|                                                                                 
                                                             
                                                  
                                                                               
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
| 
  	
 	
Journal of Theoretical and Applied Information Technology                
        
 
 
November  2014 | Vol. 69  No.2  |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DESIGN OF EFFICIENT CACHING ALGORITHMS FOR PEER TO PEER NETWORKS TO REDUCE 
TRAFFIC IN INTERNET |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S.SIVAKUMAR, Dr.S.ANBU |  
|  			
									
Abstract: | 
 			
									
Peer-to-peer (P2P) file sharing systems generate a major portion of the Internet 
traffic, and this portion is expected to increase in the future. We explore the 
potential of deploying proxy caches in different autonomous systems with the 
goal of reducing the cost incurred by Internet service providers and alleviating 
the load on the Internet backbone. P2P traffic is more complex than caching 
other internet traffic and needs several new algorithms and storage systems. The 
paper presents the design and evaluation of a entire, running, proxy cache for 
P2P traffic, referred to as PrCache. PrCache transparently intercepts and serves 
traffic from different P2P systems. A replacement storage system is projected 
and enforced in PrCache. Storage system is optimized for storing P2P traffic, 
and shown to outperform other storage systems. A new algorithm to infer the 
information required to store and serve P2P traffic by the cache is proposed. 
Extensive experiments to evaluate all aspects of PrCache using actual 
implementation and real P2P traffic are presented. Based on the analysis, 
proposed a new algorithm, called Optimized Least Grade Replacement (OLGR), takes 
recency, frequency, perfect-history, and document size under consideration for 
Web cache optimization. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Caching, LRU,LFU,Traffic,P2P,Network,Security |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
IMPACT OF NODE MOVEMENT USING DYMO PROTOCOLIN DIFFERENT LANDSCAPE TITLE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A. BOOMARANIMALANY RM. CHANDRASEKARAN  |  
|  			
									
Abstract: | 
 			
									
Manet is an anthology of mobile nodes with moving sense and can communicate to 
each other with wireless links without any infrastructure or centralized 
administration. Manet has to face many challenges in various aspects; one of the 
further most challenges is terrain size and node placement. In this paper some 
of the node placement types are analyzed and evaluated their performance. The 
results are most useful for choosing simulation environment for their particular 
research and applications which was based on performance of mobile ad-hoc 
networks |  
|  			
									
  										
			
Keywords:  | 
 			
									
Mobile ad-hoc networks, node placement, scalability, DYMO, QOS |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
POWER FACTOR IMPROVEMENT IN SINGLE PHASE DC MOTOR DRIVE USING DOUBLE SIDED PWM 
SWITCHING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
P.KARPAGAVALLI , Dr. A. EBENEZER JEYAKUMAR |  
|  			
									
Abstract: | 
 			
									
This paper presents power factor correction by interleaved dual boost converter 
fed DC Motor through full bridge DC-DC converter with unipolar voltage switching 
technique. The proposed topologies are designed to achieve unity power factor 
with average current mode controller PID based double sided PWM switching(DSPWMS) 
and it is a simple and effective manner which creates reduced total harmonic 
distortion in AC input line current. Simulation results with dual boost 
converter there is shows an improvement in power factor and THD and also 
improvement in DC motor performance .The entire system simulation work is 
carried out using MATLAB/SIMULINK environment .  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Interleaved Dual Boost Converter, PID Controller, Average Current Mode Control, 
Double Sided PWM Latched Switching, THD.  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE IMPACT OF INFORMATION ON JOB OUTCOMES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A.HAMEED, IZZELDIN I.MOHD, ALI OUDAH |  
|  			
									
Abstract: | 
 			
									
This article examines the effects of two Information and Communication 
Technology (ICT) related factors, ICT utilization and perceived ease of ICT 
usage, on two job outcomes, job satisfaction and work effectiveness. On a 
theoretical basis, the author proposed that these effects could be mediated by 
knowledge sharing. A total of 246 usable responses from full-time employees 
working in Iraq were analyzed using hierarchical regression analyses, which were 
furthered confirmed by Sobel test and bootstrap-based PROCESS analysis. Results 
showed that both job satisfaction and work effectiveness were positively related 
to ICT utilization and perceived ease of ICT usage. Employees’ knowledge sharing 
orientation significantly mediated the relationships of job satisfaction with 
ICT utilization and ease of ICT usage, as well as the relationships of work 
effectiveness with these two factors. The present study provides further 
understanding of the mechanism underlying the influences of ICT on employee 
workplace issues. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Knowledge Sharing, Job Satisfaction, Work Effectiveness, Mediator |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MULTIOBJECTIVE BUILT IN SELF REPAIR ALGORITHM WITH MULTIPLE FAULT DETECTION FOR 
RECONFIGURABLE SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
PRADEEP C, R. RADHAKRISHNAN, NEENA BABY, PHILIP SAMUEL |  
|  			
									
