Search results for: median problem
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7687

Search results for: median problem

4267 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 320
4266 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 114
4265 Optimization of Switched Reluctance Motor for Drive System in Automotive Applications

Authors: A. Peniak, J. Makarovič, P. Rafajdus, P. Dúbravka

Abstract:

The purpose of this work is to optimize a Switched Reluctance Motor (SRM) for an automotive application, specifically for a fully electric car. A new optimization approach is proposed. This unique approach transforms automotive customer requirements into an optimization problem, based on sound knowledge of a SRM theory. The approach combines an analytical and a finite element analysis of the motor to quantify static nonlinear and dynamic performance parameters, as phase currents and motor torque maps, an output power and power losses in order to find the optimal motor as close to the reality as possible, within reasonable time. The new approach yields the optimal motor which is competitive with other types of already proposed motors for automotive applications. This distinctive approach can also be used to optimize other types of electrical motors, when parts specifically related to the SRM are adjusted accordingly.

Keywords: automotive, drive system, electric car, finite element method, hybrid car, optimization, switched reluctance motor

Procedia PDF Downloads 521
4264 Flow Conservation Framework for Monitoring Software Defined Networks

Authors: Jesús Antonio Puente Fernández, Luis Javier Garcia Villalba

Abstract:

New trends on streaming videos such as series or films require a high demand of network resources. This fact results in a huge problem within traditional IP networks due to the rigidity of its architecture. In this way, Software Defined Networks (SDN) is a new concept of network architecture that intends to be more flexible and it simplifies the management in networks with respect to the existing ones. These aspects are possible due to the separation of control plane (controller) and data plane (switches). Taking the advantage of this separated control, it is easy to deploy a monitoring tool independent of device vendors since the existing ones are dependent on the installation of specialized and expensive hardware. In this paper, we propose a framework that optimizes the traffic monitoring in SDN networks that decreases the number of monitoring queries to improve the network traffic and also reduces the overload. The performed experiments (with and without the optimization) using a video streaming delivery between two hosts demonstrate the feasibility of our monitoring proposal.

Keywords: optimization, monitoring, software defined networking, statistics, query

Procedia PDF Downloads 332
4263 Predicting Seoul Bus Ridership Using Artificial Neural Network Algorithm with Smartcard Data

Authors: Hosuk Shin, Young-Hyun Seo, Eunhak Lee, Seung-Young Kho

Abstract:

Currently, in Seoul, users have the privilege to avoid riding crowded buses with the installation of Bus Information System (BIS). BIS has three levels of on-board bus ridership level information (spacious, normal, and crowded). However, there are flaws in the system due to it being real time which could provide incomplete information to the user. For example, a bus comes to the station, and on the BIS it shows that the bus is crowded, but on the stop that the user is waiting many people get off, which would mean that this station the information should show as normal or spacious. To fix this problem, this study predicts the bus ridership level using smart card data to provide more accurate information about the passenger ridership level on the bus. An Artificial Neural Network (ANN) is an interconnected group of nodes, that was created based on the human brain. Forecasting has been one of the major applications of ANN due to the data-driven self-adaptive methods of the algorithm itself. According to the results, the ANN algorithm was stable and robust with somewhat small error ratio, so the results were rational and reasonable.

Keywords: smartcard data, ANN, bus, ridership

Procedia PDF Downloads 167
4262 Study of Management of Waste Construction Materials in Civil Engineering Projects

Authors: Jalindar R. Patil, Harish P. Gayakwad

Abstract:

The increased economic growth across the globe as well as urbanization in developing countries have led into extensive construction activities that generate large amounts of wastes. Material wastage in construction projects resulted into huge financial setbacks to builders and contractors. In addition to this, it may also cause significant effects over aesthetics, health, and the general environment. However in many cities across the globe where construction wastes material management is still a problem. In this paper, the discussion is all about the method for the management of waste construction materials. The objectives of this seminar are to identify the significant source of construction waste globally, to improve the performance of by extracting the major barriers construction waste management and to determine the cost impact on the construction project. These wastes needs to be managed as well as their impacts needs to be ascertained to pave way for their proper management. The seminar includes the details of construction waste management with the reference to construction project. The application of construction waste management in the civil engineering projects is to describe the reduction in the construction wastes.

