This paper is an attempt to introduce the basic concept of Intuitionistic Fuzzy Soft Matrix Theory. Further the concept of Intuitionistic Fuzzy Soft Matrix product has been applied to solve a problem in human life.
Texture features from Chaos Game Representation Images of GenomesCSCJournals
The proposed work investigates the effectiveness of coarse measures of the Chaos Game Representation (CGR) images in differentiating genomes of various organisms. Major work in this area is seen to focus on feature extraction using Frequency Chaos Game Representation (FCGR) matrices. Although it is biologically significant, FCGR matrix has an inherent error which is associated with the insufficient computing as well as the screen resolutions. Hence the CGR image is converted to a texture image and corresponding feature vectors extracted. Features such as the texture properties and the subsequent wavelet coefficients of the texture image are used. Our work suggests that texture features characterize genomes well further; their wavelet coefficients yield better distinguishing capabilities.
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber FeatureNooria Sukmaningtyas
Quality control is one of important process that can not be avoided in industry. Image processing
technique is required to distinguish the quality of wood. If it can be done automatically by the computer, it
will be very helpful. This paper discusses the detection of straight and slant wood fiber to distinguish its
quality. This paper proposes an algorithm by using only two features i.e. mean (average value of slop
angle fiber) and maximumangle (the maximum value of slop angle fiber). Then the classification method is
used by tresholding. The result shows the performance is achieved on accuracy 79.2%
Algorithmic Dynamics of Cellular AutomataHector Zenil
Original presentation prepared for the opening keynote of the meeting in celebration of Prof. Harold McIntosh. This talk covers aspects of the complexity and behaviour of cellular automata and their emergent dynamic patterns and information dynamics of events such as particle collisions.
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGIJCSEA Journal
Thresholding is a fast, popular and computationally inexpensive segmentation technique that is always critical and decisive in some image processing applications. The result of image thresholding is not always satisfactory because of the presence of noise and vagueness and ambiguity among the classes. Since the theory of fuzzy sets is a generalization of the classical set theory, it has greater flexibility to capture faithfully the various aspects of incompleteness or imperfectness in information of situation. To overcome this problem, in this paper we proposed a two-stage fuzzy set theoretic approach to image thresholding utilizing the measure of fuzziness to evaluate the fuzziness of an image and to determine an adequate threshold value. At first, images are preprocessed to reduce noise without any loss of image details by fuzzy rule-based filtering and then in the final stage a suitable threshold is determined with the help of a fuzziness measure as a criterion function. Experimental results on test images have demonstrated the effectiveness of this method.
Developing Mathematics Skills through Audio Interfaces for Blind Childrenijcoa
The use of audio highlights the diverse views for foster learning and cognition in blind children. The purpose is to use the computer sound and voice to explore audio sense for knowing and thinking. Mathematics is used as a domain to enhance learning of mathematics knowledge for blind children. This paper presents design, development, usability and evaluation of audio-based virtual environment. After interaction the children were highly motivated, solve problem and learned basic of mathematics. So as a result the audio based virtual environment help to ameliorate the complexity of blind children to learn mathematics.
Texture features from Chaos Game Representation Images of GenomesCSCJournals
The proposed work investigates the effectiveness of coarse measures of the Chaos Game Representation (CGR) images in differentiating genomes of various organisms. Major work in this area is seen to focus on feature extraction using Frequency Chaos Game Representation (FCGR) matrices. Although it is biologically significant, FCGR matrix has an inherent error which is associated with the insufficient computing as well as the screen resolutions. Hence the CGR image is converted to a texture image and corresponding feature vectors extracted. Features such as the texture properties and the subsequent wavelet coefficients of the texture image are used. Our work suggests that texture features characterize genomes well further; their wavelet coefficients yield better distinguishing capabilities.
