International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 5, No. 3, Feb. 2013

Cover page and Table of Contents: PDF (size: 197KB)

Table Of Contents

REGULAR PAPERS

RLS Wiener Smoother for Colored Observation Noise with Relation to Innovation Theory in Linear Discrete-Time Stochastic Systems

By Seiichi Nakamori

DOI: https://doi.org/10.5815/ijitcs.2013.03.01, Pub. Date: 8 Feb. 2013

Almost estimators are designed for the white observation noise. In the estimation problems, rather than the white observation noise, there might be actual cases where the observation noise is colored. This paper, from the viewpoint of the innovation theory, based on the recursive least-squares (RLS) Wiener fixed-point smoother and filter for the colored observation noise, newly proposes the RLS Wiener fixed-interval smoothing algorithm in linear discrete-time wide-sense stationary stochastic systems. The observation y(k) is given as the sum of the signal z(k)=Hx(k) and the colored observation noise (v_c)(k). The RLS Wiener fixed-interval smoother uses the following information: (a) the system matrix for the state vector x(k); (b) the observation matrix H; (c) the variance of the state vector; (d) the system matrix for the colored observation noise (v_c)(k); (e) the variance of the colored observation noise; (f) the input noise variance in the state equation for the colored observation noise.

[...] Read more.
A Survey of Catadioptric Omnidirectional Camera Calibration

By Yan Zhang Lina Zhao Wanbao Hu

DOI: https://doi.org/10.5815/ijitcs.2013.03.02, Pub. Date: 8 Feb. 2013

For dozen years, computer vision becomes more popular, in which omnidirectional camera has a larger field of view and widely been used in many fields, such as: robot navigation, visual surveillance, virtual reality, three-dimensional reconstruction, and so on. Camera calibration is an essential step to obtain three-dimensional geometric information from a two-dimensional image. Meanwhile, the omnidirectional camera image has catadioptric distortion, which need to be corrected in many applications, thus the study of such camera calibration method has important theoretical significance and practical applications. This paper firstly introduces the research status of catadioptric omnidirectional imaging system; then the image formation process of catadioptric omnidirectional imaging system has been given; finally a simple classification of omnidirectional imaging method is given, and we discussed the advantages and disadvantages of these methods.

[...] Read more.
A Mobile-Based Computer Controller via Android Technology

By Siew-Chin Chong Lee-Ying Chong Stephanie Bosede Ajiroba

DOI: https://doi.org/10.5815/ijitcs.2013.03.03, Pub. Date: 8 Feb. 2013

The evolution of mobile devices, especially in these modern days, has drastically changed the face of business. A mobile phone device is often expected to offer computer-like functionality. These days, most mobile phone users find it somehow inconvenient to do some tasks using their computers. Most individuals prefer to change positions while sitting, stretching, and also feeling a bit more comfortable when browsing through their computers. It can be very impractical to be confined to the keyboard and mouse while sitting 5 or 10 feet from the computer. Hence, the proposed application is meant to turn the hand phone into a wireless keyboard and mouse with a touch-pad, through the wireless network. This prototype is proven to be able to perform most of the actions a normal computer keyboard and mouse can perform.

[...] Read more.
Implementing Delaunay Triangles and Bezier Curves to Identify Suitable Business Locations in the Presence of Obstacles

By Tejas Pattabhi Arti Arya Pradyumna N Swati Singh Sukanya D

DOI: https://doi.org/10.5815/ijitcs.2013.03.04, Pub. Date: 8 Feb. 2013

Data mining plays an important role in collecting information to make businesses more competitive in present business world. It is seen that the location of any business outlet is a major factor of its success. Establishing different business enterprises include a detail study of localities, people's income status living in those areas, and many other non-spatial factors. This paper is one such idea to suggest those locations for entrepreneurs, based on which they can decide on the where they can setup their business outlet. The proposed algorithm makes use of Delaunay triangulation for capturing spatial proximity and Bezier curves are used to model obstacles. The algorithm is implemented as Web application, which accepts the name of a place and collects data, form clusters and show the feasible locations of the service specified, considering the geographic irregularities and man-made obstructions. In this algorithm, spatial and non-spatial data related to a location are collected and the spatial clustering algorithm is initiated which works based on the obtained data. Clusters are formed based on the unique characteristics of each location. The experimental results are conducted on many different locations of India and in this paper results are shown for three places namely, Mysuru, Patna and Mumbai. The results have shown expected and exciting results.

