Abstract: This paper presents a sensing system for 3D sensing
and mapping by a tracked mobile robot with an arm-type sensor
movable unit and a laser range finder (LRF). The arm-type sensor
movable unit is mounted on the robot and the LRF is installed at the
end of the unit. This system enables the sensor to change position and
orientation so that it avoids occlusions according to terrain by this
mechanism. This sensing system is also able to change the height of
the LRF by keeping its orientation flat for efficient sensing. In this kind
of mapping, it may be difficult for moving robot to apply mapping
algorithms such as the iterative closest point (ICP) because sets of the
2D data at each sensor height may be distant in a common surface. In
order for this kind of mapping, the authors therefore applied
interpolation to generate plausible model data for ICP. The results of
several experiments provided validity of these kinds of sensing and
mapping in this sensing system.
Abstract: The paper presents the method developed to assess
rating points of objects with qualitative indexes. The novelty of the
method lies in the fact that the authors use linguistic scales that allow
to formalize the values of the indexes with the help of fuzzy sets. As
a result it is possible to operate correctly with dissimilar indexes on
the unified basis and to get stable final results. The obtained rating
points are used in decision making based on fuzzy expert opinions.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: Land shortage for burials is one of many issues that emerge out of accelerated urban growth in most developing Asian cities, including Kuala Lumpur. Despite actions taken by the federal government and local authorities in addressing this issue, there is no strategic solution being formulated. Apart from making provisions for land to be developed as new cemeteries, the future plan is merely to allocate reserve land to accommodate the increasing demands of burial grounds around the city. This paper examines problems that arise from the traditional practices of Malay funerary as well as an insight to current urban practices in managing Muslim burial spaces around Kuala Lumpur metropolitan region. This paper will also provide some solutions through design approach that can be applied to counter the existing issues.
Abstract: Music segmentation is a key issue in music information
retrieval (MIR) as it provides an insight into the
internal structure of a composition. Structural information about
a composition can improve several tasks related to MIR such
as searching and browsing large music collections, visualizing
musical structure, lyric alignment, and music summarization.
The authors of this paper present the MTSSM framework, a twolayer
framework for the multi-track segmentation of symbolic
music. The strength of this framework lies in the combination of
existing methods for local track segmentation and the application
of global structure information spanning via multiple tracks.
The first layer of the MTSSM uses various string matching
techniques to detect the best candidate segmentations for each
track of a multi-track composition independently. The second
layer combines all single track results and determines the best
segmentation for each track in respect to the global structure of
the composition.
Abstract: Embedding Sustainability in technological curricula has become a crucial factor for educating engineers with competences in sustainability. The Technical University of Catalonia UPC, in 2008, designed the Sustainable Technology Excellence Program STEP 2015 in order to assure a successful Sustainability Embedding. This Program takes advantage of the opportunity that the redesign of all Bachelor and Master Degrees in Spain by 2010 under the European Higher Education Area framework offered. The STEP program goals are: to design compulsory courses in each degree; to develop the conceptual base and identify reference models in sustainability for all specialties at UPC; to create an internal interdisciplinary network of faculty from all the schools; to initiate new transdisciplinary research activities in technology-sustainability-education; to spread the know/how attained; to achieve international scientific excellence in technology-sustainability-education and to graduate the first engineers/architects of the new EHEA bachelors with sustainability as a generic competence. Specifically, in this paper authors explain their experience in leading the STEP program, and two examples are presented: Industrial Robotics subject and the curriculum for the School of Architecture.
Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: Paper deals with environmental metrics and assessment systems devoted to Small and Medium Sized Enterprises. Authors are presenting proposed assessment model which has an ability to discover current environmental strengths and weaknesses of Small and Middle Sized Enterprise. Suggested model has also an ambition to become a Sustainability Decision Tool. Model is able to identify "best environmental devision" in the company, and to quantify how this decision contributed into overall environmental improvement. Authors understand environmental improvements as environmental innovations (product, process and organizational). Suggested model is based on its own concept; however, authors are also utilizing already existing environmental assessment tools.
Abstract: In this paper, a generalized derivatives operator n
λ,βf
introduced by the authors will be discussed. Some subordination and
superordination results involving this operator for certain normalized
analytic functions in the open unit disk will be investigated. Our
results extend corresponding previously known results.
