Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: This paper studies the design of a simple constellation
precoding for a multiple-input multiple-output orthogonal frequency
division multiplexing (MIMO-OFDM) system over Rayleigh fading
channels where OFDM is used to keep the diversity replicas orthogonal
and reduce ISI effects. A multi-user environment with K synchronous
co-channel users is considered. The proposed scheme provides
a bandwidth efficient transmission for individual users by increasing
the system throughput. In comparison with the existing coded
MIMO-OFDM schemes, the precoding technique is designed under
the consideration of its low implementation complexity while providing
a comparable error performance to the existing schemes.
Analytic and simulation results have been presented to show the distinguished
error performance.
Abstract: This interdisciplinary study is an investigation to evaluate user-interfaces in business administration. The study is going to be implemented on two computerized business administration systems with two distinctive user-interfaces, so that differences between the two systems can be determined. Both systems, a commercial and a prototype developed for the purpose of this study, deal with ordering of supplies, tendering procedures, issuing purchase orders, controlling the movement of the stocks against their actual balances on the shelves and editing them on their tabulations. In the second suggested system, modern computer graphics and multimedia issues were taken into consideration to cover the drawbacks of the first system. To highlight differences between the two investigated systems regarding some chosen standard quality criteria, the study employs various statistical techniques and methods to evaluate the users- interaction with both systems. The study variables are divided into two divisions: independent representing the interfaces of the two systems, and dependent embracing efficiency, effectiveness, satisfaction, error rate etc.
Abstract: Modernizing legacy applications is the key issue facing IT managers today because there's enormous pressure on organizations to change the way they run their business to meet the new requirements. The importance of software maintenance and reengineering is forever increasing. Understanding the architecture of existing legacy applications is the most critical issue for maintenance and reengineering. The artifacts recovery can be facilitated with different recovery approaches, methods and tools. The existing methods provide static and dynamic set of techniques for extracting architectural information, but are not suitable for all users in different domains. This paper presents a simple and lightweight pattern extraction technique to extract different artifacts from legacy systems using regular expression pattern specifications with multiple language support. We used our custom-built tool DRT to recover artifacts from existing system at different levels of abstractions. In order to evaluate our approach a case study is conducted.
Abstract: The implementations of green roof have been widely
used in the developed countries such as Germany, United Kingdom,
United States and Canada. Green roof have many benefits such as
aesthetic and economic value, ecological gain which are optimization
of storm water management, urban heat island mitigation and energy
conservation. In term of pollution, green roof can control the air and
noise pollution in urban cities. The application of green roof in
Malaysian building has been studied with the previous work of green
roof either in Malaysia or other Asian region as like Indonesia,
Singapore, Thailand, Taiwan and several other countries that have
similar climate and environment as in Malaysia. These technologies
of adapting green roof have been compared to the Green Building
Index (GBI) of Malaysian buildings. The study has concentrated on
the technical aspect of green roof system having focused on i) waste
& recyclable materials ii) types of plants and method of planting and
iii) green roof as tool to reduce storm water runoff. The finding of
these areas will be compared to the suitability in achieving good
practice of the GBI in Malaysia. Results show that most of the
method are based on the countries own climate and environment.
This suggests that the method of using green roof must adhere to the
tropical climate of Malaysia. Suggestion of this research will be
viewed in term of the sustainability of the green roof. Further
research can be developed to implement the best method and
application in Malaysian climate especially in urban cities and
township.
Abstract: An experiment was performed with a 24.5 MeV 14N
beam on a 12C target in the cyclotron DC-60 located in Astana,
Kazakhstan, to study the elastic scattering of 14N on 12C; the
scattering was also analyzed at different energies for tracking the
phenomenon of remarkable structure at large angles. Its aims were to
extend the measurements to very large angles, and attempt to
uniquely identify the elastic scattering potential. Good agreement
between the theoretical and experimental data has been obtained with
suitable optical potential parameters. Optical model calculations with
l -dependent imaginary potentials were also applied to the data and
relatively good agreement was found.
Abstract: Software crisis refers to the situation in which the developers are not able to complete the projects within time and budget constraints and moreover these overscheduled and over budget projects are of low quality as well. Several methodologies have been adopted form time to time to overcome this situation and now in the focus is component based software engineering. In this approach, emphasis is on reuse of already existing software artifacts. But the results can not be achieved just by preaching the principles; they need to be practiced as well. This paper highlights some of the very basic elements of this approach, which has to be in place to get the desired goals of high quality, low cost with shorter time-to-market software products.
Abstract: This research investigates the design of a low-cost 3D
spatial interaction approach using the Wii Remote for immersive
Head-Mounted Display (HMD) virtual reality. Current virtual reality
applications that incorporate the Wii Remote are either desktop
virtual reality applications or systems that use large screen displays.
