Abstract: This paper proposes a new approach for image encryption
using a combination of different permutation techniques.
The main idea behind the present work is that an image can be
viewed as an arrangement of bits, pixels and blocks. The intelligible
information present in an image is due to the correlations among the
bits, pixels and blocks in a given arrangement. This perceivable information
can be reduced by decreasing the correlation among the bits,
pixels and blocks using certain permutation techniques. This paper
presents an approach for a random combination of the aforementioned
permutations for image encryption. From the results, it is observed
that the permutation of bits is effective in significantly reducing the
correlation thereby decreasing the perceptual information, whereas
the permutation of pixels and blocks are good at producing higher
level security compared to bit permutation. A random combination
method employing all the three techniques thus is observed to be
useful for tactical security applications, where protection is needed
only against a casual observer.
Abstract: Eight difference schemes and five limiters are applied to numerical computation of Riemann problem. The resolution of discontinuities of each scheme produced is compared. Numerical dissipation and its estimation are discussed. The result shows that the numerical dissipation of each scheme is vital to improve scheme-s accuracy and stability. MUSCL methodology is an effective approach to increase computational efficiency and resolution. Limiter should be selected appropriately by balancing compressive and diffusive performance.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: This paper presents the application of a signal intensity
independent similarity criterion for rigid and non-rigid body
registration of binary objects. The criterion is defined as the
weighted ratio image of two images. The ratio is computed on a
voxel per voxel basis and weighting is performed by setting the raios
between signal and background voxels to a standard high value. The
mean squared value of the weighted ratio is computed over the union
of the signal areas of the two images and it is minimized using the
Chebyshev polynomial approximation.
Abstract: In this paper we present the design of a new encryption scheme. The scheme we propose is a very exible encryption and authentication primitive. We build this scheme on two relatively new design principles: t-functions and fast pseudo hadamard transforms. We recapitulate the theory behind these principles and analyze their security properties and efficiency. In more detail we propose a streamcipher which outputs a message authentication tag along with theencrypted data stream with only little overhead. Moreover we proposesecurity-speed tradeoffs. Our scheme is faster than other comparablet-function based designs while offering the same security level.
Abstract: This study deals with the experimental investigation
and theoretical modeling of Semi crystalline polymeric materials with
a rubbery amorphous phase (HDPE) subjected to a uniaxial cyclic
tests with various maximum strain levels, even at large deformation.
Each cycle is loaded in tension up to certain maximum strain and
then unloaded down to zero stress with N number of cycles. This
work is focuses on the measure of the volume strain due to the
phenomena of damage during this kind of tests. On the basis of
thermodynamics of relaxation processes, a constitutive model for
large strain deformation has been developed, taking into account the
damage effect, to predict the complex elasto-viscoelastic-viscoplastic
behavior of material. A direct comparison between the model
predictions and the experimental data show that the model accurately
captures the material response. The model is also capable of
predicting the influence damage causing volume variation.
Abstract: Today-s Wi Fi generation utilize the latest technology in their daily lives. Instructors at National University, the second largest non profit private institution of higher learning in California, are incorporating these new tools to modify their Online class formats to better accommodate these new skills in their distance education delivery modes. The University provides accelerated learning in a one-course per month format both Onsite and Online. Since there has been such a significant increase in Online classes over the past three years, and it is expected to grow even more over the over the next five years, Instructors cannot afford to maintain the status quo and not take advantage of these new options. It is at the discretion of the instructors which accessory they use and how comfortable and familiar they are with the technology. This paper explores the effects and summarizes students- comments of some of these new technological options which have been recently provided in order to make students- online learning experience more exciting and meaningful.
Abstract: The increasing demand for higher data rates in wireless communication systems has led to the more effective and efficient use of all allocated frequency bands. In order to use the whole bandwidth at maximum efficiency, one needs to have RF power amplifiers with a higher linear level and memory-less performance. This is considered to be a major challenge to circuit designers. In this thesis the linearity and memory are studied and examined via the behavior of the intermodulation distortion (IMD). A major source of the in-band distortion can be shown to be influenced by the out-of-band impedances presented at either the input or the output of the device, especially those impedances terminated the low frequency (IF) components. Thus, in order to regulate the in-band distortion, the out of-band distortion must be controllable. These investigations are performed on a 12W LDMOS device characterised at 2.1 GHz within a purpose built, high-power measurement system.
