In this review, we have discussed about approaches in pathway based microarray analysis. Commonly, there are two approaches in pathway based analysis, Enrichment Score and Supervised Machine Learning. These pathway ba...
详细信息
ISBN:
(纸本)9781424437740
In this review, we have discussed about approaches in pathway based microarray analysis. Commonly, there are two approaches in pathway based analysis, Enrichment Score and Supervised Machine Learning. These pathway based approaches usually aim to statistically define significant pathways that related to phenotypes of interest. Firstly we discussed an overview of pathway based microarray analysis and its general flow processes in scoring the pathways, the methods applied in both approaches, advantages and limitations based on current researches, and pathways database used in pathway analysis. This review aim to provide better understanding about pathway based microarray analysis and its approaches.
digital watermarking based on pixels modification for color image is considered in this paper. Its operations are described and its performance is investigated. Based on our observations, a method based on pixel avera...
详细信息
digital watermarking based on pixels modification for color image is considered in this paper. Its operations are described and its performance is investigated. Based on our observations, a method based on pixel averaging and unbiased watermark retrieval is proposed in order to improve the efficiency of the considering watermarking method. Particularly, we first apply the pixel averaging technique to create the localized luminance component, and used it to fine tune the watermark signal strength. We then remove some biased watermarked pixels in the watermark retrieval process to increase accuracy of the recovered watermark. The experimental results show the watermark retrieval improvements in term of NC, compared to the previous watermarking methods. The robustness against different types of attack at various strengths is also evaluated and compared.
The Italica Project is the implementation of an Electronic Health Record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a Medical Signal Grid Repository module and its int...
详细信息
In this paper a novel user-friendly implementation of an all-digital phase-locked loop (ADPLL) is *** novelty lies in the fact that the very basic functions of the ADPLL are kept in the top module Verilog *** the norm...
详细信息
In this paper a novel user-friendly implementation of an all-digital phase-locked loop (ADPLL) is *** novelty lies in the fact that the very basic functions of the ADPLL are kept in the top module Verilog *** the normal design practice, all of the main math functions were implemented using the sub-modules placed outside but called from within the top *** way ADPLL can be easily implemented in a low-cost FPGA. Further, the implementation details of an ADPLL, which are not reported previously in a singles hot, are described altogether for the first time. The reconfigurable ADPLL is then implemented in a transceiver architecture and tested with real signals received wirelessly. The recovered IQ constellation EVM of 9.0336% was obtained, which is quite *** proves the feasibility of the ADPLL not only in simulations but in a real communication system. The ADPLL designed this way can be used in any communication system, although preferably for high data rate transceiver applications.
Auditory masking is aggressively exploited by algorithms used for the lossy compression of audio signals. In compression of audio signals, the intent is to hide the noise introduced by the coding below the masking thr...
详细信息
Auditory masking is aggressively exploited by algorithms used for the lossy compression of audio signals. In compression of audio signals, the intent is to hide the noise introduced by the coding below the masking threshold, thus making the noise inaudible. This will render the coding process transparent, enabling better compression without audible degradation of the signal. In this article, we show that using masking properties of the hearing system allows for improved noise reduction. A novel method for noise reduction in speech signals is proposed. This method is shown to outperform non-auditory based methods, and compares well with other perceptually motivated noise reduction methods. It is found that the proposed method, Soulodre's PNRF combined with the ITU's PEAQ auditory model, have more musical noise but less signal distortion than the method proposed by Tsoukalas, which obtain marginally better results in informal testing results.
The purpose of this paper is to design and characterize the Multiplexer/Demultiplexer (Mux/Demux) which uses the concept of coupled mode theory. The design is based on cascading the wavelength selective coupler (WSC) ...
