|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
May 2014 | Vol. 63 No.3 |
Title: |
FUZZY BASED DETECTION AND SWARM BASED AUTHENTICATED ROUTING IN MANET |
Author: |
K.SHANTHI, T.JEBARAJAN |
Abstract: |
In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based
distributed intrusion detection (DIDS) techniques are very rarely available. In
general, these techniques are used for either detection or authentication
process. In this paper, we propose a combined approach named as fuzzy based
intrusion detection and swarm based authenticated routing in MANET. This
technique involves the detection of attacker level of the nodes in the network
layers such as MAC layer, physical layer and routing layer using fuzzy logic
technique. Based on the detected attacker level, the trust value of each node is
updated. When source node wants to transmit a data packet to the destination,
the route with trustworthy nodes is selected using swarm based ant colony
optimization (ACO) technique. By simulation results, we show that proposed
technique enhances the secured data communication. |
Keywords: |
MANET, Authentication, Routing, Attack |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
HARMONIC REDUCTION COMPARISON IN MULTILEVEL INVERTERS FOR INDUSTRIAL APPLICATION |
Author: |
ROSLI OMAR, MOHAMMED. RASHEED, AHMED AL-JANAD, MARIZAN SULAIMAN, ZULKIFILIE.
IBRAHIM |
Abstract: |
This paper presents the simulation studies adapters’ type of multi-level
consists of H-bridge cascade imposed to reduce harmonic for high power
applications. Applications of multilevel converters are able to reduce the
number of harmonics contained in the system of low-voltage electrical
distribution. This study deals with a comparative analysis between the three
stages of imposed multilevel inverter circuits cascaded H-bridge inverter with
sinusoidal pulse width modulation (SPWM) strategies. Used five to nine levels
SPWM inverter with the functions of the switching of the principles of
mitigation of harmonic components of the output voltage of the multilevel
converters operation. The simulation results show that the total harmonic
distortion of the effort (THDV) adapters for multiple outputs levels and
decreased both realized on the basis of the content of the low standard IEC. |
Keywords: |
Multilevel inverter, H-Bridge inverter (CHB), SPWM. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
A COMPARATIVE ANALYSIS OF MARKOV MODEL WITH CLUSTERING AND ASSOCIATION RULE
MINING FOR BETTER WEB PAGE PREDICTION |
Author: |
P.SAMPATH, Dr.AMITABH WAHI, D.RAMYA |
Abstract: |
Web page prediction, that involves personalizing web users behavior and also
helps the web master to improve the website structure and helps the user in
navigating the site and accessing the information. World Wide Web is a huge
storage place for pages and links. So that the browser can get the information
through the storage place. But it takes more time to reach the users targeted
page. Intermediatly browsers have to visit many unwanted links instead of
targetted page. Here, different techniques has been investigate to predict the
next set of webpage based on the previous action of browsers behaviour for which
the log files are collected and maintained. Two different predicting techniques
namely markov model along with clustering and modified markov model along with
association rule mining are applied to find out web page prediction. Thus the
comparison of markov model along with clustering and modified markov model along
with association rule mining shows better result for page prediction. |
Keywords: |
Markov Model(MM), Modified Markov Model(MMM), Markov Model with Clustering(IMC),
Markov Model with Association Rule Mining(MM-AR),Web Mining. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
EMBS: ENERGY EFFICIENT MULTIPLE BASE STATION PLACEMENT IN A CLUSTERED WIRELESS
SENSOR NETWORKS |
Author: |
K. PADMANABHAN, S. P. SHANTHARAJAH |
Abstract: |
Wireless sensor networks consist of energy constrained sensor nodes. The main
challenge of the researchers is to utilize the energy of the wireless sensor
network in an efficient manner. By minimizing the energy usage, the network
lifetime can be improved. Energy efficiency can be obtained by using various
techniques. Optimal base station placement is one of the techniques used to
minimize the energy consumption. The sensor nodes in the network forward their
sensed data to the base station either directly (single-hop) or indirectly
(multi-hop). The distance between the source and the sink determines the level
of energy consumption. The more distance between the sender and the receiver
consumes more energy. By using proper routing algorithms, the distance between
the node and the base station can be minimized. In our paper, we propose an
energy efficient base station placement in a clustered wireless sensor networks
(EMBS) to improve the lifetime of the wireless sensor networks. Network
Simulator tools were used to evaluate the performance of the system. |
Keywords: |
Base Station Positioning, clustering, energy efficiency, multiple base stations,
Wireless Sensor Network. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
CLASSIFICATION OF MEDICAL X-RAY IMAGES FOR AUTOMATED ANNOTATION |
Author: |
SUMATHI GANESAN, T. S. SUBASHINI |
Abstract: |
Of late, the amount of digital X-ray images that are produced in hospitals is
increasing rapidly. Efficient storing, processing and classifying X-ray images
have thus become an important research topic. Due to the increase in medical
digital images, there is a rising need of managing this data properly and
accessing them accurately. To overcome the difficulties of manual
classification, the automated method is preferable and hence proposed in this
work, wherein an effort has been made to automatically classify X-rays at the
macro level (coarse level) using SVM classifier with six classes of X-ray images
being taken, viz., chest, foot, spine, neck, head, and palm. Each class consists
of 30 images collected from IRMA database. Initially, pre-processing is
performed by using the M3 filter and its region-of-interest is found by applying
