Abstract: In most wheat growing moderate regions and
especially in the north of Iran climate, is affected grain filling by
several physical and abiotic stresses. In this region, grain filling often
occurs when temperatures are increasing and moisture supply is
decreasing. The experiment was designed in RCBD with split plot
arrangements with four replications. Four irrigation treatments
included (I0) no irrigation (check); (I1) one irrigation (50 mm) at
heading stage; (I2) two irrigation (100 mm) at heading and anthesis
stage; and (I3) three irrigation (150 mm) at heading, anthesis and
early grain filling growth stage, two wheat cultivars (Milan and
Shanghai) were cultured in the experiment. Totally raining was 453
mm during the growth season. The result indicated that biological
yield, grain yield and harvest index were significantly affected by
irrigation levels. I3 treatment produced more tillers number in m2,
fertile tillers number in m2, harvest index and biological yield. Milan
produced more tillers number in m2, fertile tillers in m2, while
Shanghai produced heavier tillers and grain 1000 weight. Plant height
was significant in wheat varieties while were not statistically
significant in irrigation levels. Milan produced more grain yield,
harvest index and biological yield. Grain yield shown that I1, I2, and
I3 produced increasing of 5228 (21%), 5460 (27%) and 5670 (29%)
kg ha-1, respectively. There was an interaction of irrigation and
cultivar on grain yields. In the absence of the irrigation reduced grain
1000 weight from 45 to 40 g. No irrigation reduced soil moisture
extraction during the grain filling stage. Current assimilation as a
source of carbon for grain filling depends on the light intercepting
viable green surfaces of the plant after anthesis that due to natural
senescence and the effect of various stresses. At the same time the
demand by the growing grain is increasing. It is concluded from
research work that wheat crop irrigated Milan cultivar could increase
the grain yield in comparison with Shanghai cultivar. Although, the
grain yield of Shanghai under irrigation was slightly lower than
Milan. This grain yield also was related to weather condition, sowing
date, plant density and location conditions and management of
fertilizers, because there was not significant difference in biological
and straw yield. The best result was produced by I1 treatment. I2 and
I3 treatments were not significantly difference with I1 treatment.
Grain yield of I1 indicated that wheat is under soil moisture
deficiency. Therefore, I1 irrigation was better than I0.
Abstract: Green Forestation Plan (GFP) was expected to promote the reforestation of plains totaling 60,000 has within the first 8 years. Annual subsidies were budgeted at $120,000 per ha, and $2.4 million for 20 years. In this research we have surveyed landlords- opinions toward the GFP in an attempt to understand landlords- incentives for participating in the GFP and their levels of concern and agreement toward the policy design. Based our analysis of landlords- opinions on the policy design, we expect to derive appropriate complementary measures, establish effective promotional schemes, and raise the policy effectiveness of the GFP. According to the results of this research, there was still a relatively high proportion of population who were not aware of GFP; more than 50% of landlords were neutral or willing to participate given high reforestation subsidies; approximately 30% of landlords were unwilling to participate. In terms of the designs of GFP, more than 50% of respondents were concerned and agreed with the policy design. In terms of the period of this policy, 52.7% of respondents indicated that it should be shortened to 15 years or lower. In terms of the amount of the subsidy, 41.7% of respondents showed that it should be raised to approximately $250,000/ha. In terms of land area restrictions, 88.0% of respondents believed that the minimum should be lowered to 0.4 ha. More than 70% of respondents owned less than 0.4 has of land, and since they do not own enough land to be eligible for the program, more than 80% of landlords wished to lower the minimum requirements of land area. In addition, 59.3% of respondents were reluctant to participate in reforestation because their lands were too small to be eligible; 15.0% of respondents were reluctant because the duration was too long. Responses to the question about “how the policy can be adjusted to provide incentives for landlords- participation" revealed that almost 40% of respondents desired higher subsidies. Some policy suggestions are provided as follows: (1) many landlords are still unaware of the GFP so the government should enhance the promotion of the policy; (2) many landlords are unwilling to participate in GFP mainly because they do not own enough lands to be eligible, hence the government should consider adjusting its requirements for minimum agricultural land area; (3) for subsequent promotions on GFP, the government may consider targeting on the landlords with high income and high level of education; (4) because the subsidy of this policy alone provides limited help to landlords, the government should help the landlords to explore other revenue possibilities from afforestation in addition to the existing subsidies and raise the participation incentives.
