Abstract: This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.
Abstract: Eight difference schemes and five limiters are applied to numerical computation of Riemann problem. The resolution of discontinuities of each scheme produced is compared. Numerical dissipation and its estimation are discussed. The result shows that the numerical dissipation of each scheme is vital to improve scheme-s accuracy and stability. MUSCL methodology is an effective approach to increase computational efficiency and resolution. Limiter should be selected appropriately by balancing compressive and diffusive performance.
Abstract: Design for cost (DFC) is a method that reduces life
cycle cost (LCC) from the angle of designers. Multiple domain
features mapping (MDFM) methodology was given in DFC. Using
MDFM, we can use design features to estimate the LCC. From the
angle of DFC, the design features of family cars were obtained, such
as all dimensions, engine power and emission volume. At the
conceptual design stage, cars- LCC were estimated using back
propagation (BP) artificial neural networks (ANN) method and
case-based reasoning (CBR). Hamming space was used to measure the
similarity among cases in CBR method. Levenberg-Marquardt (LM)
algorithm and genetic algorithm (GA) were used in ANN. The
differences of LCC estimation model between CBR and artificial
neural networks (ANN) were provided. ANN and CBR separately
each method has its shortcomings. By combining ANN and CBR
improved results accuracy was obtained. Firstly, using ANN selected
some design features that affect LCC. Then using LCC estimation
results of ANN could raise the accuracy of LCC estimation in CBR
method. Thirdly, using ANN estimate LCC errors and correct errors in
CBR-s estimation results if the accuracy is not enough accurate.
Finally, economically family cars and sport utility vehicle (SUV) was
given as LCC estimation cases using this hybrid approach combining
ANN and CBR.
Abstract: Knowing about the customer behavior in a grocery has
been a long-standing issue in the retailing industry. The advent of
RFID has made it easier to collect moving data for an individual
shopper's behavior. Most of the previous studies used the traditional
statistical clustering technique to find the major characteristics of
customer behavior, especially shopping path. However, in using the
clustering technique, due to various spatial constraints in the store,
standard clustering methods are not feasible because moving data such
as the shopping path should be adjusted in advance of the analysis,
which is time-consuming and causes data distortion. To alleviate this
problem, we propose a new approach to spatial pattern clustering
based on the longest common subsequence. Experimental results using
real data obtained from a grocery confirm the good performance of the
proposed method in finding the hot spot, dead spot and major path
patterns of customer movements.
Abstract: Gas Metal Arc Welding (GMAW) processes is an
important joining process widely used in metal fabrication
industries. This paper addresses modeling and optimization of this
technique using a set of experimental data and regression analysis.
The set of experimental data has been used to assess the influence
of GMAW process parameters in weld bead geometry. The
process variables considered here include voltage (V); wire feed
rate (F); torch Angle (A); welding speed (S) and nozzle-to-plate
distance (D). The process output characteristics include weld bead
height, width and penetration. The Taguchi method and regression
modeling are used in order to establish the relationships between
input and output parameters. The adequacy of the model is
evaluated using analysis of variance (ANOVA) technique. In the
next stage, the proposed model is embedded into a Simulated
Annealing (SA) algorithm to optimize the GMAW process
parameters. The objective is to determine a suitable set of process
parameters that can produce desired bead geometry, considering
the ranges of the process parameters. Computational results prove
the effectiveness of the proposed model and optimization
procedure.
Abstract: The paper evaluates the ongoing reform of VAT in the Czech Republic in terms of impacts on individual households. The main objective is to analyse the impact of given changes on individual households. The adopted method is based on the data related to household consumption by individual household quintiles; obtained data are subjected to micro-simulation examining. Results are discussed in terms of vertical tax justice. Results of the analysis reveal that VAT behaves regressively and a sole consolidation of rates at a higher level only increases the regression of this tax in the Czech Republic.
Abstract: Full search block matching algorithm is widely used for hardware implementation of motion estimators in video compression algorithms. In this paper we are proposing a new architecture, which consists of a 2D parallel processing unit and a 1D unit both working in parallel. The proposed architecture reduces both data access power and computational power which are the main causes of power consumption in integer motion estimation. It also completes the operations with nearly the same number of clock cycles as compared to a 2D systolic array architecture. In this work sum of absolute difference (SAD)-the most repeated operation in block matching, is calculated in two steps. The first step is to calculate the SAD for alternate rows by a 2D parallel unit. If the SAD calculated by the parallel unit is less than the stored minimum SAD, the SAD of the remaining rows is calculated by the 1D unit. Early termination, which stops avoidable computations has been achieved with the help of alternate rows method proposed in this paper and by finding a low initial SAD value based on motion vector prediction. Data reuse has been applied to the reference blocks in the same search area which significantly reduced the memory access.
