Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property David Zak Lawyer
A Massachusetts lawyer noted among Hispanic homeowners, David Zak possesses a strong background in mortgage lending laws. Having previously worked with the underwriting and loan origination departments for many financial institutions, David Zak is knowledgeable about real estate title transfers.
Survey: Problems Related to Human in Software ProjectsIOSR Journals
This document discusses problems related to managing human factors in software projects. It identifies several key problems: lack of planning; unclear goals and objectives; poor estimation of team size; lack of executive support and user involvement; communication problems; inappropriate skills; changing objectives; lack of management skills among team members; and poor team evaluation. The document argues that human factors are critical to project success but often do not receive sufficient attention. Better management of these issues could help improve project outcomes and reduce failures.
Effect of vermicompost on biotransformation and bioavailability of hexavalent...IOSR Journals
This document summarizes a study on the effect of vermicompost on biotransformation and bioavailability of hexavalent chromium in soil. The study found that applying vermicompost alone or combined with microorganisms like Pseudomonas fluorescens and Trichoderma viride significantly reduced hexavalent chromium levels in contaminated soil. Applying vermicompost with P. fluorescens reduced chromium by up to 84.6%, and vermicompost alone reduced it by up to 85%. Plant uptake of chromium was also reduced, with the lowest chromium content found in plants grown in soil treated with T. viride. The biological treatments effectively detoxified chromium in the soil and lowered its bioavailability to
Searching and Analyzing Qualitative Data on Personal ComputerIOSR Journals
This document presents the design and implementation of a desktop search system using Lucene. It describes the key components of indexing, analyzing text, storing indexes, and searching. For indexing, it discusses how documents are preprocessed, tokenized, and stored in an inverted index. For searching, it explains how queries are analyzed and the index is searched to return results. The system allows users to search for files on their personal computer. It includes a user interface to input queries and view results. Lucene provides an open-source toolkit to add full-text search capabilities to applications.
Context Based Web Indexing For Semantic WebIOSR Journals
This summarizes a document that proposes a new context-based indexing technique using a B+ tree for web search engines. It extracts keywords from web documents and indexes them along with their contexts and ontologies in a B+ tree. This improves search speed by allowing relevant documents to be found faster from the semantic web through an optimized indexing structure as compared to linear searches or other trees. The proposed technique increases precision and recall for user queries by incorporating contextual information into the indexing process.
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
This document proposes and describes a chaos-based direct public verifiable signcryption scheme. It begins with background on chaos theory and how chaotic systems can provide useful properties for cryptography. It then discusses signcryption schemes generally and properties they should satisfy like confidentiality, integrity, and public verifiability. The document proposes a new signcryption scheme that uses a chaotic key generator and the chaotic function f(x) = 3x(1-x^2) to dynamically generate multiple encryption keys, aiming to provide stronger security. It presents the scheme details, including parameters, key generation, and how it can realize single-recipient and multiple-recipient signcryption with public verifiability. The scheme is then analyzed for
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
The document analyzes various rate-based congestion control algorithms for wireless technologies. It finds that TCP Vegas performs better than other TCP variants in terms of delivery fraction and delay. However, TCP Vegas has a consistent window size. Congestion avoidance is more effective at resolving congestion and has higher throughput than slow start. Cross-layer congestion control requires significant power and memory. The document then analyzes the performance of AIMD, TFRC, and TCP congestion control protocols via simulation. It finds that GAIMD performs better than TFRC in terms of throughput, while TFRC is better than GAIMD in terms of smoothness.
Why U.S. Bank Lost Its Case against Ibanez on a Foreclosed Property David Zak Lawyer
A Massachusetts lawyer noted among Hispanic homeowners, David Zak possesses a strong background in mortgage lending laws. Having previously worked with the underwriting and loan origination departments for many financial institutions, David Zak is knowledgeable about real estate title transfers.