Abstract: Article 5(3) of the Brussels I Regulation provides that a person domiciled in a Member State may be sued in another Member State in matters relating to tort, delict or quasi-delict, in the courts for the place where the harmful events occurred or may occur. For a number of years Article 5 (3) of the Brussels I Regulation has been at the centre of the debate regarding the intellectual property rights infringement over the Internet. Nothing has been done to adapt the provisions relating to non-internet cases of infringement of intellectual property rights to the context of the Internet. The author’s findings indicate that in the case of intellectual property rights infringement on the Internet, the plaintiff has the option to sue either: the court of the Member State of the event giving rise to the damage: where the publisher of the newspaper is established; the court of the Member State where the damage occurred: where defamatory article is distributed. However, it must be admitted that whilst infringement over the Internet has some similarity to multi-State defamation by means of newspapers, the position is not entirely analogous due to the cross-border nature of the Internet. A simple example which may appropriately illustrate its contentious nature is a defamatory statement published on a website accessible in different Member States, and available in different languages. Therefore, we need to answer the question: how these traditional jurisdictional rules apply in the case of intellectual property rights infringement over the Internet? Should these traditional jurisdictional rules be modified?
Abstract: Education in the modern world provides the socioeconomic
progress of society. In today's society, where the presence
of large middle class ensures its stability and is a symbol of
resolution of hidden economic problems, education is an integral part
of formation and reproduction of the middle class. This article presents part of results of the sociological study conducted under the
project "Kazakhstan model of education: international experience and national traditions" supported by the Foundation of the First President
of Republic of Kazakhstan - Leader of the Nation to determine the
ratio of students to the transformations of the educational system. The
authors conclude that the Kazakhstani system of education, passing
through the transformation processes, improving the quality of
educational programs and trying to correspond to the international
standards, not yet in full range, but begins to perform important
functions in the formation of the middle class.
Abstract: The authors of this work indicate by means of a concrete example that it is possible to apply efficaciously the method of multiple criteria programming in dealing with the problem of determining the optimal production plan for a certain period of time. The work presents: (1) the selection of optimization criteria, (2) the setting of the problem of determining an optimal production plan, (3) the setting of the model of multiple criteria programming in finding a solution to a given problem, (4) the revised surrogate trade-off method, (5) generalized multicriteria model for solving production planning problem and problem of choosing technological variants in the metal manufacturing industry. In the final part of this work the authors reflect on the application of the method of multiple criteria programming while determining the optimal production plan in manufacturing enterprises.
Abstract: Today, any organization - regardless of the specific activity - must be prepared to face continuous radical changes, innovation thus becoming a condition of survival in a globalized market. Few managers have a wider vision that includes innovation, to enable better performance of the critical activities, namely the degree of novelty that it must submit an innovation to be considered as such. Companies need not only radical changes in the products or their services, but also to their business strategies. Not all managers have an overall view on the real size of necessary innovation potential. Unfortunately there is still no common understanding (and correct) of the term of innovation among managers. Moreover, not all managers are aware of the need for innovation. In these conditions, increasing the processes adaptability of firms (through innovation) to meet the needs and performance requirements is difficult without a systematic framework. To overcome this disadvantage, the authors propose a framework for designing an innovation management system,, to cover all the important aspects of a business system, to reach the actual performance of an organization.
Abstract: While the explosive increase in information published
on the Web, researchers have to filter information when searching for
conference related information. To make it easier for users to search
related information, this paper uses Topic Maps and social information
to implement ontology since ontology can provide the formalisms and
knowledge structuring for comprehensive and transportable machine
understanding that digital information requires. Besides enhancing
information in Topic Maps, this paper proposes a method of
constructing research Topic Maps considering social information.
First, extract conference data from the web. Then extract conference
topics and the relationships between them through the proposed
method. Finally visualize it for users to search and browse. This paper
uses ontology, containing abundant of knowledge hierarchy structure,
to facilitate researchers getting useful search results. However, most
previous ontology construction methods didn-t take “people" into
account. So this paper also analyzes the social information which helps
researchers find the possibilities of cooperation/combination as well as
associations between research topics, and tries to offer better results.
Abstract: The purposes of this paper are to (1) promote
excellence in computer science by suggesting a cohesive innovative
approach to fill well documented deficiencies in current computer
science education, (2) justify (using the authors- and others anecdotal
evidence from both the classroom and the real world) why this
approach holds great potential to successfully eliminate the
deficiencies, (3) invite other professionals to join the authors in proof
of concept research. The authors- experiences, though anecdotal,
strongly suggest that a new approach involving visual modeling
technologies should allow computer science programs to retain a
greater percentage of prospective and declared majors as students
become more engaged learners, more successful problem-solvers,
and better prepared as programmers. In addition, the graduates of
such computer science programs will make greater contributions to
the profession as skilled problem-solvers. Instead of wearily
rememorizing code as they move to the next course, students will
have the problem-solving skills to think and work in more
sophisticated and creative ways.
