Abstract: The calculation of buckling length factor (K) for steel
frames columns is a major and governing processes to determine the
dimensions steel frame columns cross sections during design. The
buckling length of steel frames columns has a direct effect on the cost
(weight) of using cross section. A new formula is required to
determine buckling length factor (K) by simplified way. In this
research a new formula for buckling length factor (K) was established
to determine by accurate method for a limited interval of columns
ends rigidity (GA, GB). The new formula can be used ease to
evaluate the buckling length factor without needing to complicated
equations or difficult charts.
Abstract: Molar excess Volumes, VE ijk and speeds of sound , uijk of 2-pyrrolidinone (i) + benzene or toluene (j) + ethanol (k) ternary mixture have been measured as a function of composition at 308.15 K. The observed speeds of sound data have been utilized to determine excess isentropic compressiblities, ( E S κ )ijk of ternary (i + j + k) mixtures. Molar excess volumes, VE ijk and excess isentropic compressibilities, ( E S κ )ijk data have fitted to the Redlich-Kister equation to calculate ternary adjustable parameters and standard deviations. The Moelywn-Huggins concept (Huggins in Polymer 12: 389-399, 1971) of connectivity between the surfaces of the constituents of binary mixtures has been extended to ternary mixtures (using the concept of a connectivity parameter of third degree of molecules, 3ξ , which inturn depends on its topology) to obtain an expression that describes well the measured VE ijk and ( E S κ )ijk data.
Abstract: En bloc assumes modeling all phases of the orthostatic test with the only one mathematical model, which allows the complex parametric view of orthostatic response. The work presents the implementation of a mathematical model for processing of the measurements of systolic, diastolic blood pressure and heart rate performed on volunteers during orthostatic test. The original assumption of model hypothesis that every postural change means only one Stressor, did not complying with the measurements of physiological circulation factor-time profiles. Results of the identification support the hypothesis that second postural change of orthostatic test causes induced Stressors, with the observation of a physiological regulation mechanism. Maximal demonstrations are on the heart rate and diastolic blood pressure-time profile, minimal are for the measurements of the systolic blood pressure. Presented study gives a new view on orthostatic test with impact on clinical practice.
Abstract: Many Thai movies have been very popular
domestically and internationally. Some movies were box office hits
and receiving awards. However, there has not yet been research
about how Thai movies can sell in international markets
The objectives of the research were 1) To analyze the
characteristics of Thai movies that can sell to world audiences; 2) To
investigate the factors making Thai movies into foreign markets. Thai
film professionals were interviewed. Their ideas were analyzed to
find out what factors contributing to Thai movies widely seen in
worldwide markets. Nine foreign audiences were also interviewed to
reveal what characteristics of Thai movies would be well accepted by
the markets.
The results showed that major characteristics of Thai movies
proving successful worldwide were cultural and exotic Thai movies,
outstanding genres, well-known actors, music and songs. Factors
contributing to global market were marketing, qualities of Thai
movies, and financial support from the government.
Abstract: Nanostructured materials have attracted many
researchers due to their outstanding mechanical and physical
properties. For example, carbon nanotubes (CNTs) or carbon
nanofibres (CNFs) are considered to be attractive reinforcement
materials for light weight and high strength metal matrix composites.
These composites are being projected for use in structural
applications for their high specific strength as well as functional
materials for their exciting thermal and electrical characteristics. The
critical issues of CNT-reinforced MMCs include processing
techniques, nanotube dispersion, interface, strengthening mechanisms
and mechanical properties. One of the major obstacles to the effective
use of carbon nanotubes as reinforcements in metal matrix
composites is their agglomeration and poor distribution/dispersion
within the metallic matrix. In order to tap into the advantages of the
properties of CNTs (or CNFs) in composites, the high dispersion of
CNTs (or CNFs) and strong interfacial bonding are the key issues
which are still challenging. Processing techniques used for synthesis
of the composites have been studied with an objective to achieve
homogeneous distribution of carbon nanotubes in the matrix.