However, the requirements for an HMD virtual reality system differ
from such systems. This is mainly because in HMD virtual reality,
the display screen does not remain at a fixed location. The user views
the virtual environment through display screens that are in front of
the user-s eyes and when the user moves his/her head, these screens
move as well. This means that the display has to be updated in realtime
based on where the user is currently looking. Normal usage of
the Wii Remote requires the controller to be pointed in a certain
direction, typically towards the display. This is too restrictive for
HMD virtual reality systems that ideally require the user to be able to
turn around in the virtual environment. Previous work proposed a
design to achieve this, however it suffered from a number of
drawbacks. The aim of this study is to look into a suitable method of
using the Wii Remote for 3D interaction in a space around the user
for HMD virtual reality. This paper presents an overview of issues
that had to be considered, the system design as well as experimental
results.
Abstract: Concatenative speech synthesis is a method that can
make speech sound which has naturalness and high-individuality of a
speaker by introducing a large speech corpus. Based on this method, in
this paper, we propose a voice conversion method whose conversion
speech has high-individuality and naturalness. The authors also have
two subjective evaluation experiments for evaluating individuality and
sound quality of conversion speech. From the results, following three
facts have be confirmed: (a) the proposal method can convert the
individuality of speakers well, (b) employing the framework of unit
selection (especially join cost) of concatenative speech synthesis into
conventional voice conversion improves the sound quality of
conversion speech, and (c) the proposal method is robust against the
difference of genders between a source speaker and a target speaker.
Abstract: The Tropical Data Hub (TDH) is a virtual research environment that provides researchers with an e-research infrastructure to congregate significant tropical data sets for data reuse, integration, searching, and correlation. However, researchers often require data and metadata synthesis across disciplines for crossdomain analyses and knowledge discovery. A triplestore offers a semantic layer to achieve a more intelligent method of search to support the synthesis requirements by automating latent linkages in the data and metadata. Presently, the benchmarks to aid the decision of which triplestore is best suited for use in an application environment like the TDH are limited to performance. This paper describes a new evaluation tool developed to analyze both features and performance. The tool comprises a weighted decision matrix to evaluate the interoperability, functionality, performance, and support availability of a range of integrated and native triplestores to rank them according to requirements of the TDH.
Abstract: Considering the theory of attribute grammars, we use
logical formulas instead of traditional functional semantic rules.
Following the decoration of a derivation tree, a suitable algorithm
should maintain the consistency of the formulas together with the
evaluation of the attributes. This may be a Prolog-like resolution, but
this paper examines a somewhat different strategy, based on
production specialization, local consistency and propagation: given a
derivation tree, it is interactively decorated, i.e. incrementally
checked and evaluated. The non-directed dependencies are
dynamically directed during attribute evaluation.
Abstract: In this paper, a new Genetic Algorithm (GA) based
methodology is proposed to optimize the Degree of Hybridization
(DOH) in a passenger parallel hybrid car. At first step, target
parameters for the vehicle are decided and then using ADvanced
VehIcle SimulatOR (ADVISOR) software, the variation pattern of
these target parameters, across the different DOHs, is extracted. At
the next step, a suitable cost function is defined and is optimized
using GA. In this paper, also a new technique has been proposed for
deciding the number of battery modules for each DOH, which leads
to a great improvement in the vehicle performance. The proposed
methodology is so simple, fast and at the same time, so efficient.
Abstract: Providing Services at Home has become over the last
few years a very dynamic and promising technological domain. It is
likely to enable wide dissemination of secure and automated living
environments. We propose a methodology for identifying threats to
Services at Home Delivery systems, as well as a threat analysis
of a multi-provider Home Gateway architecture. This methodology
is based on a dichotomous positive/preventive study of the target
system: it aims at identifying both what the system must do, and
what it must not do. This approach completes existing methods with
a synthetic view of potential security flaws, thus enabling suitable
measures to be taken into account. Security implications of the
evolution of a given system become easier to deal with. A prototype
is built based on the conclusions of this analysis.
Abstract: Jayanti-s algorithm is one of the best known abortable mutual exclusion algorithms. This work is an attempt to overcome an already known limitation of the algorithm while preserving its all important properties and elegance. The limitation is that the token number used to assign process identification number to new incoming processes is unbounded. We have used a suitably adapted alternative data structure, in order to completely eliminate the use of token number, in the algorithm.
Abstract: A new and highly efficient architecture for elliptic curve scalar point multiplication which is optimized for a binary field recommended by NIST and is well-suited for elliptic curve cryptographic (ECC) applications is presented. To achieve the maximum architectural and timing improvements we have reorganized and reordered the critical path of the Lopez-Dahab scalar point multiplication architecture such that logic structures are implemented in parallel and operations in the critical path are diverted to noncritical paths. With G=41, the proposed design is capable of performing a field multiplication over the extension field with degree 163 in 11.92 s with the maximum achievable frequency of 251 MHz on Xilinx Virtex-4 (XC4VLX200) while 22% of the chip area is occupied, where G is the digit size of the underlying digit-serial finite field multiplier.
