|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2011 | Vol. 30 No.1 |
Paper ID: |
14222
-JATIT |
Title: |
GA
SPEED AND DQ CURRNETS CONTROL OF PMSM WITH VECTOR CONTROL BASED SPACE VECTOR
MODULATION USING MATLAB/SIMULINK |
Author: |
A. El Janati El Idrissi, N. Zahid |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 01-09 Vol 30. No. 1 -- 2011 |
Abstract |
In recent years, permanent magnet
synchronous motors (PMSM) have gained variety industrial applications, because
of simple structures, high efficiency and ease of maintenance. But these motors
have a nonlinear mathematical model. To resolve this problem several studies
have suggested the application of soft-computing technique. This paper presents
vector control of PMSM fed by space vector modulation inverter using genetic
algorithm (GA) controllers to improve speed, currents and the electric torque by
significantly reducing their ripples, which offer an extra advantage of this
study. The proposed method effectiveness has been verified by computer
simulations using Matlab/Simulink®. These results are compared with the ones
obtained with a vector control using PI controllers for speed and current [1]
and the second obtained with adaptive controller based speed estimation
technique [2]. |
Keywords |
Permanent Magnet Synchronous Motor (PMSM),
Vector Control, Space Vector Modulation (SVM), Genetic Algorithm (GA) |
Full
Text |
|
Paper ID: |
14176
-JATIT |
Title: |
COMPARISON
PERFORMANCE OF INDUCTION MOTOR USING SVPWM AND HYSTERESIS CURRENT CONTROLLER |
Author: |
FIZATUL AINI PATAKOR, MARIZAN SULAIMAN,
ZULKIFILIE IBRAHIM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 10-17 Vol 30. No. 1 -- 2011 |
Abstract |
This paper presents the comparative
performances of three phase induction motors using space vector pulse width
modulation (SVPWM) and hysteresis current controller. An indirect field
orientation is applied to ensure decoupling control between torque and flux of
the induction motor. The hysteresis current controller is built in with PI speed
controller and three hysteresis current bands while the SVPWM system is embedded
with the two control loops, the inner current control loop and the outer speed
control loop using PI controller. Both systems were run and tested using MATLAB/SIMULINK
software. The simulation results demonstrate that the SVPWM can improve the
quality of the stator current and reduce the torque ripple while maintaining the
other performance characteristics of the system. |
Keywords |
Indirect Field Oriented, Space Vector Pulse
Width Modulation (SVPWM), Hysteresis Current Controller |
Full
Text |
|
Paper ID: |
14326
-JATIT |
Title: |
A
METHOD FOR QUALITY POWER PROVIDER TO OPERATE IN DISTORTED SUPPLY CONDITION |
Author: |
K.CHANDRASEKARAN, K.S.RAMA RAO |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 18-27 Vol 30. No. 1 -- 2011 |
Abstract |
Power Quality is a major concern within power
industry and consumers. Poor quality of supply will affect the performance of
customer equipment such as computers, microprocessors, adjustable speed drives,
power electronic controllers, life saving equipment in hospitals, etc. and
result in heavy financial losses to customers due to loss of production or
breakdown in industries or loss of life in a hospital. The two major power
quality disturbances are voltage sag and harmonic distortion. In this paper, a
Quality Power Provider (QPP) based on voltage source inverter is modeled by
simulation to compensate the power quality disturbances such as voltage sag and
voltage harmonics in the distorted supply condition. The phase locked loop (PLL)
is an important control unit of the QPP control scheme. To obtain accurate phase
information and frequency of the input supply, the dqPLL method has been
proposed. Simulation results based on MATLAB and PSCAD software are presented to
verify the performance of the proposed QPP. QPP has improved the quality of
power supply at the sensitive load end. |
Keywords |
Voltage Sag, Harmonics, PLL, Dqpll, Double
Frequency Component |
Full
Text |
|
Paper ID: |
14266
-JATIT |
Title: |
OPTIMAL
CAPACITORS PLACEMENT IN DISTRIBUTION NETWORKS USING GENETIC ALGORITHM: A
DIMENSION REDUCING APPROACH |
Author: |
S.NEELIMA, Dr. P.S.SUBRAMANYAM |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 28-34 Vol 30. No. 1 -- 2011 |
