Search results for: Black Sea
108 Estimation of Component Reusability through Reusability Metrics
Authors: Aditya Pratap Singh, Pradeep Tomar
Abstract:
Software reusability is an essential characteristic of Component-Based Software (CBS). The component reusability is an important assess for the effective reuse of components in CBS. The attributes of reusability proposed by various researchers are studied and four of them are identified as potential factors affecting reusability. This paper proposes metric for reusability estimation of black-box software component along with metrics for Interface Complexity, Understandability, Customizability and Reliability. An experiment is performed for estimation of reusability through a case study on a sample web application using a real world component.
Keywords: Component-based software, component reusability, customizability, interface complexity, reliability, understandability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3058107 Optical Verification of an Ophthalmological Examination Apparatus Employing the Electroretinogram Function on Fundus-Related Perimetry
Authors: Naoto Suzuki
Abstract:
Japanese are affected by the most common causes of eyesight loss such as glaucoma, diabetic retinopathy, pigmentary retinal degeneration, and age-related macular degeneration. We developed an ophthalmological examination apparatus with a fundus camera, precisely fundus-related perimetry (microperimetry), and electroretinogram (ERG) functions to diagnose a variety of diseases that cause eyesight loss. The experimental apparatus was constructed with the same optical system as a fundus camera. The microperimetry optical system was calculated and added to the experimental apparatus using the German company Optenso's optical engineering software (OpTaliX-LT 10.8). We also added an Edmund infrared camera (EO-0413), a lens with a 25 mm focal length, a 45° cold mirror, a 12 V/50 W halogen lamp, and an 8-inch monitor. We made the artificial eye of a plane-convex lens, a black spacer, and a hemispherical cup. The hemispherical cup had a small section of the paper at the bottom. The artificial eye was photographed five times using the experimental apparatus. The software was created to display the examination target on the monitor and save examination data using C++Builder 10.2. The retinal fundus was displayed on the monitor at a length and width of 1 mm and a resolution of 70.4 ± 4.1 and 74.7 ± 6.8 pixels, respectively. The microperimetry and ERG functions were successfully added to the experimental ophthalmological apparatus. A moving machine was developed to measure the artificial eye's movement. The artificial eye's rear part was painted black and white in the central area. It was rotated 10 degrees from one side to the other. The movement was captured five times as motion videos. Three static images were extracted from one of the motion videos captured. The images display the artificial eye facing the center, right, and left directions. The three images were processed using Scilab 6.1.0 and Image Processing and Computer Vision Toolbox 4.1.2, including trimming, binarization, making a window, deleting peripheral area, and morphological operations. To calculate the artificial eye's fundus center, we added a gravity method to the program to calculate the gravity position of connected components. From the three images, the image processing could calculate the center position.
Keywords: Ophthalmological examination apparatus, microperimetry, electroretinogram, eye movement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 570106 Predictive Model of Sensor Readings for a Mobile Robot
Authors: Krzysztof Fujarewicz
Abstract:
This paper presents a predictive model of sensor readings for mobile robot. The model predicts sensor readings for given time horizon based on current sensor readings and velocities of wheels assumed for this horizon. Similar models for such anticipation have been proposed in the literature. The novelty of the model presented in the paper comes from the fact that its structure takes into account physical phenomena and is not just a black box, for example a neural network. From this point of view it may be regarded as a semi-phenomenological model. The model is developed for the Khepera robot, but after certain modifications, it may be applied for any robot with distance sensors such as infrared or ultrasonic sensors.
