Polarization Modulation by free-Standing Asymmetric Hole Arrays

We theoretically demonstrate modulation of light polarization by a crossed rectangular hole array with asymmetric arm lengths. There are two waveguide modes that can modulate the x- and y- polarized incident waves independently. A specific structure is proposed to convert a left-hand incident wave to a right-hand outgoing wave by transmission.

n− Strongly Gorenstein Projective, Injective and Flat Modules

Let R be a ring and n a fixed positive integer, we investigate the properties of n-strongly Gorenstein projective, injective and flat modules. Using the homological theory , we prove that the tensor product of an n-strongly Gorenstein projective (flat) right R -module and projective (flat) left R-module is also n-strongly Gorenstein projective (flat). Let R be a coherent ring ,we prove that the character module of an n -strongly Gorenstein flat left R -module is an n-strongly Gorenstein injective right R -module . At last, let R be a commutative ring and S a multiplicatively closed set of R , we establish the relation between n -strongly Gorenstein projective (injective , flat ) R -modules and n-strongly Gorenstein projective (injective , flat ) S−1R-modules. All conclusions in this paper is helpful for the research of Gorenstein dimensions in future.

Groundwater Management–A Policy Perspective

Groundwater has become the most dependable source of fresh water for agriculture, domestic and industrial uses in the past few decades. This wide use of groundwater if left uncontrolled and unseen will lead to overexploitation causing sea water intrusion in the coastal areas and illegal water marketing. Several Policies and Acts have been enacted to regulate and manage the use of this valuable resource. In spite of this the over extraction of groundwater beyond the recharging capacity of aquifers and depletion in the quality of groundwater is continuing. The current study aims at reviewing the Acts and Policies existing in the State of Tamil Nadu and in the National level regarding groundwater regulation and management. Further an analysis is made on the rights associated with the usage of groundwater resources and the gaps in these policies have been analyzed. Some suggestions are made to reform the existing groundwater policies for better management and regulation of the resource.

On Q-Fuzzy Ideals in Γ-Semigroups

In this paper the concept of Q-fuzzification of ideals of Γ-semigroups has been introduced and some important properties have been investigated. A characterization of regular Γ-semigroup in terms of Q-fuzzy ideals has been obtained. Operator semigroups of a Γ-semigroup has been made to work by obtaining various relationships between Q-fuzzy ideals of a Γ-semigroup and that of its operator semigroups.

A Delay-Tolerant Distributed Query Processing Architecture for Mobile Environment

The intermittent connectivity modifies the “always on" network assumption made by all the distributed query processing systems. In modern- day systems, the absence of network connectivity is considered as a fault. Since the last upload, it might not be feasible to transmit all the data accumulated right away over the available connection. It is possible that vital information may be delayed excessively when the less important information takes place of the vital information. Owing to the restricted and uneven bandwidth, it is vital that the mobile nodes make the most advantageous use of the connectivity when it arrives. Hence, in order to select the data that needs to be transmitted first, some sort of data prioritization is essential. A continuous query processing system for intermittently connected mobile networks that comprises of a delaytolerant continuous query processor distributed across the mobile hosts has been proposed in this paper. In addition, a mechanism for prioritizing query results has been designed that guarantees enhanced accuracy and reduced delay. It is illustrated that our architecture reduces the client power consumption, increases query efficiency by the extensive simulation results.

Experimental Studies on the Mechanical Property of Laminated Bamboo in Thailand

A new generation product made from bamboo strips, known as laminated bamboo, has gained importance. The objective of this research was to experiment the effect of three factors on the mechanical property of laminated bamboo. The interested factors for experimental design were (A) four bamboo species, namely Bambusa blumeana Schultes (Pai See Suk), Dendrocalamus asper Backer (Pai Tong), Dendrocalamus hamiltonii Nees (Pai Hok) and Dendrocalamus sericeus Munro (Pai Sang Mon), (B) two types of glue adhesive, polyvinyl acetate emulsion (PVAC) fortified with urea-formaldehyde (UF) and urea-formaldehyde (UF) to make parallel-oriented bamboo strips laminates and (C) glue weight per strip area, 150 g/m2 and 190 g/m2. Experimental results showed that Dendrocalamus asper Backer (Pai Tong) and Dendrocalamus sericeus Munro (Pai Sang Mon) were best used for manufacturing due to their highest MOR and MOE. The amount of glue weight 150 g/m2 yielded higher MOR and MOE than the amount of glue weight 190 g/m2. At the conclusion, the laminated bamboo manufacturers can benefit from this research in order to select right materials according to strength, cost and accessibility.

