Abstract: A automatic human tracking system using mobile
agent technology is realized because a mobile agent moves in
accordance with a migration of a target person. In this paper, we
propose a method for determining the neighbor node in consideration
of the imaging range of cameras.
Abstract: In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.
Abstract: Unsteady natural convection and heat transfer in a square cavity partially filled with porous media using a thermal
non-equilibrium model is studied in this paper. The left vertical wall is
maintained at a constant hot temperature Th and the right vertical wall
is maintained at a constant cold temperature Tc, while the horizontal
walls are adiabatic. The governing equations are obtained by applying
the Darcy model and Boussinesq approximation. COMSOL’s finite
element method is used to solve the non-dimensional governing
equations together with specified boundary conditions. The governing
parameters of this study are the Rayleigh number (Ra = 10^5, and Ra = 10^6 ), Darcy namber (Da = 10^−2, and Da = 10^−3),
the modified thermal conductivity ratio (10^−1 ≤ γ ≤ 10^4), the inter-phase heat transfer coefficien (10^−1 ≤ H ≤ 10^3) and the
time dependent (0.001 ≤ τ ≤ 0.2). The results presented for
values of the governing parameters in terms of streamlines in both
fluid/porous-layer, isotherms of fluid in fluid/porous-layer, isotherms
of solid in porous layer, and average Nusselt number.
Abstract: Campus sustainability is the goal of a university striving for sustainable development. This study found that of 17 popular approaches, two comprehensive campus sustainability assessment frameworks were developed in the context of Sustainability in Higher Education (SHE), and used by many university campuses around the world. Sustainability Tracking Assessment and Rating Systems (STARS) and the Campus Sustainability Assessment Framework (CSAF) approaches are more comprehensive than others. Therefore, the researchers examined aspects and elements used by CSAF and STARS in the approach to develop a campus sustainability assessment framework for Universiti Kebangsaan Malaysia (UKM). Documents analysis found that CSAF and STARS do not focus on physical development, especially the construction industry, as key elements of campus sustainability assessment. This finding is in accordance with the Sustainable UKM Programme which consists of three main components of sustainable community, ecosystem and physical development.
Abstract: Walking as a type of non-motorized transportation has
various social, economical and environmental privileges. Also, today
different aspects of sustainable development have been emphasized
and promotion of sustainable transportation modes has been
considered according to this approach. Therefore, the objective of
this research is exploring the circumstance of relationship between
walking and sustainable urban transportation.For writing this article,
the most important resources related to the traits of walking have
been surveyed via a documentary method and after explaining the
concept of sustainable transportation and its indicators, benefiting
from the viewpoints of transportation experts of Tehran, as the capital
and greatest city of Iran, different modes of urban transportation have
been compared in proportion to each criterion and to each other and
have been analyzed according to AHP method. The results of this
study indicate that walking is the most sustainable mode of inner city
transportation.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: Information and Communication Technologies (ICT) in mathematical education is a very active field of research and innovation, where learning is understood to be meaningful and grasping multiple linked representation rather than rote memorization, a great amount of literature offering a wide range of theories, learning approaches, methodologies and interpretations, are generally stressing the potentialities for teaching and learning using ICT. Despite the utilization of new learning approaches with ICT, students experience difficulties in learning concepts relevant to understanding mathematics, much remains unclear about the relationship between the computer environment, the activities it might support, and the knowledge that might emerge from such activities. Many questions that might arise in this regard: to what extent does the use of ICT help students in the process of understanding and solving tasks or problems? Is it possible to identify what aspects or features of students' mathematical learning can be enhanced by the use of technology? This paper will highlight the interest of the integration of information and communication technologies (ICT) into the teaching and learning of mathematics (quadratic functions), it aims to investigate the effect of four instructional methods on students- mathematical understanding and problem solving. Quantitative and qualitative methods are used to report about 43 students in middle school. Results showed that mathematical thinking and problem solving evolves as students engage with ICT activities and learn cooperatively.
Abstract: This paper describes the results of an extensive study
and comparison of popular hash functions SHA-1, SHA-256,
RIPEMD-160 and RIPEMD-320 with JERIM-320, a 320-bit hash
function. The compression functions of hash functions like SHA-1
and SHA-256 are designed using serial successive iteration whereas
those like RIPEMD-160 and RIPEMD-320 are designed using two
parallel lines of message processing. JERIM-320 uses four parallel
lines of message processing resulting in higher level of security than
other hash functions at comparable speed and memory requirement.
The performance evaluation of these methods has been done by using
practical implementation and also by using step computation
methods. JERIM-320 proves to be secure and ensures the integrity of
messages at a higher degree. The focus of this work is to establish
JERIM-320 as an alternative of the present day hash functions for the
fast growing internet applications.
Abstract: After a strong earthquake occurs, a secondary disaster due to strong aftershocks, flood, landslide or heavy snow can possible to occur and the secondary disaster due to resident-s action also can possible to happen. However, until now seldom researchers have paid attention at it. This paper focused on the Inhabitant-s action after the strong earthquake occurs when a terrible even becomes calm. An inappropriate behavior of people with disadvantaged climate after the worse earthquake can bring a tragedy to their life.
