Abstract: Today, canines are still used effectively in acceleration detection situation. However, this method is becoming impractical in modern age and a new automated replacement to the canine is required. This paper reports the design of an innovative accelerant detector. Designing an accelerant detector is a long process as is any design process; therefore, a solution to the need for a mobile, effective accelerant detector is hereby presented. The device is simple and efficient to ensure that any accelerant detection can be conducted quickly and easily. The design utilizes Ultra Violet (UV) light to detect the accelerant. When the UV light shines on an accelerant, the hydrocarbons in the accelerant emit florescence. The advantages of using the UV light to detect accelerant are also outlined in this paper. The mobility of the device is achieved by using a Direct Current (DC) motor to run tank tracks. Tank tracks were chosen as to ensure that the device will be mobile in the rough terrain of a fire site. The materials selected for the various parts are also presented. A Solid Works Simulation was also conducted on the stresses in the shafts and the results are presented. This design is an innovative solution which offers a user friendly interface. The design is also environmentally friendly, ecologically sound and safe to use.
Abstract: Supplier appraisal fosters energy in Supply Chain
Management and helps in best optimization of viable business
partners for a company. Many Decision Making techniques have
already been proposed by researchers for supplier-s appraisal.
However, Analytic Hierarchy Process (AHP) is assumed to be the
most structured technique to attain near-best solution of the problem.
This paper focuses at implementation of AHP in the procurement
processes. It also suggests that on what factors a Public Sector
Enterprises must focus while dealing with their suppliers and what
should the suppliers do to synchronize their activities with the
strategic objectives of Organization. It also highlights the weak areas
in supplier appraisal process with a view to suggest viable
recommendations.
Abstract: Image watermarking has become an important tool for
intellectual property protection and authentication. In this paper a
watermarking technique is suggested that incorporates two
watermarks in a host image for improved protection and robustness.
A watermark, in form of a PN sequence (will be called the secondary
watermark), is embedded in the wavelet domain of a primary
watermark before being embedded in the host image. The technique
has been tested using Lena image as a host and the camera man as
the primary watermark. The embedded PN sequence was detectable
through correlation among other five sequences where a PSNR of
44.1065 dB was measured. Furthermore, to test the robustness of the
technique, the watermarked image was exposed to four types of
attacks, namely compression, low pass filtering, salt and pepper noise
and luminance change. In all cases the secondary watermark was
easy to detect even when the primary one is severely distorted.
Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: One of the most growing areas in the embedded community is multimedia devices. Multimedia devices incorporate a number of complicated functions for their operation, like motion estimation. A multitude of different implementations have been proposed to reduce motion estimation complexity, such as spiral search. We have studied the implementations of spiral search and identified areas of improvement. We propose a modified spiral search algorithm, with lower computational complexity compared to the original spiral search. We have implemented our algorithm on an embedded ARM based architecture, with custom memory hierarchy. The resulting system yields energy consumption reduction up to 64% and performance increase up to 77%, with a small penalty of 2.3 dB, in average, of video quality compared with the original spiral search algorithm.
Abstract: This paper compares the recent transformerless ACDC
power converter architectures and provides an assessment of
each. A prototype of one of the transformerless AC-DC converter
architecture is also presented depicting the feasibility of a small form
factor, power supply design. In this paper component selection
guidelines to achieve high efficiency AC-DC power conversion are
also discussed.
Abstract: Neoclassical and functionalist explanations of self
organization in multiagent systems have been criticized on several accounts including unrealistic explication of overadapted agents and
failure to resolve problems of externality. The paper outlines a more
elaborate and dynamic model that is capable of resolving these dilemmas. An illustrative example where behavioral diversity is
cobred in a repeated nonzero sum task via evolutionary computing is
presented.
Abstract: A study of the H-beam's nanosize structure phase
states after thermomechanical strengthening was carried out by TEM.
