146 research outputs found

    Layer Partition-based Matching Algorithm of DDM

    Get PDF
    High Level Architecture (HLA) is architecture for reuse and interoperation of simulations. In HLA paradigm, the Runtime Infrastructure (RTI) provides a set of services. Data Distribution Management (DDM) service reduces message traffic over the network. DDM aims to control and limit the data exchanged between federates during federation. Each federate may inform the RTI about its intention to publish some data or it may subscribe to receive a subset of the published data. DDM services are used to reduce the transmission and receiving of irrelevant data and aimed at reducing the communication over the network. These services rely on the computation of the intersection between ā€œupdateā€ and ā€œsubscriptionā€ regions. When calculating the intersection between update regions and subscription regions, the higher computation overhead can occur. Currently, there are several main DDM filtering algorithms. This paper proposes the layer partition-based matching algorithm for DDM in the HLA-based large-scale distributed simulations. The new algorithm chooses the dynamic pivot based on regions distribution in the routing space. The binary partition-based algorithm is fundamentally based on a divide and conquers approach. This algorithm always chooses the midpoint as the pivot point of routing space. This approach promises low computational overhead, since it does not require unnecessary comparisons within regions in different partitions. The proposed algorithm firstly calculates the regions distribution. Then, the partitioning among regions performs based on the result of choosing pivot based on region detection and defines the matching area that entirely covers all regions which need to match with regions at pivot point. The proposed algorithm provides the more definite matching area between update region and subscription region during matching process. This algorithm guarantees low computational overheads for matching process based on the overlapping degree between the regions and reduce the irrelevant message among federates

    A Review of Common Medicinal Plants in Chin State, Myanmar:

    Get PDF
    Promising sources of novel bioactive compounds include plants growing in several third-world countries where the local flora is still largely uninvestigated. A paradigmatic example is represented by medicinal plants growing in Myanmar, especially in Chin State, in northwestern Myanmar. This is one of the least developed areas of the country where the people still use natural remedies derived from a rich biodiversity. This review mainly covers the investigations done on phytochemical constituents and biological activities of 20 medicinal plants, namely Alangium chinense, Anemone obtusiloba, Anneslea fragrans, Antidesma bunius, Croton oblongifolius, Embelia tsjeriam-cottam, Ficus heterophylla, Gaultheria fragrantissima, Hydnocarpus kurzii, Leea macrophylla, Leucas cephalotes, Millingtonia hortensis, Myrica nagi, Olax scandens, Pimpinella heyneana, Pterospermum semisagittatum, Ruellia tuberosa, Smilax zeylanica, Stemona burkillii, and Tadehagi triquetrum, that have long been used in the Chin State for curing various diseases. These plants have been selected on the basis of their medicinal uses not only in Myanmar but also in the related Ayurvedic healing system. Moreover, besides their medicinal importance, most of them grow in the Chin State more abundantly than in other regions of Myanmar. Although the efficacy of some of these plants have been verified scientifically, the chemical constituents and biological activities of most of them still need to be investigated to confirm the claimed therapeutic effects

    Prince Myinzaing and Early Armed Resistance Movements

    Get PDF
    The British occupation forces took the Mandalay capital without armed resistance on 28 November 1885 because King Thibaw issued a royal order on 27 November 1885 for Myanmar to surrender. After dethroning King Thibaw, the British brought him to India. Then resistance to the British took place throughout upper Myanmar. The majority of the resistance leaders were royal princes, the former servicemen. Prince Myinsaing was a son of king Mindon. Prince Myinsaing made an attempt reconquer the Mandalay capital. The resistance movement led by Myinsaing caused a great deal of difficulties for the British. Although the period of his resistance against the British was short, Prince Myinsaing's leadership could influence not only on the resistance groups in central Myanmar but also on those in hilly regions. The resistance movement led by Myinsaing caused a great deal of difficulties for the British. The British made attempt to suppress the forces of Prince Myinsaing to the end

    Automated Multi-storied Car Parking System Using RFID

    Get PDF
    Radio Frequency Identification (RFID) technology is very useful technology in automation of vehicle parking system in mall/building. One of the challenging problems for many vehicle owners in big cities is where to park their vehicles. If the parking slot is known in advance one can save precious time and fuel wastage. In this research, the user is informed about the parking slot availability at a particular parking location. The slot availability details are collected using an RFID system and are updated periodically into the database. Entry-point and exit-point of the parking-lots will be under control with RFID readers, labels and barriers. Since there won't be any waiting during entry-point and exit-point the pollution problem will be avoided. There are three portions in automated multi-storied car parking system. They are RFID system, car lift control system and Bluetooth serial system. For the RFID system, 13.56 MHz passive reader and tag pairs are used. For car lift system, DC motor drivers (L298) and IR obstacle sensor are used. DC motor drivers are used to accurate the feedback operation of barrier for car lift and IR obstacle sensors are used to sense a room which was passed through the barrier after showing RFID tag. DC motor drivers and IR obstacle sensors were controlled by Basic-Pro program

