Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
FIT
FIT 2016
Generate Citations
2016 International Conference on Frontiers of Information Technology (FIT)
Dec. 19 2016 to Dec. 21 2016
Islamabad, Pakistan
Table of Contents
Cover page
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
Copyright page
Full-text access may be available. Sign in or learn about subscription options.
pp. i-i
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Preface
Full-text access may be available. Sign in or learn about subscription options.
pp. ii-ii
ICSET 2016 committee
Full-text access may be available. Sign in or learn about subscription options.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
ICSET 2016 reviewers
Full-text access may be available. Sign in or learn about subscription options.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xi
Table of contents
Full-text access may be available. Sign in or learn about subscription options.
pp. v-vii
Preface
Freely available from IEEE.
pp. xii-xiii
Performance comparison of multimedia applicationsover IPv4 and IPv6Dual stack technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ummi Suraya Shaharuddin
,
Ruhani Ab Rahman
,
Murizah Kassim
,
Mat Ikram Yusof
Conference Organization
Freely available from IEEE.
pp. xiv-xvi
Performance comparison analysis of E2E Dual-Stack IP protocol method over wired and Wi-Fi broadband access
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Wan Mohd Nazmin Wan Mahmud
,
Ruhani Ab Rahman
,
Murizah Kassim
,
Mat Ikram Yusof
Reviewers
Freely available from IEEE.
pp. xvii-xxii
FPGA implementation of template matching using binary sum of absolute difference
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-17
by
Aditya Rachman Putra
,
Fadhil Mochammad
,
Hans Herdian
Beyond Linear Control Approaches - Sliding Mode Control of Flexible Robotic Manipulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Owais Khan
,
Ateeq Ur Rehman
,
Mahmood Pervaiz
Adaptive 3D-Virtual Learning Environments: From Students' Learning Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-10
by
Aftab Alam
,
Sehat Ullah
River water level prediction modelling for flood monitoring using NNARX
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-22
by
Fazlina Ahmat Ruslan
,
Abd Manan Samad
,
Ramli Adnan
A 3-hours river water level flood prediction model using NNARX with improves modelling strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-27
by
Ramli Adnan
,
Abd Manan Samad
,
Fazlina Ahmat Ruslan
Optimal Controller Design for Self-Balancing Two-Wheeled Robot System
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-16
by
Haris Sheh Zad
,
Abasin Ulasyar
,
Adil Zohaib
,
Syed Shahzad Hussain
Enhancement of image processing procedure for multiple UAV flying blocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Nazirah Md. Tarmizi
,
Abd Manan Samad
Coverage Control Algorithm for Node Scheduling in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-22
by
Muhammad Uzair Khan
,
Sarmad Feroze
,
Muhammad Zia
Stereo visual odometry system design on humanoid robot Nao
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-38
by
Jonathan Chandra
,
Ary Setijadi Prihatmanto
Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Mujahid Mohsin
,
Zahid Anwar
Comparison of Indonesian speaker recognition using vector quantization and Hidden Markov Model for unclear pronunciation problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-45
by
Devi Handaya
,
Hanif Fakhruroja
,
Egi Muhammad Idris Hidayat
,
Carmadi Machbub
Architectural Enhancement of LEON3 Processor for Real Time and Feedback Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Zohaib Najam
,
Muhammad Najam Dar
,
Muhammad Yasir Qadri
,
Shaheryar Najam
,
Jameel Ahmed
Water storage monitoring system with pH sensor for pharmaceutical plants
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-52
by
Mohd Adli Ikram Shahrulakram
,
Juliana Johari
ANN-Based Data Mining for Better Resource Management in the Next Generation Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-39
by
M. Ahsan Latif
,
M. Adnan
3 Hours flood water level prediction using NNARX structure: Case study Kuala Lumpur
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Fazlina Ahmat Ruslan
,
Abd Manan Samad
,
Ramli Adnan
Cloud to Cloudlet - An Intelligent Recommendation System for Efficient Resources Management: Mobile Cache
