Abstract: A new steganographic method via the use of numeric
data on public websites with a self-authentication capability is
proposed. The proposed technique transforms a secret message into
partial shares by Shamir’s (k, n)-threshold secret sharing scheme with
n = k + 1. The generated k+1 partial shares then are embedded into the
numeric items to be disguised as part of the website’s numeric content,
yielding the stego numeric content. Afterward, a receiver links to the
website and extracts every k shares among the k+1 ones from the stego
numeric content to compute k+1 copies of the secret, and the
phenomenon of value consistency of the computed k+1 copies is taken
as an evidence to determine whether the extracted message is authentic
or not, attaining the goal of self-authentication of the extracted secret
message. Experimental results and discussions are provided to show
the feasibility and effectiveness of the proposed method.
Abstract: This paper presents the development of a robot car
that can track the motion of an object by detecting its color through
an Android device. The employed computer vision algorithm uses the
OpenCV library, which is embedded into an Android application of a
smartphone, for manipulating the captured image of the object. The
captured image of the object is subjected to color conversion and is
transformed to a binary image for further processing after color
filtering. The desired object is clearly determined after removing
pixel noise by applying image morphology operations and contour
definition. Finally, the area and the center of the object are
determined so that object’s motion to be tracked. The smartphone
application has been placed on a robot car and transmits by Bluetooth
to an Arduino assembly the motion directives so that to follow
objects of a specified color. The experimental evaluation of the
proposed algorithm shows reliable color detection and smooth
tracking characteristics.
Abstract: Failure of typical seismic frames has been found by
plastic hinge occurring on beams section near column faces. On the
other hand, the seismic capacity of the frames can be enhanced if the
plastic hinges of the beams are shifted away from the column faces.
This paper presents detailing of reinforcements in the interior beam–
column connections aiming to relocate the plastic hinge of reinforced
concrete and precast concrete frames. Four specimens were tested
under quasi-static cyclic load including two monolithic specimens
and two precast specimens. For one monolithic specimen, typical
seismic reinforcement was provided and considered as a reference
specimen named M1. The other reinforced concrete frame M2
contained additional intermediate steel in the connection area
compared with the specimen M1. For the precast specimens,
embedded T-section steels in joint were provided, with and without
diagonal bars in the connection area for specimen P1 and P2,
respectively. The test results indicated the ductile failure with beam
flexural failure in monolithic specimen M1 and the intermediate steel
increased strength and improved joint performance of specimen M2.
For the precast specimens, cracks generated at the end of the steel
inserts. However, slipping of reinforcing steel lapped in top of the
beams was seen before yielding of the main bars leading to the brittle
failure. The diagonal bars in precast specimens P2 improved the
connection stiffness and the energy dissipation capacity.
Abstract: With the growing of computer and network, digital
data can be spread to anywhere in the world quickly. In addition,
digital data can also be copied or tampered easily so that the security
issue becomes an important topic in the protection of digital data.
Digital watermark is a method to protect the ownership of digital data.
Embedding the watermark will influence the quality certainly. In this
paper, Vector Quantization (VQ) is used to embed the watermark into
the image to fulfill the goal of data hiding. This kind of watermarking
is invisible which means that the users will not conscious the existing
of embedded watermark even though the embedded image has tiny
difference compared to the original image. Meanwhile, VQ needs a lot
of computation burden so that we adopt a fast VQ encoding scheme by
partial distortion searching (PDS) and mean approximation scheme to
speed up the data hiding process.
The watermarks we hide to the image could be gray, bi-level and
color images. Texts are also can be regarded as watermark to embed.
In order to test the robustness of the system, we adopt Photoshop to
fulfill sharpen, cropping and altering to check if the extracted
watermark is still recognizable. Experimental results demonstrate that
the proposed system can resist the above three kinds of tampering in
general cases.
Abstract: This work assesses the cortical and the sub-cortical
neural activity recorded from rodents using entropy and mutual
information based approaches to study how hypothermia affects neural
activity. By applying the multi-scale entropy and Shannon entropy, we
quantify the degree of the regularity embedded in the cortical and
sub-cortical neurons and characterize the dependency of entropy of
these regions on temperature. We study also the degree of the mutual
information on thalamocortical pathway depending on temperature.
