Abstract: The recent growth of using multimedia transmission
over wireless communication systems, have challenges to protect the
data from lost due to wireless channel effect. Images are corrupted
due to the noise and fading when transmitted over wireless channel,
in wireless channel the image is transmitted block by block, Due to
severe fading, entire image blocks can be damaged. The aim of this
paper comes out from need to enhance the digital images at the
wireless receiver side. Proposed Boundary Interpolation (BI)
Algorithm using wavelet, have been adapted here used to
reconstruction the lost block in the image at the receiver depend on
the correlation between the lost block and its neighbors. New
Proposed technique by using Boundary Interpolation (BI) Algorithm
using wavelet with Pixel interleaver has been implemented. Pixel
interleaver work on distribute the pixel to new pixel position of
original image before transmitting the image. The block lost through
wireless channel is only effects individual pixel. The lost pixels at the
receiver side can be recovered by using Boundary Interpolation (BI)
Algorithm using wavelet. The results showed that the New proposed
algorithm boundary interpolation (BI) using wavelet with pixel
interleaver is better in term of MSE and PSNR.
Abstract: Due to the call of global warming effects, city planners aim at actions for reducing carbon emission. One of the approaches is to promote the usage of public transportation system toward the transit-oriented-development. For example, rapid transit system in Taipei city and Kaohsiung city are opening. However, until November 2008 the average daily patronage counted only 113,774 passengers at Kaohsiung MRT systems, much less than which was expected. Now the crucial questions: how the public transport competes with private transport? And more importantly, what factors would enhance the use of public transport? To give the answers to those questions, our study first applied regression to analyze the factors attracting people to use public transport around cities in the world. It is shown in our study that the number of MRT stations, city population, cost of living, transit fare, density, gasoline price, and scooter being a major mode of transport are the major factors. Subsequently, our study identified successful and unsuccessful cities in regard of the public transport usage based on the diagnosis of regression residuals. Finally, by comparing transportation strategies adopted by those successful cities, our conclusion stated that Kaohsiung City could apply strategies such as increasing parking fees, reducing parking spaces in downtown area, and reducing transfer time by providing more bus services and public bikes to promote the usage of public transport.
Abstract: e-mail has become an important means of electronic
communication but the viability of its usage is marred by Unsolicited
Bulk e-mail (UBE) messages. UBE consists of many types
like pornographic, virus infected and 'cry-for-help' messages as well
as fake and fraudulent offers for jobs, winnings and medicines. UBE
poses technical and socio-economic challenges to usage of e-mails.
To meet this challenge and combat this menace, we need to
understand UBE. Towards this end, the current paper presents a
content-based textual analysis of more than 2700 body enhancement
medicinal UBE. Technically, this is an application of Text Parsing
and Tokenization for an un-structured textual document and we
approach it using Bag Of Words (BOW) and Vector Space Document
Model techniques. We have attempted to identify the most
frequently occurring lexis in the UBE documents that advertise
various products for body enhancement. The analysis of such top
100 lexis is also presented. We exhibit the relationship between
occurrence of a word from the identified lexis-set in the given UBE
and the probability that the given UBE will be the one advertising for
fake medicinal product. To the best of our knowledge and survey of
related literature, this is the first formal attempt for identification of
most frequently occurring lexis in such UBE by its textual analysis.
Finally, this is a sincere attempt to bring about alertness against and
mitigate the threat of such luring but fake UBE.
Abstract: The scattering effect of light in fog improves the
difficulty in visibility thus introducing disturbances in transport
facilities in urban or industrial areas causing fatal accidents or public
harassments, therefore, developing an enhanced fog vision system
with radio wave to improvise the way outs of these severe problems
is really a big challenge for researchers. Series of experimental
studies already been done and more are in progress to know the
weather effect on radio frequencies for different ranges. According to
Rayleigh scattering Law, the propagating wavelength should be
greater than the diameter of the particle present in the penetrating
medium. Direct wave RF signal thus have high chance of failure to
work in such weather for detection of any object. Therefore an
extensive study was required to find suitable region in the RF band
that can help us in detecting objects with proper shape. This paper
produces some results on object detection using 912 MHz band with
successful detection of the persistence of any object coming under the
trajectory of a vehicle navigating in indoor and outdoor environment.
