Search results for: second magnetization peak anomaly
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1630

Search results for: second magnetization peak anomaly

1570 Algorithms for Fast Computation of Pan Matrix Profiles of Time Series Under Unnormalized Euclidean Distances

Authors: Jing Zhang, Daniel Nikovski

Abstract:

We propose an approximation algorithm called LINKUMP to compute the Pan Matrix Profile (PMP) under the unnormalized l∞ distance (useful for value-based similarity search) using double-ended queue and linear interpolation. The algorithm has comparable time/space complexities as the state-of-the-art algorithm for typical PMP computation under the normalized l₂ distance (useful for shape-based similarity search). We validate its efficiency and effectiveness through extensive numerical experiments and a real-world anomaly detection application.

Keywords: pan matrix profile, unnormalized euclidean distance, double-ended queue, discord discovery, anomaly detection

Procedia PDF Downloads 214
1569 Outdoor Anomaly Detection with a Spectroscopic Line Detector

Authors: O. J. G. Somsen

Abstract:

One of the tasks of optical surveillance is to detect anomalies in large amounts of image data. However, if the size of the anomaly is very small, limited information is available to distinguish it from the surrounding environment. Spectral detection provides a useful source of additional information and may help to detect anomalies with a size of a few pixels or less. Unfortunately, spectral cameras are expensive because of the difficulty of separating two spatial in addition to one spectral dimension. We investigate the possibility of modifying a simpler spectral line detector for outdoor detection. This may be especially useful if the area of interest forms a line, such as the horizon. We use a monochrome CCD that also enables detection into the near infrared. A simple camera is attached to the setup to determine which part of the environment is spectrally imaged. Our preliminary results indicate that sensitive detection of very small targets is indeed possible. Spectra could be taken from the various targets by averaging columns in the line image. By imaging a set of lines of various width we found narrow lines that could not be seen in the color image but remained visible in the spectral line image. A simultaneous analysis of the entire spectra can produce better results than visual inspection of the line spectral image. We are presently developing calibration targets for spatial and spectral focusing and alignment with the spatial camera. This will present improved results and more use in outdoor application

Keywords: anomaly detection, spectroscopic line imaging, image analysis, outdoor detection

Procedia PDF Downloads 453
1568 Reduction of Peak Input Currents during Charge Pump Boosting in Monolithically Integrated High-Voltage Generators

Authors: Jan Doutreloigne

Abstract:

This paper describes two methods for the reduction of the peak input current during the boosting of Dickson charge pumps. Both methods are implemented in the fully integrated Dickson charge pumps of a high-voltage display driver chip for smart-card applications. Experimental results reveal good correspondence with Spice simulations and show a reduction of the peak input current by a factor of 6 during boosting

Keywords: bi-stable display driver, Dickson charge pump, high-voltage generator, peak current reduction, sub-pump boosting, variable frequency boosting

Procedia PDF Downloads 416
1567 Enhancement of Long Term Peak Demand Forecast in Peninsular Malaysia Using Hourly Load Profile

Authors: Nazaitul Idya Hamzah, Muhammad Syafiq Mazli, Maszatul Akmar Mustafa

Abstract:

The peak demand forecast is crucial to identify the future generation plant up needed in the long-term capacity planning analysis for Peninsular Malaysia as well as for the transmission and distribution network planning activities. Currently, peak demand forecast (in Mega Watt) is derived from the generation forecast by using load factor assumption. However, a forecast using this method has underperformed due to the structural changes in the economy, emerging trends and weather uncertainty. The dynamic changes of these drivers will result in many possible outcomes of peak demand for Peninsular Malaysia. This paper will look into the independent model of peak demand forecasting. The model begins with the selection of driver variables to capture long-term growth. This selection and construction of variables, which include econometric, emerging trend and energy variables, will have an impact on the peak forecast. The actual framework begins with the development of system energy and load shape forecast by using the system’s hourly data. The shape forecast represents the system shape assuming all embedded technology and use patterns to continue in the future. This is necessary to identify the movements in the peak hour or changes in the system load factor. The next step would be developing the peak forecast, which involves an iterative process to explore model structures and variables. The final step is combining the system energy, shape, and peak forecasts into the hourly system forecast then modifying it with the forecast adjustments. Forecast adjustments are among other sales forecasts for electric vehicles, solar and other adjustments. The framework will result in an hourly forecast that captures growth, peak usage and new technologies. The advantage of this approach as compared to the current methodology is that the peaks capture new technology impacts that change the load shape.