Survey: Problems Related to Human in Software ProjectsIOSR Journals
This document discusses problems related to managing human factors in software projects. It identifies several key problems: lack of planning; unclear goals and objectives; poor estimation of team size; lack of executive support and user involvement; communication problems; inappropriate skills; changing objectives; lack of management skills among team members; and poor team evaluation. The document argues that human factors are critical to project success but often do not receive sufficient attention. Better management of these issues could help improve project outcomes and reduce failures.
Effect of vermicompost on biotransformation and bioavailability of hexavalent...IOSR Journals
This document summarizes a study on the effect of vermicompost on biotransformation and bioavailability of hexavalent chromium in soil. The study found that applying vermicompost alone or combined with microorganisms like Pseudomonas fluorescens and Trichoderma viride significantly reduced hexavalent chromium levels in contaminated soil. Applying vermicompost with P. fluorescens reduced chromium by up to 84.6%, and vermicompost alone reduced it by up to 85%. Plant uptake of chromium was also reduced, with the lowest chromium content found in plants grown in soil treated with T. viride. The biological treatments effectively detoxified chromium in the soil and lowered its bioavailability to
Searching and Analyzing Qualitative Data on Personal ComputerIOSR Journals
This document presents the design and implementation of a desktop search system using Lucene. It describes the key components of indexing, analyzing text, storing indexes, and searching. For indexing, it discusses how documents are preprocessed, tokenized, and stored in an inverted index. For searching, it explains how queries are analyzed and the index is searched to return results. The system allows users to search for files on their personal computer. It includes a user interface to input queries and view results. Lucene provides an open-source toolkit to add full-text search capabilities to applications.
Context Based Web Indexing For Semantic WebIOSR Journals
This summarizes a document that proposes a new context-based indexing technique using a B+ tree for web search engines. It extracts keywords from web documents and indexes them along with their contexts and ontologies in a B+ tree. This improves search speed by allowing relevant documents to be found faster from the semantic web through an optimized indexing structure as compared to linear searches or other trees. The proposed technique increases precision and recall for user queries by incorporating contextual information into the indexing process.
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
This document proposes and describes a chaos-based direct public verifiable signcryption scheme. It begins with background on chaos theory and how chaotic systems can provide useful properties for cryptography. It then discusses signcryption schemes generally and properties they should satisfy like confidentiality, integrity, and public verifiability. The document proposes a new signcryption scheme that uses a chaotic key generator and the chaotic function f(x) = 3x(1-x^2) to dynamically generate multiple encryption keys, aiming to provide stronger security. It presents the scheme details, including parameters, key generation, and how it can realize single-recipient and multiple-recipient signcryption with public verifiability. The scheme is then analyzed for
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
The document analyzes various rate-based congestion control algorithms for wireless technologies. It finds that TCP Vegas performs better than other TCP variants in terms of delivery fraction and delay. However, TCP Vegas has a consistent window size. Congestion avoidance is more effective at resolving congestion and has higher throughput than slow start. Cross-layer congestion control requires significant power and memory. The document then analyzes the performance of AIMD, TFRC, and TCP congestion control protocols via simulation. It finds that GAIMD performs better than TFRC in terms of throughput, while TFRC is better than GAIMD in terms of smoothness.
Motion analysis in video surveillance using edge detection techniquesIOSR Journals
This document discusses techniques for motion tracking in video surveillance using edge detection. It begins with an introduction to edge detection and background subtraction. It then describes five approaches to motion tracking that use background subtraction and either the Prewitt or Canny edge detection operators. The approaches include using a single Prewitt operator, background elimination with Prewitt, double Prewitt operators, single Prewitt with cropping, and background subtraction on color images with Prewitt. Visual results are provided. The conclusion is that Prewitt edge detection is better suited than Canny for motion tracking as Canny detects more edges, adding noise to background subtraction.
This document describes a low power pipelined FFT processor architecture based on the Radix-4 single delay commutator (R4SDC) algorithm. It implements and compares 16, 64, and 256-point FFT architectures using conventional R4SDC, a complex multiplier, and a multiplier-less architecture based on common subexpression technique. For the 16-point FFT, an ordered R4SDC architecture is proposed that reorders coefficients and inputs to minimize switching activity and reduce power consumption compared to the conventional design. Simulation results show the area and power requirements of the different architectural implementations.
