Abstract: Unmanned aerial vehicles (UAVs) performing their
operations for a long time have been attracting much attention in
military and civil aviation industries for the past decade. The
applicable field of UAV is changing from the military purpose only to
the civil one. Because of their low operation cost, high reliability and
the necessity of various application areas, numerous development
programs have been initiated around the world. To obtain the optimal
solutions of the design variable (i.e., sectional airfoil profile, wing
taper ratio and sweep) for high performance of UAVs, both the lift and
lift-to-drag ratio are maximized whereas the pitching moment should
be minimized, simultaneously. It is found that the lift force and
lift-to-drag ratio are linearly dependent and a unique and dominant
solution are existed. However, a trade-off phenomenon is observed
between the lift-to-drag ratio and pitching moment. As the result of
optimization, sixty-five (65) non-dominated Pareto individuals at the
cutting edge of design spaces that are decided by airfoil shapes can be
obtained.
Abstract: Information and Communications Technologies (ICT) has been integrated in education in many developing and developed countries alike, but the use of ICT in Tanzanian schools is dismal. Many Tanzanian secondary schools have no computers. The few schools with computers use them primarily for secretarial services and computer literacy training. The Tanzanian education system at other levels like secondary school level has to undergo substantial transformation, underscored by the growing application of new information and communication technology. This paper presents the e-readiness survey result from secondary schools in Tanzania. The paper also suggests how Tanzania can make use of the few present ICT resources to support and improve teaching and learning functions to improve performance and acquisition of knowledge by using e-Learning Management System (e-LMS).
Abstract: In our modern society electricity is vital to our health,
safety, comfort and well-being. While our daily use of electricity is
often taken for granted, public concern has arisen about potential
adverse health effects from electric and magnetic – electromagnetic –
fields (EMFs) produced by our use of electricity.
This paper aims to compare between the measured magnetic field
values and the simulated models for the indoor medium to low
voltage (MV/LV) distribution substations.
To calculate the magnetic flux density in the substations,
interactive software SUBCALC is used which is based on closed
form solution of the Biot-Savart law with 3D conductor model.
The comparison between the measured values and the simulated
models was acceptable. However there were some discrepancies, as
expected, may be due to the current variation during measurements.
Abstract: The study entitled “The Construction of Interactive
Computer Multimedia Instruction on Basic Japanese Vocabulary"
was aimed: 1) To construct the interactive computer multimedia
instruction on Basic Japanese Vocabulary, 2) To find out
multimedia-s quality, 3) To examine the student-s satisfaction and 4)
To study the learning achievement in Basic Japanese vocabulary. The
sampling group used in this study was composed of 40 1st year
student in Educational Communications and Technology Department,
Faculty of Industrial Education and Technology, King Mongkut-s
University of Technology Thonburi, in the academic year 2553 B.E.
(2010). According to research results, we found that 1). The quality
assessment by 3 mass media experts was at 4.72 on average or at high
level. 2) In terms of contents, the evaluation by 3 experts was at 4.81
on average or at high level. 3) In terms of achievement, there was a
statistical significance between before and after the treatment at the
.05 level. 4) The satisfaction of students towards the interactive
computer multimedia Instruction on “Basic Japanese Vocabulary"
was 4.35 on average, or at high level.
Abstract: This paper presents a smart-card applet that is able to
verify X.509 certificates and to use the public key contained in the
certificate for verifying digital signatures that have been created
using the corresponding private key, e.g. for the purpose of authenticating
the certificate owner against the card. The approach has been
implemented as an operating prototype on Java cards.
Abstract: This study was conducted to examine the effects of ketum extract on development of Chrysomya rufifacies and to analyze the presence of mitragynine in the larvae samples. 110 newly emerged first instar larvae of C. rufifacies were introduced on ketum extract-mixed cow liver at doses of 0, 20, 40 and 60g. Blowfly development rate was determined with 12 hour intervals and
mitragynine in larvae was extracted and quantitated. C. rufifacies in control group took about 192 hours to complete their development from first instar larvae to adult blowfly; meanwhile blowfly form from the highest dose of ketum was 264 hours. Mitragynine was detected in all groups of treatment, except for control. In conclusion, the presence of mitragynine in C. rufifacies is affected in delaying development rates of the blowfly for up to 62 hours or 3 days. Chemical analysis of mitragynine from larvae samples showed that this alkaloid present in all specimens analyzed.
Abstract: This paper presents a solution for a robotic
manipulation problem. We formulate the problem as combining
target identification, tracking and interception. The task in our
solution is sensing a target on a conveyor belt and then intercepting
robot-s end-effector at a convenient rendezvous point. We used
an object recognition method which identifies the target and finds
its position from visualized scene picture, then the robot system
generates a solution for rendezvous problem using the target-s initial
position and belt velocity . The interception of the target and the
end-effector is executed at a convenient rendezvous point along the
target-s calculated trajectory. Experimental results are obtained using
a real platform with an industrial robot and a vision system over it.