Keywords: Mobile robot, sensors, prediction, anticipation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1450105 The Nanobiotechnology of Obtaining of Collagen Gels from Marin Fish Skin and Yours Reological Properties for using Like New Materials in Dental Medicine
Authors: Anamaria Bechir, Rodica Sirbu, Minodora Leca, Maria Maris, Dan Artenie Maris, Emilia Mihaela Cadar, Marius Maris
Abstract:
This paper aims at presenting the biotechnology used to obtain collagen-based gels from shark (Squalus acanthias) and brill skin, marine fish growing in the Black Sea. Due to the structure of its micro-fibres, collagen can be considered a nanomaterial; in order to use collagen-based matrixes as biomaterial, rheological studies must be performed first, to state whether they are stable or not. For the triple-helix structure to remain stable within these gels at room or human body temperature, they must be stabilized by reticulation.Keywords: Collagen, biotechnology, reticulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2976104 Integrated Method for Detection of Unknown Steganographic Content
Authors: Magdalena Pejas
Abstract:
This article concerns the presentation of an integrated method for detection of steganographic content embedded by new unknown programs. The method is based on data mining and aggregated hypothesis testing. The article contains the theoretical basics used to deploy the proposed detection system and the description of improvement proposed for the basic system idea. Further main results of experiments and implementation details are collected and described. Finally example results of the tests are presented.Keywords: Steganography, steganalysis, data embedding, data mining, feature extraction, knowledge base, system learning, hypothesis testing, error estimation, black box program, file structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564103 Grid Computing for the Bi-CGSTAB Applied to the Solution of the Modified Helmholtz Equation
Authors: E. N. Mathioudakis, E. P. Papadopoulou
Abstract:
The problem addressed herein is the efficient management of the Grid/Cluster intense computation involved, when the preconditioned Bi-CGSTAB Krylov method is employed for the iterative solution of the large and sparse linear system arising from the discretization of the Modified Helmholtz-Dirichlet problem by the Hermite Collocation method. Taking advantage of the Collocation ma-trix's red-black ordered structure we organize efficiently the whole computation and map it on a pipeline architecture with master-slave communication. Implementation, through MPI programming tools, is realized on a SUN V240 cluster, inter-connected through a 100Mbps and 1Gbps ethernet network,and its performance is presented by speedup measurements included.
Keywords: Collocation, Preconditioned Bi-CGSTAB, MPI, Grid and DSM Systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1684102 A Physical Theory of Information vs. a Mathematical Theory of Communication
Authors: Manouchehr Amiri
Abstract:
This article presents a general notion of physical bit information that is compatible with the basics of quantum mechanics and incorporates the Shannon entropy as a special case. This notion of physical information leads to the Binary Data Matrix model (BDM), which predicts the basic results of quantum mechanics, general relativity, and black hole thermodynamics. The compatibility of the model with holographic, information conservation, and Landauer’s principle is investigated. After deriving the “Bit Information principle” as a consequence of BDM, the fundamental equations of Planck, De Broglie, Bekenstein, and mass-energy equivalence are derived.
Keywords: Physical theory of information, binary data matrix model, Shannon information theory, bit information principle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 146101 A Numerical Study on Thermal Dissociation of H2S
Authors: M. Moghiman, S. M. Javadi, A. R. Moghiman, S. Baghdar Hosseini
Abstract:
The main issue in sweetening natural gas is H2S dissociation. The present study is concerned with simulating thermal dissociation of H2S in industrial natural gas carbon black furnace. The comparison of calculated results against experimental measurements shows good agreement. The results show that sulfur derived from H2S thermal dissociation peaked at φ=0.95. H2S thermal dissociation is enhanced in equivalence ratio upper than 1 and H2S oxidization is increased in equivalence ratio lower than 1. H2 concentration of H2S thermal dissociation is increased with increase of equivalence ratio up to 1. Also, H2S concentration decreased in outlet as equivalence ratio increases. H2S thermal dissociation to hydrogen and Sulfur reduces its toxic characteristics and make economical benefits.Keywords: Equivalence ratio, H2S, natural gas furnace, thermaldissociation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2434100 Development a Recommendation Library System Based On Android Application
Authors: Kunyanuth Kularbphettong, Kunnika Tenprakhon, Pattarapan Roonrakwit
Abstract:
In this paper, we present a recommendation library application on Android system. The objective of this system is to support and advice user to use library resources based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on under association rules, Apriori algorithm. In this project, it was divided the result by the research purposes into 2 parts: developing the Mobile application for online library service and testing and evaluating the system. Questionnaires were used to measure user satisfaction with system usability by specialists and users. The results were satisfactory both specialists and users.
Keywords: Online library, Apriori algorithm, android application, black box.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 401399 Improved MARS Ciphering Using a Metamorphic-Enhanced Function
Authors: Moataz M. Naguib, Hatem Khater, A. Baith Mohamed
Abstract:
MARS is a shared-key (symmetric) block cipher algorithm supporting 128-bit block size and a variable key size of between 128 and 448 bits. MARS has a several rounds of cryptographic core that is designed to take advantage of the powerful results for improving security/performance tradeoff over existing ciphers. In this work, a new function added to improve the ciphering process it is called, Meta-Morphic function. This function use XOR, Rotating, Inverting and No-Operation logical operations before and after encryption process. The aim of these operations is to improve MARS cipher process and makes a high confusion criterion for the Ciphertext.
