Abstract: In the article there have been revealed the properties
of designing the research teaching the military masters and in the context it has been offered the program of mastering by the masters
military men the methodology of research work, in the course of practical teaching activity there has been considered the developed
and approbated model of organization of the process of mastering by the masters the methodology of research work. As a whole, the research direction of master preparation leaves its
sign to the content of education, forms of organization of educational
process, scientific work of masters. In this connection the offered in
the article properties of organization of research teaching and a model
of organization of mastering by the masters military men the methodology of research work can be taken into account when
designing the content of master preparation.
Abstract: Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: This paper deals with the application of a fuzzy set in
measuring teachers- beliefs about mathematics. The vagueness of
beliefs was transformed into standard mathematical values using a
fuzzy preferences model. The study employed a fuzzy approach
questionnaire which consists of six attributes for measuring
mathematics teachers- beliefs about mathematics. The fuzzy conjoint
analysis approach based on fuzzy set theory was used to analyze the
data from twenty three mathematics teachers from four secondary
schools in Terengganu, Malaysia. Teachers- beliefs were recorded in
form of degrees of similarity and its levels of agreement. The
attribute 'Drills and practice is one of the best ways of learning
mathematics' scored the highest degree of similarity at 0. 79860 with
level of 'strongly agree'. The results showed that the teachers- beliefs
about mathematics were varied. This is shown by different levels of
agreement and degrees of similarity of the measured attributes.
Abstract: A novel and versatile numerical technique to solve a self-stress equilibrium state is adopted herein as a form-finding procedure for an irregular tensegrity structure. The numerical form-finding scheme of a tensegrity structure uses only the connectivity matrix and prototype tension coefficient vector as the initial guess solution. Any information on the symmetrical geometry or other predefined initial structural conditions is not necessary to get the solution in the form-finding process. An eight-node initial condition example is presented to demonstrate the efficiency and robustness of the proposed method in the form-finding of an irregular tensegrity structure. Based on the conception from the form-finding of an eight-node irregular tensegrity structure, a monumental object is designed by considering the real world situation such as self-weight, wind and earthquake loadings.
Abstract: Saturated hydraulic conductivity is one of the soil
hydraulic properties which is widely used in environmental studies
especially subsurface ground water. Since, its direct measurement is
time consuming and therefore costly, indirect methods such as
pedotransfer functions have been developed based on multiple linear
regression equations and neural networks model in order to estimate
saturated hydraulic conductivity from readily available soil
properties e.g. sand, silt, and clay contents, bulk density, and organic
matter. The objective of this study was to develop neural networks
(NNs) model to estimate saturated hydraulic conductivity from
available parameters such as sand and clay contents, bulk density,
van Genuchten retention model parameters (i.e. r
θ , α , and n) as well
as effective porosity. We used two methods to calculate effective
porosity: : (1) eff s FC φ =θ -θ , and (2) inf φ =θ -θ eff s , in which s
θ is
saturated water content, FC θ is water content retained at -33 kPa
matric potential, and inf θ is water content at the inflection point.
Total of 311 soil samples from the UNSODA database was divided
into three groups as 187 for the training, 62 for the validation (to
avoid over training), and 62 for the test of NNs model. A commercial
neural network toolbox of MATLAB software with a multi-layer
perceptron model and back propagation algorithm were used for the
training procedure. The statistical parameters such as correlation
coefficient (R2), and mean square error (MSE) were also used to
evaluate the developed NNs model. The best number of neurons in
the middle layer of NNs model for methods (1) and (2) were
calculated 44 and 6, respectively. The R2 and MSE values of the test
phase were determined for method (1), 0.94 and 0.0016, and for
method (2), 0.98 and 0.00065, respectively, which shows that method
(2) estimates saturated hydraulic conductivity better than method (1).
