Abstract: The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting.
Abstract: For the past couple of decades Weak signal detection
is of crucial importance in various engineering and scientific
applications. It finds its application in areas like Wireless
communication, Radars, Aerospace engineering, Control systems and
many of those. Usually weak signal detection requires phase sensitive
detector and demodulation module to detect and analyze the signal.
This article gives you a preamble to intrusion detection system which
can effectively detect a weak signal from a multiplexed signal. By
carefully inspecting and analyzing the respective signal, this
system can successfully indicate any peripheral intrusion. Intrusion
detection system (IDS) is a comprehensive and easy approach
towards detecting and analyzing any signal that is weakened and
garbled due to low signal to noise ratio (SNR). This approach
finds significant importance in applications like peripheral security
systems.
Abstract: Due to the dynamic nature of the Cloud, continuous monitoring of QoS requirements is necessary to manage the Cloud computing environment. The process of QoS monitoring and SLA violation detection consists of: collecting low and high level information pertinent to the service, analyzing the collected information, and taking corrective actions when SLA violations are detected. In this paper, we detail the architecture and the implementation of the first step of this process. More specifically, we propose an event-based approach to obtain run time information of services developed as BPEL processes. By catching particular events (i.e., the low level information), our approach recognizes the run-time execution path of a monitored service and uses the BPEL execution patterns to compute QoS of the composite service (i.e., the high level information).
Abstract: The focal spot of a high intensity focused ultrasound
transducer is small. To heat a large target volume, multiple treatment spots are required. If the power of each treatment spot is fixed, it could
results in insufficient heating of initial spots and over-heating of later ones, which is caused by the thermal diffusion. Hence, to produce a
uniform heated volume, the delivered energy of each treatment spot
should be properly adjusted. In this study, we proposed an iterative, extrapolation technique to adjust the required ultrasound energy of
each treatment spot. Three different scanning pathways were used to evaluate the performance of this technique. Results indicate that by using the proposed technique, uniform heating volume could be obtained.
Abstract: Impaired fertility may be the result of indirect
consumption of anti-fertility agents through food. Monosodium
glutamate (MSG) has been widely used as food additive, flavour
enhancer and included in vaccines. This study focuses in determining
the gonadotoxic and cytotoxic effect of MSG on selected sperm
parameters such as sperm viability, sperm membrane integrity and
testes cytoarchitecture of male mice via histological examination to
determine its effect on spermatogenesis. Twenty-four Mus musculus
were randomly divided into 4 groups and given intraperitoneal
injections (IP) daily for 14 days of different MSG concentrations at
250, 500 and 1000mg/kg MSG to body weight to induce obesity.
Saline was given to control group. Mice were sacrificed and analysis
revealed abnormalities in values for sperm parameters and damages
to testes cytoarchitecture of male mice. The results recorded
decreased viability (p0.05) with degenerative structures in seminiferous tubule of
testes. The results indicated various implications of MSG on male
mice reproductive system which has consequences in fertility
potential.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: For micro-gyroscopes, the angular rate detection components have to oscillate forwards and backwards alternatively. An innovative design of micro-electromagnetic drive module is proposed to make a Π-type disc reciprocally and efficiently rotate within a certain of angular interval. Twelve Electromagnetic poles enclosing the thin disc are designed to provide the magnetic drive power. Isotropic etching technique is employed to fabricate the high-aspect-ratio trench, so that the contact angle of wire against trench can be increased and the potential defect of cavities and pores within the wire can be prevented. On the other hand, a Π-type thin disc is designed to conduct the pitch motion as an angular excitation, in addition to spinning, is exerted on the gyroscope. The efficacy of the micro-magnetic drive module is verified by the commercial software, Ansoft Maxewll. In comparison with the conventional planar windings in micro-scale systems, the magnetic drive force is increased by 150%.
Abstract: The area of Project Risk Management (PRM) has
been extensively researched, and the utilization of various tools and
techniques for managing risk in several industries has been
sufficiently reported. Formal and systematic PRM practices have
been made available for the construction industry. Based on such
body of knowledge, this paper tries to find out the global picture of
PRM practices and approaches with the help of a survey to look into
the usage of PRM techniques and diffusion of software tools, their
level of maturity, and their usefulness in the construction sector.
Results show that, despite existing techniques and tools, their usage is
limited: software tools are used only by a minority of respondents
and their cost is one of the largest hurdles in adoption. Finally, the
paper provides some important guidelines for future research
regarding quantitative risk analysis techniques and suggestions for
PRM software tools development and improvement.
Abstract: Traditional development of wireless sensor network
mote is generally based on SoC1 platform. Such method of
development faces three main drawbacks: lack of flexibility in terms
of development due to low resource and rigid architecture of SoC;
low capability of evolution and portability versus performance if
specific micro-controller architecture features are used; and the rapid
obsolescence of micro-controller comparing to the long lifetime of
power plants or any industrial installations. To overcome these
drawbacks, we have explored a new approach of development of
wireless sensor network mote using a hybrid FPGA technology. The
application of such approach is illustrated through the
implementation of an innovative wireless sensor network protocol
called OCARI.
