Abstract: Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remodolulation (WER) attack. Also if uncorrelated watermarks are used for every frame, these watermarks can be washed out with frame temporal filtering (FTF). Switching watermark system or so-called SS-N system has better performance against WER and FTF attacks. In this system, for each frame, the watermark is randomly picked up from a finite pool of watermark patterns. At first SS-N system will be surveyed and then a new collusion attack for SS-N system will be proposed using a new algorithm for separating video frame based on watermark pattern. So N sets will be built in which every set contains frames carrying the same watermark. After that, using WER attack in every set, N different watermark patterns will be estimated and removed later.
Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.
Abstract: Modern applications realized onto FPGAs exhibit high connectivity demands. Throughout this paper we study the routing constraints of Virtex devices and we propose a systematic methodology for designing a novel general-purpose interconnection network targeting to reconfigurable architectures. This network consists of multiple segment wires and SB patterns, appropriately selected and assigned across the device. The goal of our proposed methodology is to maximize the hardware utilization of fabricated routing resources. The derived interconnection scheme is integrated on a Virtex style FPGA. This device is characterized both for its high-performance, as well as for its low-energy requirements. Due to this, the design criterion that guides our architecture selections was the minimal Energy×Delay Product (EDP). The methodology is fully-supported by three new software tools, which belong to MEANDER Design Framework. Using a typical set of MCNC benchmarks, extensive comparison study in terms of several critical parameters proves the effectiveness of the derived interconnection network. More specifically, we achieve average Energy×Delay Product reduction by 63%, performance increase by 26%, reduction in leakage power by 21%, reduction in total energy consumption by 11%, at the expense of increase of channel width by 20%.
Abstract: Many experimental results suggest that more precise spike timing is significant in neural information processing. We construct a self-organization model using the spatiotemporal pat-terns, where Spike-Timing Dependent Plasticity (STDP) tunes the conduction delays between neurons. We show that, for highly syn-chronized inputs, the fluctuation of conduction delays causes globally continuous and locally distributed firing patterns through the self-organization.
Abstract: SEMG (Surface Electromyogram) is one of the
bio-signals and is generated from the muscle. And there are many
research results that use forearm EMG to detect hand motions. In this
paper, we will talk about our developed the robot hand system that can
control grasping power by SEMG. In our system, we suppose that
muscle power is proportional to the amplitude of SEMG. The power is
estimated and the grip power of a robot hand is able to be controlled
using estimated muscle power in our system. In addition, to perform a
more precise control can be considered to build a closed loop feedback
system as an object to a subject to pressure from the edge of hand. Our
objectives of this study are the development of a method that makes
perfect detection of the hand grip force possible using SEMG patterns,
and applying this method to the man-machine interface.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: With the enormous growth on the web, users get easily
lost in the rich hyper structure. Thus developing user friendly and
automated tools for providing relevant information without any
redundant links to the users to cater to their needs is the primary task
for the website owners. Most of the existing web mining algorithms
have concentrated on finding frequent patterns while neglecting the
less frequent one that are likely to contain the outlying data such as
noise, irrelevant and redundant data. This paper proposes new
algorithm for mining the web content by detecting the redundant
links from the web documents using set theoretical(classical
mathematics) such as subset, union, intersection etc,. Then the
redundant links is removed from the original web content to get the
required information by the user..
Abstract: There are multiple reasons to expect that detecting the
word order errors in a text will be a difficult problem, and detection
rates reported in the literature are in fact low. Although grammatical
rules constructed by computer linguists improve the performance of
grammar checker in word order diagnosis, the repairing task is still
very difficult. This paper presents an approach for repairing word
order errors in English text by reordering words in a sentence and
choosing the version that maximizes the number of trigram hits
according to a language model. The novelty of this method concerns
the use of an efficient confusion matrix technique for reordering the
words. The comparative advantage of this method is that works with
a large set of words, and avoids the laborious and costly process of
collecting word order errors for creating error patterns.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: Arrack is one of the forms of alcoholic beverage or
liquor which is produced from palm or date juice and commonly
consumed by the lower social class of all religious/ethnic
communities in the north-western villages of Bangladesh. The
purpose of the study was to compare arrack drinking patterns
associated with socio-demographic status among the Muslim, Hindu,
Santal, and Oraon communities in the Rasulpur union of Bangladesh.
