Search results for: weighted overlay method
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19417

Search results for: weighted overlay method

18787 Performance of the Strong Stability Method in the Univariate Classical Risk Model

Authors: Safia Hocine, Zina Benouaret, Djamil A¨ıssani

Abstract:

In this paper, we study the performance of the strong stability method of the univariate classical risk model. We interest to the stability bounds established using two approaches. The first based on the strong stability method developed for a general Markov chains. The second approach based on the regenerative processes theory . By adopting an algorithmic procedure, we study the performance of the stability method in the case of exponential distribution claim amounts. After presenting numerically and graphically the stability bounds, an interpretation and comparison of the results have been done.

Keywords: Marcov chain, regenerative process, risk model, ruin probability, strong stability

Procedia PDF Downloads 325
18786 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event

Procedia PDF Downloads 431
18785 Stability of Composite Struts Using the Modified Newmark Method

Authors: Seyed Amin Vakili, Sahar Sadat Vakili, Seyed Ehsan Vakili, Nader Abdoli Yazdi

Abstract:

The aim of this paper is to examine the behavior of elastic stability of reinforced and composite concrete struts with axial loads. The objective of this study is to verify the ability of the Modified Newmark Method to include geometric non-linearity in addition to non-linearity due to cracking, and also to show the advantage of the established method to reconsider an ignored minor parameter in mathematical modeling, such as the effect of the cracking by extra geometric bending moment Ny on cross-section properties. The purpose of this investigation is not to present some new results for the instability of reinforced or composite concrete columns. Therefore, no kinds of non-linearity involved in the problem are considered here. Only as mentioned, it is a part of the verification of the new established method to solve two kinds of non-linearity P- δ effect and cracking together simultaneously. However, the Modified Newmark Method can be used to solve non-linearity of materials and time-dependent behavior of concrete. However, since it is out of the scope of this article, it is not considered.

Keywords: stability, buckling, modified newmark method, reinforced

Procedia PDF Downloads 336
18784 Children of Quarantine: A Post COVID-19 Mental Health Dilemma

Authors: Salman Abdul Majeed, Vidur Solanki, Ruqiya Shama Tareen

Abstract:

BACKGROUND: The COVID-19 pandemic has affected the way of living as we have known for all strata of society. While disease containment measures imposed by governmental agencies have been instrumental in controlling the spread of the virus, it has had profound collateral impacts on all populations. However, the disruption caused in the lives of one segment of population has been far more damaging than most others: the emotional wellbeing of our child and adolescent populations. This impact was even more pronounced in children who already suffered from neurodevelopmental or psychiatric disorders. In particular, school closures have not only led to profound social isolation, but also negative impacts on normal developmental opportunities and interruptions in mental health services obtained through school systems. It is too soon to understand the full impacts of quarantine, isolation, stress of social detachment and fear of pandemic, but we have started to see the devastating impact on C&A already. This review intends to shed light on the current understanding of psychiatric wellbeing of C&A during COVID-19 pandemic. METHOD: Literature search utilizing key words COVID-19 and children, quarantine and children, social isolation, Loneliness, pandemic stress and children, and mental health of children, disease containment measures was carried out. Over 200 articles were identified, out of which 81 articles were included in this review article. RESULTS: The disruption caused by COVID-19 in the lives of C&A is much more damaging and its impact is far reaching. The C&A ED visits for possible suicide attempts have jumped to 22.3% in 2020 and 39.1% during 2021. One study utilizing T1-weighted structural images, computed the thickness of cortical and subcortical structures including amygdala, hippocampus, and nucleus accumbens. The Peri-COVID group showed reduced cortical and subcortical thickness and more advanced brain aging compared to pre pandemic studies. CONCLUSION: Mental health resources for C&A remain under funded, neglected, and inaccessible to population that needs it most. Children with ongoing mental health disorders were impacted worst, along with those with predisposed biopsychosocial risk factors.

