Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: The focal aspire of e-Government (eGovt) is to offer
citizen-centered service delivery. Accordingly, the citizenry
consumes services from multiple government agencies through
national portal. Thus, eGovt is an enterprise with the primary
business motive of transparent, efficient and effective public services
to its citizenry and its logical structure is the eGovernment Enterprise
Architecture (eGEA). Since eGovt is IT oriented multifaceted
service-centric system, EA doesn’t do much on an automated
enterprise other than the business artifacts. Service-Oriented
Architecture (SOA) manifestation led some governments to pertain
this in their eGovts, but it limits the source of business artifacts. The
concurrent use of EA and SOA in eGovt executes interoperability and
integration and leads to Service-Oriented e-Government Enterprise
(SOeGE). Consequently, agile eGovt system becomes a reality. As an
IT perspective eGovt comprises of centralized public service artifacts
with the existing application logics belong to various departments at
central, state and local level. The eGovt is renovating to SOeGE by
apply the Service-Orientation (SO) principles in the entire system.
This paper explores IT perspective of SOeGE in India which
encompasses the public service models and illustrated with a case
study the Passport service of India.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: The paper describes a Chinese shadow play animation
system based on Kinect. Users, without any professional training, can
personally manipulate the shadow characters to finish a shadow play
performance by their body actions and get a shadow play video
through giving the record command to our system if they want. In our
system, Kinect is responsible for capturing human movement and
voice commands data. Gesture recognition module is used to control
the change of the shadow play scenes. After packaging the data from
Kinect and the recognition result from gesture recognition module,
VRPN transmits them to the server-side. At last, the server-side uses
the information to control the motion of shadow characters and video
recording. This system not only achieves human-computer interaction,
but also realizes the interaction between people. It brings an
entertaining experience to users and easy to operate for all ages. Even
more important is that the application background of Chinese shadow
play embodies the protection of the art of shadow play animation.
Abstract: We present a trigonometric scheme to approximate a
circular arc with its two end points and two end tangents/unit
tangents. A rational cubic trigonometric Bézier curve is constructed
whose end control points are defined by the end points of the circular
arc. Weight functions and the remaining control points of the cubic
trigonometric Bézier curve are estimated by variational approach to
reproduce a circular arc. The radius error is calculated and found less
than the existing techniques.
Abstract: The paper involves a chain of activities from
synthesis, establishment of the methodology for characterization and
testing of novel protective materials through the pilot production and
application on model supports.
It summarizes the results regarding the development of the pilot
production protocol for newly developed self-cleaning materials. The
optimization of the production parameters was completed in order to
improve the most important functional properties (mineralogy
characteristics, particle size, self-cleaning properties and
photocatalytic activity) of the newly designed nanocomposite
material.
Abstract: To develop AZ91D magnesium alloys with improved
properties, we have applied TiN and VN/TiN multilayer coatings
using DC magnetron sputter technique. Coating structure, surface
morphology, chemical bonding and corrosion resistance of coatings
were analyzed by x-ray diffraction (XRD), scanning electron
microscope (SEM), x-ray photoelectron spectroscopy (XPS), and
tafel extrapolation method, respectively. XPS analysis reveal that VN
overlayer reacts with oxygen at the VN/TiN interface and forms more
stable TiN layer. Morphological investigations and the corrosion
results show that VN/TiN multilayer thin film coatings are quite
effective to optimize the corrosion resistance of Mg alloys.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.
Abstract: Laplace transformations have wide applications in
engineering and sciences. All previous studies of modified Laplace
transformations depend on differential equation with initial
conditions. The purpose of our paper is to solve the linear differential
equations (not initial value problem) and then find the general
solution (not particular) via the Laplace transformations without
needed any initial condition. The study involves both types of
differential equations, ordinary and partial.
Abstract: The final step to complete the “Analytical Systems
Engineering Process” is the “Allocated Architecture” in which all
Functional Requirements (FRs) of an engineering system must be
allocated into their corresponding Physical Components (PCs). At
this step, any design for developing the system’s allocated
architecture in which no clear pattern of assigning the exclusive
“responsibility” of each PC for fulfilling the allocated FR(s) can be
found is considered a poor design that may cause difficulties in
determining the specific PC(s) which has (have) failed to satisfy a
given FR successfully. The present study utilizes the Axiomatic
Design method principles to mathematically address this problem and
establishes an “Axiomatic Model” as a solution for reaching good
alternatives for developing the allocated architecture. This study
proposes a “loss Function”, as a quantitative criterion to monetarily
compare non-ideal designs for developing the allocated architecture
and choose the one which imposes relatively lower cost to the
system’s stakeholders. For the case-study, we use the existing design
of U. S. electricity marketing subsystem, based on data provided by
the U.S. Energy Information Administration (EIA). The result for
2012 shows the symptoms of a poor design and ineffectiveness due to
coupling among the FRs of this subsystem.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.
Abstract: Metal matrix composites (MMCs) attract considerable
attention as a result from its ability in providing a high strength, high
modulus, high toughness, high impact properties, improving wear
resistance and providing good corrosion resistance compared to
unreinforced alloy. Aluminium Silicon (Al/Si) alloy MMC has been
widely used in various industrial sectors such as in transportation,
domestic equipment, aerospace, military, construction, etc.