Abstract: | 
 			
									
Field Programmable Gate Arrays (FPGAs) are widely used in reliability-critical 
applications due to their reconfiguration ability. The emergence of partial 
reconfiguration in FPGAs has made it possible to incorporate fault tolerance 
into systems more easily. Fault tolerance includes fault detection and fault 
recovery. This paper presents the investigation of a fault detection and repair 
algorithm. Currently available self-repair algorithm makes use of large number 
of spare cells to achieve good fault coverage.This limitation is overcomed by 
the proposed algorithm, MORe which satisfies multiple objectives such as less 
area, minimum routing overhead and multiple fault detection capability.The MORe 
algorithm is demonstrated and compared with the other two existing algorithms 
using Matlab.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Field Programmable Gate Arrays (FPGAs), Fault Recovery, Self-repair, Transient 
fault, Permanent fault, Spare cell. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
QOS BASED HYBRID SWARM INTELLIGENT INTRUSION DETECTION SYSTEM FOR NETWORK 
SECURITY  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
E.BHARATHI1 Dr.A.MARIMUTHU  |  
|  			
									
Abstract: | 
 			
									
Intrusion detection system plays a vital role in system security which operates 
data in real time that may leads to dimensionality problem. As the number and 
size of the Network and Internet traffic increase and the need for the intrusion 
detection grows in step to reduce the overhead required for the intrusion 
detection and diagnosis, it has made public servers increasingly vulnerable to 
unauthorized accesses and incursion of intrusions. However, detecting the new 
type of attacks on a network system is a very difficult problem from the 
perspective of the classification mechanism of IDS. This research work presents 
swarm intelligence based approach for IDS to solve the QoS multicast routing 
problem of the entire network. In this paper, the Artificial Bee Colony 
operators are integrated with Genetic Algorithm (GA) where the employed Bees, 
Onlooker Bees and Scout Bees are there to improve the solution space named as 
Artificial Bee Genetic Colony Algorithm (ABGCA). Whereas Genetic algorithms 
belong to evolutionary algorithms, which produce solutions to optimization 
problems by means of approaches motivated by natural evolution. Artificial Bee 
Colony (ABC) is an algorithm derived from the intelligent actions of honey bee 
swarm. In the proposed approach, the operators of ABC are integrated with GA for 
local search strategy. In order to improve the overall performance of the 
system, hybrid swarm intelligence techniques can be used in IDS. The simulation 
results show that this algorithm has fast convergence and it improves the 
network security of the system.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Quality of Service; Intrusion detection system; Multicast routing; Artificial 
bee colony; Genetic Algorithm. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
INTELLIGENT PREDICTION AND PREVENTION OF VEHICLE ROLLOVER USING FLQG REGULATOR  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
BINDA.M.B, DR.M.RAJARAM |  
|  			
									
Abstract: | 
 			
									
In this paper, we present a novel methodology for predicting and prevention of 
vehicle rollover model and control strategies which is suitable for preventing 
the untripped rollovers that was to be caused in vehicle. For vehicles that are 
deemed to be susceptible to wheel-lift off, various control strategies are 
implemented by earlier researchers. In this work, we propose a method for 
rollover prediction and prevention based on the combination of fuzzy logic with 
Gaussian controller which does not require such accurate contact information. 
The validity of the proposed methodology is proved, and it is used to realize 
rollover prediction and prevention in the direction of the roll. The primary 
assumption in this implementation is that the vehicle is equipped with a 
conventional fuzzy based controller system. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Rollover, Ga Tuned Pid Controller, Pid Controller |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENERGY EFFICIENT CLUSTERING PROTOCOL FOR COLLECTING DATA IN WIRELESS SENSOR 
NETWORK |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
L.SUJIHELEN, C. JAYAKUMAR |  
|  			
									
