Abstract: The householder RLS (HRLS) algorithm is an O(N2)
algorithm which recursively updates an arbitrary square-root of the
input data correlation matrix and naturally provides the LS weight
vector. A data dependent householder matrix is applied for such
an update. In this paper a recursive estimate of the eigenvalue
spread and misalignment of the algorithm is presented at a very low
computational cost. Misalignment is found to be highly sensitive to
the eigenvalue spread of input signals, output noise of the system and
exponential window. Simulation results show noticeable degradation
in the misalignment by increase in eigenvalue spread as well as
system-s output noise, while exponential window was kept constant.
Abstract: Periphyton development and composition were
studied in three different treatments: (i) two fishpond units of
wetland-type wastewater treatment pond systems, (ii) two fishponds
in combined intensive-extensive fish farming systems and (iii) three
traditional polyculture fishponds. Results showed that amounts of
periphyton developed in traditional polyculture fishponds (iii) were
different compared to the other treatments (i and ii), where the main
function of ponds was stated wastewater treatment. Negative
correlation was also observable between water quality parameters
and periphyton production. The lower trophity, halobity and
saprobity level of ponds indicated higher amount of periphyton. The
dry matter content of periphyton was significantly higher in the
samples, which were developed in traditional polyculture fishponds
(2.84±3.02 g m-2 day-1, whereby the ash content in dry matter 74%),
than samples taken from (i) (1.60±2.32 g m-2 day-1, 61%) and (ii)
fishponds (0.65±0.45 g m-2 day-1, 81%).
Abstract: Sensor Network are emerging as a new tool for
important application in diverse fields like military surveillance,
habitat monitoring, weather, home electrical appliances and others.
Technically, sensor network nodes are limited in respect to energy
supply, computational capacity and communication bandwidth. In
order to prolong the lifetime of the sensor nodes, designing efficient
routing protocol is very critical. In this paper, we illustrate the
existing routing protocol for wireless sensor network using data
centric approach and present performance analysis of these protocols.
The paper focuses in the performance analysis of specific protocol
namely Directed Diffusion and SPIN. This analysis reveals that the
energy usage is important features which need to be taken into
consideration while designing routing protocol for wireless sensor
network.
Abstract: The mechanical deformation and the electrical conductivity of lanthanum strontium cobalt ferrite oxide under uniaxial compression were investigated at various temperatures up to 1073 K. The material reveals a rather complex mechanical behaviour related to its ferroelasticity and completely different stress-strain curves are obtained during the 1st and 2nd loading cycles. A distinctive ferroelastic creep was observed at 293 K whilst typical ferroelastic stress-strain curve were obtained in the temperature range from 473 K to 873 K. At 1073 K, on the other hand, high-temperature creep deformation was observed instead of ferroelastic deformation. The conductivity increases with increasing compressive stress at all the temperatures. The increase in conductivity is related to both geometrical and piezoelectric effects. From 293 K to 873 K, where the material exhibits ferroelastic behaviour, the variation in the total conductivity decreases with increasing temperature. The contribution of the piezoelectric effect to the total conductivity variation also decreases with increasing temperature and the maximum in piezoconductivity has a value of about 0.75 % at 293 K for a compressive stress of 100 MPa. There is no effect of domain switching on conductivity except for the geometric effect. At 1073 K, the conductivity is simply proportional to the compressive strain.
Abstract: The Navier Stokes Equations (NSE) for an incompressible fluid of variable viscosity in the presence of an unknown external force in Von-Mises system x,\ are transformed, and some new exact solutions for a class of flows characterized by equation y f x a\b for an arbitrary state equation are determined, where f x is a function, \ the stream function, a z 0 and b are the arbitrary constants. In three, out of four cases, the function f x is arbitrary, and the solutions are the solutions of the flow equations for all the flows characterized by the equationy f x a\b. Streamline patterns for some forms of f x in unbounded and bounded regions are given.
