Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: The Norwegian Military Academy (Army) has been
using a tactical simulator for the last two years. During this time
there has been some discussion concerning how to use the simulator
most efficiently and what type of learning one achieves by using the
simulator. The problem that is addressed in this paper is how
simulators can be used as a learning resource for students concerned
with developing their military profession. The aim of this article is to
create a wider consciousness regarding the use of a simulator while
educating officers in a military profession. The article discusses the
use of simulators from two different perspectives. The first
perspective deals with using the simulator as a computer game, and
the second perspective looks at the simulator as a socio-cultural
artefact. Furthermore the article discusses four different ways the
simulator can be looked upon as a useful learning resource when
educating students of a military profession.
Abstract: Multirate multimedia delivery applications in multihop Wireless Mesh Network (WMN) are data redundant and delay-sensitive, which brings a lot of challenges for designing efficient transmission systems. In this paper, we propose a new cross layer resource allocation scheme to minimize the receiver side distortion within the delay bound requirements, by exploring application layer Position and Value (P-V) diversity as well as the multihop Effective Capacity (EC). We specifically consider image transmission optimization here. First of all, the maximum supportable source traffic rate is identified by exploring the multihop Effective Capacity (EC) model. Furthermore, the optimal source coding rate is selected according to the P-V diversity of multirate media streaming, which significantly increases the decoded media quality. Simulation results show the proposed approach improved media quality significantly compared with traditional approaches under the same QoS requirements.
Abstract: Since IEC61850 substation communication standard represents the trend to develop new generations of Substation Automation System (SAS), many IED manufacturers pursue this technique and apply for KEMA. In order to put on the market to meet customer demand as fast as possible, manufacturers often apply their products only for basic environment standard certification but claim to conform to IEC61850 certification. Since verification institutes generally perform verification tests only on specific IEDs of the manufacturers, the interoperability between all certified IEDs cannot be guaranteed. Therefore the interoperability between IEDs from different manufacturers needs to be tested. Based upon the above reasons, this study applies the definitions of the information models, communication service, GOOSE functionality and Substation Configuration Language (SCL) of the IEC61850 to build the concept of communication protocols, and build the test environment. The procedures of the test of the data collection and exchange of the P2P communication mode and Client / Server communication mode in IEC61850 are outlined as follows. First, test the IED GOOSE messages communication capability from different manufacturers. Second, collect IED data from each IED with SCADA system and use HMI to display the SCADA platform. Finally, problems generally encountered in the test procedure are summarized.
Abstract: A number of previous studies were rarely considered
the effects of transient non-uniform balloon expansion on evaluation
of the properties and behaviors of stents during stent expansion, nor
did they determine parameters to maximize the performances driven
by mechanical characteristics. Therefore, in order to fully understand
the mechanical characteristics and behaviors of stent, it is necessary to
consider a realistic modeling of transient non-uniform balloon-stent
expansion. The aim of the study is to propose design parameters
capable of improving the ability of vascular stent through a
comparative study of seven commercial stents using finite element
analyses of a realistic transient non-uniform balloon-stent expansion
process. In this study, seven representative commercialized stents were
evaluated by finite element (FE) analysis in terms of the criteria based
on the itemized list of Food and Drug Administration (FDA) and
European Standards (prEN). The results indicate that using stents
composed of opened unit cells connected by bend-shaped link
structures and controlling the geometrical and morphological features
of the unit cell strut or the link structure at the distal ends of stent may
improve mechanical characteristics of stent. This study provides a
better method at the realistic transient non-uniform balloon-stent
expansion by investigating the characteristics, behaviors, and
parameters capable of improving the ability of vascular stent.
Abstract: Music segmentation is a key issue in music information
retrieval (MIR) as it provides an insight into the
internal structure of a composition. Structural information about
a composition can improve several tasks related to MIR such
as searching and browsing large music collections, visualizing
musical structure, lyric alignment, and music summarization.
The authors of this paper present the MTSSM framework, a twolayer
framework for the multi-track segmentation of symbolic
music. The strength of this framework lies in the combination of
existing methods for local track segmentation and the application
of global structure information spanning via multiple tracks.
The first layer of the MTSSM uses various string matching
techniques to detect the best candidate segmentations for each
track of a multi-track composition independently. The second
layer combines all single track results and determines the best
segmentation for each track in respect to the global structure of
the composition.
Abstract: This article gives a short preview of the new software
created especially for palletizing process in automated production
systems. Each chapter of this article is about problem solving in
development of modules in Java programming language. First part
describes structure of the software, its modules and data flow
between them. Second part describes all deployment methods, which
are implemented in the software. Next chapter is about twodimensional
editor created for manipulation with objects in each
layer of the load and gives calculations for collision control. Module
of virtual reality used for three-dimensional preview and creation of
the load is described in the fifth chapter. The last part of this article
describes communication and data flow between control system of
the robot, vision system and software.