Abstract: In this paper, the order, size and degree of the nodes
of the isomorphic fuzzy graphs are discussed. Isomorphism between
fuzzy graphs is proved to be an equivalence relation. Some properties
of self complementary and self weak complementary fuzzy graphs
are discussed.
Abstract: Faults in a network may take various forms such as hardware/software errors, vertex/edge faults, etc. Folded hypercube is a well-known variation of the hypercube structure and can be constructed from a hypercube by adding a link to every pair of nodes with complementary addresses. Let FFv (respectively, FFe) be the set of faulty nodes (respectively, faulty links) in an n-dimensional folded hypercube FQn. Hsieh et al. have shown that FQn - FFv - FFe for n ≥ 3 contains a fault-free cycle of length at least 2n -2|FFv|, under the constraints that (1) |FFv| + |FFe| ≤ 2n - 4 and (2) every node in FQn is incident to at least two fault-free links. In this paper, we further consider the constraints |FFv| + |FFe| ≤ 2n - 3. We prove that FQn - FFv - FFe for n ≥ 5 still has a fault-free cycle of length at least 2n - 2|FFv|, under the constraints : (1) |FFv| + |FFe| ≤ 2n - 3, (2) |FFe| ≥ n + 2, and (3) every vertex is still incident with at least two links.
Abstract: In order to study floristic and molecular classification
of common wild wheat (Triticum boeoticum Boiss.), an analysis was
conducted on populations of the Triticum boeoticum collected from
different regions of Iran. Considering all floristic compositions of
habitats, six floristic groups (syntaxa) within the populations were
identified. A high level of variation of T. boeoticum also detected
using SSR markers. Our results showed that molecular method
confirmed the grouping of floristic method. In other word, the results
from our study indicate that floristic classification are still useful,
efficient, and economic tools for characterizing the amount and
distribution of genetic variation in natural populations of T.
boeoticum. Nevertheless, molecular markers appear as useful and
complementary techniques for identification and for evaluation of
genetic diversity in studied populations.
Abstract: This research paper presents a framework on how to
build up malware dataset.Many researchers took longer time to
clean the dataset from any noise or to transform the dataset into a
format that can be used straight away for testing. Therefore, this
research is proposing a framework to help researchers to speed up
the malware dataset cleaningprocesses which later can be used for
testing. It is believed, an efficient malware dataset cleaning
processes, can improved the quality of the data, thus help to improve
the accuracy and the efficiency of the subsequent analysis. Apart
from that, an in-depth understanding of the malware taxonomy is
also important prior and during the dataset cleaning processes. A
new Trojan classification has been proposed to complement this
framework.This experiment has been conducted in a controlled lab
environment and using the dataset from VxHeavens dataset. This
framework is built based on the integration of static and dynamic
analyses, incident response method and knowledge database
discovery (KDD) processes.This framework can be used as the basis
guideline for malware researchers in building malware dataset.
Abstract: Parallel Prefix addition is a technique for improving
the speed of binary addition. Due to continuing integrating intensity
and the growing needs of portable devices, low-power and highperformance
designs are of prime importance. The classical parallel
prefix adder structures presented in the literature over the years
optimize for logic depth, area, fan-out and interconnect count of logic
circuits. In this paper, a new architecture for performing 8-bit, 16-bit
and 32-bit Parallel Prefix addition is proposed. The proposed prefix
adder structures is compared with several classical adders of same
bit width in terms of power, delay and number of computational
nodes. The results reveal that the proposed structures have the least
power delay product when compared with its peer existing Prefix
adder structures. Tanner EDA tool was used for simulating the adder
designs in the TSMC 180 nm and TSMC 130 nm technologies.
