Abstract: Iris localization is a very important approach in
biometric identification systems. Identification process usually is
implemented in three levels: iris localization, feature extraction, and
pattern matching finally. Accuracy of iris localization as the first step
affects all other levels and this shows the importance of iris
localization in an iris based biometric system. In this paper, we
consider Daugman iris localization method as a standard method,
propose a new method in this field and then analyze and compare the
results of them on a standard set of iris images. The proposed method
is based on the detection of circular edge of iris, and improved by
fuzzy circles and surface energy difference contexts. Implementation
of this method is so easy and compared to the other methods, have a
rather high accuracy and speed. Test results show that the accuracy of
our proposed method is about Daugman method and computation
speed of it is 10 times faster.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: Polyurethane foam (PUF) is formed by a chemical
reaction of polyol and isocyanate. The aim is to understand the
impact of Silicone on synthesizing polyurethane in differentiate
volume of molding. The method used was one step process, which is
simultaneously caried out a blending polyol (petroleum polyol and
soybean polyol), a TDI (2,4):MDI (4,4-) (80:20), a distilled water,
and a silicone. The properties of the material were measured via a
number of parameters, which are polymer density, compressive
strength, and cellular structures. It is found that density of
polyurethane using silicone with volume of molding either 250 ml or
500 ml is lower than without using silicone.
Abstract: Natural ventilation has played an important role for
many low energy-building designs. It has been also noticed as a
essential subject to persistently bring the fresh cool air from the
outside into a building. This study carried out the computational fluid
dynamics (CFD)-based simulations to examine the natural ventilation
development of a work area in a public building. The simulated results
can be useful to better understand the indoor microclimate and the
interaction of wind with buildings. Besides, this CFD simulation
procedure can serve as an effective analysis tool to characterize the
airing performance, and thereby optimize the building ventilation for
strengthening the architects, planners and other decision makers on
improving the natural ventilation design of public buildings.
Abstract: Various mechanisms providing mutual exclusion and
thread synchronization can be used to support parallel processing
within a single computer. Instead of using locks, semaphores, barriers
or other traditional approaches in this paper we focus on alternative
ways for making better use of modern multithreaded architectures
and preparing hash tables for concurrent accesses. Hash structures
will be used to demonstrate and compare two entirely different
approaches (rule based cooperation and hardware synchronization
support) to an efficient parallel implementation using traditional
locks. Comparison includes implementation details, performance
ranking and scalability issues. We aim at understanding the effects
the parallelization schemes have on the execution environment with
special focus on the memory system and memory access
characteristics.
Abstract: Artificial Intelligence (AI) methods are increasingly being used for problem solving. This paper concerns using AI-type learning machines for power quality problem, which is a problem of general interest to power system to provide quality power to all appliances. Electrical power of good quality is essential for proper operation of electronic equipments such as computers and PLCs. Malfunction of such equipment may lead to loss of production or disruption of critical services resulting in huge financial and other losses. It is therefore necessary that critical loads be supplied with electricity of acceptable quality. Recognition of the presence of any disturbance and classifying any existing disturbance into a particular type is the first step in combating the problem. In this work two classes of AI methods for Power quality data mining are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that SVMs are superior to ANNs in two critical respects: SVMs train and run an order of magnitude faster; and SVMs give higher classification accuracy.
Abstract: This paper focuses on the calibration problem of a
multi-view shooting system designed for the production of 3D
content for auto-stereoscopic visualization. The considered multiview
camera is characterized by coplanar and decentered image
sensors regarding to the corresponding optical axis. Based on the
Faugéras and Toscani-s calibration approach, a calibration method is
herein proposed for the case of multi-view camera with parallel and
decentered image sensors. At first, the geometrical model of the
shooting system is recalled and some industrial prototypes with some
shooting simulations are presented. Next, the development of the
proposed calibration method is detailed. Finally, some simulation
results are presented before ending with some conclusions about this
work.
Abstract: This interdisciplinary study is an investigation to evaluate user-interfaces in business administration. The study is going to be implemented on two computerized business administration systems with two distinctive user-interfaces, so that differences between the two systems can be determined. Both systems, a commercial and a prototype developed for the purpose of this study, deal with ordering of supplies, tendering procedures, issuing purchase orders, controlling the movement of the stocks against their actual balances on the shelves and editing them on their tabulations. In the second suggested system, modern computer graphics and multimedia issues were taken into consideration to cover the drawbacks of the first system. To highlight differences between the two investigated systems regarding some chosen standard quality criteria, the study employs various statistical techniques and methods to evaluate the users- interaction with both systems. The study variables are divided into two divisions: independent representing the interfaces of the two systems, and dependent embracing efficiency, effectiveness, satisfaction, error rate etc.
