Search results for: mechanism removal
622 An Improved Fast Search Method Using Histogram Features for DNA Sequence Database
Authors: Qiu Chen, Feifei Lee, Koji Kotani, Tadahiro Ohmi
Abstract:
In this paper, we propose an efficient hierarchical DNA sequence search method to improve the search speed while the accuracy is being kept constant. For a given query DNA sequence, firstly, a fast local search method using histogram features is used as a filtering mechanism before scanning the sequences in the database. An overlapping processing is newly added to improve the robustness of the algorithm. A large number of DNA sequences with low similarity will be excluded for latter searching. The Smith-Waterman algorithm is then applied to each remainder sequences. Experimental results using GenBank sequence data show the proposed method combining histogram information and Smith-Waterman algorithm is more efficient for DNA sequence search.Keywords: Fast search, DNA sequence, Histogram feature, Smith-Waterman algorithm, Local search
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1330621 Hybrid Multipath Congestion Control
Authors: Akshit Singhal, Xuan Wang, Zhijun Wang, Hao Che, Hong Jiang
Abstract:
Multiple Path Transmission Control Protocols (MPTCPs) allow flows to explore path diversity to improve the throughput, reliability and network resource utilization. However, the existing solutions may discourage users to adopt the solutions in the face of multipath scenario where different paths are charged based on different pricing structures, e.g., WiFi vs. cellular connections, widely available for mobile phones. In this paper, we propose a Hybrid MPTCP (H-MPTCP) with a built-in mechanism to incentivize users to use multiple paths with different pricing structures. In the meantime, H-MPTCP preserves the nice properties enjoyed by the state-of-the-art MPTCP solutions. Extensive real Linux implementation results verify that H-MPTCP can indeed achieve the design objectives.
Keywords: Congestion control, Network Utility Maximization, Multipath TCP, network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 383620 Applications for Accounting of Inherited Object-Oriented Class Members
Authors: Jehad Al Dallal
Abstract:
A class in an Object-Oriented (OO) system is the basic unit of design, and it encapsulates a set of attributes and methods. In OO systems, instead of redefining the attributes and methods that are included in other classes, a class can inherit these attributes and methods and only implement its unique attributes and methods, which results in reducing code redundancy and improving code testability and maintainability. Such mechanism is called Class Inheritance. However, some software engineering applications may require accounting for all the inherited class members (i.e., attributes and methods). This paper explains how to account for inherited class members and discusses the software engineering applications that require such consideration.
Keywords: Object-oriented design, inheritance, internal quality attribute, external quality attribute, class flattening.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1354619 Supporting QoS-aware Multicasting in Differentiated Service Networks
Authors: Manas Ranjan Kabat, Rajib Mall, Chita Ranjan Tripathy
Abstract:
A scalable QoS aware multicast deployment in DiffServ networks has become an important research dimension in recent years. Although multicasting and differentiated services are two complementary technologies, the integration of the two technologies is a non-trivial task due to architectural conflicts between them. A popular solution proposed is to extend the functionality of the DiffServ components to support multicasting. In this paper, we propose an algorithm to construct an efficient QoSdriven multicast tree, taking into account the available bandwidth per service class. We also present an efficient way to provision the limited available bandwidth for supporting heterogeneous users. The proposed mechanism is evaluated using simulated tests. The simulated result reveals that our algorithm can effectively minimize the bandwidth use and transmission costKeywords: Differentiated Services, multicasting, QoSheterogeneity, DSCP
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1490618 Modeling of a UAV Longitudinal Dynamics through System Identification Technique
Authors: Asadullah I. Qazi, Mansoor Ahsan, Zahir Ashraf, Uzair Ahmad
Abstract:
System identification of an Unmanned Aerial Vehicle (UAV), to acquire its mathematical model, is a significant step in the process of aircraft flight automation. The need for reliable mathematical model is an established requirement for autopilot design, flight simulator development, aircraft performance appraisal, analysis of aircraft modifications, preflight testing of prototype aircraft and investigation of fatigue life and stress distribution etc. This research is aimed at system identification of a fixed wing UAV by means of specifically designed flight experiment. The purposely designed flight maneuvers were performed on the UAV and aircraft states were recorded during these flights. Acquired data were preprocessed for noise filtering and bias removal followed by parameter estimation of longitudinal dynamics transfer functions using MATLAB system identification toolbox. Black box identification based transfer function models, in response to elevator and throttle inputs, were estimated using least square error technique. The identification results show a high confidence level and goodness of fit between the estimated model and actual aircraft response.
