Abstract: The plant world is the source of many medicines.
Recently, researchers have estimated that there are approximately
400,000 plant species worldwide, of which about a quarter or a third
have been used by societies for medicinal purposes. The human uses
of plants for thousands of years to treat various ailments, in many
developing countries, much of the population trust in traditional
doctors and their collections of medicinal plants to treat them.
Essential oils have many therapeutic properties. In herbal medicine,
they are used for their antiseptic properties against infectious
diseases of fungal origin, against dermatophytes, those of bacterial
origin. The aim of our study is to determine the antimicrobial effect
of essential oils of the plant Trigonella focnum greacum on some
pathogenic bacteria, it is a medicinal plant used in traditional
therapy. The test adopted is based on the diffusion method on solid
medium (Antibiogram), this method determines the sensitivity or
resistance of a microorganism vis-à-vis the extract studied. Our study
reveals that the essential oil of the plant Trigonella focnum greacum
has a different effect on the resistance of germs. For staphiloccocus
Pseudomonnas aeroginosa and Krebsilla, are moderately sensitive
strains, also Escherichia coli and Candida albicans represents a high
sensitivity. By against Proteus is a strain that represents a weak
sensitivity.
Abstract: Nodes in mobile Ad Hoc Network (MANET) do not
rely on a central infrastructure but relay packets originated by other
nodes. Mobile ad hoc networks can work properly only if the
participating nodes collaborate in routing and forwarding. For
individual nodes it might be advantageous not to collaborate, though.
In this conceptual paper we propose a new approach based on
relationship among the nodes which makes them to cooperate in an
Adhoc environment. The trust unit is used to calculate the trust
values of each node in the network. The calculated trust values are
being used by the relationship estimator to determine the relationship
status of nodes. The proposed enhanced protocol was compared with
the standard DSR protocol and the results are analyzed using the
network simulator-2.
Abstract: Traditional principal components analysis (PCA)
techniques for face recognition are based on batch-mode training
using a pre-available image set. Real world applications require that
the training set be dynamic of evolving nature where within the
framework of continuous learning, new training images are
continuously added to the original set; this would trigger a costly
continuous re-computation of the eigen space representation via
repeating an entire batch-based training that includes the old and new
images. Incremental PCA methods allow adding new images and
updating the PCA representation. In this paper, two incremental
PCA approaches, CCIPCA and IPCA, are examined and compared.
Besides, different learning and testing strategies are proposed and
applied to the two algorithms. The results suggest that batch PCA is
inferior to both incremental approaches, and that all CCIPCAs are
practically equivalent.
Abstract: Cosmic showers, from their places of origin in space,
after entering earth generate secondary particles called Extensive Air
Shower (EAS). Detection and analysis of EAS and similar High
Energy Particle Showers involve a plethora of experimental setups
with certain constraints for which soft-computational tools like
Artificial Neural Network (ANN)s can be adopted. The optimality
of ANN classifiers can be enhanced further by the use of Multiple
Classifier System (MCS) and certain data - dimension reduction
techniques. This work describes the performance of certain data
dimension reduction techniques like Principal Component Analysis
(PCA), Independent Component Analysis (ICA) and Self Organizing
Map (SOM) approximators for application with an MCS formed
using Multi Layer Perceptron (MLP), Recurrent Neural Network
(RNN) and Probabilistic Neural Network (PNN). The data inputs are
obtained from an array of detectors placed in a circular arrangement
resembling a practical detector grid which have a higher dimension
and greater correlation among themselves. The PCA, ICA and SOM
blocks reduce the correlation and generate a form suitable for real
time practical applications for prediction of primary energy and
location of EAS from density values captured using detectors in a
circular grid.
Abstract: Mobile ad-hoc networks (MANETs) are a form of
wireless networks which do not require a base station for providing
network connectivity. Mobile ad-hoc networks have many
characteristics which distinguish them from other wireless networks
which make routing in such networks a challenging task. Cluster
based routing is one of the routing schemes for MANETs in which
various clusters of mobile nodes are formed with each cluster having
its own clusterhead which is responsible for routing among clusters.
In this paper we have proposed and implemented a distributed
weighted clustering algorithm for MANETs. This approach is based
on combined weight metric that takes into account several system
parameters like the node degree, transmission range, energy and
mobility of the nodes. We have evaluated the performance of
proposed scheme through simulation in various network situations.
Simulation results show that proposed scheme outperforms the
original distributed weighted clustering algorithm (DWCA).
Abstract: This paper presents an integrated model that
automatically measures the change of rivers, damage area of bridge
surroundings, and change of vegetation. The proposed model is on the
basis of a neurofuzzy mechanism enhanced by SOM optimization
algorithm, and also includes three functions to deal with river imagery.
