Abstract: Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. One of the most common methods of implementation is Least Significant Bit Insertion, in which the least significant bit of every byte is altered to form the bit-string representing the embedded file. Altering the LSB will only cause minor changes in color, and thus is usually not noticeable to the human eye. While this technique works well for 24-bit color image files, steganography has not been as successful when using an 8-bit color image file, due to limitations in color variations and the use of a colormap. This paper presents the results of research investigating the combination of image compression and steganography. The technique developed starts with a 24-bit color bitmap file, then compresses the file by organizing and optimizing an 8-bit colormap. After the process of compression, a text message is hidden in the final, compressed image. Results indicate that the final technique has potential of being useful in the steganographic world.
Abstract: The impacts of near-campus student housing, or offcampus
students accommodation cannot be ignored by the
universities and as well as the community officials. Numerous
scholarly studies, have highlighted the substantial economic impacts
either; direct, indirect or induced, and cumulatively the roles of the
universities have significantly contributed to the local economies.
The issue of the impacts of off-campus student rental housing on
neighbourhoods is one that has been of long-standing but increasing
concern in Malaysia. Statistically, in Malaysia, there was
approximately a total of 1.2 - 1.5 million students in 2009. By the
year 2015, it is expected that 50 per cent of 18 to 30 year olds active
population should gain access to university education, amounting to
120,000 yearly. The objectives of the research are to assess the
impacts off-campus students on the local neighbourhood and
specifically to obtain information on the living and learning
conditions of off-campus students of Universiti Teknologi MARA
Shah Alam, Malaysia. It is also to isolate those factors that may
impede the successful learning so that priority can be given to them
in subsequent policy implementations and actions by government and
the higher education institutions.
Abstract: Mostly, pedestrian-car accidents occurred at a
signalized interaction is because pedestrians cannot across the
intersection safely within the green light. From the viewpoint of
pedestrian, there might have two reasons. The first one is pedestrians
cannot speed up to across the intersection, such as the elders. The other
reason is pedestrians do not sense that the signal phase is going to
change and their right-of-way is going to lose. Developing signal logic
to protect pedestrian, who is crossing an intersection is the first
purpose of this study. Another purpose of this study is improving the
reliability and reduce delay of public transportation service. Therefore,
bus preemption is also considered in the designed signal logic. In this
study, the traffic data of the intersection of Chong-Qing North Road
and Min-Zu West Road, Taipei, Taiwan, is employed to calibrate and
validate the signal logic by simulation. VISSIM 5.20, which is a
microscopic traffic simulation software, is employed to simulate the
signal logic. From the simulated results, the signal logic presented in
this study can protect pedestrians crossing the intersection
successfully. The design of bus preemption can reduce the average
delay. However, the pedestrian safety and bus preemptive signal will
influence the average delay of cars largely. Thus, whether applying the
pedestrian safety and bus preemption signal logic to an isolated
intersection or not should be evaluated carefully.
Abstract: Malaysia has successfully applied economic planning
to guide the development of the country from an economy of
agriculture and mining to a largely industrialised one. Now, with its
sights set on attaining the economic level of a fully developed nation
by 2020, the planning system must be made even more efficient and
focused.
It must ensure that every investment made in the country, contribute
towards creating the desirable objective of a strong, modern,
internationally competitive, technologically advanced, post-industrial
economy. Cities in Malaysia must also be fully aware of the enormous
competition it faces in a region with rapidly expanding and
modernising economies, all contending for the same pool of potential
international investments.
Efficiency of urban governance is also fundamental issue in
development characterized by sustainability, subsidiarity, equity,
transparency and accountability, civic engagement and citizenship, and
security. As described above, city competitiveness is harnessed
through 'city marketing and city management'.
High technology and high skilled industries, together with finance,
transportation, tourism, business, information and professional
services shopping and other commercial activities, are the principal
components of the nation-s economy, which must be developed to a
level well beyond where it is now. In this respect, Kuala Lumpur being
the premier city must play the leading role.
Abstract: Reliable water level forecasts are particularly
important for warning against dangerous flood and inundation. The
current study aims at investigating the suitability of the adaptive
network based fuzzy inference system for continuous water level
modeling. A hybrid learning algorithm, which combines the least
square method and the back propagation algorithm, is used to
identify the parameters of the network. For this study, water levels
data are available for a hydrological year of 2002 with a sampling
interval of 1-hour. The number of antecedent water level that should
be included in the input variables is determined by two statistical
methods, i.e. autocorrelation function and partial autocorrelation
function between the variables. Forecasting was done for 1-hour until
12-hour ahead in order to compare the models generalization at
higher horizons. The results demonstrate that the adaptive networkbased
fuzzy inference system model can be applied successfully and
provide high accuracy and reliability for river water level estimation.