Knowledge Sharing based on Semantic Nets and Mereology to Avoid Risks in Manufacturing

The right information at the right time influences the enterprise and technical success. Sharing knowledge among members of a big organization may be a complex activity. And as long as the knowledge is not shared, can not be exploited by the organization. There are some mechanisms which can originate knowledge sharing. It is intended, in this paper, to trigger these mechanisms by using semantic nets. Moreover, the intersection and overlapping of terms and sub-terms, as well as their relationships will be described through the mereology science for the whole knowledge sharing system. It is proposed a knowledge system to supply to operators with the right information about a specific process and possible risks, e.g. at the assembly process, at the right time in an automated manufacturing environment, such as at the automotive industry.

An Anatomically-Based Model of the Nerves in the Human Foot

Sensory nerves in the foot play an important part in the diagnosis of various neuropathydisorders, especially in diabetes mellitus.However, a detailed description of the anatomical distribution of the nerves is currently lacking. A computationalmodel of the afferent nerves inthe foot may bea useful tool for the study of diabetic neuropathy. In this study, we present the development of an anatomically-based model of various major sensory nerves of the sole and dorsal sidesof the foot. In addition, we presentan algorithm for generating synthetic somatosensory nerve networks in the big-toe region of a right foot model. The algorithm was based on a modified version of the Monte Carlo algorithm, with the capability of being able to vary the intra-epidermal nerve fiber density in differentregionsof the foot model. Preliminary results from the combinedmodel show the realistic anatomical structure of the major nerves as well as the smaller somatosensory nerves of the foot. The model may now be developed to investigate the functional outcomes of structural neuropathyindiabetic patients.

Study of EEGs from Somatosensory Cortex and Alzheimer's Disease Sources

This study is to investigate the electroencephalogram (EEG) differences generated from a normal and Alzheimer-s disease (AD) sources. We also investigate the effects of brain tissue distortions due to AD on EEG. We develop a realistic head model from T1 weighted magnetic resonance imaging (MRI) using finite element method (FEM) for normal source (somatosensory cortex (SC) in parietal lobe) and AD sources (right amygdala (RA) and left amygdala (LA) in medial temporal lobe). Then, we compare the AD sourced EEGs to the SC sourced EEG for studying the nature of potential changes due to sources and 5% to 20% brain tissue distortions. We find an average of 0.15 magnification errors produced by AD sourced EEGs. Different brain tissue distortion models also generate the maximum 0.07 magnification. EEGs obtained from AD sources and different brain tissue distortion levels vary scalp potentials from normal source, and the electrodes residing in parietal and temporal lobes are more sensitive than other electrodes for AD sourced EEG.

Video Coding Algorithm for Video Sequences with Abrupt Luminance Change

In this paper, a fast motion compensation algorithm is proposed that improves coding efficiency for video sequences with brightness variations. We also propose a cross entropy measure between histograms of two frames to detect brightness variations. The framewise brightness variation parameters, a multiplier and an offset field for image intensity, are estimated and compensated. Simulation results show that the proposed method yields a higher peak signal to noise ratio (PSNR) compared with the conventional method, with a greatly reduced computational load, when the video scene contains illumination changes.

Estimating an Optimal Neighborhood Size in the Spherical Self-Organizing Feature Map

This article presents a short discussion on optimum neighborhood size selection in a spherical selforganizing feature map (SOFM). A majority of the literature on the SOFMs have addressed the issue of selecting optimal learning parameters in the case of Cartesian topology SOFMs. However, the use of a Spherical SOFM suggested that the learning aspects of Cartesian topology SOFM are not directly translated. This article presents an approach on how to estimate the neighborhood size of a spherical SOFM based on the data. It adopts the L-curve criterion, previously suggested for choosing the regularization parameter on problems of linear equations where their right-hand-side is contaminated with noise. Simulation results are presented on two artificial 4D data sets of the coupled Hénon-Ikeda map.

Skin Detection using Histogram depend on the Mean Shift Algorithm

In this paper, we were introduces a skin detection method using a histogram approximation based on the mean shift algorithm. The proposed method applies the mean shift procedure to a histogram of a skin map of the input image, generated by comparison with standard skin colors in the CbCr color space, and divides the background from the skin region by selecting the maximum value according to brightness level. The proposed method detects the skin region using the mean shift procedure to determine a maximum value that becomes the dividing point, rather than using a manually selected threshold value, as in existing techniques. Even when skin color is contaminated by illumination, the procedure can accurately segment the skin region and the background region. The proposed method may be useful in detecting facial regions as a pretreatment for face recognition in various types of illumination.

Traceable Watermarking System using SoC for Digital Cinema Delivery

As the development of digital technology is increasing, Digital cinema is getting more spread. However, content copy and attack against the digital cinema becomes a serious problem. To solve the above security problem, we propose “Additional Watermarking" for digital cinema delivery system. With this proposed “Additional watermarking" method, we protect content copyrights at encoder and user side information at decoder. It realizes the traceability of the watermark embedded at encoder. The watermark is embedded into the random-selected frames using Hash function. Using it, the embedding position is distributed by Hash Function so that third parties do not break off the watermarking algorithm. Finally, our experimental results show that proposed method is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.

