Abstract: The tree structured approach of non-uniform filterbank
(NUFB) is normally used in perfect reconstruction (PR). The PR is
not always feasible due to certain limitations, i.e, constraints in
selecting design parameters, design complexity and some times
output is severely affected by aliasing error if necessary and
sufficient conditions of PR is not satisfied perfectly. Therefore, there
has been generalized interest of researchers to go for near perfect
reconstruction (NPR). In this proposed work, an optimized tree
structure technique is used for the design of NPR non-uniform
filterbank. Window functions of Blackman family are used to design
the prototype FIR filter. A single variable linear optimization is used
to minimize the amplitude distortion. The main feature of the
proposed design is its simplicity with linear phase property.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: Reentry trajectory optimization is a multi-constraints
optimal control problem which is hard to solve. To tackle it, we
proposed a new algorithm named CDEN(Constrained Differential
Evolution Newton-Raphson Algorithm) based on Differential Evolution(
DE) and Newton-Raphson.We transform the infinite dimensional
optimal control problem to parameter optimization which is finite
dimensional by discretize control parameter. In order to simplify
the problem, we figure out the control parameter-s scope by process
constraints. To handle constraints, we proposed a parameterless constraints
handle process. Through comprehensive analyze the problem,
we use a new algorithm integrated by DE and Newton-Raphson to
solve it. It is validated by a reentry vehicle X-33, simulation results
indicated that the algorithm is effective and robust.
Abstract: The evolution in project management was triggered by
the changes in management philosophy and practices in order to
maintain competitive advantage and continuous success in the field.
The purpose of this paper is to highlight the practicality of cognitive
style and unlearning approach in influencing the achievement of
project success by project managers. It introduces the concept of
planning, knowing and creating style from cognitive style field in the
light of achieving time, cost, quality and stakeholders appreciation in
project success context. Further it takes up a discussion of the
unlearning approach as a moderator in enhancing the relationship
between cognitive style and project success. The paper bases itself on
literature review from established disciplines like psychology,
sociology and philosophy regarding cognitive style, unlearning and
project success in general. The analysis and synthesis of literature in
the subject area a conceptual paper is utilized as the basis of future
research to form a comprehensive framework for project managers in
enhancing the project management competency.
Abstract: Estimation of stormwater pollutants is a pre-requisite
for the protection and improvement of the aquatic environment and
for appropriate management options. The usual practice for the
stormwater quality prediction is performed through water quality
modeling. However, the accuracy of the prediction by the models
depends on the proper estimation of model parameters. This paper
presents the estimation of model parameters for a catchment water
quality model developed for the continuous simulation of stormwater
pollutants from a catchment to the catchment outlet. The model is
capable of simulating the accumulation and transportation of the
stormwater pollutants; suspended solids (SS), total nitrogen (TN) and
total phosphorus (TP) from a particular catchment. Rainfall and water
quality data were collected for the Hotham Creek Catchment (HTCC),
Gold Coast, Australia. Runoff calculations from the developed model
were compared with the calculated discharges from the widely used
hydrological models, WBNM and DRAINS. Based on the measured
water quality data, model water quality parameters were calibrated
for the above-mentioned catchment. The calibrated parameters are
expected to be helpful for the best management practices (BMPs)
of the region. Sensitivity analyses of the estimated parameters were
performed to assess the impacts of the model parameters on overall
model estimations of runoff water quality.
Abstract: This paper presents an application of power line
carrier (PLC) for electrical power telemetering. This system has a
special capability of transmitting the measured values to a centralized
computer via power lines. The PLC modem as a passive high-pass
filter is designed for transmitting and receiving information. Its
function is to send the information carrier together with transmitted
data by superimposing it on the 50 Hz power frequency signal. A
microcontroller is employed to function as the main processing of the
modem. It is programmed for PLC control and interfacing with other
devices. Each power meter, connected via a PLC modem, is assigned
with a unique identification number (address) for distinguishing each
device from one another.
