Abstract: Countryside has been generally recognized and
regarded as a characteristic symbol which presents in human memory
for a long time. As a result of the change of times, because of it is
failure to meet the growing needs of the growing life and mental
decline, the vast rural area began to decline. But their history feature
image which accumulated by the ancient tradition provides people
with the origins of existence on the spiritual level, such as "identity"
and "belonging", makes people closer to the others in the spiritual and
psychological aspects of a common experience about the past, thus the
sense of a lack of culture caused by the losing of memory symbols is
weakened. So, in the modernization process, how to repair its vitality
and transform and planning it in a sustainable way has become a hot
topics in architectural and urban planning. This paper aims to break
the constraints of disciplines, from the perspective of interdiscipline,
using the research methods of systems science to analyze and discuss
the theories and methods of rural form factors, which based on the
viewpoint of memory in psychology. So we can find a right way to
transform the Rural to give full play to the role of the countryside in
the actual use and the shape of history spirits.
Abstract: The current paper presents the results of a conducted
case study. During the past few years the number of children
diagnosed with Learning Difficulties has drastically augmented and
especially the cases of ADHD (Attention Deficit Hyperactivity
Disorder). One of the core characteristics of ADHD is a deficit in
working memory functions. The review of the literature indicates a
plethora of educational software that aim at training and enhancing
the working memory. Nevertheless, in the current paper, the
possibility of using for the same purpose free, online games will be
explored. Another issue of interest is the potential effect of the
working memory training to the core symptoms of ADHD. In order
to explore the abovementioned research questions, three digital tests
are employed, all of which are developed on the E-slate platform by
the author, in order to check the levels of ADHD’s symptoms and to
be used as diagnostic tools, both in the beginning and in the end of
the case study. The tools used during the main intervention of the
research are free online games for the training of working memory.
The research and the data analysis focus on the following axes: a) the
presence and the possible change in two of the core symptoms of
ADHD, attention and impulsivity and b) a possible change in the
general cognitive abilities of the individual. The case study was
conducted with the participation of a thirteen year-old, female
student, diagnosed with ADHD, during after-school hours. The
results of the study indicate positive changes both in the levels of
attention and impulsivity. Therefore, we conclude that the training of
working memory through the use of free, online games has a positive
impact on the characteristics of ADHD. Finally, concerning the
second research question, the change in general cognitive abilities, no
significant changes were noted.
Abstract: For the music composer Myriam Marbe the musical
time and memory represent 2 (complementary) phenomena with
conclusive impact on the settlement of new musical ontologies.
Summarizing the most important achievements of the contemporary
techniques of composition, her vision on the microform presented in
The Concert for Daniel Kientzy, saxophone and orchestra transcends
the linear and unidirectional time in favour of a flexible, multivectorial
speech with spiral developments, where the sound substance
is auto(re)generated by analogy with the fundamental processes of
the memory. The conceptual model is of an archetypal essence, the
music composer being concerned with identifying the mechanisms of
the creation process, especially of those specific to the collective
creation (of oral tradition). Hence the spontaneity of expression,
improvisation tint, free rhythm, micro-interval intonation, coloristictimbral
universe dominated by multiphonics and unique sound
effects, hence the atmosphere of ritual, however purged by the
primary connotations and reprojected into a wonderful spectacular
space. The Concert is a work of artistic maturity and enforces respect,
among others, by the timbral diversity of the three species of
saxophone required by the music composer (baritone, sopranino and
alt), in Part III Daniel Kientzy shows the performance of playing two
saxophones concomitantly. The score of the music composer Myriam
Marbe contains a deeply spiritualized music, full or archetypal
symbols, a music whose drama suggests a real cinematographic
movement.
Abstract: We have conducted the optimal synthesis of rootmean-
squared objective filter to estimate the state vector in the case if
within the observation channel with memory the anomalous noises
with unknown mathematical expectation are complement in the
function of the regular noises. The synthesis has been carried out for
linear stochastic systems of continuous - time.
