Is Intellectual property (IP) central to innovation or is innovation central to IP? Univocally, patent valuation starts before drafting. Then IP is a valuation step such as innovation is. Equally "innovation is not the idea, but what you do with it". Then can ideation be engendered by artificial means? Nearly 60 years have passed since the birth of artificial intelligence and the initial dream of a machine possessing the full-range of human cognitive skills still belongs to science-fiction. However software using artificial intelligence are more and more present in our daily life. This is particularly true in the domain of information retrieval. Today's amounts of data one can access through diverse media necessitate the use of "clever algorithms" to find relevant material. This applies even more to the domain of IP. Companies' whole innovation strategy relies significantly on the analysis of patents, scientific publications and other IP documents. It is therefore crucial for them to extract in the most efficient way the best of the available information. The purpose of this paper is to give strategists, researchers, business analysts
The success of gene therapy depends on the choice of a suitable vector that is biocompatible and efficient in delivering therapeutic DNA into disease cells. After more than two decades, such an ideal vector is still a wish. Viral vectors though naturally evolved to transfect cells are immunogenic. As alternatives, non-viral vectors such as polyethyleneimine have been exploited. We decided to investigate the in-vitro cytotoxicity of branched polyethyleneimine 800D, 25kD and linear 20kD on HeLa and Vero cells. At exponential phase, cells were exposed to polymers at concentration range of 0.5 to 1000mg/ml. Cells were MTT assayed after 24, 48 and 72hours for viability (IC50). Linear PEI was less toxic than the branched PEI in both cells. The IC50 (mg/ml) values (Mean
Continental fault-block reservoirs in the Second Member of Shahejie Formation in Dongying Sag of Eastern China are difficult to achieve efficient exploration and development due to the complex geological conditions. This study relates to the in-depth analysis on diagenesis and reservoir quality in such deposits. These deposited sandstones have a wide range of porosity and permeability, which indicate both depositional facies and diagenesis control. Diagenetic processes that influenced the reservoir quality of the study area mainly insist of the formation of carbonate cements, and clay minerals, mechanical compaction, quartz cementation, and dissolution of framework grains. The distribution patterns and mineralogy of cements vary spatially, being relevant to reservoir evaluation. Among the diagenetic menerals, carbonate cements occur as the predominant components in the Shahejie sandstones of the study area. In such settings, the quality-destruction processes include mechanical compaction and carbonate cementation, whereas the quality-generation process is dissolution of detrital grains and calcite cements. The major sequence is eodiagenesis with the types and extent of eogenetic alterations related to the near-surface geological conditions. This study demonstrates diagenesis and related reservoir quality evolution can be linked to fine reservoir characterization, and thereby has an important role on hydrocarbon exploration and exploitation in the continental fault-block reservoirs.
Wood and charcoal are the frontier energy sources in developing countries mainly for heating and cooking. However, the achievable efficiency of woodstove is limited due to the poor combustion characteristics of wood in its natural form; and production of charcoal on the other hand dissipates major portion of the primary energy on the kiln site as smoke. Hence, this paper assesses the likelihood of integrating charcoal making with cooking in a charcoal making stove to enhance energy efficiency by attaining better control over combustion and increasing energy availability for end use. The scenario was demonstrated by using a Top-Lit UpDraft natural draft (TLUD-ND) gasifier stove which employs flaming pyrolysis that generates and combusts wood-gas for cooking and then recovers charcoal as a byproduct. Through standard procedures of Water Boiling Test (WBT) and proximate analysis, the average values of cooking efficiency and energy recovery in charcoal were found to be 18.05
Several factors can interfere in the quality of image such as aliasing, noise, artifact, and blurring, these factors can cause the degradation of image especially in edge regions. In order to reduce the effect of these factors, it is necessary to choose a robust interpolation method which can play important role of the reconstruction of the high-resolution image from its low-resolution counterpart, so as to preserving the edges and textures, increasing the resolution, and improving the image quality. In this paper, a new image interpolation method is proposed using gradient orientation; in the first step, we estimate the edges directions for a missing pixel location using the gradient-orientation in horizontal and vertical directions. Then, in the second step we interpolate the missing pixels along the detected edge directions using a cubic spline interpolation. We begin from a gray high-resolution image which is down-sampled by a factor of two, to obtain the low-resolution image, then; this image is reconstructed using the proposed algorithm. Our method is implemented and tested to several gray test images, and compared to other image interpolation methods. The simulation results show the effectiveness of the proposed technique using the PSNR and compared with the traditional interpolation techniques. The results showed that the proposed technique has higher accuracy, and can preserve the sharp edges and textures, and avoid the problems of blurring and the visual artifacts caused by the classical interpolation methods.