Abstract: This paper proposes a novel architecture for At-
Home medical care which enables senior citizens, patients
with chronic ailments and patients requiring post- operative
care to be remotely monitored in the comfort of their homes.
This architecture is implemented using sensors and wireless
networking for transmitting patient data to the hospitals,
health- care centers for monitoring by medical professionals.
Patients are equipped with sensors to measure their
physiological parameters, like blood pressure, pulse rate etc.
and a Wearable Data Acquisition Unit is used to transmit the
patient sensor data. Medical professionals can be alerted to
any abnormal variations in these values for diagnosis and
suitable treatment. Security threats and challenges inherent to
wireless communication and sensor network have been
discussed and a security mechanism to ensure data
confidentiality and source authentication has been proposed.
Symmetric key algorithm AES has been used for encrypting
the data and a patent-free, two-pass block cipher mode CCFB
has been used for implementing semantic security.
Abstract: This research is intended to develop a raw material allocation model in timber processing industry in Perum Perhutani Unit I, Central Java, Indonesia. The model can be used to determine the quantity of allocation of timber between chain in the supply chain to select supplier considering factors that are log price and the distance. In determining the quantity of allocation of timber between chains in the supply chain, the model considers the optimal inventory in each chain. Whilst the optimal inventory is determined based on demand forecast, the capacity and safety stock. Problem solving allocation is conducted by developing linear programming model that aims to minimize the total cost of the purchase, transportation cost and storage costs at each chain. The results of numerical examples show that the proposed model can generate savings of the purchase cost of 20.84% and select suppliers with mileage closer.
Abstract: The present paper reports results of an experimental
program conducted to study performance of fly ash based
geopolymer pastes at elevated temperature. Three series of
geopolymer pastes differing in Na2O content (8.5%, 10% and 11.5%)
were manufactured by activating low calcium fly ash with a mixture
of sodium hydroxide and sodium silicate solution. The paste
specimens were subjected to temperatures as high as 900oC and the
behaviour at elevated temperatures were investigated on the basis of
physical appearance, weight losses, residual strength, shrinkage
measurements and sorptivity tests at different temperatures. Scanning
electron microscopy along with EDX and XRD tests were also
conducted to examine microstructure and mineralogical changes
during the thermal exposure. Specimens which were initially grey
turned reddish accompanied by appearance of small cracks as the
temperature increased to 900oC. Loss of weight was more in
specimens manufactured with highest Na2O content. Geopolymer
paste specimen containing minimum Na2O performed better than
those with higher Na2O content in terms of residual compressive
strength.
Abstract: Although achieving zero-defect software release is
practically impossible, software industries should take maximum
care to detect defects/bugs well ahead in time allowing only bare
minimums to creep into released version. This is a clear indicator of
time playing an important role in the bug detection. In addition to
this, software quality is the major factor in software engineering
process. Moreover, early detection can be achieved only through
static code analysis as opposed to conventional testing.
BugCatcher.Net is a static analysis tool, which detects bugs in .NET®
languages through MSIL (Microsoft Intermediate Language)
inspection. The tool utilizes a Parser based on Finite State Automata
to carry out bug detection. After being detected, bugs need to be
corrected immediately. BugCatcher.Net facilitates correction, by
proposing a corrective solution for reported warnings/bugs to end
users with minimum side effects. Moreover, the tool is also capable
of analyzing the bug trend of a program under inspection.