Abstract: The Spiral development model has been used
successfully in many commercial systems and in a good number of
defense systems. This is due to the fact that cost-effective
incremental commitment of funds, via an analogy of the spiral model
to stud poker and also can be used to develop hardware or integrate
software, hardware, and systems. To support adaptive, semantic
collaboration between domain experts and knowledge engineers, a
new knowledge engineering process, called Spiral_OWL is proposed.
This model is based on the idea of iterative refinement, annotation
and structuring of knowledge base. The Spiral_OWL model is
generated base on spiral model and knowledge engineering
methodology. A central paradigm for Spiral_OWL model is the
concentration on risk-driven determination of knowledge engineering
process. The collaboration aspect comes into play during knowledge
acquisition and knowledge validation phase. Design rationales for the
Spiral_OWL model are to be easy-to-implement, well-organized, and
iterative development cycle as an expanding spiral.
Abstract: The value of overall oxygen transfer Coefficient
(KLa), which is the best measure of oxygen transfer in water through
aeration, is obtained by a simple approach, which sufficiently
explains the utility of the method to eliminate the discrepancies due
to inaccurate assumption of saturation dissolved oxygen
concentration. The rate of oxygen transfer depends on number of
factors like intensity of turbulence, which in turns depends on the
speed of rotation, size, and number of blades, diameter and
immersion depth of the rotor, and size and shape of aeration tank, as
well as on physical, chemical, and biological characteristic of water.
An attempt is made in this paper to correlate the overall oxygen
transfer Coefficient (KLa), as an independent parameter with other
influencing parameters mentioned above. It has been estimated that
the simulation equation developed predicts the values of KLa and
power with an average standard error of estimation of 0.0164 and
7.66 respectively and with R2 values of 0.979 and 0.989 respectively,
when compared with experimentally determined values. The
comparison of this model is done with the model generated using
Computational fluid dynamics (CFD) and both the models were
found to be in good agreement with each other.
Abstract: The Beshar River is one aquatic ecosystem, which is
located next to the city of Yasuj in southern Iran. The Beshar river
has been contaminated by industrial factories such as effluent of
sugar factory, agricultural and other activities in this region such as,
Imam Sajjad hospital, drainage from agricultural farms, Yasuj urban
surface runoff and effluent of wastewater treatment plants ,specially
Yasuj waste water treatment plant. In order to evaluate the effects of
these pollutants on the quality of the Beshar river, five monitoring
stations were selected along its course. The first station is located
upstream of Yasuj near the Dehnow village; stations 2 to 4 are
located east, south and west of city; and the 5th station is located
downstream of Yasuj. Several water quality parameters were
sampled. These include pH, dissolved oxygen, biological oxygen
demand (BOD), temperature, conductivity, turbidity, total dissolved
solids and discharge or flow measurements. Water samples from the
five stations were collected and analyzed to determine the following
physicochemical parameters: EC, pH, T.D.S, T.H, No2, DO, BOD5,
COD during 2008 to 2010. The study shows that the BOD5 value of
station 1 is at a minimum (1.7 ppm) and increases downstream from
stations 2 to 4 to a maximum (11.6 ppm), and then decreases at
station 5. The DO values of station 1 is a maximum (8.45 ppm),
decreases downstream to stations 2 - 4 which are at a minimum (3.1
ppm), before increasing at station 5. The amount of BOD and TDS
are highest at the 4th station and the amount of DO is lowest at this
station, marking the 4th station as more highly polluted than the
other stations .This study shows average amount of the water quality
parameters in first year of sampling (2008) have had a better quality
relation to third year in 2010 because of recent drought in this region
and pollutant increasing .As the Beshar river path after 5th station
goes through the mountain area with more slope and flow velocity
,so the physicochemical parameters improve at the 5th station due to
pollutant degradation and dilution. Finally the point and nonpoint
pollutant sources of Beshar river were determined and compared to
the monitoring results.
Abstract: This research aims to study the lead pollution in the air of Babylon governorate that resulted generally from vehicles exhausts in addition to industrial and human activities.Vehicles number in Babylon governorate increased significantly after year 2003 that resulted with increase in lead emissions into the air.Measurement of lead emissions was done in seven stations distributed randomly in Babylon governorate. These stations where located in Industrial (Al-Sena'ay) Quarter, 60 street (near to Babylon sewer directorate), 40 Street (near to the first intersection), Al-Hashmia city, Al-Mahaweel city, , Al- Musayab city in addition to another station in Sayd Idris village belong to Abugharaq district (Agricultural station for comparison). The measured concentrations in these stations were compared with the standard limits of Environmental Protection Agency EPA (2 μg /m3). The results of this study showed that the average of lead concentrations ,in Babylon governorate during year 2010, was (3.13 μg/m3) which was greater than standard limits (2 μg/m3). The maximum concentration of lead was (6.41 μg / m3) recorded in the Industrial (Al-Sena'ay) Quarter during April month, while the minimum concentrations was (0.36 μg / m3) recorded in the agricultural station (Abugharaq) during December month.
