• Title/Summary/Keyword: dependencies

Search Result 437, Processing Time 0.027 seconds

Indigenous Plant Utilization and Farming System of Garo Tribe in North-East Bangladesh: a Means of Sustainable Biodiversity Conservation

  • Rahman, Md. Habibur;Fardusi, Most. Jannatul
    • Journal of Forest and Environmental Science
    • /
    • v.28 no.2
    • /
    • pp.84-96
    • /
    • 2012
  • A special type of indigenous knowledge on plants utilization and farming system was explored by the Garo tribe community in the North-East region of Bangladesh, which correspond to the severe dependence on homestead forest. Results show that the Garo are totally dependent on the natural resources and that the extent of their dependency is faithfully reflected in their ethno-botanical knowledge. Dependencies that the study addressed focused on various aspects of food, fruit, energy, timber and health care on plants products. Garo tribe community in Bangladesh followed agrosilvipastoral system in their homesteads. They have indigenous hunting procedure to trap the animal in the forest. A total of 9 foods, 15 fruits, 12 energy-producing and 11 timber species was found and recorded that the Garo used in their daily life. Moreover, Garo used 23 medicinal plants species and have vast indigenous knowledge about using herbal medicine in daily health care practices. The Garo women do mostly the household activities, managing homestead forest and helping agricultural field where men perform all hard working activities like ploughing, cutting trees, digging the soil, preparation of horticultural and agricultural land, hunting, etc. The overall quality of life of the Garo could be considerably upgraded if ethno-botanical issues and their own indigenous knowledge will complement with scientific knowledge. The findings of the study conclude that the conservation of the indigenous knowledge of the Garo tribe related to plants utilization can also be turned to good account in forest conservation and is an important tool in this tribal area of Bangladesh.

Performance Analysis of Caching Instructions on SVLIW Processor and VLIW Processor (SVLIW 프로세서와 VLIW 프로세서의 명령어 캐싱에 따른 성능 분석)

  • Ji, Sung-Hyun;Park, No-Kwang;Kim, Suk-Il
    • Journal of IKEEE
    • /
    • v.1 no.1 s.1
    • /
    • pp.101-110
    • /
    • 1997
  • SVLIW processor architectures can resolve resource collisions and data dependencies between the instructions while scheduling VLIW instructions at run-time. As a result, long NOP word instructions can be removed from the object code produced for the processor. Thus, the occurrence of cache misses on the SVLIW processor would be lesser than that on the same cache size VLIW processor. Less frequent cache misses on the SVLIW processor would incur less frequent memory access, and thus, the total execution cycles to complete an application would be shortened compared with cases on the VLIW processor. Such a feature eventually compromises effects of longer instruction pipeline stages than those of the VLIW processor. In this paper, we formulate and compare two execution cycle models of the two architectures. A simulation results show that the longer memory access cycles when cache miss occurs, the total execution cycles of SVLIW processor would be shorter than those of VLIW processor.

  • PDF

BioSMACK: a linux live CD for genome-wide association analyses

  • Hong, Chang-Bum;Kim, Young-Jin;Moon, Sang-Hoon;Shin, Young-Ah;Go, Min-Jin;Kim, Dong-Joon;Lee, Jong-Young;Cho, Yoon-Shin
    • BMB Reports
    • /
    • v.45 no.1
    • /
    • pp.44-46
    • /
    • 2012
  • Recent advances in high-throughput genotyping technologies have enabled us to conduct a genome-wide association study (GWAS) on a large cohort. However, analyzing millions of single nucleotide polymorphisms (SNPs) is still a difficult task for researchers conducting a GWAS. Several difficulties such as compatibilities and dependencies are often encountered by researchers using analytical tools, during the installation of software. This is a huge obstacle to any research institute without computing facilities and specialists. Therefore, a proper research environment is an urgent need for researchers working on GWAS. We developed BioSMACK to provide a research environment for GWAS that requires no configuration and is easy to use. BioSMACK is based on the Ubuntu Live CD that offers a complete Linux-based operating system environment without installation. Moreover, we provide users with a GWAS manual consisting of a series of guidelines for GWAS and useful examples. BioSMACK is freely available at http://ksnp.cdc.go.kr/biosmack.

Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing

  • Li, Yang;Xu, Gaochao;Ge, Jiaqi;Liu, Peng;Fu, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2422-2443
    • /
    • 2020
  • This paper studies a single-user Mobile Edge Computing (MEC) system where mobile device (MD) includes an application consisting of multiple computation components or tasks with dependencies. MD can offload part of each computation-intensive latency-sensitive task to the AP integrated with MEC server. In order to accomplish the application faultlessly, we calculate out the optimal task offloading strategy in a time-division manner for a predetermined execution order under the constraints of limited computation and communication resources. The problem is formulated as an optimization problem that can minimize the energy consumption of mobile device while satisfying the constraints of computation tasks and mobile device resources. The optimization problem is equivalently transformed into solving a nonlinear equation with a linear inequality constraint by leveraging the Lagrange Multiplier method. And the proposed dual Bi-Section Search algorithm Bi-JOTD can efficiently solve the nonlinear equation. In the outer Bi-Section Search, the proposed algorithm searches for the optimal Lagrangian multiplier variable between the lower and upper boundaries. The inner Bi-Section Search achieves the Lagrangian multiplier vector corresponding to a given variable receiving from the outer layer. Numerical results demonstrate that the proposed algorithm has significant performance improvement than other baselines. The novel scheme not only reduces the difficulty of problem solving, but also obtains less energy consumption and better performance.

Analysis of Total Crime Count Data Based on Spatial Association Structure (공간적 연관구조를 고려한 총범죄 자료 분석)

  • Choi, Jung-Soon;Park, Man-Sik;Won, Yu-Bok;Kim, Hag-Yeol;Heo, Tae-Young
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.2
    • /
    • pp.335-344
    • /
    • 2010
  • Reliability of the estimation is usually damaged in the situation where a linear regression model without spatial dependencies is employed to the spatial data analysis. In this study, we considered the conditional autoregressive model in order to construct spatial association structures and estimate the parameters via the Bayesian approaches. Finally, we compared the performances of the models with spatial effects and the ones without spatial effects. We analyzed the yearly total crime count data measured from each of 25 districts in Seoul, South Korea in 2007.

Steganalysis of Content-Adaptive Steganography using Markov Features for DCT Coefficients (DCT 계수의 마코프 특징을 이용한 내용 적응적 스테가노그래피의 스테그분석)

  • Park, Tae Hee;Han, Jong Goo;Eom, Il Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.97-105
    • /
    • 2015
  • Content-adaptive steganography methods embed secret messages in hard-to-model regions of covers such as complicated texture or noisy area. Content-adaptive steganalysis methods often need high dimensional features to capture more subtle relationships of local dependencies among adjacent pixels. However, these methods require many computational complexity and depend on the location of hidden message and the exploited distortion metrics. In this paper, we propose an improved steganalysis method for content-adaptive steganography to enhance detection rate with small number features. We first show that the features form the difference between DCT coefficients are useful for analyzing the content-adaptive steganography methods, and present feature extraction mehtod using first-order Markov probability for the the difference between DCT coefficients. The extracted features are used as input of ensemble classifier. Experimental results show that the proposed method outperforms previous schemes in terms of detection rates and accuracy in spite of a small number features in various content-adaptive stego images.

Estimating Completeness of Cancer Registration in Iran with Capture-Recapture Methods

  • Mohammadi, Gohar;Akbari, Mohammad Esmaeil;Mehrabi, Yadolah;Motlagh, Ali Ghanbari;Pour, Elham Partovi;Roshandel, Gholamreza;Khosravi, Ardasheir
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.sup3
    • /
    • pp.93-99
    • /
    • 2016
  • Completeness is an important indicator of data quality in cancer registry programs. This study aimed to estimate the completeness of registered cases in a population based cancer registry program implemented in five provinces of Iran. Capture-recapture methods were used to estimate the number of cases that may have been missed and to estimate rates of completeness for different categories of age, year, and sex. The data used for this study were obtained from three sources: 1) National Pathology Database; 2) National Hospital Discharge Database; and 3) National Death Registry Database. The three sources were linked and duplicates were identified based on first name, last name, father's names, and date of birth, ICD code, and case's residency address using Microsoft Excel. Removing duplicates, the three sources reported a total of 35,643 cases from March 2008 to March 2011. Running many different multivariate models of capture-recapture and controlling for source dependencies revealed an overall under-reporting of 49% in all five registries combined. The estimated completeness differed based on age, sex, and year. The overall completeness was higher for males than females (71.2% for males and 59.9% for females). Younger age had lower rates of completeness compared to older age (38.1% for <40 years, 55.4% for 40-60 years, and 76.7 for >60 years). The results of this study indicated a moderate to severe (depending on the age, sex and year) degree of completeness in the population based cancer registration of Iran.

