Abstract: An effective approach for realizing the binary tree structure, representing a combinational logic functionality with enhanced throughput, is discussed in this paper. The optimization in maximum operating frequency was achieved through delay minimization, which in turn was possible by means of reducing the depth of the binary network. The proposed synthesis methodology has been validated by experimentation with FPGA as the target technology. Though our proposal is technology independent, yet the heuristic enables better optimization in throughput even after technology mapping for such Boolean functionality; whose reduced CNF form is associated with a lesser literal cost than its reduced DNF form at the Boolean equation level. For cases otherwise, our method converges to similar results as that of [12]. The practical results obtained for a variety of case studies demonstrate an improvement in the maximum throughput rate for Spartan IIE (XC2S50E-7FT256) and Spartan 3 (XC3S50-4PQ144) FPGA logic families by 10.49% and 13.68% respectively. With respect to the LUTs and IOBUFs required for physical implementation of the requisite non-regenerative logic functionality, the proposed method enabled savings to the tune of 44.35% and 44.67% respectively, over the existing efficient method available in literature [12].
Abstract: The paper presents the case study of hazard
identification and sensitivity of potential resource of emergency
water supply as part of the application of methodology classifying
the resources of drinking water for emergency supply of population.
The case study has been carried out on a selected resource of
emergency water supply in one region of the Czech Republic. The
hazard identification and sensitivity of potential resource of
emergency water supply is based on a unique procedure and
developed general registers of selected types of hazards and
sensitivities. The registers have been developed with the help of the
“Fault Tree Analysis” method in combination with the “What if
method”. The identified hazards for the assessed resource include
hailstorms and torrential rains, drought, soil erosion, accidents of
farm machinery, and agricultural production. The developed registers
of hazards and vulnerabilities and a semi-quantitative assessment of
hazards for individual parts of hydrological structure and
technological elements of presented drilled wells are the basis for a
semi-quantitative risk assessment of potential resource of emergency
supply of population and the subsequent classification of such
resource within the system of crisis planning.
Abstract: One of the most important parts of a cement factory is
the cement rotary kiln which plays a key role in quality and quantity of produced cement. In this part, the physical exertion and bilateral
movement of air and materials, together with chemical reactions take
place. Thus, this system has immensely complex and nonlinear dynamic equations. These equations have not worked out yet. Only
in exceptional case; however, a large number of the involved parameter were crossed out and an approximation model was
presented instead. This issue caused many problems for designing a
cement rotary kiln controller. In this paper, we presented nonlinear predictor and simulator models for a real cement rotary kiln by using
nonlinear identification technique on the Locally Linear Neuro-
Fuzzy (LLNF) model. For the first time, a simulator model as well as
a predictor one with a precise fifteen minute prediction horizon for a
cement rotary kiln is presented. These models are trained by
LOLIMOT algorithm which is an incremental tree-structure
algorithm. At the end, the characteristics of these models are expressed. Furthermore, we presented the pros and cons of these
models. The data collected from White Saveh Cement Company is used for modeling.
Abstract: The advantage of solving the complex nonlinear
problems by utilizing fuzzy logic methodologies is that the
experience or expert-s knowledge described as a fuzzy rule base can
be directly embedded into the systems for dealing with the problems.
The current limitation of appropriate and automated designing of
fuzzy controllers are focused in this paper. The structure discovery
and parameter adjustment of the Branched T-S fuzzy model is
addressed by a hybrid technique of type constrained sparse tree
algorithms. The simulation result for different system model is
evaluated and the identification error is observed to be minimum.
Abstract: The expression of LFA-1 diverges from the
physiological condition, thus active targeting carrier can provide the
benefits from difference into LFA-1 expression in various conditions.
Here, the selectivity of cIBR-conjugated nanoparticles (cIBR-NPs),
in terms of uptake, was investigated using PBMCs, Mixed PBMCMolt-
3 cells and Molt-3 cells. The expressions of LFA-1 on Molt-3
cells, from flow cytometry and Western blot, possessed the highest
level whereas PBMCs showed the lowest level. The kinetic uptake
profiles of cIBR-NPs were obtained by flow cytometry, which the
degree of cellular uptake presented a similar trend with the level of
LFA-1 indicating the influence of LFA-1 expression on the cellular
uptake of cIBR-NPs. The conformation of LFA-1 had a slight effect
on the cellular uptake of cIBR-NPs. Overall we demonstrated that
cIBR-NPs enhanced cellular uptake and improved the selectivity of
drug carriers to LFA-1 on the leukemia cells, which related with the
order of LFA-1 expression.