Modified mechanical alloying (ball milling) techniques have emerged
as promising routes for the fabrication of carbon nanotube (CNT)
reinforced metal matrix composites. In order to obtain a
homogeneous product, good control of the milling process, in
particular control of the ball movement, is essential. The control of
the ball motion during the milling leads to a reduction in grinding
energy and a more homogeneous product. Also, the critical inner
diameter of the milling container at a particular rotational speed can
be calculated. In the present work, we use conventional and modified
mechanical alloying to generate a homogenous distribution of 2 wt.
% CNT within Al powders. 99% purity Aluminium powder (Acros,
200mesh) was used along with two different types of multiwall
carbon nanotube (MWCNTs) having different aspect ratios to
produce Al-CNT composites. The composite powders were processed
into bulk material by compaction, and sintering using a cylindrical
compaction and tube furnace. Field Emission Scanning electron
microscopy (FESEM), X-Ray diffraction (XRD), Raman
spectroscopy and Vickers macro hardness tester were used to
evaluate CNT dispersion, powder morphology, CNT damage, phase
analysis, mechanical properties and crystal size determination.
Despite the success of ball milling in dispersing CNTs in Al powder,
it is often accompanied with considerable strain hardening of the Al
powder, which may have implications on the final properties of the
composite. The results show that particle size and morphology vary
with milling time. Also, by using the mixing process and sonication
before mechanical alloying and modified ball mill, dispersion of the
CNTs in Al matrix improves.
Abstract: In this paper a modified version NXM of traditional 5X5 playfair cipher is introduced which enable the user to encrypt message of any Natural language by taking appropriate size of the matrix depending upon the size of the natural language. 5X5 matrix has the capability of storing only 26 characters of English language and unable to store characters of any language having more than 26 characters. To overcome this limitation NXM matrix is introduced which solve this limitation. In this paper a special case of Urdu language is discussed. Where # is used for completing odd pair and * is used for repeating letters.
Abstract: This paper presents the results of enhancing images from a left and right stereo pair in order to increase the resolution of a 3D representation of a scene generated from that same pair. A new neural network structure known as a Self Delaying Dynamic Network (SDN) has been used to perform the enhancement. The advantage of SDNs over existing techniques such as bicubic interpolation is their ability to cope with motion and noise effects. SDNs are used to generate two high resolution images, one based on frames taken from the left view of the subject, and one based on the frames from the right. This new high resolution stereo pair is then processed by a disparity map generator. The disparity map generated is compared to two other disparity maps generated from the same scene. The first is a map generated from an original high resolution stereo pair and the second is a map generated using a stereo pair which has been enhanced using bicubic interpolation. The maps generated using the SDN enhanced pairs match more closely the target maps. The addition of extra noise into the input images is less problematic for the SDN system which is still able to out perform bicubic interpolation.
Abstract: Ventilation is a fundamental requirement for
occupant health and indoor air quality in buildings. Natural
ventilation can be used as a design strategy in free-running
buildings to:
• Renew indoor air with fresh outside air and lower room
temperatures at times when the outdoor air is cooler.
• Promote air flow to cool down the building structure
(structural cooling).
• Promote occupant physiological cooling processes
(comfort cooling).
This paper focuses on ways in which ventilation can
provide the mechanism for heat dissipation and cooling of the
building structure..It also discusses use of ventilation as a
means of increasing air movement to improve comfort when
indoor air temperatures are too high. The main influencing
factors and design considerations and quantitative guidelines
to help meet the design objectives are also discussed.
Abstract: The Chinese Postman Problem (CPP) is one of the
classical problems in graph theory and is applicable in a wide range
of fields. With the rapid development of hybrid systems and model
based testing, Chinese Postman Problem with Time Dependent Travel
Times (CPPTDT) becomes more realistic than the classical problems.
In the literature, we have proposed the first integer programming
formulation for the CPPTDT problem, namely, circuit formulation,
based on which some polyhedral results are investigated and a cutting
plane algorithm is also designed. However, there exists a main drawback:
the circuit formulation is only available for solving the special
instances with all circuits passing through the origin. Therefore, this
paper proposes a new integer programming formulation for solving
all the general instances of CPPTDT. Moreover, the size of the circuit
formulation is too large, which is reduced dramatically here. Thus, it
is possible to design more efficient algorithm for solving the CPPTDT
in the future research.
