A Novel Reversible Watermarking Method based on Adaptive Thresholding and Companding Technique

Embedding and extraction of a secret information as well as the restoration of the original un-watermarked image is highly desirable in sensitive applications like military, medical, and law enforcement imaging. This paper presents a novel reversible data-hiding method for digital images using integer to integer wavelet transform and companding technique which can embed and recover the secret information as well as can restore the image to its pristine state. The novel method takes advantage of block based watermarking and iterative optimization of threshold for companding which avoids histogram pre and post-processing. Consequently, it reduces the associated overhead usually required in most of the reversible watermarking techniques. As a result, it keeps the distortion small between the marked and the original images. Experimental results show that the proposed method outperforms the existing reversible data hiding schemes reported in the literature.

A Vehicular Visual Tracking System Incorporating Global Positioning System

Surveillance system is widely used in the traffic monitoring. The deployment of cameras is moving toward a ubiquitous camera (UbiCam) environment. In our previous study, a novel service, called GPS-VT, was firstly proposed by incorporating global positioning system (GPS) and visual tracking techniques for the UbiCam environment. The first prototype is called GODTA (GPS-based Moving Object Detection and Tracking Approach). For a moving person carried GPS-enabled mobile device, he can be tracking when he enters the field-of-view (FOV) of a camera according to his real-time GPS coordinate. In this paper, GPS-VT service is applied to the tracking of vehicles. The moving speed of a vehicle is much faster than a person. It means that the time passing through the FOV is much shorter than that of a person. Besides, the update interval of GPS coordinate is once per second, it is asynchronous with the frame rate of the real-time image. The above asynchronous is worsen by the network transmission delay. These factors are the main challenging to fulfill GPS-VT service on a vehicle.In order to overcome the influence of the above factors, a back-propagation neural network (BPNN) is used to predict the possible lane before the vehicle enters the FOV of a camera. Then, a template matching technique is used for the visual tracking of a target vehicle. The experimental result shows that the target vehicle can be located and tracking successfully. The success location rate of the implemented prototype is higher than that of the previous GODTA.

Need to Implement the Environmental Accounting Education for Sustainable Development: An Overview

Environmental accounting is a recent phenomenon in the modern jurisprudence. It may reflect the corporate governance mechanisms in line with the natural resources and environmental sound management and administration systems in any country of the world. It may be a corporate focused on the improving of the environmental quality. But it is often identified that it is ignored due to some reasons such as unconsciousness, lack of ethical education etc. At present, the world community is very much concerned about the state of the environmental accounting and auditing systems as it bears sustainability on the mother earth for our generations. It is one of the important tools for understanding on the role played by the natural environment in the economy. It provides adequate data which is highlighted both in the contribution of natural resources to economic well-being as well as the costs imposed by pollution or resource degradation. It can play a critical role as on be a part of the many international environmental organizations such as IUCN, WWF, PADELIA, WRI etc.; as they have been taking many initiatives for ensuring the environmental accouting for our competent survivals. The global state actors have already taken some greening accounting initiatives under the forum of the United Nations Division for Sustainable Dedevolpment, the United Nations Statistical Division, the United Nations Conference on Environment and development known as Earth Summit in Rio de Janeiro, Johannesburg Conference 2002 etc. This study will provide an overview of the environmental accounting education consisting of 25 respondents based on the primary and secondary sources.

Logic Program for Authorizations

As a security mechanism, authorization is to provide access control to the system resources according to the polices and rules specified by the security strategies. Either by update or in the initial specification, conflicts in authorization is an issue needs to be solved. In this paper, we propose a new approach to solve conflict by using prioritized logic programs and discuss the uniqueness of its answer set. Addressing conflict resolution from logic programming viewpoint and the uniqueness analysis of the answer set provide a novel, efficient approach for authorization conflict resolution.

Automatic Light Control in Domotics using Artificial Neural Networks

Home Automation is a field that, among other subjects, is concerned with the comfort, security and energy requirements of private homes. The configuration of automatic functions in this type of houses is not always simple to its inhabitants requiring the initial setup and regular adjustments. In this work, the ubiquitous computing system vision is used, where the users- action patterns are captured, recorded and used to create the contextawareness that allows the self-configuration of the home automation system. The system will try to free the users from setup adjustments as the home tries to adapt to its inhabitants- real habits. In this paper it is described a completely automated process to determine the light state and act on them, taking in account the users- daily habits. Artificial Neural Network (ANN) is used as a pattern recognition method, classifying for each moment the light state. The work presented uses data from a real house where a family is actually living.

