|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2015 | Vol. 79 No.3 |
Title: |
INDOOR GLOBAL PATH PLANNING BASED ON CRITICAL CELLS USING DIJKSTRA ALGORITHM |
Author: |
SANI IYAL ABDULKADIR, SYED ABDULLAH FADZLI, AZRUL AMRI JAMAL, MOKHAIRI MAKHTAR,
MOHD KHALID AWANG, MUMTAZIMAH MOHAMAD, FATMA SUSILAWATI |
Abstract: |
Path planning has been implemented in various robotics systems, and the results
checked. This paper proposes global path planning based on grids representation
in an indoor environment using Dijkstra algorithm. The algorithm uses floor plan
of any environment discretized to some equal-sized square grids. Cells that
contained doorways, corner, curve and junction are considered as critical cells.
These critical cells are used as the vertices to the Dijkstra algorithm, with
distances between two successive cells as edges between them, and the shortest
path between a set of predefined points within the terrain can then be
calculated. Simulations results show that the proposed algorithm enhances
performance and speed compared to the traditional Dijkstra’s algorithm. |
Keywords: |
Global path planning, Grid-based environment, Dijkstra algorithm, Robotics |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
WEB BASED EXPERT SYSTEM TO IDENTIFY TRUSTED PARTNER FOR B2B COLLABORATION |
Author: |
NORSHAKIRAH AB.AZIZ |
Abstract: |
Web based expert system (ES) considered as a tool for decision making process.
In the traditional supply chain, there is no standard or guideline created to
evaluate or assess the potential trusted trading partner for collaboration
purposes. If there is a request or a need for an evaluation, the team will be
created and the assessment metric keeps changing according to the evaluation
team and exposed to the bias issue. However, in web based ES, the experts’
knowledge and experience were encoded into ES and act as consultant to provide
recommendation to the assessment and evaluation for finding a potential trusted
partner. The automation in ES helps to ensure the assessment standard every time
it needed. This study provide an identification method for selecting trusted
trading partners using the e2gLite web based ES, based on e-supply chain trust
model. Malaysian construction industry supply chain was chosen as domain for
this study. |
Keywords: |
Web based expert system, Expert System, e2gLite |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
SEARCH SPACE OPTIMIZATION AND FALSE ALARM REJECTION FACE DETECTION FRAMEWORK |
Author: |
ALI SHARIFARA, MOHD SHAFRY MOHD RAHIM, HAMED SAYYADI, FARHAD NAVABIFAR |
Abstract: |
One of the main challenging issues in computer vision is automatic detection and
recognition of object classes. In particular, the detection of the class of
human faces is a challenging issue, which makes special attention due to the
large number of its practical applications, which use face detection as the main
and primary step such as face recognition, video surveillance systems, etc. The
main aim of face detection is locating human face in images or videos regardless
of variations, which are associated to the face detection problem including
pose, illumination, and occlusion. The present research distinguishes by two
main contributions, which aims to cope with the problem of face detection to
locate faces in different poses precisely. The first contribution is the
segmentation of face images, based on skin color, which allows discarding the
background regions of image quickly. The process aims to decrease the search
space and reduce the computation time for feature extraction process. The Second
contribution is applying a validation phase in order to reject false alarms. In
this phase, the algorithm uses the enhanced local binary pattern and Support
Vector Machine (SVM) to extract features of face and classification the
features, respectively. In the proposed framework, the intra-class variability
of faces is accomplished in a learning module. The learning module used enhanced
Haar-like features in order to extract features from human face. |
Keywords: |
Automatic Face Detection, False Alarm Rejection, local binary pattern, Image
Search Space Reduction, Face Recognition, Face Processing. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
WAVELET COEFFICIENTS REDUCTION METHOD BASED ON STANDARD DEVIATION CONCEPT FOR
HIGH QUALITY COMPRESSED IMAGE |
Author: |
N.S.A.M TAUJUDDIN, ROSZIATI IBRAHIM, SUHAILA SARI |
Abstract: |
This paper proposes a method to estimate the wavelet coefficient threshold value
at wavelet details subbands to archive high quality image compression. It uses
the features of Discrete Wavelet Transform (DWT) where the images are decomposed
into one approximate subband and three detail subbands. The detail subbands
consists of Diagonal, Vertical and Horizontal subband. By using the standard
deviation concept we estimate the threshold value at each detail subbands. The
coefficients with larger value then the calculated threshold will be retained
while the rest will be discarded. So, for every single image, different
threshold values are calculated and applied at each detail subbands. From the
experiment done, we found that the proposed method eliminate the near-zero
coefficients effectively without harming the quality of the compressed image. |
Keywords: |
Discrete Wavelet Transform (DWT), thresholding, standard deviation, wavelet
coefficients, image compression |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