Keywords: COVID-19 and children, quarantine and children, social isolation, Loneliness, pandemic stress and children, disease containment measures, mental health of children

Procedia PDF Downloads 76
18783 Implementation of Integer Sub-Decomposition Method on Elliptic Curves with J-Invariant 1728

Authors: Siti Noor Farwina Anwar, Hailiza Kamarulhaili

Abstract:

In this paper, we present the idea of implementing the Integer Sub-Decomposition (ISD) method on elliptic curves with j-invariant 1728. The ISD method was proposed in 2013 to compute scalar multiplication in elliptic curves, which remains to be the most expensive operation in Elliptic Curve Cryptography (ECC). However, the original ISD method only works on integer number field and solve integer scalar multiplication. By extending the method into the complex quadratic field, we are able to solve complex multiplication and implement the ISD method on elliptic curves with j-invariant 1728. The curve with j-invariant 1728 has a unique discriminant of the imaginary quadratic field. This unique discriminant of quadratic field yields a unique efficiently computable endomorphism, which later able to speed up the computations on this curve. However, the ISD method needs three endomorphisms to be accomplished. Hence, we choose all three endomorphisms to be from the same imaginary quadratic field as the curve itself, where the first endomorphism is the unique endomorphism yield from the discriminant of the imaginary quadratic field.

Keywords: efficiently computable endomorphism, elliptic scalar multiplication, j-invariant 1728, quadratic field

Procedia PDF Downloads 201
18782 Comparative Study of Expository and Simulation Method of Teaching Woodwork at Federal University of Technology, Minna, Nigeria

Authors: Robert Ogbanje Okwori

Abstract:

The research studied expository and simulation method of teaching woodwork at Federal University of Technology, Minna, Niger State, Nigeria. The purpose of the study was to compare expository and simulation method of teaching woodwork and determine the method that is more effective in improving performance of students in woodwork. Two research questions and two hypotheses were formulated to guide the study. Fifteen objective questions and two theory questions were used for data collection. The questions set were on structure of timber. The study used the quasi experimental design. The population of the study consisted of 25 woodwork students of Federal University of Technology, Minna, Niger State, Nigeria and three hundred (300) level students were used for the study. The lesson plans for expository method and questions were validated by three lecturers in the Department of Industrial and Technology Education, Federal University of Technology, Minna, Nigeria. The validators checked the appropriates of test items and all the corrections and inputs were effected before administration of the instrument. Data obtained were analyzed using mean, standard deviation and t-test statistical tool. The null hypotheses were formulated and tested using t-test statistics at 0.05 level of significance. The findings of the study showed that simulation method of teaching has improved students’ performance in woodwork and the performance of the students was not influenced by gender. Based on the findings of the study, it was concluded that there was a significant difference in the mean achievement scores of students taught woodwork using simulation method. This implies that simulation method is more effective than expository method of teaching woodwork. Therefore, woodwork teachers should adopt simulation method of teaching woodwork towards better performance. It was recommended that simulation method should be used by woodwork lecturers to teach woodwork since students perform better using the method and also the teachers needs to be trained and re-trained in using simulation method for teaching woodwork. Teachers should be encouraged to use simulation method for their instructional delivery because it will allow them to identify their areas of strength and weakness when imparting knowledge to woodwork students. Government and different agencies should assist in procuring materials and equipment for wood workshops to enable students effectively practice what they have been taught using simulation method.

Keywords: comparative, expository, simulation, woodwork

Procedia PDF Downloads 428
18781 The Number of Corona Virus Infections in 2020

Authors: Yasaswi Vengalasetti, Jacob Eisenach, Jay Bhattacharya

Abstract:

Seroprevalence studies can provide an estimation of the Infection Fatality Rate (IFR), the probability of death given infection. Measuring the seroprevalence and reported deaths of an area within a given time frame an IFR can be estimated. With this IFR calculation, we can then observe COVID-19 death figures in different countries around the world and estimate the number of cases since the onset of the pandemic. There is a large range for estimated COVID-19 infections across different countries. This ranged from 0.659 million infections in Hong Kong to 277 million infections in India. The largest estimated share of the population infected is 63% in Peru and the lowest is 3% in Norway. For younger populations, COVID-19 is most fatal in South America; for older populations, it is most fatal in North America. The Asian regions stand out with significantly lower IFRs in older populations: at 80 years old, COVID-19 is about three times as fatal than in South Asia and about twelve times as fatal than in East Asia. The weighted average for the share of the population infected, the sum of infections divided by the sum of populations across all countries, is 23%.

