Abstract: This paper describes a method to measure and
compensate a 4 axes ultra-precision machine tool that generates micro
patterns on the large surfaces. The grooving machine is usually used
for making a micro mold for many electrical parts such as a light guide
plate for LCD and fuel cells. The ultra precision machine tool has three
linear axes and one rotational table. Shaping is usually used to
generate micro patterns. In the case of 50 μm pitch and 25 μm height
pyramid pattern machining with a 90° wedge angle bite, one of linear
axis is used for long stroke motion for high cutting speed and other
linear axis are used for feeding. The triangular patterns can be
generated with many times of long stroke of one axis. Then 90°
rotation of work piece is needed to make pyramid patterns with
superposition of machined two triangular patterns.
To make a two dimensional positioning error, straightness of two
axes in out of plane, squareness between the each axis are important.
Positioning errors, straightness and squarness were measured by laser
interferometer system. Those were compensated and confirmed by
ISO230-6. One of difficult problem to measure the error motions is
squareness or parallelism of axis between the rotational table and
linear axis. It was investigated by simultaneous moving of rotary table
and XY axes. This compensation method is introduced in this paper.
Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.
Abstract: In 1990 [1] the subband-DFT (SB-DFT) technique was proposed. This technique used the Hadamard filters in the decomposition step to split the input sequence into low- and highpass sequences. In the next step, either two DFTs are needed on both bands to compute the full-band DFT or one DFT on one of the two bands to compute an approximate DFT. A combination network with correction factors was to be applied after the DFTs. Another approach was proposed in 1997 [2] for using a special discrete wavelet transform (DWT) to compute the discrete Fourier transform (DFT). In the first step of the algorithm, the input sequence is decomposed in a similar manner to the SB-DFT into two sequences using wavelet decomposition with Haar filters. The second step is to perform DFTs on both bands to obtain the full-band DFT or to obtain a fast approximate DFT by implementing pruning at both input and output sides. In this paper, the wavelet-based DFT (W-DFT) with Haar filters is interpreted as SB-DFT with Hadamard filters. The only difference is in a constant factor in the combination network. This result is very important to complete the analysis of the W-DFT, since all the results concerning the accuracy and approximation errors in the SB-DFT are applicable. An application example in spectral analysis is given for both SB-DFT and W-DFT (with different filters). The adaptive capability of the SB-DFT is included in the W-DFT algorithm to select the band of most energy as the band to be computed. Finally, the W-DFT is extended to the two-dimensional case. An application in image transformation is given using two different types of wavelet filters.
Abstract: The need to implement intelligent highways is much
more emphasized with the growth of vehicle production line as well as vehicle intelligence. The control of intelligent vehicles in order to
reduce human error and boost ease congestion is not accomplished solely by the aid of human resources. The present article is an attempt
to introduce an intelligent control system based on a single central computer. In this project, central computer, without utilizing Global
Positioning System (GPS), is capable of tracking all vehicles, crisis management and control, traffic guidance and recording traffic
crimes along the highway. By the help of RFID technology, vehicles
are connected to computerized systems, intelligent light poles and
other available hardware along the way. By the aid of Wimax
communicative technology, all components of the system are
virtually connected together through local and global networks
devised in them and the energy of the network is provided by the
solar cells installed on the intelligent light poles.
Abstract: Abrasive Jet Machining is an Unconventional
machining process in which the metal is removed from brittle and
hard material in the form of micro-chips. With increase in need of
materials like ceramics, composites, in manufacturing of various
Mechanical & Electronic components, AJM has become a useful
technique for micro machining. The present study highlights the
influence of different parameters like Pressure, SOD, Time, Abrasive
grain size, nozzle diameter on the Metal removal of FRP (Fiber
Reinforced Polymer) composite by Abrasive jet machining. The
results of the Experiments conducted were analyzed and optimized
with TAGUCHI method of Optimization and ANOVA for Optimal
Value.
Abstract: Virtually all existing networked system management
tools use a Manager/Agent paradigm. That is, distributed agents are
deployed on managed devices to collect local information and report
it back to some management unit. Even those that use standard
protocols such as SNMP fall into this model. Using standard protocol
has the advantage of interoperability among devices from different
vendors. However, it may not be able to provide customized
information that is of interest to satisfy specific management needs.