connected component labeling (CCL) and both the shape and texture features were
extracted. The fusion of shape and texture features gave a better performance of
96.56%. |
Keywords: |
Medical X-ray image classification, Gray level Co-occurrence matrix, Principle
Component Analysis, Discrete Cosine Transformation, Zernike moments and Support
Vector Machine. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT AND DISTRIBUTED CLUSTERING SCHEME WITH MOBILE SINK FOR HETEROGENEOUS
MULTI-LEVEL WIRELESS SENSOR NETWORKS |
Author: |
ALAMI CHAIBRASSOU, AHMED MOUHSEN, ISMAIL LAGRAT |
Abstract: |
Wireless sensor nodes are typically powered by non-rechargeable batteries and
deployed in an area of interest to supervise or monitor various phenomena
(temperature, pressure, humidity...). So, constrained energy is the most
important feature of wireless sensor networks (WSNs). In WSNs, saving energy and
extending network lifetime are great challenges. Clustering is a key technique
used to optimize energy consumption in WSNs. However, sensor networks with fixed
sink node or Base Station (BS) often suffer from a hot spots problem since nodes
near to sink have more traffic burden to forward during a multi-hop transmission
process. The use of mobile sinks has been shown to be an effective technique to
enhance network performance features such as latency, energy efficiency, network
lifetime, etc.
In this paper an Efficient and Distributed Clustering Scheme with Mobile Sink
(EDCSMS) for Heterogeneous Multi-level Wireless Sensor Networks is proposed. In
EDCSMS, the cluster-heads (CHs) are elected by a probability based on the ratio
between residual energy of each node and the average energy of the network, the
BS moves towards each CH by a distance proportional to the weight of its
probability. Furthermore, normal nodes select the optimal cluster-head based on
the cost function.
Finally, Simulation using MATLAB software shows that our proposed protocol
achieves longer lifetime, stability period and more effective messages to BS
than LEACH, DEEC, EDCS in multi-level heterogeneous environments. |
Keywords: |
Wireless Sensor Networks, BS Movement, Cost Function, Lifetime, Multi-Level
Heterogeneous Environments. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
GROUPING BASED SCHEDULING WITH RESOURCE FAILURE HANDLING IN COMPUTATIONAL GRID |
Author: |
P. LATCHOUMY, P. SHEIK ABDUL KHADER |
Abstract: |
Grid computing provides a virtual framework that integrates resources and
services distributed across multiple controlled domains. Grouping based job
scheduling is an important issue in grid computing in aspects of minimizing the
processing time and maximizing the resource utilization. In particular, reliable
scheduling is very important for efficient job execution. In general the failure
of resources affects job execution during runtime fatally due to dynamic nature
of grid environment. Our proposed system, grouping based scheduling with
resource failure handling handles the resource failure before and after
allocating the grouped fine-grained jobs with the suitable resources in
computational grid. In this system, the reliability of sites is monitored and
the historical data is used for predicting resource failures. This information
is taken into account when jobs groups are created and dispatched to resources.
Hence, it minimizes the probability of job failure during execution. And our
scheduler also can recover the failed job group by an appropriate recovery
method with last checkpoint using reduced check pointing time strategy within
the specified deadline. Due to resource failure, even high processing power
resource may not be completed the job successfully and hence it increases the
number of rescheduling and minimizes the resource utilization. Our proposed
failure handling method is to provide reliable job execution with minimum
processing time and maximum resource utilization. Through simulation we have
evaluated the performance of the system. In this method, job grouping based
scheduling with resource failure handling algorithm is developed for the grid
environment to provide guaranteed service to the grid user within the specified
deadline. |
Keywords: |
Capability Value (RCV), Resource Failure Prediction, Group
Performance Time (GPT), Group Checkpointing Time (GCPT), Resource Utilization. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
ANALYSIS AND SIMULATION OF CASCADED FIVE AND SEVEN LEVEL INVERTER FED INDUCTION
MOTOR |
Author: |
MANOJ KUMAR.N , KALIAPPAN.E , CHELLAMUTHU.C |
Abstract: |
This paper presents the performance analysis of cascaded multilevel inverter fed
induction motor drive. It deals with the study and analysis of five-level and
seven-level inverters for three phase induction motor drive. Both five-level and
seven-levels are realized by cascading the two H-bridge inverters. To minimize
the harmonic distortion in the output waveform without decreasing the inverter
power output a sinusoidal modulation technique is employed. A model for
multilevel inverter fed induction motor is developed and simulated using PSIM
package under steady state and transient condition to prove their merits. |
Keywords: |
Cascaded H-Bridge Multilevel Inverter, Total Harmonic Distortion (THD) And
Induction Motor. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
HIGH SPEED VLSI ARCHITECTURE FOR NON SEPARABLE BLOCK BASED LIFTING WAVELET
TRANSFORM |
Author: |
USHA BHANU.N , Dr.A.CHILAMBUCHELVAN |
Abstract: |
The inherent advantage of the in-place computation of the lifting based DWT over
the conventional convolution method makes it suitable for efficient hardware
implementation with lower computational complexity. The proposed paper uses Non
Separable block based method to derive the VLSI architecture for the two
dimensional DWT. In separable lifting DWT, the desired filter coefficients at
each level are dependent on previous output level and this introduces delay or
latency in DWT decomposition. The proposed Non–separable architecture contains
floating point multipliers and adders based on IEEE 754 single precision format.