Keywords: epidemiology, seroprevalence, covid-19, infection fatality rate

Procedia PDF Downloads 124
18780 Applications of Probabilistic Interpolation via Orthogonal Matrices

Authors: Dariusz Jacek Jakóbczak

Abstract:

Mathematics and computer science are interested in methods of 2D curve interpolation and extrapolation using the set of key points (knots). A proposed method of Hurwitz- Radon Matrices (MHR) is such a method. This novel method is based on the family of Hurwitz-Radon (HR) matrices which possess columns composed of orthogonal vectors. Two-dimensional curve is interpolated via different functions as probability distribution functions: polynomial, sinus, cosine, tangent, cotangent, logarithm, exponent, arcsin, arccos, arctan, arcctg or power function, also inverse functions. It is shown how to build the orthogonal matrix operator and how to use it in a process of curve reconstruction.

Keywords: 2D data interpolation, hurwitz-radon matrices, MHR method, probabilistic modeling, curve extrapolation

Procedia PDF Downloads 526
18779 Track Initiation Method Based on Multi-Algorithm Fusion Learning of 1DCNN And Bi-LSTM

Authors: Zhe Li, Aihua Cai

Abstract:

Aiming at the problem of high-density clutter and interference affecting radar detection target track initiation in ECM and complex radar mission, the traditional radar target track initiation method has been difficult to adapt. To this end, we propose a multi-algorithm fusion learning track initiation algorithm, which transforms the track initiation problem into a true-false track discrimination problem, and designs an algorithm based on 1DCNN(One-Dimensional CNN)combined with Bi-LSTM (Bi-Directional Long Short-Term Memory )for fusion classification. The experimental dataset consists of real trajectories obtained from a certain type of three-coordinate radar measurements, and the experiments are compared with traditional trajectory initiation methods such as rule-based method, logical-based method and Hough-transform-based method. The simulation results show that the overall performance of the multi-algorithm fusion learning track initiation algorithm is significantly better than that of the traditional method, and the real track initiation rate can be effectively improved under high clutter density with the average initiation time similar to the logical method.

Keywords: track initiation, multi-algorithm fusion, 1DCNN, Bi-LSTM

Procedia PDF Downloads 96
18778 Vibroacoustic Modulation with Chirp Signal

Authors: Dong Liu

Abstract:

By sending a high-frequency probe wave and a low-frequency pump wave to a specimen, the vibroacoustic method evaluates the defect’s severity according to the modulation index of the received signal. Many studies experimentally proved the significant sensitivity of the modulation index to the tiny contact type defect. However, it has also been found that the modulation index was highly affected by the frequency of probe or pump waves. Therefore, the chirp signal has been introduced to the VAM method since it can assess multiple frequencies in a relatively short time duration, so the robustness of the VAM method could be enhanced. Consequently, the signal processing method needs to be modified accordingly. Various studies utilized different algorithms or combinations of algorithms for processing the VAM signal method by chirp excitation. These signal process methods were compared and used for processing a VAM signal acquired from the steel samples.