The latter is most likely an indicator of coupling between these highly
connected structures in response to temperature manipulation leading
to arousal after global cerebral ischemia.
Abstract: Design concepts of real-time embedded system can be
realized initially by introducing novel design approaches. In this
literature, model based design approach and in-the-loop testing were
employed early in the conceptual and preliminary phase to formulate
design requirements and perform quick real-time verification. The
design and analysis methodology includes simulation analysis, model
based testing, and in-the-loop testing. The design of conceptual driveby-
wire, or DBW, algorithm for electronic control unit, or ECU, was
presented to demonstrate the conceptual design process, analysis, and
functionality evaluation. The concepts of DBW ECU function can be
implemented in the vehicle system to improve electric vehicle, or EV,
conversion drivability. However, within a new development process,
conceptual ECU functions and parameters are needed to be evaluated.
As a result, the testing system was employed to support conceptual
DBW ECU functions evaluation. For the current setup, the system
components were consisted of actual DBW ECU hardware, electric
vehicle models, and control area network or CAN protocol. The
vehicle models and CAN bus interface were both implemented as
real-time applications where ECU and CAN protocol functionality
were verified according to the design requirements. The proposed
system could potentially benefit in performing rapid real-time
analysis of design parameters for conceptual system or software
algorithm development.
Abstract: This paper provides a quantitative measure of the
time-varying multiunit neuronal spiking activity using an entropy
based approach. To verify the status embedded in the neuronal activity
of a population of neurons, the discrete wavelet transform (DWT) is
used to isolate the inherent spiking activity of MUA. Due to the
de-correlating property of DWT, the spiking activity would be
preserved while reducing the non-spiking component. By evaluating
the entropy of the wavelet coefficients of the de-noised MUA, a
multiresolution Shannon entropy (MRSE) of the MUA signal is
developed. The proposed entropy was tested in the analysis of both
simulated noisy MUA and actual MUA recorded from cortex in rodent
model. Simulation and experimental results demonstrate that the
dynamics of a population can be quantified by using the proposed
entropy.
Abstract: Morphological interaction of porcine cumulus-oocyte
complexes (pCOCs) was investigated on in vitro condition using
electron microscope (SEM and TEM). The totals of 1,923 oocytes
were round in shape, surrounded by Zona pellucida with layer of
cumulus cells ranging between 59.29-202.14 μm in size. They were
classified into intact-, multi-, partial cumulus cell layer oocyte, and
completely denuded oocyte, at the percentage composition of 22.80%
32.70%, 18.60%, and 25.90 % respectively. The pCOCs classified as
intact- and multi cumulus cell layer oocytes were further culturing at
37°C with 5% CO2, 95% air atmosphere and high humidity for 44 h
in M199 with Earle’s salts supplemented with 10% HTFCS, 2.2
mg/mL NaHCO3, 1 M Hepes, 0.25 mM pyruvate, 15 μg/mL porcine
follicle-stimulating hormone, 1 μg/mL LH, 1μg/mL estradiol with
ethanol, and 50 μg/mL gentamycin sulfate. On electron microscope
study, cumulus cells were found to stick their processes to secrete
substance from the sac-shape end into Zona pellucida of the oocyte
and also communicated with the neighboring cells through their
microvilli on the beginning of incubation period. It is believed that
the cumulus cells communicate with the oocyte by inserting the
microvilli through this gap and embedded in the oocyte cytoplasm
before secreting substance, through the sac-shape end of the
microvilli, to inhibit primary oocyte development at the prophase I.
Morphological changes of the complexes were observed after
culturing for 24-44 h. One hundred percentages of the cumulus layers
were expanded and cumulus cells were peeling off from the oocyte
surface. In addition, the round-shape cumulus cells transformed
themselves into either an elongate shape or a columnar shape, and no
communication between cumulus neighboring cells. After 44 h of
incubation time, diameter of oocytes surrounded by cumulus cells
was larger than 0 h incubation. The effect of hormones in culture
medium is exerted by their receptors present in porcine oocyte. It is
likely that all morphological changes of the complexes after hormone
treatment were to allow maturation of the oocyte. This study
demonstrated that the association of hormones in M199 could
promote porcine follicle activation in 44 h in vitro condition. This
culture system should be useful for studying the regulation of early
follicular growth and development, especially because these follicles represent a large source of oocytes that could be used in vitro for cell
technology.