The Detection of Straight and Slant Wood Fiber through Slop Angle Fiber FeatureNooria Sukmaningtyas
Quality control is one of important process that can not be avoided in industry. Image processing
technique is required to distinguish the quality of wood. If it can be done automatically by the computer, it
will be very helpful. This paper discusses the detection of straight and slant wood fiber to distinguish its
quality. This paper proposes an algorithm by using only two features i.e. mean (average value of slop
angle fiber) and maximumangle (the maximum value of slop angle fiber). Then the classification method is
used by tresholding. The result shows the performance is achieved on accuracy 79.2%
Algorithmic Dynamics of Cellular AutomataHector Zenil
Original presentation prepared for the opening keynote of the meeting in celebration of Prof. Harold McIntosh. This talk covers aspects of the complexity and behaviour of cellular automata and their emergent dynamic patterns and information dynamics of events such as particle collisions.
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGIJCSEA Journal
Thresholding is a fast, popular and computationally inexpensive segmentation technique that is always critical and decisive in some image processing applications. The result of image thresholding is not always satisfactory because of the presence of noise and vagueness and ambiguity among the classes. Since the theory of fuzzy sets is a generalization of the classical set theory, it has greater flexibility to capture faithfully the various aspects of incompleteness or imperfectness in information of situation. To overcome this problem, in this paper we proposed a two-stage fuzzy set theoretic approach to image thresholding utilizing the measure of fuzziness to evaluate the fuzziness of an image and to determine an adequate threshold value. At first, images are preprocessed to reduce noise without any loss of image details by fuzzy rule-based filtering and then in the final stage a suitable threshold is determined with the help of a fuzziness measure as a criterion function. Experimental results on test images have demonstrated the effectiveness of this method.
Developing Mathematics Skills through Audio Interfaces for Blind Childrenijcoa
The use of audio highlights the diverse views for foster learning and cognition in blind children. The purpose is to use the computer sound and voice to explore audio sense for knowing and thinking. Mathematics is used as a domain to enhance learning of mathematics knowledge for blind children. This paper presents design, development, usability and evaluation of audio-based virtual environment. After interaction the children were highly motivated, solve problem and learned basic of mathematics. So as a result the audio based virtual environment help to ameliorate the complexity of blind children to learn mathematics.
Fractal Boundary Value Problems for Integral and Differential Equations with ...ijcoa
In this paper, the local fractional decomposition method is applied to investigate the fractal boundary value problems for the Volterra integral equations and heat conduction equations. The accuracy and reliability of the obtained results of explained using examples.
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamicsijcoa
OBJECTIVES: To determine how SPSS can be a useful tool to evaluate Course Learning Outcomes and analyze student's performance with the help of KS test, histogram and skewness of the tool. It is also contributing to facilitate Deep learning amongst students with the help of achievement of normal distribution of grades. METHODS: Comparative analysis is done using course specification, syllabus, assessment method(Final Exam Question paper is taken as tool) and result statistics for the course of STATISTICAL PROGRAMMING (217 CSM), 3rd year (level 5 course) that is part of BCS curriculum in department of Computer Science, College of computer Science in King Khalid University. Teaching strategies are compared for two years. i.e; 2013 and 2014. Moreover the research inferences the relevance of application of NCAAA standards in meeting Learning outcomes of any module for department of Computer Science, CCS, KKU. RESULTS: Comparison of question papers depict that now students are motivated to have deep learning in terms of understanding, solving, reasoning based questions as contrast to shallow learning (memorized questions) in the past. It is indeed improving Learning domains too (Knowledge, Cognitive, Interpersonal and Communication skills) more effectively than in the past. Also grade distribution is Normal with well-defined curve for 2014 as compared to 2013 having variation in Standard deviation too. Teacher centered learning lead to surface learning. After NCAA standards implementation, there is more focus on learned centered teaching. Design of learning assessments is in such a way that it should meet learning outcomes successfully. CONCLUSIONS: The research is contributing in flourishing the personality of the students to produce qualified graduates with excellence in communication, logically and technically capable enough to share their knowledge nationally and internationally with much more confidence at any platform. Also it is opening door for researchers to evaluate their performance with the help of SPSS in academics or anywhere where we want to gather.
