Abstract: We report the results of an lattice Boltzmann
simulation of magnetohydrodynamic damping of sidewall convection
in a rectangular enclosure filled with a porous medium. In particular
we investigate the suppression of convection when a steady magnetic
field is applied in the vertical direction. The left and right vertical
walls of the cavity are kept at constant but different temperatures
while both the top and bottom horizontal walls are insulated. The
effects of the controlling parameters involved in the heat transfer and
hydrodynamic characteristics are studied in detail. The heat and mass
transfer mechanisms and the flow characteristics inside the enclosure
depended strongly on the strength of the magnetic field and Darcy
number. The average Nusselt number decreases with rising values of
the Hartmann number while this increases with increasing values of
the Darcy number.
Abstract: This paper constructs a four factors theoretical model of Chinese small and medium enterprises based on the “cartoon characters- reputation - enterprise marketing and management capabilities – protection of the cartoon image - institutional environment" by literature research, case studies and investigation. The empirical study show that the greatest impact on current merchandising rights income is the institutional environment friendliness, followed by marketing and management capabilities, input of character image protection and Cartoon characters- reputation through the real-time grey relational analysis, and the greatest impact on post-merchandising rights profit is Cartoon characters reputation, followed by the institutional environment friendliness, then marketing and management ability and input of character image protection through the time-delay grey relational analysis.
Abstract: In recent years various types of electric vehicles
has gained again increasing attention as an environmentally
benign technology in transport. Especially for urban areas with
high local pollution this Zero-emission technology (at the point
of use) is considered to provide proper solutions. Yet, the bad
economics and the limited driving ranges are still major barriers
for a broader market penetration of battery electric vehicles
(BEV) and of fuel cell vehicles (FCV). The major result of our
analyses is that the most important precondition for a further
dissemination of BEV in urban areas are emission-free zones.
This is an instrument which allows the promotion of BEV
without providing excessive subsidies. In addition, it is
important to note that the full benefits of EV can only be
harvested if the electricity used is produced from renewable
energy sources. That is to say, it has to be ensured that the use of
BEV in urban areas is clearly linked to a green electricity
purchase model. And moreover, the introduction of a CO2-
emission-based tax system would support this requirement.
Abstract: Medical images require special safety and confidentiality because critical judgment is done on the information provided by medical images. Transmission of medical image via internet or mobile phones demands strong security and copyright protection in telemedicine applications. Here, highly secured and robust watermarking technique is proposed for transmission of image data via internet and mobile phones. The Region of Interest (ROI) and Non Region of Interest (RONI) of medical image are separated. Only RONI is used for watermark embedding. This technique results in exact recovery of watermark with standard medical database images of size 512x512, giving 'correlation factor' equals to 1. The correlation factor for different attacks like noise addition, filtering, rotation and compression ranges from 0.90 to 0.95. The PSNR with weighting factor 0.02 is up to 48.53 dBs. The presented scheme is non blind and embeds hospital logo of 64x64 size.
Abstract: Nowadays, the demand for high product quality
focuses extensive attention to the quality of machined surface. The
(CNC) milling machine facilities provides a wide variety of
parameters set-up, making the machining process on the glass
excellent in manufacturing complicated special products compared to
other machining processes. However, the application of grinding
process on the CNC milling machine could be an ideal solution to
improve the product quality, but adopting the right machining
parameters is required. In glass milling operation, several machining
parameters are considered to be significant in affecting surface
roughness. These parameters include the lubrication pressure, spindle
speed, feed rate and depth of cut. In this research work, a fuzzy logic
model is offered to predict the surface roughness of a machined
surface in glass milling operation using CBN grinding tool. Four
membership functions are allocated to be connected with each input
of the model. The predicted results achieved via fuzzy logic model
are compared to the experimental result. The result demonstrated
settlement between the fuzzy model and experimental results with the
93.103% accuracy.
