Abstract: Biological reactions of individuals of a testing animal
to toxic substance are unique and can be used as an indication of the
existing of toxic substance. However, to distinguish such phenomenon
need a very complicate system and even more complicate to analyze
data in 3 dimensional. In this paper, a system to evaluate in vitro
biological activities to acute toxicity of stochastic self-affine
non-stationary signal of 3D goldfish swimming by using fractal
analysis is introduced. Regular digital camcorders are utilized by
proposed algorithm 3DCCPC to effectively capture and construct 3D
movements of the fish. A Critical Exponent Method (CEM) has been
adopted as a fractal estimator. The hypothesis was that the swimming
of goldfish to acute toxic would show the fractal property which
related to the toxic concentration. The experimental results supported
the hypothesis by showing that the swimming of goldfish under the
different toxic concentration has fractal properties. It also shows that
the fractal dimension of the swimming related to the pH value of FD Ôëê
0.26pH + 0.05. With the proposed system, the fish is allowed to swim
freely in all direction to react to the toxic. In addition, the trajectories
are precisely evaluated by fractal analysis with critical exponent
method and hence the results exhibit with much higher degree of
confidence.
Abstract: The incidences of dengue hemorrhagic disease (DHF)
over the long term exhibit a seasonal behavior. It has been
hypothesized that these behaviors are due to the seasonal climate
changes which in turn induce a seasonal variation in the incubation
period of the virus while it is developing the mosquito. The standard
dynamic analysis is applied for analysis the Susceptible-Exposed-
Infectious-Recovered (SEIR) model which includes an annual
variation in the length of the extrinsic incubation period (EIP). The
presence of both asymptomatic and symptomatic infections is
allowed in the present model. We found that dynamic behavior of the
endemic state changes as the influence of the seasonal variation of
the EIP becomes stronger. As the influence is further increased, the
trajectory exhibits sustained oscillations when it leaves the chaotic
region.
Abstract: In this paper a novel scheme for watermarking digital
audio during its compression to MPEG-1 Layer III format is
proposed. For this purpose we slightly modify some of the selected
MDCT coefficients, which are used during MPEG audio
compression procedure. Due to the possibility of modifying different
MDCT coefficients, there will be different choices for embedding the
watermark into audio data, considering robustness and transparency
factors. Our proposed method uses a genetic algorithm to select the
best coefficients to embed the watermark. This genetic selection is
done according to the parameters that are extracted from the
perceptual content of the audio to optimize the robustness and
transparency of the watermark. On the other hand the watermark
security is increased due to the random nature of the genetic
selection. The information of the selected MDCT coefficients that
carry the watermark bits, are saves in a database for future extraction
of the watermark. The proposed method is suitable for online MP3
stores to pursue illegal copies of musical artworks. Experimental
results show that the detection ratio of the watermarks at the bitrate
of 128kbps remains above 90% while the inaudibility of the
watermark is preserved.
Abstract: In this paper, a new encoding algorithm of spectral envelope based on NLMS in G.729.1 for VoIP is proposed. In the TDAC part of G.729.1, the spectral envelope and MDCT coefficients extracted in the weighted CELP coding error (lower-band) and the higher-band input signal are encoded. In order to reduce allocation bits for spectral envelope coding, a new quantization algorithm based on NLMS is proposed. Also, reduced bits are used to enhance sound quality. The performance of the proposed algorithm is evaluated by sound quality and bit reduction rates in clean and frame loss conditions.
