Abstract: In this paper, we present a non-blind technique of
adding the watermark to the Fourier spectral components of audio
signal in a way such that the modified amplitude does not exceed the
maximum amplitude spread (MAS). This MAS is due to individual
Discrete fourier transform (DFT) coefficients in that particular frame,
which is derived from the Energy Spreading function given by
Schroeder. Using this technique one can store double the information
within a given frame length i.e. overriding the watermark on the
host of equal length with least perceptual distortion. The watermark
is uniformly floating on the DFT components of original signal.
This helps in detecting any intentional manipulations done on the
watermarked audio. Also, the scheme is found robust to various signal
processing attacks like presence of multiple watermarks, Additive
white gaussian noise (AWGN) and mp3 compression.
Abstract: The deposition of diamond films on a Si3N4 substrate
is an attractive technique for industrial applications because of the
excellent properties of diamond. Pretreatment of substrate is very
important prior to diamond deposition to promote nucleation and
adhesion between coating and substrate. Deposition of
nanocrystalline diamonds films on silicon nitride substrate have been
carried out by HF-CVD technique using mixture of methane and
hydrogen gases. Different pretreatment of substrate including
chemical etching consists of hot acid etching and basic etching and
mechanical etching were used to study the quality of diamond formed
on the substrate. The structure and morphology of diamond coating
have been studied using X-ray Diffraction (XRD) and Scanning
Electron Microscope (SEM) while diamond film quality has been
characterized using Raman spectroscopy. AFM was used to
investigate the effect of chemical etching and mechanical
pretreatment on the surface roughness of the substrates and the
resultant morphology of nanocrystalline diamond. It was found that
diamond film deposited on as-received, basic etched and grinded
substrate shows the morphology of cauliflower while blasted and
acidic etched substrates produce smooth, continuous diamond film.
However, the Raman investigation did not show any deviation in
quality of diamond film for any pretreatment.
Abstract: Ontologies play an important role in semantic web
applications and are often developed by different groups and
continues to evolve over time. The knowledge in ontologies changes
very rapidly that make the applications outdated if they continue to
use old versions or unstable if they jump to new versions. Temporal
frames using frame versioning and slot versioning are used to take
care of dynamic nature of the ontologies. The paper proposes new
tags and restructured OWL format enabling the applications to work
with the old or new version of ontologies. Gene Ontology, a very
dynamic ontology, has been used as a case study to explain the OWL
Ontology with Temporal Tags.
Abstract: To derive the fractional flow equation oil
displacement will be assumed to take place under the so-called
diffusive flow condition. The constraints are that fluid saturations at
any point in the linear displacement path are uniformly distributed
with respect to thickness; this allows the displacement to be described
mathematically in one dimension. The simultaneous flow of oil and
water can be modeled using thickness averaged relative permeability,
along the centerline of the reservoir. The condition for fluid potential
equilibrium is simply that of hydrostatic equilibrium for which the
saturation distribution can be determined as a function of capillary
pressure and therefore, height. That is the fluids are distributed in
accordance with capillary-gravity equilibrium.
This paper focused on the fraction flow of water versus
cumulative oil recoveries using Buckley Leverett method. Several
field cases have been developed to aid in analysis. Producing watercut
(at surface conditions) will be compared with the cumulative oil
recovery at breakthrough for the flowing fluid.
Abstract: Natural fibres have emerged as the potential reinforcement material for composites and thus gain attraction by many researchers. This is mainly due to their applicable benefits as they offer low density, low cost, renewable, biodegradability and environmentally harmless and also comparable mechanical properties with synthetic fibre composites. The properties of hybrid composites highly depends on several factors, including the interaction of fillers with the polymeric matrix, shape and size (aspect ratio), and orientation of fillers [1]. In this study, natural fibre kenaf composites and kenaf/fibreglass hybrid composites were fabricated by a combination of hand lay-up method and cold-press method. The effect of different fibre types (powder, short and long) on the tensile properties of composites is investigated. The kenaf composites with and without the addition of fibreglass were then characterized by tensile testing and scanning electron microscopy. A significant improvement in tensile strength and modulus were indicated by the introduction of long kenaf/woven fibreglass hybrid composite. However, the opposite trends are observed in kenaf powder composite. Fractographic observation shows that fibre/matrix debonding causes the fibres pull out. This phenomenon results in the fibre and matrix fracture.
