Abstract: In most cases, it is considerably difficult to directly measure structural vibration with a lot of sensors because of complex
geometry, time and equipment cost. For this reason, this paper deals
with the problem of locating sensors on a plate model by four advanced sensor placement optimization (S.P.O) techniques. It also
suggests the evaluation index representing the characteristic of orthogonal between each of natural modes. The index value provides the assistance to selecting of proper S.P.O technique and optimal
positions for monitoring of dynamic systems without the experiment.
Abstract: The introduction of mass-customization has enabled
new ways to treat patients within medicine. However, the
introduction of industrialized treatments has also meant new
obstacles. The purpose of this study was to introduce and
theoretically test a method for improving dental crown fit. The
optimization method allocates support points in order to check the
final variation for dental crowns. Three different types of geometries
were tested and compared. The three geometries were also divided
into three sub-geometries: Current method, Optimized method and
Feasible method. The Optimized method, using the whole surface for
support points, provided the best results. The results support the
objective of the study. It also seems that the support optimization
method can dramatically improve the robustness of dental crown
treatments.
Abstract: In this paper optimal capacitor placement problem has
been formulated in a restructured distribution network. In this
scenario the distribution network operator can consider reactive
energy also as a service that can be sold to transmission system. Thus
search for optimal location, size and number of capacitor banks with
the objective of loss reduction, maximum income from selling
reactive energy to transmission system and return on investment for
capacitors, has been performed. Results is influenced with economic
value of reactive energy, therefore problem has been solved for
various amounts of it. The implemented optimization technique is
genetic algorithm. For any value of reactive power economic value,
when reverse of investment index increase and change from zero or
negative values to positive values, the threshold value of selling
reactive power has been obtained. This increasing price of economic
parameter is reasonable until the network losses is less than loss
before compensation.
Abstract: This paper attempts to explore a new method to
improve the teaching of algorithmic for beginners. It is well known
that algorithmic is a difficult field to teach for teacher and complex to
assimilate for learner. These difficulties are due to intrinsic
characteristics of this field and to the manner that teachers (the
majority) apprehend its bases. However, in a Technology Enhanced
Learning environment (TEL), assessment, which is important and
indispensable, is the most delicate phase to implement, for all
problems that generate (noise...). Our objective registers in the
confluence of these two axes. For this purpose, EASEL focused
essentially to elaborate an assessment approach of algorithmic
competences in a TEL environment. This approach consists in
modeling an algorithmic solution according to basic and elementary
operations which let learner draw his/her own step with all autonomy
and independently to any programming language. This approach
assures a trilateral assessment: summative, formative and diagnostic
assessment.
Abstract: Assessment for image quality traditionally needs its
original image as a reference. The conventional method for assessment
like Mean Square Error (MSE) or Peak Signal to Noise Ratio (PSNR)
is invalid when there is no reference. In this paper, we present a new
No-Reference (NR) assessment of image quality using blur and noise.
The recent camera applications provide high quality images by help of
digital Image Signal Processor (ISP). Since the images taken by the
high performance of digital camera have few blocking and ringing
artifacts, we only focus on the blur and noise for predicting the
objective image quality. The experimental results show that the
proposed assessment method gives high correlation with subjective
Difference Mean Opinion Score (DMOS). Furthermore, the proposed
method provides very low computational load in spatial domain and
similar extraction of characteristics to human perceptional assessment.
Abstract: Today, canines are still used effectively in acceleration detection situation. However, this method is becoming impractical in modern age and a new automated replacement to the canine is required. This paper reports the design of an innovative accelerant detector. Designing an accelerant detector is a long process as is any design process; therefore, a solution to the need for a mobile, effective accelerant detector is hereby presented. The device is simple and efficient to ensure that any accelerant detection can be conducted quickly and easily. The design utilizes Ultra Violet (UV) light to detect the accelerant. When the UV light shines on an accelerant, the hydrocarbons in the accelerant emit florescence. The advantages of using the UV light to detect accelerant are also outlined in this paper. The mobility of the device is achieved by using a Direct Current (DC) motor to run tank tracks. Tank tracks were chosen as to ensure that the device will be mobile in the rough terrain of a fire site. The materials selected for the various parts are also presented. A Solid Works Simulation was also conducted on the stresses in the shafts and the results are presented. This design is an innovative solution which offers a user friendly interface. The design is also environmentally friendly, ecologically sound and safe to use.