Abstract: The present study investigates numerically the
phenomenon of vortex-shedding and its suppression in twodimensional
mixed convective flow past a square cylinder under the
joint influence of buoyancy and free-stream orientation with respect
to gravity. The numerical experiments have been conducted at a
fixed Reynolds number (Re) of 100 and Prandtl number (Pr) of 0.71,
while Richardson number (Ri) is varied from 0 to 1.6 and freestream
orientation, α, is kept in the range 0o≤ α ≤ 90o, with 0o
corresponding to an upward flow and 90o representing a cross-flow
scenario, respectively. The continuity, momentum and energy
equations, subject to Boussinesq approximation, are discretized using
a finite difference method and are solved by a semi-explicit pressure
correction scheme. The critical Richardson number, leading to the
suppression of the vortex-shedding (Ric), is estimated by using
Stuart-Landau theory at various free-stream orientations and the
neutral curve is obtained in the Ri-α plane. The neutral curve
exhibits an interesting non-monotonic behavior with Ric first
increasing with increasing values of α upto 45o and then decreasing
till 70o. Beyond 70o, the neutral curve again exhibits a sharp
increasing asymptotic trend with Ric approaching very large values
as α approaches 90o. The suppression of vortex shedding is not
observed at α = 90o (cross-flow). In the unsteady flow regime, the
Strouhal number (St) increases with the increase in Richardson
number.
Abstract: This paper presents a novel CMOS four-transistor
SRAM cell for very high density and low power embedded SRAM
applications as well as for stand-alone SRAM applications. This cell
retains its data with leakage current and positive feedback without
refresh cycle. The new cell size is 20% smaller than a conventional
six-transistor cell using same design rules. Also proposed cell uses
two word-lines and one pair bit-line. Read operation perform from
one side of cell, and write operation perform from another side of
cell, and swing voltage reduced on word-lines thus dynamic power
during read/write operation reduced. The fabrication process is fully
compatible with high-performance CMOS logic technologies,
because there is no need to integrate a poly-Si resistor or a TFT load.
HSPICE simulation in standard 0.25μm CMOS technology confirms
all results obtained from this paper.
Abstract: Multi-user interference (MUI) is the main reason of system deterioration in the Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system. MUI increases with the number of simultaneous users, resulting into higher probability bit rate and limits the maximum number of simultaneous users. On the other hand, Phase induced intensity noise (PIIN) problem which is originated from spontaneous emission of broad band source from MUI severely limits the system performance should be addressed as well. Since the MUI is caused by the interference of simultaneous users, reducing the MUI value as small as possible is desirable. In this paper, an extensive study for the system performance specified by MUI and PIIN reducing is examined. Vectors Combinatorial (VC) codes families are adopted as a signature sequence for the performance analysis and a comparison with reported codes is performed. The results show that, when the received power increases, the PIIN noise for all the codes increases linearly. The results also show that the effect of PIIN can be minimized by increasing the code weight leads to preserve adequate signal to noise ratio over bit error probability. A comparison study between the proposed code and the existing codes such as Modified frequency hopping (MFH), Modified Quadratic- Congruence (MQC) has been carried out.
Abstract: A new code for spectral-amplitude coding optical
code-division multiple-access system is proposed called Random
diagonal (RD) code. This code is constructed using code segment and
data segment. One of the important properties of this code is that the
cross correlation at data segment is always zero, which means that
Phase Intensity Induced Noise (PIIN) is reduced. For the performance
analysis, the effects of phase-induced intensity noise, shot noise, and
thermal noise are considered simultaneously. Bit-error rate (BER)
performance is compared with Hadamard and Modified Frequency
Hopping (MFH) codes. It is shown that the system using this new
code matrices not only suppress PIIN, but also allows larger number
of active users compare with other codes. Simulation results shown
that using point to point transmission with three encoded channels,
RD code has better BER performance than other codes, also its found
that at 0 dbm PIIN noise are 10-10 and 10-11 for RD and MFH
respectively.
Abstract: In mobile environments, unspecified numbers of transactions
arrive in continuous streams. To prove correctness of their
concurrent execution a method of modelling an infinite number of
transactions is needed. Standard database techniques model fixed
finite schedules of transactions. Lately, techniques based on temporal
logic have been proposed as suitable for modelling infinite schedules.
The drawback of these techniques is that proving the basic
serializability correctness condition is impractical, as encoding (the
absence of) conflict cyclicity within large sets of transactions results
in prohibitively large temporal logic formulae. In this paper, we show
that, under certain common assumptions on the graph structure of
data items accessed by the transactions, conflict cyclicity need only
be checked within all possible pairs of transactions. This results in
formulae of considerably reduced size in any temporal-logic-based
approach to proving serializability, and scales to arbitrary numbers
of transactions.