Keywords: vibroacoustic modulation, nonlinear acoustic modulation, nonlinear acoustic NDT&E, signal processing, structural health monitoring

Procedia PDF Downloads 99
18777 Comparative Study of Propensity for Amyloidogenesis in Male and Female Mice

Authors: Keivan Jamshidi, Afshin Zahedi

Abstract:

Reactive amyloidosis is a condition that complicates a long list of chronic inflammation, chronic infectious, malignant, and hereditary disorders. In the present study the propensity for amyloidogenesis in male and female rats on spatio-temporal pattern was evaluated. For this purpose a total of 40 male and female Swiss mice, obtained from Pasteur Institute Tehran, after being weighted were randomly divided into 4 groups including 2 treatment groups [ 10 male (Group A1) and 10 female (Group B1) each], and 2 control groups [10 male (Group A2) and 10 female (Group B2) each]. At the end of 3rd, 5th and 7th weeks of experiment 3 mice were randomly selected and euthnised. Spleen samples of each animal were obtained and preserved in 10% neutral buffer formalin. Sample were then processed through different stages of dehydration, clearing and impregnation and finally embedded in paraffin blocks. Sections of 5µm thickness then cut and stained by alkaline Congo red techniques. The data obtained from polarized microscopic quantitative analysis did show significant differences between groups A1 and B1. A preferential expression of reactive amyloidosis is concluded in male, indicating sex differences in amyloidosis.

Keywords: amyloidosis, amyloidogenesis, mice, gender

Procedia PDF Downloads 596
18776 Cooperative Coevolution for Neuro-Evolution of Feed Forward Networks for Time Series Prediction Using Hidden Neuron Connections

Authors: Ravneil Nand

Abstract:

Cooperative coevolution uses problem decomposition methods to solve a larger problem. The problem decomposition deals with breaking down the larger problem into a number of smaller sub-problems depending on their method. Different problem decomposition methods have their own strengths and limitations depending on the neural network used and application problem. In this paper we are introducing a new problem decomposition method known as Hidden-Neuron Level Decomposition (HNL). The HNL method is competing with established problem decomposition method in time series prediction. The results show that the proposed approach has improved the results in some benchmark data sets when compared to the standalone method and has competitive results when compared to methods from literature.

Keywords: cooperative coevaluation, feed forward network, problem decomposition, neuron, synapse

Procedia PDF Downloads 338
18775 Policy Guidelines to Enhance the Mathematics Teachers’ Association of the Philippines (MTAP) Saturday Class Program

Authors: Roselyn Alejandro-Ymana

Abstract:

The study was an attempt to assess the MTAP Saturday Class Program along its eight components namely, modules, instructional materials, scheduling, trainer-teachers, supervisory support, administrative support, financial support and educational facilities, the results of which served as bases in developing policy guidelines to enhance the MTAP Saturday Class Program. Using a descriptive development method of research, this study involved the participation of twenty-eight (28) schools with MTAP Saturday Class Program in the Division of Dasmarinas City where twenty-eight school heads, one hundred twenty-five (125) teacher-trainer, one hundred twenty-five (125) pupil program participants, and their corresponding one hundred twenty-five (125) parents were purposively drawn to constitute the study’s respondent. A self-made validated survey questionnaire together with Pre and Post-Test Assessment Test in Mathematics for pupils participating in the program, and an unstructured interview guide was used to gather the data needed in the study. Data obtained from the instruments administered was organized and analyzed through the use of statistical tools that included the Mean, Weighted Mean, Relative Frequency, Standard Deviation, F-Test or One-Way ANOVA and the T-Test. Results of the study revealed that all the eight domains involved in the MTAP Saturday Class Program were practiced with the areas of 'trainer-teachers', 'educational facilities', and 'supervisory support' identified as the program’s strongest components while the areas of 'financial support', 'modules' and 'scheduling' as being the weakest program’s components. Moreover, the study revealed based on F-Test, that there was a significant difference in the assessment made by the respondents in each of the eight (8) domains. It was found out that the parents deviated significantly from the assessment of either the school heads or the teachers on the indicators of the program. There is much to be desired when it comes to the quality of the implementation of the MTAP Saturday Class Program. With most of the indicators of each component of the program, having received overall average ratings that were at least 0.5 point away from the ideal rating 5 for total quality, school heads, teachers, and supervisors need to work harder for total quality of the implementation of the MTAP Saturday Class Program in the division.

