|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
July 2011 | Vol. 29. No.2 |
Paper ID: |
14327
-JATIT |
Title: |
Model Development for Oxygenation of Bone Wash Effluent |
Author: |
J.SUMATHI, S.SUNDARAM |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
Effluent from bone wash industry diluted with
different quantity of water was oxygenated at 3 different speeds ranging from
135 to 155 rpm in a 1.5 litre Tokyo Rikakikai bioreactor at 298K. The data was
subjected to regression analysis and fitted to a first order plus dead time
model with an error of less than 5 percent. The model parameters were used to
design controller settings by Z-N (PID), Skogestad, Smith predictor and IMC
methods. A closed loop analysis using the above controller settings indicate
that IMC is better suited for the process based on rise time, settling time and
overshoot. Closed loop performance based on ISE, IAE and ITAE also suggested a
similar conclusion. |
Keywords |
Bone Wash effluent, Modeling, Z-N (PID), Skogestad,
Smith Predictor and IMC |
Full
Text |
|
Paper ID: |
14206
-JATIT |
Title: |
EFFECT OF SUBCARRIERS ON ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING AT DIFFERENT
MOBILE SPEEDS |
Author: |
ZACHAEUS K. ADEYEMO, OLUMIDE O. AJAYI |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
With recent increase in the demand for mobile
communication services, future generations of mobile systems are expected to
provide very high data rate transmissions as well as improved quality of service
to users within commercial feasibility so as to avoid poor reception which the
users are experiencing nowadays. OFDM which is a form of multicarrier
transmission is a promising technique capable of providing quality of service at
high data rates. In this paper, the OFDM system was developed for orthogonal 32,
64, and 128 subcarriers at different mobile speeds of 30km/h, 60km/h and 120km/h
over frequency selective multipath channel. The developed model was simulated
using MATLAB application package. OFDM-4QAM modulation format was employed to
provide the parallel transmission and the received signal was compared with the
transmitted signal to analyze the bit error rate performance of the OFDM system.
The results obtained showed that as the number of subcarriers increased from 32,
through 64 to 128, the BER increased accordingly for all the mobile speeds
considered and the effect is more noticeable at high signal-to-noise ratio. The
increase in bit error rate indicates performance degradation. From the results,
OFDM system is prone to more CFO as the number of subcarriers is increased due
to increase in the complexity of FFT |
Keywords |
Orthogonal frequency division multiplexing (OFDM),
subcarriers, data rate, Fast Fourier Transform (FFT), carrier frequency offsets
(CFO) |
Full
Text |
|
Paper ID: |
14325
-JATIT |
Title: |
Malware
Threats and Mitigation Strategies: A Survey |
Author: |
Rizwan Rehman, Dr. G.C. Hazarika, Gunadeep
Chetia |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
Malicious software is one of the major
threats faced by the internet today. Basically the program is designed to
disrupt the operation, collect information which can be used for unauthorized
access and other targeted behavior. Malwares from their early designs which were
just for propagation have now developed into more advanced form, stealing
sensitive and private information. Apart from these their can even be some
targeted worms to victimize an organization and even identity theft. In this
paper, we are addressing different trends and techniques used for developing
malware and a survey on how these can be handled in an efficient manner. Finally
we discuss trends in malware designs and latest attack models and also the
latest mitigation strategies. |
Keywords |
Malicious Software, Security, Performance,
Mitigation Strategy, Threats |
Full
Text |
|
Paper ID: |
14240
-JATIT |
Title: |
NON
LINEAR AND NON-STATIONARY DATA ANALYSIS USING HILBERT-HUANG TRANSFORM |
Author: |
Ch. HEMANTH, A. SIVASAI RAM , N. RAMA
KRISHNA, P. S. Brahmanadam |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
The newly developed method known as Hilbert-Huang
Transform (HHT) is ideal for nonlinear and non-stationary data analysis as it is
totally adaptive in nature. This paper will discuss the fundamentals of HHT
method which consists of the empirical mode decomposition and Hilbert spectral
transform. As a part of analysis, the HHT method is applied on two different
data sets in which one is the annual mean global surface temperature anomaly and
the other is the noise component measured by the Equatorial Atmosphere Radar
located in Indonesia. The analysis of two data sets indicates that the HHT
method is able to extract each and every frequency component, which might not be
possible with the Fourier spectral analysis. Specifically, this study indicates
that the decomposed components in EMD of HHT, namely the intrinsic mode function
components contain observable, physical information inherent to the original
data. Finally, the study illustrates that the HHT-based Hilbert spectra are able
to reveal the time-frequency distributions more precisely. |
Keywords |
Nonlinear and non-stationary signals, Fourier
