Search results for: traceability methods.
2646 Novel Method for Elliptic Curve Multi-Scalar Multiplication
Authors: Raveen R. Goundar, Ken-ichi Shiota, Masahiko Toyonaga
Abstract:
The major building block of most elliptic curve cryptosystems are computation of multi-scalar multiplication. This paper proposes a novel algorithm for simultaneous multi-scalar multiplication, that is by employing addition chains. The previously known methods utilizes double-and-add algorithm with binary representations. In order to accomplish our purpose, an efficient empirical method for finding addition chains for multi-exponents has been proposed.Keywords: elliptic curve cryptosystems, multi-scalar multiplication, addition chains, Fibonacci sequence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16112645 Decision-Making Criteria of PPP Projects: Stakeholder Theoretic Perspective
Authors: Xueqin Shan, Wenhua Hou, Xiaosu Ye, Chuanming Wu
Abstract:
Any decision-making is based on certain theory. Taking the public rental housing in Chongqing municipality as an example, this essay states that the stakeholder theory can provide innovative criteria and evaluation methods for Public Private Partnership (PPP) projects. It gives an analysis of how to choose decision-making criteria for different stakeholders in the PPP model and what measures to take to meet the criteria to form “symbiotic" decision-making mode through contracts and to boost the application of PPP model in large-scale public programs in China.Keywords: PPP, Stakeholder Theory, Stakeholders, Decision- making Criteria
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24232644 Numerical Buckling of Composite Cylindrical Shells under Axial Compression Using Asymmetric Meshing Technique (AMT)
Authors: Zia R. Tahir, P. Mandal
Abstract:
This paper presents the details of a numerical study of buckling and post buckling behaviour of laminated carbon fiber reinforced plastic (CFRP) thin-walled cylindrical shell under axial compression using asymmetric meshing technique (AMT) by ABAQUS. AMT is considered to be a new perturbation method to introduce disturbance without changing geometry, boundary conditions or loading conditions. Asymmetric meshing affects both predicted buckling load and buckling mode shapes. Cylindrical shell having lay-up orientation [0^o/+45^o/-45^o/0^o] with radius to thickness ratio (R/t) equal to 265 and length to radius ratio (L/R) equal to 1.5 is analysed numerically. A series of numerical simulations (experiments) are carried out with symmetric and asymmetric meshing to study the effect of asymmetric meshing on predicted buckling behaviour. Asymmetric meshing technique is employed in both axial direction and circumferential direction separately using two different methods, first by changing the shell element size and varying the total number elements, and second by varying the shell element size and keeping total number of elements constant. The results of linear analysis (Eigenvalue analysis) and non-linear analysis (Riks analysis) using symmetric meshing agree well with analytical results. The results of numerical analysis are presented in form of non-dimensional load factor, which is the ratio of buckling load using asymmetric meshing technique to buckling load using symmetric meshing technique. Using AMT, load factor has about 2% variation for linear eigenvalue analysis and about 2% variation for non-linear Riks analysis. The behaviour of load end-shortening curve for pre-buckling is same for both symmetric and asymmetric meshing but for asymmetric meshing curve behaviour in post-buckling becomes extraordinarily complex. The major conclusions are: different methods of AMT have small influence on predicted buckling load and significant influence on load displacement curve behaviour in post buckling; AMT in axial direction and AMT in circumferential direction have different influence on buckling load and load displacement curve in post-buckling.
