Abstract: Assessment for image quality traditionally needs its
original image as a reference. The conventional method for assessment
like Mean Square Error (MSE) or Peak Signal to Noise Ratio (PSNR)
is invalid when there is no reference. In this paper, we present a new
No-Reference (NR) assessment of image quality using blur and noise.
The recent camera applications provide high quality images by help of
digital Image Signal Processor (ISP). Since the images taken by the
high performance of digital camera have few blocking and ringing
artifacts, we only focus on the blur and noise for predicting the
objective image quality. The experimental results show that the
proposed assessment method gives high correlation with subjective
Difference Mean Opinion Score (DMOS). Furthermore, the proposed
method provides very low computational load in spatial domain and
similar extraction of characteristics to human perceptional assessment.
Abstract: In the traditional buckling analysis of rectangular
plates the classical thin plate theory is generally applied, so
neglecting the plating shear deformation. It seems quite clear that this
method is not totally appropriate for the analysis of thick plates, so
that in the following the two variable refined plate theory proposed
by Shimpi (2006), that permits to take into account the transverse
shear effects, is applied for the buckling analysis of simply supported
isotropic rectangular plates, compressed in one and two orthogonal
directions.
The relevant results are compared with the classical ones and, for
rectangular plates under uniaxial compression, a new direct
expression, similar to the classical Bryan-s formula, is proposed for
the Euler buckling stress.
As the buckling analysis is a widely diffused topic for a variety of
structures, such as ship ones, some applications for plates uniformly
compressed in one and two orthogonal directions are presented and
the relevant theoretical results are compared with those ones obtained
by a FEM analysis, carried out by ANSYS, to show the feasibility of
the presented method.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define the
Framework Interface Classes (FICs) and their possible specifications,
which helps in building reusable test cases for the implementations of
these classes. This paper introduces a novel technique called all
paths-state to generate state-based test cases to test the FICs at class
level. The technique is experimentally evaluated. The empirical
evaluation shows that all paths-state technique produces test cases
with a high degree of coverage for the specifications of the
implemented FICs comparing to test cases generated using round-trip
path and all-transition techniques.
Abstract: Spray chilling using air-mist nozzles has received
much attention in the food processing industry because of the
benefits it has shown over forced air convection. These benefits
include an increase in the heat transfer coefficient and a reduction in
the water loss by the product during cooling. However, few studies
have simulated the heat transfer and aerodynamics phenomena of the
air-mist chilling process for optimal operating conditions. The study
provides insight into the optimal conditions for spray impaction, heat
transfer efficiency and control of surface flooding. A computational
fluid dynamics model using a two-phase flow composed of water
droplets injected with air is developed to simulate the air-mist
chilling of food products. The model takes into consideration
droplet-to-surface interaction, water-film accumulation and surface
runoff. The results of this study lead to a better understanding of the
heat transfer enhancement, water conservation, and to a clear
direction for the optimal design of air-mist chilling systems that can
be used in commercial applications in the food and meat processing
industries.
Abstract: The compatibility of optical resonators with microfluidic systems may be relevant for chemical and biological applications. Here, a fluorescent-core microcavity (FCM) is investigated as a refractometric sensor for heavy oils. A high-index film of silicon quantum dots (QDs) was formed inside the capillary, supporting cylindrical fluorescence whispering gallery modes (WGMs). A set of standard refractive index oils was injected into a capillary, causing a shift of the WGM resonances toward longer wavelengths. A maximum sensitivity of 240 nm/RIU (refractive index unit) was found for a nominal oil index of 1.74. As well, a sensitivity of 22 nm/RIU was obtained for a lower index of 1.48, more typical of fuel hydrocarbons. Furthermore, the observed spectra and sensitivities were compared to theoretical predictions and reproduced via FDTD simulations, showing in general an excellent agreement. This work demonstrates the potential use of FCMs for oil sensing applications and the more generally for detecting liquid solutions with a high refractive index or high viscosity.
Abstract: Heat pipes are two-phase heat transfer devices with
high effective thermal conductivity. Due to the high heat transport
capacity, heat exchanger with heat pipes has become much smaller
than traditional heat exchangers in handling high heat fluxes. With
the working fluid in a heat pipe, heat can be absorbed on the
evaporator region and transported to the condenser region where the
vapour condenses releasing the heat to the cooling media. Heat pipe
technology has found increasing applications in enhancing the
thermal performance of heat exchangers in microelectranics, energy
saving in HVAC systems for operating rooms,surgery centers, hotels,
cleanrooms etc, temperature regulation systems for the human body
and other industrial sectors. Development activity in heat pipe and
thermosyphon technology in asia in recent years is surveyed. Some
new results obtained in Australia and other countries are also
included.
