Abstract: Vehicle detection is the critical step for highway monitoring. In this paper we propose background subtraction and edge detection technique for vehicle detection. This technique uses the advantages of both approaches. The practical applications approved the effectiveness of this method. This method consists of two procedures: First, automatic background extraction procedure, in which the background is extracted automatically from the successive frames; Second vehicles detection procedure, which depend on edge detection and background subtraction. Experimental results show the effective application of this algorithm. Vehicles detection rate was higher than 91%.
Abstract: The scenario of bypass transition is generally described
as follows: the low-frequency disturbances in the free-stream may
generate long stream-wise streaks in the boundary layer, which later
may trigger secondary instability, leading to rapid increase of
high-frequency disturbances. Then possibly turbulent spots emerge,
and through their merging, lead to fully developed turbulence. This
description, however, is insufficient in the sense that it does not
provide the inherent mechanism of transition that during the transition,
a large number of waves with different frequencies and wave numbers
appear almost simultaneously, producing sufficiently large Reynolds
stress, so the mean flow profile can change rapidly from laminar to
turbulent. In this paper, such a mechanism will be figured out from
analyzing DNS data of transition.
Abstract: The distributions of stresses and deflection in
rectangular isotropic and orthotropic plates with central
circular hole under transverse static loading have been studied
using finite element method. The aim of author is to analyze
the effect of D/A ratio (where D is hole diameter and A is plate
width) upon stress concentration factor (SCF) and deflection
in isotropic and orthotropic plates under transverse static
loading. The D/A ratio is varied from 0.01 to 0.9. The analysis
is done for plates of isotropic and two different orthotropic
materials. The results are obtained for three different boundary
conditions. The variations of SCF and deflection with respect
to D/A ratio are presented in graphical form and discussed.
The finite element formulation is carried out in the analysis
section of the ANSYS package.
Abstract: Uterine and oviducal fluids are necessary for
capacitation of the spermatozoa and early embryonic development.
The aim of the present study was to determine the effects of estrous
cycle phases (follicular and luteal) on some biological parameters
(enzymes, electrolytes and total proteins) in uterine and oviducal
secretions of ewes. Oviducal and uterine fluids were collected,
diluted and centrifuged. According to our results, concentrations of
GPT, G6PDH, total proteins, K and Na were significantly (P
Abstract: Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.
Abstract: Urban road network traffic has become one of the
most studied research topics in the last decades. This is mainly due to
the enlargement of the cities and the growing number of motor
vehicles traveling in this road network. One of the most sensitive
problems is to verify if the network is congestion-free. Another
related problem is the automatic reconfiguration of the network
without building new roads to alleviate congestions. These problems
require an accurate model of the traffic to determine the steady state
of the system. An alternative is to simulate the traffic to see if there
are congestions and when and where they occur. One key issue is to
find an adequate model for road intersections. Once the model
established, either a large scale model is built or the intersection is
represented by its performance measures and simulation for analysis.
In both cases, it is important to seek the queueing model to represent
the road intersection. In this paper, we propose to model the road
intersection as a BCMP queueing network and we compare this
analytical model against a simulation model for validation.
Abstract: Weblog is an Internet tool that is believed to possess
great potential to facilitate learning in education. This study wants to
know if weblog can be used to promote students- critical thinking. It
used a group of secondary two students from a Singapore school to
write weblogs as a means of substitution for their traditional
handwritten assignments. The topics for the weblogging are taken
from History syllabus but modified to suit the purpose of this study.
Weblogs from the students were collected and analysed using a
known coding system for measuring critical thinking. Results show
that the topic for blogging is crucial in determining the types of
critical thinking employed by the students. Students are seen to
display critical thinking traits in the areas of information sourcing,
linking information to arguments and viewpoints justification.
Students- criticalness is more profound when the information for
writing a topic is readily available. Otherwise, they tend to be less
critical and subjective. The study also found that students lack the
ability to source for external information suggesting that students
may need to be taught information literacy in order to widen their use
of critical thinking skills.
Abstract: The purpose of this study was to develop and examine a
Teaching Commitment Scale of Health and Physical Education
(TCS-HPE) for Taiwanese elementary school teachers. First of all,
based on teaching commitment related theory and literatures to
develop a original scale with 40 items, later both stratified random
sampling and cluster sampling were used to sample participants.
During the first stage, 300 teachers were sampled and 251 valid scales
(83.7%) returned. Later, the data was analyzed by exploratory factor
analysis to obtain 74.30% of total variance for the construct validity.
