Abstract: This paper presents an effective traffic lights detection
method at the night-time. First, candidate blobs of traffic lights are
extracted from RGB color image. Input image is represented on the
dominant color domain by using color transform proposed by Ruta,
then red and green color dominant regions are selected as candidates.
After candidate blob selection, we carry out shape filter for noise
reduction using information of blobs such as length, area, area of
boundary box, etc. A multi-class classifier based on SVM (Support
Vector Machine) applies into the candidates. Three kinds of features
are used. We use basic features such as blob width, height, center
coordinate, area, area of blob. Bright based stochastic features are also
used. In particular, geometric based moment-s values between
candidate region and adjacent region are proposed and used to improve
the detection performance. The proposed system is implemented on
Intel Core CPU with 2.80 GHz and 4 GB RAM and tested with the
urban and rural road videos. Through the test, we show that the
proposed method using PF, BMF, and GMF reaches up to 93 % of
detection rate with computation time of in average 15 ms/frame.
Abstract: FW4 is a newly developed hot die material widely
used in Forging Dies manufacturing. The right selection of the
machining conditions is one of the most important aspects to take
into consideration in the Electrical Discharge Machining (EDM) of
FW4. In this paper an attempt has been made to develop
mathematical models for relating the Material Removal Rate (MRR),
Tool Wear Ratio (TWR) and surface roughness (Ra) to machining
parameters (current, pulse-on time and voltage). Furthermore, a study
was carried out to analyze the effects of machining parameters in
respect of listed technological characteristics. The results of analysis
of variance (ANOVA) indicate that the proposed mathematical
models, can adequately describe the performance within the limits of
the factors being studied.
Abstract: Motion detection is very important in image
processing. One way of detecting motion is using optical flow.
Optical flow cannot be computed locally, since only one independent
measurement is available from the image sequence at a point, while
the flow velocity has two components. A second constraint is needed.
The method used for finding the optical flow in this project is
assuming that the apparent velocity of the brightness pattern varies
smoothly almost everywhere in the image. This technique is later
used in developing software for motion detection which has the
capability to carry out four types of motion detection. The motion
detection software presented in this project also can highlight motion
region, count motion level as well as counting object numbers. Many
objects such as vehicles and human from video streams can be
recognized by applying optical flow technique.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: The human head representations usually are based on
the morphological – structural components of a real model. Over the
time became more and more necessary to achieve full virtual models
that comply very rigorous with the specifications of the human
anatomy. Still, making and using a model perfectly fitted with the
real anatomy is a difficult task, because it requires large hardware
resources and significant times for processing. That is why it is
necessary to choose the best compromise solution, which keeps the
right balance between the details perfection and the resources
consumption, in order to obtain facial animations with real-time
rendering. We will present here the way in which we achieved such a
3D system that we intend to use as a base point in order to create
facial animations with real-time rendering, used in medicine to find
and to identify different types of pathologies.
Abstract: Professions are concerned about the public image they
have, and this public image is represented by stereotypes. Research is
needed to understand how accountants are perceived by different
actors in the society in different contexts, which would allow
universities, professional bodies and employers to adjust their
strategies to attract the right people to the profession and their
organizations. We aim to develop in this paper a framework to be
used in empirical testing in different environments to determine and
analyze the accountant-s stereotype. This framework will be useful in
analyzing the nuances associated to the accountant-s image and in
understanding the factors that may lead to uniformity in the
profession and of those leading to diversity from one context
(country, type of countries, region) to another.
Abstract: This study examined the effects of neuromuscular
training (NT) on limits of stability (LOS) in female individuals.
Twenty female basketball amateurs were assigned into NT
experimental group or control group by volunteer. All the players were
underwent regular basketball practice, 90 minutes, 3 times per week
for 6 weeks, but the NT experimental group underwent extra NT with
plyometric and core training, 50 minutes, 3 times per week for 6 weeks
during this period. Limits of stability (LOS) were evaluated by the
Biodex Balance System. One factor ANCOVA was used to examine
the differences between groups after training. The significant level for
statistic was set at p
Abstract: This paper presents a watermarking protocol able to
solve the well-known “customer-s right problem" and “unbinding
problem". In particular, the protocol has been purposely designed
to be adopted in a web context, where users wanting to buy digital
contents are usually neither provided with digital certificates issued
by certification authorities (CAs) nor able to autonomously perform
specific security actions. Furthermore, the protocol enables users to
keep their identities unexposed during web transactions as well as
allows guilty buyers, i.e. who are responsible distributors of illegal
replicas, to be unambiguously identified. Finally, the protocol has
been designed so that web content providers (CPs) can exploit
copyright protection services supplied by web service providers (SPs)
in a security context. Thus, CPs can take advantage of complex
services without having to directly implement them.
Abstract: Solutions are proposed for the central problem of estimating the reaction rate coefficients in homogeneous kinetics. The first is based upon the fact that the right hand side of a kinetic differential equation is linear in the rate constants, whereas the second one uses the technique of neural networks. This second one is discussed deeply and its advantages, disadvantages and conditions of applicability are analyzed in the mirror of the first one. Numerical analysis carried out on practical models using simulated data, and our programs written in Mathematica.