RELIABLE SHORT TERM LOAD FORECASTING USING SELF ORGANIZING MAP (SOM) IN
DEREGULATED ELECTRICITY MARKET |
Author: |
Z. H. BOHARI, H.S. AZEMY, M. N. M. NASIR, M. F. BAHAROM, M. F. SULAIMA, M. H.
JALI |
Abstract: |
Load demand prediction is important for electric power planning and must be
assessed with proper model. The power utility needs to forecasts in order to
supply energy to consumer without interference. Neural Networks method is the
most popular research topic have been done over the last decade. However, the
use of Kohonen Self Organizing Map (SOM) not really explored. This paper present
a forecasting method based on type of unsupervised learning neural networks. The
main purpose of this project is to investigate the self organizing maps (SOM)
neural networks can be used to forecast load demand. In this project, the SOM
network is explored to understand the technique of SOM. In addition, this
project targeted to improve the accuracy of short term loads forecasting through
SOM neural networks technique. This study are focused on testing the first eight
hours of the day to be forecast in order to identify its common patterns with
the historical database previously trained by neural network. Weekdays data were
us as their patterns same. After training, the data were testing and then
forecasted. Finally the errors were compared. The MAPE error is 0.322%, 0.128%
and 0.64% which is below than 3%. It show that SOM able to use in load
forecasting. |
Keywords: |
Short Term Load Forecasting, Self Organizing Map (SOM), Normalization, Neural
Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
A COMPARATIVE EVALUATION OF CLOUD MIGRATION OPTIMIZATION APPROACHES: A
SYSTEMATIC LITERATURE REVIEW |
Author: |
ABDELZAHIR ABDELMABOUD, DAYANG N. A. JAWAWI, IMRAN GHANI, ABUBAKAR ELSAFI |
Abstract: |
Context: Developments in cloud computing have made it attractive for consumers
to migrate their applications to the cloud environment. However, in the crowded
cloud market, application customers and providers face the problem of how to
assess and choose appropriate service providers for migrating their applications
to the cloud.
Objective: The main goal of this systematic review to identify and classify the
current cloud migration optimization approaches. The ancillary goal is to
present a comparative evaluation of the existing optimization approaches to
application migration in cloud computing, in order to clarify the gaps in the
existing approaches and identify promising directions in future research.
Method: We performed a systematic review of the software engineering literature
between 2010 and 2014 to accomplish the objectives of the study.
Results: The use of the search string in databases resulted in the
identification of 1548 studies. After applying the inclusion and exclusion
criteria, the number of studies was reduced to 25 studies which were identified
as the primary studies. Five different approaches to exploiting the optimization
of application migration to the cloud were identified, namely,
architecture-based optimization, model-based optimization, tool-based
optimization, single objective optimization, and multi-objective optimization.