The following processes were analyzed. 1. The dispersing of the
cementite plates by cutting them by moving dislocations. 2. The
dissolution of cementite plates and repeated precipitation of the
cementite particles on the dislocations, the boundaries, subgrains and
grains. 3. The decay of solid solution of carbon in the α-iron after
"self-tempering" of martensite. 4. The final transformation of the
retained austenite in beinite with α-iron particles and cementite
formation. 5. The implementation of the diffusion mechanism of γ ⇒
α transformation.
Abstract: This research focuses on micro-enterprise of
Malaysian Malays that are involved in very small-scaled business
activities. Among them include food stall and burger stall operators,
night market hawkers, grocery store operators as well as construction
and small service activities works. The study seeks to explore why
some micro-entrepreneurs still lag in entrepreneurship and what
needs to be rectified. This quantitative study is conducted on 173
Malay micro-enterprise owners (MEOs) and 58 Malay failed microenterprise
owners (FMEOs) involved in all range of businesses
throughout the state of Perak, Malaysia. The main aims are to
identify the gaps between the failed micro-enterprise owners
(FMEOs) and existing micro-enterprise owners (MEOs) and the
problems faced among FMEOs. The results reveal that the MEOs had
strong motivations and better marketing approaches as compared to
FMEOs. Furthermore, the FMEOs failed in the business ventures
mainly due to lack of management, sales and marketing skills and
poor competitive abilities to keep up with rivals.
Abstract: The cellular network is one of the emerging areas of
communication, in which the mobile nodes act as member for one
base station. The cluster based communication is now an emerging
area of wireless cellular multimedia networks. The cluster renders
fast communication and also a convenient way to work with
connectivity. In our scheme we have proposed an optimization
technique for the fuzzy cluster nodes, by categorizing the group
members into three categories like long refreshable member, medium
refreshable member and short refreshable member. By considering
long refreshable nodes as static nodes, we compute the new
membership values for the other nodes in the cluster. We compare
their previous and present membership value with the threshold value
to categorize them into three different members. By which, we
optimize the nodes in the fuzzy clusters. The simulation results show
that there is reduction in the cluster computational time and
iterational time after optimization.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: With the demand of mobility by users, wireless
technologies have become the hotspot developing arena. Internet
Engineering Task Force (IETF) working group has developed Mobile
IP to support node mobility. The concept of node mobility indicates
that in spite of the movement of the node, it is still connected to the
internet and all the data transactions are preserved. It provides
location-independent access to Internet. After the incorporation of
host mobility, network mobility has undergone intense research.
There are several intricacies faced in the real world implementation
of network mobility significantly the problem of nested networks and
their consequences. This article is concerned regarding a problem of
nested network called pinball route problem and proposes a solution
to eliminate the above problem. The proposed mechanism is
implemented using NS2 simulation tool and it is found that the
proposed mechanism efficiently reduces the overload caused by the
pinball route problem.
Abstract: This paper describes a novel method for automatic
estimation of the contours of weld defect in radiography images.
Generally, the contour detection is the first operation which we apply
in the visual recognition system. Our approach can be described as a
region based maximum likelihood formulation of parametric
deformable contours. This formulation provides robustness against
the poor image quality, and allows simultaneous estimation of the
contour parameters together with other parameters of the model.
Implementation is performed by a deterministic iterative algorithm
with minimal user intervention. Results testify for the very good
performance of the approach especially in synthetic weld defect
images.
Abstract: Staphylococcus aureus, one of the microflora in a
human external auditory canal (EAC) is frequently exposed to highfrequency
electromagnetic field (HF-EMF) generated by mobile
phones. It is normally non-pathogenic but in certain circumstances, it
can cause infections. This study investigates the changes in the
physiology of S. aureus when exposed to HF-EMF of a mobile
phone. Exponentially grown S. aureus were exposed to two
conditions of EMF irradiation (standby-mode and on-call mode) at
four durations; 15, 30, 45 and 60 min. Changes in the viability and
biofilm production of the S. aureus were compared between the two
conditions of exposure. EMF from the standby-mode has enhanced
the growth of S. aureus but during on-call, the growth was
suppressed. No significant difference in the amount of biofilm
produced in both modes of exposure was observed. Thus, HF-EMF
of mobile phone affects the viability of S. aureus but not its ability to
produce biofilm.