Abstract: loss of feedwater accident is one of the frequently sever accidents in steam boiler facilities. It threatens the system structural integrity and generates serious hazards and economic loses. The safety analysis of the thermal installations, based extensively on the numeric simulation. The simulation analysis using realistic computer codes like Relap5/Mod3.2 will help understand steam boiler thermal-hydraulic behavior during normal and abnormal conditions. In this study, we are interested on the evaluation of the radiant steam boiler assessment and response to loss-of-feedwater accident. Pressure, temperature and flow rate profiles are presented in various steam boiler system components. The obtained results demonstrate the importance and capability of the Relap5/Mod3.2 code in the thermal-hydraulic analysis of the steam boiler facilities.
Abstract: Embedding Sustainability in technological curricula has become a crucial factor for educating engineers with competences in sustainability. The Technical University of Catalonia UPC, in 2008, designed the Sustainable Technology Excellence Program STEP 2015 in order to assure a successful Sustainability Embedding. This Program takes advantage of the opportunity that the redesign of all Bachelor and Master Degrees in Spain by 2010 under the European Higher Education Area framework offered. The STEP program goals are: to design compulsory courses in each degree; to develop the conceptual base and identify reference models in sustainability for all specialties at UPC; to create an internal interdisciplinary network of faculty from all the schools; to initiate new transdisciplinary research activities in technology-sustainability-education; to spread the know/how attained; to achieve international scientific excellence in technology-sustainability-education and to graduate the first engineers/architects of the new EHEA bachelors with sustainability as a generic competence. Specifically, in this paper authors explain their experience in leading the STEP program, and two examples are presented: Industrial Robotics subject and the curriculum for the School of Architecture.
Abstract: Benchmarking cleaner production performance is an
effective way of pollution control and emission reduction in coal-fired
power industry. A benchmarking method using two-stage
super-efficiency data envelopment analysis for coal-fired power plants
is proposed – firstly, to improve the cleaner production performance of
DEA-inefficient or weakly DEA-efficient plants, then to select the
benchmark from performance-improved power plants. An empirical
study is carried out with the survey data of 24 coal-fired power plants.
The result shows that in the first stage the performance of 16 plants is
DEA-efficient and that of 8 plants is relatively inefficient. The target
values for improving DEA-inefficient plants are acquired by
projection analysis. The efficient performance of 24 power plants and
the benchmarking plant is achieved in the second stage. The two-stage
benchmarking method is practical to select the optimal benchmark in
the cleaner production of coal-fired power industry and will
continuously improve plants- cleaner production performance.
Abstract: This paper presents a model for an unreliable
production line, which is operated according to demand with constant
work-in-process (CONWIP). A simulation model is developed based
on the discrete model and several case problems are analyzed using
the model. The model is utilized to optimize storage space capacities
at intermediate stages and the number of kanbans at the last stage,
which is used to trigger the production at the first stage. Furthermore,
effects of several line parameters on production rate are analyzed
using design of experiments.
Abstract: Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronization messages and fewer checkpoints are preferred in mobile environment. There are two different approaches, although not orthogonal, to checkpoint mobile computing systems namely, time-based and index-based. Our protocol is a fusion of these two approaches, though not first of its kind. In the present exposition, an index-based checkpointing protocol has been developed, which uses time to indirectly coordinate the creation of consistent global checkpoints for mobile computing systems. The proposed algorithm is non-blocking, adaptive, and does not use any control message. Compared to other contemporary checkpointing algorithms, it is computationally more efficient because it takes lesser number of checkpoints and does not need to compute dependency relationships. A brief account of important and relevant works in both the fields, time-based and index-based, has also been included in the presentation.
Abstract: We present a new algorithm for nonlinear dimensionality reduction that consistently uses global information, and that enables understanding the intrinsic geometry of non-convex manifolds. Compared to methods that consider only local information, our method appears to be more robust to noise. Unlike most methods that incorporate global information, the proposed approach automatically handles non-convexity of the data manifold. We demonstrate the performance of our algorithm and compare it to state-of-the-art methods on synthetic as well as real data.
Abstract: This paper introduces our first efforts of developing a
new team for RoboCup Middle Size Competition. In our robots we
have applied omni directional based mobile system with omnidirectional
vision system and fuzzy control algorithm to navigate
robots. The control architecture of MRL middle-size robots is a three
layered architecture, Planning, Sequencing, and Executing. It also
uses Blackboard system to achieve coordination among agents.
Moreover, the architecture should have minimum dependency on low
level structure and have a uniform protocol to interact with real
robot.