In this dissertation work, different approaches are used to
collect information regarding the devices attached to a Local Area
Network. An SNMP aware application is being developed that will
manage the discovery procedure and will be used as data collector.
Abstract: Considering today-s increasing speed of change,
radical and innovative improvement - Kaikaku, is a necessity parallel
to continuous incremental improvement - Kaizen, especially for
SME-s in order to attain the competitive edge needed to be profitable.
During 2011, a qualitative single case study with the objective of
realizing a kaikaku in production has been conducted. The case study
was run as a one year project using a collaborative approach
including both researchers and company representatives. The case
study was conducted with the purpose of gaining further knowledge
about kaikaku realization as well as its implications. The empirical
results provide insights about the great productivity results achieved
by applying a specific kaikaku realization approach. However, it also
sheds light on the difficulty and contradiction of combining
innovation management and production system development.
Abstract: The growing problem of youth unemployment in
Egypt after the 25th January Revolution has directed the attention of
some human resource experts towards considering remote
employment as a partial remedy for the unemployed youth instead of
the unavailable traditional jobs, a trend which will also help with the
congested offices and unsolved traffic problem in Cairo and spread
a flexible work culture, but despite of that, the main issue remains
unresolved for these organizations to deal with the system challenges.
In the past few years, in developed countries, there has been a
growing trend for many companies to shift to remote employment
instead of the traditional office employment for many reasons: due to
the growing technological advances that helped some employees do
their work from home on a part time basis, the need for achieving an
employee-s work balance in the middle of unbalanced complicated
life, top management focus on employee-s productivity rather their
time spent at work. The objective of this paper is to study and analyze
the advantages and challenges that Egypt-s labor force will be facing
in their implementation of remote or virtual employment in both
government and private organizations after the 25th January
revolution. Therefore, the research question will be: What are the
advantages and different challenges that Egyptian organizations
might face in their implementation for remote employment system
and how can they manage these challenges for the system to work
effectively? The study is divided into six main parts: the introduction,
objective and importance of the study, research problem,
methodology, experience of some countries that implemented remote
employment, advantages and challenges of implementing remote
employment in Egypt and then the conclusion which discuses the
results and recommendations of the study.
Abstract: Texture classification is a trendy and a catchy
technology in the field of texture analysis. Textures, the repeated
patterns, have different frequency components along different
orientations. Our work is based on Texture Classification and its
applications. It finds its applications in various fields like Medical
Image Classification, Computer Vision, Remote Sensing,
Agricultural Field, and Textile Industry. Weed control has a major
effect on agriculture. A large amount of herbicide has been used for
controlling weeds in agriculture fields, lawns, golf courses, sport
fields, etc. Random spraying of herbicides does not meet the exact
requirement of the field. Certain areas in field have more weed
patches than estimated. So, we need a visual system that can
discriminate weeds from the field image which will reduce or even
eliminate the amount of herbicide used. This would allow farmers to
not use any herbicides or only apply them where they are needed. A
machine vision precision automated weed control system could
reduce the usage of chemicals in crop fields. In this paper, an
intelligent system for automatic weeding strategy Multi Resolution
Combined Statistical & spatial Frequency is used to discriminate the
weeds from the crops and to classify them as narrow, little and broad
weeds.
Abstract: Technical laboratories are typically considered as
highly hazardous places in the polytechnic institution when
addressing the problems of high incidences and fatality rates. In
conjunction with several topics covered in the technical curricular,
safety and health precaution should be highlighted in order to
connect to few key ideas of being safe. Therefore the assessment of
safety awareness in terms of safety and health about hazardous and
risks at laboratories is needed and has to be incorporated with
technical education and other training programmes. The purpose of
this study was to determine the efficacy of technical laboratory safety
in one of the polytechnics in northern region. The study examined
three related issues that were; the availability of safety material and
equipment, safety practice adopted by technical teachers and
administrator-s safety attitudes in enforcing safety to the students. A
model of efficacy technical laboratory was developed to test the
linear relationship between existing safety material and equipment,
teachers- safety practice and administrators- attitude in enforcing
safety and to identify which of technical laboratory safety issues was
the most pertinent factor to realize safety in technical laboratory.
