• Title/Summary/Keyword: Threshold concerns

Search Result 33, Processing Time 0.021 seconds

Growth Characteristics of Ultrahigh-density Microalgal Cultures

  • Richmond, Amos
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.8 no.6
    • /
    • pp.349-353
    • /
    • 2003
  • The physiological characteristics of cultures of very high cell mass (e.g. 10g cell mass/L), termed“ultrahigh cell density cultures”is reviewed. A close relationship was found between the length of the optical path (OP) in flat-plate reactors and the optimal cell density of the culture as well as its areal (g m$\^$-2/ day$\^$-1/) productivity. Cell-growth inhibition (GI) unfolds as culture density surpasses a certain threshold. If it is constantly relieved, a 1.0cm OP reactor could produce ca. 50% more than reactors with longer OP, e.g. 5 or 10cm. This unique effect, discovered by Hu et al. [3], is explained in terms of the relationships between the frequency of the light-dark cycle (L-D cycle), cells undergo in their travel between the light and dark volumes in the reactor, and the turnover time of the photosynthetic center (PC). In long OP reactors (5cm and above) the L-D cycle time may be orders of magnitude longer than the PC turnover time, resulting in a light regime in which the cells are exposed along the L-D cycle, to long, wasteful dark periods. In contrast, in reactors with an OP of ca. 1.0 cm, the L-D cycle frequency approaches the PC turnover time resulting in a significant reduction of the wasteful dark exposure time, thereby inducing a surge in photosynthetic efficiency. Presently, the major difficulty in mass cultivation of ultrahigh-density culture (UHDC) concerns cell growth inhibition in the culture, the exact nature of which is awaiting detailed investigation.

Cluster Reconfiguration Protocol in Anonymous Cluster-Based MANETs (익명성을 보장하는 클러스터 기반 이동 애드혹 네트워크에서의 클러스터 갱신 프로토콜)

  • Park, YoHan;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.103-109
    • /
    • 2013
  • Mobile ad hoc networks (MANETs) are infrastructure-less and stand-alone wireless networks with dynamic topologies. To support user's safety in MANETs, fundamental and various security services should be supported. Especially in mobile commercial market, one of the major concerns regarding security is user privacy. Recently, researches about security system to protect user privacy in cluster-based MANETs have been introduced. This paper propose a cluster reconfiguration protocol under anonymous cluster-based MANETs to enhance the network stability. The improved anonymous cluster-based MANETs can recover the network structure against abnormal states of clutserheads.

A Weighted Feature Voting Approach for Robust and Real-Time Voice Activity Detection

  • Moattar, Mohammad Hossein;Homayounpour, Mohammad Mehdi
    • ETRI Journal
    • /
    • v.33 no.1
    • /
    • pp.99-109
    • /
    • 2011
  • This paper concerns a robust real-time voice activity detection (VAD) approach which is easy to understand and implement. The proposed approach employs several short-term speech/nonspeech discriminating features in a voting paradigm to achieve a reliable performance in different environments. This paper mainly focuses on the performance improvement of a recently proposed approach which uses spectral peak valley difference (SPVD) as a feature for silence detection. The main issue of this paper is to apply a set of features with SPVD to improve the VAD robustness. The proposed approach uses a weighted voting scheme in order to take the discriminative power of the employed feature set into account. The experiments show that the proposed approach is more robust than the baseline approach from different points of view, including channel distortion and threshold selection. The proposed approach is also compared with some other VAD techniques for better confirmation of its achievements. Using the proposed weighted voting approach, the average VAD performance is increased to 89.29% for 5 different noise types and 8 SNR levels. The resulting performance is 13.79% higher than the approach based only on SPVD and even 2.25% higher than the not-weighted voting scheme.