Abstract: Crucial information barely visible to the human eye is
often embedded in a series of low resolution images taken of the
same scene. Super resolution reconstruction is the process of
combining several low resolution images into a single higher
resolution image. The ideal algorithm should be fast, and should add
sharpness and details, both at edges and in regions without adding
artifacts. In this paper we propose a super resolution blind
reconstruction technique for linearly degraded images. In our
proposed technique the algorithm is divided into three parts an image
registration, wavelets based fusion and an image restoration. In this
paper three low resolution images are considered which may sub
pixels shifted, rotated, blurred or noisy, the sub pixel shifted images
are registered using affine transformation model; A wavelet based
fusion is performed and the noise is removed using soft thresolding.
Our proposed technique reduces blocking artifacts and also
smoothens the edges and it is also able to restore high frequency
details in an image. Our technique is efficient and computationally
fast having clear perspective of real time implementation.
Abstract: Since 1984 many schemes have been proposed for
digital signature protocol, among them those that based on discrete
log and factorizations. However a new identification scheme based
on iterated function (IFS) systems are proposed and proved to be
more efficient. In this study the proposed identification scheme is
transformed into a digital signature scheme by using a one way hash
function. It is a generalization of the GQ signature schemes. The
attractor of the IFS is used to obtain public key from a private one,
and in the encryption and decryption of a hash function. Our aim is
to provide techniques and tools which may be useful towards
developing cryptographic protocols. Comparisons between the
proposed scheme and fractal digital signature scheme based on RSA
setting, as well as, with the conventional Guillou-Quisquater
signature, and RSA signature schemes is performed to prove that, the
proposed scheme is efficient and with high performance.
Abstract: In today's complex global environment, emotional intelligence in educational administrations encompasses self-regard that is formed to utilize communication effectiveness. The paper is undertaken to understand the relationship between managers- emotional intelligence especially self-regard and employees to improve communication effectiveness in educational administrations of Iran. Data (N = 145) for this study were collected through questionnaires that participants were managers and employees educational administrations of Iran. The aim of this paper assess the emotional intelligence especially self-regard of managers and employees and its relationship with communication effectiveness in educational administrations of Iran. This paper explained self-regard that has a high relationship with communication especially communication effectiveness. Self-regard plays an important role in communication effectiveness. Individuals with high self-regard tend to have higher emotional intelligence and this action lead to improve communication effectiveness. The result of the paper shows a strong correspondence between self-regard and communication effectiveness in educational administrations.
Abstract: Conjugate natural convection in a differentially heated
square enclosure containing a polygon shaped object is studied numerically in this article. The effect of various polygon types on the
fluid flow and thermal performance of the enclosure is addressed for
different thermal conductivities. The governing equations are modeled
and solved numerically using the built-in finite element method of COMSOL software. It is found that the heat transfer rate remains
stable by varying the polygon types.
Abstract: In this paper, a novel multi join algorithm to join
multiple relations will be introduced. The novel algorithm is based
on a hashed-based join algorithm of two relations to produce a double index. This is done by scanning the two relations once. But
instead of moving the records into buckets, a double index will be built. This will eliminate the collision that can happen from a complete hash algorithm. The double index will be divided into join
buckets of similar categories from the two relations. The algorithm then joins buckets with similar keys to produce joined buckets. This
will lead at the end to a complete join index of the two relations. without actually joining the actual relations. The time complexity
required to build the join index of two categories is Om log m where m is the size of each category. Totaling time complexity to O n log m
for all buckets. The join index will be used to materialize the joined relation if required. Otherwise, it will be used along with other join
indices of other relations to build a lattice to be used in multi-join operations with minimal I/O requirements. The lattice of the join indices can be fitted into the main memory to reduce time complexity of the multi join algorithm.
Abstract: In this article, we aim to discuss the formulation of two explicit group iterative finite difference methods for time-dependent two dimensional Burger-s problem on a variable mesh. For the non-linear problems, the discretization leads to a non-linear system whose Jacobian is a tridiagonal matrix. We discuss the Newton-s explicit group iterative methods for a general Burger-s equation. The proposed explicit group methods are derived from the standard point and rotated point Crank-Nicolson finite difference schemes. Their computational complexity analysis is discussed. Numerical results are given to justify the feasibility of these two proposed iterative methods.
Abstract: In a previous work, we presented the numerical
solution of the two dimensional second order telegraph partial
differential equation discretized by the centred and rotated five-point
finite difference discretizations, namely the explicit group (EG) and
explicit decoupled group (EDG) iterative methods, respectively. In
this paper, we utilize a domain decomposition algorithm on these
group schemes to divide the tasks involved in solving the same
equation. The objective of this study is to describe the development
of the parallel group iterative schemes under OpenMP programming
environment as a way to reduce the computational costs of the
solution processes using multicore technologies. A detailed
performance analysis of the parallel implementations of points and
group iterative schemes will be reported and discussed.