Abstract: This paper describes the development, modeling, and
testing of skyhook and MiniMax control strategies of semi-active
suspension. The control performances are investigated using
Matlab/Simulink [1], with a two-degree-of-freedom quarter car semiactive
suspension system model. The comparison and evaluation of
control result are made using software-in-the-loop simulation (SILS)
method. This paper also outlines the development of a hardware-inthe-
loop simulation (HILS) system. The simulation results show that
skyhook strategy can significantly reduce the resonant peak of body
and provide improvement in vehicle ride comfort. Otherwise,
MiniMax strategy can be employed to effectively improve drive
safety of vehicle by influencing wheel load. The two strategies can
be switched to control semi-active suspension system to fulfill
different requirement of vehicle in different stages.
Abstract: A two-dimensional numerical simulation of crossflow
around four cylinders in an in-line rectangular configuration is
studied by using the lattice Boltzmann method (LBM). Special
attention is paid to the effect of the spacing between the cylinders.
The Reynolds number ( Re ) is chosen to be e 100 R = and the
spacing ratio L / D is set at 0.5, 1.5, 2.5, 4.0, 5.0, 6.0, 7.0, 8.0, 9.0
and 10.0. Results show that, as in the case of four cylinders in an inline
rectangular configuration , flow fields show four different
features depending on the spacing (single square cylinder, stable
shielding flow, wiggling shielding flow and a vortex shedding flow)
are observed in this study. The effects of spacing ratio on physical
quantities such as mean drag coefficient, Strouhal number and rootmean-
square value of the drag and lift coefficients are also presented.
There is more than one shedding frequency at small spacing ratios.
The mean drag coefficients for downstream cylinders are less than
that of the single cylinder for all spacing ratios. The present results
using the LBM are compared with some existing experimental data
and numerical studies. The comparison shows that the LBM can
capture the characteristics of the bluff body flow reasonably well and
is a good tool for bluff body flow studies.
Abstract: Developed tool is one of system tools for easier access to various scientific areas and real time interactive learning between
lecturer and for hearing impaired students. There is no demand for the lecturer to know Sign Language (SL). Instead, the new software
tools will perform the translation of the regular speech into SL, after
which it will be transferred to the student. On the other side, the
questions of the student (in SL) will be translated and transferred to
the lecturer in text or speech. One of those tools is presented tool. It-s
too for developing the correct Speech Visemes as a root of total communication method for hearing impared students.
Abstract: The interactions between input/output variables are a very common phenomenon encountered in the design of multi-loop controllers for interacting multivariable processes, which can be a serious obstacle for achieving a good overall performance of multiloop control system. To overcome this impediment, the decomposed dynamic interaction analysis is proposed by decomposing the multiloop control system into a set of n independent SISO systems with the corresponding effective open-loop transfer function (EOTF) within the dynamic interactions embedded explicitly. For each EOTF, the reduced model is independently formulated by using the proposed reduction design strategy, and then the paired multi-loop proportional-integral-derivative (PID) controller is derived quite simply and straightforwardly by using internal model control (IMC) theory. This design method can easily be implemented for various industrial processes because of its effectiveness. Several case studies are considered to demonstrate the superior of the proposed method.
Abstract: Large metal and concrete structures suffer by various kinds of deterioration, and accurate prediction of the remaining life is important. This paper informs about two methods for its assessment. One method, suitable for steel bridges and other constructions exposed to fatigue, monitors the loads and damage accumulation using information systems for the operation and the finite element model of the construction. In addition to the operation load, the dead weight of the construction and thermal stresses can be included into the model. The second method is suitable for concrete bridges and other structures, which suffer by carbonatation and other degradation processes, driven by diffusion. The diffusion constant, important for the prediction of future development, can be determined from the depth-profile of pH, obtained by pH measurement at various depths. Comparison with measurements on real objects illustrates the suitability of both methods.
