Abstract: In this study, a fuzzy similarity approach for Arabic
web pages classification is presented. The approach uses a fuzzy
term-category relation by manipulating membership degree for the
training data and the degree value for a test web page. Six measures
are used and compared in this study. These measures include:
Einstein, Algebraic, Hamacher, MinMax, Special case fuzzy and
Bounded Difference approaches. These measures are applied and
compared using 50 different Arabic web pages. Einstein measure was
gave best performance among the other measures. An analysis of
these measures and concluding remarks are drawn in this study.
Abstract: Malay Folk Literature in early childhood education
served as an important agent in child development that involved
emotional, thinking and language aspects. Up to this moment not
much research has been carried out in Malaysia particularly in the
teaching and learning aspects nor has there been an effort to publish
“big books." Hence this article will discuss the stance taken by
university undergraduate students, teachers and parents in evaluating
Malay Folk Literature in early childhood education to be used as big
books. The data collated and analyzed were taken from 646
respondents comprising 347 undergraduates and 299 teachers. Results
of the study indicated that Malay Folk Literature can be absorbed into
teaching and learning for early childhood with a mean of 4.25 while it
can be in big books with a mean of 4.14. Meanwhile the highest mean
value required for placing Malay Folk Literature genre as big books in
early childhood education rests on exemplary stories for
undergraduates with mean of 4.47; animal fables for teachers with a
mean of 4.38. The lowest mean value of 3.57 is given to lipurlara
stories. The most popular Malay Folk Literature found suitable for
early children is Sang Kancil and the Crocodile, followed by Bawang
Putih Bawang Merah. Pak Padir, Legends of Mahsuri, Origin of
Malacca, and Origin of Rainbow are among the popular stories as
well. Overall the undergraduates show a positive attitude toward all
the items compared to teachers. The t-test analysis has revealed a non
significant relationship between the undergraduate students and
teachers with all the items for the teaching and learning of Malay Folk
Literature.
Abstract: In IETF RFC 2002, Mobile-IP was developed to
enable Laptobs to maintain Internet connectivity while moving
between subnets. However, the packet loss that comes from
switching subnets arises because network connectivity is lost while
the mobile host registers with the foreign agent and this encounters
large end-to-end packet delays. The criterion to initiate a simple and
fast full-duplex connection between the home agent and foreign
agent, to reduce the roaming duration, is a very important issue to be
considered by a work in this paper. State-transition Petri-Nets of the
modeling scenario-based CIA: communication inter-agents procedure
as an extension to the basic Mobile-IP registration process was
designed and manipulated to describe the system in discrete events.
The heuristic of configuration file during practical Setup session for
registration parameters, on Cisco platform Router-1760 using IOS
12.3 (15)T and TFTP server S/W is created. Finally, stand-alone
performance simulations from Simulink Matlab, within each subnet
and also between subnets, are illustrated for reporting better end-toend
packet delays. Results verified the effectiveness of our Mathcad
analytical manipulation and experimental implementation. It showed
lower values of end-to-end packet delay for Mobile-IP using CIA
procedure-based early registration. Furthermore, it reported packets
flow between subnets to improve losses between subnets.
Abstract: In this work, a new approach is proposed to control
the manipulators for Humanoid robot. The kinematics of the
manipulators in terms of joint positions, velocity, acceleration and
torque of each joint is computed using the Denavit Hardenberg (D-H)
notations. These variables are used to design the manipulator control
system, which has been proposed in this work. In view of supporting
the development of a controller, a simulation of the manipulator is
designed for Humanoid robot. This simulation is developed through
the use of the Virtual Reality Toolbox and Simulink in Matlab. The
Virtual Reality Toolbox in Matlab provides the interfacing and
controls to an environment which is developed based on the Virtual
Reality Modeling Language (VRML). Chains of bones were used to
represent the robot.
Abstract: The aim of this study was to test whether the Attention
Networks Test (ANT) showed temporal decrements in performance.
Vigilance tasks typically show such decrements, which may reflect
impairments in executive control resulting from cognitive fatigue.
The ANT assesses executive control, as well as alerting and
orienting. Thus, it was hypothesized that ANT executive control
would deteriorate over time. Manipulations including task condition
(trial composition) and masking were included in the experimental
design in an attempt to increase performance decrements. However,
results showed that there is no temporal decrement on the ANT. The
roles of task demands, cognitive fatigue and participant motivation in
producing this result are discussed. The ANT may not be an effective
tool for investigating temporal decrement in attention.
