Search results for: Military Fighter Aircraft Selection
758 Operational Modal Analysis Implementation on a Hybrid Composite Plate
Authors: Z. A. C. Saffry, D. L. Majid, N. H. M. Haidzir
Abstract:
In aerospace applications, interactions of airflow with aircraft structures can result in undesirable structural deformations. This structural deformation in turn, can be predicted if the natural modes of the structure are known. This can be achieved through conventional modal testing that requires a known excitation force in order to extract these dynamic properties. This technique can be experimentally complex because of the need for artificial excitation and it is also does not represent actual operational condition. The current work presents part of research work that address the practical implementation of operational modal analysis (OMA) applied to a cantilevered hybrid composite plate employing single contactless sensing system via laser vibrometer. OMA technique extracts the modal parameters based only on the measurements of the dynamic response. The OMA results were verified with impact hammer modal testing and good agreement was obtained.Keywords: Hybrid Kevlar composite, Laser Vibrometer, modal parameters, Operational Modal Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2168757 Carrying Out the Steps of Decision Making Process in Concrete Organization
Authors: Eva Štěpánková
Abstract:
The decision-making process is theoretically clearly defined. Generally, it includes the problem identification and analysis, data gathering, goals and criteria setting, alternatives development and optimal alternative choice and its implementation. In practice however, various modifications of the theoretical decision-making process can occur. The managers can consider some of the phases to be too complicated or unfeasible and thus they do not carry them out and conversely some of the steps can be overestimated. The aim of the paper is to reveal and characterize the perception of the individual phases of decision-making process by the managers. The research is concerned with managers in the military environment – commanders. Quantitative survey is focused cross-sectionally in the individual levels of management of the Ministry of Defence of the Czech Republic. On the total number of 135 respondents the analysis focuses on which of the decision-making process phases are problematic or not carried out in practice and which are again perceived to be the easiest. Then it is examined the reasons of the findings.
Keywords: Decision making, decision making process, decision problems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1961756 Automatic Staging and Subtype Determination for Non-Small Cell Lung Carcinoma Using PET Image Texture Analysis
Authors: Seyhan Karaçavuş, Bülent Yılmaz, Ömer Kayaaltı, Semra İçer, Arzu Taşdemir, Oğuzhan Ayyıldız, Kübra Eset, Eser Kaya
Abstract:
In this study, our goal was to perform tumor staging and subtype determination automatically using different texture analysis approaches for a very common cancer type, i.e., non-small cell lung carcinoma (NSCLC). Especially, we introduced a texture analysis approach, called Law’s texture filter, to be used in this context for the first time. The 18F-FDG PET images of 42 patients with NSCLC were evaluated. The number of patients for each tumor stage, i.e., I-II, III or IV, was 14. The patients had ~45% adenocarcinoma (ADC) and ~55% squamous cell carcinoma (SqCCs). MATLAB technical computing language was employed in the extraction of 51 features by using first order statistics (FOS), gray-level co-occurrence matrix (GLCM), gray-level run-length matrix (GLRLM), and Laws’ texture filters. The feature selection method employed was the sequential forward selection (SFS). Selected textural features were used in the automatic classification by k-nearest neighbors (k-NN) and support vector machines (SVM). In the automatic classification of tumor stage, the accuracy was approximately 59.5% with k-NN classifier (k=3) and 69% with SVM (with one versus one paradigm), using 5 features. In the automatic classification of tumor subtype, the accuracy was around 92.7% with SVM one vs. one. Texture analysis of FDG-PET images might be used, in addition to metabolic parameters as an objective tool to assess tumor histopathological characteristics and in automatic classification of tumor stage and subtype.Keywords: Cancer stage, cancer cell type, non-small cell lung carcinoma, PET, texture analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 977755 Analyzing the Effect of Materials’ Selection on Energy Saving and Carbon Footprint: A Case Study Simulation of Concrete Structure Building
Authors: M. Kouhirostamkolaei, M. Kouhirostami, M. Sam, J. Woo, A. T. Asutosh, J. Li, C. Kibert
Abstract:
Construction is one of the most energy consumed activities in the urban environment that results in a significant amount of greenhouse gas emissions around the world. Thus, the impact of the construction industry on global warming is undeniable. Thus, reducing building energy consumption and mitigating carbon production can slow the rate of global warming. The purpose of this study is to determine the amount of energy consumption and carbon dioxide production during the operation phase and the impact of using new shells on energy saving and carbon footprint. Therefore, a residential building with a re-enforced concrete structure is selected in Babolsar, Iran. DesignBuilder software has been used for one year of building operation to calculate the amount of carbon dioxide production and energy consumption in the operation phase of the building. The primary results show the building use 61750 kWh of energy each year. Computer simulation analyzes the effect of changing building shells -using XPS polystyrene and new electrochromic windows- as well as changing the type of lighting on energy consumption reduction and subsequent carbon dioxide production. The results show that the amount of energy and carbon production during building operation has been reduced by approximately 70% by applying the proposed changes. The changes reduce CO2e to 11345 kg CO2/yr. The result of this study helps designers and engineers to consider material selection’s process as one of the most important stages of design for improving energy performance of buildings.
