238 research outputs found

    Cohesive token passing algorithm utilizing software agents

    Get PDF
    The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. MAC protocols have been extensively researched from several angles. This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). The relevance of intelligence in sustaining the pre-requisites for dynamic reconfiguration has gained an integral attention in MANET. Approach: The implementation of Token Ring in MANET can be correlated to its complementary implementation in IP networks. In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. The core of the new protocol is based on the circulation mechanism of the token. As opposed to the traditional circulatory mechanism, a software agent is designed to become an intelligent circulatory agent is this research. The developed software agent is utilized to implement prioritized token access subject to the traffic type. Each station is coupled with a software agent who cohesively collaborates to assign the token. Results: The proposed agent and the enhanced Token Ring implementation have been extensively verified through simulation experiments. A complete circulation of the ring is defined upon all nodes being visited at least once. Discrete-event simulation models were developed and deployed for the purpose of performance analysis. The results acquired validated the improved results of the new software agent based implementation. The performance metrics studied were average delay and average buffer utilization. Conclusion: The proposed algorithm has enabled to derive an ideal balance between the complexity of intelligent processing and the versatility of managing the token ring

    Dynamic layout algorithms for wireless field hockey strategy system

    Get PDF
    Sensor deployment in the field of sports is providing enormous potential for elevating the playing field standards. This paper presents an enhanced localization algorithm which harnesses the dynamic and reconfiguration attributes of field hockey players on a strategy board; known as the Wireless Field Hockey Strategy System (WiHoc Ver1.0). The proposed algorithm utilized for determining the location of field hockey players overcomes the constraints and confined anchor based WiHoc Ver 1.0. The resolution encompasses the new versatile platform which captures the positional location within the parameters of a hockey pitch and of cooperative nodes to determine the optimal location of anchor positioning to ensure that the achieved accuracy of localization is enhanced. The proposed algorithm was evaluated extensively through discrete - event simulations. The acquired results via the accuracy performance metrics validated the enhanced ability of the proposed algorithm

    REMOTE SENSING TECHNIQUES FOR OIL PALM AGE CLASSIFICATION USING LANDSAT-5 TM SATELLITE

    Get PDF
    This paper demonstrates the procedure to classify the age of oil palm trees using Landsat-5 TM (thematic mapper) remote sensing data. The study was conducted in two phases: phase I focuses on the the land cover classification, and phase II involves the oil palm age classification. Firstly,the region of interest (ROI) was identified and drawn in order to supply the training and testing pixels for the supervised classification. Maximum likelihood (ML) classifier was used for land cover classification. The land cover classification using the ML produces a good result with an overall accuracy of 85.51% and kappa coefficient of 0.8208. Meanwhile, three classifiers were used to investigate the age of oil palm classification, which are the 1) Maximum likelihood (ML), 2) Neural Network (NN) and, 3) Support Vector Machine (SVM). The accuracy of the classifications was then assessed by comparing the classifications with a reference set using a confusion matrix technique. Among the three classifiers, SVM performs the best with the highest overall accuracy of 54.18% and kappa coefficient of 0.39

    Aromatic interactions in tryptophan-containing peptides: crystal structures of model tryptophan peptides and phenylalanine analogs

    Get PDF
    The crystal structures of the peptides, Boc-Leu-Trp-Val-OMe (1), Ac-Leu-Trp-Val-OMe (2a and 2b), Boc-Leu-Phe-Val-OMe (3), Ac-Leu-Phe-Val-OMe (4), and Boc-Ala-Aib-Leu-Trp-Val-OMe (5) have been determined by X-ray diffraction in order to explore the nature of interactions between aromatic rings, specifically the indole side chain of Trp residues. Peptide 1 adopts a type I β-turn conformation stabilized by an intramolecular 4→1 hydrogen bond. Molecules of 1 pack into helical columns stabilized by two intermolecular hydrogen bonds, Leu(1)NH...O(2)Trp(2) and IndoleNH...O(1)Leu(1). The superhelical columns further pack into the tetragonal space group P43 by means of a continuous network of indole-indole interactions. Peptide 2 crystallizes in two polymorphic forms, P21 (2a) and P212121 (2b). In both forms, the peptide backbone is extended, with antiparallel β-sheet association being observed in crystals. Extended strand conformations and antiparallel β-sheet formation are also observed in the Phe-containing analogs, Boc-Leu-Phe-Val-OMe (3) and Ac-Leu-Phe-Val-OMe (4). Peptide 5 forms a short stretch of 310-helix. Analysis of aromatic-aromatic and aromatic-amide interactions in the structures of peptides, 1, 2a, 2b are reported along with the examples of 14 Trp-containing peptides from the Cambridge Crystallographic Database. The results suggest that there is no dramatic preference for a preferred orientation of two proximal indole rings. In Trp-containing peptides specific orientations of the indole ring, with respect to the preceding and succeeding peptide units, appear to be preferred in β-turns and extended structures

    Multiphase scalable grid scheduler based on multi-QoS using min-min heuristic.