Keywords: Black box modeling, fixed wing aircraft, least square error, longitudinal dynamics, system identification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1138617 Matching Current Search with Future Postings
Authors: Kim Nee Goh, Viknesh Kumar Naleyah
Abstract:
Online trading is an alternative to conventional shopping method. People trade goods which are new or pre-owned before. However, there are times when a user is not able to search the items wanted online. This is because the items may not be posted as yet, thus ending the search. Conventional search mechanism only works by searching and matching search criteria (requirement) with data available in a particular database. This research aims to match current search requirements with future postings. This would involve the time factor in the conventional search method. A Car Matching Alert System (CMAS) prototype was developed to test the matching algorithm. When a buyer-s search returns no result, the system saves the search and the buyer will be alerted if there is a match found based on future postings. The algorithm developed is useful and as it can be applied in other search context.
Keywords: Matching algorithm, online trading, search, future postings, car matching
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1427616 The Collapse of a Crane on Site: A Case Study
Authors: T. Teruzzi, S. Antonietti, C. Mosca, C. Paglia
Abstract:
This paper discusses the causes of the structural failure in a tower crane. The structural collapse occurred at the upper joints of the extension element used to increase the height of the crane. The extension element consists of a steel lattice structure made with angular profiles and plates joined to the tower element by arc welding. Macroscopic inspection of the sections showed that the break was always observed on the angular profiles at the weld bead edge. The case study shows how, using mechanical characterization, chemical analysis of the steel and macroscopic and microscopic metallographic examinations, it was possible to obtain significant evidence that identified the mechanism causing the breakage. The analyses identified the causes of the structural failure as the use of materials that were not suitable for welding and poor performance in the welding joints.
Keywords: Failure, weld, microstructure, microcracks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 508615 Design Exploration on Mixed-Use Development of Island House: Take the Southeast Coastal Area of Chinese as an Example
Authors: Fu Jiayan, Wang Zhu, Sun Jiaojiao
Abstract:
Mixed-use development is one of the most important trends in new island house transformation along southeast coastal area in China. Unique island geographical environment and profound fishing village culture coexist for a long time in this. With artistic creation for the purpose of the "live-work" houses are in a large number of emergence, however, still lack of systematic strategy. Based on space effect from marine resources to regional human settlements, this article teases out the evolution regularity of island settlement context and architectural form, then, puts forward the formation mechanism and construction model of art island houses. Thereby, to further explore space design method and site creation strategy of mixed-use development.Keywords: Mixed-use, Island House, Art Creation, Southeast Coastal Area of Chinese.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1490614 Vaccinated Susceptible Infected and Recovered (VSIR) Mathematical Model to Study the Effect of Bacillus Calmette-Guerin (BCG) Vaccine and the Disease Stability Analysis
Authors: Muhammad Shahid, Nasir-uddin Khan, Mushtaq Hussain, Muhammad Liaquat Ali, Asif Mansoor
Abstract:
Tuberculosis (TB) remains a leading cause of infectious mortality. It is primarily transmitted by the respiratory route, individuals with active disease may infect others through airborne particles which releases when they cough, talk, or sing and subsequently inhale by others. In order to study the effect of the Bacilli Calmette-Guerin (BCG) vaccine after vaccination of TB patient, a Vaccinated Susceptible Infected and Recovered (VSIR) mathematical model is being developed to achieve the desired objectives. The mathematical model, so developed, shall be used to quantify the effect of BCG Vaccine to protect the immigrant young adult person. Moreover, equations are to be established for the disease endemic and free equilibrium states and subsequently utilized in disease stability analysis. The stability analysis will give a complete picture of disease annihilation from the total population if the total removal rate from the infectious group should be greater than total number of dormant infections produced throughout infectious period.Keywords: Bacillus Calmette-Guerin vaccine, disease-free equilibrium state, VSIR Quantification, disease stability analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1678613 Indonesian News Classification using Support Vector Machine
