Abstract: A simple but effective digital watermarking scheme
utilizing a context adaptive variable length coding (CAVLC) method
is presented for wireless communication system. In the proposed
approach, the watermark bits are embedded in the final non-zero
quantized coefficient of each DCT block, thereby yielding a potential
reduction in the length of the coded block. As a result, the
watermarking scheme not only provides the means to check the
authenticity and integrity of the video stream, but also improves the
compression ratio and therefore reduces both the transmission time
and the storage space requirements of the coded video sequence. The
results confirm that the proposed scheme enables the detection of
malicious tampering attacks and reduces the size of the coded H.264
file. Therefore, the current study is feasible to apply in the video
applications of wireless communication such as 3G system
Abstract: In the paper, the energetic features of the loaded gait
are newly analyzed depending on the trunk flexion change. To
investigate the loaded gait, walking experiments are performed for five
subjects and, the ground reaction forces and kinematic data are
measured. Based on these information, we compute the impulse,
momentum and mechanical works done on the center of body mass,
through the trunk flexion change. As a result, it is shown that the trunk
flexion change does not affect the impulses and momentums during
the step-to-step transition as well. However, the direction of the
pre-collision momentum does change depending on the trunk flexion
change, which is degenerated just after (or during) the collision period.
Abstract: Many artificial intelligence (AI) techniques are inspired
by problem-solving strategies found in nature. Robustness is a key
feature in many natural systems. This paper studies robustness in
artificial neural networks (ANNs) and proposes several novel, nature
inspired ANN architectures. The paper includes encouraging results
from experimental studies on these networks showing increased
robustness.
Abstract: This paper explores the opportunity of using tri-axial
wireless accelerometers for supervised monitoring of sports
movements. A motion analysis system for the upper extremities of
lawn bowlers in particular is developed. Accelerometers are placed
on parts of human body such as the chest to represent the shoulder
movements, the back to capture the trunk motion, back of the hand,
the wrist and one above the elbow, to capture arm movements. These
sensors placement are carefully designed in order to avoid restricting
bowler-s movements. Data is acquired from these sensors in soft-real
time using virtual instrumentation; the acquired data is then
conditioned and converted into required parameters for motion
regeneration. A user interface was also created to facilitate in the
acquisition of data, and broadcasting of commands to the wireless
accelerometers. All motion regeneration in this paper deals with the
motion of the human body segment in the X and Y direction, looking
into the motion of the anterior/ posterior and lateral directions
respectively.
Abstract: In this paper, we present a novel approach to accurately
detect text regions including shop name in signboard images with
complex background for mobile system applications. The proposed
method is based on the combination of text detection using edge
profile and region segmentation using fuzzy c-means method. In the
first step, we perform an elaborate canny edge operator to extract all
possible object edges. Then, edge profile analysis with vertical and
horizontal direction is performed on these edge pixels to detect
potential text region existing shop name in a signboard. The edge
profile and geometrical characteristics of each object contour are
carefully examined to construct candidate text regions and classify the
main text region from background. Finally, the fuzzy c-means
algorithm is performed to segment and detected binarize text region.
Experimental results show that our proposed method is robust in text
detection with respect to different character size and color and can
provide reliable text binarization result.
Abstract: In this work a software simulation model has been
proposed for two driven wheels mobile robot path planning; that can
navigate in dynamic environment with static distributed obstacles.
The work involves utilizing Bezier curve method in a proposed N
order matrix form; for engineering the mobile robot path. The Bezier
curve drawbacks in this field have been diagnosed. Two directions:
Up and Right function has been proposed; Probability Recursive
Function (PRF) to overcome those drawbacks.
PRF functionality has been developed through a proposed;
obstacle detection function, optimization function which has the
capability of prediction the optimum path without comparison
between all feasible paths, and N order Bezier curve function that
ensures the drawing of the obtained path.
The simulation results that have been taken showed; the mobile
robot travels successfully from starting point and reaching its goal
point. All obstacles that are located in its way have been avoided.
This navigation is being done successfully using the proposed PRF
techniques.
Abstract: We report a novel fusion tag for expressing
recombinant proteins in E. coli. The fusion tag is the C-terminus part
of the human GMCSF gene comprising 45 amino acids, which aid in
over expression of otherwise non expressible genes. Expression of
hIFN a2b with this fusion tag also escapes the requirement of rare
codons for expression. This is also a first report of a small fusion tag
of human origin having affinity to heparin sepharose column
facilitating the purification of fusion protein.
Abstract: Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing (LAR1).Our evaluation is based on energy consumption in mobile ad hoc networks. The performance differentials are analyzed using varying network load, mobility, and network size. We simulate protocols with GLOMOSIM simulator. Based on the observations, we make recommendations about when the performance of either protocol can be best.