This was done by analyzing survey-based data sets particularly those
obtained from samples of 210 students in the polytechnic. The
Pearson Correlation was used to measure the association between the
variables and to test the research hypotheses. The result of the study
has found that there was a significant correlation between existing
safety material and equipment, safety practice adopted by teacher
and administrator-s attitude. There was also a significant relationship
between technical laboratory safety and safety practice adopted by
teacher and between technical laboratory safety and administrator
attitude. Hence, safety practice adopted by teacher and administrator
attitude is vital in realizing technical laboratory safety.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: This study adopts a qualitative approach, which
engages in the dialectical discussion on two levels of dyad opposite
views. The first level of the dyad opposite views is the Western
strategic perspective and the Eastern Tai-Chi thinking. The second
level of the dyad opposite views is resource-based view and resource
dependence theory. This study concludes the resource-oriented actions
for competitive advantage as the metaphor of Tai-Chi consisted of yin
and yang. This study argues that the focal firm should adopt bridging
strategy during the core competence development period because its
core competence development is likely to meet its competitor’s needs
of exploring strategy during the competitor’s external resource
development stage. In addition, the focal firm should adopt buffering
strategy during the external resource development period to prevent its
competitor’s the exploiting strategy from attack during the
competitor’s core competence development stage. Consequently, this
study takes a significant first step toward a novel contextualize
understanding of resource development based on strategic perspective
and Tai-Chi thinking providing more fully sustainable strategy for
competitive advantage.
Abstract: The National Blood Center, Thai Red Cross Society is
responsible for providing blood to hospitals all over the country.
When any hospital needs blood, it will have to send the vehicle to
pick up at the NBC. There are a lot of vehicles to pick up blood at the
NBC every day. Each vehicle is usually empty for inbound trip and a
little loaded for outbound. The NBC realized such waste or loss and
there have been the third party offered to distribute blood and charge
for fee. This paper proposes to apply the vehicle routing problem
(VRP) for estimating the fair price. The idea is tested with the real
data during seven-day period of 6 – 12 July 2010 to estimate the fair
price for transporting blood in Bangkok Metropolitan Region.
Abstract: Construction site safety in China has aroused
comprehensive concern all over the world. It is imperative to
investigate the main causes of poor construction site safety. This paper
divides all the causes into four aspects, namely the factors of workers,
object, environment and management and sets up the accident causes
element system based on Delphi Method. This is followed by the
application of structural equation modeling to examine the importance
of each aspect of causes from the standpoints of different roles related
to the construction respectively. The results indicate that all the four
aspects of factors are in need of improvement, and different roles have
different ideas considering the priority of those factors. The paper has
instructive significance for the practitioners to take measures to
improve construction site safety in China accordingly.
Abstract: The research investigates the “impact of VLE on mathematical concepts acquisition of the special education needs (SENs) students at KS4 secondary education sector" in England. The overall aim of the study is to establish possible areas of difficulties to approach for above or below knowledge standard requirements for KS4 students in the acquisition and validation of basic mathematical concepts. A teaching period, in which virtual learning environment (Fronter) was used to emphasise different mathematical perception and symbolic representation was carried out and task based survey conducted to 20 special education needs students [14 actually took part]. The result shows that students were able to process information and consider images, objects and numbers within the VLE at early stages of acquisition process. They were also able to carry out perceptual tasks but with limiting process of different quotient, thus they need teacher-s guidance to connect them to symbolic representations and sometimes coach them through. The pilot study further indicates that VLE curriculum approaches for students were minutely aligned with mathematics teaching which does not emphasise the integration of VLE into the existing curriculum and current teaching practice. There was also poor alignment of vision regarding the use of VLE in realisation of the objectives of teaching mathematics by the management. On the part of teacher training, not much was done to develop teacher-s skills in the technical and pedagogical aspects of VLE that is in-use at the school. The classroom observation confirmed teaching practice will find a reliance on VLE as an enhancer of mathematical skills, providing interaction and personalisation of learning to SEN students.
