Search results for: lock-free hash table
589 Improve B-Tree Index’s Performance Using Lock-Free Hash Table
Authors: Zhanfeng Ma, Zhiping Xiong, Hu Yin, Zhengwei She, Aditya P. Gurajada, Tianlun Chen, Ying Li
Abstract:
Many RDBMS vendors use B-tree index to achieve high performance for point queries and range queries, and some of them also employ hash index to further enhance the performance as hash table is more efficient for point queries. However, there are extra overheads to maintain a separate hash index, for example, hash mapping for all data records must always be maintained, which results in more memory space consumption; locking, logging and other mechanisms are needed to guarantee ACID, which affects the concurrency and scalability of the system. To relieve the overheads, Hash Cached B-tree (HCB) index is proposed in this paper, which consists of a standard disk-based B-tree index and an additional in-memory lock-free hash table. Initially, only the B-tree index is constructed for all data records, the hash table is built on the fly based on runtime workload, only data records accessed by point queries are indexed using hash table, this helps reduce the memory footprint. Changes to hash table are done using compare-and-swap (CAS) without performing locking and logging, this helps improve the concurrency and avoid contention. The hash table is also optimized to be cache conscious. HCB index is implemented in SAP ASE database, compared with the standard B-tree index, early experiments and customer adoptions show significant performance improvement. This paper provides an overview of the design of HCB index and reports the experimental results.Keywords: B-tree, compare-and-swap, lock-free hash table, point queries, range queries, SAP ASE database
Procedia PDF Downloads 285588 New Two-Way Map-Reduce Join Algorithm: Hash Semi Join
Authors: Marwa Hussein Mohamed, Mohamed Helmy Khafagy, Samah Ahmed Senbel
Abstract:
Map Reduce is a programming model used to handle and support massive data sets. Rapidly increasing in data size and big data are the most important issue today to make an analysis of this data. map reduce is used to analyze data and get more helpful information by using two simple functions map and reduce it's only written by the programmer, and it includes load balancing , fault tolerance and high scalability. The most important operation in data analysis are join, but map reduce is not directly support join. This paper explains two-way map-reduce join algorithm, semi-join and per split semi-join, and proposes new algorithm hash semi-join that used hash table to increase performance by eliminating unused records as early as possible and apply join using hash table rather than using map function to match join key with other data table in the second phase but using hash tables isn't affecting on memory size because we only save matched records from the second table only. Our experimental result shows that using a hash table with hash semi-join algorithm has higher performance than two other algorithms while increasing the data size from 10 million records to 500 million and running time are increased according to the size of joined records between two tables.Keywords: map reduce, hadoop, semi join, two way join
Procedia PDF Downloads 512587 Generation of Symmetric Key Using Randomness of Hash Function
Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar
Abstract:
In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation
Procedia PDF Downloads 159586 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 427585 A Method of the Semantic on Image Auto-Annotation
Authors: Lin Huo, Xianwei Liu, Jingxiong Zhou
Abstract:
Recently, due to the existence of semantic gap between image visual features and human concepts, the semantic of image auto-annotation has become an important topic. Firstly, by extract low-level visual features of the image, and the corresponding Hash method, mapping the feature into the corresponding Hash coding, eventually, transformed that into a group of binary string and store it, image auto-annotation by search is a popular method, we can use it to design and implement a method of image semantic auto-annotation. Finally, Through the test based on the Corel image set, and the results show that, this method is effective.Keywords: image auto-annotation, color correlograms, Hash code, image retrieval
Procedia PDF Downloads 496584 Improved Hash Value Based Stream CipherUsing Delayed Feedback with Carry Shift Register
Authors: K. K. Soundra Pandian, Bhupendra Gupta
Abstract:
