Abstract: The three-dimensional incompressible flow past a
rectangular open cavity is investigated, where the aspect ratio of the
cavity is considered as 4. The principle objective is to use large-eddy
simulation to resolve and control the large-scale structures, which are
largely responsible for flow oscillations in a cavity. The flow past an
open cavity is very common in aerospace applications and can be a
cause of acoustic source due to hydrodynamic instability of the shear
layer and its interactions with the downstream edge. The unsteady
Navier-stokes equations have been solved on a staggered mesh using
a symmetry-preserving central difference scheme. Synthetic jet has
been used as an active control to suppress the cavity oscillations in
wake mode for a Reynolds number of ReD = 3360. The effect of
synthetic jet has been studied by varying the jet amplitude and
frequency, which is placed at the upstream wall of the cavity. The
study indicates that there exits a frequency band, which is larger than
a critical value, is effective in attenuating cavity oscillations when
blowing ratio is more than 1.0.
Abstract: Large volumes of fingerprints are collected and stored
every day in a wide range of applications, including forensics, access
control etc. It is evident from the database of Federal Bureau of
Investigation (FBI) which contains more than 70 million finger
prints. Compression of this database is very important because of this
high Volume. The performance of existing image coding standards
generally degrades at low bit-rates because of the underlying block
based Discrete Cosine Transform (DCT) scheme. Over the past
decade, the success of wavelets in solving many different problems
has contributed to its unprecedented popularity. Due to
implementation constraints scalar wavelets do not posses all the
properties which are needed for better performance in compression.
New class of wavelets called 'Multiwavelets' which posses more
than one scaling filters overcomes this problem. The objective of this
paper is to develop an efficient compression scheme and to obtain
better quality and higher compression ratio through multiwavelet
transform and embedded coding of multiwavelet coefficients through
Set Partitioning In Hierarchical Trees algorithm (SPIHT) algorithm.
A comparison of the best known multiwavelets is made to the best
known scalar wavelets. Both quantitative and qualitative measures of
performance are examined for Fingerprints.
Abstract: Utilizing echoic intension and distribution from different organs and local details of human body, ultrasonic image can catch important medical pathological changes, which unfortunately may be affected by ultrasonic speckle noise. A feature preserving ultrasonic image denoising and edge enhancement scheme is put forth, which includes two terms: anisotropic diffusion and edge enhancement, controlled by the optimum smoothing time. In this scheme, the anisotropic diffusion is governed by the local coordinate transformation and the first and the second order normal derivatives of the image, while the edge enhancement is done by the hyperbolic tangent function. Experiments on real ultrasonic images indicate effective preservation of edges, local details and ultrasonic echoic bright strips on denoising by our scheme.
Abstract: Photonic Crystal (PhC) based devices are being
increasingly used in multifunctional, compact devices in integrated
optical communication systems. They provide excellent
controllability of light, yet maintaining the small size required for
miniaturization. In this paper, the band gap properties of PhCs and
their typical applications in optical waveguiding are considered.
Novel PhC based applications such as nonlinear switching and
tapers are considered and simulation results are shown using the
accurate time-domain numerical method based on Finite Difference
Time Domain (FDTD) scheme. The suitability of these devices for
novel applications is discussed and evaluated.
Abstract: In this paper, a novel feature-based image
watermarking scheme is proposed. Zernike moments which have
invariance properties are adopted in the scheme. In the proposed
scheme, feature points are first extracted from host image and several
circular patches centered on these points are generated. The patches
are used as carriers of watermark information because they can be
regenerated to locate watermark embedding positions even when
watermarked images are severely distorted. Zernike transform is then
applied to the patches to calculate local Zernike moments. Dither
modulation is adopted to quantize the magnitudes of the Zernike
moments followed by false alarm analysis. Experimental results show
that quality degradation of watermarked image is visually
transparent. The proposed scheme is very robust against image
processing operations and geometric attacks.