The Cronbach-s alpha coefficient of sum scale reliability was 0.94, and
subscale coefficients were between 0.80 and 0.96. In the second stage,
400 teachers were sampled and 318 valid scales (79.5%) returned.
Finally, this study used confirmatory factor analysis to test validity and
reliability of TCS-HPE. The result showed that the fit indexes reached
acceptable criteria(¤ç2
(246 ) =557.64 , p
Abstract: The present study deals with the analysis of the cylindrical part of a CNG storage vessel, combining a plastic liner and an over wrapped filament wound composite. Three kind of polymer are used in the present analysis: High density Polyethylene HDPE, Light low density Polyethylene LLDPE and finally blend of LLDPE/HDPE. The effect of the mechanical properties on the behavior of type IV vessel may be then investigated. In the present paper, the effect of the order of the circumferential winding on the stacking sequence may be then investigated. Based on mechanical considerations, the present model provides an exact solution for stresses and deformations on the cylindrical section of the vessel under thermo-mechanical static loading. The result show a good behavior of HDPE liner compared to the other plastic materials. The presence of circumferential winding angle in the stacking improves the rigidity of vessel by improving the burst pressure.
Abstract: In the present work flow past circular cylinder and
cylinder with rectangular and triangular wake splitter is studied to
improve aerodynamic parameters. The Comparison of drag
coefficient is tabulated for bare cylinder, cylinder with rectangular
and triangular wake splitters. Flow past circular cylinder and cylinder
with triangular and rectangular wake splitter is performed at
Reynoldsnumber 5, 20, 40, 50,80, 100.An incompressible PISO finite
volume code employing a non-staggered grid arrangement is used, a
second order upwind scheme is used for convective terms. The time
discretization is implicit and a Second order Crank-Nicholson scheme
is employed. Length of wake splitter in both configurations is taken
to be equal to diameter of cylinder. Wake length is found to be less
with rectangular wake splitter when compared to bare cylinder and
cylinder with triangular wake splitter. Coefficient of drag is found to
be less for triangular wake splitter when compared to bare cylinder &
cylinder with rectangular wake splitter.
Abstract: During this day a considerable amount of Leachate is produced with high amounts of organic material and nutrients needed plants. This study has done in order to scrutinize the effect of Leachate compost on the pH, EC and organic matter percentage in the form of statistical Factorial plan through randomizing block design with three main and two minor treatments and also three replications during three six month periods. Major treatments include N: Irrigation with the region-s well water as a control, I: Frequent irrigation with well water and Leachate, C: Mixing Leachate and water well (25 percent leachate + 75 percent ordinary well water) and secondary treatments, include DI: surface drip irrigation and SDI: sub surface drip irrigation. Results of this study indicated significant differences between treatments and also there were mixing up with the control treatment in the reduction of pH, increasing soluble salts and also increasing the organic matter percentage. This increase is proportional to the amount of added Leachate and in the treatment also proportional to higher mixture of frequent treatment. Therefore, since creating an acidic pH increases the ability to absorb some nutrient elements such as phosphorus, iron, zinc, copper and manganese are increased and the other hand, organic materials also improve many physical and chemical properties of soil are used in Leachate trash Consider health issues as refined in the green belts around cities as a liquid fertilizer recommended.
Abstract: It is well known that during the developments in the
economic sector and through the financial crises occur everywhere in
the whole world, volatility measurement is the most important
concept in financial time series. Therefore in this paper we discuss
the volatility for Amman stocks market (Jordan) for certain period of
time. Since wavelet transform is one of the most famous filtering
methods and grows up very quickly in the last decade, we compare
this method with the traditional technique, Fast Fourier transform to
decide the best method for analyzing the volatility. The comparison
will be done on some of the statistical properties by using Matlab
program.
Abstract: The financial crisis has decreased the opportunities of
small businesses to acquire financing through conventional financial
actors, such as commercial banks. This credit constraint is partly the
reason for the emergence of new alternatives of financing, in addition
to the spreading opportunities for communication and secure
financial transfer through Internet. One of the most interesting venues
for finance is termed “crowdfunding". As the term suggests
crowdfunding is an appeal to prospective customers and investors to
form a crowd that will finance projects that otherwise would find it
hard to generate support through the most common financial actors.
Crowdfunding is in this paper divided into different models; the
threshold model, the microfinance model, the micro loan model and
the equity model. All these models add to the financial possibilities of
emerging entrepreneurs.
