Abstract: Medical image data hiding has strict constrains such
as high imperceptibility, high capacity and high robustness.
Achieving these three requirements simultaneously is highly
cumbersome. Some works have been reported in the literature on
data hiding, watermarking and stegnography which are suitable for
telemedicine applications. None is reliable in all aspects. Electronic
Patient Report (EPR) data hiding for telemedicine demand it blind
and reversible. This paper proposes a novel approach to blind
reversible data hiding based on integer wavelet transform.
Experimental results shows that this scheme outperforms the prior
arts in terms of zero BER (Bit Error Rate), higher PSNR (Peak Signal
to Noise Ratio), and large EPR data embedding capacity with
WPSNR (Weighted Peak Signal to Noise Ratio) around 53 dB,
compared with the existing reversible data hiding schemes.
Abstract: This paper is mainly concerned with the application of
a novel technique of data interpretation for classifying measurements
of plasma columns in Tokamak reactors for nuclear fusion
applications. The proposed method exploits several concepts derived
from soft computing theory. In particular, Artificial Neural Networks
and Multi-Class Support Vector Machines have been exploited to
classify magnetic variables useful to determine shape and position of
the plasma with a reduced computational complexity. The proposed
technique is used to analyze simulated databases of plasma equilibria
based on ITER geometry configuration. As well as demonstrating the
successful recovery of scalar equilibrium parameters, we show that
the technique can yield practical advantages compared with earlier
methods.
Abstract: We study the spatial design of experiment and we want to select a most informative subset, having prespecified size, from a set of correlated random variables. The problem arises in many applied domains, such as meteorology, environmental statistics, and statistical geology. In these applications, observations can be collected at different locations and possibly at different times. In spatial design, when the design region and the set of interest are discrete then the covariance matrix completely describe any objective function and our goal is to choose a feasible design that minimizes the resulting uncertainty. The problem is recast as that of maximizing the determinant of the covariance matrix of the chosen subset. This problem is NP-hard. For using these designs in computer experiments, in many cases, the design space is very large and it's not possible to calculate the exact optimal solution. Heuristic optimization methods can discover efficient experiment designs in situations where traditional designs cannot be applied, exchange methods are ineffective and exact solution not possible. We developed a GA algorithm to take advantage of the exploratory power of this algorithm. The successful application of this method is demonstrated in large design space. We consider a real case of design of experiment. In our problem, design space is very large and for solving the problem, we used proposed GA algorithm.
Abstract: When architecting an application, key nonfunctional requirements such as performance, scalability, availability and security, which influence the architecture of the system, are some times not adequately addressed. Performance of the application may not be looked at until there is a concern. There are several problems with this reactive approach. If the system does not meet its performance objectives, the application is unlikely to be accepted by the stakeholders. This paper suggests an approach for performance modeling for web based J2EE and .Net applications to address performance issues early in the development life cycle. It also includes a Performance Modeling Case Study, with Proof-of-Concept (PoC) and implementation details for .NET and J2EE platforms.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.
Abstract: This paper presents design features of a rescue robot, named CEO Mission II. Its body is designed to be the track wheel type with double front flippers for climbing over the collapse and the rough terrain. With 125 cm. long, 5-joint mechanical arm installed on the robot body, it is deployed not only for surveillance from the top view but also easier and faster access to the victims to get their vital signs. Two cameras and sensors for searching vital signs are set up at the tip of the multi-joint mechanical arm. The third camera is at the back of the robot for driving control. Hardware and software of the system, which controls and monitors the rescue robot, are explained. The control system is used for controlling the robot locomotion, the 5-joint mechanical arm, and for turning on/off devices. The monitoring system gathers all information from 7 distance sensors, IR temperature sensors, 3 CCD cameras, voice sensor, robot wheels encoders, yawn/pitch/roll angle sensors, laser range finder and 8 spare A/D inputs. All sensors and controlling data are communicated with a remote control station via IEEE 802.11b Wi-Fi. The audio and video data are compressed and sent via another IEEE 802.11g Wi-Fi transmitter for getting real-time response. At remote control station site, the robot locomotion and the mechanical arm are controlled by joystick. Moreover, the user-friendly GUI control program is developed based on the clicking and dragging method to easily control the movement of the arm. Robot traveling map is plotted from computing the information of wheel encoders and the yawn/pitch data. 2D Obstacle map is plotted from data of the laser range finder. The concept and design of this robot can be adapted to suit many other applications. As the Best Technique awardee from Thailand Rescue Robot Championship 2006, all testing results are satisfied.
Abstract: Can biometrics do what everyone is expecting it will?
And more importantly, should it be doing it? Biometrics is the
buzzword “on the mouth" of everyone, who are trying to use this
technology in a variety of applications. But all this “hype" about
biometrics can be dangerous without a careful evaluation of the real
needs of each application. In this paper I-ll try to focus on the
dangers of using the right technology at the right time in the wrong
place.
