Search results for: faulty signature
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 318

Search results for: faulty signature

198 The Success of Local Community Participation in Ecotourism Site: A Case Study of Sukau

Authors: Awangku Hassanal Bahar Pengiran Bagul

Abstract:

Ecotourism has been the signature tourism activity for Sabah since the 90s, and it has become a model of sustainable tourism development for Malaysia due to its ability to enhance conservation activities and local community development. This paper outlines the experience in developing indicators for the success of the local community participation of an ecotourism site, Sukau, in Sabah. The research was qualitative in nature and employed case study as its methodology. The outcome of this research suggested that Sukau has a mixed success with local community participation for the ecotourism activity. The community is in need of coaching and capacity building to intensify the ecotourism activity However, the ecotourism has successfully promoted conservation at its surrounding area.

Keywords: community, ecotourism, rural development, success, sustainable tourism

Procedia PDF Downloads 350
197 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents

Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace

Abstract:

The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.

Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat

Procedia PDF Downloads 104
196 Photogrammetry and Topographic Information for Urban Growth and Change in Amman

Authors: Mahmoud M. S. Albattah

Abstract:

Urbanization results in the expansion of administrative boundaries, mainly at the periphery, ultimately leading to changes in landcover. Agricultural land, naturally vegetated land, and other land types are converted into residential areas with a high density of constructs, such as transportation systems and housing. In urban regions of rapid growth and change, urban planners need regular information on up to date ground change. Amman (the capital of Jordan) is growing at unprecedented rates, creating extensive urban landscapes. Planners interact with these changes without having a global view of their impact. The use of aerial photographs and satellite images data combined with topographic information and field survey could provide effective information to develop urban change and growth inventory which could be explored towards producing a very important signature for the built-up area changes.

Keywords: highway design, satellite technologies, remote sensing, GIS, image segmentation, classification

Procedia PDF Downloads 413
195 Structural and Magnetic Properties of CoFe2-xNdxO4 Spinel Ferrite Nanoparticles

Authors: R. S. Yadav, J. Havlica, I. Kuřitka, Z. Kozakova, J. Masilko, M. Hajdúchová, V. Enev, J. Wasserbauer

Abstract:

In this present work, CoFe2-xNdxO4 (0.0 ≤ x ≥0.1) spinel ferrite nanoparticles were synthesized by starch-assisted sol-gel auto-combustion method. Powder X-ray diffraction patterns were revealed the formation of cubic spinel ferrite with the signature of NdFeO3 phase at higher Nd3+ concentration. The field emission scanning electron microscopy study demonstrated the spherical nanoparticle in the size range between 5-15 nm. Raman and Fourier Transform Infrared spectra supported the formation of the spinel ferrite structure in the nanocrystalline form. The X-ray photoelectron spectroscopy (XPS) analysis confirmed the presence of Co2+ and Fe3+ at octahedral as well as a tetrahedral site in CoFe2-xNdxO4 nanoparticles. The change in magnetic properties with a variation of concentration of Nd3+ ions in cobalt ferrite nanoparticles was observed.

Keywords: nanoparticles, spinel ferrites, sol-gel auto-combustion method, CoFe2-xNdxO4

Procedia PDF Downloads 467
194 The Role of Tempo in the Perception of Musical Grouping

Authors: Marina B. Cottrell

Abstract:

Tempo plays a significant role in the perception of metrical groupings, with faster tempi tending to increase the number of beats in a given metrical unit. Previous research has shown a correlation between the perception of metric grouping and native language, but little is currently known about other possible musical factors that contribute to metric grouping tendencies. This study aims to find the tempo boundaries at which the perceptual groupings of a melodic pattern changes and to correlate these regions with self-reported musical experience. Participants were presented with looping melodies (divided between major and minor keys). Using a slider bar that controlled the tempo, subjects were asked to locate the point at which they heard the metric grouping doubled or halved. This region was shown to primarily be affected by the mode and time signature of the stimulus. The results also suggest a correlation between the level of musical training and the region of perceived grouping change.