Keywords: AES, MARS, Metamorphic, Cryptography, Block Cipher.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 204398 Development of Autonomous Line-Following Soccer Robots
Authors: A. A. Shafie, M. F. Alias, M. H. Ali
Abstract:
The main objective of this project is to build an autonomous microcontroller-based mobile robot for a local robot soccer competition. The black competition field is equipped with white lines to serve as the guidance path for competing robots. Two prototypes of soccer robot embedded with the Basic Stamp II microcontroller have been developed. Two servo motors are used as the drive train for the first prototype whereas the second prototype uses two DC motors as its drive train. To sense the lines, lightdependent resistors (LDRs) supply the analog inputs for the microcontroller. The performances of both prototypes are evaluated. The DC motor-driven robot has produced better trajectory control over the one using servo motors and has brought the team into the final round.Keywords: Soccer robot, Obstacle detection, Differential drive, Line following.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 165197 Basket Option Pricing under Jump Diffusion Models
Authors: Ali Safdari-Vaighani
Abstract:
Pricing financial contracts on several underlying assets received more and more interest as a demand for complex derivatives. The option pricing under asset price involving jump diffusion processes leads to the partial integral differential equation (PIDEs), which is an extension of the Black-Scholes PDE with a new integral term. The aim of this paper is to show how basket option prices in the jump diffusion models, mainly on the Merton model, can be computed using RBF based approximation methods. For a test problem, the RBF-PU method is applied for numerical solution of partial integral differential equation arising from the two-asset European vanilla put options. The numerical result shows the accuracy and efficiency of the presented method.Keywords: Radial basis function, basket option, jump diffusion, RBF-PUM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 120896 A New Type of Integration Error and its Influence on Integration Testing Techniques
Authors: P. Prema, B. Ramadoss
Abstract:
Testing is an activity that is required both in the development and maintenance of the software development life cycle in which Integration Testing is an important activity. Integration testing is based on the specification and functionality of the software and thus could be called black-box testing technique. The purpose of integration testing is testing integration between software components. In function or system testing, the concern is with overall behavior and whether the software meets its functional specifications or performance characteristics or how well the software and hardware work together. This explains the importance and necessity of IT for which the emphasis is on interactions between modules and their interfaces. Software errors should be discovered early during IT to reduce the costs of correction. This paper introduces a new type of integration error, presenting an overview of Integration Testing techniques with comparison of each technique and also identifying which technique detects what type of error.Keywords: Integration Error, Integration Error Types, Integration Testing Techniques, Software Testing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 221895 Challenges for Security in Wireless Sensor Networks (WSNs)
Authors: Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher
Abstract:
Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, computational power and lower memory. Researchers working in this area have proposed a number of security techniques for this purpose. Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks. This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.
Keywords: Wireless senor networks (WSNs), security, denial of service, black hole, cryptography, stenography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 292394 Data and Control Flow Analysis of VDMµ Specifications
Authors: Mubina Nazmeen, Iram Rubab
Abstract:
Formal Specification languages are being widely used for system specification and testing. Highly critical systems such as real time systems, avionics, and medical systems are represented using Formal specification languages. Formal specifications based testing is mostly performed using black box testing approaches thus testing only the set of inputs and outputs of the system. The formal specification language such as VDMµ can be used for white box testing as they provide enough constructs as any other high level programming language. In this work, we perform data and control flow analysis of VDMµ class specifications. The proposed work is discussed with an example of SavingAccount.Keywords: VDM-SL, VDMµ, data flow graph, control flowgraph, testing, formal specification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 437793 The Effect of Carbon on Molybdenum in the Preparation of Microwave Induced Molybdenum Carbide
Authors: Abd. Rahim Yacob, Mohd Khairul Asyraf Amat Mustajab, Nurshaira Haifa Suhaimi
Abstract:
This study shows the effect of carbon towards molybdenum carbide alloy when exposed to Microwave. This technique is also known as Microwave Induced Alloying (MIA) for the preparation of molybdenum carbide. In this study ammonium heptamolybdate solution and carbon black powder were heterogeneously mixed and exposed to microwave irradiation for 2 minutes. The effect on amount of carbon towards the produced alloy on morphological and oxidation states changes during microwave is presented. In this experiment, it is expected carbon act as a reducing agent with the ratio 2:7 molybdenum to carbon as the optimum for the production of molybdenum carbide alloy. All the morphological transformations and changes in this experiment were followed and characterized using X-Ray Diffraction and FESEM.Keywords: Carbon, molybdenum carbide, microwave induced alloying.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 234292 Comparative Analysis of Total Phenolic Content in Sea Buckthorn Wine and Other Selected Fruit Wines
Authors: Bharti Negi, Gargi Dey
Abstract:
This is the first report from India on a beverage resulting from alcoholic fermentation of the juice of sea buckthorn (Hippophae rhamnoides L) using lab isolated yeast strain. The health promoting potential of the product was evaluated based on its total phenolic content. The most important finding was that under the present fermentation condition, the total phenolic content of the wine product was 689 mg GAE/L. Investigation of influence of bottle ageing on the sea buckthorn wine showed a slight decrease in the phenolic content (534 m mg GAE/L). This study also includes the comparative analysis of the phenolic content of wines from other selected fruit juices like grape, apple and black currant. KeywordsAlcoholic fermentation, Hippophae, Total phenolic content, Wine
Keywords: Alcoholic fermentation, Hippophae, Total phenolic content, Wine
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 308291 The Non-Uniqueness of Partial Differential Equations Options Price Valuation Formula for Heston Stochastic Volatility Model
Authors: H. D. Ibrahim, H. C. Chinwenyi, T. Danjuma
Abstract:
An option is defined as a financial contract that provides the holder the right but not the obligation to buy or sell a specified quantity of an underlying asset in the future at a fixed price (called a strike price) on or before the expiration date of the option. This paper examined two approaches for derivation of Partial Differential Equation (PDE) options price valuation formula for the Heston stochastic volatility model. We obtained various PDE option price valuation formulas using the riskless portfolio method and the application of Feynman-Kac theorem respectively. From the results obtained, we see that the two derived PDEs for Heston model are distinct and non-unique. This establishes the fact of incompleteness in the model for option price valuation.
Keywords: Option price valuation, Partial Differential Equations, Black-Scholes PDEs, Ito process.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 50690 Heat Transfer Analysis of Rectangular Channel Plate Heat Sink
Authors: Zhang Lei, Liu Min, Liu Botao
Abstract:
In order to improve the simulation effects of space cold black environment, this paper described a rectangular channel plate heat sink. By using fluid mechanics theory and finite element method, the internal fluid flow and heat transfer in heat sink was numerically simulated to analyze the impact of channel structural on fluid flow and heat transfer. The result showed that heat sink temperature uniformity is well, and the impact of channel structural on the heat sink temperature uniformity is not significant. The channel depth and spacing are important factors which affect the fluid flow and heat transfer in the heat sink. The two factors of heat transfer and resistance need to be considered comprehensively to determine the optimal flow structure parameters.Keywords: heat transfer, heat sink, numerical simulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 184089 Correction of Infrared Data for Electrical Components on a Board
Authors: Seong-Ho Song, Ki-Seob Kim, Seop-Hyeong Park, Seon-Woo Lee
Abstract:
In this paper, the data correction algorithm is suggested when the environmental air temperature varies. To correct the infrared data in this paper, the initial temperature or the initial infrared image data is used so that a target source system may not be necessary. The temperature data obtained from infrared detector show nonlinear property depending on the surface temperature. In order to handle this nonlinear property, Taylor series approach is adopted. It is shown that the proposed algorithm can reduce the influence of environmental temperature on the components in the board. The main advantage of this algorithm is to use only the initial temperature of the components on the board rather than using other reference device such as black body sources in order to get reference temperatures.Keywords: Infrared camera, Temperature Data compensation, Environmental Ambient Temperature, Electric Component
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 152788 Buzan Mind Mapping: An Efficient Technique for Note-Taking
Authors: T. K. Tee, M. N. A. Azman, S. Mohamed, Muhammad, M., M. M. Mohamad, J. Md Yunos, M. H. Yee, W. Othman
Abstract:
Buzan mind mapping is an efficient system of note-taking that makes revision a fun thing to do for students. Tony Buzan has been teaching children all over the world for the past thirty years and has proved that mind maps are the magic formula in the classroom for everyone. The purpose of this paper is to discuss the importance of Buzan mind mapping as a note-taking technique for the secondary school students. This paper also examines the mind mapping technique, advantages and disadvantages of hand-drawn mind maps. Samples of students’ mind maps were presented and discussed.