Abstract: This paper presents a novel control method based on radial basis function networks (RBFNs) for chaotic dynamical systems. The proposed method first identifies the nonlinear part of the chaotic system off-line and then constructs a model-following controller using only the estimated system parameters. Simulation results show the effectiveness of the proposed control scheme.
Abstract: Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.
Abstract: In this paper we proposed multistage adaptive
ARQ/HARQ/HARQ scheme. This method combines pure ARQ
(Automatic Repeat reQuest) mode in low channel bit error rate and
hybrid ARQ method using two different Reed-Solomon codes in
middle and high error rate conditions. It follows, that our scheme has
three stages. The main goal is to increase number of states in adaptive
HARQ methods and be able to achieve maximum throughput for
every channel bit error rate. We will prove the proposal by
calculation and then with simulations in land mobile satellite channel
environment. Optimization of scheme system parameters is described
in order to maximize the throughput in the whole defined Signal-to-
Noise Ratio (SNR) range in selected channel environment.
Abstract: In this paper, we propose a novel frequency offset
estimation scheme for orthogonal frequency division multiplexing
(OFDM) systems. By correlating the OFDM signals within the coherence
phase bandwidth and employing a threshold in the frequency
offset estimation process, the proposed scheme is not only robust to
the timing offset but also has a reduced complexity compared with
that of the conventional scheme. Moreover, a timing offset estimation
scheme is also proposed as the next stage of the proposed frequency
offset estimation. Numerical results show that the proposed scheme
can estimate frequency offset with lower computational complexity
and does not require additional memory while maintaining the same
level of estimation performance.
Abstract: In this paper we propose two first non-generic constructions
of multisignature scheme based on coding theory. The
first system make use of the CFS signature scheme and is secure
in random oracle while the second scheme is based on the KKS
construction and is a few times. The security of our construction relies
on a difficult problems in coding theory: The Syndrome Decoding
problem which has been proved NP-complete [4].
Abstract: A new nonlinear PID controller and its stability
analysis are presented in this paper. A nonlinear function is deduced
from the similarities between the control effort and the electric-field
effect of a capacitor. The conventional linear PID controller can be
modified into a nonlinear one by this function. To analyze the stability
of the nonlinear PID controlled system, an idea of energy equivalence
is adapted to avoid the conservativeness which is usually arisen from
some traditional theorems and Criterions. The energy equivalence is
naturally related with the conceptions of Passivity and T-Passivity. As
a result, an engineering guideline for the parameter design of the
nonlinear PID controller is obtained. An inverted pendulum system is
tested to verify the nonlinear PID control scheme.
Abstract: For broadband wireless mobile communication
systems the orthogonal frequency division multiplexing (OFDM) is a
suitable modulation scheme. The frequency offset between
transmitter and receiver local oscillator is main drawback of OFDM
systems, which causes intercarrier interference (ICI) in the
subcarriers of the OFDM system. This ICI degrades the bit error rate
(BER) performance of the system. In this paper an improved self-ICI
cancellation scheme is proposed to improve the system performance.
The proposed scheme is based on discrete Fourier transform-inverse
discrete Fourier transform (DFT-IDFT). The simulation results show
that there is satisfactory improvement in the bit error rate (BER)
performance of the present scheme.
Abstract: A cell-centered finite volume scheme for discretizing diffusion operators on distorted quadrilateral meshes has recently been designed and added to APMFCG to enable that code to be used as a tool for studying explosive magnetic flux compression generators. This paper describes this scheme. Comparisons with analytic results for 2-D test cases are presented, as well as 2-D results from a test of a "realistic" generator configuration.
Abstract: Digital watermarking in medical images can ensure
the authenticity and integrity of the image. This design paper reviews
some existing watermarking schemes and proposes a reversible
tamper detection and recovery watermarking scheme. Watermark
data from ROI (Region Of Interest) are stored in RONI (Region Of
Non Interest). The embedded watermark allows tampering detection
and tampered image recovery. The watermark is also reversible and
data compression technique was used to allow higher embedding
capacity.