Authors: Dewi Y. Liliana, Agung Hardianto, M. Ridok
Abstract:
Digital news with a variety topics is abundant on the internet. The problem is to classify news based on its appropriate category to facilitate user to find relevant news rapidly. Classifier engine is used to split any news automatically into the respective category. This research employs Support Vector Machine (SVM) to classify Indonesian news. SVM is a robust method to classify binary classes. The core processing of SVM is in the formation of an optimum separating plane to separate the different classes. For multiclass problem, a mechanism called one against one is used to combine the binary classification result. Documents were taken from the Indonesian digital news site, www.kompas.com. The experiment showed a promising result with the accuracy rate of 85%. This system is feasible to be implemented on Indonesian news classification.Keywords: classification, Indonesian news, text processing, support vector machine
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3489612 LQR and SMC Stabilization of a New Unmanned Aerial Vehicle
Authors: Kaan T. Oner, Ertugrul Cetinsoy, Efe Sirimoglu, Cevdet Hancer, Taylan Ayken, Mustafa Unel
Abstract:
We present our ongoing work on the development of a new quadrotor aerial vehicle which has a tilt-wing mechanism. The vehicle is capable of take-off/landing in vertical flight mode (VTOL) and flying over long distances in horizontal flight mode. Full dynamic model of the vehicle is derived using Newton-Euler formulation. Linear and nonlinear controllers for the stabilization of attitude of the vehicle and control of its altitude have been designed and implemented via simulations. In particular, an LQR controller has been shown to be quite effective in the vertical flight mode for all possible yaw angles. A sliding mode controller (SMC) with recursive nature has also been proposed to stabilize the vehicle-s attitude and altitude. Simulation results show that proposed controllers provide satisfactory performance in achieving desired maneuvers.Keywords: UAV, VTOL, dynamic model, stabilization, LQR, SMC
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2109611 Phage Capsid for Efficient Delivery of Cytotoxic Drugs
Authors: Simona Dostalova, Ana Maria Jimenez Jimenez, Marketa Vaculovicova, Vojtech Adam, Rene Kizek
Abstract:
Various nanomaterials can be used as a drug delivery vehicles in nanomedicine, called nanocarriers. They can either be organic or inorganic, synthetic or natural-based. Although synthetic nanocarriers are easier to produce, they can often be toxic for the organism and thus not suitable for use in treatment. From naturalbased nanocarriers, the most commonly used are protein cages or viral capsids. In this work, virus bacteriophage λ was used for delivery of different cytotoxic drugs (cisplatin, carboplatin, oxaliplatin and doxorubicin). Large quantities of phage λ were obtained from phage λ-producing strain of E. coli cultivated in medium with 0.2% maltose. After killing of E. coli with chloroform and its removal by centrifugation, the phage was concentrated by ultracentrifugation at 130 000×g and 4°C for 3 h. The encapsulation of the drugs was performed by infusion method and four different concentrations of the drugs were encapsulated (200; 100; 50; 25 μg·mL-1). Free drug molecules were removed by filtration. The encapsulation was verified using the absorbance for doxorubicin and atomic absorption spectrometry for platinum cytostatics. The amount of encapsulated drug linearly increased with the increasing concentration of applied drug with the determination coefficient R2=0.989 for doxorubicin; R2=0.967 for cisplatin; R2=0.989 for carboplatin and R2=0.996 for oxaliplatin. The overall encapsulation efficiency was calculated as 50% for doxorubicin; 8% for cisplatin; 6% for carboplatin and 10% for oxaliplatin.Keywords: Bacteriophage λ, doxorubicin, platinum cytostatics, protein-based nanocarrier, viral capsid.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1765610 Real-Time 3D City Generation using Shape Grammars with LOD Variations