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approachijcoa
Detection of software bugs and its occurrences, repudiation and its root cause is a very difficult process in large multi threaded applications. It is a must for a software developer or software organization to identify bugs in their applications and to remove or overcome them. The application should be protected from malfunctioning. Many of the compilers and Integrated Development Environments are effectively identifying errors and bugs in applications while running or compiling, but they fail in detecting actual cause for the bugs in the running applications. The developer has to reframe or recreate the package with the new one without bugs. It is time consuming and effort is wasted in Software Development Life Cycle. There is a possibility to use graph mining techniques in detecting software bugs. But there are many problems in using graph mining techniques. Managing large graph data, processing nodes with links and processing subgraphs are the problems to be faced in graph mining approach. This paper presents a novel algorithm named BugLoc which is capable of detecting bugs from the multi threaded software application. The BugLoc uses object template to store graph data which reduces graph management complexities. It also uses substring analysis method in detecting frequent subgraphs. The BugLoc then analyses frequent subgraphs to detect exact location of the software bugs. The experimental results show that the algorithm is very efficient, accurate and scalable for large graph dataset.
The detection of moving object is an important in many applications such as a vehicle identification in a traffic monitoring system,human detection in a crime branch.In this paper we identify a vehicle in a video sequence.This paper briefly explain the detection of moving vehicle in a video.We introduce a new algorithm BGS for idntifying vehicle in a video sequence. First, we differentiate the foreground from background in frames by learning the background. Then, the image is divided into many small nonoverlapped frames. The candidates of the vehicle part can be found from the frames if there is some change in gray level between the current image and the background. The extracted background subtraction method is used in subsequent analysis to detect a vehicle and classify moving vehicle.
Analysis of Women Harassment in Villages Using CETD Matrix Modalijcoa
It is commonly understood that misbehavior intends to upset .Law says , the repeated intentional misbehavior towards women is an offensive. The main concept of this paper can find something interesting that will make us reflect on what is done by women’s rights and gender equality. To solve such problem, in this paper we are interested to adopt CETD matrix.
Solving Assignment Problem Using L-R Fuzzy Numbersijcoa
In this paper we determine a new method to solving assignment problem using L-R fuzzy parameters. This method requires finding out the minimal cost reach optimality compared to the existing methods available in the literature. Numerical examples show that the fuzzy assignment ranking method offers an effective way for handling the fuzzy assignment problem.
Fuzzy Chroamtic Number of Line Graph using α-Cutsijcoa
In this paper, we introduce chromatic number of line graph using α-cuts. The concept of chromatic number of fuzzy graphs was introduced by Munoz et.al, later Eslahchi and onagh. They are defined by the fuzzy chromatic number of complete graphs (kn), cycle graph (cn), star graph (sn), wheel graph (wn), and line graph are found and results are summarized.
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...ijcoa
In this paper, using a new Fuzzy bimodal called Induced Neutrosophic Cognitive Relational Maps (INCRM) we analyse the Socio-Economic problem faced by Rag-Pickers. Based on the study, conclusions and some remedial measures are stated.
Dual Trapezoidal Fuzzy Number and its Applicationsijcoa
In this Paper, we introduce Convergence of α-Cut. We define at Which point the α-Cut converges to the fuzzy numbers and it will be illustrated by example using dual trapezoidal fuzzy number and some mensuration problems are illustrated with approximated values.
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...ijcoa
This paper presents an implementation of one dimensional Burgers equation using implicit method with Intel Xeon Phi Coprocessor. In particular, we used MAGMA MIC library which is an open source high performance library for solving a systems of non-linear equations. Further for high performance computation we consider offload mode as the primary mode of operation for Intel Xeon phi coprocessor. The result obtained from implicit scheme is then compared with the exact values and it’s seen that the results obtained are approximate and reliable. The result table showed that the proposed scheme achieved higher performance on Intel MIC platform.