A total of 391 respondents (Muslim n-109, Hindu n-103, Santal n-89,
Oraon n-90) selected by cluster random sampling were interviewed
by ADP (Arrack Drinking Pattern) questionnaire. The results of
Pearson Chi-Squire test revealed that arrack drinking patterns were
significantly differed among the Muslim, Hindu, Santal, and Oraon
communities- drinkers. In addition, the results of Spearman-s
bivariate correlation coefficients also revealed that sociodemographic
characteristics of the communities- drinkers were the
significantly positive and negative associations with the arrack
drinking patterns in the Rasulpur union, Bangladesh. The study
suggests that further cross-cultural researches should be conducted
on the consequences of arrack drinking patterns on the communities-
drinkers.
Abstract: This paper presents a comparative study on
Vanadyl Phthalocyanine (VOPc) thin films deposited by thermal
evaporation and spin coating techniques. The samples
were prepared on cleaned glass substrates and annealed at
various temperatures ranging form 95oC to 155oC. To obtain
the morphological and structural properties of VOPc thin
films, X-ray diffraction (XRD) technique and atomic force
microscopy (AFM) have been implied. The AFM topographic
images show a very slight difference in the thermally grown
films, before and after annealing, however best results are
achieved for the spin-cast film annealed at 125oC. The XRD
spectra show no existence of the sharp peaks, suggesting the
material to be amorphous. The humps in the XRD patterns
indicate the presence of some crystallites.
Abstract: The report focuses on such an important indicator of the nature and direction of development of ethnic and cultural processes in the Republic of Kazakhstan, as ethno linguistic situation. It is shown that, in essence, on the one hand, expresses the degree of the actual propagation and the level of use of the languages of the various ethnic communities. On the other hand, reflects the important patterns, trends and prospects of ethno-cultural and ethnodemographic processes in the Republic. It is important to note that the ethno linguistic situation in different regions of Kazakhstan, due to its more dynamic and much more difficult to demonstrate a much greater variety of options when compared with the ethnic situation in the country. For the two major ethnic groups of the republic – Kazakh and Russian language ethno differentiating retains its value, while for the other ethnic groups observed decline in the importance of this indicator. As you know, the language of international communication in the country is Russian. As the censuses of population, the Russian language in many areas of Northern, Central and Eastern Kazakhstan becomes a means of ethno linguistic development for most of the non-Russian population. This is most clearly illustrated by the Germans, and the Slavic ethnic groups. In this case, the Russian language is not just a means of international communication for a number of ethnic groups, and ethnic groups, it becomes a factor of ethnic self-expression. The value of the Kazakh language as their mother tongue for the other groups of the population is small. More clearly it can be traced only to the Turkic-speaking population of the republic – Uzbeks, Uighurs, Tatars, Turks, etc. The state Kazakh language is a means of international communication in the Western and Southern Kazakhstan, with a predominance of the Kazakh population. The report shows that the most important factor in the development of ethno-linguistic and ethno-cultural processes is bilingualism. Comparative analysis of materials census shows, first, on the increase of the proportion of bilingual population among Kazakhs and Russian, and second, to reduce the proportion of bilingual population of other ethnic groups living in Kazakhstan, and third, a higher proportion bilingual population among residents than rural residents, regardless of their ethnicity. Bilingualism is mainly of a "national Kazakh", "national Russian" or "Kazakh-national" or "Russian-national" character. The President N.A. Nazarbayev said that the Kazakh language is the most important factor in the consolidation of the people of Kazakhstan. He therefore called on government and other state and local representative bodies fully develop the state language, to create all the necessary organizational, material and technical conditions for free and open learning the state language by all citizens of the Republic of Kazakhstan.
Abstract: Climate change is a cumulative change in weather
patterns over a period of time. Trend analysis using non-parametric
Mann-Kendall test may help to determine the existence and
magnitude of any statistically significant trend in the climatic data.
Another index called Sen slope may be used to quantify the
magnitude of such trends. A toolbar extension to ESRI ArcGIS
named Arc Trends has been developed in this study for performing
the above mentioned tasks. To study the temporal trend of
meteorological parameters, 32 years (1971-2002) monthly
meteorological data were collected for 133 selected stations over
different agro-ecological regions of India. Both the maximum and
minimum temperatures were found to be rising. A significant
increasing trend in the relative humidity and a consistent significant
decreasing trend in the wind speed all over the country were found.
However, a general increase in rainfall was not found in recent years.
