Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: In this paper, an intelligent automatic parking control method is proposed. First, the dynamical equation of the rear parking control is derived. Then a fuzzy logic control is proposed to perform the parking planning process. Further, a rear neural network is proposed for the steering control. Through the simulations and experiments, the intelligent auto-parking mode controllers have been shown to achieve the demanded goals with satisfactory control performance and to guarantee the system robustness under parametric variations and external disturbances. To improve some shortcomings and limitations in conventional parking mode control and further to reduce consumption time and prime cost.
Abstract: Our study is concerned with the development of an Emergency Medical Services (EMS) ambulance location and allocation model called the Time-based Ambulance Zoning Optimization Model (TAZ_OPT). This paper presents the framework of the study. The model is formulated using the goal programming (GP), where the goals are to determine the satellite locations of ambulances and the number of ambulances to be allocated at these locations. The model aims at maximizing the expected demand coverage based on probability of reaching the emergency location within targetted time, and minimizing the ambulance busyness likelihood value. Among the benefits of the model is the increased accessibility and availability of ambulances, thus, enhanced quality of the EMS ambulance services.
Abstract: Through the course of this paper we outline how
mobile Business Intelligence (m-BI) can help businesses to work
smarter and to improve their agility. When we analyze the industry
from the usage perspective or how interaction with the enterprise BI
system happens via mobile devices, we may easily understand that
there are two major types of mobile BI: passive and active. Active
mobile BI gives provisions for users to interact with the BI systems
on-the-fly. Active mobile business intelligence often works as a
combination of both “push and pull" techniques. Some mistakes were
done in the up-to-day progress of mobile technologies and mobile BI,
as well as some problems that still have to be resolved. We discussed
in the paper rather broadly.
Abstract: The purpose of this research was to study the factors
that influenced the success of mobile phone entrepreneurs at Central
Plaza. The sample group included 187 entrepreneurs at Central Plaza.
A questionnaire was utilized as a tool to collect data. Statistics used
in this research included frequency, percentage, mean, and standard
deviation. Independent- sample t- test, one way ANOVA, and
multiple regression analysis. Data were analyzed by using Statistical
Package for the Social Sciences.The findings disclosed that the
majority of respondents were male between 25-40 years old, and held
an undergraduate degree. The average income of respondents was
between 15,001-25,000 baht. The majority of respondents had less
than 5 years of working experience.
In terms of personality, the findings revealed that expression and
agreement were ranked at the highest level. Whereas, emotion
stability, consciousness, open to new experience were ranked at high.
From the hypotheses testing, the findings revealed that different
genders had different success in their mobile phone business with
different income from the last 6 months. However, difference in age,
income, level of education, and experience affected the success in
terms of income, number of customers, and overall success of
business. Moreover, the factors of personalities included expression,
agreement, emotion stability, consciousness, open to new experience,
and competitive strategy. From the findings, these factors were able
to predict mobile phone business success at 66.9 percent.
Abstract: A novel and versatile numerical technique to solve a self-stress equilibrium state is adopted herein as a form-finding procedure for an irregular tensegrity structure. The numerical form-finding scheme of a tensegrity structure uses only the connectivity matrix and prototype tension coefficient vector as the initial guess solution. Any information on the symmetrical geometry or other predefined initial structural conditions is not necessary to get the solution in the form-finding process. An eight-node initial condition example is presented to demonstrate the efficiency and robustness of the proposed method in the form-finding of an irregular tensegrity structure. Based on the conception from the form-finding of an eight-node irregular tensegrity structure, a monumental object is designed by considering the real world situation such as self-weight, wind and earthquake loadings.
Abstract: User satisfaction is one of the most used success
indicators in the research of information system (IS). Literature
shows user expectations have great influence on user satisfaction.
Both expectation and satisfaction of users are important for Hospital
Information Systems (HIS). Education, IS experience, age, attitude
towards change, business title, sex and working unit of the hospital,
are examined as the potential determinant of the medical users’
expectations. Data about medical user expectations are collected by
the “Expectation Questionnaire” developed for this study.
Expectation data are used for calculating the Expectation Meeting
Ratio (EMR) with the evaluation framework also developed for this
study. The internal consistencies of the answers to the questionnaire
are measured by Cronbach´s Alpha coefficient. The multivariate
analysis of medical user’s EMRs of HIS is performed by forward
stepwise binary logistic regression analysis. Education and business
title is appeared to be the determinants of expectations from HIS.
Abstract: A mathematical model based on a mass and energy
balance for the combustion in a cement rotary kiln was developed.
The model was used to investigate the impact of replacing about
45 % of the primary coal energy by different alternative fuels.
