Abstract: This paper shows the potential system benefits of
simple tracking solar system using a stepper motor and light sensor.
This method is increasing power collection efficiency by developing
a device that tracks the sun to keep the panel at a right angle to its
rays. A solar tracking system is designed, implemented and
experimentally tested. The design details and the experimental results
are shown.
Abstract: This paper shows that some properties of the decision
rules in the literature do not hold by presenting a counterexample. We
give sufficient and necessary conditions under which these properties
are valid. These results will be helpful when one tries to choose the
right decision rules in the research of rough set theory.
Abstract: In this paper, a novel copyright protection scheme for digital images based on Visual Cryptography and Statistics is proposed. In our scheme, the theories and properties of sampling distribution of means and visual cryptography are employed to achieve the requirements of robustness and security. Our method does not need to alter the original image and can identify the ownership without resorting to the original image. Besides, our method allows multiple watermarks to be registered for a single host image without causing any damage to other hidden watermarks. Moreover, it is also possible for our scheme to cast a larger watermark into a smaller host image. Finally, experimental results will show the robustness of our scheme against several common attacks.
Abstract: The Bangnanglee Sub-district Administrative Office,
Thailand had initiated a policy to environmental protection with
encouraging household waste management in order to promote civil
responsibility for domestic hygienic. This research studied the
household behaviors on solid waste and wastewater management. A
sample population of 306 families answered a questionnaire. The
study showed that, on average, domestic activities had produced 1.93
kilograms of waste per household per day. It has been found that 79%
of the households made several attempts to reduce their own amount
of waste. 80% of the households stationed their own garbage bins.
71% managed their waste by selling recyclable products. As for the
rest of the waste, 51% burned them, while 29% disposed their waste
in the nearby public trashcans and other 13% have them buried. As
for wastewater, 60% of the households disposed it into the sewage,
whereas 30% disposed them right from their elevated house.
Abstract: Many states are now committed to implementing
international human rights standards domestically. In terms of
practical governance, how might effectiveness be measured? A facevalue
answer can be found in domestic laws and institutions relating
to human rights. However, this article provides two further tools to
help states assess their status on the spectrum of robust to fragile
human rights governance. The first recognises that each state has its
own 'human rights history' and the ideal end stage is robust human
rights governance, and the second is developing criteria to assess
robustness. Although a New Zealand case study is used to illustrate
these tools, the widespread adoption of human rights standards by
many states inevitably means that the issues are relevant to other
countries. This is even though there will always be varying degrees of
similarity-difference in constitutional background and developed or
emerging human rights systems.
Abstract: This paper presents the results of enhancing images from a left and right stereo pair in order to increase the resolution of a 3D representation of a scene generated from that same pair. A new neural network structure known as a Self Delaying Dynamic Network (SDN) has been used to perform the enhancement. The advantage of SDNs over existing techniques such as bicubic interpolation is their ability to cope with motion and noise effects. SDNs are used to generate two high resolution images, one based on frames taken from the left view of the subject, and one based on the frames from the right. This new high resolution stereo pair is then processed by a disparity map generator. The disparity map generated is compared to two other disparity maps generated from the same scene. The first is a map generated from an original high resolution stereo pair and the second is a map generated using a stereo pair which has been enhanced using bicubic interpolation. The maps generated using the SDN enhanced pairs match more closely the target maps. The addition of extra noise into the input images is less problematic for the SDN system which is still able to out perform bicubic interpolation.
Abstract: Digital watermarking is the process of embedding
information into a digital signal which can be used in DRM (digital
rights managements) system. The visible watermark (often called logo)
can indicate the owner of the copyright which can often be seen in the
TV program and protects the copyright in an active way. However,
most of the schemes do not consider the visible watermark removing
process. To solve this problem, a visible watermarking scheme with
embedding and removing process is proposed under the control of a
secure template. The template generates different version of
watermarks which can be seen visually the same for different users.
Users with the right key can completely remove the watermark and
recover the original image while the unauthorized user is prevented to
remove the watermark. Experiment results show that our
watermarking algorithm obtains a good visual quality and is hard to be
removed by the illegally users. Additionally, the authorized users can
completely remove the visible watermark and recover the original
image with a good quality.
Abstract: Accurate timing alignment and stability is important
to maximize the true counts and minimize the random counts in
positron emission tomography So signals output from detectors must
be centering with the two isotopes to pre-operation and fed signals
into four units of pulse-processing units, each unit can accept up to
eight inputs. The dual source computed tomography consist two units
on the left for 15 detector signals of Cs-137 isotope and two units on
the right are for 15 detectors signals of Co-60 isotope. The gamma
spectrum consisting of either single or multiple photo peaks. This
allows for the use of energy discrimination electronic hardware
associated with the data acquisition system to acquire photon counts
data with a specific energy, even if poor energy resolution detectors
are used. This also helps to avoid counting of the Compton scatter
counts especially if a single discrete gamma photo peak is emitted by
the source as in the case of Cs-137. In this study the polyenergetic
version of the alternating minimization algorithm is applied to the
dual energy gamma computed tomography problem.