Abstract: From past many decades human beings are suffering
from plethora of natural disasters. Occurrence of disasters is a
frequent process; it changes conceptual myths as more and more
advancement are made. Although we are living in technological era
but in developing countries like Pakistan disasters are shaped by
socially constructed roles. The need is to understand the most
vulnerable group of society i.e. females; their issues are complex in
nature because of undermined gender status in the society. There is a
need to identify maximum issues regarding females and to enhance
the achievement of millennium development goals (MDGs). Gender
issues are of great concern all around the globe including Pakistan.
Here female visibility in society is low, and also during disasters, the
failure to understand the reality that concentrates on double burden
including productive and reproductive care. Women have to
contribute a lot in society so we need to make them more disaster
resilient. For this non-structural measures like awareness, trainings
and education must be carried out. In rural and in urban settings in
any disaster like earthquake or flood, elements like gender
perspective, their age, physical health, demographic issues contribute
towards vulnerability. In Pakistan the gender issues in disasters were
of less concern before 2005 earthquake and 2010 floods. Significant
achievements are made after 2010 floods when gender and child cell
was created to provide all facilities to women and girls. The aim of
the study is to highlight all necessary facilities in a disaster to build
coping mechanism in females from basic rights till advance level
including education.
Abstract: We report the results of an lattice Boltzmann
simulation of magnetohydrodynamic damping of sidewall convection
in a rectangular enclosure filled with a porous medium. In particular
we investigate the suppression of convection when a steady magnetic
field is applied in the vertical direction. The left and right vertical
walls of the cavity are kept at constant but different temperatures
while both the top and bottom horizontal walls are insulated. The
effects of the controlling parameters involved in the heat transfer and
hydrodynamic characteristics are studied in detail. The heat and mass
transfer mechanisms and the flow characteristics inside the enclosure
depended strongly on the strength of the magnetic field and Darcy
number. The average Nusselt number decreases with rising values of
the Hartmann number while this increases with increasing values of
the Darcy number.
Abstract: For the communication between human and computer
in an interactive computing environment, the gesture recognition is
studied vigorously. Therefore, a lot of studies have proposed efficient
methods about the recognition algorithm using 2D camera captured
images. However, there is a limitation to these methods, such as the
extracted features cannot fully represent the object in real world.
Although many studies used 3D features instead of 2D features for
more accurate gesture recognition, the problem, such as the processing
time to generate 3D objects, is still unsolved in related researches.
Therefore we propose a method to extract the 3D features combined
with the 3D object reconstruction. This method uses the modified
GPU-based visual hull generation algorithm which disables unnecessary
processes, such as the texture calculation to generate three kinds
of 3D projection maps as the 3D feature: a nearest boundary, a farthest
boundary, and a thickness of the object projected on the base-plane. In
the section of experimental results, we present results of proposed
method on eight human postures: T shape, both hands up, right hand
up, left hand up, hands front, stand, sit and bend, and compare the
computational time of the proposed method with that of the previous
methods.
Abstract: Image watermarking has proven to be quite an
efficient tool for the purpose of copyright protection and
authentication over the last few years. In this paper, a novel image
watermarking technique in the wavelet domain is suggested and
tested. To achieve more security and robustness, the proposed
techniques relies on using two nested watermarks that are embedded
into the image to be watermarked. A primary watermark in form of a
PN sequence is first embedded into an image (the secondary
watermark) before being embedded into the host image. The
technique is implemented using Daubechies mother wavelets where
an arbitrary embedding factor α is introduced to improve the
invisibility and robustness. The proposed technique has been applied
on several gray scale images where a PSNR of about 60 dB was
achieved.
Abstract: Unlike Christianity and Buddhism, Islam, being one
of the three universal world religions, actively penetrates into
people-s everyday life. The main reason for this is that in Islam the
religion and ideology, philosophy, religious organizations and state
bodies are closely interrelated. In order to analyze the state of being
of interrelations of religion and civil society in Kazakhstan, it is
necessary to study Islam and its relations with spiritual culture of the
society. According to the Constitution of the Republic of Kazakhstan
the religion is separated from the state, i.e. each performs its own
function without interfering into each other-s affairs. The right of the
citizens of our republic to freedom of thinking and faith is based on
the Constitution of the RK, Civil Code, Law “On freedom of faith
and religious unions in the Republic of Kazakhstan".
