Abstract: We study in this paper the effect of the scene
changing on image sequences coding system using Embedded
Zerotree Wavelet (EZW). The scene changing considered here is the
full motion which may occurs. A special image sequence is generated
where the scene changing occurs randomly. Two scenarios are
considered: In the first scenario, the system must provide the
reconstruction quality as best as possible by the management of the
bit rate (BR) while the scene changing occurs. In the second scenario,
the system must keep the bit rate as constant as possible by the
management of the reconstruction quality. The first scenario may be
motivated by the availability of a large band pass transmission
channel where an increase of the bit rate may be possible to keep the
reconstruction quality up to a given threshold. The second scenario
may be concerned by the narrow band pass transmission channel
where an increase of the bit rate is not possible. In this last case,
applications for which the reconstruction quality is not a constraint
may be considered. The simulations are performed with five scales
wavelet decomposition using the 9/7-tap filter bank biorthogonal
wavelet. The entropy coding is performed using a specific defined
binary code book and EZW algorithm. Experimental results are
presented and compared to LEAD H263 EVAL. It is shown that if
the reconstruction quality is the constraint, the system increases the
bit rate to obtain the required quality. In the case where the bit rate
must be constant, the system is unable to provide the required quality
if the scene change occurs; however, the system is able to improve
the quality while the scene changing disappears.
Abstract: The major part of light weight timber constructions
consists of insulation. Mineral wool is the most commonly used
insulation due to its cost efficiency and easy handling. The fiber
orientation and porosity of this insulation material enables flowthrough.
The air flow resistance is low. If leakage occurs in the
insulated bay section, the convective flow may cause energy losses
and infiltration of the exterior wall with moisture and particles. In
particular the infiltrated moisture may lead to thermal bridges and
growth of health endangering mould and mildew. In order to prevent
this problem, different numerical calculation models have been
developed. All models developed so far have a potential for
completion. The implementation of the flow-through properties of
mineral wool insulation may help to improve the existing models.
Assuming that the real pressure difference between interior and
exterior surface is larger than the prescribed pressure difference in the
standard test procedure for mineral wool ISO 9053 / EN 29053,
measurements were performed using the measurement setup for
research on convective moisture transfer “MSRCMT".
These measurements show, that structural inhomogeneities of
mineral wool effect the permeability only at higher pressure
differences, as applied in MSRCMT. Additional microscopic
investigations show, that the location of a leak within the
construction has a crucial influence on the air flow-through and the
infiltration rate. The results clearly indicate that the empirical values
for the acoustic resistance of mineral wool should not be used for the
calculation of convective transfer mechanisms.
Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: This paper reports the tensile fracture location
characterizations of dissimilar friction stir welds between 5754
aluminium alloy and C11000 copper. The welds were produced using
three shoulder diameter tools; namely, 15, 18 and 25 mm by varying
the process parameters. The rotational speeds considered were 600,
950 and 1200 rpm while the feed rates employed were 50, 150 and
300 mm/min to represent the low, medium and high settings
respectively. The tensile fracture locations were evaluated using the
optical microscope to identify the fracture locations and were
characterized. It was observed that 70% of the tensile samples failed
in the Thermo Mechanically Affected Zone (TMAZ) of copper at the
weld joints. Further evaluation of the fracture surfaces of the pulled
tensile samples revealed that welds with low Ultimate Tensile
Strength either have defects or intermetallics present at their joint
interfaces.
Abstract: A cancelable palmprint authentication system
proposed in this paper is specifically designed to overcome the
limitations of the contemporary biometric authentication system. In
this proposed system, Geometric and pseudo Zernike moments are
employed as feature extractors to transform palmprint image into a
lower dimensional compact feature representation. Before moment
computation, wavelet transform is adopted to decompose palmprint
image into lower resolution and dimensional frequency subbands.
This reduces the computational load of moment calculation
drastically. The generated wavelet-moment based feature
representation is used to generate cancelable verification key with a
set of random data. This private binary key can be canceled and
replaced. Besides that, this key also possesses high data capture
offset tolerance, with highly correlated bit strings for intra-class
population. This property allows a clear separation of the genuine
and imposter populations, as well as zero Equal Error Rate
achievement, which is hardly gained in the conventional biometric
based authentication system.
Abstract: Reducing the risk of information leaks is one of
the most important functions of identity management systems. To
achieve this purpose, Dey et al. have already proposed an account
management method for a federated login system using a blind
signature scheme. In order to ensure account anonymity for the
authentication provider, referred to as an IDP (identity provider),
a blind signature scheme is utilized to generate an authentication
token on an authentication service and the token is sent to an IDP.
However, there is a problem with the proposed system. Malicious
users can establish multiple accounts on an IDP by requesting such
accounts. As a measure to solve this problem, in this paper, the
authors propose an account checking method that is performed before
account generation.
