Abstract: With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). Implementations of these two algorithms have been realized for experimental purposes. The results of analysis are given in this paper.
Abstract: The purpose of this study was to determine the most satisfying and frustrating aspects of ICT (Information and Communications Technologies) teaching in Turkish schools. Another aim was to compare these aspects based-on ICT teachers- selfefficacy. Participants were 119 ICT teachers from different geographical areas of Turkey. Participants were asked to list salient satisfying and frustrating aspects of ICT teaching, and to fill out the Self-Efficacy Scale for ICT Teachers. Results showed that the high self-efficacy teachers listed more positive and negative aspects of ICT teaching then did the low self-efficacy teachers. The satisfying aspects of ICT teaching were the dynamic nature of ICT subject, higher student interest, having opportunity to help other subject teachers, and lecturing in well-equipped labs, whereas the most frequently cited frustrating aspects of ICT teaching were ICT-related extra works of schools and colleagues, shortages of hardware and technical problems, indifferent students, insufficient teaching time, and the status of ICT subject in school curriculum. This information could be useful in redesigning ICT teachers- roles and responsibilities as well as job environment in schools.
Abstract: In this paper, a bond graph dynamic model for a valvecontrolled
hydraulic cylinder has been developed. A simplified bond
graph model of the inter-actuator interactions in a multi-cylinder
hydraulic system has also been presented. The overall bond graph
model of a valve-controlled hydraulic cylinder was developed by
combining the bond graph sub-models of the pump, spool valve and
the actuator using junction structures. Causality was then assigned
in order to obtain a computational model which could be simulated.
The causal bond graph model of the hydraulic cylinder was verified
by comparing the open loop state responses to those of an ODE
model which had been developed in literature based on the same
assumptions. The results were found to correlate very well both
in the shape of the curves, magnitude and the response times,
thus indicating that the developed model represents the hydraulic
dynamics of a valve-controlled cylinder. A simplified model for interactuator
interaction was presented by connecting an effort source with
constant pump pressure to the zero-junction from which the cylinders
in a multi-cylinder system are supplied with a constant pressure from
the pump. On simulating the state responses of the developed model
under different situations of cylinder operations, indicated that such
a simple model can be used to predict the inter-actuator interactions.
Abstract: This study explored the relationship between
psychological traits, demographics and financial behavioral biases for
individual investors in Taiwan stock market. By using questionnaire
survey method conducted in 2010, there are 554 valid convenient
samples collected to examine the determinants of three types of
behavioral biases. Based on literature review, two hypothesized
models are constructed and further used to evaluate the effects of big
five personality traits and demographic variables on investment biases
through Structural Equation Model (SEM) analysis. The results
showed that investment biases of individual investors are significantly
related to four personality traits as well as some demographics.
Abstract: In this paper, we define distance partition of vertex set of a graph G with reference to a vertex in it and with the help of the same, a graph with metric dimension two (i.e. β (G) = 2 ) is characterized. In the process, we develop a polynomial time algorithm that verifies if the metric dimension of a given graph G is two. The same algorithm explores all metric bases of graph G whenever β (G) = 2 . We also find a bound for cardinality of any distance partite set with reference to a given vertex, when ever β (G) = 2 . Also, in a graph G with β (G) = 2 , a bound for cardinality of any distance partite set as well as a bound for number of vertices in any sub graph H of G is obtained in terms of diam H .
Abstract: α-Pinene is the main component of the most
turpentine oils. The hydration of α-pinene with acid catalysts leads to
a complex mixture of monoterpenes. In order to obtain more valuable
products, the α-pinene in the turpentine can be hydrated in dilute
mineral acid solutions to produce α-terpineol. The design of
separation processes requires information on phase equilibrium and
related thermodynamic properties. This paper reports the results of
study on liquid-liquid equilibrium (LLE) of system containing α-
pinene + water and α-terpineol + water.
Binary LLE for α-pinene + water system, and α-terpineol + water
systems were determined by experiment at 301K and atmospheric
pressure. The two component mixture was stirred for about 30min,
then the mixture was left for about 2h for complete phase separation.
The composition of both phases was analyzed by using a Gas
Chromatograph. The experimental data were correlated by
considering both NRTL and UNIQUAC activity coefficient models.