Abstract |
A distribution system is an interface between the
bulk power system and the consumers. Among these systems, radial distributions
system is popular because of low cost and simple design. In distribution
systems, the voltages at buses reduces when moved away from the substation, also
the losses are high. The reason for decrease in voltage and high losses is the
insufficient amount of reactive power, which can be provided by the shunt
capacitors. But the placement of the capacitor with appropriate size is always a
challenge. Thus the optimal capacitor placement problem is to determine the
location and size of capacitors to be placed in distribution networks in an
efficient way to reduce the power losses and improve the voltage profile of the
system. For this purpose, in this paper, two stage methodologies are used. In
first stage, the load flow of pre-compensated distribution system is carried out
using ‘dimension reducing distribution load flow algorithm (DRDLFA)’. On the
basis of this load flow the potential locations of compensation are computed. In
the second stage, Genetic Algorithm (GA) technique is used to determine the
optimal location and size of the capacitors such that the cost of the energy
loss and capacitor cost to be a minimum. The above method is tested on IEEE 69
bus system and compared with other methods in the literature. |
Keywords |
Dimension Reducing Distribution Load Flow
Algorithm (DRDLFA)’ Genetic Algorithm, Electrical Distribution Network, Optimal
Capacitors Placement. |
Full
Text |
|
Paper ID: |
14289
-JATIT |
Title: |
GENETIC ALGORITHM FOR DECODING LINEAR CODES OVER AWGN AND FADING CHANNELS |
Author: |
H. BERBIA, F. ELBOUANANI, R. ROMADI, H.
BENAZZA, M. BELKASMI |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 35-41 Vol 30. No. 1 -- 2011 |
Abstract |
This paper introduces a decoder for binary linear
codes based on Genetic Algorithm (GA) over the Gaussian and Rayleigh flat fading
channel. The performances and compututional complexity of our decoder applied to
BCH and convolutional codes are good compared to Chase-2 and Viterbi algorithm
respectively. It show that our algorithm is less complex for linear block codes
of large block length; furthermore it's performances can be improved by tuning
the decoder's parameters, in particular the number of individuals by population
and the number of generations |
Keywords |
Block Code, Decoding, Methaheuristic, Genetic
Algorithm, Neural Network |
Full
Text |
|
Paper ID: |
14304
-JATIT |
Title: |
RELIABILITY ANALYSIS OF RING, AGENT AND CLUSTER BASED DISTRIBUTED SYSTEMS |
Author: |
R.SEETHALAKSHMI, K.S.RAVICHANDRAN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 42-47 Vol 30. No. 1 -- 2011 |
Abstract |
The introduction of pervasive devices and
mobile devices has led to immense growth of real time distributed processing. In
such context reliability of the computing environment is very important.
Reliability is the probability that the devices, links, processes, programs and
files work efficiently for the specified period of time and in the specified
condition. Distributed systems are available as conventional ring networks,
clusters and agent based systems. Reliability of such systems is focused. These
networks are heterogeneous and scalable in nature. There are several factors,
which are to be considered for reliability estimation. These include the
application related factors like algorithms, data-set sizes, memory usage
pattern, input-output, communication patterns, task granularity and
load-balancing. It also includes the hardware related factors like processor
architecture, memory hierarchy, input-output configuration and network. The
software related factors concerning reliability are operating systems, compiler,
communication protocols, libraries and preprocessor performance. In estimating
the reliability of a system, the performance estimation is an important aspect.
Reliability analysis is approached using probability. |
Keywords |
Reliability, Distributed System, Clusters,
Agents, Ring Networks Cluster Information Gathering. |
Full
Text |
|
Paper ID: |
14367
-JATIT |
Title: |
SEARCHABLE SYMMETRIC ENCRYPTION: REVIEW AND EVALUATION |
Author: |
YAP JOE EARN, RAED ALSAQOUR, MAHA ABDELHAQ,
TARIQ ABDULLAH |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 48-54 Vol 30. No. 1 -- 2011 |
Abstract |
Searchable Symmetric Encryption (SSE) allows a user
to search over their encrypted data on a third party storage provider privately.
There are several existing SSE schemes have been proposed to achieve this goal.
This paper concerns with three currentSSE schemes, which are the Practical
Techniques for Searches in Encrypted Data (PTSED), the Secure Index(SI), and the
Fuzzy Keyword Search over Encrypted Data in the Cloud Computing (FKS-EDCC).The
objective of this paper is to introduce a review of the three schemes with a
discussion in the advantages and disadvantages of each.This paper also
implements aprototype over an SI-based secure file searching system using java
language. The performance of the system has been evaluated and discussed
according to the false-positive rate. |
Keywords |
Searchable Symmetric Encryption (SSE),
Practical Techniques for searches in encrypted Data (PTSED), Secure index (SI),
Fuzz Keyword Search over Encrypted Data in Cloud Computing (FKS-EDCC) |
Full
Text |
|
Paper ID: |
14316
-JATIT |
Title: |
SURVEY
ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK |
Author: |
FARAZ AHSAN, ALI ZAHIR, SAJJAD MOHSIN, KHALID
HUSSAIN |
Source: |
Journal of Theoretical and Applied
Information Technology
pp 55-65 Vol 30. No. 1 -- 2011 |
Abstract |
Wireless networks are more depicted to
intentional or unintentional threats than their wired based equivalent networks.
Major reason being the wireless medium which can be approached by others, who
can listen and interfere in an on-going valid communication. In the absence of a
collision detection mechanism and relying mainly on cooperation of each other
for packet routing, the standard defined for wireless network is unable to
identify any malicious activity, by default. Among attacks the ones which create
isolation of the nodes on the network are considered more severe. If they last
long enough, can result in denial-of-service and hence network collapses
completely. The simplest form of such attacks is jamming attack which can block
any current legitimate communication. It is easy to launch as no especial
hardware is required and the area in range for a particular time can be jammed
for any legal communication. Jamming is a specialized Denial of Service attack
in which purpose is not to overflow buffers, instead to choke the physical
communication channel, hence avoiding jammer is much harder than other forms of
denial of service attacks. Unlike other attacks, especially routing attacks, no
network parameter and topology etc need to be known in advance before launching
jamming attack. However, if the network parameters are known and the attack is
intelligently placed, a jammer can last longer resulting in more survival time
on the network and damage. This paper surveys on different types of jamming
attack and the mitigation techniques generally used. Besides this, we
investigate about the approaches proposed that are considered efficient to
survive in a jammed region, actively. Finally, we conclude by highlighting the
potential areas which can be targeted to optimize in minimizing the effects of a
jamming attack, as future directions. |
Keywords |
WLAN, Jamming Attack, Wireless Network,
Survival Approaches, DOS |
Full
Text |
|
|
|