Abstract: Air conditioning systems of houses consume large
quantity of electricity. To reducing energy consumption for air
conditioning purposes it is becoming attractive the use of evaporative
cooling air conditioning which is less energy consuming compared to
air chillers. But, it is obvious that higher energy efficiency of
evaporative cooling is not enough to judge whether evaporative
cooling economically is competitive with other types of cooling
systems. To proving the higher energy efficiency and cost
effectiveness of the evaporative cooling competitive analysis of
various types of cooling system should be accomplished. For noted
purpose optimization mathematical model for each system should be
composed based on system approach analysis. In this paper different
types of evaporative cooling-heating systems are discussed and
methods for increasing their energy efficiency and as well as
determining of their design parameters are developed. The
optimization mathematical models for each of them are composed
with help of which least specific costs for each of them are reviled.
The comparison of specific costs proved that the most efficient and
cost effective is considered the “direct evaporating" system if it is
applicable for given climatic conditions. Next more universal and
applicable for many climatic conditions system providing least cost
of heating and cooling is considered the “direct evaporating" system.
Abstract: management of medical devices in hospitals includes
the planning of medical equipment acquisition and maintenance. The
presence of critical and non-critical areas together with technological
proliferation render the management of medical devices very
complex. This study creates an easy and objective methodology for
the analysis of medical equipment maintenance, that makes the
management of medical devices more feasible. The study has been
carried out at Florence Hospital Careggi and it aims to help the
clinical engineering department to manage medical equipment by
clarifying the hospital situation through a characterization of the
different areas, technologies and fault typologies.
Abstract: This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned.
Abstract: Overall cost is a significant consideration in any
decision-making process. Although many studies were carried out on
overall cost in construction, little has treated the uncertainties of real
life cycle development. On the basis of several case studies, a
feedback process was performed on the historical data of studied
buildings. This process enabled to identify some factors causing
uncertainty during the operational period. As a result, the research
proposes a new method for assessing the overall cost during a part of
the building-s life cycle taking account of the building actual value,
its end-of-life value and the influence of the identified life cycle
uncertainty factors. The findings are a step towards a higher level of
reliability in overall cost evaluation taking account of some usually
unexpected uncertainty factors.
Abstract: Requirement engineering has been the subject of large
volume of researches due to the significant role it plays in the
software development life cycle. However, dynamicity of software
industry is much faster than advances in requirements engineering
approaches. Therefore, this paper aims to systematically review and
evaluate the current research in requirement engineering and identify
new research trends and direction in this field. In addition, various
research methods associated with the Evaluation-based techniques
and empirical study are highlighted for the requirements engineering
field. Finally, challenges and recommendations on future directions
research are presented based on the research team observations
during this study.
Abstract: In this paper, we show that the association of the PI
regulators for the speed and stator currents with a control strategy
using the linearization by state feedback for an induction machine
without speed sensor, and with an adaptation of the rotor resistance.
The rotor speed is estimated by using the model reference adaptive
system approach (MRAS). This method consists of using two
models: The first is the reference model and the second is an
adjustable one in which two components of the stator flux, obtained
from the measurement of the currents and stator voltages are
estimated. The estimated rotor speed is then obtained by canceling
the difference between stator-flux of the reference model and those
of the adjustable one. Satisfactory results of simulation are obtained
and discussed in this paper to highlight the proposed approach.
Abstract: This paper gives an overview of a deep drawing
process by pressurized liquid medium separated from the sheet by a
rubber diaphragm. Hydroforming deep drawing processing of sheet
metal parts provides a number of advantages over conventional
techniques. It generally increases the depth to diameter ratio possible
in cup drawing and minimizes the thickness variation of the drawn
cup. To explore the deformation mechanism, analytical and
numerical simulations are used for analyzing the drawing process of
an AA6061-T4 blank. The effects of key process parameters such as
coefficient of friction, initial thickness of the blank and radius
between cup wall and flange are investigated analytically and
numerically. The simulated results were in good agreement with the
results of the analytical model. According to finite element
simulations, the hydroforming deep drawing method provides a more
uniform thickness distribution compared to conventional deep
drawing and decreases the risk of tearing during the process.
Abstract: The intrusion detection problem has been frequently studied, but intrusion detection methods are often based on a single point of view, which always limits the results. In this paper, we introduce a new intrusion detection model based on the combination of different current methods. First we use a notion of distance to unify the different methods. Second we combine these methods using the Pearson correlation coefficients, which measure the relationship between two methods, and we obtain a combined distance. If the combined distance is greater than a predetermined threshold, an intrusion is detected. We have implemented and tested the combination model with two different public data sets: the data set of masquerade detection collected by Schonlau & al., and the data set of program behaviors from the University of New Mexico. The results of the experiments prove that the combination model has better performances.