Abstract: For optimal unbiased filter as mean-square and in the
case of functioning anomalous noises in the observation memory
channel, we have proved insensitivity of filter to inaccurate
knowledge of the anomalous noise intensity matrix and its
equivalence to truncated filter plotted only by non anomalous
components of an observation vector.
Abstract: In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.
Abstract: In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.
Abstract: Greenhouse is a building, which provides controlled climate conditions to the plants to keep them from external hard conditions. Greenhouse technology gives freedom to the farmer to select any crop type in any time during year. The quality and productivity of plants inside greenhouse is highly dependent on the management quality and a good management scheme is defined by the quality of the information collected from the greenhouse environment. Therefore, Continuous monitoring of environmental variables such as temperature, humidity, and soil moisture gives information to the grower to better understand, how each factor affects growth and how to manage maximal crop productiveness. In this piper, we designed and implemented climate monitoring with irrigation control system based on Wireless Sensor Network (WSN) technology. The designed system is characterized with friendly to use, easy to install by any greenhouse user, multi-sensing nodes, multi-PAN ID, low cast, water irrigation control and low operation complexity. The system consists of two node types (sensing and control) with star topology on one PAN ID. Moreover, greenhouse manager can modifying system parameters such as (sensing node addresses, irrigation upper and lower control limits) by updating corresponding data in SDRAM memory. In addition, the designed system uses 2*16 characters. LCD to display the micro climate parameters values of each plants row inside the greenhouse.
Abstract: Proper maintenance and preservation of significant cultural heritages or historic buildings is necessary. It can not only enhance environmental benefits and a sense of community, but also preserve a city's history and people’s memory. It allows the next generation to be able to get a glimpse of our past, and achieve the goal of sustainable preserved cultural assets. However, the management of maintenance work has not been appropriate for many designated heritages or historic buildings so far. The planning and implementation of the reuse has yet to have a breakthrough specification. It leads the heritages to a mere formality of being “reserved”, instead of the real meaning of “conservation”. For the restoration and preservation of cultural heritages study issues, it is very important due to the consideration of historical significance, symbolism, and economic benefits effects. However, the decision makers such as the officials from public sector they often encounter which heritage should be prioritized to be restored first under the available limited budgets. Only very few techniques are available today to determine the appropriately restoration priorities for the diverse historical heritages, perhaps because of a lack of systematized decision-making aids been proposed before. In the past, the discussions of management and maintenance towards cultural assets were limited to the selection of reuse alternatives instead of the allocation of resources. In view of this, this research will adopt some integrated research methods to solve the existing problems that decision-makers might encounter when allocating resources in the management and maintenance of heritages and historic buildings.
The purpose of this study is to develop a sustainable decision making model for local governments to resolve these problems. We propose an alternative decision support model to prioritize restoration needs within the limited budgets. The model is constructed based on fuzzy Delphi, fuzzy analysis network process (FANP) and goal programming (GP) methods. In order to avoid misallocate resources; this research proposes a precise procedure that can take multi-stakeholders views, limited costs and resources into consideration. Also, the combination of many factors and goals has been taken into account to find the highest priority and feasible solution results. To illustrate the approach we propose in this research, seven cultural heritages in Taipei city as one example has been used as an empirical study, and the results are in depth analyzed to explain the application of our proposed approach.
Abstract: Fault tolerance is critical in many of today's large computer systems. This paper focuses on improving fault tolerance through testing. Moreover, it concentrates on the memory faults: how to access the editable part of a process memory space and how this part is affected. A special Software Fault Injection Technique (SFIT) is proposed for this purpose. This is done by sequentially scanning the memory of the target process, and trying to edit maximum number of bytes inside that memory. The technique was implemented and tested on a group of programs in software packages such as jet-audio, Notepad, Microsoft Word, Microsoft Excel, and Microsoft Outlook. The results from the test sample process indicate that the size of the scanned area depends on several factors. These factors are: process size, process type, and virtual memory size of the machine under test. The results show that increasing the process size will increase the scanned memory space. They also show that input-output processes have more scanned area size than other processes. Increasing the virtual memory size will also affect the size of the scanned area but to a certain limit.
