Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image sequence while keeping its content visible. The proposed technique embeds the residuals of the right frames to the corresponding frames of the left sequence, halving the total capacity. The residual frames may result in after a disparity compensated procedure between the two video streams or by a joint motion and disparity compensation. The residuals are usually lossy compressed before embedding because of the limited embedding capacity of the left frames. The watermarked frames are visible at a high quality and at any instant the stereoscopic video may be recovered by an inverse process. In fact, the left frames may be exactly recovered whereas the right ones are slightly distorted as the residuals are not embedded intact. The employed embedding method reorders the left frame into an array of consecutive pixel pairs and embeds a number of bits according to their intensity difference. In this way, it hides a number of bits in intensity smooth areas and most of the data in textured areas where resulting distortions are less visible. The experimental evaluation demonstrates that the proposed scheme is quite effective.
Abstract: Existing underground pipe jacking methods use a
reinforcing rod in a steel tube to obtain structural stiffness. However,
some problems such as inconvenience of works and expensive
materials resulted from limited working space and reinforcing works
are existed. To resolve these problems, a new pipe jacking method,
namely PST (Prestressed Segment Tunnel) method, was developed
which used joint to connect the steel segment and form erection
structure. For evaluating the flexural capacity of the PST method
structure, a experimental test was conducted. The parameters
considered in the test were span-to-depth ratio of segment, diameter of
steel tube at the corner, prestressing force, and welding of joint. The
flexural behaviours with the effect of load capacity in serviceability
state according to different parameters were examined.. The frame
with long segments could increase flexural stiffness and the specimen
with large diameter of concave corner showed excellent resistance
ability to the negative moment. In addition, welding of joints increased
the flexural capacity.
Abstract: In this paper we present a novel method, which
reduces the computational complexity of abrupt cut detection. We
have proposed fast algorithm, where the similarity of frames within
defined step is evaluated instead of comparing successive frames.
Based on the results of simulation on large video collection, the
proposed fast algorithm is able to achieve 80% reduction of needed
frames comparisons compared to actually used methods without the
shot cut detection accuracy degradation.
Abstract: Meta-reasoning is essential for multi-agent communication. In this paper we propose a framework of multi-agent communication in which agents employ meta-reasoning to reason with agent and ontology locations in order to communicate semantic information with other agents on the semantic web and also reason with multiple distributed ontologies. We shall argue that multi-agent communication of Semantic Web information cannot be realized without the need to reason with agent and ontology locations. This is because for an agent to be able to communicate with another agent, it must know where and how to send a message to that agent. Similarly, for an agent to be able to reason with an external semantic web ontology, it must know where and how to access to that ontology. The agent framework and its communication mechanism are formulated entirely in meta-logic.
Abstract: New Growth Theory helps us make sense of the
ongoing shift from a resource-based economy to a knowledge-based
economy. It underscores the point that the economic processes which
create and diffuse new knowledge are critical to shaping the growth
of nations, communities and individual firms. In all too many
contributions to New (Endogenous) Growth Theory – though not in
all – central reference is made to 'a stock of knowledge', a 'stock of
ideas', etc., this variable featuring centre-stage in the analysis. Yet it
is immediately apparent that this is far from being a crystal clear
concept. The difficulty and uncertainty of being able to capture the
value associated with knowledge is a real problem. The intent of this
paper is introducing new thinking and theorizing about the
knowledge and its measurability in new growth theory. Moreover the
study aims to synthesize various strain of the literature with a
practical bearing on knowledge concept. By contribution of
institution framework which is found within NGT, we can indirectly
measure the knowledge concept. Institutions matter because they
shape the environment for production and employment of new
knowledge
Abstract: This paper discusses the design characteristics management accounting systems should have to be useful for strategic planning and control and provides brief introductions to strategic variance analysis, profit-linked performance measurement models and balanced scorecard. It shows two multi-period, multiproduct models are specified, can be related to Porter's strategy framework and cost and revenue drivers, and can be used to support strategic planning, control and cost management.