Keywords: Construction materials, green construction, energy simulation, carbon footprint, energy saving, concrete structure, DesignBuilder.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 992754 An Overview of Evaluations Using Augmented Reality for Assembly Training Tasks
Authors: S. Werrlich, E. Eichstetter, K. Nitsche, G. Notni
Abstract:
Augmented Reality (AR) is a strong growing research topic in different training domains such as medicine, sports, military, education and industrial use cases like assembly and maintenance tasks. AR claims to improve the efficiency and skill-transfer of training tasks. This paper gives a comprehensive overview of evaluations using AR for assembly and maintenance training tasks published between 1992 and 2017. We search in a structured way in four different online databases and get 862 results. We select 17 relevant articles focusing on evaluating AR-based training applications for assembly and maintenance tasks. This paper also indicates design guidelines which are necessary for creating a successful application for an AR-based training. We also present five scientific limitations in the field of AR-based training for assembly tasks. Finally, we show our approach to solve current research problems using Design Science Research (DSR).
Keywords: Assembly, augmented reality, survey, training.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1922753 Securing Message in Wireless Sensor Network by using New Method of Code Conversions
Authors: Ahmed Chalak Shakir, GuXuemai, Jia Min
Abstract:
Recently, wireless sensor networks have been paid more interest, are widely used in a lot of commercial and military applications, and may be deployed in critical scenarios (e.g. when a malfunctioning network results in danger to human life or great financial loss). Such networks must be protected against human intrusion by using the secret keys to encrypt the exchange messages between communicating nodes. Both the symmetric and asymmetric methods have their own drawbacks for use in key management. Thus, we avoid the weakness of these two cryptosystems and make use of their advantages to establish a secure environment by developing the new method for encryption depending on the idea of code conversion. The code conversion-s equations are used as the key for designing the proposed system based on the basics of logic gate-s principals. Using our security architecture, we show how to reduce significant attacks on wireless sensor networks.Keywords: logic gates, code conversions, Gray-code, and clustering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1655752 The National Security Assurance of the Republic of Kazakhstan
Authors: Sholpan Zhandossova, Erden Ordabek, Yelbolsyn Nazarov
Abstract:
the article analyzes the national security as a scientific and practical problem, characterized by the state's political institutions to ensure effective action to maintain optimal conditions for the existence and development of the individual and society. National security, as a category of political science reflects the relationship between the security to the nation, including public relations and social consciousness, social institutions and their activities, ensuring the realization of national interests in a particular historical situation. In national security are three security levels: individual, society and state. Their role and place determined by the nature of social relations, political systems, the presence of internal and external threats. In terms of content in the concept of national security is taken to provide political, economic, military, environmental, information security and safety of the cultural development of the nation.