The developed images are finally transformed to video signal to
enable continuous monitoring.
Abstract: Improving the performance of the QCL through block diagram as well as mathematical models is the main scope of this paper. In order to enhance the performance of the underlined device, the mathematical model parameters are used in a reliable manner in such a way that the optimum behavior was achieved. These parameters play the central role in specifying the optical characteristics of the considered laser source. Moreover, it is important to have a large amount of radiated power, where increasing the amount of radiated power represents the main hopping process that can be predicted from the behavior of quantum laser devices. It was found that there is a good agreement between the calculated values from our mathematical model and those obtained with VisSim and experimental results. These demonstrate the strength of mplementation of both mathematical and block diagram models.
Abstract: This paper presents a research conducted to investigate the effect of mixing process on polypropylene (PP) modified bitumen mixed with well graded aggregate to form modified bituminous concrete mix. Two mode of mixing, namely dry and wet with different concentration of polymer polypropylene was used with 80/100 pen bitumen, to evaluate the bituminous concrete mix properties. Three percentages of polymer varying from 1-3% by the weight of bitumen was used in this study. Three mixes namely control mix, wet mix and dry mix were prepared. Optimum binder content was calculated considering Marshall Stability, flow, air voids and Marshall Quotient at different bitumen content varying from 4% - 6.5% for control, dry and wet mix. Engineering properties thus obtained at the calculated optimum bitumen content revealed that wet mixing process is advantageous in comparison to dry mixing as it increases the stiffness of the mixture with the increase in polymer content in bitumen. Stiffness value for wet mix increases with the increase in polymer content which is beneficial in terms of rutting. 1% PP dry mix also shows enhanced stiffness, with the air void content limited to 4%.The flow behaviour of dry mix doesn't indicate any major difference with the increase in polymer content revealing that polymer acting as an aggregate only without affecting the viscosity of the binder in the mix. Polypropylene (PP) when interacted with 80 pen base bitumen enhances its performance characteristics which were brought about by altered rheological properties of the modified bitumen. The decrease in flow with the increase in binder content reflects the increase in viscosity of binder which induces the plastic flow in the mix. Workability index indicates that wet mix were easy to compact up to desired void ratio in comparison to dry mix samples.
Abstract: The advancement in wireless technology with the wide
use of mobile devices have drawn the attention of the research and
technological communities towards wireless environments, such as
Wireless Local Area Networks (WLANs), Wireless Wide Area
Networks (WWANs), and mobile systems and ad-hoc networks.
Unfortunately, wired and wireless networks are expressively different
in terms of link reliability, bandwidth, and time of propagation delay
and by adapting new solutions for these enhanced
telecommunications, superior quality, efficiency, and opportunities
will be provided where wireless communications were otherwise
unfeasible. Some researchers define 4G as a significant improvement
of 3G, where current cellular network’s issues will be solved and data
transfer will play a more significant role. For others, 4G unifies
cellular and wireless local area networks, and introduces new routing
techniques, efficient solutions for sharing dedicated frequency bands,
and an increased mobility and bandwidth capacity. This paper
discusses the possible solutions and enhancements probabilities that
proposed to improve the performance of Transmission Control
Protocol (TCP) over different wireless networks and also the paper
investigated each approach in term of advantages and disadvantages.
Abstract: The RK1GL2X3 method is a numerical method for solving initial value problems in ordinary differential equations, and is based on the RK1GL2 method which, in turn, is a particular case of the general RKrGLm method. The RK1GL2X3 method is a fourth-order method, even though its underlying Runge-Kutta method RK1 is the first-order Euler method, and hence, RK1GL2X3 is considerably more efficient than RK1. This enhancement is achieved through an implementation involving triple-nested two-point Gauss- Legendre quadrature.
Abstract: Turbine blade cooling is considered as the most
effective way of maintaining high operating temperature making use
of the available materials, and turbine systems with wet compression
have a potential for future power generation because of high efficiency
and high specific power with a relatively low cost. In this paper
performance analysis of wet-compression gas turbine cycle with
turbine blade cooling is carried out. The wet compression process is
analytically modeled based on non-equilibrium droplet evaporation.
