Abstract: Lossless compression schemes with secure
transmission play a key role in telemedicine applications that helps in
accurate diagnosis and research. Traditional cryptographic algorithms
for data security are not fast enough to process vast amount of data.
Hence a novel Secured lossless compression approach proposed in
this paper is based on reversible integer wavelet transform, EZW
algorithm, new modified runlength coding for character
representation and selective bit scrambling. The use of the lifting
scheme allows generating truly lossless integer-to-integer wavelet
transforms. Images are compressed/decompressed by well-known
EZW algorithm. The proposed modified runlength coding greatly
improves the compression performance and also increases the
security level. This work employs scrambling method which is fast,
simple to implement and it provides security. Lossless compression
ratios and distortion performance of this proposed method are found
to be better than other lossless techniques.
Abstract: The exhaustive quality control is becoming more and
more important when commercializing competitive products in the
world's globalized market. Taken this affirmation as an undeniable
truth, it becomes critical in certain sector markets that need to offer
the highest restrictions in quality terms. One of these examples is the
percussion cap mass production, a critical element assembled in
firearm ammunition. These elements, built in great quantities at a
very high speed, must achieve a minimum tolerance deviation in
their fabrication, due to their vital importance in firing the piece of
ammunition where they are built in. This paper outlines a machine
vision development for the 100% inspection of percussion caps
obtaining data from 2D and 3D simultaneous images. The acquisition
speed and precision of these images from a metallic reflective piece
as a percussion cap, the accuracy of the measures taken from these
images and the multiple fabrication errors detected make the main
findings of this work.
Abstract: The objectives of this research were to compare the success of SME registered in Nakorn Pathom Province divided in personal data also to study the relations between the innovation knowledge and capability and the success of SME registered in Nakorn Pathom Province and to study the relations between the work efficiency and the success of SME registered in Nakorn Pathom Province. A questionnaire was utilized as a tool to collect data. Statistics utilized in this research included frequency, percentage, mean, standard deviation, and multiple regression analysis. Data were analyzed by using Statistical Package for the Social Sciences.The findings revealed that the majority of respondents were male with the age between 25-34 years old, hold undergraduate degree, married and stay together. The average income of respondents was between 10,001-20,000 baht. It also found that in terms of innovation knowledge and capability, there were two variables had an influence on the amount of innovation knowledge and capability, innovation evaluation which were physical characteristic and innovation process.
Abstract: The experiments were performed in a batch set up
under different concentrations of Cu (II) (0.2 g.l-1 to 0.9 g.l-1), pH (4-
6), temperatures (20oC – 40oC) with varying teak leaves powder (as
biosorbent) dosage of 0.3 g.l-1 to 0.5 g.l-1. The kinetics of interactions
were tested with pseudo first order Lagergran equation and the value
for k1 was found to be 6.909 x 10-3 min-1. The biosorption data gave
a good fit with Langmuir and Fruendlich isotherms and the Langmuir
monolayer capacity (qm) was found to be 166.78 mg. g-1. Similarly
the Freundlich adsorption capacity (Kf) was estimated as 2.49 l g-1.
The mean values of the thermodynamic parameters ΔH, ΔS, and ΔG
were -62.42 KJ. mol-1, -0.219 KJ.mol-1 K-1 and -1.747 KJ.mol-1 at
293 K from a solution containing 0.4 g l-1 of Cu(II) showing the
biosorption to be thermodynamically favourable. These results show
good potentiality of using teak leaves as a biosorbent for the removal
of Cu(II) from aqueous solutions.
Abstract: This paper propose a new circuit design which
monitor total leakage current during standby mode and generates the
optimal reverse body bias voltage, by using the adaptive body bias
(ABB) technique to compensate die-to-die parameter variations.
Design details of power monitor are examined using simulation
framework in 65nm and 32nm BTPM model CMOS process.
Experimental results show the overhead of proposed circuit in terms
of its power consumption is about 10 μW for 32nm technology and
about 12 μW for 65nm technology at the same power supply voltage
as the core power supply. Moreover the results show that our
proposed circuit design is not far sensitive to the temperature
variations and also process variations. Besides, uses the simple
blocks which offer good sensitivity, high speed, the continuously
feedback loop.
Abstract: Nonlinear system identification is becoming an important tool which can be used to improve control performance. This paper describes the application of adaptive neuro-fuzzy inference system (ANFIS) model for controlling a car. The vehicle must follow a predefined path by supervised learning. Backpropagation gradient descent method was performed to train the ANFIS system. The performance of the ANFIS model was evaluated in terms of training performance and classification accuracies and the results confirmed that the proposed ANFIS model has potential in controlling the non linear system.
