1,695 research outputs found
Statistics in the Landscape of Intersecting Brane Models
An approach towards a statistical survey of four dimensional supersymmetric
vacua in the string theory landscape is described and illustrated with three
examples of ensembles of intersecting D-brane models. The question whether it
is conceivable to make predictions based on statistical distributions is
discussed. Especially interesting in this context are possible correlations
between low energy observables. As an example we look at correlations between
properties of the gauge sector of intersecting D-brane models and Gepner model
constructions.Comment: Submitted for the SUSY07 proceedings, 4 pages, 2 figure
Web Caching and Prefetching with Cyclic Model Analysis of Web Object Sequences
Web caching is the process in which web objects are temporarily stored to reduce bandwidth consumption, server load and latency. Web prefetching is the process of fetching web objects from the server before they are actually requested by the client. Integration of caching and prefetching can be very beneficial as the two techniques can support each other. By implementing this integrated scheme in a client-side proxy, the perceived latency can be reduced for not one but many users. In this paper, we propose a new integrated caching and prefetching policy called the WCP-CMA which makes use of a profit-driven caching policy that takes into account the periodicity and cyclic behaviour of the web access sequences for deriving prefetching rules. Our experimental results have shown a 10%-15% increase in the hit ratios of the cached objects and 5%-10% decrease in delay compared to the existing schem
Automatic Discovery and Ranking of Synonyms for Search Keywords in the Web
Search engines are an indispensable part of a web user's life. A vast majority of these web users experience difficulties caused by the keyword-based search engines such as inaccurate results for queries and irrelevant URLs even though the given keyword is present in them. Also, relevant URLs may be lost as they may have the synonym of the keyword and not the original one. This condition is known as the polysemy problem. To alleviate these problems, we propose an algorithm called automatic discovery and ranking of synonyms for search keywords in the web (ADRS). The proposed method generates a list of candidate synonyms for individual keywords by employing the relevance factor of the URLs associated with the synonyms. Then, ranking of these candidate synonyms is done using co-occurrence frequencies and various page count-based measures. One of the major advantages of our algorithm is that it is highly scalable which makes it applicable to online data on the dynamic, domain-independent and unstructured World Wide Web. The experimental results show that the best results are obtained using the proposed algorithm with WebJaccard
An Adaptive Threshold based FPGA Implementation for Object and Face detection
The moving object and face detection are vital requirement for real time security applications. In this paper, we propose an Adaptive Threshold based FPGA Implementation for Object and Face detection. The input Images and reference Images are preprocessed using Gaussian Filter to smoothen the high frequency components. The 2D-DWT is applied on Gaussian filter outputs and only LL bands are considered for further processing. The modified background with adaptive threshold are used to detect the object with LL band of reference image. The detected object is passed through Gaussian filter to enhance the quality of object. The matching unit is designed to recognize face from standard face database images. It is observed that the performance parameters such as percentage TSR and hardware utilizations are better compared to existing techniques
Similarity Based Ranking of Query Results from Real Web Databases
The information available in the World Wide Web is stored using many real Web databases (e.g. vehicle database). Accessing the information from these real Web databases has become increasingly important for the users to find the desired information. Web users search for the desired information by querying these Web databases, when the number of query results generated is large, it is very difficult for the Web user to select the most relevant information from the large result set generated. Users today, have become more and more demanding in terms of the quality of information that is provided to them while searching the Web databases. The most common solution to solve the problem involves ranking the query results returned by the Web databases. Earlier approaches have used query logs, user profiles and frequencies of database values. The problem in all of these techniques is that ranking is performed in a user and query independent manner. This paper, proposes an automated ranking of query results returned by Web databases by analyzing user, query and workload similarity. The effectiveness of this approach is discussed considering a vehicle Web database as an example