Abstract: In this paper we propose a method which improves the efficiency of video coding. Our method combines an adaptive GOP (group of pictures) structure and the shot cut detection. We have analyzed different approaches for shot cut detection with aim to choose the most appropriate one. The next step is to situate N frames to the positions of detected cuts during the process of video encoding. Finally the efficiency of the proposed method is confirmed by simulations and the obtained results are compared with fixed GOP structures of sizes 4, 8, 12, 16, 32, 64, 128 and GOP structure with length of entire video. Proposed method achieved the gain in bit rate from 0.37% to 50.59%, while providing PSNR (Peak Signal-to-Noise Ratio) gain from 1.33% to 0.26% in comparison to simulated fixed GOP structures.
Abstract: The balancing numbers are natural numbers n satisfying
the Diophantine equation 1 + 2 + 3 + · · · + (n - 1) = (n + 1) +
(n + 2) + · · · + (n + r); r is the balancer corresponding to the
balancing number n.The nth balancing number is denoted by Bn
and the sequence {Bn}1
n=1 satisfies the recurrence relation Bn+1 =
6Bn-Bn-1. The balancing numbers posses some curious properties,
some like Fibonacci numbers and some others are more interesting.
This paper is a study of recurrent sequence {xn}1
n=1 satisfying the
recurrence relation xn+1 = Axn - Bxn-1 and possessing some
curious properties like the balancing numbers.
Abstract: Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.
Abstract: When binary decision diagrams are formed from
uniformly distributed Monte Carlo data for a large number of
variables, the complexity of the decision diagrams exhibits a
predictable relationship to the number of variables and minterms. In
the present work, a neural network model has been used to analyze the
pattern of shortest path length for larger number of Monte Carlo data
points. The neural model shows a strong descriptive power for the
ISCAS benchmark data with an RMS error of 0.102 for the shortest
path length complexity. Therefore, the model can be considered as a
method of predicting path length complexities; this is expected to lead
to minimum time complexity of very large-scale integrated circuitries
and related computer-aided design tools that use binary decision
diagrams.
Abstract: Digital watermarking is one of the techniques for
copyright protection. In this paper, a normalization-based robust
image watermarking scheme which encompasses singular value
decomposition (SVD) and discrete cosine transform (DCT)
techniques is proposed. For the proposed scheme, the host image is
first normalized to a standard form and divided into non-overlapping
image blocks. SVD is applied to each block. By concatenating the
first singular values (SV) of adjacent blocks of the normalized image,
a SV block is obtained. DCT is then carried out on the SV blocks to
produce SVD-DCT blocks. A watermark bit is embedded in the highfrequency
band of a SVD-DCT block by imposing a particular
relationship between two pseudo-randomly selected DCT
coefficients. An adaptive frequency mask is used to adjust local
watermark embedding strength. Watermark extraction involves
mainly the inverse process. The watermark extracting method is blind
and efficient. Experimental results show that the quality degradation
of watermarked image caused by the embedded watermark is visually
transparent. Results also show that the proposed scheme is robust
against various image processing operations and geometric attacks.
Abstract: Structural representation and technology mapping of
a Boolean function is an important problem in the design of nonregenerative
digital logic circuits (also called combinational logic
circuits). Library aware function manipulation offers a solution to
this problem. Compact multi-level representation of binary networks,
based on simple circuit structures, such as AND-Inverter Graphs
(AIG) [1] [5], NAND Graphs, OR-Inverter Graphs (OIG), AND-OR
Graphs (AOG), AND-OR-Inverter Graphs (AOIG), AND-XORInverter
Graphs, Reduced Boolean Circuits [8] does exist in
literature. In this work, we discuss a novel and efficient graph
realization for combinational logic circuits, represented using a
NAND-NOR-Inverter Graph (NNIG), which is composed of only
two-input NAND (NAND2), NOR (NOR2) and inverter (INV) cells.