In general, the adaptive network-based fuzzy inference system
provides accurate and reliable water level prediction for 1-hour ahead
where the MAPE=1.15% and correlation=0.98 was achieved. Up to
12-hour ahead prediction, the model still shows relatively good
performance where the error of prediction resulted was less than
9.65%. The information gathered from the preliminary results
provide a useful guidance or reference for flood early warning
system design in which the magnitude and the timing of a potential
extreme flood are indicated.
Abstract: The orthogonal processes to shape the triangle steel plate into a equilateral vertical steel are examined by an incremental elasto-plastic finite-element method based on an updated Lagrangian formulation. The highly non-linear problems due to the geometric changes, the inelastic constitutive behavior and the boundary conditions varied with deformation are taken into account in an incremental manner. On the contact boundary, a modified Coulomb friction mode is specially considered. A weighting factor r-minimum is employed to limit the step size of loading increment to linear relation. In particular, selective reduced integration was adopted to formulate the stiffness matrix. The simulated geometries of verticality could clearly demonstrate the vertical processes until unloading. A series of experiments and simulations were performed to validate the formulation in the theory, leading to the development of the computer codes. The whole deformation history and the distribution of stress, strain and thickness during the forming process were obtained by carefully considering the moving boundary condition in the finite-element method. Therefore, this modeling can be used for judging whether a equilateral vertical steel can be shaped successfully. The present work may be expected to improve the understanding of the formation of the equilateral vertical steel.
Abstract: Keys to high-quality face-to-face education are ensuring flexibility in the way lectures are given, and providing care and responsiveness to learners. This paper describes a face-to-face education support system that is designed to raise the satisfaction of learners and reduce the workload on instructors. This system consists of a lecture adaptation assistance part, which assists instructors in adapting teaching content and strategy, and a Q&A assistance part, which provides learners with answers to their questions. The core component of the former part is a “learning achievement map", which is composed of a Bayesian network (BN). From learners- performance in exercises on relevant past lectures, the lecture adaptation assistance part obtains information required to adapt appropriately the presentation of the next lecture. The core component of the Q&A assistance part is a case base, which accumulates cases consisting of questions expected from learners and answers to them. The Q&A assistance part is a case-based search system equipped with a search index which performs probabilistic inference. A prototype face-to-face education support system has been built, which is intended for the teaching of Java programming, and this approach was evaluated using this system. The expected degree of understanding of each learner for a future lecture was derived from his or her performance in exercises on past lectures, and this expected degree of understanding was used to select one of three adaptation levels. A model for determining the adaptation level most suitable for the individual learner has been identified. An experimental case base was built to examine the search performance of the Q&A assistance part, and it was found that the rate of successfully finding an appropriate case was 56%.
Abstract: The equilibrium process of plasma nitrogen species by
chemical kinetic reactions along various pressures is successfully
investigated. The equilibrium process is required in industrial
application to obtain the stable condition when heating up the
material for having homogenous reaction. Nitrogen species densities
is modeled by a continuity equation and extended Arrhenius form.
These equations are used to integrate the change of density over the
time. The integration is to acquire density and the reaction rate of
each reaction where temperature and time dependence are imposed.
A comparison is made with global model within pressure range of 1-
100mTorr and the temperature of electron is set to be higher than
other nitrogen species. The results shows that the chemical kinetic
model only agrees for high pressure because of no power imposed;
while the global model considers the external power along the
pressure range then the electron and nitrogen species give highly
quantity densities by factor of 3 to 5.
Abstract: Retinal prostheses have been successful in eliciting
visual responses in implanted subjects. As these prostheses progress,
one of their major limitations is the need for increased resolution. As
an alternative to increasing the number of electrodes, virtual
electrodes may be used to increase the effective resolution of current
electrode arrays. This paper presents a virtual electrode technique
based upon time-offsets between stimuli. Two adjacent electrodes are
stimulated with identical pulses with too short of pulse widths to
activate a neuron, but one has a time offset of one pulse width. A
virtual electrode of twice the pulse width was then shown to appear in
the center, with a total width capable of activating a neuron. This can
be used in retinal implants by stimulating electrodes with pulse
widths short enough to not elicit responses in neurons, but with their
combined pulse width adequate to activate a neuron in between them.
