Abstract: We theoretically demonstrate modulation of light
polarization by a crossed rectangular hole array with asymmetric arm
lengths. There are two waveguide modes that can modulate the x- and
y- polarized incident waves independently. A specific structure is
proposed to convert a left-hand incident wave to a right-hand outgoing
wave by transmission.
Abstract: Let R be a ring and n a fixed positive integer, we
investigate the properties of n-strongly Gorenstein projective, injective
and flat modules. Using the homological theory , we prove that
the tensor product of an n-strongly Gorenstein projective (flat) right
R -module and projective (flat) left R-module is also n-strongly
Gorenstein projective (flat). Let R be a coherent ring ,we prove that
the character module of an n -strongly Gorenstein flat left R -module
is an n-strongly Gorenstein injective right R -module . At last, let
R be a commutative ring and S a multiplicatively closed set of R ,
we establish the relation between n -strongly Gorenstein projective
(injective , flat ) R -modules and n-strongly Gorenstein projective
(injective , flat ) S−1R-modules. All conclusions in this paper is
helpful for the research of Gorenstein dimensions in future.
Abstract: Groundwater has become the most dependable source
of fresh water for agriculture, domestic and industrial uses in the past
few decades. This wide use of groundwater if left uncontrolled and
unseen will lead to overexploitation causing sea water intrusion in the
coastal areas and illegal water marketing. Several Policies and Acts
have been enacted to regulate and manage the use of this valuable
resource. In spite of this the over extraction of groundwater beyond
the recharging capacity of aquifers and depletion in the quality of
groundwater is continuing. The current study aims at reviewing the
Acts and Policies existing in the State of Tamil Nadu and in the
National level regarding groundwater regulation and management.
Further an analysis is made on the rights associated with the usage of
groundwater resources and the gaps in these policies have been
analyzed. Some suggestions are made to reform the existing
groundwater policies for better management and regulation of the
resource.
Abstract: In this paper the concept of Q-fuzzification of ideals of Γ-semigroups has been introduced and some important properties have been investigated. A characterization of regular Γ-semigroup in terms of Q-fuzzy ideals has been obtained. Operator semigroups of a Γ-semigroup has been made to work by obtaining various relationships between Q-fuzzy ideals of a Γ-semigroup and that of its operator semigroups.
Abstract: The intermittent connectivity modifies the “always
on" network assumption made by all the distributed query processing
systems. In modern- day systems, the absence of network
connectivity is considered as a fault. Since the last upload, it might
not be feasible to transmit all the data accumulated right away over
the available connection. It is possible that vital information may be
delayed excessively when the less important information takes place
of the vital information. Owing to the restricted and uneven
bandwidth, it is vital that the mobile nodes make the most
advantageous use of the connectivity when it arrives. Hence, in order
to select the data that needs to be transmitted first, some sort of data
prioritization is essential. A continuous query processing system for
intermittently connected mobile networks that comprises of a delaytolerant
continuous query processor distributed across the mobile
hosts has been proposed in this paper. In addition, a mechanism for
prioritizing query results has been designed that guarantees enhanced
accuracy and reduced delay. It is illustrated that our architecture
reduces the client power consumption, increases query efficiency by
the extensive simulation results.
Abstract: A new generation product made from bamboo strips,
known as laminated bamboo, has gained importance. The objective
of this research was to experiment the effect of three factors on the
mechanical property of laminated bamboo. The interested factors for
experimental design were (A) four bamboo species, namely Bambusa
blumeana Schultes (Pai See Suk), Dendrocalamus asper Backer (Pai
Tong), Dendrocalamus hamiltonii Nees (Pai Hok) and
Dendrocalamus sericeus Munro (Pai Sang Mon), (B) two types of
glue adhesive, polyvinyl acetate emulsion (PVAC) fortified with
urea-formaldehyde (UF) and urea-formaldehyde (UF) to make
parallel-oriented bamboo strips laminates and (C) glue weight per
strip area, 150 g/m2 and 190 g/m2. Experimental results showed that
Dendrocalamus asper Backer (Pai Tong) and Dendrocalamus
sericeus Munro (Pai Sang Mon) were best used for manufacturing
due to their highest MOR and MOE. The amount of glue weight 150
g/m2 yielded higher MOR and MOE than the amount of glue weight
190 g/m2. At the conclusion, the laminated bamboo manufacturers
can benefit from this research in order to select right materials
according to strength, cost and accessibility.