Abstract: | 
 			
									
Wireless Sensor Network (WSN) is used for collecting the information from the 
environment. WSN consists of a large number of Sensor Nodes (SN). Each Sensor 
Nodes in the network are connected by a wireless Channels. All the real time 
applications of Wireless Sensor Network (WSN) need energy. The nodes in the 
Wireless sensor networks are battery driven. There are some techniques such as 
clustering and data aggregation is used for energy efficiency. In the existing 
Energy Efficient Clustering to Enhanced Lifetime (EECPL) protocol, the reduction 
in the energy consumption is accomplished by performing data aggregation in the 
Cluster Members rather than Cluster Heads. Further, ring topology is adopted, in 
order to enable load balancing in the network. However, it is observed that the 
delay involved in data transmission is increased which makes it unsuitable for 
real-time application. In this paper, an Energy Efficient Clustering Protocol is 
proposed to reduce without compromising Network lifetime. The proposed protocol 
is compared with the existing EECPL protocol. The performance metrics considered 
for comparison are average end to end delay, the average energy consumption and 
network lifetime. NS2 simulation tool is used for the implementation. The 
proposed protocol outperforms the existing EECPL protocol. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Energy Efficient Clustering to Enhanced Lifetime protocol, Cluster Head, Data 
aggregation, Cluster Member. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
T.KARTHIKEYAN, DR.A.RAJARAM |  
|  			
									
Abstract: | 
 			
									
Mobile Ad hoc Network (MANET) consists of mobile nodes. Nodes are connected 
without any infrastructure. MANET ensures that lack of infrastructure, self 
organization and no access point. Mobile nodes are sharing their data whenever 
and wherever it’s needed. To maintain the effective data sharing, the data 
replication technique is needed. The main aim of the research work is to develop 
the data replication algorithm based on multicasting, data access method and 
power consumption in order to provide the minimum power consumption and high 
data availability rate in the network. Due to the presence of the network 
partition, mobile nodes in one partition are not able to access the data hosted 
by nodes in the other partition. So the performance of data access is degraded. 
Existing methods aims at balancing trade-off between energy consumption, data 
availability and delay. In proposed method we are focussing on balancing between 
data accessibility, power consumption and data availability ratio. In first 
phase, the multicast approach is proposed to achieve higher data availability. 
In second phase, the data replication procedure is proposed to ensure the higher 
data replication rate. In third phase, the data accessibility method ensures the 
more data accessibility rate. In fourth phase the power consumption procedure to 
ensure minimum transmission and reception power. By simulation results show that 
the proposed scheme achieves better performance than the existing methods like 
DAFN and OTOO. |  
|  			
									
  										
			
Keywords:  | 
 			
									
MANET, Power Consumption, Data Accessibility, End To End Delay, Overhead, 
Network Lifetime, Network Partition And Data Replication Procedure. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
EFFICIENT POSITION BASED PACKET FORWARDING PROTOCOL FOR WIRELESS SENSOR NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
B.ANITHA, DR.A.RAJARAM |  
|  			
									
Abstract: | 
 			
									
In Wireless Sensor Networks, sensor nodes are controlled by either base station 
or without bases station. In our scheme, the sensor nodes are not depends on the 
base station. Once the sensor node sent a packet to the destination node, the 
residual energy is calculated through the multipath routing approach. In this 
research work, an Efficient Position based Packet Forwarding Protocol (EPPFP) to 
increase packet delivery rate based on the position of sensor nodes. It consists 
of three phases. In first phase, multipath routing is implemented based on link 
with high packet forwarding capacity. In second phase, packet forwarding scheme 
is implemented to achieve high packet delivery rate and to schedule the packet 
transmissions to multiple packet forwarders. In third phase, packet forwarding 
verification is proposed to verify whether or not packets are successfully 
forwarded. Based on simulation results, the proposed EPPFP achieves high 
delivery ratio, increased network lifetime, less delay, minimum overhead and 
energy consumption in terms of mobility, time and number of nodes than existing 
schemes namely. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Packet forwarding, Packet verification, Network lifetime, End to End delay, 
Mobility, Communication Overhead, Energy Consumption, Packet Delivery ratio and 
pause time. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
REMOVAL OF DIFFERENT TYPES OF ARTIFACTS AND IMPULSE NOISE IN GRAY SCALE IMAGES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S.SURESH KUMAR, DR. H. MANGALAM |  
|  			
									