[...] Read more.
Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies

By Tousif ur Rehman Muhammad Naeem Ahmed Khan Naveed Riaz

DOI: https://doi.org/10.5815/ijitcs.2013.03.05, Pub. Date: 8 Feb. 2013

Requirement engineering is an integral part of the software development lifecycle since the basis for developing successful software depends on comprehending its requirements in the first place. Requirement engineering involves a number of processes for gathering requirements in accordance with the needs and demands of users and stakeholders of the software product. In this paper, we have reviewed the prominent processes, tools and technologies used in the requirement gathering phase. The study is useful to perceive the current state of the affairs pertaining to the requirement engineering research and to understand the strengths and limitations of the existing requirement engineering techniques. The study also summarizes the best practices and how to use a blend of the requirement engineering techniques as an effective methodology to successfully conduct the requirement engineering task. The study also highlights the importance of security requirements as though they are part of the non-functional requirement, yet are naturally considered fundamental to secure software development.

[...] Read more.
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce

By P. Srinivasa Rao K. Thammi Reddy MHM. Krishna Prasad

DOI: https://doi.org/10.5815/ijitcs.2013.03.06, Pub. Date: 8 Feb. 2013

The massive increases in data have paved a path for distributed computing, which in turn can reduce the data processing time. Though there are various approaches in distributed computing, Hadoop is one of the most efficient among the existing ones. Hadoop consists of different elements out of which Map Reduce is a scalable tool that enables to process a huge data in parallel. We proposed a Novel and Efficient User Profile Characterization under distributed environment. In this frame work the network anomalies are detected by using Hadoop Map Reduce technique. The experimental results clearly show that the proposed technique shows better performance.

[...] Read more.
A Novel Circuit forThermocouple Signals Linearization Using AD Converter

By Ayman A. Aly Aly S. Abo El-Lail

DOI: https://doi.org/10.5815/ijitcs.2013.03.07, Pub. Date: 8 Feb. 2013

A novel circuit for linearization of thermocouple signals using Analog – to – Digital converter (ADC) is proposed. The present method utilizes the ratio metric property of ADCs and the converter performs analog to digital conversion as well as linearization. The resulting circuit also has provision for scaling the linearized digital output to obtain a desired full-scale value. Computational studies carried out on the proposed method gives satisfactory results for thermocouples with monotonic concave upward and downward characteristics.

[...] Read more.
Comparison of on Demand Routing Protocols

By Bharat Bhushan Shailender Gupta C.K.Nagpal

DOI: https://doi.org/10.5815/ijitcs.2013.03.08, Pub. Date: 8 Feb. 2013

A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

[...] Read more.
SCXTREME Framework: A Customized Approach of Process Improvements in Agile Blend with CMMI Practices in Pakistan

By Samina Jan Engr Ali Javed

DOI: https://doi.org/10.5815/ijitcs.2013.03.09, Pub. Date: 8 Feb. 2013

The proposed framework shows the customized approach that improves the software development process by using the Agile techniques. The proposed research work blends the CMMI practices according to Agile methods of development (specially Scrum, because Scrum is extremely used by Pakistani firms)
CMMI is a model for the process improvement within organization, but it is too expensive to implement all practices of CMMI for each level. So for small size organizations, at level 2, 3 there are some practices which are helpful in managing and defining their software development process. By implementing the proposed framework, organizations can improve their maturity and capability level.
There are several problems while working on Agile, many management areas can be neglected. In SCXTREME there are eight process area selected from CMMI and fit them according to Agile, so agile can be suitable for Pakistani organization by implementing some process area at level 2 and level 3.

[...] Read more.
Internet Passport Authentication System Using Multiple Biometric Identification Technology

By V.K. Narendira Kumar B. Srinivasan

DOI: https://doi.org/10.5815/ijitcs.2013.03.10, Pub. Date: 8 Feb. 2013

Electronic passports (e-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper consider only those passport scenarios whose passport protocols base on public-key cryptography, certificates, and a public key infrastructure without addressing the protocols itself detailed, but this is no strong constraint. Furthermore assume the potential passport applier to use ordinary PCs with Windows or Linux software and an arbitrary connection to the Internet. Technological securities issues are to be found in several dimension, but below paper focus on hardware, software, and infrastructure as some of the most critical issues.

[...] Read more.