Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: Article 5(3) of the Brussels I Regulation provides that a person domiciled in a Member State may be sued in another Member State in matters relating to tort, delict or quasi-delict, in the courts for the place where the harmful events occurred or may occur. For a number of years Article 5 (3) of the Brussels I Regulation has been at the centre of the debate regarding the intellectual property rights infringement over the Internet. Nothing has been done to adapt the provisions relating to non-internet cases of infringement of intellectual property rights to the context of the Internet. The author’s findings indicate that in the case of intellectual property rights infringement on the Internet, the plaintiff has the option to sue either: the court of the Member State of the event giving rise to the damage: where the publisher of the newspaper is established; the court of the Member State where the damage occurred: where defamatory article is distributed. However, it must be admitted that whilst infringement over the Internet has some similarity to multi-State defamation by means of newspapers, the position is not entirely analogous due to the cross-border nature of the Internet. A simple example which may appropriately illustrate its contentious nature is a defamatory statement published on a website accessible in different Member States, and available in different languages. Therefore, we need to answer the question: how these traditional jurisdictional rules apply in the case of intellectual property rights infringement over the Internet? Should these traditional jurisdictional rules be modified?
Abstract: Global approximation using metamodel for complex
mathematical function or computer model over a large variable
domain is often needed in sensibility analysis, computer simulation,
optimal control, and global design optimization of complex, multiphysics
systems. To overcome the limitations of the existing
response surface (RS), surrogate or metamodel modeling methods for
complex models over large variable domain, a new adaptive and
regressive RS modeling method using quadratic functions and local
area model improvement schemes is introduced. The method applies
an iterative and Latin hypercube sampling based RS update process,
divides the entire domain of design variables into multiple cells,
identifies rougher cells with large modeling error, and further divides
these cells along the roughest dimension direction. A small number
of additional sampling points from the original, expensive model are
added over the small and isolated rough cells to improve the RS
model locally until the model accuracy criteria are satisfied. The
method then combines local RS cells to regenerate the global RS
model with satisfactory accuracy. An effective RS cells sorting
algorithm is also introduced to improve the efficiency of model
evaluation. Benchmark tests are presented and use of the new
metamodeling method to replace complex hybrid electrical vehicle
powertrain performance model in vehicle design optimization and
optimal control are discussed.
Abstract: In the present work, Pulsed Electro Acoustic (PEA)
technique was adopted to understand the space charge dynamics in
elastomeric material. It is observed that the polarity of the applied
DC voltage voltage and its magnitude alters the space charge
dynamics in insulation structure. It is also noticed that any addition
of compound to the base material/processing technique have
characteristic variation in the space charge injection process. It could
be concluded based on the present work that the plasticizer could
inject heterocharges into the insulation medium. Also it is realized
that space charge magnitude is less with the addition of plasticizer. In
the PEA studies, it is observed that local electric field in the
insulating material can be much more than applied electric field due
to space charge formation. One of the important conclusions arrived
at based on PEA technique is that one could understand the safe
operating electric field of an insulation material and the charge trap
sites.
Abstract: In the upgrade process of enterprise information
systems, whether new systems will be success and their development
will be efficient, depends on how to deal with and utilize those legacy systems. We propose an evaluation system, which comprehensively
describes the capacity of legacy information systems in five aspects.
Then a practical legacy systems evaluation method is scripted. Base on
the evaluation result, we put forward 4 kinds of migration strategy: eliminated, maintenance, modification, encapsulating. The methods
and strategies play important roles in practice.
Abstract: In this paper presents a technique for developing the
computational efficiency in simulating double output induction
generators (DOIG) with two rotor circuits where stator transients are
to be included. Iterative decomposition is used to separate the flux–
Linkage equations into decoupled fast and slow subsystems, after
which the model order of the fast subsystems is reduced by
neglecting the heavily damped fast transients caused by the second
rotor circuit using integral manifolds theory. The two decoupled
subsystems along with the equation for the very slowly changing slip
constitute a three time-scale model for the machine which resulted in
increasing computational speed. Finally, the proposed method of
reduced order in this paper is compared with the other conventional
methods in linear and nonlinear modes and it is shown that this
method is better than the other methods regarding simulation
accuracy and speed.
Abstract: This paper addresses the problem of how one can
improve the performance of a non-optimal filter. First the theoretical question on dynamical representation for a given time correlated
random process is studied. It will be demonstrated that for a wide class of random processes, having a canonical form, there exists
a dynamical system equivalent in the sense that its output has the
same covariance function. It is shown that the dynamical approach is more effective for simulating and estimating a Markov and non-
Markovian random processes, computationally is less demanding,
especially with increasing of the dimension of simulated processes.
Numerical examples and estimation problems in low dimensional
systems are given to illustrate the advantages of the approach. A very useful application of the proposed approach is shown for the
problem of state estimation in very high dimensional systems. Here a modified filter for data assimilation in an oceanic numerical model
is presented which is proved to be very efficient due to introducing
a simple Markovian structure for the output prediction error process
and adaptive tuning some parameters of the Markov equation.