It requires six lifting steps for the implementation of 9/7 lossy lifting DWT
and the latency is reduced when compared to separable DWT. It is suitable for
handling a parallel block of 4×4 input image coefficients at each level, for
achieving higher speed and dynamic accuracy. The architecture is coded in
Hardware Description Language and implemented in Altera Cyclone II FPGA. The
critical path delay for the proposed Non Separable architecture is 3.189 ns,
with a speed of 313.58 MHz. The total thermal power dissipation of the
architecture is 128.59 mW, suitable for low power embedded multimedia
applications. |
Keywords: |
Block Based Scanning, Floating Point Arithmetic, FPGA Implementation, Lifting
DWT, Non Separable And Separable DWT. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
LOCATION VERIFICATION TECHNIQUE FOR SECURE GEOGRAPHICAL ROUTING IN VANET |
Author: |
A.PUNITHA, J. MARTIN LEO MANICKAM |
Abstract: |
The geographical path routing has more benefits in Vehicular Adhoc Network
(VANET). However, the lack of location verification scheme results in cruel
security attacks. In this paper, location verification technique for secure
geographical routing in VANET that encodes the geographical locations of nodes
using geographic hashes is proposed. Data packets are transmitted securely over
the communication channel through private and public keys of a node. The next
hop is carefully chosen by geographic routing. This technique uses two step
location verification schemes. First, when data is transmitted from the source
to its next hop, the packet is verified through reliability checks. Then,
validation of its location is done by distance bounding scheme.The proposed
solution effectively secures the geographical routing with valuable location
verification schemes. By simulation, we show that the proposed technique defends
various attacks by reducing the packet drop and increasing the packet delivery
ratio. |
Keywords: |
Location Verification, Geographical Routing, VANET, Security |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT ROUTING IN MOBILE AD HOC NETWORK USING COOPERATIVE
COMMUNICATION |
Author: |
FEMILA.L, DR.V.VIJAYARANGAN |
Abstract: |
Cooperative communication (CC) is a competent method to acknowledge the quality
of service (QoS) communication in mobile ad hoc networks (MANETs). In MANETs,
mobile nodes are generally power-driven by batteries with limited energy
supplies therefore, these networks are commonly known as power constrained.
Topology control is to resolve the transmission power nodes so as to increase
network connectivity and increase the energy efficiency. To this end, this paper
utilizes the CC to link disconnected networks in order to reduce transmission
power of nodes with increases network connectivity. In this paper, we propose
the energy efficient routing for MANET, which exploits cooperative communication
with topology control. Our approach works on physical layer with cooperative
communication and proposes two routing algorithms: 1) Non Cooperative Routing
scheme (NCR) and 2) Cooperative Routing (CR) scheme. In simulation results, the
proposed algorithms are compared with existing methods to prove the efficiency
of our proposed method. |
Keywords: |
Mobile ad hoc network, Cooperative Communication, Energy efficient, Topology
control, Routing, Transmission power. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN ENERGY EFFICIENT LINEAR CHAIN-BASED CLUSTERING ROUTING PROTOCOL FOR WIRELESS
SENSOR NETWORKS |
Author: |
SUMITHRA S , ARULDOSS ALBERT VICTOIRE T |
Abstract: |
A highly distributed network with number of nodes deployed in a wide area for
the accumulation and transmission of information perceived by monitoring the
environment to the remote base station and facilitation analysis is the Wireless
Sensor Network. Sensor nodes are highly power limited leading to depletion in a
short span of time. The main challenge defamation is in designing a routing
mechanism with efficient energy utilization, minimal delay and the network life
time is high. In this paper we propose a routing protocol and data gathering
using linear chain and binary combining schemes where the sensor nodes configure
the cluster. The linear chaining is the communication and data gathering,
aggregation is happening only through the Cluster Head. We develop an
energy-efficient chaining algorithm which uses a sequence of insertions to add
the least amount of energy consumption to the whole chain. It consumes less
power compared to the closest neighbor node. |
Keywords: |
Linear chain, Binary combining, Cluster, Wireless Sensor Networks |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN AND IMPLEMENTATION OF LOW COST SEPIC PHOTOVOLTAIC SYSTEM FOR CONSTANT