Keywords: CFRP Composite Cylindrical Shell, Asymmetric Meshing Technique, Primary Buckling, Secondary Buckling, Linear Eigenvalue Analysis, Non-linear Riks Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24862643 The Effect of Physical Exercise to Level of Nuclear Factor Kappa B on Serum, Macrophages and Myocytes
Authors: Eryati Darwin, Eka Fithra Elfi, Indria Hafizah
Abstract:
Background: Physical exercise induces a pattern of hormonal and immunological responses that prevent endothelial dysfunction by maintaining the availability of nitric oxide (NO). Regular and moderate exercise stimulates NO release, that can be considered as protective factor of cardiovascular diseases, while strenuous exercise induces increased levels in a number of pro-inflammatory and anti-inflammatory cytokines. Pro-inflammatory cytokines tumor necrosis factor-α (TNF-α) triggers endothelial activation which results in an increased vascular permeability. Nuclear gene factor kappa B (NF-κB) activates biological effect of TNF-α. Aim of Study: To determine the effect of physical exercise on the endothelial and skeletal muscle, we measured the level of NF-κB on rats’ serum, macrophages, and myocytes after strenuous physical exercise. Methods: 30 male Rattus norvegicus in the age of eight weeks were randomly divided into five groups (each containing six), and there were treated groups (T) and control group (C). The treated groups obtain strenuous physical exercise by ran on treadmill at 32 m/minutes for 1 hour or until exhaustion. Blood samples, myocytes of gastrocnemius muscle, and intraperitoneal macrophages were collected sequentially. There were investigated immediately, 2 hours, 6 hours, and 24 hours (T1, T2, T3, and T4) after sacrifice. The levels of NF-κB were measured by ELISA methods. Results: From our study, we found that the levels of NF-κB on myocytes in treated group from which its specimen was taken immediately (T1), 2 hours after treadmill (T2), and 6 hours after treadmill (T3) were significantly higher than control group (p<0.05), while the group from which its specimen was taken 24 hours after treadmill, was no significantly different (p>0.05). Also on macrophages, NF-κB in treated groups T1, T2, and T3 was significantly higher than control group (p<0.05), but there was no difference between T4 and control group (p>0.05). The level of serum NF-κB was not significantly different between treatment group as well as compared to control group (p>0.05). Serum NF-κB was significantly higher than the level on macrophages and myocytes (p<0.05). Conclusion: This study demonstrated that strenuous physical exercise stimulates the activation of NF-κB that plays a role in vascular inflammation and muscular damage, and may be recovered after resting period.
Keywords: Endothelial function, inflammation, NF-κB, physical exercise.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10962642 Use of Magnesium as a Renewable Energy Source
Authors: Rafayel K. Kostanyan
Abstract:
The opportunities of use of metallic magnesium as a generator of hydrogen gas, as well as thermal and electric energy is presented in the paper. Various schemes of magnesium application are discussed and power characteristics of corresponding devices are presented. Economic estimation of hydrogen price obtained by different methods is made, including the use of magnesium as a source of hydrogen for transportation in comparison with gasoline. Details and prospects of our new inexpensive technology of magnesium production from magnesium hydroxide and magnesium bearing rocks (which are available worldwide and in Armenia) are analyzed. It is estimated the threshold cost of Mg production at which application of this metal in power engineering is economically justified.
Keywords: Magnesium, power generation, production, renewable energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20142641 Direct Simulation Monte Carlo (DSMC) Algorithm – A Comparison of Mathematica Code with FLUENT 6.2 for Low Knudsen Number
Authors: Nabeel A. Qazi, Absaar ul Jabbar, Khalid Parvez
Abstract:
A code has been developed in Mathematica using Direct Simulation Monte Carlo (DSMC) technique. The code was tested for 2-D air flow around a circular cylinder. Same geometry and flow properties were used in FLUENT 6.2 for comparison. The results obtained from Mathematica simulation indicated significant agreement with FLUENT calculations, hence providing insight into particle nature of fluid flows.Keywords: DSMC algorithm, non continuum gas flows, Monte Carlo methods
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34212640 Case Study of Obstructive Sleep Apnea and Methods of Treatment for a Professional Driver
Authors: R. Pääkkönen, L. Korpinen, T. Kava, I. Salmi
Abstract:
This study evaluates obstructive sleep apnea treatment through a case study involving a 67-year-old male driver who had a successful continuous positive airway pressure (CPAP) treatment at home but experienced difficulties with traveling and dental care. There are many cheap sleep apnea and snoring devices available, but there is little professional advice on what kind of devices can help. Professional drivers receive yearly specialized medical care follow-up.
