IJITCS Vol. 5, No. 3, Feb. 2013
Cover page and Table of Contents: PDF (size: 197KB)
REGULAR PAPERS
Almost estimators are designed for the white observation noise. In the estimation problems, rather than the white observation noise, there might be actual cases where the observation noise is colored. This paper, from the viewpoint of the innovation theory, based on the recursive least-squares (RLS) Wiener fixed-point smoother and filter for the colored observation noise, newly proposes the RLS Wiener fixed-interval smoothing algorithm in linear discrete-time wide-sense stationary stochastic systems. The observation y(k) is given as the sum of the signal z(k)=Hx(k) and the colored observation noise (v_c)(k). The RLS Wiener fixed-interval smoother uses the following information: (a) the system matrix for the state vector x(k); (b) the observation matrix H; (c) the variance of the state vector; (d) the system matrix for the colored observation noise (v_c)(k); (e) the variance of the colored observation noise; (f) the input noise variance in the state equation for the colored observation noise.
[...] Read more.For dozen years, computer vision becomes more popular, in which omnidirectional camera has a larger field of view and widely been used in many fields, such as: robot navigation, visual surveillance, virtual reality, three-dimensional reconstruction, and so on. Camera calibration is an essential step to obtain three-dimensional geometric information from a two-dimensional image. Meanwhile, the omnidirectional camera image has catadioptric distortion, which need to be corrected in many applications, thus the study of such camera calibration method has important theoretical significance and practical applications. This paper firstly introduces the research status of catadioptric omnidirectional imaging system; then the image formation process of catadioptric omnidirectional imaging system has been given; finally a simple classification of omnidirectional imaging method is given, and we discussed the advantages and disadvantages of these methods.
[...] Read more.The evolution of mobile devices, especially in these modern days, has drastically changed the face of business. A mobile phone device is often expected to offer computer-like functionality. These days, most mobile phone users find it somehow inconvenient to do some tasks using their computers. Most individuals prefer to change positions while sitting, stretching, and also feeling a bit more comfortable when browsing through their computers. It can be very impractical to be confined to the keyboard and mouse while sitting 5 or 10 feet from the computer. Hence, the proposed application is meant to turn the hand phone into a wireless keyboard and mouse with a touch-pad, through the wireless network. This prototype is proven to be able to perform most of the actions a normal computer keyboard and mouse can perform.
[...] Read more.Data mining plays an important role in collecting information to make businesses more competitive in present business world. It is seen that the location of any business outlet is a major factor of its success. Establishing different business enterprises include a detail study of localities, people's income status living in those areas, and many other non-spatial factors. This paper is one such idea to suggest those locations for entrepreneurs, based on which they can decide on the where they can setup their business outlet. The proposed algorithm makes use of Delaunay triangulation for capturing spatial proximity and Bezier curves are used to model obstacles. The algorithm is implemented as Web application, which accepts the name of a place and collects data, form clusters and show the feasible locations of the service specified, considering the geographic irregularities and man-made obstructions. In this algorithm, spatial and non-spatial data related to a location are collected and the spatial clustering algorithm is initiated which works based on the obtained data. Clusters are formed based on the unique characteristics of each location. The experimental results are conducted on many different locations of India and in this paper results are shown for three places namely, Mysuru, Patna and Mumbai. The results have shown expected and exciting results.
[...] Read more.Requirement engineering is an integral part of the software development lifecycle since the basis for developing successful software depends on comprehending its requirements in the first place. Requirement engineering involves a number of processes for gathering requirements in accordance with the needs and demands of users and stakeholders of the software product. In this paper, we have reviewed the prominent processes, tools and technologies used in the requirement gathering phase. The study is useful to perceive the current state of the affairs pertaining to the requirement engineering research and to understand the strengths and limitations of the existing requirement engineering techniques. The study also summarizes the best practices and how to use a blend of the requirement engineering techniques as an effective methodology to successfully conduct the requirement engineering task. The study also highlights the importance of security requirements as though they are part of the non-functional requirement, yet are naturally considered fundamental to secure software development.
[...] Read more.The massive increases in data have paved a path for distributed computing, which in turn can reduce the data processing time. Though there are various approaches in distributed computing, Hadoop is one of the most efficient among the existing ones. Hadoop consists of different elements out of which Map Reduce is a scalable tool that enables to process a huge data in parallel. We proposed a Novel and Efficient User Profile Characterization under distributed environment. In this frame work the network anomalies are detected by using Hadoop Map Reduce technique. The experimental results clearly show that the proposed technique shows better performance.
[...] Read more.A novel circuit for linearization of thermocouple signals using Analog – to – Digital converter (ADC) is proposed. The present method utilizes the ratio metric property of ADCs and the converter performs analog to digital conversion as well as linearization. The resulting circuit also has provision for scaling the linearized digital output to obtain a desired full-scale value. Computational studies carried out on the proposed method gives satisfactory results for thermocouples with monotonic concave upward and downward characteristics.
[...] Read more.A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.
[...] Read more.The proposed framework shows the customized approach that improves the software development process by using the Agile techniques. The proposed research work blends the CMMI practices according to Agile methods of development (specially Scrum, because Scrum is extremely used by Pakistani firms)
CMMI is a model for the process improvement within organization, but it is too expensive to implement all practices of CMMI for each level. So for small size organizations, at level 2, 3 there are some practices which are helpful in managing and defining their software development process. By implementing the proposed framework, organizations can improve their maturity and capability level.
There are several problems while working on Agile, many management areas can be neglected. In SCXTREME there are eight process area selected from CMMI and fit them according to Agile, so agile can be suitable for Pakistani organization by implementing some process area at level 2 and level 3.
Electronic passports (e-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper consider only those passport scenarios whose passport protocols base on public-key cryptography, certificates, and a public key infrastructure without addressing the protocols itself detailed, but this is no strong constraint. Furthermore assume the potential passport applier to use ordinary PCs with Windows or Linux software and an arbitrary connection to the Internet. Technological securities issues are to be found in several dimension, but below paper focus on hardware, software, and infrastructure as some of the most critical issues.
[...] Read more.