|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines encompassing the most basic research to the most innovative technologies. Please submit your papers electronically to our submission system at http://jatit.org/submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal identifiable information in the manuscript before submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June
2011 | Vol. 28. No.2 |
Paper ID: |
14299 -JATIT |
Title: |
THE OPTIMAL DIRECT TORQUE CONTROL OF A
PMSM DRIVE: FPGA-BASED IMPLEMENTATION WITH MATLAB & SIMULINK SIMULATION. |
Author: |
BADRE BOSSOUFI, MOHAMMED KARIM,
SILVIU IONITA, AHMED LAGRIOUI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
In this paper, we present a new
contribution of FPGAs (Field-Programmable Gate Array) for control of electrical
machines. A detailed description of the structure of direct torque control for
PMSM drive, a bench test was realized by a prototyping platform, the
experimental results obtained show the effectiveness and the benefit of our
contribution and the different steps of implementation for the control FPGA |
Keywords |
FPGA, Direct Torque Control (DTC),
Permanent Magnet Synchronous Machine (PMSM), reusability, DSP, ADC |
Full Text |
|
Paper ID: |
14286 -JATIT |
Title: |
CRITICAL SUCCESS AND FAILURE FACTORS OF
ERP IMPLEMENTATIONS: TWO CASES FROM KINGDOM OF SAUDI ARABIA |
Author: |
AHAMD ALDAMMAS, ABDULLAH S. AL-MUDIMIGH |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
Every year, the number of
high-profile ERP (enterprise resource planning) project failures in the IT
industry are normalized, failures that burn through mountains of cash, bring
company operations to a standstill, generate bad publicity for vendors and toss
careers in the trash.
This paper is a comprehensive description of how critical success and failure
factors impact the implementation of two major ERP systems. In this paper we
have covered some ERP systems and its major components more over we have
addressed some critical success and failure factors in detail. Two case studies
have been presented and mapped these critical factors with successful results.
Finally we have presented a priority model to learn how these factors must be
taken before starting such ERP systems. |
Keywords |
ERP, Critical Success factor,
Critical Failure Factor, Integration, Organization. |
Full Text |
|
Paper ID: |
14216 -JATIT |
Title: |
AN INTEGRATED BLOCK AND STREAM CIPHER
APPROACH FOR KEY ENHANCEMENT |
Author: |
MANIKANDAN.G, MANIKANDAN.R,
RAJENDIRAN.P, KRISHNAN.G, SUNDARGANESH.G |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
In the world of digital data
transaction, in order to transact the data in a more secured manner the need for
a cryptographic algorithm cannot be compensated by others. There are huge
numbers of cryptographic algorithms which makes the system resistant from the
attacks of intruders and eavesdroppers.RivestCipher4 and Blow fish are the
cryptographic algorithms which are very well known for their performance,
simplicity, strong key generation. In this paper, we propose a method of
combining block and stream cipher for increasing the key strength so that it
will be very hard for the intruder to break the key and intruder will have no
idea about the key formation from the combination of block and stream cipher. So
it will lead to increased key complexity which obviously results the intruder
nothing else than confusion and frustration. |
Keywords |
Blowfish, Cryptography, Encryption,
Key strength, Key complexity, Rc4 algorithm |
Full Text |
|
Paper ID: |
14302 -JATIT |
Title: |
FPGA IMPLEMENTATION OF SCALABLE
BANDWIDTH SINGLE CARRIER FREQUENCY DOMAIN MULTIPLE ACCESS TRANSCEIVER FOR THE
FOURTH GENERATION WIRELESS COMMUNICATION |
Author: |
DHIRENDRA KUMAR TRIPATHI, S.
ARULMOZHI NANGAI, R. MUTHAIAH |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
In this paper, design and
implementation of 4G SC-FDMA transceiver on FPGA is done and explained. Long
Term Evolution (LTE) is next generation mobile communication standard from 3GPP,
it is based on OFDMA) in Downlink Transmission and SC-FDMA in uplink
Transmission. SC-FDMA is based on Frequency Division Multiple Access scheme.
When compared with other multiple access scheme, it deals with the multiple
users in a shared communication systems. SC-FDMA is also called as linearly
pre-coded OFDMA, in the sense it has the additional discrete time Fourier
transform (DFT) processing in SC-FDMA. The main advantage of SC-FDMA over OFDMA
is low Peak to average power ratio, so the power transmission is low when
compared. This work proposes a run time reconfiguration architecture for the SC-FDMA.
Where the bandwidth and sub carrier mapping schemes of SC-FDMA can be changed.
Real time FPGA implementation results are captured in the Chipscope Pro Embedded
Logic analyzer. |
Keywords |
Orthogonal Frequency Division
Multiple Access(OFDMA), Single Carrier-Frequency Division Multiple Access (SC-FDMA),
Long Term Evolution (LTE), Discrete time Fourier transform (DFT) |
Full Text |
|
Paper ID: |
14301 -JATIT |
Title: |
CONTENT BASED IMAGE RETRIEVAL USING LOCAL
DERIVATIVE PATTERNS |
Author: |
P.V. N. REDDY, K. SATYA PRASAD |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
A new image indexing and retrieval
algorithm known as local derivative pattern (LDP_16_2) is proposed in this work.