Keywords: Sleep, apnea patient, CPAP, professional driver.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7732639 Incorporation of Safety into Design by Safety Cube
Authors: Mohammad Rajabalinejad
Abstract:
Safety is often seen as a requirement or a performance indicator through the design process, and this does not always result in optimally safe products or systems. This paper suggests integrating the best safety practices with the design process to enrich the exploration experience for designers and add extra values for customers. For this purpose, the commonly practiced safety standards and design methods have been reviewed and their common blocks have been merged forming Safety Cube. Safety Cube combines common blocks for design, hazard identification, risk assessment and risk reduction through an integral approach. An example application presents the use of Safety Cube for design of machinery.Keywords: Safety, safety cube, design, product, system, machinery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14952638 New Product-Type Estimators for the Population Mean Using Quartiles of the Auxiliary Variable
Authors: Amer Ibrahim Falah Al-Omari
Abstract:
In this paper, we suggest new product-type estimators for the population mean of the variable of interest exploiting the first or the third quartile of the auxiliary variable. We obtain mean square error equations and the bias for the estimators. We study the properties of these estimators using simple random sampling (SRS) and ranked set sampling (RSS) methods. It is found that, SRS and RSS produce approximately unbiased estimators of the population mean. However, the RSS estimators are more efficient than those obtained using SRS based on the same number of measured units for all values of the correlation coefficient.
Keywords: Product estimator, auxiliary variable, simple random sampling, extreme ranked set sampling
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15312637 Scalable Deployment and Configuration of High-Performance Virtual Clusters
Authors: Kyrre M Begnum, Matthew Disney
Abstract:
Virtualization and high performance computing have been discussed from a performance perspective in recent publications. We present and discuss a flexible and efficient approach to the management of virtual clusters. A virtual machine management tool is extended to function as a fabric for cluster deployment and management. We show how features such as saving the state of a running cluster can be used to avoid disruption. We also compare our approach to the traditional methods of cluster deployment and present benchmarks which illustrate the efficiency of our approach.
Keywords: Cluster management, clusters, high-performance, virtual machines, Xen
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14042636 Predominance of Teaching Models Used by Math Teachers in Secondary Education
Authors: Verónica Diaz Quezada
Abstract:
This research examines the teaching models used by secondary math teachers when teaching logarithmic, quadratic and exponential functions. For this, descriptive case studies have been carried out on 5 secondary teachers. These teachers have been chosen from 3 scientific-humanistic and technical schools, in Chile. Data have been obtained through non-participant class observation and the application of a questionnaire and a rubric to teachers. According to the results, the didactic model that prevails is the one that starts with an interactive strategy, moves to a more content-based structure, and ends with a reinforcement stage. Nonetheless, there is always influence from teachers, their methods, and the group of students.Keywords: Teaching models, math teachers, functions, secondary education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8042635 Linear Cryptanalysis for a Chaos-Based Stream Cipher
Authors: Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang
Abstract:
Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem – confusion and diffusion. We show that this well-designed chaos-based stream cipher is still insecure against distinguishing attack. This distinguishing attack promotes the further improvement of the cipher.
Keywords: Stream cipher, chaos, linear cryptanalysis, distinguishing attack.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17522634 An Iterative Method for the Least-squares Symmetric Solution of AXB+CYD=F and its Application
Authors: Minghui Wang
Abstract:
Based on the classical algorithm LSQR for solving (unconstrained) LS problem, an iterative method is proposed for the least-squares like-minimum-norm symmetric solution of AXB+CYD=E. As the application of this algorithm, an iterative method for the least-squares like-minimum-norm biymmetric solution of AXB=E is also obtained. Numerical results are reported that show the efficiency of the proposed methods.
