Search results for: modified simplex algorithm
5325 A Highly Efficient Broadcast Algorithm for Computer Networks
Authors: Ganesh Nandakumaran, Mehmet Karaata
Abstract:
A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms
Procedia PDF Downloads 5055324 Analysis of ECGs Survey Data by Applying Clustering Algorithm
Authors: Irum Matloob, Shoab Ahmad Khan, Fahim Arif
Abstract:
As Indo-pak has been the victim of heart diseases since many decades. Many surveys showed that percentage of cardiac patients is increasing in Pakistan day by day, and special attention is needed to pay on this issue. The framework is proposed for performing detailed analysis of ECG survey data which is conducted for measuring the prevalence of heart diseases statistics in Pakistan. The ECG survey data is evaluated or filtered by using automated Minnesota codes and only those ECGs are used for further analysis which is fulfilling the standardized conditions mentioned in the Minnesota codes. Then feature selection is performed by applying proposed algorithm based on discernibility matrix, for selecting relevant features from the database. Clustering is performed for exposing natural clusters from the ECG survey data by applying spectral clustering algorithm using fuzzy c means algorithm. The hidden patterns and interesting relationships which have been exposed after this analysis are useful for further detailed analysis and for many other multiple purposes.Keywords: arrhythmias, centroids, ECG, clustering, discernibility matrix
Procedia PDF Downloads 3525323 Support Vector Machine Based Retinal Therapeutic for Glaucoma Using Machine Learning Algorithm
Authors: P. S. Jagadeesh Kumar, Mingmin Pan, Yang Yung, Tracy Lin Huan
Abstract:
Glaucoma is a group of visual maladies represented by the scheduled optic nerve neuropathy; means to the increasing dwindling in vision ground, resulting in loss of sight. In this paper, a novel support vector machine based retinal therapeutic for glaucoma using machine learning algorithm is conservative. The algorithm has fitting pragmatism; subsequently sustained on correlation clustering mode, it visualizes perfect computations in the multi-dimensional space. Support vector clustering turns out to be comparable to the scale-space advance that investigates the cluster organization by means of a kernel density estimation of the likelihood distribution, where cluster midpoints are idiosyncratic by the neighborhood maxima of the concreteness. The predicted planning has 91% attainment rate on data set deterrent on a consolidation of 500 realistic images of resolute and glaucoma retina; therefore, the computational benefit of depending on the cluster overlapping system pedestal on machine learning algorithm has complete performance in glaucoma therapeutic.Keywords: machine learning algorithm, correlation clustering mode, cluster overlapping system, glaucoma, kernel density estimation, retinal therapeutic
Procedia PDF Downloads 2555322 The Effect of Modified Posterior Shoulder Stretching Exercises on Posterior Shoulder Tightness, Shoulder Pain, and Dysfunction in Patients with Subacromial Impingement
Authors: Ozge Tahran, Sevgi Sevi Yesilyaprak
Abstract:
Objective: The aim of the study was to investigate the effect of the Wilk’s modified two different stretching exercises on posterior shoulder tightness, pain, and dysfunction in patients with subacromial impingement syndrome (SIS). Method: This study was carried out on 67 patients who have more than 15° difference in shoulder internal rotation range of motion between two sides and had been diagnosed as SIS. Before treatment, all patients were randomly assigned into three groups. Standard physiotherapy programme was applied to the Group 3 (n=23), standard physiotherapy program with Wilk’s modified cross-body stretching exercises were applied to Group 1 (n=22), and standard physiotherapy program with Wilk’s modified sleeper stretching exercises were applied to Group 2 (n= 23). All the patients received 20 sessions of physiotherapy during 4 weeks, 5 days in a week by a physiotherapist. The patients continued their exercises at home at the weekends. Pain severity, shoulder rotation range of motion, posterior shoulder tightness, upper extremity functionality with Constant and Murley Score (CMS) and disability level with The Disabilities of the Arm, Shoulder and Hand Score (QuickDASH) were evaluated before and after physiotherapy programme. Results: Before treatment, demographic and anthropometric characteristics were similar in groups and there was no statistical difference (p > 0.05). It was determined that pain severity decreased, shoulder rotation range of motion, posterior shoulder tightness, upper extremity functionality, and disability were improved after physiotherapy in both groups (p < 0.05). Group 1 and 2 had better results in terms of reduction of pain severity during activity, increase in shoulder rotation range of motion, posterior shoulder mobility and upper extremity functionality and improvement in upper extremity disability, compared to Group 3 (p < 0.05). Conclusion: Modified posterior shoulder stretching exercises in addition to standard physiotherapy programme is more effective for reduction of pain during activity, to improve shoulder rotation range of motion, posterior shoulder mobility, and upper extremity functionality in patients with SIS compared to standard physiotherapy programme alone.Keywords: modified posterior shoulder stretching exercises, posterior shoulder tightness, shoulder complex, subacromial impingement syndrome