Abstract: In this work, we present for the first time in our
perception an efficient digital watermarking scheme for mpeg audio
layer 3 files that operates directly in the compressed data domain,
while manipulating the time and subband/channel domain. In
addition, it does not need the original signal to detect the watermark.
Our scheme was implemented taking special care for the efficient
usage of the two limited resources of computer systems: time and
space. It offers to the industrial user the capability of watermark
embedding and detection in time immediately comparable to the real
music time of the original audio file that depends on the mpeg
compression, while the end user/audience does not face any artifacts
or delays hearing the watermarked audio file. Furthermore, it
overcomes the disadvantage of algorithms operating in the PCMData
domain to be vulnerable to compression/recompression attacks,
as it places the watermark in the scale factors domain and not in the
digitized sound audio data. The strength of our scheme, that allows it
to be used with success in both authentication and copyright
protection, relies on the fact that it gives to the users the enhanced
capability their ownership of the audio file not to be accomplished
simply by detecting the bit pattern that comprises the watermark
itself, but by showing that the legal owner knows a hard to compute
property of the watermark.
Abstract: The analysis is mainly concentrating on the knowledge
management literatures productivity trend which subjects as
“knowledge management" in SSCI database. The purpose what the
analysis will propose is to summarize the trend information for
knowledge management researchers since core knowledge will be
concentrated in core categories. The result indicated that the literature
productivity which topic as “knowledge management" is still
increasing extremely and will demonstrate the trend by different
categories including author, country/territory, institution name,
document type, language, publication year, and subject area. Focus on
the right categories, you will catch the core research information. This
implies that the phenomenon "success breeds success" is more
common in higher quality publications.
Abstract: Existing image-based virtual reality applications
allow users to view image-based 3D virtual environment in a more
interactive manner. User could “walkthrough"; looks left, right, up
and down and even zoom into objects in these virtual worlds of
images. However what the user sees during a “zoom in" is just a
close-up view of the same image which was taken from a distant.
Thus, this does not give the user an accurate view of the object from
the actual distance. In this paper, a simple technique for zooming in
an object in a virtual scene is presented. The technique is based on
the 'hotspot' concept in existing application. Instead of navigation
between two different locations, the hotspots are used to focus into
an object in the scene. For each object, several hotspots are created.
A different picture is taken for each hotspot. Each consecutive
hotspot created will take the user closer to the object. This will
provide the user with a correct of view of the object based on his
proximity to the object. Implementation issues and the relevance of
this technique in potential application areas are highlighted.
Abstract: The purpose of this paper is to summarize the
following protection of scouring countermeasures by using
Bentonite-Enhanced Sand (BES) mixtures. The concept of
underground improvement is being used in this study to reduce the
void of the sand. The sand bentonite mixture was used to bond the
ground soil conditions surrounding the pile of integral bridge. The
right composition of sand bentonite mixture was proposed based on
previous findings. The swelling effect of bentonite also was
investigated to ensure there is no adverse impact to the structure of
the integral bridge. ScourScour, another name for severe erosion,
occurs when the erosive capacity of water resulting from natural and
manmade events exceeds the ability of earth materials to resist its
effects. According to AASHTO LRFD Specifications (Section
C3.7.5), scour is the most common reason for the collapse of
highway bridges in the United States
Abstract: Wireless capsule endoscopy provides real-time images in the digestive tract. Capsule images are usually low resolution and are diverse images due to travel through various regions of human body. Color information has been a primary reference in predicting abnormalities such as bleeding. Often color is not sufficient for this purpose. In this study, we took morphological shapes into account as additional, but important criterion. First, we processed gastric images in order to indentify various objects in the image. Then, we analyzed color information in the object. In this way, we could remove unnecessary information and increase the accuracy. Compared to our previous investigations, we could handle images of various degrees of brightness and improve our diagnostic algorithm.
Abstract: Unsteady natural convection and heat transfer in a square cavity partially filled with porous media using a thermal
non-equilibrium model is studied in this paper. The left vertical wall is
maintained at a constant hot temperature Th and the right vertical wall
is maintained at a constant cold temperature Tc, while the horizontal
walls are adiabatic. The governing equations are obtained by applying
the Darcy model and Boussinesq approximation. COMSOL’s finite
element method is used to solve the non-dimensional governing
equations together with specified boundary conditions. The governing
parameters of this study are the Rayleigh number (Ra = 10^5, and Ra = 10^6 ), Darcy namber (Da = 10^−2, and Da = 10^−3),
the modified thermal conductivity ratio (10^−1 ≤ γ ≤ 10^4), the inter-phase heat transfer coefficien (10^−1 ≤ H ≤ 10^3) and the
time dependent (0.001 ≤ τ ≤ 0.2). The results presented for
values of the governing parameters in terms of streamlines in both
fluid/porous-layer, isotherms of fluid in fluid/porous-layer, isotherms
of solid in porous layer, and average Nusselt number.