Abstract: The right information at the right time influences the
enterprise and technical success. Sharing knowledge among members
of a big organization may be a complex activity. And as long as the
knowledge is not shared, can not be exploited by the organization.
There are some mechanisms which can originate knowledge sharing.
It is intended, in this paper, to trigger these mechanisms by using
semantic nets. Moreover, the intersection and overlapping of terms
and sub-terms, as well as their relationships will be described through
the mereology science for the whole knowledge sharing system. It is
proposed a knowledge system to supply to operators with the right
information about a specific process and possible risks, e.g. at the
assembly process, at the right time in an automated manufacturing
environment, such as at the automotive industry.
Abstract: Sensory nerves in the foot play an important part in the diagnosis of various neuropathydisorders, especially in diabetes mellitus.However, a detailed description of the anatomical distribution of the nerves is currently lacking. A computationalmodel of the afferent nerves inthe foot may bea useful tool for the study of diabetic neuropathy. In this study, we present the development of an anatomically-based model of various major sensory nerves of the sole and dorsal sidesof the foot. In addition, we presentan algorithm for generating synthetic somatosensory nerve networks in the big-toe region of a right foot model. The algorithm was based on a modified version of the Monte Carlo algorithm, with the capability of being able to vary the intra-epidermal nerve fiber density in differentregionsof the foot model. Preliminary results from the combinedmodel show the realistic anatomical structure of the major nerves as well as the smaller somatosensory nerves of the foot. The model may now be developed to investigate the functional outcomes of structural neuropathyindiabetic patients.
Abstract: This study is to investigate the electroencephalogram (EEG) differences generated from a normal and Alzheimer-s disease (AD) sources. We also investigate the effects of brain tissue distortions due to AD on EEG. We develop a realistic head model from T1 weighted magnetic resonance imaging (MRI) using finite element method (FEM) for normal source (somatosensory cortex (SC) in parietal lobe) and AD sources (right amygdala (RA) and left amygdala (LA) in medial temporal lobe). Then, we compare the AD sourced EEGs to the SC sourced EEG for studying the nature of potential changes due to sources and 5% to 20% brain tissue distortions. We find an average of 0.15 magnification errors produced by AD sourced EEGs. Different brain tissue distortion models also generate the maximum 0.07 magnification. EEGs obtained from AD sources and different brain tissue distortion levels vary scalp potentials from normal source, and the electrodes residing in parietal and temporal lobes are more sensitive than other electrodes for AD sourced EEG.
Abstract: In this paper, a fast motion compensation algorithm is
proposed that improves coding efficiency for video sequences with
brightness variations. We also propose a cross entropy measure
between histograms of two frames to detect brightness variations. The
framewise brightness variation parameters, a multiplier and an offset
field for image intensity, are estimated and compensated. Simulation
results show that the proposed method yields a higher peak signal to
noise ratio (PSNR) compared with the conventional method, with a
greatly reduced computational load, when the video scene contains
illumination changes.
Abstract: This article presents a short discussion on
optimum neighborhood size selection in a spherical selforganizing
feature map (SOFM). A majority of the literature
on the SOFMs have addressed the issue of selecting optimal
learning parameters in the case of Cartesian topology SOFMs.
However, the use of a Spherical SOFM suggested that the
learning aspects of Cartesian topology SOFM are not directly
translated. This article presents an approach on how to
estimate the neighborhood size of a spherical SOFM based on
the data. It adopts the L-curve criterion, previously suggested
for choosing the regularization parameter on problems of
linear equations where their right-hand-side is contaminated
with noise. Simulation results are presented on two artificial
4D data sets of the coupled Hénon-Ikeda map.
Abstract: In this paper, we were introduces a skin detection
method using a histogram approximation based on the mean shift
algorithm. The proposed method applies the mean shift procedure to a
histogram of a skin map of the input image, generated by comparison
with standard skin colors in the CbCr color space, and divides the
background from the skin region by selecting the maximum value
according to brightness level. The proposed method detects the skin
region using the mean shift procedure to determine a maximum value
that becomes the dividing point, rather than using a manually selected
threshold value, as in existing techniques. Even when skin color is
contaminated by illumination, the procedure can accurately segment
the skin region and the background region. The proposed method may
be useful in detecting facial regions as a pretreatment for face
recognition in various types of illumination.