Keywords: hourly load profile, load forecasting, long term peak demand forecasting, peak demand

Procedia PDF Downloads 130
1566 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
1565 Electro-oxidation of Catechol in the Presence of Nicotinamide at Different pH

Authors: M. A. Motin, M. A. Aziz, M. Hafiz Mia, M. A. Hasem

Abstract:

The redox behavior of catechol in the presence of nicotinamide as nucleophiles has been studied in aqueous solution with various pH values and different concentration of nicotinamide using cyclic voltammetry and differential pulse voltammetry. Cyclic voltammetry of catechol in buffer solution (3.00 < pH < 9.00) shows one anodic and corresponding cathodic peak which relates to the transformation of catechol to corresponding o-benzoquinone and vice versa within a quasi reversible two electron transfer process. Cyclic voltammogram of catechol in the presence of nicotinamide in buffer solution of pH 7, show one anodic peak in the first cycle of potential and on the reverse scan the corresponding cathodic peak slowly decreases and new peak is observed at less positive potential. In the second cycle of potential a new anodic peak is observed at less positive potential. This indicates that nicotinamide attached with catechol and formed adduct after first cycle of oxidation. The effect of pH of catechol in presence of nicotinamide was studied by varying pH from 3 to 11. The substitution reaction of catechol with nicotimamide is facilitated at pH 7. In buffer solution of higher pH (>9), the CV shows different pattern. The effect of concentration of nicotinamide was studied by 2mM to 100 mM. The maximum substitution reaction has been found for 50 mM of nicotinamide and of pH 7. The proportionality of the first scan anodic and cathodic peak currents with square root of scan rate suggests that the peak current of the species at each redox reaction is controlled by diffusion process. The current functions (1/v-1/2) of the anodic peak decreased with the increasing of scan rate demonstrated that the behavior of the substitution reaction is of ECE type.

Keywords: redox interaction, catechol, nicotinamide, substituion reaction, pH effect

Procedia PDF Downloads 430
1564 Approximation Algorithms for Peak-Demand Reduction

Authors: Zaid Jamal Saeed Almahmoud

Abstract:

Smart grid is emerging as the future power grid, with smart techniques to optimize power consumption and electricity generation. Minimizing peak power consumption under a fixed delay requirement is a significant problem in the smart grid.For this problem, all appliances must be scheduled within a given finite time duration. We consider the problem of minimizing the peak demand under appliances constraints by scheduling power jobs with uniform release dates and deadlines. As the problem is known to be NP-hard, we analyze the performance of a version of the natural greedy heuristic for solving this problem. Our theoretical analysis and experimental results show that the proposed heuristic outperforms existing methods by providing a better approximation to the optimal solution.

Keywords: peak demand scheduling, approximation algorithms, smart grid, heuristics

Procedia PDF Downloads 66
1563 Peak Floor Response for Buildings with Flexible Base

Authors: Luciano Roberto Fernandez-Sola, Cesar Augusto Arredondo-Velez, Miguel Angel Jaimes-Tellez

Abstract:

This paper explores the modifications on peak acceleration, velocity and displacement profiles over the structure due to dynamic soil-structure interaction (DSSI). A shear beam model is used for the structure. Soil-foundation flexibility (inertial interaction) is considered by a set of springs and dashpots at the structure base. Kinematic interaction is considered using transfer functions. Impedance functions are computed using simplified expressions for rigid foundations. The research studies the influence of the slenderness ratio on the value of the peak floor response. It is shown that the modifications of peak floor responses are not the same for acceleration, velocity and displacement. This is opposite to the hypothesis used by methods included in several building codes. Results show that modifications produced by DSSI on different response quantities are not equal.

