Abstract: In this work we develop an object extraction method
and propose efficient algorithms for object motion characterization.
The set of proposed tools serves as a basis for development of objectbased
functionalities for manipulation of video content. The
estimators by different algorithms are compared in terms of quality
and performance and tested on real video sequences. The proposed
method will be useful for the latest standards of encoding and
description of multimedia content – MPEG4 and MPEG7.
Abstract: The transformation of vocal characteristics aims at
modifying voice such that the intelligibility of aphonic voice is
increased or the voice characteristics of a speaker (source speaker) to
be perceived as if another speaker (target speaker) had uttered it. In
this paper, the current state-of-the-art voice characteristics
transformation methodology is reviewed. Special emphasis is placed
on voice transformation methodology and issues for improving the
transformed speech quality in intelligibility and naturalness are
discussed. In particular, it is suggested to use the modulation theory
of speech as a base for research on high quality voice transformation.
This approach allows one to separate linguistic, expressive, organic
and perspective information of speech, based on an analysis of how
they are fused when speech is produced. Therefore, this theory
provides the fundamentals not only for manipulating non-linguistic,
extra-/paralinguistic and intra-linguistic variables for voice
transformation, but also for paving the way for easily transposing the
existing voice transformation methods to emotion-related voice
quality transformation and speaking style transformation. From the
perspectives of human speech production and perception, the popular
voice transformation techniques are described and classified them
based on the underlying principles either from the speech production
or perception mechanisms or from both. In addition, the advantages
and limitations of voice transformation techniques and the
experimental manipulation of vocal cues are discussed through
examples from past and present research. Finally, a conclusion and
road map are pointed out for more natural voice transformation
algorithms in the future.
Abstract: Sensory input plays an important role to human
posture control system to initiate strategy in order to counterpart any
unbalance condition and thus, prevent fall. In previous study, joint
stiffness was observed able to describe certain issues regarding to
movement performance. But, correlation between balance ability and
joint stiffness is still remains unknown. In this study, joint stiffening
strategy at ankle and hip were observed under different sensory
manipulations and its correlation with conventional clinical test
(Functional Reach Test) for balance ability was investigated. In order
to create unstable condition, two different surface perturbations (tilt
up-tilt (TT) down and forward-backward (FB)) at four different
frequencies (0.2, 0.4, 0.6 and 0.8 Hz) were introduced. Furthermore,
four different sensory manipulation conditions (include vision and
vestibular system) were applied to the subject and they were asked to
maintain their position as possible. The results suggested that joint
stiffness were high during difficult balance situation. Less balance
people generated high average joint stiffness compared to balance
people. Besides, adaptation of posture control system under repetitive
external perturbation also suggested less during sensory limited
condition. Overall, analysis of joint stiffening response possible to
predict unbalance situation faced by human
Abstract: The present work consecutively on synthesis and
characterization of composites, Al/Al alloy A 384.1 as matrix in
which the main ingredient as Al/Al-5% MgO alloy based metal
matrix composite. As practical implications the low cost processing
route for the fabrication of Al alloy A 384.1 and operational
difficulties of presently available manufacturing processes based in
liquid manipulation methods. As all new developments, complete
understanding of the influence of processing variables upon the final
quality of the product. And the composite is applied comprehensively
to the acquaintance for achieving superiority of information
concerning the specific heat measurement of a material through the
aid of thermographs. Products are evaluated concerning relative
particle size and mechanical behavior under tensile strength.
Furthermore, Taguchi technique was employed to examine the
experimental optimum results are achieved, owing to effectiveness of
this approach.
Abstract: Ligula intestinalis is a three-host life-cycle
Pseudophyllidean Cestode which in its plerocercoid stage infests a
range of fresh water species. The objective of the present study was
the worm occurrence within planctonic copepods, fishes and
piscivorous birds and examine of parasite-hosts samples in the Lake
of Sattarkhan Dam (near the city of Ahar, East Azerbaijan, Iran).