Keywords: mathematics achievement, MTAP program, policy guidelines, program assessment

Procedia PDF Downloads 212
18774 Suitable Tuning Method Selection for PID Controller Used in Digital Excitation System of Brushless Synchronous Generator

Authors: Deepak M. Sajnekar, S. B. Deshpande, R. M. Mohril

Abstract:

At present many rotary excitation control system are using analog type of Automatic Voltage Regulator which now started to replace with the digital automatic voltage regulator which is provided with PID controller and tuning of PID controller is a challenging task. The cases where digital excitation control system is used tuning of PID controller are still carried out by pole placement method. Tuning of PID controller used for static excitation control system is not challenging because it does not involve exciter time constant. This paper discusses two methods of tuning PID controller i.e. Pole placement method and pole zero cancellation method. GUI prepared for both the methods on the platform of MATLAB. Using this GUI, performance results and time required for tuning for both the methods are compared. Sensitivity of the methods is also presented with parameter variation like loop gain ‘K’ and exciter time constant ‘te’.

Keywords: digital excitation system, automatic voltage regulator, pole placement method, pole zero cancellation method

Procedia PDF Downloads 678
18773 Image Features Comparison-Based Position Estimation Method Using a Camera Sensor

Authors: Jinseon Song, Yongwan Park

Abstract:

In this paper, propose method that can user’s position that based on database is built from single camera. Previous positioning calculate distance by arrival-time of signal like GPS (Global Positioning System), RF(Radio Frequency). However, these previous method have weakness because these have large error range according to signal interference. Method for solution estimate position by camera sensor. But, signal camera is difficult to obtain relative position data and stereo camera is difficult to provide real-time position data because of a lot of image data, too. First of all, in this research we build image database at space that able to provide positioning service with single camera. Next, we judge similarity through image matching of database image and transmission image from user. Finally, we decide position of user through position of most similar database image. For verification of propose method, we experiment at real-environment like indoor and outdoor. Propose method is wide positioning range and this method can verify not only position of user but also direction.

Keywords: positioning, distance, camera, features, SURF(Speed-Up Robust Features), database, estimation

Procedia PDF Downloads 350
18772 A Novel Method for Silence Removal in Sounds Produced by Percussive Instruments

Authors: B. Kishore Kumar, Rakesh Pogula, T. Kishore Kumar

Abstract:

The steepness of an audio signal which is produced by the musical instruments, specifically percussive instruments is the perception of how high tone or low tone which can be considered as a frequency closely related to the fundamental frequency. This paper presents a novel method for silence removal and segmentation of music signals produced by the percussive instruments and the performance of proposed method is studied with the help of MATLAB simulations. This method is based on two simple features, namely the signal energy and the spectral centroid. As long as the feature sequences are extracted, a simple thresholding criterion is applied in order to remove the silence areas in the sound signal. The simulations were carried on various instruments like drum, flute and guitar and results of the proposed method were analyzed.

Keywords: percussive instruments, spectral energy, spectral centroid, silence removal

Procedia PDF Downloads 412
18771 Building and Tree Detection Using Multiscale Matched Filtering

Authors: Abdullah H. Özcan, Dilara Hisar, Yetkin Sayar, Cem Ünsalan

Abstract:

In this study, an automated building and tree detection method is proposed using DSM data and true orthophoto image. A multiscale matched filtering is used on DSM data. Therefore, first watershed transform is applied. Then, Otsu’s thresholding method is used as an adaptive threshold to segment each watershed region. Detected objects are masked with NDVI to separate buildings and trees. The proposed method is able to detect buildings and trees without entering any elevation threshold. We tested our method on ISPRS semantic labeling dataset and obtained promising results.