Keywords: peak floor intensities, dynamic soil-structure interaction, buildings with flexible base, kinematic and inertial interaction

Procedia PDF Downloads 428
1562 Load Forecast of the Peak Demand Based on Both the Peak Demand and Its Location

Authors: Qais H. Alsafasfeh

Abstract:

The aim of this paper is to provide a forecast of the peak demand for the next 15 years for electrical distribution companies. The proposed methodology provides both the peak demand and its location for the next 15 years. This paper describes the Spatial Load Forecasting model used, the information provided by electrical distribution company in Jordan, the workflow followed, the parameters used and the assumptions made to run the model. The aim of this paper is to provide a forecast of the peak demand for the next 15 years for electrical distribution companies. The proposed methodology provides both the peak demand and its location for the next 15 years. This paper describes the Spatial Load Forecasting model used, the information provided by electrical distribution company in Jordan, the workflow followed, the parameters used and the assumptions made to run the model.

Keywords: load forecast, peak demand, spatial load, electrical distribution

Procedia PDF Downloads 464
1561 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags

Authors: Zhang Shuqi, Liu Dan

Abstract:

For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.

Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation

Procedia PDF Downloads 75
1560 A Photovoltaic Micro-Storage System for Residential Applications

Authors: Alia Al Nuaimi, Ayesha Al Aberi, Faiza Al Marzouqi, Shaikha Salem Ali Al Yahyaee, Ala Hussein

Abstract:

In this paper, a PV micro-storage system for residential applications is proposed. The term micro refers to the size of the PV storage system, which is in the range of few kilo-watts, compared to the grid size (~GWs). Usually, in a typical load profile of a residential unit, two peak demand periods exist: one at morning and the other at evening time. The morning peak can be partly covered by the PV energy directly, while the evening peak cannot be covered by the PV alone. Therefore, an energy storage system that stores solar energy during daytime and use this stored energy when the sun is absent is a must. A complete design procedure including theoretical analysis followed by simulation verification and economic feasibility evaluation is addressed in this paper.

Keywords: battery, energy storage, photovoltaic, peak shaving, smart grid

Procedia PDF Downloads 285
1559 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 100
1558 Maximaxing the Usage of Solar Energy in an Area of Low Peak Sunlight Hours

Authors: Ohabuiro John Uwabunkeonye

Abstract:

Source of green energy is becoming a concern in developing countries where most energy source in use emits high level of carbon (IV) oxide which contributes to global warming. More so, even with the generation of energy from fossil fuel, the electricity supply is still very inadequate. Therefore, this paper examines different ways of designing and installing photovoltaic (PV) system in terms of optimal sizing of PV array and battery storage in an area of very low peak sunlight hours (PSH) and inadequate supply of electricity from utility companies. Different sample of Peak sunlight hour for selected areas in Nigeria are considered and the lowest of it all is taken. Some means of ensuring that the available solar energy is harnessed properly and converted into electrical energy are discussed for usage in such areas as mentioned above.

Keywords: green energy, fossil fuel, peak sunlight hour, photovoltaic

Procedia PDF Downloads 617
1557 A Simple Approach to Reliability Assessment of Structures via Anomaly Detection

Authors: Rims Janeliukstis, Deniss Mironovs, Andrejs Kovalovs

Abstract:

Operational Modal Analysis (OMA) is widely applied as a method for Structural Health Monitoring for structural damage identification and assessment by tracking the changes of the identified modal parameters over time. Unfortunately, modal parameters also depend on such external factors as temperature and loads. Any structural condition assessment using modal parameters should be done taking into consideration those external factors, otherwise there is a high chance of false positives. A method of structural reliability assessment based on anomaly detection technique called Machalanobis Squared Distance (MSD) is proposed. It requires a set of reference conditions to learn healthy state of a structure, which all future parameters are compared to. In this study, structural modal parameters (natural frequency and mode shape), as well as ambient temperature and loads acting on the structure are used as features. Numerical tests were performed on a finite element model of a carbon fibre reinforced polymer composite beam with delamination damage at various locations and of various severities. The advantages of the demonstrated approach include relatively few computational steps, ability to distinguish between healthy and damaged conditions and discriminate between different damage severities. It is anticipated to be promising in reliability assessment of massively produced structural parts.

