Abstract: Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.
Abstract: Electromagnetic flow meter by measuring the varying of magnetic flux, which is related to the velocity of conductive flow, can measure the rate of fluids very carefully and precisely. Electromagnetic flow meter operation is based on famous Faraday's second Law. In these equipments, the constant magnetostatic field is produced by electromagnet (winding around the tube) outside of pipe and inducting voltage that is due to conductive liquid flow is measured by electrodes located on two end side of the pipe wall. In this research, we consider to 2-dimensional mathematical model that can be solved by numerical finite difference (FD) solution approach to calculate induction potential between electrodes. The fundamental concept to design the electromagnetic flow meter, exciting winding and simulations are come out by using MATLAB and PDE-Tool software. In the last stage, simulations results will be shown for improvement and accuracy of technical provision.
Abstract: In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: The aim of this study was to establish the relationship between the principles of Educational Sport and the objectives of Physical Education in two brasilian laws: National Curriculum Guidelines (PCNs) for the Elementary and Middle School Levels and the Guidelines and Basis Legislation (LDB). The method used was the survey analysis in order to determine the practices present in, or the opinions of, a specific population. The instrument used in this research was a questionnaire. After a broad review of the bibliography and according to the methodological procedures, the aim was to set the relationships between the Principles of Educational Sport and the objectives of Physical Education, according to the Brazilian Law (LDB) and National Curriculum Guidelines (PCNs) in a table made under the analysis of a group of specialists. As the relation between the principles of Educational Sport and the objectives of School Physical Education have shown, we can state that School Physical Education has gained pedagogical security for the potential use of Educational Sport as part of its contents.
Abstract: This paper deals with the application of a fuzzy set in
measuring teachers- beliefs about mathematics. The vagueness of
beliefs was transformed into standard mathematical values using a
fuzzy preferences model. The study employed a fuzzy approach
questionnaire which consists of six attributes for measuring
mathematics teachers- beliefs about mathematics. The fuzzy conjoint
analysis approach based on fuzzy set theory was used to analyze the
data from twenty three mathematics teachers from four secondary
schools in Terengganu, Malaysia. Teachers- beliefs were recorded in
form of degrees of similarity and its levels of agreement. The
attribute 'Drills and practice is one of the best ways of learning
mathematics' scored the highest degree of similarity at 0. 79860 with
level of 'strongly agree'. The results showed that the teachers- beliefs
about mathematics were varied. This is shown by different levels of
agreement and degrees of similarity of the measured attributes.
Abstract: International competitiveness receives much attention
nowadays, but up to now its assessment has been heavily based on
manufacturing industry statistics. This paper addresses the need for
competitiveness indicators that cover the service sector and sets out a
multilevel framework for measuring international services trade
competitiveness. The approach undertaken here aims at
comparatively examining the international competitiveness of the
EU-25 (the twenty-five European Union member states before the 1st
of January 2007), Romanian and Bulgarian services trade, as well as
the last two countries- structure of specialization on the EU-25
services market. The primary changes in the international
competitiveness of three major services sectors – transportation,
travel and other services - are analyzed. This research attempts to
determine the ability of the two recent European Union (EU) member
states to contend with the challenges that might arise from the hard
competition within the enlarged EU, in the field of services trade.
Abstract: The gustatory system allows animals to distinguish
varieties of food and affects greatly the consumption of food, hence
the health and growth of animals. In the current study, we
investigated the histogenesis of vallate papillae (VLP) in the rabbit
tongue using light and scanning electron microscopy. Samples were
obtained from rabbit embryos at the embryonic days 16-30 (E16-30),
and from newborns until maturity; 6 months. At E16, the first
primordia of vallate papillae were observed as small pits on the
surface epithelium of the tongue-s root. At E18, the caudal part was
prominent with loose mesenchymal tissue core; meanwhile the rostral
part of the papilla was remained as a thick mass of epithelial cells. At
E20-24, the side epithelium formed the primitive annular groove. At
E26, the primitive taste buds appeared only at the papillary surface
and reached their maturity by E28. The annular groove started to
appear at E26 became more defined at E28. The definitive vallate
papillae with substantial number of apparently mature taste buds
were observed by the end of the second week. We conclude that the
vallate papillae develop early and mature during the early postnatal
life.