Abstract: This paper presents a new method of fault detection and isolation (FDI) for polymer electrolyte membrane (PEM) fuel cell (FC) dynamic systems under an open-loop scheme. This method uses a radial basis function (RBF) neural network to perform fault identification, classification and isolation. The novelty is that the RBF model of independent mode is used to predict the future outputs of the FC stack. One actuator fault, one component fault and three sensor faults have been introduced to the PEMFC systems experience faults between -7% to +10% of fault size in real-time operation. To validate the results, a benchmark model developed by Michigan University is used in the simulation to investigate the effect of these five faults. The developed independent RBF model is tested on MATLAB R2009a/Simulink environment. The simulation results confirm the effectiveness of the proposed method for FDI under an open-loop condition. By using this method, the RBF networks able to detect and isolate all five faults accordingly and accurately.
Abstract: In this paper, supply policy and procurement of
shared resources in some kinds of concurrent construction projects
are investigated. This could be oriented to the problems of holding
construction companies who involve in different projects
concurrently and they have to supply limited resources to several
projects as well as prevent delays to any project. Limits on
transportation vehicles and storage facilities for potential
construction materials and also the available resources (such as cash
or manpower) are some of the examples which affect considerably on
management of all projects over all. The research includes
investigation of some real multi-storey buildings during their
execution periods and surveying the history of the activities. It is
shown that the common resource demand variation curve of the
projects may be expanded or displaced to achieve an optimum
distribution scheme. Of course, it may cause some delay to some
projects, but it has minimum influence on whole execution period of
all projects and its influence on procurement cost of the projects is
considerable. These observations on investigation of some
multistorey building which are built in Iran will be presented in this
paper.
Abstract: In this paper we analyze the application of a formal proof system to the discrete logarithm problem used in publickey cryptography. That means, we explore a computer verification of the ElGamal encryption scheme with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm is formally verified with computer support. Besides, we present a formalization of the DSA signature scheme in the Isabelle/HOL system. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic signature scheme.
Abstract: Distillation column is one of the most common
operations in process industries and is while the most expensive unit
of the amount of energy consumption. Many ideas have been
presented in the related literature for optimizing energy consumption
in distillation columns. This paper studies the different heat
integration methods in a distillation column which separate Benzene,
Toluene, Xylene, and C9+. Three schemes of heat integration
including, indirect sequence (IQ), indirect sequence with forward
energy integration (IQF), and indirect sequence with backward
energy integration (IQB) has been studied in this paper. Using
shortcut method these heat integration schemes were simulated with
Aspen HYSYS software and compared with each other with
regarding economic considerations. The result shows that the energy
consumption has been reduced 33% in IQF and 28% in IQB in
comparison with IQ scheme. Also the economic result shows that the
total annual cost has been reduced 12% in IQF and 8% in IQB
regarding with IQ scheme. Therefore, the IQF scheme is most
economic than IQB and IQ scheme.
Abstract: In this paper, the telegraph equation is solved numerically by cubic B-spline quasi-interpolation .We obtain the numerical scheme, by using the derivative of the quasi-interpolation to approximate the spatial derivative of the dependent variable and a low order forward difference to approximate the temporal derivative of the dependent variable. The advantage of the resulting scheme is that the algorithm is very simple so it is very easy to implement. The results of numerical experiments are presented, and are compared with analytical solutions by calculating errors L2 and L∞ norms to confirm the good accuracy of the presented scheme.
Abstract: A water surface slope limiting scheme is tested and
compared with the water depth slope limiter for the solution of one
dimensional shallow water equations with bottom slope source term.
Numerical schemes based on the total variation diminishing Runge-
Kutta discontinuous Galerkin finite element method with slope
limiter schemes based on water surface slope and water depth are
used to solve one-dimensional shallow water equations. For each
slope limiter, three different Riemann solvers based on HLL, LF, and
Roe flux functions are used. The proposed water surface based slope
limiter scheme is easy to implement and shows better conservation
property compared to the slope limiter based on water depth. Of the
three flux functions, the Roe approximation provides the best results
while the LF function proves to be least suitable when used with
either slope limiter scheme.