In this work, a comparative numerical study of natural convection in a channel with two types of walls was presented. This channel has two flat walls in the first case and flat wall and sinusoidal one in the second case. This type of channels is used as a thermosyphon system under the tiles of the roof of the buildings. It maximizes natural ventilation and minimizes the solar energy absorbed by the construction. To evaluate the effectiveness of the air channel, a numerical model is developed for the studied thermosyphon using the software FLUENT. The governing equations are solved by using the software Fluent where the SIMPLER algorithm is used for the coupling of velocity and pressure. The flow is turbulent and the turbulence is modeled by using the k-ε model. The distributions of speeds, temperatures and mass flow induced are determined. The obtained results are in good agreement with the experimental ones. A comparative study of the air flow in the second type of channel with sinusoidal wall was performed, it fined that it gives a flow with a high rate and the use of the corrugated surface allows us to increase the heat transfer to the fluid and the rate of mass flow without affecting the length of the channel.
Securing the digital assets is a major concern in the present digital information era. Various tools and techniques have been researched and implemented to secure the digital assets at both individual and organizational levels. Intrusion detection systems are considered as the cornerstone of modern information security. These systems enable us to be safe from the malicious users, who intend to misuse our digital data and resources. There are different approaches, methods, and techniques employed within the field of intrusion detection. Intrusion detection based on evolutionary methods is currently a hot topic of research. Various evolutionary techniques have been successfully implemented for intrusion detection. In this paper, a survey on applications of genetic algorithms in intrusion detection systems is carried out. The paper provides an introduction to the basic concepts of intrusion detection and genetic algorithms. The generic implementation of genetic algorithms using pseudo code is presented. Pseudo code for genetic algorithm based intrusion detection method is also included for clear understanding. The paper also provides an overview of the advantages and disadvantages of genetic algorithms in general, and as applied to intrusion detection in particular. This survey will provide helpful insight into the related literature and implementation of genetic algorithms in intrusion detection systems. It will also be a good source of information for people interested in the genetic algorithms based intrusion detection systems.
S. macrocarpon is a vegetable produced by nearly of 95 % of growers in Benin. Although the consumption of this vegetable is such important in this country, there are no data on its hygienic properties. This study aims to propose a technique for producing vegetable with improved health quality, based on anaerobic biodigestion of poultry manure. A method of vegetable's production based on anaerobic digestion of poultry manure was proposed and evaluated. The study showed that levels of bacteria decreased in the compost, with values from 6.5.106 CFU/g to 3.4.104 CFU/g for fecal coliforms and from 3.5.105 CFU/g to 5.4.103 CFU/g for Enterococcus. Lead complexed by chemical reactions was reduced with an amount from 2.39 mg/kg to 0.204 mg/kg. The amendante value of these chickens manure was improved by increasing phosphorus with a value from 9.96 % to 16.40 % and the reduction of total nitrogen from 18900 mg/kg to 13096.33 mg/kg. The data from this study allow to consider a large-scale production of S. macrocarpon with improved hygienic quality.