Abstract: Wireless Mesh Networking is a promising proposal
for broadband data transmission in a large area with low cost and
acceptable QoS. These features- trade offs in WMNs is a hot research
field nowadays. In this paper a mathematical optimization framework
has been developed to maximize throughput according to upper
bound delay constraints. IEEE 802.11 based infrastructure
backhauling mode of WMNs has been considered to formulate the
MINLP optimization problem. Proposed method gives the full
routing and scheduling procedure in WMN in order to obtain
mentioned goals.
Abstract: This paper describes the design and results of FROID,
an outbound intrusion detection system built with agent technology
and supported by an attacker-centric ontology. The prototype
features a misuse-based detection mechanism that identifies remote
attack tools in execution. Misuse signatures composed of attributes
selected through entropy analysis of outgoing traffic streams and
process runtime data are derived from execution variants of attack
programs. The core of the architecture is a mesh of self-contained
detection cells organized non-hierarchically that group agents in a
functional fashion. The experiments show performance gains when
the ontology is enabled as well as an increase in accuracy achieved
when correlation cells combine detection evidence received from
independent detection cells.
Abstract: Digital watermarking is the process of embedding
information into a digital signal which can be used in DRM (digital
rights managements) system. The visible watermark (often called logo)
can indicate the owner of the copyright which can often be seen in the
TV program and protects the copyright in an active way. However,
most of the schemes do not consider the visible watermark removing
process. To solve this problem, a visible watermarking scheme with
embedding and removing process is proposed under the control of a
secure template. The template generates different version of
watermarks which can be seen visually the same for different users.
Users with the right key can completely remove the watermark and
recover the original image while the unauthorized user is prevented to
remove the watermark. Experiment results show that our
watermarking algorithm obtains a good visual quality and is hard to be
removed by the illegally users. Additionally, the authorized users can
completely remove the visible watermark and recover the original
image with a good quality.
Abstract: A great deal of research works in the field information
systems security has been based on a positivist paradigm. Applying
the reductionism concept of the positivist paradigm for information
security means missing the bigger picture and thus, the lack of holism
which could be one of the reasons why security is still overlooked,
comes as an afterthought or perceived from a purely technical
dimension. We need to reshape our thinking and attitudes towards
security especially in a complex and dynamic environment such as e-
Business to develop a holistic understanding of e-Business security in
relation to its context as well as considering all the stakeholders in
the problem area. In this paper we argue the suitability and need for
more inductive interpretive approach and qualitative research method
to investigate e-Business security. Our discussion is based on a
holistic framework of enquiry, nature of the research problem, the
underling theoretical lens and the complexity of e-Business
environment. At the end we present a research strategy for
developing a holistic framework for understanding of e-Business
security problems in the context of developing countries based on an
interdisciplinary inquiry which considers their needs and
requirements.
Abstract: In this paper, we propose a morphing method by which face color images can be freely transformed. The main focus of this work is the transformation of one face image to another. This method is fully automatic in that it can morph two face images by automatically detecting all the control points necessary to perform the morph. A face detection neural network, edge detection and medium filters are employed to detect the face position and features. Five control points, for both the source and target images, are then extracted based on the facial features. Triangulation method is then used to match and warp the source image to the target image using the control points. Finally color interpolation is done using a color Gaussian model that calculates the color for each particular frame depending on the number of frames used. A real coded Genetic algorithm is used in both the image warping and color blending steps to assist in step size decisions and speed up the morphing. This method results in ''very smooth'' morphs and is fast to process.
Abstract: A robust AUSM+ upwind discretisation scheme has been developed to simulate multiphase flow using consistent spatial discretisation schemes and a modified low-Mach number diffusion term. The impact of the selection of an interfacial pressure model has also been investigated. Three representative test cases have been simulated to evaluate the accuracy of the commonly-used stiffenedgas equation of state with respect to the IAPWS-IF97 equation of state for water. The algorithm demonstrates a combination of robustness and accuracy over a range of flow conditions, with the stiffened-gas equation tending to overestimate liquid temperature and density profiles.