Adin and Roichman [1] introduced the concept of permutation graphs and Peter Keevash, Po-Shen Loh and Benny Sudakov [2] identified some permutation graphs with maximum number of edges. Ryuhei Uehara, Gabriel Valiente, discussed on Linear structure of Bipartite Permutation Graphs and the Longest Path Problem [3]. If i, j belongs to a permutation on p symbols {1, 2, …, p} and i is less than j then there is an edge between i and j in the permutation graph if i appears after j in the sequence of permutation. So the line of i crosses the line of j in the permutation. Hence there is a one to one correspondence between crossing of lines in the permutation and the edges of the corresponding permutation graph. In this paper we found the conditions for a permutation to realize a double star and comprehend the algorithm to determine the satuation index of the permutation. AMS Subject Classification (2010): 05C35, 05C69, 20B30.
Classification and Prediction of Heart Disease from Diabetes Patients using H...ijcoa
The multi-factorial chronicle, severe disease among human is diabetes. As a result of abnormal level of glucose in body leads to heart attack, kidney disease, renal failure, Hyperglycemia and also cancer in organs like liver and pancreas. Many studies have been proved that several types of heart diseases are possible in diabetic patients having a high blood sugar. Many approaches were proposed to diagnose both Diabetes and heart diseases. Most of the diabetes people can also have heart diseases called as Diabetic Cardiomyopathy. The earliest manifestation of diabetic cardiomyopathy is needed certain processes. The objective of the study is to examine the association of heart disease and diabetes. The relationship between diabetes and cardiovascular diseases are examined by taking into account of age, sex and associated diabetic and cardiovascular risk factors. The data are collected from patients with diabetes. From these data, features are selected by ant colony optimization and those selected features are given to hybrid PSO-LIBSVM to classify abnormal and normal data. This performance is evaluated using performance metrics and proved this classifiers efficiency for detection of Diabetic Cardiomyopathy.
Fractal Boundary Value Problems for Integral and Differential Equations with ...ijcoa
In this paper, the local fractional decomposition method is applied to investigate the fractal boundary value problems for the Volterra integral equations and heat conduction equations. The accuracy and reliability of the obtained results of explained using examples.
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamicsijcoa
OBJECTIVES: To determine how SPSS can be a useful tool to evaluate Course Learning Outcomes and analyze student's performance with the help of KS test, histogram and skewness of the tool. It is also contributing to facilitate Deep learning amongst students with the help of achievement of normal distribution of grades. METHODS: Comparative analysis is done using course specification, syllabus, assessment method(Final Exam Question paper is taken as tool) and result statistics for the course of STATISTICAL PROGRAMMING (217 CSM), 3rd year (level 5 course) that is part of BCS curriculum in department of Computer Science, College of computer Science in King Khalid University. Teaching strategies are compared for two years. i.e; 2013 and 2014. Moreover the research inferences the relevance of application of NCAAA standards in meeting Learning outcomes of any module for department of Computer Science, CCS, KKU. RESULTS: Comparison of question papers depict that now students are motivated to have deep learning in terms of understanding, solving, reasoning based questions as contrast to shallow learning (memorized questions) in the past. It is indeed improving Learning domains too (Knowledge, Cognitive, Interpersonal and Communication skills) more effectively than in the past. Also grade distribution is Normal with well-defined curve for 2014 as compared to 2013 having variation in Standard deviation too. Teacher centered learning lead to surface learning. After NCAA standards implementation, there is more focus on learned centered teaching. Design of learning assessments is in such a way that it should meet learning outcomes successfully. CONCLUSIONS: The research is contributing in flourishing the personality of the students to produce qualified graduates with excellence in communication, logically and technically capable enough to share their knowledge nationally and internationally with much more confidence at any platform. Also it is opening door for researchers to evaluate their performance with the help of SPSS in academics or anywhere where we want to gather.