Caregiver's Burden and Quality of Life of Male Spouses with Stroke Wives (뇌졸중 환자인 부인을 돌보는 남성노인 배우자의 부담감과 건강 관련 삶의 질)

  • Han, Jung-Hee;Park, Yeon-Hwan
    • Korean Journal of Adult Nursing
    • /
    • v.24 no.6
    • /
    • pp.615-626
    • /
    • 2012
  • Purpose: The purpose of this study was to investigate caregiver burden and health related quality of life (HRQoL) among male spouses who cared for partners with a stroke. Methods: The subjects were spouses of 121 female patients who visited the neurology outpatients department in one tertiary hospital located in Seoul between February and April in 2011. Results: The mean age of the male caregivers was $71.25{\pm}5.51$ years. The mean score of caregiver's burden was moderate ($63.28{\pm}9.85$). The average reported caregiving time was $58.48{\pm}5.51$ min/day with the male spouses spending more time in house-working than with caregiving activities. The reported depression and care giving time, plus the cognitive status and functional dependencies of the spouse were significantly related to male caregiver's burden. The mean scores of 'physical health' and 'mental health' for quality of life for the male caregivers was moderate (47.49 and 47.33 respectively). Overall, caregiver's burden has a negative effect on the HRQoL of male spouses. Conclusion: Caregiver's burden and HRQoL are important problems which are in need of nurses' attention. It is suggested that intervention programs for male spouses be developed with a focus on emotional and social support as well as education about the caregiving role.

A Development of DMB-AF Player Supporting 3D Video Contents (3D 비디오 콘텐트를 지원하는 DMB-AF 플레이어 개발)

  • Kim, Yong-Han;Park, Min-Kyu
    • Journal of Broadcast Engineering
    • /
    • v.16 no.3
    • /
    • pp.542-551
    • /
    • 2011
  • Recently an extension to DMB-AF (Digital Multimedia Broadcasting Application Format) standard was proposed in [1] without sufficient validation for industrial application due to incomplete implementation. The extended DMB-AF can include stereoscopic video and stereoscopic images for interactive service data, i.e., MPEG-4 BIFS data, in addition to the existing 2D video and 2D images for BIFS services. The contents in the extended DMB-AF can provide a temporal mixture of 2D/3D video presentations possibly with or without 2D/3D images for BIFS services. In this paper we developed DMB-AF player software that can play the extended DMB-AF files and authored several test files for its verification. As a result, we introduced a new method for indicating dependencies of 3D media tracks to improve the extension in [1] and validated the extended DMB-AF with the improvement.

Measurement and Analysis of Power Dissipation of Value Speculation in Superscalar Processors (슈퍼스칼라 프로세서에서 값 예측을 이용한 모험적 실행의 전력소모 측정 및 분석)

  • 이상정;이명근;신화정
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.724-735
    • /
    • 2003
  • In recent high-performance superscalar processors, the result value of an instruction is predicted to improve instruction-level parallelism by breaking data dependencies. Using those predicted values, instructions are speculatively executed and substantial performance can be gained. It, however, requires additional power consumption due to the frequent access and update of the value prediction table. In this paper, first, the trade-off between the performance improvement and the increased power consumption for value prediction is measured and analyzed. And, in order to reduce additional power consumption without performance loss, the technique of controlling speculative execution with confidence counter and predicting useful instructions is developed. Also, in order to prove the validity, a tool is developed that can simulate processor behavior at cycle-level and measure total energy consumption and power consumption per cycle.