Keywords: Kazakhstan, national security, religious extremism
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1955751 Concept for a Multidisciplinary Design Process–An Application on High Lift Systems
Authors: P. Zamov, H. Spangenberg
Abstract:
Presents a concept for a multidisciplinary process supporting effective task transitions between different technical domains during the architectural design stage. A system configuration challenge is the multifunctional driven increased solution space. As a consequence, more iteration is needed to find a global optimum, i.e. a compromise between involved disciplines without negative impact on development time. Since state of the art standards like ISO 15288 and VDI 2206 do not provide a detailed methodology on multidisciplinary design process, higher uncertainties regarding final specifications arise. This leads to the need of more detailed and standardized concepts or processes which could mitigate risks. The performed work is based on analysis of multidisciplinary interaction, of modeling and simulation techniques. To demonstrate and prove the applicability of the presented concept, it is applied to the design of aircraft high lift systems, in the context of the engineering disciplines kinematics, actuation, monitoring, installation and structure design.Keywords: Systems engineering, multidisciplinary, architectural design, high lift system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2304750 Assessment of Downy mildew Resistance (Peronospora farinosa) in a Quinoa (Chenopodium quinoa Willd.) Germplasm
Authors: Manal Mhada, BrahimEzzahiri, Ouafae Benlhabib
Abstract:
Seventy-nine accessions, including two local wild species (Chenopodium album and C. murale) and several cultivated quinoa lines developed through recurrent selection in Morocco were screened for their resistance against Peronospora farinose, the causal agent of downy mildew disease. The method of artificial inoculation on detached healthy leaves taken from the middle stage of the plant was used. Screened accessions showed different levels of quantitative resistance to downy mildew as they were scored through the calculation of their area under disease progress curve and their two resistance components, the incubation period and the latent period. Significant differences were found between accessions regarding the three criteria (Incubation Period, Latent Period and Area Under Diseases Progress Curve). Accessions M2a and S938/1 were ranked resistant as they showed the longest Incubation Period (7 days) and Latent Period (12 days) and the lowest area under diseases progress curve (4). Therefore, M24 is the most susceptible accession as it has presented the highest area under diseases progress curve (34.5) and the shortest Incubation Period (1 day) and Latent Period (3 days). In parallel to this evaluation approach, the accession resistance was confirmed under the field conditions through natural infection by using the tree-leaf method. The high correlation found between detached leaf inoculation method and field screening under natural infection allows us to use this laboratory technique with sureness in further selection works.
Keywords: Detached leaf inoculation, Downy mildew, Field screening, Quinoa.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2510749 Grading and Sequencing Tasks in Task-Based Syllabus: A Critical Look at Criterion Selection
Authors: Hossein Ahmadi, Ogholgol Nazari
Abstract:
The necessity of grading and sequencing tasks has led to the development of different criteria in this regard. However, appropriateness of these criteria in different situations is less discussed. This paper attempts to shed more light on the priority of different criteria in relation with different factors including learners, teachers, educational, and cultural factors.
Keywords: Criteria, Grading, Sequencing, Language learning tasks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6656748 Aeroelasticity Analysis of Rotor Blades in the First Two Stages of Axial Compressor in the Case of a Bird Strike
Authors: R. Rzadkowski, V. Gnesin, M. Drewczyński, R. Szczepanik
Abstract:
A bird strike can cause damage to stationary and rotating aircraft engine parts, especially the engine fan. This paper presents a bird strike simulated by blocking four stator blade passages. It includes the numerical results of the unsteady lowfrequency aerodynamic forces and the aeroelastic behaviour caused by a non-symmetric upstream flow affecting the first two rotor blade stages in the axial-compressor of a jet engine. The obtained results show that disturbances in the engine inlet strongly influence the level of unsteady forces acting on the rotor blades. With a partially blocked inlet the whole spectrum of low-frequency harmonics is observed. Such harmonics can lead to rotor blade damage. The lowfrequency amplitudes are higher in the first stage rotor blades than in the second stage. In both rotor blades stages flutter appeared as a result of bird strike.Keywords: Flutter, unsteady forces, rotor blades.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2468747 Research on the Protection and Reuse Model of Historical Buildings in Chinese Airports
Authors: Jie Ouyang, Chen Nie
Abstract:
China had constructed a large number of military and civilian airports before and after World War II, and then began large-scale repairs, reconstructions or relocation of airports after the baptism of wars after World War I and World War II. The airport's historical area and its historical buildings such as terminals, hangars, and towers have adopted different protection strategies and reuse application strategies. This paper is based on the judgment of the value of airport historical buildings to study different protection and reuse strategies. The protection and reuse models of historical buildings are classified in three dimensions: the airport historical area, the airport historical building complex and its individual buildings, and combined with specific examples to discuss and summarize the technical characteristics, protection strategies and successful experiences of different modes of protection and reuse of historical areas and historical buildings of airports.