Abstract: The log periodogram regression is widely used in empirical
applications because of its simplicity, since only a least squares
regression is required to estimate the memory parameter, d, its good
asymptotic properties and its robustness to misspecification of the
short term behavior of the series. However, the asymptotic distribution
is a poor approximation of the (unknown) finite sample distribution
if the sample size is small. Here the finite sample performance of different
nonparametric residual bootstrap procedures is analyzed when
applied to construct confidence intervals. In particular, in addition to
the basic residual bootstrap, the local and block bootstrap that might
adequately replicate the structure that may arise in the errors of the
regression are considered when the series shows weak dependence in
addition to the long memory component. Bias correcting bootstrap
to adjust the bias caused by that structure is also considered. Finally,
the performance of the bootstrap in log periodogram regression based
confidence intervals is assessed in different type of models and how
its performance changes as sample size increases.
Abstract: I/O workload is a critical and important factor to
analyze I/O pattern and file system performance. However tracing I/O
operations on the fly distributed parallel file system is non-trivial due
to collection overhead and a large volume of data. In this paper, we
design and implement a parallel file system logging method for high
performance computing using shared memory-based multi-layer
scheme. It minimizes the overhead with reduced logging operation
response time and provides efficient post-processing scheme through
shared memory. Separated logging server can collect sequential logs
from multiple clients in a cluster through packet communication.
Implementation and evaluation result shows low overhead and high
scalability of this architecture for high performance parallel logging
analysis.
Abstract: In this paper, enhanced ground proximity warning simulation and validation system is designed and implemented. First, based on square grid and sub-grid structure, the global digital terrain database is designed and constructed. Terrain data searching is implemented through querying the latitude and longitude bands and separated zones of global terrain database with the current aircraft position. A combination of dynamic scheduling and hierarchical scheduling is adopted to schedule the terrain data, and the terrain data can be read and delete dynamically in the memory. Secondly, according to the scope, distance, approach speed information etc. to the dangerous terrain in front, and using security profiles calculating method, collision threat detection is executed in real-time, and provides caution and warning alarm. According to this scheme, the implementation of the enhanced ground proximity warning simulation system is realized. Simulations are carried out to verify a good real-time in terrain display and alarm trigger, and the results show simulation system is realized correctly, reasonably and stable.
Abstract: Learning programming is difficult for many learners. Some researches have found that the main difficulty relates to cognitive load. Cognitive overload happens in programming due to the nature of the subject which is intrinisicly over-bearing on the working memory. It happens due to the complexity of the subject itself. The problem is made worse by the poor instructional design methodology used in the teaching and learning process. Various efforts have been proposed to reduce the cognitive load, e.g. visualization softwares, part-program method etc. Use of many computer based systems have also been tried to tackle the problem. However, little success has been made to alleviate the problem. More has to be done to overcome this hurdle. This research attempts at understanding how cognitive load can be managed so as to reduce the problem of overloading. We propose a mechanism to measure the cognitive load during pre instruction, post instruction and in instructional stages of learning. This mechanism is used to help the instruction. As the load changes the instruction is made to adapt itself to ensure cognitive viability. This mechanism could be incorporated as a sub domain in the student model of various computer based instructional systems to facilitate the learning of programming.
Abstract: The physiological effects of physical exercise on
human body are relatively well known in literature, which describes
in detail the changes that occur in the cardiovascular system, the
respiratory one, in bones and other systems, both during exercise
and after its delivery. However, the effects of exercise on mental
processes are less treated. From the literature reviews discussed in
this study, it can be detached the idea that we can not exactly say that
physical exercise has beneficial effects on mental processes, but
neither that it would have potentially negative effects. This
uncertainty, reflected in the inability to indicate precise and
unequivocal meaning, favorable-unfavorable physical effort in acting
on mental processes, is a prime reason to undertake a study of the
phenomenon influence effort administered physical education classes
on the dynamics of mental processes like attention and memory.