Abstract: Paper deals with environmental metrics and assessment systems devoted to Small and Medium Sized Enterprises. Authors are presenting proposed assessment model which has an ability to discover current environmental strengths and weaknesses of Small and Middle Sized Enterprise. Suggested model has also an ambition to become a Sustainability Decision Tool. Model is able to identify "best environmental devision" in the company, and to quantify how this decision contributed into overall environmental improvement. Authors understand environmental improvements as environmental innovations (product, process and organizational). Suggested model is based on its own concept; however, authors are also utilizing already existing environmental assessment tools.
Abstract: Restoration of endodontically treated teeth is a
common problem in dentistry, related to the fractures occurring in
such teeth and to concentration of forces little information regarding
variation of basic preparation guidelines in stress distribution has
been available. To date, there is still no agreement in the literature
about which material or technique can optimally restore
endodontically treated teeth. The aim of the present study was to
evaluate the influence of the core height and restoration materials on
corono-radicular restored upper first premolar. The first step of the
study was to achieve 3D models in order to analyze teeth, dowel and
core restorations and overlying full ceramic crowns. The FEM model
was obtained by importing the solid model into ANSYS finite
element analysis software. An occlusal load of 100 N was conducted,
and stresses occurring in the restorations, and teeth structures were
calculated. Numerical simulations provide a biomechanical
explanation for stress distribution in prosthetic restored teeth. Within
the limitations of the present study, it was found that the core height
has no important influence on the stress generated in coronoradicular
restored premolars. It can be drawn that the cervical regions
of the teeth and restorations were subjected to the highest stress
concentrations.
Abstract: Waiting times and queues are a daily problem for theme parks. Fast lines or priority queues appear as a solution for a specific segment of customers, that is, tourists who are willing to pay to avoid waiting. This paper analyzes the fast line system and explores the factors that affect the decision to purchase a fast line pass. A greater understanding of these factors may help companies to design appropriate products and services. This conceptual paper was based on a literature review in marketing and consumer behavior. Additional research was identified in related disciplines such as leisure studies, psychology, and sociology. A conceptual framework of the factors influencing the decision to purchase a fast line pass is presented.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.
Abstract: The myoelectric signal (MES) is one of the Biosignals
utilized in helping humans to control equipments. Recent approaches
in MES classification to control prosthetic devices employing pattern
recognition techniques revealed two problems, first, the classification
performance of the system starts degrading when the number of
motion classes to be classified increases, second, in order to solve the
first problem, additional complicated methods were utilized which
increase the computational cost of a multifunction myoelectric
control system. In an effort to solve these problems and to achieve a
feasible design for real time implementation with high overall
accuracy, this paper presents a new method for feature extraction in
MES recognition systems. The method works by extracting features
using Wavelet Packet Transform (WPT) applied on the MES from
multiple channels, and then employs Fuzzy c-means (FCM)
algorithm to generate a measure that judges on features suitability for
classification. Finally, Principle Component Analysis (PCA) is
utilized to reduce the size of the data before computing the
classification accuracy with a multilayer perceptron neural network.
The proposed system produces powerful classification results (99%
accuracy) by using only a small portion of the original feature set.
Abstract: To make use of the limited amounts of water in arid
region, the Iranians developed man-made underground water
channels called qanats (kanats) .In fact, qanats may be considered as
the first long-distance water transfer system. Qanats are an ancient
water transfer system found in arid regions wherein groundwater
from mountainous areas, aquifers and sometimes from rivers, was
brought to points of re-emergence such as an oasis, through one or
more underground tunnels. The tunnels, many of which were
kilometers in length, had designed for slopes to provide gravitational
flow. The tunnels allowed water to drain out to the surface by gravity
to supply water to lower and flatter agricultural land.
Qanats have been an ancient, sustainable system facilitating the
harvesting of water for centuries in Iran, and more than 35 additional
countries of the world such as India, Arabia, Egypt, North Africa,
Spain and even to New world.
There are about 22000 qanats in Iran with 274000 kilometers of
underground conduits all built by manual labor. The amount of
water of the usable qanats of Iran produce is altogether 750 to
1000 cubic meter per second. The longest chain of qanat is
situated in Gonabad region in Khorasan province. It is 70
kilometers long. Qanats are renewable water supply systems that
have sustained agricultural settlement on the Iranian plateau for
millennia. The great advantages of Qanats are no evaporation
during transit, little seepage , no raising of the water- table and no
pollution in the area surrounding the conduits. Qanat systems
have a profound influence on the lives of the water users in Iran, and
conform to Iran-s climate. Qanat allows those living in a desert
environment adjacent to a mountain watershed to create a large oasis
in an otherwise stark environment.
This paper explains qanats structure designs, their history,
objectives causing their creation, construction materials, locations
and their importance in different times, as well as their present
sustainable role in Iran.