Abstract: Automatic Extraction of Event information from
social text stream (emails, social network sites, blogs etc) is a vital
requirement for many applications like Event Planning and
Management systems and security applications. The key information
components needed from Event related text are Event title, location,
participants, date and time. Emails have very unique distinctions over
other social text streams from the perspective of layout and format
and conversation style and are the most commonly used
communication channel for broadcasting and planning events.
Therefore we have chosen emails as our dataset. In our work, we
have employed two statistical NLP methods, named as Finite State
Machines (FSM) and Hidden Markov Model (HMM) for the
extraction of event related contextual information. An application
has been developed providing a comparison among the two methods
over the event extraction task. It comprises of two modules, one for
each method, and works for both bulk as well as direct user input.
The results are evaluated using Precision, Recall and F-Score.
Experiments show that both methods produce high performance and
accuracy, however HMM was good enough over Title extraction and
FSM proved to be better for Venue, Date, and time.
Abstract: The present contribution deals with the
thermophoretic deposition of nanoparticles over a rapidly rotating
permeable disk in the presence of partial slip, magnetic field, thermal
radiation, thermal-diffusion, and diffusion-thermo effects. The
governing nonlinear partial differential equations such as continuity,
momentum, energy and concentration are transformed into nonlinear
ordinary differential equations using similarity analysis, and the
solutions are obtained through the very efficient computer algebra
software MATLAB. Graphical results for non-dimensional
concentration and temperature profiles including thermophoretic
deposition velocity and Stanton number (thermophoretic deposition
flux) in tabular forms are presented for a range of values of the
parameters characterizing the flow field. It is observed that slip
mechanism, thermal-diffusion, diffusion-thermo, magnetic field and
radiation significantly control the thermophoretic particles deposition
rate. The obtained results may be useful to many industrial and
engineering applications.
Abstract: The paper presents an investigation into the role of virtual reality and web technologies in the field of distance education. Within this frame, special emphasis is given on the building of web-based virtual learning environments so as to successfully fulfill their educational objectives. In particular, basic pedagogical methods are studied, focusing mainly on the efficient preparation, approach and presentation of learning content, and specific designing rules are presented considering the hypermedia, virtual and educational nature of this kind of applications. The paper also aims to highlight the educational benefits arising from the use of virtual reality technology in medicine and study the emerging area of web-based medical simulations. Finally, an innovative virtual reality environment for distance education in medicine is demonstrated. The proposed environment reproduces conditions of the real learning process and enhances learning through a real-time interactive simulator.
Abstract: We report a lithography-free approach to fabricate the
biomimetics, quasi-beehive Si nanostructures (QBSNs), on
Si-substrates. The self-assembled SiGe nanoislands via the strain
induced surface roughening (Asaro-Tiller-Grinfeld instability) during
in-situ annealing play a key role as patterned sacrifice regions for
subsequent reactive ion etching (RIE) process performed for
fabricating quasi-beehive nanostructures on Si-substrates. As the
measurements of field emission, the bare QBSNs show poor field
emission performance, resulted from the existence of the native oxide
layer which forms an insurmountable barrier for electron emission. In
order to dramatically improve the field emission characteristics, the
platinum nanopillars (Pt-NPs) were deposited on QBSNs to form
Pt-NPs/QBSNs heterostructures. The turn-on field of Pt-NPs/QBSNs
is as low as 2.29 V/μm (corresponding current density of 1 μA/cm2),
and the field enhancement factor (β-value) is significantly increased to
6067. More importantly, the uniform and continuous electrons excite
light emission, due to the surrounding filed emitters from
Pt-NPs/QBSNs, can be easily obtained. This approach does not require
an expensive photolithographic process and possesses great potential
for applications.
Abstract: Natural gas flow contains undesirable solid particles,
liquid condensation, and/or oil droplets and requires reliable
removing equipment to perform filtration. Recent natural gas
processing applications are demanded compactness and reliability of
process equipment. Since conventional means are sophisticated in
design, poor in efficiency, and continue lacking robust, a supersonic
nozzle has been introduced as an alternative means to meet such
demands.
A 3-D Convergent-Divergent Nozzle is simulated using
commercial Code for pressure ratio (NPR) varies from 1.2 to 2. Six
different shapes of nozzle are numerically examined to illustrate the
position of shock-wave as such spot could be considered as a
benchmark of particle separation. Rectangle, triangle, circular,
elliptical, pentagon, and hexagon nozzles are simulated using Fluent
Code with all have same cross-sectional area.
The simple one-dimensional inviscid theory does not describe the
actual features of fluid flow precisely as it ignores the impact of
nozzle configuration on the flow properties. CFD Simulation results,
however, show that nozzle geometry influences the flow structures
including location of shock wave.
The CFD analysis predicts shock appearance when p01/pa>1.2 for
almost all geometry and locates at the lower area ratio (Ae/At).
