Abstract: A plausible architecture of an ancient genetic code is derived from an extended base triplet vector space over the Galois field of the extended base alphabet {D, G, A, U, C}, where the letter D represent one or more hypothetical bases with unspecific pairing. We hypothesized that the high degeneration of a primeval genetic code with five bases and the gradual origin and improvements of a primitive DNA repair system could make possible the transition from the ancient to the modern genetic code. Our results suggest that the Watson-Crick base pairing and the non-specific base pairing of the hypothetical ancestral base D used to define the sum and product operations are enough features to determine the coding constraints of the primeval and the modern genetic code, as well as the transition from the former to the later. Geometrical and algebraic properties of this vector space reveal that the present codon assignment of the standard genetic code could be induced from a primeval codon assignment. Besides, the Fourier spectrum of the extended DNA genome sequences derived from the multiple sequence alignment suggests that the called period-3 property of the present coding DNA sequences could also exist in the ancient coding DNA sequences.
Abstract: Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, objectbased watermarking schemes are needed for copyright protection. This paper proposes a novel blind object watermarking scheme for images and video using the in place lifting shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy image/video compression (e.g. JPEG, JPEG2000 and MPEG-4), scaling, adding noise, filtering, etc.
Abstract: Spam mails are unwanted mails sent to large number
of users. Spam mails not only consume the network resources, but
cause security threats as well. This paper proposes an efficient
technique to detect, and to prevent spam mail in the sender side rather
than the receiver side. This technique is based on a counter set on the
sender server. When a mail is transmitted to the server, the mail server
checks the number of the recipients based on its counter policy. The
counter policy performed by the mail server is based on some
pre-defined criteria. When the number of recipients exceeds the
counter policy, the mail server discontinues the rest of the process, and
sends a failure mail to sender of the mail; otherwise the mail is
transmitted through the network. By using this technique, the usage of
network resources such as bandwidth, and memory is preserved. The
simulation results in real network show that when the counter is set on
the sender side, the time required for spam mail detection is 100 times
faster than the time the counter is set on the receiver side, and the
network resources are preserved largely compared with other
anti-spam mail techniques in the receiver side.
Abstract: Mobile agents are a powerful approach to develop distributed systems since they migrate to hosts on which they have the resources to execute individual tasks. In a dynamic environment like a peer-to-peer network, Agents have to be generated frequently and dispatched to the network. Thus they will certainly consume a certain amount of bandwidth of each link in the network if there are too many agents migration through one or several links at the same time, they will introduce too much transferring overhead to the links eventually, these links will be busy and indirectly block the network traffic, therefore, there is a need of developing routing algorithms that consider about traffic load. In this paper we seek to create cooperation between a probabilistic manner according to the quality measure of the network traffic situation and the agent's migration decision making to the next hop based on decision tree learning algorithms.
Abstract: This paper presents an efficient VLSI architecture
design to achieve real time video processing using Full-Search Block
Matching (FSBM) algorithm. The design employs parallel bank
architecture with minimum latency, maximum throughput, and full
hardware utilization. We use nine parallel processors in our
architecture and each controlled by a state machine. State machine
control implementation makes the design very simple and cost
effective. The design is implemented using VHDL and the
programming techniques we incorporated makes the design
completely programmable in the sense that the search ranges and the
block sizes can be varied to suit any given requirements. The design
can operate at frequencies up to 36 MHz and it can function in QCIF
and CIF video resolution at 1.46 MHz and 5.86 MHz, respectively.
Abstract: The past decade has seen enormous growth in the amount of software produced. However, given the ever increasing complexity of the software being developed and the concomitant rise in the typical project size, managers are becoming increasingly aware of the importance of issues that influence the productivity levels of the project teams involved. By analyzing the latest release of ISBSG data repository, we report on the factors found to significantly influence the productivity among which average team size and language type are the two most essential ones. Building on this we present an original model for evaluating the potential productivity during the project planning stage.
Abstract: Genome profiling (GP), a genotype based technology, which exploits random PCR and temperature gradient gel electrophoresis, has been successful in identification/classification of organisms. In this technology, spiddos (Species identification dots) and PaSS (Pattern similarity score) were employed for measuring the closeness (or distance) between genomes. Based on the closeness (PaSS), we can buildup phylogenetic trees of the organisms. We noticed that the topology of the tree is rather robust against the experimental fluctuation conveyed by spiddos. This fact was confirmed quantitatively in this study by computer-simulation, providing the limit of the reliability of this highly powerful methodology. As a result, we could demonstrate the effectiveness of the GP approach for identification/classification of organisms.