Procedia PDF Downloads 1795321 Minimizing Total Completion Time in No-Wait Flowshops with Setup Times
Authors: Ali Allahverdi
Abstract:
The m-machine no-wait flowshop scheduling problem is addressed in this paper. The objective is to minimize total completion time subject to the constraint that the makespan value is not greater than a certain value. Setup times are treated as separate from processing times. Several recent algorithms are adapted and proposed for the problem. An extensive computational analysis has been conducted for the evaluation of the proposed algorithms. The computational analysis indicates that the best proposed algorithm performs significantly better than the earlier existing best algorithm.Keywords: scheduling, no-wait flowshop, algorithm, setup times, total completion time, makespan
Procedia PDF Downloads 3415320 Optimization of Biodiesel Production from Palm Oil over Mg-Al Modified K-10 Clay Catalyst
Authors: Muhammad Ayoub, Abrar Inayat, Bhajan Lal, Sintayehu Mekuria Hailegiorgis
Abstract:
Biodiesel which comes from pure renewable resources provide an alternative fuel option for future because of limited fossil fuel resources as well as environmental concerns. The transesterification of vegetable oils for biodiesel production is a promising process to overcome this future crises of energy. The use of heterogeneous catalysts greatly simplifies the technological process by facilitating the separation of the post-reaction mixture. The purpose of the present work was to examine a heterogeneous catalyst, in particular, Mg-Al modified K-10 clay, to produce methyl esters of palm oil. The prepared catalyst was well characterized by different latest techniques. In this study, the transesterification of palm oil with methanol was studied in a heterogeneous system in the presence of Mg-Al modified K-10 clay as solid base catalyst and then optimized these results with the help of Design of Experiments software. The results showed that methanol is the best alcohol for this reaction condition. The best results was achieved for optimization of biodiesel process. The maximum conversion of triglyceride (88%) was noted after 8 h of reaction at 60 ̊C, with a 6:1 molar ratio of methanol to palm oil and 3 wt % of prepared catalyst.Keywords: palm oil, transestrefication, clay, biodiesel, mesoporous clay, K-10
Procedia PDF Downloads 3975319 Impact of Relaxing Incisions on Maxillofacial Growth Following Sommerlad–Furlow Modified Technique in Patients with Isolated Cleft Palate: A Preliminary Comparative Study
Authors: Sadam Elayah, Yang Li, Bing Shi
Abstract:
Background: The impact of relaxing incisions on maxillofacial growth during palatoplasty remains a topic of debate, and further research is needed to understand its effects fully. Thus, the current study is the first long-term study that aimed to assess the maxillofacial growth of patients with isolated cleft palate following the Sommerlad-Furlow modified (S.F) technique and to estimate the impact of relaxing incisions on maxillofacial growth following S.F technique in patients with isolated cleft palate. Methods: A total of 85 participants, 55 patients with non-syndromic isolated soft and hard cleft palate underwent primary palatoplasty with our technique (30 patients received the Sommerlad-Furlow modified technique without relaxing incision (S.F+RI group), and 25 received Sommerlad-Furlow modified technique without relaxing (S.F-RI group) with no significant difference found between them regarding the cleft type, cleft width, and age at repair. While the other 30 were normal participants with skeletal class I pattern (C group). The control group was matched with the study group in number, age, and sex. All the study variables were measured using stable landmarks, including 12 linear and 10 angular variants. Results: The mean ages at collection of cephalograms were 6.03±0.80 in the S.F+RI group, 5.96±0.76 in the S.F-RI group, and 5.91±0.87 in the C group. Regarding cranial base, the results showed no statistically significant differences between the three groups in S-N and S-N-Ba. The S.F+R.I group had a significantly shorter S-Ba than the S.F-R.I & C groups (P= 0.01). However, there was no statistically significant difference between the S.F-R.I & C groups (P=0.80). Regarding the skeletal maxilla, there was no significant difference between the S.F+R.I and S.F-R.I groups in all linear measurements (N-ANS, S- PM & SN-PP ) except Co-A, the S.F+R.I group had significantly