Abstract: Designing modern machine tools is a complex task. A
simulation tool to aid the design work, a virtual machine, has
therefore been developed in earlier work. The virtual machine
considers the interaction between the mechanics of the machine
(including structural flexibility) and the control system. This paper
exemplifies the usefulness of the virtual machine as a tool for product
development. An optimisation study is conducted aiming at
improving the existing design of a machine tool regarding weight and
manufacturing accuracy at maintained manufacturing speed. The
problem can be categorised as constrained multidisciplinary multiobjective
multivariable optimisation. Parameters of the control and
geometric quantities of the machine are used as design variables. This
results in a mix of continuous and discrete variables and an
optimisation approach using a genetic algorithm is therefore
deployed. The accuracy objective is evaluated according to
international standards. The complete systems model shows nondeterministic
behaviour. A strategy to handle this based on statistical
analysis is suggested. The weight of the main moving parts is reduced
by more than 30 per cent and the manufacturing accuracy is
improvement by more than 60 per cent compared to the original
design, with no reduction in manufacturing speed. It is also shown
that interaction effects exist between the mechanics and the control,
i.e. this improvement would most likely not been possible with a
conventional sequential design approach within the same time, cost
and general resource frame. This indicates the potential of the virtual
machine concept for contributing to improved efficiency of both
complex products and the development process for such products.
Companies incorporating such advanced simulation tools in their
product development could thus improve its own competitiveness as
well as contribute to improved resource efficiency of society at large.
Abstract: The present work presents the extraction of copper(II)
from sulphuric acid solutions with Sodium diethyldithiocarbamate
(SDDT), and six different organic diluents: Dichloromethane,
Chloroform, Carbon tetrachloride, Toluene, xylene and Cyclohexane,
were tested. The pair SDDT/Chloroform showed to be the most
selective in removing the copper cations, and hence was considered
throughout the experimental study.
The effects of operating parameters such as the initial concentration
of the extracting agent, the agitation time, the agitation speed and the
acid concentration were considered.
For an initial concentration of Cu (II) of 63 ppm in a 0.5 M sulphuric
acid solution, both with a mass of the extracting agent of 20 mg, an
extraction percentage of about 97.8 % and a distribution coefficient
of 44.42 were obtained, respectively, confirming the performance
of the SDDT-Chloroform pair.
Abstract: The hydro-mechanical model for unsaturated soils has
been presented based on the effective stress principle taking into
account effects of drying-wetting process. The elasto-plastic
constitutive equations for stress-strain relations of the soil skeleton
have been established. A plasticity model is modified from modified
Cam-Clay model. The hardening rule has been established by
considering the isotropic consolidation paths. The effect of dryingwetting
process is introduced through the ¤ç parameter. All model
coefficients are identified in terms of measurable parameters. The
simulations from the proposed model are compared with the
experimental results. The model calibration was performed to extract
the model parameter from the experimental results. Good agreement
between the results predicted using proposed model and the
experimental results was obtained.
Abstract: Unlike general-purpose processors, digital signal
processors (DSP processors) are strongly application-dependent. To
meet the needs for diverse applications, a wide variety of DSP
processors based on different architectures ranging from the
traditional to VLIW have been introduced to the market over the
years. The functionality, performance, and cost of these processors
vary over a wide range. In order to select a processor that meets the
design criteria for an application, processor performance is usually
the major concern for digital signal processing (DSP) application
developers. Performance data are also essential for the designers of
DSP processors to improve their design. Consequently, several DSP
performance benchmarks have been proposed over the past decade or
so. However, none of these benchmarks seem to have included recent
new DSP applications.
In this paper, we use a new benchmark that we recently developed
to compare the performance of popular DSP processors from Texas
Instruments and StarCore. The new benchmark is based on the
Selectable Mode Vocoder (SMV), a speech-coding program from the
recent third generation (3G) wireless voice applications. All
benchmark kernels are compiled by the compilers of the respective
DSP processors and run on their simulators. Weighted arithmetic
mean of clock cycles and arithmetic mean of code size are used to
compare the performance of five DSP processors.
In addition, we studied how the performance of a processor is
affected by code structure, features of processor architecture and
optimization of compiler. The extensive experimental data gathered,
analyzed, and presented in this paper should be helpful for DSP
processor and compiler designers to meet their specific design goals.
Abstract: Based on the standard finite element method, a new
finite element method which is known as nonlocal finite element
method (NL-FEM) is numerically implemented in this article to
study the nonlocal effects for solving 1D nonlocal elastic problem.