The LLE data for the system of α-pinene + water and α-terpineol +
water were correlated successfully by the NRTL model. The
experimental data were not satisfactorily fitted by the UNIQUAC
model. The NRTL model (α =0.3) correlates the LLE data for the
system of α-pinene + water at 301K with RMSD of 0.0404%. And
the NRTL model (α =0.61) at 301K with RMSD of 0.0058 %. The
NRTL model (α =0.3) correlates the LLE data for the system of α-
terpineol + water at 301K with RMSD of 0.1487% and the NRTL
model (α =0.6) at 301K with RMSD of 0.0032%, between the
experimental and calculated mole fractions.
Abstract: System MEMORI automatically detects and recognizes
rotated and/or rescaled versions of the objects of a database within
digital color images with cluttered background. This task is accomplished
by means of a region grouping algorithm guided by heuristic
rules, whose parameters concern some geometrical properties and the
recognition score of the database objects. This paper focuses on the
strategies implemented in MEMORI for the estimation of the heuristic
rule parameters. This estimation, being automatic, makes the system
a self configuring and highly user-friendly tool.
Abstract: The passive electrical properties of a tissue depends
on the intrinsic constituents and its structure, therefore by measuring
the complex electrical impedance of the tissue it might be possible to
obtain indicators of the tissue state or physiological activity [1].
Complete bio-impedance information relative to physiology and
pathology of a human body and functional states of the body tissue or
organs can be extracted by using a technique containing a fourelectrode
measurement setup. This work presents the estimation
measurement setup based on the four-electrode technique. First, the
complex impedance is estimated by three different estimation
techniques: Fourier, Sine Correlation and Digital De-convolution and
then estimation errors for the magnitude, phase, reactance and
resistance are calculated and analyzed for different levels of
disturbances in the observations. The absolute values of relative
errors are plotted and the graphical performance of each technique is
compared.
Abstract: In this paper a deterministic polynomial-time
algorithm is presented for the Clique problem. The case is considered
as the problem of omitting the minimum number of vertices from the
input graph so that none of the zeroes on the graph-s adjacency
matrix (except the main diagonal entries) would remain on the
adjacency matrix of the resulting subgraph. The existence of a
deterministic polynomial-time algorithm for the Clique problem, as
an NP-complete problem will prove the equality of P and NP
complexity classes.
Abstract: There is inadequate information on the practice of
female genital mutilation (FGM) in the UK, and there are often
myths and perceptions within communities that influence the
effectiveness of prevention programmes. This means it is difficult to
address the trends and changes in the practice in the UK.
To this end, FORWARD undertook novel and innovative research
using the Participatory Ethnographic and Evaluative Research
(PEER) method to explore the views of women from Eritrea, Sudan,
Somalia and Ethiopia that live in London and Bristol (two UK cities).
Women-s views, taken from PEER interviews, reflected reasons for
continued practice of FGM: marriageability, the harnessing and
control of female sexuality, and upholding traditions from their
countries of origin. It was also clear that the main supporters of the
practice were believed to be older women within families and
communities.
Women described the impact FGM was having on their lives as
isolating. And although it was clearly considered a private and
personal matter, they developed a real sense of connection with their
peers within the research process.
The women were overwhelmingly positive about combating the
practice, although they believed it would probably take a while
before it ends completely. They also made concrete
recommendations on how to improve support services for women
affected by FGM: Training for professionals (particularly in
healthcare), increased engagement with, and outreach to,
communities, culturally appropriate materials and information made
available and accessible to communities, and more consequent
implementation of legislation.
Finally, the women asked for more empathy and understanding,
particularly from health professionals. Rather than presenting FGM
as a completely alien and inconceivable practice, it may help for
those looking into these women-s lives and working with them to
understand the social and economic context in which the practice
takes place.
Abstract: The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: In this paper we propose a method for recognition of
adult video based on support vector machine (SVM). Different kernel
features are proposed to classify adult videos. SVM has an advantage
that it is insensitive to the relative number of training example in
positive (adult video) and negative (non adult video) classes. This
advantage is illustrated by comparing performance between different
SVM kernels for the identification of adult video.
