Abstract: Most of the image watermarking methods, using the properties of the human visual system (HVS), have been proposed in literature. The component of the visual threshold is usually related to either the spatial contrast sensitivity function (CSF) or the visual masking. Especially on the contrast masking, most methods have not mention to the effect near to the edge region. Since the HVS is sensitive what happens on the edge area. This paper proposes ultrasound image watermarking using the visual threshold corresponding to the HVS in which the coefficients in a DCT-block have been classified based on the texture, edge, and plain area. This classification method enables not only useful for imperceptibility when the watermark is insert into an image but also achievable a robustness of watermark detection. A comparison of the proposed method with other methods has been carried out which shown that the proposed method robusts to blockwise memoryless manipulations, and also robust against noise addition.
Abstract: The systematic manipulations of shapes and sizes of
inorganic compounds greatly benefit the various application fields
including optics, magnetic, electronics, catalysis and medicine.
However shape control has been much more difficult to achieve.
Hence exploration of novel method for the preparation of differently
shaped nanoparticles is challenging research area. II-VI group of
semiconductor cadmium sulphide (CdS) nanostructure with different
morphologies (such as, acicular like, mesoporous, spherical shapes)
and of crystallite sizes vary from 11 to 16 nm were successfully
synthesized by chemical aqueous precipitation of Cd2+ ions with
homogeneously released S2- ions from decomposition of cadmium
sulphate (CdSO4) and thioacetamide (CH3CSNH2) by annealing at
different radiations (microwave, ultrasonic and sunlight) with matter
and systematic research has been done for various factors affecting
the controlled growth rate of CdS nanoparticles. The obtained
nanomaterials have been characterized by X-ray Diffraction (XRD),
Fourier Transform Infrared Spectroscopy (FTIR),
Thermogravometric (DSC-TGA) analysis and Scanning Electron
Microscopy (SEM). The result indicates that on increasing the
reaction time particle size increases but on increasing the molar ratios
grain size decreases.
Abstract: This paper considers the autonomous navigation
problem of multiple n-link nonholonomic mobile manipulators within
an obstacle-ridden environment. We present a set of nonlinear
acceleration controllers, derived from the Lyapunov-based control
scheme, which generates collision-free trajectories of the mobile
manipulators from initial configurations to final configurations in a
constrained environment cluttered with stationary solid objects of
different shapes and sizes. We demonstrate the efficiency of the
control scheme and the resulting acceleration controllers of the
mobile manipulators with results through computer simulations of an
interesting scenario.
Abstract: Cameras are often mounted on platforms that canmove like rovers, booms, gantries and aircraft. People operate suchplatforms to capture desired views of scene or target. To avoidcollisions with the environment and occlusions, such platforms oftenpossess redundant degrees-of-freedom. As a result, manipulatingsuch platforms demands much skill. Visual-servoing some degrees-of-freedom may reduce operator burden and improve tracking per-formance. This concept, which we call human-in-the-loop visual-servoing, is demonstrated in this paper and applies a Α-β-γ filter and feedforward controller to a broadcast camera boom.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: CFlow is a flow chart software, it contains facilities to
draw and evaluate a flow chart. A flow chart evaluation applies a
simulation method to enable presentation of work flow in a flow
chart solution. Flow chart simulation of CFlow is executed by
manipulating the CFlow data file which is saved in a graphical vector
format. These text-based data are organised by using a data
classification technic based on a Library classification-scheme. This
paper describes the file format for flow chart simulation software of
CFlow.
Abstract: Automatic control of the robotic manipulator involves
study of kinematics and dynamics as a major issue. This paper
involves the forward and inverse kinematics of 2-DOF robotic
manipulator with revolute joints. In this study the Denavit-
Hartenberg (D-H) model is used to model robot links and joints. Also
forward and inverse kinematics solution has been achieved using
Artificial Neural Networks for 2-DOF robotic manipulator. It shows
that by using artificial neural network the solution we get is faster,
acceptable and has zero error.
Abstract: In this paper, a framework for the simplification and
standardization of metaheuristic related parameter-tuning by applying
a four phase methodology, utilizing Design of Experiments and
Artificial Neural Networks, is presented. Metaheuristics are multipurpose
problem solvers that are utilized on computational optimization
problems for which no efficient problem specific algorithm
exist. Their successful application to concrete problems requires the
finding of a good initial parameter setting, which is a tedious and
time consuming task. Recent research reveals the lack of approach
when it comes to this so called parameter-tuning process. In the
majority of publications, researchers do have a weak motivation for
their respective choices, if any. Because initial parameter settings
have a significant impact on the solutions quality, this course of
action could lead to suboptimal experimental results, and thereby
a fraudulent basis for the drawing of conclusions.