Abstract: Synchronization between 0.1 Hz oscillations in heart rate and blood pressure is studied and its change during vertical tilt is evaluated in 37 myocardial infarction patients. Two groups of patients are identified with decreased and increased, respectively, synchronization of the studied oscillations as a response to a tilt test. It is shown that assessment of synchronization of 0.1 Hz oscillations as a response to vertical tilt can be used as a guideline for selecting optimal dose of beta-blocker treatment in post-myocardial infarction patients.
Abstract: The information on the Web increases tremendously.
A number of search engines have been developed for searching Web
information and retrieving relevant documents that satisfy the
inquirers needs. Search engines provide inquirers irrelevant
documents among search results, since the search is text-based rather
than semantic-based. Information retrieval research area has
presented a number of approaches and methodologies such as
profiling, feedback, query modification, human-computer interaction,
etc for improving search results. Moreover, information retrieval has
employed artificial intelligence techniques and strategies such as
machine learning heuristics, tuning mechanisms, user and system
vocabularies, logical theory, etc for capturing user's preferences and
using them for guiding the search based on the semantic analysis
rather than syntactic analysis. Although a valuable improvement has
been recorded on search results, the survey has shown that still
search engines users are not really satisfied with their search results.
Using ontologies for semantic-based searching is likely the key
solution. Adopting profiling approach and using ontology base
characteristics, this work proposes a strategy for finding the exact
meaning of the query terms in order to retrieve relevant information
according to user needs. The evaluation of conducted experiments
has shown the effectiveness of the suggested methodology and
conclusion is presented.
Abstract: The Constraints imposed by non-thermal
leptogenesis on the survival of the neutrino mass models describing
the presently available neutrino mass patterns, are studied
numerically. We consider the Majorana CP violating phases coming
from right-handed Majorana mass matrices to estimate the baryon
asymmetry of the universe, for different neutrino mass models
namely quasi-degenerate, inverted hierarchical and normal
hierarchical models, with tribimaximal mixings. Considering two
possible diagonal forms of Dirac neutrino mass matrix as either
charged lepton or up-quark mass matrix, the heavy right-handed
mass matrices are constructed from the light neutrino mass matrix.
Only the normal hierarchical model leads to the best predictions of
baryon asymmetry of the universe, consistent with observations in
non-thermal leptogenesis scenario.
Abstract: Internet addiction has become a critical problem on
adolescents in Taiwan, and its negative effects on various dimensions
of adolescent development caught the attention of educational and
psychological experts. This study examined the correlation between
cognitive (locus of control) and emotion (emotion venting strategies)
factors on internet addiction of adolescents in Taiwan. Using the
Compulsive Internet Use (CIU) and the Emotion Venting Strategy
scales, a survey was conducted and 215 effective samples (students
ranging from12 to14 years old) returned. Quantitative analysis
methods such as descriptive statistics, t-test, ANOVA, Pearson
correlations and multiple regression were adopted. The results were as
follows: 1. Severity of Internet addiction has significant gender
differences; boys were at a higher risk than girls in becoming addicted
to the Internet. 2. Emotion venting, locus of control and internet
addiction have been shown to be positive correlated with one another.
3. Setting the locus of control as the control variable, emotion venting
strategy has positive and significant contribution to internet addiction.
The results of this study suggest that coaching deconstructive emotion
strategies and cognitive believes are encouraged to integrate with
actual field work.
Abstract: A simple network model is developed in OPNET to
study the performance of the Wi-Fi protocol. The model is simulated
in OPNET and performance factors such as load, throughput and delay
are analysed from the model. Four applications such as oracle, http, ftp
and voice are applied over the Wireless LAN network to determine the
throughput. The voice application utilises a considerable amount of
bandwidth of up to 5Mbps, as a result the 802.11g standard of the
Wi-Fi protocol was chosen which can support a data rate of up to
54Mbps. Results indicate that when the load in the Wi-Fi network is
increased the queuing delay on the point-to-point links in the Wi-Fi
network significantly reduces until it is comparable to that of WiMAX.
In conclusion, the queuing delay of the Wi-Fi protocol for the network
model simulated was about 0.00001secs comparable to WiMAX
network values.
Abstract: This paper presents the hardware design of a unified
architecture to compute the 4x4, 8x8 and 16x16 efficient twodimensional
(2-D) transform for the HEVC standard. This
architecture is based on fast integer transform algorithms. It is
designed only with adders and shifts in order to reduce the hardware
cost significantly. The goal is to ensure the maximum circuit reuse
during the computing while saving 40% for the number of operations.