Abstract: The paper considers a single-server queue with fixedsize
batch Poisson arrivals and exponential service times, a model
that is useful for a buffer that accepts messages arriving as fixed size
batches of packets and releases them one packet at time. Transient
performance measures for queues have long been recognized as
being complementary to the steady-state analysis. The focus of the
paper is on the use of the functions that arise in the analysis of the
transient behaviour of the queuing system. The paper exploits
practical modelling to obtain a solution to the integral equation
encountered in the analysis. Results obtained indicate that under
heavy load conditions, there is significant disparity in the statistics
between the transient and steady state values.
Abstract: In this paper, we propose an improved 3D star skeleton
technique, which is a suitable skeletonization for human posture representation
and reflects the 3D information of human posture.
Moreover, the proposed technique is simple and then can be performed
in real-time. The existing skeleton construction techniques, such as
distance transformation, Voronoi diagram, and thinning, focus on the
precision of skeleton information. Therefore, those techniques are not
applicable to real-time posture recognition since they are computationally
expensive and highly susceptible to noise of boundary. Although
a 2D star skeleton was proposed to complement these problems,
it also has some limitations to describe the 3D information of the
posture. To represent human posture effectively, the constructed skeleton
should consider the 3D information of posture. The proposed 3D
star skeleton contains 3D data of human, and focuses on human action
and posture recognition. Our 3D star skeleton uses the 8 projection
maps which have 2D silhouette information and depth data of human
surface. And the extremal points can be extracted as the features of 3D
star skeleton, without searching whole boundary of object. Therefore,
on execution time, our 3D star skeleton is faster than the “greedy" 3D
star skeleton using the whole boundary points on the surface. Moreover,
our method can offer more accurate skeleton of posture than the
existing star skeleton since the 3D data for the object is concerned.
Additionally, we make a codebook, a collection of representative 3D
star skeletons about 7 postures, to recognize what posture of constructed
skeleton is.
Abstract: Tumour suppressors are key participants in the
prevention of cancer. Regulation of their expression through
miRNAs is important for comprehensive translation inhibition of
tumour suppressors and elucidation of carcinogenesis mechanisms.
We studies the possibility of 1521 miRNAs to bind with 873 mRNAs
of human tumour suppressors using RNAHybrid 2.1 and ERNAhybrid
programmes. Only 978 miRNAs were found to be
translational regulators of 812 mRNAs, and 61 mRNAs did not have
any miRNA binding sites. Additionally, 45.9% of all miRNA binding
sites were located in coding sequences (CDSs), 33.8% were located
in 3' untranslated region (UTR), and 20.3% were located in the
5'UTR. MiRNAs binding with more than 50 target mRNAs and
mRNAs binding with several miRNAs were selected. Hsa-miR-5096
had 15 perfectly complementary binding sites with mRNAs of 14
tumour suppressors. These newly indentified miRNA binding sites
can be used in the development of medicines (anti-sense therapies)
for cancer treatment.
Abstract: R&D risk management has been suggested as one of
the management approaches for accomplishing the goals of public
R&D investment. The investment in basic science and core technology
development is the essential roles of government for securing the
social base needed for continuous economic growth. And, it is also an
important role of the science and technology policy sectors to generate
a positive environment in which the outcomes of public R&D can be
diffused in a stable fashion by controlling the uncertainties and risk
factors in advance that may arise during the application of such
achievements to society and industry. Various policies have already
been implemented to manage uncertainties and variables that may
have negative impact on accomplishing public R& investment goals.
But we may derive new policy measures for complementing the
existing policies and for exploring progress direction by analyzing
them in a policy package from the viewpoint of R&D risk
management.