Abstract: Image convolution similar to the receptive fields
found in mammalian visual pathways has long been used in
conventional image processing in the form of Gabor masks.
However, no VLSI implementation of parallel, multi-layered pulsed
processing has been brought forward which would emulate this
property. We present a technical realization of such a pulsed image
processing scheme. The discussed IC also serves as a general testbed
for VLSI-based pulsed information processing, which is of interest
especially with regard to the robustness of representing an analog
signal in the phase or duration of a pulsed, quasi-digital signal, as
well as the possibility of direct digital manipulation of such an
analog signal. The network connectivity and processing properties
are reconfigurable so as to allow adaptation to various processing
tasks.
Abstract: In order to improve control performance and eliminate steady, a coupling compensation for 6-DOF parallel robot is presented. Taking dynamic load Tank Simulator as the research object, this paper analyzes the coupling of 6-DOC parallel robot considering the degree of freedom of the 6-DOF parallel manipulator. The coupling angle and coupling velocity are derived based on inverse kinematics model. It uses the mechanism-model combined method which takes practical moving track that considering the performance of motion controller and motor as its input to make the study. Experimental results show that the coupling compensation improves motion stability as well as accuracy. Besides, it decreases the dither amplitude of dynamic load Tank Simulator.
Abstract: The paper focuses on the enhanced stiffness modeling
of robotic manipulators by taking into account influence of the external force/torque acting upon the end point. It implements the
virtual joint technique that describes the compliance of manipulator elements by a set of localized six-dimensional springs separated by
rigid links and perfect joints. In contrast to the conventional
formulation, which is valid for the unloaded mode and small
displacements, the proposed approach implicitly assumes that the loading leads to the non-negligible changes of the manipulator posture and corresponding amendment of the Jacobian. The
developed numerical technique allows computing the static
equilibrium and relevant force/torque reaction of the manipulator for
any given displacement of the end-effector. This enables designer
detecting essentially nonlinear effects in elastic behavior of
manipulator, similar to the buckling of beam elements. It is also proposed the linearization procedure that is based on the inversion of
the dedicated matrix composed of the stiffness parameters of the
virtual springs and the Jacobians/Hessians of the active and passive
joints. The developed technique is illustrated by an application example that deals with the stiffness analysis of a parallel
manipulator of the Orthoglide family
Abstract: In order to calculate the flexural strength of
normal-strength concrete (NSC) beams, the nonlinear actual concrete
stress distribution within the compression zone is normally replaced
by an equivalent rectangular stress block, with two coefficients of α
and β to regulate the intensity and depth of the equivalent stress
respectively. For NSC beams design, α and β are usually assumed
constant as 0.85 and 0.80 in reinforced concrete (RC) codes. From an
earlier investigation of the authors, α is not a constant but significantly
affected by flexural strain gradient, and increases with the increasing
of strain gradient till a maximum value. It indicates that larger
concrete stress can be developed in flexure than that stipulated by
design codes. As an extension and application of the authors- previous
study, the modified equivalent concrete stress block is used here to
produce a series of design charts showing the maximum design limits
of flexural strength and ductility of singly- and doubly- NSC beams,
through which both strength and ductility design limits are improved
by taking into account strain gradient effect.
Abstract: The use of High Order Statistics (HOS) analysis is
expected to provide so many candidates of features that can be selected for pattern recognition. More candidates of the feature can
be extracted using simple manipulation through a specific mathematical function prior to the HOS analysis. Feature extraction
method using HOS analysis combined with Difference to the Nth-Power manipulation has been examined in application for Automatic
Modulation Recognition (AMR) to perform scheme recognition of three digital modulation signal, i.e. QPSK-16QAM-64QAM in the
AWGN transmission channel. The simulation results is reported
when the analysis of HOS up to order-12 and the manipulation of Difference to the Nth-Power up to N = 4. The obtained accuracy rate
of AMR using the method of Simple Decision obtained 90% in SNR > 10 dB in its classifier, while using the method of Voted Decision is
96% in SNR > 2 dB.