Abstract: This article is an extension and a practical application
approach of Wheeler-s NEBIC theory (Net Enabled Business
Innovation Cycle). NEBIC theory is a new approach in IS research
and can be used for dynamic environment related to new technology.
Firms can follow the market changes rapidly with support of the IT
resources. Flexible firms adapt their market strategies, and respond
more quickly to customers changing behaviors. When every leading
firm in an industry has access to the same IT resources, the way that
these IT resources are managed will determine the competitive
advantages or disadvantages of firm. From Dynamic Capabilities
Perspective and from newly introduced NEBIC theory by Wheeler,
we know that only IT resources cannot deliver customer value but
good configuration of those resources can guarantee customer value
by choosing the right emerging technology, grasping the right
economic opportunities through business innovation and growth. We
found evidences in literature that SOA (Service Oriented
Architecture) is a promising emerging technology which can deliver
the desired economic opportunity through modularity, flexibility and
loose-coupling. SOA can also help firms to connect in network which
can open a new window of opportunity to collaborate in innovation
and right kind of outsourcing. There are many articles and research
reports indicates that failure rate in outsourcing is very high but at the
same time research indicates that successful outsourcing projects
adds tangible and intangible benefits to the service consumer.
Business executives and policy makers in the west should not afraid
of outsourcing but they should choose the right strategy through the
use of emerging technology to significantly reduce the failure rate in
outsourcing.
Abstract: With optimized bandwidth and latency discrepancy ratios, Node Gain Scores (NGSs) are determined and used as a basis for shaping the max-heap overlay. The NGSs - determined as the respective bandwidth-latency-products - govern the construction of max-heap-form overlays. Each NGS is earned as a synergy of discrepancy ratio of the bandwidth requested with respect to the estimated available bandwidth, and latency discrepancy ratio between the nodes and the source node. The tree leads to enhanceddelivery overlay multicasting – increasing packet delivery which could, otherwise, be hindered by induced packet loss occurring in other schemes not considering the synergy of these parameters on placing the nodes on the overlays. The NGS is a function of four main parameters – estimated available bandwidth, Ba; individual node's requested bandwidth, Br; proposed node latency to its prospective parent (Lp); and suggested best latency as advised by source node (Lb). Bandwidth discrepancy ratio (BDR) and latency discrepancy ratio (LDR) carry weights of α and (1,000 - α ) , respectively, with arbitrary chosen α ranging between 0 and 1,000 to ensure that the NGS values, used as node IDs, maintain a good possibility of uniqueness and balance between the most critical factor between the BDR and the LDR. A max-heap-form tree is constructed with assumption that all nodes possess NGS less than the source node. To maintain a sense of load balance, children of each level's siblings are evenly distributed such that a node can not accept a second child, and so on, until all its siblings able to do so, have already acquired the same number of children. That is so logically done from left to right in a conceptual overlay tree. The records of the pair-wise approximate available bandwidths as measured by a pathChirp scheme at individual nodes are maintained. Evaluation measures as compared to other schemes – Bandwidth Aware multicaSt architecturE (BASE), Tree Building Control Protocol (TBCP), and Host Multicast Tree Protocol (HMTP) - have been conducted. This new scheme generally performs better in terms of trade-off between packet delivery ratio; link stress; control overhead; and end-to-end delays.
Abstract: According to investigating impact of complexity of
stereoscopic frame pairs on stereoscopic video coding and
transmission, a new rate control algorithm is presented. The proposed
rate control algorithm is performed on three levels: stereoscopic group
of pictures (SGOP) level, stereoscopic frame (SFrame) level and
frame level. A temporal-spatial frame complexity model is firstly
established, in the bits allocation stage, the frame complexity, position
significance and reference property between the left and right frames
are taken into account. Meanwhile, the target buffer is set according to
the frame complexity. Experimental results show that the proposed
method can efficiently control the bitrates, and it outperforms the fixed
quantization parameter method from the rate distortion perspective,
and average PSNR gain between rate-distortion curves (BDPSNR) is
0.21dB.
Abstract: As a multicultural country, Indonesia has many subcultures
with unique performing arts. Some of them are well-known
to international tourists, such as music ensemble (known as gamelan)
in Bali and Java, shadow puppet play (wayang) in Java, and martial
arts (known as pencak silat) in Sumatra. Some examples of famous
traditional dances in Indonesia are Srimpi from Yogyakarta and Solo,
Legong from Bali, and Gong dance from Kalimantan. Performing arts
show the identity of a nation. However, they are a complex subject,
especially when they are addressed to children. The performing arts,
e.g. music, dance theatre, and opera are experiential, experimental,
and emotionally charged. Therefore, the right strategy and promotion
need to be developed to engage children to appreciate and preserve
traditional dances. This study aims to explore and identify
possibilities of internet usage as a medium to promote traditional
dances, especially to children in Indonesia.