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Muhammad Haseeb
,
Ahmad Ahsan
,
Asad W. Malik
Manifold design for uniform fluid distribution in parallel microchannels
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Yusnira Husaini
,
Arnan Mitchell
,
Gary Rosengarten
,
Juliana Johari
Teaching and Learning Object-Oriented Analysis and Design with 3D Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-51
by
Irum Inayat
,
Zubaria Inayat
,
Rooh Ul Amin
Evaluating the quality of e-learning using consistent fuzzy preference relations method
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Emi Iryanti
,
Ridwan Pandiya
Regression Test Suite Optimization Using Adaptive Neuro Fuzzy Inference System
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-56
by
Aftab Ali Haider
,
Aamer Nadeem
,
Shamaila Akram
Design of drug-pregnancy alerting system to prevent harmful drug effect for pregnant women
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-71
by
Shella Arrum Wardhani
,
Richard Karel Willem Mengko
,
Agung Wahyu Setiawan
On Test Patterns for Cloud Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Sidra Siddiqui
,
Tamim Ahmed Khan
Design of TCP SYN Flood DDoS attack detection using artificial immune systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-76
by
Gilang Ramadhan
,
Yusuf Kurniawan
,
Chang-Soo Kim
Internet Addiction Impacts on Time Management That Results in Poor Academic Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Shafaq Siddiqi
,
Zulfiqar A. Memon
Data quality assurance for hybrid and panoramic scanners via self-calibration
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Mohd Azwan Abbas
,
Halim Setan
,
Zulkepli Majid
,
Albert K. Chong
,
Khairulnizam M. Idris
,
Mohd Farid Mohd Ariff
,
Anuar Aspuri
,
Lau Chong Luh
,
Abd Manan Samad
Admission Criteria in Pakistani Universities: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Zafar Iqbal
,
Junaid Qadir
,
Adnan Noor Mian
Design and implementation of web based real time chat interfacing server
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-87
by
Diotra Henriyan
,
Devie Pratama Subiyanti
,
Rizki Fauzian
,
Dian Anggraini
,
M. Vicky Ghani Aziz
,
Ary Setijadi Prihatmanto
Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Mohib Ullah
,
Rafiullah Khan
,
Muhammad Arshad Islam
Design and implementation of system prediction and traffic conditions visualization in two dimensional map (Case study: Bandung city)
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-91
by
Dian Anggraini
,
Wisnu Siswantoko
,
Diotra Henriyan
,
Devie Pratama Subiyanti
,
Mochamad Vicky Ghani Aziz
,
Ary Setijadi Prihatmanto
Evolving the Taxonomy Based on Hierarchical Clustering Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-86
by
Rabia Irfan
,
Sharifullah Khan
Security analysis testing for secure instant messaging in Android with study case: Telegram
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-96
by
Aditya Candra
,
Yusuf Kurniawan
,
Kyung-Hyune Rhee
Comparative Study of Discretization Methods on the Performance of Associative Classifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Zulfiqar Ali
,
Waseem Shahzad
Internet of Things using publish and subscribe method cloud-based application to NFT-based hydroponic system
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-104
by
Muhammad Agus Triawan
,
Hilwadi Hindersah
,
Desta Yolanda
,
Febrian Hadiatna
Coin Recognition with Reduced Feature Set SIFT Algorithm Using Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Ghulam Farooque
,
Allah Bux Sargano
,
Imran Shafi
,
Waqar Ali
Design and implementation of data logger using lossless data compression method for Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-108
by
Febrian Hadiatna
,
Hilwadi Hindersah
,
Desta Yolanda
,
Muhammad Agus Triawan
Computer Aided System for Leukocytes Classification and Segmentation in Blood Smear Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Muhammad Sajjad
,
Siraj Khan
,
Muhammad Shoaib
,
Hazrat Ali
,
Zahoor Jan
,
Khan Muhammad
,
Irfan Mehmood
Boosting the Accuracy of AdaBoost for Object Detection and Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
Zahid Mahmood
,
Muhammad Nazeer
,
Muhammad Arif
,
Imran Shahzad
,
Fahad Khan
,
Mazhar Ali
,
Uzair Khan
,
Samee U. Khan