An Improvement in Power Management in green Computing using Neural NetworksIOSR Journals
This document summarizes previous work on green computing and power management techniques using neural networks. It proposes a new technique using neural networks and dynamic clustering for energy conservation in green computing. Previous approaches focused on virtualization, power management, material recycling, and algorithms for efficient routing and clustering. The proposed technique would use a neural network's learning capabilities combined with dynamic clustering to improve energy efficiency. It was implemented in a simulation and results were presented graphically. The goal is to reduce resource consumption and electronic waste through more efficient power management.
Enhancement in Weighted PageRank Algorithm Using VOLIOSR Journals
1) The document proposes enhancing the Weighted PageRank algorithm by incorporating visits of links (VOL) to calculate page rank. It takes into account both the number of visits of inlinks and outlinks of pages.
2) A new algorithm, called Enhanced Weighted PageRank using VOL (EWPR VOL), is presented. It calculates page popularity based on the number of visits of inlinks (WVOLin) and outlinks (WVOLout).
3) The EWPR VOL algorithm is demonstrated using a sample web graph to calculate page rank values for pages A, B and C based on the number of visits of their inlinks and outlinks.
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...IOSR Journals
This document discusses using a k-nearest neighbor algorithm to classify ECG data. It proposes using additional dimensional features of ECG signals, like the area under the curve calculated using Simpson's rule and a scanline algorithm, along with patient metadata like age, gender, exercise levels, and medical history. A mathematical model is defined to represent the ECG and patient data. The k-nearest neighbor algorithm is then described as a way to classify new ECG data based on its similarity to labeled training data, using Euclidean distance to find the closest k neighbors. This approach aims to improve ECG analysis by considering more than just the ECG signal.
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in mobile ad hoc networks based on packet delivery ratio. It simulates the protocols using NS-3 simulator over 600 seconds with 50 nodes moving randomly. The results show that OLSR has the best performance with high and stable packet delivery ratio, while DSDV has the worst performance with many dropped packets. AODV shows average performance throughout the simulation.
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
This document discusses a modular approach to intrusion detection in homogeneous wireless networks. It begins by introducing wireless networks and the need for intrusion detection systems (IDS) due to security vulnerabilities. It then discusses different types of IDS, including signature-based detection that identifies known attacks, and anomaly-based detection that identifies deviations from normal behavior but can result in high false positives. The document proposes a modular approach combining advantages of signature-based and anomaly-based detection for high detection rates and low false positives. Requirements for IDS in wireless networks are also outlined.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
This document discusses reducing false positives and false negatives in intrusion detection for zigbee wireless networks. It proposes a new approach called service-oriented traffic classification (SOTC) that uses information about previously discovered network services to classify traffic flows. The key advantages of SOTC are robustness, accuracy, and low computational requirements compared to traditional port-based and payload-based classification methods. The document provides background on related work, describes how SOTC works, and discusses some implementation considerations to make it effective in practice.
Transient Power Flow in Micro grids with Signal Stability EnergyIOSR Journals
This document summarizes research on transient power flow in microgrids with signal stability energy. It discusses how microgrids can integrate distributed generation and energy storage to optimize power management both when connected to and isolated from the main grid. The research models different types of microgrids and proposes controls for coordinating distributed assets to regulate voltage and power flow. Simulation results demonstrate how multiple distributed generators can respond to changes in load to maintain stability during events like islanding from the utility grid.
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...IOSR Journals
This document proposes an Elephant Based Swarm Optimization (EBSO) approach to maximize the lifespan of wireless sensor networks. It models the wireless sensor network and describes elephants' social behavior that is inspiring the approach. Elephants exhibit unselfish behavior, strong memory, and ability to communicate and survive in large groups. The EBSO approach aims to adopt these behaviors through a cross-layer optimization of routing, MAC scheduling, and radio link parameters. It compares EBSO to LEACH and PSO protocols, showing EBSO extends network lifetime by balancing energy usage across nodes.