VOLTAGE |
Author: |
S.VENKATANARAYANAN, M.SARAVANAN |
Abstract: |
The photovoltaic (PV) system gives variable output voltage due to temperature
and insolation variation with respect to time. This paper presents the design of
a SEPIC converter for getting constant output voltage from PV system using a
simple control circuit. The SEPIC is designed to make the power flow from PV
module to load effectively and maintaining constant output voltage. This paper
gives the detailed design and implementation of a 20W prototype SEPIC integrated
PV power supply with soft start feature. The efficiency of the proposed method
is proved with simulation results and prototype experimental results. |
Keywords: |
Boost, Control, Converters, Charging, Prototype , SEPIC |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NEW IMAGE RECONSTRUCTION TECHNIQUE WITH AID OF IPSO (IMPROVED PARTICLE SWARM
OPTIMIZATION) AND DWT (DISCRETE WAVELET TRANSFORM) |
Author: |
B.DEEVENA RAJU, Dr.P.PANDARINATH, Dr.G.S.PRASAD |
Abstract: |
The term ‘Image Reconstruction’ refers to the retrieval of the original image
(or a general signal) from its given awful version, such as an image that is
corrupted by noise, blurred by atmospheric turbulence (as in certain astronomic
observations), or that has certain scratched regions. The previous image
reconstruction technique reconstructs the cracked images by exploiting the DWT
and PSO methods. This image reconstruction technique based on PSO-DWT
reconstructs the images with good quality, but the PSNR value of the
reconstructed images and the threshold selection by PSO degrade the PSO-DWT
technique performance. So, to avoid these drawbacks, a new Improved Particle
Swarm Optimization (IPSO) technique is proposed in this paper. Here, a new image
reconstruction technique is developed with DWT and IPSO techniques. In this
proposed technique, the given images are reconstructed by the DWT and the
optimal thresholds values are selected by the Improved Particle Swarm
Optimization (IPSO) method. Our proposed IPSO technique solves the PSO technique
drawback by considering the bad components in the velocity computation process.
The proposed technique is implemented and the results are analyzed in terms of
their PSNR values. The results show the effectiveness of proposed image
reconstruction technique in reconstructing the images and achieving improvement
in PSNR ratio. Furthermore, the performance of the proposed IPSO-DWT technique
is evaluated by comparing with existing image reconstruction PSO-DWT technique. |
Keywords: |
Image Reconstruction, Discrete wavelet Transform (DWT), Particle Swarm
optimization (PSO), Improved Particle Swarm optimization (IPSO), PSNR |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE ROLE OF ICT ON QUALITY OF LIFE (STUDY ON INDONESIAN DOMESTIC WORKERS IN
SINGAPORE) |
Author: |
ALILA PRAMIYANTI, HEPPY MILLANYANI |
Abstract: |
Singapore was the fifth country with the most problematic number of Indonesian
domestic workers (TKI). Communication problems are the most common problems
faced by them. This occurs because the gap in accessing, processing, and using
information. Whereas communication skills is paramount and became important to
adapt and understand the cultural differences. In the era of Information and
Communication Technology (ICT), a variety of technologies can be used as a tool
of communication that could reduce their problem, for instance by using mobile
phones and the internet. This study aims to determine the role of ICT,
especially mobile phones and the Internet and its influence on quality of life
of TKI in Singapore. This research is causality type which use multiple
regression as data analysis technique. Data collection conducted through
questionnaire distributed to 400 respondents that selected using accidental
sampling approach. The results of this study indicated that simultaneously, the
use of ICT intensity significantly affected the Quality of Life TKI in Singapore
amounted to 36.2%. The remaining 63.8% was influenced by other variables that
were not examined in this study. |
Keywords: |
Communication, Domestic workers, ICT, Quality of Life, Indonesia |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMPORTANT FEATURES IN TEXT PRESENTATION FOR CHILDREN WITH DYSLEXIA |
Author: |
ROZITA ISMAIL, AZIZAH JAAFAR |
Abstract: |
Information and communication technology (ICT) plays an important role in
providing solutions, support and hope for children with dyslexia. Teachers and
parents acknowledge the capability of ICT to assist children in acquiring the
lessons taught using educational courseware. Teaching dyslexic students requires
more than just basic multimedia applications. Customized applications with an