Special attention is paid for the effects of pressure ratio and water
injection ratio on the important system variables such as ratio of
coolant fluid flow, fuel consumption, thermal efficiency and specific
power. Parametric studies show that wet compression leads to
insignificant improvement in thermal efficiency but significant
enhancement of specific power in gas turbine systems with turbine
blade cooling.
Abstract: Revolutions Applications such as telecommunications, hands-free communications, recording, etc. which need at least one microphone, the signal is usually infected by noise and echo. The important application is the speech enhancement, which is done to remove suppressed noises and echoes taken by a microphone, beside preferred speech. Accordingly, the microphone signal has to be cleaned using digital signal processing DSP tools before it is played out, transmitted, or stored. Engineers have so far tried different approaches to improving the speech by get back the desired speech signal from the noisy observations. Especially Mobile communication, so in this paper will do reconstruction of the speech signal, observed in additive background noise, using the Kalman filter technique to estimate the parameters of the Autoregressive Process (AR) in the state space model and the output speech signal obtained by the MATLAB. The accurate estimation by Kalman filter on speech would enhance and reduce the noise then compare and discuss the results between actual values and estimated values which produce the reconstructed signals.
Abstract: Generally flow behavior in centrifugal fan is observed
to be in a state of instability with flow separation zones on suction
surface as well as near the front shroud. Overall performance of the
diffusion process in a centrifugal fan could be enhanced by
judiciously introducing the boundary layer suction slots. With easy
accessibility of CFD as an analytical tool, an extensive numerical
whole field analysis of the effect of boundary layer suction slots in
discrete regions of suspected separation points is possible. This paper
attempts to explore the effect of boundary layer suction slots
corresponding to various geometrical locations on the impeller with
converging configurations for the slots. The analysis shows that the
converging suction slots located on the impeller blade about 25%
from the trailing edge, significantly improves the static pressure
recovery across the fan. Also it is found that Slots provided at a
radial distance of about 12% from the leading and trailing edges
marginally improve the static pressure recovery across the fan.
Abstract: The purpose of this study is to investigate the chemical
degradation of the organophosphorus pesticide of parathion and
carbamate insecticide of methomyl in the aqueous phase through
Fenton process. With the employment of batch Fenton process, the
degradation of the two selected pesticides at different pH, initial
concentration, humic acid concentration, and Fenton reagent dosages
was explored. The Fenton process was found effective to degrade
parathion and methomyl. The optimal dosage of Fenton reagents (i.e.,
molar concentration ratio of H2O2 to Fe2+) at pH 7 for parathion
degradation was equal to 3, which resulted in 50% removal of
parathion. Similarly, the optimal dosage for methomyl degradation
was 1, resulting in 80% removal of methomyl. This study also found
that the presence of humic substances has enhanced pesticide
degradation by Fenton process significantly. The mass spectroscopy
results showed that the hydroxyl free radical may attack the single
bonds with least energy of investigated pesticides to form smaller
molecules which is more easily to degrade either through
physio-chemical or bilolgical processes.
Abstract: The application of agro-industrial waste in Aluminum
Metal Matrix Composites has been getting more attention as they
can reinforce particles in metal matrix which enhance the strength
properties of the composites. In addition, by applying these agroindustrial
wastes in useful way not only save the manufacturing cost
of products but also reduce the pollutions on environment. This
paper represents a literature review on a range of industrial wastes
and their utilization in metal matrix composites. The paper describes
the synthesis methods of agro-industrial waste filled metal matrix
composite materials and their mechanical, wear, corrosion, and
physical properties. It also highlights the current application and
future potential of agro-industrial waste reinforced composites in
aerospace, automotive and other construction industries.
Abstract: This paper highlights the importance of the selection
of the building-s wall material,and the shortcomings of the most
commonly used framed structures with masonry infills .The
objective of this study is investigating the behavior of infill walls as
structural components in existing structures.Structural infill walls are
very important in structural behavior under earthquake effects.
Structural capacity under the effect of earthquake,displacement and
relative story displacement are affected by the structural irregularities
.The presence of nonstructural masonry infill walls can modify
extensively the global seismic behavior of framed buildings .The
stability and integrity of reinforced concrete frames are enhanced by
masonry infill walls. Masonry infill walls alter displacement and
base shear of the frame as well. Short columns have great
importance during earthquakes,because their failure may lead to
additional structural failures and result in total building collapse.