Abstract: | 
 			
									
An adaptive based artifacts removal algorithm is proposed for removal of 
blocking artifacts, strip lines, drop lines, blotches and impulses in images. 
The algorithm detects noise variance level and then proper method is selected 
depending upon the variance. The algorithm changes the maximum size of window 
during the filtering operation depending on noise level. The output of the 
filter is a particular value which replaces the current pixel value at that 
point on which the value is centered at that time. Thus window size is 
automatically modified based on the density of noise in the image. It replaces a 
number of independent algorithms required for removal of blocking and other 
different artifacts and gives better result. The performance of the algorithm is 
evaluated in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), 
Correlation, Feature Similarity (FSIM), Mean Structural Similarity (MSSIM) and 
Visual signal-to-noise ratio (VSNR). The computation time is compared with other 
algorithms that already exist. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Strip Lines, Blotches, Blocking Artifacts, Noise Variance, Adaptive Based 
Artifact Removal Algorithm, Feature Similarity. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DETERMINING SOFTWARE MAINTAINABILITY OF JAVA INTERFACES USING QUANTITATIVE 
APPROACH |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
N.BASKAR, A.V.RAMANI |  
|  			
									
Abstract: | 
 			
									
Software maintainability is one important aspect in the evolution of a software 
product. Several coupling measures have been introduced to identify and measure 
the design complexity of an object oriented (OO) systems. The coupling metrics 
proposed in this paper recognizes the complexity between inheritance and 
interface programming. This paper presents measurements of Coupling between 
Object (CBO) in object oriented programming. The metric values of class and 
interface inheritance diagrams have been compared to prove whether 
maintainability is improved to use and beneficial for the software developers. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Software Maintainability, Software Metrics, Object Oriented Systems, Interface, 
Coupling, Java |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PROPERTY BASED DYNAMIC SLICING OF OBJECT ORIENTED PROGRAMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SANTOSH KUMAR PANI, G.B.MUND |  
|  			
									
Abstract: | 
 			
									
Slicing is the process of extracting the statements of a program affecting a 
given computation.In contrast to static slices, Dynamic slices are smaller in 
size as they extract statements for a given execution of a program and helps in 
interactive applications like debugging and testing. From last three decades, 
many algorithms have been designed to slice a program with respect to the syntax 
of the program. Traditional bulky Syntax based slices for program variables used 
at many places in a program are generally large even for dynamic slices. Most of 
the semantics based slicing algorithms extract slices by storing an execution 
trace of a program. To the best of our knowledge generating dynamic slices based 
on abstract/concrete properties of program variables is scarcely reported in 
literature. We present here an algorithm for generating dynamic syntax based as 
well as property slices of object oriented programs addressing all key object 
oriented features.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Dynamic slice, ReferenceSet, Property based Slice, Polymerphism, Abstract state. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
FOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND 
OPTICAL FLOW |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SIVAGAMI.M , REVATHI.T , JEGANATHAN.L |  
|  			
									
Abstract: | 
 			
									
This paper address the problem of extracting the foreground objects.We proposed 
a novel technique for foreground object extraction using Fuzzy-c-means with 
Bit-plane slicing and optical flow. Modeling the background is a challenging 
task in foreground extraction. Before modeling the adaptive background image, 
the image is processed by Lab color model and Bit-plane slicing. Then the frame 
is modeled as a background using Fuzzy C - means algorithm with threshold.The 
foreground is extracted based on this model. The background model is updated at 
regular intervals of time. At last, the optical flow is applied to the 
foreground extracted image to eliminate the errors caused due to the movement of 
background object such as tree leaves, etc. The videos are taken from the 
weizmann dataset and examined for this method. This method yields better results 
than the previous algorithms with respect to memory consumption and quality of 
the extracted image. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Foreground extraction, Fuzzy C-Means, optical flow, GMM, K-means, Bit-Plane 
Slicing. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
3D MODELING AND SIMULATION OF ALGAE FOR SIMULATOR VEHICLES AND UNDERWATER 
ENVIRONMENT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DUDDY SOEGIARTO |  
|  			
									