Abstract: Through the course of this paper we define Locationbased
Intelligence (LBI) which is outgrowing from process of
amalgamation of geolocation and Business Intelligence.
Amalgamating geolocation with traditional Business Intelligence (BI)
results in a new dimension of BI named Location-based Intelligence.
LBI is defined as leveraging unified location information for business
intelligence. Collectively, enterprises can transform location data into
business intelligence applications that will benefit all aspects of the
enterprise. Expectations from this new dimension of business
intelligence are great and its future is obviously bright.
Abstract: In this paper, the class of weakly left C-wrpp
semigroups which includes the class of weakly left C-rpp semigroups
as a subclass is introduced. To particularly show that the spined
product of a left C-wrpp semigroup and a right normal band which is a
weakly left C-wrpp semifroup by virtue of left C-full Ehremann cyber
groups recently obtained by authors Li-Shum, results obtained by
Tang and Du-Shum are extended and strengthened.
Abstract: There were many studies on how to alleviate breast discomfort by reducing breast motion, in which nipple motion was used to represent breast motion. However, this assumption had not been experimentally validated. The aim of this paper was to experimentally validate if nipple can be used as a good indicator of breast. Seven participants (average of 24.4 years old) were recruited to walk and run on the treadmill at 5km h-1 and 10km h-1 respectively. Six markers were pasted on their bodies to collect motion data of different parts of breasts. The results of Friedman test combined with the relationship among the five markers on the same breast revealed that nipple could be used as a good indicator of breast. Wilcoxon test showed that there was no significant (P
Abstract: The advances in multimedia and networking technologies
have created opportunities for Internet pirates, who can easily
copy multimedia contents and illegally distribute them on the Internet,
thus violating the legal rights of content owners. This paper describes
how a simple and well-known watermarking procedure based on a
spread spectrum method and a watermark recovery by correlation can
be improved to effectively and adaptively protect MPEG-2 videos
distributed on the Internet. In fact, the procedure, in its simplest
form, is vulnerable to a variety of attacks. However, its security
and robustness have been increased, and its behavior has been
made adaptive with respect to the video terminals used to open
the videos and the network transactions carried out to deliver them
to buyers. In fact, such an adaptive behavior enables the proposed
procedure to efficiently embed watermarks, and this characteristic
makes the procedure well suited to be exploited in web contexts,
where watermarks usually generated from fingerprinting codes have
to be inserted into the distributed videos “on the fly", i.e. during the
purchase web transactions.
Abstract: Internet is largely composed of textual contents and a
huge volume of digital contents gets floated over the Internet daily.
The ease of information sharing and re-production has made it
difficult to preserve author-s copyright. Digital watermarking came
up as a solution for copyright protection of plain text problem after
1993. In this paper, we propose a zero text watermarking algorithm
based on occurrence frequency of non-vowel ASCII characters and
words for copyright protection of plain text. The embedding
algorithm makes use of frequency non-vowel ASCII characters and
words to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original
copyright owner. Experimental results illustrate the effectiveness of
the proposed algorithm on text encountering meaning preserving
attacks performed by five independent attackers.
Abstract: In the last decade digital watermarking procedures have
become increasingly applied to implement the copyright protection
of multimedia digital contents distributed on the Internet. To this
end, it is worth noting that a lot of watermarking procedures
for images and videos proposed in literature are based on spread
spectrum techniques. However, some scepticism about the robustness
and security of such watermarking procedures has arisen because
of some documented attacks which claim to render the inserted
watermarks undetectable. On the other hand, web content providers
wish to exploit watermarking procedures characterized by flexible and
efficient implementations and which can be easily integrated in their
existing web services frameworks or platforms. This paper presents
how a simple spread spectrum watermarking procedure for MPEG-2
videos can be modified to be exploited in web contexts. To this end,
the proposed procedure has been made secure and robust against some
well-known and dangerous attacks. Furthermore, its basic scheme
has been optimized by making the insertion procedure adaptive with
respect to the terminals used to open the videos and the network transactions
carried out to deliver them to buyers. Finally, two different
implementations of the procedure have been developed: the former
is a high performance parallel implementation, whereas the latter is
a portable Java and XML based implementation. Thus, the paper
demonstrates that a simple spread spectrum watermarking procedure,
with limited and appropriate modifications to the embedding scheme,
can still represent a valid alternative to many other well-known and
more recent watermarking procedures proposed in literature.