Abstract: The statistical distributions are modeled in explaining
nature of various types of data sets. Although these distributions are
mostly uni-modal, it is quite common to see multiple modes in the
observed distribution of the underlying variables, which make the
precise modeling unrealistic. The observed data do not exhibit
smoothness not necessarily due to randomness, but could also be due
to non-randomness resulting in zigzag curves, oscillations, humps
etc. The present paper argues that trigonometric functions, which
have not been used in probability functions of distributions so far,
have the potential to take care of this, if incorporated in the
distribution appropriately. A simple distribution (named as, Sinoform
Distribution), involving trigonometric functions, is illustrated in the
paper with a data set. The importance of trigonometric functions is
demonstrated in the paper, which have the characteristics to make
statistical distributions exotic. It is possible to have multiple modes,
oscillations and zigzag curves in the density, which could be suitable
to explain the underlying nature of select data set.
Abstract: In this work, we developed the concept of
supercompression, i.e., compression above the compression standard
used. In this context, both compression rates are multiplied. In fact,
supercompression is based on super-resolution. That is to say,
supercompression is a data compression technique that superpose
spatial image compression on top of bit-per-pixel compression to
achieve very high compression ratios. If the compression ratio is very
high, then we use a convolutive mask inside decoder that restores the
edges, eliminating the blur. Finally, both, the encoder and the
complete decoder are implemented on General-Purpose computation
on Graphics Processing Units (GPGPU) cards. Specifically, the
mentio-ned mask is coded inside texture memory of a GPGPU.
Abstract: In this paper a study on the vibration of thin
cylindrical shells with ring supports and made of functionally graded
materials (FGMs) composed of stainless steel and nickel is presented.
Material properties vary along the thickness direction of the shell
according to volume fraction power law. The cylindrical shells have
ring supports which are arbitrarily placed along the shell and impose
zero lateral deflections. The study is carried out based on third order
shear deformation shell theory (T.S.D.T). The analysis is carried out
using Hamilton-s principle. The governing equations of motion of
FGM cylindrical shells are derived based on shear deformation
theory. Results are presented on the frequency characteristics,
influence of ring support position and the influence of boundary
conditions. The present analysis is validated by comparing results
with those available in the literature.
Abstract: In this work a new method for low complexity
image coding is presented, that permits different settings and great
scalability in the generation of the final bit stream. This coding
presents a continuous-tone still image compression system that
groups loss and lossless compression making use of finite arithmetic
reversible transforms. Both transformation in the space of color and
wavelet transformation are reversible. The transformed coefficients
are coded by means of a coding system in depending on a
subdivision into smaller components (CFDS) similar to the bit
importance codification. The subcomponents so obtained are
reordered by means of a highly configure alignment system
depending on the application that makes possible the re-configure of
the elements of the image and obtaining different importance levels
from which the bit stream will be generated. The subcomponents of
each importance level are coded using a variable length entropy
coding system (VBLm) that permits the generation of an embedded
bit stream. This bit stream supposes itself a bit stream that codes a
compressed still image. However, the use of a packing system on the
bit stream after the VBLm allows the realization of a final highly
scalable bit stream from a basic image level and one or several
improvement levels.
Abstract: For higher order multiplications, a huge number of
adders or compressors are to be used to perform the partial product
addition. We have reduced the number of adders by introducing
special kind of adders that are capable to add five/six/seven bits per
decade. These adders are called compressors. Binary counter
property has been merged with the compressor property to develop
high order compressors. Uses of these compressors permit the
reduction of the vertical critical paths. A 16×16 bit multiplier has
been developed using these compressors. These compressors make
the multipliers faster as compared to the conventional design that
have been used 4-2 compressors and 3-2 compressors.
Abstract: The present study based on removal of natural dyes of
Roselle petals, then used Roselle petals powder (RPP) as an
adsorbent for the removal of methylene blue dye (as a typical cationic
or basic dye) from aqueous solutions. The present study shows that
used Roselle petals powder exhibit adsorption trend for the dye. The
adsorption processes were carried out at various conditions of
temperatures ranging from 278 to 338 K ± 2 K , concentrations,
processing time and a wide range of pH between 2.5-11. Adsorption
isotherm equations such as Freundlich, and Langmuir were applied to
calculate the values of respective constants. Adsorption study was
found that the currently introduced adsorbent can be used to remove
cationic dyes such as methylene blue from aqueous solutions.