    Get PDF
    In scheduling, the main factor that affects searching speed and mapping performance is the number of resources orthe size of search space. In grid computing, the scheduler performance plays an essential role in the overall performance.So, it is obvious the need for scalable scheduler that can manage the growing in resources (i.e. scalable). With the assumption that each resource has its own specifications and each job has its own requirements; then searching the whole search space (all the resources) can waste plenty of scheduling time. In this paper, we propose a two-phase scheduler that uses min-min algorithm to speed up the mapping time with almost the same efficiency. The scheduler is also based on the assumption that the resources in grid computing can be classified into clusters. The scheduler tries first to schedule the jobs to the suitable cluster (i.e. first phase)and then each cluster schedule the incoming jobs to the suitable resources (i.e. second phase). The scheduler is based on multidimensional QoS to enhance the mapping as much as it can.The simulation results show that the use of two-phase strategy can support the scalable scheduler

    Preliminary Studies on the Development of Monoclonal Antibodies Against Mycelia of Ganoderma boninense, the Causal Pathogen of Basal Stem Rot of Oil Palm

    Get PDF
    This study aimed to raise specific MAbs against G. boninense, the causal pathogen of basal stem rot (BSR) of oil palm. Crude mycelium extract of G. boninense was used as immunogen to generate MAbs. Mycelium was harvested from liquid culture and freeze-dried followed by re-suspension in phosphate buffer saline (PBS). Two 10-week old BALB-C mice were immunized with the mycelial extract. The mice were boosted once before harvesting their spleens for fusion. The MAbs were fused with myeloma cells from BALB-C mice. Initial screening was carried out using plate-trapped antigen enzyme-linked immunosorbent assay (PTA-ELISA) with mycelial immunogen of G. boninense. The MAbs with positive signals were verified via secondary screening and cloned for cross-reactivity test. Cross-reactivity testing was carried out with 2 other fungi namely; Trichoderma and Botrytis along with 2 different species of Ganoderma commonly found in oil palm plantations namely; G. zonatum, and G. miniatocinctum. This study found that the MAbs raised against G. boninense were not specific as the MAbs gave positive signals through the cross-reactivity test with all fungi tested in the cross-reactivity. Future work would be using these MAbs in a co-immunization program whereby the generated Ganoderma sp generic monoclonal antibody will be pre-mixed with the G. boninense mycelium immunogen to allow reduction in the potential cross-reactivity of newly generated antibodies with Ganoderma sp. Our efforts are also currently directed at optimizing the immunogen preparation for the production of MAbs specific to G. boninense

    E-store management using bell-lapadula access control security model

    Get PDF
    Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access leve

    E-store management using bell-lapadula access control security model

    Get PDF
    Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access leve

    Tryptophan-containing peptide helices: Interactions involving the indole side chain

    Get PDF
    Two designed peptide sequences containing Trp residues at positions i and i + 5 (Boc-Leu-Trp-Val-Ala-Aib-Leu-Trp-Val-OMe, 1) as well as i and i + 6 (Boc-Leu-Trp-Val-Aib-Ala-Aib-Leu-Trp-Val-OMe, 2) containing one and two centrally positioned Aib residues, respectively, for helix nucleation, have been shown to form stable helices in chloroform solutions. Structures derived from nuclear magnetic resonance (NMR) data reveal six and seven intramolecularly hydrogen-bonded NH groups in peptides 1 and 2, respectively. The helical conformation of octapeptide 1 has also been established in the solid state by X-ray diffraction. The crystal structure reveals an interesting packing motif in which helical columns are stabilized by side chain-backbone hydrogen bonding involving the indole Nε1H of Trp(2) as donor, and an acceptor C=O group from Leu(6) of a neighboring molecule. Helical columns also associate laterally, and strong interactions are observed between the Trp(2) and Trp(7) residues on neighboring molecules. The edge-to-face aromatic interactions between the indoles suggest a potential C-H…π interaction involving the Cζ3H of Trp(2). Concentration dependence of NMR chemical shifts provides evidence for peptide association in solution involving the Trp(2) Nε1H protons, presumably in a manner similar to that observed in the crystal

    A performance simulation tool for the analysis of data gathering in both terrestrial and underwater sensor networks

    Get PDF
    Wireless sensor networks (WSNs) have greatly contributed to human-associated technologies. The deployment of WSNs has transcended several paradigms. Two of the most significant features of WSNs are the intensity of deployment and the criticalness of the applications that they govern. The tradeoff between volume and cost requires justified investments for evaluating the multitudes of hardware and complementary software options. In underwater sensor networks (USNs), testing any technique is not only costly but also difficult in terms of full deployment. Therefore, evaluation prior to the actual procurement and setup of a WSN and USN is an extremely important step. The spectrum of performance analysis tools encompassing the test-bed, analysis, and simulation has been able to provide the prerequisites that these evaluations require. Simulations have proven to be an extensively used tool for analysis in the computer network field. A number of simulation tools have been developed for wired/wireless radio networks. However, each simulation tool has several restrictions when extended to the analysis of WSNs. These restrictions are largely attributed to the unique nature of each WSN within a designated area of research. In addition, these tools cannot be used for underwater environments with an acoustic communication medium, because there is a wide range of differences between radio and acoustic communications. The primary purpose of this paper is to present, propose, and develop a discrete event simulation designed specifically for mobile data gathering in WSNs. In addition, this simulator has the ability to simulate 2-D USNs. This simulator has been tailored to cater to both mobile and static data gathering techniques for both topologies, which are either dense or light. The results obtained using this simulator have shown an evolving efficient simulator for both WSNs and USNs. The developed simulator has been extensively tested in terms of its validity and scope of governance
    corecore