Fish sample were collected with fyke and gill nets and the abdominal
cavity was examined for the presence of ligula. Zooplanktons were
captured using a planktonic net and occurrence of parasitic larval
form in the body cavity was determined. Piscivorous birds were
selected by telescope, they hunted and dissected for presence of
parasite eggs in their gut. Results indicated that prevalence of
infection was 16% for cyclopid copepoda and majority of infected
cyclopid were female Cyclops. Investigation of 310 fishes specimens
were indicated to infection of five species of cyprinid fishes. In
addition, results indicated to manipulation of six species of migratory
aquatic and semi aquatic birds by ligula. Obtained results are in
agreement by previous studies. Its definite in this study that all of
fishes in Sattarkhan Lake capable to infection, its important for
health because they capture by native people and it is documented
that ligula can be introduce as a zoonose. It's seemed that to prevent
from disperses of parasite and restricted of infection, biological
elimination can be effective and it's necessary to inform native
people about sanitation.
Abstract: Most of the image watermarking methods, using the properties of the human visual system (HVS), have been proposed in literature. The component of the visual threshold is usually related to either the spatial contrast sensitivity function (CSF) or the visual masking. Especially on the contrast masking, most methods have not mention to the effect near to the edge region. Since the HVS is sensitive what happens on the edge area. This paper proposes ultrasound image watermarking using the visual threshold corresponding to the HVS in which the coefficients in a DCT-block have been classified based on the texture, edge, and plain area. This classification method enables not only useful for imperceptibility when the watermark is insert into an image but also achievable a robustness of watermark detection. A comparison of the proposed method with other methods has been carried out which shown that the proposed method robusts to blockwise memoryless manipulations, and also robust against noise addition.
Abstract: The systematic manipulations of shapes and sizes of
inorganic compounds greatly benefit the various application fields
including optics, magnetic, electronics, catalysis and medicine.
However shape control has been much more difficult to achieve.
Hence exploration of novel method for the preparation of differently
shaped nanoparticles is challenging research area. II-VI group of
semiconductor cadmium sulphide (CdS) nanostructure with different
morphologies (such as, acicular like, mesoporous, spherical shapes)
and of crystallite sizes vary from 11 to 16 nm were successfully
synthesized by chemical aqueous precipitation of Cd2+ ions with
homogeneously released S2- ions from decomposition of cadmium
sulphate (CdSO4) and thioacetamide (CH3CSNH2) by annealing at
different radiations (microwave, ultrasonic and sunlight) with matter
and systematic research has been done for various factors affecting
the controlled growth rate of CdS nanoparticles. The obtained
nanomaterials have been characterized by X-ray Diffraction (XRD),
Fourier Transform Infrared Spectroscopy (FTIR),
Thermogravometric (DSC-TGA) analysis and Scanning Electron
Microscopy (SEM). The result indicates that on increasing the
reaction time particle size increases but on increasing the molar ratios
grain size decreases.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: Image convolution similar to the receptive fields
found in mammalian visual pathways has long been used in
conventional image processing in the form of Gabor masks.
However, no VLSI implementation of parallel, multi-layered pulsed
processing has been brought forward which would emulate this
property. We present a technical realization of such a pulsed image
processing scheme. The discussed IC also serves as a general testbed
for VLSI-based pulsed information processing, which is of interest
especially with regard to the robustness of representing an analog
signal in the phase or duration of a pulsed, quasi-digital signal, as
well as the possibility of direct digital manipulation of such an
analog signal. The network connectivity and processing properties
are reconfigurable so as to allow adaptation to various processing
tasks.
Abstract: The use of High Order Statistics (HOS) analysis is
expected to provide so many candidates of features that can be selected for pattern recognition. More candidates of the feature can
be extracted using simple manipulation through a specific mathematical function prior to the HOS analysis. Feature extraction
method using HOS analysis combined with Difference to the Nth-Power manipulation has been examined in application for Automatic
Modulation Recognition (AMR) to perform scheme recognition of three digital modulation signal, i.e. QPSK-16QAM-64QAM in the
AWGN transmission channel. The simulation results is reported
when the analysis of HOS up to order-12 and the manipulation of Difference to the Nth-Power up to N = 4. The obtained accuracy rate
of AMR using the method of Simple Decision obtained 90% in SNR > 10 dB in its classifier, while using the method of Voted Decision is
96% in SNR > 2 dB.