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approachijcoa
Detection of software bugs and its occurrences, repudiation and its root cause is a very difficult process in large multi threaded applications. It is a must for a software developer or software organization to identify bugs in their applications and to remove or overcome them. The application should be protected from malfunctioning. Many of the compilers and Integrated Development Environments are effectively identifying errors and bugs in applications while running or compiling, but they fail in detecting actual cause for the bugs in the running applications. The developer has to reframe or recreate the package with the new one without bugs. It is time consuming and effort is wasted in Software Development Life Cycle. There is a possibility to use graph mining techniques in detecting software bugs. But there are many problems in using graph mining techniques. Managing large graph data, processing nodes with links and processing subgraphs are the problems to be faced in graph mining approach. This paper presents a novel algorithm named BugLoc which is capable of detecting bugs from the multi threaded software application. The BugLoc uses object template to store graph data which reduces graph management complexities. It also uses substring analysis method in detecting frequent subgraphs. The BugLoc then analyses frequent subgraphs to detect exact location of the software bugs. The experimental results show that the algorithm is very efficient, accurate and scalable for large graph dataset.
The detection of moving object is an important in many applications such as a vehicle identification in a traffic monitoring system,human detection in a crime branch.In this paper we identify a vehicle in a video sequence.This paper briefly explain the detection of moving vehicle in a video.We introduce a new algorithm BGS for idntifying vehicle in a video sequence. First, we differentiate the foreground from background in frames by learning the background. Then, the image is divided into many small nonoverlapped frames. The candidates of the vehicle part can be found from the frames if there is some change in gray level between the current image and the background. The extracted background subtraction method is used in subsequent analysis to detect a vehicle and classify moving vehicle.
Analysis of Women Harassment in Villages Using CETD Matrix Modalijcoa
It is commonly understood that misbehavior intends to upset .Law says , the repeated intentional misbehavior towards women is an offensive. The main concept of this paper can find something interesting that will make us reflect on what is done by women’s rights and gender equality. To solve such problem, in this paper we are interested to adopt CETD matrix.
Solving Assignment Problem Using L-R Fuzzy Numbersijcoa
In this paper we determine a new method to solving assignment problem using L-R fuzzy parameters. This method requires finding out the minimal cost reach optimality compared to the existing methods available in the literature. Numerical examples show that the fuzzy assignment ranking method offers an effective way for handling the fuzzy assignment problem.
Fuzzy Chroamtic Number of Line Graph using α-Cutsijcoa
In this paper, we introduce chromatic number of line graph using α-cuts. The concept of chromatic number of fuzzy graphs was introduced by Munoz et.al, later Eslahchi and onagh. They are defined by the fuzzy chromatic number of complete graphs (kn), cycle graph (cn), star graph (sn), wheel graph (wn), and line graph are found and results are summarized.
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...ijcoa
In this paper, using a new Fuzzy bimodal called Induced Neutrosophic Cognitive Relational Maps (INCRM) we analyse the Socio-Economic problem faced by Rag-Pickers. Based on the study, conclusions and some remedial measures are stated.
Dual Trapezoidal Fuzzy Number and its Applicationsijcoa
In this Paper, we introduce Convergence of α-Cut. We define at Which point the α-Cut converges to the fuzzy numbers and it will be illustrated by example using dual trapezoidal fuzzy number and some mensuration problems are illustrated with approximated values.
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...ijcoa
This paper presents an implementation of one dimensional Burgers equation using implicit method with Intel Xeon Phi Coprocessor. In particular, we used MAGMA MIC library which is an open source high performance library for solving a systems of non-linear equations. Further for high performance computation we consider offload mode as the primary mode of operation for Intel Xeon phi coprocessor. The result obtained from implicit scheme is then compared with the exact values and it’s seen that the results obtained are approximate and reliable. The result table showed that the proposed scheme achieved higher performance on Intel MIC platform.
Adin and Roichman [1] introduced the concept of permutation graphs and Peter Keevash, Po-Shen Loh and Benny Sudakov [2] identified some permutation graphs with maximum number of edges. Ryuhei Uehara, Gabriel Valiente, discussed on Linear structure of Bipartite Permutation Graphs and the Longest Path Problem [3]. If i, j belongs to a permutation on p symbols {1, 2, …, p} and i is less than j then there is an edge between i and j in the permutation graph if i appears after j in the sequence of permutation. So the line of i crosses the line of j in the permutation. Hence there is a one to one correspondence between crossing of lines in the permutation and the edges of the corresponding permutation graph. In this paper we found the conditions for a permutation to realize a double star and comprehend the algorithm to determine the satuation index of the permutation. AMS Subject Classification (2010): 05C35, 05C69, 20B30.