Abstract: Creation and maintenance of knowledge management
systems has been recognized as an important research area.
Consecutively lack of accurate results from knowledge management
systems limits the organization to apply their knowledge
management processes. This leads to a failure in getting the right
information to the right people at the right time thus followed by a
deficiency in decision making processes. An Intranet offers a
powerful tool for communication and collaboration, presenting data
and information, and the means that creates and shares knowledge,
all in one easily accessible place. This paper proposes an archetype
describing how a knowledge management system, with the support
of intranet capabilities, could very much increase the accuracy of
capturing, storing and retrieving knowledge based processes thereby
increasing the efficiency of the system. This system will expect a
critical mass of usage, by the users, for intranet to function as
knowledge management systems. This prototype would lead to a
design of an application that would impose creation and maintenance
of an effective knowledge management system through intranet. The
aim of this paper is to introduce an effective system to handle
capture, store and distribute knowledge management in a form that
may not lead to any failure which exists in most of the systems. The
methodology used in the system would require all the employees, in
the organization, to contribute the maximum to deliver the system to
a successful arena. The system is still in its initial mode and thereby
the authors are under the process to practically implement the ideas,
as mentioned in the system, to produce satisfactory results.
Abstract: This paper features the trajectory planning design of a indigenously developed 4-Axis SCARA robot which is used for doing successful robotic manipulation task in the laboratory. Once, a trajectory is being designed and given as input to the robot, the robot's gripper tip moves along that specified trajectory. Trajectories have to be designed in the work space only. The main idea of this paper is to design a continuous path trajectory model for the indigenously developed SCARA robot arm during its maneuvering from one point to another point (during pick and place operations) in a workspace avoiding all the obstacles in its path of motion.
Abstract: Nano fibers produced by electrospinning are of industrial and scientific attention due to their special characteristics such as long length, small diameter and high surface area. Applications of electrospun structures in nanotechnology are included tissue scaffolds, fibers for drug delivery, composite reinforcement, chemical sensing, enzyme immobilization, membrane-based filtration, protective clothing, catalysis, solar cells, electronic devices and others. Many polymer and ceramic precursor nano fibers have been successfully electrospun with diameters in the range from 1 nm to several microns. The process is complex so that fiber diameter is influenced by various material, design and operating parameters. The objective of this work is to apply genetic algorithm on the parameters of electrospinning which have the most significant effect on the nano fiber diameter to determine the optimum parameter values before doing experimental set up. Effective factors including initial polymer concentration, initial jet radius, electrical potential, relaxation time, initial elongation, viscosity and distance between nozzle and collector are considered to determine finest diameter which is selected by user.
Abstract: Building condition assessment is a critical activity in Malaysia-s Comprehensive Asset Management Model. It is closely related to building performance that impact user-s life and decision making. This study focuses on public primary school, one of the most valuable assets for the country. The assessment was carried out based on CSP1 Matrix in Kuching Division of Sarawak, Malaysia. Based on the matrix used, three main criteria of the buildings has successfully evaluate: the number of defects; schools rating; and total schools rating. The analysis carried out on 24 schools found that the overall 4, 725 defects has been identified. Meanwhile, the overall score obtained was 45, 868 and the overall rating is 9.71, which is at the fair condition. This result has been associated with building age to evaluate its impacts on school buildings condition. The findings proved that building condition is closely related to building age and its support the theory that 'the ageing building has more defect than the new one'.
Abstract: Urban problems are problems of organized complexity. Thus, many models and scientific methods to resolve urban problems are failed. This study is concerned with proposing of a fuzzy system driven approach for classification and solving urban problems. The proposed study investigated mainly the selection of the inputs and outputs of urban systems for classification of urban problems. In this research, five categories of urban problems, respect to fuzzy system approach had been recognized: control, polytely, optimizing, open and decision making problems. Grounded Theory techniques were then applied to analyze the data and develop new solving method for each category. The findings indicate that the fuzzy system methods are powerful processes and analytic tools for helping planners to resolve urban complex problems. These tools can be successful where as others have failed because both incorporate or address uncertainty and risk; complexity and systems interacting with other systems.
Abstract: Recent fifteen years witnessed fast improvements in the field of humanoid robotics. The human-like robot structure is
more suitable to human environment with its supreme obstacle avoidance properties when compared with wheeled service robots.