Abstract: Bacterial molecular chaperone DnaK plays an essential role in protein folding, stress response and transmembrane targeting of proteins. DnaKs from many bacterial species, including Escherichia coli, Salmonella typhimurium and Haemophilus infleunzae are the molecular targets for the insect-derived antimicrobial peptide pyrrhocoricin. Pyrrhocoricin-like peptides bind in the substrate recognition tunnel. Despite the high degree of crossspecies sequence conservation in the substrate-binding tunnel, some bacteria are not sensitive to pyrrhocoricin. This work addresses the molecular mechanism of resistance of Helicobacter pylori DnaK to pyrrhocoricin. Homology modelling, structural and sequence analysis identify a single aminoacid substitution at the interface between the lid and the β-sandwich subdomains of the DnaK substrate-binding domain as the major determinant for its resistance.
Abstract: Calcium [Ca2+] is an important second messenger
which plays an important role in signal transduction. There are
several parameters that affect its concentration profile like buffer
source etc. The effect of stationary immobile buffer on Ca2+
concentration has been incorporated which is a very important
parameter needed to be taken into account in order to make the
model more realistic. Interdependence of all the important parameters
like diffusion coefficient and influx over [Ca2+] profile has been
studied. Model is developed in the form of advection diffusion
equation together with buffer concentration. A program has been
developed using finite volume method for the entire problem and
simulated on an AMD-Turion 32-bit machine to compute the
numerical results.
Abstract: This study presents a simulation model for converting coal to methanol, based on gasification technology with the commercial chemical process simulator, Pro/II® V8.1.1. The methanol plant consists of air separation unit (ASU), gasification unit, gas clean-up unit, and methanol synthetic unit. The clean syngas is produced with the first three operating units, and the model has been verified with the reference data from United States Environment Protection Agency. The liquid phase methanol (LPMEOHTM) process is adopted in the methanol synthetic unit. Clean syngas goes through gas handing section to reach the reaction requirement, reactor loop/catalyst to generate methanol, and methanol distillation to get desired purity over 99.9 wt%. The ratio of the total energy combined with methanol and dimethyl ether to that of feed coal is 78.5% (gross efficiency). The net efficiency is 64.2% with the internal power consumption taken into account, based on the assumption that the efficiency of electricity generation is 40%.
Abstract: In this study, we sought to investigate the mercury
removal efficiency of manganese oxides from natural gas. The
fundamental studies on mercury removal with manganese oxides
sorbents were carried out in a laboratory scale fixed bed reactor at 30
°C with a mixture of methane (20%) and nitrogen gas laden with 4.8
ppb of elemental mercury. Manganese oxides with varying surface
area and crystalline phase were prepared by conventional precipitation
method in this study. The effects of surface area, crystallinity and
other metal oxides on mercury removal efficiency were investigated.
Effect of Ag impregnation on mercury removal efficiency was also
investigated. Ag supported on metal oxide such titania and zirconia as
reference materials were also used in this study for comparison. The
characteristics of mercury removal reaction with manganese oxide
was investigated using a temperature programmed desorption (TPD)
technique.
Manganese oxides showed very high Hg removal activity (about
73-93% Hg removal) for first time use. Surface area of the manganese
oxide samples decreased after heat-treatment and resulted in complete
loss of Hg removal ability for repeated use after Hg desorption in the
case of amorphous MnO2, and 75% loss of the initial Hg removal
activity for the crystalline MnO2. Mercury desorption efficiency of
crystalline MnO2 was very low (37%) for first time use and high (98%)
after second time use. Residual potassium content in MnO2 may have
some effect on the thermal stability of the adsorbed Hg species.
Desorption of Hg from manganese oxides occurs at much higher
temperatures (with a peak at 400 °C) than Ag/TiO2 or Ag/ZrO2.
Mercury may be captured on manganese oxides in the form of mercury
manganese oxide.
Abstract: In this paper, the structural genetic algorithm is used to optimize the neural network to control the joint movements of robotic arm. The robotic arm has also been modeled in 3D and simulated in real-time in MATLAB. It is found that Neural Networks provide a simple and effective way to control the robot tasks. Computer simulation examples are given to illustrate the significance of this method. By combining Genetic Algorithm optimization method and Neural Networks for the given robotic arm with 5 D.O.F. the obtained the results shown that the base joint movements overshooting time without controller was about 0.5 seconds, while with Neural Network controller (optimized with Genetic Algorithm) was about 0.2 seconds, and the population size of 150 gave best results.
