Abstract: In this paper we present a novel error model for
packet loss and subsequent error description. The proposed model
simulates the error performance of wireless communication link. The
model is designed as two independent Markov chains, where the first
one is used for packet generation and the second one generates
correctly and incorrectly transmitted bits for received packets from
the first chain. The statistical analyses of real communication on the
wireless link are used for determination of model-s parameters. Using
the obtained parameters and the implementation of the generator, we
collected generated traffic. The obtained results generated by
proposed model are compared with the real data collection.
Abstract: A novel feature selection strategy to improve the recognition accuracy on the faces that are affected due to nonuniform illumination, partial occlusions and varying expressions is proposed in this paper. This technique is applicable especially in scenarios where the possibility of obtaining a reliable intra-class probability distribution is minimal due to fewer numbers of training samples. Phase congruency features in an image are defined as the points where the Fourier components of that image are maximally inphase. These features are invariant to brightness and contrast of the image under consideration. This property allows to achieve the goal of lighting invariant face recognition. Phase congruency maps of the training samples are generated and a novel modular feature selection strategy is implemented. Smaller sub regions from a predefined neighborhood within the phase congruency images of the training samples are merged to obtain a large set of features. These features are arranged in the order of increasing distance between the sub regions involved in merging. The assumption behind the proposed implementation of the region merging and arrangement strategy is that, local dependencies among the pixels are more important than global dependencies. The obtained feature sets are then arranged in the decreasing order of discriminating capability using a criterion function, which is the ratio of the between class variance to the within class variance of the sample set, in the PCA domain. The results indicate high improvement in the classification performance compared to baseline algorithms.
Abstract: This paper studies the problem of exponential
stability of perturbed discrete linear systems with periodic
coefficients. Assuming that the unperturbed system is exponentially
stable we obtain conditions on the perturbations under which the
perturbed system is exponentially stable.
Abstract: Our goal is to effectively increase the number of boats in the river during a six month period. The main factors of determining the number of boats are duration and “select the priority trip". In the microcosmic simulation model, the best result is 4 to 24 nights with DSCF, and the number of boats is 812 with an increasing ratio of 9.0% related to the second best result. However, the number of boats is related to 31.6% less than the best one in 6 to 18 nights with FCFS. In the discrete duration model, we get from 6 to 18 nights, the numbers of boats have increased to 848 with an increase ratio of 29.7% than the best result in model I for the same time range. Moreover, from 4 to 24 nights, the numbers of boats have increase to 1194 with an increase ratio of 47.0% than the best result in model I for the same time range.
Abstract: We describe an effective method for image encryption
which employs magnitude and phase manipulation using carrier
images. Although it involves traditional methods like magnitude and
phase encryptions, the novelty of this work lies in deploying the
concept of carrier images for encryption purpose. To this end, a
carrier image is randomly chosen from a set of stored images. One
dimensional (1-D) discrete Fourier transform (DFT) is then carried
out on the original image to be encrypted along with the carrier
image. Row wise spectral addition and scaling is performed between
the magnitude spectra of the original and carrier images by randomly
selecting the rows. Similarly, row wise phase addition and scaling is
performed between the original and carrier images phase spectra by
randomly selecting the rows. The encrypted image obtained by these
two operations is further subjected to one more level of magnitude
and phase manipulation using another randomly chosen carrier image
by 1-D DFT along the columns. The resulting encrypted image is
found to be fully distorted, resulting in increasing the robustness
of the proposed work. Further, applying the reverse process at the
receiver, the decrypted image is found to be distortionless.
Abstract: Supply network management adopts a systematic
and integrative approach to managing the operations and
relationships of various parties in a supply network. The objective
of the manufactures in their supply network is to reduce inventory
costs and increase customer satisfaction levels. One way of doing
that is to synchronize delivery performance. A supply network can
be described by nodes representing the companies and the links
(relationships) between these nodes. Uncertainty in delivery time
depends on type of network relationship between suppliers. The
problem is to understand how the individual uncertainties influence
the total uncertainty of the network and identify those parts of the
network, which has the highest potential for improving the total
delivery time uncertainty.