Keywords: operational modal analysis, reliability assessment, anomaly detection, damage, mahalanobis squared distance

Procedia PDF Downloads 83
1556 Anomaly: A Case of Babri Masjid Dispute

Authors: Karitikeya Sonker

Abstract:

Religion as a discrete system through its lawful internal working produces an output in the form of realised spatial order with its social logic and a social order with its spatial logic. Thus, it appears to exhibit its duality of spatial and trans-spatial. The components of this system share a relevance forming a collective. This shared relevance creates meaning forming a group where all collectives share one identity. This group with its new social order and its spatial logic revive the already existing spatial order. These religious groups do so having a tendency to expand resulting in the production of space in a situation of encounter where they have found relevance. But an encounter without a lawful internal working of a discrete system results in anomaly because groups do not find relevance due to the absence of collective identity. Events happen all around. One of the main reasons we could say that something became an event is because of conflict. Conflict not in its definitive sense but any occurrence that happens because of an intervention that creates an event worth remembering. The unfolding of such events creates Cities and Urban spaces which exhibit their duality of spatial and trans-spatial by behaving as a discrete system. This system through its lawful internal working produces an output in the form of realized spatial order with its social logic and a social order with spatial logic. The components of this system form a collective through a shared a relevance. This shared relevance creates meaning forming a group where all collectives share one identity. This group with its new social order and its spatial logic revives the already existing spatial order. These groups do so having a tendency to expand resulting in the production of space in a situation of encounter where they have found relevance. But an encounter without a lawful internal working of the discrete system results in anomaly because groups do not find relevance due to the absence of collective identity. This paper makes an effort to explore one such even in the case of Babri Mosque and Ramjanmabhumi, Ayodhya to explain the anomaly as transposition of social and spatial. The paper through the case studies makes an attempt to generate an equation explaining the two different situations of religious encounters, former reviving the social and spatial order and the other resulting in anomaly. Through the case study, it makes an attempt to generate an equation explaining the two different situations of religious encounters, former reviving the social and spatial order and the other resulting in anomaly.

Keywords: Babri Masjid, Ayodhya, conflict, religion

Procedia PDF Downloads 240
1555 Peak Shaving in Microgrids Using Hybrid Storage

Authors: Juraj Londák, Radoslav Vargic, Pavol Podhradský

Abstract:

In this contribution, we focus on the technical and economic aspects of using hybrid storage in microgrids for peak shaving. We perform a feasibility analysis of hybrid storage consisting of conventional supercapacitors and chemical batteries. We use multiple real-life consumption profiles from various industry-oriented microgrids. The primary purpose is to construct a digital twin model for reserved capacity simulation and prediction. The main objective is to find the equilibrium between technical innovations, acquisition costs and energy cost savings

Keywords: microgrid, peak shaving, energy storage, digital twin

Procedia PDF Downloads 130
1554 Congenital Positional Anomaly of Descending Colon and Sigmoid Colon: Its Embryological Basis and Clinical Implications

Authors: Dhivyalakshmi Gnanasekaran, Sonali Adole Prasante, Raveendranath Veeramamani, H. Y. Suma

Abstract:

A rare case of intestinal malrotation with midline descending colon and right sided sigmoid colon was observed in an adult male cadaver aged around 55 years during routine dissection. The descending colon began from the splenic flexure and gradually descended downwards to occupy the midline position and turned to the right side to be continued as sigmoid colon at the level of the fifth lumbar vertebra. In the right iliac fossa some part of loop of sigmoid colon displaced into the right lumbar region before entering into the true pelvis to continue as rectum. This anomalous descending and sigmoid colon was supplied by varying branching pattern of inferior mesenteric artery. It is extremely important to consider this embryological anomaly before any interventional diagnostic procedures like colonoscopy and to enhance the safety of colonic surgery.

