Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: Aluminum/Copper clad sheet has been fabricated using
asymmetric extrusion method, which caused severe shear deformation
between Al and Cu plate to easily bond to each other. Interfacial
microstructure and mechanical properties of Al/Cu clad were studied
by scanning electron microscope equipped with energy dispersive
X-ray detector, micro-hardness, and tension tests. The asymmetric
extrusion bonding was very effective to provide a good interface for
atoms diffusion during subsequent annealing. The strength of bonding
was higher with the increasing extrusion ratio.
Abstract: AAM (active appearance model) has been successfully
applied to face and facial feature localization. However, its performance is sensitive to initial parameter values. In this paper, we propose a two-stage AAM for robust face alignment, which first fits an
inner face-AAM model to the inner facial feature points of the face and then localizes the whole face and facial features by optimizing the
whole face-AAM model parameters. Experiments show that the proposed face alignment method using two-stage AAM is more reliable to the background and the head pose than the standard
AAM-based face alignment method.
Abstract: Compost manufacturing plants are one of units where
wastewater is produced in significantly large amounts. Wastewater
produced in these plants contains high amounts of substrate (organic
loads) and is classified as stringent waste which creates significant
pollution when discharged into the environment without treatment. A
compost production plant in the one of the Iran-s province treating
200 tons/day of waste is one of the most important environmental
pollutant operations in this zone. The main objectives of this paper
are to investigate the compost wastewater treatability in hybrid
anaerobic reactors with an upflow-downflow arrangement, to
determine the kinetic constants, and eventually to obtain an
appropriate mathematical model. After starting the hybrid anaerobic
reactor of the compost production plant, the average COD removal
rate efficiency was 95%.
Abstract: Single crystals of Magnesium alloys such as Mg-1Al,
Mg-1Zn-0.5Y, Mg-3Li, and AZ31 alloys were successfully fabricated in this study by employing the modified Bridgman method. Single
crystals of pure Mg were also made in this study. To determine the exact orientation of crystals, Laue back-reflection method and pole figure measurement were carried out on each single crystal. Dimensions of single crystals were 10 mm in diameter and 120 mm in
length. Hardness and compression tests were conducted and the results
revealed that hardness and the strength strongly depended on the
orientation. The closer to basal one the orientation was, the higher hardness and compressive strength were. The effect of alloying was
not higher than that of orientation. After compressive deformation of single crystals, the orientation of the crystals was found to rotate and to be parallel to the basal orientation.
Abstract: With a development of Hybrid Electric Vehicle(HEV),
A photovoltaic(PV) generation system is used for charging batteries in many cases. A dc/dc converter using PV power for a battery charger
requires a high efficiency. In this paper, A ZVS boost converter using the renewable energies for HEV charger is proposed. Through the theoretical analysis and experimental result, operation modes and characteristics of the proposed topology are verified.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: This paper proposes a method which reduces power consumption in single-error correcting, double error-detecting checker circuits that perform memory error correction code. Power is minimized with little or no impact on area and delay, using the degrees of freedom in selecting the parity check matrix of the error correcting codes. The genetic algorithm is employed to solve the non linear power optimization problem. The method is applied to two commonly used SEC-DED codes: standard Hamming and odd column weight Hsiao codes. Experiments were performed to show the performance of the proposed method.
Abstract: In this paper, we proposed the robust mobile object
detection method for light effect in the night street image block based
updating reference background model using block state analysis.
Experiment image is acquired sequence color video from steady
camera. When suddenly appeared artificial illumination, reference
background model update this information such as street light, sign
light. Generally natural illumination is change by temporal, but
artificial illumination is suddenly appearance. So in this paper for
exactly detect artificial illumination have 2 state process. First process
is compare difference between current image and reference
background by block based, it can know changed blocks. Second
process is difference between current image-s edge map and reference
background image-s edge map, it possible to estimate illumination at
any block. This information is possible to exactly detect object,
artificial illumination and it was generating reference background
more clearly. Block is classified by block-state analysis. Block-state
has a 4 state (i.e. transient, stationary, background, artificial
illumination). Fig. 1 is show characteristic of block-state respectively
[1]. Experimental results show that the presented approach works well
in the presence of illumination variance.