Abstract: Multicast Network Technology has pervaded our
lives-a few examples of the Networking Techniques and also for the
improvement of various routing devices we use. As we know the
Multicast Data is a technology offers many applications to the user
such as high speed voice, high speed data services, which is presently
dominated by the Normal networking and the cable system and
digital subscriber line (DSL) technologies. Advantages of Multi cast
Broadcast such as over other routing techniques. Usually QoS
(Quality of Service) Guarantees are required in most of Multicast
applications. The bandwidth-delay constrained optimization and we
use a multi objective model and routing approach based on genetic
algorithm that optimizes multiple QoS parameters simultaneously.
The proposed approach is non-dominated routes and the performance
with high efficiency of GA. Its betterment and high optimization has
been verified. We have also introduced and correlate the result of
multicast GA with the Broadband wireless to minimize the delay in
the path.
Abstract: BioEnergy is an archetypal appropriate technology
and alternate source of energy in rural areas of China, and can meet
the basic need for cooking fuel in rural areas. The paper introduces
with an alternate mean of research that can accelerate the biogas
energy production. Tithonia diversifolia or the Tree marigold can be
hailed as mesophillic anaerobic digestion to increase the production
of more Bioenergy. Tithonia diversifolia is very native to Mexico and
Central America, which can be served as ornamental plants- green
manure and can prevent soil erosion. Tithonia diversifolia is widely
grown and known to Asia, Africa, America and Australia as well.
Nowadays, Considering China’s geographical condition it is found
that Tithonia diversifolia is widely growing plant in the many tropical
and subtropical regions of southern Yunnan- which can have great
usage in accelerating and increasing the Bioenergy production
technology. The paper discussed aiming at proving possibility that
Tithonia diversifolia can be applied in biogas fermentation and its
biogas production potential, the research carried experiment on
Tithonia diversifolia biogas fermentation under the mesophilic
condition (35 Celsius Degree). The result revealed that Tithonia
diversifolia can be used as biogas fermentative material, and 6%
concentration can get the best biogas production, with the TS biogas
production rate 656mL/g and VS biogas production rate 801mL/g. It
is well addressed that Tithonia diversifolia grows wildly in 53
Counties and 9 cities of Yunnan Province, which mainly grows in
form of the road side plants, the edge of the field, countryside, forest
edge, open space; of which demersum-natures can form dense
monospecific beds -causing serious harm to agricultural production
landforms threatening the ecological system as a potentially harmful
exotic plant. There are also found the three types of invasive daisy
alien plants -Eupatorium adenophorum, Eupatorium Odorata and
Tithonia diversifolia in Yunnan Province of China-among them the
Tithonia diversifolia is responsible for causing serious harm to
agricultural production. In this paper we have designed the
experimental explanation of Biogas energy production that requires
anaerobic environment and some microbes; Tithonia diversifolia
plant has been taken into consideration while carrying experiments
and with successful resulting of generating more BioEnergy
emphasizing on the practical applications of Tithonia diversifolia.
This paper aims at- to find a new mechanism to provide a more
scientific basis for the development of this plant herbicides in Biogas
energy and to improve the utilization throughout the world as well.
Abstract: Steel surface defect detection is essentially one of
pattern recognition problems. Support Vector Machines (SVMs) are
known as one of the most proper classifiers in this application. In this
paper, we introduce a more accurate classification method by using
SVMs as our final classifier of the inspection system. In this scheme,
multiclass classification task is performed based on the "one-againstone"
method and different kernels are utilized for each pair of the
classes in multiclass classification of the different defects.
In the proposed system, a decision tree is employed in the first
stage for two-class classification of the steel surfaces to "defect" and
"non-defect", in order to decrease the time complexity. Based on
the experimental results, generated from over one thousand images,
the proposed multiclass classification scheme is more accurate than
the conventional methods and the overall system yields a sufficient
performance which can meet the requirements in steel manufacturing.