Keywords: Airport, airport area, historic airport building, protection, reuse model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 675746 Transient Three Dimensional FE Modeling for Thermal Analysis of Pulsed Current Gas Tungsten Arc Welding of Aluminum Alloy
Authors: N. Karunakaran, V. Balasubramanian
Abstract:
This paper presents the results of a study aimed at establishing the temperature distribution during the welding of aluminum alloy plates by Pulsed Current Gas Tungsten Arc Welding (PCGTAW) and Constant Current Gas Tungsten Arc Welding (CCGTAW) processes. Pulsing of the GTA welding current influences the dimensions and solidification rate of the fused zone, it also reduces the weld pool volume hence a narrower bead. In this investigation, the base material considered was aluminum alloy AA 6351 T6, which is finding use in aircraft, automobile and high-speed train components. A finite element analysis was carried out using ANSYS, and the results of the FEA were compared with the experimental results. It is evident from the study that the finite element analysis using ANSYS can be effectively used to model PCGTAW process for finding temperature distribution.
Keywords: Gas tungsten arc welding, pulsed current, finite element analysis, thermal analysis, aluminum alloy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2281745 Monomial Form Approach to Rectangular Surface Modeling
Authors: Taweechai Nuntawisuttiwong, Natasha Dejdumrong
Abstract:
Geometric modeling plays an important role in the constructions and manufacturing of curve, surface and solid modeling. Their algorithms are critically important not only in the automobile, ship and aircraft manufacturing business, but are also absolutely necessary in a wide variety of modern applications, e.g., robotics, optimization, computer vision, data analytics and visualization. The calculation and display of geometric objects can be accomplished by these six techniques: Polynomial basis, Recursive, Iterative, Coefficient matrix, Polar form approach and Pyramidal algorithms. In this research, the coefficient matrix (simply called monomial form approach) will be used to model polynomial rectangular patches, i.e., Said-Ball, Wang-Ball, DP, Dejdumrong and NB1 surfaces. Some examples of the monomial forms for these surface modeling are illustrated in many aspects, e.g., construction, derivatives, model transformation, degree elevation and degress reduction.Keywords: Monomial form, rectangular surfaces, CAGD curves, monomial matrix applications.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 704744 Application of UAS in Forest Firefighting for Detecting Ignitions and 3D Fuel Volume Estimation
Authors: Artur Krukowski, Emmanouela Vogiatzaki
Abstract:
The article presents results from the AF3 project “Advanced Forest Fire Fighting” focused on Unmanned Aircraft Systems (UAS)-based 3D surveillance and 3D area mapping using high-resolution photogrammetric methods from multispectral imaging, also taking advantage of the 3D scanning techniques from the SCAN4RECO project. We also present a proprietary embedded sensor system used for the detection of fire ignitions in the forest using near-infrared based scanner with weight and form factors allowing it to be easily deployed on standard commercial micro-UAVs, such as DJI Inspire or Mavic. Results from real-life pilot trials in Greece, Spain, and Israel demonstrated added-value in the use of UAS for precise and reliable detection of forest fires, as well as high-resolution 3D aerial modeling for accurate quantification of human resources and equipment required for firefighting.
Keywords: Forest wildfires, fuel volume estimation, 3D modeling, UAV, surveillance, firefighting, ignition detectors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 581743 The Portrayal of Muslim Militants "Southern Bandits" in Thai Newspapers
Authors: Treepon Kirdnark
Abstract:
This paper examines the depiction of Muslim militants in Thai newspapers in 2004. Stuart Hall-s “representation" and “public idioms" are used as theoretical frameworks. Critical Discourse Analysis is employed as a methodology to examine 240 news articles from two leading Thai language newspapers. The results show that the militants are usually labeled as “southern bandits." This suggests that they are just a culprit of the violence in the deep south of Thailand. They are usually described as people who cause turbulence. Consequently, the military have to get rid of them. However, other aspects of the groups such as their political agenda or the failures of the Thai state in dealing with the Malay Muslims were not mention in the news stories. In the time of violence, the researcher argues that this kind of newspaper coverage may help perpetuate the discourse of Malay Muslim, instead of providing fuller picture of the ongoing conflicts.