Abstract: Fiber Bragg optic sensor is embedded in composite
material to detect and monitor the damage that occurs in composite
structures. In this paper, we deal with the mode-Ι delamination to
determine the material strength to crack propagation, using the
coupling mode theory and T-matrix method to simulate the FBGs
spectrum for both uniform and non-uniform strain distribution. The
double cantilever beam test is modeled in FEM to determine the
longitudinal strain. Two models are implemented, the first is the
global half model, and the second is the sub-model to represent the
FBGs with higher refined mesh. This method can simulate damage in
composite structures and converting strain to a wavelength shifting in
the FBG spectrum.
Abstract: This paper introduces novel approaches to partitioning
and mapping in terms of model-based embedded multicore system
engineering and further discusses benefits, industrial relevance and
features in common with existing approaches. In order to assess
and evaluate results, both approaches have been applied to a real
industrial application as well as to various prototypical demonstrative
applications, that have been developed and implemented for
different purposes. Evaluations show, that such applications improve
significantly according to performance, energy efficiency, meeting
timing constraints and covering maintaining issues by using
the AMALTHEA platform and the implemented approaches.
Furthermore, the model-based design provides an open, expandable,
platform independent and scalable exchange format between
OEMs, suppliers and developers on different levels. Our proposed
mechanisms provide meaningful multicore system utilization since
load balancing by means of partitioning and mapping is effectively
performed with regard to the modeled systems including hardware,
software, operating system, scheduling, constraints, configuration and
more data.
Abstract: Many issues about the relationship between auditors in
auditing practices with its stakeholders often heard. It appears in
perspectives of bringing out the variety of phenomena affecting from
the audit practice of greed and not appreciating from the
independency of the audit profession and professional code of ethics.
It becomes a logical consequence in practicing of capitalism in
accounting. The main purpose of this article would like to uncover
the existing auditing practices in Indonesia, especially in Java that
associated with a strong influence of Javanese culture with reluctant
/”shy", politely, "legowo (gratefully accepted)", "ngemong"
(friendly), "not mentholo" (lenient), "tepo seliro" (tolerance),
"ngajeni" (respectful), "acquiescent" and also reveals its relationships
with Non Javanese culture in facing the conflict of interest in
practical of auditing world. The method used by interpretive
approach that emphasizes the role of language, interpret and
understand and see social reality as something other than a label,
name or concept. Global practices in auditing of each country have
particular cultures that affect the standard set by those regulatory
standards results the adaptation of IAS. The majority of parties in
Indonesia is dominated by Javanese racial regulators, so Java culture
is embedded in every audit practices and those conditions in Java
leads auditors in having similar behaviour, sometimes interfere with
standard Java code of conduct must be executed by an auditor.
Auditors who live in Java have the characters of Javanese culture that
is hard to avoid in the audit practice. However, practically, the
auditors still are relevant in their profession.
Abstract: Code- mixing in spontaneous speech has been widely
discussed, but not in virtual situations; especially in context of the
third language learning students. Thus, this study is an attempt to
explore the linguistic characteristics of the mixing of Japanese,
English and Thai in a mobile Line chat room by students with their
background of English as L2, Japanese as L3 and Thai as mother
tongue. The result found that insertion of Thai content words is a very
common linguistic phenomenon embedded with the other two
languages in the sentences. As chatting is to be ‘relational’ or
‘interactional’, it affected the style of lexical choices to be speech-like,
more personal and emotionally-related. A personal pronoun in
Japanese is often mixed into the sentences. The Japanese
sentence-final question particle か “ka” was added to the end of the
sentence based on Thai grammar rules. Some unique characteristics
were created while chatting.
Abstract: In order to manufacture short gap single Si nanowire
(NW) field effect transistor (FET) by imprinting and transferring
method, we introduce the method using Al2O3 sacrificial layer. The
diameters of cylindrical Si NW addressed between Au electrodes by
dielectrophoretic (DEP) alignment method are controlled to 106, 128,
and 148 nm. After imprinting and transfer process, cylindrical Si NW
is embedded in PVP adhesive and dielectric layer. By curing
transferred cylindrical Si NW and Au electrodes on PVP-coated p++ Si
substrate with 200nm-thick SiO2, 3μm gap Si NW FET fabrication
was completed. As the diameter of embedded Si NW increases, the
mobility of FET increases from 80.51 to 121.24 cm2/V·s and the
threshold voltage moves from –7.17 to –2.44 V because the ratio of
surface to volume gets reduced.