shorter Co-A than the S.F-R.I & C groups (P= <0.01). While the angular measurement, S.F+R.I group had significantly less SNA angle than the S.F-R.I & C groups (P= <0.01). Regarding mandibular bone, there were no statistically significant differences in all linear and angular mandibular measurements between the S.F+R.I and S.F-R.I groups. Regarding intermaxillary relation, the S.F+R.I group had significant differences in Co-Gn - Co-A and ANB compared to the S.F-R.I & C groups (P= <0.01). There was no statistically significant difference in PP-MP among the three groups. Conclusion: As a preliminary report, the Sommerlad-Furlow modified technique without relaxing incisions was found to have good maxillary positioning in the face and a satisfactory intermaxillary relationship compared to the Sommerlad-Furlow modified technique with relaxing incisions.Keywords: relaxing incisions, cleft palate, palatoplasty, maxillofacial growth
Procedia PDF Downloads 1125318 A Review on Parametric Optimization of Casting Processes Using Optimization Techniques
Authors: Bhrugesh Radadiya, Jaydeep Shah
Abstract:
In Indian foundry industry, there is a need of defect free casting with minimum production cost in short lead time. Casting defect is a very large issue in foundry shop which increases the rejection rate of casting and wastage of materials. The various parameters influences on casting process such as mold machine related parameters, green sand related parameters, cast metal related parameters, mold related parameters and shake out related parameters. The mold related parameters are most influences on casting defects in sand casting process. This paper review the casting produced by foundry with shrinkage and blow holes as a major defects was analyzed and identified that mold related parameters such as mold temperature, pouring temperature and runner size were not properly set in sand casting process. These parameters were optimized using different optimization techniques such as Taguchi method, Response surface methodology, Genetic algorithm and Teaching-learning based optimization algorithm. Finally, concluded that a Teaching-learning based optimization algorithm give better result than other optimization techniques.Keywords: casting defects, genetic algorithm, parametric optimization, Taguchi method, TLBO algorithm
Procedia PDF Downloads 7295317 Effect Analysis of an Improved Adaptive Speech Noise Reduction Algorithm in Online Communication Scenarios
Authors: Xingxing Peng
Abstract:
With the development of society, there are more and more online communication scenarios such as teleconference and online education. In the process of conference communication, the quality of voice communication is a very important part, and noise may cause the communication effect of participants to be greatly reduced. Therefore, voice noise reduction has an important impact on scenarios such as voice calls. This research focuses on the key technologies of the sound transmission process. The purpose is to maintain the audio quality to the maximum so that the listener can hear clearer and smoother sound. Firstly, to solve the problem that the traditional speech enhancement algorithm is not ideal when dealing with non-stationary noise, an adaptive speech noise reduction algorithm is studied in this paper. Traditional noise estimation methods are mainly used to deal with stationary noise. In this chapter, we study the spectral characteristics of different noise types, especially the characteristics of non-stationary Burst noise, and design a noise estimator module to deal with non-stationary noise. Noise features are extracted from non-speech segments, and the noise estimation module is adjusted in real time according to different noise characteristics. This adaptive algorithm can enhance speech according to different noise characteristics, improve the performance of traditional algorithms to deal with non-stationary noise, so as to achieve better enhancement effect. The experimental results show that the algorithm proposed in this chapter is effective and can better adapt to different types of noise, so as to obtain better speech enhancement effect.Keywords: speech noise reduction, speech enhancement, self-adaptation, Wiener filter algorithm
Procedia PDF Downloads 595316 Wastewater Treatment by Modified Bentonite
Authors: Mecabih Zohra
Abstract:
Water is such an important element of many manufacturing processes which that use a big amount of chemical substances, It is likely to cause it contamination of water returning to rivers by industrial discharged. These contaminants can be a high in suspended solid and chemical oxygen demand. In this study, urban wastewater of sidi bel abbes city (Algeria) was treated by adsorption using modified bentonite from Magnia (Algeria) by conducting batch experiments to investigate its equilibrium characteristics and kinetics. Purified bentonite is characterized by; CEC, XRF, BET, FITR, XRD, SEM and 27Al spectroscopy. The results showed the removal of suspended solids exceeds 98.47% and COD up to 99.52%, and regarding of sorption efficiencies (qm), the maximum COD sorption efficiencies (qm) calculated using the Langmuir model is 156.23, 64.47 and 17.19 mg/g respectively, for a pH range of 4 to 9.Keywords: adsorption, bentonite, COD, wastewater