Keywords: civil engineering, construction materials, waste management, construction activities

Procedia PDF Downloads 531
4261 Exploring the Possibility of Islamic Banking as a Viable Alternative to the Conventional Banking Model

Authors: Lavan Vickneson

Abstract:

In today’s modern economy, the conventional banking model is the primary banking system used around the world. A significant problem faced by the conventional banking model is the recurring nature of banking crises. History’s record of the various banking crises, ranging from the Great Depression to the 2008 subprime mortgage crisis, is testament to the fact that banking crises continue to strike despite the preventive measures in place, such as bank’s minimum capital requirements and deposit guarantee schemes. If banking crises continue to occur despite these preventive measures, it necessarily follows that there are inherent flaws with the conventional banking model itself. In light of this, a possible alternative banking model to the conventional banking model is Islamic banking. To date, Islamic banking has been a niche market, predominantly serving Muslim investors. This paper seeks to explore the possibility of Islamic banking being more than just a niche market and playing a greater role in banking sectors around the world, by being a viable alternative to the conventional banking model.

Keywords: bank crises, conventional banking model, Islamic banking, niche market

Procedia PDF Downloads 282
4260 Clothes Identification Using Inception ResNet V2 and MobileNet V2

Authors: Subodh Chandra Shakya, Badal Shrestha, Suni Thapa, Ashutosh Chauhan, Saugat Adhikari

Abstract:

To tackle our problem of clothes identification, we used different architectures of Convolutional Neural Networks. Among different architectures, the outcome from Inception ResNet V2 and MobileNet V2 seemed promising. On comparison of the metrices, we observed that the Inception ResNet V2 slightly outperforms MobileNet V2 for this purpose. So this paper of ours proposes the cloth identifier using Inception ResNet V2 and also contains the comparison between the outcome of ResNet V2 and MobileNet V2. The document here contains the results and findings of the research that we performed on the DeepFashion Dataset. To improve the dataset, we used different image preprocessing techniques like image shearing, image rotation, and denoising. The whole experiment was conducted with the intention of testing the efficiency of convolutional neural networks on cloth identification so that we could develop a reliable system that is good enough in identifying the clothes worn by the users. The whole system can be integrated with some kind of recommendation system.

Keywords: inception ResNet, convolutional neural net, deep learning, confusion matrix, data augmentation, data preprocessing

Procedia PDF Downloads 187
4259 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers

Authors: Shireen Simon

Abstract:

Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.

Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers

Procedia PDF Downloads 287
4258 Landslide Hazard a Gigantic Problem in Indian Himalayan Region: Needs In-Depth Research to Minimize Disaster

Authors: Varun Joshi, M. S. Rawat

Abstract:

The Indian Himalayan Region (IHR) is inherently fragile and susceptible to landslide hazard due to its extremely weak geology, highly rugged topography and heavy monsoonal rainfall. One of the most common hazards in the IHR is landslide, and this event is particularly frequent in Himalayan states of India i.e. Jammu & Kashmir, Himachal Pradesh, Uttarakhand, Sikkim, Manipur and Arunachal Pradesh. Landslides are mostly triggered by extreme rainfall events but the incidence increases during monsoon months (June to September). Natural slopes which are otherwise stable but they get destabilized due to anthropogenic activities like construction of various developmental activities and deforestation. These activities are required to fulfill the developmental needs and upliftment of societal status in the region. Landslides also trigger during major earthquakes and reported most observable and damaging phenomena. Studies indicate that the landslide phenomenon has increased many folds due to developmental activities in Himalayan region. Gradually increasing and devastating consequences of landslides turned into one of the most important hydro-geological hazards in Himalayan states especially in Uttarakhand and Sikkim states of India. The recent most catastrophic rainfall in June 2013 in Uttarakhand lead to colossal loss of life and property. The societal damage due to this incident is still to be recovered even after three years. Sikkim earthquake of September 2011 is witnessed for triggering of large number of coseismic landslides. The rescue and relief team faced huge problem in helping the trapped villagers in remote locations of the state due to road side blockade by landslides. The recent past incidences of landslides in Uttarakhand, as well as Sikkim states, created a new domain of research in terms of understanding the phenomena of landslide and management of disaster in such situation. Every year at many locations landslides trigger which force dwellers to either evacuate their dwelling or lose their life and property. The communication and transportation networks are also severely affected by landslides at several locations. Many times the drinking water supply disturbed and shortage of daily need household items reported during monsoon months. To minimize the severity of landslide in IHR requires in-depth research and developmental planning. For most of the areas in the present study, landslide hazard zonation is done on 1:50,000 scale. The land use planning maps on extensive basis are not available. Therefore, there is a need of large-scale landslide hazard zonation and land use planning maps. If the scientist conduct research on desired aspects and their outcome of research is utilized by the government in developmental planning then the incidents of landslide could be minimized, subsequent impact on society, life and property would be reduced. Along with the scientific research, there is another need of awareness generation in the region for stake holders and local dwellers to combat with the landslide hazard, if triggered in their location.