Abstract: In today-s turbulent environment, companies are faced with two principal challenges. On the one hand, it is necessary to produce ever more cost-effectively to remain competitive. On the other hand, factories need to be transformable in order to manage unpredictable changes in the corporate environment. To deal with these different challenges, companies use the philosophy of lean production in the first case, in the second case the philosophy of transformability. To a certain extent these two approaches follow different directions. This can cause conflicts when designing factories. Therefore, the Institute of Production Systems and Logistics (IFA) of the Leibniz University of Hanover has developed a procedure to allow companies to evaluate and design their factories with respect to the requirements of both philosophies.
Abstract: An empirical study of web applications that use
software frameworks is presented here. The analysis is based on two
approaches. In the first, developers using such frameworks are
required, based on their experience, to assign weights to parameters
such as database connection. In the second approach, a performance
testing tool, OpenSTA, is used to compute start time and other such
measures. From such an analysis, it is concluded that open source
software is superior to proprietary software. The motivation behind
this research is to examine ways in which a quantitative assessment
can be made of software in general and frameworks in particular.
Concepts such as metrics and architectural styles are discussed along
with previously published research.
Abstract: This paper presents a new method of analog fault diagnosis based on back-propagation neural networks (BPNNs) using wavelet decomposition and fractal dimension as preprocessors. The proposed method has the capability to detect and identify faulty components in an analog electronic circuit with tolerance by analyzing its impulse response. Using wavelet decomposition to preprocess the impulse response drastically de-noises the inputs to the neural network. The second preprocessing by fractal dimension can extract unique features, which are the fed to a neural network as inputs for further classification. A comparison of our work with [1] and [6], which also employs back-propagation (BP) neural networks, reveals that our system requires a much smaller network and performs significantly better in fault diagnosis of analog circuits due to our proposed preprocessing techniques.
Abstract: This study aims to propose three evaluation methods to
evaluate the Tokyo Cap and Trade Program when emissions trading is
performed virtually among enterprises, focusing on carbon dioxide
(CO2), which is the only emitted greenhouse gas that tends to increase.
The first method clarifies the optimum reduction rate for the highest
cost benefit, the second discusses emissions trading among enterprises
through market trading, and the third verifies long-term emissions
trading during the term of the plan (2010-2019), checking the validity
of emissions trading partly using Geographic Information Systems
(GIS). The findings of this study can be summarized in the following
three points.
1. Since the total cost benefit is the greatest at a 44% reduction rate, it
is possible to set it more highly than that of the Tokyo Cap and
Trade Program to get more total cost benefit.
2. At a 44% reduction rate, among 320 enterprises, 8 purchasing
enterprises and 245 sales enterprises gain profits from emissions
trading, and 67 enterprises perform voluntary reduction without
conducting emissions trading. Therefore, to further promote
emissions trading, it is necessary to increase the sales volumes of
emissions trading in addition to sales enterprises by increasing the
number of purchasing enterprises.
3. Compared to short-term emissions trading, there are few enterprises
which benefit in each year through the long-term emissions trading
of the Tokyo Cap and Trade Program. Only 81 enterprises at the
most can gain profits from emissions trading in FY 2019. Therefore,
by setting the reduction rate more highly, it is necessary to increase
the number of enterprises that participate in emissions trading and
benefit from the restraint of CO2 emissions.
Abstract: The purpose of this study was to explore the learning
effects on dance domain in Arts Curriculum at junior and senior high
levels. A total of 1,366 students from 9th to 11th grade of different
areas from Taiwan were administered a self-designed dance
achievement test. Data were analyzed through descriptive analysis,
independent sample t test, one-way ANOVA and Post hoc comparison
analysis using Scheffé Test. The results showed (1) female students
Abstract: Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be inestimable building blocks for cryptographic applications. They are at the heart of numerous protocols such as key agreements, public-key cryptosystems, digital signatures, identification schemes, publicly verifiable secret sharings, hash functions and bit commitments. The search for new groups with intractable DLP is therefore of great importance.The goal of this article is to study elliptic curves over the ring Fq[], with Fq a finite field of order q and with the relation n = 0, n ≥ 3. The motivation for this work came from the observation that several practical discrete logarithm-based cryptosystems, such as ElGamal, the Elliptic Curve Cryptosystems . In a first time, we describe these curves defined over a ring. Then, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. In anther article we study their cryptographic properties, an attack of the elliptic discrete logarithm problem, a new cryptosystem over these curves.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.