The networks are constructed on the basis of irredundant disjunctive
and conjunctive normal forms, after factoring, comprising terms with
minimum support. Construction of a NNIG for a non-regenerative
function in normal form would be straightforward, whereas for the
complementary phase, it would be developed by considering a virtual
instance of the function. However, the choice of best NNIG for a
given function would be based upon literal count, cell count and
DAG node count of the implementation at the technology
independent stage. In case of a tie, the final decision would be made
after extracting the physical design parameters.
We have considered AIG representation for reduced disjunctive
normal form and the best of OIG/AOG/AOIG for the minimized
conjunctive normal forms. This is necessitated due to the nature of
certain functions, such as Achilles- heel functions. NNIGs are found
to exhibit 3.97% lesser node count compared to AIGs and
OIG/AOG/AOIGs; consume 23.74% and 10.79% lesser library cells
than AIGs and OIG/AOG/AOIGs for the various samples considered.
We compare the power efficiency and delay improvement achieved
by optimal NNIGs over minimal AIGs and OIG/AOG/AOIGs for
various case studies. In comparison with functionally equivalent,
irredundant and compact AIGs, NNIGs report mean savings in power
and delay of 43.71% and 25.85% respectively, after technology
mapping with a 0.35 micron TSMC CMOS process. For a
comparison with OIG/AOG/AOIGs, NNIGs demonstrate average
savings in power and delay by 47.51% and 24.83%. With respect to
device count needed for implementation with static CMOS logic
style, NNIGs utilize 37.85% and 33.95% lesser transistors than their
AIG and OIG/AOG/AOIG counterparts.
Abstract: A study of the obtainable watermark data rate for information hiding algorithms is presented in this paper. As the perceptual entropy for wideband monophonic audio signals is in the range of four to five bits per sample, a significant amount of additional information can be inserted into signal without causing any perceptual distortion. Experimental results showed that transform domain watermark embedding outperforms considerably watermark embedding in time domain and that signal decompositions with a high gain of transform coding, like the wavelet transform, are the most suitable for high data rate information hiding. Keywords?Digital watermarking, information hiding, audio watermarking, watermark data rate.
Abstract: The principal objective of this study is to be able to
extract niobium oxide from columbite-tantalite concentrate of Thayet
Kon Area in Nay Phi Taw. It is recovered from columbite-tantalite
concentrate which contains 19.29 % Nb2O5.The recovery of niobium
oxide from columbite-tantalite concentrate can be divided into three
main sections, namely, digestion of the concentrate, recovery from
the leached solution and precipitation and calcinations. The
concentrate was digested with hydrofluoric acid and sulfuric acid. Of
the various parameters that effect acidity and time were studied. In
the recovery section solvent extraction process using methyl isobutyl
ketone was investigated. Ammonium hydroxide was used as a
precipitating agent and the precipitate was later calcined. The
percentage of niobium oxide is 74%.
Abstract: Independent spanning trees (ISTs) provide a number of advantages in data broadcasting. One can cite the use in fault tolerance network protocols for distributed computing and bandwidth. However, the problem of constructing multiple ISTs is considered hard for arbitrary graphs. In this paper we present an efficient algorithm to construct ISTs on hypercubes that requires minimum resources to be performed.
Abstract: Medical image modalities such as computed
tomography (CT), magnetic resonance imaging (MRI), ultrasound
(US), X-ray are adapted to diagnose disease. These modalities
provide flexible means of reviewing anatomical cross-sections and
physiological state in different parts of the human body. The raw
medical images have a huge file size and need large storage
requirements. So it should be such a way to reduce the size of those
image files to be valid for telemedicine applications. Thus the image
compression is a key factor to reduce the bit rate for transmission or
storage while maintaining an acceptable reproduction quality, but it is
natural to rise the question of how much an image can be compressed
and still preserve sufficient information for a given clinical
application. Many techniques for achieving data compression have
been introduced. In this study, three different MRI modalities which
are Brain, Spine and Knee have been compressed and reconstructed
using wavelet transform. Subjective and objective evaluation has
been done to investigate the clinical information quality of the
compressed images. For the objective evaluation, the results show
that the PSNR which indicates the quality of the reconstructed image
is ranging from (21.95 dB to 30.80 dB, 27.25 dB to 35.75 dB, and
26.93 dB to 34.93 dB) for Brain, Spine, and Knee respectively. For
the subjective evaluation test, the results show that the compression
ratio of 40:1 was acceptable for brain image, whereas for spine and
knee images 50:1 was acceptable.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: Extraction of laccase produced by L. polychrous in an
aqueous two-phase system, composed of polyethylene glycol and
phosphate salt at pH 7.0 and 250C was investigated. The effect of
PEG molecular weight, PEG concentration and phosphate
concentration was determined. Laccase preferentially partitioned to
the top phase. Good extraction of laccase to the top phase was
observed with PEG 4000. The optimum system was found in the
system containing 12% w/w PEG 4000 and 16% w/w phosphate salt
with KE of 88.3, purification factor of 3.0-fold and 99.1% yield.