Conclusion: The study findings reveal an increased interested in optimization
approaches to migrating applications to the cloud in recent years. However,
cloud migration optimization approaches, including the architecture-based,
model-based, tool-based, single objective and multi-objective optimization
approaches, are still in the early stages of research and require more research
investigation. In addition, we found that the multi-objective optimization
approach provides the best solutions to multi-optimization problems and supports
decision-making, and thus requires a high level of research attention. Related
topics regarding service-level agreement violation, elasticity, and full
automation of cloud migration optimization also require future research
attention. |
Keywords: |
Application Migration, Optimization, Search-Based Software Engineering,
Systematic Literature Review |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN INTEGRATED THEORETICAL FRAMEWORK FOR CLOUD COMPUTING ADOPTION BY UNIVERSITIES
TECHNOLOGY TRANSFER OFFICEs (TTOs) |
Author: |
MAHSA BARADARAN ROHANI, AB. RAZAK CHE HUSSIN |
Abstract: |
Cloud Computing (CC) as a new phenomenon technology has become a significant
term in the world of information systems (IS). Adopting new technologies and
developing new systems as new strategies help organizations to gain competitive
advantage and become more efficient and productive. As cloud-based solutions
have many advantages for organizations it is valuable for them to understand the
determinants of cloud computing adoption. Organizations including
Technology-Transfer-Offices (TTOs) need to improve their business methods by
adopting CC. Despite the advantages of Cloud Computing, only a few studies have
examined CC adoption in the IS field and in particular there is no study in the
context of TTO. This paper aims to fill this gap by analyzing the determinants
of CC adoption by Malaysian TTOs. Many factors influence CC adoption. The aim of
this paper is to identify the factors and barriers which influence the adoption
of CC by TTOs. To assess the determinants of CC adoption by TTOs, researcher
proposed an integrated theoretical framework based on two theories of adoption:
the Diffusion of Innovations (DOI) theory and
Technology-Organization-Environment (TOE). |
Keywords: |
Cloud Computing, Adoption, Technology Transfer Office (TTO), Diffusion of
Innovations (DOI), Technology-Organization-Environment (TOE) |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
CHARACTERIZATION OF SOFT COMPACT SPACES BASED ON SOFT FILTER |
Author: |
PEI WANG, JIALI HE |
Abstract: |
In this paper, we define soft filter and maximal soft filter and give some
characterizations about them. Zorlutuna, Akdag, Min, Atmaca[2]introduced and
studied the notion of soft compact space. In particular, we investigate the soft
compact space based on soft filter and maximal soft filter and get some new
results.It provides theoretical supports for the development of the soft
topological spaces. |
Keywords: |
Soft Compact space, Soft Filter, Maximal Soft Filter, Soft Cluster Point , Soft
Set |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
RGB-D IMAGE BASED LANDMARK IDENTIFICATION FOR CORRIDOR COVERAGE NAVIGATION |
Author: |
MUHAMMAD FUAD, RUSDHIANTO EFFENDI A.K., DJOKO PURWANTO |
Abstract: |
Developing robotic coverage navigation system in straight corridor using only
one sensor, RGB-D camera, is a challanging problem. System must be able to
identify the landmarks that naturally exist in structured environment. This
ability is needed to provide the information about perimeters of workspace that
should be covered by robot in a single task at segmented area of corridor. Color
detection and distance estimation using RGB-D images are applied to identify
landmarks that found in corridor. Identification is calculated from salient
region that covered 0.125 of images area. Landmarks in range between 0.8 to 5.6
meters have successfully identified with accuracy 98.86%. |
Keywords: |
Coverage Navigation, RGB-D Images, Landmarks, Straight Corridor, Structured
Environment. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
DIGITAL REFERENCE SERVICES USING WEB SERVICES: OVERVIEW, DESIGN AND
SPECIFICATIONS |
Author: |
MAGAJI ZAINAB MUSA, M NORDIN A RAHMAN, JULAILY AIDA JUSOH |
Abstract: |
Digital reference service (DRS) is an emerging trend of traditional reference
service. Easily accessible digital reference service that provides real time
service to the patrons has become one of the necessities of the library
information systems. Implementing a networked synchronous digital reference
service by most libraries has become a difficult task. Web services on the other
hand allow interoperability between heterogeneous devices and applications
provided that they have conformed to the web services protocols. This paper
gives an overview of digital reference service and web services applications. It
uses questionnaires to make a survey in some university libraries so as to find
out the actual problems faced by patrons while using DRS and also to know the