Legislatively secured separation of the mosque and church from
the state does not mean that religion has no influence on the latter.
The state, consisting of citizens with their own beliefs, including
religious ones, cannot be isolated from the influence of religion.
Nowadays it is commonly accepted that it is not possible to
understand and forecast key social processes without taking into
account the religious factor.
Abstract: This paper presented a MATLAB-based system named Smart Access Network Testing, Analyzing and Database (SANTAD), purposely for in-service transmission surveillance and self restoration against fiber fault in fiber-to-the-home (FTTH) access network. The developed program will be installed with optical line terminal (OLT) at central office (CO) to monitor the status and detect any fiber fault that occurs in FTTH downwardly from CO towards residential customer locations. SANTAD is interfaced with optical time domain reflectometer (OTDR) to accumulate every network testing result to be displayed on a single computer screen for further analysis. This program will identify and present the parameters of each optical fiber line such as the line's status either in working or nonworking condition, magnitude of decreasing at each point, failure location, and other details as shown in the OTDR's screen. The failure status will be delivered to field engineers for promptly actions, meanwhile the failure line will be diverted to protection line to ensure the traffic flow continuously. This approach has a bright prospect to improve the survivability and reliability as well as increase the efficiency and monitoring capabilities in FTTH.
Abstract: The role of knowledge is a determinative factor in the
life of economy and society. To determine knowledge is not an easy
task yet the real task is to determine the right knowledge. From this
view knowledge is a sum of experience, ideas and cognitions which
can help companies to remain in markets and to realize a maximum
profit. At the same time changes of circumstances project in advance
that contents and demands of the right knowledge are changing. In
this paper we will analyse a special segment on the basis of an
empirical survey. We investigated the behaviour and strategies of
small and medium sized enterprises (SMEs) in the area of
knowledge-handling. This survey was realized by questionnaires and
wide range statistical methods were used during processing. As a
result we will show how these companies are prepared to operate in a
knowledge-based economy and in which areas they have prominent
deficiencies.
Abstract: With the development of Internet and databases application techniques, the demand that lots of databases in the Internet are permitted to remote query and access for authorized users becomes common, and the problem that how to protect the copyright of relational databases arises. This paper simply introduces the knowledge of cloud model firstly, includes cloud generators and similar cloud. And then combined with the property of the cloud, a method of protecting relational databases copyright with cloud watermark is proposed according to the idea of digital watermark and the property of relational databases. Meanwhile, the corresponding watermark algorithms such as cloud watermark embedding algorithm and detection algorithm are proposed. Then, some experiments are run and the results are analyzed to validate the correctness and feasibility of the watermark scheme. In the end, the foreground of watermarking relational database and its research direction are prospected.
Abstract: Housing is a basic human right. The provision of new
house shall be free from any defects, even for the defects that people
do normally considered as 'cosmetic defects'. This paper studies
about the building defects of newly completed house of 72 unit of
double-storey terraced located in Bangi, Selangor. The building
survey implemented using protocol 1 (visual inspection). As for new
house, the survey work is very stringent in determining the defects
condition and priority. Survey and reporting procedure is carried out
based on CSP1 Matrix that involved scoring system, photographs and
plan tagging. The analysis is done using Statistical Package for Social
Sciences (SPSS). The finding reveals that there are 2119 defects
recorded in 72 terraced houses. The cumulative score obtained was
27644 while the overall rating is 13.05. These results indicate that the
construction quality of the newly terraced houses is low and not up to
an acceptable standard as the new house should be.
Abstract: Although Face detection is not a recent activity in the
field of image processing, it is still an open area for research. The
greatest step in this field is the work reported by Viola and its recent
analogous is Huang et al. Both of them use similar features and also
similar training process. The former is just for detecting upright
faces, but the latter can detect multi-view faces in still grayscale
images using new features called 'sparse feature'. Finding these
features is very time consuming and inefficient by proposed methods.
