Abstract: Intelligent Video-Surveillance (IVS) systems are
being more and more popular in security applications. The analysis
and recognition of abnormal behaviours in a video sequence has
gradually drawn the attention in the field of IVS, since it allows
filtering out a large number of useless information, which guarantees
the high efficiency in the security protection, and save a lot of human
and material resources. We present in this paper ADABeV, an
intelligent video-surveillance framework for event recognition in
crowded scene to detect the abnormal human behaviour. This
framework is attended to be able to achieve real-time alarming,
reducing the lags in traditional monitoring systems. This architecture
proposal addresses four main challenges: behaviour understanding in
crowded scenes, hard lighting conditions, multiple input kinds of
sensors and contextual-based adaptability to recognize the active
context of the scene.
Abstract: Sustainable development is one of the most debated
issues, recently. In terms of providing more livable Earth continuity,
while Production activities are going on, on the other hand protecting
the environment has importance. As a strategy for sustainable
development, eco-innovation is the application of innovations to
reduce environmental burdens. Endeavors to understand ecoinnovation
processes have been affected from environmental
economics and innovation economics from neoclassical economics,
and evolutionary economics other than neoclassical economics. In
the light of case study analyses, this study aims to display activities
in this field through case studies after explaining the theoretical
framework of eco-innovations. This study consists of five sections
including introduction and conclusion. In the second part of the study
identifications of the concepts related with eco-innovation are
described and eco-innovations are classified. Third section considers
neoclassical and evolutionary approaches from neoclassical
economics and evolutionary economics, respectively. Fourth section
gives the case studies of successful eco-innovations. Last section is
the conclusion part and offers suggestions for future eco-innovation
research according to the theoretical framework and the case studies.
Abstract: Earth reinforcing techniques have become useful and economical to solve problems related to difficult grounds and provide satisfactory foundation performance. In this context, this paper uses radial basis function neural network (RBFNN) for predicting the bearing pressure of strip footing on reinforced granular bed overlying weak soil. The inputs for the neural network models included plate width, thickness of granular bed and number of layers of reinforcements, settlement ratio, water content, dry density, cohesion and angle of friction. The results indicated that RBFNN model exhibited more than 84 % prediction accuracy, thereby demonstrating its application in a geotechnical problem.
Abstract: Green propellants used for satellite-level propulsion
system become attractive in recent years because the non-toxicity and
lower requirements of safety protection. One of the green propellants,
high-concentration hydrogen peroxide H2O2 solution (≥70% w/w,
weight concentration percentage), often known as high-test peroxide
(HTP), is considered because it is ITAR-free, easy to manufacture and
the operating temperature is lower than traditional monopropellant
propulsion. To establish satellite propulsion technology, the National
Space Organization (NSPO) in Taiwan has initialized a long-term
cooperation project with the National Cheng Kung University to
develop compatible tank and thruster. An experimental propulsion
payload has been allocated for the future self-reliant satellite to
perform orbit transfer and maintenance operations. In the present
research, an 1-Newton thruster prototype is designed and the thrusting
force is measured by a pendulum-type platform. The preliminary
hot-firing test at ambient environment showed the generated thrust and
the specific impulse are about 0.7 Newton and 102 seconds,
respectively.
Abstract: In this paper, we evaluate the performance of some wavelet based coding algorithms such as 3D QT-L, 3D SPIHT and JPEG2K. In the first step we achieve an objective comparison between three coders, namely 3D SPIHT, 3D QT-L and JPEG2K. For this purpose, eight MRI head scan test sets of 256 x 256x124 voxels have been used. Results show superior performance of 3D SPIHT algorithm, whereas 3D QT-L outperforms JPEG2K. The second step consists of evaluating the robustness of 3D SPIHT and JPEG2K coding algorithm over wireless transmission. Compressed dataset images are then transmitted over AWGN wireless channel or over Rayleigh wireless channel. Results show the superiority of JPEG2K over these two models. In fact, it has been deduced that JPEG2K is more robust regarding coding errors. Thus we may conclude the necessity of using corrector codes in order to protect the transmitted medical information.
Abstract: Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples- personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can arise through undisciplined use and/or misuse of social media. We specifically address identity theft, misrepresentation of information posted, cyber bullying, children and social networking, and social networking in the work place. Recommendations are provided for how to reduce the risk of being the victim of a crime or engaging in embarrassing behavior that could irrevocably harm one-s reputation either professionally or personally. We also discuss what responsibilities social networking companies have to protect their users and also what law enforcement and policy makers can do to help alleviate the problems.