Orbit Ephemeris Failure Detection in a GNSS Regional Application

  • Ahn, Jongsun;Lee, Young Jae;Won, Dae Hee;Jun, Hyang-Sig;Yeom, Chanhong;Sung, Sangkyung;Lee, Jeong-Oog
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.16 no.1
    • /
    • pp.89-101
    • /
    • 2015
  • To satisfy civil aviation requirements using the Global Navigation Satellite System (GNSS), it is important to guarantee system integrity. In this work, we propose a fault detection algorithm for GNSS ephemeris anomalies. The basic principle concerns baseline length estimation with GNSS measurements (pseudorange, broadcasted ephemerides). The estimated baseline length is subtracted from the true baseline length, computed using the exact surveyed ground antenna positions. If this subtracted value differs by more than a given threshold, this indicates that an ephemeris anomaly has been detected. This algorithm is suitable for detecting Type A ephemeris failure, and more advantageous for use with multiple stations with various long baseline vectors. The principles of the algorithm, sensitivity analysis, minimum detectable error (MDE), and protection level derivation are described and we verify the sensitivity analysis and algorithm availability based on real GPS data in Korea. Consequently, this algorithm is appropriate for GNSS regional implementation.

Mutable Encryption for Oblivious Data Access in Cloud Storage

  • Ahmad, Mahmood;Hussain, Shujjat;Pervez, Zeeshan;Lee, Sungyoung;Chung, Tae Choong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.157-158
    • /
    • 2013
  • Data privacy and access control policies in computer clouds are a prime concerns while talking about the sensitive data. Authorized access is ensured with the help of secret keys given to a range of valid users. Granting the role access is a trivial matter but revoking user access is tricky and compute intensive. To revoke a user and making his data access ineffective the data owner has to compute new set of keys for the rest of effective users. This situation is inappropriate where user revocation is a frequent phenomenon. Time based revocation is another way to deal this issue where key for data access expires automatically. This solution rests in a very strong assumption of time determination in advance. In this paper we have proposed a mutable encryption for oblivious data access in cloud storage where the access key becomes ineffective after defined number of threshold by the data owner. The proposed solution adds to its novelty by introducing mutable encryption while accessing the data obliviously.

Tracing Fiscal Sustainability in Malaysia

  • LAU, Evan;LEE, Alvina Syn-Yee
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • One of the concerns in the economic policy circle is the fiscal sustainability. This current research revisit the notion of fiscal sustainability for Malaysia using the Indicator of Fiscal Sustainability (IFS) developed by Croce and Juan-Ramón (2003) where we employ samples of time-series data from 1970 to 2017. The findings reveal that 40 out of 48 years, during which the calculated IFS algorithm is above the threshold of 1, imply Malaysia was fiscally unsustainable. Despite having been fiscally unsustainable, Malaysia's fiscal stance shows improvement as a result of fiscal consolidation and fiscal reforms during the sample period. This is shown by the improved calculated IFS algorithm on average, which the value improved from 1.465 in 1970-1993 to 1.377 in 1998-2004 and to 1.146 in the 2006-2013. From the policy front, this indicator can serve as a precautionary early warning measure in formulating future fiscal path for Malaysia. This can be executed by targeting debt ratio and shifting the allocation of expenditures away from less efficient toward more growth-enhancing ones, which eventually would regain fiscal space to counter any incoming economic shocks in the future. This can enhance the fiscal transparency and assist in formulating a fiscal policy strategy in Malaysia.

Issues in Air Pollution Epidemiologic Studies (대기오염 역학연구의 주요 쟁점들)

  • Ha, Eun-Hee;Kwon, Ho-Jang
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.2
    • /
    • pp.109-118
    • /
    • 2001
  • The purpose of this review is to discuss the debate concerning the interpretation of epidemiologic studies on particles and health effects. Study of the 1952 air pollution disaster in London established that very high levels of particulate-based smog can cause dramatic increases in daily mortality. However, recent epidemiologic studies have reported statistically significant health effects and mortality due to low levels of air pollution. The statistical significance does not prove causation in observational studies; therefore it is necessary to evaluate these associations. There are arguments for and against each of the numerous studies using Hill's criteria, however the body of accepted evidence supports the causal association. In particular, a high level of consistency in the estimated effect of PM10 has been observed across studies worldwide. The mechanism of the relationship between air pollution and health effects is not obvious. The mechanism of particle-induced injury may involve the production of an inflammatory response by the particulate. The harvesting and the threshold effect are also major concerns regarding the health effects of air pollution. However, current epidemiologic findings indicate that linear models lacking a threshold are appropriate for assessing the effect of particulate air pollution on daily mortality even at current levels.