Abstract: The Far From Most Strings Problem (FFMSP) is to obtain a string which is far from as many as possible of a given set of strings. All the input and the output strings are of the same length, and two strings are said to be far if their hamming distance is greater than or equal to a given positive integer. FFMSP belongs to the class of sequences consensus problems which have applications in molecular biology. The problem is NP-hard; it does not admit a constant-ratio approximation either, unless P = NP. Therefore, in addition to exact and approximate algorithms, (meta)heuristic algorithms have been proposed for the problem in recent years. On the other hand, in the recent years, hybrid algorithms have been proposed and successfully used for many hard problems in a variety of domains. In this paper, a new metaheuristic algorithm, called Constructive Beam and Local Search (CBLS), is investigated for the problem, which is a hybridization of constructive beam search and local search algorithms. More specifically, the proposed algorithm consists of two phases, the first phase is to obtain several candidate solutions via the constructive beam search and the second phase is to apply local search to the candidate solutions obtained by the first phase. The best solution found is returned as the final solution to the problem. The proposed algorithm is also similar to memetic algorithms in the sense that both use local search to further improve individual solutions. The CBLS algorithm is compared with the most recent published algorithm for the problem, GRASP, with significantly positive results; the improvement is by order of magnitudes in most cases.
Abstract: The significance of emissions from the road transport
sector (such as air pollution, noise, etc) has grown considerably in
recent years. In Australia, 14.3% of national greenhouse gas
emissions in 2000 were the transport sector-s share which 12.9% of
net national emissions were related to a road transport alone.
Considering the growing attention to the green house gas(GHG)
emissions, this paper attempts to provide air pollution modeling
aspects of environmental consequences of the road transport by using
one of the best computer based tools including the Geographic
Information System (GIS). In other word, in this study, GIS and its
applications is explained, models which are used to model air
pollution and GHG emissions from vehicles are described and GIS is
applied in real case study that attempts to forecast GHG emission
from people who travel to work by car in 2031 in Melbourne for
analysing results as thematic maps.
Abstract: This paper discusses the investigation of a wearable
textile monopole antenna on specific absorption rate (SAR) for bodycentric
wireless communication applications at 2.45 GHz. The
antenna is characterized on a realistic 8 x 8 x 8 mm3 resolution
truncated Hugo body model in CST Microwave Studio software. The
result exhibited that the simulated SAR values were reduced
significantly by 83.5% as the position of textile monopole was
varying between 0 mm and 15 mm away from the human upper arm.
A power absorption reduction of 52.2% was also noticed as the
distance of textile monopole increased.
Abstract: As a popular rank-reduced vector space approach,
Latent Semantic Indexing (LSI) has been used in information
retrieval and other applications. In this paper, an LSI-based content
vector model for text classification is presented, which constructs
multiple augmented category LSI spaces and classifies text by their
content. The model integrates the class discriminative information
from the training data and is equipped with several pertinent feature
selection and text classification algorithms. The proposed classifier
has been applied to email classification and its experiments on a
benchmark spam testing corpus (PU1) have shown that the approach
represents a competitive alternative to other email classifiers based
on the well-known SVM and naïve Bayes algorithms.
Abstract: The interaction between wakes of bluff body and
airfoil have profound influences on system performance in many
industrial applications, e.g., turbo-machinery and cooling fan. The
present work investigates the effect of configuration include; airfoil-s
angle of attack, transverse and inline spacing of the models, on
frequency behavior of the cylinder-s near-wake. The experiments
carried on under subcritical flow regime, using the hot-wire
anemometry (HWA). The relationship between the Strouhal numbers
and arrangements provide an insight into the global physical
processes of wake interaction and vortex shedding.
Abstract: Poly-β-hydroxybutyrate (PHB) is one of the most
famous biopolymers that has various applications in production of
biodegradable carriers. The most important strategy for enhancing
efficiency in production process and reducing the price of PHB, is the
accurate expression of kinetic model of products formation and
parameters that are effective on it, such as Dry Cell Weight (DCW)
and substrate consumption. Considering the high capabilities of
artificial neural networks in modeling and simulation of non-linear
systems such as biological and chemical industries that mainly are
multivariable systems, kinetic modeling of microbial production of
PHB that is a complex and non-linear biological process, the three
layers perceptron neural network model was used in this study.
Artificial neural network educates itself and finds the hidden laws
behind the data with mapping based on experimental data, of dry cell
weight, substrate concentration as input and PHB concentration as
output. For training the network, a series of experimental data for
PHB production from Hydrogenophaga Pseudoflava by glucose
carbon source was used. After training the network, two other
experimental data sets that have not intervened in the network
education, including dry cell concentration and substrate
concentration were applied as inputs to the network, and PHB
concentration was predicted by the network. Comparison of predicted
data by network and experimental data, indicated a high precision
predicted for both fructose and whey carbon sources. Also in present
study for better understanding of the ability of neural network in
modeling of biological processes, microbial production kinetic of
PHB by Leudeking-Piret experimental equation was modeled. The
Observed result indicated an accurate prediction of PHB
concentration by artificial neural network higher than Leudeking-
Piret model.