Keywords: coseismic, Indian Himalayan Region, landslide hazard zonation, Sikkim, societal, Uttarakhand

Procedia PDF Downloads 251
4257 Nonlinear Analysis with Failure Using the Boundary Element Method

Authors: Ernesto Pineda Leon, Dante Tolentino Lopez, Janis Zapata Lopez

Abstract:

The current paper shows the application of the boundary element method for the analysis of plates under shear stress causing plasticity. In this case, the shear deformation of a plate is considered by means of the Reissner’s theory. The probability of failure of a Reissner’s plate due to a proposed index plastic behavior is calculated taken into account the uncertainty in mechanical and geometrical properties. The problem is developed in two dimensions. The classic plasticity’s theory is applied and a formulation for initial stresses that lead to the boundary integral equations due to plasticity is also used. For the plasticity calculation, the Von Misses criteria is used. To solve the non-linear equations an incremental method is employed. The results show a relatively small failure probability for the ranges of loads between 0.6 and 1.0. However, for values between 1.0 and 2.5, the probability of failure increases significantly. Consequently, for load bigger than 2.5 the plate failure is a safe event. The results are compared to those that were found in the literature and the agreement is good.

Keywords: boundary element method, failure, plasticity, probability

Procedia PDF Downloads 311
4256 A Brief Review of Urban Green Vegetation (Green Wall) in Reduction of Air Pollution

Authors: Masoumeh Pirhadi

Abstract:

Air pollution is becoming a major health problem affecting millions. In support of this observation, the world health organization estimates that many people feel unhealthy due to pollution. This is a coupled fact that one of the main global sources of air pollution in cities is greenhouse gas emissions due heavy traffic. Green walls are developed as a sustainable strategy to reduce pollution by increasing vegetation in developed areas without occupying space in the city. This concept an offer advantageous environmental benefits and they can also be proposed for aesthetic purposes, and today they are used to preserve the urban environment. Green walls can also create environments that can promote a healthy lifestyle. Findings of multiple studies also indicate that Green infrastructure in cities is a strategy for improving air quality and increasing the sustainability of cities. Since these green solutions (green walls) act as porous materials that affect the diffusion of air pollution they can also act as a removing air vents that clean the air. Therefore, implementation of this strategy can be considered as a prominent factor in achieving a cleaner environment.

Keywords: green vegetation, air pollution, green wall, urban area

Procedia PDF Downloads 155
4255 Addressing the Exorbitant Cost of Labeling Medical Images with Active Learning

Authors: Saba Rahimi, Ozan Oktay, Javier Alvarez-Valle, Sujeeth Bharadwaj

Abstract:

Successful application of deep learning in medical image analysis necessitates unprecedented amounts of labeled training data. Unlike conventional 2D applications, radiological images can be three-dimensional (e.g., CT, MRI), consisting of many instances within each image. The problem is exacerbated when expert annotations are required for effective pixel-wise labeling, which incurs exorbitant labeling effort and cost. Active learning is an established research domain that aims to reduce labeling workload by prioritizing a subset of informative unlabeled examples to annotate. Our contribution is a cost-effective approach for U-Net 3D models that uses Monte Carlo sampling to analyze pixel-wise uncertainty. Experiments on the AAPM 2017 lung CT segmentation challenge dataset show that our proposed framework can achieve promising segmentation results by using only 42% of the training data.