High resolution imagery from FORMOSAT-2 satellite taken before
and after the invasion period is adopted. By randomly selecting a
bridge out of 129 destroyed bridges, the recognition results show that
the average width has increased 66%. The ruined segment of the
bridge is located exactly at the most scour region. The vegetation
coverage has also reduced to nearly 90% of the original. The results
yielded from the proposed model demonstrate a pinpoint accuracy rate
at 99.94%. This study brings up a successful tool not only for
large-scale damage assessment but for precise measurement to
disasters.
Abstract: The objective of this paper is twofold: (1) discuss and
analyze the successful case studies worldwide, and (2) identify the
similarities and differences of case studies worldwide. Design
methodology/approach: The nature of this research is mainly method
qualitative (multi-case studies, literature review). This investigation
uses ten case studies, and the data was mainly collected and
organizational documents from the international countries. Finding:
The finding of this research can help incubator manager, policy
maker and government parties for successful implementation.
Originality/value: This paper contributes to the current literate review
on the best practices worldwide. Additionally, it presents future
perspective for academicians and practitioners.
Abstract: This paper deals with the evaluation of flow properties
of polymeric matrix with natural animal fillers. Technical university
of Liberec cooperates on the long-term development of “green
materials“ that should replace conventionally used materials
(especially in automotive industry). Natural fibres (of animal and
plant origin) from all over the world are collected and adapted
(drying, cutting etc.) for extrusion processing. Inside the extruder
these natural additives are blended with polymeric (synthetic and
biodegradable - PLA) matrix and created compound is subsequently
cut for pellets in the wet way. These green materials with unique
recipes are then studied and their mechanical, physical and
processing properties are determined. The main goal of this research
is to develop new ecological materials very similar to unfilled
polymers. In this article the rheological behaviour of chosen natural
animal fibres is introduced considering their shape and surface that
were observed with use of SEM microscopy.
Abstract: A Picard-Newton iteration method is studied to accelerate the numerical solution procedure of a class of two-dimensional nonlinear coupled parabolic-hyperbolic system. The Picard-Newton iteration is designed by adding higher-order terms of small quantity to an existing Picard iteration. The discrete functional analysis and inductive hypothesis reasoning techniques are used to overcome difficulties coming from nonlinearity and coupling, and theoretical analysis is made for the convergence and approximation properties of the iteration scheme. The Picard-Newton iteration has a quadratic convergent ratio, and its solution has second order spatial approximation and first order temporal approximation to the exact solution of the original problem. Numerical tests verify the results of the theoretical analysis, and show the Picard-Newton iteration is more efficient than the Picard iteration.
Abstract: Assessment for image quality traditionally needs its
original image as a reference. The conventional method for assessment
like Mean Square Error (MSE) or Peak Signal to Noise Ratio (PSNR)
is invalid when there is no reference. In this paper, we present a new
No-Reference (NR) assessment of image quality using blur and noise.
The recent camera applications provide high quality images by help of
digital Image Signal Processor (ISP). Since the images taken by the
high performance of digital camera have few blocking and ringing
artifacts, we only focus on the blur and noise for predicting the
objective image quality. The experimental results show that the
proposed assessment method gives high correlation with subjective
Difference Mean Opinion Score (DMOS). Furthermore, the proposed
method provides very low computational load in spatial domain and
similar extraction of characteristics to human perceptional assessment.
Abstract: One of the most growing areas in the embedded community is multimedia devices. Multimedia devices incorporate a number of complicated functions for their operation, like motion estimation. A multitude of different implementations have been proposed to reduce motion estimation complexity, such as spiral search. We have studied the implementations of spiral search and identified areas of improvement. We propose a modified spiral search algorithm, with lower computational complexity compared to the original spiral search. We have implemented our algorithm on an embedded ARM based architecture, with custom memory hierarchy. The resulting system yields energy consumption reduction up to 64% and performance increase up to 77%, with a small penalty of 2.3 dB, in average, of video quality compared with the original spiral search algorithm.
Abstract: The charnockitic and associated granitic rocks of Akure area were studied for their field and petrographic relationship's. The outcrops locations were plotted in Surfer 8. The granitic rock exhibits a porphyritic texture and outcrops in the north-eastern side of the study area while the charnockitics outcrop in the central/western part. An essentially dark coloured and fine grained intrusive exhibiting xenoliths and xenocrysts (plagioclase phenocrysts) of the granite outcrops between the granitic and charnockitic rocks. Mineralogically, the central rock combines the content of the other two indicating that it is most likely a product of their hybridization. The charnockitic magma is believed to have intruded and assimilated the granite substantially thereby contaminating itself and consequently emplacing the hybrid. The presented model of emplacement elucidates the hybridization proposal. Conclusively, the charnockitics are believed to be (a) younger than the granite, (b) of Pan-African age and (c) of igneous origin.