Classification and Prediction of Heart Disease from Diabetes Patients using H...ijcoa
The multi-factorial chronicle, severe disease among human is diabetes. As a result of abnormal level of glucose in body leads to heart attack, kidney disease, renal failure, Hyperglycemia and also cancer in organs like liver and pancreas. Many studies have been proved that several types of heart diseases are possible in diabetic patients having a high blood sugar. Many approaches were proposed to diagnose both Diabetes and heart diseases. Most of the diabetes people can also have heart diseases called as Diabetic Cardiomyopathy. The earliest manifestation of diabetic cardiomyopathy is needed certain processes. The objective of the study is to examine the association of heart disease and diabetes. The relationship between diabetes and cardiovascular diseases are examined by taking into account of age, sex and associated diabetic and cardiovascular risk factors. The data are collected from patients with diabetes. From these data, features are selected by ant colony optimization and those selected features are given to hybrid PSO-LIBSVM to classify abnormal and normal data. This performance is evaluated using performance metrics and proved this classifiers efficiency for detection of Diabetic Cardiomyopathy.
Format Preserving Encryption for Small Domainijcoa
Cryptography is important in communicating secured information that is vulnerable to distortion. The main goal of this paper is encrypting the small arbitrary length data without any changes in the length and data type. We propose a flexible arbitrary length small domain block cipher (FPESD). FPESD is based on AES Algorithm. The resulting cipher text is the same as input plaintext. Here, we use Galois finite field GF (28) and format preserving key to implement FPE. For decryption format preserving key is used along with cipher text and secret key.
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...ijcoa
The intuitionistic double layered fuzzy graph gives a 3-D structural view to a fuzzy graph. To find the cartesian product of two intuitionistic double layered fuzzy graphsis a challenging one. In this paper under some condition,a simple method to find the vertex degree of cartesian product of two IDLFG without the cartesianproduct structure is given.
Clustering and Classification in Support of Climatology to mine Weather Data ...ijcoa
Knowledge of climate data of region is essential for business, society, agriculture, pollution and energy applications. Climate is not fixed, the fluctuation in the climate can be seen from year to year.The data mining application help meteorological scientists to predictaccurate weather forecast and decisions and also provide more performance and reliability than any other methods. The data mining techniques applied on weather data are efficient when compare to the mathematical models used. Various techniques of data mining are applied on climate data to support weather forecasting, climate scientists, agriculture, vegetation, water resources and tourism. The aim of this paper is to provide a review report on various data mining techniques applied on weather data set in support of weather prediction and climate analysis.
Test Suite Reduction Based on Fault Detection with Cost Optimizationijcoa
Test Suite Reduction is an optimization technique to identify the minimally sized subset of test cases with enforced constraints involved. The main purpose of test suite reduction is to deduce increased number of test cases that in turn increase the time and cost involved in execution. Fault Detection is the method of identifying the faults that affect the outcome of the system either logically or syntactically. This paper focuses on the reduction of the test suite that has high fault identification rates and also incurs low cost of execution of test cases. The proposed approach includes a new parameter Fault Detection Effectiveness to identify fault rates of test suite; an algorithm for test suite reduction based on priority of requirements; a low cost framework to identify the execution of test cases with minimum budget. Thus, the proposed work defines a test suite that has high fault detection effectiveness providing maximum coverage to requirements at minimum cost of execution.
As the e-commerce is gaining popularity various customer surveys of objects are currently accessible on the Internet. These surveys are frequently disordered, prompting challenges in knowledge discovery and object assessment. This article proposes an object feature positioning skeleton, which consequently recognizes the critical features of an object from online customer surveys. The critical object features are recognized focused around two perceptions: 1) they are normally commented extensively by customers and 2) customer suppositions on the critical feature significantly impact their general assessments on the object. Specifically, given the customer surveys of an item, we first extract the object feature by a shallow reliance parser and focus customer suppositions on these features through an opinion characterizer. We then create a probabilistic object feature positioning calculation to identify the criticalness of perspectives by at the same time considering feature recurrence and the impact of customer opinion given to every feature over their general opinion. The experimental results on 3 popular products demonstrate the effectiveness of our approach.
