Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and quasi-stationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine first stage nozzle blade.
Abstract: To study the impact of the inter-module ventilation (IMV) on the space station, the Computational Fluid Dynamic (CFD) model under the influence of IMV, the mathematical model, boundary conditions and calculation method are established and determined to analyze the influence of IMV on cabin air flow characteristics and velocity distribution firstly; and then an integrated overall thermal mathematical model of the space station is used to consider the impact of IMV on thermal management. The results show that: the IMV has a significant influence on the cabin air flow, the flowrate of IMV within a certain range can effectively improve the air velocity distribution in cabin, if too much may lead to its deterioration; IMV can affect the heat deployment of the different modules in space station, thus affecting its thermal management, the use of IMV can effectively maintain the temperature levels of the different modules and help the space station to dissipate the waste heat.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: In areas of low to moderate seismicity many building contents and equipment are not positively fixed to the floor or tied to adjacent walls. Under seismic induced horizontal vibration, such contents and equipment can suffer from damage by either overturning or impact associated with rocking. This paper focuses on the estimation of shock on typical contents and equipment due to rocking. A simplified analytical model is outlined that can be used to estimate the maximum acceleration on a rocking object given its basic geometric and mechanical properties. The developed model was validated against experimental results. The experimental results revealed that the maximum shock acceleration can be underestimated if the static stiffness of the materials at the interface between the rocking object and floor is used rather than the dynamic stiffness. Excellent agreement between the model and experimental results was found when the dynamic stiffness for the interface material was used, which was found to be generally much higher than corresponding static stiffness under different investigated boundary conditions of the cushion. The proposed model can be a beneficial tool in performing a rapid assessment of shock sensitive components considered for possible seismic rectification.
Abstract: Global Software Development (GSD) projects are
passing through different boundaries of a company, country and even
in other continents where time zone differs between both sites.
Beside many benefits of such development, research declared plenty
of negative impacts on these GSD projects. It is important to
understand problems which may lie during the execution of GSD
project with different time zones. This research project discussed and
provided different issues related to time delays in GSD projects. In
this paper, authors investigated some of the time delay factors which
usually lie in GSD projects with different time zones. This
investigation is done through systematic review of literature.
Furthermore, the practices to overcome these delay factors which
have already been reported in literature and GSD organizations are
also explored through literature survey and case studies.
Abstract: In this paper we discuss the effect of unbounded particle interaction operator on particle growth and we study how this can address the choice of appropriate time steps of the numerical simulation. We provide also rigorous mathematical proofs showing that large particles become dominating with increasing time while small particles contribute negligibly. Second, we discuss the efficiency of the algorithm by performing numerical simulations tests and by comparing the simulated solutions with some known analytic solutions to the Smoluchowski equation.
Abstract: Simultaneous transient conduction and radiation heat
transfer with heat generation is investigated. Analysis is carried out
for both steady and unsteady situations. two-dimensional gray
cylindrical enclosure with an absorbing, emitting, and isotropically
scattering medium is considered. Enclosure boundaries are assumed
at specified temperatures. The heat generation rate is considered
uniform and constant throughout the medium. The lattice Boltzmann
method (LBM) was used to solve the energy equation of a transient
conduction-radiation heat transfer problem. The control volume finite
element method (CVFEM) was used to compute the radiative
information. To study the compatibility of the LBM for the energy
equation and the CVFEM for the radiative transfer equation, transient
conduction and radiation heat transfer problems in 2-D cylindrical
geometries were considered. In order to establish the suitability of the
LBM, the energy equation of the present problem was also solved
using the the finite difference method (FDM) of the computational
fluid dynamics. The CVFEM used in the radiative heat transfer was
employed to compute the radiative information required for the
solution of the energy equation using the LBM or the FDM (of the
CFD). To study the compatibility and suitability of the LBM for the
solution of energy equation and the CVFEM for the radiative
information, results were analyzed for the effects of various
parameters such as the boundary emissivity. The results of the LBMCVFEM
combination were found to be in excellent agreement with
the FDM-CVFEM combination. The number of iterations and the
steady state temperature in both of the combinations were found
comparable. Results are found for situations with and without heat
generation. Heat generation is found to have significant bearing on
temperature distribution.