Inheritance study and stable sources of maydis leaf blight (Cochliobolus heterostrophus) resistance in tropical maize germplasm
Maydis leaf blight (MLB), a serious foliar fungal disease of maize, may cause up to 40% losses in yield. The present studies were undertaken to identify the stable sources of MLB resistance, its inheritance study, and testing of MLB resistance linked markers from diverse background in the Indian adapted tropical maize genotypes. A set of 112 inbred lines were screened under artificially created epiphytotics conditions at three hotspot locations. Analysis across multi-locations revealed significant effects of genotypes and environments, and non-significant effects due to genotypes × environment interaction on disease incidence. A total of 25 inbred lines with stable resistance were identified across multi-locations. Inheritance of resistance was studied in six F1s and two F2s of resistant and susceptible parents. The null hypothesis of segregation of resistance and susceptible for mono and digenic ratios in two F2 populations was rejected by Chi-square test. The non-significant differences among the reciprocal crosses depicted the complete control of nuclear genome for MLB resistance. Partial dominance in F1s and normal distribution pattern in F2s of resistant and susceptible parents suggested polygenic nature of MLB resistance. Correlation studies in F2 populations exhibited significant negative correlation between disease score and days to flowering. Five simple sequence repeats (SSRs) markers, found associated to MLB resistance in different studies were unable to differentiate amongst MLB resistance and susceptible parents in our study. This emphasizes the need of fine mapping for MLB resistance in Indian germplasm. The identified stable sources of resistance and information on inheritance study can be used further in strengthening of resistance breeding against MLB
Computer Aided Design of MIC layouts with Postprocessor for Photoplotter
A PC-based computer-aided design (CAD) package for designing microwave integrated circuit (MIC) printed circuit board (PCB) layout, called microwave artwork postprocessor for photoplotter (MAPP), is developed. The small size of MIC PCBs makes them suitable for defence applications. MAPP has a postprocessor which converts the MIC layout data to a format acceptable as input to a Gerber photoplotter. Photomask of the PCB is obtained from the photoplotter. This paper presents the methodology for the CAD of MIC layouts and also discusses the algorithm for filling of a general polygon with curved edges, and which lies in the real domain. This algorithm is used in the postprocessor for a photoplotter
Real Time and Continuous Detection of Phishing Websites
Web Spoofing draws the client to associate with the fake sites instead of the genuine ones. The fundamental goal of this assault is to take the delicate data from the clients. The assailant makes a "shadow" site that seems to be like the genuine site. This deceitful demonstration enables the aggressor to watch and adjust any data from the client. This paper proposes a discovery system of phishing sites in view of checking Uniform Resources Locators (URLs) of pages. The proposed arrangement can recognize the real site page and fake website page by checking the Uniform Resources Locators (URLs) of suspected pages. URLs are examined in light of specific qualities to check the phishing website pages. The identified assaults are accounted for aversion. The execution of the proposed arrangement is assessed utilizing Phistank and Yahoo catalog datasets. The got comes about demonstrate that the location instrument is deployable and competent to distinguish different sorts of phishing assaults keeping up a low rate of false alerts
Yangians, Integrable Quantum Systems and Dorey's rule
We study tensor products of fundamental representations of Yangians and show
that the fundamental quotients of such tensor products are given by Dorey's
rule.Comment: We have made corrections to the results for the Yangians associated
to the non--simply laced algebra
Dorey's Rule and the q-Characters of Simply-Laced Quantum Affine Algebras
Let Uq(ghat) be the quantum affine algebra associated to a simply-laced
simple Lie algebra g. We examine the relationship between Dorey's rule, which
is a geometrical statement about Coxeter orbits of g-weights, and the structure
of q-characters of fundamental representations V_{i,a} of Uq(ghat). In
particular, we prove, without recourse to the ADE classification, that the rule
provides a necessary and sufficient condition for the monomial 1 to appear in
the q-character of a three-fold tensor product V_{i,a} x V_{j,b} x V_{k,c}.Comment: 30 pages, latex; v2, to appear in Communications in Mathematical
Physic
- …