emphasis on special techniques are important to engage students with normal
educational subjects. Research and studies in this area actively utilize the
human-computer interaction (HCI) to increase the usability and success rate when
developing a dyslexic’s educational courseware. We conducted a few experiments
to investigate the usage of text as one of a number of interesting features by
which to increase usability. The interaction behaviors of children with dyslexia
in the focus groups were then observed and analyzed. This paper reports the
research findings that elaborate on how different formats of text can influence
successful interaction in designing educational courseware for children with
dyslexia. |
Keywords: |
Dyslexia, Usability, Interaction Design, Education For Children |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
IMPROVING THE PROTECTION OF FPGA BASED SEQUENTIAL IP CORE DESIGNS USING
HIERARCHICAL WATERMARKING TECHNIQUE |
Author: |
M.MEENAKUMARI, G.ATHISHA |
Abstract: |
In recent years, Intellectual Property (IP) cores in Very Large Scale
Integration (VLSI) have become an active research area as it provides a
new-fangled revolution in the Electronic Design Automation industry. An IP core
is a previously designed and demonstrated component that can be integrated into
design. Owing to the development of IP cores, time consumption becomes less and
the product can be arrived in specified time. Designer of VLSI IP cores needs
assurance that the design will not be illegally redistributed by consumers. IP
core vendors are facing a major challenge to avoid revenue loss due to IP
piracy. Watermarking is a well-known technique to protect an unauthorized use of
IP core. Finite State Machine (FSM) is one of the representations of sequential
digital designs. In this paper, a new dynamic hierarchical watermarking scheme
is proposed. The watermark is embedded in the state transitions of FSM at the
behavioural level. A watermark is embedded into FSM by hierarchically splitting
original FSM into smaller FSMs. Experimental results on benchmark circuits shows
that this hierarchical watermarking approach is an efficient method for
protecting sequential IP cores. |
Keywords: |
Reuse, Intellectual Property, IP Core, FSM, Hierarchical Watermarking |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
A NOVEL METHOD FOR FRACTAL IMAGE COMPRESSION USING POLYNOMIAL HYBRID WAVELET AND
PARTICLE SWARM OPTIMIZATION |
Author: |
D.VENKATASEKHAR, P.ARUNA, V.DHIVYA |
Abstract: |
Fractal compression is a lossy compression method for digital images, based on
fractals. The method is best suited for textures and natural images, relying on
the fact that parts of an image often resemble other parts of the same image.
Fractal Image Compression (FIC) techniques take more time to perform processes
are encoding and global search. Particle Swam Optimization (PSO) and Wavelet
transformation methods are used to reduce the encoding time. Both of the
techniques and their performance are analyzed in terms of their compression
ratio, encoding time, Mean Square Error (MSR) and PSNR (Peak Signal-to Noise
Ratio) value. Based on these parameters the performances of the techniques are
studied and a comparative analysis of these techniques is provided. |
Keywords: |
Compression Ratio; Discrete Cosine Transform; Discrete Wavelet Transform;
Encoding Time; Fractal Image Compression; Particle Swarm Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
ROBUST BOUNDED CONTROL FOR UNCERTAIN NONLINEAR SYSTEMS: APPLICATION TO A
NONLINEAR STRICT FEEDBACK WIND TURBINE MODEL WITH EXPLICIT WIND SPEED DYNAMICS |
Author: |
MUHAMMAD NIZAM KAMARUDIN, ABDUL RASHID HUSAIN, MOHAMAD NOH AHMAD |
Abstract: |
In this paper, a robust bounded control law for a class of uncertain nonlinear
systems is proposed. The proposed bounded controller guarantees asymptotic
stability, asymptotic tracking and asymptotic disturbance rejection of systems
in strict feedback form with the sum of unmatched uncertainties and the
unbounded exogenous disturbance. A feedback law emerged from Artstein's Theorem
and Sontag's universal formulas are known to be useful to limit the control
signal. However, the formulas are not robust as in many cases, being applied to
the systems without uncertainties and disturbances. The controller proposed in
this paper takes advantages of a mixed backstepping and Lyapunov redesign, which
employed to enrich the Sontag's universal formulas. Therefore, the appealing
feature of the proposed controller is that it satisfies small control property
in order to preserve performance robustness and stability robustness with less