Abstract: In this paper, we present the design and experimental
evaluation of complementary energy path adiabatic logic (CEPAL)
based 1 bit full adder circuit. A simulative investigation on the
proposed full adder has been done using VIRTUOSO SPECTRE
simulator of cadence in 0.18μm UMC technology and its
performance has been compared with the conventional CMOS full
adder circuit. The CEPAL based full adder circuit exhibits the energy
saving of 70% to the conventional CMOS full adder circuit, at 100
MHz frequency and 1.8V operating voltage.
Abstract: Cell phone forensics to acquire and analyze data in the
cellular phone is nowadays being used in a national investigation
organization and a private company. In order to collect cellular phone
flash memory data, we have two methods. Firstly, it is a logical
method which acquires files and directories from the file system of the
cell phone flash memory. Secondly, we can get all data from bit-by-bit
copy of entire physical memory using a low level access method. In
this paper, we describe a forensic tool to acquire cell phone flash
memory data using a logical level approach. By our tool, we can get
EFS file system and peek memory data with an arbitrary region from
Korea CDMA cell phone.
Abstract: As an adult man and woman love each other and come to have faith in each other as their spouse, they marry each other. Recently people-s economic life has become individualized and women are enjoying a high education level and increased participation in social activities, and these changes are creating environment favorable for single life. Thus, an increasing number of people are choosing celibacy, and many people prefer cohabitation to marriage. Nevertheless, marriage is still regarded as a must-to-do in our thought. Most of people throughout the world admit marriage as one of natural processes of life, and is an important passage rite in life that all people experience as we can see everywhere in the world despite the diversity of lifestyles. With regard to wedding ceremony, however, each country and culture has its own unique tradition and style of festival. It is not just a congratulatory ceremony but contains multiple concepts representing the age, country or culture. Moreover, the form and contents of wedding ceremony changes over time, and such features of wedding ceremony are well represented in films. This study took note of the fact that films reflect and reproduce each country-s historicity, culturality and analyzed four films, which are believed to show differences between Eastern and Western wedding ceremonies. The selected films are: A Perfect Match (2002), Marriage Is a Crazy Thing (2001), Bride Wars (2009) and 27 Dresses (2008). The author attempted to examine wedding ceremonies described in the four films, differences between the East and the West suggested by the films, and changes in their societies.
Abstract: Tea is consumed by a big part of the world-s
population. It has an enormous importance for the Turkish culture.
Nearly it is brewed every morning and evening at the all houses. Also it is consumed with lemon wedge. Habitual drinking of tea
infusions may significantly contribute to daily dietary requirements of elements.
Different instrumental techniques are used for determination of
these elements. But atomic and mass spectroscopic methods are preferred most. In these study chromium, iron and selenium contents
after the hot water brewing of black and green tea were determined
by Optical Emission Spectroscopy (ICP-OES). Furthermore, effect
of lemon addition on chromium, iron and selenium concentration tea
infusions is investigated.
Results of the investigation showed that concentration of
chromium, iron and selenium increased in black tea with lemon addition. On the other hand only selenium is increased with lemon
addition in green tea. And iron concentration is not detected in green
tea but its concentration is determined as 1.420 ppm after lemon addition.
Abstract: It is well known that a linear dynamic system including
a delay will exhibit limit cycle oscillations when a bang-bang sensor
is used in the feedback loop of a PID controller. A similar behaviour
occurs when a delayed feedback signal is used to train a neural
network. This paper develops a method of predicting this behaviour
by linearizing the system, which can be shown to behave in a manner
similar to an integral controller. Using this procedure, it is possible
to predict the characteristics of the neural network driven limit cycle
to varying degrees of accuracy, depending on the information known
about the system. An application is also presented: the intelligent
control of a spark ignition engine.