Refuse derived fuel, waste wood, solid hazardous waste and liquid
hazardous waste were used in the modeling. The results showed that
in order to keep the kiln temperature unchanged, and thereby
maintain the required clinker quality, the production capacity had to
be reduced by 1-15 %, depending on the fuel type. The reason for the
reduction is increased exhaust gas flow rates caused by the fuel
characteristics. The model, which has been successfully validated in a
full-scale experiment, was also used to show that the negative impact
on the production capacity can be avoided if a relatively small part of
the combustion air is replaced by pure oxygen.
Abstract: The objectives of the study are to examine the
determinants of ERP implementation success factors of ERP
implementation. The result indicates that large scale ERP
implementation success consist of eight factors: project management
competence, knowledge sharing, ERP system quality , understanding,
user involvement, business process re-engineering, top management
support, organization readiness.
Abstract: Nowaday-s, many organizations use systems that
support business process as a whole or partially. However, in some
application domains, like software development and health care
processes, a normative Process Aware System (PAS) is not suitable,
because a flexible support is needed to respond rapidly to new
process models. On the other hand, a flexible Process Aware System
may be vulnerable to undesirable and fraudulent executions, which
imposes a tradeoff between flexibility and security. In order to make
this tradeoff available, a genetic-based anomaly detection model for
logs of Process Aware Systems is presented in this paper. The
detection of an anomalous trace is based on discovering an
appropriate process model by using genetic process mining and
detecting traces that do not fit the appropriate model as anomalous
trace; therefore, when used in PAS, this model is an automated
solution that can support coexistence of flexibility and security.
Abstract: In this paper, the American exchange option (AEO) valuation problem is modelled as a free boundary problem. The critical stock price for an AEO is satisfied an integral equation implicitly. When the remaining time is large enough, an asymptotic formula is provided for pricing an AEO. The numerical results reveal that our asymptotic pricing formula is robust and accurate for the long-term AEO.
Abstract: In this paper, a novel adaptive fuzzy sliding mode
control method is proposed for the robust tracking control of robotic
manipulators. The proposed controller possesses the advantages of
adaptive control, fuzzy control, and sliding mode control. First, system
stability and robustness are guaranteed based on the sliding mode
control. Further, fuzzy rules are developed incorporating with
adaptation law to alleviate the input chattering effectively. Stability of
the control system is proven by using the Lyapunov method. An
application to a three-degree-of-freedom robotic manipulator is
carried out. Accurate trajectory tracking as well as robustness is
achieved. Input chattering is greatly eliminated.
Abstract: The genetic algorithm (GA) based solution techniques
are found suitable for optimization because of their ability of
simultaneous multidimensional search. Many GA-variants have been
tried in the past to solve optimal power flow (OPF), one of the
nonlinear problems of electric power system. The issues like
convergence speed and accuracy of the optimal solution obtained
after number of generations using GA techniques and handling
system constraints in OPF are subjects of discussion. The results
obtained for GA-Fuzzy OPF on various power systems have shown
faster convergence and lesser generation costs as compared to other
approaches. This paper presents an enhanced GA-Fuzzy OPF (EGAOPF)
using penalty factors to handle line flow constraints and load
bus voltage limits for both normal network and contingency case
with congestion. In addition to crossover and mutation rate
adaptation scheme that adapts crossover and mutation probabilities
for each generation based on fitness values of previous generations, a
block swap operator is also incorporated in proposed EGA-OPF. The
line flow limits and load bus voltage magnitude limits are handled by
incorporating line overflow and load voltage penalty factors
respectively in each chromosome fitness function. The effects of
different penalty factors settings are also analyzed under contingent
state.
Abstract: Severe symptoms, such as dissociation, depersonalization, self-mutilation, suicidal ideations and gestures, are the main reasons for a person to be diagnosed with Borderline Personality Disorder (BPD) and admitted to an inpatient Psychiatric Hospital. However, these symptoms are also indicators of a severe traumatic history as indicated by the extensive research on the topic. Unfortunately patients with such clinical presentation often are treated repeatedly only for their symptomatic behavior, while the main cause for their suffering, the trauma itself, is usually left unaddressed therapeutically. All of the highly structured, replicable, and manualized treatments lack the recognition of the uniqueness of the person and fail to respect his/her rights to experience and react in an idiosyncratic manner. Thus the communicative and adaptive meaning of such symptomatic behavior is missed. Only its pathological side is recognized and subjected to correction and stigmatization, and the message that the person is damaged goods that needs fixing is conveyed once again. However, this time the message would be even more convincing for the victim, because it is sent by mental health providers, who have the credibility to make such a judgment. The result is a revolving door of very expensive hospitalizations for only a temporary and patchy fix. In this way the patients, once victims of abuse and hardship are left invalidated and thus their re-victimization is perpetuated in their search for understanding and help. Keywordsborderline personality disorder (BPD), complex PTSD, integrative treatment of trauma, re-victimization of trauma victims.