Abstract: IP networks are evolving from data communication
infrastructure into many real-time applications such as video
conferencing, IP telephony and require stringent Quality of Service
(QoS) requirements. A rudimentary issue in QoS routing is to find a
path between a source-destination pair that satisfies two or more endto-
end constraints and termed to be NP hard or complete. In this
context, we present an algorithm Multi Constraint Path Problem
Version 3 (MCPv3), where all constraints are approximated and
return a feasible path in much quicker time. We present another
algorithm namely Delay Coerced Multi Constrained Routing
(DCMCR) where coerce one constraint and approximate the
remaining constraints. Our algorithm returns a feasible path, if exists,
in polynomial time between a source-destination pair whose first
weight satisfied by the first constraint and every other weight is
bounded by remaining constraints by a predefined approximation
factor (a). We present our experimental results with different
topologies and network conditions.
Abstract: A Space Vector based Pulse Width Modulation
control technique for the three-phase PWM converter is proposed in
this paper. The proposed control scheme is based on a synchronous
reference frame model. High performance and efficiency is obtained
with regards to the DC bus voltage and the power factor
considerations of the PWM rectifier thus leading to low losses.
MATLAB/SIMULINK are used as a platform for the simulations and
a SIMULINK model is presented in the paper. The results show that
the proposed model demonstrates better performance and properties
compared to the traditional SPWM method and the method improves
the dynamic performance of the closed loop drastically.
For the Space Vector based Pulse Width Modulation, Sine signal
is the reference waveform and triangle waveform is the carrier
waveform. When the value sine signal is large than triangle signal,
the pulse will start produce to high. And then when the triangular
signals higher than sine signal, the pulse will come to low. SPWM
output will changed by changing the value of the modulation index
and frequency used in this system to produce more pulse width. The
more pulse width produced, the output voltage will have lower
harmonics contents and the resolution increase.
Abstract: The robustness of color-based signatures in the presence of a selection of representative distortions is investigated. Considered are five signatures that have been developed and evaluated within a new modular framework. Two signatures presented in this work are directly derived from histograms gathered from video frames. The other three signatures are based on temporal information by computing difference histograms between adjacent frames. In order to obtain objective and reproducible results, the evaluations are conducted based on several randomly assembled test sets. These test sets are extracted from a video repository that contains a wide range of broadcast content including documentaries, sports, news, movies, etc. Overall, the experimental results show the adequacy of color-histogram-based signatures for video fingerprinting applications and indicate which type of signature should be preferred in the presence of certain distortions.
Abstract: Software Reusability is primary attribute of software
quality. There are metrics for identifying the quality of reusable
components but the function that makes use of these metrics to find
reusability of software components is still not clear. These metrics if
identified in the design phase or even in the coding phase can help us
to reduce the rework by improving quality of reuse of the component
and hence improve the productivity due to probabilistic increase in
the reuse level. In this paper, we have devised the framework of
metrics that uses McCabe-s Cyclometric Complexity Measure for
Complexity measurement, Regularity Metric, Halstead Software
Science Indicator for Volume indication, Reuse Frequency metric
and Coupling Metric values of the software component as input
attributes and calculated reusability of the software component. Here,
comparative analysis of the fuzzy, Neuro-fuzzy and Fuzzy-GA
approaches is performed to evaluate the reusability of software
components and Fuzzy-GA results outperform the other used
approaches. The developed reusability model has produced high
precision results as expected by the human experts.
Abstract: Contact stress is an important problem in industry.
This is a problem that in the first attention may be don-t appears, but
disregard of these stresses cause a lot of damages in machines. These
stresses occur at locations such as gear teeth, bearings, cams and
between a locomotive wheel and the railroad rail. These stresses
cause failure by excessive elastic deformation, yielding and fracture.
In this paper we intend show the effective parameters in contact
stress and ponder effect of curvature. In this paper we study contact
stresses on the surface of gear teeth and compare these stresses for
four popular profiles of gear teeth (involute, cycloid, epicycloids, and
hypocycloid). We study this problem with mathematical and finite
element methods and compare these two methods on different profile
surfaces.
Abstract: The goal of a network-based intrusion detection
system is to classify activities of network traffics into two major
categories: normal and attack (intrusive) activities. Nowadays, data
mining and machine learning plays an important role in many
sciences; including intrusion detection system (IDS) using both
supervised and unsupervised techniques. However, one of the
essential steps of data mining is feature selection that helps in
improving the efficiency, performance and prediction rate of
proposed approach. This paper applies unsupervised K-means
clustering algorithm with information gain (IG) for feature selection
and reduction to build a network intrusion detection system. For our
experimental analysis, we have used the new NSL-KDD dataset,
which is a modified dataset for KDDCup 1999 intrusion detection
benchmark dataset. With a split of 60.0% for the training set and the
remainder for the testing set, a 2 class classifications have been
implemented (Normal, Attack). Weka framework which is a java
based open source software consists of a collection of machine
learning algorithms for data mining tasks has been used in the testing
process. The experimental results show that the proposed approach is
very accurate with low false positive rate and high true positive rate
and it takes less learning time in comparison with using the full
features of the dataset with the same algorithm.
