Abstract: Automatic currency note recognition invariably
depends on the currency note characteristics of a particular country
and the extraction of features directly affects the recognition ability.
Sri Lanka has not been involved in any kind of research or
implementation of this kind. The proposed system “SLCRec" comes
up with a solution focusing on minimizing false rejection of notes.
Sri Lankan currency notes undergo severe changes in image quality
in usage. Hence a special linear transformation function is adapted to
wipe out noise patterns from backgrounds without affecting the
notes- characteristic images and re-appear images of interest. The
transformation maps the original gray scale range into a smaller
range of 0 to 125. Applying Edge detection after the transformation
provided better robustness for noise and fair representation of edges
for new and old damaged notes. A three layer back propagation
neural network is presented with the number of edges detected in row
order of the notes and classification is accepted in four classes of
interest which are 100, 500, 1000 and 2000 rupee notes. The
experiments showed good classification results and proved that the
proposed methodology has the capability of separating classes
properly in varying image conditions.
Abstract: This paper presents an approach for early breast
cancer diagnostic by employing combination of artificial neural
networks (ANN) and multiwaveletpacket based subband image
decomposition. The microcalcifications correspond to high-frequency
components of the image spectrum, detection of microcalcifications
is achieved by decomposing the mammograms into different
frequency subbands,, reconstructing the mammograms from the
subbands containing only high frequencies. For this approach we
employed different types of multiwaveletpacket. We used the result
as an input of neural network for classification. The proposed
methodology is tested using the Nijmegen and the Mammographic
Image Analysis Society (MIAS) mammographic databases and
images collected from local hospitals. Results are presented as the
receiver operating characteristic (ROC) performance and are
quantified by the area under the ROC curve.
Abstract: The traditional public relations manager is usually responsible for maintaining and enhancing the reputation of the organization among key publics. While the principal focus of this effort is on support publics, it is quite clearly recognized that an organization's image has important effects on its own employees, its donors and volunteers, and its clients. The aim of paper is to define application`s aspects of public relations media and tools by nonprofit organizations in Albanian reality. Actually does used public relations media and tools, like written material, audiovisual material, organizational identity media, news, interviews and speeches, events, web sites by nonprofit organizations to attract donors? If, public relations media and tools are used, does exists a relation between public relation media and fundraising?
Abstract: This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: This paper presents the application of a signal intensity
independent similarity criterion for rigid and non-rigid body
registration of binary objects. The criterion is defined as the
weighted ratio image of two images. The ratio is computed on a
voxel per voxel basis and weighting is performed by setting the raios
between signal and background voxels to a standard high value. The
mean squared value of the weighted ratio is computed over the union
of the signal areas of the two images and it is minimized using the
Chebyshev polynomial approximation.
Abstract: In this paper we present the design of a new encryption scheme. The scheme we propose is a very exible encryption and authentication primitive. We build this scheme on two relatively new design principles: t-functions and fast pseudo hadamard transforms. We recapitulate the theory behind these principles and analyze their security properties and efficiency. In more detail we propose a streamcipher which outputs a message authentication tag along with theencrypted data stream with only little overhead. Moreover we proposesecurity-speed tradeoffs. Our scheme is faster than other comparablet-function based designs while offering the same security level.
Abstract: Today-s Wi Fi generation utilize the latest technology in their daily lives. Instructors at National University, the second largest non profit private institution of higher learning in California, are incorporating these new tools to modify their Online class formats to better accommodate these new skills in their distance education delivery modes. The University provides accelerated learning in a one-course per month format both Onsite and Online. Since there has been such a significant increase in Online classes over the past three years, and it is expected to grow even more over the over the next five years, Instructors cannot afford to maintain the status quo and not take advantage of these new options. It is at the discretion of the instructors which accessory they use and how comfortable and familiar they are with the technology. This paper explores the effects and summarizes students- comments of some of these new technological options which have been recently provided in order to make students- online learning experience more exciting and meaningful.
