Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: This paper presents a new stable robust adaptive controller and observer design for a class of nonlinear systems that contain i. Coupling of unmeasured states and unknown parameters ii. Unknown dead zone at the system actuator. The system is firstly cast into a modified form in which the observer and parameter estimation become feasible. Then a stable robust adaptive controller, state observer, parameter update laws are derived that would provide global adaptive system stability and desirable performance. To validate the approach, simulation was performed to a single-link mechanical system with a dynamic friction model and unknown dead zone exists at the system actuation. Then a comparison is presented with the results when there is no dead zone at the system actuation.
Abstract: Educational games (EG) seem to have lots of potential due to digital games popularity and preferences of our younger generations of learners. However, most studies focus on game design and its effectiveness while little has been known about the factors that can affect users to accept or to reject EG for their learning. User acceptance research try to understand the determinants of information systems (IS) adoption among users by investigating both systems factors and users factors. Upon the lack of knowledge on acceptance factors for educational games, we seek to understand the issue. This study proposed a model of acceptance factors based on Unified Theory of Acceptance and Use of Technology (UTAUT). We use original model (performance expectancy, effort expectancy and social influence) together with two new determinants (learning opportunities and enjoyment). We will also investigate the effect of gender and gaming experience that moderate the proposed factors.
Abstract: In this paper the authors propose and verify an approach to control heat flow in machine tool components. Thermal deformations are a main aspect that affects the accuracy of machining. Due to goals of energy efficiency, thermal basic loads should be reduced. This leads to inhomogeneous and time variant temperature profiles. To counteract these negative consequences, material with high melting enthalpy is used as a method for thermal stabilization. The increased thermal capacity slows down the transient thermal behavior. To account for the delayed thermal equilibrium, a control mechanism for thermal flow is introduced. By varying a gap in a heat flow path the thermal resistance of an assembly can be controlled. This mechanism is evaluated in two experimental setups. First to validate the ability to control the thermal resistance and second to prove the possibility of a self-sufficient option based on the selfsensing abilities of thermal shape memory alloys.
Abstract: Mobile banking services present a unique growth
opportunity for mobile operators in emerging markets, and have
already made good progress in bringing financial services to the
previously unbanked populations of many developing countries. The
potential is amazing, but what about the risks? In the complex
process of establishing a mobile banking business model, many kinds
of risks and factors need to be monitored and well-managed. Risk
identification is the first stage of risk management. Correct risk
identification ensures risk management effectiveness. Keeping the
risks low makes it possible to use the full potential of mobile banking
and carry out the planned business strategy. The focus should be on
adoption of consumers which is the main risk factor of mobile
banking services.
Abstract: Optical burst switching(OBS) is considered as one of
preferable network technologies for the next generation Internet. The
Internet has two traffic classes, i.e. real-time bursts and reliable bursts.
It is an important subject for OBS to achieve cooperated operation of
real-time bursts and reliable bursts. In this paper, we proposes a new
effective traffic control method named Separate TB+LB (Token
Bucket + Leaky Bucket : TB+LB) method. The proposed method
presents a new Token Bucket scheme for real-time bursts called as
RBO-TB (Real-time Bursts Oriented Token Bucket). The method also
applies the LB method to reliable bursts for obtaining better
performance. This paper verifies the effectiveness of the Separate
TB+LB method through the performance evaluation.
Abstract: The study site was located in Ratchaburi Province,
Thailand. Four experimental plots in dry dipterocarp forest (DDF)
and four plots in mixed deciduous forest (MDF) were set up to
estimate the above-ground biomass of tree, sapling and bamboo. The
allometry equations were used to investigate above-ground biomass
of these vegetation. Seedling and other understory were determined
using direct harvesting method. Carbon storage in above-ground
biomass was calculated based on IPCC 2006.
The results showed that the above-ground biomass of DDF at
20-40% slope,
Abstract: The interaction among information and communication technology (ICT) industries is a recently ubiquitous phenomenon through fixed-mobile integration. To monitor the impact of interaction, previous research has mainly focused on measuring spillover effect among ICT industries using various methods. Among others, inter-industry analysis is one of the useful methods for examining spillover effect between industries. However, more complex ICT industries become, more important the impact within an industry is. Inter-industry analysis is limited in mirroring intra-relationships within an industry. Thus, this study applies the analytic network process (ANP) to measure the spillover effect, capturing all of the intra and inter-relationships. Using ANP-based intra and inter-industry analysis, the spillover effect is effectively measured, mirroring the complex structure of ICT industries. A main ICT industry and its linkages are also explored to show the current structure of ICT industries. The proposed approach is expected to allow policy makers to understand interactions of ICT industries and their impact.