Abstract: Understanding road features such as lanes, the color
of lanes, and sidewalks in a live video captured from a moving
vehicle is essential to build video-based navigation systems. In this
paper, we present a novel idea to understand the road features using
support vector machines. Various feature vectors including color
components of road markings and the difference between two
regions, i.e., chosen AOIs, and so on are fed into SVM, deciding
colors of lanes and sidewalks robustly. Experimental results are
provided to show the robustness of the proposed idea.
Abstract: Modernizing legacy applications is the key issue facing IT managers today because there's enormous pressure on organizations to change the way they run their business to meet the new requirements. The importance of software maintenance and reengineering is forever increasing. Understanding the architecture of existing legacy applications is the most critical issue for maintenance and reengineering. The artifacts recovery can be facilitated with different recovery approaches, methods and tools. The existing methods provide static and dynamic set of techniques for extracting architectural information, but are not suitable for all users in different domains. This paper presents a simple and lightweight pattern extraction technique to extract different artifacts from legacy systems using regular expression pattern specifications with multiple language support. We used our custom-built tool DRT to recover artifacts from existing system at different levels of abstractions. In order to evaluate our approach a case study is conducted.
Abstract: The heterotrophic seedling growth can be defined as a
product of two components: (1) the weight of mobilized seed reserve,
and (2) conversion efficiency of utilized seed reserve to seedling
tissue. The first component can be further divided into (1) initial seed
weight, and (2) the fraction of seed reserve, which is mobilized. The
objective of this study was the identification of the sensitive seedling
growth component(s) in response to drought and salinity stresses.
Two experiments were separately conducted using various salinity
levels (osmotic pressure) of 0, 0.25, 0.50, 0.75, 1, 1.25 and 1.5 MPa
created using NaCl as first experiment and by polyethylene glycol
(drought stress) of 0, 0.2, 0.4, 0.6, 0.8, 1, 1.2 and 1.4 MPa in second
experiment. Seeds of five crops species (Hordeum vulgare, Brassica
napus, Zea mays, Medicago sativa and Medicago scutellata) were
used in each experiment. In both experiments, seedling growth,
fraction of seed reserve utilization and weight of mobilized seed
reserve decreased with increasing drought and salt intensity.
However, drought and salinity stresses had no effect on the
conversion efficiency. It was concluded that the sensitive component
of seedling growth is the weight of mobilized seed reserve.
Abstract: The aim of this study was to synthesize the single
walled carbon nanotubes (SWCNTs) and determine their hydrogen
storage capacities. SWCNTs were firstly synthesized by chemical
vapor deposition (CVD) of acetylene (C2H2) on a magnesium oxide
(MgO) powder impregnated with an iron nitrate (Fe(NO3)3·9H2O)
solution. The synthesis parameters were selected as: the synthesis
temperature of 800°C, the iron content in the precursor of 5% and the
synthesis time of 30 min. Purification process of SWCNTs was
fulfilled by microwave digestion at three different temperatures (120,
150 and 200 °C), three different acid concentrations (0.5, 1 and 1.5
M) and for three different time intervals (15, 30 and 60 min). Nitric
acid (HNO3) was used in the removal of the metal catalysts. The
hydrogen storage capacities of the purified materials were measured
using volumetric method at the liquid nitrogen temperature and gas
pressure up to 100 bar. The effects of the purification conditions such
as temperature, time and acid concentration on hydrogen adsorption
were investigated.
Abstract: Helical milling operations are used to generate or
enlarge boreholes by means of a milling tool. The bore diameter can be
adjusted through the diameter of the helical path. The kinematics of
helical milling on a three axis machine tool is analysed firstly. The
relationships between processing parameters, cutting tool geometry
characters with machined hole feature are formulated. The feed motion
of the cutting tool has been decomposed to plane circular feed and
axial linear motion. In this paper, the time varying cutting forces acted
on the side cutting edges and end cutting edges of the flat end cylinder
miller is analysed using a discrete method separately. These two
components then are combined to produce the cutting force model
considering the complicated interaction between the cutters and
workpiece. The time varying cutting force model describes the
instantaneous cutting force during processing. This model could be
used to predict cutting force, calculate statics deflection of cutter and
workpiece, and also could be the foundation of dynamics model and
predicting chatter limitation of the helical milling operations.