Keywords: Matrix equation, bisymmetric matrix, least squares problem, like-minimum norm, iterative algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14892633 VoIP Networks Performance Analysis with Encryption Systems
Authors: Edward Paul Guillen, Diego Alejandro Chacon
Abstract:
The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This paper analyzes the VoIP throughput and the QoS parameters with different commercial encryption methods. The measurement–based approach uses lab scenarios to simulate LAN and WAN environments. Security mechanisms such as TLS, SIAX2, SRTP, IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.Keywords: VoIP, Secure VoIP, Throughput Analysis, VoIP QoS evaluation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28942632 Suicide Conceptualization in Adolescents through Semantic Networks
Authors: K. P. Valdés García, E. I. Rodríguez Fonseca, L. G. Juárez Cantú
Abstract:
Suicide is a global, multidimensional and dynamic problem of mental health, which requires a constant study for its understanding and prevention. When research of this phenomenon is done, it is necessary to consider the different characteristics it may have because of the individual and sociocultural variables, the importance of this consideration is related to the generation of effective treatments and interventions. Adolescents are a vulnerable population due to the characteristics of the development stage. The investigation was carried out with the objective of identifying and describing the conceptualization of adolescents of suicide, and in this process, we find possible differences between men and women. The study was carried out in Saltillo, Coahuila, Mexico. The sample was composed of 418 volunteer students aged between 11 and 18 years. The ethical aspects of the research were reviewed and considered in all the processes of the investigation with the participants, their parents and the schools to which they belonged, psychological attention was offered to the participants and preventive workshops were carried in the educational institutions. Natural semantic networks were the instrument used, since this hybrid method allows to find and analyze the social concept of a phenomenon; in this case, the word suicide was used as an evocative stimulus and participants were asked to evoke at least five words and a maximum 10 that they thought were related to suicide, and then hierarchize them according to the closeness with the construct. The subsequent analysis was carried with Excel, yielding the semantic weights, affective loads and the distances between each of the semantic fields established according to the words reported by the subjects. The results showed similarities in the conceptualization of suicide in adolescents, men and women. Seven semantic fields were generated; the words were related in the discourse analysis: 1) death, 2) possible triggering factors, 3) associated moods, 4) methods used to carry it out, 5) psychological symptomatology that could affect, 6) words associated with a rejection of suicide, and finally, 7) specific objects to carry it out. One of the necessary aspects to consider in the investigations of complex issues such as suicide is to have a diversity of instruments and techniques that adjust to the characteristics of the population and that allow to understand the phenomena from the social constructs and not only theoretical. The constant study of suicide is a pressing need, the loss of a life from emotional difficulties that can be solved through psychiatry and psychological methods requires governments and professionals to pay attention and work with the risk population.
Keywords: Adolescents, semantic networks, speech analysis, suicide.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7562631 Automatic Checkpoint System Using Face and Card Information
Authors: Kriddikorn Kaewwongsri, Nikom Suvonvorn
Abstract:
In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person’s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society.
Keywords: Face comparison, card recognition, OCR, checkpoint system, authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17922630 Pattern Recognition of Biological Signals
Authors: Paulo S. Caparelli, Eduardo Costa, Alexsandro S. Soares, Hipolito Barbosa
Abstract:
This paper presents an evolutionary method for designing electronic circuits and numerical methods associated with monitoring systems. The instruments described here have been used in studies of weather and climate changes due to global warming, and also in medical patient supervision. Genetic Programming systems have been used both for designing circuits and sensors, and also for determining sensor parameters. The authors advance the thesis that the software side of such a system should be written in computer languages with a strong mathematical and logic background in order to prevent software obsolescence, and achieve program correctness.Keywords: Pattern recognition, evolutionary computation, biological signal, functional programming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17442629 Study of Parameters Affecting the Electrostatic Attractions Force
Authors: Vahid Sabermand, Yousef Hojjat, Majid Hasanzadeh
Abstract:
This paper contains 2 main parts. In the first part of paper we simulated and studied three types of electrode patterns used in various industries for suspension and handling of the semiconductor and glass and we selected the best pattern by evaluating the electrostatic force, which was comb pattern electrode. In the second part we investigated the parameters affecting the amount of electrostatic force such as the gap between surface and electrode (g), the electrode width (w), the gap between electrodes (t), the surface permittivity and electrode length and methods of improvement of adhesion force by changing these values.
