Abstract: There are many types of mechanical failure on the
dental implant. In this project, the failure that needs to take into
consideration is the bone resorption on the dental implant. Human
bone has its ability to remodel after the implantation. As the dental
implant is installed into the bone, the bone will detect and change the
bone structure to achieve new biomechanical environment. This
phenomenon is known as bone remodeling. The objective of the
project is to improve the performance of dental implant by using
different types of design. These designs are used to analyze and
predict the failure of the dental implant by using finite element
analysis (FEA) namely ANSYS. The bone is assumed to be fully
attached to the implant or cement. Hence, results are then compared
with other researchers. The results were presented in the form of Von
Mises stress, normal stress, shear stress analysis, and displacement.
The selected design will be analyzed further based on a theoretical
calculation of bone remodeling on the dental implant. The results
have shown that the design constructed passed the failure analysis.
Therefore, the selected design is proven to have a stable performance
at the recovery stage.
Abstract: Worldwide Interoperability for Microwave Access, is a broadband technology, which can effectively transmit a data across a group of users using Multicast and Broadcast Service. WiMAX belongs to a family of (IEEE 802.16) standards and is evolving as a fourth generation technology. WiMAX is the next generation technology that offers wireless access over long distances. MBS zone, which is a group of base stations that are broadcasting the same multicast packets which defines Multicast and Broadcast services. Handover is a process of transferring an ongoing call or data session from one channel connected to the core network to another channel. The handover causes authentication, delay, packet loss, jitter that mainly affects the communication. In this paper, we present a survey on handover security issues in WiMAX.
Abstract: Information security plays a major role in uplifting the standard of secured communications via global media. In this paper, we have suggested a technique of encryption followed by insertion before transmission. Here, we have implemented two different concepts to carry out the above-specified tasks. We have used a two-point crossover technique of the genetic algorithm to facilitate the encryption process. For each of the uniquely identified rows of pixels, different mathematical methodologies are applied for several conditions checking, in order to figure out all the parent pixels on which we perform the crossover operation. This is done by selecting two crossover points within the pixels thereby producing the newly encrypted child pixels, and hence the encrypted cover image. In the next lap, the first and second order derivative operators are evaluated to increase the security and robustness. The last lap further ensures reapplication of the crossover procedure to form the final stego-image. The complexity of this system as a whole is huge, thereby dissuading the third party interferences. Also, the embedding capacity is very high. Therefore, a larger amount of secret image information can be hidden. The imperceptible vision of the obtained stego-image clearly proves the proficiency of this approach.
Abstract: Automatic License plate recognition (ALPR) is a technology which recognizes the registration plate or number plate or License plate of a vehicle. In this paper, an Indian vehicle number plate is mined and the characters are predicted in efficient manner. ALPR involves four major technique i) Pre-processing ii) License Plate Location Identification iii) Individual Character Segmentation iv) Character Recognition. The opening phase, named pre-processing helps to remove noises and enhances the quality of the image using the conception of Morphological Operation and Image subtraction. The second phase, the most puzzling stage ascertain the location of license plate using the protocol Canny Edge detection, dilation and erosion. In the third phase, each characters characterized by Connected Component Approach (CCA) and in the ending phase, each segmented characters are conceptualized using cross correlation template matching- a scheme specifically appropriate for fixed format. Major application of ALPR is Tolling collection, Border Control, Parking, Stolen cars, Enforcement, Access Control, Traffic control. The database consists of 500 car images taken under dissimilar lighting condition is used. The efficiency of the system is 97%. Our future focus is Indian Vehicle License Plate Validation (Whether License plate of a vehicle is as per Road transport and highway standard).
Abstract: Web Usage Mining is the application of data mining
techniques to find usage patterns from web log data, so as to grasp
required patterns and serve the requirements of Web-based
applications. User’s expertise on the internet may be improved by
minimizing user’s web access latency. This may be done by
predicting the future search page earlier and the same may be prefetched
and cached. Therefore, to enhance the standard of web
services, it is needed topic to research the user web navigation
behavior. Analysis of user’s web navigation behavior is achieved
through modeling web navigation history. We propose this technique
which cluster’s the user sessions, based on the K-medoids technique.
Abstract: This study aims to establish function point process
based on stochastic distribution. In order to demonstrate effectiveness
of the study we present a case study that it applies suggested method
on an automotive electrical and electronics system software
development based on Monte Carlo Simulation. It is expected that the
result of this paper is used as guidance for establishing function point
process in organizations and tools for helping project managers make
decisions correctly.
