Abstract: It has been known that a characteristic
Burst-Suppression (BS) pattern appears in EEG during the early
recovery period following Cardiac Arrest (CA). Here, to explore the
relationship between cortical and subcortical neural activities
underlying BS, extracellular activity in the parietal cortex and the
centromedian nucleus of the thalamus and extradural EEG were
recorded in a rodent CA model. During the BS, the cortical firing rate
is extraordinarily high, and that bursts in EEG correlate to dense spikes
in cortical neurons. Newly observed phenomena are that 1) thalamic
activity reemerges earlier than cortical activity following CA, and 2)
the correlation coefficient of cortical and thalamic activities rises
during BS period. These results would help elucidate the underlying
mechanism of brain recovery after CA injury.
Abstract: In this report we have discussed the theoretical aspects
of the flow transformation, occurring through a series of bifurcations.
The parameters and their continuous diversion, the intermittent bursts
in the transition zone, variation of velocity and pressure with time,
effect of roughness in turbulent zone, and changes in friction factor
and head loss coefficient as a function of Reynolds number for a
transverse flow across a cylinder have been discussed. An analysis of
the variation in the wake length with Reynolds number was done in
FORTRAN.
Abstract: The growth of wireless devices affects the availability
of limited frequencies or spectrum bands as it has been known that
spectrum bands are a natural resource that cannot be added.
Meanwhile, the licensed frequencies are idle most of the time.
Cognitive radio is one of the solutions to solve those problems.
Cognitive radio is a promising technology that allows the unlicensed
users known as secondary users (SUs) to access licensed bands
without making interference to licensed users or primary users (PUs).
As cloud computing has become popular in recent years, cognitive
radio networks (CRNs) can be integrated with cloud platform. One of
the important issues in CRNs is security. It becomes a problem since
CRNs use radio frequencies as a medium for transmitting and CRNs
share the same issues with wireless communication systems. Another
critical issue in CRNs is performance. Security has adverse effect to
performance and there are trade-offs between them. The goal of this
paper is to investigate the performance related to security trade-off in
CRNs with supporting cloud platforms. Furthermore, Queuing
Network Models with preemptive resume and preemptive repeat
identical priority are applied in this project to measure the impact of
security to performance in CRNs with or without cloud platform. The
generalized exponential (GE) type distribution is used to reflect the
bursty inter-arrival and service times at the servers. The results show
that the best performance is obtained when security is disabled and
cloud platform is enabled.
Abstract: In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.
Abstract: In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.
Abstract: Optical Burst Switching (OBS) is a promising technology for the future generation Internet. Control architecture and Contention resolution are the main issues faced by the Optical Burst Switching networks. In this paper we are only taking care of the Contention problem and to overcome this issue we propose Pre-Deflection Routing with Control Packet Signal Scheme for Contention Resolution in Optical Burst Switch Networks. In this paper Pre-deflection routing approach has been proposed in which routing is carried out in two ways, Shortest Path First (SPF) and Least Hop First (LHF) Routing to forward the clusters and canoes respectively. Hereafter Burst Offset Time Control Algorithm has been proposed where a forward control packet (FCP) collects the congestion price and contention price along its paths. Thereafter a reverse-direction control packet (RCP) sent by destination node which delivers the information of FCP to the source node, and source node uses this information to revise its offset time and burst length.
Abstract: The primary objectives of transient analysis are to determine the values of transient pressures that can result from flow control operations and to establish the design criteria for system equipment and devices (such as control devices and pipe wall thickness) so as to provide an acceptable level of protection against system failure due to pipe collapse or bursting. Because of the complexity of the equations needed to describe transients, numerical computer models are used to analyze transient flow hydraulics. An effective numerical model allows the hydraulic engineer to analyze potential transient events and to identify and evaluate alternative solutions for controlling hydraulic transients, thereby protecting the integrity of the hydraulic system. This paper presents the influence of using the protection devices to control the adverse effects due to excessive and low pressure occurs in the transient.
Abstract: Novel solid lipid nanoparticles (SLNs) were developed to improve oral bioavailability of oxyresveratrol (OXY). The SLNs were prepared by a high speed homogenization technique, at an effective speed and time, using Compritol® 888 ATO (5% w/w) as the solid lipid. The appropriate weight proportions (0.3% w/w) of OXY affected the physicochemical properties of blank SLNs. The effects of surfactant types on the properties of the formulations such as particle size and entrapment efficacy were also investigated. Conclusively, Tween 80 combined with soy lecithin was the most appropriate surfactant to stabilize OXY-loaded SLNs. The mean particle size of the optimized formulation was 134.40 ± 0.57 nm. In vitro drug release study, the selected S2 formulation showed a retarded release profile for OXY with no initial burst release compared to OXY suspension in the simulated gastrointestinal fluids. Therefore, these SLNs could provide a suitable system to develop for the oral OXY delivery.