Abstract: In this paper, a framework for the simplification and
standardization of metaheuristic related parameter-tuning by applying
a four phase methodology, utilizing Design of Experiments and
Artificial Neural Networks, is presented. Metaheuristics are multipurpose
problem solvers that are utilized on computational optimization
problems for which no efficient problem specific algorithm
exist. Their successful application to concrete problems requires the
finding of a good initial parameter setting, which is a tedious and
time consuming task. Recent research reveals the lack of approach
when it comes to this so called parameter-tuning process. In the
majority of publications, researchers do have a weak motivation for
their respective choices, if any. Because initial parameter settings
have a significant impact on the solutions quality, this course of
action could lead to suboptimal experimental results, and thereby
a fraudulent basis for the drawing of conclusions.
Abstract: Rural tourism has many economical, environmental, and socio-cultural benefits. However, the development of rural tourism compared to urban tourism is also faced with several challenges added to the disadvantages of rural tourism. The aim of this study is to design a model of the factors affecting the motivations of rural tourists, in an attempt to improve the understanding of rural tourism motivation for the development of that form of tourism. The proposed model is based on a sound theoretical framework. It was designed following a literature review of tourism motivation theoretical frameworks and of rural tourism motivation factors. The tourism motivation theoretical framework that fitted to the best all rural tourism motivation factors was then chosen as the basis for the proposed model. This study hence found that the push and pull tourism motivation framework and the inner and outer directed values theory are the most adequate theoretical frameworks for the modeling of rural tourism motivation.
Abstract: This paper proposes a new decision making approch
based on quantitative possibilistic influence diagrams which are
extension of standard influence diagrams in the possibilistic framework.
We will in particular treat the case where several expert
opinions relative to value nodes are available. An initial expert assigns
confidence degrees to other experts and fixes a similarity threshold
that provided possibility distributions should respect. To illustrate our
approach an evaluation algorithm for these multi-source possibilistic
influence diagrams will also be proposed.
Abstract: Modeling of Panel Zone (PZ) seismic behavior,
because of its role in overall ductility and lateral stiffness of steel
moment frames, has been considered a challenge for years. There are
some studies regarding the effects of different doubler plates
thicknesses and geometric properties of PZ on its seismic behavior.
However, there is not much investigation on the effects of number of
provided continuity plates in case of presence of one triangular
haunch, two triangular haunches and rectangular haunch (T shape
haunches) for exterior columns. In this research first detailed finite
element models of 12tested connection of SAC joint venture were
created and analyzed then obtained cyclic behavior backbone curves
of these models besides other FE models for similar tests were used
for neural network training. Then seismic behavior of these data is
categorized according to continuity plate-s arrangements and
differences in type of haunches. PZ with one-sided haunches have
little plastic rotation. As the number of continuity plates increases
due to presence of two triangular haunches (four continuity plate),
there will be no plastic rotation, in other words PZ behaves in its
elastic range. In the case of rectangular haunch, PZ show more plastic
rotation in comparison with one-sided triangular haunch and
especially double-sided triangular haunches. Moreover, the models
that will be presented in case of triangular one-sided and double-
sided haunches and rectangular haunches as a result of this study
seem to have a proper estimation of PZ seismic behavior.
Abstract: In a recent major industry-supported research and development study, a novel framework was developed and applied for assessment of reliability and quality performance levels in reallife power systems with practical large-scale sizes. The new assessment methodology is based on three metaphors (dimensions) representing the relationship between available generation capacities and required demand levels. The paper shares the results of the successfully completed stud and describes the implementation of the new methodology on practical zones in the Saudi electricity system.
Abstract: In this study, we have defined slant helix according to
Bishop frame in Euclidean 3-Space. Furthermore, we have given
some necassary and sufficient conditons for the slant helix.