The architecture is developed using FIFOs to compute the second
dimension. The proposed hardware was implemented in VHDL. The
VHDL RTL code works at 240 MHZ in an Altera Stratix III FPGA.
The number of cycles in this architecture varies from 33 in 4-point-
2D-DCT to 172 when the 16-point-2D-DCT is computed. Results
show frequency improvements reaching 96% when compared to an
architecture described as the direct transcription of the algorithm.
Abstract: Working memory (WM) can be defined as the system
which actively holds information in the mind to do tasks in spite of
the distraction. Contrary, short-term memory (STM) is a system that
represents the capacity for the active storing of information without
distraction. There has been accumulating evidence that these types of
memory are related to higher cognition (HC). The aim of this study
was to verify the relationship between HC and memory (visual STM
and WM, auditory STM and WM). 59 primary school children were
tested by intelligence test, mathematical tasks (HC) and memory
subtests. We have shown that visual but not auditory memory is a
significant predictor of higher cognition. The relevance of these
results are discussed.
Abstract: The efficiency of an image watermarking technique depends on the preservation of visually significant information. This is attained by embedding the watermark transparently with the maximum possible strength. The current paper presents an approach for still image digital watermarking in which the watermark embedding process employs the wavelet transform and incorporates Human Visual System (HVS) characteristics. The sensitivity of a human observer to contrast with respect to spatial frequency is described by the Contrast Sensitivity Function (CSF). The strength of the watermark within the decomposition subbands, which occupy an interval on the spatial frequencies, is adjusted according to this sensitivity. Moreover, the watermark embedding process is carried over the subband coefficients that lie on edges where distortions are less noticeable. The experimental evaluation of the proposed method shows very good results in terms of robustness and transparency.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: The unique structural configuration found in human foot allows easy walking. Similar movement is hard to imitate even for an ape. It is obvious that human ambulation relates to the foot structure itself. Suppose the bones are represented as vertices and the joints as edges. This leads to the development of a special graph that represents human foot. On a footprint there are point-ofcontacts which have contact with the ground. It involves specific vertices. Theoretically, for an ideal ambulation, these points provide reactions onto the ground or the static equilibrium forces. They are arranged in sequence in form of a path. The ambulating footprint follows this path. Having the human foot graph and the path crossbred, it results in a representation that describes the profile of an ideal ambulation. This profile cites the locations where the point-of-contact experience normal reaction forces. It highlights the significant of these points.
Abstract: The aim of this study was to examine and identify the
type of Iranian financial market in terms of being symmetrical or
asymmetrical and to measure relationship between type of market
and the market's indices. In this study, daily information on the
market-s Share Price Index, Industrial Index and Top Fifty Most
Active Companies during the years 1999-2010 has been used. In
addition, to determine type of the financial market, rate of return on
Security is taken into account. In this research, by using logistic
regression analysis methods, relationship of the market type with the
above mentioned indices have been examined. The results showed
that the type of the financial market has a positive significant
association with market share price index and Industrial Index. Index
of Top Fifty Most Active Companies is significantly associated with
type of financial market, however this relationship is inverse.
Abstract: A new Feed-Forward/Feedback Generalized
Minimum Variance Pole-placement Controller to incorporate the
robustness of classical pole-placement into the flexibility of
generalized minimum variance self-tuning controller for Single-Input
Single-Output (SISO) has been proposed in this paper. The design,
which provides the user with an adaptive mechanism, which ensures
that the closed loop poles are, located at their pre-specified positions.
In addition, the controller design which has a feed-forward/feedback
structure overcomes the certain limitations existing in similar poleplacement
control designs whilst retaining the simplicity of
adaptation mechanisms used in other designs. It tracks set-point
changes with the desired speed of response, penalizes excessive
control action, and can be applied to non-minimum phase systems.
Besides, at steady state, the controller has the ability to regulate the
constant load disturbance to zero. Example simulation results using
both simulated and real plant models demonstrate the effectiveness of
the proposed controller.
Abstract: We propose a new approach on how to obtain the approximate solutions of Hamilton-Jacobi (HJ) equations. The process of the approximation consists of two steps. The first step is to transform the HJ equations into the virtual time based HJ equations (VT-HJ) by introducing a new idea of ‘virtual-time’. The second step is to construct the approximate solutions of the HJ equations through a computationally iterative procedure based on the VT-HJ equations. It should be noted that the approximate feedback solutions evolve by themselves as the virtual-time goes by. Finally, we demonstrate the effectiveness of our approximation approach by means of simulations with linear and nonlinear control problems.