Abstract: Recent studies demonstrated that high-fat diet increases oxidative stress in plasma and in a variety of tissues. Many researchers have been looking for natural products, which can reverse the effect of high fat diet. Recently, buckwheat is becoming common ingredient in functional food because of it properties. In study on buckwheat, it is known that, this plant plays roles as anti-oxidative, anti-inflammatory and anti-hypertensive. Nevertheless still little is known about buckwheat groats. The aim of this study was to investigate the effects of addition of buckwheat groats to the fat diet (30% lard), on some antioxidant and oxidant stress parameters in plasma and selected tissues in Wistar rats. The experiment was carried out with three months old male Wistar rats ca. 250g of body weight fed for 5 weeks with either a high-fat (30% of lard) diet or control diet, with or without addition of buckwheat groats. In plasma biochemistry and the activities of the antioxidant enzymes were measured selected tissues: glutathione peroxidase (GPX), catalase (CAT) and the levels of total and reduced glutathione (GSH), free thiol groups (pSH), antioxidant potential of plasma (FRAP) and oxidant stress indices - proteins carbonyl groups (CO) and malonyldialdehyde concentration (MDA). Activity of catalase (CAT) in plasma of rats was significantly increased in buckwheat groats groups and activity of GPx3 in plasma of rats was decreased in buckwheat groups as compared to control group. The reduced glutathione (GSH) in plasma of rats was significantly increased and protein CO was significantly decreased in buckwheat groups as compared to controls. The lowered concentration of GSH was found in serum of rats fed buckwheat groats addition but it accompanied in 7-fold increase in reduced-to-oxidized glutatione ratio, significant increase in HDL and decrease in nonHDL concentration. Conclusions: Buckwheat groats indicate a beneficial effect in inhibiting protein and lipid peroxidation in rats and improved lipid profile. These results suggest that buckwheat groats exert a significant antioxidant potential and may be used as normal food constituent to ameliorate the oxidant-induced damage in organism.
Abstract: The increasing demand for higher data rates in wireless communication systems has led to the more effective and efficient use of all allocated frequency bands. In order to use the whole bandwidth at maximum efficiency, one needs to have RF power amplifiers with a higher linear level and memory-less performance. This is considered to be a major challenge to circuit designers. In this thesis the linearity and memory are studied and examined via the behavior of the intermodulation distortion (IMD). A major source of the in-band distortion can be shown to be influenced by the out-of-band impedances presented at either the input or the output of the device, especially those impedances terminated the low frequency (IF) components. Thus, in order to regulate the in-band distortion, the out of-band distortion must be controllable. These investigations are performed on a 12W LDMOS device characterised at 2.1 GHz within a purpose built, high-power measurement system.
Abstract: Gas Metal Arc Welding (GMAW) processes is an
important joining process widely used in metal fabrication
industries. This paper addresses modeling and optimization of this
technique using a set of experimental data and regression analysis.
The set of experimental data has been used to assess the influence
of GMAW process parameters in weld bead geometry. The
process variables considered here include voltage (V); wire feed
rate (F); torch Angle (A); welding speed (S) and nozzle-to-plate
distance (D). The process output characteristics include weld bead
height, width and penetration. The Taguchi method and regression
modeling are used in order to establish the relationships between
input and output parameters. The adequacy of the model is
evaluated using analysis of variance (ANOVA) technique. In the
next stage, the proposed model is embedded into a Simulated
Annealing (SA) algorithm to optimize the GMAW process
parameters. The objective is to determine a suitable set of process
parameters that can produce desired bead geometry, considering
the ranges of the process parameters. Computational results prove
the effectiveness of the proposed model and optimization
procedure.
Abstract: The task of strategic information technology
management is to focus on adapting technology to ensure
competitiveness. A key factor for success in this sector is awareness
and readiness to deploy new technologies and exploit the services
they offer. Recently, the need for more flexible and dynamic user
interfaces (UIs) has been recognized, especially in mobile
applications. An ongoing research project (MOP), initiated by TUT
in Finland, is looking at how mobile device UIs can be adapted for
different needs and contexts. It focuses on examining the possibilities
to develop adapter software for solving the challenges related to the
UI and its flexibility in mobile devices. This approach has great
potential for enhancing information transfer in mobile devices, and
consequently for improving information management. The
technology presented here could be one of the key emerging
technologies in the information technology sector in relation to
mobile devices and telecommunications.
Abstract: Variable channel conditions in underwater networks,
and variable distances between sensors due to water current, leads to
variable bit error rate (BER). This variability in BER has great
effects on energy efficiency of error correction techniques used. In
this paper an efficient energy adaptive hybrid error correction
technique (AHECT) is proposed. AHECT adaptively changes error
technique from pure retransmission (ARQ) in a low BER case to a
hybrid technique with variable encoding rates (ARQ & FEC) in a
high BER cases. An adaptation algorithm depends on a precalculated
packet acceptance rate (PAR) look-up table, current BER,
packet size and error correction technique used is proposed. Based
on this adaptation algorithm a periodically 3-bit feedback is added to
the acknowledgment packet to state which error correction technique
is suitable for the current channel conditions and distance.
Comparative studies were done between this technique and other
techniques, and the results show that AHECT is more energy
efficient and has high probability of success than all those
techniques.