Effectual Data Integrity Checking Technique Based on Number Theoryijcoa
Cloud Computing makes data really mobile and a client can simply access a chosen cloud with any internet accessible device. The espousal and dispersion of Cloud computing are threatened by unresolved security issues that affect both the cloud provider and the cloud user. The integrity of data stored in the cloud is one of the challenges to be addressed before the novel storage model is applied widely. This paper analyses the efficiency issues and security dodge of an existing scheme and proposes an amended data integrity scheme using improved RSA and number theory based concept for cloud archive. This scheme of protecting the integrity of guest virtual machines can be agreed upon by both the cloud and the customer and can be incorporated in the service level agreement (SLA).Based onhypothetical analysis, we demonstrate that the proposedscheme has a provably safe and highly adroit dataintegrity inspection measure.
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brainijcoa
What cause to the neurons of the human brain cells when they are damaged. They become inactive. So damage to subthalamiuc nucleus (STN) neurons of the human brain causing larger involuntary movements and thereby attacking the Parkinson’s disease (PD). Deep brain stimulation (DBS) of bilateral sub thalamic nuclei (STN) is an efficient method of rehabilitation technique in subjects with advanced idiopathic Parkinson’s (or Parkinson) disease. Accurate targeting of STN neurons and placement of microelectrodes/ (neurosensors) are paramount importance for optimal results after STN-DBS method.In this paper, microminiaturized electrode recordings (MER) of STN neurons were detected in a mean of 3.5 ±1.1 channels on right hemisphere and 3.6 ±1.04 on left hemisphere.Final channel selected were most commonly central seen in 42.3% followed by anterior in 33.7%. When a high current is delivered to STN or GPi neurons of basal ganglia (a component of human brain), causing their inhibition and improved indication of symptoms. It is now known that there is a significant change in the firing pattern and a reorganization of the entire basal ganglia circuit with DBS. The MER of STN neurons has identified a specific high frequency irregular larger amplitude firing patterns seen only in disease states and hence used to detect the neurons of ST nucleus during functional surgery. Microelectrode recording is so useful to confirm the right path but has to be taken in consideration with effects on macro stimulation.
EDM: Finding Answers to Reduce Dropout Rates in Schoolsijcoa
The focus of this paper is to get a bird's eye view of the various factors that could be analyzed to present schools and governments timely indicators of school dropouts. With the help of EDM, one could have access to enormous amounts of data. The crux of the matter would be to identify the data in line with plans and ideas that would eventually lead to the formulation of policies that enhance the teaching and learning process.
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...ijcoa
Agile software development has been gaining popularity and replacing the traditional methods of developing software. However, estimating the size and effort in Agile software development still remains a challenge. Measurement practices in agile methods are more important than traditional methods, because lack of appropriate an effective measurement practices will increase the risk of project. This paper discuss about traditional and agile effort estimation model, and analysis done on how the metrics are used in estimation process. The paper also suggeststo use object point and use case point to improve accuracy of effort in agile software development.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
Lateral Ventricles.pdf very easy good diagrams comprehensive
Intuitionistic Fuzzy Soft Matrix Theory and its Application in Human Life
1. International Journal of Computing Algorithm, Vol 3(3), June 2014
ISSN(Print):2278-2397
Website: www.ijcoa.com
Intuitionistic Fuzzy Soft Matrix Theory and its
Application in Human Life
A.Virgin Raj1
, S.Ashok2
1 2
PG and Research Department of Mathematics,
St.Joseph College of Arts and Science (Autonomous), Cuddalore,Tamilnadu, India
E-mail: avirginraj@gmail.com, ashokvicky88@gmail.com
Abstract
This paper is an attempt to introduce the basic concept of Intuitionistic Fuzzy Soft Matrix
Theory. Further the concept of Intuitionistic Fuzzy Soft Matrix product has been applied to
solve a problem in human life.