Keywords: meter, metric grouping, mode, tempo

Procedia PDF Downloads 117
193 Reinforcement Learning for Quality-Oriented Production Process Parameter Optimization Based on Predictive Models

Authors: Akshay Paranjape, Nils Plettenberg, Robert Schmitt

Abstract:

Producing faulty products can be costly for manufacturing companies and wastes resources. To reduce scrap rates in manufacturing, process parameters can be optimized using machine learning. Thus far, research mainly focused on optimizing specific processes using traditional algorithms. To develop a framework that enables real-time optimization based on a predictive model for an arbitrary production process, this study explores the application of reinforcement learning (RL) in this field. Based on a thorough review of literature about RL and process parameter optimization, a model based on maximum a posteriori policy optimization that can handle both numerical and categorical parameters is proposed. A case study compares the model to state–of–the–art traditional algorithms and shows that RL can find optima of similar quality while requiring significantly less time. These results are confirmed in a large-scale validation study on data sets from both production and other fields. Finally, multiple ways to improve the model are discussed.

Keywords: reinforcement learning, production process optimization, evolutionary algorithms, policy optimization, actor critic approach

Procedia PDF Downloads 63
192 Fault-Tolerant Configuration for T-Type Nested Neutral Point Clamped Converter

Authors: S. Masoud Barakati, Mohsen Rahmani Haredasht

Abstract:

Recently, the use of T-type nested neutral point clamped (T-NNPC) converter has increased in medium voltage applications. However, the T-NNPC converter architecture's reliability and continuous operation are at risk by including semiconductor switches. Semiconductor switches are a prone option for open-circuit faults. As a result, fault-tolerant converters are required to improve the system's reliability and continuous functioning. This study's primary goal is to provide a fault-tolerant T-NNPC converter configuration. In the proposed design utilizing the cold reservation approach, a redundant phase is considered, which replaces the faulty phase once the fault is diagnosed in each phase. The suggested fault-tolerant configuration can be easily implemented in practical applications due to the use of a simple PWM control mechanism. The performance evaluation of the proposed configuration under different scenarios in the MATLAB-Simulink environment proves its efficiency.

Keywords: T-type nested neutral point clamped converter, reliability, continuous operation, open-circuit faults, fault-tolerant converters

Procedia PDF Downloads 85
191 Intellectual Property Rights Applicability in the Sport Industry

Authors: Poopak Dehshahri

Abstract:

The applicability of intellectual property rights in the sports industry from the present paper’s perspective includes athletic skills, which are comprised of two parts: athletic movements and athletic methods. Also, the applicability pertaining to the athletes᾽ personality, such as the Name, the Image, the Voice, the Signature and their Shirt Number, are deemed as related to the sports natural persons. Radio and TV broadcasting rights of the sports events, the signs and symbols of the athletic institutions including the sign and symbol, trademark (brand name), the name and the place of residence of the sports clubs, the Sports events and the special sports, special slogan of the sports clubs or sports competitions and the sports clothing design are Included under the athletic institutions᾽ applicability of intellectual property rights.

Keywords: sport industry, intellectual property, sport skills, right to fame, radio and television broadcasting right, sport sign

Procedia PDF Downloads 34
190 A New Approach of Preprocessing with SVM Optimization Based on PSO for Bearing Fault Diagnosis

Authors: Tawfik Thelaidjia, Salah Chenikher

Abstract:

Bearing fault diagnosis has attracted significant attention over the past few decades. It consists of two major parts: vibration signal feature extraction and condition classification for the extracted features. In this paper, feature extraction from faulty bearing vibration signals is performed by a combination of the signal’s Kurtosis and features obtained through the preprocessing of the vibration signal samples using Db2 discrete wavelet transform at the fifth level of decomposition. In this way, a 7-dimensional vector of the vibration signal feature is obtained. After feature extraction from vibration signal, the support vector machine (SVM) was applied to automate the fault diagnosis procedure. To improve the classification accuracy for bearing fault prediction, particle swarm optimization (PSO) is employed to simultaneously optimize the SVM kernel function parameter and the penalty parameter. The results have shown feasibility and effectiveness of the proposed approach