Authors: Pearl Goswell, Jun Jo
Abstract:
Creating3D environments, including characters and cities, is a significantly time consuming process due to a large amount of workinvolved in designing and modelling.There have been a number of attempts to automatically generate 3D objects employing shape grammars. However it is still too early to apply the mechanism to real problems such as real-time computer games.The purpose of this research is to introduce a time efficient and cost effective method to automatically generatevarious 3D objects for real-time 3D games. This Shape grammar-based real-time City Generation (RCG) model is a conceptual model for generating 3Denvironments in real-time and can be applied to 3D gamesoranimations. The RCG system can generate even a large cityby applying fundamental principles of shape grammars to building elementsin various levels of detailin real-time.Keywords: real-time city generation, shape grammars, 3D games, 3D modelling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2326609 Back Bone Node Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks
Authors: Nidhi Gupta, Sanjoy Das, Khushal Singh
Abstract:
Mobile Ad hoc Network is a set of self-governing nodes which communicate through wireless links. Dynamic topology MANETs makes routing a challenging task. Various routing protocols are there, but due to various fundamental characteristic open medium, changing topology, distributed collaboration and constrained capability, these protocols are tend to various types of security attacks. Black hole is one among them. In this attack, malicious node represents itself as having the shortest path to the destination but that path not even exists. In this paper, we aim to develop a routing protocol for detection and prevention of black hole attack by modifying AODV routing protocol. This protocol is able to detect and prevent the black hole attack. Simulation is done using NS-2, which shows the improvement in network performance.Keywords: Ad hoc, AODV, Back Bone, routing, Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2160608 Key Frames Extraction for Sign Language Video Analysis and Recognition
Authors: Jaroslav Polec, Petra Heribanová, Tomáš Hirner
Abstract:
In this paper we proposed a method for finding video frames representing one sign in the finger alphabet. The method is based on determining hands location, segmentation and the use of standard video quality evaluation metrics. Metric calculation is performed only in regions of interest. Sliding mechanism for finding local extrema and adaptive threshold based on local averaging is used for key frames selection. The success rate is evaluated by recall, precision and F1 measure. The method effectiveness is compared with metrics applied to all frames. Proposed method is fast, effective and relatively easy to realize by simple input video preprocessing and subsequent use of tools designed for video quality measuring.Keywords: Key frame, video, quality, metric, MSE, MSAD, SSIM, VQM, sign language, finger alphabet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2033607 An Experimental Study to Control Single Droplet by Actuating Waveform with Preliminary and Suppressing Vibration
Authors: Oke Oktavianty, Tadayuki Kyoutani, Shigeyuki Haruyama, Ken Kaminishi
Abstract:
For advancing the experiment system standard of Inkjet printer that is being developed, the actual natural period, fire limitation number in droplet weight measurement and observation distance in droplet velocity measurement was investigated. In another side, the study to control the droplet volume in inkjet printer with negative actuating waveform method is still limited. Therefore, the effect of negative waveform with preliminary and suppressing vibration addition on the droplet formation process, droplet shape, volume and velocity were evaluated. The different voltage and print-head temperature were exerted to obtain the optimum preliminary and suppressing vibration. The mechanism of different phenomenon from each waveform was also discussed.