Procedia PDF Downloads 875315 Wastewater Treatment by Modified Bentonite
Authors: Mecabih Zohra
Abstract:
Water is such an important element of many manufacturing processes which that use a big amount of chemical substances, It is likely to cause it contamination of water returning to rivers by industrial discharged. These contaminants can be a high in suspended solid and chemical oxygen demand. In this study, urban wastewater of sidi bel abbes city (Algeria) was treated by adsorption using modified bentonite from Magnia (Algeria) by conducting batch experiments to investigate its equilibrium characteristics and kinetics. Purified bentonite is characterized by; CEC, XRF, BET, FITR, XRD, SEM and 27Al spectroscopy. The results showed the removal of suspended solids exceeds 98.47% and COD up to 99.52%, and regarding of sorption efficiencies (qm), the maximum COD sorption efficiencies (qm) calculated using the Langmuir model is 156.23, 64.47 and 17.19 mg/g respectively, for a pH range of 4 to 9.Keywords: adsorption, bentonite, COD, wastewater
Procedia PDF Downloads 835314 Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions
Authors: Maher Aburrous, Adel Khelifi, Manar Abu Talib
Abstract:
Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents.Keywords: XML transaction, encryption, Advanced Encryption Standard (AES), XML classification, e-banking security, fuzzy classification, cryptography, intelligent encryption
Procedia PDF Downloads 4125313 Multithreading/Multiprocessing Simulation of The International Space Station Multibody System Using A Divide and Conquer Dynamics Formulation with Flexible Bodies
Authors: Luong A. Nguyen, Elihu Deneke, Thomas L. Harman
Abstract:
This paper describes a multibody dynamics algorithm formulated for parallel implementation on multiprocessor computing platforms using the divide-and-conquer approach. The system of interest is a general topology of rigid and elastic articulated bodies with or without loops. The algorithm is an extension of Featherstone’s divide and conquer approach to include the flexible-body dynamics formulation. The equations of motion, configured for the International Space Station (ISS) with its robotic manipulator arm as a system of articulated flexible bodies, are implemented in separate computer processors. The performance of this divide-and-conquer algorithm implementation in multiple processors is compared with an existing method implemented on a single processor.Keywords: multibody dynamics, multiple processors, multithreading, divide-and-conquer algorithm, computational efficiency, flexible body dynamics
Procedia PDF Downloads 3375312 Modified Montgomery for RSA Cryptosystem
Authors: Rupali Verma, Maitreyee Dutta, Renu Vig
Abstract:
Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence, efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a Modified Montgomery Modular multiplication in which addition of operands is computed by 4:2 compressor. The basic logic operations in addition are partitioned over two iterations such that parallel computations are performed. This reduces the critical path delay of proposed Montgomery design. The proposed design and RSA are implemented on Virtex 2 and Virtex 5 FPGAs. The two factors partitioning and parallelism have improved the frequency and throughput of proposed design.Keywords: RSA, montgomery modular multiplication, 4:2 compressor, FPGA
Procedia PDF Downloads 4145311 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 3685310 Environmental Impact of Cysts of Some Dinoflagellates Species in the Bizerta Lagoon
Authors: M. Bellakhal, M. Bellakhal, L. Aleya
Abstract:
The specific composition and abundance of dinoflagellate resistance cysts in relation to environmental factors were studied from the superficial sediment at 123 stations in the Bizerte lagoon. 48 morphotypes of dinoflagellate cysts were identified, mainly dominated by Brigantidinium simplex, Votadinum spinosum, Alexandrium pacificum, Alexandrium pseudogonyaulax, and Lingulodinum machaerophorum. The density of cysts ranged from 1276 to 20126 cysts g⁻¹ dry sediment. Significant differences in the distribution pattern of the cysts were recorded, which allowed us to distinguish two areas; thus the inner areas of the lagoon have an abundance of cysts greater than the areas with marine influence. Ballast water discharges and shellfish culture may be incriminated as potential sources of introduction of species, particularly potentially toxic ones such as A. pacificum and Polysphaeridium zoharyi, without neglecting the role of currents in cyst distribution. Cyst mapping can be used as an indicator of potential foci of future toxic species blooms in this ecosystem.Keywords: Bizerta Lagoon, cysts, dinoflagellates, mapping