specific requirements of the patrons. It provides a means of eradicating the
present problem of digital referencing in the libraries by proposing a model for
using web services technology in developing networked synchronous digital
reference services. The functional informal specifications of the proposed model
are also provided. |
Keywords: |
Digital, Reference, Web Services, Design, Specification, Library, Information
System. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
SPACE-EFFICIENT AND ACCURATE FORWARDING LOOP DETECTION METHOD USING BLOOM-FILTER
FOR FAST AND RELIABLE INTERNET ROUTING |
Author: |
GHADAH ALDABBAGH , HALABI HASBULLAH , KARAN VERMA , OMAIMAH BAMASAK |
Abstract: |
Link or router node failure in a network of Internet is a typical cause of
traffic congestion due to the developed forwarding loop at the router. This
failure has a significant impact on Internet performance, contributed from the
inability of the affected router to find alternative link/route in fast manner
and from the high probability of packet dropping during the attempt of
re-routing. The existing Internet approach in handling this issue is to use TTL
(time-to-live) of TCP/IP, by which a packet will be dropped whenever the TTL
timer expires. However, this approach was found inefficient due to long
convergence period. Hence, the effort now is to develop a faster re-routing
mechanism, by reducing the possibility of forwarding loop incidents for any
cases of link/node failures, whilst minimizing packet losses during the
convergence period. This work proposes a novel detection method for possible
forwarding loop incidents at a router with support of Bloom-filter. Bloom-filter
is a probabilistic data structure that helps to ensure the availability of an
item in a set, which never lead to false negative results, but may produce false
positive results. With this Bloom-filter-based method, link’s or node’s failure
information is attached at the packet header of a packet in a space-efficient
manner and to accurately detect for possible incidents of forwarding loop when
the packet is traversing through its route from source to destination. If the
possibility can be more accurately detected, then packets losses can be
minimized to very least during the convergence period and hence, fast and
reliable routing shall be achieved. Through simulations, it was found that the
proposed method of BF-k/2 has outperformed the other re-routing methods. It has
not only efficiently used the limited space of the packet header, but also
adaptively reducing the false positive probabilities for reliable routing. |
Keywords: |
Internet, Link/Node Failure, Forwarding Loop, Bloom-Filter. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
DESIGN AND OPTIMIZATION OF AN XML- BASED GRAMMATICAL STRUCTURE OF THE HOLY QURAN |
Author: |
AYOUB KADIM, AZZEDDINE LAZREK |
Abstract: |
The Holy Quran is considered one of the most studied books along the human
history. In fact, until now, scholars and researchers continue to treat it from
various specialties: Quranic jurisprudence, rhetoric, grammar, etc., what is
called the Quranic sciences. In the same way, we aim through this work to add a
new contribution by designing a model that can absorb and organize all the
information relating to the Quranic grammar. So, after studying Arabic grammar
and Quranic structure, we proposed a methodology to classify Arabic grammar
units and index Quranic elements to have an optimal and rich structure. The
proposed model is based on XML language for more flexibility and compatibility
with various systems and to more benefit from it in Quranic and Natural Language
Processing researches. And finally, we discuss contributions, limitations,
applications and prospects of this work. |
Keywords: |
Holy Quran, Quranic sciences, Arabic Language, Grammatical analysis, Natural
Language Processing, XML language |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
EMG FEATURES REDUCTION USING FUZZY C-MEANS CLUSTERING TECHNIQUE |
Author: |
M.H.JALI, N.I.E.JUSOH, M.N.M.NASIR, T.A.IZZUDDIN, M.F.BAHAROM |
Abstract: |
This paper illustrates the electromyography (EMG) features reduction for
classification by using Fuzzy C-Means Clustering (FCM) technique. There are two
types of EMG study which are diagnosis EMG and kinesiological EMG. The diagnosis
EMG is study about the characteristics of the motor unit action potential for
duration and amplitude while for the kinesiological EMG is about the movement
analysis of the muscle activity. This work will focus more on kinesionological
EMG that used two types of electrode which are surface electrode and fine wire.
The EMG signal is a measure of electrical current during the contraction of the
muscle. EMG classification is not an easy task due to the signal contains a lot
of uncertainties that leads to a high dimensional feature vector. The objective
of this work is to extract the time domain features from the EMG signal and to
perform the features reduction technique based on different pattern using FCM.