Keywords: condition monitoring, discrete wavelet transform, fault diagnosis, kurtosis, machine learning, particle swarm optimization, roller bearing, rotating machines, support vector machine, vibration measurement

Procedia PDF Downloads 409
189 Simulating Economic Order Quantity and Reorder Point Policy for a Repairable Items Inventory System

Authors: Mojahid F. Saeed Osman

Abstract:

Repairable items inventory system is a management tool used to incorporate all information concerning inventory levels and movements for repaired and new items. This paper presents development of an effective simulation model for managing the inventory of repairable items for a production system where production lines send their faulty items to a repair shop considering the stochastic failure behavior and repair times. The developed model imitates the process of handling the on-hand inventory of repaired items and the replenishment of the inventory of new items using Economic Order Quantity and Reorder Point ordering policy in a flexible and risk-free environment. We demonstrate the appropriateness and effectiveness of the proposed simulation model using an illustrative case problem. The developed simulation model can be used as a reliable tool for estimating a healthy on-hand inventory of new and repaired items, backordered items, and downtime due to unavailability of repaired items, and validating and examining Economic Order Quantity and Reorder Point ordering policy, which would further be compared with other ordering strategies as future work.

Keywords: inventory system, repairable items, simulation, maintenance, economic order quantity, reorder point

Procedia PDF Downloads 109
188 Improving the Foult Ride through Capability and Stability of Wind Farms with DFIG Wind Turbine by Using Statcom

Authors: Abdulfetah Shobole, Arif Karakas, Ugur Savas Selamogullari, Mustafa Baysal

Abstract:

The concern of reducing emissions of Co2 from the fossil fuel generating units and using renewable energy sources increased in our world. Due this fact the integration ratio of wind farms to grid reached 20-30% in some part of our world. With increased integration of large MW scaled wind farms to the electric grid, the stability of the electrical system is a great concern. Thus, operators of power systems usually deman the wind turbine generators to obey the same rules as other traditional kinds of generation, such as thermal and hydro, i.e. not affect the grid stability. FACTS devices such as SVC or STATCOM are mostly installed close to the connection point of the wind farm to the grid in order to increase the stability especially during faulty conditions. In this paper wind farm with DFIG turbine type and STATCOM are dynamically modeled and simulated under three phase short circuit fault condition. The dynamic modeling is done by DigSILENT PowerFactory for the wind farm, STATCOM and the network. The simulation results show improvement of system stability near to the connection point of the STATCOM.

Keywords: DFIG wind turbine, statcom, dynamic modeling, digsilent

Procedia PDF Downloads 686
187 The Effect of Collapse Structure on Economic Growth and Influence of Soil Investigation

Authors: Fatai Shola Afolabi

Abstract:

The study identified and evaluates the causes of building failure and examined the effects of building failure with respect to cost in Lagos State, Nigeria. The method employed in the collection of data includes the administration of questionnaire to professionals in the construction industry and case studies for the sites. A purposive sampling technique was used for selecting the sites visited, and selecting the construction professionals. Descriptive statistical techniques such as frequency distribution and percentages and mean response analysis were used to analyze data. The study revealed that the major causes of building failures were bad design, faulty construction, over loading, non-possession of approved drawings, Possession of approved drawings but non-compliance, and the use of quarks. In the two case studies considered, the total direct loss to the building owners was thirty eight million three hundred and eight five thousand, seven hundred and twenty one naira (38,385,721) which is about One hundred and ninety four thousand, eighty hundred and fifty one dollars ($194,851) at one hundred and ninety seven naira to one US dollars, central bank Nigeria of exchange rate as at 14th March, 2015.