Procedia PDF Downloads 1355309 Roullete Wheel Selection Mechanism for Solving Travelling Salesman Problem in Ant Colony Optimization
Authors: Sourabh Joshi, Geetinder Kaur, Sarabjit Kaur, Gulwatanpreet Singh, Geetika Mannan
Abstract:
In this paper, we have use an algorithm that able to obtain an optimal solution to travelling salesman problem from a huge search space, quickly. This algorithm is based upon the ant colony optimization technique and employees roulette wheel selection mechanism. To illustrate it more clearly, a program has been implemented which is based upon this algorithm, that presents the changing process of route iteration in a more intuitive way. In the event, we had find the optimal path between hundred cities and also calculate the distance between two cities.Keywords: ant colony, optimization, travelling salesman problem, roulette wheel selection
Procedia PDF Downloads 4415308 A Modified Open Posterior Approach for the Fixation of Posterior Cruciate Ligament Tibial Avulsion Fractures
Authors: Babak Mirzashahi, Arvin Najafi, Pejman Mansouri, Mahmoud Farzan
Abstract:
Background: The most effective treatment of posterior cruciate ligament (PCL) tears and the consequence of untreated PCL injuries remain controversial. Objectives: The aim of this study is to assess outcomes of fixation of tibial posterior cruciate ligament (PCL) avulsion fractures via a modified technique. Patients and Methods: From January, 2009 to March, 2012, there were 45 cases of PCL tibial avulsion fractures that were referred to our hospital and were managed through a modified open posterior approach. Fixation of Tibial PCL avulsion fractures were fixed by means of a lag screw and washer placed through our modified open posterior approach. Range of motion was begun on the first postoperative day. Clinical stability, range of motion, gastrocnemius muscle strength, radiographic investigation, and patient’s overall quality of life was analyzed at final follow up visit. Results: The average of overall musculoskeletal functional evaluation scores was 15 (range 3–35). All patients achieved union of their fracture and had clinically stable knees at the latest follow-up. The mean preoperative Lysholm score for 15 knees was 62 ± 8 (range, 50-75); the mean postoperative Lysholm score was 92± 7 (range, 75-101). A significant difference in Lysholm scores between preoperative and final follow-up evaluations was found (P < .05). At first-year follow-up, 42 (93%) patients revealed a difference of less than 10 mm in thigh circumference between their injured and healthy knees. Conclusions: The management of displaced large PCL avulsion fractures with placement of a cancellous lag screw with washer by means of the modified open posterior approach leads to satisfactory clinical, radiographic, and functional results and reduces the operation time and less blood loss. Level of evidence: IV.Keywords: posterior cruciate ligament, tibial fracture, lysholm knee score, patient outcome assessment
Procedia PDF Downloads 3025307 Water Purification By Novel Nanocomposite Membrane
Authors: E. S. Johal, M. S. Saini, M. K. Jha
Abstract:
Currently, 1.1 billion people are at risk due to lack of clean water and about 35 % of people in the developed world die from water related problem. To alleviate these problems water purification technology requires new approaches for effective management and conservation of water resources. Electrospun nanofibres membrane has a potential for water purification due to its high large surface area and good mechanical strength. In the present study PAMAM dendrimers composite nynlon-6 nanofibres membrane was prepared by crosslinking method using Glutaraldehyde. Further, the efficacy of the modified membrane can be renewed by mere exposure of the saturated membrane with the solution having acidic pH. The modified membrane can be used as an effective tool for water purification.Keywords: dendrimer, nanofibers, nanocomposite membrane, water purification
Procedia PDF Downloads 3575306 Two Stage Assembly Flowshop Scheduling Problem Minimizing Total Tardiness
Authors: Ali Allahverdi, Harun Aydilek, Asiye Aydilek
Abstract:
The two stage assembly flowshop scheduling problem has lots of application in real life. To the best of our knowledge, the two stage assembly flowshop scheduling problem with total tardiness performance measure and separate setup times has not been addressed so far, and hence, it is addressed in this paper. Different dominance relations are developed and several algorithms are proposed. Extensive computational experiments are conducted to evaluate the proposed algorithms. The computational experiments have shown that one of the algorithms performs much better than the others. Moreover, the experiments have shown that the best performing algorithm performs much better than the best existing algorithm for the case of zero setup times in the literature. Therefore, the proposed best performing algorithm not only can be used for problems with separate setup times but also for the case of zero setup times.Keywords: scheduling, assembly flowshop, total tardiness, algorithm