Keywords: building detection, local maximum filtering, matched filtering, multiscale

Procedia PDF Downloads 321
18770 Modified Design of Flyer with Reduced Weight for Use in Textile Machinery

Authors: Payal Patel

Abstract:

Textile machinery is one of the fastest evolving areas which has an application of mechanical engineering. The modular approach towards the processing right from the stage of cotton to the fabric, allows us to observe the result of each process on its input. Cost and space being the major constraints. The flyer is a component of roving machine, which is used as a part of spinning process. In the present work using the application of Hyper Works, the flyer arm has been modified which saves the material used for manufacturing the flyer. The size optimization of the flyer is carried out with the objective of reduction in weight under the constraints of standard operating conditions. The new design of the flyer is proposed and validated using the module of HyperWorks which is equally strong, but light weighted compared to the existing design. Dynamic balancing of the optimized model is carried out to align a principal inertia axis with the geometric axis of rotation. For the balanced geometry of flyer, air resistance is obtained theoretically and with Gambit and Fluent. Static analysis of the balanced geometry has been done to verify the constraint of operating condition. Comparison of weight, deflection, and factor of safety has been made for different aluminum alloys.

Keywords: flyer, size optimization, textile, weight

Procedia PDF Downloads 217
18769 A Generalization of the Secret Sharing Scheme Codes Over Certain Ring

Authors: Ibrahim Özbek, Erdoğan Mehmet Özkan

Abstract:

In this study, we generalize (k,n) threshold secret sharing scheme on the study Ozbek and Siap to the codes over the ring Fq+ αFq. In this way, it is mentioned that the method obtained in that article can also be used on codes over rings, and new advantages to be obtained. The method of securely sharing the key in cryptography, which Shamir first systematized and Massey carried over to codes, became usable for all error-correcting codes. The firewall of this scheme is based on the hardness of the syndrome decoding problem. Also, an open study area is left for those working for other rings and code classes. All codes that correct errors with this method have been the working area of this method.

Keywords: secret sharing scheme, linear codes, algebra, finite rings

Procedia PDF Downloads 76
18768 Building Green Infrastructure Networks Based on Cadastral Parcels Using Network Analysis

Authors: Gon Park

Abstract:

Seoul in South Korea established the 2030 Seoul City Master Plan that contains green-link projects to connect critical green areas within the city. However, the plan does not have detailed analyses for green infrastructure to incorporate land-cover information to many structural classes. This study maps green infrastructure networks of Seoul for complementing their green plans with identifying and raking green areas. Hubs and links of main elements of green infrastructure have been identified from incorporating cadastral data of 967,502 parcels to 135 of land use maps using geographic information system. Network analyses were used to rank hubs and links of a green infrastructure map with applying a force-directed algorithm, weighted values, and binary relationships that has metrics of density, distance, and centrality. The results indicate that network analyses using cadastral parcel data can be used as the framework to identify and rank hubs, links, and networks for the green infrastructure planning under a variable scenarios of green areas in cities.

Keywords: cadastral data, green Infrastructure, network analysis, parcel data

Procedia PDF Downloads 209
18767 Attitude Stabilization of Satellites Using Random Dither Quantization

Authors: Kazuma Okada, Tomoaki Hashimoto, Hirokazu Tahara

Abstract:

Recently, the effectiveness of random dither quantization method for linear feedback control systems has been shown in several papers. However, the random dither quantization method has not yet been applied to nonlinear feedback control systems. The objective of this paper is to verify the effectiveness of random dither quantization method for nonlinear feedback control systems. For this purpose, we consider the attitude stabilization problem of satellites using discrete-level actuators. Namely, this paper provides a control method based on the random dither quantization method for stabilizing the attitude of satellites using discrete-level actuators.

Keywords: quantized control, nonlinear systems, random dither quantization

Procedia PDF Downloads 243
18766 A Teaching Method for Improving Sentence Fluency in Writing

Authors: Manssour Habbash, Srinivasa Rao Idapalapati

Abstract:

Although writing is a multifaceted task, teaching writing is a demanding task basically for two reasons: Grammar and Syntax. This article provides a method of teaching writing that was found to be effective in improving students’ academic writing composition skill. The article explains the concepts of ‘guided-discovery’ and ‘guided-construction’ upon which a method of teaching writing is grounded and developed. Providing a brief commentary on what the core could mean primarily, the article presents an exposition of understanding and identifying the core and building upon the core that can demonstrate the way a teacher can make use of the concepts in teaching for improving the writing skills of their students. The method is an adaptation of grammar translation method that has been improvised to suit to a student-centered classroom environment. An intervention of teaching writing through this method was tried out with positive outcomes in formal classroom research setup, and in view of the content’s quality that relates more to the classroom practices and also in consideration of its usefulness to the practicing teachers the process and the findings are presented in a narrative form along with the results in tabular form.