Abstract: A simple but effective digital watermarking scheme
utilizing a context adaptive variable length coding (CAVLC) method
is presented for wireless communication system. In the proposed
approach, the watermark bits are embedded in the final non-zero
quantized coefficient of each DCT block, thereby yielding a potential
reduction in the length of the coded block. As a result, the
watermarking scheme not only provides the means to check the
authenticity and integrity of the video stream, but also improves the
compression ratio and therefore reduces both the transmission time
and the storage space requirements of the coded video sequence. The
results confirm that the proposed scheme enables the detection of
malicious tampering attacks and reduces the size of the coded H.264
file. Therefore, the current study is feasible to apply in the video
applications of wireless communication such as 3G system
Abstract: In this paper, we present a novel approach to accurately
detect text regions including shop name in signboard images with
complex background for mobile system applications. The proposed
method is based on the combination of text detection using edge
profile and region segmentation using fuzzy c-means method. In the
first step, we perform an elaborate canny edge operator to extract all
possible object edges. Then, edge profile analysis with vertical and
horizontal direction is performed on these edge pixels to detect
potential text region existing shop name in a signboard. The edge
profile and geometrical characteristics of each object contour are
carefully examined to construct candidate text regions and classify the
main text region from background. Finally, the fuzzy c-means
algorithm is performed to segment and detected binarize text region.
Experimental results show that our proposed method is robust in text
detection with respect to different character size and color and can
provide reliable text binarization result.
Abstract: Learning is the acquisition of new mental schemata, knowledge, abilities and skills which can be used to solve problems potentially more successfully. The learning process is optimum when it is assisted and personalized. Learning is not a single activity, but should involve many possible activities to make learning become meaningful. Many e-learning applications provide facilities to support teaching and learning activities. One way to identify whether the e-learning system is being used by the learners is through the number of hits that can be obtained from the e-learning system's log data. However, we cannot rely solely to the number of hits in order to determine whether learning had occurred meaningfully. This is due to the fact that meaningful learning should engage five characteristics namely active, constructive, intentional, authentic and cooperative. This paper aims to analyze the e-learning activities that is meaningful to learning. By focusing on the meaningful learning characteristics, we match it to the corresponding Moodle e-learning activities. This analysis discovers the activities that have high impact to meaningful learning, as well as activities that are less meaningful. The high impact activities is given high weights since it become important to meaningful learning, while the low impact has less weight and said to be supportive e-learning activities. The result of this analysis helps us categorize which e-learning activities that are meaningful to learning and guide us to measure the effectiveness of e-learning usage.
Abstract: This study investigated the effect of cross sectional
geometry on sediment transport rate. The processes of sediment
transport are generally associated to environmental management,
such as pollution caused by the forming of suspended sediment in the
channel network of a watershed and preserving physical habitats and
native vegetations, and engineering applications, such as the
influence of sediment transport on hydraulic structures and flood
control design. Many equations have been proposed for computing
the sediment transport, the influence of many variables on sediment
transport has been understood; however, the effect of other variables
still requires further research. For open channel flow, sediment
transport capacity is recognized to be a function of friction slope,
flow velocity, grain size, grain roughness and form roughness, the
hydraulic radius of the bed section and the type and quantity of
vegetation cover. The effect of cross sectional geometry of the
channel on sediment transport is one of the variables that need
additional investigation. The width-depth ratio (W/d) is a
comparative indicator of the channel shape. The width is the total
distance across the channel and the depth is the mean depth of the
channel. The mean depth is best calculated as total cross-sectional
area divided by the top width. Channels with high W/d ratios tend to
be shallow and wide, while channels with low (W/d) ratios tend to be
narrow and deep. In this study, the effects of the width-depth ratio on
sediment transport was demonstrated theoretically by inserting the
shape factor in sediment continuity equation and analytically by
utilizing the field data sets for Yalobusha River. It was found by
utilizing the two approaches as a width-depth ratio increases the
sediment transport decreases.
Abstract: Numerical design optimization is a powerful tool that
can be used by engineers during any stage of the design process.
There are many different applications for structural optimization. A
specific application that will be discussed in the following paper is
experimental data matching. Data obtained through tests on a physical
structure will be matched with data from a numerical model of that
same structure. The data of interest will be the dynamic characteristics
of an antenna structure focusing on the mode shapes and modal
frequencies. The structure used was a scaled and simplified model of
the Karoo Array Telescope-7 (KAT-7) antenna structure.
This kind of data matching is a complex and difficult task. This
paper discusses how optimization can assist an engineer during the
process of correlating a finite element model with vibration test data.
Abstract: Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of employing Neural Networks for identification of Cipher Systems from cipher texts. Cascade Correlation Neural Network and Back Propagation Network have been employed for identification of Cipher Systems. Very large collection of cipher texts were generated using a Block Cipher (Enhanced RC6) and a Stream Cipher (SEAL). Promising results were obtained in terms of accuracy using both the Neural Network models but it was observed that the Cascade Correlation Neural Network Model performed better compared to Back Propagation Network.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.