Abstract: | 
 			
									
Research in the field of modeling and simulation of underwater environment is to 
study the behavior of the environment and biota in the form a unified function 
and behavior in a marine ecosystem. Modeling and simulation in this study the 
main objective is to support the manufacture of vehicle simulators and the 
underwater environment by making the modeling and simulation of marine plants, 
especially algae. Modeling and simulation is performed using the laws of physics 
to simulate the motion behavior of marine algae as a result of the dynamics of 
water in the form of hydrodynamics and thermodynamics, or both. In this 
research, modeling is used to provide a descriptive overview of the structure of 
the handle while the laws of physics-dynamics for dynamic simulation. 
Implementation process modeling and simulation is done by using the method of 
l-systems and OpenGL. Modeling and simulation using the method of L-system and 
OpenGL in this study resulted in the visualization of structures and simulation 
algae under the sea. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Modeling, Simulation, Algae, L-system, OpenGL |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
INTERACTIVE HIGH QUALITY VIDEO STREAMING VIA COEQUAL SUPPORT VIDEO TRANSCODER |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
S.VETRIVEL, DR. G. ATHISHA |  
|  			
									
Abstract: | 
 			
									
The most challenging problem in video transcoding is to determine the spatial 
resolution, given a target bit rate. The spatial resolution (i.e., frame size), 
chronological resolution (i.e., frame rate), and amplitude (i.e., SNR) are 
classically excluded during the quantization step size (QS) to code the video. 
In video streaming, similar video is regularly requested by receivers at 
different sustainable receiving rates. Research works on Distortion-Quantization 
(D-Q) and Distortion-Rate (D-R) model was developed to enhance the source model 
using two-pass rate control method. D-Q and D-R model for H.264 variable bit 
rate coding does not provide constant video quality provided with the target 
rate constraint in practical video coding systems. On the other hand, the frame 
rate and quantization on the bit rate (QBR) provided rate constraint efficiently 
and effectively on both the sides of the encoder and decoder. The receiver 
solves the problem related to rate-constrained SVC adaptation by assuming 
spatial resolution with irregular perceptual video quality as output. To 
maintain the quality of video in a constant manner, Coequal Support Video 
Transcoding (CSVT) technique is developed. Coequal Support Video Transcoding 
enables effective transcoding in overlay streaming with constant video quality. 
First, CSVT leverages active co-equal cooperation without demanding 
infrastructure support such as a transcoding server. Second, as transcoding is 
computationally extreme with different types of devices used by participating 
nodes with minimal computing power and related resources such as bandwidth, an 
additional overlay called Meta-Video transcoding approach is also constructed in 
CSVT. The Meta-Video transcoding approach in CSVT instantly share the 
intermediate transcoding to minimize the total computing overhead .Experimental 
results collected within a realistically simulated test bed measures the factors 
such as video quality, PSNR rate, CPU overhead, processing time, bit rate and 
transmission cost. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Video Transcoding, Infrastructure Support, Frame Rate, Quantization on Bit 
Rate, Overlay Streaming, Distortion-Quantization, Metadata Overlay |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENHANCED KERBEROS AUTHENTICATION FOR DISTRIBUTED ENVIRONMENT  |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
A. JESUDOSS , N.P. SUBRAMANIAM |  
|  			
									
Abstract: | 
 			
									
This paper aims to provide a unique and enhanced authentication model based on 
Kerberos environment. With this, it provides a hack-proof authentication system 
and protects the Kerberos environment from password-guessing attack and replay 
attack. Traditionally, the banking and financial institutions sends OTP to the 
client mobile. When it is hacked, the identity can be compromised. Using the 
proposed authentication model, even when the nonce value or the OTP is hacked, 
the identity cannot be compromised. This paper insists the need for an 
additional Session Key and a nonce to be used between the Authentication Server 
(AS) and Client i.e. Alice. This helps to make the security stronger. Kerberos 
environment is prone for replay attack and password-guessing attack and hence 
this security model helps Kerberos environment to prevent such attacks.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Authentication, Kerberos, KDC, Secret key, Session Key, Replay Attack, 
Password-Guessing Attack. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ENERGY EFFICIENT RECLUSTERING ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR 
NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
C.P. SUBHA , Dr. S.MALARKKAN |  
|  			
									