Keywords: image segmentation, active learning, convolutional neural network, 3D U-Net

Procedia PDF Downloads 156
4254 Data Quality Enhancement with String Length Distribution

Authors: Qi Xiu, Hiromu Hota, Yohsuke Ishii, Takuya Oda

Abstract:

Recently, collectable manufacturing data are rapidly increasing. On the other hand, mega recall is getting serious as a social problem. Under such circumstances, there are increasing needs for preventing mega recalls by defect analysis such as root cause analysis and abnormal detection utilizing manufacturing data. However, the time to classify strings in manufacturing data by traditional method is too long to meet requirement of quick defect analysis. Therefore, we present String Length Distribution Classification method (SLDC) to correctly classify strings in a short time. This method learns character features, especially string length distribution from Product ID, Machine ID in BOM and asset list. By applying the proposal to strings in actual manufacturing data, we verified that the classification time of strings can be reduced by 80%. As a result, it can be estimated that the requirement of quick defect analysis can be fulfilled.

Keywords: string classification, data quality, feature selection, probability distribution, string length

Procedia PDF Downloads 318
4253 Design and Sensitivity Analysis of Photovoltaic/Thermal Solar Collector

Authors: H. M. Farghally, N. M. Ahmed, H. T. El-Madany, D. M. Atia, F. H. Fahmy

Abstract:

Energy is required in almost every aspect of human activities and development of any nation in this world. Increasing fossil fuel price, energy security and climate change have important bearings on sustainable development of any nation. The renewable energy technology is considered one of the drastic approaches taken over the world to reduce the energy problem. The preservation of vegetables by freezing is one of the most important methods of retaining quality in agricultural products over long-term storage periods. Freezing factories show high demand of energy for both heat and electricity; the hybrid Photovoltaic/Thermal (PV/T) systems could be used in order to meet this requirement. This paper presents PV/T system design for freezing factory. Also, the complete mathematical modeling and Matlab Simulink of PV/T collector is introduced. The sensitivity analysis for the manufacturing parameters of PV/T collector is carried out to study their effect on the thermal and electrical efficiency.

Keywords: renewable energy, hybrid PV/T system, sensitivity analysis, ecological sciences

Procedia PDF Downloads 292
4252 Detection of Pharmaceutical Personal Protective Equipment in Video Stream

Authors: Michael Leontiev, Danil Zhilikov, Dmitry Lobanov, Lenar Klimov, Vyacheslav Chertan, Daniel Bobrov, Vladislav Maslov, Vasilii Vologdin, Ksenia Balabaeva

Abstract:

Pharmaceutical manufacturing is a complex process, where each stage requires a high level of safety and sterility. Personal Protective Equipment (PPE) is used for this purpose. Despite all the measures of control, the human factor (improper PPE wearing) causes numerous losses to human health and material property. This research proposes a solid computer vision system for ensuring safety in pharmaceutical laboratories. For this, we have tested a wide range of state-of-the-art object detection methods. Composing previously obtained results in this sphere with our own approach to this problem, we have reached a high accuracy ([email protected]) ranging from 0.77 up to 0.98 in detecting all the elements of a common set of PPE used in pharmaceutical laboratories. Our system is a step towards safe medicine production.

Keywords: sterility and safety in pharmaceutical development, personal protective equipment, computer vision, object detection, monitoring in pharmaceutical development, PPE

Procedia PDF Downloads 87
4251 Initial Observations of the Utilization of Zoom Software for Synchronous English as a Foreign Language Oral Communication Classes at a Japanese University

Authors: Paul Nadasdy

Abstract:

In 2020, oral communication classes at many universities in Japan switched to online and hybrid lessons because of the coronavirus pandemic. Teachers had to adapt their practices immediately and deal with the challenges of the online environment. Even for experienced teachers, this still presented a problem as many had not conducted online classes before. Simultaneously, for many students, this type of learning was completely alien to them, and they had to adapt to the challenges faced by communicating in English online. This study collected data from 418 first grade students in the first semester of English communication classes at a technical university in Tokyo, Japan. Zoom software was used throughout the learning period. Though there were many challenges in the setting up and implementation of Zoom classes at the university, the results indicated that the students enjoyed the format and made the most of the circumstances. This proved the robustness of the course that was taught in regular lessons and the adaptability of teachers and students to challenges in a very short timeframe.