The two quantum methods Hartree-Fock HF/6-31G* (d, p) and density functional theory DFT/3-21G* (d, p) were used to calculate the equilibrium of the Si-F and Si-Cl bonds in SiH3X compounds where X may be F- or Cl- ; the atomic electron affinity of chloride (Cl-), fluoride (F-), chlorine (Cl) and fluorine (F); entropy (S), heat capacity (Cv), total energy and reaction enthalpy of fluorosilanes, chlorosilanes and silyl radicals; and bond angles and bond lengths of SiH3F and SiH3Cl. Inter-atomic distances of the Si-F and Si-Cl bonds in SiH3F and SiH3Cl calculated using HR and DFT are in good agreement with the experimental values. The optimal distance of the Si-F bond is shorter than that of the Si-Cl bond in SiH3X. Electron affinities calculated using HF and DFT are not in agreement with those obtained experimentally. The values of entropy (S) increase in parallel with the increase in the number of fluorine atoms in the silanes. The geometric structures of SiH3F and SiH3Cl both belong to the C3v point group. Their bond angles are slightly different. SiH3F has slightly higher energy than SiH3Cl. This might be due to the value of the bond angle in SiH3F, which is 109.18
Ad-hoc mobile/802.11 networks are fully considered as networks with no fixed physical line connections. Ad-hoc networks have no fixed topology due to the movement of the end nodes. All the nodes in ad-hoc networks are mobile. Each node taking part in this network can act as host and router which can send and receive data. In this type of situations some kind of routing protocols are needed for these mobile nodes to fully operate and function properly. Ad-hoc network has some common features, which need some routing protocol. The most significant one is the dynamic routing protocols, which quickly change the topology. Reactive routing protocols search a route to destination/remote device on needed basis. Proactive protocols maintain the whole routing table at each node. In order to show the performance, NS2 network simulator has been used. The purpose of this study is to show the performance of two widely known ad-hoc routing protocols, AODV and DSR, in terms of packet delivery ratio, average end-to-end delay and routing overhead by changing the mobility. The simulation has been carried out using NS2 2.29 as the simulation platform.
This paper concentrates on controlling of power flow in power lines with the help of series Flexible Alternating Current Transmission Systems (FACTS) device. The power flow control deals with the task of taking remedial measures against overloads and nonlinear loads in the system due to the occurrence of contingencies. The series FACTS devices considered in this paper are Thyristor Controlled Series Capacitor (TCSC), Thyristor Controlled Phase Shifter (TCPS) and Static Synchronous Series Compensator (SSSC). This paper presents the modelling of these series FACTS devices suitable for incorporation in load flow program for the study of steady state operation of power system. A systematic foundation on the theory and practice of positive sequence power flow is presented here. An efficient Newton-Rapshon (NR) method is used for solving the nonlinear algebraic load flow equations in the load flow problem. A step by step procedure for incorporation of series FACTS devices within the NR load flow algorithm is described. The effectiveness of the proposed models and convergence of the proposed load flow algorithm is tested on standard IEEE 30 bus test network without and with these series FACTS devices. Programming for the solution of series controllable branches with these proposed models is done by using MATLAB software. Results are reported and studies are presented to demonstrate and compare the efficiency of TCPS, TCSC and SSSC.
Two essays were carried out to evaluate the effect of different types of auxins on root formation and the influence of dark and culture substratum on tetraploid hybrid FHIA-01 proliferation (Musa spp. AAAB). The plant material consisted of tissue culture plantlets of FHIA -01 hybrid tetraploid banana (Musa AAAB). The trial, with a total of 10 replicates per treatment was carried out in each pot containing five explants. For both tests, a combination of two cytokinins was enriched in culture substratum. The results obtained show that regeneration was high in culture substratum with light than substratum without meta-methoxytopolin riboside (M2). The medium M2 to the light induced a higher number of the buds compared to medium dose reduced meta-methoxytopolin riboside (M1). Meanwhile, only explants inoculated on the medium M1 in the dark induced callus. The bud proliferation, induction of root, leaf and the broadcast callus induction are significantly influenced by the different substratum and photoperiod, increasing the explant size, the number of emerged leaves, roots and the number of the weight of explant with buds proliferated. Formulating specific culture media cultivars according to group (ABB or AAA) and the choice of culture conditions (light intensity) would avoid consecutive failures and low proliferation in in vitro culture.
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a request-packet to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node's priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor's known node, non-neighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its nodes.