Abstract: Application of Expert System in the area of agriculture would take the form of Integrated Crop Management decision aids and would encompass water management, fertilizer management, crop protection systems and identification of implements. In order to remain competitive, the modern farmer often relies on agricultural specialists and advisors to provide information for decision-making. An expert system normally composed of a knowledge base (information, heuristics, etc.), inference engine (analyzes knowledge base), and end user interface (accepting inputs, generating outputs). Software named 'CROP-9-DSS' incorporating all modern features like, graphics, photos, video clippings etc. has been developed. This package will aid as a decision support system for identification of pest and diseases with control measures, fertilizer recommendation system, water management system and identification of farm implements for leading crops of Kerala (India) namely Coconut, Rice, Cashew, Pepper, Banana, four vegetables like Amaranthus, Bhindi, Brinjal and Cucurbits. 'CROP-9-DSS' will act as an expert system to agricultural officers, scientists in the field of agriculture and extension workers for decision-making and help them in suggesting suitable recommendations.
Abstract: In this study, we sought to investigate the mercury
removal efficiency of manganese oxides from natural gas. The
fundamental studies on mercury removal with manganese oxides
sorbents were carried out in a laboratory scale fixed bed reactor at 30
°C with a mixture of methane (20%) and nitrogen gas laden with 4.8
ppb of elemental mercury. Manganese oxides with varying surface
area and crystalline phase were prepared by conventional precipitation
method in this study. The effects of surface area, crystallinity and
other metal oxides on mercury removal efficiency were investigated.
Effect of Ag impregnation on mercury removal efficiency was also
investigated. Ag supported on metal oxide such titania and zirconia as
reference materials were also used in this study for comparison. The
characteristics of mercury removal reaction with manganese oxide
was investigated using a temperature programmed desorption (TPD)
technique.
Manganese oxides showed very high Hg removal activity (about
73-93% Hg removal) for first time use. Surface area of the manganese
oxide samples decreased after heat-treatment and resulted in complete
loss of Hg removal ability for repeated use after Hg desorption in the
case of amorphous MnO2, and 75% loss of the initial Hg removal
activity for the crystalline MnO2. Mercury desorption efficiency of
crystalline MnO2 was very low (37%) for first time use and high (98%)
after second time use. Residual potassium content in MnO2 may have
some effect on the thermal stability of the adsorbed Hg species.
Desorption of Hg from manganese oxides occurs at much higher
temperatures (with a peak at 400 °C) than Ag/TiO2 or Ag/ZrO2.
Mercury may be captured on manganese oxides in the form of mercury
manganese oxide.
Abstract: The objectives of the study are to examine the
determinants of ERP implementation success factors of ERP
implementation. The result indicates that large scale ERP
implementation success consist of eight factors: project management
competence, knowledge sharing, ERP system quality , understanding,
user involvement, business process re-engineering, top management
support, organization readiness.
Abstract: The concept of e-government has begun to spread among countries. It is based on the use of information communication technology (ICT) to fully utilize government resources, as well as to provide government services to citizens, investors and foreigners. Critical factors are the factors that are determined by the senior management of each organization; the success or failure of the organization depends on the effective implementation of critical factors. These factors vary from one organization to another according to their activity, size and functions. It is very important that organizations identify them in order to avoid the risk of implementing initiatives that may fail to work, while simultaneously exploiting opportunities that may succeed in working. The main focus of this paper is to investigate the majority of critical success factors (CSFs) associated with the implementation of e-government projects. This study concentrates on both technical and nontechnical factors. This paper concludes by listing the majority of CSFs relating to successful e-government implementation in Bahrain.
Abstract: Nowaday-s, many organizations use systems that
support business process as a whole or partially. However, in some
application domains, like software development and health care
processes, a normative Process Aware System (PAS) is not suitable,
because a flexible support is needed to respond rapidly to new
process models. On the other hand, a flexible Process Aware System
may be vulnerable to undesirable and fraudulent executions, which
imposes a tradeoff between flexibility and security. In order to make
this tradeoff available, a genetic-based anomaly detection model for
logs of Process Aware Systems is presented in this paper. The
detection of an anomalous trace is based on discovering an
appropriate process model by using genetic process mining and
detecting traces that do not fit the appropriate model as anomalous
trace; therefore, when used in PAS, this model is an automated
solution that can support coexistence of flexibility and security.
