Search results for: handwritten signature verification
530 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 276529 BAN Logic Proof of E-passport Authentication Protocol
Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana
Abstract:
E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic
Procedia PDF Downloads 437528 Application of Envelope Spectrum Analysis and Spectral Kurtosis to Diagnose Debris Fault in Bearing Using Acoustic Signals
Authors: Henry Ogbemudia Omoregbee, Mabel Usunobun Olanipekun
Abstract:
Debris fault diagnosis based on acoustic signals in rolling element bearing running at low speed and high radial loads are more of low amplitudes, particularly in the case of debris faults whose signals necessitate high sensitivity analyses. As the rollers in the bearing roll over debris trapped in grease used to lubricate the bearings, the envelope signal created by amplitude demodulation carries additional diagnostic information that is not available through ordinary spectrum analysis of the raw signal. The kurtosis value obtained for three different scenarios (debris induced, outer crack induced, and a normal good bearing) couldn't be used to easily identify whether the used bearings were defective or not. It was established in this work that the envelope spectrum analysis detected the fault signature and its harmonics induced in the debris bearings when bandpass filtering of the raw signal with the frequency band specified by kurtogram and spectral kurtosis was made.Keywords: rolling bearings, rolling element bearing noise, bandpass filtering, harmonics, envelope spectrum analysis, spectral kurtosis
Procedia PDF Downloads 88527 The Analysis of TRACE/PARCS in the Simulation of Ultimate Response Guideline for Lungmen ABWR
Authors: J. R. Wang, W. Y. Li, H. T. Lin, B. H. Lee, C. Shih, S. W. Chen
Abstract:
In this research, the TRACE/PARCS model of Lungmen ABWR has been developed for verification of ultimate response guideline (URG) efficiency. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. The simulation initial condition is 100% rated power/100% rated core flow. This research focuses on the estimation of the time when the fuel might be damaged with no water injection by using TRACE/PARCS first. Then, the effect of the reactor core isolation system (RCIC), control depressurization and ac-independent water addition system (ACIWA), which can provide the injection with 950 gpm are also estimated for the station blackout (SBO) transient.Keywords: ABWR, TRACE, safety analysis, PARCS
Procedia PDF Downloads 455526 Predictive Maintenance of Electrical Induction Motors Using Machine Learning
Authors: Muhammad Bilal, Adil Ahmed
Abstract:
This study proposes an approach for electrical induction motor predictive maintenance utilizing machine learning algorithms. On the basis of a study of temperature data obtained from sensors put on the motor, the goal is to predict motor failures. The proposed models are trained to identify whether a motor is defective or not by utilizing machine learning algorithms like Support Vector Machines (SVM) and K-Nearest Neighbors (KNN). According to a thorough study of the literature, earlier research has used motor current signature analysis (MCSA) and vibration data to forecast motor failures. The temperature signal methodology, which has clear advantages over the conventional MCSA and vibration analysis methods in terms of cost-effectiveness, is the main subject of this research. The acquired results emphasize the applicability and effectiveness of the temperature-based predictive maintenance strategy by demonstrating the successful categorization of defective motors using the suggested machine learning models.Keywords: predictive maintenance, electrical induction motors, machine learning, temperature signal methodology, motor failures
Procedia PDF Downloads 119525 Computer Aided Assembly Attributes Retrieval Methods for Automated Assembly Sequence Generation
Authors: M. V. A. Raju Bahubalendruni, Bibhuti Bhusan Biswal, B. B. V. L. Deepak
Abstract:
Achieving an appropriate assembly sequence needs deep verification for its physical feasibility. For this purpose, industrial engineers use several assembly predicates; namely, liaison, geometric feasibility, stability and mechanical feasibility. However, testing an assembly sequence for these predicates requires huge assembly information. Extracting such assembly information from an assembled product is a time consuming and highly skillful task with complex reasoning methods. In this paper, computer aided methods are proposed to extract all the necessary assembly information from computer aided design (CAD) environment in order to perform the assembly sequence planning efficiently. These methods use preliminary capabilities of three-dimensional solid modelling and assembly modelling methods used in CAD software considering equilibrium laws of physical bodies.Keywords: assembly automation, assembly attributes, assembly, CAD
Procedia PDF Downloads 305524 The Concept and Practice of Good Governance in the European Union
Authors: Robert Grzeszczak
Abstract:
The article deals with one of the most significant issues concerning the functioning of the public sector in the European Union. The objectives of good governance were formulated by the EU itself and also the Scholars in reaction to the discussion that started a decade ago and concerned the role of the government in 21st century, the future of integration processes and globalization challenges in Europe. Currently, the concept of good governance is mainly associated with the improvement of management of public policies in the European Union, concerning both domestic and EU policies. However, it goes beyond the issues of state capacity and effectiveness of management. Good governance relates also to societal participation in the public administration and verification of decisions made in public authorities’ (including public administration). Indirectly, the concept and practice of good governance are connected to societal legitimisation of public bodies in the European Union.Keywords: good governance, government, European law, European Union
Procedia PDF Downloads 562523 Latency-Based Motion Detection in Spiking Neural Networks
Authors: Mohammad Saleh Vahdatpour, Yanqing Zhang
Abstract:
Understanding the neural mechanisms underlying motion detection in the human visual system has long been a fascinating challenge in neuroscience and artificial intelligence. This paper presents a spiking neural network model inspired by the processing of motion information in the primate visual system, particularly focusing on the Middle Temporal (MT) area. In our study, we propose a multi-layer spiking neural network model to perform motion detection tasks, leveraging the idea that synaptic delays in neuronal communication are pivotal in motion perception. Synaptic delay, determined by factors like axon length and myelin insulation, affects the temporal order of input spikes, thereby encoding motion direction and speed. Overall, our spiking neural network model demonstrates the feasibility of capturing motion detection principles observed in the primate visual system. The combination of synaptic delays, learning mechanisms, and shared weights and delays in SMD provides a promising framework for motion perception in artificial systems, with potential applications in computer vision and robotics.Keywords: neural network, motion detection, signature detection, convolutional neural network
Procedia PDF Downloads 89522 Reflectance Imaging Spectroscopy Data (Hyperspectral) for Mineral Mapping in the Orientale Basin Region on the Moon Surface
Authors: V. Sivakumar, R. Neelakantan
Abstract:
Mineral mapping on the Moon surface provides the clue to understand the origin, evolution, stratigraphy and geological history of the Moon. Recently, reflectance imaging spectroscopy plays a significant role in identifying minerals on the planetary surface in the Visible to NIR region of the electromagnetic spectrum. The Moon Mineralogy Mapper (M3) onboard Chandrayaan-1 provides unprecedented spectral data of lunar surface to study about the Moon surface. Here we used the M3 sensor data (hyperspectral imaging spectroscopy) for analysing mineralogy of Orientale basin region on the Moon surface. Reflectance spectrums were sampled from different locations of the basin and continuum was removed using ENvironment for Visualizing Images (ENVI) software. Reflectance spectra of unknown mineral composition were compared with known Reflectance Experiment Laboratory (RELAB) spectra for discriminating mineralogy. Minerals like olivine, Low-Ca Pyroxene (LCP), High-Ca Pyroxene (HCP) and plagioclase were identified. In addition to these minerals, an unusual type of spectral signature was identified, which indicates the probable Fe-Mg-spinel lithology in the basin region.Keywords: chandryaan-1, moon mineralogy mapper, mineral, mare orientale, moon
Procedia PDF Downloads 396521 Classification of Random Doppler-Radar Targets during the Surveillance Operations
Authors: G. C. Tikkiwal, Mukesh Upadhyay
Abstract:
During the surveillance operations at war or peace time, the Radar operator gets a scatter of targets over the screen. This may be a tracked vehicle like tank vis-à-vis T72, BMP etc, or it may be a wheeled vehicle like ALS, TATRA, 2.5Tonne, Shaktiman or moving the army, moving convoys etc. The radar operator selects one of the promising targets into single target tracking (STT) mode. Once the target is locked, the operator gets a typical audible signal into his headphones. With reference to the gained experience and training over the time, the operator then identifies the random target. But this process is cumbersome and is solely dependent on the skills of the operator, thus may lead to misclassification of the object. In this paper, we present a technique using mathematical and statistical methods like fast fourier transformation (FFT) and principal component analysis (PCA) to identify the random objects. The process of classification is based on transforming the audible signature of target into music octave-notes. The whole methodology is then automated by developing suitable software. This automation increases the efficiency of identification of the random target by reducing the chances of misclassification. This whole study is based on live data.Keywords: radar target, FFT, principal component analysis, eigenvector, octave-notes, DSP