Abstract: This paper is to develop a fuzzy net present value (FNPV) method by taking vague cash flow and imprecise required rate of return into account for evaluating the value of the Build-Operate-Transfer (BOT) sport facilities. In order to clearly manifest a more realistic capital budgeting model based on the classical net present value (NPV) method, some uncertain financial elements in NPV formula will be fuzzified as triangular fuzzy numbers. Through the conscientious manipulation of fuzzy set theory, we will find that the proposed FNPV model is a more explicit extension of classical (crisp) model and could be more practicable for the financial managers to capture the essence of capital budgeting of sport facilities than non-fuzzy model.
Abstract: This paper describes how the correct endian mode of
the TMS320C6713 DSK board can be identified. It also explains how
the TMS320C6713 DSK board can be used in the little endian and in
the big endian modes for assembly language programming in
particular and for signal processing in general. Similarly, it discusses
how crucially important it is for a user of the TMS320C6713 DSK
board to identify the mode of operation and then use it correctly
during the development stages of the assembly language
programming; otherwise, it will cause unnecessary confusion and
erroneous results as far as storing data into the memory and loading
data from the memory is concerned. Furthermore, it highlights and
strongly recommends to the users of the TMS320C6713 DSK board
to be aware of the availability and importance of various display
options in the Code Composer Studio (CCS) for correctly
interpreting and displaying the desired data in the memory. The
information presented in this paper will be of great importance and
interest to those practitioners and developers who wants to use the
TMS320C6713 DSK board for assembly language programming as
well as input-output signal processing manipulations. Finally,
examples that clearly illustrate the concept are presented.
Abstract: By taking advantage of computer-s processing power, an unlimited number of variations and parameters in both spatial and environmental can be provided while following the same set of rules and constraints. This paper focuses on using the tools of parametric urbanism towards a more responsive environmental and sustainable urban morphology. It presents an understanding to Parametric Urban Comfort Envelope (PUCE) as an interactive computational assessment urban model. In addition, it investigates the applicability potentials of this model to generate an optimized urban form to Borg El Arab city (a new Egyptian Community) concerning the human comfort values specially wind and solar envelopes. Finally, this paper utilizes its application outcomes -both visual and numerical- to extend the designer-s limitations by decrease the concern of controlling and manipulation of geometry, and increase the designer-s awareness about the various potentials of using the parametric tools to create relationships that generate multiple geometric alternatives.
Abstract: Economic crime (i.e. corporate fraud) has a
significant impact on business. This study analyzes the fraud cases
reported by the Malaysian Securities Commission. Frauds involving
market manipulation and/or illegal share trading are the most
common types of fraud reported over the 6 years analyzed. The
highest number of frauds reported involved investment and fund
holding companies. Alarmingly the results indicate quite a high
number of frauds cases are committed by management. The higher
number of Chinese perpetrators may be due to fact that they are the
dominant group in Malaysian business. The result also shows that
more than half of companies involved with fraud are privately held
companies in the investment/fund/finance sector. The results of this
study highlight general characteristic of perpetrators (person and
company) that commit fraud which could help the regulators in their
monitoring and enforcement activities. To investors, this would help
in analyzing their business investment or portfolio risk.
Abstract: VRML( The virtual reality modeling language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This article has studied plans to build virtualized scenes based on the technology of virtual reality and Java programe, and introduced how to execute real-time data transactions of VRML file and Java programe by applying Script Node, in doing so we have the VRML interactivity being strengthened.
Abstract: The goal of this work is to describe a new algorithm for finding the optimal variable order, number of nodes for any order and other ROBDD parameters, based on a tabular method. The tabular method makes use of a pre-built backend database table that stores the ROBDD size for selected combinations of min-terms. The user uses the backend table and the proposed algorithm to find the necessary ROBDD parameters, such as best variable order, number of nodes etc. Experimental results on benchmarks are given for this technique.