Abstract: A new topology of unified power quality conditioner
(UPQC) is proposed for different power quality (PQ) improvement in
a three-phase four-wire (3P-4W) distribution system. For neutral
current mitigation, a star-hexagon transformer is connected in shunt
near the load along with three-leg voltage source inverters (VSIs)
based UPQC. For the mitigation of source neutral current, the uses of
passive elements are advantageous over the active compensation due
to ruggedness and less complexity of control. In addition to this, by
connecting a star-hexagon transformer for neutral current mitigation
the over all rating of the UPQC is reduced. The performance of the
proposed topology of 3P-4W UPQC is evaluated for power-factor
correction, load balancing, neutral current mitigation and mitigation
of voltage and currents harmonics. A simple control algorithm based
on Unit Vector Template (UVT) technique is used as a control
strategy of UPQC for mitigation of different PQ problems. In this
control scheme, the current/voltage control is applied over the
fundamental supply currents/voltages instead of fast changing APFs
currents/voltages, thereby reducing the computational delay.
Moreover, no extra control is required for neutral source current
compensation; hence the numbers of current sensors are reduced. The
performance of the proposed topology of UPQC is analyzed through
simulations results using MATLAB software with its Simulink and
Power System Block set toolboxes.
Abstract: In this paper, a Bayesian Network (BN) based system
is presented for providing clinical decision support to healthcare
practitioners in rural or remote areas of India for young infants or
children up to the age of 5 years. The government is unable to
appoint child specialists in rural areas because of inadequate number
of available pediatricians. It leads to a high Infant Mortality Rate
(IMR). In such a scenario, Intelligent Pediatric System provides a
realistic solution. The prototype of an intelligent system has been
developed that involves a knowledge component called an Intelligent
Pediatric Assistant (IPA); and User Agents (UA) along with their
Graphical User Interfaces (GUI). The GUI of UA provides the
interface to the healthcare practitioner for submitting sign-symptoms
and displaying the expert opinion as suggested by IPA. Depending
upon the observations, the IPA decides the diagnosis and the
treatment plan. The UA and IPA form client-server architecture for
knowledge sharing.
Abstract: Knowing about the customer behavior in a grocery has
been a long-standing issue in the retailing industry. The advent of
RFID has made it easier to collect moving data for an individual
shopper's behavior. Most of the previous studies used the traditional
statistical clustering technique to find the major characteristics of
customer behavior, especially shopping path. However, in using the
clustering technique, due to various spatial constraints in the store,
standard clustering methods are not feasible because moving data such
as the shopping path should be adjusted in advance of the analysis,
which is time-consuming and causes data distortion. To alleviate this
problem, we propose a new approach to spatial pattern clustering
based on the longest common subsequence. Experimental results using
real data obtained from a grocery confirm the good performance of the
proposed method in finding the hot spot, dead spot and major path
patterns of customer movements.
Abstract: The task of strategic information technology
management is to focus on adapting technology to ensure
competitiveness. A key factor for success in this sector is awareness
and readiness to deploy new technologies and exploit the services
they offer. Recently, the need for more flexible and dynamic user
interfaces (UIs) has been recognized, especially in mobile
applications. An ongoing research project (MOP), initiated by TUT
in Finland, is looking at how mobile device UIs can be adapted for
different needs and contexts. It focuses on examining the possibilities
to develop adapter software for solving the challenges related to the
UI and its flexibility in mobile devices. This approach has great
potential for enhancing information transfer in mobile devices, and
consequently for improving information management. The
technology presented here could be one of the key emerging
technologies in the information technology sector in relation to
mobile devices and telecommunications.
Abstract: The paper evaluates the ongoing reform of VAT in the Czech Republic in terms of impacts on individual households. The main objective is to analyse the impact of given changes on individual households. The adopted method is based on the data related to household consumption by individual household quintiles; obtained data are subjected to micro-simulation examining. Results are discussed in terms of vertical tax justice. Results of the analysis reveal that VAT behaves regressively and a sole consolidation of rates at a higher level only increases the regression of this tax in the Czech Republic.
Abstract: There are three possible effects of Special Theory of
Relativity (STR) on a thermodynamic system. Planck and Einstein
looked upon this process as isobaric; on the other hand Ott saw it as
an adiabatic process. However plenty of logical reasons show that the
process is isotherm. Our phenomenological consideration
demonstrates that the temperature is invariant with Lorenz
transformation. In that case process is isotherm, so volume and
pressure are Lorentz covariant. If the process is isotherm the Boyles
law is Lorentz invariant. Also equilibrium constant and Gibbs energy,
activation energy, enthalpy entropy and extent of the reaction became
Lorentz invariant.
Abstract: Data security in u-Health system can be an important
issue because wireless network is vulnerable to hacking. However, it is
not easy to implement a proper security algorithm in an embedded
u-health monitoring because of hardware constraints such as low
performance, power consumption and limited memory size and etc. To
secure data that contain personal and biosignal information, we
implemented several security algorithms such as Blowfish, data
encryption standard (DES), advanced encryption standard (AES) and
Rivest Cipher 4 (RC4) for our u-Health monitoring system and the
results were successful. Under the same experimental conditions, we
compared these algorithms. RC4 had the fastest execution time.
