|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
April
2011 | Vol. 26. No.2 |
Paper ID: |
14203-JATIT |
Title: |
EFFICIENT METHOD FOR SECURELY MANAGING PASSWORDS |
Author: |
ASMA TANVEER, AIHAB KHAN, MALIK SIKANDER HAYAT
KHIYAL, SYED AFAQ HUSSAIN |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
A password is a secret string that is used for
security and authentication purposes and to provide access to a resource.
Therefore it is more vulnerable to attacks such as hacking, phishing, identity
theft, Cyber stalking and website cloning. But it is difficult for humans to
remember large no of passwords. This research is formulated to provide a source
to users by which they can conveniently and securely manage their passwords. The
user is authorized to enter the site information, ID and password in a list
which is secured by a Master Password which is encrypted. AES encryption
algorithm is also compared with DES encryption algorithms w.r.t time, size of
file after encryption and we have concluded that AES algorithm is faster than
DES. AES has only known attack that is brute force attack which allows Hacker to
try different combination of words and characters to break security. AES has
high performance as compared to DES |
Keywords |
Phishing, Authentication, Password, Master Password
Security, AES, DES |
Full
Text |
|
Paper ID: |
14115-JATIT |
Title: |
ACTIONABLE FILTERING THEMES IN EXECUTIVE
INFORMATION SYSTEMS FOR MANAGING INFORMATION OVERLOAD |
Author: |
SAMEER DUTTA |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
Executives are subjected to relentless onslaught of
information. Many strategies have been suggested in the past to negotiate the
torrents of information flows confronting executives. This paper recommends
modifying the structure of information flows reaching the executives as an
effective strategy to manage information overload. Such a strategy will enhance
the actionability of the decisions taken by the executives who use information
inflows as inputs to such decision making. Autonomous software agents can be
used for the purpose of building more effective information inflow structures. |
Keywords |
Information Overload, Autonomous Agents, Executive
Information Systems |
Full
Text |
|
Paper ID: |
14024-JATIT |
Title: |
DESIGNING AND IMPLEMENTATION OF ELECTRONIC PAYMENT
GATEWAY FOR DEVELOPING COUNTRIES |
Author: |
Ailya Izhar,
Aihab Khan, Malik Sikandar Hayat Khiyal, Wajeeh Javed, Shiraz Baig |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
In this paper a brief overview of electronic
payment gateway is provided. This paper addresses the requirements for an
electronic payment gateway from both the customers' and the merchants' point of
view. Most of the population doesn’t trust on the local existing online payment
gateway because it is not very secure. Mostly people want to adopt electronic
payment system as it has lots of advantages. They need such a gateway that
fulfill their all requirements and provide security, privacy etc. On the basis
of these requirements and the local infrastructure, we propose an electronic
payment gateway for local environment. |
Keywords |
E-commerce, Electronic Payment, Payment Gateway,
Security, Privacy |
Full
Text |
|
Paper ID: |
14071-JATIT |
Title: |
UNIPLANAR QUASI YAGI ANTENNA FOR CHANNEL
MEASUREMENTS AT X BAND |
Author: |
K.Prabhu
Kumar, Dr.P.S.Brahmanandam, B.T.P.Madhav, K Ch Sri Kavya, V.Shiva Kumar,
T.RaghavendraVishnu, D.Rakesh |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
Uniplanar quasi yagi antenna has gained
considerable attention recently as a method of producing a broad bandwidth
antenna array with a well defined end-fire radiation pattern. An important
advantage of the novel quasi-yagi antenna designed in x-band is its ability to
be scaled linearly to any frequency band. This paper presents simulation results
of scaled quasi-yagi antenna designed to operate around 10GHz using Agilent High
frequency Structure Simulator (HFSS) software. Return loss, input impedance
smith chart, radiation patterns, E-field, H-field and current distributions are
simulated and presented. |
Keywords |
Uniplanar, Quasi, X Band, HFSS, E-field, H-field |
Full
Text |
|
Paper ID: |
14072-JATIT |
Title: |
PERFORMANCE EVALUATION OF MICROSTRIP SQUARE PATCH
ANTENNA ON DIFFERENT SUBSTRATE MATERIALS |
Author: |
D.Rakesh,
P.Rakesh Kumar, Prof. Habibulla Khan, K Ch Sri Kavya, B.T.P.Madhav |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
The demand of small size electronic systems has
been increasing for several decades. The physical size of systems is reduced due
to advancements in integrated circuits. With reduction in size of electronic
systems, there is also an increasing demand of small and low cost antennas.
Patch antennas are one of the most attractive antennas for integrated RF
front-end systems due to their compatibility with microwave integrated circuits.