  • PDF

Detection of Genetically Modified Genes from Soybean Sprout Products (콩나물에서 발견된 유전자 변형 도입 유전자의 비의도적 혼입 조사)

  • 윤성철
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.49 no.3
    • /
    • pp.227-231
    • /
    • 2004
  • A total of 219 polymerase chain reaction tests of genetically modified (GM) DNA sequences in soybean seeds and soybean sprouts were conducted during 2000-2001. No CM gene was found in 96 tests of soybean seeds. However, either a functional CP4EPSPS gene or the 355 promoter gene was found three times in 2000 and eight times in 2001, in between 0.01 and 0.17% of soybean spout products, in 123 tests. Since the amount of GM genes was much less than the threshold limit of 3%, none of the 11 positive soybean-sprout samples needed to be libeled GM crops. Of these, seven sprout samples were from domestic seeds and four were from seeds imported from China. To find the contamination route, the raw materials, seed surface, floor of the storage room, area around the selection machine, surface of the packaging film and corn powder used in the package were tested. The 35S promoter gene was detected in only two samples of the corn powder (0.1%). Although we could not find the cause of the GM contamination, the sprout package film is one possibility. In total,8.9% of the soybean sprout tests were GM positive, but the amounts were much less than the threshold of 3%. This means that there are frequent false-positives and these would threaten the sprout industry if GMO were decided qualitatively. Food companies should make their safety data available to the public and make an effort to address people's concerns about GM food more openly. In addition, there is a need to establish a quantitative test for GM genes in sampled water and a sampling method for raw materials.

Wavelet based Fuzzy Integral System for 3D Face Recognition (퍼지적분을 이용한 웨이블릿 기반의 3차원 얼굴 인식)

  • Lee, Yeung-Hak;Shim, Jae-Chang
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.10
    • /
    • pp.616-626
    • /
    • 2008
  • The face shape extracted by the depth values has different appearance as the most important facial feature information and the face images decomposed into frequency subband are signified personal features in detail. In this paper, we develop a method for recognizing the range face images by combining the multiple frequency domains for each depth image and depth fusion using fuzzy integral. For the proposed approach, the first step tries to find the nose tip that has a protrusion shape on the face from the extracted face area. It is used as the reference point to normalize for orientated facial pose and extract multiple areas by the depth threshold values. In the second step, we adopt as features for the authentication problem the wavelet coefficient extracted from some wavelet subband to use feature information. The third step of approach concerns the application of eigenface and Linear Discriminant Analysis (LDA) method to reduce the dimension and classify. In the last step, the aggregation of the individual classifiers using the fuzzy integral is explained for extracted coefficient at each resolution level. In the experimental results, using the depth threshold value 60 (DT60) show the highest recognition rate among the regions, and the depth fusion method achieves 98.6% recognition rate, incase of fuzzy integral.

3D Face Recognition using Wavelet Transform Based on Fuzzy Clustering Algorithm (펴지 군집화 알고리즘 기반의 웨이블릿 변환을 이용한 3차원 얼굴 인식)

  • Lee, Yeung-Hak
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1501-1514
    • /
    • 2008
  • The face shape extracted by the depth values has different appearance as the most important facial information. The face images decomposed into frequency subband are signified personal features in detail. In this paper, we develop a method for recognizing the range face images by multiple frequency domains for each depth image using the modified fuzzy c-mean algorithm. For the proposed approach, the first step tries to find the nose tip that has a protrusion shape on the face from the extracted face area. And the second step takes into consideration of the orientated frontal posture to normalize. Multiple contour line areas which have a different shape for each person are extracted by the depth threshold values from the reference point, nose tip. And then, the frequency component extracted from the wavelet subband can be adopted as feature information for the authentication problems. The third step of approach concerns the application of eigenface to reduce the dimension. And the linear discriminant analysis (LDA) method to improve the classification ability between the similar features is adapted. In the last step, the individual classifiers using the modified fuzzy c-mean method based on the K-NN to initialize the membership degree is explained for extracted coefficient at each resolution level. In the experimental results, using the depth threshold value 60 (DT60) showed the highest recognition rate among the extracted regions, and the proposed classification method achieved 98.3% recognition rate, incase of fuzzy cluster.

  • PDF