Abstract: Traditionally, wind tunnel models are made of metal
and are very expensive. In these years, everyone is looking for ways
to do more with less. Under the right test conditions, a rapid
prototype part could be tested in a wind tunnel. Using rapid prototype
manufacturing techniques and materials in this way significantly
reduces time and cost of production of wind tunnel models. This
study was done of fused deposition modeling (FDM) and their ability
to make components for wind tunnel models in a timely and cost
effective manner. This paper discusses the application of wind tunnel
model configuration constructed using FDM for transonic wind
tunnel testing. A study was undertaken comparing a rapid
prototyping model constructed of FDM Technologies using
polycarbonate to that of a standard machined steel model. Testing
covered the Mach range of Mach 0.3 to Mach 0.75 at an angle-ofattack
range of - 2° to +12°. Results from this study show relatively
good agreement between the two models and rapid prototyping
Method reduces time and cost of production of wind tunnel models.
It can be concluded from this study that wind tunnel models
constructed using rapid prototyping method and materials can be
used in wind tunnel testing for initial baseline aerodynamic database
development.
Abstract: Verification of real-time software systems can be
expensive in terms of time and resources. Testing is the main method
of proving correctness but has been shown to be a long and time
consuming process. Everyday engineers are usually unwilling to
adopt formal approaches to correctness because of the overhead
associated with developing their knowledge of such techniques.
Performance modelling techniques allow systems to be evaluated
with respect to timing constraints. This paper describes PARTES, a
framework which guides the extraction of performance models from
programs written in an annotated subset of C.
Abstract: Delivering streaming video over wireless is an
important component of many interactive multimedia applications
running on personal wireless handset devices. Such personal devices
have to be inexpensive, compact, and lightweight. But wireless
channels have a high channel bit error rate and limited bandwidth.
Delay variation of packets due to network congestion and the high bit
error rate greatly degrades the quality of video at the handheld
device. Therefore, mobile access to multimedia contents requires
video transcoding functionality at the edge of the mobile network for
interworking with heterogeneous networks and services. Therefore,
to guarantee quality of service (QoS) delivered to the mobile user, a
robust and efficient transcoding scheme should be deployed in
mobile multimedia transporting network. Hence, this paper
examines the challenges and limitations that the video transcoding
schemes in mobile multimedia transporting network face. Then
handheld resources, network conditions and content based mobile
and wireless video transcoding is proposed to provide high QoS
applications. Exceptional performance is demonstrated in the
experiment results. These experiments were designed to verify and
prove the robustness of the proposed approach. Extensive
experiments have been conducted, and the results of various video
clips with different bit rate and frame rate have been provided.
Abstract: Autofluorescence (AF) bronchoscopy is an
established method to detect dysplasia and carcinoma in situ (CIS).
For this reason the “Sotiria" Hospital uses the Karl Storz D-light
system. However, in early tumor stages the visualization is not that
obvious. With the help of a PC, we analyzed the color images we
captured by developing certain tools in Matlab®. We used statistical
methods based on texture analysis, signal processing methods based
on Gabor models and conversion algorithms between devicedependent
color spaces. Our belief is that we reduced the error made
by the naked eye. The tools we implemented improve the quality of
patients' life.
Abstract: Multimedia, as it stands now is perhaps the most
diverse and rich culture around the globe. One of the major needs of
Multimedia is to have a single system that enables people to
efficiently search through their multimedia catalogues. Many
Domain Specific Systems and architectures have been proposed but
up till now no generic and complete architecture is proposed. In this
paper, we have suggested a generic architecture for Multimedia
Database. The main strengths of our architecture besides being
generic are Semantic Libraries to reduce semantic gap, levels of
feature extraction for more specific and detailed feature extraction
according to classes defined by prior level, and merging of two types
of queries i.e. text and QBE (Query by Example) for more accurate
yet detailed results.
Abstract: Urban water management in Australia faces increasing pressure to deal with the challenges of droughts, growing population and the climate change uncertainty. Addressing these challenges is an opportunity to incorporate the parallel goals of sustainable water management and climate change adaptation through holistic, non-technical means. This paper presents case studies from Perth and Sydney which show how despite robust adaptation plans and experience, recent efforts to 'drought proof' cities have focused on supply-side measures (i.e. desalination), rather than rethinking how water is used and managing demand. The trend towards desalination as a climate adaptation measure raises questions about the sustainability of urban water futures in Australia.
Abstract: The use of buffer thresholds, blocking and adequate
service strategies are well-known techniques for computer networks
traffic congestion control. This motivates the study of series queues
with blocking, feedback (service under Head of Line (HoL) priority
discipline) and finite capacity buffers with thresholds. In this paper,
the external traffic is modelled using the Poisson process and the
service times have been modelled using the exponential distribution.