control effort. Another advantage of the proposed controller is the formulas
become applicable to higher order systems (i.e. order > 0). This paper also
discusses fuzzy logic tuning approach for the controller parameters such that
the closed loop system matrix remain Hurtwitz. For practicality, the proposed
technique is applied to a variable speed control of a new strict feedback wind
turbine system with wind dynamics appeared explicitly in the system model. The
proposed controller guarantees the asymptotic tracking of the turbine rotor
speed; maintains the optimal tip speed ratio and produces maximum power
coefficient. This yields maximum power output from the turbine. |
Keywords: |
Robust bounded control, wind turbine, asymptotic tracking, Backstepping,
Lyapunov function |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
THE ACCEPTANCE OF USING M-GOVERNMENT SERVICES IN JORDAN |
Author: |
AHMAD ALTHUNIBAT, THAMER A. ALRAWASHDEH, MOHAMMAD MUHAIRAT |
Abstract: |
Mobile services have enormous potential to be one of the government’s most
effective tools, to govern, control, and administer community requirements and
justice. In order for the governments to offer acceptable and attainable mobile
services, these services have to be used by citizens. The preliminary question
that lead to this study was: What are the factors that affect user acceptance of
m-Government services in Jordan?, or how can we motivate the citizens to utilize
services? As m-Government services are a new field, there is a minimal amount of
research and literature that could assist in discerning the factors that affect
acceptance of such services. This study applies the Technology Acceptance Model
(TAM) to examine the user acceptance of using m-Government services. The results
show that Perceived usefulness (PU) and Perceived ease of use (PEOU) affect
citizen’s acceptance of m-Government services. Failures to demonstrate the
advantages of m-Government services to potential citizens will likely result in
a low rate of acceptance. |
Keywords: |
Acceptance, E-Government, M-Government .TAM model. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
SCENE CLASSIFICATION USING SUPPORT VECTOR MACHINES WITH LDA |
Author: |
N. VEERANJANEYULU, AKKINENI RAGHUNATH , B. JYOSTNA DEVI, VENKATA NARESH MANDHALA |
Abstract: |
Scene classification, the classification of images into semantic categories is a
challenging and important problem nowadays. We present a procedure to classify
real world scenes in eight semantic groups of coast, forest, mountain, open
country, street, tall building, highway and inside city using support vector
machines. Traditional classification approaches generalize poorly on image
classification tasks, when the classes are non-separable. In this paper we used
Support Vector Machine (SVM) for scene classification. SVM is a supervised
classification technique, has its roots in Statistical Learning Theory and have
gained prominence because they are robust, accurate and are effective even when
using a small training sample. By their nature SVMs are essentially binary
classifiers, however, they can be adapted to handle the multiple classification
tasks common in scene classification. This paper shows that support vector
machines (SVM’s) can generalize well on difficult scene classification problems.
SVMs can efficiently perform a non-linear classification using kernel trick,
implicitly mapping their inputs into high-dimensional feature spaces. In this
paper 4 types of kernels (linear, polynomial, gaussian and sigmoidal kernels)
are used with support vector machines. It is observed that Gaussian kernel
outperform other types of kernels. Moreover, we observed that a simple remapping
of the input x to x' improves the performance of linear SVM’s to such an extent
that it makes them, for this problem, a valid alternative to RBF kernels. |
Keywords: |
Support vector machine, Kernel, cross validation, dimensionality reduction,
linear kernel, polynomial kernel, gaussian kernel and sigmoidal kernel |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
DESIGN, ANALYSIS AND OPTIMIZATION OF A NEW STRUCTURE OF MICROSTRIP PATCH ANTENNA
FOR RFID APPLICATIONS |
Author: |
ALI EL ALAMI , SAAD DOSSE BENNANI , MOULHIME EL BEKKALI , ALI BENBASSOU |
Abstract: |
In this paper, we propose a new structure patch antenna excited by two identical
microstrip lines having a common feeding adapted to 50 ohm and intended to
applications of Radio Frequency Identification (RFID). The slots inserted at the
patch antenna have a direct impact on improving the radiation characteristics in
terms of reflection coefficient, voltage standing wave ratio, input impedance
and directivity over a range of frequencies ranging from 2 GHz up to 2.9 GHz.