Aluminium silicon alloy is an MMC that had been reinforced with
aluminium nitrate (AlN) particle and become a new generation
material use in automotive and aerospace sector. The AlN is one of
the advance material that have a bright prospect in future since it has
features such as lightweight, high strength, high hardness and
stiffness quality. However, the high degree of ceramic particle
reinforcement and the irregular nature of the particles along the
matrix material that contribute to its low density is the main problem
which leads to difficulties in machining process. This paper examined
the tool wear when milling AlSi/AlN Metal Matrix Composite using
a TiB2 (Titanium diboride) coated carbide cutting tool. The volume
of the AlN reinforced particle was 10% and milling process was
carried out under dry cutting condition. The TiB2 coated carbide
insert parameters used were at the cutting speed of (230, 300 and
370m/min, feed rate of 0.8, Depth of Cut (DoC) at 0.4m). The
Sometech SV-35 video microscope system used to quantify of the
tool wear. The result shown that tool life span increasing with the
cutting speeds at (370m/min, feed rate of 0.8mm/tooth and DoC at
0.4mm) which constituted an optimum condition for longer tool life
lasted until 123.2 mins. Meanwhile, at medium cutting speed which
at 300m/m, feed rate of 0.8mm/tooth and depth of cut at 0.4mm we
found that tool life span lasted until 119.86 mins while at low cutting
speed it lasted in 119.66 mins. High cutting speed will give the best
parameter in cutting AlSi/AlN MMCs material. The result will help
manufacturers in machining process of AlSi/AlN MMCs materials.
Abstract: Red blood cells (RBC) are the most common types of
blood cells and are the most intensively studied in cell biology. The
lack of RBCs is a condition in which the amount of hemoglobin level
is lower than normal and is referred to as “anemia”. Abnormalities in
RBCs will affect the exchange of oxygen. This paper presents a
comparative study for various techniques for classifying the RBCs as
normal or abnormal (anemic) using WEKA. WEKA is an open
source consists of different machine learning algorithms for data
mining applications. The algorithms tested are Radial Basis Function
neural network, Support vector machine, and K-Nearest Neighbors
algorithm. Two sets of combined features were utilized for
classification of blood cells images. The first set, exclusively consist
of geometrical features, was used to identify whether the tested blood
cell has a spherical shape or non-spherical cells. While the second
set, consist mainly of textural features was used to recognize the
types of the spherical cells. We have provided an evaluation based on
applying these classification methods to our RBCs image dataset
which were obtained from Serdang Hospital - Malaysia, and
measuring the accuracy of test results. The best achieved
classification rates are 97%, 98%, and 79% for Support vector
machines, Radial Basis Function neural network, and K-Nearest
Neighbors algorithm respectively.
Abstract: The classroom of the 21st century is an ever changing
forum for new and innovative thoughts and ideas. With increasing
technology and opportunity, students have rapid access to
information that only decades ago would have taken weeks to obtain.
Unfortunately, new techniques and technology are not the cure for
the fundamental problems that have plagued the classroom ever since
education was established. Class size has been an issue long debated
in academia. While it is difficult to pin point an exact number, it is
clear that in this case more does not mean better. By looking into the
success and pitfalls of classroom size the true advantages of smaller
classes will become clear. Previously, one class was comprised of 50
students. Being seventeen and eighteen- year- old students,
sometimes it was quite difficult for them to stay focused. To help
them understand and gain much knowledge, a researcher introduced
“The Theory of Multiple Intelligence” and this, in fact, enabled
students to learn according to their own learning preferences no
matter how they were being taught. In this lesson, the researcher
designed a cycle of learning activities involving all intelligences so
that everyone had equal opportunities to learn.
Abstract: Solar air heater is a type of heat exchanger which
transforms solar radiation into heat energy. The thermal performance
of conventional solar air heater has been found to be poor because of
the low convective heat transfer coefficient from the absorber plate to
the air. It is attributed to the formation of a very thin boundary layer
at the absorber plate surface commonly known as viscous sub-layer.
Thermal efficiency of solar air heater can be improved by providing
the artificial roughness on absorber plate is the most efficient
technique. In this paper an attempt is made to provide artificial
roughness by incorporating inclined multiple V-ribs in the underside
of the absorber plate. 60˚V – ribs are arranged inclined to the
direction of air flow. Performance of collector estimated theoretically
and experimentally. Results of the investigation reveal that thermal
efficiency of collector with multiple V-ribs increased by 14%.
Abstract: We present an analytical model for the calculation of
the sensitivity, the spectral current noise and the detective parameter
for an optically illuminated In0.53Ga0.47As n+nn+ diode. The
photocurrent due to the excess carrier is obtained by solving the
continuity equation. Moreover, the current noise level is evaluated at
room temperature and under a constant voltage applied between the
diode terminals. The analytical calculation of the current noise in the
n+nn+ structure is developed by considering the free carries
fluctuations. The responsivity and the detection parameter are
discussed as functions of the doping concentrations and the emitter
layer thickness in one-dimensional homogeneous n+nn+ structure.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.