Abstract: Trust is essential for further and wider acceptance of
contemporary e-services. It was first addressed almost thirty years
ago in Trusted Computer System Evaluation Criteria standard by
the US DoD. But this and other proposed approaches of that
period were actually solving security. Roughly some ten years ago,
methodologies followed that addressed trust phenomenon at its core,
and they were based on Bayesian statistics and its derivatives, while
some approaches were based on game theory. However, trust is a
manifestation of judgment and reasoning processes. It has to be dealt
with in accordance with this fact and adequately supported in cyber
environment. On the basis of the results in the field of psychology
and our own findings, a methodology called qualitative algebra has
been developed, which deals with so far overlooked elements of trust
phenomenon. It complements existing methodologies and provides a
basis for a practical technical solution that supports management of
trust in contemporary computing environments. Such solution is also
presented at the end of this paper.
Abstract: Renewable water resources are crucial production
variables in arid and semi-arid regions where intensive agriculture is
practiced to meet ever-increasing demand for food and fiber. This is
crucial for the Dez and Moghan command areas where water delivery
problems and adverse environmental issues are widespread. This
paper aims to identify major problems areas using on-farm surveys of
200 farmers, agricultural extensionists and water suppliers which was
complemented by secondary data and field observations during 2010-
2011 cultivating season. The SPSS package was used to analyze and
synthesis data. Results indicated inappropriate canal operations in
both schemes, though there was no unanimity about the underlying
causes. Inequitable and inflexible distribution was found to be rooted
in deficient hydraulic structures particularly in the main and
secondary canals. The inadequacy and inflexibility of water
scheduling regime was the underlying causes of recurring pest and
disease spread which often led to the decline of crop yield and
quality, although these were not disputed, the water suppliers were
not prepared to link with the deficiencies in the operation of the main
and secondary canals. They rather attributed these to the prevailing
salinity; alkalinity, water table fluctuations and leaching of the
valuable agro-chemical inputs from the plants- route zone with farreaching
consequences. Examples of these include the pollution of
ground and surface resources due to over-irrigation at the farm level
which falls under the growers- own responsibility. Poor irrigation
efficiency and adverse environmental problems were attributed to
deficient and outdated farming practices that were in turn rooted in
poor extension programs and irrational water charges.
Abstract: The development of many measurement and inspection systems of products based on real-time image processing can not be carried out totally in a laboratory due to the size or the temperature of the manufactured products. Those systems must be developed in successive phases. Firstly, the system is installed in the production line with only an operational service to acquire images of the products and other complementary signals. Next, a recording service of the image and signals must be developed and integrated in the system. Only after a large set of images of products is available, the development of the real-time image processing algorithms for measurement or inspection of the products can be accomplished under realistic conditions. Finally, the recording service is turned off or eliminated and the system operates only with the real-time services for the acquisition and processing of the images. This article presents a systematic performance evaluation of the image compression algorithms currently available to implement a real-time recording service. The results allow establishing a trade off between the reduction or compression of the image size and the CPU time required to get that compression level.
Abstract: Basel III (or the Third Basel Accord) is a global
regulatory standard on bank capital adequacy, stress testing and
market liquidity risk agreed upon by the members of the Basel
Committee on Banking Supervision in 2010-2011, and scheduled to
be introduced from 2013 until 2018. Basel III is a comprehensive set
of reform measures. These measures aim to; (1) improve the banking
sector-s ability to absorb shocks arising from financial and economic
stress, whatever the source, (2) improve risk management and
governance, (3) strengthen banks- transparency and disclosures.
Similarly the reform target; (1) bank level or micro-prudential,
regulation, which will help raise the resilience of individual banking
institutions to periods of stress. (2) Macro-prudential regulations,
system wide risk that can build up across the banking sector as well
as the pro-cyclical implication of these risks over time. These two
approaches to supervision are complementary as greater resilience at
the individual bank level reduces the risk system wide shocks.