Abstract: This paper has, as its point of departure, the foundational
axiomatic theory of E. De Giorgi (1996, Scuola Normale
Superiore di Pisa, Preprints di Matematica 26, 1), based on two
primitive notions of quality and relation. With the introduction of
a unary relation, we develop a system totally based on the sole
primitive notion of relation. Such a modification enables a definition
of the concept of dynamic unary relation. In this way we construct a
simple language capable to express other well known theories such
as Robinson-s arithmetic or a piece of a theory of concatenation. A
key role in this system plays an abstract relation designated by “( )",
which can be interpreted in different ways, but in this paper we will
focus on the case when we can perform computations and obtain
results.
Abstract: Mostly transforms are used for speech data
compressions which are lossy algorithms. Such algorithms are
tolerable for speech data compression since the loss in quality is not
perceived by the human ear. However the vector quantization (VQ)
has a potential to give more data compression maintaining the same
quality. In this paper we propose speech data compression algorithm
using vector quantization technique. We have used VQ algorithms
LBG, KPE and FCG. The results table shows computational
complexity of these three algorithms. Here we have introduced a new
performance parameter Average Fractional Change in Speech
Sample (AFCSS). Our FCG algorithm gives far better performance
considering mean absolute error, AFCSS and complexity as
compared to others.
Abstract: The protection of groundwater resources is the great
important many semiarid and arid environments. Baghan watershed
is located in the north of Kangan in the Boshehr province in Iran. The
groundwater resources have a vital role in supplying agricultural,
drinking, domestic and industrial water demand in Baghan
watershed. For our investigation into the water quality we collected
30 samples to chemical and physical analysis. The result showed the
marl and evaporation deposits that contain anhydrite and gypsum is
the main source of groundwater pollution, and one part of the
groundwater was polluted by oil and gas industrial. Another part of
the groundwater was contaminated by urban waste water. The
electrical conductivity and captions and anions increased around of
towns and gas refinery. Although the negative impact of untreated
domestic wastewater is relatively low but the results showed strongly
the negative impact of wastewater refinery is very considerable. This
negative impact increased in downstream due to shallow aquifer.
Additionally, the agents that adversely affect the quality of
groundwater come from a variety of sources, including geology,
domestic wastewater and the Jam refinery in Baghan watershed.
Abstract: In the present work, study of the vibration of thin cylindrical shells made of a functionally gradient material (FGM) composed of stainless steel and nickel is presented. Material properties are graded in the thickness direction of the shell according to volume fraction power law distribution. The objective is to study the natural frequencies, the influence of constituent volume fractions and the effects of boundary conditions on the natural frequencies of the FG cylindrical shell. The study is carried out using third order shear deformation shell theory. The governing equations of motion of FG cylindrical shells are derived based on shear deformation theory. Results are presented on the frequency characteristics, influence of constituent volume fractions and the effects of free-free boundary conditions.
Abstract: Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition, it will include a digital photograph that will enable biometric comparison, through the use of facial recognition technology at international borders. Moreover, the e-passport will have a new interface, incorporating additional antifraud and security features. However, its problems are reliability, security and privacy. Privacy is a serious issue since there is no encryption between the readers and the E-passport. However, security issues such as authentication, data protection and control techniques cannot be embedded in one process. In this paper, design and prototype implementation of an improved E-passport reader is presented. The passport holder is authenticated online by using GSM network. The GSM network is the main interface between identification center and the e-passport reader. The communication data is protected between server and e-passport reader by using AES to encrypt data for protection will transferring through GSM network. Performance measurements indicate a 19% improvement in encryption cycles versus previously reported results.
Abstract: In-situ chemical oxidation (ISCO) has been widely
used for source zone remediation of Dense Nonaqueous Phase
Liquids (DNAPLs) in subsurface environments. DNAPL source
zones for karst aquifers are generally located in epikarst where the
DNAPL mass is trapped either in karst soil or at the regolith contact
with carbonate bedrock. This study aims to investigate the
performance of oxidation of residual trichloroethylene found in such
environments by potassium permanganate. Batch and flow cell
experiments were conducted to determine the kinetics and the mass
removal rate of TCE. pH change, Cl production, TCE and MnO4
destruction were monitored routinely during experiments. Nonreactive
tracer tests were also conducted prior and after the oxidation
process to determine the influence of oxidation on flow conditions.
The results show that oxidant consumption rate of the calcareous
epikarst soil was significant and the oxidant demand was determined
to be 20 g KMnO4/kg soil. Oxidation rate of residual TCE (1.26x10-3
s-1) was faster than the oxidant consumption rate of the soil (2.54 -
2.92x10-4 s-1) at only high oxidant concentrations (> 40 mM
KMnO4). Half life of TCE oxidation ranged from 7.9 to 10.7 min.
