Furthermore, fast visual tracking can be achieved by
using Extreme Learning Machine (ELM). The developed tracking algorithm is based
on bootstrap particle filter. Thus the observation model of particle filter is
enhanced into two steps: offline training step and online tracking step. The
offline training stage is carried out by training one kind of deep learning
techniques: Stacked Denoising Autoencoder (SDAE) with auxiliary image data.
During the online tracking process, an additional classification layer based on
ELM is added to the encoder part of the trained. Using experiments, we found (i)
the specific feature is only suitable for certain target objects (ii) the
running time of the tracking algorithm can be improved by using ELM with
regularization and intensity adjustment in online step, (iii) dynamic model is
crucial for object tracking, especially when adjusting the diagonal covariance
matrix values. Preliminary experimental results are provided. The algorithm is
still restricted to track single object and will extend to track multiple object
and will enhance by creating the advanced dynamic model. These are remaining for
our future works. |
Keywords: |
visual tracking, mobile robots, bootstrap particle filter, deep learning,
extreme learning machine |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF WORM HOLE ATTACK ON AD HOC ON DEMAND MULTIPATH
DISTANCE VECTOR ROUTING |
Author: |
Ramya Dorai, Rajaram. M |
Abstract: |
Mobile Adhoc Network (MANET) is a self-configuring network of mobile nodes
connected by wireless links. Security is a dominant concern in MANET due to its
intrinsic vulnerabilities. MANETs are receptive to attacks due to its open
medium, dynamically changing network topology, cooperative algorithms, lack of
central monitoring and management point, and lack of a line of defense. Nodes
depend on each other for packet transmission from source node to destination
node through routing. The efficiency of a network degrades due to the presence
of malicious nodes. This study evaluates the impact of wormhole attack on MANET.
Adhoc On-demand Multipath Distance Vector (AOMDV) routing is considered for
evaluation. |
Keywords: |
Multimodal Biometrics, Fingerprint, Finger Vein, Radial Basis Function (RBF)
Classifier, BAT, Gravitational Search |
Source: |
Journal of Theoretical and Applied Information Technology
31st August 2014 -- Vol. 66. No. 3 -- 2014 |
Full
Text |
|
|
|