Abstract: The weighting exponent m is called the fuzzifier that
can have influence on the clustering performance of fuzzy c-means
(FCM) and mÎ[1.5,2.5] is suggested by Pal and Bezdek [13]. In this
paper, we will discuss the robust properties of FCM and show that the
parameter m will have influence on the robustness of FCM. According
to our analysis, we find that a large m value will make FCM more
robust to noise and outliers. However, if m is larger than the theoretical
upper bound proposed by Yu et al. [14], the sample mean will become
the unique optimizer. Here, we suggest to implement the FCM
algorithm with mÎ[1.5,4] under the restriction when m is smaller
than the theoretical upper bound.
Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: The goal of steganography is to avoid drawing
suspicion to the transmission of a hidden message. If suspicion is
raised, steganography may fail. The success of steganography
depends on the secrecy of the action. If steganography is detected,
the system will fail but data security depends on the robustness of the
applied algorithm. In this paper, we propose a novel plausible
deniability scheme in steganography by using a diversionary message
and encrypt it with a DES-based algorithm. Then, we compress the
secret message and encrypt it by the receiver-s public key along with
the stego key and embed both messages in a carrier using an
embedding algorithm. It will be demonstrated how this method can
support plausible deniability and is robust against steganalysis.
Abstract: This study deals with a multi-criteria optimization
problem which has been transformed into a single objective
optimization problem using Response Surface Methodology (RSM),
Artificial Neural Network (ANN) and Grey Relational Analyses
(GRA) approach. Grey-RSM and Grey-ANN are hybrid techniques
which can be used for solving multi-criteria optimization problem.
There have been two main purposes of this research as follows.
1. To determine optimum and robust fiber dyeing process
conditions by using RSM and ANN based on GRA,
2. To obtain the best suitable model by comparing models
developed by different methodologies.
The design variables for fiber dyeing process in textile are
temperature, time, softener, anti-static, material quantity, pH,
retarder, and dispergator. The quality characteristics to be evaluated
are nominal color consistency of fiber, maximum strength of fiber,
minimum color of dyeing solution. GRA-RSM with exact level
value, GRA-RSM with interval level value and GRA-ANN models
were compared based on GRA output value and MSE (Mean Square
Error) performance measurement of outputs with each other. As a
result, GRA-ANN with interval value model seems to be suitable
reducing the variation of dyeing process for GRA output value of the
model.
Abstract: This paper explores the implementation of adaptive
coding and modulation schemes for Multiple-Input Multiple-Output
Orthogonal Frequency Division Multiplexing (MIMO-OFDM) feedback
systems. Adaptive coding and modulation enables robust and
spectrally-efficient transmission over time-varying channels. The basic
premise is to estimate the channel at the receiver and feed this estimate
back to the transmitter, so that the transmission scheme can be
adapted relative to the channel characteristics. Two types of codebook
based channel feedback techniques are used in this work. The longterm
and short-term CSI at the transmitter is used for efficient channel
utilization. OFDM is a powerful technique employed in communication
systems suffering from frequency selectivity. Combined with
multiple antennas at the transmitter and receiver, OFDM proves to be
robust against delay spread. Moreover, it leads to significant data rates
with improved bit error performance over links having only a single
antenna at both the transmitter and receiver. The coded modulation
increases the effective transmit power relative to uncoded variablerate
variable-power MQAM performance for MIMO-OFDM feedback
system. Hence proposed arrangement becomes an attractive approach
to achieve enhanced spectral efficiency and improved error rate
performance for next generation high speed wireless communication
systems.
Abstract: Science parks are often established to drive regional
economic growth, especially in countries with emerging economies.
However, mixed findings regarding the performances of science park
firms are found in the literature. This study tries to explain these
mixed findings by taking a relational approach and exploring
(un)intended knowledge transfers between new technology-based
firms (NTBFs) in the emerging South African economy. Moreover,
the innovation outcomes of these NTBFs are examined by using a
multi-dimensional construct. Results show that science park location
plays a significant role in explaining innovative sales, but is
insignificant when a different indicator of innovation outcomes is
used. Furthermore, only for innovations that are new to the firms,
both science park location and intended knowledge transfer via
informal business relationships have a positive impact; whereas
social relationships have a negative impact.