Abstract: The motorway segment between Tangier and Oued
R’mel has experienced, since the beginning of building works,
significant instability and landslides linked to a number of geological,
hydrogeological and geothermic factors affecting the different
formations.
The landslides observed are not fully understood, despite many
studies conducted on this segment. This study aims at producing new
methods to better explain the phenomena behind the landslides,
taking into account the geotechnical and geothermic contexts. This
analysis builds up on previous studies and geotechnical data collected
in the field.
The final body of data collected shall be processed through the
Plaxis software for a better and customizable view of the landslide
problems in the area, which will help tofind solutions and stabilize
land in the area.
Abstract: This paper contributes to the field of Environmental
Awareness Training (EAT) evaluation in terms of military activities.
Environmental management of military activities is a growing concern
for defence forces worldwide and the importance of EAT is becoming
widely recognized. As one of Australia-s largest landowners, the
Australian Defence Force (ADF) is extremely mindful of its duty as a
joint environmental manager. It has an integrated Environmental
Management System (EMS) to assist environmental management and
EAT is an essential part of the ADF EMS model. This paper examines
how EAT was conducted during the exercise Talisman Saber in 2009
(TS09) and evaluates its effectiveness, using Shoalwater Bay Training
Area (SWBTA), one of the most significant military training areas and
a significant protected area in Australia, as a case study. A
questionnaire survey conducted showed, overall, that EAT was
effective from the perspective of a sample of participants.
Recommendations are made for the ADF to refine EAT for future
exercises.
Abstract: As the development of digital technology is increasing,
Digital cinema is getting more spread.
However, content copy and attack against the digital cinema becomes
a serious problem. To solve the above security problem, we propose
“Additional Watermarking" for digital cinema delivery system. With
this proposed “Additional watermarking" method, we protect content
copyrights at encoder and user side information at decoder. It realizes
the traceability of the watermark embedded at encoder.
The watermark is embedded into the random-selected frames using
Hash function. Using it, the embedding position is distributed by Hash
Function so that third parties do not break off the watermarking
algorithm.
Finally, our experimental results show that proposed method is much
better than the convenient watermarking techniques in terms of
robustness, image quality and its simple but unbreakable algorithm.
Abstract: This paper highlights the importance of integrating social and technical approach (which is so called a “hybrid socio-technical approach") as one innovative and strategic program to support the social development in geodisaster prone area in Indonesia. Such program mainly based on public education and community participation as a partnership program by the University, local government and may also with the private company and/ or local NGO. The indigenous, simple and low cost technology has also been introduced and developed as a part of the hybrid sociotechnical system, in order to ensure the life and environmental protection, with respect to the sustainable human and social development.
Abstract: In nature, electromagnetic fields always appear like
atmosphere static electric field, the earth's static magnetic field and
the wide-rang frequency electromagnetic field caused by lightening.
However, besides natural electromagnetic fields (EMF), today human
beings are mostly exposed to artificial electromagnetic fields due to
technology progress and outspread use of electrical devices. To
evaluate nuisance of EMF, it is necessary to know field intensity for
every frequency which appears and compare it with allowed values.
Low frequency EMF-s around transmission and distribution lines are
time-varying quasi-static electromagnetic fields which have
conservative component of low frequency electrical field caused by
charges and eddy component of low frequency magnetic field caused
by currents. Displacement current or field delay are negligible, so
energy flow in quasi-static EMF involves diffusion, analog like heat
transfer. Electrical and magnetic field can be analyzed separately.
This paper analysis the numerical calculations in ELF-400 software
of EMF in distribution substation in shopping center. Analyzing the
results it is possible to specify locations exposed to the fields and
give useful suggestion to eliminate electromagnetic effect or reduce it
on acceptable level within the non-ionizing radiation norms and
norms of protection from EMF.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: In order to upgrade the seismic resistibility of structures and enhance the functionality of an isolator, a new base isolator called the multiple trench friction pendulum system (MTFPS) is proposed in this study. The proposed MTFPS isolator is composed of a trench concave surface and several intermediate sliding plates in two orthogonal directions. Mathematical formulations have been derived to examine the characteristics of the proposed MTFPS isolator possessing multiple intermediate sliding plates. By means of mathematical formulations, it can be inferred that the natural period and damping effect of the MTFPS isolator with several intermediate sliding plates can be altered continually and controllably during earthquakes. Furthermore, results obtained from shaking table tests demonstrate that the proposed isolator provides good protection to structures for prevention of damage from strong earthquakes.