In the modern era, as the application data’s are massive and complex, it needs to be secured from the adversary attack. In this context, a non-recursive key based integrated spritz stream cipher with the circulant hash function using delayed feedback with carry shift register (d-FCSR) is proposed in this paper. The novelty of this proposed stream cipher algorithm is to engender the improved keystream using d-FCSR. The proposed algorithm is coded using Verilog HDL to produce dynamic binary key stream and implemented on commercially available FPGA device Virtex 5 xc5vlx110t-2ff1136. The implementation of stream cipher using d-FCSR on the FPGA device operates at a maximum frequency of 60.62 MHz. It achieved the data throughput of 492 Mbps and improved in terms of efficiency (throughput/area) compared to existing techniques. This paper also briefs the cryptanalysis of proposed circulant hash value based spritz stream cipher using d-FCSR is against the adversary attack on a hardware platform for the hardware based cryptography applications.Keywords: cryptography, circulant function, field programmable gated array, hash value, spritz stream cipher
Procedia PDF Downloads 248583 A Survey on Compression Methods for Table Constraints
Authors: N. Gharbi
Abstract:
Constraint Satisfaction problems are mathematical problems that are often used to model many real-world problems for which we look if there exists a solution satisfying all its constraints. Table constraints are important for modeling parts of many problems since they list all combinations of allowed or forbidden values. However, they admit practical limitations because they are sometimes too large to be represented in a direct way. In this paper, we present a survey of the different categories of the proposed approaches to compress table constraints in order to reduce both space and time complexities.Keywords: constraint programming, compression, data mining, table constraints
Procedia PDF Downloads 324582 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.Keywords: cloud storage security, sharing storage, attributes, Hash algorithm
Procedia PDF Downloads 389581 Lookup Table Reduction and Its Error Analysis of Hall Sensor-Based Rotation Angle Measurement
Authors: Young-San Shin, Seongsoo Lee
Abstract:
Hall sensor is widely used to measure rotation angle. When the Hall voltage is measured for linear displacement, it is converted to angular displacement using arctangent function, which requires a large lookup table. In this paper, a lookup table reduction technique is presented for angle measurement. When the input of the lookup table is small within a certain threshold, the change of the outputs with respect to the change of the inputs is relatively small. Thus, several inputs can share same output, which significantly reduce the lookup table size. Its error analysis was also performed, and the threshold was determined so as to maintain the error less than 1°. When the Hall voltage has 11-bit resolution, the lookup table size is reduced from 1,024 samples to 279 samples.Keywords: hall sensor, angle measurement, lookup table, arctangent
Procedia PDF Downloads 336580 Derivation of Technology Element for Automation in Table Formwork in a Tall Building Construction
Authors: Junehyuck Lee, Dongmin Lee, Hunhee Cho, Kyung-In Kang
Abstract:
A table formwork method has recently been widely applied in reinforced concrete structures in a tall building construction to improve safety and productivity. However, this method still depended mainly on manpower. Therefore, this study aimed at derivation of technology element to apply the automation in table formwork in a tall building construction. These results will contribute to improve productivity and labor saving in table formwork in tall building construction.Keywords: table form, tall building, automation, productivity
Procedia PDF Downloads 398579 The Effect of Static Balance Enhance by Table Tennis Training Intervening on Deaf Children
Authors: Yi-Chun Chang, Ching-Ting Hsu, Wei-Hua Ho, Yueh-Tung Kuo
Abstract:
Children with hearing impairment have deficits of balance and motors. Although most of parents teach deaf children communication skills in early life, but rarely teach the deficits of balance. The purpose of this study was to investigate whether static balance improved after table tennis training. Table tennis training was provided four times a week for eight weeks to two 12-year-old deaf children. The table tennis training included crossover footwork, sideway attack, backhand block-sideways-flutter forehand attack, and one-on-one tight training. Data were gathered weekly and statistical comparisons were made with a paired t-test. We observed that the dominant leg is better than the non-dominant leg in static balance and girl balance ability is better than boy. The final result shows that table tennis training significantly improves the deaf children’s static balance performance. It indicates that table tennis training on deaf children helps the static balance ability.Keywords: deaf children, static balance, table tennis, vestibular structure