To fulfill the demand of integrated RF front-end systems, a design of micro
strip patch antenna for 60GHz microwave applications has been introduced. This
antenna maintains a maximum gain of 7.91dB for far field region with respect to
paraboloidal rectangular aperture antenna. It is actually a coaxial probe fed
antenna for impedance matching with 50 ohms coaxial cable. This antenna works
well in the frequency 60GHz with a maximum at 60.15GHZ. It is basically a low
cost, light weight, medium gain and narrow band antenna for microwave
applications such as a feeding element for other antennas and in research
institutes as a reference antenna. It can also be used at the output of signal
conditioning circuit for receiving signals from micro electromechanical sensors. |
Keywords |
Square patch, Substrate Materials, |
Full
Text |
|
Paper ID: |
14156-JATIT |
Title: |
HYPER GRAPH AND COPROCESSOR DESIGN FOR VLSI
PARTITIONING PROBLEMS |
Author: |
M.
Thiyagarajan, R. Manikandan |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
VLSI Cell partitioning is considered as Hypergraph
model, which can be a treated a randomized algorithm through the markov chain.
This approach helps to give a probabilistic algorithm through transition
probability matrices of a markov chain for VLSI partitioning. In the second
model SAT problem situation is used to model FPGA Layout. As almost all problems
posed in VLSI design and analysis are NP-Complete, any attempt to solve them is
to identify some reduction tool to NP-Complete problems. One such reduction is
attempted through SAT Problem. |
Keywords |
Hyper Graph, Markov Chain ,Max-Min Cut, Adjacency
Matrix, SAT Problem, FPGA Layout, NP-Complete Reduction, Formal Language , Time
Complexity |
Full
Text |
|
Paper ID: |
14073-JATIT |
Title: |
A METHODOLOGY FOR THE DESIGN OF AN ELECTRICITY
THEFT MONITORING SYSTEM |
Author: |
SOLOMON NUNOO, JOSEPH C. ATTACHIE |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
Utility companies in Ghana estimate that
electricity theft costs them over a billion US dollars in annual revenues. The
purpose of this work is to provide an algorithm for the design of electricity
theft monitoring system which allows violators to be detected at a remote
location. It begins with the analysis of losses in electrical power systems. The
bulk of these losses are caused by electricity theft, rather than other
possibilities such as poor maintenance and calculation and accounting mistakes,
though some power systems may suffer from both. Other aspects discussed include
the various forms of theft practices, methodology for detection of theft,
generating the theft case algorithm using the backtracking algorithm method and
communicating these data from the consumer premises to the substation using the
existing power lines. Appropriate conclusions and recommendations were given
from the information gathered. |
Keywords |
Electricity Theft, Monitoring System, Algorithm,
Power Line Communication |
Full
Text |
|
Paper ID: |
14149-JATIT |
Title: |
URBAN GROWTH AND LAND USE/LAND COVER
CHANGE OF POKHARA SUB-METROPOLITAN CITY, NEPAL |
Author: |
BHAGAWAT RIMAL |
Source: |
Journal of Theoretical and Applied
Information Technology
Vol 26. No. 2 -- 2011 |
Abstract |
Urban development has enlarged the
modification of natural resources and has changed land use and land cover
patterns. Urbanization is a process of increase of modernization system which
modifies the socioeconomic activities and revolutionizes the land use practice
according to time frame. Due to the proximate and underlying causes, land use
and land cover change has become the main challenge of the present world. Due to
the huge course of urbanization, the major cities of the world are compelled to
face the severe threats. Various causes of the urbanization process bring the
unrestrained impact on land use and land cover change. An unplanned urbanization
process is becoming the major problem in the developed and developing countries.
Population growth, migration, political instability, economic opportunities,
centralized plans and policies of the government, accessibility of physical
infrastructure, globalization are some of the major causes of the high level of
urbanization in Nepal. This paper presents the historical urban growth
phenomenon and analysis of land use and land cover change of Pokhara
sub-metropolitan by utilizing remote sensing imagery and GIS. In the study,
Markov chain model has been used to predict future changes based on the rate of
past change in IDRISI GIS. The landsat images of 1977 MSS, 1990 TM, 1999 ETM+
and 2010 TM are rectified and registered in Universal Transverse Mercator (UTM)
zone 44N. Supervised classification system has been used to classify the images
of different land use categories. Six land use classes have been identified:
Urban (Built-up), water body, open field, forest cover, cultivated land and
sandy area. Urban land use change for the year 2021 was modeled using a Markov
chain based approach. For the projection of 2021, transitional probability
matrix table from the land use land cover map of 1999 and simulated map of 2010
is derived. Projected land cover changes show a growing tendency in urban land
use, which might threaten the areas that are currently reserved for forest and
agricultural lands. |
Keywords |
Urban growth, Land use/Land cover,
Infrastructure, Satellite imagery, Markov Chain Model GIS. |
Full
Text |
|
|
|