Abstract: In the past few years, the use of wireless sensor networks (WSNs) potentially increased in applications such as intrusion detection, forest fire detection, disaster management and battle field. Sensor nodes are generally battery operated low cost devices. The key challenge in the design and operation of WSNs is to prolong the network life time by reducing the energy consumption among sensor nodes. Node clustering is one of the most promising techniques for energy conservation. This paper presents a novel clustering algorithm which maximizes the network lifetime by reducing the number of communication among sensor nodes. This approach also includes new distributed cluster formation technique that enables self-organization of large number of nodes, algorithm for maintaining constant number of clusters by prior selection of cluster head and rotating the role of cluster head to evenly distribute the energy load among all sensor nodes.
Abstract: A multilayer self organizing neural neural network
(MLSONN) architecture for binary object extraction, guided by a beta
activation function and characterized by backpropagation of errors
estimated from the linear indices of fuzziness of the network output
states, is discussed. Since the MLSONN architecture is designed to
operate in a single point fixed/uniform thresholding scenario, it does
not take into cognizance the heterogeneity of image information in
the extraction process. The performance of the MLSONN architecture
with representative values of the threshold parameters of the beta
activation function employed is also studied. A three layer bidirectional
self organizing neural network (BDSONN) architecture
comprising fully connected neurons, for the extraction of objects from
a noisy background and capable of incorporating the underlying image
context heterogeneity through variable and adaptive thresholding,
is proposed in this article. The input layer of the network architecture
represents the fuzzy membership information of the image scene to
be extracted. The second layer (the intermediate layer) and the final
layer (the output layer) of the network architecture deal with the self
supervised object extraction task by bi-directional propagation of the
network states. Each layer except the output layer is connected to the
next layer following a neighborhood based topology. The output layer
neurons are in turn, connected to the intermediate layer following
similar topology, thus forming a counter-propagating architecture
with the intermediate layer. The novelty of the proposed architecture
is that the assignment/updating of the inter-layer connection weights
are done using the relative fuzzy membership values at the constituent
neurons in the different network layers. Another interesting feature
of the network lies in the fact that the processing capabilities of
the intermediate and the output layer neurons are guided by a beta
activation function, which uses image context sensitive adaptive
thresholding arising out of the fuzzy cardinality estimates of the
different network neighborhood fuzzy subsets, rather than resorting to
fixed and single point thresholding. An application of the proposed
architecture for object extraction is demonstrated using a synthetic
and a real life image. The extraction efficiency of the proposed
network architecture is evaluated by a proposed system transfer index
characteristic of the network.
Abstract: The goal of steganography is to avoid drawing
suspicion to the transmission of a hidden message. If suspicion is
raised, steganography may fail. The success of steganography
depends on the secrecy of the action. If steganography is detected,
the system will fail but data security depends on the robustness of the
applied algorithm. In this paper, we propose a novel plausible
deniability scheme in steganography by using a diversionary message
and encrypt it with a DES-based algorithm. Then, we compress the
secret message and encrypt it by the receiver-s public key along with
the stego key and embed both messages in a carrier using an
embedding algorithm. It will be demonstrated how this method can
support plausible deniability and is robust against steganalysis.
Abstract: As German companies roll out their standardized
production systems to offshore manufacturing plants, they face the
challenge of implementing them in different cultural environments.
Studies show that the local adaptation is one of the key factors for a
successful implementation. Thus the question arises of where the line
between standardization and adaptation can be drawn. To answer
this question the influence of culture on production systems is
analysed in this paper. The culturally contingent components of
production systems are identified. Also the contingency factors are
classified according to their impact on the necessary adaptation
changes and implementation effort. Culturally specific decision
making, coordination, communication and motivation patterns
require one-time changes in organizational and process design. The
attitude towards rules requires more intense coaching and controlling.
Lastly a framework is developed to depict standardization and
adaption needs when transplanting production systems into different
cultural environments.