LDP_16_2 histograms are used as features of each image in the data base.
LDP_16_2 encodes the higher order derivative information which contains more
detailed discriminative features. This property made it a powerful tool for
feature extraction of images in the data base. Improved results in terms of
retrieval efficiency and computational complexity are observed over recent work
based on LBP_16_2 (Local Binary Patterns) features based CBIR system and LBP
correlogram features based CBIR system.. The distance measures viz. city block
distance, Euclidean distance, Canberra distance and d12 distance are used as
similarity measures in the proposed CBIR system. Superiority of d12 distance is
observed over other distances in terms of average retrieval rate. |
Keywords |
High Order Local Patterns, Texture, Local
Derivative Patterns (LDP_16_2), Local Binary Patterns (LBP_16_2), Image
Retrieval, Histogram. |
Full Text |
|
Paper ID: |
14290 -JATIT |
Title: |
CHARACTER IDENTIFICATION IN VIDEOS USING
IRIS RECOGNITION |
Author: |
RAMYA G , VIDHYALAKSHMI J ,
Dr.A..UMAMAKESWARI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
In Character based browsing which is
predominant in films, the identification of speaking faces plays a vital role.
After identifying the speaking face, clustering of those faces is a difficult
task. The difficulty is in extracting the exact speaking faces and clustering
them. In the existing techniques, lip movement of a character is taken as Region
Of Interest (ROI) for identifying the faces in the films. For clustering those
faces, the k-means clustering technique is used. By using the above technique,
retrieval of speaking faces cannot produce an accurate result. So, in this
paper, lip movement as ROI and IRIS recognition for clustering of speaking faces
are used. This paper proposes a mechanism to generate precise results by
comparing with the existing techniques. |
Keywords |
Speaking face identification, ROI,
lip alignment, IRIS, PCA |
Full Text |
|
Paper ID: |
14150 -JATIT |
Title: |
FUZZY OPTIMIZATION FOR SPEED CONTROLLER OF
AN INDIRECT VECTOR CONTROLLED INDUCTION MOTOR DRIVE USING MATLAB SIMULINK |
Author: |
ANGGUN ANUGRAH, ROSLI OMAR, MARIZAN
SULAIMAN, AZHAR AHMAD |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
The aim of this paper is to investigate
the performance of a Fuzzy-Logic-Controller (FLC) which is applied on
three-phase induction motor drive system for high-performance industrial
applications. In this paper, the FLC is used as a speed controller to replace
the conventional PI speed controller. The FLC will determine the time of
switching on the Space Vector Pulse Width Modulation (SVPWM) inverter that
supplies power to drive the induction motor considering variable direct and
quadrature axis inductances. The performance of the suggested technique has been
simulated and developed using MATLAB/ SIMULINK for dynamic operating condition,
such as certain change in command speed, and step change in load. The simulation
result shows the feasibility of the proposed technique in order to improve the
speed response and low torque ripple on three phase induction motor drive. |
Keywords |
Field Oriented Control, Fuzzy Logic
Controller, Space Vector PWM, Induction Motor |
Full Text |
|
Paper ID: |
14298 -JATIT |
Title: |
ANALYSIS OF MOBILITY PARAMETERS EFFECT ON
POSITION INFORMATION INACCURACY OF GPSR POSITION-BASED MANET ROUTING PROTOCOL |
Author: |
RAED ALSAQOUR, MOHAMAD SHANUDIN, MAHAMOD
ISMAIL, MAHA ABDELHAQ |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 28. No. 2 -- 2011 |
Abstract |
Position-based routing protocols
have become more popular in Mobile Ad hoc network (MANET) due to their
advantages in using geographical position information of the nodes to route the
data packet to the destination node. Each node periodically sends their
geographical position information to its neighbors using beacon packets. Data
packet routing in position-based routing protocol uses neighbors’ position
information, which is stored in the node’s neighbors list and the destination
node’s position information stored in the routing data packet header field to
route the data packet from source to destination. Most of the current work in
position-based routing protocols assumes that position information in the node’s
neighbors list for its neighbors is accurate, while in reality, only a rough
estimate of this position information is available for the nodes. This paper
provides analysis study to realize the effect of position information inaccuracy
caused by different mobility parameters on Greedy Perimeter Stateless Routing (GPSR)
position-based routing protocol. In general, inaccuracy occurs when inexact
position information is used. However, the results from the analysis work shown
that the node beacon packet interval-time and node speed mobility parameters
have a high impact on position information inaccuracy and have an intense effect
in degrading the performance of GPSR protocol in terms of average end-to-end
delay, non-optimal route, false local maximum, and routing loop. |
Keywords |
Mobile Adhoc Network (MANET), Greedy
Perimeter Stateless Routing (GPSR), Beacon Packet Interval-Time, Node Speed |
Full Text |
|
|
|