Procedia PDF Downloads 432578 Preparation of Regional Input-Output Table for Fars Province in 2011: GRIT1Method
Authors: Maryam Akbarzadeh, F. Esmaeilzadeh, A. Poostvar, M. Manuchehri
Abstract:
Preparation of regional input-output tables requires statistical methods combined with high costs and too much time. Obtained estimates by non-statistical methods have low confidence coefficient. Therefore, integrated methods for this purpose are suggested by recent input–output studies. In this study, first GRIT method is introduced as an appropriate integrated method for preparation of input-output table of Fars province. Next, input-output table is prepared for Fars province using this method. Therefore, this study is based on input-output table of national economy in 2001. Necessary modifications performed in the field of changes at level of prices and differences of regional trade compared with other areas at national level. Moreover, up to date statistics and information and technical experts view on the various economic sectors along with input-output table 33 was used in 2011 followed by investigation of general structure of the province economy based on the amounts of added value obtained from this table.Keywords: grit, input-output, table, regional
Procedia PDF Downloads 259577 Correlation between Physical Fitness and Performance and Grade of Table Tennis of Middle School Students
Authors: Yisong Cong, Mingming Guo, Xiaozan Wang, Yizhi Zhang, Qingqing Yuan
Abstract:
This study is to test the correlation between the Physical Fitness (PF) of middle school students and their performance and sports grade of table tennis. Methods: 398 middle school students from Shanghai Tongji No.2 Middle School participated in the study, including 232 boys and 166 girls. Each participant participated in the Chinese Students’ Physical Fitness Test (CSPFT), including BMI, 50-meter running, vital capacity, sitting body flexion, standing long jump, 800-meter running, 1000-meter running, pull-ups, and sit-ups. Test scores were converted to a percentage score according to the CSPFT guidelines. In addition, each student participated in the Nation Junior Table Tennis grade test, and completed the table tennis sports grade assessment of 1-9. Results: There is a significant positive correlation between the scores of multiple PF tests and the total scores of table tennis, such as BMI (r = 0.15, p < 0.01), standing long jump (r = 0.15, p < 0.05), 800-meter run (r = 0.02, p <0.01); The scores of multiple PF are positively correlated with table tennis grade, such as vital capacity (r = 0.1, p < 0.01) and 50-meter running (r = 0.18, p < 0.05). At the same time, the sit-ups performance showed a significant negative correlation with the table tennis performance (r = -0.08, p < 0.01); There is no significant correlation between the other PF indicators and the performance and grade of table tennis. Conclusions: This study shows that there is a corresponding relationship between some PF indicators of middle school students and their table tennis performance and table tennis grade,but the specific form and reason of the relationship need to be further explored.Keywords: middle school students, physical fitness, table tennis grade, table tennis performance
Procedia PDF Downloads 159576 Association Between Hip Internal and External Rotation Range of Motion and Low Back Pain in Table Tennis Players
Authors: Kaili Wang, Botao Zhang, Enming Zhang
Abstract:
Background: Low back pain (LBP) is a common problem affecting athletes' training and competition. Although the association between a limited hip range of motion and prevalence of low back pain has been studied extensively, it has not been studied in table tennis. Aim: The main purposes of this study in table tennis players were (1) to investigate if there is a difference in hip internal rotation (HIR) and external rotation (HER) range of motion (ROM) between players with LBP and players without LBP and (2) to analyze the association between HIR and HER ROM and LBP. Methods: Forty-six table tennis players from the Chinese table tennis team were evaluated for passive maximum HIR and HER ROM. LBP was retrospectively recorded for the last 12 months before the date of ROM assessment by a physical therapist. The data were analyzed the difference in HIR and HER ROM between players with LBP and players without LBP by Mann-Whitney U test, and the association between the difference in HIR and HER ROM and LBP was analyzed via a binary logistic regression. Results: The 54% of players had developed LBP during the retrospective study period. Significant difference between LBP group and the asymptomatic group for HIR ROM (z=4.007, p<0.001) was observed. Difference between LBP group and asymptomatic group for HER ROM (z=1.117, p=0.264) was not significant. Players who had HIR ROM deficit had an increased risk of LBP compared with players without HIR ROM deficit (OR=5.344, 95%CI: 1.006-28.395, P=0.049). Conclusion: HIR ROM of a table tennis player with LBP was less than a table tennis player without LBP. Compared with player whose HIR ROM was normal, player who had HIR ROM deficit appeared to have a higher risk for LBP.Keywords: assessment, injury prevention, low back pain, table tennis players