Abstract: After Apple's first introduction its smart phone, iPhone
in the end of 2009 in Korea, the number of Korean smarphone users
had been rapidly increasing so that the half of Korean population
became smart phone users as of February, 2012. Currently, smart
phones are positioned as a major digital media with powerful
influences in Korea. And, now, Koreans are leaning new information,
enjoying games and communicating other people every time and
everywhere. As smart phone devices' performances increased, the
number of usable services became more while adequate GUI
developments are required to implement various functions with smart
phones. The strategy to provide similar experiences on smart phones
through familiar features based on employment of existing media's
functions mostly contributed to smart phones' popularization in
connection with smart phone devices' iconic GUIs.
The spread of Smart phone increased mobile web accesses.
Therefore, the attempts to implement PC's web in the smart phone's
web are continuously made. The mobile web GUI provides familiar
experiences to users through designs adequately utilizing the smart
phone's GUIs. As the number of users familiarized to smart phones
and mobile web GUIs, opposite to reversed remediation from many
parts of PCs, PCs are starting to adapt smart phone GUIs.
This study defines this phenomenon as the reversed remediation,
and reviews the reversed remediation cases of Smart phone GUI'
characteristics of PCs. For this purpose, the established study issues
are as under:
· what is the reversed remediation?
· what are the smart phone GUI's characteristics?
· what kind of interrelationship exist s between the smart phone and
PC's web site?
It is meaningful in the forecast of the future GUI's change by
understanding of characteristics in the paradigm changes of PC and
smart phone's GUI designs. This also will be helpful to establish
strategies for digital devices' development and design.
Abstract: Wireless sensor networks are consisted of hundreds or
thousands of small sensors that have limited resources.
Energy-efficient techniques are the main issue of wireless sensor
networks. This paper proposes an energy efficient agent-based
framework in wireless sensor networks. We adopt biologically
inspired approaches for wireless sensor networks. Agent operates
automatically with their behavior policies as a gene. Agent aggregates
other agents to reduce communication and gives high priority to nodes
that have enough energy to communicate. Agent behavior policies are
optimized by genetic operation at the base station. Simulation results
show that our proposed framework increases the lifetime of each node.
Each agent selects a next-hop node with neighbor information and
behavior policies. Our proposed framework provides self-healing,
self-configuration, self-optimization properties to sensor nodes.
Abstract: The cables in a nuclear power plant are designed to be
used for about 40 years in safe operation environment. However, the
heat and radiation in the nuclear power plant causes the rapid
performance deterioration of cables in nuclear vessels and heat
exchangers, which requires cable lifetime estimation. The most
accurate method of estimating the cable lifetime is to evaluate the
cables in a laboratory. However, removing cables while the plant is
operating is not allowed because of its safety and cost. In this paper, a
robot system to estimate the cable lifetime in nuclear power plants is
developed and tested. The developed robot system can calculate a
modulus value to estimate the cable lifetime even when the nuclear
power plant is in operation.
Abstract: This paper presents a robust vehicle detection approach using Haar-like feature. It is possible to get a strong edge feature from this Haar-like feature. Therefore it is very effective to remove the shadow of a vehicle on the road. And we can detect the boundary of vehicles accurately. In the paper, the vehicle detection algorithm can be divided into two main steps. One is hypothesis generation, and the other is hypothesis verification. In the first step, it determines vehicle candidates using features such as a shadow, intensity, and vertical edge. And in the second step, it determines whether the candidate is a vehicle or not by using the symmetry of vehicle edge features. In this research, we can get the detection rate over 15 frames per second on our embedded system.