The analysis and optimization have been performed using the simulator HFSS (High
Frequency Structure Simulator) based on the finite element method. Next, in
order to validate our simulation, we use another electromagnetic simulator CST
MWS (Computer Simulation Technology- MicroWaves Studio) which is based on the
finite integration method. The simulation results of the two simulators agree
well practically. |
Keywords: |
Patch Antenna, Microstrip Line, RFID Application, Reflection Coefficient, VSWR,
Input Impedance, Directivity, Simulators HFSS And CST. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
AN EFFICIENT APPROACH TO DEVELOP SOFTWARE COST ESTIMATION MODEL USING CASE-BASED
REASONING AND AGENT TECHNOLOGY |
Author: |
HASAN AL-SAKRAN, HASSAN Y. A. ABU TAIR |
Abstract: |
One of the most important tasks for IT professionals is software development
cost estimation. This critical task affects the firm's software investment
decisions before bidding for a contract or committing required resources to that
project. Under-estimation may lead to unexpected increase in budget, delay of
project completion or its low quality, while over-estimation may lead to losing
business opportunities. In this work authors investigate possibility of building
a software cost estimation model by using multi-agent system to collect software
cost data from distributed predefined project cost databases. The developed
model implements Case-Based Reasoning (CBR) to find similar projects in
historical data retrieved from measured software projects developed by different
organizations, which will assist the project managers to perform an appropriate
cost estimation of a software project. |
Keywords: |
Analogy, Case-Based Reasoning, Agent Technology, Magnitude of Relative Error. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFICIENT CROSS-LAYER DESIGN ARCHITECTURE FOR ROUTING AND CHANNEL SELECTION IN
MULTI-RADIO MULTI-CHANNEL WIRELESS MESH NETWORKS |
Author: |
C.ANBU ANANTH, K.SELVAKUMAR |
Abstract: |
In wireless mesh network, there is a need of efficient Cross-Layer Design
Architecture for Routing and Channel Selection in Multi-Radio Multi-Channel
Wireless Mesh Networks. For this we propose interference and congestion aware
cross-layer architecture for wireless mesh networks. The proposed technique
first we apply Cross-Layer QoS-Aware Routing Protocol, in which we use bandwidth
estimation for physical routing and ICA metric for logical routing. We select
the channel by using Channel Quality Variables at last we Optimize and adjust
the cross-layer metrics using delay dissatisfaction ratio, Throughput
dissatisfaction ratio and PER dissatisfaction ratio. Our proposed technique
selects high quality paths and interference free channels also makes effective
utilization of the available interfaces and prioritizes the packets in the event
of congestion. |
Keywords: |
Architecture, Routing, Channel Selection, Mesh Networks, QoS |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
HYBRID OPTIMIZATION FOR CLASSIFICATION OF THE WOOD KNOTS |
Author: |
S. MOHAN , K. VENKATACHALAPATHY , P. SUDHAKAR |
Abstract: |
Knots are common wood defects. A knot is a specific imperfection in timber,
reducing its strength which can be exploited for artistic effect, resulting in
knot selection being an important matter in the wood industry. The value of wood
is related to its quality, and this in turn is determined by defect numbers and
distribution. This is challenging as in some instances, selection/classification
is manual. In this paper, it is proposed to detect and classify the knots in
timber boards. Hilbert transforms and Gabor filters are used for pre-processing
the image of knots. The features obtained from preprocessing were classified
using Multi Layer Perceptron (MLP) and Neural Network (NN) with Particle Swarm
Optimization (PSO) and Invasive Weed Optimization (IWO) for momentum and
learning rate. |
Keywords: |
Wood Knots, Hilbert Transforms, Gabor Filter, Multilayer Perceptron, Neural
Network, Particle Swarm Optimization, Invasive Weed Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
A COMBINATORIAL TREE BASED FREQUENT PATTERN MINING |
Author: |
YAMUNA DEVI. N, DEVI SHREE J |
Abstract: |
Frequent pattern mining is a process of extracting frequently occurring itemset
patterns from very large data storages. These frequent patterns are used to
generate Association Rules. Association rules define the relationship among
items. The strength of the relationship can be measured using two different
units namely support value and confidence level. Any relationship that satisfies
minimum threshold of support value is known as frequent pattern. There are
several methods and algorithms suggested to mine frequent patterns from large
databases. Most of the methods can be assessed for its complexity based on the
number of processing levels and number of candidate sets with subsets that are
generated in each level. In this paper, the combinatorial approach which
automatically filters infrequent itemsets and mine only frequent patterns is
suggested. The complexity is based on the number of transactions and the maximum
length of transactions. The new approach purely depends on the size of input
transaction database. The combinatorial approach does not depend on the unknown
number of processing levels and does not generate unnecessary candidate sets and
subsets. The method is compared with number of existing legendary methods for
its performance. |
Keywords: |
Association Rule Mining, Frequent Item Set Mining, Combinatorial Approach, Tree
Structure Based Combinations. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
TROPOS BASED ADAPTATION FRAMEWORK FOR SELF ADAPTIVE SYSTEM |
Author: |
GOWRI. R, KANMANI.S, PUNITHA. D |
Abstract: |
Today’s software complexity is increasing which in turn increase the need for
software to work autonomously with least human intervention. Self-adaptive
software work autonomously in unpredictable environment overcoming the failures
and increasing the performance. Engineering self- adaptive software is very