Keywords: News Discourse, Newspapers, Thailand, Thai Muslims.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1797742 Comparative Studies on Dissimilar Metals thin Sheets Using Laser Beam Welding - A Review
Authors: K. Kalaiselvan, A. Elango, N. M. Nagarajan
Abstract:
Laser beam welding for the dissimilar Titanium and Aluminium thin sheets is an emerging area which is having wider applications in aerospace, aircraft, automotive, electronics and in other industries due to its high speed, non-contact, precision with low heat effects, least welding distortion, low labor costs and convenient operation. Laser beam welding of dissimilar metal combinations are increasingly demanded due to high energy densities with small fusion and heat affected zones. Furthermore, no filler or electrode material is required and contamination of weld is also very small. The present study is to reviews the influence of different parameters like laser power, welding speed, power density, beam diameter, focusing distance and type of shielding gas on the mechanical properties of dissimilar metal combinations like SS/Al, Cu/Al and Ti/Al focusing on aluminum to other materials. Research findings reveal that Ti/Al combination gives better metallurgical and mechanical properties than other combinations such as SS/Al and Cu/Al.
Keywords: Laser Beam Welding, dissimilar metals, SS/Al, Cu/Al and Ti/Al sheets.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2680741 Regional Security Issue: Central Asian Countries and NATO Cooperation (On the Example of Kazakhstan)
Authors: Karakulov Y., Baizakova K.
Abstract:
Kazakhstan attaches the great importance to cooperation with European countries within the framework of multilateral security organizations such as NATO. Cooperation of Kazakhstan with the NATO is a prominent aspect of strengthening of regional security of republic. It covers a wide spectrum of areas, such as reform of sector of defense and security, military operative compatibility of armed forces of NATO member-countries and Kazakhstan, civil emergency planning and scientific cooperation. The cooperation between Kazakhstan and NATO is based on the mutual interests of neighboring republics in the region so that the existing forms of cooperation between Kazakhstan and NATO will not be negatively perceived both in Asia as well as among CIS countries. Kazakhstan tailors its participation in the PfP programme through an annual Individual Partnership Programme, selecting those activities that will help achieve the goals it has set in the IPAP. Level of cooperation within the limits of PfP essentially differs on each republic. Cooperation with Kazakhstan progressed most of all since has been signed IPAP from the NATOKeywords: Central Asia, Kazakhstan, NATO cooperation, regional security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2169740 Entropy Generation Analyze Due to the Steady Natural Convection of Newtonian Fluid in a Square Enclosure
Authors: T. T. Naas, Y. Lasbet, C. Kezrane
Abstract:
The thermal control in many systems is widely accomplished applying mixed convection process due to its low cost, reliability and easy maintenance. Typical applications include the aircraft electronic equipment, rotating-disc heat exchangers, turbo machinery, and nuclear reactors, etc. Natural convection in an inclined square enclosure heated via wall heater has been studied numerically. Finite volume method is used for solving momentum and energy equations in the form of stream function–vorticity. The right and left walls are kept at a constant temperature, while the other parts are adiabatic. The range of the inclination angle covers a whole revolution. The method is validated for a vertical cavity. A general power law dependence of the Nusselt number with respect to the Rayleigh number with the coefficient and exponent as functions of the inclination angle is presented. For a fixed Rayleigh number, the inclination angle increases or decreases is found.
Keywords: Inclined enclosure, natural convection in enclosure, Nusselt number.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2228739 Efficient Utilization of Unmanned Aerial Vehicle (UAV) for Fishing through Surveillance for Fishermen
Authors: T. Ahilan, V. Aswin Adityan, S. Kailash
Abstract:
UAV’s are small remote operated or automated aerial surveillance systems without a human pilot aboard. UAV’s generally finds its use in military and special operation application, a recent growing trend in UAV’s finds its application in several civil and nonmilitary works such as inspection of power or pipelines. The objective of this paper is the augmentation of a UAV in order to replace the existing expensive sonar (Sound Navigation And Ranging) based equipment amongst small scale fisherman, for whom access to sonar equipment are restricted due to limited economic resources. The surveillance equipment’s present in the UAV will relay data and GPS (Global Positioning System) location onto a receiver on the fishing boat using RF signals, using which the location of the schools of fishes can be found. In addition to this, an emergency beacon system is present for rescue operations and drone recovery.Keywords: GPS, RF signals, School of fish, Sonar, Surveillance UAV, Video stream.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3170738 Survey of Potato Viral Infection Using Das-Elisa Method in Georgia
Authors: Maia Kukhaleishvili, Ekaterine Bulauri, Iveta Megrelishvili, Tamar Shamatava, Tamar Chipashvili
Abstract:
Plant viruses can cause loss of yield and quality in a lot of important crops. Symptoms of pathogens are variable depending on the cultivars and virus strain. Selection of resistant potato varieties would reduce the risk of virus transmission and significant economic impact. Other way to avoid reduced harvest yields is regular potato seed production sampling and testing for viral infection. The aim of this study was to determine the occurrence and distribution of viral diseases according potato cultivars for further selection of virus-free material in Georgia. During the summer 2015- 2016, 5 potato cultivars (Sante, Laura, Jelly, Red Sonia, Anushka) at 5 different farms located in Akhalkalaki were tested for 6 different potato viruses: Potato virus A (PVA), Potato virus M (PVM), Potato virus S (PVS), Potato virus X (PVX), Potato virus Y (PVY) and potato leaf roll virus (PLRV). A serological method, Double Antibody Sandwich-Enzyme linked Immunosorbent Assay (DASELISA) was used at the laboratory to analyze the results. The result showed that PVY (21.4%) and PLRV (19.7%) virus presence in collected samples was relatively high compared to others. Researched potato cultivars except Jelly and Laura were infected by PVY with different concentrations. PLRV was found only in three potato cultivars (Sante, Jelly, Red Sonia) and PVM virus (3.12%) was characterized with low prevalence. PVX, PVA and PVS virus infection was not reported. It would be noted that 7.9% of samples were containing PVY/PLRV mix infection. Based on the results it can be concluded that PVY and PLRV infections are dominant in all research cultivars. Therefore significant yield losses are expected. Systematic, long-term control of potato viral infection, especially seed-potatoes, must be regarded as the most important factor to increase seed productivity.Keywords: Diseases, infection, potato, virus.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 942737 Development of an Ensemble Classification Model Based on Hybrid Filter-Wrapper Feature Selection for Email Phishing Detection
Authors: R. B. Ibrahim, M. S. Argungu, I. M. Mungadi
Abstract:
It is obvious in this present time, internet has become an indispensable part of human life since its inception. The Internet has provided diverse opportunities to make life so easy for human beings, through the adoption of various channels. Among these channels are email, internet banking, video conferencing, and the like. Email is one of the easiest means of communication hugely accepted among individuals and organizations globally. But over decades the security integrity of this platform has been challenged with malicious activities like Phishing. Email phishing is designed by phishers to fool the recipient into handing over sensitive personal information such as passwords, credit card numbers, account credentials, social security numbers, etc. This activity has caused a lot of financial damage to email users globally which has resulted in bankruptcy, sudden death of victims, and other health-related sicknesses. Although many methods have been proposed to detect email phishing, in this research, the results of multiple machine-learning methods for predicting email phishing have been compared with the use of filter-wrapper feature selection. It is worth noting that all three models performed substantially but one outperformed the other. The dataset used for these models is obtained from Kaggle online data repository, while three classifiers: decision tree, Naïve Bayes, and Logistic regression are ensemble (Bagging) respectively. Results from the study show that the Decision Tree (CART) bagging ensemble recorded the highest accuracy of 98.13% using PEF (Phishing Essential Features). This result further demonstrates the dependability of the proposed model.
Keywords: Ensemble, hybrid, filter-wrapper, phishing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 178736 A Novel Switched Reluctance Motor with U-type Segmental Rotor Pairs: Design, Analysis and Simulation Results
Abstract:
This paper describes the design and modeling procedure of a novel 5-phase segment type switched reluctance motor (ST-SRM) under simultaneous two-phase (bipolar) excitation of windings. The rotor cores of ST-SRM are embedded in an aluminum block as well as to improve the performance characteristics. The magnetic circuit of the produced ST-SRM is constructed so that the magnetic flux paths are short and exclusive to each phase, thereby minimizing the commutation switching and eddy current losses in the laminations. The design and simulation principles presented apply primarily to conventional SRM and ST-SRM. It is proved that the novel 5-phase switched reluctance motor under two-phase excitation is superior among the criteria used in comparison. The purposed model is particularly well suited for high torque and weight constrained applications such as automobiles, aerospace and military applications.Keywords: Segmental Rotor Pairs, Two-phase Excitation, Commutation Switching, Aluminum Block.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3265735 Driving Behaviors at Intersections (Case Study- Tehran-Zone 3-Region 3)
Authors: A. Mansour Khaki, A. E. Forouhid, S. Hemmati, M. Rahnamay-Naeini
Abstract:
In this article we research on the drivers’ behavior at intersections. Some significant behaviors are chosen and designed a questionnaire which was about 2 pages. In this questionnaire, samples were being asked to answer by checking the box. The answers have been from always to never. This questionnaire related to our selection’s behaviors. Finally it has been resulted that most of aggressive behaviors were being common in them. Also it has been suggested some solutions for each of them.