Procedia PDF Downloads 3445305 Optimal Voltage and Frequency Control of a Microgrid Using the Harmony Search Algorithm
Authors: Hossein Abbasi
Abstract:
The stability is an important topic to plan and manage the energy in the microgrids as the same as the conventional power systems. The voltage and frequency stability is one of the most important issues recently studied in microgrids. The objectives of this paper are the modelling and designing of the components and optimal controllers for the voltage and frequency control of the AC/DC hybrid microgrid under the different disturbances. Since the PI controllers have the advantages of simple structure and easy implementation, so they are designed and modeled in this paper. The harmony search (HS) algorithm is used to optimize the controllers’ parameters. According to the achieved results, the PI controllers have a good performance in voltage and frequency control of the microgrid.Keywords: frequency control, HS algorithm, microgrid, PI controller, voltage control
Procedia PDF Downloads 3915304 Algorithms for Fast Computation of Pan Matrix Profiles of Time Series Under Unnormalized Euclidean Distances
Authors: Jing Zhang, Daniel Nikovski
Abstract:
We propose an approximation algorithm called LINKUMP to compute the Pan Matrix Profile (PMP) under the unnormalized l∞ distance (useful for value-based similarity search) using double-ended queue and linear interpolation. The algorithm has comparable time/space complexities as the state-of-the-art algorithm for typical PMP computation under the normalized l₂ distance (useful for shape-based similarity search). We validate its efficiency and effectiveness through extensive numerical experiments and a real-world anomaly detection application.Keywords: pan matrix profile, unnormalized euclidean distance, double-ended queue, discord discovery, anomaly detection
Procedia PDF Downloads 2475303 Design and Performance Improvement of Three-Dimensional Optical Code Division Multiple Access Networks with NAND Detection Technique
Authors: Satyasen Panda, Urmila Bhanja
Abstract:
In this paper, we have presented and analyzed three-dimensional (3-D) matrices of wavelength/time/space code for optical code division multiple access (OCDMA) networks with NAND subtraction detection technique. The 3-D codes are constructed by integrating a two-dimensional modified quadratic congruence (MQC) code with one-dimensional modified prime (MP) code. The respective encoders and decoders were designed using fiber Bragg gratings and optical delay lines to minimize the bit error rate (BER). The performance analysis of the 3D-OCDMA system is based on measurement of signal to noise ratio (SNR), BER and eye diagram for a different number of simultaneous users. Also, in the analysis, various types of noises and multiple access interference (MAI) effects were considered. The results obtained with NAND detection technique were compared with those obtained with OR and AND subtraction techniques. The comparison results proved that the NAND detection technique with 3-D MQC\MP code can accommodate more number of simultaneous users for longer distances of fiber with minimum BER as compared to OR and AND subtraction techniques. The received optical power is also measured at various levels of BER to analyze the effect of attenuation.Keywords: Cross Correlation (CC), Three dimensional Optical Code Division Multiple Access (3-D OCDMA), Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA), Multiple Access Interference (MAI), Phase Induced Intensity Noise (PIIN), Three Dimensional Modified Quadratic Congruence/Modified Prime (3-D MQC/MP) code
Procedia PDF Downloads 4135302 Pion/Muon Identification in a Nuclear Emulsion Cloud Chamber Using Neural Networks
Authors: Kais Manai
Abstract:
The main part of this work focuses on the study of pion/muon separation at low energy using a nuclear Emulsion Cloud Chamber (ECC) made of lead and nuclear emulsion films. The work consists of two parts: particle reconstruction algorithm and a Neural Network that assigns to each reconstructed particle the probability to be a muon or a pion. The pion/muon separation algorithm has been optimized by using a detailed Monte Carlo simulation of the ECC and tested on real data. The algorithm allows to achieve a 60% muon identification efficiency with a pion misidentification smaller than 3%.Keywords: nuclear emulsion, particle identification, tracking, neural network
Procedia PDF Downloads 5095301 Modified RSA in Mobile Communication
Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar
Abstract:
The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.Keywords: M-RSA, sensor networks, sensor applications, security
Procedia PDF Downloads 3435300 A Multi-Population DE with Adaptive Mutation and Local Search for Global Optimization
Authors: Zhoucheng Bao, Haiyan Zhu, Tingting Pang, Zuling Wang
Abstract:
This paper proposes a multi-population DE with adaptive mutation and local search for global optimization, named AMMADE. In order to better coordinate the cooperation between the populations and the rational use of resources. In AMMADE, the population is divided based on the Euclidean distance sorting method at each generation to appropriately coordinate the cooperation between subpopulations and the usage of resources, such that the best-performed subpopulation will get more computing resources in the next generation. Further, an adaptive local search strategy is employed on the best-performed subpopulation to achieve a balanced search. The proposed algorithm has been tested by solving optimization problems taken from CEC2014 benchmark problems. Experimental results show that our algorithm can achieve a competitive or better than related methods. The results also confirm the significance of devised strategies in the proposed algorithm.Keywords: differential evolution, multi-mutation strategies, memetic algorithm, adaptive local search
Procedia PDF Downloads 1605299 Split Monotone Inclusion and Fixed Point Problems in Real Hilbert Spaces
Authors: Francis O. Nwawuru
Abstract:
The convergence analysis of split monotone inclusion problems and fixed point problems of certain nonlinear mappings are investigated in the setting of real Hilbert spaces. Inertial extrapolation term in the spirit of Polyak is incorporated to speed up the rate of convergence. Under standard assumptions, a strong convergence of the proposed algorithm is established without computing the resolvent operator or involving Yosida approximation method. The stepsize involved in the algorithm does not depend on the spectral radius of the linear operator. Furthermore, applications of the proposed algorithm in solving some related optimization problems are also considered. Our result complements and extends numerous results in the literature.Keywords: fixedpoint, hilbertspace, monotonemapping, resolventoperators
Procedia PDF Downloads 545298 Linear Frequency Modulation-Frequency Shift Keying Radar with Compressive Sensing
Authors: Ho Jeong Jin, Chang Won Seo, Choon Sik Cho, Bong Yong Choi, Kwang Kyun Na, Sang Rok Lee
Abstract:
In this paper, a radar signal processing technique using the LFM-FSK (Linear Frequency Modulation-Frequency Shift Keying) is proposed for reducing the false alarm rate based on the compressive sensing. The LFM-FSK method combines FMCW (Frequency Modulation Continuous Wave) signal with FSK (Frequency Shift Keying). This shows an advantage which can suppress the ghost phenomenon without the complicated CFAR (Constant False Alarm Rate) algorithm. Moreover, the parametric sparse algorithm applying the compressive sensing that restores signals efficiently with respect to the incomplete data samples is also integrated, leading to reducing the burden of ADC in the receiver of radars. 24 GHz FMCW signal is applied and tested in the real environment with FSK modulated data for verifying the proposed algorithm along with the compressive sensing.Keywords: compressive sensing, LFM-FSK radar, radar signal processing, sparse algorithm
Procedia PDF Downloads 4855297 Accuracy of VCCT for Calculating Stress Intensity Factor in Metal Specimens Subjected to Bending Load
Authors: Sanjin Kršćanski, Josip Brnić
Abstract:
Virtual Crack Closure Technique (VCCT) is a method used for calculating stress intensity factor (SIF) of a cracked body that is easily implemented on top of basic finite element (FE) codes and as such can be applied on the various component geometries. It is a relatively simple method that does not require any special finite elements to be used and is usually used for calculating stress intensity factors at the crack tip for components made of brittle materials. This paper studies applicability and accuracy of VCCT applied on standard metal specimens containing trough thickness crack, subjected to an in-plane bending load. Finite element analyses were performed using regular 4-node, regular 8-node and a modified quarter-point 8-node 2D elements. Stress intensity factor was calculated from the FE model results for a given crack length, using data available from FE analysis and a custom programmed algorithm based on virtual crack closure technique. Influence of the finite element size on the accuracy of calculated SIF was also studied. The final part of this paper includes a comparison of calculated stress intensity factors with results obtained from analytical expressions found in available literature and in ASTM standard. Results calculated by this algorithm based on VCCT were found to be in good correlation with results obtained with mentioned analytical expressions.Keywords: VCCT, stress intensity factor, finite element analysis, 2D finite elements, bending
Procedia PDF Downloads 3065296 Intrusion Detection Using Dual Artificial Techniques
Authors: Rana I. Abdulghani, Amera I. Melhum
Abstract:
With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.Keywords: IDS, SI, BP, NSL_KDD, PSO
Procedia PDF Downloads 383