12,564 research outputs found
Controlling and securing a Digital Home using Multiple Sensor Based Perception system Integrated with Mobile and Voice technology
Fully controlled digital home had always been considered as a luxury of rich
people because of excessive cost to install the system. It is now within the
reach of mass people with lots of inexpensive cool features. In this paper we
have designed and developed a very low cost, efficient and reliable Digital
home system. Fully Controlled Digital Home is no more a Luxury. Our proposed
system made it affordable. We built a low-cost feature-rich Digital Home System
(DHS). Digital Home System is combination of automated services i.e. Electronic
Device Controller, IR Security System, Web Desktop, Remote Video Surveillance
System and Virtual Mobile by which we can control our home by avoiding old
manual processes e.g. our physical presence at home is optional. The System
provides some of the modern luxury & security features to us. Now we can
control Light, fan, AC or any electronic devices by voice command, Blue-tooth,
GPRS or Website. To control the system remotely, GPRS connectivity is added. We
can also monitor our home from remote area by using Remote Video Surveillance
System. This enables live video into mobile device of the digital home.
Moreover, we can also access our PC and do the necessary tasks from any
internet enabled computer in the world by using Web Desktop which is specially
built for this purpose. Furthermore, access of unauthorized person in the home
will be notified by SMS & store the image of the person and also generate a
voice alarm. So that ensures the security of our valuable things. Also we can
identify and monitor the location of our valuable assets e.g. precious metals
remotely. Finally, Virtual mobile application is a Universal mobile Driver by
which we can exactly perform some same task e.g. Remote call, Phone book
access, SMS read-write of our mobile device from our new invented computer's
virtual mobile.Comment: 8 page
Results of Long-Baseline Neutrino Experiments Based on the Consideration of Frameworks
In this paper, we present an analysis of the outcomes of long-baseline
neutrino experiments based on the consideration of frameworks. Our analysis
suggests that the time difference between the time-of-flights corresponding to
the speed of light (in vacuum) and that of the neutrino from a source to a
detector is within the range of our predicted time difference assuming that the
speed of neutrino follows a Galilean transformation. As the ghostly particles
called neutrinos have peculiar properties which are still unresolved, so we
propose measurements need to be performed at different times of the day to test
any diurnal variations (if possible then any annual variations) due to the
movement of the Earth.Comment: Revised in Acknowledgments, 9 pages, 5 figurs, accepted in
International Conference on Neutrino Physics and Astrophysics (ICNPA: 2012),
Amsterdam May 201
Investigation by physical methods of the possible role of telomeres in DNA in aging process
The interaction energies between the different types of bases of a single
strand of DNA molecule have been calculated. Using these original values of
energies the harmonic behavior of a number of base patterns of DNA has been
studied. In view of the great interest aroused by the discovery of the role of
the telomere segment of the DNA in the replication process and its possible
link with the aging process, we have investigated, with simple models, the
harmonic behavior of the telomeric pattern of bases as well as the
thermodynamic response in the biological system. With these results a
conclusion on the probable role of the telomeric pattern on aging has also been
drawn. Here the calculated values of harmonic frequencies of the telomeric
pattern of bases and of other possible patterns show that the telomeric pattern
is associated with the highest vibrational frequency among all patterns of base
combinations at the replication end of DNA. This seems to suggest that due to
the existing telomeric pattern being closest to the frequencies of the
electromagnetic radiation coming from sunlight, resonance of the telomeric
frequency with such radiation may be responsible for damage to the reproductive
ability of the cells and consequent aging and other problems. On the other hand
in the last part of this work we have calculated the thermal vibrational
amplitudes of the telomeric pattern and other possible patterns which show that
the amplitude for the telomeric pattern is the least, and this suggests that
the telomeric pattern is more mechanically and thermally stable than other
possible patterns in the biological environment against damage from ordinary
heat and mechanical effects.Comment: 10 pages, 3 figures, physics theories in DN
SHEAR-net: An End-to-End Deep Learning Approach for Single Push Ultrasound Shear Wave Elasticity Imaging
Ultrasound Shear Wave Elastography (USWE) with conventional B-mode imaging
demonstrates better performance in lesion segmentation and classification
problems. In this article, we propose SHEAR-net, an end-to-end deep neural
network, to reconstruct USWE images from tracked tissue displacement data at
different time instants induced by a single acoustic radiation force (ARF) with
100% or 50% of the energy in conventional use. The SHEAR-net consists of a
localizer called the S-net to first localize the lesion location and then uses
recurrent layers to extract temporal correlations from wave patterns using
different time frames, and finally, with an estimator, it reconstructs the
shear modulus image from the concatenated outputs of S-net and recurrent
layers. The network is trained with 800 simulation and a limited number of CIRS
tissue mimicking phantom data and is optimized using a multi-task learning loss
function where the tasks are: inclusion localization and modulus estimation.