Keywords: Electrostatic force, electrostatic adhesion, electrostatic chuck, electrostatic application in industry, Electroadhesive grippers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28032628 Approximate Solution of Nonlinear Fredholm Integral Equations of the First Kind via Converting to Optimization Problems
Authors: Akbar H. Borzabadi, Omid S. Fard
Abstract:
In this paper we introduce an approach via optimization methods to find approximate solutions for nonlinear Fredholm integral equations of the first kind. To this purpose, we consider two stages of approximation. First we convert the integral equation to a moment problem and then we modify the new problem to two classes of optimization problems, non-constraint optimization problems and optimal control problems. Finally numerical examples is proposed.Keywords: Fredholm integral equation, Optimization method, Optimal control, Nonlinear and linear programming
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17732627 A Holistic Approach for Technical Product Optimization
Authors: H. Lang, M. Bader, A. Buchroithner
Abstract:
Holistic methods covering the development process as a whole – e.g. systems engineering – have established themselves in product design. However, technical product optimization, representing improvements in efficiency and/or minimization of loss, usually applies to single components of a system. A holistic approach is being defined based on a hierarchical point of view of systems engineering. This is subsequently presented using the example of an electromechanical flywheel energy storage system for automotive applications.Keywords: Design, product development, product optimization, systems engineering, flywheel energy storage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26522626 Gait Recognition System: Bundle Rectangle Approach
Authors: Edward Guillen, Daniel Padilla, Adriana Hernandez, Kenneth Barner
Abstract:
Biometrics methods include recognition techniques such as fingerprint, iris, hand geometry, voice, face, ears and gait. The gait recognition approach has some advantages, for example it does not need the prior concern of the observed subject and it can record many biometric features in order to make deeper analysis, but most of the research proposals use high computational cost. This paper shows a gait recognition system with feature subtraction on a bundle rectangle drawn over the observed person. Statistical results within a database of 500 videos are shown.Keywords: Autentication, Biometrics, Gait Recognition, Human Identification, Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18772625 A Calibration Device for Force-Torque Sensors
Authors: Nicolay Zarutskiy, Roman Bulkin
Abstract:
The paper deals with the existing methods of force-torque sensor calibration with a number of components from one to six, analyzed their advantages and disadvantages, the necessity of introduction of a calibration method. Calibration method and its constructive realization are also described here. A calibration method allows performing automated force-torque sensor calibration both with selected components of the main vector of forces and moments and with complex loading. Thus, two main advantages of the proposed calibration method are achieved: the automation of the calibration process and universality.Keywords: Automation, calibration, calibration device, calibration method, force-torque sensors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12902624 Experimental Study of Kiwi Juice under Sonication and Carbonation
Authors: N. Dizadji, P. Entezar, A. Afsari
Abstract:
This paper focuses on the experimental impacts of ultrasonic, carbonate and a combination of them on the quality of fresh kiwi juice. Today, non-thermal methods like ultrasonic, which have imperceptible effects on some properties of the juice such as taste, flavor and color, are commonly used for killing microorganisms.In this paper, some properties of kiwi fruit juice under ultrasonic, carbonate and a combination of them has been researched. Those properties include pH, acidity, transparency and Brix. Its impact on microorganisms has been studied as well.The results show that using a combination of carbonate and sonicate make the cavitation more severe without a perceptible effect on nonactivation of microorganisms.Keywords: carbonate, juice, inactivation, ultrasonic
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19592623 Intersectional Bullying, LGBT Youth and the Construction of Power
Authors: Elle Hilke Dominski
Abstract:
This paper explores the impact of intersectional bullying of lesbian, gay, bisexual, transgender (LGBT) youth from a multi-layered experience perspective within bullying incidents at school. Present inclusionary measures at school may not be designed as a continuous process of finding better methods for responding to diversity, rather remain ‘fixed’ as singular solutions applied universally. This paper argues recognizing education through a lens of inclusion begins to realize most educational systems are poorly equipped to handle diversity.
Keywords: Education, inclusion and exclusion, bullying, intersectional bullying, LGBT, power paradigms.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16532622 An Overview of Some High Order and Multi-Level Finite Difference Schemes in Computational Aeroacoustics
Authors: Appanah Rao Appadu, Muhammad Zaid Dauhoo
Abstract:
In this paper, we have combined some spatial derivatives with the optimised time derivative proposed by Tam and Webb in order to approximate the linear advection equation which is given by = 0. Ôêé Ôêé + Ôêé Ôêé x f t u These spatial derivatives are as follows: a standard 7-point 6 th -order central difference scheme (ST7), a standard 9-point 8 th -order central difference scheme (ST9) and optimised schemes designed by Tam and Webb, Lockard et al., Zingg et al., Zhuang and Chen, Bogey and Bailly. Thus, these seven different spatial derivatives have been coupled with the optimised time derivative to obtain seven different finite-difference schemes to approximate the linear advection equation. We have analysed the variation of the modified wavenumber and group velocity, both with respect to the exact wavenumber for each spatial derivative. The problems considered are the 1-D propagation of a Boxcar function, propagation of an initial disturbance consisting of a sine and Gaussian function and the propagation of a Gaussian profile. It is known that the choice of the cfl number affects the quality of results in terms of dissipation and dispersion characteristics. Based on the numerical experiments solved and numerical methods used to approximate the linear advection equation, it is observed in this work, that the quality of results is dependent on the choice of the cfl number, even for optimised numerical methods. The errors from the numerical results have been quantified into dispersion and dissipation using a technique devised by Takacs. Also, the quantity, Exponential Error for Low Dispersion and Low Dissipation, eeldld has been computed from the numerical results. Moreover, based on this work, it has been found that when the quantity, eeldld can be used as a measure of the total error. In particular, the total error is a minimum when the eeldld is a minimum.