Abstract: Value engineering is an efficacious contraption for
administrators to make up their minds. Value perusals proffer the
gaffers a suitable instrument to decrease the expenditures of the life
span, quality amelioration, structural improvement, curtailment of the
construction schedule, longevity prolongation or a merging of the
aforementioned cases. Subjecting organizers to pressures on one
hand and their accountability towards their pertinent fields together
with inherent risks and ambiguities of other options on the other hand
set some comptrollers in a dilemma utilization of risk management
and the value engineering in projects manipulation with regard to
complexities of implementing projects can be wielded as a
contraption to identify and efface each item which wreaks
unnecessary expenses and time squandering sans inflicting any
damages upon the essential project applications. Of course It should
be noted that implementation of risk management and value
engineering with regard to the betterment of efficiency and functions
may lead to the project implementation timing elongation. Here time
revamping does not refer to time diminishing in the whole cases. his
article deals with risk and value engineering conceptualizations at
first. The germane reverberations effectuated due to its execution in
Iran Khodro Corporation are regarded together with the joint features
and amalgamation of the aforesaid entia; hence the proposed
blueprint is submitted to be taken advantage of in engineering and
industrial projects including Iran Khodro Corporation.
Abstract: In this paper, a novel multipurpose audio watermarking
algorithm is proposed based on Vector Quantization (VQ) in Discrete
Cosine Transform (DCT) domain using the codeword labeling and
index-bit constrained method. By using this algorithm, it can fulfill the
requirements of both the copyright protection and content integrity
authentication at the same time for the multimedia artworks. The
robust watermark is embedded in the middle frequency coefficients of
the DCT transform during the labeled codeword vector quantization
procedure. The fragile watermark is embedded into the indices of the
high frequency coefficients of the DCT transform by using the
constrained index vector quantization method for the purpose of
integrity authentication of the original audio signals. Both the robust
and the fragile watermarks can be extracted without the original audio
signals, and the simulation results show that our algorithm is effective
with regard to the transparency, robustness and the authentication
requirements
Abstract: This paper presents a solution for a robotic
manipulation problem. We formulate the problem as combining
target identification, tracking and interception. The task in our
solution is sensing a target on a conveyor belt and then intercepting
robot-s end-effector at a convenient rendezvous point. We used
an object recognition method which identifies the target and finds
its position from visualized scene picture, then the robot system
generates a solution for rendezvous problem using the target-s initial
position and belt velocity . The interception of the target and the
end-effector is executed at a convenient rendezvous point along the
target-s calculated trajectory. Experimental results are obtained using
a real platform with an industrial robot and a vision system over it.
Abstract: We describe an effective method for image encryption
which employs magnitude and phase manipulation using carrier
images. Although it involves traditional methods like magnitude and
phase encryptions, the novelty of this work lies in deploying the
concept of carrier images for encryption purpose. To this end, a
carrier image is randomly chosen from a set of stored images. One
dimensional (1-D) discrete Fourier transform (DFT) is then carried
out on the original image to be encrypted along with the carrier
image. Row wise spectral addition and scaling is performed between
the magnitude spectra of the original and carrier images by randomly
selecting the rows. Similarly, row wise phase addition and scaling is
performed between the original and carrier images phase spectra by
randomly selecting the rows. The encrypted image obtained by these
two operations is further subjected to one more level of magnitude
and phase manipulation using another randomly chosen carrier image
by 1-D DFT along the columns. The resulting encrypted image is
found to be fully distorted, resulting in increasing the robustness
of the proposed work. Further, applying the reverse process at the
receiver, the decrypted image is found to be distortionless.
Abstract: An exact algorithm for a n-link manipulator movement amidst arbitrary unknown static obstacles is presented.
The algorithm guarantees the reaching of a target configuration of the manipulator in a finite number of steps. The algorithm is
reduced to a finite number of calls of a subroutine for planning a trajectory in the presence of known forbidden states. The polynomial approximation algorithm which is used as the subroutine is presented. The results of the exact algorithm
implementation for the control of a seven link (7 degrees of
freedom, 7DOF) manipulator are given.