Abstract: The pulp and paper mill effluent is one of the high
polluting effluent amongst the effluents obtained from polluting
industries. All the available methods for treatment of pulp and paper
mill effluent have certain drawbacks. The coagulation is one of the
cheapest process for treatment of various organic effluents. Thus, the
removal of chemical oxygen demand (COD) and colour of paper mill
effluent is studied using coagulation process. The batch coagulation
process was performed using various coagulants like: aluminium
chloride, poly aluminium chloride and copper sulphate. The initial
pH of the effluent (Coagulation pH) has tremendous effect on COD
and colour removal. Poly aluminium chloride (PAC) as coagulant
reduced COD to 84 % and 92 % of colour was removed at an
optimum pH 5 and coagulant dose of 8 ml l-1. With aluminium
chloride at an optimum pH = 4 and coagulant dose of 5 g l-1, 74 %
COD and 86 % colour removal were observed. The results using
copper sulphate as coagulant (a less commercial coagulant) were
encouraging. At an optimum pH 6 and mass loading of 5 g l-1, 76 %
COD reduction and 78 % colour reduction were obtained. It was also
observed that after addition of coagulant, the pH of the effluent
decreases. The decrease in pH was highest for AlCl3, which was
followed by PAC and CuSO4. Significant amount of COD reductions
was obtained by coagulation process. Since the coagulation process
is the first stage for treatment of effluent and some of the coagulant
cations usually remain in the treated effluents. Thus, cation like
copper may be one of the good catalyst for second stage of treatment
process like wet oxidation. The copper has been found to be good
oxidation catalyst then iron and aluminum.
Abstract: Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.
Abstract: In terms of total online audience, newspapers are the most successful form of online content to date. The online audience for newspapers continues to demand higher-quality services, including personalized news services. News providers should be able to offer suitable users appropriate content. In this paper, a news article recommender system is suggested based on a user-s preference when he or she visits an Internet news site and reads the published articles. This system helps raise the user-s satisfaction, increase customer loyalty toward the content provider.
Abstract: The line sleeves on power transmission line connects
two conductors while the transmission line is constructing. However,
the line sleeves sometimes cause transmission line break down,
because the line sleeves are deteriorated and decayed by acid rain.
When the transmission line is broken, the economical loss is huge.
Therefore the line sleeves on power transmission lines should be
inspected periodically to prevent power failure. In this paper, Korea
Electric Power Research Institute reviewed several robots to inspect
line status and proposes a robot to inspect line sleeve by measuring
magnetic field on line sleeve. The developed inspection tool can
reliable to move along transmission line and overcome several
obstacles on transmission line. The developed system is also applied
on power transmission line and verified the efficiency of the robot.
Abstract: The intention of this lessons is to assess the probability
of optical coherence tomography (OCT) for biometric recognition.
The OCT is the foundation on an optical signal acquisition and
processing method and has the micrometer-resolution. In this study,
we used the porcine skin for verifying the abovementioned means. The
porcine tissue was sound acknowledged for structural and
immunohistochemical similarity with human skin, so it could be
suitable for pre-clinical trial as investigational specimen. For this
reason, it was tattooed by the tattoo machine with the tattoo-pigment.
We detected the pattern of the tattooed skin by the OCT according to
needle speed. The result was consistent with the histology images.
This result showed that the OCT was effective to examine the tattooed
skin section noninvasively. It might be available to identify
morphological changes inside the skin.
Abstract: High building constructions are increasing in south
beaches of the Caspian Sea because of tourist attractions and limitation of residential areas. According to saturated alluvial fields transfer of load from high structures to the soil by piles is inevitable.
In spite of most of these piles are under compression forces, tension piles are used in special conditions. Few studies have been conducted
because of the limited use of these piles. Tension capacity of openended pipe piles in full scale was tested in this study. The length of the bored piles was 420 up to 480 cm and all were in 120 cm
diameter. The results of testing 7 piles were compared with the results of relations given by researches.
Abstract: As an effort to promote wind power industry in Korea,
Korea South-East Power Corporation has been developing 22MW
YeungHeung wind farm consisting of nine 2 to 3MW wind turbines
supplied by three manufacturers. To maximize its availability and
reliability and to solve the difficulty of operating three kinds of
SCADA systems, Korea Electric Power Corporation has been
developing a condition monitoring system integrated with control
functions. This paper presents the developed condition monitoring
system and its application to YeungHeung wind test bed, and the
design of its control functions.