Procedia PDF Downloads 394520 The Use of Remote Sensing in the Study of Vegetation Jebel Boutaleb, Setif, Algeria
Authors: Khaled Missaoui, Amina Beldjazia, Rachid Gharzouli, Yamna Djellouli
Abstract:
Optical remote sensing makes use of visible, near infrared and short-wave infrared sensors to form images of the earth's surface by detecting the solar radiation reflected from targets on the ground. Different materials reflect and absorb differently at different wavelengths. Thus, the targets can be differentiated by their spectral reflectance signatures in the remotely sensed images. In this work, we are interested to study the distribution of vegetation in the massif forest of Boutaleb (North East of Algeria) which suffered between 1998 and 1999 very large fires. In this case, we use remote sensing with Landsat images from two dates (1984 and 2000) to see the results of these fires. Vegetation has a unique spectral signature which enables it to be distinguished readily from other types of land cover in an optical/near-infrared image. Normalized Difference Vegetation Index (NDVI) is calculated with ENVI 4.7 from Band 3 and 4. The results showed a very important floristic diversity in this forest. The comparison of NDVI from the two dates confirms that there is a decrease of the density of vegetation in this area due to repeated fires.Keywords: remote sensing, boutaleb, diversity, forest
Procedia PDF Downloads 560519 A Light in the Road of Protection of Civilians: Responsibility to Protect
Authors: Zeynep Selin Acar
Abstract:
In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto
Procedia PDF Downloads 262518 Optimal Design of Substation Grounding Grid Based on Genetic Algorithm Technique
Authors: Ahmed Z. Gabr, Ahmed A. Helal, Hussein E. Said
Abstract:
With the incessant increase of power systems capacity and voltage grade, the safety of grounding grid becomes more and more prominent. In this paper, the designing substation grounding grid is presented by means of genetic algorithm (GA). This approach purposes to control the grounding cost of the power system with the aid of controlling grounding rod number and conductor lengths under the same safety limitations. The proposed technique is used for the design of the substation grounding grid in Khalda Petroleum Company “El-Qasr” power plant and the design was simulated by using CYMGRD software for results verification. The result of the design is highly complying with IEEE 80-2000 standard requirements.Keywords: genetic algorithm, optimum grounding grid design, power system analysis, power system protection, single layer model, substation
Procedia PDF Downloads 537517 Zero Net Energy Communities and the Impacts to the Grid
Authors: Heidi von Korff
Abstract:
The electricity grid is changing in terms of flexibility. Distributed generation (DG) policy is being discussed worldwide and implemented. Developers and utilities are seeking a pathway towards Zero Net Energy (ZNE) communities and the interconnection to the distribution grid. Using the VISDOM platform for establishing a method for managing and monitoring energy consumption loads of ZNE communities as a capacity resource for the grid. Reductions in greenhouse gas emissions and energy security are primary policy drivers for incorporating high-performance energy standards and sustainability practices in residential households, such as a market transformation of ZNE and nearly ZNE (nZNE) communities. This research investigates how load data impacts ZNE, to see if there is a correlation to the daily load variations in a single ZNE home. Case studies will include a ZNE community in California and a nearly ZNE community (All – Electric) in the Netherlands, which both are in measurement and verification (M&V) phases and connected to the grid for simulations of methods.Keywords: zero net energy, distributed generation, renewable energy, zero net energy community
Procedia PDF Downloads 307516 Metamorphic Computer Virus Classification Using Hidden Markov Model
Authors: Babak Bashari Rad
Abstract:
A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model
Procedia PDF Downloads 315515 Thermal Fracture Analysis of Fibrous Composites with Variable Fiber Spacing Using Jk-Integral
Authors: Farid Saeidi, Serkan Dag
Abstract:
In this study, fracture analysis of a fibrous composite laminate with variable fiber spacing is carried out using Jk-integral method. The laminate is assumed to be under thermal loading. Jk-integral is formulated by using the constitutive relations of plane orthotropic thermoelasticity. Developed domain independent form of the Jk-integral is then integrated into the general purpose finite element analysis software ANSYS. Numerical results are generated so as to assess the influence of variable fiber spacing on mode I and II stress intensity factors, energy release rate, and T-stress. For verification, some of the results are compared to those obtained using displacement correlation technique (DCT).Keywords: Jk-integral, Variable Fiber Spacing, Thermoelasticity, T-stress, Finite Element Method, Fibrous Composite.