An Approach to Improve Brain Disorder Using Machine Learning TechniquesIOSR Journals
This summary provides an overview of an approach to improve diagnosis of attention deficit hyperactivity disorder (ADHD) using machine learning techniques. The study applies various machine learning algorithms like support vector machines (SVM), K-nearest neighbors (KNN), and co-training to electroencephalography (EEG) signals from patients in order to better classify and diagnose ADHD. MATLAB is used to analyze the EEG data and evaluate the performance of different machine learning methods at decomposing the signals, selecting relevant features, and determining the most effective approach for addressing brain disorders like ADHD. The goal is to develop a decision support system that can more accurately diagnose ADHD through analysis of brain activity patterns in EEG data using supervised and semi-supervised machine learning
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
This document discusses techniques for optimizing virtual function calls in object-oriented programming languages. Virtual function calls are indirect calls that involve lookup through a virtual function table (VFT) at runtime, which has performance overhead compared to direct calls. Various static analysis techniques like Class Hierarchy Analysis (CHA) and Rapid Type Analysis (RTA) aim to resolve some virtual calls by determining the possible target types and replacing indirect calls with direct calls if a single target is possible. CHA uses the class hierarchy and declared types to determine possible target types, while RTA also considers instantiated types in the program to further reduce possible targets. The document analyzes examples to demonstrate how CHA and RTA can optimize some virtual calls.
This document summarizes the Firefly Algorithm, a meta-heuristic optimization algorithm inspired by the flashing behaviors of fireflies. It describes the concepts behind the algorithm, including how attractiveness and light intensity are formulated based on distance. The algorithm is tested on six unconstrained benchmark functions to evaluate its performance. The results show that the Firefly Algorithm finds the global optimum for most test functions and performs better with larger population sizes, though convergence speed decreases with larger populations due to increased computational complexity.
Effect of Age of Spawned Catfish (Clarias Gariepinus) Broodstock on Quantity ...IOSR Journals
This study examined the effect of broodstock age on egg and milt production in catfish (Clarias gariepinus) and subsequent fry growth. Older female broodstock (24-30 months) produced more eggs (260-300g) than younger females (150-160g at 15-18 months). Similarly, older males (24-32 months) produced more milt (280-320g) than younger males (200-240g at 16-20 months). Hatchability and fry growth were also higher for eggs and fry from older broodstock. The study recommends using broodstock at least 24 months old to obtain optimal egg quantity, hatchability, and
Power Quality Improvement in Faulty Conditions using Tuned Harmonic FiltersIOSR Journals
This document presents a study on improving power quality in faulty electrical power systems using tuned harmonic filters. It proposes using single tuned and double tuned harmonic filters to reduce total harmonic distortion (THD) during different types of faults, including line-to-ground, line-to-line, double line-to-ground, three phase, and three phase with ground faults. A four bus power system model is simulated in MATLAB/Simulink. Results show that a double tuned filter is more effective at reducing THD during faults, with THD reductions of up to 70%, compared to 30-50% for a single tuned filter. The double tuned filter improves power quality the most during line-to-ground, double line-
Genetic Variability, Heritability for Late leaf Spot tolerance and Productivi...IOSR Journals
This document summarizes a study on genetic variability, heritability, and traits related to late leaf spot tolerance and productivity in a recombinant inbred line population of groundnut. The study evaluated 106 recombinant inbred lines plus parental lines. High genetic variation was observed for traits related to late leaf spot score, yield, and other components. High heritability and genetic advance were found for traits like late leaf spot score, 100-seed weight, and haulm weight per plant, indicating these are controlled by additive genes and good for selection. Several lines were identified with improved late leaf spot tolerance, early maturity, yield, and other traits.
Here's the powerpoint of the presentation Nuts&Bold gave to the Museum Computer Network 2013 (#MCN2013).
The first part is all about our inspirations, the second one is the presentation of the process used for Variations, an entirely crowdsourced online exhibit, and the final part is about our current research.
Have fun and if you'd like more info connect yourself to our Facebook page www.facebook.com/nutsandbold.ca or linkedIn or twitter (@nutsbold) or contact us at info@nutsandbold.ca. We will be happy to talk to you some more about our process, the possibilities, etc.