Abstract: This paper present a new way to find the aerodynamic
characteristic equation of missile for the numerical trajectories
prediction more accurate. The goal is to obtain the polynomial
equation based on two missile characteristic parameters, angle of
attack (α ) and flight speed (ν ). First, the understudied missile is
modeled and used for flow computational model to compute
aerodynamic force and moment. Assume that performance range of
understudied missile where range -10< α
Abstract: To estimate the risks of dam failure phenomenon, it is necessary to understand this phenomenon and the involved governing factors. Overtopping and piping are the two main reasons of earthdam failures. In the piping context, the piping is determined as a phenomenon which is occurred between two phases, the water liquid and the solid soil. In this investigation, the onset of piping and its development, as well as the movement of water in soil, are numerically approached. In this regard, a one-dimensional numerical model based on the mass-conserving finite-volume method is developed and applied in order to simulate the piping phenomenon in a continuous circular tunnel of given initial length and radius, located between upstream and downstream. The simulation result includes the time-variations of radius along the tunnel until the radius value reaches its critical and the piping phenomenon converts to overtopping.
Abstract: The integral form of equations of motion of composite
beams subjected to varying time loads are discretized using a
developed finite element model. The model consists of a straight five
node twenty-two degrees of freedom beam element. The stability
analysis of the beams is studied by solving the matrix form
characteristic equations of the system. The principle of virtual work
and the first order shear deformation theory are employed to analyze
the beams with large deformation and small strains. The regions of
dynamic instability of the beam are determined by solving the
obtained Mathieu form of differential equations. The effects of nonconservative
loads, shear stiffness, and damping parameters on
stability and response of the beams are examined. Several numerical
calculations are presented to compare the results with data reported
by other researchers.
Abstract: Even it has been recognized that Shape Memory
Alloys (SMA) have a significant potential for deployment actuators,
the number of applications of SMA-based actuators to the present
day is still quite small, due to the need of deep understanding of the
thermo-mechanical behavior of SMA, causing an important need for
a mathematical model able to describe all thermo-mechanical
properties of SMA by relatively simple final set of constitutive
equations. SMAs offer attractive potentials such as: reversible strains
of several percent, generation of high recovery stresses and high
power / weight ratios. The paper tries to provide an overview of the
shape memory functions and a presentation of the designed and
developed temperature control system used for a gripper actuated by
two pairs of differential SMA active springs. An experimental setup
was established, using electrical energy for actuator-s springs heating
process. As for holding the temperature of the SMA springs at certain
level for a long time was developed a control system in order to
avoid the active elements overheating.
Abstract: Lignocellulosic materials are considered the most
abundant renewable resource available for the Bioethanol
Production. Water Hyacinth is one of potential raw material of the
world-s worst aquatic plant as a feedstock to produce Bioethanol.
The purposed this research is obtain reduced of matter for
biodegradation lignin in Biological pretreatment with White Rot
Fungi eg. Phanerochaete Chrysosporium using Solid state
Fermentation methods. Phanerochaete Chrysosporium is known to
have the best ability to degraded lignin, but simultaneously it can also
degraded cellulose and hemicelulose. During 8 weeks incubation,
water hyacinth occurred loss of weight reached 34,67%, while loss
of lignin reached 67,21%, loss of cellulose reached 11,01% and loss
of hemicellulose reached 36,56%. The kinetic of losses lignin using
regression linear plot, the results is obtained constant rate (k) of
reduction lignin is -0.1053 and the equation of reduction of lignin
is y = wo - 0, 1.53 x
Abstract: In this paper, we present a technical and an economic
assessment of several sources of renewable energy in Saudi Arabia;
mainly solar, wind, hydro and biomass. We analyze the
environmental and climatic conditions in relation to these sources
and give an overview of some of the existing clean energy
technologies. Using standardized cost and efficiency data, we carry
out a cost benefit analysis to understand the economic factors
influencing the sustainability of energy production from renewable
sources in light of the energy cost and demand in the Saudi market.
Finally, we take a look at the Saudi petroleum industry and the
existing sources of conventional energy and assess the potential of
building a successful market for renewable energy under the
constraints imposed by the flow of subsidized cheap oil. We show
that while some renewable energy resources are well suited for
distributed or grid connected generation in the kingdom, their
viability is greatly undercut by the well developed and well
capitalized oil industry.
