12,564 research outputs found

    Controlling and securing a Digital Home using Multiple Sensor Based Perception system Integrated with Mobile and Voice technology

    Full text link
    Fully controlled digital home had always been considered as a luxury of rich people because of excessive cost to install the system. It is now within the reach of mass people with lots of inexpensive cool features. In this paper we have designed and developed a very low cost, efficient and reliable Digital home system. Fully Controlled Digital Home is no more a Luxury. Our proposed system made it affordable. We built a low-cost feature-rich Digital Home System (DHS). Digital Home System is combination of automated services i.e. Electronic Device Controller, IR Security System, Web Desktop, Remote Video Surveillance System and Virtual Mobile by which we can control our home by avoiding old manual processes e.g. our physical presence at home is optional. The System provides some of the modern luxury & security features to us. Now we can control Light, fan, AC or any electronic devices by voice command, Blue-tooth, GPRS or Website. To control the system remotely, GPRS connectivity is added. We can also monitor our home from remote area by using Remote Video Surveillance System. This enables live video into mobile device of the digital home. Moreover, we can also access our PC and do the necessary tasks from any internet enabled computer in the world by using Web Desktop which is specially built for this purpose. Furthermore, access of unauthorized person in the home will be notified by SMS & store the image of the person and also generate a voice alarm. So that ensures the security of our valuable things. Also we can identify and monitor the location of our valuable assets e.g. precious metals remotely. Finally, Virtual mobile application is a Universal mobile Driver by which we can exactly perform some same task e.g. Remote call, Phone book access, SMS read-write of our mobile device from our new invented computer's virtual mobile.Comment: 8 page

    Results of Long-Baseline Neutrino Experiments Based on the Consideration of Frameworks

    Full text link
    In this paper, we present an analysis of the outcomes of long-baseline neutrino experiments based on the consideration of frameworks. Our analysis suggests that the time difference between the time-of-flights corresponding to the speed of light (in vacuum) and that of the neutrino from a source to a detector is within the range of our predicted time difference assuming that the speed of neutrino follows a Galilean transformation. As the ghostly particles called neutrinos have peculiar properties which are still unresolved, so we propose measurements need to be performed at different times of the day to test any diurnal variations (if possible then any annual variations) due to the movement of the Earth.Comment: Revised in Acknowledgments, 9 pages, 5 figurs, accepted in International Conference on Neutrino Physics and Astrophysics (ICNPA: 2012), Amsterdam May 201

    Investigation by physical methods of the possible role of telomeres in DNA in aging process

    Get PDF
    The interaction energies between the different types of bases of a single strand of DNA molecule have been calculated. Using these original values of energies the harmonic behavior of a number of base patterns of DNA has been studied. In view of the great interest aroused by the discovery of the role of the telomere segment of the DNA in the replication process and its possible link with the aging process, we have investigated, with simple models, the harmonic behavior of the telomeric pattern of bases as well as the thermodynamic response in the biological system. With these results a conclusion on the probable role of the telomeric pattern on aging has also been drawn. Here the calculated values of harmonic frequencies of the telomeric pattern of bases and of other possible patterns show that the telomeric pattern is associated with the highest vibrational frequency among all patterns of base combinations at the replication end of DNA. This seems to suggest that due to the existing telomeric pattern being closest to the frequencies of the electromagnetic radiation coming from sunlight, resonance of the telomeric frequency with such radiation may be responsible for damage to the reproductive ability of the cells and consequent aging and other problems. On the other hand in the last part of this work we have calculated the thermal vibrational amplitudes of the telomeric pattern and other possible patterns which show that the amplitude for the telomeric pattern is the least, and this suggests that the telomeric pattern is more mechanically and thermally stable than other possible patterns in the biological environment against damage from ordinary heat and mechanical effects.Comment: 10 pages, 3 figures, physics theories in DN

    SHEAR-net: An End-to-End Deep Learning Approach for Single Push Ultrasound Shear Wave Elasticity Imaging

    Full text link
    Ultrasound Shear Wave Elastography (USWE) with conventional B-mode imaging demonstrates better performance in lesion segmentation and classification problems. In this article, we propose SHEAR-net, an end-to-end deep neural network, to reconstruct USWE images from tracked tissue displacement data at different time instants induced by a single acoustic radiation force (ARF) with 100% or 50% of the energy in conventional use. The SHEAR-net consists of a localizer called the S-net to first localize the lesion location and then uses recurrent layers to extract temporal correlations from wave patterns using different time frames, and finally, with an estimator, it reconstructs the shear modulus image from the concatenated outputs of S-net and recurrent layers. The network is trained with 800 simulation and a limited number of CIRS tissue mimicking phantom data and is optimized using a multi-task learning loss function where the tasks are: inclusion localization and modulus estimation. The efficacy of the proposed SHEAR-net is extensively evaluated both qualitatively and quantitatively on 125 test set of motion data obtained from simulation and CIRS phantoms. We show that the proposed approach consistently outperforms the current state-of-the-art method and achieves overall 4-5 dB improvement in PSNR and SNR. In addition, an average gain of 0.15 in DSC and SSIM values indicate that the SHEAR-net has a better inclusion coverage area and structural similarity of the two approaches. The proposed real-time deep learning based technique can accurately estimate shear modulus for a minimum tissue displacement of 0.5ÎĽ\mum and image multiple inclusions with a single push ARF