Abstract: A numerical study is made of laminar, unsteady flow
behind a rotationally oscillating circular cylinder using a recently
developed higher order compact (HOC) scheme. The stream function
vorticity formulation of Navier-Stokes (N-S) equations in cylindrical
polar coordinates are considered as the governing equations. The
temporal behaviour of vortex formation and relevant streamline
patterns of the flow are scrutinized over broad ranges of two
externally specified parameters namely dimensionless forced
oscillating frequency Sf and dimensionless peak rotation rate αm for
the Reynolds-s number Re = 200. Excellent agreements are found
both qualitatively and quantitatively with the existing experimental
and standard numerical results.
Abstract: One of the most challenges for hard surface cleaning product is to get rid of soap scum, a filmy sticky layer in the bathroom. The deposits of soap scum can be removed by using a proper surfactant solution with chelating agent. Unfortunately, the conventional chelating agent, ethylenediamine tetraacetic acid (EDTA), has low biodegradability, which can be tolerance in water resources and harmful to aquatic animal and microorganism. In this study, two biodegradable chelating agents, ethylenediamine disuccinic acid (EDDS) and glutamic acid diacetic acid (GLDA) were introduced as a replacement of EDTA. The result shows that using GLDA with amphoteric surfactant gave the highest equilibrium solubility of soap scum.
Abstract: This paper is concerned with the production of an Arabic word semantic similarity benchmark dataset. It is the first of its kind for Arabic which was particularly developed to assess the accuracy of word semantic similarity measurements. Semantic similarity is an essential component to numerous applications in fields such as natural language processing, artificial intelligence, linguistics, and psychology. Most of the reported work has been done for English. To the best of our knowledge, there is no word similarity measure developed specifically for Arabic. In this paper, an Arabic benchmark dataset of 70 word pairs is presented. New methods and best possible available techniques have been used in this study to produce the Arabic dataset. This includes selecting and creating materials, collecting human ratings from a representative sample of participants, and calculating the overall ratings. This dataset will make a substantial contribution to future work in the field of Arabic WSS and hopefully it will be considered as a reference basis from which to evaluate and compare different methodologies in the field.
Abstract: Avionics software is safe-critical embedded software
and its architecture is evolving from traditional federated architectures
to Integrated Modular Avionics (IMA) to improve resource usability.
ARINC 653 (Avionics Application Standard Software Interface) is a
software specification for space and time partitioning in Safety-critical
avionics Real-time operating systems. Arinc653 uses two-level
scheduling strategies, but current modeling tools only apply to simple
problems of Arinc653 two-level scheduling, which only contain time
property. In avionics industry, we are always manually allocating
tasks and calculating the timing table of a real-time system to ensure
it-s running as we design. In this paper we represent an automatically
generating strategy which applies to the two scheduling problems with
dependent constraints in Arinc653 partition run-time environment. It
provides the functionality of automatic generation from the task and partition models to scheduling policy through allocating the tasks to the partitions while following the constraints, and then we design a simulating mechanism to check whether our policy is schedulable or
not
Abstract: The automatic construction of large, high-resolution
image vistas (mosaics) is an active area of research in the fields of
photogrammetry [1,2], computer vision [1,4], medical image
processing [4], computer graphics [3] and biometrics [8]. Image
stitching is one of the possible options to get image mosaics. Vista
Creation in image processing is used to construct an image with a
large field of view than that could be obtained with a single
photograph. It refers to transforming and stitching multiple images
into a new aggregate image without any visible seam or distortion in
the overlapping areas. Vista creation process aligns two partial
images over each other and blends them together. Image mosaics
allow one to compensate for differences in viewing geometry. Thus
they can be used to simplify tasks by simulating the condition in
which the scene is viewed from a fixed position with single camera.
While obtaining partial images the geometric anomalies like rotation,
scaling are bound to happen. To nullify effect of rotation of partial
images on process of vista creation, we are proposing rotation
invariant vista creation algorithm in this paper. Rotation of partial
image parts in the proposed method of vista creation may introduce
some missing region in the vista. To correct this error, that is to fill
the missing region further we have used image inpainting method on
the created vista. This missing view regeneration method also
overcomes the problem of missing view [31] in vista due to cropping,
irregular boundaries of partial image parts and errors in digitization
[35]. The method of missing view regeneration generates the missing
view of vista using the information present in vista itself.