Abstract: In the self-stabilizing algorithmic paradigm, each node has a local view of the system, in a finite amount of time the system converges to a global state with desired property. In a graph G =
(V, E), a subset S C V is a 2-packing if Vi c V: IN[i] n SI
Abstract: In this paper, we deal with the Steiner tree problem
(STP) on a graph in which a fuzzy number, instead of a real number,
is assigned to each edge. We propose a modification of the shortest
paths approximation based on the fuzzy shortest paths (FSP)
evaluations. Since a fuzzy min operation using the extension
principle leads to nondominated solutions, we propose another
approach to solving the FSP using Cheng's centroid point fuzzy
ranking method.
Abstract: The existence of many biological systems,
especially human societies, is based on cooperative behavior
[1, 2]. If natural selection favors selfish individuals, then what
mechanism is at work that we see so many cooperative
behaviors? One answer is the effect of network structure. On a
graph, cooperators can evolve by forming network bunches
[2, 3, 4]. In a research, Ohtsuki et al used the idea of iterated
prisoners- dilemma on a graph to model an evolutionary
game. They showed that the average number of neighbors
plays an important role in determining whether cooperation is
the ESS of the system or not [3]. In this paper, we are going to
study the dynamics of evolution of cooperation in a social
network. We show that during evolution, the ratio of
cooperators among individuals with fewer neighbors to
cooperators among other individuals is greater than unity. The
extent to which the fitness function depends on the payoff of
the game determines this ratio.
Abstract: The paper aims to specify and build a system, a learning support in radiology-senology (breast radiology) dedicated to help assist junior radiologists-senologists in their radiologysenology- related activity based on experience of expert radiologistssenologists. This system is named SAFRS (i.e. system supporting the training of radiologists-senologists). It is based on the exploitation of radiologic-senologic images (primarily mammograms but also echographic images or MRI) and their related clinical files. The aim of such a system is to help breast cancer screening in education. In order to acquire this expert radiologist-senologist knowledge, we have used the CBR (case-based reasoning) approach. The SAFRS system will promote the evolution of teaching in radiology-senology by offering the “junior radiologist" trainees an advanced pedagogical product. It will permit a strengthening of knowledge together with a very elaborate presentation of results. At last, the know-how will derive from all these factors.
Abstract: In this paper we focus on event extraction from Tamil
news article. This system utilizes a scoring scheme for extracting and
grouping event-specific sentences. Using this scoring scheme eventspecific
clustering is performed for multiple documents. Events are
extracted from each document using a scoring scheme based on
feature score and condition score. Similarly event specific sentences
are clustered from multiple documents using this scoring scheme.
The proposed system builds the Event Template based on user
specified query. The templates are filled with event specific details
like person, location and timeline extracted from the formed clusters.
The proposed system applies these methodologies for Tamil news
articles that have been enconverted into UNL graphs using a Tamil to
UNL-enconverter. The main intention of this work is to generate an
event based template.
Abstract: In this work we propose a novel Steganographic
method for hiding information within the spatial domain of the gray
scale image. The proposed approach works by dividing the cover into
blocks of equal sizes and then embeds the message in the edge of the
block depending on the number of ones in left four bits of the pixel.
The proposed approach is tested on a database consists of 100
different images. Experimental results, compared with other
methods, showed that the proposed approach hide more large
information and gave a good visual quality stego-image that can be
seen by human eyes.
Abstract: In this study three commercial semiconductor devices
were characterized in the laboratory for computed tomography
dosimetry: one photodiode and two phototransistors. It was evaluated
four responses to the irradiation: dose linearity, energy dependence,
angular dependence and loss of sensitivity after X ray exposure. The
results showed that the three devices have proportional response with
the air kerma; the energy dependence displayed for each device
suggests that some calibration factors would be applied for each one;
the angular dependence showed a similar pattern among the three
electronic components. In respect to the fourth parameter analyzed,
one phototransistor has the highest sensitivity however it also showed
the greatest loss of sensitivity with the accumulated dose. The
photodiode was the device with the smaller sensitivity to radiation,
on the other hand, the loss of sensitivity after irradiation is negligible.
Since high accuracy is a desired feature for a dosimeter, the
photodiode can be the most suitable of the three devices for
dosimetry in tomography. The phototransistors can also be used for
CT dosimetry, however it would be necessary a correction factor due
to loss of sensitivity with accumulated dose.