complex. In this paper generic adaptation framework using AOSE methodologyTropos
has been proposed to develop Self-Adaptive System. In this Framework adaptation
process is fully automated by making feedback loop as first class citizen. Two
classes of requirements namely adaptive requirements to be monitored and
evolution requirements to make changes on target system as a result of
reconfiguration is used. Proposed framework is illustrated with case study Smart
Travel Recommender System as it involves dynamic changes and is evaluated using
existing system CARE framework and Tropos4As framework. |
Keywords: |
Tropos, Feedback loop, Adaptive requirements, evolution requirements,
Reconfiguration |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
TRACKING OBJECT USING EXPONENTIAL FORGETTING FACTOR IN THE LBP CODE |
Author: |
HANANE. RAMI, MOHAMMED. HAMRI, LHOUSSINE. MASMOUDI |
Abstract: |
In this paper we present a method for objects tracking in images sequence. This
approach is achieved into two main steps. In the first one, we use the
Exponential Forgetting Factor in the calculation of Local Binary Pattern to
tracking the motif in a sequence of images. In the second one, we perform the
algorithm by the pattern selected based on a distance measure to find similarity
between two histograms, for this goal we work with The Chi-Square distance. For
evaluation the algorithm tracking results we use the cumulative Euclidean
distance from the pixel position for each images. The proposed approach has been
tested on synthetic and real sequence images and the results are satisfactory. |
Keywords: |
Computer vision, Sequence image, Tracking, LBP, Exponential Forgetting Factor
(EFF), Chi-Square distance. |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
EFFECTS OF MULTIPLE COMBINATION WEIGHTAGE USING MOPSO FOR MOTION CONTROL GANTRY
CRANE SYSTEM |
Author: |
H.I. JAAFAR, Z. MOHAMED, J.J. JAMIAN, M.S.M. ARAS, A.M. KASSIM, M.F. SULAIMA |
Abstract: |
This paper presents the implementation of Multi Objective Particle Swarm
Optimization in controlling motion control of Gantry Crane System. Three
objective functions are considered to be optimized, named (i) steady state
error, (ii) overshoot, and (iii) settling time. Six cases with different setting
of weight summation are analyzed in order to obtain five parameters (PID and PD)
controller. A combination of PID and PD controller is observed and utilized for
controlling trolley movement to desired position and reduced the payload
oscillation concurrently. Various cases of weight summation values will affect
to the controller parameters and system responses. The performances of the
system is conducted and presented within Matlab environment. |
Keywords: |
Computational Intelligence, Gantry Crane System, Motion
Control, PID Controller, Multi Objective Particle Swarm Optimization (MOPSO) |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
A FRAMEWORK FOR DIRECT AND SEMANTICS BASED TRANSFORMATION FROM RELATIONAL
DATABASE TO ONTOLOGY |
Author: |
C.RAMATHILAGAM, Dr.M.L.VALARMATHI |
Abstract: |
The Conventional Web matches the search index given by the user in the available
document repository and retrieves those documents for information retrieval. The
Semantic Web, the extension of conventional web retrieves not the documents by
the mentioned method, instead finds the semantics of the given search index and
retrieves the information from the knowledge repository. One such knowledge
representation format is Ontology. Ontology is generated in two ways. One is
through manual creation by Ontology language developers with the help of domain
experts. The problem in this method is either the domain experts need to be
familiar with the Ontology development language or the developers of Ontology
should have domain expertise. The other method is converting the available
structured data into Ontology. Since more than 70% of the Web retrieval is from
Relational Data Base contents, conversion of Relational Data Base contents into
Ontology documents is in need. This conversion is required for two reasons. One
is to give solution to the first approach and the other is, Relational Data Base
content is rich in data but the retrieval is not rich in semantics. Since the
Ontology lacks rich data, the conversion from available data collection to a
semantic data format needs focus. This paper proposes a framework for converting
Relational Data Base contents into Ontology contents by following certain
mapping rules. These rules give the direct or simple transformation from
Relational Data Base components and data into the corresponding Ontology
components. This paper also proposes the semantics based conversion rules which
gives more reasoning support to the Ontology document to provide efficient
information retrieval. |
Keywords: |
Semantic web, Schema, Mapping, Ontology, Resource Description Framework (RDF),
RDF Schema (RDFS), Web Ontology Language (OWL), Description Language (DL), First
Order Logic (FOL) |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
Title: |
CLUSTERING WIRELESS NODES BASED ON ADAPTIVE MODULATION WITH CUSTOMIZED KERNEL |
Author: |
NAVANEETHAN.C, HELEN PRABHA.K |
Abstract: |
In wireless network system, diversity techniques have been accepted as effective
modes to conflict multipath fading due to delay or bandwidth constraints and
explore the use of multiple transmit or receive antennas at the same terminal
(spatial diversity). A cooperative diversity scheme avoids the size limitation
by allowing the terminals to rely in parallel. In this work, we focus on
wireless communication among nodes grouping them as different clusters so as to
form a virtual logic channel for each cluster, implemented using kernel
customized, low power consuming hardware modules. The proposed work enables a
large number of simple low-power nodes to be distributed in a field and transmit
data in a secured manner. |
Keywords: |
WSN, Modulation/Demodulation, node/network security, GNU, FL2440 |
Source: |
Journal of Theoretical and Applied Information Technology
31 May 2014 -- Vol. 63. No. 3 -- 2014 |
Full
Text |
|
|
|