Have fun and let us know what you thinker of the exhibit !
http://commissairesglaneurs.wix.com/variations
nutsandbold.ca
A Novel High Order Tree for Securing Key Management for Multicast ServicesIOSR Journals
The document proposes a novel high order tree scheme called MKE-MGKM for securing key management in multiple multicast group environments. The MKE-MGKM scheme uses asymmetric master and slave keys generated from a master key encryption algorithm. This asymmetry allows rekeying overhead to be reduced by modifying only the master key when a slave key is updated, while keeping other slave keys unchanged. Numerical analysis and simulations show the MKE-MGKM scheme can reduce the storage overhead of a key distribution center by 75% and the storage overhead of a user by up to 85%, as well as communication overhead by 60%, compared to existing schemes. The scheme aims to address limitations of existing group key management schemes for multiple co-existing multicast
City Puzzle as an interactive simulation that visualizes future urban planning approaches. It builds on the mixed reality environment "Gulliver's World" to allow collaborative design of virtual cities.
13 червня у пришкільному таборі "Соколята" (на базі ЗОШ № 16 м. Вінниці) було проведено день Енергозбереження від Проекту ЄС/ПРООН "Місцевий розвиток орієнтований на громаду - ІІІ". Біля 200 дітей прийняли участь у цьому заході - вони малювали, дивились мультики, проходили тест - квест та багато чого іншого.
Motion analysis in video surveillance using edge detection techniquesIOSR Journals
This document discusses techniques for motion tracking in video surveillance using edge detection. It begins with an introduction to edge detection and background subtraction. It then describes five approaches to motion tracking that use background subtraction and either the Prewitt or Canny edge detection operators. The approaches include using a single Prewitt operator, background elimination with Prewitt, double Prewitt operators, single Prewitt with cropping, and background subtraction on color images with Prewitt. Visual results are provided. The conclusion is that Prewitt edge detection is better suited than Canny for motion tracking as Canny detects more edges, adding noise to background subtraction.
This document describes a low power pipelined FFT processor architecture based on the Radix-4 single delay commutator (R4SDC) algorithm. It implements and compares 16, 64, and 256-point FFT architectures using conventional R4SDC, a complex multiplier, and a multiplier-less architecture based on common subexpression technique. For the 16-point FFT, an ordered R4SDC architecture is proposed that reorders coefficients and inputs to minimize switching activity and reduce power consumption compared to the conventional design. Simulation results show the area and power requirements of the different architectural implementations.
An Improvement in Power Management in green Computing using Neural NetworksIOSR Journals
This document summarizes previous work on green computing and power management techniques using neural networks. It proposes a new technique using neural networks and dynamic clustering for energy conservation in green computing. Previous approaches focused on virtualization, power management, material recycling, and algorithms for efficient routing and clustering. The proposed technique would use a neural network's learning capabilities combined with dynamic clustering to improve energy efficiency. It was implemented in a simulation and results were presented graphically. The goal is to reduce resource consumption and electronic waste through more efficient power management.
Enhancement in Weighted PageRank Algorithm Using VOLIOSR Journals
1) The document proposes enhancing the Weighted PageRank algorithm by incorporating visits of links (VOL) to calculate page rank. It takes into account both the number of visits of inlinks and outlinks of pages.
2) A new algorithm, called Enhanced Weighted PageRank using VOL (EWPR VOL), is presented. It calculates page popularity based on the number of visits of inlinks (WVOLin) and outlinks (WVOLout).
3) The EWPR VOL algorithm is demonstrated using a sample web graph to calculate page rank values for pages A, B and C based on the number of visits of their inlinks and outlinks.
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...IOSR Journals
This document discusses using a k-nearest neighbor algorithm to classify ECG data. It proposes using additional dimensional features of ECG signals, like the area under the curve calculated using Simpson's rule and a scanline algorithm, along with patient metadata like age, gender, exercise levels, and medical history. A mathematical model is defined to represent the ECG and patient data. The k-nearest neighbor algorithm is then described as a way to classify new ECG data based on its similarity to labeled training data, using Euclidean distance to find the closest k neighbors. This approach aims to improve ECG analysis by considering more than just the ECG signal.