Keywords: Inkjet printer, DoD, waveform, preliminary and suppressing vibration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 946606 Novel Dual Stage Membrane Bioreactor for the Continuous Remediation of Electroplating Wastewater
Authors: B. A. Q. Santos, S. K. O. Ntwampe, G. Muchatibaya
Abstract:
In this study, the designed dual stage membrane bioreactor (MBR) system was conceptualized for the treatment of cyanide and heavy metals in electroplating wastewater. The design consisted of a primary treatment stage to reduce the impact of fluctuations and the secondary treatment stage to remove the residual cyanide and heavy metal contaminants in the wastewater under alkaline pH conditions. The primary treatment stage contained hydrolyzed Citrus sinensis (C. sinensis) pomace and the secondary treatment stage contained active Aspergillus awamori (A. awamori) biomass, supplemented solely with C. sinensis pomace extract from the hydrolysis process. An average of 76.37%, 95.37%, 93.26 and 94.76% and 99.55%, 99.91%, 99.92% and 99.92% degradation efficiency for total cyanide (T-CN), including the sorption of nickel (Ni), zinc (Zn) and copper (Cu) were observed after the first and second treatment stages, respectively. Furthermore, cyanide conversion by-products degradation was 99.81% and 99.75 for both formate (CHOO-) and ammonium (NH4 +) after the second treatment stage. After the first, second and third regeneration cycles of the C. sinensis pomace in the first treatment stage, Ni, Zn and Cu removal achieved was 99.13%, 99.12% and 99.04% (first regeneration cycle), 98.94%, 98.92% and 98.41% (second regeneration cycle) and 98.46 %, 98.44% and 97.91% (third regeneration cycle), respectively. There was relatively insignificant standard deviation detected in all the measured parameters in the system which indicated reproducibility of the remediation efficiency in this continuous system.
Keywords: Aspergillus awamori, Citrus sinensis pomace, electroplating wastewater remediation, membrane bioreactor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2147605 A New Approach of Wireless Network Traffic on VPN
Authors: Amir Rashid, M. Saleem Khan, Freeha Zafar
Abstract:
This work presents a new approach of securing a wireless network. The configuration is focused on securing & Protecting wireless network traffic for a small network such as a home or dorm room. The security Mechanism provided both authentication, allowing only known authorized users access to the wireless network, and encryption, preventing anyone from reading the wireless traffic. The mentioned solution utilizes the open source free S/WAN software which implements the Internet Protocol Security –IPSEC. In addition to wireless components, wireless NIC in PC and wireless access point needs a machine running Linux to act as security gateway. While the current configuration assumes that the wireless PC clients are running Linux, Windows XP/VISTA/7 based machines equipped with VPN software which will allow to interface with this configuration.Keywords: Wireless network security, security network, authentication, encryption and internet protocol security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2143604 Bandwidth Allocation for ABR Service in Cellular Networks
Authors: Khaja Kamaluddin, Muhammed Yousoof
Abstract:
Available Bit Rate Service (ABR) is the lower priority service and the better service for the transmission of data. On wireline ATM networks ABR source is always getting the feedback from switches about increase or decrease of bandwidth according to the changing network conditions and minimum bandwidth is guaranteed. In wireless networks guaranteeing the minimum bandwidth is really a challenging task as the source is always in mobile and traveling from one cell to another cell. Re establishment of virtual circuits from start to end every time causes the delay in transmission. In our proposed solution we proposed the mechanism to provide more available bandwidth to the ABR source by re-usage of part of old Virtual Channels and establishing the new ones. We want the ABR source to transmit the data continuously (non-stop) inorderto avoid the delay. In worst case scenario at least minimum bandwidth is to be allocated. In order to keep the data flow continuously, priority is given to the handoff ABR call against new ABR call.Keywords: Bandwidth allocation, Virtual Channel (VC), CBR, ABR, MCR and QOS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1600603 Effects of Nanolayer Structure and Brownian Motion of Particles in Thermal Conductivity Enhancement of Nanofluids
Authors: M. Izadi, S. Hossainpour, D. Jalali-Vahid
Abstract:
Nanofluids are novel fluids that are going to have an important role in future industrial thermal device designs. Studies are being predominantly conducted on the mechanism of these heat transfers. The key to this attraction is in the increase in thermal conductivity brought about by the Nanofluids compared with the base fluid. Different models have been proposed for calculation of effective thermal conduction that has been gradually modified. In this investigation effect of nanolayer structure and Brownian motion of particles are studied and a new modified thermal conductivity model is proposed. Temperature, concentration, nanolayer thickness and particle size are taken as variables and their effect are studied simultaneously on the thermal conductivity of the fluids, showing the concentration of the nanoparticles to affect the nanolayer thickness which also affects the Brownian motion.Keywords: Relative thermal conductivity, Brownian motion, Nanolayer structure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1630602 Potential Field Functions for Motion Planning and Posture of the Standard 3-Trailer System
Authors: K. Raghuwaiya, S. Singh, B. Sharma, J. Vanualailai
Abstract:
This paper presents a set of artificial potential field functions that improves upon, in general, the motion planning and posture control, with theoretically guaranteed point and posture stabilities, convergence and collision avoidance properties of 3-trailer systems in a priori known environment. We basically design and inject two new concepts; ghost walls and the distance optimization technique (DOT) to strengthen point and posture stabilities, in the sense of Lyapunov, of our dynamical model. This new combination of techniques emerges as a convenient mechanism for obtaining feasible orientations at the target positions with an overall reduction in the complexity of the navigation laws. The effectiveness of the proposed control laws were demonstrated via simulations of two traffic scenarios.