Abstract: This work presents the highly accurate numerical calculation
of the natural frequencies for functionally graded beams with
simply supported boundary conditions. The Timoshenko first order
shear deformation beam theory and the higher order shear deformation
beam theory of Reddy have been applied to the functionally
graded beams analysis. The material property gradient is assumed
to be in the thickness direction. The Hamilton-s principle is utilized
to obtain the dynamic equations of functionally graded beams. The
influences of the volume fraction index and thickness-to-length ratio
on the fundamental frequencies are discussed. Comparison of the
numerical results for the homogeneous beam with Euler-Bernoulli
beam theory results show that the derived model is satisfactory.
Abstract: Aerial and satellite images are information rich. They are also complex to analyze. For GIS systems, many features require fast and reliable extraction of roads and intersections. In this paper, we study efficient and reliable automatic extraction algorithms to address some difficult issues that are commonly seen in high resolution aerial and satellite images, nonetheless not well addressed in existing solutions, such as blurring, broken or missing road boundaries, lack of road profiles, heavy shadows, and interfering surrounding objects. The new scheme is based on a new method, namely reference circle, to properly identify the pixels that belong to the same road and use this information to recover the whole road network. This feature is invariable to the shape and direction of roads and tolerates heavy noise and disturbances. Road extraction based on reference circles is much more noise tolerant and flexible than the previous edge-detection based algorithms. The scheme is able to extract roads reliably from images with complex contents and heavy obstructions, such as the high resolution aerial/satellite images available from Google maps.
Abstract: In this work the numerical simulation of transient heat
transfer in a cylindrical probe is done. An experiment was conducted
introducing a steel cylinder in a heating chamber and registering its
surface temperature along the time during one hour. In parallel, a
mathematical model was solved for one dimension transient heat
transfer in cylindrical coordinates, considering the boundary
conditions of the test. The model was solved using finite difference
method, because the thermal conductivity in the cylindrical steel bar
and the convection heat transfer coefficient used in the model are
considered temperature dependant functions, and both conditions
prevent the use of the analytical solution. The comparison between
theoretical and experimental results showed the average deviation is
below 2%. It was concluded that numerical methods are useful in
order to solve engineering complex problems. For constant k and h,
the experimental methodology used here can be used as a tool for
teaching heat transfer in mechanical engineering, using mathematical
simplified models with analytical solutions.
Abstract: Recent progress in calculation of the one-loop selfenergy
of the electron bound in the Coulomb field is summarized.
The relativistic multipole expansion is introduced. This expansion
is based on a single assumption: except for the part of the time
component of the electron four-momentum corresponding to the
electron rest mass, the exchange of four-momentum between the
virtual electron and photon can be treated perturbatively. For non Sstates
and normalized difference n3En −E1 of the S-states this
itself yields very accurate results after taking the method to the third
order. For the ground state the perturbation treatment of the electron
virtual states with very high three-momentum is to be avoided. For
these states one can always rearrange the pertinent expression in such
a way that free-particle approximation is allowed. Combination of
the relativistic multipole expansion and free-particle approximation
yields very accurate result after taking the method to the ninth order.
These results are in very good agreement with the previous results
obtained by the partial wave expansion and definitely exclude the
possibility that the uncertainity in determination of the proton radius
comes from the uncertainity in the calculation of the one-loop selfenergy.
Abstract: Recently T. C. Au-Yeung, C.Au, and P. C. W. Fung [2] have given the solution of the KdV equation [1] to the boundary condition , where b is a constant. We have further extended the method of [2] to find the solution of the KdV equation with asymptotic degeneracy. Via simulations we find both bright and dark Solitons (i.e. Solitons with opposite phases).
Abstract: The objective is to split a simply connected polygon
into a set of convex quadrilaterals without inserting new
boundary nodes. The presented approach consists in repeatedly
removing quadrilaterals from the polygon. Theoretical results
pertaining to quadrangulation of simply connected polygons are
derived from the usual 2-ear theorem. It produces a quadrangulation
technique with O(n) number of quadrilaterals. The
theoretical methodology is supplemented by practical results
and CAD surface segmentation.