Abstract: Industrial robots play a vital role in automation
however only little effort are taken for the application of robots in
machining work such as Grinding, Cutting, Milling, Drilling,
Polishing etc. Robot parallel manipulators have high stiffness,
rigidity and accuracy, which cannot be provided by conventional
serial robot manipulators. The aim of this paper is to perform the
modeling and the workspace analysis of a 3 DOF Parallel
Manipulator (3 DOF PM). The 3 DOF PM was modeled and
simulated using 'ADAMS'. The concept involved is based on the
transformation of motion from a screw joint to a spherical joint
through a connecting link. This paper work has been planned to
model the Parallel Manipulator (PM) using screw joints for very
accurate positioning. A workspace analysis has been done for the
determination of work volume of the 3 DOF PM. The position of the
spherical joints connected to the moving platform and the
circumferential points of the moving platform were considered for
finding the workspace. After the simulation, the position of the joints
of the moving platform was noted with respect to simulation time and
these points were given as input to the 'MATLAB' for getting the
work envelope. Then 'AUTOCAD' is used for determining the work
volume. The obtained values were compared with analytical
approach by using Pappus-Guldinus Theorem. The analysis had been
dealt by considering the parameters, link length and radius of the
moving platform. From the results it is found that the radius of
moving platform is directly proportional to the work volume for a
constant link length and the link length is also directly proportional
to the work volume, at a constant radius of the moving platform.
Abstract: With the prevalence of computer and development of information technology, Geographic Information Systems (GIS) have long used for a variety of applications in electrical engineering. GIS are designed to support the analysis, management, manipulation and mapping of spatial data. This paper presents several usages of GIS in power utilities such as automated route selection for the construction of new power lines which uses a dynamic programming model for route optimization, load forecasting and optimizing planning of substation-s location and capacity with comprehensive algorithm which involves an accurate small-area electric load forecasting procedure and simulates the different cost functions of substations.
Abstract: Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.
Abstract: Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.
Abstract: Robot manipulators are highly coupled nonlinear
systems, therefore real system and mathematical model of dynamics
used for control system design are not same. Hence, fine-tuning of
controller is always needed. For better tuning fast simulation speed
is desired. Since, Matlab incorporates LAPACK to increase the speed
and complexity of matrix computation, dynamics, forward and
inverse kinematics of PUMA 560 is modeled on Matlab/Simulink in
such a way that all operations are matrix based which give very less
simulation time. This paper compares PID parameter tuning using
Genetic Algorithm, Simulated Annealing, Generalized Pattern Search
(GPS) and Hybrid Search techniques. Controller performances for all
these methods are compared in terms of joint space ITSE and
cartesian space ISE for tracking circular and butterfly trajectories.
Disturbance signal is added to check robustness of controller. GAGPS
hybrid search technique is showing best results for tuning PID
controller parameters in terms of ITSE and robustness.
Abstract: This paper proposes a solution to the motion planning
and control problem of a point-mass robot which is required to move
safely to a designated target in a priori known workspace cluttered
with fixed elliptical obstacles of arbitrary position and sizes. A
tailored and unique algorithm for target convergence and obstacle
avoidance is proposed that will work for any number of fixed
obstacles. The control laws proposed in this paper also ensures that
the equilibrium point of the given system is asymptotically stable.
Computer simulations with the proposed technique and applications
to a planar (RP) manipulator will be presented.
Abstract: Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.
Abstract: In this article the homotopy continuation method (HCM) to solve the forward kinematic problem of the 3-PRS parallel manipulator is used. Since there are many difficulties in solving the system of nonlinear equations in kinematics of manipulators, the numerical solutions like Newton-Raphson are inevitably used. When dealing with any numerical solution, there are two troublesome problems. One is that good initial guesses are not easy to detect and another is related to whether the used method will converge to useful solutions. Results of this paper reveal that the homotopy continuation method can alleviate the drawbacks of traditional numerical techniques.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: In this paper, a novel adaptive fuzzy sliding mode
control method is proposed for the robust tracking control of robotic
manipulators. The proposed controller possesses the advantages of
adaptive control, fuzzy control, and sliding mode control. First, system
stability and robustness are guaranteed based on the sliding mode
control. Further, fuzzy rules are developed incorporating with
adaptation law to alleviate the input chattering effectively. Stability of
the control system is proven by using the Lyapunov method. An
application to a three-degree-of-freedom robotic manipulator is
carried out. Accurate trajectory tracking as well as robustness is
achieved. Input chattering is greatly eliminated.