Procedia PDF Downloads 111575 Seismic Response of Structure Using a Three Degree of Freedom Shake Table
Authors: Ketan N. Bajad, Manisha V. Waghmare
Abstract:
Earthquakes are the biggest threat to the civil engineering structures as every year it cost billions of dollars and thousands of deaths, around the world. There are various experimental techniques such as pseudo-dynamic tests – nonlinear structural dynamic technique, real time pseudo dynamic test and shaking table test method that can be employed to verify the seismic performance of structures. Shake table is a device that is used for shaking structural models or building components which are mounted on it. It is a device that simulates a seismic event using existing seismic data and nearly truly reproducing earthquake inputs. This paper deals with the use of shaking table test method to check the response of structure subjected to earthquake. The various types of shake table are vertical shake table, horizontal shake table, servo hydraulic shake table and servo electric shake table. The goal of this experiment is to perform seismic analysis of a civil engineering structure with the help of 3 degree of freedom (i.e. in X Y Z direction) shake table. Three (3) DOF shaking table is a useful experimental apparatus as it imitates a real time desired acceleration vibration signal for evaluating and assessing the seismic performance of structure. This study proceeds with the proper designing and erection of 3 DOF shake table by trial and error method. The table is designed to have a capacity up to 981 Newton. Further, to study the seismic response of a steel industrial building, a proportionately scaled down model is fabricated and tested on the shake table. The accelerometer is mounted on the model, which is used for recording the data. The experimental results obtained are further validated with the results obtained from software. It is found that model can be used to determine how the structure behaves in response to an applied earthquake motion, but the model cannot be used for direct numerical conclusions (such as of stiffness, deflection, etc.) as many uncertainties involved while scaling a small-scale model. The model shows modal forms and gives the rough deflection values. The experimental results demonstrate shake table as the most effective and the best of all methods available for seismic assessment of structure.Keywords: accelerometer, three degree of freedom shake table, seismic analysis, steel industrial shed
Procedia PDF Downloads 139574 Empowering Certificate Management with Blockchain Technology
Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware
Abstract:
The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker
Procedia PDF Downloads 45573 Effectiveness of Lowering the Water Table as a Mitigation Measure for Foundation Settlement in Liquefiable Soils Using 1-g Scale Shake Table Test
Authors: Kausar Alam, Mohammad Yazdi, Peiman Zogh, Ramin Motamed
Abstract:
An earthquake is an unpredictable natural disaster. It induces liquefaction, which causes considerable damage to the structure, life support, and piping systems because of ground settlement. As a result, people are incredibly concerned about how to resolve the situation. Previous researchers adopted different ground improvement techniques to reduce the settlement of the structure during earthquakes. This study evaluates the effectiveness of lowering the water table as a technique to mitigate foundation settlement in liquefiable soil. The performance will be evaluated based on foundation settlement and the reduction of excessive pore water pressure. In this study, a scaled model was prepared based on a full-scale shale table experiment conducted at the University of California, San Diego (UCSD). The model ground consists of three soil layers having a relative density of 55%, 45%, and 90%, respectively. A shallow foundation is seated over an unsaturated crust layer. After preparation of the model ground, the water table was measured to be at 45, 40, and 35 cm (from the bottom). Then, the input motions were applied for 10 seconds, with a peak acceleration of 0.25g and a constant frequency of 2.73 Hz. Based on the experimental results, the effectiveness of the lowering water table in reducing the foundation settlement and excess pore water pressure was evident. The foundation settlement was reduced from 50 mm to 5 mm. In addition, lowering the water table as a mitigation measure is a cost-effective way to decrease liquefaction-induced building settlement.Keywords: foundation settlement, ground water table, liquefaction, hake table test