Here, we propose a new approach for finding sparse features using a
genetic algorithm system. This method requires less computational
cost and gets more effective features in learning process for face
detection that causes more accuracy.
Abstract: With the advent of digital cinema and digital
broadcasting, copyright protection of video data has been one of the
most important issues.
We present a novel method of watermarking for video image data
based on the hardware and digital wavelet transform techniques and
name it as “traceable watermarking" because the watermarked data is
constructed before the transmission process and traced after it has been
received by an authorized user.
In our method, we embed the watermark to the lowest part of each
image frame in decoded video by using a hardware LSI.
Digital Cinema is an important application for traceable
watermarking since digital cinema system makes use of watermarking
technology during content encoding, encryption, transmission,
decoding and all the intermediate process to be done in digital cinema
systems. The watermark is embedded into the randomly selected
movie frames using hash functions.
Embedded watermark information can be extracted from the
decoded video data. For that, there is no need to access original movie
data. Our experimental results show that proposed traceable
watermarking method for digital cinema system is much better than the
convenient watermarking techniques in terms of robustness, image
quality, speed, simplicity and robust structure.
Abstract: This paper presented a new approach for centralized
monitoring and self-protected against fiber fault in fiber-to-the-home
(FTTH) access network by using Smart Access Network Testing,
Analyzing and Database (SANTAD). SANTAD will be installed
with optical line terminal (OLT) at central office (CO) for in-service
transmission surveillance and fiber fault localization within FTTH
with point-to-multipoint (P2MP) configuration downwardly from CO
towards customer residential locations based on the graphical user
interface (GUI) processing capabilities of MATLAB software.
SANTAD is able to detect any fiber fault as well as identify the
failure location in the network system. SANTAD enable the status of
each optical network unit (ONU) connected line is displayed onto
one screen with capability to configure the attenuation and detect the
failure simultaneously. The analysis results and information will be
delivered to the field engineer for promptly actions, meanwhile the
failure line will be diverted to protection line to ensure the traffic
flow continuously. This approach has a bright prospect to improve
the survivability and reliability as well as increase the efficiency and
monitoring capabilities in FTTH.
Abstract: Can biometrics do what everyone is expecting it will?
And more importantly, should it be doing it? Biometrics is the
buzzword “on the mouth" of everyone, who are trying to use this
technology in a variety of applications. But all this “hype" about
biometrics can be dangerous without a careful evaluation of the real
needs of each application. In this paper I-ll try to focus on the
dangers of using the right technology at the right time in the wrong
place.
Abstract: The data is available in abundance in any business
organization. It includes the records for finance, maintenance,
inventory, progress reports etc. As the time progresses, the data keep
on accumulating and the challenge is to extract the information from
this data bank. Knowledge discovery from these large and complex
databases is the key problem of this era. Data mining and machine
learning techniques are needed which can scale to the size of the
problems and can be customized to the application of business. For
the development of accurate and required information for particular
problem, business analyst needs to develop multidimensional models
which give the reliable information so that they can take right
decision for particular problem. If the multidimensional model does
not possess the advance features, the accuracy cannot be expected.
The present work involves the development of a Multidimensional
data model incorporating advance features. The criterion of
computation is based on the data precision and to include slowly
change time dimension. The final results are displayed in graphical
form.
Abstract: A novel design of two-wheeled robotic vehicle with moving payload is presented in this paper. A mathematical model describing the vehicle dynamics is derived and simulated in Matlab Simulink environment. Two control strategies were developed to stabilise the vehicle in the upright position. A robust Proportional- Integral-Derivative (PID) control strategy has been implemented and initially tested to measure the system performance, while the second control strategy is to use a hybrid fuzzy logic controller (FLC). The results are given on a comparative basis for the system performance in terms of disturbance rejection, control algorithms robustness as well as the control effort in terms of input torque.