Abstract: Computer programming is considered a very difficult
course by many computer science students. The reasons for the
difficulties include cognitive load involved in programming,
different learning styles of students, instructional methodology and
the choice of the programming languages. To reduce the difficulties
the following have been tried: pair programming, program
visualization, different learning styles etc. However, these efforts
have produced limited success. This paper reviews the problem and
proposes a framework to help students overcome the difficulties
involved.
Abstract: One-way functions are functions that are easy to
compute but hard to invert. Their existence is an open conjecture; it
would imply the existence of intractable problems (i.e. NP-problems
which are not in the P complexity class).
If true, the existence of one-way functions would have an impact
on the theoretical framework of physics, in particularly, quantum
mechanics. Such aspect of one-way functions has never been shown
before.
In the present work, we put forward the following.
We can calculate the microscopic state (say, the particle spin in the
z direction) of a macroscopic system (a measuring apparatus
registering the particle z-spin) by the system macroscopic state (the
apparatus output); let us call this association the function F. The
question is: can we compute the function F in the inverse direction?
In other words, can we compute the macroscopic state of the system
through its microscopic state (the preimage F -1)?
In the paper, we assume that the function F is a one-way function.
The assumption implies that at the macroscopic level the Schrödinger
equation becomes unfeasible to compute. This unfeasibility plays a
role of limit of the validity of the linear Schrödinger equation.
Abstract: Public administration institutions in cooperation with
politicians are not the sole policy decision makers in full meaning
any longer. Meanwhile, a special role, namely steering the decision
making process, could be delegated to them.
Despite the wide scientific discussion on different aspects what
has direct impact on policy creation, there is a lack of holistic
practical managerial advice, which could integrate infrastructure of
policy decision making with intellectual capital and with
interconnection of partnership. The proposed harmonized decision
making model of process, people and partnership entitled by
acronym HM-3P is analyzed as a framework for implementation of
public administration steering role seeking the coherent social
involvement in policy decision making.
Abstract: In the past years a lot of effort has been made in the
field of face detection. The human face contains important features
that can be used by vision-based automated systems in order to
identify and recognize individuals. Face location, the primary step of
the vision-based automated systems, finds the face area in the input
image. An accurate location of the face is still a challenging task.
Viola-Jones framework has been widely used by researchers in order
to detect the location of faces and objects in a given image. Face
detection classifiers are shared by public communities, such as
OpenCV. An evaluation of these classifiers will help researchers to
choose the best classifier for their particular need. This work focuses
of the evaluation of face detection classifiers minding facial
landmarks.
Abstract: In this paper we propose a framework for
multisensor intrusion detection called Fuzzy Agent-Based Intrusion
Detection System. A unique feature of this model is that the agent
uses data from multiple sensors and the fuzzy logic to process log
files. Use of this feature reduces the overhead in a distributed
intrusion detection system. We have developed an agent
communication architecture that provides a prototype
implementation. This paper discusses also the issues of combining
intelligent agent technology with the intrusion detection domain.
Abstract: A full six degrees of freedom (6-DOF) flight dynamics
model is proposed for the accurate prediction of short and long-range
trajectories of high spin and fin-stabilized projectiles via atmospheric
flight to final impact point. The projectiles is assumed to be both rigid
(non-flexible), and rotationally symmetric about its spin axis launched
at low and high pitch angles. The mathematical model is based on the
full equations of motion set up in the no-roll body reference frame and
is integrated numerically from given initial conditions at the firing
site. The projectiles maneuvering motion depends on the most
significant force and moment variations, in addition to wind and
gravity. The computational flight analysis takes into consideration the
Mach number and total angle of attack effects by means of the
variable aerodynamic coefficients. For the purposes of the present
work, linear interpolation has been applied from the tabulated database
of McCoy-s book. The developed computational method gives
satisfactory agreement with published data of verified experiments and
computational codes on atmospheric projectile trajectory analysis for
various initial firing flight conditions.