Abstract: This paper presents an efficient burst error spreading tool. Also, it studies a vital issue in wireless communications, which is the transmission of images over wireless networks. IEEE ZigBee 802.15.4 is a short-range communication standard that could be used for small distance multimedia transmissions. In fact, the ZigBee network is a Wireless Personal Area Network (WPAN), which needs a strong interleaving mechanism for protection against error bursts. Also, it is low power technology and utilized in the Wireless Sensor Networks (WSN) implementation. This paper presents the chaotic interleaving scheme as a data randomization tool for this purpose. This scheme depends on the chaotic Baker map. The mobility effects on the image transmission are studied with different velocity through utilizing the Jakes’ model. A comparison study between the proposed chaotic interleaving scheme and the traditional block and convolutional interleaving schemes for image transmission over a correlated fading channel is presented. The simulation results show the superiority of the proposed chaotic interleaving scheme over the traditional schemes.
Abstract: Recently, most digital systems are designed as GALS (Globally Asynchronous Locally Synchronous) systems. Several architectures have been proposed as bus architectures for a GALS system : shared bus, segmented bus, ring bus, and so on. In this study, we propose a ring segmented bus architecture which is a combination of segmented bus and ring bus architecture with the aim of throughput enhancement. In a segmented bus architecture, segments are connected in series. By connecting the segments at the end of the bus and constructing the ring bus, it becomes possible to allocate a channel of the bus bidirectionally. The bus channel is allocated to the shortest path between segments. We consider a metastable operation caused by asynchronous communication between segments and a burst transfer between segments. According to the result of simulation, it is shown that the GALS system designed by the proposed method has the desired operations.
Abstract: In this paper, we study statistical multiplexing of VBR
video in ATM networks. ATM promises to provide high speed realtime
multi-point to central video transmission for telemedicine
applications in rural hospitals and in emergency medical services.
Video coders are known to produce variable bit rate (VBR) signals
and the effects of aggregating these VBR signals need to be
determined in order to design a telemedicine network infrastructure
capable of carrying these signals. We first model the VBR video
signal and simulate it using a generic continuous-data autoregressive
(AR) scheme. We carry out the queueing analysis by the Fluid
Approximation Model (FAM) and the Markov Modulated Poisson
Process (MMPP). The study has shown a trade off: multiplexing
VBR signals reduces burstiness and improves resource utilization,
however, the buffer size needs to be increased with an associated
economic cost. We also show that the MMPP model and the Fluid
Approximation model fit best, respectively, the cell region and the
burst region. Therefore, a hybrid MMPP and FAM completely
characterizes the overall performance of the ATM statistical
multiplexer. The ramifications of this technology are clear: speed,
reliability (lower loss rate and jitter), and increased capacity in video
transmission for telemedicine. With migration to full IP-based
networks still a long way to achieving both high speed and high
quality of service, the proposed ATM architecture will remain of
significant use for telemedicine.
Abstract: The paper presents the multi-element synthetic
transmit aperture (MSTA) method with a small number of elements
transmitting and all elements apertures in medical ultrasound
imaging. As compared to the other methods MSTA allows to
increase the system frame rate and provides the best compromise
between penetration depth and lateral resolution.
In the experiments a 128-element linear transducer array with
0.3 mm pitch excited by a burst pulse of 125 ns duration were used.
The comparison of 2D ultrasound images of tissue mimicking
phantom obtained using the STA and the MSTA methods is
presented to demonstrate the benefits of the second approach. The
results were obtained using SA algorithm with transmit and receive
signals correction based on a single element directivity function.
Abstract: the effects of refining and alkaline chemicals on potential of recycling bleached chemical pulp of bagasse were investigated in this study. Recycling was done until three times. Handsheet properties such as, apparent density, light scattering coefficient, tear index, burst index, breaking length, and fold number according to TAPPI standard were measured. Water retention value also was used to considering the treatments during recycling. Refining enhanced the strength of recycled pulp by increasing fiber flexibility and swelling ability, whereas by applying chemical treatment didn't observe any improvement. The morphology of recycled fiber was considered with scanning electron microscopy (SEM).
Abstract: In this work, a characterization and modeling of
packet loss of a Voice over Internet Protocol (VoIP) communication
is developed. The distributions of the number of consecutive received
and lost packets (namely gap and burst) are modeled from the
transition probabilities of two-state and four-state model.
