Abstract: Skin color can provide a useful and robust cue
for human-related image analysis, such as face detection,
pornographic image filtering, hand detection and tracking,
people retrieval in databases and Internet, etc. The major
problem of such kinds of skin color detection algorithms is
that it is time consuming and hence cannot be applied to a real
time system. To overcome this problem, we introduce a new
fast technique for skin detection which can be applied in a real
time system. In this technique, instead of testing each image
pixel to label it as skin or non-skin (as in classic techniques),
we skip a set of pixels. The reason of the skipping process is
the high probability that neighbors of the skin color pixels are
also skin pixels, especially in adult images and vise versa. The
proposed method can rapidly detect skin and non-skin color
pixels, which in turn dramatically reduce the CPU time
required for the protection process. Since many fast detection
techniques are based on image resizing, we apply our
proposed pixel skipping technique with image resizing to
obtain better results. The performance evaluation of the
proposed skipping and hybrid techniques in terms of the
measured CPU time is presented. Experimental results
demonstrate that the proposed methods achieve better result
than the relevant classic method.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: Deflocculation and gel characterization were
investigated for three different composition of porcelain slips at
specific gravity 1.8. The suspensions were dispersed with sodium
silicate (Na2SiO3) in under-deflocculated slips and fully deflocculated
slips. The rheology characterization of slips was conducted by the
deflocculation curves and the gel curves. The results showed that
decreasing the amount of the ball clay composition in the slips
consumed less dosages of the dispersants. The under-deflocculated
slips tended to have a gelation rate faster than the fully deflocculated
slips.
Abstract: In this paper, we demonstrate the adaptive
least-mean-square (LMS) filter modeling using SystemC. SystemC is
a modeling language that allows designer to model both hardware and
software component and makes it possible to design from high level
system of abstraction to low level system of abstraction. We produced
five adaptive least-mean-square filter models that are classed as five
abstraction levels using SystemC proceeding from the abstract model
to the more concrete model.
Abstract: This study investigated morphology of the Spanner Barb (Puntius lateristriga Valenciennes, 1842) and water quality at Thepchana waterfall. This study was conducted at Thepchana Waterfall, Khao Nan National Park from March to May 2007. There were 40 Spanner Barb collected with 20 males and 20 females. Males had an average of 5.57 cm in standard length, 6.62 cm in total length and 5.18 g in total body weight. Females had an average of 7.25 cm in standard length, 8.24 cm in total length and 10.96 g in total body weight. The length (L) – weight (W) relationships for combining sexes, males and females were LogW = -2.137 + 3.355logL, log W = -0.068 + 3.297logL, and log W = -2.068 + 3.297logL, respectively. The Spanner Barb were smaller size fish with a compressed form; terminal mouth; villiform teeth; ctenoid scale; concave tail; general body color yellowish olive, with slight reddish tint to fins; vertical band beginning below dorsal and horizontal stripe from base of tail almost to vertical band. They also had a vertical band midway between the eye and first vertical band. There was a black spot above anal fin. The bladder looked like J-shape. Inside of the bladder was found small insects and insect lava. The body length and the bowels length was 1:1 ratio. The water temperature ranged from 25.00 – 27.00 °C which was appropriate for their habitat characteristics. Acid - alkalinity ranged from 6.65 – 6.90 mg/l. Dissolved oxygen ranged from 4.55 – 4.70 mg/l. Water hardness ranged from 31.00 – 48.00 mg/l. The amount of ammonia was about 0.25 mg/l.
Abstract: People usually have a telephone voice, which means
they adjust their speech to fit particular situations and to blend in with
other interlocutors. The question is: Do we speak differently to
different people? This possibility has been suggested by social
psychologists within Accommodation Theory [1]. Converging toward
the speech of another person can be regarded as a polite speech
strategy while choosing a language not used by the other interlocutor
can be considered as the clearest example of speech divergence [2].
The present study sets out to investigate such processes in the course
of everyday telephone conversations. Using Joos-s [3] model of
formality in spoken English, the researchers try to explore
convergence to or divergence from the addressee. The results
propound the actuality that lexical choice, and subsequently, patterns
of style vary intriguingly in concordance with the person being
addressed.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: This paper proposes a Fuzzy Expert System design to
determine the wearing properties of nitrided and non nitrided steel.
The proposed Fuzzy Expert System approach helps the user and the
manufacturer to forecast the wearing properties of nitrided and non
nitrided steel under specified laboratory conditions. Surfaces of the
engineering components are often nitrided for improving wear,
corosion, fatigue specifications. A major property of nitriding
process is reducing distortion and wearing of the metalic alloys. A
Fuzzy Expert System was developed for determining the wearing and
durability properties of nitrided and non nitrided steels that were
tested under different loads and different sliding speeds in the
laboratory conditions.