Abstract: The new concept of two–dimensional (2D) image
processing implementation for auto-guiding system is shown in this
paper. It is dedicated to astrophotography and operates with
astronomy CCD guide cameras or with self-guided dual-detector
CCD cameras and ST4 compatible equatorial mounts. This idea was
verified by MATLAB model, which was used to test all procedures
and data conversions. Next the circuit prototype was implemented at
Altera MAX II CPLD device and tested for real astronomical object
images. The digital processing speed of CPLD prototype board was
sufficient for correct equatorial mount guiding in real-time system.
Abstract: Controlled release urea has become popular in agricultural industry as it helps to solve environmental issues and increase crop yield. Recently biomass was identified to replace the polymer used as a coating material in the conventional coated urea. In this paper spreading and contact angle of biomass droplet (lignin, cellulose and clay) on urea surface are investigated experimentally. There were two tests were conducted, sessile drop for contact angle measurement and pendant drop for contact angle measurement. A different concentration of biomass droplet was released from 30 mm above a substrate. Glass was used as a controlled substrate. Images were recorded as soon as the droplet impacted onto the urea before completely adsorb into the urea. Digitized droplets were then used to identify the droplet-s surface tension and contact angle. There is large difference observed between the low surface tension and high surface tension liquids, where the wetting and spreading diameter is higher for lower surface tension. From the contact angle results, the data showed that the biomass coating films were possible as wetting liquid (θ < 90º). Contact angle of biomass coating material gives good indication for the wettablity of a liquid on urea surface.
Abstract: The exploration of this paper will focus on the Cshaped
transition curve. This curve is designed by using the concept
of circle to circle where one circle lies inside other. The degree of
smoothness employed is curvature continuity. The function used in
designing the C-curve is Bézier-like cubic function. This function has
a low degree, flexible for the interactive design of curves and
surfaces and has a shape parameter. The shape parameter is used to
control the C-shape curve. Once the C-shaped curve design is
completed, this curve will be applied to design spur gear tooth. After
the tooth design procedure is finished, the design will be analyzed by
using Finite Element Analysis (FEA). This analysis is used to find
out the applicability of the tooth design and the gear material that
chosen. In this research, Cast Iron 4.5 % Carbon, ASTM A-48 is
selected as a gear material.
Abstract: As part of national epidemiological survey on bovine
viral diarrhea virus (BVDV), a total of 274 dejecta samples were
collected from 14 cattle farms in 8 areas of Xinjiang Uygur
Autonomous Region in northwestern China. Total RNA was extracted
from each sample, and 5--untranslated region (UTR) of BVDV
genome was amplified by using two-step reverse
transcriptase-polymerase chain reaction (RT-PCR). The PCR products
were subsequently sequenced to study the genetic variations of BVDV
in these areas. Among the 274 samples, 33 samples were found
virus-positive. According to sequence analysis of the PCR products,
the 33 samples could be arranged into 16 groups. All the sequences,
however, were highly conserved with BVDV Osloss strains. The virus
possessed theses sequences belonged to BVDV-1b subtype by
phylogenetic analysis. Based on these data, we established a typing
tree for BVDV in these areas. Our results suggested that BVDV-1b
was a predominant subgenotype in northwestern China and no
correlation between the genetic and geographical distances could be
observed above the farm level.
Abstract: The paper provides an in-depth tutorial of mathematical
construction of maximal length sequences (m-sequences) via primitive
polynomials and how to map the same when implemented in
shift registers. It is equally important to check whether a polynomial
is primitive or not so as to get proper m-sequences. A fast method to
identify primitive polynomials over binary fields is proposed where
the complexity is considerably less in comparison with the standard
procedures for the same purpose.
Abstract: This paper deals with the problem of constructing
constraints in non safe Petri Nets and then reducing the number of the
constructed constraints. In a system, assigning some linear constraints
to forbidden states is possible. Enforcing these constraints on the
system prevents it from entering these states. But there is no a
systematic method for assigning constraints to forbidden states in non
safe Petri Nets. In this paper a useful method is proposed for
constructing constraints in non safe Petri Nets. But when the number of these constraints is large enforcing them on the system may complicate the Petri Net model. So, another method is proposed for reducing the number of constructed constraints.
Abstract: To learn about China-s future energy demand, this paper first proposed GM(1,1) model group based on recursive solutions of parameters estimation, setting up a general solving-algorithm of the model group. This method avoided the problems occurred on the past researches that remodeling, loss of information and large amount of calculation. This paper established respectively all-data-GM(1,1), metabolic GM(1,1) and new information GM (1,1)model according to the historical data of energy consumption in China in the year 2005-2010 and the added data of 2011, then modeling, simulating and comparison of accuracies we got the optimal models and to predict. Results showed that the total energy demand of China will be 37.2221 billion tons of equivalent coal in 2012 and 39.7973 billion tons of equivalent coal in 2013, which are as the same as the overall planning of energy demand in The 12th Five-Year Plan.