Procedia PDF Downloads 388514 Investigation of Lead and Zinc Oxide Deposits Using Geological and Geophysical Techniques at Oshiri Province in Onicha Local Government Area of Ebonyi State Located Within Southeastern Part of Nigeria, West Africa
Authors: Amaechi O. Azi, Uche D. Aluge, Lim H. San, Godwin A. Agbo
Abstract:
This paper is centered on the investigation of mineral deposits in selected locations in Oshiri province in Ebonyi State. Mineral deposits contribute immensely to the economic growth of a society. In researching lead and zinc oxide-bearing sites at Oshiri, geological and geophysical research technique was employed. Petrozenith, Earth Resistivity Meter, and Schlumberger setup were selected to examine the electrical characteristics of the subsurface. To determine the apparent resistivity of the subsurface, five soundings were taken, and the field data were processed using WinResist software. The mudstone, lead-shale, shale-granite, and lateritic topsoil were the four geoelectric strata that were found. The third layer, which corresponds to the shale-lead lithology, has a resistivity value between 211.9 m to 807.7 m at a depth of 25 m. Due to its resistivity levels and geological trend, this layer makes an excellent signature for lead-zinc occurrence. This zone is expected to house deposits of lead and zinc oxide in commercial quantity.Keywords: Schlumberger, current, resistivity, lithology
Procedia PDF Downloads 78513 Seamless MATLAB® to Register-Transfer Level Design Methodology Using High-Level Synthesis
Authors: Petri Solanti, Russell Klein
Abstract:
Many designers are asking for an automated path from an abstract mathematical MATLAB model to a high-quality Register-Transfer Level (RTL) hardware description. Manual transformations of MATLAB or intermediate code are needed, when the design abstraction is changed. Design conversion is problematic as it is multidimensional and it requires many different design steps to translate the mathematical representation of the desired functionality to an efficient hardware description with the same behavior and configurability. Yet, a manual model conversion is not an insurmountable task. Using currently available design tools and an appropriate design methodology, converting a MATLAB model to efficient hardware is a reasonable effort. This paper describes a simple and flexible design methodology that was developed together with several design teams.Keywords: design methodology, high-level synthesis, MATLAB, verification
Procedia PDF Downloads 140512 A Photovoltaic Micro-Storage System for Residential Applications
Authors: Alia Al Nuaimi, Ayesha Al Aberi, Faiza Al Marzouqi, Shaikha Salem Ali Al Yahyaee, Ala Hussein
Abstract:
In this paper, a PV micro-storage system for residential applications is proposed. The term micro refers to the size of the PV storage system, which is in the range of few kilo-watts, compared to the grid size (~GWs). Usually, in a typical load profile of a residential unit, two peak demand periods exist: one at morning and the other at evening time. The morning peak can be partly covered by the PV energy directly, while the evening peak cannot be covered by the PV alone. Therefore, an energy storage system that stores solar energy during daytime and use this stored energy when the sun is absent is a must. A complete design procedure including theoretical analysis followed by simulation verification and economic feasibility evaluation is addressed in this paper.Keywords: battery, energy storage, photovoltaic, peak shaving, smart grid
Procedia PDF Downloads 321511 Trace Element Compositions of Placer Gold Samples: Implication for Gold Exploration in Northern Cameroon
Authors: Yanick Blaise Ketchaya, Taofa Zhou
Abstract:
The type of primary source of gold deposit can be explored by using the study of trace element analysis of placer gold which is a valuable exploration tool. Au-bearing deposits are investigated through the placer gold, which is an important indicator mineral. The hydrothermal fluid interacting with diverse geological settings exerts an important function on the chemical composition of gold. Consequently, alluvial gold particles from the placer deposits within the Gamba district in northern Cameroon were examined by an electron probe microanalyzer (EPMA) to show discriminant chemical signatures. The gold grains from a different locality show the same trace element composition, which appears to be in a solid solution in Au. These trace element compositions, contained in gold grains, indicate a homogeneous source. The placer gold particles have significant chemical characteristics (low Ag content), consistent with a mesothermal source. The gold particle signatures in the Gamba district, with high Te and Bi contents, reflect the chemical characteristics of the felsic host rock superimposed on the chemical signature of the hydrothermal fluid.Keywords: hypogene source, Northern Cameroon, placer gold, trace element
Procedia PDF Downloads 109510 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks
Authors: Ahmed Abdullah Ahmed
Abstract:
The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments
Procedia PDF Downloads 513509 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery
Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman
Abstract:
Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.Keywords: CGA, IPv6, NDP, SEND
Procedia PDF Downloads 385508 Failure Criterion for Mixed Mode Fracture of Cracked Wood Specimens
Authors: Mahdi Fakoor, Seyed Mohammad Navid Ghoreishi
Abstract:
Investigation of fracture of wood components can prevent from catastrophic failures. Created fracture process zone (FPZ) in crack tip vicinity has important effect on failure of cracked composite materials. In this paper, a failure criterion for fracture investigation of cracked wood specimens under mixed mode I/II loading is presented. This criterion is based on maximum strain energy release rate and material nonlinearity in the vicinity of crack tip due to presence of microcracks. Verification of results with available experimental data proves the coincidence of the proposed criterion with the nature of fracture of wood. To simplify the estimation of nonlinear properties of FPZ, a damage factor is also introduced for engineering and application purposes.Keywords: fracture criterion, mixed mode loading, damage zone, micro cracks
Procedia PDF Downloads 299507 Mathematical Model of Cancer Growth under the Influence of Radiation Therapy
Authors: Beata Jackowska-Zduniak
Abstract:
We formulate and analyze a mathematical model describing dynamics of cancer growth under the influence of radiation therapy. The effect of this type of therapy is considered as an additional equation of discussed model. Numerical simulations show that delay, which is added to ordinary differential equations and represent time needed for transformation from one type of cells to the other one, affects the behavior of the system. The validation and verification of proposed model is based on medical data. Analytical results are illustrated by numerical examples of the model dynamics. The model is able to reconstruct dynamics of treatment of cancer and may be used to determine the most effective treatment regimen based on the study of the behavior of individual treatment protocols.Keywords: mathematical modeling, numerical simulation, ordinary differential equations, radiation therapy
Procedia PDF Downloads 409506 Application of Principle Component Analysis for Classification of Random Doppler-Radar Targets during the Surveillance Operations
Authors: G. C. Tikkiwal, Mukesh Upadhyay
Abstract:
During the surveillance operations at war or peace time, the Radar operator gets a scatter of targets over the screen. This may be a tracked vehicle like tank vis-à-vis T72, BMP etc, or it may be a wheeled vehicle like ALS, TATRA, 2.5Tonne, Shaktiman or moving army, moving convoys etc. The Radar operator selects one of the promising targets into Single Target Tracking (STT) mode. Once the target is locked, the operator gets a typical audible signal into his headphones. With reference to the gained experience and training over the time, the operator then identifies the random target. But this process is cumbersome and is solely dependent on the skills of the operator, thus may lead to misclassification of the object. In this paper we present a technique using mathematical and statistical methods like Fast Fourier Transformation (FFT) and Principal Component Analysis (PCA) to identify the random objects. The process of classification is based on transforming the audible signature of target into music octave-notes. The whole methodology is then automated by developing suitable software. This automation increases the efficiency of identification of the random target by reducing the chances of misclassification. This whole study is based on live data.Keywords: radar target, fft, principal component analysis, eigenvector, octave-notes, dsp
Procedia PDF Downloads 346505 A Game-Theory-Based Price-Optimization Algorithm for the Simulation of Markets Using Agent-Based Modelling
Authors: Juan Manuel Sanchez-Cartas, Gonzalo Leon
Abstract:
A price competition algorithm for ABMs based on game theory principles is proposed to deal with the simulation of theoretical market models. The algorithm is applied to the classical Hotelling’s model and to a two-sided market model to show it leads to the optimal behavior predicted by theoretical models. However, when theoretical models fail to predict the equilibrium, the algorithm is capable of reaching a feasible outcome. Results highlight that the algorithm can be implemented in other simulation models to guarantee rational users and endogenous optimal behaviors. Also, it can be applied as a tool of verification given that is theoretically based.Keywords: agent-based models, algorithmic game theory, multi-sided markets, price optimization
Procedia PDF Downloads 458504 Vegetative Materia Medica for the Women Illness in mss2999 Kitab Tibb: A Modern Medical Interpretation of a Malay Medical Manuscript
