Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2016 International Conference on Frontiers of Information Technology (FIT)

19-21 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 74
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (11645 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s):xiv - xvi
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2016, Page(s):xvii - xxii
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Beyond Linear Control Approaches - Sliding Mode Control of Flexible Robotic Manipulator

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    Flexibility in robotic manipulators offers various benefits in terms of operational speed, power consumption, maneuverability, and weight. However, these advantages lead to complex controller design. This paper presents two laws, nonlinear sliding mode control (SMC) and linear quadratic regulator (LQR) for addressing the control problem of flexible joint manipulator. The aim is to accurately track... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive 3D-Virtual Learning Environments: From Students' Learning Perspective

    Publication Year: 2016, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    Adaptive 3D-Virtual Learning Environments (3D-VLEs) have the ability to dynamically change its contents according to the learning goals of each student which result in improved learning. This paper presents a new idea of horizontal transition inside adaptive 3D-VLEs. Using the proposed approach, same teaching concept is presented with more examples and learning material which help students underst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Controller Design for Self-Balancing Two-Wheeled Robot System

    Publication Year: 2016, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    In this paper an optimal controller is designed for a self-balancing two-wheeled robot system based on the robust Model Predictive Control (MPC) scheme. The MPC controller computes the trajectory of the manipulated variable in order to optimize the behavior of the system future output. A limited time window is used for the optimization described by the length of time and initial time. By minimizin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coverage Control Algorithm for Node Scheduling in Wireless Sensor Networks

    Publication Year: 2016, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (614 KB) | HTML iconHTML

    A large number of wireless sensor nodes (SNs) are usually deployed in a remote area, where these nodes accurately monitor the environment and communicate the data collected by the SNs, to a central processing station wirelessly. Since the SNs are powered by batteries, therefore, to prolong the network operating life, they must utilize energy efficiently. In this paper, we propose a method to contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics

    Publication Year: 2016, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    In this paper we propose an ontology-based framework for the Internet of Things (IoT) to safeguard against Advanced Persistent Threats (APTs). The framework grasps the understanding of attack kill-chain, leveraged attack patterns and vulnerabilities and aligns them with network semantics to gauge their applicability on IoT systems. Followed by that, it automatically infers efficient solutions for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Enhancement of LEON3 Processor for Real Time and Feedback Applications

    Publication Year: 2016, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    The trade-off between performance and power consumptionfor dynamic and complex applications is inevitable andis considered as a key design challenge for system architects. Performance statistics for hard real time systems must be readilyavailable for a feedback system, specifically for reconfigurablearchitectures. The feedback in terms of performance statisticscan be useful for run-time reconfigur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ANN-Based Data Mining for Better Resource Management in the Next Generation Wireless Networks

    Publication Year: 2016, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    The recent years have witnessed a sharp increase in the use of smart phones for internet applications, video calling, social networking and emails, etc. resulting in an unprecedented increase in the worldwide wireless network traffic. During the deployment of the wireless network topologies the prime focus has to be given towards the requirement for the bandwidth, user capacities and provision of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud to Cloudlet - An Intelligent Recommendation System for Efficient Resources Management: Mobile Cache

    Publication Year: 2016, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Mobile devices are gaining impact in last few years due to their versatility of platform to run various types of applications. Over the years, the storage of mobile devices is increased but still it cannot fulfill all users requirements. Most of the times, users faced limited memory issues on mobile devices, therefore to free up space users often delete files abruptly without considering the usage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching and Learning Object-Oriented Analysis and Design with 3D Game

    Publication Year: 2016, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    Game based-learning methods are largely adopted in many academic fields. The multi-dimensional virtual reality based learning games help the learners to understand the problem dynamics effectively and to construct optimal solutions for them. This shows that games help learners in problem solving and enhancing their performance. Still the implementation of game-based learning is new to software eng... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression Test Suite Optimization Using Adaptive Neuro Fuzzy Inference System

    Publication Year: 2016, Page(s):52 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    Regression testing is an important activity performed to ensure thatchanges in the baseline version of the system do not influence thealready tested part of the system. It becomes difficult to run the entiretest suite due to constrained or limited resources. A subset of test casesthat is as efficient as the original test suite is searched as optimal suite.Computational intelligence approaches has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Test Patterns for Cloud Applications

    Publication Year: 2016, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    Software testing is an important aspect for the quality of software. Different levels of experience, types of application and needs enforce differences in performing testing activity for same features of applications. Testing as an activity within a development house usually includes testing of recurrent situation e.g., testing of security features etc. Development of a homogeneous test ground req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Addiction Impacts on Time Management That Results in Poor Academic Performance

    Publication Year: 2016, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    Internet addiction also called as "internet dependency" is a disorder related to excessive or poorly controlled preoccupations regarding computer use and internet access. Although the advantages of internet are undeniable, however, from the pathological perspective its excessive usage is creating disturbances not only in family and relationships but also in health, academics and memory recall in u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Admission Criteria in Pakistani Universities: A Case Study

    Publication Year: 2016, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Since the performance of educational institutions depends critically on their students, it is imperative that educational institutions deploy an efficient and reliable admission criteria. In the context of Pakistan, a variety of admission criteria has been developed-mostly in isolation-by different universities. Despite the importance of these admission criteria, limited systematic information exi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search

    Publication Year: 2016, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    Web Search Engines allow the user to retrieve data from the Internet using search query. WSEs maintain search query log to improve the result quality by retrieving personalized search result. WSE are known to sell query log related data to the marketing organizations for boosting revenues, which poses a threat to user privacy. Private web search is a concept in which the user gets data from the In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving the Taxonomy Based on Hierarchical Clustering Approach

    Publication Year: 2016, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Taxonomy is an effective mean of organizing, managing and accessing large amount of information available in today's digital world. However, data changes frequently in today's digitally connected world. Taxonomy needs to be evolved when underlying data set changes, otherwise, it could not represent the changed data set accurately. Many automatic techniques are available that are generating taxonom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Study of Discretization Methods on the Performance of Associative Classifiers

    Publication Year: 2016, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    In this article we investigate the effect of discretization Methods on the Performance of Associative Classifiers. Most of the classification approaches work on the dicretized databases. There are various approaches exploited for the discretizion of the database to compare the performance of the classifiers. The selection of the discretization method greatly influences the classification performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coin Recognition with Reduced Feature Set SIFT Algorithm Using Neural Network

    Publication Year: 2016, Page(s):93 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    Coin recognition is one of the prime important activities for modern banking and currency processing systems. These systems are widely used for coin sorting, automatic counting, and vending machines. The technique at the heart of such systems is object recognition in a digital image. Object classification and recognition is still one of the challenging research areas because we put our cognitive c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.