Sciweavers

153
Voted
IJACTAICIT
2010
237views more  IJACTAICIT 2010»
15 years 22 days ago
Path Planning of Mobile Robot Based on Modification of Vector Field Histogram using Neuro-Fuzzy Algorithm
In this paper, a neuro-fuzzy algorithm has been implemented to improve the path planning of a mobile robot based on modification of vector field histogram (VFH) approach using neu...
Ali H. Hamad, Fatima B. Ibrahim
127
Voted
IJACTAICIT
2010
175views more  IJACTAICIT 2010»
15 years 22 days ago
Achieving CMMI Maturity Level 3 by Implementing FEAF Reference Models
The basic purpose of an Enterprise Architecture project is creating integrity among different enterprise components, including processes, systems, technologies, and etc. While CMM...
Fatemeh Kafili Kasmaee, Ramin Nassiri, Gholamreza ...
128
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 22 days ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
15 years 22 days ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
139
Voted
IJACTAICIT
2010
155views more  IJACTAICIT 2010»
15 years 22 days ago
Constructive Dynamic Program Slicing Research
Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the ...
Jaakko Korpi, Jussi Koskinen
120
Voted
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
15 years 22 days ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
IJACTAICIT
2010
549views more  IJACTAICIT 2010»
15 years 22 days ago
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
The MTS-88.c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembl...
Omar Walid Abdul-Wahab, Wameedh Nazar Flayyih
IJACTAICIT
2010
200views more  IJACTAICIT 2010»
15 years 22 days ago
An Intelligent Framework for Natural Object Identification in Images
Human superiority over computers in identifying natural objects like clouds, water, grass etc. comes from two capabilities: the capability to maintain a growing knowledge base per...
Aasia Khanum
105
Voted
IJACTAICIT
2010
95views more  IJACTAICIT 2010»
15 years 22 days ago
Expert System Design of Two Electrostatic Lenses Column by Mixing Dynamic Programming and AI Techniques
This paper have shown an expert system design by using optimization methods for the Focused ion beam FIB optical system, by mixing the dynamic programming procedure and artificial...
Fadhil A. Ali
IJACTAICIT
2010
136views more  IJACTAICIT 2010»
15 years 22 days ago
Performance Enhancement of Wireless Communication Systems using Transmit and Receive diversity
In this paper, we describe the concatenation of Turbo/Convolutional codes with transmit and receive diversity schemes by using Space-Time Block Code. It is shown that, by using tw...
Ahmed J. Jameel