Keywords: building structures, building failure, building collapse, structural failure, cost, direct loss

Procedia PDF Downloads 233
186 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 229
185 Computational Approaches to Study Lineage Plasticity in Human Pancreatic Ductal Adenocarcinoma

Authors: Almudena Espin Perez, Tyler Risom, Carl Pelz, Isabel English, Robert M. Angelo, Rosalie Sears, Andrew J. Gentles

Abstract:

Pancreatic ductal adenocarcinoma (PDAC) is one of the most deadly malignancies. The role of the tumor microenvironment (TME) is gaining significant attention in cancer research. Despite ongoing efforts, the nature of the interactions between tumors, immune cells, and stromal cells remains poorly understood. The cell-intrinsic properties that govern cell lineage plasticity in PDAC and extrinsic influences of immune populations require technically challenging approaches due to the inherently heterogeneous nature of PDAC. Understanding the cell lineage plasticity of PDAC will improve the development of novel strategies that could be translated to the clinic. Members of the team have demonstrated that the acquisition of ductal to neuroendocrine lineage plasticity in PDAC confers therapeutic resistance and is a biomarker of poor outcomes in patients. Our approach combines computational methods for deconvolving bulk transcriptomic cancer data using CIBERSORTx and high-throughput single-cell imaging using Multiplexed Ion Beam Imaging (MIBI) to study lineage plasticity in PDAC and its relationship to the infiltrating immune system. The CIBERSORTx algorithm uses signature matrices from immune cells and stroma from sorted and single-cell data in order to 1) infer the fractions of different immune cell types and stromal cells in bulked gene expression data and 2) impute a representative transcriptome profile for each cell type. We studied a unique set of 300 genomically well-characterized primary PDAC samples with rich clinical annotation. We deconvolved the PDAC transcriptome profiles using CIBERSORTx, leveraging publicly available single-cell RNA-seq data from normal pancreatic tissue and PDAC to estimate cell type proportions in PDAC, and digitally reconstruct cell-specific transcriptional profiles from our study dataset. We built signature matrices and optimized by simulations and comparison to ground truth data. We identified cell-type-specific transcriptional programs that contribute to cancer cell lineage plasticity, especially in the ductal compartment. We also studied cell differentiation hierarchies using CytoTRACE and predict cell lineage trajectories for acinar and ductal cells that we believe are pinpointing relevant information on PDAC progression. Collaborators (Angelo lab, Stanford University) has led the development of the Multiplexed Ion Beam Imaging (MIBI) platform for spatial proteomics. We will use in the very near future MIBI from tissue microarray of 40 PDAC samples to understand the spatial relationship between cancer cell lineage plasticity and stromal cells focused on infiltrating immune cells, using the relevant markers of PDAC plasticity identified from the RNA-seq analysis.

Keywords: deconvolution, imaging, microenvironment, PDAC

Procedia PDF Downloads 96
184 Analysis and Modeling of Vibratory Signals Based on LMD for Rolling Bearing Fault Diagnosis

Authors: Toufik Bensana, Slimane Mekhilef, Kamel Tadjine

Abstract:

The use of vibration analysis has been established as the most common and reliable method of analysis in the field of condition monitoring and diagnostics of rotating machinery. Rolling bearings cover a broad range of rotary machines and plays a crucial role in the modern manufacturing industry. Unfortunately, the vibration signals collected from a faulty bearing are generally non-stationary, nonlinear and with strong noise interference, so it is essential to obtain the fault features correctly. In this paper, a novel numerical analysis method based on local mean decomposition (LMD) is proposed. LMD decompose the signal into a series of product functions (PFs), each of which is the product of an envelope signal and a purely frequency modulated FM signal. The envelope of a PF is the instantaneous amplitude (IA) and the derivative of the unwrapped phase of a purely flat frequency demodulated (FM) signal is the IF. After that, the fault characteristic frequency of the roller bearing can be extracted by performing spectrum analysis to the instantaneous amplitude of PF component containing dominant fault information. the results show the effectiveness of the proposed technique in fault detection and diagnosis of rolling element bearing.