Keywords: Buzan Mind Mapping, note-taking technique, hand-drawn mind maps.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 939487 A Critical Survey of Reusability Aspects for Component-Based Systems
Authors: Arun Sharma, Rajesh Kumar, P. S. Grover
Abstract:
The last decade has shown that object-oriented concept by itself is not that powerful to cope with the rapidly changing requirements of ongoing applications. Component-based systems achieve flexibility by clearly separating the stable parts of systems (i.e. the components) from the specification of their composition. In order to realize the reuse of components effectively in CBSD, it is required to measure the reusability of components. However, due to the black-box nature of components where the source code of these components are not available, it is difficult to use conventional metrics in Component-based Development as these metrics require analysis of source codes. In this paper, we survey few existing component-based reusability metrics. These metrics give a border view of component-s understandability, adaptability, and portability. It also describes the analysis, in terms of quality factors related to reusability, contained in an approach that aids significantly in assessing existing components for reusability.Keywords: Components, Customizability, Reusability, and Observability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 247186 Effect of Different Salt Concentrations and Temperatures on Seed Germination and Seedling Characters in Safflower (Carthamus tinctorius L.) Genotypes
Authors: Rahim Ada, Zamari Temory, Hasan Dalgiç
Abstract:
Germination and seedling responses of seven safflower seed genotypes (Dinçer, Remzibey, Black Sun2 cultivars and A19, F4, I1, J19 lines) to different salinity concentrations (0, 5, 10 and 20g l-1) and temperatures (10 and 20oC) evaluated in Completely Randomized Factorial Designs in Department of Field Crops of Selcuk University, Konya, Turkey. Seeds in the control (distilled water) had at 10 and 20oC the highest germination percentage (93.88 and 94.32%), shoot length (4.60 and 8.72cm) and root length (4.27 and 6.54cm) shoot dry weight (22.37mg and 25.99mg) and root dry weight (2.22 and 2.47mg). As the salt concentration increased, values of all characters were decreased. In this experiment, in 20g l-1 salt concentration found germination percentage (21.28 and 26.66%), shoot (1.32 and 1.35cm) and root length (1.04 and 1.10cm) shoot (8.05mg and 7.49mg) and root dry weight (0.83 and 0.98mg) at 10 and 20oC.
Keywords: NaCl, Safflower, Temperature.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 200585 Towards Synthesis of Atropodiastereomeric Indolostilbenes Hybrids: A New Class of Oligostilbenoids
Authors: K. Ahmad, M. Suhaimi, Mohamad N. Azmi, K. Awang, Mohd A. Nafiah
Abstract:
The conceptually construction of axially chiral indolostilbenesi.eN-(2-{(E)-2-[2'-(1-Acetyl-1H-indol-2-yl)-3'chloro-4,4',6,6'-tetramethoxy[1,1'-biphenyl]-2yl]ethenyl}phenyl)acetamide and N-(2-{(E)-2-[2'-(1-Acetyl-1H-indol-2-yl)-3'-chloro-2,4',6,6'-tetramethoxy[1,1'-biphenyl]-4-yl]ethenyl}phenyl) acetamide are described in this paper. These structure, were obtained by the tactical combination of palladium-catalyzed coupling which produced 10-acetamido-3,5-dimethoxystilbene, follow by FeCl3-induced oxidative cyclization/dimerisation. All structures were unambiguously confirmed by 1D (1H, 13C) and 2D NMR experiment, (COSY, HMQC, HMBC) and mass spectrometry.
Keywords: Indolostilbene, FeCl3-oxidative cyclization, Oligostilbenooids, Oxidative cyclization/dimerization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 151784 Isobaric Vapor-Liquid Equilibria of Mesitylene + 1- Heptanol and Mesitylene +1-Octanol at 97.3 kPa
Authors: Seema Kapoor, Sushil K. Kansal, Baljinder K. Gill, Aarti Sharma, Swati Arora
Abstract:
Isobaric vapor-liquid equilibrium measurements are reported for the binary mixtures of Mesitylene + 1-Heptanol and Mesitylene + 1-Octanol at 97.3 kPa. The measurements have been performed using a vapor recirculating type (modified Othmer's) equilibrium still. Both the mixtures show positive deviation from ideality. The Mesitylene + 1-Heptanol mixture forms an azeotrope whereas Mesitylene + 1- Octanol form a non – azeotropic mixture. The activity coefficients have been calculated taking into consideration the vapor phase nonideality. The data satisfy the thermodynamic consistency tests of Herington, and Hirata. The activity coefficients have been satisfactorily correlated by means of the Margules, Redlich-Kister, Wilson, Black, and NRTL equations. The activity coefficient values have also been obtained by UNIFAC method.