Abstract: This paper deals with the status of solid waste pollution in touristic spots of North coastal Andhra Pradesh. Case studies of Eco tourism, cultural tourism and pilgrim tourism are elaborately discussed and the study is based on both primary and secondary data. Data collection includes field collection of solid waste, semi structured interviews and observation of tourists. Results indicate generation of 72% Non biodegradable material in Eco touristic places like RK beach Visakhapatnam, Araku Valley. Pydithalli Jathra is a famous cultural touristic attraction and more than one lakh people converge here. The solid waste at this spot includes 20% coconut shells, 50% plastic bottles and covers, 20% Banana peelings and remaining are food materials. Radhasapthami is the most important festival celebrated at famous sun temple Arasavalli of Srikakulam. Here solid waste includes 50% water bottles, plastic covers, 10% papers, 10% hair, 30% left out food material and Banana peelings.
Abstract: In the traditional buckling analysis of rectangular
plates the classical thin plate theory is generally applied, so
neglecting the plating shear deformation. It seems quite clear that this
method is not totally appropriate for the analysis of thick plates, so
that in the following the two variable refined plate theory proposed
by Shimpi (2006), that permits to take into account the transverse
shear effects, is applied for the buckling analysis of simply supported
isotropic rectangular plates, compressed in one and two orthogonal
directions.
The relevant results are compared with the classical ones and, for
rectangular plates under uniaxial compression, a new direct
expression, similar to the classical Bryan-s formula, is proposed for
the Euler buckling stress.
As the buckling analysis is a widely diffused topic for a variety of
structures, such as ship ones, some applications for plates uniformly
compressed in one and two orthogonal directions are presented and
the relevant theoretical results are compared with those ones obtained
by a FEM analysis, carried out by ANSYS, to show the feasibility of
the presented method.
Abstract: Supplier appraisal fosters energy in Supply Chain
Management and helps in best optimization of viable business
partners for a company. Many Decision Making techniques have
already been proposed by researchers for supplier-s appraisal.
However, Analytic Hierarchy Process (AHP) is assumed to be the
most structured technique to attain near-best solution of the problem.
This paper focuses at implementation of AHP in the procurement
processes. It also suggests that on what factors a Public Sector
Enterprises must focus while dealing with their suppliers and what
should the suppliers do to synchronize their activities with the
strategic objectives of Organization. It also highlights the weak areas
in supplier appraisal process with a view to suggest viable
recommendations.
Abstract: Image watermarking has become an important tool for
intellectual property protection and authentication. In this paper a
watermarking technique is suggested that incorporates two
watermarks in a host image for improved protection and robustness.
A watermark, in form of a PN sequence (will be called the secondary
watermark), is embedded in the wavelet domain of a primary
watermark before being embedded in the host image. The technique
has been tested using Lena image as a host and the camera man as
the primary watermark. The embedded PN sequence was detectable
through correlation among other five sequences where a PSNR of
44.1065 dB was measured. Furthermore, to test the robustness of the
technique, the watermarked image was exposed to four types of
attacks, namely compression, low pass filtering, salt and pepper noise
and luminance change. In all cases the secondary watermark was
easy to detect even when the primary one is severely distorted.
Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: One of the most growing areas in the embedded community is multimedia devices. Multimedia devices incorporate a number of complicated functions for their operation, like motion estimation. A multitude of different implementations have been proposed to reduce motion estimation complexity, such as spiral search. We have studied the implementations of spiral search and identified areas of improvement. We propose a modified spiral search algorithm, with lower computational complexity compared to the original spiral search. We have implemented our algorithm on an embedded ARM based architecture, with custom memory hierarchy. The resulting system yields energy consumption reduction up to 64% and performance increase up to 77%, with a small penalty of 2.3 dB, in average, of video quality compared with the original spiral search algorithm.
Abstract: In a chirp spread spectrum (CSS) system, the overlap
technique is used for increasing bit rate. More overlaps can offer
higher data throughput; however, they may cause more intersymbol
interference (ISI) at the same time, resulting in serious bit error
rate (BER) performance degradation. In this paper, we perform the
BER analysis and derive a closed form BER expression for the
overlap-based CSS system. The derived BER expression includes
the number of overlaps as a parameter, and thus, would be very
useful in determining the number of overlaps for a specified BER.