Keywords: fault diagnosis, local mean decomposition, rolling element bearing, vibration analysis

Procedia PDF Downloads 374
183 A Method for False Alarm Recognition Based on Multi-Classification Support Vector Machine

Authors: Weiwei Cui, Dejian Lin, Leigang Zhang, Yao Wang, Zheng Sun, Lianfeng Li

Abstract:

Built-in test (BIT) is an important technology in testability field, and it is widely used in state monitoring and fault diagnosis. With the improvement of modern equipment performance and complexity, the scope of BIT becomes larger, and it leads to the emergence of false alarm problem. The false alarm makes the health assessment unstable, and it reduces the effectiveness of BIT. The conventional false alarm suppression methods such as repeated test and majority voting cannot meet the requirement for a complicated system, and the intelligence algorithms such as artificial neural networks (ANN) are widely studied and used. However, false alarm has a very low frequency and small sample, yet a method based on ANN requires a large size of training sample. To recognize the false alarm, we propose a method based on multi-classification support vector machine (SVM) in this paper. Firstly, we divide the state of a system into three states: healthy, false-alarm, and faulty. Then we use multi-classification with '1 vs 1' policy to train and recognize the state of a system. Finally, an example of fault injection system is taken to verify the effectiveness of the proposed method by comparing ANN. The result shows that the method is reasonable and effective.

Keywords: false alarm, fault diagnosis, SVM, k-means, BIT

Procedia PDF Downloads 115
182 Studies on Influence of Rub on Vibration Signature of Rotating Machines

Authors: K. N. Umesh, K. S. Srinivasan

Abstract:

The influence of rotor rub was studied with respect to light rub and heavy rub conditions. The investigations were carried out for both below and above critical speeds. The time domain waveform has revealed truncation of the waveform during rubbing conditions. The quantum of rubbing has been indicated by the quantum of truncation. The orbits for light rub have indicated a single loop whereas for heavy rub multi looped orbits have been observed. In the heavy rub condition above critical speed both sub harmonics and super harmonics are exhibited. The orbit precess in a direction opposite to the direction of the rotation of the rotor. When the rubbing was created above the critical speed the orbit shape was of '8' shape indicating the rotor instability. Super-harmonics and sub-harmonics of vibration signals have been observed for light rub and heavy rub conditions and for speeds above critical.

Keywords: rotor rub, orbital analysis, frequency analysis, vibration signatures

Procedia PDF Downloads 290
181 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN

Procedia PDF Downloads 303
180 Auteur 3D Filmmaking: From Hitchcock’s Protrusion Technique to Godard’s Immersion Aesthetic

Authors: Delia Enyedi

Abstract:

Throughout film history, the regular return of 3D cinema has been discussed in connection to crises caused by the advent of television or the competition of the Internet. In addition, the three waves of stereoscopic 3D (from 1952 up to 1983) and its current digital version have been blamed for adding a challenging technical distraction to the viewing experience. By discussing the films Dial M for Murder (1954) and Goodbye to Language (2014), the paper aims to analyze the response of recognized auteurs to the use of 3D techniques in filmmaking. For Alfred Hitchcock, the solution to attaining perceptual immersion paradoxically resided in restraining the signature effect of 3D, namely protrusion. In Jean-Luc Godard’s vision, 3D techniques allowed him to explore perceptual absorption by means of depth of field, for which he had long advocated as being central to cinema. Thus, both directors contribute to the foundation of an auteur aesthetic in 3D filmmaking.