spectral analysis, Empirical Mode
Decomposition (EMD), Hilbert Spectral Analysis (HAS), Instantaneous frequency |
Full
Text |
|
Paper ID: |
14330
-JATIT |
Title: |
DATA
BATTLE ON THE DIGITAL FIELD BETWEEN HORSE CAVALRY AND INTERLOPERS |
Author: |
THANIKAISELVAN V, SANTOSH KUMAR, NARALA NEELIMA,
RENGARAJAN AMIRTHARAJAN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
In this paper a novel steganographic method
has been proposed to improve the security of embedded data with high capacity
and imperceptible visual quality, the proposed method is based on four-pixel
block differencing, modified LSB substitution and Knights tour. Secret data is
embedded randomly using knights tour in each 8×8 pixels block of cover image and
n-bit modified LSB ¬substitution has been used to improve the quality of stego
image, where n is decided by the level to which the average difference value
falls into, then it employs readjustment procedure to reduce the perceptual
distortion. The proposed method adaptively embeds the secret data into cover
image by differentiating the edge and smooth areas, so that more number of
secret bits can be embedded without making any perceptual distortion. Results
show that our proposed method has provided greater security with high embedding
capacity and a better image quality. |
Keywords |
Information hiding, Steganography , Modified
LSB substitution, Knights tour, Pixel Value Differencing (PVD) |
Full
Text |
|
Paper ID: |
14321
-JATIT |
Title: |
PYRAMID
BASED DATA GATHERING SCHEME FOR WIRELESS SENSOR NETWORKS |
Author: |
ABDULLAH AL-DHELAAN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
Wireless sensor networks are deployed to
collect useful information from an area of interest. Consequently, the sensed
data must be gathered by the nodes and transmitted to a base station for further
processing. Due to the limited battery power and criticality of the applications
in most cases, methods employed for data gathering and aggregation need to be
power efficient and with minimum delay in order to achieve longer network
lifetime and be effective. In this paper, we propose a novel scheme for data
gathering based on the pyramid interconnection that uses the pyramid as a
virtual backbone and collects data from all sensors to the base station upwards.
Moreover, we provide an efficient construction mechanism for the virtual
backbone. The proposed scheme achieves both objectives as it reduces the power
consumption and provides minimum delay as well as providing better scalability,
efficiency and fault tolerance. We analyze the performance of our scheme and
conduct a comparative study to demonstrate its superiority compared to other
schemes proposed recently in the literature. |
Keywords |
Pyramid, Wireless Sensor Networks, Virtual
Backbone, Data Gathering, Power Efficiency, Delay. |
Full
Text |
|
Paper ID: |
14175
-JATIT |
Title: |
HYBRID GENETIC ALGORITHMS WITH SIMULATING ANNEALING FOR UNIVERSITY COURSE
TIMETABLING PROBLEMS |
Author: |
Nabeel R.
AL-Milli |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
The Educational Timetabling problem deals with the
assignment of course (or lecture events) to a limited set of specific timeslots
and rooms, subject to a variety of hard and soft constraints. All hard
constraints must be satisfied, obtaining a feasible solution. In this paper we
establish a new hybrid algorithm to solve course timetabling problem based on
Genetic Algorithm and Simulating Annealing algorithm. We perform a hybrdised
method on standard benchmark course timetable problems and able to produce
promising results. |
Keywords |
Course Timetabling, Genetic Algorithms,
Simulating Annealing |
Full
Text |
|
Paper ID: |
14284
-JATIT |
Title: |
GENETIC ALGORITHM FOR SHORTEST PATH IN PACKET SWITCHING NETWORKS |
Author: |
ANU CHAUDHARY, NEERAJ
KUMAR PANDEY |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 29. No. 2 -- 2011 |
Abstract |
The problem of finding the shortest path
between two nodes is a well known problem in network analysis. Optimal routing
has been widely studied for interconnection networks this paper considers the
problem of finding the shortest path. A Genetic algorithm based strategy is
proposed and the algorithm has been developed to find the shortest (Optimal)
Path Variable-length chromosomes (strings) and their genes (parameters) have
been used for encoding the problem. The crossover operation exchanges partial
chromosomes (partial routes) at positionally independent crossing sites and the
mutation operation maintains the genetic diversity of the population. The
proposed algorithm can cure all the infeasible chromosomes with a simple repair
function. Crossover and mutation together provide a search capability that
results in improved quality of solution and enhanced rate of convergence. Even
though shortest path routing algorithms are already well established, there are
researchers who are trying to find alternative methods to find shortest paths
through a network. One such alternative is to use genetic algorithm (GA). GA is
a multi-purpose search and optimization algorithm that is inspired by the theory
of genetics and natural selection. |
Keywords |
Genetic Algorithm (GA), Shortest Path |
Full
Text |
|
|
|