Advanced Materials Research
Vol. 414
Vol. 414
Advanced Materials Research
Vol. 413
Vol. 413
Advanced Materials Research
Vol. 412
Vol. 412
Advanced Materials Research
Vol. 411
Vol. 411
Advanced Materials Research
Vol. 410
Vol. 410
Advanced Materials Research
Vol. 409
Vol. 409
Advanced Materials Research
Vols. 403-408
Vols. 403-408
Advanced Materials Research
Vol. 402
Vol. 402
Advanced Materials Research
Vols. 399-401
Vols. 399-401
Advanced Materials Research
Vols. 396-398
Vols. 396-398
Advanced Materials Research
Vols. 393-395
Vols. 393-395
Advanced Materials Research
Vols. 391-392
Vols. 391-392
Advanced Materials Research
Vols. 383-390
Vols. 383-390
Advanced Materials Research Vols. 403-408
Paper Title Page
Abstract: In this paper, Data Mining is applied to develop the idea of directing an industrial process to be placed in a better state of operation, so the efficiency would be increased. A clustering algorithm, (Modified K-Means) is used to determine the patterns of interest, i.e. the nearest operating state in the history of the process data, on which the efficiency is higher than the current state of the process. Then, like what happens in a decision support mechanism, controllable variable of the current operating state is suggested to be changed to meet the ones of the desired pattern
942
Abstract: The trend in industrial control has been to reduce the communications wiring across a plant. Eliminating the cabled connection between a sensors and a host computer enhances the performances and the manageability of a data acquisition system. Through the use of Bluetooth technology the data acquisition components can be paired with a wide variety of pre-existing devices. This makes the host computer portable, cheaper and versatile. Data is collected from the sensors by a microcontroller with an attached Bluetooth module, which transmits the data to a host computer for processing. Costs are reduced by making use of pre-existing processing power and display on the host computer. Depending on the application the data can be processed in any way required on the host computer. This paper describes the practical design of Bluetooth based 12- Channel temperatures acquisition system which contains remote temperature sensors connected to a microcontroller which controls also the Bluetooth module transmission, and a computer connected to a Bluetooth adapter. In this way, the sensors data are collected and processed by the microcontroller, transmitted via Bluetooth to a host computer which monitoring and recording the temperatures measurements.
948
Abstract: This paper presents a web base multicriteria group decision support system for evaluating information security policy decision making with respect to Indian e-government system. This study first proposes a rational-political group decision-making model which identifies three uncertain factors involved in a group decision-making process: decision maker’s roles in a group reaching a satisfactory solution, preferences for alternatives and judgments for assessment criteria. Based on the model, a linguistic term oriented multi criteria group decision-making method is developed. The method uses general fuzzy number to deal with the three uncertain factors described by linguistic terms and aggregates these factors into a group satisfactory decision that is in a most acceptable degree of the group. Moreover, this study implements the method by developing a web-based group decision support system. This system allows decision makers to participate a group decision-making through the web, and manages the group decision-making process as a whole, from criteria generation, alternative evaluation, opinions interaction to decision aggregation. An information security decision making problem is presented to demonstrate the effectiveness of the approach.
954
Abstract: The digital information revolution has brought important changes in our society and life. Nowadays, large amount of data is transmitted over the network and if the data that is being transmitted is important, one should use secure technique like steganography to transmit it. Steganography is a method of hiding a secret message in a cover media such as text, image, audio etc. in a way that hides the existence of the secret data. This paper introduces new method for audio steganography. The proposed method works on the basis of low bit blind encoding scheme which is used to embed secret data into non-silent samples of wav audio file. Robustness and performance of the proposed scheme is investigated by performing experiments on different audio signals.
963
Abstract: Simultaneous masking is when a sound is made inaudible by a masker, a noise or unwanted sound of the same duration as the original sound. An innovative approach is investigated for speech processing in cochlea. Differently from the traditional filter-bank spectral analysis strategies, the proposed method analyses the speech signal by means of the wavelet packets. Splitting the speech signal by filtering and down sampling at each decomposition level, using wavelet packets with different wavelet functions, helps to shrink the effect of simultaneous masking. The performance of the proposed method is experimentally evaluated with vowel-consonant-vowel -syllables for fifteen English consonants. The dichotic presentation of processed speech signals effectively reduces the simultaneous masking through which it improves auditory perception.