Abstract: The aim of the article is extending and developing
econometrics and network structure based methods which are able to
distinguish price manipulation in Tehran stock exchange. The
principal goal of the present study is to offer model for
approximating price manipulation in Tehran stock exchange. In order
to do so by applying separation method a sample consisting of 397
companies accepted at Tehran stock exchange were selected and
information related to their price and volume of trades during years
2001 until 2009 were collected and then through performing runs
test, skewness test and duration correlative test the selected
companies were divided into 2 sets of manipulated and non
manipulated companies. In the next stage by investigating
cumulative return process and volume of trades in manipulated
companies, the date of starting price manipulation was specified and
in this way the logit model, artificial neural network, multiple
discriminant analysis and by using information related to size of
company, clarity of information, ratio of P/E and liquidity of stock
one year prior price manipulation; a model for forecasting price
manipulation of stocks of companies present in Tehran stock
exchange were designed. At the end the power of forecasting models
were studied by using data of test set. Whereas the power of
forecasting logit model for test set was 92.1%, for artificial neural
network was 94.1% and multi audit analysis model was 90.2%;
therefore all of the 3 aforesaid models has high power to forecast
price manipulation and there is no considerable difference among
forecasting power of these 3 models.
Abstract: In this paper, a Smart Home Service Robot, McBot II,
which performs mess-cleanup function etc. in house, is designed much
more optimally than other service robots. It is newly developed in
much more practical system than McBot I which we had developed
two years ago. One characteristic attribute of mobile platforms
equipped with a set of dependent wheels is their omni- directionality
and the ability to realize complex translational and rotational
trajectories for agile navigation in door. An accurate coordination of
steering angle and spinning rate of each wheel is necessary for a
consistent motion. This paper develops trajectory controller of
3-wheels omni-directional mobile robot using fuzzy azimuth estimator.
A specialized anthropomorphic robot manipulator which can be
attached to the housemaid robot McBot II, is developed in this paper.
This built-in type manipulator consists of both arms with 3 DOF
(Degree of Freedom) each and both hands with 3 DOF each. The
robotic arm is optimally designed to satisfy both the minimum
mechanical size and the maximum workspace. Minimum mass and
length are required for the built-in cooperated-arms system. But that
makes the workspace so small. This paper proposes optimal design
method to overcome the problem by using neck joint to move the arms
horizontally forward/backward and waist joint to move them
vertically up/down. The robotic hand, which has two fingers and a
thumb, is also optimally designed in task-based concept. Finally, the
good performance of the developed McBot II is confirmed through
live tests of the mess-cleanup task.
Abstract: IETF RFC 2002 originally introduced the wireless
Mobile-IP protocol to support portable IP addresses for mobile
devices that often change their network access points to the Internet.
The inefficiency of this protocol mainly within the handoff
management produces large end-to-end packet delays, during
registration process, and further degrades the system efficiency due to
packet losses between subnets. The criterion to initiate a simple and
fast full-duplex connection between the home agent and foreign
agent, to reduce the roaming duration, is a very important issue to be
considered by a work in this paper. State-transition Petri-Nets of the
modeling scenario-based CIA: communication inter-agents procedure
as an extension to the basic Mobile-IP registration process was
designed and manipulated. The heuristic of configuration file during
practical Setup session for registration parameters, on Cisco platform
Router-1760 using IOS 12.3 (15)T is created. Finally, stand-alone
performance simulations results from Simulink Matlab, within each
subnet and also between subnets, are illustrated for reporting better
end-to-end packet delays. Results verified the effectiveness of our
Mathcad analytical manipulation and experimental implementation. It
showed lower values of end-to-end packet delay for Mobile-IP using
CIA procedure. Furthermore, it reported packets flow between
subnets to improve packet losses between subnets.
Abstract: Cryptographic protocols are widely used in various
applications to provide secure communications. They are usually
represented as communicating agents that send and receive messages.
These agents use their knowledge to exchange information and
communicate with other agents involved in the protocol. An agent
knowledge can be partitioned into explicit knowledge and procedural
knowledge. The explicit knowledge refers to the set of information
which is either proper to the agent or directly obtained from other
agents through communication. The procedural knowledge relates to
the set of mechanisms used to get new information from what is
already available to the agent.
In this paper, we propose a mathematical framework which specifies
the explicit knowledge of an agent involved in a cryptographic
protocol. Modelling this knowledge is crucial for the specification,
analysis, and implementation of cryptographic protocols. We also,
report on a prototype tool that allows the representation and the
manipulation of the explicit knowledge.