Abstract: This research uses computational linguistics, an area of study that employs a computer to process natural language, and aims at discerning the patterns that exist in declarative sentences used in technical texts. The approach is mathematical, and the focus is on instructional texts found on web pages. The technique developed by the author and named the MAYA Semantic Technique is used here and organized into four stages. In the first stage, the parts of speech in each sentence are identified. In the second stage, the subject of the sentence is determined. In the third stage, MAYA performs a frequency analysis on the remaining words to determine the verb and its object. In the fourth stage, MAYA does statistical analysis to determine the content of the web page. The advantage of the MAYA Semantic Technique lies in its use of mathematical principles to represent grammatical operations which assist processing and accuracy if performed on unambiguous text. The MAYA Semantic Technique is part of a proposed architecture for an entire web-based intelligent tutoring system. On a sample set of sentences, partial semantics derived using the MAYA Semantic Technique were approximately 80% accurate. The system currently processes technical text in one domain, namely Cµ programming. In this domain all the keywords and programming concepts are known and understood.
Abstract: Composite nanostructures of metal
core/semiconductor shell (Au/CdS) configuration were prepared
using organometalic method. UV-Vis spectra for the Au/CdS colloids
show initially two well separated bands, corresponding to surface
plasmon of the Au core, and the exciton of CdS shell. The absorption
of CdS shell is enhanced, while the Au plasmon band is suppressed
as the shell thickness increases. The shell sizes were estimated from
the optical spectra using the effective mass approximation model
(EMA), and compared to the sizes of the Au core and CdS shell
measured by high resolution transmission electron microscope
(HRTEM). The changes in the absorption features are discussed in
terms of gradual increase in the coupling strength of the Au core
surface plasmon and the exciton in the CdS. leading to charge
transfer and modification of electron oscillation in Au core.
Abstract: The modern world is experiencing fundamental and dynamic changes. The transformation of international relations; the end of confrontation and successive overcoming of the Cold War consequences have expanded possible international cooperation. The global nuclear conflict threat has been minimized, while a tendency to establish a unipolar world structure with the U.S. economic and power domination is growing. The current world system of international relations, apparently is secular. However, the religious beliefs of one or another nations play a certain (sometimes a key) role, both in the domestic affairs of the individual countries and in the development of bilateral ties. Political situation in Central Asia has been characterized by new factors such as international terrorism; religious extremism and radicalism; narcotrafficking and illicit arms trade of a global character immediately threaten to peace and political stability in Central Asia. The role and influence of Islamic fundamentalism is increasing; political ethnocentrism and the associated aggravation of inter-ethnic relations, the ambiguity of national interests and objectives of major geo-political groups in the Central Asian region regarding the division the political influence, emerge. This article approaches the following issues: the role of Islam in Central Asia; destabilizing factors in Central Asia; Islamic movements in Central Asia, Western Europe and the United States; the United States, Western Europe and Central Asia: religion, politics, ideology, and the US-Central Asia antiterrorism and religious extremism cooperation.
Abstract: From the perspective of system of systems (SoS) and
emergent behaviors, this paper describes large scale application
software systems, and proposes framework methods to further depict
systems- functional and non-functional characteristics. Besides, this
paper also specifically discusses some functional frameworks. In the
end, the framework-s applications in system disintegrations, system
architecture and stable intermediate forms are additionally dealt with
in this in building, deployment and maintenance of large scale
software applications.
Abstract: This article discusses the prospects of participation of
the Republic of Kazakhstan in Hague Conference on Private
International Law on the unification of collision law in the
international trade.
The article analyzes some conventions on international trade. The
appropriate conclusions based on the opinions of scientists and
experts in this field have been made. First, all issues presented in the
form of gaps or spaces in conventions should be the subject to direct
negotiations in the course of the activities of Hague Conference, and
have a comprehensive feature, be transparent and taken under
simplified procedure.
Secondly, one should not underestimate the value of conventions
that do not become active due to various reasons and having a
positive impact on the development and improvement of national
legislation and practice in the field of private international law.
Thirdly, Kazakhstan has to reconsider its attitude to Hague
Conference, having become its full member and aiming at providing
constructive and fruitful cooperation with both the organization itself
and its member states.
Abstract: Face authentication for access control is a face
membership authentication which passes the person of the incoming
face if he turns out to be one of an enrolled person based on face
recognition or rejects if not. Face membership authentication belongs
to the two class classification problem where SVM(Support Vector
Machine) has been successfully applied and shows better performance
compared to the conventional threshold-based classification. However,
most of previous SVMs have been trained using image feature vectors
extracted from face images of each class member(enrolled
class/unenrolled class) so that they are not robust to variations in
illuminations, poses, and facial expressions and much affected by
changes in member configuration of the enrolled class
In this paper, we propose an effective face membership
authentication method based on SVM using class discriminating
features which represent an incoming face image-s associability with
each class distinctively. These class discriminating features are weakly
related with image features so that they are less affected by variations
in illuminations, poses and facial expression.
Through experiments, it is shown that the proposed face
membership authentication method performs better than the threshold
rule-based or the conventional SVM-based authentication methods and
is relatively less affected by changes in member size and membership.