Abstract: Due to insufficient frequency band and tremendous growth of the mobile users, complex computation is needed for the use of resources. Long distance communication began with the introduction of telegraphs and simple coded pulses, which were used to transmit short messages. Since then numerous advances have rendered reliable transfer of information both easier and quicker. Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires. Wireless network can be broadly categorized in infrastructure network and infrastructure less network. Infrastructure network is one in which we have a base station to serve the mobile users and in the infrastructure less network is one in which no infrastructure is available to serve the mobile users this kind of networks are also known as mobile Adhoc networks. In this paper we have simulated the result for different scenarios with protocols like AODV and DSR; we simulated the result for throughput, delay and receiving traffic in the given scenario.
Abstract: This paper demonstrates how the soft systems
methodology can be used to improve the delivery of a module in data warehousing for fourth year information technology students.
Graduates in information technology needs to have academic skills
but also needs to have good practical skills to meet the skills requirements of the information technology industry. In developing
and improving current data warehousing education modules one has to find a balance in meeting the expectations of various role players such as the students themselves, industry and academia. The soft
systems methodology, developed by Peter Checkland, provides a
methodology for facilitating problem understanding from different world views. In this paper it is demonstrated how the soft systems methodology can be used to plan the improvement of data
warehousing education for fourth year information technology students.
Abstract: Corner detection and optical flow are common techniques for feature-based video stabilization. However, these algorithms are computationally expensive and should be performed at a reasonable rate. This paper presents an algorithm for discarding irrelevant feature points and maintaining them for future use so as to improve the computational cost. The algorithm starts by initializing a maintained set. The feature points in the maintained set are examined against its accuracy for modeling. Corner detection is required only when the feature points are insufficiently accurate for future modeling. Then, optical flows are computed from the maintained feature points toward the consecutive frame. After that, a motion model is estimated based on the simplified affine motion model and least square method, with outliers belonging to moving objects presented. Studentized residuals are used to eliminate such outliers. The model estimation and elimination processes repeat until no more outliers are identified. Finally, the entire algorithm repeats along the video sequence with the points remaining from the previous iteration used as the maintained set. As a practical application, an efficient video stabilization can be achieved by exploiting the computed motion models. Our study shows that the number of times corner detection needs to perform is greatly reduced, thus significantly improving the computational cost. Moreover, optical flow vectors are computed for only the maintained feature points, not for outliers, thus also reducing the computational cost. In addition, the feature points after reduction can sufficiently be used for background objects tracking as demonstrated in the simple video stabilizer based on our proposed algorithm.
Abstract: The dynamic spectrum allocation solutions such as
cognitive radio networks have been proposed as a key technology to
exploit the frequency segments that are spectrally underutilized.
Cognitive radio users work as secondary users who need to
constantly and rapidly sense the presence of primary users or
licensees to utilize their frequency bands if they are inactive. Short
sensing cycles should be run by the secondary users to achieve
higher throughput rates as well as to provide low level of interference
to the primary users by immediately vacating their channels once
they have been detected. In this paper, the throughput-sensing time
relationship in local and cooperative spectrum sensing has been
investigated under two distinct scenarios, namely, constant primary
user protection (CPUP) and constant secondary user spectrum
usability (CSUSU) scenarios. The simulation results show that the
design of sensing slot duration is very critical and depends on the
number of cooperating users under CPUP scenario whereas under
CSUSU, cooperating more users has no effect if the sensing time
used exceeds 5% of the total frame duration.
Abstract: Large volumes of fingerprints are collected and stored
every day in a wide range of applications, including forensics, access
control etc. It is evident from the database of Federal Bureau of
Investigation (FBI) which contains more than 70 million finger
prints. Compression of this database is very important because of this
high Volume. The performance of existing image coding standards
generally degrades at low bit-rates because of the underlying block
based Discrete Cosine Transform (DCT) scheme. Over the past
decade, the success of wavelets in solving many different problems
has contributed to its unprecedented popularity. Due to
implementation constraints scalar wavelets do not posses all the
properties which are needed for better performance in compression.
New class of wavelets called 'Multiwavelets' which posses more
than one scaling filters overcomes this problem. The objective of this
paper is to develop an efficient compression scheme and to obtain
better quality and higher compression ratio through multiwavelet
transform and embedded coding of multiwavelet coefficients through
Set Partitioning In Hierarchical Trees algorithm (SPIHT) algorithm.
A comparison of the best known multiwavelets is made to the best
known scalar wavelets. Both quantitative and qualitative measures of
performance are examined for Fingerprints.