Abstract: Decomposition processes take place in landfill
generate leachates that can be categorized mainly of acetogenic and
methanogenic in nature. BOD:COD ratio computed in this study for a
landfill site over a 3 years duration revealed as a good indicator to
identify acetogenic leachate from methanogenic leachate. Correlation
relationships to predict pollutant level taking into consideration of
climatic condition are derived.
Abstract: Power loss reduction is one of the main targets in power industry and so in this paper, the problem of finding the optimal configuration of a radial distribution system for loss reduction is considered. Optimal reconfiguration involves the selection of the best set of branches to be opened ,one each from each loop, for reducing resistive line losses , and reliving overloads on feeders by shifting the load to adjacent feeders. However ,since there are many candidate switching combinations in the system ,the feeder reconfiguration is a complicated problem. In this paper a new approach is proposed based on a simple optimum loss calculation by determining optimal trees of the given network. From graph theory a distribution network can be represented with a graph that consists a set of nodes and branches. In fact this problem can be viewed as a problem of determining an optimal tree of the graph which simultaneously ensure radial structure of each candidate topology .In this method the refined genetic algorithm is also set up and some improvements of algorithm are made on chromosome coding. In this paper an implementation of the algorithm presented by [7] is applied by modifying in load flow program and a comparison of this method with the proposed method is employed. In [7] an algorithm is proposed that the choice of the switches to be opened is based on simple heuristic rules. This algorithm reduce the number of load flow runs and also reduce the switching combinations to a fewer number and gives the optimum solution. To demonstrate the validity of these methods computer simulations with PSAT and MATLAB programs are carried out on 33-bus test system. The results show that the performance of the proposed method is better than [7] method and also other methods.
Abstract: The potential, opportunities and drawbacks of biogas
technology use in Turkey are evaluated in this paper. Turkey is
dependent on foreign sources of energy. Therefore, use of biogas
technology would provide a safe way of waste disposal and recovery
of renewable energy, particularly from a sustainable domestic source,
which is less unlikely to be influenced by international price or
political fluctuations. Use of biogas technology would especially
meet the cooking, heating and electricity demand in rural areas and
protect the environment, additionally creating new job opportunities
and improving social-economical conditions.
Abstract: The ITE Project is a project that has 1800 km length
and across the Turkey's land through east to west. The project of
pipeline enters geographically from Iran to Doğubayazit (Turkey) in
the east, exits to Greece from Ipsala province of Turkey in the west.
This project is the one of the international projects in such scale that
provides the natural gas of Iran and Caspian Sea through the
European continent. In this investigation, some information will be
given about the methods used to verify the direction of the pipeline
and the technical properties of the results obtained. The cost of
project itself entirely depends on the direction of the pipeline which
would be as short as possible and the specifications of the land cover.
Production standards of 1/2000 scaled digital orthophoto and vectoral
maps as a results of the use of map production materials and methods
(such as high resolution satellite images, and digital aerial images
captured from digital aerial cameras), will also be given in this report.
According to Turkish national map production standards, TM
((Transversal Mercator, 3 degree) projection is used for large scale
map and UTM (Universal Transversal Mercator, 6 degree) is used for
small scale map production standards. Some information is also given
about the projection used in the ITE natural gas pipeline project.
Abstract: Aloe vera has been used worldwide both for
pharmaceutical, food, and cosmetic industries due to the plethora of
biological activities of some of its metabolites. The aim of this study
was to evaluate the antifungal and antioxidant activities of the leaf
extract. The antifungal activity was determined by the agar-well
diffusion method against plant and human fungal pathogens. The
methanol and ethanol portions of the extracts studied were more
bioactive than ethyl acetate portion. It was also observed that the
activity was more pronounced on plant pathogen than human
pathogen except Candida albicans. This is an indication that the
extract has the potential to treat plant fungal infections. The Aloe
extract showed the significant antioxidant activity by the DPPH
radical scavenging method. Therefore, the Aloe extract provided as
natural antioxidant has been used in health foods for medical and
preservative purposes.
Abstract: Data mining uses a variety of techniques each of which is useful for some particular task. It is important to have a deep understanding of each technique and be able to perform sophisticated analysis. In this article we describe a tool built to simulate a variation of the Kohonen network to perform unsupervised clustering and support the entire data mining process up to results visualization. A graphical representation helps the user to find out a strategy to optmize classification by adding, moving or delete a neuron in order to change the number of classes. The tool is also able to automatically suggest a strategy for number of classes optimization.The tool is used to classify macroeconomic data that report the most developed countries? import and export. It is possible to classify the countries based on their economic behaviour and use an ad hoc tool to characterize the commercial behaviour of a country in a selected class from the analysis of positive and negative features that contribute to classes formation.
Abstract: Despite of many scholars and practitioners recognize
the knowledge management implementation in an organizations but
insufficient attention has been paid by researchers to select suitable
knowledge portal system (KPS) selection. This study develops a
Multi Criteria Decision making model based on the fuzzy VIKOR
approach to help organizations in selecting KPS. The suitable portal
is the critical influential factors on the success of knowledge
management (KM) implementation in an organization.