Abstract: This paper represents four unsupervised clustering algorithms namely sIB, RandomFlatClustering, FarthestFirst, and FilteredClusterer that previously works have not been used for network traffic classification. The methodology, the result, the products of the cluster and evaluation of these algorithms with efficiency of each algorithm from accuracy are shown. Otherwise, the efficiency of these algorithms considering form the time that it use to generate the cluster quickly and correctly. Our work study and test the best algorithm by using classify traffic anomaly in network traffic with different attribute that have not been used before. We analyses the algorithm that have the best efficiency or the best learning and compare it to the previously used (K-Means). Our research will be use to develop anomaly detection system to more efficiency and more require in the future.
Abstract: In this paper, an efficient technique is proposed to manage the cache memory. The proposed technique introduces some modifications on the well-known set associative mapping technique. This modification requires a little alteration in the structure of the cache memory and on the way by which it can be referenced. The proposed alteration leads to increase the set size virtually and consequently to improve the performance and the utilization of the cache memory. The current mapping techniques have accomplished good results. In fact, there are still different cases in which cache memory lines are left empty and not used, whereas two or more processes overwrite the lines of each other, instead of using those empty lines. The proposed algorithm aims at finding an efficient way to deal with such problem.
Abstract: Mathematical and computational modeling of calcium
signalling in nerve cells has produced considerable insights into how
the cells contracts with other cells under the variation of biophysical
and physiological parameters. The modeling of calcium signaling in
astrocytes has become more sophisticated. The modeling effort has
provided insight to understand the cell contraction. Main objective
of this work is to study the effect of voltage gated (Operated)
calcium channel (VOC) on calcium profile in the form of advection
diffusion equation. A mathematical model is developed in the form
of advection diffusion equation for the calcium profile. The model
incorporates the important physiological parameter like diffusion
coefficient etc. Appropriate boundary conditions have been framed.
Finite volume method is employed to solve the problem. A program
has been developed using in MATLAB 7.5 for the entire problem
and simulated on an AMD-Turion 32-bite machine to compute the
numerical results.
Abstract: This paper focuses on assessment of air pollution in Umm-Alhyman, Kuwait, which is located south to oil refineries, power station, oil field, and highways. The measurements were made over a period of four days in March and July in 2001, 2004, and 2008. The measured pollutants included methanated and nonmethanated hydrocarbons (MHC, NMHC), CO, CO2, SO2, NOX, O3, and PM10. Also, meteorological parameters were measured, which includes temperature, wind speed and direction, and solar radiation. Over the study period, data analysis showed increase in measured SO2, NOX and CO by factors of 1.2, 5.5 and 2, respectively. This is explained in terms of increase in industrial activities, motor vehicle density, and power generation. Predictions of the measured data were made by the ISC-AERMOD software package and by using the ISCST3 model option. Finally, comparison was made between measured data against international standards.
Abstract: This study investigated the effect of cross sectional
geometry on sediment transport rate. The processes of sediment
transport are generally associated to environmental management,
such as pollution caused by the forming of suspended sediment in the
channel network of a watershed and preserving physical habitats and
native vegetations, and engineering applications, such as the
influence of sediment transport on hydraulic structures and flood
control design. Many equations have been proposed for computing
the sediment transport, the influence of many variables on sediment
transport has been understood; however, the effect of other variables
still requires further research. For open channel flow, sediment
transport capacity is recognized to be a function of friction slope,
flow velocity, grain size, grain roughness and form roughness, the
hydraulic radius of the bed section and the type and quantity of
vegetation cover. The effect of cross sectional geometry of the
channel on sediment transport is one of the variables that need
additional investigation. The width-depth ratio (W/d) is a
comparative indicator of the channel shape. The width is the total
distance across the channel and the depth is the mean depth of the
channel. The mean depth is best calculated as total cross-sectional
area divided by the top width. Channels with high W/d ratios tend to
be shallow and wide, while channels with low (W/d) ratios tend to be
narrow and deep. In this study, the effects of the width-depth ratio on
sediment transport was demonstrated theoretically by inserting the
shape factor in sediment continuity equation and analytically by
utilizing the field data sets for Yalobusha River. It was found by
utilizing the two approaches as a width-depth ratio increases the
sediment transport decreases.
Abstract: Computer network courses are essential parts of college computer science curriculum and hands-on networking experience is well recognized as an effective approach to help students understand better about the network concepts, the layered architecture of network protocols, and the dynamics of the networks. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up and maintain the lab environment. Many universities/colleges lack the resources and build-ups in this field and have difficulty to provide students with hands-on practice labs. A new affordable and easily-adoptable approach to networking labs is desirable to enhance network teaching and learning. In addition, current network labs are short on providing hands-on practice for modern wireless and mobile network learning. With the prevalence of smart mobile devices, wireless and mobile network are permeating into various aspects of our information society. The emerging and modern mobile technology provides computer science students with more authentic learning experience opportunities especially in network learning. A mobile device based hands-on labware can provide an excellent ‘real world’ authentic learning environment for computer network especially for wireless network study. In this paper, we present our mobile device-based hands-on labware (series of lab module) for computer network learning which is guided by authentic learning principles to immerse students in a real world relevant learning environment. We have been using this labware in teaching computer network, mobile security, and wireless network classes. The student feedback shows that students can learn more when they have hands-on authentic learning experience.