We consider a three-station network with two finite buffers, for
which a set of thresholds (tm1 and tm2) is defined. This computer
network behaves as follows. A task, which finishes its service at
station B, gets sent back to station A for re-processing with
probability o. When the number of tasks in the second buffer exceeds
a threshold tm2 and the number of task in the first buffer is less than
tm1, the fed back task is served under HoL priority discipline. In
opposite case, for fed backed tasks, “no two priority services in
succession" procedure (preventing a possible overflow in the first
buffer) is applied. Using an open Markovian queuing schema with
blocking, priority feedback service and thresholds, a closed form
cost-effective analytical solution is obtained. The model of servers
linked in series is very accurate. It is derived directly from a twodimensional
state graph and a set of steady-state equations, followed
by calculations of main measures of effectiveness. Consequently,
efficient expressions of the low computational cost are determined.
Based on numerical experiments and collected results we conclude
that the proposed model with blocking, feedback and thresholds can
provide accurate performance estimates of linked in series networks.
Abstract: Nowadays, the focus on renewable energy and alternative fuels has increased due to increasing oil prices, environment pollution, and also concern on preserving the nature. Biodiesel has been known as an attractive alternative fuel although biodiesel produced from edible oil is very expensive than conventional diesel. Therefore, the uses of biodiesel produced from non-edible oils are much better option. Currently Jatropha biodiesel (JBD) is receiving attention as an alternative fuel for diesel engine. Biodiesel is non-toxic, biodegradable, high lubricant ability, highly renewable, and its use therefore produces real reduction in petroleum consumption and carbon dioxide (CO2) emissions. Although biodiesel has many advantages, but it still has several properties need to improve, such as lower calorific value, lower effective engine power, higher emission of nitrogen oxides (NOX) and greater sensitivity to low temperature. Exhaust gas recirculation (EGR) is effective technique to reduce NOX emission from diesel engines because it enables lower flame temperature and oxygen concentration in the combustion chamber. Some studies succeeded to reduce the NOX emission from biodiesel by EGR but they observed increasing soot emission. The aim of this study was to investigate the engine performance and soot emission by using blended Jatropha biodiesel with different EGR rates. A CI engine that is water-cooled, turbocharged, using indirect injection system was used for the investigation. Soot emission, NOX, CO2, carbon monoxide (CO) were recorded and various engine performance parameters were also evaluated.
Abstract: This study aims to explore the relationship between the
disposition effect and herding behavior of investors trading Taiwanese
information technology stocks. This study differs from previous
literature in two aspects. First, in contrast with the earlier studies that
focused on investigating investors’ herding behavior, this study
explores the possibility that the disposition effect drives investors’
herding behavior. Additionally, it takes an in-depth look at the
interdependence between the disposition effect and herding behavior
of investors, including lead-lag relationship and volatility transmission
effect. Empirical results show that investors trading Taiwan’s
information technology stocks exhibit pronounced herding behavior
and that the disposition effect has a great impact on their herding
behavior.
Abstract: A therapeutic success is the aim of any therapeutic
intervention, but a therapeutic failure is the other side of the same
coin. The purpose of this study is to present the activity of a personal
development group, composed of 14 participants (psychologists,
doctors and a priest) registered for a 2 days course of integrative
psychotherapy. The objectives of this study are centred on: the
management of the personal development group breaking moment
realized by the therapist/trainer; the analysis of the trainer’s personal
situation and of some group participants and the brief presentation of
the main work methods applied on participants in the repairing of the
therapeutic relation and in the counter transfer management. The
therapist’s orientation is an integrative one and the demarche realized
includes T.A. techniques, role play, Gestalt and family systemic
psychotherapy. The conclusions obtained represent landmarks for the
future activity within that group and strengthen the therapeutic
relation with the group.
Abstract: Existing proceeding-models for the development of mechatronic systems provide a largely parallel action in the detailed development. This parallel approach is to take place also largely independent of one another in the various disciplines involved. An approach for a new proceeding-model provides a further development of existing models to use for the development of Adaptronic Systems. This approach is based on an intermediate integration and an abstract modeling of the adaptronic system. Based on this system-model a simulation of the global system behavior, due to external and internal factors or Forces is developed. For the intermediate integration a special data management system is used. According to the presented approach this data management system has a number of functions that are not part of the "normal" PDM functionality. Therefore a concept for a new data management system for the development of Adaptive system is presented in this paper. This concept divides the functions into six layers. In the first layer a system model is created, which divides the adaptronic system based on its components and the various technical disciplines. Moreover, the parameters and properties of the system are modeled and linked together with the requirements and the system model. The modeled parameters and properties result in a network which is analyzed in the second layer. From this analysis necessary adjustments to individual components for specific manipulation of the system behavior can be determined. The third layer contains an automatic abstract simulation of the system behavior. This simulation is a precursor for network analysis and serves as a filter. By the network analysis and simulation changes to system components are examined and necessary adjustments to other components are calculated. The other layers of the concept treat the automatic calculation of system reliability, the "normal" PDM-functionality and the integration of discipline-specific data into the system model. A prototypical implementation of an appropriate data management with the addition of an automatic system development is being implemented using the data management system ENOVIA SmarTeam V5 and the simulation system MATLAB.