Keywords: sigmoid colon, descending colon, hindgut, malrotation

Procedia PDF Downloads 214
1553 The Correlation of Physical Activity and Plantar Pressure in Young Adults

Authors: Lovro Štefan

Abstract:

Background: The main purpose of the present study was to explore the correlations between physical activity and peak plantar pressure in dynamic mode. Methods: Participants were one hundred forty-six first-year university students (30.8% girls). Plantar pressure generated under each region of the foot (forefoot, midfoot, and heel) was measured by using Zebris dynamometric platform (Isny, Germany). The level of physical activity (PA) was calculated with the International Physical Activity questionnaire (IPAQ - short form). Results: In boys, forefoot peak plantar pressure was correlated with moderate PA (MPA; r=-0.21), vigorous PA (VPA; r=-0.18), and moderate-to-vigorous PA (MVPA; r=-0.28). No significant correlations with other foot regions (p>0.05) were observed. In girls, forefoot peak plantar pressure was correlated with MPA (r =-0.30), VPA (r=-0.39) and MVPA (r=-0.38). Also, heel peak pressure was significantly correlated with MPA (r=-0.33), while no significant correlations with VPA (r=0.05) and MVPA (r=-0.15) were observed. Conclusion: This study shows that different intensities of PA were mostly correlated with forefoot peak plantar pressure in both boys and girls. Therefore, strategies that reduce plantar pressure through a more active lifestyle should be implemented within the education system.

Keywords: pedobarography, youth, exercise, associations

Procedia PDF Downloads 74
1552 SIPINA Induction Graph Method for Seismic Risk Prediction

Authors: B. Selma

Abstract:

The aim of this study is to test the feasibility of SIPINA method to predict the harmfulness parameters controlling the seismic response. The approach developed takes into consideration both the focal depth and the peak ground acceleration. The parameter to determine is displacement. The data used for the learning of this method and analysis nonlinear seismic are described and applied to a class of models damaged to some typical structures of the existing urban infrastructure of Jassy, Romania. The results obtained indicate an influence of the focal depth and the peak ground acceleration on the displacement.

Keywords: SIPINA algorithm, seism, focal depth, peak ground acceleration, displacement

Procedia PDF Downloads 283
1551 Ion-Acoustic Double Layers in a Non-Thermal Electronegative Magnetized Plasma

Authors: J. K. Chawla, S. K. Jain, M. K. Mishra

Abstract:

Ion-acoustic double layers have been studied in magnetized plasma. The modified Korteweg-de Vries (m-KdV) equation using reductive perturbation method is derived. It is found that for the selected set of parameters, the system supports rarefactive double layers depending upon the value of nonthermal parameters. It is also found that the magnetization affects only the width of the double layer. For a given set of parameter values, increases in the magnetization and the obliqueness angle (θ) between wave vector and magnetic field, affect the width of the double layers, however the amplitude of the double layers have no effect. An increase in the values of nonthermal parameter decreases the amplitude of the rarefactive double layer. The effect of the ion temperature ratio on the amplitude and width of the double layers are also discussed in detail.

Keywords: ion-acoustic double layers, magnetized electronegative plasma, reductive perturbation method, the modified Korteweg-de Vries (KdV) equation

Procedia PDF Downloads 579
1550 Dimensionality Reduction in Modal Analysis for Structural Health Monitoring

Authors: Elia Favarelli, Enrico Testi, Andrea Giorgetti

Abstract:

Autonomous structural health monitoring (SHM) of many structures and bridges became a topic of paramount importance for maintenance purposes and safety reasons. This paper proposes a set of machine learning (ML) tools to perform automatic feature selection and detection of anomalies in a bridge from vibrational data and compare different feature extraction schemes to increase the accuracy and reduce the amount of data collected. As a case study, the Z-24 bridge is considered because of the extensive database of accelerometric data in both standard and damaged conditions. The proposed framework starts from the first four fundamental frequencies extracted through operational modal analysis (OMA) and clustering, followed by density-based time-domain filtering (tracking). The fundamental frequencies extracted are then fed to a dimensionality reduction block implemented through two different approaches: feature selection (intelligent multiplexer) that tries to estimate the most reliable frequencies based on the evaluation of some statistical features (i.e., mean value, variance, kurtosis), and feature extraction (auto-associative neural network (ANN)) that combine the fundamental frequencies to extract new damage sensitive features in a low dimensional feature space. Finally, one class classifier (OCC) algorithms perform anomaly detection, trained with standard condition points, and tested with normal and anomaly ones. In particular, a new anomaly detector strategy is proposed, namely one class classifier neural network two (OCCNN2), which exploit the classification capability of standard classifiers in an anomaly detection problem, finding the standard class (the boundary of the features space in normal operating conditions) through a two-step approach: coarse and fine boundary estimation. The coarse estimation uses classics OCC techniques, while the fine estimation is performed through a feedforward neural network (NN) trained that exploits the boundaries estimated in the coarse step. The detection algorithms vare then compared with known methods based on principal component analysis (PCA), kernel principal component analysis (KPCA), and auto-associative neural network (ANN). In many cases, the proposed solution increases the performance with respect to the standard OCC algorithms in terms of F1 score and accuracy. In particular, by evaluating the correct features, the anomaly can be detected with accuracy and an F1 score greater than 96% with the proposed method.

Keywords: anomaly detection, frequencies selection, modal analysis, neural network, sensor network, structural health monitoring, vibration measurement

Procedia PDF Downloads 92
1549 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 75
1548 Competing Interactions, and Magnetization Dynamics in Doped Rare-Earth Manganites Nanostructural System

Authors: Wiqar Hussain Shah

Abstract:

The Structural, magnetic and transport behavior of La1-xCaxMnO3+ (x=0.48, 0.50, 0.52 and 0.55 and =0.015) compositions close to charge ordering, was studied through XRD, resistivity, DC magnetization and AC susceptibility measurements. With time and thermal cycling (T<300 K) there is an irreversible transformation of the low-temperature phase from a partially ferromagnetic and metallic to one that is less ferromagnetic and highly resistive. For instance, an increase of resistivity can be observed by thermal cycling, where no effect is obtained for lower Ca concentration. The time changes in the magnetization are logarithmic in general and activation energies are consistent with those expected for electron transfer between Mn ions. The data suggest that oxygen non-stoichiometry results in mechanical strains in this two-phase system, leading to the development of irreversible metastable states, which relax towards the more stable charge-ordered and antiferromagnetic microdomains at the nano-meter size. This behavior is interpreted in terms of strains induced charge localization at the interface between FM/AFM domains in the antiferromagnetic matrix. Charge, orbital ordering and phase separation play a prominent role in the appearance of such properties, since they can be modified in a spectacular manner by external factor, making the different physical properties metastable. Here we describe two factors that deeply modify those properties, viz. the doping concentration and the thermal cycling. The metastable state is recovered by the high temperature annealing. We also measure the magnetic relaxation in the metastable state and also the revival of the metastable state (in a relaxed sample) due to high temperature (800 ) thermal treatment.

Keywords: Rare-earth maganites, nano-structural materials, doping effects on electrical, magnetic properties, competing interactions

Procedia PDF Downloads 98
1547 A Comparative Analysis on QRS Peak Detection Using BIOPAC and MATLAB Software

Authors: Chandra Mukherjee

Abstract:

The present paper is a representation of the work done in the field of ECG signal analysis using MATLAB 7.1 Platform. An accurate and simple ECG feature extraction algorithm is presented in this paper and developed algorithm is validated using BIOPAC software. To detect the QRS peak, ECG signal is processed by following mentioned stages- First Derivative, Second Derivative and then squaring of that second derivative. Efficiency of developed algorithm is tested on ECG samples from different database and real time ECG signals acquired using BIOPAC system. Firstly we have lead wise specified threshold value the samples above that value is marked and in the original signal, where these marked samples face change of slope are spotted as R-peak. On the left and right side of the R-peak, faces change of slope identified as Q and S peak, respectively. Now the inbuilt Detection algorithm of BIOPAC software is performed on same output sample and both outputs are compared. ECG baseline modulation correction is done after detecting characteristics points. The efficiency of the algorithm is tested using some validation parameters like Sensitivity, Positive Predictivity and we got satisfied value of these parameters.

Keywords: first derivative, variable threshold, slope reversal, baseline modulation correction

Procedia PDF Downloads 379
1546 X-Ray Energy Release in the Solar Eruptive Flare from 6th of September 2012

Authors: Mirabbos Mirkamalov, Zavkiddin Mirtoshev

Abstract:

The M 1.6 class flare occurred on 6th of September 2012. Our observations correspond to the active region NOAA 11560 with the heliographic coordinates N04W71. The event took place between 04:00 UT and 04:45 UT, and was close to the solar limb at the western region. The flare temperature correlates with flux peak, increases for a short period (between 04:08 UT and 04:12 UT), rises impulsively, attains a maximum value of about 17 MK at 04:12 UT and gradually decreases after peak value. Around the peak we observe significant emissions of X-ray sources. Flux profiles of the X-ray emission exhibit a progressively faster raise and decline as the higher energy channels are considered.

Keywords: magnetic reconnection, solar atmosphere, solar flare, X-ray emission

Procedia PDF Downloads 280
1545 Anomaly Detection in Financial Markets Using Tucker Decomposition

Authors: Salma Krafessi

Abstract:

The financial markets have a multifaceted, intricate environment, and enormous volumes of data are produced every day. To find investment possibilities, possible fraudulent activity, and market oddities, accurate anomaly identification in this data is essential. Conventional methods for detecting anomalies frequently fail to capture the complex organization of financial data. In order to improve the identification of abnormalities in financial time series data, this study presents Tucker Decomposition as a reliable multi-way analysis approach. We start by gathering closing prices for the S&P 500 index across a number of decades. The information is converted to a three-dimensional tensor format, which contains internal characteristics and temporal sequences in a sliding window structure. The tensor is then broken down using Tucker Decomposition into a core tensor and matching factor matrices, allowing latent patterns and relationships in the data to be captured. A possible sign of abnormalities is the reconstruction error from Tucker's Decomposition. We are able to identify large deviations that indicate unusual behavior by setting a statistical threshold. A thorough examination that contrasts the Tucker-based method with traditional anomaly detection approaches validates our methodology. The outcomes demonstrate the superiority of Tucker's Decomposition in identifying intricate and subtle abnormalities that are otherwise missed. This work opens the door for more research into multi-way data analysis approaches across a range of disciplines and emphasizes the value of tensor-based methods in financial analysis.

Keywords: tucker decomposition, financial markets, financial engineering, artificial intelligence, decomposition models

Procedia PDF Downloads 22
1544 Analytical Investigation of Viscous and Non-Viscous Fluid Particles in a Restricted Region Using Diffusion Magnetic Resonance Imaging Equation

Authors: Yusuf, S. I., Saba, A., Olaoye, D. O., Ibrahim J. A., Yahaya H. M., Jatto A. O

Abstract:

Nuclear Magnetic Resonance (NMR) technology has been applied in several ways to provide vital information about petro-physical properties of reservoirs. However, due to the need to study the molecular behaviours of particles of the fluids in different restricted media, diffusion magnetic resonance equation is hereby applied in spherical coordinates and solved analytically using the method of separation of variables and solution of Legendre equation by Frobenius method. The viscous fluid considered in this research work is unused oil while the non-viscous fluid is water. The results obtained show that water begins to manifest appreciable change at radial adjustment value of 10 and Magnetization of 2.31191995400015x1014 and relaxes finally at 2.30x1014 at radial adjustment value of 1. On the other hand, unused engine oil begins to manifest its changes at radial adjustment value of 40 and Magnetization of 1.466557018x1014and relaxes finally at 1.48x1014 at radial adjustment value of 5.

