Sciweavers

IJACTAICIT
2010
237views more  IJACTAICIT 2010»
13 years 2 months ago
Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm
In this paper, a neuro-fuzzy algorithm has been implemented to improve the path planning of a mobile robot based on modification of vector field histogram (VFH) approach using neu...
Ali H. Hamad, Fatima B. Ibrahim
IJACTAICIT
2010
175views more  IJACTAICIT 2010»
13 years 2 months ago
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models
The basic purpose of an Enterprise Architecture project is creating integrity among different enterprise components, including processes, systems, technologies, and etc. While CMM...
Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza ...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 2 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 2 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
IJACTAICIT
2010
155views more  IJACTAICIT 2010»
13 years 2 months ago
Constructive Dynamic Program Slicing Research
Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the ...
Jaakko Korpi, Jussi Koskinen
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
13 years 2 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
IJACTAICIT
2010
549views more  IJACTAICIT 2010»
13 years 2 months ago
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
The MTS-88.c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembl...
Omar Walid Abdul-Wahab, Wameedh Nazar Flayyih
IJACTAICIT
2010
200views more  IJACTAICIT 2010»
13 years 2 months ago
An Intelligent Framework for Natural Object Identification in Images
Human superiority over computers in identifying natural objects like clouds, water, grass etc. comes from two capabilities: the capability to maintain a growing knowledge base per...
Aasia Khanum
IJACTAICIT
2010
95views more  IJACTAICIT 2010»
13 years 2 months ago
Expert System Design of Two Electrostatic Lenses Column by Mixing Dynamic Programming and AI Techniques
This paper have shown an expert system design by using optimization methods for the Focused ion beam FIB optical system, by mixing the dynamic programming procedure and artificial...
Fadhil A. Ali
IJACTAICIT
2010
136views more  IJACTAICIT 2010»
13 years 2 months ago
Performance Enhancement of Wireless Communication Systems using Transmit and Receive diversity
In this paper, we describe the concatenation of Turbo/Convolutional codes with transmit and receive diversity schemes by using Space-Time Block Code. It is shown that, by using tw...
Ahmed J. Jameel