28 research outputs found

    Age Related Changes in Hematological Values of Myanmar Local Puppies

    Get PDF
    The hematological parameters were used to monitor the health status and its components also changed according to the ages. However, there were no reports for this issues in Myanmar local dogs. Thus, this study was carried out to investigate the age-related changes on the hematological parameters of local puppies in Myanmar. Ten local puppies with the age of 2-3 month old were used in this experiment, which was lasted for 8 weeks.The daily clinical examinations were conducted throughout the entire experimental period for general health check-up. Haematological parameters (Total WBC count and its differential counts, and RBC, HCT, MCV, HGB, MCH, MCHC and platelets) were measured bi-weekly with Abacus Vet-5 automate haematology analyser. According to the results, the total WBC and eosinophil counts were not significantly different (P>0.05), while lymphocytes, monocytes, neutrophils and basophils were significantly different (P<0.05) with the aging of experimental animals. The values of RBC, HGB, HCT, MCV, MCH, MCHC and platelets were not significantly different (P>0.05) throughout the experimental periods. Thus, the age-related changes were observed on cell counts of lymphocytes, monocytes, neutrophils, basophils in Myanmar local puppies

    Consistent patterns of common species across tropical tree communities

    Get PDF
    Trees structure the Earth’s most biodiverse ecosystem, tropical forests. The vast number of tree species presents a formidable challenge to understanding these forests, including their response to environmental change, as very little is known about most tropical tree species. A focus on the common species may circumvent this challenge. Here we investigate abundance patterns of common tree species using inventory data on 1,003,805 trees with trunk diameters of at least 10 cm across 1,568 locations1,2,3,4,5,6 in closed-canopy, structurally intact old-growth tropical forests in Africa, Amazonia and Southeast Asia. We estimate that 2.2%, 2.2% and 2.3% of species comprise 50% of the tropical trees in these regions, respectively. Extrapolating across all closed-canopy tropical forests, we estimate that just 1,053 species comprise half of Earth’s 800 billion tropical trees with trunk diameters of at least 10 cm. Despite differing biogeographic, climatic and anthropogenic histories7, we find notably consistent patterns of common species and species abundance distributions across the continents. This suggests that fundamental mechanisms of tree community assembly may apply to all tropical forests. Resampling analyses show that the most common species are likely to belong to a manageable list of known species, enabling targeted efforts to understand their ecology. Although they do not detract from the importance of rare species, our results open new opportunities to understand the world’s most diverse forests, including modelling their response to environmental change, by focusing on the common species that constitute the majority of their trees.Publisher PDFPeer reviewe

    MISTY1 Encryption /Decryption System with ELGamal Key Distribution

    No full text
    Data communication is an important aspect of our living and protection from data misuse is important. The main security concerns of applications are addressed by cryptography. Cryptographic techniques are extremely critical to the development and use of defense information systems and communication networks. In the distributed environment, encryption is needed for authentication and guarding the secrecy of data in transit. This system presents the encryption of the data types such as text files and images of different formats. This system includes the two encryption and decryption components; MISTY1 symmetric algorithm and ELGamal key distribution .Input file is encrypted with MISTY1 symmetric key and that key is encrypted again with ELGamal asymmetric key for security performance. Cipher text has to be decrypted to recover the original files. Sender needs to perform file and key encryption whereas receiver key and file decryption

    Image Database Classification and Retrieval Using Support Vector Machines (SVM)

    No full text
    In this paper, we propose a support vector machines (SVMs) method of classifying image regions hierarchically based on their semantics rather than on low-level features. First, image regions are segmented using the hill-climbing method. And then, the support vector machines classify these regions. The SVMs learn the semantics of specified classes from a database of image regions. A support vector machine was used as the classifier. We developed a new way to assign probability after multi-class SVM classification. Our approach achieved approximately 90% accuracy on a collection of images with minimal noise. A support vector machine (SVM) is used to classify the feature vectors. To reduce the computation time and improve the classification accuracy. We also developed a new way to compute probabilistic outputs from a multi-class support vector machines

    Distillery Waste Water Treatment using Photo-catalytic UV-TiO2 System

    No full text
    In this study, removal of chemical oxygen demand COD, total suspended solids TSS, total dissolved solids TDS and colour ofdistillery wastewater using photo-catalytic process with TiO2 was carried out. Wastewater treatment from anaerobic sedimentation tank, COD: 4476 mg/L, TSS: 640 mg/L, total dissolved solids TDS: 720 mg/L was used for the photocatalyticprocess. The effectiveness of heterogeneous photocatalytic degradation on distillery wastewater using the UV-TiO2 process wasinvestigated in a laboratory scale. For the photocatalytic process, the effect of the catalyst was studied using various amounts ofTiO2 (0.1 to 0.5 g/L). Also, the effect of contact time (30 to 180 min) with the different UV power (10 to 30 W) was studied. For0.1 g/L TiO2 dosage, COD removal 94% with minimum contact time 110 min in 20 W UV power. For 0.2 g/L TiO2 dosage, CODremoval 94% with minimum contact time 110 min in 20 W UV power. For 0.3 g/L TiO2 dosage, COD removal 95% with minimum contact time 100 min in 30 W UV power. For 0.4 g/L TiO2 dosage,COD removal 95% with minimum contact time 80 min in 20 WUV power. For 0.5 g/L TiO2 dosage, COD removal 95%L with minimum contact time 80 min in 30 W UV power. By the usage ofTiO2 dosage (0.1 to 0.5) g/L, the COD values of treated water effluents were reduced to standard emission guideline 250 mg/L. Inthe use of the energy usage, the condition with UV power 20 W with TiO2 dosage at the contact time of 110 min was the optimum.In the use of processing time, the condition with UV power 30 W with the 0.4 g/L of TiO2 dosage at the contact time of 80 min wasthe optimum

    Development of Web-Based Air-Line Arrangement System Using Intelligent Agent

    No full text
    In traditional AI technique, systems have not been designed for dynamic environments requiring adaptive response. Agent-oriented approach has the potential enough to improve robustness and flexibility of web services. The primary function of an agent is to help the user better use, manage and interact with the computer applications. Intelligent agents automatically identify web resources, integrate and execute them for achieving the intended goals of the user. Electronic commerce is having a revolutionary effect on business. It changes the way businesses interact with consumers, as well as the way they interact with each other. In fact, we build a Web-Based E-Commerce System using intelligence agent to compose and combine web and services of flight and airways to achieve user goal. It has many advantages like improved efficiency, better process control, improved customer service, flexibility and business process improvement. System relate with web services to provide refined search and composition in order to take care of user needs. But still there is need of more research to explore this area of e-commerce system

    Perimeter Intrusion Detective System Using Arduino

    Full text link
    Perimeter intrusion detection systems are an integral part of most physical security systems. The mainfocus of the Perimeter Intrusion Detection System (PID) is on the fence intrusion. To secure public and private placessuch as military bases, airports, power station and security related application, the used of perimeter fencing iswidely applicable for isolating and protecting. Fence structures merely prevent a percentage of intrusions orpostpone them. Therefore, to monitor and investigate activities on or around the university, a higher level of securityis needed. The system used major components as Arduino board, 8x8 LED display, ultrasonic sensor, 16x2 LCDdisplay module and speaker. The unauthorized person who tries to intrude the university woulld be sensed, detectedand alarm would generate a signal that an intruder was trying to enter the university. The sound level depended onthe distance, the nearer the intruder and stronger would be the alarm signal. PID system displayed the distance of theobject or personal found in its region on the LCD display. This system was very useful for security applications.Ultrasonic sensor would be searching if there was a motion in its range
    corecore