An Eringen-type nonlocal elastic model is considered. In this model,
the constitutive stress-strain law is expressed interms of integral
equation which governs the nonlocal material behavior. The new
NL-FEM is adopted in such a way that the postulated nonlocal elastic
behavior of material is captured by a finite element endowed with a
set of (cross-stiffness) element itself by the other elements in mesh.
An example with their analytical solutions and the relevant numerical
findings for various load and boundary conditions are presented and
discussed in details. It is observed from the numerical solutions that
the torsional deformation angle decreases with increasing nonlocal
nanoscale parameter. It is also noted that the analytical solution fails
to capture the nonlocal effect in some cases where numerical
solutions handle those situation effectively which prove the
reliability and effectiveness of numerical techniques.
Abstract: In the present paper, we-ll explore how social media tools provide an opportunity for new developments of the e-Learning in the context of managing personal knowledge. There will be a discussion how social media tools provide a possibility for helping knowledge workersand students to gather, organize and manage their personal information as a part of the e-learning process. At the centre of this social software driven approach to e-learning environments are the challenges of personalization and collaboration. We-ll share concepts of how organizations are using social media for e-Learning and believe that integration of these tools into traditional e-Learning is probably not a choice, but inevitability. Students- Survey of use of web technologies and social networking tools is presented. Newly developed framework for semantic blogging capable of organizing results relevant to user requirements is implemented at Varna Free University (VFU) to provide more effective navigation and search.
Abstract: Calcium is very important for communication among
the neurons. It is vital in a number of cell processes such as secretion,
cell movement, cell differentiation. To reduce the system of reactiondiffusion
equations of [Ca2+] into a single equation, two theories
have been proposed one is excess buffer approximation (EBA) other
is rapid buffer approximation (RBA). The RBA is more realistic than
the EBA as it considers both the mobile and stationary endogenous
buffers. It is valid near the mouth of the channel. In this work we have
studied the effects of different types of buffers on calcium diffusion
under RBA. The novel thing studied is the effect of sodium ions on
calcium diffusion. The model has been made realistic by considering
factors such as variable [Ca2+], [Na+] sources, sodium-calcium
exchange protein(NCX), Sarcolemmal Calcium ATPase pump. The
proposed mathematical leads to a system of partial differential equations
which has been solved numerically to study the relationships
between different parameters such as buffer concentration, buffer
disassociation rate, calcium permeability. We have used Forward
Time Centred Space (FTCS) approach to solve the system of partial
differential equations.
Abstract: Security is an interesting and significance issue for
popular virtual platforms, such as virtualization cluster and cloud
platforms. Virtualization is the powerful technology for cloud
computing services, there are a lot of benefits by using virtual machine
tools which be called hypervisors, such as it can quickly deploy all
kinds of virtual Operating Systems in single platform, able to control
all virtual system resources effectively, cost down for system platform
deployment, ability of customization, high elasticity and high
reliability. However, some important security problems need to take
care and resolved in virtual platforms that include terrible viruses, evil
programs, illegal operations and intrusion behavior. In this paper, we
present useful Intrusion Detection Mechanism (IDM) software that not
only can auto to analyze all system-s operations with the accounting
journal database, but also is able to monitor the system-s state for
virtual platforms.
Abstract: The objective of this work was to examine the changes
in non destructive properties caused by carbonation of CEM II
mortar. Samples of CEM II mortar were prepared and subjected to
accelerated carbonation at 20°C, 65% relative humidity and 20% CO2
concentration. We examined the evolutions of the gas permeability,
the thermal conductivity, the thermal diffusivity, the volume of the
solid phase by helium pycnometry, the longitudinal and transverse
ultrasonic velocities. The principal contribution of this work is that,
apart of the gas permeability, changes in other non destructive
properties have never been studied during the carbonation of cement
materials. These properties are important in predicting/measuring the
durability of reinforced concrete in CO2 environment. The
carbonation depth and the porosity accessible to water were also
reported in order to explain comprehensively the changes in non
destructive parameters.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.