Abstract: | 
 			
									
Wireless sensor networks are composed of a large number of sensor nodes with 
limited energy resources. One critical issue in wireless sensor networks is how 
to gather sensed information in an energy efficient way since the energy is 
limited. The clustering algorithm is a technique used to reduce energy 
consumption. It can improve the scalability and lifetime of wireless sensor 
network. In this paper, we introduce an adaptive clustering protocol for 
wireless sensor networks, which is called Adaptive Decentralized Re-Clustering 
Heterogeneous Protocol (ADRHP) for Wireless Sensor Networks. In ADRHP, the 
cluster heads and next heads are elected based on residual energy of each node 
and the average energy of each cluster. Clustering has been well received as an 
effective way to reduce the energy consumption of a wireless sensor network. 
Clustering is defined as the process of choosing a set of wireless sensor nodes 
to be cluster heads for a given wireless sensor network. Therefore, data traffic 
generated at each sensor node can be sent via cluster heads to the base station. 
We introduce ADRHP, for electing cluster heads and next heads in wireless sensor 
networks. The selection of cluster heads and next heads are weighted by the 
remaining energy of sensor nodes and the average energy of each cluster. ADRHP 
is an adaptive clustering protocol; cluster heads rotate over time to balance 
the energy dissipation of sensor nodes.The simulation results show that ADRHP 
achieves longer lifetime and more data messages transmissions than current 
neural network based clustering protocols in wireless sensor networks. |  
|  			
									
  										
			
Keywords:  | 
 			
									
REBCS, ADRHP,RECLUSTERING. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
TRACKING PERFORMANCES OF A HOT AIR BLOWER SYSTEM USING DIFFERENT TYPES OF 
CONTROLLERS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
SITI FATIMAH SULAIMAN, KHAIRUDDIN OSMAN, MOHD FUA’AD RAHMAT, AMAR FAIZ ZAINAL 
ABIDIN, ISMAIL MOHD KHAIRUDDIN |  
|  			
									
Abstract: | 
 			
									
System modeling is an important task to develop a mathematical model that 
describes the dynamics of a system. The scope for this work consists of modeling 
and controller design for a particular system. A heating and ventilation model 
is the system to be modeled and will be perturbed by pseudo random binary 
sequences (PRBS) signal. Parametric approach using AutoRegressive with Exogenous 
input (ARX) model structure will be used to estimate the mathematical model or 
approximated model plant. In this work, the approximated plant model is 
estimated using System Identification approach. Once the mathematical model is 
obtained, several controllers such as Self-Tuning Pole Assignment controller, 
Proportional-Integral-Derivative (PID) controller, and Generalized Minimum 
Variance (GMV) controller are designed and simulated in MATLAB. Finally, a 
comparative study based on simulation is analyzed and discussed in order to 
identify which controller deliver better performance in terms of the system’s 
tracking performances. It is found from a simulation done that a Self-Tuning 
Pole Assignment Servo-Regulator controller with a small value of pole give a 
best performance in term of its ability to eliminate error (%e_ss) and produce 
zero percentage of overshoot (%OS), while GMV controller using PSO tuning method 
offers a fast rise-time (T_r), settling time (T_s), and also its ability in 
eliminating (%e_ss). 
  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Hot Air Blower System, System Modeling, System Identification, ARX Model, 
Controllers |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A NOVEL APPROACH TO ENHANCE THE QUALITY OF AOMDV ROUTING PROTOCOL FOR MOBILE AD 
HOC NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
P.PERIYASAMY, E.KARTHIKEYAN |  
|  			
									