Abstract: The concept of e-government has begun to spread among countries. It is based on the use of information communication technology (ICT) to fully utilize government resources, as well as to provide government services to citizens, investors and foreigners. Critical factors are the factors that are determined by the senior management of each organization; the success or failure of the organization depends on the effective implementation of critical factors. These factors vary from one organization to another according to their activity, size and functions. It is very important that organizations identify them in order to avoid the risk of implementing initiatives that may fail to work, while simultaneously exploiting opportunities that may succeed in working. The main focus of this paper is to investigate the majority of critical success factors (CSFs) associated with the implementation of e-government projects. This study concentrates on both technical and nontechnical factors. This paper concludes by listing the majority of CSFs relating to successful e-government implementation in Bahrain.
Abstract: In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to fragile watermarking since it is the usual scheme for authentication.We then analyze the requirements for image authentication and integrity in medical imagery, and we show finally that invertible schemes are the best suited for this particular field. A well known authentication method is studied. This technique is then adapted here for interleaving patient information and message authentication code with medical images in a reversible manner, that is using lossless compression. The resulting scheme enables on a side the exact recovery of the original image that can be unambiguously authenticated, and on the other side, the patient information to be saved or transmitted in a confidential way. To ensure greater security the patient information is encrypted before being embedded into images.
Abstract: Nowaday-s, many organizations use systems that
support business process as a whole or partially. However, in some
application domains, like software development and health care
processes, a normative Process Aware System (PAS) is not suitable,
because a flexible support is needed to respond rapidly to new
process models. On the other hand, a flexible Process Aware System
may be vulnerable to undesirable and fraudulent executions, which
imposes a tradeoff between flexibility and security. In order to make
this tradeoff available, a genetic-based anomaly detection model for
logs of Process Aware Systems is presented in this paper. The
detection of an anomalous trace is based on discovering an
appropriate process model by using genetic process mining and
detecting traces that do not fit the appropriate model as anomalous
trace; therefore, when used in PAS, this model is an automated
solution that can support coexistence of flexibility and security.
Abstract: Research in distributed artificial intelligence and multiagent systems consider how a set of distributed entities can interact and coordinate their actions in order to solve a given problem. In this paper an overview of this concept and its evolution is presented particularly its application in the design of intelligent tutoring systems. An intelligent tutor based on the concept of agent and centered specifically on the design of a pedagogue agent is illustrated. Our work has two goals: the first one concerns the architecture aspect and the design of a tutor using multiagent approach. The second one deals particularly with the design of a part of a tutor system: the pedagogue agent.
Abstract: A perfect secret-sharing scheme is a method to distribute a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of participants in any unqualified subset is statistically independent of the secret. The collection of all qualified subsets is called the access structure of the perfect secret-sharing scheme. In a graph-based access structure, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing the access structure based on G is defined as AR = (Pv2V (G) H(v))/(|V (G)|H(s)), where s is the secret and v is the share of v, both are random variables from and H is the Shannon entropy. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing a given access structure is called the optimal average information ratio of that access structure. Most known results about the optimal average information ratio give upper bounds or lower bounds on it. In this present structures based on bipartite graphs and determine the exact values of the optimal average information ratio of some infinite classes of them.
Abstract: S-Curves are commonly used in technology forecasting. They show the paths of product performance in relation to time or investment in R&D. It is a useful tool to describe the inflection points and the limit of improvement of a technology. Companies use this information to base their innovation strategies.
However inadequate use and some limitations of this technique lead
to problems in decision making. In this paper first technology
forecasting and its importance for company level strategies will be
discussed. Secondly the S-Curve and its place among other
forecasting techniques will be introduced. Thirdly its use in
technology forecasting will be discussed based on its advantages,
disadvantages and limitations. Finally an application of S-curve on
3D TV technology using patent data will also be presented and the
results will be discussed.
Abstract: This paper presents the system identification by
physical-s law method and designs the controller for the Azimuth
Angle Control of the Platform of the Multi-Launcher Rocket System
(MLRS) by Root Locus technique. The plant mathematical model
was approximated using MATLAB for simulation and analyze the
system. The controller proposes the implementation of PID
Controller using Programmable Logic Control (PLC) for control the
plant. PID Controllers are widely applicable in industrial sectors and
can be set up easily and operate optimally for enhanced productivity,
improved quality and reduce maintenance requirement. The results
from simulation and experiments show that the proposed a PID
Controller to control the elevation angle that has superior control
performance by the setting time less than 12 sec, the rise time less
than 1.6 sec., and zero steady state. Furthermore, the system has a
high over shoot that will be continue development.