Abstract: Wireless Sensor Network (WSN) comprises of sensor
nodes which are designed to sense the environment, transmit sensed
data back to the base station via multi-hop routing to reconstruct
physical phenomena. Since physical phenomena exists significant
overlaps between temporal redundancy and spatial redundancy, it is
necessary to use Redundancy Suppression Algorithms (RSA) for sensor
node to lower energy consumption by reducing the transmission
of redundancy. A conventional algorithm of RSAs is threshold-based
RSA, which sets threshold to suppress redundant data. Although
many temporal and spatial RSAs are proposed, temporal-spatial RSA
are seldom to be proposed because it is difficult to determine when
to utilize temporal or spatial RSAs. In this paper, we proposed a
novel temporal-spatial redundancy suppression algorithm, Codebookbase
Redundancy Suppression Mechanism (CRSM). CRSM adopts
vector quantization to generate a codebook, which is easily used to
implement temporal-spatial RSA. CRSM not only achieves power
saving and reliability for WSN, but also provides the predictability
of network lifetime. Simulation result shows that the network lifetime
of CRSM outperforms at least 23% of that of other RSAs.
Abstract: Nowadays, we are facing with network threats that
cause enormous damage to the Internet community day by day. In
this situation, more and more people try to prevent their network
security using some traditional mechanisms including firewall,
Intrusion Detection System, etc. Among them honeypot is a versatile
tool for a security practitioner, of course, they are tools that are meant
to be attacked or interacted with to more information about attackers,
their motives and tools. In this paper, we will describe usefulness of
low-interaction honeypot and high-interaction honeypot and
comparison between them. And then we propose hybrid honeypot
architecture that combines low and high -interaction honeypot to
mitigate the drawback. In this architecture, low-interaction honeypot
is used as a traffic filter. Activities like port scanning can be
effectively detected by low-interaction honeypot and stop there.
Traffic that cannot be handled by low-interaction honeypot is handed
over to high-interaction honeypot. In this case, low-interaction
honeypot is used as proxy whereas high-interaction honeypot offers
the optimal level realism. To prevent the high-interaction honeypot
from infections, containment environment (VMware) is used.
Abstract: Producing companies aspire to high delivery
availability despite appearing disruptions. To ensure high delivery
availability safety stocksare required. Howeversafety stock leads to
additional capital commitment and compensates disruptions instead
of solving the reasons.The intention is to increase the stability in
production by configuring the production planning and control
systematically. Thus the safety stock can be reduced. The largest
proportion of inventory in producing companies is caused by batch
inventory, schedule deviations and variability of demand rates.These
reasons for high inventory levels can be reduced by configuring the
production planning and control specifically. Hence the inventory
level can be reduced. This is enabled by synchronizing the lot size
straightening the demand as well as optimizing the releasing order,
sequencing and capacity control.
Abstract: For the purpose of finding the quotient structure of multiple algebras such as groups, Abelian groups and rings, we will state concepts of ( strong or weak ) equalities on multiple algebras, which will lead us to research on how ( strong or weak) are equalities defined on a multiple algebra over the quotients obtained from it. In order to find a quotient structure of multiple algebras such as groups, Abelian groups and loops, a part of this article has been allocated to the concepts of equalities (strong and weak) of the defined multiple functions on multiple algebras. This leads us to do research on how defined equalities (strong and weak) are made in the multiple algebra on its resulted quotient.
Abstract: Extraction of Fe(III) from aqueous solution using Trin-
butyl Phosphate (TBP) as carrier needs a highly acidic medium
(>6N) as it favours formation of chelating complex FeCl3.TBP.
Similarly, stripping of Iron(III) from loaded organic solvents requires
neutral pH or alkaline medium to dissociate the same complex. It is
observed that TBP co-extracts acids along with metal, which causes
reversal of driving force of extraction and iron(III) is re-extracted
back from the strip phase into the feed phase during Liquid Emulsion
Membrane (LEM) pertraction. Therefore, rate of extraction of
different mineral acids (HCl, HNO3, H2SO4) using TBP with and
without presence of metal Fe(III) was examined. It is revealed that in
presence of metal acid extraction is enhanced. Determination of mass
transfer coefficient of both acid and metal extraction was performed
by using Bulk Liquid Membrane (BLM). The average mass transfer
coefficient was obtained by fitting the derived model equation with
experimentally obtained data. The mass transfer coefficient of the
mineral acid extraction is in the order of kHNO3 = 3.3x10-6m/s > kHCl =
6.05x10-7m/s > kH2SO4 = 1.85x10-7m/s. The distribution equilibria of
the above mentioned acids between aqueous feed solution and a
solution of tri-n-butyl-phosphate (TBP) in organic solvents have been
investigated. The stoichiometry of acid extraction reveals the
formation of TBP.2HCl, HNO3.2TBP, and TBP.H2SO4 complexes.