Memory usage was the most efficient for DES. However, considering
performance and safety capability, however, we concluded that AES
was the most appropriate algorithm for a personal u-Health monitoring
system.
Abstract: Natural convection heat transfer from a heated
horizontal semi-circular cylinder (flat surface upward) has been
investigated for the following ranges of conditions; Grashof number,
and Prandtl number. The governing partial differential equations
(continuity, Navier-Stokes and energy equations) have been solved
numerically using a finite volume formulation. In addition, the role of
the type of the thermal boundary condition imposed at cylinder
surface, namely, constant wall temperature (CWT) and constant heat
flux (CHF) are explored. Natural convection heat transfer from a
heated horizontal semi-circular cylinder (flat surface upward) has
been investigated for the following ranges of conditions; Grashof
number, and Prandtl number, . The governing partial differential
equations (continuity, Navier-Stokes and energy equations) have
been solved numerically using a finite volume formulation. In
addition, the role of the type of the thermal boundary condition
imposed at cylinder surface, namely, constant wall temperature
(CWT) and constant heat flux (CHF) are explored. The resulting flow
and temperature fields are visualized in terms of the streamline and
isotherm patterns in the proximity of the cylinder. The flow remains
attached to the cylinder surface over the range of conditions spanned
here except that for and ; at these conditions, a separated flow
region is observed when the condition of the constant wall
temperature is prescribed on the surface of the cylinder. The heat
transfer characteristics are analyzed in terms of the local and average
Nusselt numbers. The maximum value of the local Nusselt number
always occurs at the corner points whereas it is found to be minimum
at the rear stagnation point on the flat surface. Overall, the average
Nusselt number increases with Grashof number and/ or Prandtl
number in accordance with the scaling considerations. The numerical
results are used to develop simple correlations as functions of
Grashof and Prandtl number thereby enabling the interpolation of the
present numerical results for the intermediate values of the Prandtl or
Grashof numbers for both thermal boundary conditions.
Abstract: Isobaric and cooling zone of iron ore reactor have been
simulated. In this paper, heat and mass transfer equation are
formulated to perform the temperature and concentration of gas and
solid phase respectively. Temperature profile for isobaric zone is
simulated on the range temperature of 873-1163K while cooling zone
is simulated on the range temperature of 733-1139K. The simulation
results have a good agreement with the plant data. Total carbon
formation in the isobaric zone is only 30% of total carbon contained in
the sponge iron product. The formation of Fe3C in isobaric zone
reduces metallization degree up to 0.58% whereas reduction of
metallization degree in cooling zone up to 1.139%. The decreasing of
sponge iron temperature in the isobaric and cooling zone is around 300
K and 600 K respectively.
Abstract: This paper describes the development, modeling, and
testing of skyhook and MiniMax control strategies of semi-active
suspension. The control performances are investigated using
Matlab/Simulink [1], with a two-degree-of-freedom quarter car semiactive
suspension system model. The comparison and evaluation of
control result are made using software-in-the-loop simulation (SILS)
method. This paper also outlines the development of a hardware-inthe-
loop simulation (HILS) system. The simulation results show that
skyhook strategy can significantly reduce the resonant peak of body
and provide improvement in vehicle ride comfort. Otherwise,
MiniMax strategy can be employed to effectively improve drive
safety of vehicle by influencing wheel load. The two strategies can
be switched to control semi-active suspension system to fulfill
different requirement of vehicle in different stages.
Abstract: This paper introduces two decoders for binary linear
codes based on Metaheuristics. The first one uses a genetic algorithm
and the second is based on a combination genetic algorithm with
a feed forward neural network. The decoder based on the genetic
algorithms (DAG) applied to BCH and convolutional codes give good
performances compared to Chase-2 and Viterbi algorithm respectively
and reach the performances of the OSD-3 for some Residue
Quadratic (RQ) codes. This algorithm is less complex for linear
block codes of large block length; furthermore their performances
can be improved by tuning the decoder-s parameters, in particular the
number of individuals by population and the number of generations.
In the second algorithm, the search space, in contrast to DAG which
was limited to the code word space, now covers the whole binary
vector space. It tries to elude a great number of coding operations
by using a neural network. This reduces greatly the complexity of
the decoder while maintaining comparable performances.
Abstract: Developed tool is one of system tools for easier access to various scientific areas and real time interactive learning between
lecturer and for hearing impaired students. There is no demand for the lecturer to know Sign Language (SL). Instead, the new software
tools will perform the translation of the regular speech into SL, after
which it will be transferred to the student. On the other side, the
questions of the student (in SL) will be translated and transferred to
the lecturer in text or speech. One of those tools is presented tool. It-s
too for developing the correct Speech Visemes as a root of total communication method for hearing impared students.