Keywords: zoom, hybrid lessons, communicative english, online teaching

Procedia PDF Downloads 84
4250 A Review of Methods for Handling Missing Data in the Formof Dropouts in Longitudinal Clinical Trials

Authors: A. Satty, H. Mwambi

Abstract:

Much clinical trials data-based research are characterized by the unavoidable problem of dropout as a result of missing or erroneous values. This paper aims to review some of the various techniques to address the dropout problems in longitudinal clinical trials. The fundamental concepts of the patterns and mechanisms of dropout are discussed. This study presents five general techniques for handling dropout: (1) Deletion methods; (2) Imputation-based methods; (3) Data augmentation methods; (4) Likelihood-based methods; and (5) MNAR-based methods. Under each technique, several methods that are commonly used to deal with dropout are presented, including a review of the existing literature in which we examine the effectiveness of these methods in the analysis of incomplete data. Two application examples are presented to study the potential strengths or weaknesses of some of the methods under certain dropout mechanisms as well as to assess the sensitivity of the modelling assumptions.

Keywords: incomplete longitudinal clinical trials, missing at random (MAR), imputation, weighting methods, sensitivity analysis

Procedia PDF Downloads 415
4249 Durability Enhancement of CaSO4 in Repetitive Operation of Chemical Heat Pump

Authors: Y. Shiren, M. Masuzawa, H. Ohkura, T. Yamagata, Y. Aman, N. Kobayashi

Abstract:

An important problem for the CaSO4/CaSO4・1/2H2O Chemical heat pump (CHP) is that the material is deactivated through repetitive reaction between hydration and dehydration in which the crystal phase of the material is transformed from III-CaSO4 to II-CaSO4. We investigated suppression on the phase change by adding a sulfated compound. The most effective material was MgSO4. MgSO4 doping increased the durability of CaSO4 in the actual CHP repetitive cycle of hydration/dehydration to 3.6 times that of undoped CaSO4. The MgSO4-doped CaSO4 showed a higher phase transition temperature and activation energy for crystal transformation from III-CaSO4 to II-CaSO4. MgSO4 doping decreased the crystal lattice size of CaSO4・1/2H2O and II-CaSO4 to smaller than that of undoped CaSO4. Modification of the crystal structure is considered to be related to the durability change in CaSO4 resulting from MgSO4 doping.

Keywords: CaSO4, chemical heat pump, durability of chemical heat storage material, heat storage

Procedia PDF Downloads 579
4248 Nonparametric Copula Approximations

Authors: Serge Provost, Yishan Zang

Abstract:

Copulas are currently utilized in finance, reliability theory, machine learning, signal processing, geodesy, hydrology and biostatistics, among several other fields of scientific investigation. It follows from Sklar's theorem that the joint distribution function of a multidimensional random vector can be expressed in terms of its associated copula and marginals. Since marginal distributions can easily be determined by making use of a variety of techniques, we address the problem of securing the distribution of the copula. This will be done by using several approaches. For example, we will obtain bivariate least-squares approximations of the empirical copulas, modify the kernel density estimation technique and propose a criterion for selecting appropriate bandwidths, differentiate linearized empirical copulas, secure Bernstein polynomial approximations of suitable degrees, and apply a corollary to Sklar's result. Illustrative examples involving actual observations will be presented. The proposed methodologies will as well be applied to a sample generated from a known copula distribution in order to validate their effectiveness.

Keywords: copulas, Bernstein polynomial approximation, least-squares polynomial approximation, kernel density estimation, density approximation

Procedia PDF Downloads 74
4247 Artificial Intelligence-Based Detection of Individuals Suffering from Vestibular Disorder

Authors: Dua Hişam, Serhat İkizoğlu

Abstract:

Identifying the problem behind balance disorder is one of the most interesting topics in the medical literature. This study has considerably enhanced the development of artificial intelligence (AI) algorithms applying multiple machine learning (ML) models to sensory data on gait collected from humans to classify between normal people and those suffering from Vestibular System (VS) problems. Although AI is widely utilized as a diagnostic tool in medicine, AI models have not been used to perform feature extraction and identify VS disorders through training on raw data. In this study, three machine learning (ML) models, the Random Forest Classifier (RF), Extreme Gradient Boosting (XGB), and K-Nearest Neighbor (KNN), have been trained to detect VS disorder, and the performance comparison of the algorithms has been made using accuracy, recall, precision, and f1-score. With an accuracy of 95.28 %, Random Forest Classifier (RF) was the most accurate model.

