|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines encompassing the most basic research to the most innovative technologies. Please submit your papers electronically to our submission system at http://jatit.org/submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal identifiable information in the manuscript before submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February
2011 | Vol. 24. No.2 |
Paper ID: |
14063-JATIT |
Title: |
PARALLEL MATRIX MULTIPLICATION
IMPLEMENTATION IN DISTRIBUTED ENVIRONMENT THROUGH RMI |
Author: |
NAKKEERAN.M, Dr.RM.CHANDRASEKARAN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
This paper proposes to solve the
parallel matrix multiplication implementation in a distributed environment
through RMI based on JAVA threads. The application distributes the products of
rows and columns on different machines. One server and two clients are run to
find the product of matrix multiplication. The server distributes the determine
blocks of rows and columns on the registered clients. The clients return their
product blocks to a server, which calculate the final product of matrix
multiplication. Applications of this type will allow loaded servers to transfer
part of the load to clients to exploit the computing power available at client
side. The time of matrix multiplication with size of 200 X 200 and 500 X 500 is
reduced by 61.34% and 36.67% respectively by using 2-clients in comparison to
sequential program and this time can be decreased more in the case of increasing
the number of clients. |
Keywords |
Distributed Environment, RMI, Java
Threads |
Full Text |
|
Paper ID: |
14088 -JATIT |
Title: |
INCREASING INFORMATION SECURITY INSIDE
ORGANIZATIONS THROUGH AWARENESS LEARNING FOR EMPLOYEES |
Author: |
MOHAMMAD BTOUSH, ABDULSALAM
ALARABEYAT, MALIK ZBOON, OMAR RYATI, MUNEER HASSAN, SULIEMAN AHMAD |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
Social Engineering is the use of
non-technical means to gain unauthorized access to information or systems.
Instead of using vulnerabilities and exploit scripts, the hacker uses human
nature. Social Engineering provides the potential for the most complete
penetration of a target, but it does take time and talent. Generally, it is only
used by hackers who are targeting a specific organization. Social Engineering is
represented as in ability of building improper trust relationships with people
who are working inside the organization to get unauthorized access privileges or
gaining sensitive information such as (usernames, passwords, and personal
identification codes(PINS)) which are needed to gain unauthorized access/see the
organization's systems and information. Hackers have applied numerous methods to
bypass the security measures, for instance using psychological tricks on
legitimate users of a computer system to gaining unauthorized access to the
information or systems. Many organizations like (companies, banks, universities)
around the world are used set of(software and hardware Implementations)to
protect them from this fatal attack. there is real fact every one you must takes
in yours mind, are you can find one computer system in the world is not depend
on human element inside it?, there will always be people who used to provide
information and maintenance inside the organizations. many people are using
social skills in some forms of our life since the beginning of our life on the
universe, because most of us are want to be helpful and trusting source for
others that it is from human nature which can not be change it easily. Inside my
short paper WE attempt discussing the critical need for security issue in my
organization (Petra University), as well as for an individuals (lecturers and
Employees), then, WE will describe some of the methods that are used by Social
Engineers to infiltrate security measures which are applied inside my university
in an effort to ascertain confidential information and use it for malicious
purposes. To end with, this paper WE will explain the importance of awareness
learning against Social Engineering attack, and describe how the people should
incorporate to safeguard and fighting against Social Engineering threats by
giving some suggested solutions. |
Keywords |
Awareness learning, Dumpster
Diving, Impersonation, Phishing, Social Engineering. |
Full Text |
|
Paper ID: |
14111-JATIT |
Title: |
Modeling and Simulation of
Discontinuous Current Mode Inverter Fed Permanent Magnet Synchronous Motor Drive |
Author: |
M.
Rajashekar, I.V.Venu Gopala swamy, T.Anil kumar, |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
The aim of this project is to model
a six step discontinuous current mode inverter fed to a Permanent Magnet
Synchronous Motor (PMSM) drive using MATLAB/SIMULINK. The dq-axis
Voltage-Current and Torque relation in terms of machine parameters are used
along with a six step 120 degree mode inverter and gate drive using MATLAB/SIMULINK.
There is also a provision for easy changes to the machine parameters and gate
drive inverter parameters at appropriate places. The various subsystems allow us
to change the parameters like power supply data, phase angle advance, PMSM
parameters such as stator resistance, inductance, number of poles, rotor magnet
constant, Moment of Inertia of motor and damping constant etc.
The above model finds its application in power electronics and drives
laboratories. Simulation will be done for a phase angle advance of 30° and 45°
for a six step discontinuous current mode inverter fed PMSM drive at no load. |
Keywords |
Permanent Magnet Synchronous motor
(PMSM), Brushe Less Direct Current Motor(BLDC), Current Source Inverter (CSI),
Voltage Source Inverter (VSI) |
Full Text |
|
Paper ID: |
-JATIT |
Title: |
Modeling and scheduling intelligent
method’s application in increasing hospitals’ efficiency |
Author: |
Neda Darvish , Mahnaz Vaezi |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
Every human cost of each hospital as the
greatest presenter the health care and treatment to all people, the main sources
and credits allocated to the health and treatment of a country. Determining the
optimal number of employees for each ward of hospital, because of its importance
in quality of services offered to customers and costs are among the issues that
any clear standard has not been written for it.