Abstract: In this paper, an efficient technique is proposed to manage the cache memory. The proposed technique introduces some modifications on the well-known set associative mapping technique. This modification requires a little alteration in the structure of the cache memory and on the way by which it can be referenced. The proposed alteration leads to increase the set size virtually and consequently to improve the performance and the utilization of the cache memory. The current mapping techniques have accomplished good results. In fact, there are still different cases in which cache memory lines are left empty and not used, whereas two or more processes overwrite the lines of each other, instead of using those empty lines. The proposed algorithm aims at finding an efficient way to deal with such problem.
Abstract: The set of all abelian subalgebras is computationally
obtained for any given finite-dimensional Lie algebra, starting from the nonzero brackets in its law. More concretely, an algorithm
is described and implemented to compute a basis for each nontrivial abelian subalgebra with the help of the symbolic computation package MAPLE. Finally, it is also shown a brief computational study
for this implementation, considering both the computing time and the
used memory.
Abstract: Random Access Memory (RAM) is an important
device in computer system. It can represent the snapshot on how the
computer has been used by the user. With the growth of its
importance, the computer memory has been an issue that has been
discussed in digital forensics. A number of tools have been developed
to retrieve the information from the memory. However, most of the
tools have their limitation in the ability of retrieving the important
information from the computer memory. Hence, this paper is aimed
to discuss the limitation and the setback for two main techniques such
as process signature search and process enumeration. Then, a new
hybrid approach will be presented to minimize the setback in both
individual techniques. This new approach combines both techniques
with the purpose to retrieve the information from the process block
and other objects in the computer memory. Nevertheless, the basic
theory in address translation for x86 platforms will be demonstrated
in this paper.
Abstract: This paper sets forth the possibility and importance about applying Data Mining in Web logs mining and shows some problems in the conventional searching engines. Then it offers an improved algorithm based on the original AprioriAll algorithm which has been used in Web logs mining widely. The new algorithm adds the property of the User ID during the every step of producing the candidate set and every step of scanning the database by which to decide whether an item in the candidate set should be put into the large set which will be used to produce next candidate set. At the meantime, in order to reduce the number of the database scanning, the new algorithm, by using the property of the Apriori algorithm, limits the size of the candidate set in time whenever it is produced. Test results show the improved algorithm has a more lower complexity of time and space, better restrain noise and fit the capacity of memory.
Abstract: The neurogenic potential of many herbal extracts used
in Indian medicine is hitherto unknown. Extracts derived from
Clitoria ternatea Linn have been used in Indian Ayurvedic system of
medicine as an ingredient of “Medhya rasayana", consumed for
improving memory and longevity in humans and also in treatment of
various neurological disorders. Our earlier experimental studies with
oral intubation of Clitoria ternatea aqueous root extract (CTR) had
shown significant enhancement of learning and memory in postnatal
and young adult Wistar rats. The present study was designed to
elucidate the in vitro effects of 200ng/ml of CTR on proliferation,
differentiation and growth of anterior subventricular zone neural
stem cells (aSVZ NSC-s) derived from prenatal and postnatal rat
pups. Results show significant increase in proliferation and growth of
neurospheres and increase in the yield of differentiated neurons of
aSVZ neural precursor cells (aSVZNPC-s) at 7 days in vitro when
treated with 200ng/ml of CTR as compared to age matched control.
Results indicate that CTR has growth promoting neurogenic effect on
aSVZ neural stem cells and their survival similar to neurotrophic
factors like Survivin, Neuregulin 1, FGF-2, BDNF possibly the basis
for enhanced learning and memory.