In this work, five subjects that use right hand as dominant and without previous
illness record are selected.The EMG signal is collected at the forearm muscle.
Then, the subjects will be asked to perform 5 different patterns which are
lateral, tripod, tip, power and extension..It is expected that FCM could perform
EMG features reduction for classifying the upper limb muscle based on the
different pattern perform. |
Keywords: |
Electromyography, Fuzzy C-Means Clustering, forearm muscle,
Classification,Pattern |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
DESIGN PROTOTYPE OF ROBOT EXPLORER TERRAIN NATURAL DISASTERS FOR MAINLAND FIELD |
Author: |
GIVA ANDRIANA MUTIARA, GITA INDAH HAPSARI |
Abstract: |
Nowadays, robots are used as alternatives tool to replace human activities in
various fields. The case of the evacuation of disaster victims is one of good
example where robots became one of the best choice because the heavy and
dangerous terrain that mostly appear at disaster area was proved to be harmful
and dangerous for humans operator. The idea of using robots is to become the
instrument that can be controlled remotely, over difficult terrain and provide
information for the evacuation team before taking further action. The robot used
is wheeled robot designed and controlled wirelessly by the joystick. Cruising
terrain information gathering is done using IP camera with wireless transmission
media. Camera catches are then displayed in a web application on a personal
computer (PC). Tests performed include testing the servo motor, servo motor
control is wireless, wireless transmission range, IP camera, transmitting
streaming video, and streaming video transmission range. The test results
indicate that the functionality of the motor and the camera has been in
accordance with the purpose only to be enhanced wireless coverage. |
Keywords: |
Robot explorer, field land, IP Camera, Wireless, Video Streaming |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
CASCADED IMAGE STEGANOGRAPHY TO INCREASE ROBUSTNESS AGAINTS ATTACK OF THE STEGO
IMAGE |
Author: |
E.I.H.UJIANTO, A.HARJOKO, R.WARDOYO, A.MOESRIAMI |
Abstract: |
Information hiding is the most important method in hiding secret information
from unauthorized party. The purpose of information hiding is to protect the
secret information. One of the method commonly used is steganography. In this
research, Cascaded Image Steganography based on spatial and tranformational
domain is proposed. This method utilizes two steganography algorithms and double
cover information hiding. There are two main processes which are encoding and
decoding. The encoding process consists of two steps which are Encoding level-1
and Encoding level-2. The decoding process also consists of two steps which are
Decoding level-1 and Decoding level-2. The robustness test is then performed
against stego image that undergo images processing operations such as filtering,
cropping, rotating, and compression. The results show that stego image undergoes
filtering has SNR value of 53.6361 dB indicating good picture quality and high
fidelity, whereas stego image undergoes JPEG compression has SNR value of
52.7693 dB indicating good picture quality and high fidelity. Image undergoes
rotating(-) has poor image quality indicating low fidelity level, whereas image
undergoes rotating(+) and cropping has unusable image quality indicating very
low fidelity level. The Cascaded Image Steganography method is more secure due
to the double cover information hiding. |
Keywords: |
Cascaded Image Steganography, Image, Encoding, Decoding, Picture Quality |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
PROPER NOUNS RECOGNITION IN ARABIC CRIME TEXT USING MACHINE LEARNING APPROACH |
Author: |
SUHAD AL-SHOUKRY, NAZLIA OMAR |
Abstract: |
Named Entity Recognition (NER) identifies proper nouns in a text and categorizes
it as a distinct kind of named entities. This function enables the extraction of
peoples name, locations, organizations, and currencies. Several research abound
in this area in Arabic NER is concerned. However, recognizing Arabic named
entities is challenging due to the complexity in the Arabic language. These
complexities are represented by non-existence of capitalization feature which
facilitates the process of NER. Furthermore, there is a lack of lexical corpora
that may include all the Arabic NEs. On other hand, most of the approaches that
have been proposed for Arabic NER were based on handcrafted rule-based methods
which can be laborious and time consuming. Therefore, this paper presents our
attempt at recognizing and extracting the most important named entities, such as
names of persons, locations, organizations, crime types, dates and times in
Arabic crime documents using the Decision Tree classifier and feature extraction
for crime dataset. The dataset consists of varying data sizes collected from
online resources and undergone multiple pre-processing tasks. Additionally, the
feature extraction task which includes POS tagging, keyword trigger, definite
articles and affixes has been performed. Furthermore the classifier will utilize
these features in order to classify the named entities. The results demonstrate
that the use of the Decision Tree (DT) yields good results in small size
datasets, but failed when the dataset is large in the case of the crime domain.