Keywords: Driver, behavior, intersection, study.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1423734 Multipurpose Three Dimensional Finite Element Procedure for Thermal Analysis in Pulsed Current Gas Tungsten Arc Welding of AZ 31B Magnesium Alloy Sheets
Authors: N.Karunakaran, V.Balasubramanian
Abstract:
This paper presents the results of a study aimed at establishing the temperature distribution during the welding of magnesium alloy sheets by Pulsed Current Gas Tungsten Arc Welding (PCGTAW) and Constant Current Gas Tungsten Arc Welding (CCGTAW) processes. Pulsing of the GTAW welding current influences the dimensions and solidification rate of the fused zone, it also reduces the weld pool volume hence a narrower bead. In this investigation, the base material considered was 2mm thin AZ 31 B magnesium alloy, which is finding use in aircraft, automobile and high-speed train components. A finite element analysis was carried out using ANSYS, and the results of the FEA were compared with the experimental results. It is evident from this study that the finite element analysis using ANSYS can be effectively used to model PCGTAW process for finding temperature distribution.Keywords: gas tungsten arc welding, pulsed current, finiteelement analysis, thermal analysis, magnesium alloy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2003733 Identification of Aircraft Gas Turbine Engines Temperature Condition
Authors: Pashayev A., Askerov D., C. Ardil, Sadiqov R., Abdullayev P.
Abstract:
Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Keywords: Identification of a technical condition, aviation gasturbine engine, fuzzy logic and neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1660732 Adaptive Hierarchical Key Structure Generation for Key Management in Wireless Sensor Networks using A*
Authors: Jin Myoung Kim, Tae Ho Cho
Abstract:
Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.
Keywords: Heuristic search, key management, security, sensor network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1684731 Identification of Aircraft Gas Turbine Engine's Temperature Condition
Authors: Pashayev A., Askerov D., C. Ardil, Sadiqov R., Abdullayev P.
Abstract:
Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Keywords: Identification of a technical condition, aviation gasturbine engine, fuzzy logic and neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1672730 Unearthing Decisional Patterns of Air Traffic Control Officers from Simulator Data
Authors: Z. Zakaria, S. W. Lye, S. Endy
Abstract:
Despite the continuous advancements in automated conflict resolution tools, there is still a low rate of adoption of automation from Air Traffic Control Officers (ATCOs). Trust or acceptance in these tools and conformance to the individual ATCO preferences in strategy execution for conflict resolution are two key factors that impact their use. This paper proposes a methodology to unearth and classify ATCO conflict resolution strategies from simulator data of trained and qualified ATCOs. The methodology involves the extraction of ATCO executive control actions and the establishment of a system of strategy resolution classification based on ATCO radar commands and prevailing flight parameters in deconflicting a pair of aircraft. Six main strategies used to handle various categories of conflict were identified and discussed. It was found that ATCOs were about twice more likely to choose only vertical maneuvers in conflict resolution compared to horizontal maneuvers or a combination of both vertical and horizontal maneuvers.
Keywords: Air traffic control strategies, conflict resolution, simulator data, strategy classification system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 59729 Topology Optimization of Aircraft Fuselage Structure
Authors: Muniyasamy Kalanchiam, Baskar Mannai
Abstract:
Topology Optimization is a defined as the method of determining optimal distribution of material for the assumed design space with functionality, loads and boundary conditions [1]. Topology optimization can be used to optimize shape for the purposes of weight reduction, minimizing material requirements or selecting cost effective materials [2]. Topology optimization has been implemented through the use of finite element methods for the analysis, and optimization techniques based on the method of moving asymptotes, genetic algorithms, optimality criteria method, level sets and topological derivatives. Case study of Typical “Fuselage design" is considered for this paper to explain the benefits of Topology Optimization in the design cycle. A cylindrical shell is assumed as the design space and aerospace standard pay loads were applied on the fuselage with wing attachments as constraints. Then topological optimization is done using Finite Element (FE) based software. This optimization results in the structural concept design which satisfies all the design constraints using minimum material.Keywords: Fuselage, Topology optimization, payloads, designoptimization, Finite Element Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4094