In this paper, we present a pipeline architecture specifically designed to process and compress DNA microarray images. Many of the pixilated image generation methods produce one row of the image at a time. This property is fully exploited by the proposed pipeline that takes in one row of the produced image at each clock pulse and performs the necessary image processing steps on it. This will remove the present need for sluggish software routines that are considered a major bottleneck in the microarray technology. Moreover, two different structures are proposed for compressing DNA microarray images. The proposed architecture is proved to be highly modular, scalable, and suited for a standard cell VLSI implementation. 相似文献
Silicon - In this study, a new magnetic ZrFe2O4@SiO2-TCPP nanocatalyst with high efficiency was used for the oxidation of cyclohexane to cyclohexanone (Ke) and cyclohexanol (Al). The mesoporous... 相似文献
Maintaining a fluid and safe traffic is a major challenge for human societies because of its social and economic impacts. Various technologies have considerably paved the way for the elimination of traffic problems and have been able to effectively detect drivers’ violations. However, the high volume of the real-time data collected from surveillance cameras and traffic sensors along with the data obtained from individuals have made the use of traditional methods ineffective. Therefore, using Hadoop for processing large-scale structured and unstructured data as well as multimedia data can be of great help. In this paper, the TVD-MRDL system based on the MapReduce techniques and deep learning was employed to discover effective solutions. The Distributed Deep Learning System was implemented to analyze traffic big data and to detect driver violations in Hadoop. The results indicated that more accurate monitoring automatically creates the power of deterrence and behavior change in drivers and it prevents drivers from committing unusual behaviors in society. So, if the offending driver is identified quickly after committing the violation and is punished with the appropriate punishment and dealt with decisively and without negligence, we will surely see a decrease in violations at the community level. Also, the efficiency of the TVD-MRDL performance increased by more than 75% as the number of data nodes increased.
In this work, the effect of various effective dimensionless numbers and moisture contents on initiation of instability in combustion of moisty organic dust is calculated. To have reliable model, effect of thermal radiation is taken into account. One- dimensional flame structure is divided into three zones: preheat zone, reaction zone and post-flame zone. To investigate pulsating characteristics of flame, governing equations are rewritten in dimensionless space-time ((, r/, ~) coordinates. By solving these newly achieved governing equations and combining them, which is completely discussed in body of article, a new expression is obtained. By solving this equation, it is possible to predict initiation of instability in organic dust flame. According to the obtained results by increasing Lewis number, threshold of instability happens sooner. On the other hand, pulsating is postponed by increasing Damk6hler number, pyrolysis temperature or moisture content. Also, by considering thermal radiation effect, burning velocity predicted by our model is closer to experimental results. 相似文献
Adaptive steganography methods tend to increase the security against attacks. Most of adaptive methods use LSB flipping (LSB-F) for embedding part of their algorithms. LSB-F is very much vulnerable against simple steganalysis methods but it allows the adaptive algorithms to be extractable at the receiver side. Use of LSB matching (LSB-M) could increase the security but extraction of data at the receiver is difficult or, in occasions, impossible. There are numerous attacks against LSB-M. In this paper we are proposing an adaptive algorithm which, unlike most adaptive methods, uses LSB-M as its embedding method. The proposed method uses a complexity measure based on a local neighborhood analysis for determination of secure locations of an image. Comparable adaptive methods that use LSB-M suffer from possible changes in the complexity of pixels when embedding is performed. The proposed algorithm is such that when a pixel is categorized as complex at the transmitter and is embedded the receiver will identify it as complex too, and data is correctly retrieved. Better performance of the algorithm is shown by obtaining higher PSNR values for the embedded images with respect to comparable adaptive algorithms. The security of the algorithm against numerous attacks is shown to be higher than LSB-M. Also, it is compared with a recent adaptive method and is proved to be advantageous for most embedding rates. 相似文献
Wireless Personal Communications - In recent years, Smart Cities and Smart Homes have been studied as an important field of research. The design and construction of smart homes have flourished so... 相似文献
Fractal coding algorithm has many applications including image compression. In this paper a classification scheme is presented which allows the hardware implementation of the fractal coder. High speed and low power consumption are the goal of the suggested design. The introduced method is based on binary classification of domain and range blocks. The proposed technique increases the processing speed and reduces the power consumption while the qualities of the reconstructed images are comparable with those of the available software techniques. In order to show the functionality of the proposed algorithm, the architecture was implemented on a FPGA chip. The application of the proposed hardware is shown in image compression. The resulted compression ratios, PSNR error, gate count, compression speed and power consumption are compared with the existing designs. Other applications of the proposed design are feasible in certain fields such as mass–volume database coding and also in video coder’s block matching schemes. 相似文献
Visual surveillance of a designated air space can be achieved by a randomly distributed camera sensor network spread over a large area. The location and field of view of each battery operated sensor, after a calibration phase, will be known to a central processing node. To increase the lifetime of the network, the density of distributed sensors could be such that a subset of sensors can cover the required air space. As a sensor dies another sensor should be selected to compensate for the dead one and reestablish the complete coverage. This process should be continued until complete coverage is not achievable by the existing sensors. Thereafter, a graceful degradation of the coverage is desirable.The goal is to elongate the lifetime of the network while maintaining a maximum possible coverage of the designated air space. Since the selection of a subset of sensors for complete coverage of the target area is an NP-complete problem, we present a number of heuristics for this case. The proposed methods are categorized in two groups. In one category, the sensors are prioritized based on their visual and communicative properties and the selection is performed according to the prioritizing function. In the other group, we propose traditional evolutionary and swarm intelligence algorithms. The performance of the proposed methods is evaluated through extensive simulations. 相似文献
A parametric analytical study is carried out to scrutinize the mechanism of fluid flow, heat transfer and entropy generation in a low-speed rarefied gaseous flow confined between a shaft and its concentric housing, i.e., the cylindrical Couette flow. In the first law analysis, closed form solutions for the radial temperature profiles are obtained by incorporating the calculated velocity distribution into the energy equation. The derivations for three thermal cases, which are founded on imposing different thermal conditions, namely, the Uniform Heat Flux (UHF) and the Constant Wall Temperature (CWT) boundary conditions, are presented. In the second law analysis, the contributions of thermal diffusion and fluid friction irreversibility to the total entropy generation in the micro domain are illustrated, and the relevant expressions for the Bejan number and the entropy generation number as well as the average entropy generation rate are derived. Finally, the variations of major variables with influential parameters such as the Knudsen number, the Brinkman number and rotation mode are investigated to elucidate the associated effects of rarefaction phenomenon, viscous dissipation and geometric condition on the characteristics of the flow. 相似文献