This is due to the difficulty of relevant keywords and features in such fields.
The best result for this experiment is 81.35% F-measure. |
Keywords: |
Natural language processing, Machine Learning, Decision Tree, Named entity
recognition, Arabic crime document. |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
APPLICATION INTEGRATION AND AUDIT CONTROL IN ORGNISATIONAL MERGER: CASE OF OMAN |
Author: |
SAQIB ALI, RAFI ASHRAFI AND SALIM AL BUSAIDI |
Abstract: |
Information and information systems are valuable assets of today’s organisation.
These organisations use various applications based on their needs. Whenever
there is a merger between two organisations, one of the biggest challenges is to
integrate and audit those applications in the merged organisations. This paper
reviews various application integration and audit frameworks, discusses their
limitation, and proposes an approach for the post-merger integration and audit
of the applications of the merged organisations. The approach is demonstrated
through the application of a case study of the merger among three organisations
in Oman. |
Keywords: |
Application, Business Process, Business Applications, Input Controls, Process
Controls, Output Controls, Information Security, IT Audit, IT Governance, Oman |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
TRAJECTORY TRACKING BASED ON ARM’S LENGTH VARIATION |
Author: |
YASAMEEN KAMIL N., D. HAZRY, KHAIRUNIZAM WAN, ZURADZMAN M. RAZLAN |
Abstract: |
Recent growth in scientific technology, integrated actuators and data processing
has made the improvement in Unmanned Aerial Vehicle (UAV), quadrotor; wholly
possible. In this paper, a description of a novel controlling and modeling
design of quadrotor based on the variation in the arm’s length with fixing the
motors speed. This design is performed by utilizing a stepper motor mounted
inside the fixed arm in order to increasing or decreasing the sliding arm which
leads to increasing or decreasing the total arms length according to the
required movement. A PD controller is used to stabilize the system performance
in altitude, attitude angle and position, a new mathematical model consequent
the proposed design. For the optimal selection of the arm’s length, a
mathematical expression is designed. A MATLAB code is adopted for the simulation
to study the stability of the quadrotor response according to the proposed
design and its performance in the trajectory tracking. |
Keywords: |
Arm’s length, PD controller, Quadrotor, Trajectory tracking, UAV |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
Title: |
END-TO-END SECURITY WITH IPSEC AND BIOMETRIC TECHNOLOGY IN VOIP OVER IPV6 |
Author: |
MOHD NAZRI ISMAIL, MOHD SHUKRAN, KAMARUZAMAN MASKAT, NORHATTA MOHD |
Abstract: |
Voice over Internet Protocol (VoIP) nowadays is the popular communication
technology. This paper is about adding face recognition as the biometric
authentication for VoIP architecture and added on the end-user workstation for
user login. We compare the VoIP performance on IPv6 and IPv4 LANs in presence in
difference uses of softphone codecs. Softphone is uses to making call and SIP
server at the voice gateway. The performance measures are jitter, packet loss,
delays and Mean Opinion Score (MOS). Together with this, Window 7 IPSec is added
to ensure end-to-end security through the implementation of VoIP architecture.
This paper divided into difference chapters. |
Keywords: |
VoIP; SIP; IPv4, IPv6, biometric, IPSec, LAN, softphone |
Source: |
Journal of Theoretical and Applied Information Technology
30th September 2015 -- Vol. 79. No. 3 -- 2015 |
Full
Text |
|
|
|