Some properties of the enzyme such as thermal stability, effect of
heavy metal ions and kinetic constants were also presented in this
work. The thermal stability decreased sharply with high temperature
above 60 0C. The enzyme was inhibited by Cd2+, Pb2+, Zn2+ and
Cu2+. The Vmax and Km values of the enzyme were 74.70
μmol/min/ml and 9.066 mM respectively.
Abstract: The purpose of this study was to elucidate the factors affecting antimicrobial effectiveness of essential oils against food spoilage and pathogenic bacteria. The minimum inhibition concentrations (MIC) of the essential oils, were determined by turbidimetric technique using Biocreen C, analyzer. The effects of pH ranging from 7.3 to 5.5 in absence and presence of essential oils and/or NaCl on the lag time and mean generation time of the bacteria at 370C, were carried out and results were determined showed that, combination of low pH and essential oil at 370C had additive effects against the test micro-organisms. The combination of 1.2 % (w/v) of NaCl and clove essential oil at 0.0325% (v/v) was effective against E. coli. The use of concentrations less than MIC in combination with low pH and or NaCl has the potential of being used as an alternative to “traditional food preservatives".
Abstract: In the modern construction practices, industrial wastes
or by-products are largely used as raw materials in cement and
concrete. These impart many benefits to the environment and bringabout
an economic impact because the cost of waste disposal is
constantly increasing due to strict environmental regulations. It was
reported in literature that the leakage of oil onto concrete element in
older cement grinding unit resulted in concrete with greater resistance
to freezing and thawing. This effect was thought to be similar to
adding an air-entraining chemical admixture to concrete. This paper
presents an investigation on the load deflection behaviour and crack
patterns of reinforced concrete (RC) beams subjected to four point
loading. Ten 120x260x1900 mm beams were cast with 100%
ordinary Portland cement (OPC) concrete, 20% fly ash (FA) and 20%
rice husk ash (RHA) blended cement concrete. 0.15% dosage of
admixtures (used engine oil, new engine oil, and superplasticizer)
was used throughout the experiment. Results show that OPC and
OPC/RHA RC beams containing used engine oil and superplasticizer
exhibit higher capacity, 18-26% than their corresponding control
mix.
Abstract: The relevance of the study of everyday life in Almaty
and Kyzylorda are associated with the emergence of the modern
trends in historiography and socializing areas of government reform.
The relevance is due to the fact that in the early twentieth century
Kyzylorda and Almaty began to develop as a city and this period has
a special place in the life of the state. An interesting aspect of the
everyday life of the inhabitants of the new city, which was built in the
era of Stalin's Five-Year Plans, can be examined through the eyes of
the Soviet people living in a specific environment, reflecting the life
of the citizens. The study of industrialization of the Soviet Union and
the attention paid to new developments in the first five years of
everyday aspects as the impact of the modernization of the 1930s was
one of the decisive factors in the lives of residents. Among these
factors, we would like to highlight the medical field, which is the
basis of all human life, specifically focusing on the state of medicine
in Alma-Ata in the first 20-30-years of the twentieth century, and
analyze the different aspects of human life, determining the quality of
medical care to the population during this period.