Abstract: A multi-rate discrete-time model, whose response
agrees exactly with that of a continuous-time original at all sampling
instants for any sampling periods, is developed for a linear system,
which is assumed to have multiple real eigenvalues. The sampling
rates can be chosen arbitrarily and individually, so that their ratios
can even be irrational. The state space model is obtained as a
combination of a linear diagonal state equation and a nonlinear output
equation. Unlike the usual lifted model, the order of the proposed
model is the same as the number of sampling rates, which is less than
or equal to the order of the original continuous-time system. The
method is based on a nonlinear variable transformation, which can be
considered as a generalization of linear similarity transformation,
which cannot be applied to systems with multiple eigenvalues in
general. An example and its simulation result show that the proposed
multi-rate model gives exact responses at all sampling instants.
Abstract: We report a novel fusion tag for expressing
recombinant proteins in E. coli. The fusion tag is the C-terminus part
of the human GMCSF gene comprising 45 amino acids, which aid in
over expression of otherwise non expressible genes. Expression of
hIFN a2b with this fusion tag also escapes the requirement of rare
codons for expression. This is also a first report of a small fusion tag
of human origin having affinity to heparin sepharose column
facilitating the purification of fusion protein.
Abstract: Wheat has a bimodal starch granule population and the dependency of the rate of enzymatic hydrolysis on particle size has been investigated. Ungelatinised wheaten starch granules were separated into two populations by sedimentation and decantation. Particle size was analysed by laser diffraction and morphological characteristics were viewed using SEM. The sedimentation technique though lengthy, gave satisfactory separation of the granules. Samples (10μm and original) were digested with a-amylase using a dialysis model. Granules of 10μm (p10μm. Moreover, the digestion rate was dependent on particle size whereby smaller granules produced higher rate of release. The methodology and results reported here can be used as a basis for further evaluations designed to delay the release of glucose during the digestion of native starches.
Abstract: This paper describes a method of signal process applied
on an end effects of Hilbert-Huang transform (HHT) to provide an
improvement in the reality of spectrum. The method is based on
back-propagation network (BPN). To improve the effect, the end
extension of the original signal is obtained by back-propagation
network. A full waveform including origin and its extension is
decomposed by using empirical mode decomposition (EMD) to obtain
intrinsic mode functions (IMFs) of the waveform. Then, the Hilbert
transform (HT) is applied to the IMFs to obtain the Hilbert spectrum of
the waveform. As a result, the method is superiority of the processing
of end effect of HHT to obtain the real frequency spectrum of signals.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: We study different types of aggregation operators and
the decision making process with minimization of regret. We analyze
the original work developed by Savage and the recent work
developed by Yager that generalizes the MMR method creating a
parameterized family of minimal regret methods by using the ordered
weighted averaging (OWA) operator. We suggest a new method that
uses different types of geometric operators such as the weighted
geometric mean or the ordered weighted geometric operator (OWG)
to generalize the MMR method obtaining a new parameterized family
of minimal regret methods. The main result obtained in this method
is that it allows to aggregate negative numbers in the OWG operator.
Finally, we give an illustrative example.
Abstract: In this paper the development of a software to
encrypt messages with asymmetric cryptography is presented. In
particular, is used the RSA (Rivest, Shamir and Adleman) algorithm
to encrypt alphanumeric information. The software allows to
generate different public keys from two prime numbers provided by
the user, the user must then select a public-key to generate the
corresponding private-key. To encrypt the information, the user must
provide the public-key of the recipient as well as the message to be
encrypted. The generated ciphertext can be sent through an insecure
channel, so that would be very difficult to be interpreted by an
intruder or attacker. At the end of the communication, the recipient
can decrypt the original message if provide his/her public-key and
his/her corresponding private-key.
Abstract: In illumination variant face recognition, existing
methods extracting face albedo as light normalized image may lead to
loss of extensive facial details, with light template discarded. To
improve that, a novel approach for realistic facial texture
reconstruction by combining original image and albedo image is
proposed. First, light subspaces of different identities are established
from the given reference face images; then by projecting the original
and albedo image into each light subspace respectively, texture
reference images with corresponding lighting are reconstructed and
two texture subspaces are formed. According to the projections in
texture subspaces, facial texture with normal light can be synthesized.
Due to the combination of original image, facial details can be
preserved with face albedo. In addition, image partition is applied to
improve the synthesization performance. Experiments on Yale B and
CMUPIE databases demonstrate that this algorithm outperforms the
others both in image representation and in face recognition.