Simulation results showed that shock wave in Elliptical nozzle has
the farthest distance from the throat among the others at relatively
small NPR. As NPR increases, hexagon would be the farthest. The
numerical result is compared with available experimental data and
has shown good agreement in terms of shock location and flow
structure.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: Stress Concentration Factors are significant in
machine design as it gives rise to localized stress when any change in
the design of surface or abrupt change in the cross section occurs.
Almost all machine components and structural members contain
some form of geometrical or microstructural discontinuities. These
discontinuities are very dangerous and lead to failure. So, it is very
much essential to analyze the stress concentration factors for critical
applications like Turbine Rotors. In this paper Finite Element
Analysis (FEA) with extremely fine mesh in the vicinity of the
blades of Steam Turbine Rotor is applied to determine stress
concentration factors. A model of Steam Turbine Rotor is shown in
Fig. 1.
Abstract: this paper presented a survey analysis subjected on
network bandwidth management from published papers referred in
IEEE Explorer database in three years from 2009 to 2011. Network
Bandwidth Management is discussed in today-s issues for computer
engineering applications and systems. Detailed comparison is
presented between published papers to look further in the IP based
network critical research area for network bandwidth management.
Important information such as the network focus area, a few
modeling in the IP Based Network and filtering or scheduling used in
the network applications layer is presented. Many researches on
bandwidth management have been done in the broad network area
but fewer are done in IP Based network specifically at the
applications network layer. A few researches has contributed new
scheme or enhanced modeling but still the issue of bandwidth
management still arise at the applications network layer. This survey
is taken as a basic research towards implementations of network
bandwidth management technique, new framework model and
scheduling scheme or algorithm in an IP Based network which will
focus in a control bandwidth mechanism in prioritizing the network
traffic the applications layer.
Abstract: This paper proposes a declarative language for
knowledge representation (Ibn Rochd), and its environment of
exploitation (DeGSE). This DeGSE system was designed and
developed to facilitate Ibn Rochd writing applications. The system
was tested on several knowledge bases by ascending complexity,
culminating in a system for recognition of a plant or a tree, and
advisors to purchase a car, for pedagogical and academic guidance,
or for bank savings and credit. Finally, the limits of the language and
research perspectives are stated.
Abstract: The aim of this paper is to present a comparative
study on two different methods for the evaluation of the equilibrium
point of a ship, core issue for designing an On Board Stability System
(OBSS) module that, starting from geometry information of a ship
hull, described by a discrete model in a standard format, and the
distribution of all weights onboard calculates the ship floating
conditions (in draught, heel and trim).
Abstract: Data mining (DM) is the process of finding and extracting frequent patterns that can describe the data, or predict unknown or future values. These goals are achieved by using various learning algorithms. Each algorithm may produce a mining result completely different from the others. Some algorithms may find millions of patterns. It is thus the difficult job for data analysts to select appropriate models and interpret the discovered knowledge. In this paper, we describe a framework of an intelligent and complete data mining system called SUT-Miner. Our system is comprised of a full complement of major DM algorithms, pre-DM and post-DM functionalities. It is the post-DM packages that ease the DM deployment for business intelligence applications.
Abstract: Wheeled Mobile Robots (WMRs) are built with their
Wheels- drive machine, Motors. Depend on their desire design of
WMR, Technicians made used of DC Motors for motion control. In
this paper, the author would like to analyze how to choose DC motor
to be balance with their applications of especially for WMR.
Specification of DC Motor that can be used with desire WMR is to
be determined by using MATLAB Simulink model. Therefore, this
paper is mainly focus on software application of MATLAB and
Control Technology. As the driving system of DC motor, a
Peripheral Interface Controller (PIC) based control system is
designed including the assembly software technology and H-bridge
control circuit. This Driving system is used to drive two DC gear
motors which are used to control the motion of WMR. In this
analyzing process, the author mainly focus the drive system on
driving two DC gear motors that will control with Differential Drive
technique to the Wheeled Mobile Robot . For the design analysis of
Motor Driving System, PIC16F84A is used and five inputs of sensors
detected data are tested with five ON/OFF switches. The outputs of
PIC are the commands to drive two DC gear motors, inputs of Hbridge
circuit .In this paper, Control techniques of PIC
microcontroller and H-bridge circuit, Mechanism assignments of
WMR are combined and analyzed by mainly focusing with the
“Modeling and Simulink of DC Motor using MATLAB".
Abstract: This paper describes studies carried out to investigate
the viability of using wireless cameras as a tool in monitoring
changes in air quality. A camera is used to monitor the change in
colour of a chemically responsive polymer within view of the camera
as it is exposed to varying chemical species concentration levels. The
camera captures this image and the colour change is analyzed by
averaging the RGB values present. This novel chemical sensing
approach is compared with an established chemical sensing method
using the same chemically responsive polymer coated onto LEDs. In
this way, the concentration levels of acetic acid in the air can be
tracked using both approaches. These approaches to chemical plume
tracking have many applications for air quality monitoring.