Procedia PDF Downloads 113572 Improved Impossible Differential Cryptanalysis of Midori64
Authors: Zhan Chen, Wenquan Bi, Xiaoyun Wang
Abstract:
The Midori family of light weight block cipher is proposed in ASIACRYPT2015. It has attracted the attention of numerous cryptanalysts. There are two versions of Midori: Midori64 which takes a 64-bit block size and Midori128 the size of which is 128-bit. In this paper an improved 10-round impossible differential attack on Midori64 is proposed. Pre-whitening keys are considered in this attack. A better impossible differential path is used to reduce time complexity by decreasing the number of key bits guessed. A hash table is built in the pre-computation phase to reduce computational complexity. Partial abort technique is used in the key seiving phase. The attack requires 259 chosen plaintexts, 214.58 blocks of memory and 268.83 10-round Midori64 encryptions.Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori
Procedia PDF Downloads 347571 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 50570 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools
Abstract:
Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.Keywords: block matching, digital evidence, hash list, evaluation of digital evidence
Procedia PDF Downloads 254569 Traverse Surveying Table Simple and Sure
Authors: Hamid Fallah
Abstract:
Creating surveying stations is the first thing that a surveyor learns; they can use it for control and implementation in projects such as buildings, roads, tunnels, monitoring, etc., whatever is related to the preparation of maps. In this article, the method of calculation through the traverse table and by checking several examples of errors of several publishers of surveying books in the calculations of this table, we also control the results of several software in a simple way. Surveyors measure angles and lengths in creating surveying stations, so the most important task of a surveyor is to be able to correctly remove the error of angles and lengths from the calculations and to determine whether the amount of error is within the permissible limit for delete it or not.Keywords: UTM, localization, scale factor, cartesian, traverse
Procedia PDF Downloads 81568 Clustering Based and Centralized Routing Table Topology of Control Protocol in Mobile Wireless Sensor Networks
Authors: Mbida Mohamed, Ezzati Abdellah
Abstract:
A strong challenge in the wireless sensor networks (WSN) is to save the energy and have a long life time in the network without having a high rate of loss information. However, topology control (TC) protocols are designed in a way that the network is divided and having a standard system of exchange packets between nodes. In this article, we will propose a clustering based and centralized routing table protocol of TC (CBCRT) which delegates a leader node that will encapsulate a single routing table in every cluster nodes. Hence, if a node wants to send packets to the sink, it requests the information's routing table of the current cluster from the node leader in order to root the packet.Keywords: mobile wireless sensor networks, routing, topology of control, protocols
Procedia PDF Downloads 272567 Taylor’s Law and Relationship between Life Expectancy at Birth and Variance in Age at Death in Period Life Table
Authors: David A. Swanson, Lucky M. Tedrow
Abstract:
Taylor’s Law is a widely observed empirical pattern that relates variances to means in sets of non-negative measurements via an approximate power function, which has found application to human mortality. This study adds to this research by showing that Taylor’s Law leads to a model that reasonably describes the relationship between life expectancy at birth (e0, which also is equal to mean age at death in a life table) and variance at age of death in seven World Bank regional life tables measured at two points in time, 1970 and 2000. Using as a benchmark a non-random sample of four Japanese female life tables covering the period from 1950 to 2004, the study finds that the simple linear model provides reasonably accurate estimates of variance in age at death in a life table from e0, where the latter range from 60.9 to 85.59 years. Employing 2017 life tables from the Human Mortality Database, the simple linear model is used to provide estimates of variance at age in death for six countries, three of which have high e0 values and three of which have lower e0 values. The paper provides a substantive interpretation of Taylor’s Law relative to e0 and concludes by arguing that reasonably accurate estimates of variance in age at death in a period life table can be calculated using this approach, which also can be used where e0 itself is estimated rather than generated through the construction of a life table, a useful feature of the model.Keywords: empirical pattern, mean age at death in a life table, mean age of a stationary population, stationary population