Keywords: core of a text, guided construction, guided discovery, theme of a text

Procedia PDF Downloads 381
18765 Level Set and Morphological Operation Techniques in Application of Dental Image Segmentation

Authors: Abdolvahab Ehsani Rad, Mohd Shafry Mohd Rahim, Alireza Norouzi

Abstract:

Medical image analysis is one of the great effects of computer image processing. There are several processes to analysis the medical images which the segmentation process is one of the challenging and most important step. In this paper the segmentation method proposed in order to segment the dental radiograph images. Thresholding method has been applied to simplify the images and to morphologically open binary image technique performed to eliminate the unnecessary regions on images. Furthermore, horizontal and vertical integral projection techniques used to extract the each individual tooth from radiograph images. Segmentation process has been done by applying the level set method on each extracted images. Nevertheless, the experiments results by 90% accuracy demonstrate that proposed method achieves high accuracy and promising result.

Keywords: integral production, level set method, morphological operation, segmentation

Procedia PDF Downloads 318
18764 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 452
18763 Multi-Level Attentional Network for Aspect-Based Sentiment Analysis

Authors: Xinyuan Liu, Xiaojun Jing, Yuan He, Junsheng Mu

Abstract:

Aspect-based Sentiment Analysis (ABSA) has attracted much attention due to its capacity to determine the sentiment polarity of the certain aspect in a sentence. In previous works, great significance of the interaction between aspect and sentence has been exhibited in ABSA. In consequence, a Multi-Level Attentional Networks (MLAN) is proposed. MLAN consists of four parts: Embedding Layer, Encoding Layer, Multi-Level Attentional (MLA) Layers and Final Prediction Layer. Among these parts, MLA Layers including Aspect Level Attentional (ALA) Layer and Interactive Attentional (ILA) Layer is the innovation of MLAN, whose function is to focus on the important information and obtain multiple levels’ attentional weighted representation of aspect and sentence. In the experiments, MLAN is compared with classical TD-LSTM, MemNet, RAM, ATAE-LSTM, IAN, AOA, LCR-Rot and AEN-GloVe on SemEval 2014 Dataset. The experimental results show that MLAN outperforms those state-of-the-art models greatly. And in case study, the works of ALA Layer and ILA Layer have been proven to be effective and interpretable.

Keywords: deep learning, aspect-based sentiment analysis, attention, natural language processing

Procedia PDF Downloads 139
18762 Assessment of Body Mass Index among Children of Primary School in Behbahan City

Authors: Hosseini Siahi Zohreh, Sana Mohammad Jafar

Abstract:

With increase in fat and over weight in children and its undesirable effects on different organisms of the body and since many of the sicknesses are due to over weight and with losing weight these sicknesses disappear, and on the other hand with mal nutrition and under weight in children other kind of sicknesses such as derogation of body's security system, frequent infection, insufficient growth, shortness, and delay in maturity etc. are some of the signs of being under weight. Therefore recognition of signs of over weight and under weight and their prevalence in children are important. To determine this difficulty we have used the body mass index as screening tool since it is very prevalent and a good and important guide and has very good relation with body fat in children. In this study 2321 students from primary schools in Behbahan have been chosen randomly and evaluated by height and weight and their body mass index have been calculated and then recorded on the BMI percentile diagram which is for age and gender. The following results obtained: The amount of total fat, over weight and slimness are 9.3, 12.1 and 12.32 percent respectively. Therefore 21.4% of the children were over weighted. It did not show any meaningful statistical relation in fat conditions among boys and girls, but there has been a meaningful statistical relation in slimness among boys and girls.