Although highly significant fraction of residual TCE mass in the
system was destroyed by permanganate oxidation, TCE
concentration in the effluent remained above its MCL. Flow
interruption tests indicate that efficiency of ISCO was limited by the
rate of TCE dissolution and the rate-limited desorption of TCE. The
residence time and the initial concentration of the oxidant in the
source zone also controlled the efficiency of ISCO in epikarst.
Abstract: Non-premixed turbulent combustion Computational Fluid Dynamics (CFD) has been carried out in a simplified methanefuelled coaxial jet combustor employing Large Eddy Simulation (LES). The objective of this study is to evaluate the performance of LES in modelling non-premixed combustion using a commercial software, FLUENT, and investigate the effects of the grid density and chemistry models employed on the accuracy of the simulation results. A comparison has also been made between LES and Reynolds Averaged Navier-Stokes (RANS) predictions. For LES grid sensitivity test, 2.3 and 6.2 million cell grids are employed with the equilibrium model. The chemistry model sensitivity analysis is achieved by comparing the simulation results from the equilibrium chemistry and steady flamelet models. The predictions of the mixture fraction, axial velocity, species mass fraction and temperature by LES are in good agreement with the experimental data. The LES results are similar for the two chemistry models but influenced considerably by the grid resolution in the inner flame and near-wall regions.
Abstract: Mammalian genomes contain large number of
retroelements (SINEs, LINEs and LTRs) which could affect
expression of protein coding genes through associated transcription
factor binding sites (TFBS). Activity of the retroelement-associated
TFBS in many genes is confirmed experimentally but their global
functional impact remains unclear. Human SINEs (Alu repeats) and
mouse SINEs (B1 and B2 repeats) are known to be clustered in GCrich
gene rich genome segments consistent with the view that they
can contribute to regulation of gene expression. We have shown
earlier that Alu are involved in formation of cis-regulatory modules
(clusters of TFBS) in human promoters, and other authors reported
that Alu located near promoter CpG islands have an increased
frequency of CpG dinucleotides suggesting that these Alu are
undermethylated. Human Alu and mouse B1/B2 elements have an
internal bipartite promoter for RNA polymerase III containing
conserved sequence motif called B-box which can bind basal
transcription complex TFIIIC. It has been recently shown that TFIIIC
binding to B-box leads to formation of a boundary which limits
spread of repressive chromatin modifications in S. pombe. SINEassociated
B-boxes may have similar function but conservation of
TFIIIC binding sites in SINEs located near mammalian promoters
has not been studied earlier. Here we analysed abundance and
distribution of retroelements (SINEs, LINEs and LTRs) in annotated
sequences of the Database of mammalian transcription start sites
(DBTSS). Fractions of SINEs in human and mouse promoters are
slightly lower than in all genome but >40% of human and mouse
promoters contain Alu or B1/B2 elements within -1000 to +200 bp
interval relative to transcription start site (TSS). Most of these SINEs
is associated with distal segments of promoters (-1000 to -200 bp
relative to TSS) indicating that their insertion at distances >200 bp
upstream of TSS is tolerated during evolution. Distribution of SINEs
in promoters correlates negatively with the distribution of CpG
sequences. Using analysis of abundance of 12-mer motifs from the
B1 and Alu consensus sequences in genome and DBTSS it has been
confirmed that some subsegments of Alu and B1 elements are poorly
conserved which depends in part on the presence of CpG
dinucleotides. One of these CpG-containing subsegments in B1
elements overlaps with SINE-associated B-box and it shows better
conservation in DBTSS compared to genomic sequences. It has been
also studied conservation in DBTSS and genome of the B-box
containing segments of old (AluJ, AluS) and young (AluY) Alu
repeats and found that CpG sequence of the B-box of old Alu is
better conserved in DBTSS than in genome. This indicates that Bbox-
associated CpGs in promoters are better protected from
methylation and mutation than B-box-associated CpGs in genomic
SINEs. These results are consistent with the view that potential
TFIIIC binding motifs in SINEs associated with human and mouse
promoters may be functionally important. These motifs may protect
promoters from repressive histone modifications which spread from
adjacent sequences. This can potentially explain well known
clustering of SINEs in GC-rich gene rich genome compartments and
existence of unmethylated CpG islands.
Abstract: A graph G is fractional k-covered if for each edge e of
G, there exists a fractional k-factor h, such that h(e) = 1. If k = 2,
then a fractional k-covered graph is called a fractional 2-covered
graph. The binding number bind(G) is defined as follows,
bind(G) = min{|NG(X)|
|X|
: ├ÿ = X Ôèå V (G),NG(X) = V (G)}.
In this paper, it is proved that G is fractional 2-covered if δ(G) ≥ 4
and bind(G) > 5
3 .