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in mobile ad hoc networks based on packet delivery ratio. It simulates the protocols using NS-3 simulator over 600 seconds with 50 nodes moving randomly. The results show that OLSR has the best performance with high and stable packet delivery ratio, while DSDV has the worst performance with many dropped packets. AODV shows average performance throughout the simulation.
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
This document discusses a modular approach to intrusion detection in homogeneous wireless networks. It begins by introducing wireless networks and the need for intrusion detection systems (IDS) due to security vulnerabilities. It then discusses different types of IDS, including signature-based detection that identifies known attacks, and anomaly-based detection that identifies deviations from normal behavior but can result in high false positives. The document proposes a modular approach combining advantages of signature-based and anomaly-based detection for high detection rates and low false positives. Requirements for IDS in wireless networks are also outlined.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
This document discusses reducing false positives and false negatives in intrusion detection for zigbee wireless networks. It proposes a new approach called service-oriented traffic classification (SOTC) that uses information about previously discovered network services to classify traffic flows. The key advantages of SOTC are robustness, accuracy, and low computational requirements compared to traditional port-based and payload-based classification methods. The document provides background on related work, describes how SOTC works, and discusses some implementation considerations to make it effective in practice.
Transient Power Flow in Micro grids with Signal Stability EnergyIOSR Journals
This document summarizes research on transient power flow in microgrids with signal stability energy. It discusses how microgrids can integrate distributed generation and energy storage to optimize power management both when connected to and isolated from the main grid. The research models different types of microgrids and proposes controls for coordinating distributed assets to regulate voltage and power flow. Simulation results demonstrate how multiple distributed generators can respond to changes in load to maintain stability during events like islanding from the utility grid.
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...IOSR Journals
This document proposes an Elephant Based Swarm Optimization (EBSO) approach to maximize the lifespan of wireless sensor networks. It models the wireless sensor network and describes elephants' social behavior that is inspiring the approach. Elephants exhibit unselfish behavior, strong memory, and ability to communicate and survive in large groups. The EBSO approach aims to adopt these behaviors through a cross-layer optimization of routing, MAC scheduling, and radio link parameters. It compares EBSO to LEACH and PSO protocols, showing EBSO extends network lifetime by balancing energy usage across nodes.
An Approach to Improve Brain Disorder Using Machine Learning TechniquesIOSR Journals
This summary provides an overview of an approach to improve diagnosis of attention deficit hyperactivity disorder (ADHD) using machine learning techniques. The study applies various machine learning algorithms like support vector machines (SVM), K-nearest neighbors (KNN), and co-training to electroencephalography (EEG) signals from patients in order to better classify and diagnose ADHD. MATLAB is used to analyze the EEG data and evaluate the performance of different machine learning methods at decomposing the signals, selecting relevant features, and determining the most effective approach for addressing brain disorders like ADHD. The goal is to develop a decision support system that can more accurately diagnose ADHD through analysis of brain activity patterns in EEG data using supervised and semi-supervised machine learning
De-virtualizing virtual Function Calls using various Type Analysis Technique...IOSR Journals
This document discusses techniques for optimizing virtual function calls in object-oriented programming languages. Virtual function calls are indirect calls that involve lookup through a virtual function table (VFT) at runtime, which has performance overhead compared to direct calls. Various static analysis techniques like Class Hierarchy Analysis (CHA) and Rapid Type Analysis (RTA) aim to resolve some virtual calls by determining the possible target types and replacing indirect calls with direct calls if a single target is possible. CHA uses the class hierarchy and declared types to determine possible target types, while RTA also considers instantiated types in the program to further reduce possible targets. The document analyzes examples to demonstrate how CHA and RTA can optimize some virtual calls.