Abstract: The power transformer is the most expensive, indispensable and arguably the most important equipment item in a power system Insulation failure in transformers can cause long term interruption to supply and loss of revenue and the condition assessment of the insulation is thus an important maintenance procedure. Oil-impregnated transformer insulation consists of mainly organic materials including mineral oil and cellulose-base paper and pressboard. The operating life of cellulose-based insulation, as with most organic insulation, depends heavily on its operating temperature rise above ambient. This paper reports results of a laboratory-based experimental investigation of partial discharge (PD) activity at high temperature in oil-impregnated insulation. The experiments reported here are part an on-going programme aimed at investigating the way in which insulation deterioration can be monitored and quantified by use of partial discharge diagnostics. Partial discharge patterns were recorded and analysed during increasing and decreasing phases of the temperature. The effect of ageing of the insulation on the PD patterns in oil and oil-impregnated insulation are also considered.
Abstract: This article describes the aspects of the formation of
the national idea and national identity through the prism of gender
control and its contradistinction to the obsolete, Soviet component.
The role of females in ethnic and national projects is considered from
the point of view of Dr. Nira Yuval-Davis: as biological reproducers
of the ethnic communities- members; as reproducers of the boarders
of ethnic/national groups; as central participants in the ideological
reproduction of community and transducers of its culture; as symbols
in ideology, reproduction and transformation of ethnic/national
categories; and as participants of national, economical, political and
military combats. The society of the transitional type uses the
symbolic resources of the formation of gender component in the
national project. The gender patterns act like cultural codes,
executing the important ideological function in formation of the
national female- image, i.e. the discussion on hijab - it-s not just the
discussion on control over the female body, it-s the discussion on the
metaphor of social order.
Abstract: This paper presents the fundamentals of Origami engineering and its application in nowadays as well as future industry. Several main cores of mathematical approaches such as Huzita- Hatori axioms, Maekawa and Kawasaki-s theorems are introduced briefly. Meanwhile flaps and circle packing by Robert Lang is explained to make understood the underlying principles in designing crease pattern. Rigid origami and its corrugation patterns which are potentially applicable for creating transformable or temporary spaces is discussed to show the transition of origami from paper to thick material. Moreover, some innovative applications of origami such as eyeglass, origami stent and high tech origami based on mentioned theories and principles are showcased in section III; while some updated origami technology such as Vacuumatics, self-folding of polymer sheets and programmable matter folding which could greatlyenhance origami structureare demonstrated in Section IV to offer more insight in future origami.
Abstract: Video sensor networks operate on stringent requirements
of latency. Packets have a deadline within which they have
to be delivered. Violation of the deadline causes a packet to be
treated as lost and the loss of packets ultimately affects the quality
of the application. Network latency is typically a function of many
interacting components. In this paper, we propose ways of reducing
the forwarding latency of a packet at intermediate nodes. The
forwarding latency is caused by a combination of processing delay
and queueing delay. The former is incurred in order to determine the
next hop in dynamic routing. We show that unless link failures in a
very specific and unlikely pattern, a vast majority of these lookups
are redundant. To counter this we propose source routing as the
routing strategy. However, source routing suffers from issues related
to scalability and being impervious to network dynamics. We propose
solutions to counter these and show that source routing is definitely
a viable option in practical sized video networks. We also propose a
fast and fair packet scheduling algorithm that reduces queueing delay
at the nodes. We support our claims through extensive simulation on
realistic topologies with practical traffic loads and failure patterns.
Abstract: Traditional object segmentation methods are time consuming and computationally difficult. In this paper, onedimensional object detection along the secant lines is applied. Statistical features of texture images are computed for the recognition process. Example matrices of these features and formulae for calculation of similarities between two feature patterns are expressed. And experiments are also carried out using these features.
Abstract: This paper proposes a visual cryptography by random
grids scheme with identifiable shares. The method encodes an image
O in two shares that exhibits the following features: (1) each generated
share has the same scale as O, (2) any share singly has noise-like
appearance that reveals no secret information on O, (3) the secrets can
be revealed by superimposing the two shares, (4) folding a share up
can disclose some identification patterns, and (5) both of the secret
information and the designated identification patterns are recognized
by naked eye without any computation. The property to show up
identification patterns on folded shares establishes a simple and
friendly interface for users to manage the numerous shares created by
VC schemes.
Abstract: The aim of this article is to narrate the utility of novel simulation approach i.e. convolution method to predict blood concentration of drug utilizing dissolution data of salbutamol sulphate microparticulate formulations with different release patterns (1:1, 1:2 and 1:3, drug:polymer). Dissolution apparatus II USP 2007 and 900 ml double distilled water stirrd at 50 rpm was employed for dissolution analysis. From dissolution data, blood drug concentration was determined, and in return predicted blood drug concentration data was used to calculate the pharmacokinetic parameters i.e. Cmax, Tmax, and AUC. Convolution is a good biwaiver technique; however its better utility needs it application in the conditions where biorelevant dissolution media are used.