Abstract: In the meat processing industry the substitution of
meat with non-meat ingredients is considered an important strategy
for reducing overall production costs. The main purpose of the
current research was to evaluate differences in physical-chemical
composition of cooked sausage with different legumes additions.
Peas (Pisum sativum), beans (Phaseolus vulgaris) and lentil (Lens
culinaris) were used in preparation of sausages. The legumes at
proportion of 20% of the total weight of meat were added in
sausages. The whole ingredients were mixed, filled into casing,
compressed, cooked and cooled. After storage the samples were
sensory evaluated. The sensory evaluation was carried out using the
nine point hedonic scale and line scale. Sausages without legumes
flour was used as control sample. The main conclusion of the current
research the legumes flour can be successfully used for cooked
sausages production.
Abstract: This paper is concerned with an investigation into the
localized non-stability of a thin elastic orthotropic semi-infinite plate.
In this study, a semi-infinite plate, simply supported on two edges
and different boundary conditions, clamped, hinged, sliding contact
and free on the other edge, are considered. The mathematical model
is used and a general solution is presented the conditions under which
localized solutions exist are investigated.
Abstract: Micro power sources are required to be used in autonomous microelectromechanical system (MEMS). In this paper,
we designed and fabricated a three dimensional (3D) MEMS supercapacitor, which is consisting of conformal silicon
dioxide/titanium/polypyrrole (PPy) layers on silicon substrate. At first, ''through-structure'' was fabricated on the silicon substrate by high-aspect-ratio deep reactive ion etching (DRIE) method, which enlarges the available surface area significantly. Then the SiO2/Ti/PPy layers grew sequentially on the ³through-structure´. Finally, the supercapacitor was investigated by electrochemical methods.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define the
Framework Interface Classes (FICs) and their possible specifications,
which helps in building reusable test cases for the implementations of
these classes. This paper introduces a novel technique called all
paths-state to generate state-based test cases to test the FICs at class
level. The technique is experimentally evaluated. The empirical
evaluation shows that all paths-state technique produces test cases
with a high degree of coverage for the specifications of the
implemented FICs comparing to test cases generated using round-trip
path and all-transition techniques.
Abstract: The effect of a time delay on the transmission on
dengue fever is studied. The time delay is due to the presence of an
incubation period for the dengue virus to develop in the mosquito
before the mosquito becomes infectious. The conditions for the
existence of a Hopf bifurcation to limit cycle behavior are
established. The conditions are different from the usual one and they
are based on whether a particular third degree polynomial has
positive real roots. A theorem for determining whether for a given
set of parameter values, a critical delay time exist is given. It is
found that for a set of realistic values of the parameters in the model,
a Hopf bifurcation can not occur. For a set of unrealistic values of
some of the parameters, it is shown that a Hopf bifurcation can occur.
Numerical solutions using this last set show the trajectory of two of
the variables making a transition from a spiraling orbit to a limit
cycle orbit.
Abstract: Medical services are usually provided in hospitals; however, in developing country, some rural residences have fewer opportunities to access in healthcare services due to the limitation of transportation communication. Therefore, in Thailand, there are charitable organizations operating to provide medical treatments to these people by shifting the medical services to operation sites; this is commonly known as mobile medical service. Operation routing is important for the organization to reduce its transportation cost in order to focus more on other important activities; for instance, the development of medical apparatus. VRP is applied to solve the problem of high transportation cost of the studied organization with the searching techniques of saving algorithm to find the minimum total distance of operation route and satisfy available time constraints of voluntary medical staffs.