Hybrid Function Method for Solving Nonlinear Fredholm Integral Equations of the Second Kind

A numerical method for solving nonlinear Fredholm integral equations of second kind is proposed. The Fredholm type equations which have many applications in mathematical physics are then considered. The method is based on hybrid function  approximations. The properties of hybrid of block-pulse functions and Chebyshev polynomials are presented and are utilized to reduce the computation of nonlinear Fredholm integral equations to a system of nonlinear. Some numerical examples are selected to illustrate the effectiveness and simplicity of the method.

A Two-Step Approach for Tree-structured XPath Query Reduction

XML data consists of a very flexible tree-structure which makes it difficult to support the storing and retrieving of XML data. The node numbering scheme is one of the most popular approaches to store XML in relational databases. Together with the node numbering storage scheme, structural joins can be used to efficiently process the hierarchical relationships in XML. However, in order to process a tree-structured XPath query containing several hierarchical relationships and conditional sentences on XML data, many structural joins need to be carried out, which results in a high query execution cost. This paper introduces mechanisms to reduce the XPath queries including branch nodes into a much more efficient form with less numbers of structural joins. A two step approach is proposed. The first step merges duplicate nodes in the tree-structured query and the second step divides the query into sub-queries, shortens the paths and then merges the sub-queries back together. The proposed approach can highly contribute to the efficient execution of XML queries. Experimental results show that the proposed scheme can reduce the query execution cost by up to an order of magnitude of the original execution cost.

Geometric Operators in the Selection of Human Resources

We study the possibility of using geometric operators in the selection of human resources. We develop three new methods that use the ordered weighted geometric (OWG) operator in different indexes used for the selection of human resources. The objective of these models is to manipulate the neutrality of the old methods so the decision maker is able to select human resources according to his particular attitude. In order to develop these models, first a short revision of the OWG operator is developed. Second, we briefly explain the general process for the selection of human resources. Then, we develop the three new indexes. They will use the OWG operator in the Hamming distance, in the adequacy coefficient and in the index of maximum and minimum level. Finally, an illustrative example about the new approach is given.

Next Generation IP Address Transition Mechanism for Web Application System

Internet Protocol version 4 (IPv4) address is decreasing and a rapid transition method to the next generation IP address (IPv6) should be established. This study aims to evaluate and select the best performance of the IPv6 address network transitionmechanisms, such as IPv4/IPv6 dual stack, transport Relay Translation (TRT) and Reverse Proxy with additional features. It is also aim to prove that faster access can be done while ensuring optimal usage of available resources used during the test and actual implementation. This study used two test methods such asInternet Control Message Protocol (ICMP)ping and ApacheBenchmark (AB) methodsto evaluate the performance.Performance metrics for this study include aspects ofaverageaccessin one second,time takenfor singleaccess,thedata transfer speed and the costof additional requirements.Reverse Proxy with Caching featureis the most efficientmechanism because of it simpler configurationandthe best performerfrom the test conducted.

An Efficient and Secure Solution for the Problems of ARP Cache Poisoning Attacks

The Address Resolution Protocol (ARP) is used by computers to map logical addresses (IP) to physical addresses (MAC). However ARP is an all trusting protocol and is stateless which makes it vulnerable to many ARP cache poisoning attacks such as Man-in-the-Middle (MITM) and Denial of service (DoS) attacks. These flaws result in security breaches thus weakening the appeal of the computer for exchange of sensitive data. In this paper we describe ARP, outline several possible ARP cache poisoning attacks and give the detailed of some attack scenarios in network having both wired and wireless hosts. We have analyzed each of proposed solutions, identify their strengths and limitations. Finally get that no solution offers a feasible solution. Hence, this paper presents an efficient and secure version of ARP that is able to cope up with all these types of attacks and is also a feasible solution. It is a stateful protocol, by storing the information of the Request frame in the ARP cache, to reduce the chances of various types of attacks in ARP. It is more efficient and secure by broadcasting ARP Reply frame in the network and storing related entries in the ARP cache each time when communication take place.