    Highly Cytotoxic Xanthones from Cratoxylum cochinchinense Collected in Myanmar

    Get PDF
    Eight xanthones and one anthraquinone, together with four common triterpenoids, have been isolated from the barks of Cratoxylum cochinchinense, collected in Myanmar. The structures of the metabolites were elucidated by spectroscopic data analysis and their antiproliferative activities were measured against six human tumor cell lines, by using the MTT assay. Pruniflorone N (1) showed a significant cytotoxicity against all cancer cells with IC50 values in the range 3-9 Ī¼M, on average higher than the anticancer drug cisplatin. Instead, compounds 2 and 3 exhibited high antiproliferative activity against some specific cell lines

    Six-month adherence to Statin use and subsequent risk of major adverse cardiovascular events (MACE) in patients discharged with acute coronary syndromes

    Get PDF
    Acknowledgements: The authors thank all participants who contributed to the study. Funding: CPACS-1 was funded by unrestricted educational grants from Guidant and Sanofi-Aventis, and grants from The Royal Australasian College of Physicians. AP is supported by an Australian National Heart Foundation Career Development Award. CPACS-2 was funded by an unrestricted grant from Sanofi-Aventis China. The George Institute for Global Health at Peking University Health Science Center sponsored the study and owns the data. Data analyses and reports were supported by Beijing Science and Technology Key Research Plan (D151100002215001). However, the authors are solely responsible for the design, analyses, the drafting and editing of the manuscript, and its final contents.Peer reviewedPublisher PD

    Comparative Study for Text Document Classification Using Different Machine Learning Algorithms

    Get PDF
    Classification is a supervised learning method: the goal is finding the labels of the unknown object. In the real world, the tedious amounts of manual works are required to label the unknown documents. The system is initially trained by labeled documents by using one of the supervise machine learning algorithm and then applied trained model to predict the label of the unknown documents.Ā  The framework of text document classification consists of: input text document, pre-processing, feature extraction and classification. The analysis four common classification methods are performed: NaĆÆve Bayes, Decision Tree, Support Vector Machine and K-nearest neighbors for text document classification. The main focus of this paper is to present comparative study of different exiting classification methods for text document classification. The experiment performed different classification methods on the Enron Email Dataset and measure classification accuracy, true positive, true negative, false positive and false negative to compare the performance of different classification methods

    Structural basis of substrate specificity in human cytidine deaminase family APOBEC3s

    Get PDF
    The human cytidine deaminase family of APOBEC3s (A3s) plays critical roles in both innate immunity and the development of cancers. A3s comprise seven functionally overlapping but distinct members that can be exploited as nucleotide base editors for treating genetic diseases. Although overall structurally similar, A3s have vastly varying deamination activity and substrate preferences. Recent crystal structures of ssDNA-bound A3s together with experimental studies have provided some insights into distinct substrate specificities among the family members. However, the molecular interactions responsible for their distinct biological functions and how structure regulates substrate specificity are not clear. In this study, we identified the structural basis of substrate specificities in three catalytically active A3 domains whose crystal structures have been previously characterized: A3A, A3B- CTD, and A3G-CTD. Through molecular modeling and dynamic simulations, we found an interdependency between ssDNA substrate binding conformation and nucleotide sequence specificity. In addition to the U-shaped conformation seen in the crystal structure with the CTC0 motif, A3A can accommodate the CCC0 motif when ssDNA is in a more linear (L) conformation. A3B can also bind both U- and L-shaped ssDNA, unlike A3G, which can stably recognize only linear ssDNA. These varied conformations are stabilized by sequence-specific interactions with active site loops 1 and 7, which are highly variable among A3s. Our results explain the molecular basis of previously observed substrate specificities in A3s and have implications for designing A3-specific inhibitors for cancer therapy as well as engineering base-editing systems for gene therapy

    A Real-Time and Long-Term Face Tracking Method Using Convolutional Neural Network and Optical Flow in IoT-Based Multimedia Communication Systems

    Get PDF
    The development of the Internet of Things (IoT) stimulates many research works related to Multimedia Communication Systems (MCS), such as human face detection and tracking. This trend drives numerous progressive methods. Among these methods, the deep learning-based methods can spot face patch in an image effectively and accurately. Many people consider face tracking as face detection, but they are two different techniques. Face detection focuses on a single image, whose shortcoming is obvious, such as unstable and unsmooth face position when adopted on a sequence of continuous images; computing is expensive due to its heavy reliance on Convolutional Neural Networks (CNNs) and limited detection performance on the edge device. To overcome these defects, this paper proposes a novel face tracking strategy by combining CNN and optical flow, namely, C-OF, which achieves an extremely fast, stable, and long-term face tracking system. Two key things for commercial applications are the stability and smoothness of face positions in a sequence of image frames, which can provide more probability for face biological signal extraction, silent face antispoofing, and facial expression analysis in the fields of IoT-based MCS. Our method captures face patterns in every two consequent frames via optical flow to get rid of the unstable and unsmooth problems. Moreover, an innovative metric for measuring the stability and smoothness of face motion is designed and adopted in our experiments. The experimental results illustrate that our proposed C-OF outperforms both face detection and object tracking methods
    • ā€¦
    corecore