Keywords: Artificial potential fields, 3-trailer systems, motion planning, posture, parking and collision-free trajectories.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2129601 Effect of Pre-Plasma Potential on Laser Ion Acceleration
Authors: Djemai Bara, Mohamed Faouzi Mahboub, Djamila Bennaceur-Doumaz
Abstract:
In this work, the role of the preformed plasma created on the front face of a target, irradiated by a high intensity short pulse laser, in the framework of ion acceleration process, modeled by Target Normal Sheath Acceleration (TNSA) mechanism, is studied. This plasma is composed of cold ions governed by fluid equations and non-thermal & trapped with densities represented by a "Cairns-Gurevich" equation. The self-similar solution of the equations shows that electronic trapping and the presence of non-thermal electrons in the pre-plasma are both responsible in ion acceleration as long as the proportion of energetic electrons is not too high. In the case where the majority of electrons are energetic, the electrons are accelerated directly by the ponderomotive force of the laser without the intermediate of an accelerating plasma wave.Keywords: Cairns-Gurevich Equation, ion acceleration, plasma expansion, pre-plasma.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 713600 Hybrid Hierarchical Routing Protocol for WSN Lifetime Maximization
Authors: H. Aoudia, Y. Touati, E. H. Teguig, A. Ali Cherif
Abstract:
Conceiving and developing routing protocols for wireless sensor networks requires considerations on constraints such as network lifetime and energy consumption. In this paper, we propose a hybrid hierarchical routing protocol named HHRP combining both clustering mechanism and multipath optimization taking into account residual energy and RSSI measures. HHRP consists of classifying dynamically nodes into clusters where coordinators nodes with extra privileges are able to manipulate messages, aggregate data and ensure transmission between nodes according to TDMA and CDMA schedules. The reconfiguration of the network is carried out dynamically based on a threshold value which is associated with the number of nodes belonging to the smallest cluster. To show the effectiveness of the proposed approach HHRP, a comparative study with LEACH protocol is illustrated in simulations.Keywords: Routing protocols, energy optimization, clustering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 902599 Automatic Deactivation in Phased Array Probe for Human Prostate Magnetic Resonance Imaging at 1.5T
Authors: Fotios N. Vlachos, Anastasios D. Garetsos, Nikolaos K. Uzunoglu, Efstathios D. Gotsis
Abstract:
A four element prototype phased array surface probe has been designed and constructed to improve clinical human prostate spectroscopic data. The probe consists of two pairs of adjacent rectangular coils with an optimum overlap to reduce the mutual inductance. The two pairs are positioned on the anterior and the posterior pelvic region and two couples of varactors at the input of each coil undertake the procedures of tuning and matching. The probe switches off and on automatically during the consecutive phases of the MR experiment with the use of an analog switch that is triggered by a microcontroller. Experimental tests that were carried out resulted in high levels of tuning accuracy. Also, the switching mechanism functions properly for various applied loads and pulse sequence characteristics, producing only 10 μs of latency.Keywords: Automatic tuning, prostate imaging, phased array, spectroscopy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1681598 Identifying Attack Code through an Ontology-Based Multiagent Tool: FROID
Authors: Salvador Mandujano
Abstract:
This paper describes the design and results of FROID, an outbound intrusion detection system built with agent technology and supported by an attacker-centric ontology. The prototype features a misuse-based detection mechanism that identifies remote attack tools in execution. Misuse signatures composed of attributes selected through entropy analysis of outgoing traffic streams and process runtime data are derived from execution variants of attack programs. The core of the architecture is a mesh of self-contained detection cells organized non-hierarchically that group agents in a functional fashion. The experiments show performance gains when the ontology is enabled as well as an increase in accuracy achieved when correlation cells combine detection evidence received from independent detection cells.Keywords: Outbound intrusion detection, knowledge management, multiagent systems, ontology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1663597 Enabling Automated Deployment for Cluster Computing in Distributed PC Classrooms