Abstract: Research and development R&D work involves
enormous amount of work that has to do with data measurement and
collection. This process evolves as new information is fed, new
technologies are utilized, and eventually new knowledge is created
by the stakeholders i.e., researchers, clients, and end-users. When
new knowledge is created, procedures of R&D work should evolve
and produce better results within improved research skills and
improved methods of data measurements and collection. This
measurement improvement should then be benchmarked against a
metric that should be developed at the organization. In this paper, we
are suggesting a conceptual metric for R&D work performance
improvement (PI) at the Kuwait Institute for Scientific Research
(KISR). This PI is to be measured against a set of variables in the
suggested metric, which are more closely correlated to organizational
output, as opposed to organizational norms. The paper also mentions
and discusses knowledge creation and management as an addedvalue
to R&D work and measurement improvement. The research
methodology followed in this work is qualitative in nature, based on
a survey that was distributed to researchers and interviews held with
senior researchers at KISR. Research and analyses in this paper also
include looking at and analyzing KISR-s literature.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and cvazistationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine 1st stage nozzle blade
Abstract: Grobner basis calculation forms a key part of computational
commutative algebra and many other areas. One important
ramification of the theory of Grobner basis provides a means to solve
a system of non-linear equations. This is why it has become very
important in the areas where the solution of non-linear equations is
needed, for instance in algebraic cryptanalysis and coding theory. This
paper explores on a parallel-distributed implementation for Grobner
basis calculation over GF(2). For doing so Buchberger algorithm is
used. OpenMP and MPI-C language constructs have been used to
implement the scheme. Some relevant results have been furnished
to compare the performances between the standalone and hybrid
(parallel-distributed) implementation.
Abstract: Numerical investigation of flow around a square cylinder are presented using the multi-relaxation-time lattice Boltzmann methods at different Reynolds numbers. A detail analysis are given in terms of time-trace analysis of drag and lift coefficients, power spectra analysis of lift coefficient, vorticity contours visualizations, streamlines and phase diagrams. A number of physical quantities mean drag coefficient, drag coefficient, Strouhal number and root-mean-square values of drag and lift coefficients are calculated and compared with the well resolved experimental data and numerical results available in open literature. The Reynolds numbers affected the physical quantities.
Abstract: The evolution of information and communication
technology has made a very powerful support for the improvement of
online learning platforms in creation of courses. This paper presents a
study that attempts to explore new web architecture for creating an
adaptive online learning system to profiles of learners, using the Web
as a source for the automatic creation of courses for the online
training platform. This architecture will reduce the time and decrease
the effort performed by the drafters of the current e-learning
platform, and direct adaptation of the Web content will greatly enrich
the quality of online training courses.
Abstract: Direct Torque Control is a control technique in AC
drive systems to obtain high performance torque control. The
conventional DTC drive contains a pair of hysteresis comparators.
DTC drives utilizing hysteresis comparators suffer from high torque
ripple and variable switching frequency. The most common solution
to those problems is to use the space vector depends on the reference
torque and flux. In this Paper The space vector modulation technique
(SVPWM) is applied to 2 level inverter control in the proposed
DTC-based induction motor drive system, thereby dramatically
reducing the torque ripple. Then the controller based on space vector
modulation is designed to be applied in the control of Induction
Motor (IM) with a three-level Inverter. This type of Inverter has
several advantages over the standard two-level VSI, such as a greater
number of levels in the output voltage waveforms, Lower dV/dt, less
harmonic distortion in voltage and current waveforms and lower
switching frequencies. This paper proposes a general SVPWM
algorithm for three-level based on standard two-level SVPWM. The
proposed scheme is described clearly and simulation results are
reported to demonstrate its effectiveness. The entire control scheme is
implemented with Matlab/Simulink.
Abstract: In this paper, a novel method for a biometric system based on the ECG signal is proposed, using spectral coefficients computed through linear predictive coding (LPC). ECG biometric systems have traditionally incorporated characteristics of fiducial points of the ECG signal as the feature set. These systems have been shown to contain loopholes and thus a non-fiducial system allows for tighter security. In the proposed system, incorporating non-fiducial features from the LPC spectrum produced a segment and subject recognition rate of 99.52% and 100% respectively. The recognition rates outperformed the biometric system that is based on the wavelet packet decomposition (WPD) algorithm in terms of recognition rates and computation time. This allows for LPC to be used in a practical ECG biometric system that requires fast, stringent and accurate recognition.
Abstract: Unsteady natural convection and heat transfer in a square cavity partially filled with porous media using a thermal
non-equilibrium model is studied in this paper. The left vertical wall is
maintained at a constant hot temperature Th and the right vertical wall
is maintained at a constant cold temperature Tc, while the horizontal
walls are adiabatic. The governing equations are obtained by applying
the Darcy model and Boussinesq approximation. COMSOL’s finite
element method is used to solve the non-dimensional governing
equations together with specified boundary conditions. The governing
parameters of this study are the Rayleigh number (Ra = 10^5, and Ra = 10^6 ), Darcy namber (Da = 10^−2, and Da = 10^−3),
the modified thermal conductivity ratio (10^−1 ≤ γ ≤ 10^4), the inter-phase heat transfer coefficien (10^−1 ≤ H ≤ 10^3) and the
time dependent (0.001 ≤ τ ≤ 0.2). The results presented for
values of the governing parameters in terms of streamlines in both
fluid/porous-layer, isotherms of fluid in fluid/porous-layer, isotherms
of solid in porous layer, and average Nusselt number.