Moreover, extraction of Iron(III) by TBP in HCl aqueous solution
forms complex FeCl3.TBP.2HCl while in HNO3 medium forms
complex 3FeCl3.TBP.2HNO3
Abstract: Sedimentation in reservoirs lowers the quality of
consumed water, reduce the volume of reservoir, lowers the
controllable amount of flood, increases the risk of water overflow
during possible floods and the risk of reversal and reduction of dam's
useful life. So in all stages of dam establishment such as cognitive
studies, phase-1 studies of design, control, construction and
maintenance, the problem of sedimentation in reservoir should be
considered. What engineers need to do is examine and develop the
methods to keep effective capacity of a reservoir, however engineers
should also consider the influences of the methods on the flood
disaster, functions of water use facilities and environmental
issues.This article first examines the sedimentation in reservoirs and
shows how to control it and then discusses the studies about the
sedimens in Siazakh Dam.
Abstract: In this paper three basic approaches and different
methods under each of them for extracting region of interest (ROI)
from stationary images are explored. The results obtained for each of
the proposed methods are shown, and it is demonstrated where each
method outperforms the other. Two main problems in ROI
extraction: the channel selection problem and the saliency reversal
problem are discussed and how best these two are addressed by
various methods is also seen. The basic approaches are 1) Saliency
based approach 2) Wavelet based approach 3) Clustering based
approach. The saliency approach performs well on images containing
objects of high saturation and brightness. The wavelet based
approach performs well on natural scene images that contain regions
of distinct textures. The mean shift clustering approach partitions the
image into regions according to the density distribution of pixel
intensities. The experimental results of various methodologies show
that each technique performs at different acceptable levels for
various types of images.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: Phase transformation temperature is one of the most important parameters for the shape memory alloys (SMAs). The most popular method to determine these phase transformation temperatures is the Differential Scanning Calorimeter (DSC), but due to the limitation of the DSC testing itself, it made it difficult for the finished product which is not in the powder form. A novel method which uses the Universal Testing Machine has been conducted to determine the phase transformation temperatures. The Flexinol wire was applied with force and maintained throughout the experiment and at the same time it was heated up slowly until a temperature of approximately 1000C with direct current. The direct current was then slowly decreased to cool down the temperature of the Flexinol wire. All the phase transformation temperatures for Flexinol wire were obtained. The austenite start at 52.540C and austenite finish at 60.900C, while martensite start at 44.780C and martensite finish at 32.840C.
Abstract: Carbon fibers have specific characteristics in
comparison with industrial and structural materials used in different
applications. Special properties of carbon fibers make them attractive
for reinforcing and fabrication of composites. These fibers have been
utilized for composites of metals, ceramics and plastics. However,
it-s mainly used in different forms to reinforce lightweight polymer
materials such as epoxy resin, polyesters or polyamides. The
composites of carbon fiber are stronger than steel, stiffer than
titanium, and lighter than aluminum and nowadays they are used in a
variety of applications. This study explains applications of carbon
fibers in different fields such as space, aviation, transportation,
medical, construction, energy, sporting goods, electronics, and the
other commercial/industrial applications. The last findings of
composites with polymer, metal and ceramic matrices containing
carbon fibers and their applications in the world investigated.
Researches show that carbon fibers-reinforced composites due to
unique properties (including high specific strength and specific
modulus, low thermal expansion coefficient, high fatigue strength,
and high thermal stability) can be replaced with common industrial
and structural materials.
Abstract: Many contemporary telemedical applications rely on
regular consultations over the phone or video conferencing which
consumes valuable resources such as the time of the doctors. Some
applications or treatments allow automated diagnostics on the patient
side which only notifies the doctors in case a significant worsening
of patient’s condition is measured.
Such programs can save valuable resources but an important
implementation issue is how to ensure effective and cheap diagnostics
on the patient side. First, specific diagnostic devices on patient side
are expensive and second, they need to be user-˜friendly to encourage
patient’s cooperation and reduce errors in usage which may cause
noise in diagnostic data.
This article proposes the use of modern smartphones and various
build-in or attachable sensors as universal diagnostic devices applicable
in a wider range of telemedical programs and demonstrates their
application on a case-study – a program for schizophrenic relapse
prevention.
Abstract: An approach to develop the FPGA of a flexible key
RSA encryption engine that can be used as a standard device in the
secured communication system is presented. The VHDL modeling of
this RSA encryption engine has the unique characteristics of
supporting multiple key sizes, thus can easily be fit into the systems
that require different levels of security. A simple nested loop addition
and subtraction have been used in order to implement the RSA
operation. This has made the processing time faster and used
comparatively smaller amount of space in the FPGA. The hardware
design is targeted on Altera STRATIX II device and determined that
the flexible key RSA encryption engine can be best suited in the
device named EP2S30F484C3. The RSA encryption implementation
has made use of 13,779 units of logic elements and achieved a clock
frequency of 17.77MHz. It has been verified that this RSA
encryption engine can perform 32-bit, 256-bit and 1024-bit
encryption operation in less than 41.585us, 531.515us and 790.61us
respectively.