Abstract: Internal controls of accounting are an essential
business function for a growth-oriented organization, and include the
elements of risk assessment, information communications and even
employees' roles and responsibilities. Internal controls of accounting
systems are designed to protect a company from fraud, abuse and
inaccurate data recording and help organizations keep track of
essential financial activities. Internal controls of accounting provide a
streamlined solution for organizing all accounting procedures and
ensuring that the accounting cycle is completed consistently and
successfully. Implementing a formal Accounting Procedures Manual
for the organization allows the financial department to facilitate
several processes and maintain rigorous standards. Internal controls
also allow organizations to keep detailed records, manage and
organize important financial transactions and set a high standard for
the organization's financial management structure and protocols. A
well-implemented system also reduces the risk of accounting errors
and abuse. A well-implemented controls system allows a company's
financial managers to regulate and streamline all functions of the
accounting department. Internal controls of accounting can be set up
for every area to track deposits, monitor check handling, keep track
of creditor accounts, and even assess budgets and financial statements
on an ongoing basis. Setting up an effective accounting system to
monitor accounting reports, analyze records and protect sensitive
financial information also can help a company set clear goals and
make accurate projections. Creating efficient accounting processes
allows an organization to set specific policies and protocols on
accounting procedures, and reach its financial objectives on a regular
basis. Internal accounting controls can help keep track of such areas
as cash-receipt recording, payroll management, appropriate recording
of grants and gifts, cash disbursements by authorized personnel, and
the recording of assets. These systems also can take into account any
government regulations and requirements for financial reporting.
Abstract: Article presents the geometry and structure
reconstruction procedure of the aircraft model for flatter research
(based on the I22-IRYDA aircraft). For reconstruction the Reverse
Engineering techniques and advanced surface modeling CAD tools
are used. Authors discuss all stages of data acquisition process,
computation and analysis of measured data. For acquisition the three
dimensional structured light scanner was used. In the further sections,
details of reconstruction process are present. Geometry
reconstruction procedure transform measured input data (points
cloud) into the three dimensional parametric computer model
(NURBS solid model) which is compatible with CAD systems.
Parallel to the geometry of the aircraft, the internal structure
(structural model) are extracted and modeled. In last chapter the
evaluation of obtained models are discussed.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: Users of computer systems may often require the
private transfer of messages/communications between parties across
a network. Information warfare and the protection and dominance of
information in the military context is a prime example of an
application area in which the confidentiality of data needs to be
maintained. The safe transportation of critical data is therefore often
a vital requirement for many private communications. However,
unwanted interception/sniffing of communications is also a
possibility. An elementary stealthy transfer scheme is therefore
proposed by the authors. This scheme makes use of encoding,
splitting of a message and the use of a hashing algorithm to verify the
correctness of the reconstructed message. For this proof-of-concept
purpose, the authors have experimented with the random sending of
encoded parts of a message and the construction thereof to
demonstrate how data can stealthily be transferred across a network
so as to prevent the obvious retrieval of data.
Abstract: The scope of this paper is to describe a real electrical
installation of renewable energy using photovoltaic cells. The
displayed power grid connected network was established in 2007 at
area of Northern Greece. The photovoltaic park is composed of 6120
photovoltaic cells able to deliver a total power of 1.101.600 Wp. For
the transformation of DC voltage to AC voltage have been used 25
stand alone three phases inverters and for the connection at the
medium voltage network of Greek Power Authority have been
installed two oil immersed transformer of 630 kVA each one. Due to
the wide space area of installation a specific external lightning
protection system has been designed. Additionally, due to the
sensitive electronics of the control and protection systems of park,
surge protection, equipotent bonding and shielding were also of
major importance.
Abstract: Main goal of preventive healthcare problems are at
decreasing the likelihood and severity of potentially life-threatening
illnesses by protection and early detection. The levels of
establishment and staffing costs along with summation of the travel
and waiting time that clients spent are considered as objectives
functions of the proposed nonlinear integer programming model. In
this paper, we have proposed a bi-objective mathematical model for
designing a network of preventive healthcare facilities so as to
minimize aforementioned objectives, simultaneously. Moreover, each
facility acts as M/M/1 queuing system. The number of facilities to be
established, the location of each facility, and the level of technology
for each facility to be chosen are provided as the main determinants
of a healthcare facility network. Finally, to demonstrate performance
of the proposed model, four multi-objective decision making
techniques are presented to solve the model.