Abstract: IPsec has now become a standard information security
technology throughout the Internet society. It provides a well-defined
architecture that takes into account confidentiality, authentication,
integrity, secure key exchange and protection mechanism against
replay attack also. For the connectionless security services on packet
basis, IETF IPsec Working Group has standardized two extension
headers (AH&ESP), key exchange and authentication protocols. It is
also working on lightweight key exchange protocol and MIB's for
security management. IPsec technology has been implemented on
various platforms in IPv4 and IPv6, gradually replacing old
application-specific security mechanisms. IPv4 and IPv6 are not
directly compatible, so programs and systems designed to one
standard can not communicate with those designed to the other. We
propose the design and implementation of controlled Internet security
system, which is IPsec-based Internet information security system in
IPv4/IPv6 network and also we show the data of performance
measurement. With the features like improved scalability and
routing, security, ease-of-configuration, and higher performance of
IPv6, the controlled Internet security system provides consistent
security policy and integrated security management on IPsec-based
Internet security system.
Abstract: Nonlinear and unbalance loads in three phase
networks create harmonics and losses. Active and passive filters are
used for elimination or reduction of these effects. Passive filters have
some limitations. For example, they are designed only for a specific
frequency and they may cause to resonance in the network at the
point of common coupling. The other drawback of a passive filter is
that the sizes of required elements are normally large. The active
filter can improve some of limitations of passive filter for example;
they can eliminate more than one harmonic and don't cause resonance
in the network. In this paper inverter analysis have been done
simultaneously in three phase and the RL impedance of the line have
been considered. A sliding mode control based on energy feedback of
capacitors is employed in the design with this method, the dynamic
speed of the filter is improved effectively and harmonics and load
unbalance is compensating quickly.
Abstract: Nowadays, financial and economic crises are growing
more and reach more countries and sectors. These events have, as a
result, a considerable impact on the activities of the firms which think
unstable and in danger.
But besides this heavy uncertainty which weighs on the different
firms, the family firm, object of our research, is not only confronted
with these external difficulties but also with an internal challenge and
of size: that of transmission. Indeed, the transmission of an
organization from one generation to another can succeed as it can
fail; leaving considerable damage.
Our research registers as part of these problems since we tried to
understand relation between the behavior of two main actors of the
process of succession, predecessor and successor; and the success of
transmission.
Abstract: Recently, permeable breakwaters have been suggested to overcome the disadvantages of fully protection breakwaters. These protection structures have minor impacts on the coastal environment and neighboring beaches where they provide a more economical protection from waves and currents. For regular waves, a numerical model is used (FLOW-3D, VOF) to investigate the hydraulic performance of a permeable breakwater. The model of permeable breakwater consists of a pair of identical vertical slotted walls with an impermeable upper and lower part, where the draft is a decimal multiple of the total depth. The middle part is permeable with a porosity of 50%. The second barrier is located at distant of 0.5 and 1.5 of the water depth from the first one. The numerical model is validated by comparisons with previous laboratory data and semi-analytical results of the same model. A good agreement between the numerical results and both laboratory data and semi-analytical results has been shown and the results indicate the applicability of the numerical model to reproduce most of the important features of the interaction. Through the numerical investigation, the friction factor of the model is carefully discussed.
Abstract: An important structuring mechanism for knowledge bases is building clusters based on the content of their knowledge objects. The objects are clustered based on the principle of maximizing the intraclass similarity and minimizing the interclass similarity. Clustering can also facilitate taxonomy formation, that is, the organization of observations into a hierarchy of classes that group similar events together. Hierarchical representation allows us to easily manage the complexity of knowledge, to view the knowledge at different levels of details, and to focus our attention on the interesting aspects only. One of such efficient and easy to understand systems is Hierarchical Production rule (HPRs) system. A HPR, a standard production rule augmented with generality and specificity information, is of the following form Decision If < condition> Generality Specificity . HPRs systems are capable of handling taxonomical structures inherent in the knowledge about the real world. In this paper, a set of related HPRs is called a cluster and is represented by a HPR-tree. This paper discusses an algorithm based on cumulative learning scenario for dynamic structuring of clusters. The proposed scheme incrementally incorporates new knowledge into the set of clusters from the previous episodes and also maintains summary of clusters as Synopsis to be used in the future episodes. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested incremental structuring of clusters would be useful in mining data streams.
Abstract: This paper presents a comparison between Spectrum-
Sliced Wavelength Division Multiplexing (SS-WDM) and Spectrum
Amplitude Coding Optical Code Division Multiple Access (SAC
Optical CDMA) systems for different light sources. The performance
of the system is shown in the simulated results of the bit error rate
(BER) and the eye diagram of both systems. The comparison results
indicate that the Multiple Access Interference (MAI) effects have a
significant impact on SS-WDM over SAC Optical CDMA systems.
Finally, in terms of spectral efficiency at constant BER of 10-12, SSWDM
offers higher spectral efficiency than optical CDMA since no
bandwidth expansion in needed.