Keywords: viscous and non-viscous fluid, restricted medium, relaxation times, coefficient of diffusion

Procedia PDF Downloads 51
1543 Structural, Magnetic and Electrical Properties of Gd3+ Doped CoFe2O4 Nanoparticles Synthesized by Sonochemical Method

Authors: Raghvendra Singh Yadav, Ivo Kuřitka

Abstract:

In this report, we studied the impact of Gd3+ substitution on structural, magnetic and electrical properties of CoFe2O4 nanoparticles synthesized by sonochemical method. X-ray diffraction pattern confirmed the formation of cubic spinel structure at low concentration of Gd3+ ions, however, GdFeO3 additional phase was observed at higher concentration of Gd3+ ions. Raman and Fourier Transform Infrared spectroscopy study also confirmed cubic spinel structure of Gd3+ substituted CoFe2O4 nanoparticles. The field emission scanning electron microscopy study revealed that Gd3+ substituted CoFe2O4 nanoparticles were in the range of 5-20 nm. The magnetic properties of Gd3+ substituted CoFe2O4 nanoparticles were investigated by using vibrating sample magnetometer. The variation in saturation magnetization, coercivity and remanent magnetization with Gd3+ concentration in CoFe2O4 nanoparticles was observed. The variation of real and imaginary part of dielectric constant, tan δ, and AC conductivity were studied at room temperature.

Keywords: spinel ferrites, nanoparticles, sonochemical method, magnetic properties

Procedia PDF Downloads 270
1542 First-Principles Modeling of Nanoparticle Magnetization, Chaining, and Motion

Authors: Pierce Radecki, Pulkit Malik, Bharath Ramaswamy, Ben Shapiro

Abstract:

The ability to effectively design and test magnetic nanoparticles for controlled movement has been an elusive goal in the design of these particles. Magnetic nanoparticles of various characteristics have been created for use towards therapeutic effects, however the challenge of designing for controlled movement remains unmet. A step towards design in this aspect is a first principles model that captures and predicts the behaviors of particles in a magnetic field. The model is governed by four forces acting on the particles, the magnetic gradient, the dipole-dipole forces, the steric forces, and the viscous drag force. The particles are multi-core or single core, and incorporate a preferred magnetization axis. Particles exhibit behaviors, such as chaining, in simulations that are similar to those witnessed through experimentation. Currently, experimental results are being compared to the modeling results for verification of the model, through the analysis of chaining behaviors. This modeling system will be used in designing magnetic nanoparticles for specific chaining and movement behaviors.

Keywords: controlled movement, modeling, magnetic nanoparticles, nanoparticle design

Procedia PDF Downloads 281
1541 Indoor Robot Positioning with Precise Correlation Computations over Walsh-Coded Lightwave Signal Sequences

Authors: Jen-Fa Huang, Yu-Wei Chiu, Jhe-Ren Cheng

Abstract:

Visible light communication (VLC) technique has become useful method via LED light blinking. Several issues on indoor mobile robot positioning with LED blinking are examined in the paper. In the transmitter, we control the transceivers blinking message. Orthogonal Walsh codes are adopted for such purpose on auto-correlation function (ACF) to detect signal sequences. In the robot receiver, we set the frame of time by 1 ns passing signal from the transceiver to the mobile robot. After going through many periods of time detecting the peak value of ACF in the mobile robot. Moreover, the transceiver transmits signal again immediately. By capturing three times of peak value, we can know the time difference of arrival (TDOA) between two peak value intervals and finally analyze the accuracy of the robot position.

Keywords: Visible Light Communication, Auto-Correlation Function (ACF), peak value of ACF, Time difference of Arrival (TDOA)

Procedia PDF Downloads 273