Abstract: Voice over Internet Protocol (VoIP) application or commonly known as softphone has been developing an increasingly large market in today-s telecommunication world and the trend is expected to continue with the enhancement of additional features. This includes leveraging on the existing presence services, location and contextual information to enable more ubiquitous and seamless communications. In this paper, we discuss the concept of seamless session transfer for real-time application such as VoIP and IPTV, and our prototype implementation of such concept on a selected open source VoIP application. The first part of this paper is about conducting performance evaluation and assessments across some commonly found open source VoIP applications that are Ekiga, Kphone, Linphone and Twinkle so as to identify one of them for implementing our design of seamless session transfer. Subjective testing has been carried out to evaluate the audio performance on these VoIP applications and rank them according to their Mean Opinion Score (MOS) results. The second part of this paper is to discuss on the performance evaluations of our prototype implementation of session transfer using Linphone.
Abstract: In this paper, we present a robust and secure
algorithm for watermarking, the watermark is first transformed into
the frequency domain using the discrete wavelet transform (DWT).
Then the entire DWT coefficient except the LL (Band) discarded,
these coefficients are permuted and encrypted by specific mixing.
The encrypted coefficients are inserted into the most significant
spectral components of the stego-image using a chaotic system. This
technique makes our watermark non-vulnerable to the attack (like
compression, and geometric distortion) of an active intruder, or due
to noise in the transmission link.
Abstract: The paper deals with the most important changes that have occurred in business because of social media and its impact on organisations and leadership in recent years. It seeks to synthesize existing research, theories and concepts, in order to understand "social destinations", and to provide a bridge from past research to future success. Becoming a "social destination" is a strategic and tactical leadership and management issue and the paper will present the importance of destination leadership in choosing the way towards a social destination and some organisational models. It also presents some social media tools that can be used in transforming a destination into a social one. Adapting organisations to the twentyfirst century means adopting social media as a way of life and a way of business.
Abstract: Hazardous Material transportation by road is coupled
with inherent risk of accidents causing loss of lives, grievous injuries,
property losses and environmental damages. The most common type
of hazmat road accident happens to be the releases (78%) of
hazardous substances, followed by fires (28%), explosions (14%) and
vapour/ gas clouds (6 %.).
The paper is discussing initially the probable 'Impact Zones'
likely to be caused by one flammable (LPG) and one toxic (ethylene
oxide) chemicals being transported through a sizable segment of a
State Highway connecting three notified Industrial zones in Surat
district in Western India housing 26 MAH industrial units. Three
'hotspots' were identified along the highway segment depending on
the particular chemical traffic and the population distribution within
500 meters on either sides. The thermal radiation and explosion
overpressure have been calculated for LPG / Ethylene Oxide BLEVE
scenarios along with toxic release scenario for ethylene oxide.
Besides, the dispersion calculations for ethylene oxide toxic release
have been made for each 'hotspot' location and the impact zones
have been mapped for the LOC concentrations. Subsequently, the
maximum Initial Isolation and the protective zones were calculated
based on ERPG-3 and ERPG-2 values of ethylene oxide respectively
which are estimated taking the worst case scenario under worst
weather conditions. The data analysis will be helpful to the local
administration in capacity building with respect to rescue /
evacuation and medical preparedness and quantitative inputs to
augment the District Offsite Emergency Plan document.
Abstract: The structure of retinal vessels is a prominent feature,
that reveals information on the state of disease that are reflected in
the form of measurable abnormalities in thickness and colour.
Vascular structures of retina, for implementation of clinical diabetic
retinopathy decision making system is presented in this paper.
Retinal Vascular structure is with thin blood vessel, whose accuracy
is highly dependent upon the vessel segmentation. In this paper the
blood vessel thickness is automatically detected using preprocessing
techniques and vessel segmentation algorithm. First the capture
image is binarized to get the blood vessel structure clearly, then it is
skeletonised to get the overall structure of all the terminal and
branching nodes of the blood vessels. By identifying the terminal
node and the branching points automatically, the main and branching
blood vessel thickness is estimated. Results are presented and
compared with those provided by clinical classification on 50 vessels
collected from Bejan Singh Eye hospital..
Abstract: This paper presents a Particle Swarm Optimization
(PSO) method for determining the optimal parameters of a first-order
controller for TCP/AQM system. The model TCP/AQM is described
by a second-order system with time delay. First, the analytical
approach, based on the D-decomposition method and Lemma of
Kharitonov, is used to determine the stabilizing regions of a firstorder
controller. Second, the optimal parameters of the controller are
obtained by the PSO algorithm. Finally, the proposed method is
implemented in the Network Simulator NS-2 and compared with the
PI controller.