Abstract: This paper discusses the Urdu script characteristics,
Urdu Nastaleeq and a simple but a novel and robust technique to
recognize the printed Urdu script without a lexicon. Urdu being a
family of Arabic script is cursive and complex script in its nature, the
main complexity of Urdu compound/connected text is not its
connections but the forms/shapes the characters change when it is
placed at initial, middle or at the end of a word. The characters
recognition technique presented here is using the inherited
complexity of Urdu script to solve the problem. A word is scanned
and analyzed for the level of its complexity, the point where the level
of complexity changes is marked for a character, segmented and
feeded to Neural Networks. A prototype of the system has been
tested on Urdu text and currently achieves 93.4% accuracy on the
average.
Abstract: This paper describes a prototype aircraft that can fly
slowly, safely and transmit wireless video for tasks like reconnaissance,
surveillance and target acquisition. The aircraft is designed to
fly in closed quarters like forests, buildings, caves and tunnels which
are often spacious but GPS reception is poor. Envisioned is that a
small, safe and slow flying vehicle can assist in performing dull,
dangerous and dirty tasks like disaster mitigation, search-and-rescue
and structural damage assessment.
Abstract: In a bi-fuel diesel engine, the carburetor plays a vital
role in switching from fuel gas to petrol mode operation and viceversa.
The carburetor is the most important part of the fuel system of
a diesel engine. All diesel engines carry variable venturi mixer
carburetors. The basic operation of the carburetor mainly depends on
the restriction barrel called the venturi. When air flows through the
venturi, its speed increases and its pressure decreases. The main
challenge focuses on designing a mixing device which mixes the
supplied gas is the incoming air at an optimum ratio. In order to
surmount the identified problems, the way fuel gas and air flow in
the mixer have to be analyzed. In this case, the Computational Fluid
Dynamics or CFD approach is applied in design of the prototype
mixer. The present work is aimed at further understanding of the air
and fuel flow structure by performing CFD studies using a software
code. In this study for mixing air and gas in the condition that has
been mentioned in continuance, some mixers have been designed.
Then using of computational fluid dynamics, the optimum mixer has
been selected. The results indicated that mixer with 12 holes can
produce a homogenous mixture than those of 8-holes and 6-holes
mixer. Also the result showed that if inlet convergency was smoother
than outlet divergency, the mixture get more homogenous, the reason
of that is in increasing turbulence in outlet divergency.
Abstract: This paper focuses on the calibration problem of a
multi-view shooting system designed for the production of 3D
content for auto-stereoscopic visualization. The considered multiview
camera is characterized by coplanar and decentered image
sensors regarding to the corresponding optical axis. Based on the
Faugéras and Toscani-s calibration approach, a calibration method is
herein proposed for the case of multi-view camera with parallel and
decentered image sensors. At first, the geometrical model of the
shooting system is recalled and some industrial prototypes with some
shooting simulations are presented. Next, the development of the
proposed calibration method is detailed. Finally, some simulation
results are presented before ending with some conclusions about this
work.
Abstract: This paper presents a simple and original method for
the generation of short monocycle pulses based on the transient
response of a passive band-pass filter. The recorded sub-nanosecond
pulses show a good symmetry and a small ringing (13 % of the peak
amplitude). Their spectral density covers the range 3.1 GHz to
10.6 GHz. The possibility to adapt the pulse spectral density to the
indoor FCC frequency mask is demonstrated with a prototype
working at a reduced frequency (FCC/1000). A detection technique is
proposed.
Abstract: This interdisciplinary study is an investigation to evaluate user-interfaces in business administration. The study is going to be implemented on two computerized business administration systems with two distinctive user-interfaces, so that differences between the two systems can be determined. Both systems, a commercial and a prototype developed for the purpose of this study, deal with ordering of supplies, tendering procedures, issuing purchase orders, controlling the movement of the stocks against their actual balances on the shelves and editing them on their tabulations. In the second suggested system, modern computer graphics and multimedia issues were taken into consideration to cover the drawbacks of the first system. To highlight differences between the two investigated systems regarding some chosen standard quality criteria, the study employs various statistical techniques and methods to evaluate the users- interaction with both systems. The study variables are divided into two divisions: independent representing the interfaces of the two systems, and dependent embracing efficiency, effectiveness, satisfaction, error rate etc.
Abstract: Today-s Voltage Regulator Modules (VRMs) face increasing design challenges as the number of transistors in microprocessors increases per Moore-s Law. These challenges have recently become even more demanding as microprocessors operate at sub voltage range at significantly high current. This paper presents a new multiphase topology with cell configuration for improved performance in low voltage and high current applications. A lab scale hardware prototype of the new topology was design and constructed. Laboratory tests were performed on the proposed converter and compared with a commercially available VRM. Results from the proposed topology exhibit improved performance compared to the commercially available counterpart.