Abstract: As a security mechanism, authorization is to provide access control to the system resources according to the polices and rules specified by the security strategies. Either by update or in the initial specification, conflicts in authorization is an issue needs to be solved. In this paper, we propose a new approach to solve conflict by using prioritized logic programs and discuss the uniqueness of its answer set. Addressing conflict resolution from logic programming viewpoint and the uniqueness analysis of the answer set provide a novel, efficient approach for authorization conflict resolution.
Abstract: The increasing development of wireless networks and
the widespread popularity of handheld devices such as Personal
Digital Assistants (PDAs), mobile phones and wireless tablets
represents an incredible opportunity to enable mobile devices as a
universal payment method, involving daily financial transactions.
Unfortunately, some issues hampering the widespread acceptance of
mobile payment such as accountability properties, privacy protection,
limitation of wireless network and mobile device. Recently, many
public-key cryptography based mobile payment protocol have been
proposed. However, limited capabilities of mobile devices and
wireless networks make these protocols are unsuitable for mobile
network. Moreover, these protocols were designed to preserve
traditional flow of payment data, which is vulnerable to attack and
increase the user-s risk. In this paper, we propose a private mobile
payment protocol which based on client centric model and by
employing symmetric key operations. The proposed mobile payment
protocol not only minimizes the computational operations and
communication passes between the engaging parties, but also
achieves a completely privacy protection for the payer. The future
work will concentrate on improving the verification solution to
support mobile user authentication and authorization for mobile
payment transactions.
Abstract: When a lightning strike falls near an overhead power
line, the intense electromagnetic field radiated by the current of the
lightning return stroke coupled with power lines and there induced
transient overvoltages, which can cause a back-flashover in electrical
network. The indirect lightning represents a major danger owing to
the fact that it is more frequent than that which results from the direct
strikes.
In this paper we present an analysis of the electromagnetic
coupling between an external electromagnetic field generated by the
lightning and an electrical overhead lines, so we give an important
and original contribution: We are based on our experimental
measurements which we carried in the high voltage laboratories of
EPFL in Switzerland during the last trimester of 2005, on the recent
works of other authors and with our mathematical improvement a
new particular analytical expression of the electromagnetic field
generated by the lightning return stroke was developed and presented
in this paper. The results obtained by this new electromagnetic field
formulation were compared with experimental results and give a
reasonable approach.
Abstract: This paper has two main ideas. Firstly, it describes Evans and Wurster-s concepts “the trade-off between reach and richness", and relates them to the impact of technology on the virtual markets. Authors Evans and Wurster see the transfer of information as a 'trade'off between richness and reach-. Reach refers to the number of people who share particular information, with Richness ['Rich'] being a more complex concept combining: bandwidth, customization, interactivity, reliability, security and currency. Traditional shopping limits the number of shops the shopper is able to visit due to time and other cost constraints; the time spent traveling consequently leaves the shopper with less time to evaluate the product. The paper concludes that although the Web provides Reach, offering Richness and the sense of community required for creating and sustaining relationships with potential clients could be difficult.
Abstract: Airbag deployment has been known to be responsible
for huge death, incidental injuries and broken bones due to low crash
severity and wrong deployment decisions. Therefore, the authorities
and industries have been looking for more innovative and intelligent
products to be realized for future enhancements in the vehicle safety
systems (VSSs). Although the VSSs technologies have advanced
considerably, they still face challenges such as how to avoid
unnecessary and untimely airbag deployments that can be hazardous
and fatal. Currently, most of the existing airbag systems deploy
without regard to occupant size and position. As such, this paper will
focus on the occupant and crash sensing performances due to frontal
collisions for the new breed of so called smart airbag systems. It
intends to provide a thorough discussion relating to the occupancy
detection, occupant size classification, occupant off-position
detection to determine safe distance zone for airbag deployment,
crash-severity analysis and airbag decision algorithms via a computer
modeling. The proposed system model consists of three main
modules namely, occupant sensing, crash severity analysis and
decision fusion. The occupant sensing system module utilizes the
weight sensor to determine occupancy, classify the occupant size,
and determine occupant off-position condition to compute safe
distance for airbag deployment. The crash severity analysis module is
used to generate relevant information pertinent to airbag deployment
decision. Outputs from these two modules are fused to the decision
module for correct and efficient airbag deployment action. Computer
modeling work is carried out using Simulink, Stateflow,
SimMechanics and Virtual Reality toolboxes.