Kalman filter and iterative-hungarian algorithm implementation for low complexity point tracking as part of fast multiple object tracking system
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-115
by
Bima Sahbani
,
Widyawardana Adiprawita
p2pHT: A Point to Point Hough Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-114
by
Muhammad Usman Karim Khan
,
Abdul Bais
Comparison study of neural network and deep neural network on repricing GAP prediction in Indonesian conventional public bank
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-122
by
Hendri Karisma
,
Dwi Hendratmo Widyantoro
A Pattern Reconfigurable Dielectric Resonator Antenna for Wireless Fidelity Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-119
by
Sajid Aqeel
,
Rizwan Khan
,
Aftab Ahmad Khan
,
Jawad Saleem
,
Owais
Traffic signs text recognition and error correction
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-127
by
Didit Andri Jatmiko
,
Ary S. Prihatmanto
Effective Classification of EEG Signals Using K-Nearest Neighbor Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-124
by
Umer I. Awan
,
U.H. Rajput
,
Ghazaal Syed
,
Rimsha Iqbal
,
Ifra Sabat
,
M. Mansoor
Comparison of prediction methods for moving objects in 3D coordinates using Kalman Filter and least square
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-131
by
Yoga S. Satriawan
,
Carmadi Machbub
,
Egi M. I. Hidayat
Analysis of Carrier Frequency Offset Distribution on Efficiency of Multicarrier Spread Spectrum Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-129
by
Kashif Iqbal
,
Junaid Ahmed
,
Atifa Rafique
Scenes categorization based on appears objects probability
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-136
by
Marzuki
,
Egi Muhamad Hidayat
,
Rinaldi Munir
,
P Ary Setijadi
,
Carmadi Machbub
Comparison of accuracy level K-Nearest Neighbor algorithm and support vector machine algorithm in classification water quality status
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
Amri Danades
,
Devie Pratama
,
Dian Anggraini
,
Diny Anggriani
A High Performance Real-Time FGPA-Based Interferometry Sensor Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-135
by
Tassadaq Hussain
,
Saqib Amin
,
Usman Zabit
,
Faysal Kamran
,
Olivier D. Bernal
,
Thierry Bosch
Data preparation step for automated diagnosis based on HRV analysis and machine learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-148
by
Vincentius Timothy
,
Ary Setijadi Prihatmanto
,
Kyung-Hyune Rhee
MPC and H-Infinity Based Feedback Control of Non-Linear Robotic Manipulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-141
by
Muhammad Imran Ullah
,
Syed Ali Ajwad
,
Muhammad Irfan
,
Jamshed Iqbal
A study on the stress identification using observed heart beat data
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-152
by
S.P.L. Aditya Pramanta
,
Ary Setijadi Prihatmanto
,
Man-Gon Park
Optimal Path Planning for Mobile Robots Using Memory Efficient A*
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-146
by
Iram Noreen
,
Amna Khan
,
Zulfiqar Habib
Implementation of real-time fuzzy logic control for NFT-based hydroponic system on Internet of Things environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-159
by
Desta Yolanda
,
Hilwadi Hindersah
,
Febrian Hadiatna
,
Muhammad Agus Triawan
Towards Formalism of Earthquake Detection and Disaster Reduction Using WSANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-152
by
Hamra Afzaal
,
Nazir Ahmad Zafar
Structure health monitoring using fourier transform and neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-162
by
A. Ihsan Auditia
,
Pranoto H. Rusmin
Analysis of Co-Channel Interference in VANETs under Nakagami-m Fading
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-158
by
Furqan Jameel
,
Farhana Jabeen
,
Zara Hamid
Multi Path Multi Priority (MPMP) Scalable Video Streaming for Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
Sajid Nazir
,
Mohammad Kaleem
Implementation of hazardous chemical gas monitoring system using unmanned aerial vehicle (UAV)
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-168
by
Fadhil Mochammad
,
Aditya Rachman Putra
,
Bambang Riyanto Trilaksono
On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Gul Zameen Khan
,
Ruben Gonzalez
,
Xin-Wen Wu
,
Eun-Chan Park
Preliminary result on gesture recognition of Sigeh Penguten Dance using Hidden Markov Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