Authors: Wan Aminah Hasbullah
Abstract:
The knowledge of medicine in Malay society stemmed out from the need to remedy disease process. Such knowledge came from observations by looking at the signs on the plants which signify it uses, the doctrine of signature, and also observing what kind of animal and its parts that can be used to treat the disease. Prayers (jampi and doa’) play a very important role in the therapeutic processes addressing the ethereal part of the body. In Malay medicine, prayers were said in the heart of the Malay bomoh (medicine man) when they are first approaching the diseased person, seeking the help of Allah in accurately directing his mind into making the right diagnosis and subsequently the right choice of treatment. In the making of medicine, similar rituals were religiously followed, starting from gathering the materia medica to the final concoction of the medicine. Thus, all the materia medica and the prayers in Malay medicine were gathered and documented in the medical manuscript known as MSS 2999 Kitab Tibb. For this study, a collection of vegetative materia medica which is specialized for the women illness from this manuscript will be gathered and analysed. A medical and cultural interpretation will be highlighted to see the relationship between efficacy in traditional Malay medicine as practiced in the past and the recent practice of the modern medicine.Keywords: vegetative, materia medica, woman illness, Malay medical manuscript
Procedia PDF Downloads 254503 The Impact on the Network Deflectometry
Authors: Djamel–Eddine Yassine Boutiba
Abstract:
In this present memory, we present the various impacts deflectometer leading to the sizing by strengthening of existing roadways. It reminds that the road network in Algeria plays a major role with regard to drainage in major strategic areas and especially in the fringe northern Algeria. Heavy traffic passing through the northern fringe (between 25% and 30% heavy vehicles) causes substantial degradations at both the surface layer and base layer. The work on site by means within the laboratory CTTP such as deflectographe Lacroix, allowed us to record a large number of deflection localized bending on RN19A (Carrefour CW73-Ain- Merane), whose analysis of the results led us to opt for a building throughout the band's project . By the recorder against HWD (Heavy Weight déflectometer) allowed us to learn about the behavior of the pavement on the banks. In addition, the Software Alize III has been essential in the verification of the increase in the thickness dimensioned.Keywords: capacity, deflection, deflectograph lacroix, degradation, hwd
Procedia PDF Downloads 285502 Production of Biodiesel Using Brine Waste as a Heterogeneous Catalyst
Authors: Hilary Rutto, Linda Sibali
Abstract:
In these modern times, we constantly search for new and innovative technologies to lift the burden of our extreme energy demand. The overall purpose of biofuel production research is to source an alternative energy source to replace the normal use of fossil fuel as liquid petroleum products. This experiment looks at the basis of biodiesel production with regards to alternative catalysts that can be used to produce biodiesel. The key factors that will be addressed during the experiments will focus on temperature variation, catalyst additions to the overall reaction, methanol to oil ratio, and the impact of agitation on the reaction. Brine samples sources from nearby plants will be evaluated and tested thoroughly and the key characteristics of these brine samples analysed for the verification of its use as a possible catalyst in biodiesel production. The one factor at a time experimental approach was used in this experiment, and the recycle and reuse characteristics of the heterogeneous catalyst was evaluated.Keywords: brine sludge, heterogenous catalyst, biodiesel, one factor
Procedia PDF Downloads 172501 Numerical Simulation and Experimental Validation of the Tire-Road Separation in Quarter-car Model
Authors: Quy Dang Nguyen, Reza Nakhaie Jazar
Abstract:
The paper investigates vibration dynamics of tire-road separation for a quarter-car model; this separation model is developed to be close to the real situation considering the tire is able to separate from the ground plane. A set of piecewise linear mathematical models is developed and matches the in-contact and no-contact states to be considered as mother models for further investigations. The bound dynamics are numerically simulated in the time response and phase portraits. The separation analysis may determine which values of suspension parameters can delay and avoid the no-contact phenomenon, which results in improving ride comfort and eliminating the potentially dangerous oscillation. Finally, model verification is carried out in the MSC-ADAMS environment.Keywords: quarter-car vibrations, tire-road separation, separation analysis, separation dynamics, ride comfort, ADAMS validation
Procedia PDF Downloads 93