Abstract: The Iranian bentonite was first characterized by
Scanning Electron Microscopy (SEM), Inductively Coupled Plasma
mass spectrometry (ICP-MS), X-ray fluorescence (XRF), X-ray
Diffraction (XRD) and BET. The bentonite was then treated
thermally between 150°C-250°C at 15min, 45min and 90min and
also was activated chemically with different concentration of
sulphuric acid (3N, 5N and 10N). Although the results of thermal
activated-bentonite didn-t show any considerable changes in specific
surface area and Cation Exchange Capacity (CEC), but the results of
chemical treated bentonite demonstrated that such properties have
been improved by acid activation process.
Abstract: In this paper, a planar antenna for UWB applications
has been proposed. The antenna consists of a square patch, a partial
ground plane and a slot on the ground plane. The proposed antenna is
easy to be integrated with microwave circuitry for low manufacturing
cost. The flat type antenna has a compact structure and the total size
is 14.5×14.5mm2. The result shows that the impedance bandwidth
(VSWR≤ 2) of the proposed antenna is 12.49 GHz (2.95 to 15.44
GHz), which is equivalent to 135.8%. Details of the proposed
compact planar UWB antenna design is presented and discussed.
Abstract: We apply a particle tracking technique to track the motion of individual pathogenic Leptospira. We observe and capture images of motile Leptospira by means of CCD and darkfield microscope. Image processing, statistical theories and simulations are used for data analysis. Based on trajectory patterns, mean square displacement, and power spectral density characteristics, we found that the motion modes are most likely to be directed motion mode (70%) and the rest are either normal diffusion or unidentified mode. Our findings may support the fact that why leptospires are very well efficient toward targeting internal tissues as a result of increase in virulence factor.
Abstract: Developed tool is one of system tools for easier access to various scientific areas and real time interactive learning between
lecturer and for hearing impaired students. There is no demand for the lecturer to know Sign Language (SL). Instead, the new software
tools will perform the translation of the regular speech into SL, after
which it will be transferred to the student. On the other side, the
questions of the student (in SL) will be translated and transferred to
the lecturer in text or speech. One of those tools is presented tool. It-s
too for developing the correct Speech Visemes as a root of total communication method for hearing impared students.
Abstract: It has often been said that the strength of any country
resides in the strength of its industrial sector, and Progress in
industrial society has been accomplished by the creation of new
technologies. Developments have been facilitated by the increasing
availability of advanced manufacturing technology (AMT), in
addition the implementation of advanced manufacturing technology
(AMT) requires careful planning at all levels of the organization to
ensure that the implementation will achieve the intended goals.
Justification and implementation of advanced manufacturing
technology (AMT) involves decisions that are crucial for the
practitioners regarding the survival of business in the present days of
uncertain manufacturing world. This paper assists the industrial
managers to consider all the important criteria for success AMT
implementation, when purchasing new technology. Concurrently,
this paper classifies the tangible benefits of a technology that are
evaluated by addressing both cost and time dimensions, and the
intangible benefits are evaluated by addressing technological,
strategic, social and human issues to identify and create awareness of
the essential elements in the AMT implementation process and
identify the necessary actions before implementing AMT.
Abstract: Data mining can be called as a technique to extract
information from data. It is the process of obtaining hidden
information and then turning it into qualified knowledge by statistical
and artificial intelligence technique. One of its application areas is
medical area to form decision support systems for diagnosis just by
inventing meaningful information from given medical data. In this
study a decision support system for diagnosis of illness that make use
of data mining and three different artificial intelligence classifier
algorithms namely Multilayer Perceptron, Naive Bayes Classifier and
J.48. Pima Indian dataset of UCI Machine Learning Repository was
used. This dataset includes urinary and blood test results of 768
patients. These test results consist of 8 different feature vectors.
Obtained classifying results were compared with the previous studies.
The suggestions for future studies were presented.
Abstract: Globalization and therefore increasing tight competition among companies, have resulted to increase the importance of making well-timed decision. Devising and employing effective strategies, that are flexible and adaptive to changing market, stand a greater chance of being effective in the long-term. In other side, a clear focus on managing the entire product lifecycle has emerged as critical areas for investment. Therefore, applying wellorganized tools to employ past experience in new case, helps to make proper and managerial decisions. Case based reasoning (CBR) is based on a means of solving a new problem by using or adapting solutions to old problems. In this paper, an adapted CBR model with k-nearest neighbor (K-NN) is employed to provide suggestions for better decision making which are adopted for a given product in the middle of life phase. The set of solutions are weighted by CBR in the principle of group decision making. Wrapper approach of genetic algorithm is employed to generate optimal feature subsets. The dataset of the department store, including various products which are collected among two years, have been used. K-fold approach is used to evaluate the classification accuracy rate. Empirical results are compared with classical case based reasoning algorithm which has no special process for feature selection, CBR-PCA algorithm based on filter approach feature selection, and Artificial Neural Network. The results indicate that the predictive performance of the model, compare with two CBR algorithms, in specific case is more effective.