Abstract: Antifungal activities of ether and methanolic extracts of volatiles oils of Nigella Sativa seeds were tested against pathogenic bacterias and fungies strains.The volatile oil were found to have significant antifungal and antibacterial activities compare to tetracycline, cefuroxime and ciprofloxacin positive controls.The ether and methanolic esxtracts were compared to each other for antifungal and antibacterial activities and ether extracts showed stonger activity than methanolic one.
Abstract: In order to evaluation the effects of natural, biological
and chemical fertilizers on grain yield and chickpea quality, field
experiments were carried out in 2007 and 2008 growing seasons. In
this research the effects of different organic, chemical and biological
fertilizers were investigated on grain yield and quality of chickpea.
Experimental units were arranged in split-split plots based on
randomized complete blocks with three replications. The highest
amounts of yield and yield components were obtained in G1×N5
interaction. Significant increasing of N, P, K, Fe and Mg content in
leaves and grains emphasized on superiority of mentioned treatment
because each one of these nutrients has an approved role in
chlorophyll synthesis and photosynthesis ability of the crop. The
combined application of compost, farmyard manure and chemical
phosphorus (N5) had the best grain quality due to high protein, starch
and total sugar contents, low crude fiber and reduced cooking time.
Abstract: Chatter vibration has been a troublesome problem
for a machine tool toward the high precision and high speed machining.
Essentially, the machining performance is determined by the dynamic
characteristics of the machine tool structure and dynamics of cutting
process, which can further be identified in terms of the stability lobe
diagram. Therefore, realization on the machine tool dynamic behavior
can help to enhance the cutting stability. To assess the dynamic
characteristics and machining stability of a vertical milling system
under the influence of a linear guide, this study developed a finite
element model integrated the modeling of linear components with the
implementation of contact stiffness at the rolling interface. Both the
finite element simulations and experimental measurements reveal that
the linear guide with different preload greatly affects the vibration
behavior and milling stability of the vertical column spindle head
system, which also clearly indicate that the predictions of the
machining stability agree well with the cutting tests. It is believed that
the proposed model can be successfully applied to evaluate the
dynamics performance of machine tool systems of various
configurations.
Abstract: Power system stabilizers (PSS) must be capable of providing appropriate stabilization signals over a broad range of
operating conditions and disturbance. Traditional PSS rely on robust
linear design method in an attempt to cover a wider range of operating
condition. Expert or rule-based controllers have also been proposed.
Recently fuzzy logic (FL) as a novel robust control
design method has shown promising results. The emphasis in fuzzy
control design center is around uncertainties in the system parameters
& operating conditions. In this paper a novel Robust Fuzzy Logic Power
System Stabilizer (RFLPSS) design is proposed The RFLPSS
basically utilizes only one measurable Δω signal as input
(generator shaft speed).
The speed signal is discretized resulting in three inputs to the
RFLPSS. There are six rules for the fuzzification and two rules for
defuzzification. To provide robustness, additional signal namely,
speed are used as inputs to RFLPSS enabling appropriate gain
adjustments for the three RFLPSS inputs. Simulation studies
show the superior performance of the RFLPSS compared
with an optimally designed conventional PSS and discrete mode FLPSS.
Abstract: Digital Video Terrestrial Broadcasting (DVB-T)
allows combining broadcasting, telephone and data services in one
network. It has facilitated mobile TV broadcasting. Mobile TV
broadcasting is dominated by fragmentation of standards in use in
different continents. In Asia T-DMB and ISDB-T are used while
Europe uses mainly DVB-H and in USA it is MediaFLO. Issues of
royalty for developers of these different incompatible technologies,
investments made and differing local conditions shall make it
difficult to agree on a unified standard in a very near future. Despite
this shortcoming, mobile TV has shown very good market potential.
There are a number of challenges that still exist for regulators,
investors and technology developers but the future looks bright.
There is need for mobile telephone operators to cooperate with
content providers and those operating terrestrial digital broadcasting
infrastructure for mutual benefit.
Abstract: As we make progressive products for good works, and
future industries want to get higher speed and resolution from various
developments in the robotics as well as precise control system, the
concept of control feedback is getting more important. Within a range
of industrial developments, the concept is most responsible for the
high reliability of a device. We explain an efficient analyzing method
of a rotary encoder such as an incremental type encoder and absolute
type encoder using the LabVIEW program
Abstract: Under the difficult access to finance of SMEs, they expect that its relationship with the banks shall constitute a real help to access appropriate financing, at reasonable costs and requirements, given the possibility of mutually beneficial and long lasting relation. The literature, but also the research we have carried on, is centered on such determinants as concentration and the length of the relationship, but at the same time, there is little certainty that banks are responding positively to them. Furthermore, although the trust is considered as being a fundamental element of bank relationship – see the case house bank – SMEs find that the banks finance them looking rather on collaterals and covenants than to trust. Moreover, a positive behavior, such as prompt or advance repayments of loans, doesn-t generate any positive feedback from the banks side. All these show a deep un-satisfaction of the SMEs concerning their relationship banking.