Maria Shusanti Febrianti
,
Egi Hidayat
,
Aciek Ida Wuryandari
,
Ary Setijadi Prihatmanto
,
Carmadi Machbub
Understanding the Design Space of a Software Defined WiFi Network Testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-175
by
Tausif Zahid
,
Xiaojun Hei
,
Wenqing Cheng
Controls of BLDC motors in electric vehicle testing simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-178
by
Hanif F. Prasetyo
,
Arief S. Rohman
,
Farkhad I. Hariadi
,
Hilwadi Hindersah
A Simple, Fast and Near Optimal Approximation Algorithm for Optimization of Un-Weighted Minimum Vertex Cover
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-180
by
Muhammad Fayaz
,
Shakeel Arshad
,
Umar Zaman
,
Akhlaque Ahmad
Music generator with Markov Chain: A case study with Beatme Touchdown
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-183
by
Zaky Hassani
,
Aciek Ida Wuryandari
Transformation of Activity Diagram into Coloured Petri Nets Using Weighted Directed Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-186
by
Maryam Jamal
,
Nazir Ahmad Zafar
Design and implementation of walking pattern and trajectory compensator of NAO humanoid robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-188
by
Hilmi Fadli
,
Egi Hidayat
,
Carmadi Machbub
Modeling E-Business Customization with e3value Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-192
by
Faiza Allah Bukhsh
,
Patrício De Alencar Silva
Hardware-in-the-loop simulation of UAV Hexacopter for chemical hazard monitoring mission
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-193
by
Rendy Wandarosanza
,
Bambang Riyanto Trilaksono
,
Egi Hidayat
Concurrent Algorithms in SPIN Model Checker
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-198
by
M. Saqib Nawaz
,
Hussam Ali
,
M. Ikram Ullah Lali
Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-198
by
Ariana Tulus Purnomo
,
Yudi Satria Gondokaryono
,
Chang-Soo Kim
Cross Platform Bug Correlation Using Stack Traces
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Maryam Abdul Ghafoor
,
Junaid Haroon Siddiqui
Fast non-random chaff point generator for fuzzy vault biometric cryptosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-204
by
Annisa Istiqomah Arrahmah
,
Yudi Satria Gondokaryono
,
Kyung-Hyune Rhee
Test-Suite Prioritisation by Application Navigation Tree Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Muhammad Muzammal
BookOnt: A Comprehensive Book Structural Ontology for Book Search and Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Asim Ullah
,
Irfan Ullah
,
Shah Khusro
,
Shaukat Ali
Job Description Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Nabeel Ahmed
,
Sharifullah Khan
,
Khalid Latif
Mobile-Based Intelligent Transportation for Bus Commuters Based on Twitter Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Tariq Mahmood
,
Ghulam Mujtaba
,
Liyana Shuib
,
Nikkishah Zulfiqar Ali
,
Amir Bawa
,
Saima Karim
A Rough Set Based Feature Selection Approach Using Random Feature Vectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Muhammad Summair Raza
,
Usman Qamar
Author index
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-228
Ensemble Sparse Classification of Colon Cancer
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Saima Rathore
,
Muhammad Aksam Iftikhar
,
Mehdi Hassan
Crowd Video Classification Using Convolutional Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
Atika Burney
,
Tahir Q. Syed
Scene Completion Using Top-1 Similar Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-257
by
Romana Talat
,
Muhammad Muzammal
,
Imran Siddiqi
Using ANN for Multi-View Activity Recognition in Indoor Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-263
by
Shaheena Noor
,
Vali Uddin
THD Analysis of Reduced Switch Five Level Inverter Using Multicarrier PWM Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-268
by
Muhammad Arif
,
Madiha Sultan
,
Jawad Saleem
,
Abdul Majid
Analysis of HV Plasma Corona Reactor Treatment System for Industrial Waste Water
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Nayab Pervez
,
Abdur Rashid
,
Adil Habib Alam
Impact Quantification of Demand Response Uncertainty on Unit Commitment of Microgrids
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
Akhtar Hussain
,
Van-Hai Bui
,
Hak-Man Kim
Showing 100 out of 118
Load More
Load All