970
Abstract: A geographic information system (GIS), or geospatial information system is any system that captures, stores, analyzes, manages, and presents data that are linked to location(s). GIS is the merging of cartography, statistical analysis, and database technology, natural resource management, precision agriculture, photogrammetric, urban planning, emergency management, navigation, aerial video, and localized search engines.Today the concept of GIS is widely used in different areas of research and mankind. The disaster management systems are most based on GIS today, and the core idea of those systems is the past earthquake experiences. Remote sensing image processing can help government assess earthquake damage quickly. Taking this technology integrated with the quondam system can improve the assessment’s precision of this kind of system. In this paper, we discuss a method which quickly evaluates the earthquake damage. Firstly, we discuss different cases and quick evaluation of earthquake damage by means of GIS based system. Secondly, analyzes the result by quick assessment. Thirdly, integrating the image processing module with the old system to get the new system, in which the assessment’s precision can be improved.
976
Abstract: Cognition and Communication are two processes that are interrelated through the sciences Noology and Electronics. Cybernetics is the art and science of understanding, which connects these two sciences together. In an age where human rights are inclusive of transformation of a human as a Cyborg, man and machine are closely working together, where machine intelligence means connecting machines with Noosphere. As we all know the basic difference between human beings and animals are with respect to thinking, where humans are more endowed with divine qualities and powers, which are controlled through the Words. Humans are also involved in the creation of the Words through their creative abilities. This paper aims to describe an idea about the communication and control through an invisible media known as Noosphere, where exchange of Words, generation of Words, rearrangement of Words, elimination of Words and modification of Words are done in the Heart and we inform the world about the invention of the Word. We use a methodology of analogous comparison with the communication through the Electromagnetic waves over a perfect conductor, where the media is a perfect conductor of words known as Holy Spirit. It also uses an analogy with electrons. This paper can be considered as a key paper related with Control, Cybernetics, Noology and Electronics, which gives the ultimate in all communication technologies and the ultimate status of Noosphere prophesied by intellectuals, through which Cybernetics can be raised to its original thought as the Science of Government, without any fear about unscrupulous Governments. This paper discusses how power is controlled through words and explains the weirdness in Control, Electronics, Computer Communications, and the Cyberspace communications. The communication system developed through this media can be called as Sky Mail or S-MAIL.
982
Abstract: MANETS is a kind of ad-hoc network which is continuously changing and not predictable. The nodes in this kind of network are mobile and reorganize themselves randomly. Mobility of these nodes keeps changing from time to time. These nodes are connected using wireless connections to form an ad-hoc network called VANETS. In VANETS (vehicular ad-hoc network) the mobile nodes are vehicles which are equipped with their own resources to carry out the communication (like power, software etc). This paper deals with analyzing the vulnerabilities of VANETS and achieving data integrity and security by providing some authentic means of communication and standards. It describes a protocol which provides prevention against malicious node and how the network reacts in the presence of the malicious node. Using the concept of reliability tables, the paper describes a methodology to dynamically re-create a new route whenever a malicious node is interfaced thus achieving data integrity and security.
994
Abstract: Current Classification algorithms require large amounts of data to be stored enduringly in the memory for long assortment and amount of time. Diverse classification techniques had been already proposed in the literature for both in the run of the mill environment and distributed environment. Mining of decision trees in the distributed environment can be able to handle the large amount of data but with high communication cost. A new distributed communication decision tree algorithm is proposed here which reduces the communication cost for the transmission of the data in the distributed and heterogeneous environment.
1002
Abstract: In this paper, we put forward a technique for keeping web pages up-to-date, later used by search engine to serve the end user queries. A major part of the Web is dynamic and hence, a need arises to constantly update the changed web documents in search engine’s repository. In this paper we used the client-server architecture for crawling the web and propose a technique for detecting changes in web page based on the content of the images present if any in web documents. Once it is being identified that the image embedded in the web document is changed then the previous copy of the web document present in the search engine’s database/repository is replaced with the changed one.
1008