Optimum Working Fluid Selection for Automotive Cogeneration System

A co-generation system in automobile can improve thermal efficiency of vehicle in some degree. The waste heat from the engine exhaust and coolant is still attractive energy source that reaches around 60% of the total energy converted from fuel. To maximize the effectiveness of heat exchangers for recovering the waste heat, it is vital to select the most suitable working fluid for the system, not to mention that it is important to find the optimum design for the heat exchangers. The design of heat exchanger is out of scoop of this study; rather, the main focus has been on the right selection of working fluid for the co-generation system. Simulation study was carried out to find the most suitable working fluid that can allow the system to achieve the optimum efficiency in terms of the heat recovery rate and thermal efficiency.

A Two-Phase Mechanism for Agent's Action Selection in Soccer Simulation

Soccer simulation is an effort to motivate researchers and practitioners to do artificial and robotic intelligence research; and at the same time put into practice and test the results. Many researchers and practitioners throughout the world are continuously working to polish their ideas and improve their implemented systems. At the same time, new groups are forming and they bring bright new thoughts to the field. The research includes designing and executing robotic soccer simulation algorithms. In our research, a soccer simulation player is considered to be an intelligent agent that is capable of receiving information from the environment, analyze it and to choose the best action from a set of possible ones, for its next move. We concentrate on developing a two-phase method for the soccer player agent to choose its best next move. The method is then implemented into our software system called Nexus simulation team of Ferdowsi University. This system is based on TsinghuAeolus[1] team that was the champion of the world RoboCup soccer simulation contest in 2001 and 2002.

Web Page Watermarking: XML files using Synonyms and Acronyms

Advent enhancements in the field of computing have increased massive use of web based electronic documents. Current Copyright protection laws are inadequate to prove the ownership for electronic documents and do not provide strong features against copying and manipulating information from the web. This has opened many channels for securing information and significant evolutions have been made in the area of information security. Digital Watermarking has developed into a very dynamic area of research and has addressed challenging issues for digital content. Watermarking can be visible (logos or signatures) and invisible (encoding and decoding). Many visible watermarking techniques have been studied for text documents but there are very few for web based text. XML files are used to trade information on the internet and contain important information. In this paper, two invisible watermarking techniques using Synonyms and Acronyms are proposed for XML files to prove the intellectual ownership and to achieve the security. Analysis is made for different attacks and amount of capacity to be embedded in the XML file is also noticed. A comparative analysis for capacity is also made for both methods. The system has been implemented using C# language and all tests are made practically to get the results.

The Effects of Misspecification of Stochastic Processes on Investment Appraisal

For decades financial economists have been attempted to determine the optimal investment policy by recognizing the option value embedded in irreversible investment whose project value evolves as a geometric Brownian motion (GBM). This paper aims to examine the effects of the optimal investment trigger and of the misspecification of stochastic processes on investment in real options applications. Specifically, the former explores the consequence of adopting optimal investment rules on the distributions of corporate value under the correct assumption of stochastic process while the latter analyzes the influence on the distributions of corporate value as a result of the misspecification of stochastic processes, i.e., mistaking an alternative process as a GBM. It is found that adopting the correct optimal investment policy may increase corporate value by shifting the value distribution rightward, and the misspecification effect may decrease corporate value by shifting the value distribution leftward. The adoption of the optimal investment trigger has a major impact on investment to such an extent that the downside risk of investment is truncated at the project value of zero, thereby moving the value distributions rightward. The analytical framework is also extended to situations where collection lags are in place, and the result indicates that collection lags reduce the effects of investment trigger and misspecification on investment in an opposite way.

Solution of The KdV Equation with Asymptotic Degeneracy

Recently T. C. Au-Yeung, C.Au, and P. C. W. Fung [2] have given the solution of the KdV equation [1] to the boundary condition , where b is a constant. We have further extended the method of [2] to find the solution of the KdV equation with asymptotic degeneracy. Via simulations we find both bright and dark Solitons (i.e. Solitons with opposite phases).

Spread Spectrum Image Watermarking for Secured Multimedia Data Communication

Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.

Design, Development and Analysis of Automated Storage and Retrieval System with Single and Dual Command Dispatching using MATLAB

Automated material handling is given prime importance in the semi automated and automated facilities since it provides solution to the gigantic problems related to inventory and also support the latest philosophies like just in time production JIT and lean production. Automated storage and retrieval system is an antidote (if designed properly) to the facility sufferings like getting the right material , materials getting perished, long cycle times or many other similar kind of problems. A working model of automated storage and retrieval system (AS/RS) is designed and developed under the design parameters specified by Material Handling Industry of America (MHIA). Later on analysis was carried out to calculate the throughput and size of the machine. The possible implementation of this technology in local scenario is also discussed in this paper.