Abstract: In this study, we introduced a communication system
where human body was used as medium through which data were
transferred. Multiple biosignal sensing units were attached to a subject
and wireless personal area network was formed. Data of the sensing
units were shared among them. We used wideband pulse
communication that was simple, low-power consuming and high data
rated. Each unit functioned as independent communication device or
node. A method of channel search and communication among the
modes was developed. A protocol of carrier sense multiple
access/collision detect was implemented in order to avoid data
collision or interferences. Biosignal sensing units should be located at
different locations due to the nature of biosignal origin. Our research
provided a flexibility of collecting data without using electrical wires.
More non-constrained measurement was accomplished which was
more suitable for u-Health monitoring.
Abstract: Many metrics were proposed to evaluate the
characteristics of the analysis and design model of a given product
which in turn help to assess the quality of the product. Function point
metric is a measure of the 'functionality' delivery by the software.
This paper presents an analysis of a set of programs of a project
developed in Cµ through Function Points metric. Function points
are measured for a Data Flow Diagram (DFD) of the case developed
at initial stage. Lines of Codes (LOCs) and possible errors are
calculated with the help of measured Function Points (FPs). The
calculations are performed using suitable established functions.
Calculated LOCs and errors are compared with actual LOCs and
errors found at the time of analysis & design review, implementation
and testing. It has been observed that actual found errors are more
than calculated errors. On the basis of analysis and observations,
authors conclude that function point provides useful insight and helps
to analyze the drawbacks in the development process.
Abstract: Space-time block codes (STBC) and spatial multiplexing
(SM) are promising techniques that effectively exploit multipleinput
multiple-output (MIMO) transmission to achieve more reliable
communication and a higher multiplexing rate, respectively. In this
paper, we study a practical design for hybrid scheme with multi-input
multi-output orthogonal frequency division multiplexing (MIMOOFDM)
systems to flexibly maximize the tradeoff between diversity
and multiplexing gains. Unlike the existing STBC and SM designs
which are suitable for the integer multiplexing rate, the proposed
design can achieve arbitrary number of multiplexing rate.
Abstract: The current situation in the eurozone raises a number of topics for discussion and to help in finding an answer to the question of whether a common currency is a more suitable means of coping with the impact of the financial crisis or whether national currencies are better suited to this. The economic situation in the EU is now considerably volatile and, due to problems with the fulfilment of the Maastricht convergence criteria, it is now being considered whether, in their further development, new member states will decide to distance themselves from the euro or will, in an attempt to overcome the crisis, speed up the adoption of the euro. The Czech Republic is one country with little interest in adopting the euro, justified by the fact that a better alternative to dealing with this crisis is an independent monetary policy and its ability to respond flexibly to the economic situation not only in Europe, but around the world. One attribute of the crisis in the Czech Republic and its mitigation is the freely floating exchange rate of the national currency. It is not only the Czech Republic that is attempting to alleviate the impact of the crisis, but also new EU member countries facing fresh questions to which theory have yet to provide wholly satisfactory answers. These questions undoubtedly include the problem of inflation targeting and the choice of appropriate instruments for achieving financial stability. The difficulty lies in the fact that these objectives may be contradictory and may require more than one means of achieving them. In this respect we may assume that membership of the euro zone might not in itself mitigate the development of the recession or protect the nation from future crises. We are of the opinion that the decisive factor in the development of any economy will continue to be the domestic economic policy and the operability of market economic mechanisms. We attempt to document this fact using selected countries as examples, these being the Czech Republic, Poland, Hungary, and Slovakia.
Abstract: Sensors possess several properties of physical
measures. Whether devices that convert a sensed signal into an
electrical signal, chemical sensors and biosensors, thus all these
sensors can be considered as an interface between the physical and
electrical equipment. The problem is the analysis of the multitudes of
saved settings as input variables. However, they do not all have the
same level of influence on the outputs. In order to identify the most
sensitive parameters, those that can guide users in gathering
information on the ground and in the process of model calibration
and sensitivity analysis for the effect of each change made.
Mathematical models used for processing become very complex.
In this paper a fuzzy rule-based system is proposed as a solution
for this problem. The system collects the available signals
information from sensors. Moreover, the system allows the study of
the influence of the various factors that take part in the decision
system. Since its inception fuzzy set theory has been regarded as a
formalism suitable to deal with the imprecision intrinsic to many
problems. At the same time, fuzzy sets allow to use symbolic models.
In this study an example was applied for resolving variety of
physiological parameters that define human health state. The
application system was done for medical diagnosis help. The inputs
are the signals expressed the cardiovascular system parameters, blood
pressure, Respiratory system paramsystem was done, it will be able
to predict the state of patient according any input values.