1,766 research outputs found

    Energy and Nutrient Intake Monitoring

    Get PDF
    A passive system to determine the in-flight intake of nutrients is developed. Nonabsorbed markers placed in all foods in proportion to the nutrients selected for study are analyzed by neutron activation analysis. Fecal analysis for each market indicates how much of the nutrients were eaten and apparent digestibility. Results of feasibility tests in rats, mice, and monkeys indicate the diurnal variation of several markers, the transit time for markers in the alimentary tract, the recovery of several markers, and satisfactory use of selected markers to provide indirect measurement of apparent digestibility. Recommendations are provided for human feasibility studies

    Molecular cloning of growth hormone encoding cDNA of Indian major carps by a modified rapid amplification of cDNA ends strategy

    Get PDF
    A modified rapid amplification of cDNA ends (RACE) strategy has been developed for cloning highly conserved cDNA sequences. Using this modified method, the growth hormone (GH) encoding cDNA sequences of Labeo rohita, Cirrhina mrigala and Catla catla have been cloned, characterized and overexpressed in Escherichia coli. These sequences show 96-98% homology to each other and are about 85% homologous to that of common carp. Besides, an attempt has been made for the first time to describe a 3-D model of the fish GH protein

    Interrelationship between cloud cover and sensible heat flux over land during MONTBLEX-1990

    Get PDF
    Micro-meteorological tower observations of MONTBLEX (Monsoon Trough Boundary Layer Experiment)- 1990, combined with routine surface observations at Jodhpur in the dry convective sector of Indian summer monsoon trough are used to examine the interrelationship between total cloud cover (TCC) and surface sensible heat flux (SHF) during the summer monsoon of 1990. A significant inverse relationship between TCC and SHF is found during various Intensive Observation Periods of the experiment. This relationship holds for the various methods of estimation of SHF. © Printed in India

    Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks

    Get PDF
    This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities. The protocol achieves to increase Packet Reception Ratio (PRR) and reduce end-to-end delay while considering multi-queue priority policy, two-hop neighborhood information, link reliability and power efficiency. The protocol is modular and utilizes effective methods for estimating the link metrics. Numerical results show that the proposed protocol is a feasible solution to addresses QoS service differenti- ation for traffic with different priorities.Comment: 13 page

    DRSP : Dimension Reduction For Similarity Matching And Pruning Of Time Series Data Streams

    Get PDF
    Similarity matching and join of time series data streams has gained a lot of relevance in today's world that has large streaming data. This process finds wide scale application in the areas of location tracking, sensor networks, object positioning and monitoring to name a few. However, as the size of the data stream increases, the cost involved to retain all the data in order to aid the process of similarity matching also increases. We develop a novel framework to addresses the following objectives. Firstly, Dimension reduction is performed in the preprocessing stage, where large stream data is segmented and reduced into a compact representation such that it retains all the crucial information by a technique called Multi-level Segment Means (MSM). This reduces the space complexity associated with the storage of large time-series data streams. Secondly, it incorporates effective Similarity Matching technique to analyze if the new data objects are symmetric to the existing data stream. And finally, the Pruning Technique that filters out the pseudo data object pairs and join only the relevant pairs. The computational cost for MSM is O(l*ni) and the cost for pruning is O(DRF*wsize*d), where DRF is the Dimension Reduction Factor. We have performed exhaustive experimental trials to show that the proposed framework is both efficient and competent in comparison with earlier works.Comment: 20 pages,8 figures, 6 Table

    Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization

    Get PDF
    Till now there is a huge research had in the field of visual information retrieval, but with the growth of data and with less processing speed we are not meeting the needs of current problem. The main focus of this paper is to identify the objects with salient features and object highlighting. Till now object identification is done with the pixel based or with the region based. Different methodologies are compared in this work and they will be processed with the learning work. Multi scale contrast is one of the pixel based technology where object borders are identified but not the object. This can be done with the histogram contrast. Still it is not covering all the features of the object and it is not clear in identifying the objects at high contrast regions. To solve this issue region based contrasting method is used which is the better solution for all this object identification. After extracting the features and identifying the object, now auto classification or identification of the object should be done. The other part of the work mainly concentrates on the learning system which uses most popular neural network algorithms. Identifying the drawbacks of neural network algorithms and proposing the new methodology identify the objects is done in this paper

    Trust model genetic node recovery based on cloud theory for underwater acoustic sensor network

    Get PDF
    Underwater Acoustic Sensor Networks [UASNs] are becoming a very growing research topic in the field of WSNs. UASNs are harmful by many attacks such as Jamming attacks at the physical layer, Collision attacks at the data link layer and Dos attacks at the network layer. UASNs has a unique characteristic such as unreliable communication, mobility, and computation of underwater sensor network. Because of this the traditional security mechanism, e.g. cryptographic, encryption, authorization and authentications are not suitable for UASNs. Many trust mechanisms of TWSNs [Terrestrial Wireless Sensor Networks] had proposed to UASNs and failed to provide security for UASNs environment, due to dynamic network structure and weak link connection between sensors. In this paper, a novel Trust Model Genetic Algorithm based on Cloud Theory [TMC] for UASNs has been proposed. The TMC-GA suggested a genetic node recovery algorithm to improve the TMC network in terms of better network lifetime, residual energy and total energy consumption. Also ensures that sensor nodes are participating in the rerouting in the routing discovery and performs well in terms of successful packet delivery. Simulation result provides that the proposed TMC-Genetic node recovery algorithm outperforms compared to other related works in terms of the number of hops, end-to-end delay, total energy consumption, residual energy, routing overhead, throughput and network lifetime
    • …
    corecore