Abstract: Evolution strategy (ES) is a well-known instance of evolutionary algorithms, and there have been many studies on ES. In this paper, the author proposes an extended ES for solving fuzzy-valued optimization problems. In the proposed ES, genotype values are not real numbers but fuzzy numbers. Evolutionary processes in the ES are extended so that it can handle genotype instances with fuzzy numbers. In this study, the proposed method is experimentally applied to the evolution of neural networks with fuzzy weights and biases. Results reveal that fuzzy neural networks evolved using the proposed ES with fuzzy genotype values can model hidden target fuzzy functions even though no training data are explicitly provided. Next, the proposed method is evaluated in terms of variations in specifying fuzzy numbers as genotype values. One of the mostly adopted fuzzy numbers is a symmetric triangular one that can be specified by its lower and upper bounds (LU) or its center and width (CW). Experimental results revealed that the LU model contributed better to the fuzzy ES than the CW model, which indicates that the LU model should be adopted in future applications of the proposed method.
Abstract: Workflow scheduling is an important part of cloud
computing and based on different criteria it decides cost, execution
time, and performances. A cloud workflow system is a platform
service facilitating automation of distributed applications based on
new cloud infrastructure. An aspect which differentiates cloud
workflow system from others is market-oriented business model, an
innovation which challenges conventional workflow scheduling
strategies. Time and Cost optimization algorithm for scheduling
Hybrid Clouds (TCHC) algorithm decides which resource should be
chartered from public providers is combined with a new De-De
algorithm considering that every instance of single and multiple
workflows work without deadlocks. To offset this, two new concepts
- De-De Dodging Algorithm and Priority Based Decisive Algorithm -
combine with conventional deadlock avoidance issues by proposing
one algorithm that maximizes active (not just allocated) resource use
and reduces Makespan.
Abstract: DNA Barcode provides good sources of needed
information to classify living species. The classification problem has
to be supported with reliable methods and algorithms. To analyze
species regions or entire genomes, it becomes necessary to use the
similarity sequence methods. A large set of sequences can be
simultaneously compared using Multiple Sequence Alignment which
is known to be NP-complete. However, all the used methods are still
computationally very expensive and require significant computational
infrastructure. Our goal is to build predictive models that are highly
accurate and interpretable. In fact, our method permits to avoid the
complex problem of form and structure in different classes of
organisms. The empirical data and their classification performances
are compared with other methods. Evenly, in this study, we present
our system which is consisted of three phases. The first one, is called
transformation, is composed of three sub steps; Electron-Ion
Interaction Pseudopotential (EIIP) for the codification of DNA
Barcodes, Fourier Transform and Power Spectrum Signal Processing.
Moreover, the second phase step is an approximation; it is
empowered by the use of Multi Library Wavelet Neural Networks
(MLWNN). Finally, the third one, is called the classification of DNA
Barcodes, is realized by applying the algorithm of hierarchical
classification.
Abstract: This paper presents the ‘Eye Ball Motion Controlled
Wheelchair using IR Sensors’ for the elderly and differently abled
people. In this eye tracking based technology, three Proximity
Infrared (IR) sensor modules are mounted on an eye frame to trace
the movement of the iris. Since, IR sensors detect only white objects;
a unique sequence of digital bits is generated corresponding to each
eye movement. These signals are then processed via a micro
controller IC (PIC18F452) to control the motors of the wheelchair.
The potential and efficiency of previously developed rehabilitation
systems that use head motion, chin control, sip-n-puff control, voice
recognition, and EEG signals variedly have also been explored in
detail. They were found to be inconvenient as they served either
limited usability or non-affordability. After multiple regression
analyses, the proposed design was developed as a cost-effective,
flexible and stream-lined alternative for people who have trouble
adopting conventional assistive technologies.
Abstract: This article presents our prototype MASET (Multi
Agents System for E-Tutoring Learners engaged in online
collaborative work). MASET that we propose is a system which
basically aims to help tutors in monitoring the collaborative work of
students and their various interactions. The evaluation of such
interactions by the tutor is based on the results provided by the
automatic analysis of the interaction indicators. This system is
predicated upon the middleware JADE (Java Agent Development
Framework) and e-learning Moodle platform. The MASET
environment is modeled by AUML which allows structuring the
different interactions between agents for the fulfillment and
performance of online collaborative work. This multi-agent system
has been the subject of a practical experimentation based on the
interactions data between Master Computer Engineering and System
students.
Abstract: Image Processing is a structure of Signal Processing
for which the input is the image and the output is also an image or
parameter of the image. Image Resolution has been frequently
referred as an important aspect of an image. In Image Resolution
Enhancement, images are being processed in order to obtain more
enhanced resolution. To generate highly resoluted image for a low
resoluted input image with high PSNR value. Stationary Wavelet
Transform is used for Edge Detection and minimize the loss occurs
during Downsampling. Inverse Discrete Wavelet Transform is to get
highly resoluted image. Highly resoluted output is generated from the
Low resolution input with high quality. Noisy input will generate
output with low PSNR value. So Noisy resolution enhancement
technique has been used for adaptive sub-band thresholding is used.
Downsampling in each of the DWT subbands causes information loss
in the respective subbands. SWT is employed to minimize this loss.
Inverse Discrete wavelet transform (IDWT) is to convert the object
which is downsampled using DWT into a highly resoluted object.