Procedia PDF Downloads 330566 An Optimized Approach to Generate the Possible States of Football Tournaments Final Table
Authors: Mouslem Damkhi
Abstract:
This paper focuses on possible states of a football tournament final table according to the number of participating teams. Each team holds a position in the table with which it is possible to determine the highest and lowest points for that team. This paper proposes an optimized search space based on the minimum and maximum number of points which can be gained by each team to produce and enumerate the possible states for a football tournament final table. The proposed search space minimizes producing the invalid states which cannot occur during a football tournament. The generated states are filtered by a validity checking algorithm which seeks to reach a tournament graph based on a generated state. Thus, the algorithm provides a way to determine which team’s wins, draws and loses values guarantee a particular table position. The paper also presents and discusses the experimental results of the approach on the tournaments with up to eight teams. Comparing with a blind search algorithm, our proposed approach reduces generating the invalid states up to 99.99%, which results in a considerable optimization in term of the execution time.Keywords: combinatorics, enumeration, graph, tournament
Procedia PDF Downloads 122565 Shaking Table Test and Seismic Performance Evaluation of Spring Viscous Damper Cable System
Authors: Asad Naeem, Jinkoo Kim
Abstract:
This research proposes a self-centering passive damping system consisting of a spring viscous damper linked with a preloaded tendon. The seismic performance of the spring viscous damper is evaluated by pseudo-dynamic tests, and the results are used for the formulation of an analytical model of the damper in the structural analysis program. The shaking table tests of a two-story steel frame installed with the proposed damping system are carried out using five different earthquake records. The results from the shaking table tests are verified by numerical simulation of the retrofitted structure. The results obtained from experiments and numerical simulations demonstrate that the proposed damping system with self-centering capability is effective in reducing earthquake-induced displacement and member forces.Keywords: seismic retrofit, spring viscous damper, shaking table test, earthquake resistant structures
Procedia PDF Downloads 178564 Experimental and Numerical Analysis of Mustafa Paşa Mosque in Skopje
Authors: Ozden Saygili, Eser Cakti
Abstract:
The masonry building stock in Istanbul and in other cities of Turkey are exposed to significant earthquake hazard. Determination of the safety of masonry structures against earthquakes is a complex challenge. This study deals with experimental tests and non-linear dynamic analysis of masonry structures modeled through discrete element method. The 1:10 scale model of Mustafa Paşa Mosque was constructed and the data were obtained from the sensors on it during its testing on the shake table. The results were used in the calibration/validation of the numerical model created on the basis of the 1:10 scale model built for shake table testing. 3D distinct element model was developed that represents the linear and nonlinear behavior of the shake table model as closely as possible during experimental tests. Results of numerical analyses with those from the experimental program were compared and discussed.Keywords: dynamic analysis, non-linear modeling, shake table tests, masonry
Procedia PDF Downloads 424563 Improving Traditional Methods of Handling Fish from Integrated Pond Culture Systems in Monai Village, New Bussa, Nigeria
Authors: Olokor O. Julius, Ngwu E. Onyebuchi, Ajani K. Emmanuel, Omitoyin O. Bamidele, Olokor O. Linda, Akomas Stella
Abstract:
The study assessed the quality changes of Clarias gariepenus obtained from integrated culture systems (rice, poultry and fish) which were displayed at 31-33oC average daily temperature on the traditional market table used by local fish farmers to sell fish harvested from their ponds and those on an improved table designed for this study. Unlike the conventional table, the improved table was screened against flies and indiscriminate touch by customers. The fishes were displayed on both tables for 9 hours and quality attributes were monitored hourly by trained panelists. For C. gariepinus, the gills, and intestine recorded faster deterioration starting from the fourth and fifth hours while those on the improved table were prolonged by one hour. Scores for skin brightness and texture did not indicate quality deterioration throughout the display period. However, at the end of the storage time, samples on the improved table recorded 1.5 x 104 cfu/g while samples in unscreened table recorded 3.7 x 10 7 cfu/g. The study shows how simple modifications of a traditional practice can help extend keeping qualities of farmed fish, reduce health hazards in local communities where there is no electricity to preserve fish in whatever form despite a boom in aquaculture. Monai community has a fish farm estate of over 200 small holder farmers with annual output capacity of over $10 million dollars. The simple improvement made to farmers practice in this study is to ensure Community hygiene and boost income of peasant fish farmers by improving the market quality of their products.Keywords: fish spoilage, improved handling, income generation, retail table
Procedia PDF Downloads 448562 Disturbance Observer-Based Predictive Functional Critical Control of a Table Drive System
Authors: Toshiyuki Satoh, Hiroki Hara, Naoki Saito, Jun-ya Nagase, Norihiko Saga
Abstract:
This paper addresses a control system design for a table drive system based on the disturbance observer (DOB)-based predictive functional critical control (PFCC). To empower the previously developed DOB-based PFC to handle constraints on controlled outputs, we propose to take a critical control approach. To this end, we derive the transfer function representation of the PFC controller, and yield a detailed design procedure. The effectiveness of the proposed method is confirmed through an experimental evaluation.Keywords: critical control, disturbance observer, mechatronics, motion control, predictive functional control, table drive systems
Procedia PDF Downloads 487561 Assess Changes in Groundwater Dynamics Caused by Mini Dam Construction in Arid Zone of District Killa Abdullah, Pakistan
Authors: Akhtar Malik Muhammad, Agha Mirwais
Abstract:
Dams are considered to recharge aquifers by raising the water table, especially the ones near wells. The present study investigates the impact of dams on groundwater recharge in Jilga, Pakistan. The comparative analysis of changes in the groundwater table of the year 2012 and 2019 was carried out using ArcGIS 10.5 through the kriging method and remote sensing techniques to evaluate the mini dam's impact on the upstream area. Arc Info Spatial Analyze extension was used to find static water level maps of the years. The water table was observed minimum 67.08 feet and maximum 130.09 feet in 2012 whereas in 2019 the minimum water table level 49.89 feet and maximum 115.85 feet. Groundwater recharge with different ratio was noted, but the most significant was at Rabbani dam with 26ft due to supported lithology conditions and the lowest recharge was found at Garang dam14ft. The overall positive trend indicates the rehabilitation of dead karez and agriculture activities by increasing 36% the vegetation area in 2019. An over 6% increase in human settlement indicates socioeconomic development. Thus, it highlights the need for preferential focus on the construction of the dam so that the water level could be sustained to cater to the agricultural and domestic needs of the local population around the yearKeywords: water table, GIS, land cover, mini dams, agriculture
Procedia PDF Downloads 83560 Spatial Data Mining by Decision Trees
Authors: Sihem Oujdi, Hafida Belbachir
Abstract:
Existing methods of data mining cannot be applied on spatial data because they require spatial specificity consideration, as spatial relationships. This paper focuses on the classification with decision trees, which are one of the data mining techniques. We propose an extension of the C4.5 algorithm for spatial data, based on two different approaches Join materialization and Querying on the fly the different tables. Similar works have been done on these two main approaches, the first - Join materialization - favors the processing time in spite of memory space, whereas the second - Querying on the fly different tables- promotes memory space despite of the processing time. The modified C4.5 algorithm requires three entries tables: a target table, a neighbor table, and a spatial index join that contains the possible spatial relationship among the objects in the target table and those in the neighbor table. Thus, the proposed algorithms are applied to a spatial data pattern in the accidentology domain. A comparative study of our approach with other works of classification by spatial decision trees will be detailed.Keywords: C4.5 algorithm, decision trees, S-CART, spatial data mining
Procedia PDF Downloads 612