Consequently the effects of short columns are considered in this
study.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: The compression-absorption heat pump (C-A HP), one
of the promising heat recovery equipments that make process hot
water using low temperature heat of wastewater, was evaluated by
computer simulation. A simulation program was developed based on
the continuity and the first and second laws of thermodynamics. Both
the absorber and desorber were modeled using UA-LMTD method. In
order to prevent an unfeasible temperature profile and to reduce
calculation errors from the curved temperature profile of a mixture,
heat loads were divided into lots of segments. A single-stage
compressor was considered. A compressor cooling load was also
taken into account. An isentropic efficiency was computed from the
map data. Simulation conditions were given based on the system
consisting of ordinarily designed components. The simulation results
show that most of the total entropy generation occurs during the
compression and cooling process, thus suggesting the possibility that
system performance can be enhanced if a rectifier is introduced.
Abstract: Stream Control Transmission Protocol (SCTP) has been
proposed to provide reliable transport of real-time communications.
Due to its attractive features, such as multi-streaming and multihoming,
the SCTP is often expected to be an alternative protocol
for TCP and UDP. In the original SCTP standard, the secondary path
is mainly regarded as a redundancy. Recently, most of researches
have focused on extending the SCTP to enable a host to send its
packets to a destination over multiple paths simultaneously. In order
to transfer packets concurrently over the multiple paths, the SCTP
should be well designed to avoid unnecessary fast retransmission
and the mis-estimation of congestion window size through the paths.
Therefore, we propose an Enhanced Cooperative ACK SCTP (ECASCTP)
to improve the path recovery efficiency of multi-homed host
which is under concurrent multiple transfer mode. We evaluated the
performance of our proposed scheme using ns-2 simulation in terms
of cwnd variation, path recovery time, and goodput. Our scheme
provides better performance in lossy and path asymmetric networks.
Abstract: Web-based cooperative learning focuses on (1) the interaction and the collaboration of community members, and (2) the sharing and the distribution of knowledge and expertise by network technology to enhance learning performance. Numerous research literatures related to web-based cooperative learning have demonstrated that cooperative scripts have a positive impact to specify, sequence, and assign cooperative learning activities. Besides, literatures have indicated that role-play in web-based cooperative learning environments enhances two or more students to work together toward the completion of a common goal. Since students generally do not know each other and they lack the face-to-face contact that is necessary for the negotiation of assigning group roles in web-based cooperative learning environments, this paper intends to further extend the application of genetic algorithm (GA) and propose a GA-based algorithm to tackle the problem of role assignment in web-based cooperative learning environments, which not only saves communication costs but also reduces conflict between group members in negotiating role assignments.
Abstract: The objectives were to identify cyanide-degrading
bacteria and study cyanide removal efficiency. Agrobacterium
tumefaciens SUTS 1 was isolated. This is a new strain of
microorganisms for cyanide degradation. The maximum growth rate
of SUTS 1 obtained 4.7 × 108 CFU/ml within 4 days. The cyanide
removal efficiency was studied at 25, 50, and 150 mg/L cyanide. The
residual cyanide, ammonia, nitrate, nitrite, pH, and cell counts were
analyzed. At 25 and 50 mg/L cyanide, SUTS 1 obtained similar
removal efficiency approximately 87.50%. At 150 mg/L cyanide,
SUTS 1 enhanced the cyanide removal efficiency up to 97.90%. Cell
counts of SUTS 1 increased when the cyanide concentration was set
at lower. The ammonia increased when the removal efficiency
increased. The nitrate increased when the ammonia decreased but the
nitrite did not detect in all experiments. pH values also increased
when the cyanide concentrations were set at higher.
Abstract: The main purpose of this research paper was to study
the requirements for human capital development in order to be ready
for ASEAN Community. Thai education institutions are encountering
a challenging course of change to be effective members of ASEAN
Economic Community (AEC) in 2015. It was vital that everyone and
every organization participate in the process of becoming part of the
ASEAN community, a pluralistic society. Thai universities will be
required to partake in the human capital development in a variety of
fields. In order to assist the whole nation to enhance potential
development, there was a need to collaborate with other ASEAN
leading universities to do researches to ameliorate the qualifications
and capabilities of university management, administers, professors,
and staffs.