Abstract: Smoke from domestic wood burning has been
identified as a major contributor to air pollution, motivating detailed
emission measurements under controlled conditions. A series of
experiments was performed to characterise the emissions from wood
combustion in a fireplace and in a woodstove of two common species
of trees grown in Spain: Pyrenean oak (Quercus pyrenaica) and
black poplar (Populus nigra). Volatile organic compounds (VOCs) in
the exhaust emissions were collected in Tedlar bags, re-sampled in
sorbent tubes and analysed by thermal desorption-gas
chromatography-flame ionisation detection. Pyrenean oak presented
substantially higher emissions in the woodstove than in the fireplace,
for the majority of compounds. The opposite was observed for
poplar. Among the 45 identified species, benzene and benzenerelated
compounds represent the most abundant group, followed by
oxygenated VOCs and aliphatics. Emission factors obtained in this
study are generally of the same order than those reported for
residential experiments in the USA.
Abstract: This paper introduces a temporal epistemic logic
CBCTL that updates agent-s belief states through communications
in them, based on computational tree logic (CTL). In practical
environments, communication channels between agents may not be
secure, and in bad cases agents might suffer blackouts. In this study,
we provide inform* protocol based on ACL of FIPA, and declare the
presence of secure channels between two agents, dependent on time.
Thus, the belief state of each agent is updated along with the progress
of time. We show a prover, that is a reasoning system for a given
formula in a given a situation of an agent ; if it is directly provable
or if it could be validated through the chains of communications, the
system returns the proof.
Abstract: Software Development Risks Identification (SDRI),
using Fault Tree Analysis (FTA), is a proposed technique to identify
not only the risk factors but also the causes of the appearance of the
risk factors in software development life cycle. The method is based
on analyzing the probable causes of software development failures
before they become problems and adversely affect a project. It uses
Fault tree analysis (FTA) to determine the probability of a particular
system level failures that are defined by A Taxonomy for Sources of
Software Development Risk to deduce failure analysis in which an
undesired state of a system by using Boolean logic to combine a
series of lower-level events. The major purpose of this paper is to use
the probabilistic calculations of Fault Tree Analysis approach to
determine all possible causes that lead to software development risk
occurrence
Abstract: Contamination of heavy metals in tin tailings has
caused an interest in the scientific approach of their remediation. One
of the approaches is through phytoremediation, which is using tree
species to extract the heavy metals from the contaminated soils. Tin
tailings comprise of slime and sand tailings. This paper reports only
on the finding of the four timber species namely Acacia mangium,
Hopea odorata, Intsia palembanica and Swietenia macrophylla on
the removal of cadmium (Cd) and lead (Pb) from the slime tailings.
The methods employed for sampling and soil analysis are established
methods. Six trees of each species were randomly selected from a
0.25 ha plot for extraction and determination of their heavy metals.
The soil samples were systematically collected according to 5 x 5 m
grid from each plot. Results showed that the concentration of heavy
metals in soils and trees varied according to species. Higher
concentration of heavy metals was found in the stem than the
primary roots of all the species. A. Mangium accumulated the highest
total amount of Pb per hectare basis.
Abstract: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today's commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98% detection rate (DR) in comparison with
other existing methods.
Abstract: A combination of image fusion and quad tree decomposition method is used for detecting the sunspot trajectories in each month and computation of the latitudes of these trajectories in each solar hemisphere. Daily solar images taken with SOHO satellite are fused for each month and the result of fused image is decomposed with Quad Tree decomposition method in order to classifying the sunspot trajectories and then to achieve the precise information about latitudes of sunspot trajectories. Also with fusion we deduce some physical remarkable conclusions about sun magnetic fields behavior. Using quad tree decomposition we give information about the region on sun surface and the space angle that tremendous flares and hot plasma gases permeate interplanetary space and attack to satellites and human technical systems. Here sunspot images in June, July and August 2001 are used for studying and give a method to compute the latitude of sunspot trajectories in each month with sunspot images.