Keywords: Binary mixture, Mesitylene, Vapor-liquid equilibrium, 1-Heptanol, 1-Octanol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 194683 Labeling Method in Steganography
Authors: H. Motameni, M. Norouzi, M. Jahandar, A. Hatami
Abstract:
In this paper a way of hiding text message (Steganography) in the gray image has been presented. In this method tried to find binary value of each character of text message and then in the next stage, tried to find dark places of gray image (black) by converting the original image to binary image for labeling each object of image by considering on 8 connectivity. Then these images have been converted to RGB image in order to find dark places. Because in this way each sequence of gray color turns into RGB color and dark level of grey image is found by this way if the Gary image is very light the histogram must be changed manually to find just dark places. In the final stage each 8 pixels of dark places has been considered as a byte and binary value of each character has been put in low bit of each byte that was created manually by dark places pixels for increasing security of the main way of steganography (LSB).
Keywords: Binary image, labeling, low bit, neighborhood, RGB image, steganography, threshold.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 213982 Tourism Planning in Developing Countries: Review of Concepts and Sustainability Issues
Authors: Patrick B. Cobbinah, Rosemary Black, Rik Thwaites
Abstract:
Globally, issues of sustainable development have become the fulcrum around which current international discourse revolves. Many governments in both the developed and the developing countries are focusing on strategies to achieve sustainable growth. Tourism has been identified as a major sector in safeguarding a sustainable future. However, research has shown that tourism if not properly managed can be detrimental. This paper posits tourism in the sustainable development discourse, exploring how the historical evolution of tourism and issues of sustainability have informed the state of tourism activities in the developing countries. Using secondary data analysis, the paper reveals that current conceptual explanations of tourism are linked to sustainable development. However, tourism activities in developing countries are usually driven by profit without adequate consideration for environmental and social factors. The paper raises two questions and further recommends that tourism activities should be informed by sustainable development principles.
Keywords: Developing countries, mass tourism, sustainable development, sustainable tourism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 664781 Using Exponential Lévy Models to Study Implied Volatility patterns for Electricity Options
Authors: Pinho C., Madaleno M.
Abstract:
German electricity European options on futures using Lévy processes for the underlying asset are examined. Implied volatility evolution, under each of the considered models, is discussed after calibrating for the Merton jump diffusion (MJD), variance gamma (VG), normal inverse Gaussian (NIG), Carr, Geman, Madan and Yor (CGMY) and the Black and Scholes (B&S) model. Implied volatility is examined for the entire sample period, revealing some curious features about market evolution, where data fitting performances of the five models are compared. It is shown that variance gamma processes provide relatively better results and that implied volatility shows significant differences through time, having increasingly evolved. Volatility changes for changed uncertainty, or else, increasing futures prices and there is evidence for the need to account for seasonality when modelling both electricity spot/futures prices and volatility.Keywords: Calibration, Electricity Markets, Implied Volatility, Lévy Models, Options on Futures, Pricing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 480880 Recognition of Grocery Products in Images Captured by Cellular Phones
Authors: Farshideh Einsele, Hassan Foroosh
Abstract:
In this paper, we present a robust algorithm to recognize extracted text from grocery product images captured by mobile phone cameras. Recognition of such text is challenging since text in grocery product images varies in its size, orientation, style, illumination, and can suffer from perspective distortion. Pre-processing is performed to make the characters scale and rotation invariant. Since text degradations can not be appropriately defined using well-known geometric transformations such as translation, rotation, affine transformation and shearing, we use the whole character black pixels as our feature vector. Classification is performed with minimum distance classifier using the maximum likelihood criterion, which delivers very promising Character Recognition Rate (CRR) of 89%. We achieve considerably higher Word Recognition Rate (WRR) of 99% when using lower level linguistic knowledge about product words during the recognition process.
Keywords: Camera-based OCR, Feature extraction, Document and image processing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 247079 To Study the Parametric Effects on Optimality of Various Feeding Sequences of a Multieffect Evaporators in Paper Industry using Mathematical Modeling and Simulation with MATLAB
Authors: Deepak Kumar, Vivek Kumar, V. P. Singh
Abstract:
This paper describes a steady state model of a multiple effect evaporator system for simulation and control purposes. The model includes overall as well as component mass balance equations, energy balance equations and heat transfer rate equations for area calculations for all the effects. Each effect in the process is represented by a number of variables which are related by the energy and material balance equations for the feed, product and vapor flow for backward, mixed and split feed. For simulation 'fsolve' solver in MATLAB source code is used. The optimality of three sequences i.e. backward, mixed and splitting feed is studied by varying the various input parameters.Keywords: MATLAB "fsolve" solver, multiple effectevaporators, black liquor, feeding sequences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3259