Abstract: The successful use of CDMA technology is based on
the construction of large families of encoding sequences with good
correlation properties. This paper discusses PN sequence generation
based on Residue Arithmetic with an effort to improve the performance
of existing interference-limited CDMA technology for mobile
cellular systems. All spreading codes with residual number system
proposed earlier did not consider external interferences, multipath
propagation, Doppler effect etc. In literature the use of residual
arithmetic in DS-CDMA was restricted to encoding of already spread
sequence; where spreading of sequence is done by some existing
techniques. The novelty of this paper is the use of residual number
system in generation of the PN sequences which is used to spread
the message signal. The significance of cross-correlation factor in
alleviating multi-access interference is also discussed. The RNS based
PN sequence has superior performance than most of the existing
codes that are widely used in DS-CDMA applications. Simulation
results suggest that the performance of the proposed system is
superior to many existing systems.
Abstract: A. niger XP isolated from Vietnam produces very low amount of acidic phytase with optimal pH at 2.5 and 5.5. The phytase production of this strain was successfully improved through gene cloning and expression. A 1.4 - kb DNA fragment containing the coding region of the phyA gene was amplified by PCR and inserted into the expression vector pPICZαA with a signal peptide α- factor, under the control of AOX1 promoter. The recombined plasmid was transformed into the host strain P. pastoris KM71H and X33 by electroporation. Both host strains could efficiently express and secret phytase. The multicopy strains were screened for over expression of phytase. All the selected multicopy strains of P. pastoris X33 were examined for phytase activity, the maximum phytase yield of 1329 IU/ml was obtained after 4 days of incubation in medium BMM. The recombinant protein with MW of 97.4 KW showed to be the only one protein secreted in the culture broth. Multicopy transformant P. pastoris X33 supposed to be potential candidate for producing the commercial preparation of phytase.
Abstract: We present linear codes over finite commutative rings
which are not necessarily Frobenius. We treat the notion of syndrome
decoding by using Pontrjagin duality. We also give a version of Delsarte-s
theorem over rings relating trace codes and subring subcodes.
Abstract: The research on two-wheeled inverted pendulum (TWIP) mobile robots or commonly known as balancing robots have gained momentum over the last decade in a number of robotic laboratories around the world. This paper describes the hardware design of such a robot. The objective of the design is to develop a TWIP mobile robot as well as MATLAB interfacing configuration to be used as flexible platform comprises of embedded unstable linear plant intended for research and teaching purposes. Issues such as selection of actuators and sensors, signal processing units, MATLAB Real Time Workshop coding, modeling and control scheme will be addressed and discussed. The system is then tested using a wellknown state feedback controller to verify its functionality.
Abstract: Tumour suppressors are key participants in the
prevention of cancer. Regulation of their expression through
miRNAs is important for comprehensive translation inhibition of
tumour suppressors and elucidation of carcinogenesis mechanisms.
We studies the possibility of 1521 miRNAs to bind with 873 mRNAs
of human tumour suppressors using RNAHybrid 2.1 and ERNAhybrid
programmes. Only 978 miRNAs were found to be
translational regulators of 812 mRNAs, and 61 mRNAs did not have
any miRNA binding sites. Additionally, 45.9% of all miRNA binding
sites were located in coding sequences (CDSs), 33.8% were located
in 3' untranslated region (UTR), and 20.3% were located in the
5'UTR. MiRNAs binding with more than 50 target mRNAs and
mRNAs binding with several miRNAs were selected. Hsa-miR-5096
had 15 perfectly complementary binding sites with mRNAs of 14
tumour suppressors. These newly indentified miRNA binding sites
can be used in the development of medicines (anti-sense therapies)
for cancer treatment.
Abstract: In this paper, various algorithms for designing quadrature mirror filter are reviewed and a new algorithm is presented for the design of near perfect reconstruction quadrature mirror filter bank. In the proposed algorithm, objective function is formulated using the perfect reconstruction condition or magnitude response condition of prototype filter at frequency (ω = 0.5π) in ideal condition. The cutoff frequency is iteratively changed to adjust the filters coefficients using optimization algorithm. The performances of the proposed algorithm are evaluated in term of computation time, reconstruction error and number of iterations. The design examples illustrate that the proposed algorithm is superior in term of peak reconstruction error, computation time, and number of iterations. The proposed algorithm is simple, easy to implement, and linear in nature.