Abstract: Airbag deployment has been known to be responsible
for huge death, incidental injuries and broken bones due to low crash
severity and wrong deployment decisions. Therefore, the authorities
and industries have been looking for more innovative and intelligent
products to be realized for future enhancements in the vehicle safety
systems (VSSs). Although the VSSs technologies have advanced
considerably, they still face challenges such as how to avoid
unnecessary and untimely airbag deployments that can be hazardous
and fatal. Currently, most of the existing airbag systems deploy
without regard to occupant size and position. As such, this paper will
focus on the occupant and crash sensing performances due to frontal
collisions for the new breed of so called smart airbag systems. It
intends to provide a thorough discussion relating to the occupancy
detection, occupant size classification, occupant off-position
detection to determine safe distance zone for airbag deployment,
crash-severity analysis and airbag decision algorithms via a computer
modeling. The proposed system model consists of three main
modules namely, occupant sensing, crash severity analysis and
decision fusion. The occupant sensing system module utilizes the
weight sensor to determine occupancy, classify the occupant size,
and determine occupant off-position condition to compute safe
distance for airbag deployment. The crash severity analysis module is
used to generate relevant information pertinent to airbag deployment
decision. Outputs from these two modules are fused to the decision
module for correct and efficient airbag deployment action. Computer
modeling work is carried out using Simulink, Stateflow,
SimMechanics and Virtual Reality toolboxes.
Abstract: Riprap is mostly used to prevent erosion by flows
down the steep slopes in river engineering. A total of 53 stability tests
performed on angular riprap with a median stone size ranging from
15 to 278 mm and slope ranging from 1 to 40% are used in this study.
The existing equations for the prediction of medium size of angular
stones are checked for their accuracy using the available data.
Predictions of median size using these equations are not satisfactory
and results show deviation by more than ±20% from the observed
values. A multivariable power regression analysis is performed to
propose a new equation relating the median size with unit discharge,
bed slope, riprap thickness and coefficient of uniformity. The
proposed relationship satisfactorily predicts the median angular stone
size with ±20% error. Further, the required size of the rounded stone
is more than the angular stone for the same unit discharge and the
ratio increases with unit discharge and also with embankment slope
of the riprap.
Abstract: To improve the characterization of blood flows, we propose a method which makes it possible to use the spectral analysis
of the Doppler signals. Our calculation induces a reasonable approximation, the error made on estimated speed reflects the fact
that speed depends on the flow conditions as well as on measurement parameters like the bore and the volume flow rate. The estimate of the Doppler signal frequency enables us to determine the maximum Doppler frequencie Fd max as well as the maximum flow speed. The
results show that the difference between the estimated frequencies
( Fde ) and the Doppler frequencies ( Fd ) is small, this variation tends to zero for important θ angles and it is proportional to the diameter D. The description of the speed of friction and the
coefficient of friction justify the error rate obtained.
Abstract: From the importance of the conference and its
constructive role in the studies discussion, there must be a strong
organization that allows the exploitation of the discussions in opening
new horizons. The vast amount of information scattered across the
web, make it difficult to find experts, who can play a prominent role
in organizing conferences. In this paper we proposed a new approach
of extracting researchers- information from various Web resources
and correlating them in order to confirm their correctness. As a
validator of this approach, we propose a service that will be useful to
set up a conference. Its main objective is to find appropriate experts,
as well as the social events for a conference. For this application we
us Semantic Web technologies like RDF and ontology to represent
the confirmed information, which are linked to another ontology
(skills ontology) that are used to present and compute the expertise.
Abstract: This paper proposes different methods for estimation
of the harmonic currents of the single-phase diode bridge rectifier. Both simple and advanced methods are compared and the models are
put into a context of practical use for calculating the harmonic distortion in a typical application. Finally, the different models are
compared to measurements of a real application and convincing results are achieved.
Abstract: This study investigated possible ways to improve the
efficiency of the platinum precipitation process using ammonium
chloride by reducing the platinum content reporting to the effluent.
The ore treated consist of five platinum group metals namely,
ruthenium, rhodium, iridium, platinum, palladium and a precious
metal gold. Gold, ruthenium, rhodium and iridium were extracted
prior the platinum precipitation process. Temperature, reducing
agent, flow rate and potential difference were the variables controlled
to determine the operation conditions for optimum platinum
precipitation efficiency. Hydrogen peroxide was added as the
oxidizing agent at the temperature of 85-90oC and potential
difference of 700-850mV was the variable used to check the
oxidizing state of platinum. The platinum was further purified at
temperature between 60-65oC, potential difference above 700 mV,
ammonium chloride of 200 l, and at these conditions the platinum
content reporting to the effluent was reduced to less than 300ppm,
resulting in optimum platinum precipitation efficiency and purity of
99.9%.
Abstract: An approach is offered for more precise definition of base lines- borders in handwritten cursive text and general problems of handwritten text segmentation have also been analyzed. An offered method tries to solve problems arose in handwritten recognition with specific slant or in other words, where the letters of the words are not on the same vertical line. As an informative features, some recognition systems use ascending and descending parts of the letters, found after the word-s baseline detection. In such recognition systems, problems in baseline detection, impacts the quality of the recognition and decreases the rate of the recognition. Despite other methods, here borders are found by small pieces containing segmentation elements and defined as a set of linear functions. In this method, separate borders for top and bottom border lines are found. At the end of the paper, as a result, azerbaijani cursive handwritten texts written in Latin alphabet by different authors has been analyzed.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.