Keywords: vestibular disorder, machine learning, random forest classifier, k-nearest neighbor, extreme gradient boosting

Procedia PDF Downloads 69
4246 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

Authors: R. Rama Kishore, Sunesh

Abstract:

Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.

Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy

Procedia PDF Downloads 366
4245 Quantitative Analysis of Multiprocessor Architectures for Radar Signal Processing

Authors: Deepak Kumar, Debasish Deb, Reena Mamgain

Abstract:

Radar signal processing requires high number crunching capability. Most often this is achieved using multiprocessor platform. Though multiprocessor platform provides the capability of meeting the real time computational challenges, the architecture of the same along with mapping of the algorithm on the architecture plays a vital role in efficiently using the platform. Towards this, along with standard performance metrics, few additional metrics are defined which helps in evaluating the multiprocessor platform along with the algorithm mapping. A generic multiprocessor architecture can not suit all the processing requirements. Depending on the system requirement and type of algorithms used, the most suitable architecture for the given problem is decided. In the paper, we study different architectures and quantify the different performance metrics which enables comparison of different architectures for their merit. We also carried out case study of different architectures and their efficiency depending on parallelism exploited on algorithm or data or both.

Keywords: radar signal processing, multiprocessor architecture, efficiency, load imbalance, buffer requirement, pipeline, parallel, hybrid, cluster of processors (COPs)

Procedia PDF Downloads 412
4244 An Axiomatic Approach to Constructing an Applied Theory of Possibility

Authors: Oleksii Bychkov

Abstract:

The fundamental difference between randomness and vagueness is that the former requires statistical research. These issues were studied by Zadeh L, Dubois D., Prad A. The theory of possibility works with expert assessments, hypotheses, etc. gives an idea of the characteristics of the problem situation, the nature of the goals and real limitations. Possibility theory examines experiments that are not repeated. The article discusses issues related to the formalization of a fuzzy, uncertain idea of reality. The author proposes to expand the classical model of the theory of possibilities by introducing a measure of necessity. The proposed model of the theory of possibilities allows us to extend the measures of possibility and necessity onto a Boolean while preserving the properties of the measure. Thus, upper and lower estimates are obtained to describe the fact that the event will occur. Knowledge of the patterns that govern mass random, uncertain, fuzzy events allows us to predict how these events will proceed. The article proposed for publication quite fully reveals the essence of the construction and use of the theory of probability and the theory of possibility.

Keywords: possibility, artificial, modeling, axiomatics, intellectual approach

Procedia PDF Downloads 33
4243 The Effect of Chisel Edge on Drilling-Induced Delamination

Authors: Parnian Kianfar, Navid Zarif Karimi, Giangiacomo Minak

Abstract:

Drilling is one of the most important machining operations as numerous holes must be drilled in order to install mechanical fasteners for assembly in composite structures. Delamination is a major problem associated with the drilling of fiber reinforced composite materials, which degrades the mechanical properties of these materials. In drilling, delamination is initiated when the drilling force exceeds a threshold value, particularly at the critical entry and exit locations of the drill bit. The chisel edge of twist drill is a major contributor to the thrust force which is the primary cause of delamination. The main objective of this paper is to study the effect of chisel edge and pilot hole on thrust force and delamination during drilling of glass fiber reinforced composites. For this purpose, two sets of experiments, with and without pilot hole, were conducted with different drilling conditions. The results show a great reduction in the thrust force when a pilot hole is present which removes the chisel edge contribution.