Macroeconomic impact of Basel III; OECD estimates that the
medium-term impact of Basel III implementation on GDP growth is
in the range -0,05 percent to -0,15 percent per year. On the other hand
economic output is mainly affected by an increase in bank lending
spreads as banks pass a rise in banking funding costs, due to higher
capital requirements, to their customers. Consequently the estimated
effects on GDP growth assume no active response from monetary
policy. Basel III impact on economic output could be offset by a
reduction (or delayed increase) in monetary policy rates by about 30
to 80 basis points. The aim of this paper is to create a framework
based on the recent regulations in order to prevent financial crises.
Thus the need to overcome the global financial crisis will contribute
to financial crises that may occur in the future periods. In the first
part of the paper, the effects of the global crisis on the banking
system examine the concept of financial regulations. In the second
part; especially in the financial regulations and Basel III are analyzed.
The last section in this paper explored the possible consequences of
the macroeconomic impacts of Basel III.
Abstract: In this study, a minimal submaximal element of LIT(X) (the lattice of all intuitionistic topologies for X, ordered by inclusion) is determined. Afterwards, a new contractive property, intuitionistic mega-connectedness, is defined. We show that the submaximality and mega-connectedness are not complementary intuitionistic topological invariants by identifying those members of LIT(X) which are intuitionistic mega-connected.
Abstract: Networked schools have become a feature of
education systems in countries that seek to provide learning
opportunities in schools located beyond major centres of population.
The internet and e-learning have facilitated the development of
virtual educational structures that complement traditional schools,
encouraging collaborative teaching and learning to proceed. In rural
New Zealand and in the Atlantic Canadian province of
Newfoundland and Labrador, e-learning is able to provide new ways
of organizing teaching, learning and the management of educational
opportunities. However, the future of e-teaching and e-learning in
networked schools depends on the development of professional
education programs that prepare teachers for collaborative teaching
and learning environments in which both virtual and traditional face
to face instruction co-exist.
Abstract: Data mining (DM) is the process of finding and extracting frequent patterns that can describe the data, or predict unknown or future values. These goals are achieved by using various learning algorithms. Each algorithm may produce a mining result completely different from the others. Some algorithms may find millions of patterns. It is thus the difficult job for data analysts to select appropriate models and interpret the discovered knowledge. In this paper, we describe a framework of an intelligent and complete data mining system called SUT-Miner. Our system is comprised of a full complement of major DM algorithms, pre-DM and post-DM functionalities. It is the post-DM packages that ease the DM deployment for business intelligence applications.
Abstract: A state of the art Speaker Identification (SI) system requires a robust feature extraction unit followed by a speaker modeling scheme for generalized representation of these features. Over the years, Mel-Frequency Cepstral Coefficients (MFCC) modeled on the human auditory system has been used as a standard acoustic feature set for SI applications. However, due to the structure of its filter bank, it captures vocal tract characteristics more effectively in the lower frequency regions. This paper proposes a new set of features using a complementary filter bank structure which improves distinguishability of speaker specific cues present in the higher frequency zone. Unlike high level features that are difficult to extract, the proposed feature set involves little computational burden during the extraction process. When combined with MFCC via a parallel implementation of speaker models, the proposed feature set outperforms baseline MFCC significantly. This proposition is validated by experiments conducted on two different kinds of public databases namely YOHO (microphone speech) and POLYCOST (telephone speech) with Gaussian Mixture Models (GMM) as a Classifier for various model orders.
Abstract: A subcarrier - spectral amplitude coding optical code
division multiple access system using the Khazani-Syed code with
Complementary subtraction detection technique is proposed. The
proposed system has been analyzed by taking into account the effects
of phase-induced intensity noise, shot noise, thermal noise and intermodulation
distortion noise. The performance of the system has been
compared with the spectral amplitude coding optical code division
multiple access system using the Hadamard code and the Modified
Quadratic Congruence code. The analysis shows that the proposed
system can eliminate the multiple access interference using the
Complementary subtraction detection technique, and hence improve
the overall system performance.