Measurements show that both models describe adequately the burst
distribution, but the decay of gap distribution for non-homogeneous
losses is better fit by the four-state model. The respective
probabilities of transition between states for each model were
estimated with a proposed algorithm from a set of monitored VoIP
calls in order to obtain representative minimum, maximum and
average values for both models.
Abstract: Numerical studies have been carried out using a two
dimensional code to examine the influence of pressure / thrust
transient of solid propellant rockets at liftoff. This code solves
unsteady Reynolds-averaged thin-layer Navier–Stokes equations by
an implicit LU-factorization time-integration method. The results
from the parametric study indicate that when the port is narrow there
is a possibility of increase in pressure / thrust-rise rate due to
relatively high flame spread rate. Parametric studies further reveal
that flame spread rate can be altered by altering the propellant
properties, igniter jet characteristics and nozzle closure burst pressure
without altering the grain configuration and/or the mission
demanding thrust transient. We observed that when the igniter
turbulent intensity is relatively low the vehicle could liftoff early due
to the early flow choking of the rocket nozzle. We concluded that the
high pressurization-rate has structural implications at liftoff in
addition to transient burning effect. Therefore prudent selection of the
port geometry and the igniter, for meeting the mission requirements,
within the given envelop are meaningful objectives for any designer
for the smooth liftoff of solid propellant rockets.
Abstract: In this paper, we are going to determine the threshold levels of adaptive modulation in a burst by burst CDMA system by a suboptimum method so that the above method attempts to increase the average bit per symbol (BPS) rate of transceiver system by switching between the different modulation modes in variable channel condition. In this method, we choose the minimum values of average bit error rate (BER) and maximum values of average BPS on different values of average channel signal to noise ratio (SNR) and then calculate the relative threshold levels of them, so that when the instantaneous SNR increases, a higher order modulation be employed for increasing throughput and vise-versa when the instantaneous SNR decreases, a lower order modulation be employed for improvement of BER. In transmission step, by this adaptive modulation method, in according to comparison between obtained estimation of pilot symbols and a set of above suboptimum threshold levels, above system chooses one of states no transmission, BPSK, 4QAM and square 16QAM for modulation of data. The expected channel in this paper is a slow Rayleigh fading.
Abstract: This paper reports the feasibility of the ARMA model
to describe a bursty video source transmitting over a AAL5 ATM link
(VBR traffic). The traffic represents the activity of the action movie
"Lethal Weapon 3" transmitted over the ATM network using the Fore
System AVA-200 ATM video codec with a peak rate of 100 Mbps
and a frame rate of 25. The model parameters were estimated for a
single video source and independently multiplexed video sources. It
was found that the model ARMA (2, 4) is well-suited for the real data
in terms of average rate traffic profile, probability density function,
autocorrelation function, burstiness measure, and the pole-zero
distribution of the filter model.
Abstract: The burst of Web 2.0 technology and social
networking tools manifest different styles of learning and managing
knowledge among both knowledge workers and adult learners. In the
Western countries, open-learning concept has been made popular due
to the ease of use and the reach that the technology provides. In
Malaysia, there are still some gaps between the learners- acceptance
of technology and the full implementation of the technology in the
education system. There is a need to understand how adult learners,
who are knowledge workers, manage their personal knowledge via
social networking tools, especially in their learning process. Four
processes of personal knowledge management (PKM) and four
cognitive enablers are proposed supported by analysed data on adult
learners in a university. The model derived from these processes and
enablers is tested and presented, with recommendations on features to be included in adult learners- learning environment.
Abstract: Water pipe network is installed underground and once equipped, it is difficult to recognize the state of pipes when the leak or burst happens. Accordingly, post management is often delayed
after the fault occurs. Therefore, the systematic fault management system of water pipe network is required to prevent the accident and
minimize the loss. In this work, we develop online fault detection system of water pipe network using data of pipes such as flow rate
or pressure. The transient model describing water flow in pipelines
is presented and simulated using MATLAB. The fault situations such
as the leak or burst can be also simulated and flow rate or pressure data when the fault happens are collected. Faults are detected using
statistical methods of fast Fourier transform and discrete wavelet transform, and they are compared to find which method shows the
better fault detection performance.
Abstract: This study offers a new simple method for assessing
an axial part-through crack in a pipe wall. The method utilizes simple
approximate expressions for determining the fracture parameters K,
J, and employs these parameters to determine critical dimensions of a
crack on the basis of equality between the J-integral and the J-based
fracture toughness of the pipe steel. The crack tip constraint is taken
into account by the so-called plastic constraint factor C, by which the
uniaxial yield stress in the J-integral equation is multiplied. The
results of the prediction of the fracture condition are verified by burst
tests on test pipes.