Abstract: This paper is to develop a fuzzy net present value (FNPV) method by taking vague cash flow and imprecise required rate of return into account for evaluating the value of the Build-Operate-Transfer (BOT) sport facilities. In order to clearly manifest a more realistic capital budgeting model based on the classical net present value (NPV) method, some uncertain financial elements in NPV formula will be fuzzified as triangular fuzzy numbers. Through the conscientious manipulation of fuzzy set theory, we will find that the proposed FNPV model is a more explicit extension of classical (crisp) model and could be more practicable for the financial managers to capture the essence of capital budgeting of sport facilities than non-fuzzy model.
Abstract: This paper describes how the correct endian mode of
the TMS320C6713 DSK board can be identified. It also explains how
the TMS320C6713 DSK board can be used in the little endian and in
the big endian modes for assembly language programming in
particular and for signal processing in general. Similarly, it discusses
how crucially important it is for a user of the TMS320C6713 DSK
board to identify the mode of operation and then use it correctly
during the development stages of the assembly language
programming; otherwise, it will cause unnecessary confusion and
erroneous results as far as storing data into the memory and loading
data from the memory is concerned. Furthermore, it highlights and
strongly recommends to the users of the TMS320C6713 DSK board
to be aware of the availability and importance of various display
options in the Code Composer Studio (CCS) for correctly
interpreting and displaying the desired data in the memory. The
information presented in this paper will be of great importance and
interest to those practitioners and developers who wants to use the
TMS320C6713 DSK board for assembly language programming as
well as input-output signal processing manipulations. Finally,
examples that clearly illustrate the concept are presented.
Abstract: By taking advantage of computer-s processing power, an unlimited number of variations and parameters in both spatial and environmental can be provided while following the same set of rules and constraints. This paper focuses on using the tools of parametric urbanism towards a more responsive environmental and sustainable urban morphology. It presents an understanding to Parametric Urban Comfort Envelope (PUCE) as an interactive computational assessment urban model. In addition, it investigates the applicability potentials of this model to generate an optimized urban form to Borg El Arab city (a new Egyptian Community) concerning the human comfort values specially wind and solar envelopes. Finally, this paper utilizes its application outcomes -both visual and numerical- to extend the designer-s limitations by decrease the concern of controlling and manipulation of geometry, and increase the designer-s awareness about the various potentials of using the parametric tools to create relationships that generate multiple geometric alternatives.
Abstract: In this research work, a novel parallel manipulator
with high positioning and orienting rate is introduced. This
mechanism has two rotational and one translational degree of
freedom. Kinematics and Jacobian analysis are investigated.
Moreover, workspace analysis and optimization has been performed
by using genetic algorithm toolbox in Matlab software. Because of
decreasing moving elements, it is expected much more better
dynamic performance with respect to other counterpart mechanisms
with the same degrees of freedom. In addition, using couple of
cylindrical and revolute joints increased mechanism ability to have
more extended workspace.
Abstract: Earlier studies in kinship networks have primarily
focused on observing the social relationships existing between family
relatives. In this study, we pre-identified hubs in the network to
investigate if they could play a catalyst role in the transfer of physical
information. We conducted a case study of a ceremony performed in
one of the families of a small Hindu community – the Uttar Rarhi
Kayasthas. Individuals (n = 168) who resided in 11 geographically
dispersed regions were contacted through our hub-based
representation. We found that using this representation, over 98% of
the individuals were successfully contacted within the stipulated
period. The network also demonstrated a small-world property, with
an average geodesic distance of 3.56.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: Economic crime (i.e. corporate fraud) has a
significant impact on business. This study analyzes the fraud cases
reported by the Malaysian Securities Commission. Frauds involving
market manipulation and/or illegal share trading are the most
common types of fraud reported over the 6 years analyzed. The
highest number of frauds reported involved investment and fund
holding companies. Alarmingly the results indicate quite a high
number of frauds cases are committed by management. The higher
number of Chinese perpetrators may be due to fact that they are the
dominant group in Malaysian business. The result also shows that
more than half of companies involved with fraud are privately held
companies in the investment/fund/finance sector. The results of this
study highlight general characteristic of perpetrators (person and
company) that commit fraud which could help the regulators in their
monitoring and enforcement activities. To investors, this would help
in analyzing their business investment or portfolio risk.