In This study, the aim of modeling of hospital and use of intelligent systems to
adjust the shift program and to determine optimal number of hospital staff in
order to increase efficiency and minimizing its costs.
As, the presence of patient in the hospital and releasing them can be considered
as a discrete system with the characteristics of Markov processes, in the first
step, using Markov’s chain models a good estimate of the system conditions such
as the number of beds needed and occupied beds, which can be offered in the
optimization of capacity is beneficial. In second step, to develop the model, an
approach is stated for minimizing the costs with assist of Petri's network.
Finally, to control and optimize the model with using the genetic algorithm is
presented for optimal shifting of human resources like nurses. The results show
42% reduction of human resources costs and 87% saving service time for patient.
Method of study: this study is applicable and it’s in group of
descriptive-analysis studies, which had been design as the software and the data
collection tool was the checklist of Bu Ali Hospital’s patients’ records, which
approved by the related experts and studied after observation, chronoscope and
also time of human resources services to several patients and the plan shift of
nurses and doctors has been studied with use of intelligent system’s designing.
Data analysis and planning is carried out with the method of Petri net and
Markov and genetic algorithm with use of Matlab and Hpsim software.
Findings: comparison of preparation programs and system design show to patients,
improvement of cost reduction about 42% and 87% time saving service.
Conclusion:
Research various models in operation, can be used as a suitable tool for
scheduling and determination the optimal number of staff needed in several parts
of a hospital, which has a vital and significant role. Since the designed system
in this study is limited to the obtained data from medical and educational
center of Bu Ali department affiliated to Islamic Azad University Tehran medical
branch, to extend and optimum use in other hospitals require making changes in
programming based on data. Therefore, it is recommended to make these systems
usable in other hospitals and increasing restrictions, so the prepared program
will be closer to the real world, to be done. |
Keywords |
Hospital Efficiency, Petri's
network, Markov’s Chain Model, Genetic Algorithm, Intelligent Networking |
Full Text |
|
Paper ID: |
14142 -JATIT |
Title: |
Insilico Promoter Prediction using
Grey Relational Analysis |
Author: |
Uma Devi Tatavarthi, Venkata
Nageswara Rao Padmanabhuni, Appa Rao Allam, Ramachandra Sridhar Gumpen |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
In machine learning, multiclass or
multi-label classification is the special case within statistical classification
of assigning one of several class labels to an input object. The multiclass
problem is more complex than binary classification and less researched problem.
In biology promoter is the DNA region where the transcription initiation takes
place. Reliable recognition of promoter region is essential for understanding
biological mechanical of the gene. This study proposes a new approach for
predicting the promoter from the DNA sequence based on the modeling of Grey
Relational Analysis (GRA). In order to construct a promoter prediction system,
GRA approach is developed and applied to the real data set with 2111 samples of
promoters and non-promoters of 4 species. The results of the current model are
compared to those of traditional ones, logistic regression and back-propagation
neural network. The results illustrate that the prediction of the proposed GRA
model demonstrates better prediction accuracy than the conventional ones. The
current results show that the proposed GRA provides a novel approach in
predicting the promoter from a genome. |
Keywords |
Promoter Prediction, Grey
Relational Analysis, Grey Systems, Classification |
Full Text |
|
Paper ID: |
14121-JATIT |
Title: |
A NEW APPROACH FOR GENERATING STRONG
KEY IN RIVESTCIPHER4 ALGORITHM |
Author: |
MANIKANDAN GANESAN, MANIKANDAN
RAMACHANDRAN, SUNDARGANESH GOVINDKUMAR |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
In the era of digital transaction,
in order to transact the data in a more secured manner the need for a
cryptographic algorithm is inevitable. There are numerous numbers of
cryptographic algorithms which makes the system invulnerable from the attacks of
intruders and eavesdroppers.RivestCipher4 algorithm is one such cryptographic
algorithm which is very well known for its performance and simplicity. In this
paper, we propose a software toolkit for increasing the key strength so that it
will be very hard for the intruder to break the key and this technique will act
as black box so that intruder will have no idea about the key formation. So it
will lead to increased key complexity which obviously results the intruder
nothing else than confusion and frustration. |
Keywords |
Cryptography, Encryption, key strength,
key complexity |
Full Text |
|
Paper ID: |
14145 -JATIT |
Title: |
DESIGN AND ANALYSIS OF SPEECH
PROCESSING USING KALMAN FILTERING |
Author: |
Vineela Murikipudi, K.Phani Srinivas
D.S.Ramkiran, Prof.Habibulla Khan, G.Mrudula, K.Sudhakar Babu, T.Raghavendra
Vishnu |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 24. No. 2 -- 2011 |
Abstract |
Speech processing is used widely in
every day’s applications that most people take for granted, such as network wire
lines, cellular telephony, telephony system and telephone answering machines.
Due to its popularity and increasing of demand, engineers are trying various
approaches of improving the process. One of the methods for improving the
process is Kalman filtering. Kalman filtering now become a popular filtering
technique for estimating and resolving redundant errors containing in speech.
The objective of this paper is to generate a reconstructed output speech signal
from the input signal involving the application of a Kalman filter estimation
technique. In this paper, Kalman filter is used to estimate the parameters of
the autoregressive (AR) process and represented in the state-space domain. |
Keywords |
Kalman Filter, Noise Reduction,
Speech Processing |
Full Text |
|
|
|