Abstract: P2P Networks are highly dynamic structures since
their nodes – peer users keep joining and leaving continuously. In the
paper, we study the effects of network change rates on query routing
efficiency. First we describe some background and an abstract system
model. The chosen routing technique makes use of cached metadata
from previous answer messages and also employs a mechanism for
broken path detection and metadata maintenance. Several metrics are
used to show that the protocol behaves quite well even with high rate
of node departures, but above a certain threshold it literally breaks
down and exhibits considerable efficiency degradation.
Abstract: The aim of this paper is to propose a dynamic integrated approach, based on modularity concept and on the business ecosystem approach, that exploit different eBusiness services for SMEs under an open business network platform. The adoption of this approach enables firms to collaborate locally for delivering the best product/service to the customers as well as globally by accessing international markets, interrelate directly with the customers, create relationships and collaborate with worldwide actors. The paper will be structured as following: We will start by offering an overview of the state of the art of eBusiness platforms among SME of food and tourism firms and then we discuss the main drawbacks that characterize them. The digital business ecosystem approach and the modularity concept will be described as the theoretical ground in which our proposed integrated model is rooted. Finally, the proposed model along with a discussion of the main value creation potentialities it might create for SMEs will be presented.
Abstract: This paper treats a discrete-time finite buffer batch arrival queue with a single working vacation and partial batch rejection in which the inter-arrival and service times are, respectively, arbitrary and geometrically distributed. The queue is analyzed by using the supplementary variable and the imbedded Markov-chain techniques. We obtain steady-state system length distributions at prearrival, arbitrary and outside observer-s observation epochs. We also present probability generation function (p.g.f.) of actual waiting-time distribution in the system and some performance measures.
Abstract: The Constraints imposed by non-thermal
leptogenesis on the survival of the neutrino mass models describing
the presently available neutrino mass patterns, are studied
numerically. We consider the Majorana CP violating phases coming
from right-handed Majorana mass matrices to estimate the baryon
asymmetry of the universe, for different neutrino mass models
namely quasi-degenerate, inverted hierarchical and normal
hierarchical models, with tribimaximal mixings. Considering two
possible diagonal forms of Dirac neutrino mass matrix as either
charged lepton or up-quark mass matrix, the heavy right-handed
mass matrices are constructed from the light neutrino mass matrix.
Only the normal hierarchical model leads to the best predictions of
baryon asymmetry of the universe, consistent with observations in
non-thermal leptogenesis scenario.
Abstract: Due to adverse pressure gradient along the diverging
walls of wide-angled diffusers, the attached flow separates from
one wall and remains attached permanently to the other wall in a
process called stalling. Stalled diffusers render the whole fluid flow
system, in which they are part of, very inefficient. There is then an
engineering need to try to understand the whole process of diffuser
stall if any meaningful attempts to improve on diffuser efficiency
are to be made. In this regard, this paper provides a data bank
contribution for the mean flow-field in wide-angled diffusers where
the complete velocity and static pressure fields, and pressure recovery
data for diffusers in the fully stalled flow regime are experimentally
measured. The measurements were carried out at Reynolds numbers
between 1.07×105 and 2.14×105 based on inlet hydraulic diameter
and centreline velocity for diffusers whose divergence angles were
between 30Ôùª and 50Ôùª. Variation of Reynolds number did not significantly
affect the velocity and static pressure profiles. The wall static
pressure recovery was found to be more sensitive to changes in the
Reynolds number. By increasing the velocity from 10 m/s to 20 m/s,
the wall static pressure recovery increased by 8.31%. However, as the
divergence angle was increased, a similar increase in the Reynolds
number resulted in a higher percentage increase in pressure recovery.