This document summarizes the Firefly Algorithm, a meta-heuristic optimization algorithm inspired by the flashing behaviors of fireflies. It describes the concepts behind the algorithm, including how attractiveness and light intensity are formulated based on distance. The algorithm is tested on six unconstrained benchmark functions to evaluate its performance. The results show that the Firefly Algorithm finds the global optimum for most test functions and performs better with larger population sizes, though convergence speed decreases with larger populations due to increased computational complexity.
Effect of Age of Spawned Catfish (Clarias Gariepinus) Broodstock on Quantity ...IOSR Journals
This study examined the effect of broodstock age on egg and milt production in catfish (Clarias gariepinus) and subsequent fry growth. Older female broodstock (24-30 months) produced more eggs (260-300g) than younger females (150-160g at 15-18 months). Similarly, older males (24-32 months) produced more milt (280-320g) than younger males (200-240g at 16-20 months). Hatchability and fry growth were also higher for eggs and fry from older broodstock. The study recommends using broodstock at least 24 months old to obtain optimal egg quantity, hatchability, and
Power Quality Improvement in Faulty Conditions using Tuned Harmonic FiltersIOSR Journals
This document presents a study on improving power quality in faulty electrical power systems using tuned harmonic filters. It proposes using single tuned and double tuned harmonic filters to reduce total harmonic distortion (THD) during different types of faults, including line-to-ground, line-to-line, double line-to-ground, three phase, and three phase with ground faults. A four bus power system model is simulated in MATLAB/Simulink. Results show that a double tuned filter is more effective at reducing THD during faults, with THD reductions of up to 70%, compared to 30-50% for a single tuned filter. The double tuned filter improves power quality the most during line-to-ground, double line-
Genetic Variability, Heritability for Late leaf Spot tolerance and Productivi...IOSR Journals
This document summarizes a study on genetic variability, heritability, and traits related to late leaf spot tolerance and productivity in a recombinant inbred line population of groundnut. The study evaluated 106 recombinant inbred lines plus parental lines. High genetic variation was observed for traits related to late leaf spot score, yield, and other components. High heritability and genetic advance were found for traits like late leaf spot score, 100-seed weight, and haulm weight per plant, indicating these are controlled by additive genes and good for selection. Several lines were identified with improved late leaf spot tolerance, early maturity, yield, and other traits.
Here's the powerpoint of the presentation Nuts&Bold gave to the Museum Computer Network 2013 (#MCN2013).
The first part is all about our inspirations, the second one is the presentation of the process used for Variations, an entirely crowdsourced online exhibit, and the final part is about our current research.
Have fun and if you'd like more info connect yourself to our Facebook page www.facebook.com/nutsandbold.ca or linkedIn or twitter (@nutsbold) or contact us at info@nutsandbold.ca. We will be happy to talk to you some more about our process, the possibilities, etc.
Have fun and let us know what you thinker of the exhibit !
http://commissairesglaneurs.wix.com/variations
nutsandbold.ca
A Novel High Order Tree for Securing Key Management for Multicast ServicesIOSR Journals
The document proposes a novel high order tree scheme called MKE-MGKM for securing key management in multiple multicast group environments. The MKE-MGKM scheme uses asymmetric master and slave keys generated from a master key encryption algorithm. This asymmetry allows rekeying overhead to be reduced by modifying only the master key when a slave key is updated, while keeping other slave keys unchanged. Numerical analysis and simulations show the MKE-MGKM scheme can reduce the storage overhead of a key distribution center by 75% and the storage overhead of a user by up to 85%, as well as communication overhead by 60%, compared to existing schemes. The scheme aims to address limitations of existing group key management schemes for multiple co-existing multicast
City Puzzle as an interactive simulation that visualizes future urban planning approaches. It builds on the mixed reality environment "Gulliver's World" to allow collaborative design of virtual cities.
13 червня у пришкільному таборі "Соколята" (на базі ЗОШ № 16 м. Вінниці) було проведено день Енергозбереження від Проекту ЄС/ПРООН "Місцевий розвиток орієнтований на громаду - ІІІ". Біля 200 дітей прийняли участь у цьому заході - вони малювали, дивились мультики, проходили тест - квест та багато чого іншого.