Keywords: Alfred Hitchcock, authorship, 3D filmmaking, Jean-Luc Godard, perceptual absorption, perceptual immersion

Procedia PDF Downloads 263
179 Prevalence of Iron Deficiency Anaemia and Its Impact on Nutritional Status of Rural Pregnant Women

Authors: Nuzhat Sultana

Abstract:

Iron deficiency (IDA) is the commonest nutritional anemia present in Indian pregnant women. The overall development of a fetus is determined to a great extent by the type of nourishment mother receives right from its conception. To study the risk factors of iron deficiency anemia, two hundred rural pregnant women in the age of 15-35 years in the second trimester of pregnancy from the countryside of Beed district was selected. These samples were divided into groups 'A' (experimental samples) and 'C' (control samples). Experimental samples were received oral supplementation of iron and folic acid for ninety days, but control samples did not receive any supplementation. All the samples were observed anthropometrically, biochemically and clinically before and after supplementation. The study result shows that maximum numbers of i.e. 75% pregnant women had low levels of weight and hemoglobin as compared to standard weight and HB level. However, after supplementation only in experimental group weight and HB level was increased. It was observed that prevalence of risk factors associated with anemia was higher in rural pregnant women. Poverty, illiteracy, faulty food habits, and poor intake of iron during pregnancy are the main causative factors for iron deficiency anemia in rural pregnant women.

Keywords: iron deficiency, anemia, risk factors, pregnancy

Procedia PDF Downloads 383
178 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 133
177 Investigations on Microstructural and Raman Scattering Properties of B2O3 Doped Ba(Ti1-xZrx)O3 Nanoceramics

Authors: Keri̇m Emre Öksüz, Şaduman Şen, Uğur Şen

Abstract:

0.5 wt. % B2O3–doped Ba (Ti1-xZrx) O3, (x=0-0.4) lead-free nanoceramics were synthesized using the solid-state reaction method by adopting the ball milling technique. The influence of the substitution content on crystallographic structure, phase transition, microstructure and sintering behaviour of BT and BZT ceramics were investigated. XRD analysis at room temperature revealed a structural transformation from tetragonal to rhombohedral with enhancement of ZrO2 content in the barium titanate matrix. The scanning electron microscope (SEM) and energy-dispersive X-ray spectroscopy (EDS) were used to investigate microstructure and surface morphology of the sintered samples. The evolution of the Raman spectra was studied for various compositions, and the spectroscopic signature of the corresponding phase was determined. Scanning Electron Microscope (SEM) observations revealed enhanced microstructural uniformity and retarded grain growth with increasing Zr content.

Keywords: BaTiO3, barium-titanate-zirconate, nanoceramics, raman spectroscopy

Procedia PDF Downloads 314
176 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile

Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho

Abstract:

An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.

Keywords: air to air missile, missile approach warning, lethal range, survivability

Procedia PDF Downloads 526
175 Analysis of Vibratory Signals Based on Local Mean Decomposition (LMD) for Rolling Bearing Fault Diagnosis

Authors: Toufik Bensana, Medkour Mihoub, Slimane Mekhilef

Abstract:

The use of vibration analysis has been established as the most common and reliable method of analysis in the field of condition monitoring and diagnostics of rotating machinery. Rolling bearings cover a broad range of rotary machines and plays a crucial role in the modern manufacturing industry. Unfortunately, the vibration signals collected from a faulty bearing are generally nonstationary, nonlinear and with strong noise interference, so it is essential to obtain the fault features correctly. In this paper, a novel numerical analysis method based on local mean decomposition (LMD) is proposed. LMD decompose the signal into a series of product functions (PFs), each of which is the product of an envelope signal and a purely frequency modulated FM signal. The envelope of a PF is the instantaneous amplitude (IA), and the derivative of the unwrapped phase of a purely flat frequency demodulated (FM) signal is the IF. After that, the fault characteristic frequency of the roller bearing can be extracted by performing spectrum analysis to the instantaneous amplitude of PF component containing dominant fault information. The results show the effectiveness of the proposed technique in fault detection and diagnosis of rolling element bearing.