Abstract: Geopolymer concretes are new class of construction
materials that have emerged as an alternative to Ordinary Portland
cement concrete. Considerable researches have been carried out on
material development of geopolymer concrete; however, a few studies
have been reported on the structural use of them. This paper presents
the bond behaviors of reinforcement embedded in fly ash based
geopolymer concrete. The development lengths of reinforcement for
various compressive strengths of concrete, 20, 30 and 40 MPa, and
reinforcement diameters, 10, 16 and 25 mm, are investigated. Total 27
specimens were manufactured and pull-out test according to EN 10080
was applied to measure bond strength and slips between concrete and
reinforcements. The average bond strengths decreased from 23.06MPa
to 17.26 MPa, as the diameters of reinforcements increased from
10mm to 25mm. The compressive strength levels of geopolymer
concrete showed no significant influence on bond strengths in this
study. Also, the bond-slip relations between geopolymer concrete and
reinforcement are derived using non-linear regression analysis for
various experimental conditions.
Abstract: This paper investigates the viability of using carbon
fiber reinforced epoxy composites modified with carbon nanotubes to
strengthening reinforced concrete (RC) columns. Six RC columns
was designed and constructed according to ASCE standards. The
columns were wrapped using carbon fiber sheets impregnated with
either neat epoxy or CNTs modified epoxy. These columns were then
tested under concentric axial loading. Test results show that;
compared to the unwrapped specimens; wrapping concrete columns
with carbon fiber sheet embedded in CNTs modified epoxy resulted
in an increase in its axial load resistance, maximum displacement,
and toughness values by 24%, 109% and 232%, respectively. These
results reveal that adding CNTs into epoxy resin enhanced the
confinement effect, specifically, increased the axial load resistance,
maximum displacement, and toughness values by 11%, 6%, and
19%, respectively compared with columns strengthening with carbon
fiber sheet embedded in neat epoxy.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: The influence of three different types of halloysite
nanotubes (HNTs) with different dimensions, namely as camel lake
(CLA), Jarrahdale (JA) and Matauri Bay (MB), on their reinforcing
ability of ethylene propylene dine monomer (EPDM) were
investigated by varying the HNTs loading (from 0-15 phr).
Mechanical properties of the nanocomposites improved with addition
of all three HNTs, but CLA based nanocomposites exhibited a
significant enhancement compared to the other HNTs. For instance,
tensile properties of EPDM nanocomposites increased by 120%,
256% and 340% for MB, JA and CLA, respectively, with addition of
15 phr of HNTs. This could be due to the higher aspect ratio and
higher surface area of CLA compared to others. Scanning electron
microscopy (SEM) of nanocomposites at 15 phr of HNT loadings
showed low amounts of pulled-out nanotubes which confirmed the
presence of more embedded nanotubes inside the EPDM matrix, as
well as aggregates within the fracture surface of EPDM/HNT
nanocomposites
Abstract: Two micromechanical models for 3D smart composite
with embedded periodic or nearly periodic network of generally
orthotropic reinforcements and actuators are developed and applied to
cubic structures with unidirectional orientation of constituents.
Analytical formulas for the effective piezothermoelastic coefficients
are derived using the Asymptotic Homogenization Method (AHM).
Finite Element Analysis (FEA) is subsequently developed and used
to examine the aforementioned periodic 3D network reinforced smart
structures. The deformation responses from the FE simulations are
used to extract effective coefficients. The results from both
techniques are compared. This work considers piezoelectric materials
that respond linearly to changes in electric field, electric
displacement, mechanical stress and strain and thermal effects. This
combination of electric fields and thermo-mechanical response in
smart composite structures is characterized by piezoelectric and
thermal expansion coefficients. The problem is represented by unitcell
and the models are developed using the AHM and the FEA to
determine the effective piezoelectric and thermal expansion
coefficients. Each unit cell contains a number of orthotropic
inclusions in the form of structural reinforcements and actuators.
Using matrix representation of the coupled response of the unit cell,
the effective piezoelectric and thermal expansion coefficients are
calculated and compared with results of the asymptotic
homogenization method. A very good agreement is shown between
these two approaches.