Used Image denoising and resolution enhancement techniques will
generate image with high PSNR value. Our Proposed method will
improve Image Resolution and reached the optimized threshold.
Abstract: This paper presents the development of a robot car
that can track the motion of an object by detecting its color through
an Android device. The employed computer vision algorithm uses the
OpenCV library, which is embedded into an Android application of a
smartphone, for manipulating the captured image of the object. The
captured image of the object is subjected to color conversion and is
transformed to a binary image for further processing after color
filtering. The desired object is clearly determined after removing
pixel noise by applying image morphology operations and contour
definition. Finally, the area and the center of the object are
determined so that object’s motion to be tracked. The smartphone
application has been placed on a robot car and transmits by Bluetooth
to an Arduino assembly the motion directives so that to follow
objects of a specified color. The experimental evaluation of the
proposed algorithm shows reliable color detection and smooth
tracking characteristics.
Abstract: Quality of Service (QoS) attributes as part of the
service description is an important factor for service attribute. It is not
easy to exactly quantify the weight of each QoS conditions since
human judgments based on their preference causes vagueness. As
web services selection requires optimization, evolutionary computing
based on heuristics to select an optimal solution is adopted. In this
work, the evolutionary computing technique Particle Swarm
Optimization (PSO) is used for selecting a suitable web services
based on the user’s weightage of each QoS values by optimizing the
QoS weight vector and thereby finding the best weight vectors for
best services that is being selected. Finally the results are compared
and analyzed using static inertia weight and deterministic inertia
weight of PSO.
Abstract: Objects are usually horizontally sliced when printed by 3D printers. Therefore, if an object to be printed, such as a collection of fibers, originally has natural direction in shape, the printed direction contradicts with the natural direction. By using proper tools, such as field-oriented 3D paint software, field-oriented solid modelers, field-based tool-path generation software, and non-horizontal FDM 3D printers, the natural direction can be modeled and objects can be printed in a direction that is consistent with the natural direction. This consistence results in embodiment of momentum or force in expressions of the printed object. To achieve this goal, several design and manufacturing problems, but not all, have been solved. An application of this method is (Japanese) 3D calligraphy.
Abstract: This paper proposes techniques like MT CMOS,
POWER GATING, DUAL STACK, GALEOR and LECTOR to
reduce the leakage power. A Full Adder has been designed using
these techniques and power dissipation is calculated and is compared
with general CMOS logic of Full Adder.
Simulation results show the validity of the proposed techniques is
effective to save power dissipation and to increase the speed of
operation of the circuits to a large extent.
Abstract: The exponential growth of social media arouses much
attention on public opinion information. The online forums, blogs,
micro blogs are proving to be extremely valuable resources and are
having bulk volume of information. However, most of the social
media data is unstructured and semi structured form. So that it is
more difficult to decipher automatically. Therefore, it is very much
essential to understand and analyze those data for making a right
decision. The online forums hotspot detection is a promising research
field in the web mining and it guides to motivate the user to take right
decision in right time. The proposed system consist of a novel
approach to detect a hotspot forum for any given time period. It uses
aging theory to find the hot terms and E-K-means for detecting the
hotspot forum. Experimental results demonstrate that the proposed
approach outperforms k-means for detecting the hotspot forums with
the improved accuracy.
Abstract: One of the crucial parameters of digital cryptographic
systems is the selection of the keys used and their distribution. The
randomness of the keys has a strong impact on the system’s security
strength being difficult to be predicted, guessed, reproduced, or
discovered by a cryptanalyst. Therefore, adequate key randomness
generation is still sought for the benefit of stronger cryptosystems.
This paper suggests an algorithm designed to generate and test
pseudo random number sequences intended for cryptographic
applications. This algorithm is based on mathematically manipulating
a publically agreed upon information between sender and receiver
over a public channel. This information is used as a seed for
performing some mathematical functions in order to generate a
sequence of pseudorandom numbers that will be used for
encryption/decryption purposes. This manipulation involves
permutations and substitutions that fulfill Shannon’s principle of
“confusion and diffusion”. ASCII code characters were utilized in the
generation process instead of using bit strings initially, which adds
more flexibility in testing different seed values. Finally, the obtained
results would indicate sound difficulty of guessing keys by attackers.
Abstract: This paper proposes the application of the Smart
Security Concept in the East Mediterranean. Smart Security aims to
secure critical infrastructure, such as hydrocarbon platforms, against
asymmetrical threats. The concept is based on Anti Asymmetrical
Area Denial (A3D) which necessitates limiting freedom of action of
maritime terrorists and piracy by founding safe and secure maritime
areas through sea lines of communication using short range
capabilities.
Abstract: We address a new integer frequency offset (IFO)
estimation scheme with an aid of a pilot for orthogonal frequency
division multiplexing systems. After correlating each continual pilot
with a predetermined scattered pilot, the correlation value is again
correlated to alleviate the influence of the timing offset. From
numerical results, it is demonstrated that the influence of the timing
offset on the IFO estimation is significantly decreased.