Abstract: A self-association model has been used to understand
the concentration dependence of free energy of mixing (GM), heat of
mixing (HM), entropy of mixing (SM), activity (a) and microscopic
structures, such as concentration fluctuation in long wavelength limit
(Scc(0)) and Warren-Cowley short range order parameter ( 1
α )for Cu-
Tl molten alloys at 1573K. A comparative study of surface tension of
the alloys in the liquid state at that temperature has also been carried
out theoretically as function of composition in the light of Butler-s
model, Prasad-s model and quasi-chemical approach. Most of the
computed thermodynamic properties have been found in agreement
with the experimental values. The analysis reveals that the Cu-Tl
molten alloys at 1573K represent a segregating system at all
concentrations with moderate interaction. Surface tensions computed
from different approaches have been found to be comparable to each
other showing increment with the composition of copper.
Abstract: Composting is the process in which municipal solid
waste (MSW) and other organic waste materials such as biosolids
and manures are decomposed through the action of bacteria and other
microorganisms into a stable granular material which, applied to
land, as soil conditioner. Microorganisms, especially those that are
able to degrade polymeric organic material have a key role in speed
up this process. The aim of this study has been established to
isolation of microorganisms with high ability to production
extracellular enzymes for degradation of natural polymers that are
exists in MSW for decreasing time of degradation phase. Our
experimental study for isolation designed in two phases: in first
phase we isolated degrading microorganism with selected media that
consist a special natural polymer such as cellulose, starch, lipids and
etc as sole source of carbon. In second phase we selected
microorganism that had high degrading enzyme production with
enzymatic assay for seed production. However, our findings in pilot
scale have indicated that usage of this microbial consortium had high
efficiency for decreasing degradation phase.
Abstract: In recent years, a new numerical method has been
developed, the extended finite element method (X-FEM). The
objective of this work is to exploit the (X-FEM) for the treatment of
the fracture mechanics problems on 3D geometries, where we
showed the ability of this method to simulate the fatigue crack
growth into two cases: edge and central crack. In the results we
compared the six first natural frequencies of mode shapes uncracking
with the cracking initiation in the structure, and showed the stress
intensity factor (SIF) evolution function as crack size propagation
into structure, the analytical validation of (SIF) is presented. For to
evidence the aspects of this method, all result is compared between
FEA and X-FEM.
Abstract: In this paper, we propose a texture feature-based
language identification using wavelet-domain BDIP (block difference
of inverse probabilities) and BVLC (block variance of local
correlation coefficients) features and FFT (fast Fourier transform)
feature. In the proposed method, wavelet subbands are first obtained
by wavelet transform from a test image and denoised by Donoho-s
soft-thresholding. BDIP and BVLC operators are next applied to the
wavelet subbands. FFT blocks are also obtained by 2D (twodimensional)
FFT from the blocks into which the test image is
partitioned. Some significant FFT coefficients in each block are
selected and magnitude operator is applied to them. Moments for each
subband of BDIP and BVLC and for each magnitude of significant
FFT coefficients are then computed and fused into a feature vector. In
classification, a stabilized Bayesian classifier, which adopts variance
thresholding, searches the training feature vector most similar to the
test feature vector. Experimental results show that the proposed
method with the three operations yields excellent language
identification even with rather low feature dimension.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: This paper compares planning results of the electricity and water generation inventory up to year 2030 in the State of
Kuwait. Currently, the generation inventory consists of oil and gas fired technologies only. The planning study considers two main cases. The first case, Reference case, examines a generation inventory based on oil and gas fired generation technologies only.
The second case examines the inclusion of renewables as part of the generation inventory under two scenarios. In the first scenario, Ref-RE, renewable build-out is based on optimum economic performance
of overall generation system. Result shows that the optimum installed
renewable capacity with electric energy generation of 11% . In the second scenario, Ref-RE20, the renewable capacity build-out is
forced to provide 20% of electric energy by 2030. The respective energy systems costs of Reference, Ref-RE and Ref-RE20 case
scenarios reach US dollar 24, 10 and 14 billion annually in 2030.
Abstract: This paper studies a vital issue in wireless
communications, which is the transmission of images over Wireless
Personal Area Networks (WPANs) through the Bluetooth network. It
presents a simple method to improve the efficiency of error control
code of old Bluetooth versions over mobile WPANs through
Interleaved Error Control Code (IECC) technique. The encoded
packets are interleaved by simple block interleaver. Also, the paper
presents a chaotic interleaving scheme as a tool against bursts of
errors which depends on the chaotic Baker map. Also, the paper
proposes using the chaotic interleaver instead of traditional block
interleaver with Forward Error Control (FEC) scheme. A comparison
study between the proposed and standard techniques for image
transmission over a correlated fading channel is presented.
Simulation results reveal the superiority of the proposed chaotic
interleaving scheme to other schemes. Also, the superiority of FEC
with proposed chaotic interleaver to the conventional interleavers
with enhancing the security level with chaotic interleaving packetby-
packet basis.