Abstract: | 
 			
									
Since the AOMDV routing protocol selects multiple node disjoint paths based on 
minimal hop count, the link failures and route breaks occurred in highly dynamic 
ad hoc networks. For eliminating such problems, we proposed a novel link quality 
based multipath routing protocol called Link Quality Based Multipath Routing (LQBMR) 
protocol which is the extension of a well known AOMDV routing protocol. The 
proposed protocol finds multiple link reliable paths using Path-Link Quality 
Estimator (P-LQE) such as Cumulative Expected Transmission Count (CETX). The 
LQBMR protocol uses only CETX instead of hop count as path metric for 
determining more link reliable paths between any source and destination pair for 
data transmission. We have evaluated the performance of LQBMR protocol using NS 
2.34 and compared it with AOMDV routing protocol. The LQBMR protocol reduces the 
routing overhead, packet loss ratio, normalized routing overhead and energy 
consumption. It also increases the packet delivery ratio and throughput. From 
the simulation results, it is found that the LQBMR protocol has performed better 
than AOMDV routing protocol. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Mobile Ad Hoc Networks, Multipath Routing, Packet Delivery Ratio, Throughput, 
Average End To End Delay, Normalized Routing Overhead, AOMDV And Link Quality 
Estimator. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ALGORITHMS FOR DATA ANALYSIS AND DETECTION OF CHANGES IN THE SECURITY LEVEL OF 
DATA TRANSMISSION IN WIRELESS NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
D.M. MIKHAYLOV, A.V. ZUYKOV, M.I. FROIMSON, A.V. STARIKOVSKIY, S.M. KHARKOV |  
|  			
									
Abstract: | 
 			
									
Personal mobile devices with growing functionality have become an integral part 
of people`s life influencing complexity of modern mobile networks with 
increasing number of users and base stations. Mobile phones and networks are not 
sufficiently protected as conventional systems do not provide an effective means 
for dealing with existing security problems. This paper addresses the issue of 
data security transmitted in wireless networks. The main attention is paid to 
detection of un-trusted base station primarily based on accessible 
software-defined radio modules. Authors provide the description of data analysis 
system for wireless networks comprising three modules: wireless cellular 
connections quality and mobile device condition control module; wireless 
connection authentication and security control module; wireless Wi-Fi 
connections authentication module, as well as detection algorithm of untrusted 
base stations. The article also provides the information about the experiments 
carried out and points out shortcomings of the current version of the proposed 
algorithms. The testing experiments and further improvements are underway to 
increase the system quality. It is planned to pay attention to the eavesdropping 
issue. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Data Security, Data Analysis, Untrusted Base Station Detection, Base Station, 
Wireless Network. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
SPATIO-TEMPORAL SEGMENTATION AND CLASSIFICATION ON AERIAL DATA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
Mr.K.PRAGADEESWARAN , Dr.A.SUBRAMANI |  
|  			
									
Abstract: | 
 			
									
Classification is one of the standard problems in data mining with a set of 
training data. Each set has data points and being signified by a feature vector, 
the significant task to be performed is to algorithmically build a model that 
measures the class label of an unseen test attribute based on the attribute 
feature vector. Adaptive Cluster Distance Bounding for High-Dimensional Indexing 
based on separating hyper plane boundaries of Voronoi clusters develops 
inter-dimensional correlations. Indexing real high-dimensional data sets focus 
on the clustering paradigm for search and retrieval but overlapping occurs while 
using the features of temporal and spatio-temporal data on aerial types of data. 
The goal is to develop a method which segment the heterogeneous data points in a 
significant manner, spatiotemporally localize instances of activities in a 
sequence way and remove overlapping using the seeds. To start with, initially 
the focal point is obtained by classifying the temporal data using the 
Spatial-Temporal Segmentation Modeling (SSM) method. SSM then uses individual 
feature as a seed in order to expand the spatiotemporal specificity on aerial 
data. SSM ensembles by sampling individual features as seeds by subsequently 
taking into account their nearest neighbors and further segments heterogeneity 
data points correspondences according to the coherence value. Finally, the 
points having significant degree of overlap is discarded that overlap with the 
temporal and spatio-temporal data. With this lenses dataset extracted from UCI 
repository, SSM compute the features that are related to spatiotemporal 
configuration between the training and test sets. Experiments conducted prove 
the effectiveness of the method and it further shows that the proposed spatio-temporal 
segmentation algorithm leverages the classification pattern to reduce the 
average execution time by increasing the micro averaged accuracy efficiently and 
effectively.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Spatial-Temporal Segmentation Modeling, Classification, Nearest Neighbor, 
Heterogeneity Data Points, Degree of overlap, Coherence. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
20th  November 2014 -- Vol. 69. No. 2 -- 2014  |  
|  									
			
 Full 
Text | 
 
 		
										
  						
							 |    		
							
 |     	 
 |