Abstract: In this paper, acoustic techniques are used to detect hidden insect infestations of date palm tress (Phoenix dactylifera L.). In particular, we use an acoustic instrument for early discovery of the presence of a destructive insect pest commonly known as the Red Date Palm Weevil (RDPW) and scientifically as Rhynchophorus ferrugineus (Olivier). This type of insect attacks date palm tress and causes irreversible damages at late stages. As a result, the infected trees must be destroyed. Therefore, early presence detection is a major part in controlling the spread and economic damage caused by this type of infestation. Furthermore monitoring and early detection of the disease can asses in taking appropriate measures such as isolating or treating the infected trees. The acoustic system is evaluated in terms of its ability for early discovery of hidden bests inside the tested tree. When signal acquisitions is completed for a number of date palms, a signal processing technique known as time-frequency analysis is evaluated in terms of providing an estimate that can be visually used to recognize the acoustic signature of the RDPW. The testing instrument was tested in the laboratory first then; it was used on suspected or infested tress in the field. The final results indicate that the acoustic monitoring approach along with signal processing techniques are very promising for the early detection of presence of the larva as well as the adult pest in the date palms.
Abstract: An improved processing description to be employed in biosonar signal processing in a cochlea model is proposed and examined. It is compared to conventional models using a modified discrimination analysis and both are tested. Their performances are evaluated with echo data captured from natural targets (trees).Results indicate that the phase characteristics of low-pass filters employed in the echo processing have a significant effect on class separability for this data.
Abstract: In this paper, a new algorithm for generating codebook is proposed for vector quantization (VQ) in image coding. The significant features of the training image vectors are extracted by using the proposed Orthogonal Polynomials based transformation. We propose to generate the codebook by partitioning these feature vectors into a binary tree. Each feature vector at a non-terminal node of the binary tree is directed to one of the two descendants by comparing a single feature associated with that node to a threshold. The binary tree codebook is used for encoding and decoding the feature vectors. In the decoding process the feature vectors are subjected to inverse transformation with the help of basis functions of the proposed Orthogonal Polynomials based transformation to get back the approximated input image training vectors. The results of the proposed coding are compared with the VQ using Discrete Cosine Transform (DCT) and Pairwise Nearest Neighbor (PNN) algorithm. The new algorithm results in a considerable reduction in computation time and provides better reconstructed picture quality.
Abstract: The scientific community has invested a great deal of effort in the fields of discrete wavelet transform in the last few decades. Discrete wavelet transform (DWT) associated with the vector quantization has been proved to be a very useful tool for the compression of image. However, the DWT is very computationally intensive process requiring innovative and computationally efficient method to obtain the image compression. The concurrent transformation of the image can be an important solution to this problem. This paper proposes a model of concurrent DWT for image compression. Additionally, the formal verification of the model has also been performed. Here the Symbolic Model Verifier (SMV) has been used as the formal verification tool. The system has been modeled in SMV and some properties have been verified formally.
Abstract: Distributed Computing Systems are usually considered the most suitable model for practical solutions of many parallel algorithms. In this paper an enhanced distributed system is presented to improve the time complexity of Binary Indexed Trees (BIT). The proposed system uses multi-uniform processors with identical architectures and a specially designed distributed memory system. The analysis of this system has shown that it has reduced the time complexity of the read query to O(Log(Log(N))), and the update query to constant complexity, while the naive solution has a time complexity of O(Log(N)) for both queries. The system was implemented and simulated using VHDL and Verilog Hardware Description Languages, with xilinx ISE 10.1, as the development environment and ModelSim 6.1c, similarly as the simulation tool. The simulation has shown that the overhead resulting by the wiring and communication between the system fragments could be fairly neglected, which makes it applicable to practically reach the maximum speed up offered by the proposed model.
Abstract: The main purpose of this research was to study how to communicate the identity of the Bangpoo, Samu tPrakan province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows:
The identity of Bangpoo, Samut Prakan province. This establishment was near the Mouth of the Gulf of Thailand for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Banpoo seaside resort and mangrove trees. Bangpoo seaside resort is characterized by muddy beacheswhere the greatest number of seagulls can be seen from March to May each year.
The communication of the identity of Bangpoo, Samut Prakan province which the researcher could find and design to present in English materials can be summed up in 3 items: 1) The history of Bangpoo, Samut Prakan province 2) The Learning center of Ecotourism: Seagulls and Mangrove forest 3) How to keep Banpoo, Samut Prakran province for ecotourism.