The Relationship of Knowledge Management Practices, Competencies and the Organizational Performance of Government Departments in Malaysia

This paper attempts to highlight the significant role of knowledge management practices (KMP) and competencies in improving the performance and efficiency of public sector organizations. It appears that public sector organizations in developing countries have not received much attention in the research literature of knowledge management and competencies. Therefore, this paper seeks to explore the role of KMP and competencies in achieving superior performance among public sector organizations in Malaysia in the broader perspective. Survey questionnaires were distributed to all Administrative and Diplomatic Officers (ADS) from 28 ministries located in Putrajaya, Malaysia. This paper also examines preliminary empirical results on the relationship between support for knowledge management practices, competencies, and orientation in Malaysia-s public organizations. This paper supports the notion that the practices of knowledge management at the organizational level are a prerequisite for successful organizational performance. In conclusion, the results not only have the potential to contribute theoretically to both management strategy and knowledge management field literature but also to the area of organizational performance.

A System of Automatic Speech Recognition based on the Technique of Temporal Retiming

We report in this paper the procedure of a system of automatic speech recognition based on techniques of the dynamic programming. The technique of temporal retiming is a technique used to synchronize between two forms to compare. We will see how this technique is adapted to the field of the automatic speech recognition. We will expose, in a first place, the theory of the function of retiming which is used to compare and to adjust an unknown form with a whole of forms of reference constituting the vocabulary of the application. Then we will give, in the second place, the various algorithms necessary to their implementation on machine. The algorithms which we will present were tested on part of the corpus of words in Arab language Arabdic-10 [4] and gave whole satisfaction. These algorithms are effective insofar as we apply them to the small ones or average vocabularies.

Feature Preserving Image Interpolation and Enhancement Using Adaptive Bidirectional Flow

Image interpolation is a common problem in imaging applications. However, most interpolation algorithms in existence suffer visually to some extent the effects of blurred edges and jagged artifacts in the image. This paper presents an adaptive feature preserving bidirectional flow process, where an inverse diffusion is performed to enhance edges along the normal directions to the isophote lines (edges), while a normal diffusion is done to remove artifacts (''jaggies'') along the tangent directions. In order to preserve image features such as edges, angles and textures, the nonlinear diffusion coefficients are locally adjusted according to the first and second order directional derivatives of the image. Experimental results on synthetic images and nature images demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations.

A Quality Optimization Approach: An Application on Next Generation Networks

The next generation wireless systems, especially the cognitive radio networks aim at utilizing network resources more efficiently. They share a wide range of available spectrum in an opportunistic manner. In this paper, we propose a quality management model for short-term sub-lease of unutilized spectrum bands to different service providers. We built our model on competitive secondary market architecture. To establish the necessary conditions for convergent behavior, we utilize techniques from game theory. Our proposed model is based on potential game approach that is suitable for systems with dynamic decision making. The Nash equilibrium point tells the spectrum holders the ideal price values where profit is maximized at the highest level of customer satisfaction. Our numerical results show that the price decisions of the network providers depend on the price and QoS of their own bands as well as the prices and QoS levels of their opponents- bands.

Behavior of Solutions of the System of Recurrence Equations Based on the Verhulst-Pearl Model

By utilizing the system of the recurrence equations, containing two parameters, the dynamics of two antagonistically interconnected populations is studied. The following areas of the system behavior are detected: the area of the stable solutions, the area of cyclic solutions occurrence, the area of the accidental change of trajectories of solutions, and the area of chaos and fractal phenomena. The new two-dimensional diagram of the dynamics of the solutions change (the fractal cabbage) has been obtained. In the cross-section of this diagram for one of the equations the well-known Feigenbaum tree of doubling has been noted.Keywordsbifurcation, chaos, dynamics of populations, fractals

Biochemical and Multiplex PCR Analysis of Toxic Crystal Proteins to Determine Genes in Bacillus thuringiensis Mutants

The Egyptian Bacillus thuringiensis isolate (M5) produce crystal proteins that is toxic against insects was irradiated with UV light to induce mutants. Upon testing 10 of the resulting mutants for their toxicity against cotton leafworm larvae, the three mutants 62, 64 and 85 proved to be the most toxic ones. Upon testing these mutants along with their parental isolate by SDS-PAGE analysis of spores-crystals proteins as well as vegetative cells proteins, new induced bands appeared in the three mutants by UV radiation and also they showed disappearance of some other bands as compared with the wild type isolate. Multiplex PCR technique, with five sets of specific primers, was used to detect the three types of cryI genes cryIAa, cryIAb and cryIAc. Results showed that these three genes exist, as distinctive bands, in the wild type isolate (M5) as well as in mutants 62 and 85, while the mutant 64 had two distinctive bands of cryIAb and cryIAc genes, and a faint band of cryI Aa gene. Finally, these results revealed that mutant 62 is considered as the promising mutant since it is UV resistant, highly toxic against Spodoptera littoralis and active against a wide range of Lepidopteran insects.