Abstract: An on-line condition monitoring method for transmission line is proposed using electrical circuit theory and IT technology in this paper. It is reasonable that the circuit parameters such as resistance (R), inductance (L), conductance (g) and capacitance (C) of a transmission line expose the electrical conditions and physical state of the line. Those parameters can be calculated from the linear equation composed of voltages and currents measured by synchro-phasor measurement technique at both end of the line. A set of linear voltage drop equations containing four terminal constants (A, B ,C ,D ) are mathematical models of the transmission line circuits. At least two sets of those linear equations are established from different operation condition of the line, they may mathematically yield those circuit parameters of the line. The conditions of line connectivity including state of connecting parts or contacting parts of the switching device may be monitored by resistance variations during operation. The insulation conditions of the line can be monitored by conductance (g) and capacitance(C) measurements. Together with other condition monitoring devices such as partial discharge, sensors and visual sensing device etc.,they may give useful information to monitor out any incipient symptoms of faults. The prototype of hardware system has been developed and tested through laboratory level simulated transmission lines. The test has shown enough evident to put the proposed method to practical uses.
Abstract: In textile industry, besides the conventional textile
products, technical textile goods, that have been brought external
functional properties into, are being developed for technical textile
industry. Especially these products produced with weaving
technology are widely preferred in areas such as sports, geology,
medical, automotive, construction and marine sectors. These textile
products are exposed to various stresses and large deformations under
typical conditions of use. At this point, sufficient and reliable data
could not be obtained with uniaxial tensile tests for determination of
the mechanical properties of such products due to mainly biaxial
stress state. Therefore, the most preferred method is a biaxial tensile
test method and analysis. These tests and analysis is applied to fabrics
with different functional features in order to establish the textile
material with several characteristics and mechanical properties of the
product. Planar biaxial tensile test, cylindrical inflation and bulge
tests are generally required to apply for textile products that are used
in automotive, sailing and sports areas and construction industry to
minimize accidents as long as their service life. Airbags, seat belts
and car tires in the automotive sector are also subject to the same
biaxial stress states, and can be characterized by same types of
experiments. In this study, in accordance with the research literature
related to the various biaxial test methods are compared. Results with
discussions are elaborated mainly focusing on the design of a biaxial
test apparatus to obtain applicable experimental data for developing a
finite element model. Sample experimental results on a prototype
system are expressed.
Abstract: Providing Services at Home has become over the last
few years a very dynamic and promising technological domain. It is
likely to enable wide dissemination of secure and automated living
environments. We propose a methodology for identifying threats to
Services at Home Delivery systems, as well as a threat analysis
of a multi-provider Home Gateway architecture. This methodology
is based on a dichotomous positive/preventive study of the target
system: it aims at identifying both what the system must do, and
what it must not do. This approach completes existing methods with
a synthetic view of potential security flaws, thus enabling suitable
measures to be taken into account. Security implications of the
evolution of a given system become easier to deal with. A prototype
is built based on the conclusions of this analysis.
Abstract: The last decade has seen an early majority of people
The last decade, the role of the of the information communication
technologies has increased in improving the social and business life
of people. Today, it is recognized that game could contribute to
enhance virtual rehabilitation by better engaging patients. Our
research study aims to develop a game based system enhancing
cognitive and physical capabilities of elderly people. To this end, the
project aims to develop a low cost hand held system based on
existing game such as Wii, PSP, or Xbox. This paper discusses the
concepts and requirements for developing such game for elderly
people. Based on the requirement elicitation, we intend to develop a
prototype related to sport and dance activities.
Abstract: The Resource-Constrained Project Scheduling
Problem (RCPSP) is concerned with single-item or small batch
production where limited resources have to be allocated to dependent
activities over time. Over the past few decades, a lot of work has
been made with the use of optimal solution procedures for this basic
problem type and its extensions. Brucker and Knust[1] discuss, how
timetabling problems can be modeled as a RCPSP. Authors discuss
high school timetabling and university course timetabling problem as
an example. We have formulated two mathematical formulations of
course timetabling problem in a new way which are the prototype of
single-mode RCPSP. Our focus is to show, how course timetabling
problem can be transformed into RCPSP. We solve this
transformation model with genetic algorithm.
Abstract: The blood ducts must be occluded to avoid loss of
blood from vessels in laparoscopic surgeries. This paper presents a
locking mechanism to be used in a ligation laparoscopic procedure
(LigLAP I), as an alternative solution for a stapling procedure.
Currently, stapling devices are being used to occlude vessels. Using
these devices may result in some problems, including injury of bile
duct, taking up a great deal of space behind the vessel, and bile leak.
In this new procedure, a two-layer suture occludes a vessel. A
locking mechanism is also required to hold the suture. Since there is
a limited space at the device tip, a Shape Memory Alloy (SMA)
actuator is used in this mechanism. Suitability for cleanroom
applications, small size, and silent performance are among the
advantages of SMA actuators in biomedical applications. An
experimental study is conducted to examine the function of the
locking mechanism. To set up the experiment, a prototype of a
locking mechanism is built using nitinol, which is a nickel-titanium
shape memory alloy. The locking mechanism successfully locks a
polymer suture for all runs of the experiment. In addition, the effects
of various surface materials on the applied pulling forces are studied.