Experimental results showed that regardless of the wall to which
the flow was attached, both the velocity and pressure fields were
replicated with discrepancies below 2%.
Abstract: Social-economic variables influence transportation
demand largely. Analyses of discrete choice model consider
social-economic variables to study traveler-s mode choice and
demand. However, to calibrate the discrete choice model needs to have
plenty of questionnaire survey. Also, an aggregative model is
proposed. The historical data of passenger volumes for high speed rail
and domestic civil aviation are employed to calibrate and validate the
model. In this study, models with different social-economic variables,
which are oil price, GDP per capita, CPI and economic growth rate,
are compared. From the results, the model with the oil price is better
than models with the other social-economic variables.
Abstract: Internet addiction has become a critical problem on
adolescents in Taiwan, and its negative effects on various dimensions
of adolescent development caught the attention of educational and
psychological experts. This study examined the correlation between
cognitive (locus of control) and emotion (emotion venting strategies)
factors on internet addiction of adolescents in Taiwan. Using the
Compulsive Internet Use (CIU) and the Emotion Venting Strategy
scales, a survey was conducted and 215 effective samples (students
ranging from12 to14 years old) returned. Quantitative analysis
methods such as descriptive statistics, t-test, ANOVA, Pearson
correlations and multiple regression were adopted. The results were as
follows: 1. Severity of Internet addiction has significant gender
differences; boys were at a higher risk than girls in becoming addicted
to the Internet. 2. Emotion venting, locus of control and internet
addiction have been shown to be positive correlated with one another.
3. Setting the locus of control as the control variable, emotion venting
strategy has positive and significant contribution to internet addiction.
The results of this study suggest that coaching deconstructive emotion
strategies and cognitive believes are encouraged to integrate with
actual field work.
Abstract: This paper presents the hardware design of a unified
architecture to compute the 4x4, 8x8 and 16x16 efficient twodimensional
(2-D) transform for the HEVC standard. This
architecture is based on fast integer transform algorithms. It is
designed only with adders and shifts in order to reduce the hardware
cost significantly. The goal is to ensure the maximum circuit reuse
during the computing while saving 40% for the number of operations.
The architecture is developed using FIFOs to compute the second
dimension. The proposed hardware was implemented in VHDL. The
VHDL RTL code works at 240 MHZ in an Altera Stratix III FPGA.
The number of cycles in this architecture varies from 33 in 4-point-
2D-DCT to 172 when the 16-point-2D-DCT is computed. Results
show frequency improvements reaching 96% when compared to an
architecture described as the direct transcription of the algorithm.
Abstract: The efficiency of an image watermarking technique depends on the preservation of visually significant information. This is attained by embedding the watermark transparently with the maximum possible strength. The current paper presents an approach for still image digital watermarking in which the watermark embedding process employs the wavelet transform and incorporates Human Visual System (HVS) characteristics. The sensitivity of a human observer to contrast with respect to spatial frequency is described by the Contrast Sensitivity Function (CSF). The strength of the watermark within the decomposition subbands, which occupy an interval on the spatial frequencies, is adjusted according to this sensitivity. Moreover, the watermark embedding process is carried over the subband coefficients that lie on edges where distortions are less noticeable. The experimental evaluation of the proposed method shows very good results in terms of robustness and transparency.
Abstract: In this paper we describes the authentication for DHCP
(Dynamic Host Configuration Protocol) message which provides the
efficient key management and reduces the danger replay attack without
an additional packet for a replay attack. And the authentication for
DHCP message supports mutual authentication and provides both
entity authentication and message authentication. We applied the
authentication for DHCP message to the home network environments
and tested through a home gateway.
Abstract: The paper describes ergonomics problems trend of
student at B5101 classroom building 2, Suranaree University of
Technology. The objective to survey ergonomics problems and effect
from use chairs for sitting in class room. The result from survey
method 100 student they use lecture chair for sitting in classroom
more than 2 hours/ day by RULA[1]. and Body discomfort survey[2].
