ABSTRACT
Medical species (Senecio L.) not only is key multilevel functional medicinal material of indications of respiratory tract infections, tonsillitis, pharyngitis, pneumonia, conjunctivitis, enteritis, dysentery, but also it is a widely distributed wide plant species. This plant species is widely distributed elevation from 500m to 1500m in forest landscapes and vegetation ecosystems in Shan County of China. However, understanding leaves dry biomass of this species is difficult along elevation. This work explained that the relation between leaves dry biomass of this species and elevation is a significant positive connection from 500m to 1000m (P<0.01) as well as the links between leaves dry biomass of this species and elevation is a significant negative connection from 1000m to 1500m (P<0.01). This study provides six ecosystem types and a series of areas ecological adaptation for finding new medicinal species. Therefore, this study has vital theoretical and practical significance for medicinal plant protection along different elevation and environmental gradient.
ABSTRACT
A key characteristic of Newton’s First Law of Motion is that it satisfies the Law of Causality. It is pointed out that the same arguments that are the basis for the conclusion that the speed and direction of an object will not change in the absence of some unbalanced external force can be equally well applied to all other physical properties. For example, it must be expected that a clock in motion will maintain the same constant rate indefinitely under these conditions. It is thus clear that two such (inertial) clocks must have a constant ratio Q, which means that the time difference of any two events measured with these clocks must satisfy an analogous proportionality relation, i.e. Δt’ = Δt/Q. The space-time mixing characteristic exhibited by the Lorentz transformation (LT) stands in contradiction to this proportionality, therefore demonstrating that the LT violates the Law of Causality. The experiments carried out with circumnavigating atomic clocks demonstrate that the same proportionality relationship for elapsed times is satisfied quite generally and is used to good effect in the operation of the Global Positioning System. A consequence of the elapsed-time proportionality is the absolute simultaneity of events occurring anywhere in the universe. Analogous proportional relationships, referred to as uniform scaling, exist for all physical properties. Hence, there exists a Corollary to the Law of Inertia for properties that is applicable on a completely general basis.
ABSTRACT
Distributed computing is a computing in which different components and objects comprising an application can be located on different computers connected to a network. For example, a word processing application might consist of an editor component on one computer, a spell-checker object on a second computer, and a thesaurus on a third computer. In some distributed computing systems, each of the three computers could even be running a different operating system. Cloud computing has become a new age technology that has got huge potentials in enterprises and markets. Clouds can make it possible to access applications and associated data from anywhere. Companies are able to rent resources from cloud for storage and other computational purposes so that their infrastructure cost can be reduced significantly. Further they can make use of company ‘swide access to applications, based on pay-as-you-go model. Hence there is no need for getting licenses for individual products. However one of the major pitfalls in cloud computing is related to optimizing the resources being allocated. Because of the uniqueness of the model, resource allocation is performed with the objective of minimizing the costs associated with it. The other challenges of resource allocation are meeting customer demands and application requirements. Here, various resource allocation strategies and their challenges are discussed in detail. It is believed that this thesis would benefit both cloud users and researchers in overcoming the challenges faced.
ABSTRACT
The picture covering is achieve lively reputation owed to its established function as a picture is extended supervising consist of helpful data. In view of this paper, we have particularly considered the approach of steganography by incorporating picture covering inward addition picture among unharmed architecture digital indication plan. Our advanced attempt allow the basic picture preprocessing efforts through clarify of owner picture chase by enclose of the classified picture and declaration of the picture documents inward the owner picture. Next, the stego-picture is liable as an instruction to the digital indication plan. The encouraging developmental by-product advise the future of the plan.
ABSTRACT
Polar codes are a class of capacity-achieving codes. In the past decade, the interest and research effort on polar codes has been constantly rising in academia and industry alike. The selection of polar codes as the channel coding technique for control channels for 5G NR communications system has proven merits. Also, with better performance than LDPC and turbo codes, polar codes supersede the tail-biting convolutional codes used in LTE systems. In this paper polar coding scheme called CRC-Aided Polar (CA-Polar) coding scheme has been investigated using QPSK modulation over an AWGN channel.
Original Research Article
ABSTRACT
A single phase grid connected with a photovoltaic (PV) power system that will provide high voltage gain with state model analysis for the control of the system has been presented. First the photovoltaic system is designed and simulated using MATLAB SIMULINK software. The output voltage of a PV array is comparatively low thus high voltage gain is necessary for grid-connection and synchronization. The PV system has been provided with a boost converter which will boost the low voltage of the PV array to high dc-voltage. A steady state model is obtained and is verified with the help of simulation. A full bridge inverter with bidirectional power flow is used as the second power processing stage, which stabilizes the dc voltage and the output current. Further, a maximum-power-point-tracking method is employed in the PV system to obtain a high performance. The photovoltaic (PV) energy effect can be considered an essential sustainable resource because of solar radiant energy abundance and the sustainability thus grid connected photovoltaic system is widely used, although solar energy is available abundantly and free of cost, the cost of the photovoltaic cells is very high. Hence the initial investment on solar energy will be very high. The basic element of a PV system is the solar cell which converts the solar irradiance into direct current. Grid interconnection of PV system requires an efficient converter to convert the low DC voltage into AC. The Gate Diffusion Input requires twin well CMOS or silicon on insulator (SOI) process for fabrication. Depending on the weather and the day time, the amount of electrical energy generated by the solar panels changes which is a problem for the system powered by photovoltaic systems. Grid-connected PV systems can cause problems on the grid, such as injecting more harmonics or reducing the stability. The main objective is to develop a power electronics interface for a three-phase grid connected PV with SIMULINK and Monte Carlo model...
ABSTRACT
Anti-patterns are flaws that adversely impact the quality of the system. The term "Code Smell" refers to a sign that there are anti-patterns in software, which prompts system restructuring. As a result, managing the maintenance becomes challenging. Refactoring is required more when the number of smells increases. Different methods for detecting anti-patterns in the system have been found. The research sought to examine how anti-patterns affect classes and which specific anti-patterns have a greater influence than others. A conclusion has been reached regarding the findings for upcoming research on open-source systems. The introduction is followed by the various anti-patterns in the first of the paper's four sections. Additionally, the associated work has been thoroughly analysed, followed by a succinct conclusion. Thus, the study presents many methods for identifying software system code smells. Therefore, odour detection will be useful in increasing reliability during testing and maintenance phases by foreseeing anti-patterns and errors before to product delivery. Additionally, the community of software engineers and managers will benefit from the identification of anti-patterns by using it to enhance software development maintenance efforts.