Abstract: The theoretical investigation is carried out to describe
the effect of increase of pressure waves amplitude in clean and bubbly liquid. The goal of the work is to capture the regime of multiple magnification of acoustic and shock waves in the liquid,
which enables to get appropriate conditions to enlarge collapses of
micro-bubbles. The influence of boundary conditions and frequency
of the governing acoustic field is studied for the case of the
cylindrical acoustic resonator. It has been observed the formation of
standing waves with large amplitude at resonant frequencies. The
interaction of the compression wave with gas and vapor bubbles is
investigated for the convergent channel. It is shown theoretically that
the chemical reactions, which occur inside gas bubbles, provide additional impulse to the wave, that affect strongly on the collapses
of the vapor bubbles
Abstract: The recognition of handwritten numeral is an
important area of research for its applications in post office, banks
and other organizations. This paper presents automatic recognition of
handwritten Kannada numerals based on structural features. Five
different types of features, namely, profile based 10-segment string,
water reservoir; vertical and horizontal strokes, end points and
average boundary length from the minimal bounding box are used in
the recognition of numeral. The effect of each feature and their
combination in the numeral classification is analyzed using nearest
neighbor classifiers. It is common to combine multiple categories of
features into a single feature vector for the classification. Instead,
separate classifiers can be used to classify based on each visual
feature individually and the final classification can be obtained based
on the combination of separate base classification results. One
popular approach is to combine the classifier results into a feature
vector and leaving the decision to next level classifier. This method
is extended to extract a better information, possibility distribution,
from the base classifiers in resolving the conflicts among the
classification results. Here, we use fuzzy k Nearest Neighbor (fuzzy
k-NN) as base classifier for individual feature sets, the results of
which together forms the feature vector for the final k Nearest
Neighbor (k-NN) classifier. Testing is done, using different features,
individually and in combination, on a database containing 1600
samples of different numerals and the results are compared with the
results of different existing methods.
Abstract: A numerical method for solving the time-independent Schrödinger equation of a particle moving freely in a three-dimensional
axisymmetric region is developed. The boundary of the region
is defined by an arbitrary analytic function. The method uses a
coordinate transformation and an expansion in eigenfunctions. The
effectiveness is checked and confirmed by applying the method to a
particular example, which is a prolate spheroid.
Abstract: The cardiovascular system has become the most
important subject of clinical research, particularly measurement of
arterial blood flow. Therefore correct determination of arterial
diameter is crucial. We propose a novel, semi-automatic method for
artery lumen detection. The method is based on Gaussian probability
function. Usability of our proposed method was assessed by
analyzing ultrasound B-mode CFA video sequences acquired from
eleven healthy volunteers. The correlation coefficient between the
manual and semi-automatic measurement of arterial diameter was
0.996. Our proposed method for detecting artery boundary is novel
and accurate enough for the measurement of artery diameter.
Abstract: Numerous divergence measures (spectral distance, cepstral
distance, difference of the cepstral coefficients, Kullback-Leibler
divergence, distance given by the General Likelihood Ratio, distance
defined by the Recursive Bayesian Changepoint Detector and the
Mahalanobis measure) are compared in this study. The measures are
used for detection of abrupt spectral changes in synthetic AR signals
via the sliding window algorithm. Two experiments are performed;
the first is focused on detection of single boundary while the second
concentrates on detection of a couple of boundaries. Accuracy of
detection is judged for each method; the measures are compared
according to results of both experiments.
Abstract: A power cable is widely used for power supply in
power distributing networks and power transmission lines. Due to
limitations in the production, delivery and setting up power cables,
they are produced and delivered in several separate lengths. Cable
itself, consists of two cable terminations and arbitrary number of
cable joints, depending on the cable route length. Electrical stress
control is needed to prevent a dielectric breakdown at the end of the
insulation shield in both the air and cable insulation. Reliability of
cable joint depends on its materials, design, installation and operating
environment. The paper describes design and performance results for
new modeled cable joints. Design concepts, based on numerical
calculations, must be correct. An Equivalent Electrodes
Method/Boundary Elements Method-hybrid approach that allows
electromagnetic field calculations in multilayer dielectric media,
including inhomogeneous regions, is presented.