Abstract: Research in quantum computation is looking for the consequences of having information encoding, processing and communication exploit the laws of quantum physics, i.e. the laws which govern the ultimate knowledge that we have, today, of the foreign world of elementary particles, as described by quantum mechanics. This paper starts with a short survey of the principles which underlie quantum computing, and of some of the major breakthroughs brought by the first ten to fifteen years of research in this domain; quantum algorithms and quantum teleportation are very biefly presented. The next sections are devoted to one among the many directions of current research in the quantum computation paradigm, namely quantum programming languages and their semantics. A few other hot topics and open problems in quantum information processing and communication are mentionned in few words in the concluding remarks, the most difficult of them being the physical implementation of a quantum computer. The interested reader will find a list of useful references at the end of the paper.
Abstract: This paper presents an approach for an unequal error
protection of facial features of personal ID images coding. We
consider unequal error protection (UEP) strategies for the efficient
progressive transmission of embedded image codes over noisy
channels. This new method is based on the progressive image
compression embedded zerotree wavelet (EZW) algorithm and UEP
technique with defined region of interest (ROI). In this case is ROI
equal facial features within personal ID image. ROI technique is
important in applications with different parts of importance. In ROI
coding, a chosen ROI is encoded with higher quality than the
background (BG). Unequal error protection of image is provided by
different coding techniques and encoding LL band separately. In our
proposed method, image is divided into two parts (ROI, BG) that
consist of more important bytes (MIB) and less important bytes
(LIB). The proposed unequal error protection of image transmission
has shown to be more appropriate to low bit rate applications,
producing better quality output for ROI of the compresses image.
The experimental results verify effectiveness of the design. The
results of our method demonstrate the comparison of the UEP of
image transmission with defined ROI with facial features and the
equal error protection (EEP) over additive white gaussian noise
(AWGN) channel.
Abstract: With the advent of digital cinema and digital
broadcasting, copyright protection of video data has been one of the
most important issues.
We present a novel method of watermarking for video image data
based on the hardware and digital wavelet transform techniques and
name it as “traceable watermarking" because the watermarked data is
constructed before the transmission process and traced after it has been
received by an authorized user.
In our method, we embed the watermark to the lowest part of each
image frame in decoded video by using a hardware LSI.
Digital Cinema is an important application for traceable
watermarking since digital cinema system makes use of watermarking
technology during content encoding, encryption, transmission,
decoding and all the intermediate process to be done in digital cinema
systems. The watermark is embedded into the randomly selected
movie frames using hash functions.
Embedded watermark information can be extracted from the
decoded video data. For that, there is no need to access original movie
data. Our experimental results show that proposed traceable
watermarking method for digital cinema system is much better than the
convenient watermarking techniques in terms of robustness, image
quality, speed, simplicity and robust structure.
Abstract: This paper presents a video transmission system using
layered multiple description (coding (MDC) and multi-path transport
for reliable video communications in wireless ad-hoc networks.
The proposed MDC extends a quality-scalable H.264/AVC video
coding algorithm to generate two independent descriptions. The two
descriptions are transmitted over different paths to a receiver in order
to alleviate the effect of unstable channel conditions of wireless adhoc
networks. If one description is lost due to transmission erros,
then the correctly received description is used to estimate the lost
information of the corrupted description. The proposed MD coder
maintains an adequate video quality as long as both description are
not simultaneously lost. Simulation results show that the proposed
MD coding combined with multi-path transport system is largely
immune to packet losses, and therefore, can be a promising solution
for robust video communications over wireless ad-hoc networks.
Abstract: In spite of all advancement in software testing,
debugging remains a labor-intensive, manual, time consuming, and
error prone process. A candidate solution to enhance debugging
process is to fuse it with testing process. To achieve this integration,
a possible solution may be categorizing common software tests and
errors followed by the effort on fixing the errors through general
solutions for each test/error pair. Our approach to address this issue is
based on Christopher Alexander-s pattern and pattern language
concepts. The patterns in this language are grouped into three major
sections and connect the three concepts of test, error, and debug.
These patterns and their hierarchical relationship shape a pattern
language that introduces a solution to solve software errors in a
known testing context.
Finally, we will introduce our developed framework ADE as a
sample implementation to support a pattern of proposed language,
which aims to automate the whole process of evolving software
design via evolutionary methods.