Heuristic Optimization Techniques for Network Reconfiguration in Distribution System

Network reconfiguration is an operation to modify the network topology. The implementation of network reconfiguration has many advantages such as loss minimization, increasing system security and others. In this paper, two topics about the network reconfiguration in distribution system are briefly described. The first topic summarizes its impacts while the second explains some heuristic optimization techniques for solving the network reconfiguration problem.

Numerical Study of Liquefied Petroleum Gas Laminar Flow in Cylindrical Elliptic Pipes

Fluid flow in cylinders of elliptic cross-section was investigated. Fluid used is Liquefied petroleum gas (LPG). LPG found in Nigeria contains majorly butane with percentages of propane. Commercial available code FLUENT which uses finite volume method was used to solve fluid flow governing equations. There has been little attention paid to fluid flow in cylindrical elliptic pipes. The present work aims to predict the LPG gas flow in cylindrical pipes of elliptic cross-section. Results of flow parameters of velocity and pressure distributions are presented. Results show that the pressure drop in elliptic pipes is higher than circular pipe of the same cross-sectional area. This is an important result as the pressure drop is related to the pump power needed to drive the flow. Results show that the velocity increases towards centre of the pipe as the flow moves downstream, and also increases towards the outlet of the pipe.

The Effect of Body Condition Score on Hormonal and Vaginal Histological Changes During Estrus of Synchronized Etawah Cross Bred Does

Eight Etawah cross bred does were divided into two groups based on body condition score (BCS). Group I (BSC 2, body weight 25-30 kg; n = 4), and Group II (BSC 3, body weight, 35-40 kg, n=4). All does received intravaginal controlled internal drug release devices (CIDR) for 10 days, and a prostaglandin F2α at 48 h before CIDR removal. Estrus detection was carried out using vasectomized buck. Vaginal epithelium was taken to determine estrus cycle. Blood samples were taken every 3-6 hours, started from moment of CIDR removal until the end of estrus. The results showed vaginal histological indicated estrus occurred at the hours of 25 to 60 and 30 to 70 post CIDR removal in BCS 2 and 3, respectively. Progesterone peak of BCS 2 and BCS 3 were 0.18±0.31 and 0.48±0.31 ng/mL on the hour 0 post CIDR removal. Estradiol -17ß peak of each group was 53.25±35.08 and 89.91±92.84 pg/mL at 48 post CIDR removal. LH surge only occurred on BCS 3 groups, the LH concentrations were 9.9± 9.1; 4.5± 4.0; and 18.2± 9.1 ng/mL at 45, 48 and 51 hours post CIDR removal, respectively. It was concluded that the BCS had effects on vaginal histological changes and LH surge.

Influence of Raw Materials Ratio and Sintering Temperature on the Properties of the Refractory Mullite-Corundum Ceramics

The alumosilicate ceramics with mullite crystalline phase are used in various branches of science and technique. The mullite refractory ceramics with high porosity serve as a heat insulator and as a constructional materials [1], [2]. The purpose of the work was to sinter high porosity ceramic and to increase the quantity of mullite phase in this mullite, mullite-corundum ceramics. Two types of compositions were prepared at during the experiment. The first type is compositions with commercial alumina and silica oxides. The second type is from mixing these oxides with 10, 20 and 30 wt.%. of kaolin. In all samples the Al2O3 and SiO2 were in 2.57:1 ratio, because that was conformed to mullite stechiometric compositions (3Al2O3.2SiO2). The types of alumina oxides were α-Al2O3 (d50=4µm) and γ-Al2O3 (d50=80µm). Ratios of α-: γ-Al2O3 were (1:1) or (1:3). The porous materials were prepared by slip casting of suspension of raw materials. The aluminium paste (0.18 wt.%) was used as a pore former. Water content in the suspensions was 26-47 wt.%. Pore formation occurred as a result of hydrogen formation in chemical reaction between aluminium paste and water [2]. The samples were sintered at the temperature of 1650°C and 1750°C for one hour. The increasing amount of kaolin, α-: γ-Al2O3 at the ratio (1:3) and sintering at the highest temperature raised the quantity of mullite phase. The mullite phase began to dominate over the corundum phase.