Keywords: composites, chisel edge, drilling, delamination

Procedia PDF Downloads 438
4242 Numerical Simulation of Magnetohydrodynamic (MHD) Blood Flow in a Stenosed Artery

Authors: Sreeparna Majee, G. C. Shit

Abstract:

Unsteady blood flow has been numerically investigated through stenosed arteries to achieve an idea about the physiological blood flow pattern in diseased arteries. The blood is treated as Newtonian fluid and the arterial wall is considered to be rigid having deposition of plaque in its lumen. For direct numerical simulation, vorticity-stream function formulation has been adopted to solve the problem using implicit finite difference method by developing well known Peaceman-Rachford Alternating Direction Implicit (ADI) scheme. The effects of magnetic parameter and Reynolds number on velocity and wall shear stress are being studied and presented quantitatively over the entire arterial segment. The streamlines have been plotted to understand the flow pattern in the stenosed artery, which has significant alterations in the downstream of the stenosis in the presence of magnetic field. The results show that there are nominal changes in the flow pattern when magnetic field strength is enhanced upto 8T which can have remarkable usage to MRI machines.

Keywords: magnetohydrodynamics, blood flow, stenosis, energy dissipation

Procedia PDF Downloads 276
4241 Traffic Congestion Problem and Possible Solution in Kabul City

Authors: Sayed Abdul Rahman Sadaat, Nsenda Lukumwena

Abstract:

Traffic congestion is a worldwide issue, especially in developing countries. This is also the case of Afghanistan, especially in Kabul-the capital city, whose rapid population growth makes it the fifth fastest growing city in the world. Traffic congestion affects not only the mobility of people and goods but also the air quality that leads to numerous deaths (3000 people) every year. There are many factors that contribute to traffic congestion. The insufficiency and inefficiency of public transportation system along with the increase of private vehicles can be considered among the most important contributing factors. This paper addresses the traffic congestion and attempts to suggest possible solutions that can help improve the current public transportation system in Kabul. To this end, the methodology used in this paper includes field work conducted in Kabul city and literature review. The outcome suggests that improving the public transportation system is likely to contribute to the reduction of traffic congestion and the improvement of air quality, thereby reducing the number of death related to air quality.

Keywords: air quality, Kabul, Afghanistan, public transportation system, improvements, traffic congestion

Procedia PDF Downloads 381
4240 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey

Authors: Stephanie M. De Oliveira

Abstract:

For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.

Keywords: refugees, Turkey, asylum seekers, United Nations

Procedia PDF Downloads 368
4239 Visual Analytics in K 12 Education: Emerging Dimensions of Complexity

Authors: Linnea Stenliden

Abstract:

The aim of this paper is to understand emerging learning conditions, when a visual analytics is implemented and used in K 12 (education). To date, little attention has been paid to the role visual analytics (digital media and technology that highlight visual data communication in order to support analytical tasks) can play in education, and to the extent to which these tools can process actionable data for young students. This study was conducted in three public K 12 schools, in four social science classes with students aged 10 to 13 years, over a period of two to four weeks at each school. Empirical data were generated using video observations and analyzed with help of metaphors by Latour. The learning conditions are found to be distinguished by broad complexity characterized by four dimensions. These emerge from the actors’ deeply intertwined relations in the activities. The paper argues in relation to the found dimensions that novel approaches to teaching and learning could benefit students’ knowledge building as they work with visual analytics, analyzing visualized data.

Keywords: analytical reasoning, complexity, data use, problem space, visual analytics, visual storytelling, translation

Procedia PDF Downloads 376
4238 Sliding Velocity in Impact with Friction in Three-Dimensional Multibody Systems

Authors: Hesham A. Elkaranshawy, Amr Abdelrazek, Hosam Ezzat

Abstract:

This paper analyzes a single point rough collision in three dimensional rigid-multibody systems. A set of nonlinear different equations describing the progress and outcome of the impact are obtained. Specifically in case of the tangential, referred to as sliding, component of impact velocity is of great importance. Numerical methods are used to solve this problem. In this work, all these possible sliding behaviors during impact are identified, conditions leading to each behavior are specified, and an appropriate numerical procedure is suggested. A case of a four-degrees-of-freedom spatial robot that collides with its environment is investigated. The phase portrait of the tangential velocity, which presents the flow trajectories for different initial conditions, is calculated. Using the coefficient of friction as a control parameter, few phase portraits are drawn, each for a specific value of this coefficient. In addition, the bifurcation associated with the variation of this coefficient will be investigated.

Keywords: friction impact, three-dimensional rigid multibody systems, sliding velocity, nonlinear ordinary differential equations, phase portrait

Procedia PDF Downloads 381