Keywords: fault diagnosis, rolling element bearing, local mean decomposition, condition monitoring

Procedia PDF Downloads 360
174 A Mimetic Textuality in Robert Frost's 'Nothing Gold Can Stay'

Authors: Kurt S. Candilas

Abstract:

This study is a critical analysis of the work of Robert Frost, 'Nothing Gold Can Stay'. It subjects the literary piece into a qualitative analysis using the critical theory of mimesis. In effect, this study is proposed to find out and shed light on the mimetic feature of the poem’s textuality. Generally, it aims to analyze the poem’s deeper meaning in the context of the reality of life from birth to death. For the most part, this critical analysis discerns, investigates, and highlights the features which present the imitation of life in detail and from a deeper view. Based on the result of analysis, it shows that Frost has portrayed the cycle of life from birth to midst life as about proving oneself to others as far as achievements and accomplishments are concerned; secondly, at some point of one’s life, successes and achievements are just one’s perfect signature of living. As Frost discloses his poem, his message of the reality of life from birth to death is clear enough, that nothing is going to last forever.

Keywords: Nothing Gold Can Stay, mimesis, birth, death

Procedia PDF Downloads 442
173 Enhanced Test Scheme based on Programmable Write Time for Future Computer Memories

Authors: Nor Zaidi Haron, Fauziyah Salehuddin, Norsuhaidah Arshad, Sani Irwan Salim

Abstract:

Resistive random access memories (RRAMs) are one of the main candidates for future computer memories. However, due to their tiny size and immature device technology, the quality of the outgoing RRAM chips is seen as a serious issue. Defective RRAM cells might behave differently than existing semiconductor memories (Dynamic RAM, Static RAM, and Flash), meaning that they are difficult to be detected using existing test schemes. This paper presents an enhanced test scheme, referred to as Programmable Short Write Time (PSWT) that is able to improve the detection of faulty RRAM cells. It is developed by applying multiple weak write operations, each with different time durations. The test circuit embedded in the RRAM chip is made programmable in order to supply different weak write times during testing. The RRAM electrical model is described using Verilog-AMS language and is simulated using HSPICE simulation tools. Simulation results show that the proposed test scheme offers better open-resistive fault detection compared to existing test schemes.

Keywords: memory fault, memory test, design-for-testability, resistive random access memory

Procedia PDF Downloads 351
172 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 309
171 Optimization Query Image Using Search Relevance Re-Ranking Process

Authors: T. G. Asmitha Chandini

Abstract:

Web-based image search re-ranking, as an successful method to get better the results. In a query keyword, the first stair is store the images is first retrieve based on the text-based information. The user to select a query keywordimage, by using this query keyword other images are re-ranked based on their visual properties with images.Now a day to day, people projected to match images in a semantic space which is used attributes or reference classes closely related to the basis of semantic image. though, understanding a worldwide visual semantic space to demonstrate highly different images from the web is difficult and inefficient. The re-ranking images, which automatically offline part learns dissimilar semantic spaces for different query keywords. The features of images are projected into their related semantic spaces to get particular images. At the online stage, images are re-ranked by compare their semantic signatures obtained the semantic précised by the query keyword image. The query-specific semantic signatures extensively improve both the proper and efficiency of image re-ranking.

Keywords: Query, keyword, image, re-ranking, semantic, signature

Procedia PDF Downloads 526
170 Long Term Love Relationships Analyzed as a Dynamic System with Random Variations

Authors: Nini Johana Marín Rodríguez, William Fernando Oquendo Patino

Abstract:

In this work, we model a coupled system where we explore the effects of steady and random behavior on a linear system like an extension of the classic Strogatz model. This is exemplified by modeling a couple love dynamics as a linear system of two coupled differential equations and studying its stability for four types of lovers chosen as CC='Cautious- Cautious', OO='Only other feelings', OP='Opposites' and RR='Romeo the Robot'. We explore the effects of, first, introducing saturation, and second, adding a random variation to one of the CC-type lover, which will shape his character by trying to model how its variability influences the dynamics between love and hate in couple in a long run relationship. This work could also be useful to model other kind of systems where interactions can be modeled as linear systems with external or internal random influence. We found the final results are not easy to predict and a strong dependence on initial conditions appear, which a signature of chaos.

Keywords: differential equations, dynamical systems, linear system, love dynamics

Procedia PDF Downloads 324
169 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak

Abstract:

Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 285