Keywords: Optimised time derivative, dissipation, dispersion, cfl number, Nomenclature: k : time step, h : spatial step, β :advection velocity, r: cfl/Courant number, hkrβ= , w =θ, h : exact wave number, n :time level, RPE : Relative phase error per unit time step, AFM :modulus of amplification factor
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16362621 A Novel Steganographic Method for Gray-Level Images
Authors: Ahmad T. Al-Taani, Abdullah M. AL-Issa
Abstract:
In this work we propose a novel Steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by dividing the cover into blocks of equal sizes and then embeds the message in the edge of the block depending on the number of ones in left four bits of the pixel. The proposed approach is tested on a database consists of 100 different images. Experimental results, compared with other methods, showed that the proposed approach hide more large information and gave a good visual quality stego-image that can be seen by human eyes.Keywords: Data Embedding, Cryptography, Watermarking, Steganography, Least Significant Bit, Information Hiding.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22662620 Using Hermite Function for Solving Thomas-Fermi Equation
Authors: F. Bayatbabolghani, K. Parand
Abstract:
In this paper, we propose Hermite collocation method for solving Thomas-Fermi equation that is nonlinear ordinary differential equation on semi-infinite interval. This method reduces the solution of this problem to the solution of a system of algebraic equations. We also present the comparison of this work with solution of other methods that shows the present solution is more accurate and faster convergence in this problem.
Keywords: Collocation method, Hermite function, Semi-infinite, Thomas-Fermi equation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21502619 Evaluation of Texture of Packhams Pears
Authors: Raquel P. F. Guiné, Bruno L. Marques
Abstract:
The textural parameters, together with appearance and flavor, are sensory attributes of great importance for the product to be accepted by the consumer. The objective of the present study was the evaluation of the textural attributes of Packhams pears in the fresh state, after drying in a chamber with forced convection at 50ºC, lyophilized and re-hydrated. In texture analysis it was used the method of Texture Profile Analysis (TPA). The parameters analyzed were hardness, cohesiveness, adhesiveness, elasticity and chewiness. From the results obtained is possible to see that the drying operation greatly affected some textural properties of the pears, so that the hardness diminished very much with drying, for both drying methods.
Keywords: Drying, pear, texture, hardness.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18612618 The Study on Service-oriented Encapsulating Methods of Legacy Systems
Authors: Chao Qi, Xiaoyan Su, Zhan Mao, Xuan Qi
Abstract:
At present, web Service is the first choice to reuse the legacy system for the implementation of SOA. According to the status of the implementation of SOA and the status of the legacy systems, we propose four encapsulating strategies. Base on the strategies, we proposal the service-oriented encapsulating framework, the legacy system can be encapsulated by the service-oriented encapsulating layer in three aspects, communication protocols, data and program. The reuse rate of the legacy systems can be increased by using this frameworkKeywords: Legacy system, service-oriented encapsulating, SOA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15622617 Discontinuous Galerkin Method for Total Variation Minimization on Inpainting Problem
Authors: Xijian Wang
Abstract:
This paper is concerned with the numerical minimization of energy functionals in BV ( ) (the space of bounded variation functions) involving total variation for gray-scale 1-dimensional inpainting problem. Applications are shown by finite element method and discontinuous Galerkin method for total variation minimization. We include the numerical examples which show the different recovery image by these two methods.Keywords: finite element method, discontinuous Galerkin method, total variation minimization, inpainting
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1343