The efficacy of the proposed SHEAR-net is extensively evaluated both
qualitatively and quantitatively on 125 test set of motion data obtained from
simulation and CIRS phantoms. We show that the proposed approach consistently
outperforms the current state-of-the-art method and achieves overall 4-5 dB
improvement in PSNR and SNR. In addition, an average gain of 0.15 in DSC and
SSIM values indicate that the SHEAR-net has a better inclusion coverage area
and structural similarity of the two approaches. The proposed real-time deep
learning based technique can accurately estimate shear modulus for a minimum
tissue displacement of 0.5m and image multiple inclusions with a single
push ARF
Jacobi sums of order
The aim of this paper is to deal with congruences for Jacobi sums of order
over a finite field , $p^{r}\equiv 1\ (mod \
2l^{2})l>3pJ_{2l^{2}}(1,n)2l^{2}$ in terms of Dickson-Hurwitz sums.Comment: Submitted for consideratio
A Survey of TCP Reno, New Reno and Sack Over Mobile Ad-Hoc Network
Transmission Control Protocol (TCP) is often preferred to be implemented at
the transport layer of a Mobile Ad-hoc Network (MANET) because of its wide
range of applications, which enjoys the advantage of reliable data transmission
in the Internet. However, because of some unique characteristics of MANET, TCP
cannot offer reliable services while using e-mail, internet search and file
transmission in such a network. The research investigates how well the
different versions of TCP respond to various performance differentials when
subjected to different network stresses and topology changes, aside from
identifying the most efficient and robust TCP version(s) for different MANET
scenarios. Among several TCP variants, three types are considered important for
the analysis, namely TCP Reno, TCP New Reno and TCP Selective Acknowledgment
(SACK). In most cases, the TCP performance is found in our study to decrease
when the node size and mobility rate is increased in the network. There is,
however, exception to this. As our simulation results demonstrate, the
increases in the node velocity sometimes help the TCP to attain a better
performance. The study also reveals that out of the three variants, TCP SACK
can adapt relatively well to the changing network sizes while TCP Reno performs
most robustly in the presence of different mobility rates within MANET.Comment: 8 Figures, MANE
A New Compression Based Index Structure for Efficient Information Retrieval
Finding desired information from large data set is a difficult problem.
Information retrieval is concerned with the structure, analysis, organization,
storage, searching, and retrieval of information. Index is the main constituent
of an IR system. Now a day exponential growth of information makes the index
structure large enough affecting the IR system's quality. So compressing the
Index structure is our main contribution in this paper. We compressed the
document number in inverted file entries using a new coding technique based on
run-length encoding. Our coding mechanism uses a specified code which acts over
run-length coding. We experimented and found that our coding mechanism on an
average compresses 67.34% percent more than the other techniques.Comment: 5 page
A Literature Review of Code Clone Analysis to Improve Software Maintenance Process
Software systems are getting more complex as the system grows where
maintaining such system is a primary concern for the industry. Code clone is
one of the factors making software maintenance more difficult. It is a process
of replicating code blocks by copy-and-paste that is common in software
development. In the beginning stage of the project, developers find it easy and
time consuming though it has crucial drawbacks in the long run. There are two
types of researchers where some researchers think clones lead to additional
changes during maintenance phase, in later stage increase the overall
maintenance effort. On the other hand, some researchers think that cloned codes
are more stable than non cloned codes. In this study, we discussed Code Clones
and different ideas, methods, clone detection tools, related research on code
clone, case study.Comment: This is a research collaboration of American International
University-Bangladesh, Carleton University-Canada, SCICON &
TigerHATS-Banglades
Child Education Through Animation: An Experimental Study
Teachers have tried to teach their students by introducing text books along
with verbal instructions in traditional education system. However, teaching and
learning methods could be changed for developing Information and Communication
Technology. It's time to adapt students with interactive learning system so
that they can improve their learning, catching, and memorizing capabilities. It
is indispensable to create high quality and realistic leaning environment for
students. Visual learning can be easier to understand and deal with their
learning. We developed visual learning materials in the form of video for
students of primary level using different multimedia application tools. The
objective of this paper is to examine the impact of students abilities to
acquire new knowledge or skills through visual learning materials and blended
leaning that is integration of visual learning materials with teachers
instructions. We visited a primary school in Dhaka city for this study and
conducted teaching with three different groups of students, (i) teacher taught
students by traditional system on same materials and marked level of students
ability to adapt by a set of questions, (ii) another group was taught with only
visual learning material and assessment was done with 15 questionnaires, (iii)
the third group was taught with the video of solar system combined with
teachers instructions and assessed with the same questionnaires. This
integration of visual materials with verbal instructions is a blended approach
of learning. The interactive blended approach greatly promoted students ability
of acquisition of knowledge and skills. Students response and perception were
very positive towards the blended technique than the other two methods. This
interactive blending leaning system may be an appropriate method especially for
school children
Risk analysis for long term disposal of radioactive nuclear waste
In this study the technical risk analysis that was conducted using fault
trees.With respect to the scenarios in Bangladesh, there is still no concrete
proposal about a permanent disposal method, so this analysis is based on the
propositions and other historical data. When actual data is produced, this risk
analysis technique can then be employed to calculate risks.Comment: 13 pages, 5 figure
- …