Abstract: Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can be improved. One common design for routing protocols in mobile ad hoc networks is to use positioning information; we use the node-s geometric locations to introduce an algorithm that can construct the virtual backbone structure locally in 3D environment. The algorithm construction has a constant time.
Abstract: In this paper, a set of experimental data has been used to assess the influence of abrasive water jet (AWJ) process parameters in cutting 6063-T6 aluminum alloy. The process variables considered here include nozzle diameter, jet traverse rate, jet pressure and abrasive flow rate. The effects of these input parameters are studied on depth of cut (h); one of most important characteristics of AWJ. The Taguchi method and regression modeling are used in order to establish the relationships between input and output parameters. The adequacy of the model is evaluated using analysis of variance (ANOVA) technique. In the next stage, the proposed model is embedded into a Simulated Annealing (SA) algorithm to optimize the AWJ process parameters. The objective is to determine a suitable set of process parameters that can produce a desired depth of cut, considering the ranges of the process parameters. Computational results prove the effectiveness of the proposed model and optimization procedure.
Abstract: The predictability of masonry arch bridges and their
behaviour is widely considered doubtful due to the lack of knowledge
about the conditions of a given masonry arch bridge. The assessment
methods for masonry arch bridges are MEXE, ARCHIE, RING and
Frame Analysis Method. The material properties of the masonry and
fill material are extremely difficult to determine accurately.
Consequently, it is necessary to examine the effect of load dispersal
angle through the fill material, the effect of variations in the stiffness
of the masonry, the tensile strength of the masonry mortar continuum
and the compressive strength of the masonry mortar continuum. It is
also important to understand the effect of fill material on load
dispersal angle to determine their influence on ratings. In this paper a
series of parametric studies, to examine the sensitivity of assessment
ratings to the various sets of input data required by the frame analysis
method, are carried out.
Abstract: Among many different methods that are used for
optimizing different engineering problems mathematical (numerical)
optimization techniques are very important because they can easily
be used and are consistent with most of engineering problems. Many
studies and researches are done on stability analysis of three
dimensional (3D) slopes and the relating probable slip surfaces and
determination of factors of safety, but in most of them force
equilibrium equations, as in simplified 2D methods, are considered
only in two directions. In other words for decreasing mathematical
calculations and also for simplifying purposes the force equilibrium
equation in 3rd direction is omitted. This point is considered in just a
few numbers of previous studies and most of them have only given a
factor of safety and they haven-t made enough effort to find the most
probable slip surface. In this study shapes of the slip surfaces are
modeled, and safety factors are calculated considering the force
equilibrium equations in all three directions, and also the moment
equilibrium equation is satisfied in the slip direction, and using
nonlinear programming techniques the shape of the most probable
slip surface is determined. The model which is used in this study is a
3D model that is composed of three upper surfaces which can cover
all defined and probable slip surfaces. In this research the meshing
process is done in a way that all elements are prismatic with
quadrilateral cross sections, and the safety factor is defined on this
quadrilateral surface in the base of the element which is a part of the
whole slip surface. The method that is used in this study to find the
most probable slip surface is the non-linear programming method in
which the objective function that must get optimized is the factor of
safety that is a function of the soil properties and the coordinates of
the nodes on the probable slip surface. The main reason for using
non-linear programming method in this research is its quick
convergence to the desired responses. The final results show a good
compatibility with the previously used classical and 2D methods and
also show a reasonable convergence speed.
Abstract: The paper investigates the relationship between the foreign direct investment (FDI) and the corporate governance or transparency by investigating the country-level FDI flows, FDI inward performance, corporate governance and transparency variables. From the regression analysis with Newey-West estimator of 28 country panel data from 1990- 2002, we find strong positive relationships between corporate governance or transparency level of hosting countries and FDI inward performance within hosting countries. A strong positive relationship is found between anti-director rights level or number of analysts of hosting countries and FDI inward performance within hosting countries. Also, we find a positive relationship between the number of analysts of hosting countries and FDI inflows. The empirical results are consistent with stock market liberalizations and corporate governance explanations of reasons for FDI.
Abstract: The purpose of this study is to determine in what
ways elementary education prospective teachers are being informed
about innovations and to explain the role of social influence in the
usage process of a technological innovation in terms of genders. The
study group consisted of 300 prospective teachers, including 234
females and 66 males. Data have been collected by a questionnaire
developed by the researchers. The result of the study showed that,
while prospective teachers are being informed about innovations
most frequently by mass media, they rarely seek to take expert
advice. In addition, analysis of results showed that the social
influence on females were significantly higher than males in usage
process of a technological innovation.