Abstract: Cultural stories are political. They register cultural
phenomena and their relations with the world and society in term of
their existence, function, characteristics by using different context.
This paper will provide a new way of rethinking which will help us
to rethink the relationship between fiction and politics. It discusses
the theme of human rights and it shows the relevance between art and
politics by studying the civil society through a literary framework.
Reasons to establish a relationship between fiction and politics are
the relevant themes and universal issues among the two disciplines.
Both disciplines are sets of views and ideas formulated by the human
mind to explain political or cultural phenomenon. Other reasons are
the complexity and depth of the author-s vision, and the need to
explain the violations of human rights in a more active structure
which can relate to emotional and social existence.
Abstract: Traditionally, wind tunnel models are made of metal
and are very expensive. In these years, everyone is looking for ways
to do more with less. Under the right test conditions, a rapid
prototype part could be tested in a wind tunnel. Using rapid prototype
manufacturing techniques and materials in this way significantly
reduces time and cost of production of wind tunnel models. This
study was done of fused deposition modeling (FDM) and their ability
to make components for wind tunnel models in a timely and cost
effective manner. This paper discusses the application of wind tunnel
model configuration constructed using FDM for transonic wind
tunnel testing. A study was undertaken comparing a rapid
prototyping model constructed of FDM Technologies using
polycarbonate to that of a standard machined steel model. Testing
covered the Mach range of Mach 0.3 to Mach 0.75 at an angle-ofattack
range of - 2° to +12°. Results from this study show relatively
good agreement between the two models and rapid prototyping
Method reduces time and cost of production of wind tunnel models.
It can be concluded from this study that wind tunnel models
constructed using rapid prototyping method and materials can be
used in wind tunnel testing for initial baseline aerodynamic database
development.
Abstract: Automatic determination of blood in less bright or
noisy capsule endoscopic images is difficult due to low S/N ratio.
Especially it may not be accurate to analyze these images due to the
influence of external disturbance. Therefore, we proposed detection
methods that are not dependent only on color bands. In locating
bleeding regions, the identification of object outlines in the frame and
features of their local colors were taken into consideration. The results
showed that the capability of detecting bleeding was much improved.
Abstract: This article concerned with the translation of Quranic
verses to Braille symbols, by using Visual basic program. The
system has the ability to translate the special vibration for the Quran.
This study limited for the (Noun + Scoon) vibrations. It builds on an
existing translation system that combines a finite state machine with
left and right context matching and a set of translation rules. This
allows to translate the Arabic language from text to Braille symbols
after detect the vibration for the Quran verses.
Abstract: The Brazilian legislation has only established
diagnostic reference levels (DRLs) in terms of Multiple Scan
Average Dose (MSAD) as a quality control parameter for computed
tomography (CT) scanners. Compliance with DRLs can be verified
by measuring the Computed Tomography Kerma Index (Ca,100) with
a pencil ionization chamber or by obtaining the kerma distribution in
CT scans with radiochromic films or rod shape lithium fluoride
termoluminescent dosimeters (TLD-100). TL dosimeters were used
to record kerma profiles and to determine MSAD values of a Bright
Speed model GE CT scanner. Measurements were done with
radiochromic films and TL dosimeters distributed in cylinders
positioned in the center and in four peripheral bores of a standard
polymethylmethacrylate (PMMA) body CT dosimetry phantom.
Irradiations were done using a protocol for adult chest. The
maximum values were found at the midpoint of the longitudinal axis.
The MSAD values obtained with three dosimetric techniques were
compared.
Abstract: This paper considers the exclusion of consumer rights by the New Zealand Consumer Guarantees Act 1993 in eauctions. The paper asserts that the absence of an individual auctioneer conducting each e-auction means that e-auctions may not be auctions at all. The paper also questions the justification for excluding consumer rights in e-auctions because the rationale for excluding consumer rights in traditional auctions does not fit with e-auctions due to the significant differences in the sale processes. The paper recommends reform by way of statutory amendment.
Abstract: The subject of the paper is comparative analysis of the hotel guest-s contractual liability for breaching the obligation for non-payment of hotel services in the hotel-keeper-s contract. The paper is methodologically conceived of six chapters (1. introduction, 2. comparative law sources of the hotel-keeper-s contract, 3. the guest-s obligation for payment of hotel services, 4. hotel guest's liability for non-payment, 5. the hotel-keeper-s rights due to nonpayment and 6. conclusion), which analyzes the guest-s liability for non-payment of hotel services through the international law, European law, euro-continental national laws (France, Germany, Italy, Croatia) and Anglo-American national laws (UK, USA). The paper-s results are the synthesis of answers to the set hypothesis and comparative review of hotel guest-s contractual liability for nonpayment of hotel services provided. In conclusion, it is necessary to adopt an international convention on the hotel-keeper-s contract, which would unify the institute of the hotel guest-s contractual liability for non-payment of hotel services at the international level.