Abstract: Insufficient Quality of Service (QoS) of Voice over
Internet Protocol (VoIP) is a growing concern that has lead the need
for research and study. In this paper we investigate the performance
of VoIP and the impact of resource limitations on the performance of
Access Networks. The impact of VoIP performance in Access
Networks is particularly important in regions where Internet
resources are limited and the cost of improving these resources is
prohibitive. It is clear that perceived VoIP performance, as measured
by mean opinion score [2] in experiments, where subjects are asked
to rate communication quality, is determined by end-to-end delay on
the communication path, delay variation, packet loss, echo, the
coding algorithm in use and noise. These performance indicators can
be measured and the affect in the Access Network can be estimated.
This paper investigates the congestion in the Access Network to the
overall performance of VoIP services with the presence of other
substantial uses of internet and ways in which Access Networks can
be designed to improve VoIP performance. Methods for analyzing
the impact of the Access Network on VoIP performance will be
surveyed and reviewed. This paper also considers some approaches
for improving performance of VoIP by carrying out experiments
using Network Simulator version 2 (NS2) software with a view to
gaining a better understanding of the design of Access Networks.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: A New features are extracted and compared to
improve the prediction of protein-protein interactions. The basic idea
is to select and use the best set of features from the Tensor matrices
that are produced by the frequency vectors of the protein sequences.
Three set of features are compared, the first set is based on the
indices that are the most common in the interacting proteins, the
second set is based on the indices that tend to be common in the
interacting and non-interacting proteins, and the third set is
constructed by using random indices. Moreover, three encoding
strategies are compared; that are based on the amino asides polarity,
structure, and chemical properties. The experimental results indicate
that the highest accuracy can be obtained by using random indices
with chemical properties encoding strategy and support vector
machine.
Abstract: This paper investigates the performance of a speech
recognizer in an interactive voice response system for various coded
speech signals, coded by using a vector quantization technique namely
Multi Switched Split Vector Quantization Technique. The process of
recognizing the coded output can be used in Voice banking application.
The recognition technique used for the recognition of the coded speech
signals is the Hidden Markov Model technique. The spectral distortion
performance, computational complexity, and memory requirements of
Multi Switched Split Vector Quantization Technique and the
performance of the speech recognizer at various bit rates have been
computed. From results it is found that the speech recognizer is
showing better performance at 24 bits/frame and it is found that the
percentage of recognition is being varied from 100% to 93.33% for
various bit rates.
Abstract: Regulatory relationships of 686 intronic miRNA and 784 intergenic miRNAs with mRNAs of 51 intronic miRNA coding genes were established. Interaction features of studied miRNAs with 5'UTR, CDS and 3'UTR of mRNA of each gene were revealed. Functional regions of mRNA were shown to be significantly heterogenous according to the number of binding sites of miRNA and to the location density of these sites.
Abstract: In this paper, we present a simple circuit for
Manchester decoding and without using any complicated or
programmable devices. This circuit can decode 90kbps of transmitted
encoded data; however, greater than this transmission rate can be
decoded if high speed devices were used. We also present a new
method for extracting the embedded clock from Manchester data in
order to use it for serial-to-parallel conversion. All of our
experimental measurements have been done using simulation.
Abstract: The aim of this paper to characterize a larger set of
wavelet functions for implementation in a still image compression
system using SPIHT algorithm. This paper discusses important
features of wavelet functions and filters used in sub band coding to
convert image into wavelet coefficients in MATLAB. Image quality
is measured objectively using peak signal to noise ratio (PSNR) and
its variation with bit rate (bpp). The effect of different parameters is
studied on different wavelet functions. Our results provide a good
reference for application designers of wavelet based coder.
Abstract: A subcarrier - spectral amplitude coding optical code
division multiple access system using the Khazani-Syed code with
Complementary subtraction detection technique is proposed. The
proposed system has been analyzed by taking into account the effects
of phase-induced intensity noise, shot noise, thermal noise and intermodulation
distortion noise. The performance of the system has been
compared with the spectral amplitude coding optical code division
multiple access system using the Hadamard code and the Modified
Quadratic Congruence code. The analysis shows that the proposed
system can eliminate the multiple access interference using the
Complementary subtraction detection technique, and hence improve
the overall system performance.
Abstract: LDPC codes could be used in magnetic storage devices because of their better decoding performance compared to other error correction codes. However, their hardware implementation results in large and complex decoders. This one of the main obstacles the decoders to be incorporated in magnetic storage devices. We construct small high girth and rate 2 columnweight codes from cage graphs. Though these codes have low performance compared to higher column weight codes, they are easier to implement. The ease of implementation makes them more suitable for applications such as magnetic recording. Cages are the smallest known regular distance graphs, which give us the smallest known column-weight 2 codes given the size, girth and rate of the code.