详细信息
The purpose of this paper is to design and characterize the Multiplexer/Demultiplexer (Mux/Demux) which uses the concept of coupled mode theory. The design is based on cascading the wavelength selective coupler (WSC) devices utilizing commercial specification. The device is designed on silica substrate with compliance of FTTH wavelength such as wavelengths 1310 nm (upstream data/voice), 1480 nm (downstream data/voice), 1550 nm (video) and 1625 nm (testing). The proposal of designed Mux/Demux is used as a router for specific wavelength in order to detect any optical line failure in FTTH network application in which the OTDR launched wavelength (1625 nm) is used as troubleshooting signal. The performance of the devices was modeled using the beam propagation method (BPM-Cad) product from the Optiwave Inc. The device then is characterized in term of output power, insertion loss and true loss measurement.
This paper presents a case study of development of a 6-axis robotic arm controller. The robot is powered by a hydraulic pump. The position of each axis can be derived from its potentiometer voltage. At each and every ...
详细信息
This paper presents a case study of development of a 6-axis robotic arm controller. The robot is powered by a hydraulic pump. The position of each axis can be derived from its potentiometer voltage. At each and every axis, a servo-valve is employed to control a servo motor. Its relative velocity is related to the servo-valve input. With 2 nd order PID controller, a micro-controller commands movements of all axes. The PID inputs are the six voltages from potentiometers and its outputs are the six DC voltages, which command the six servo-valves. A trajectory file is generated by solving the inverse kinematics problem with some (angular to digital value) conversions. A special case; closed-form calculation is developed to solve kinematics problem. With some constraints it only yields one solution. Experiments show that robot follow the given trajectory with acceptable errors.
In this paper, a novel multiwavelength Brillouin-erbium fiber laser (BEFL) with double-pass BP pre-amplified technique within the linear cavity is experimentally demonstrated. The linear cavity of the laser system is ...
详细信息
ISBN:
(纸本)9781424440801
In this paper, a novel multiwavelength Brillouin-erbium fiber laser (BEFL) with double-pass BP pre-amplified technique within the linear cavity is experimentally demonstrated. The linear cavity of the laser system is formed by two high reflectivity mirrors placed at both ends of the resonator. The main innovative step in this approach is the use of the erbium-doped fiber amplifier (EDFA) to amplify the Brillouin pump (BP) power twice within the laser cavity before entering the single-mode fiber. Therefore, the proposed fiber laser eliminates the requirement for high external BP power to create the Brillouin gain and suppress the self-lasing cavity modes.
Biometric authentication provides a high security and reliable approach to be used in security access system. However, this authentication method has not been widely implemented in a resource-constrained embedded syst...
详细信息
Biometric authentication provides a high security and reliable approach to be used in security access system. However, this authentication method has not been widely implemented in a resource-constrained embedded system. In this project, we investigate a method of personal authentication based on infrared vein pattern in the back of the hand, targeted for embedded system which is implemented in Altera Nios II FPGA prototyping system, running on Real Time Operating system (RTOS). The RTOS applied is Nios2-Linux. A biometric feature is extracted from the vein pattern image and then matched for personal authentication. The algorithm consists of four modules: image capturing, image pre-processing, feature extraction, and the authentication module. These image processing algorithms executed in an embedded system with a 50 MHz fixed point processor. Preliminary experiment on a database of 82 images of 15 candidates show promising result with the system reaching equal error rate of 5.5%.
This paper presents the implementation of a tightly coupled hardware architectural enhancement to the Altera FPGA-based Nios II embedded processor. The goal is to accelerate Advanced Encryption Standard (AES) operatio...
详细信息
This paper presents the implementation of a tightly coupled hardware architectural enhancement to the Altera FPGA-based Nios II embedded processor. The goal is to accelerate Advanced Encryption Standard (AES) operations in 128, 192 and 256-bits, for application in a high-performance embedded system implementing symmetric key cryptography. The concept is to augment the embedded processor with a new custom instruction for encryption and decryption operations. In order to show the effectiveness of tightly coupled hardware implementation over coprocessor based approach, we have also realized the design in coprocessor approach using the same AES core. Experimental results show that for the encryption or decryption operations, real implementation with custom instructions and tightly coupled hardware is about 35% faster than the co-processor based hardware.
暂无评论