Abstract: As the development of digital technology is increasing,
Digital cinema is getting more spread.
However, content copy and attack against the digital cinema becomes
a serious problem. To solve the above security problem, we propose
“Additional Watermarking" for digital cinema delivery system. With
this proposed “Additional watermarking" method, we protect content
copyrights at encoder and user side information at decoder. It realizes
the traceability of the watermark embedded at encoder.
The watermark is embedded into the random-selected frames using
Hash function. Using it, the embedding position is distributed by Hash
Function so that third parties do not break off the watermarking
algorithm.
Finally, our experimental results show that proposed method is much
better than the convenient watermarking techniques in terms of
robustness, image quality and its simple but unbreakable algorithm.
Abstract: A co-generation system in automobile can improve
thermal efficiency of vehicle in some degree. The waste heat from the
engine exhaust and coolant is still attractive energy source that reaches
around 60% of the total energy converted from fuel. To maximize the
effectiveness of heat exchangers for recovering the waste heat, it is
vital to select the most suitable working fluid for the system, not to
mention that it is important to find the optimum design for the heat
exchangers. The design of heat exchanger is out of scoop of this study;
rather, the main focus has been on the right selection of working fluid
for the co-generation system. Simulation study was carried out to find
the most suitable working fluid that can allow the system to achieve
the optimum efficiency in terms of the heat recovery rate and thermal
efficiency.
Abstract: Soccer simulation is an effort to motivate researchers and practitioners to do artificial and robotic intelligence research; and at the same time put into practice and test the results. Many researchers and practitioners throughout the world are continuously working to polish their ideas and improve their implemented systems. At the same time, new groups are forming and they bring bright new thoughts to the field. The research includes designing and executing robotic soccer simulation algorithms. In our research, a soccer simulation player is considered to be an intelligent agent that is capable of receiving information from the environment, analyze it and to choose the best action from a set of possible ones, for its next move. We concentrate on developing a two-phase method for the soccer player agent to choose its best next move. The method is then implemented into our software system called Nexus simulation team of Ferdowsi University. This system is based on TsinghuAeolus[1] team that was the champion of the world RoboCup soccer simulation contest in 2001 and 2002.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: For decades financial economists have been attempted to determine the optimal investment policy by recognizing the option value embedded in irreversible investment whose project value evolves as a geometric Brownian motion (GBM). This paper aims to examine the effects of the optimal investment trigger and of the misspecification of stochastic processes on investment in real options applications. Specifically, the former explores the consequence of adopting optimal investment rules on the distributions of corporate value under the correct assumption of stochastic process while the latter analyzes the influence on the distributions of corporate value as a result of the misspecification of stochastic processes, i.e., mistaking an alternative process as a GBM. It is found that adopting the correct optimal investment policy may increase corporate value by shifting the value distribution rightward, and the misspecification effect may decrease corporate value by shifting the value distribution leftward. The adoption of the optimal investment trigger has a major impact on investment to such an extent that the downside risk of investment is truncated at the project value of zero, thereby moving the value distributions rightward. The analytical framework is also extended to situations where collection lags are in place, and the result indicates that collection lags reduce the effects of investment trigger and misspecification on investment in an opposite way.
Abstract: Recently T. C. Au-Yeung, C.Au, and P. C. W. Fung [2] have given the solution of the KdV equation [1] to the boundary condition , where b is a constant. We have further extended the method of [2] to find the solution of the KdV equation with asymptotic degeneracy. Via simulations we find both bright and dark Solitons (i.e. Solitons with opposite phases).
Abstract: Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.
Abstract: Automated material handling is given prime
importance in the semi automated and automated facilities since it
provides solution to the gigantic problems related to inventory and
also support the latest philosophies like just in time production JIT
and lean production. Automated storage and retrieval system is an
antidote (if designed properly) to the facility sufferings like getting
the right material , materials getting perished, long cycle times or
many other similar kind of problems. A working model of automated
storage and retrieval system (AS/RS) is designed and developed
under the design parameters specified by Material Handling Industry
of America (MHIA). Later on analysis was carried out to calculate
the throughput and size of the machine. The possible implementation
of this technology in local scenario is also discussed in this paper.