The numerical results demonstrate that the BER derived in a closed
form closely agrees with the simulated BER.
Abstract: The charnockitic and associated granitic rocks of Akure area were studied for their field and petrographic relationship's. The outcrops locations were plotted in Surfer 8. The granitic rock exhibits a porphyritic texture and outcrops in the north-eastern side of the study area while the charnockitics outcrop in the central/western part. An essentially dark coloured and fine grained intrusive exhibiting xenoliths and xenocrysts (plagioclase phenocrysts) of the granite outcrops between the granitic and charnockitic rocks. Mineralogically, the central rock combines the content of the other two indicating that it is most likely a product of their hybridization. The charnockitic magma is believed to have intruded and assimilated the granite substantially thereby contaminating itself and consequently emplacing the hybrid. The presented model of emplacement elucidates the hybridization proposal. Conclusively, the charnockitics are believed to be (a) younger than the granite, (b) of Pan-African age and (c) of igneous origin.
Abstract: Neoclassical and functionalist explanations of self
organization in multiagent systems have been criticized on several accounts including unrealistic explication of overadapted agents and
failure to resolve problems of externality. The paper outlines a more
elaborate and dynamic model that is capable of resolving these dilemmas. An illustrative example where behavioral diversity is
cobred in a repeated nonzero sum task via evolutionary computing is
presented.
Abstract: This research focuses on micro-enterprise of
Malaysian Malays that are involved in very small-scaled business
activities. Among them include food stall and burger stall operators,
night market hawkers, grocery store operators as well as construction
and small service activities works. The study seeks to explore why
some micro-entrepreneurs still lag in entrepreneurship and what
needs to be rectified. This quantitative study is conducted on 173
Malay micro-enterprise owners (MEOs) and 58 Malay failed microenterprise
owners (FMEOs) involved in all range of businesses
throughout the state of Perak, Malaysia. The main aims are to
identify the gaps between the failed micro-enterprise owners
(FMEOs) and existing micro-enterprise owners (MEOs) and the
problems faced among FMEOs. The results reveal that the MEOs had
strong motivations and better marketing approaches as compared to
FMEOs. Furthermore, the FMEOs failed in the business ventures
mainly due to lack of management, sales and marketing skills and
poor competitive abilities to keep up with rivals.
Abstract: The cellular network is one of the emerging areas of
communication, in which the mobile nodes act as member for one
base station. The cluster based communication is now an emerging
area of wireless cellular multimedia networks. The cluster renders
fast communication and also a convenient way to work with
connectivity. In our scheme we have proposed an optimization
technique for the fuzzy cluster nodes, by categorizing the group
members into three categories like long refreshable member, medium
refreshable member and short refreshable member. By considering
long refreshable nodes as static nodes, we compute the new
membership values for the other nodes in the cluster. We compare
their previous and present membership value with the threshold value
to categorize them into three different members. By which, we
optimize the nodes in the fuzzy clusters. The simulation results show
that there is reduction in the cluster computational time and
iterational time after optimization.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: With the demand of mobility by users, wireless
technologies have become the hotspot developing arena. Internet
Engineering Task Force (IETF) working group has developed Mobile
IP to support node mobility. The concept of node mobility indicates
that in spite of the movement of the node, it is still connected to the
internet and all the data transactions are preserved. It provides
location-independent access to Internet. After the incorporation of
host mobility, network mobility has undergone intense research.
There are several intricacies faced in the real world implementation
of network mobility significantly the problem of nested networks and
their consequences. This article is concerned regarding a problem of
nested network called pinball route problem and proposes a solution
to eliminate the above problem. The proposed mechanism is
implemented using NS2 simulation tool and it is found that the
proposed mechanism efficiently reduces the overload caused by the
pinball route problem.
Abstract: This paper describes a novel method for automatic
estimation of the contours of weld defect in radiography images.
Generally, the contour detection is the first operation which we apply
in the visual recognition system. Our approach can be described as a
region based maximum likelihood formulation of parametric
deformable contours. This formulation provides robustness against
the poor image quality, and allows simultaneous estimation of the
contour parameters together with other parameters of the model.
Implementation is performed by a deterministic iterative algorithm
with minimal user intervention. Results testify for the very good
performance of the approach especially in synthetic weld defect
images.