Abstract: A mathematical model for the hydrodynamics of a
surface water treatment pilot plant was developed and validated by
the determination of the residence time distribution (RTD) for the
main equipments of the unit. The well known models of ideal/real
mixing, ideal displacement (plug flow) and (one-dimensional axial)
dispersion model were combined in order to identify the structure
that gives the best fitting of the experimental data for each equipment
of the pilot plant. RTD experimental results have shown that pilot
plant hydrodynamics can be quite well approximated by a
combination of simple mathematical models, structure which is
suitable for engineering applications. Validated hydrodynamic
models will be further used in the evaluation and selection of the
most suitable coagulation-flocculation reagents, optimum operating
conditions (injection point, reaction times, etc.), in order to improve
the quality of the drinking water.
Abstract: In this work, we present for the first time in our
perception an efficient digital watermarking scheme for mpeg audio
layer 3 files that operates directly in the compressed data domain,
while manipulating the time and subband/channel domain. In
addition, it does not need the original signal to detect the watermark.
Our scheme was implemented taking special care for the efficient
usage of the two limited resources of computer systems: time and
space. It offers to the industrial user the capability of watermark
embedding and detection in time immediately comparable to the real
music time of the original audio file that depends on the mpeg
compression, while the end user/audience does not face any artifacts
or delays hearing the watermarked audio file. Furthermore, it
overcomes the disadvantage of algorithms operating in the PCMData
domain to be vulnerable to compression/recompression attacks,
as it places the watermark in the scale factors domain and not in the
digitized sound audio data. The strength of our scheme, that allows it
to be used with success in both authentication and copyright
protection, relies on the fact that it gives to the users the enhanced
capability their ownership of the audio file not to be accomplished
simply by detecting the bit pattern that comprises the watermark
itself, but by showing that the legal owner knows a hard to compute
property of the watermark.
Abstract: To simulate expected climate change, we implemented a two-factor (temperature and soil moisture) field design in a forest in Ontario, Canada. To manipulate moisture input, we erected rain-exclusion structures. Under each structure, plots were watered with one of three treatments and thermally controlled with three heat treatments to simulate changes in air temperature and rainfall based on the climate model (GCM) predictions for the study area. Environmental conditions (including untreated controls) were monitored tracking air temperature, soil temperature, soil moisture, and photosynthetically active radiation. We measured rainfall and relative humidity at the site outside the rain-exclusion structures. Analyses of environmental conditions demonstrates that the temperature manipulation was most effective at maintaining target temperature during the early part of the growing season, but it was more difficult to keep the warmest treatment at 5º C above ambient by late summer. Target moisture regimes were generally achieved however incoming solar radiation was slightly attenuated by the structures.
Abstract: Lossless compression schemes with secure
transmission play a key role in telemedicine applications that helps in
accurate diagnosis and research. Traditional cryptographic algorithms
for data security are not fast enough to process vast amount of data.
Hence a novel Secured lossless compression approach proposed in
this paper is based on reversible integer wavelet transform, EZW
algorithm, new modified runlength coding for character
representation and selective bit scrambling. The use of the lifting
scheme allows generating truly lossless integer-to-integer wavelet
transforms. Images are compressed/decompressed by well-known
EZW algorithm. The proposed modified runlength coding greatly
improves the compression performance and also increases the
security level. This work employs scrambling method which is fast,
simple to implement and it provides security. Lossless compression
ratios and distortion performance of this proposed method are found
to be better than other lossless techniques.
Abstract: This paper will present the initial findings of a
research into distributed computer rendering. The goal of the
research is to create a distributed computer system capable of
rendering a 3D model into an MPEG-4 stream. This paper outlines
the initial design, software architecture and hardware setup for the
system.
Distributed computing means designing and implementing
programs that run on two or more interconnected computing systems.
Distributed computing is often used to speed up the rendering of
graphical imaging. Distributed computing systems are used to
generate images for movies, games and simulations.
A topic of interest is the application of distributed computing to
the MPEG-4 standard. During the course of the research, a
distributed system will be created that can render a 3D model into an
MPEG-4 stream. It is expected that applying distributed computing
principals will speed up rendering, thus improving the usefulness and
efficiency of the MPEG-4 standard