However, the walking control for bipedal robots is a challenging task
due to their complex dynamics. Stable reference generation plays a very important role in control.
Linear Inverted Pendulum Model (LIPM) and the Zero Moment Point (ZMP) criterion are applied in a number of studies for stable
walking reference generation of biped walking robots. This paper follows this main approach too. We propose a natural and continuous ZMP reference trajectory for a stable and human-like walk. The ZMP reference trajectories move forward under the sole of the support foot when the robot body is supported by a single leg. Robot center of mass trajectory is obtained
from predefined ZMP reference trajectories by a Fourier series
approximation method. The Gibbs phenomenon problem common with Fourier approximations of discontinuous functions is avoided by employing continuous ZMP references. Also, these ZMP reference
trajectories possess pre-assigned single and double support phases,
which are very useful in experimental tuning work.
The ZMP based reference generation strategy is tested via threedimensional
full-dynamics simulations of a 12-degrees-of-freedom
biped robot model. Simulation results indicate that the proposed reference trajectory generation technique is successful.
Abstract: An experiment was performed in the south of
Morocco in order to evaluate the effect of deficit irrigation by treated
wastewater on chickpea production. We applied six irrigation
treatments on a local variety of chickpea by supplying alternatively
50 or 100% of ETm in a completely randomized design.
We found a highly significant difference between treatments in
terms of biomass production. Drought stress during the vegetative
period showed highest yield with 6.5 t/ha which was more than the
yield obtained for the control (4.9 t/ha). The optimal crop stage in
which deficit irrigation can be applied is the vegetative growth stage,
as the crop has a chance to develop its root system, to be able to
cover the plant needs for water and nutrient supply during the rest of
cycle, and non stress conditions during the flowering and seed filling
stages allow the plant to optimize its photosynthesis and carbon
translocation, therefore increase its productivity.
Abstract: Many problems in computer vision and image
processing present potential for parallel implementations through one
of the three major paradigms of geometric parallelism, algorithmic
parallelism and processor farming. Static process scheduling
techniques are used successfully to exploit geometric and algorithmic
parallelism, while dynamic process scheduling is better suited to
dealing with the independent processes inherent in the process
farming paradigm. This paper considers the application of parallel or
multi-computers to a class of problems exhibiting spatial data
characteristic of the geometric paradigm. However, by using
processor farming paradigm, a dynamic scheduling technique is
developed to suit the MIMD structure of the multi-computers. A
hybrid scheme of scheduling is also developed and compared with
the other schemes. The specific problem chosen for the investigation
is the Hough transform for line detection.
Abstract: HIV-1 genome is highly heterogeneous. Due to this
variation, features of HIV-I genome is in a wide range. For this
reason, the ability to infection of the virus changes depending on
different chemokine receptors. From this point of view, R5 HIV
viruses use CCR5 coreceptor while X4 viruses use CXCR5 and
R5X4 viruses can utilize both coreceptors. Recently, in
Bioinformatics, R5X4 viruses have been studied to classify by using
the experiments on HIV-1 genome.
In this study, R5X4 type of HIV viruses were classified using
Auto Regressive (AR) model through Artificial Neural Networks
(ANNs). The statistical data of R5X4, R5 and X4 viruses was
analyzed by using signal processing methods and ANNs. Accessible
residues of these virus sequences were obtained and modeled by AR
model since the dimension of residues is large and different from
each other. Finally the pre-processed data was used to evolve various
ANN structures for determining R5X4 viruses. Furthermore ROC
analysis was applied to ANNs to show their real performances. The
results indicate that R5X4 viruses successfully classified with high
sensitivity and specificity values training and testing ROC analysis
for RBF, which gives the best performance among ANN structures.
Abstract: Computational techniques derived from digital image processing are playing a significant role in the security and digital copyrights of multimedia and visual arts. This technology has the effect within the domain of computers. This research presents discrete M-band wavelet transform (MWT) and cosine transform (DCT) based watermarking algorithm by incorporating the principal component analysis (PCA). The proposed algorithm is expected to achieve higher perceptual transparency. Specifically, the developed watermarking scheme can successfully resist common signal processing, such as geometric distortions, and Gaussian noise. In addition, the proposed algorithm can be parameterized, thus resulting in more security. To meet these requirements, the image is transformed by a combination of MWT & DCT. In order to improve the security further, we randomize the watermark image to create three code books. During the watermark embedding, PCA is applied to the coefficients in approximation sub-band. Finally, first few component bands represent an excellent domain for inserting the watermark.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created