The result from Body discomfort survey contribute fatigue problems
at neck, lower back, upper back and right shoulder 2.93, 2.91, 2.33,
1.75 respectively and result from RULA contribute fatigue problems
at neck, body and right upper arm 4.00, 3.75 and 3.00 respectively
are consistent. After that the researcher provide improvement plan
for design new chair support student fatigue reduction by prepare
data of sample anthropometry and design ergonomics chair prototype
3 unit. Then sample 100 student trial to use new chair and evaluate
again by RULA, Body discomfort and satisfaction. The result from
trial new chair after improvement by RULA present fatigue reduction
average of head and neck from 4.00 to 2.25 , body and trunk from
3.75 to 2.00 and arm force from 1.00 to 0.25 respectively. The result
from trial new chair after improvement by Body discomfort present
fatigue reduction average of lower back from 2.91 to 0.87, neck from
2.93 to 1.24, upper back 2.33 to 0.84 and right upper arm from 1.75
to 0.74. That statistical of RULA and Body discomfort survey
present fatigue reduction after improvement significance with a
confidence level of 95% (p-value 0.05). When analyzing the
relationship of fatigue as part of the body by Chi – square test during
RULA and Body discomfort that before and after improvements were
consistent with the significant level of confidence 95% (p-value 0.05)
. Moreover the students satisfaction result from trial with a new chair
for 30 minutes [3]. 72 percent very satisfied of the folding of the
secondary writing simple 66% the width of the writing plate, 64% the
suitability of the writing plate, 62% of soft seat cushion and 61%
easy to seat the chair.
Abstract: Fingerprint based identification system; one of a well
known biometric system in the area of pattern recognition and has
always been under study through its important role in forensic
science that could help government criminal justice community. In
this paper, we proposed an identification framework of individuals by
means of fingerprint. Different from the most conventional
fingerprint identification frameworks the extracted Geometrical
element features (GEFs) will go through a Discretization process.
The intention of Discretization in this study is to attain individual
unique features that could reflect the individual varianceness in order
to discriminate one person from another. Previously, Discretization
has been shown a particularly efficient identification on English
handwriting with accuracy of 99.9% and on discrimination of twins-
handwriting with accuracy of 98%. Due to its high discriminative
power, this method is adopted into this framework as an independent
based method to seek for the accuracy of fingerprint identification.
Finally the experimental result shows that the accuracy rate of
identification of the proposed system using Discretization is 100%
for FVC2000, 93% for FVC2002 and 89.7% for FVC2004 which is
much better than the conventional or the existing fingerprint
identification system (72% for FVC2000, 26% for FVC2002 and
32.8% for FVC2004). The result indicates that Discretization
approach manages to boost up the classification effectively, and
therefore prove to be suitable for other biometric features besides
handwriting and fingerprint.
Abstract: The unique structural configuration found in human foot allows easy walking. Similar movement is hard to imitate even for an ape. It is obvious that human ambulation relates to the foot structure itself. Suppose the bones are represented as vertices and the joints as edges. This leads to the development of a special graph that represents human foot. On a footprint there are point-ofcontacts which have contact with the ground. It involves specific vertices. Theoretically, for an ideal ambulation, these points provide reactions onto the ground or the static equilibrium forces. They are arranged in sequence in form of a path. The ambulating footprint follows this path. Having the human foot graph and the path crossbred, it results in a representation that describes the profile of an ideal ambulation. This profile cites the locations where the point-of-contact experience normal reaction forces. It highlights the significant of these points.
Abstract: This paper provides an introduction into the
evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different
phases of information processing in the work domain. It starts by
charting the past and present usage of computers in work
environments and shows current technological trends, which are likely to influence future business applications. The second part
starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient
Intelligence applications based on identification and localization
information, which are already used in the production and retail sector. Based on current systems and prototype applications, the
paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.