Abstract: It has been proven that early establishment of
microbial flora in digestive tract of ruminants, has a beneficial effect
on their health condition and productivity. A probiotic compound,
made from five bacteria isolated from adult bovine cattle, was dosed
to 15 Holstein newborn calves in order to measure its capacity of
improving body weight gain and reduce diarrhea incidence. The test
was performed in the municipality of Cajicá (Colombia), at 2580
m.a.s.l., throughout rainy season, with environmental temperature
that oscillated between 4 to 25 °C. Five calves were allotted to
control (no addition of probiotic). Treatments 1, and 2 (5 calves per
group) received 10 ml Probiotic mix 1 and 2, respectively. Probiotic
mixes 1 and 2 where similar in microbial composition but different in
production process. Probiotics were added to the morning milk and
dosed on a daily basis by a month and then on a weekly basis for
three additional months. Diarrhea incidence was measured by
observance of number of animals affected in each group; each animal
was weighed up on a daily basis for obtaining weight gain and rumen
fluid samples were extracted with oro-esophageal catheter for
determining level of fiber and grain consumption.
Abstract: Multirate multimedia delivery applications in multihop Wireless Mesh Network (WMN) are data redundant and delay-sensitive, which brings a lot of challenges for designing efficient transmission systems. In this paper, we propose a new cross layer resource allocation scheme to minimize the receiver side distortion within the delay bound requirements, by exploring application layer Position and Value (P-V) diversity as well as the multihop Effective Capacity (EC). We specifically consider image transmission optimization here. First of all, the maximum supportable source traffic rate is identified by exploring the multihop Effective Capacity (EC) model. Furthermore, the optimal source coding rate is selected according to the P-V diversity of multirate media streaming, which significantly increases the decoded media quality. Simulation results show the proposed approach improved media quality significantly compared with traditional approaches under the same QoS requirements.
Abstract: In this research, a systematic investigation was carried out to determine the optimum conditions of HDS reactor. Moreover, a suitable model was developed for a rigorous RTO (real time optimization) loop of HDS (Hydro desulfurization) process. A systematic experimental series was designed based on CCD (Central Composite design) and carried out in the related pilot plant to tune the develop model. The designed variables in the experiments were Temperature, LHSV and pressure. However, the hydrogen over fresh feed ratio was remained constant. The ranges of these variables were respectively equal to 320-380ºC, 1- 21/hr and 50-55 bar. a power law kinetic model was also developed for our further research in the future .The rate order and activation energy , power of reactant concentration and frequency factor of this model was respectively equal to 1.4, 92.66 kJ/mol and k0=2.7*109 .
Abstract: The objective of this work was to investigate flow
properties of powdered infant formula samples. Samples were
purchased at a local pharmacy and differed in composition. Lactose
free infant formula, gluten free infant formula and infant formulas
containing dietary fibers and probiotics were tested and compared
with a regular infant formula sample which did not contain any of
these supplements. Particle size and bulk density were determined
and their influence on flow properties was discussed. There were no
significant differences in bulk densities of the samples, therefore the
connection between flow properties and bulk density could not be
determined. Lactose free infant formula showed flow properties
different to standard supplement-free sample. Gluten free infant
formula with addition of probiotic microorganisms and dietary fiber
had the narrowest particle size distribution range and exhibited the
best flow properties. All the other samples exhibited the same
tendency of decreasing compaction coefficient with increasing flow
speed, which means they all become freer flowing with higher flow
speeds.
Abstract: We present a prototype interactive (hyper) map of strategic, tactical, and logistic options for Supply Chain Management. The map comprises an anthology of options, broadly classified within the strategic spectrum of efficiency versus responsiveness, and according to logistic and cross-functional drivers. They are exemplified by cases in diverse industries. We seek to get all these information and ideas organized to help supply chain managers identify effective choices for specific business environments. The key and innovative linkage we introduce is the configuration of competitive forces. Instead of going through seemingly endless and isolated cases and wondering how one can borrow from them, we aim to provide a guide by force comparisons. The premise is that best practices in a different industry facing similar forces may be a most productive resource in supply chain design and planning. A prototype template is demonstrated.