Various materials are mounted at the mechanism tip to compare the
maximum pulling forces applied to the suture for each material. The
results show that the various surface materials on the device tip
provide large differences in the applied pulling forces.
Abstract: A prototype model of an emulsion separator was
designed and manufactured. Generally, it is a cylinder filled with
different fractal modules. The emulsion was fed into the reactor by a
peristaltic pump through an inlet placed at the boundary between the
two phases. For hydrodynamic design and sizing of the reactor the
assumptions of the theory of filtration were used and methods to
describe the separation process were developed. Based on this
methodology and using numerical methods and software of Autodesk
the process is simulated in different operating modes. The basic
hydrodynamic characteristics - speed and performance for different
types of fractal systems and decisions to optimize the design of the
reactor were also defined.
Abstract: Designing, implementing, and debugging concurrency
control algorithms in a real system is a complex, tedious, and errorprone
process. Further, understanding concurrency control
algorithms and distributed computations is itself a difficult task.
Visualization can help with both of these problems. Thus, we have
developed an exploratory environment in which people can prototype
and test various versions of concurrency control algorithms, study
and debug distributed computations, and view performance statistics
of distributed systems. In this paper, we describe the exploratory
environment and show how it can be used to explore concurrency
control algorithms for the interactive steering of distributed
computations.
Abstract: Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness is accordingly attracting more attention from industry, because stakeholders are held accountable for the information with which they work. The authors developed an Information Security Retrieval and Awareness model – entitled “ISRA" – that is tailored specifically towards enhancing information security awareness in industry amongst all users of information, to address shortcomings in existing information security awareness models. This paper is principally aimed at expounding a prototype for the ISRA model to highlight the advantages of utilizing the model. The prototype will focus on the non-technical, humanrelated information security issues in industry. The prototype will ensure that all stakeholders in an organization are part of an information security awareness process, and that these stakeholders are able to retrieve specific information related to information security issues relevant to their job category, preventing them from being overburdened with redundant information.
Abstract: Image-based Rendering(IBR) techniques recently
reached in broad fields which leads to a critical challenge to build up
IBR-Driven visualization platform where meets requirement of high
performance, large bounds of distributed visualization resource
aggregation and concentration, multiple operators deploying and
CSCW design employing. This paper presents an unique IBR-based
visualization dataflow model refer to specific characters of IBR
techniques and then discusses prominent feature of IBR-Driven
distributed collaborative visualization (DCV) system before finally
proposing an novel prototype. The prototype provides a well-defined
three level modules especially work as Central Visualization Server,
Local Proxy Server and Visualization Aid Environment, by which
data and control for collaboration move through them followed the
previous dataflow model. With aid of this triple hierarchy architecture
of that, IBR oriented application construction turns to be easy. The
employed augmented collaboration strategy not only achieve
convenient multiple users synchronous control and stable processing
management, but also is extendable and scalable.
Abstract: In this paper newly reported Cosh window function is
used in the design of prototype filter for M-channel Near Perfect
Reconstruction (NPR) Cosine Modulated Filter Bank (CMFB). Local
search optimization algorithm is used for minimization of distortion
parameters by optimizing the filter coefficients of prototype filter.
Design examples are presented and comparison has been made with
Kaiser window based filterbank design of recently reported work.
The result shows that the proposed design approach provides lower
distortion parameters and improved far-end suppression than the
Kaiser window based design of recent reported work.
Abstract: Cryptographic protocols are widely used in various
applications to provide secure communications. They are usually
represented as communicating agents that send and receive messages.
These agents use their knowledge to exchange information and
communicate with other agents involved in the protocol. An agent
knowledge can be partitioned into explicit knowledge and procedural
knowledge. The explicit knowledge refers to the set of information
which is either proper to the agent or directly obtained from other
agents through communication. The procedural knowledge relates to
the set of mechanisms used to get new information from what is
already available to the agent.
In this paper, we propose a mathematical framework which specifies
the explicit knowledge of an agent involved in a cryptographic
protocol. Modelling this knowledge is crucial for the specification,
analysis, and implementation of cryptographic protocols. We also,
report on a prototype tool that allows the representation and the
manipulation of the explicit knowledge.
Abstract: This paper presents a system overview of Mobile to Server Face Recognition, which is a face recognition application developed specifically for mobile phones. Images taken from mobile phone cameras lack of quality due to the low resolution of the cameras. Thus, a prototype is developed to experiment the chosen method. However, this paper shows a result of system backbone without the face recognition functionality. The result demonstrated in this paper indicates that the interaction between mobile phones and server is successfully working. The result shown before the database is completely ready. The system testing is currently going on using real images and a mock-up database to test the functionality of the face recognition algorithm used in this system. An overview of the whole system including screenshots and system flow-chart are presented in this paper. This paper also presents the inspiration or motivation and the justification in developing this system.