Keywords: assessment, students, Behbahan, Body Mass Index

Procedia PDF Downloads 520
18761 Sensor Registration in Multi-Static Sonar Fusion Detection

Authors: Longxiang Guo, Haoyan Hao, Xueli Sheng, Hanjun Yu, Jingwei Yin

Abstract:

In order to prevent target splitting and ensure the accuracy of fusion, system error registration is an important step in multi-static sonar fusion detection system. To eliminate the inherent system errors including distance error and angle error of each sonar in detection, this paper uses offline estimation method for error registration. Suppose several sonars from different platforms work together to detect a target. The target position detected by each sonar is based on each sonar’s own reference coordinate system. Based on the two-dimensional stereo projection method, this paper uses real-time quality control (RTQC) method and least squares (LS) method to estimate sensor biases. The RTQC method takes the average value of each sonar’s data as the observation value and the LS method makes the least square processing of each sonar’s data to get the observation value. In the underwater acoustic environment, matlab simulation is carried out and the simulation results show that both algorithms can estimate the distance and angle error of sonar system. The performance of the two algorithms is also compared through the root mean square error and the influence of measurement noise on registration accuracy is explored by simulation. The system error convergence of RTQC method is rapid, but the distribution of targets has a serious impact on its performance. LS method can not be affected by target distribution, but the increase of random noise will slow down the convergence rate. LS method is an improvement of RTQC method, which is widely used in two-dimensional registration. The improved method can be used for underwater multi-target detection registration.

Keywords: data fusion, multi-static sonar detection, offline estimation, sensor registration problem

Procedia PDF Downloads 169
18760 Modal FDTD Method for Wave Propagation Modeling Customized for Parallel Computing

Authors: H. Samadiyeh, R. Khajavi

Abstract:

A new FD-based procedure, modal finite difference method (MFDM), is proposed for seismic wave propagation modeling, in which simulation is dealt with in the modal space. The method employs eigenvalues of a characteristic matrix formed by appropriate time-space FD stencils. Since MFD runs for different modes are totally independent of each other, MFDM can easily be parallelized while considerable simplicity in parallel-algorithm is also achieved. There is no requirement to any domain-decomposition procedure and inter-core data exchange. More important is the possibility to skip processing of less-significant modes, which enables one to adjust the procedure up to the level of accuracy needed. Thus, in addition to considerable ease of parallel programming, computation and storage costs are significantly reduced. The method is qualified for its efficiency by some numerical examples.

Keywords: Finite Difference Method, Graphics Processing Unit (GPU), Message Passing Interface (MPI), Modal, Wave propagation

Procedia PDF Downloads 297
18759 Radial Distortion Correction Based on the Concept of Verifying the Planarity of a Specimen

Authors: Shih-Heng Tung, Ming-Hsiang Shih, Wen-Pei Sung

Abstract:

Because of the rapid development of digital camera and computer, digital image correlation method has drawn lots of attention recently and has been applied to a variety of fields. However, the image distortion is inevitable when the image is captured through a lens. This image distortion problem can result in an innegligible error while using digital image correlation method. There are already many different ways to correct the image distortion, and most of them require specific image patterns or precise control points. A new distortion correction method is proposed in this study. The proposed method is based on the fact that a flat surface should keep flat when it is measured using three-dimensional (3D) digital image measurement technique. Lens distortion can be divided into radial distortion, decentering distortion and thin prism distortion. Because radial distortion has a more noticeable influence than the other types of distortions, this method deals only with radial distortion. The simplified 3D digital image measurement technique is adopted to measure the surface coordinates of a flat specimen. Then the gradient method is applied to find the best correction parameters. A few experiments are carried out in this study to verify the correctness of this method. The results show that this method can achieve a good accuracy and it is suitable for both large and small distortion conditions. The most important advantage is that it requires neither mark with specific pattern nor precise control points.

Keywords: 3D DIC, radial distortion, distortion correction, planarity

Procedia PDF Downloads 551
18758 Solving 94-Bit ECDLP with 70 Computers in Parallel

Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai

Abstract:

Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.

Keywords: Pollard's rho method, BN curve, Montgomery multiplication

Procedia PDF Downloads 272