    Jacobi sums of order 2l22l^2

    Full text link
    The aim of this paper is to deal with congruences for Jacobi sums of order 2l22l^{2} over a finite field Fq,q=pr\mathbb{F}_{q}, q=p^{r}, $p^{r}\equiv 1\ (mod \ 2l^{2}),where, where l>3and and pareprimes.Further,wealsocalculateJacobisums are primes. Further, we also calculate Jacobi sums J_{2l^{2}}(1,n)oforder of order 2l^{2}$ in terms of Dickson-Hurwitz sums.Comment: Submitted for consideratio

    A Survey of TCP Reno, New Reno and Sack Over Mobile Ad-Hoc Network

    Full text link
    Transmission Control Protocol (TCP) is often preferred to be implemented at the transport layer of a Mobile Ad-hoc Network (MANET) because of its wide range of applications, which enjoys the advantage of reliable data transmission in the Internet. However, because of some unique characteristics of MANET, TCP cannot offer reliable services while using e-mail, internet search and file transmission in such a network. The research investigates how well the different versions of TCP respond to various performance differentials when subjected to different network stresses and topology changes, aside from identifying the most efficient and robust TCP version(s) for different MANET scenarios. Among several TCP variants, three types are considered important for the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment (SACK). In most cases, the TCP performance is found in our study to decrease when the node size and mobility rate is increased in the network. There is, however, exception to this. As our simulation results demonstrate, the increases in the node velocity sometimes help the TCP to attain a better performance. The study also reveals that out of the three variants, TCP SACK can adapt relatively well to the changing network sizes while TCP Reno performs most robustly in the presence of different mobility rates within MANET.Comment: 8 Figures, MANE

    A New Compression Based Index Structure for Efficient Information Retrieval

    Full text link
    Finding desired information from large data set is a difficult problem. Information retrieval is concerned with the structure, analysis, organization, storage, searching, and retrieval of information. Index is the main constituent of an IR system. Now a day exponential growth of information makes the index structure large enough affecting the IR system's quality. So compressing the Index structure is our main contribution in this paper. We compressed the document number in inverted file entries using a new coding technique based on run-length encoding. Our coding mechanism uses a specified code which acts over run-length coding. We experimented and found that our coding mechanism on an average compresses 67.34% percent more than the other techniques.Comment: 5 page

    A Literature Review of Code Clone Analysis to Improve Software Maintenance Process

    Full text link
    Software systems are getting more complex as the system grows where maintaining such system is a primary concern for the industry. Code clone is one of the factors making software maintenance more difficult. It is a process of replicating code blocks by copy-and-paste that is common in software development. In the beginning stage of the project, developers find it easy and time consuming though it has crucial drawbacks in the long run. There are two types of researchers where some researchers think clones lead to additional changes during maintenance phase, in later stage increase the overall maintenance effort. On the other hand, some researchers think that cloned codes are more stable than non cloned codes. In this study, we discussed Code Clones and different ideas, methods, clone detection tools, related research on code clone, case study.Comment: This is a research collaboration of American International University-Bangladesh, Carleton University-Canada, SCICON & TigerHATS-Banglades

    Child Education Through Animation: An Experimental Study

    Full text link
    Teachers have tried to teach their students by introducing text books along with verbal instructions in traditional education system. However, teaching and learning methods could be changed for developing Information and Communication Technology. It's time to adapt students with interactive learning system so that they can improve their learning, catching, and memorizing capabilities. It is indispensable to create high quality and realistic leaning environment for students. Visual learning can be easier to understand and deal with their learning. We developed visual learning materials in the form of video for students of primary level using different multimedia application tools. The objective of this paper is to examine the impact of students abilities to acquire new knowledge or skills through visual learning materials and blended leaning that is integration of visual learning materials with teachers instructions. We visited a primary school in Dhaka city for this study and conducted teaching with three different groups of students, (i) teacher taught students by traditional system on same materials and marked level of students ability to adapt by a set of questions, (ii) another group was taught with only visual learning material and assessment was done with 15 questionnaires, (iii) the third group was taught with the video of solar system combined with teachers instructions and assessed with the same questionnaires. This integration of visual materials with verbal instructions is a blended approach of learning. The interactive blended approach greatly promoted students ability of acquisition of knowledge and skills. Students response and perception were very positive towards the blended technique than the other two methods. This interactive blending leaning system may be an appropriate method especially for school children

    Risk analysis for long term disposal of radioactive nuclear waste

    Full text link
    In this study the technical risk analysis that was conducted using fault trees.With respect to the scenarios in Bangladesh, there is still no concrete proposal about a permanent disposal method, so this analysis is based on the propositions and other historical data. When actual data is produced, this risk analysis technique can then be employed to calculate risks.Comment: 13 pages, 5 figure
    • …
    corecore