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang
Abstract:
The rapid improvement of the microprocessor and network has made it possible for the PC cluster to compete with conventional supercomputers. Lots of high throughput type of applications can be satisfied by using the current desktop PCs, especially for those in PC classrooms, and leave the supercomputers for the demands from large scale high performance parallel computations. This paper presents our development on enabling an automated deployment mechanism for cluster computing to utilize the computing power of PCs such as reside in PC classroom. After well deployment, these PCs can be transformed into a pre-configured cluster computing resource immediately without touching the existing education/training environment installed on these PCs. Thus, the training activities will not be affected by this additional activity to harvest idle computing cycles. The time and manpower required to build and manage a computing platform in geographically distributed PC classrooms also can be reduced by this development.
Keywords: PC cluster, automated deployment, cluster computing, PC classroom.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1530596 An Improved Scheduling Strategy in Cloud Using Trust Based Mechanism
Authors: D. Sumathi, P. Poongodi
Abstract:
Cloud Computing refers to applications delivered as services over the internet, and the datacenters that provide those services with hardware and systems software. These were earlier referred to as Software as a Service (SaaS). Scheduling is justified by job components (called tasks), lack of information. In fact, in a large fraction of jobs from machine learning, bio-computing, and image processing domains, it is possible to estimate the maximum time required for a task in the job. This study focuses on Trust based scheduling to improve cloud security by modifying Heterogeneous Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT (Trust Reputation HEFT) which is then compared to Dynamic Load Scheduling.Keywords: Software as a Service (SaaS), Trust, Heterogeneous Earliest Finish Time (HEFT) algorithm, Dynamic Load Scheduling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2196595 Implementation of Watch Dog Timer for Fault Tolerant Computing on Cluster Server
Authors: Meenakshi Bheevgade, Rajendra M. Patrikar
Abstract:
In today-s new technology era, cluster has become a necessity for the modern computing and data applications since many applications take more time (even days or months) for computation. Although after parallelization, computation speeds up, still time required for much application can be more. Thus, reliability of the cluster becomes very important issue and implementation of fault tolerant mechanism becomes essential. The difficulty in designing a fault tolerant cluster system increases with the difficulties of various failures. The most imperative obsession is that the algorithm, which avoids a simple failure in a system, must tolerate the more severe failures. In this paper, we implemented the theory of watchdog timer in a parallel environment, to take care of failures. Implementation of simple algorithm in our project helps us to take care of different types of failures; consequently, we found that the reliability of this cluster improves.Keywords: Cluster, Fault tolerant, Grid, Grid ComputingSystem, Meta-computing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2214594 Effect of Secondary Curvature on Mixing Characteristic within Constant Circular Tubes
Authors: Minh Tuan Nguyen, Sang-Wook Lee
Abstract:
In this study, numerical simulations on laminar flow in sinusoidal wavy shaped tubes were conducted for mean Reynolds number of 250, which is in the range of physiological flow-rate and investigated flow structures, pressure distribution and particle trajectories both in steady and periodic inflow conditions. For extensive comparisons, various wave lengths and amplitudes of sine function for geometry of tube models were employed. The results showed that small amplitude secondary curvature has significant influence on the nature of flow patterns and particle mixing mechanism. This implies that characterizing accurate geometry is essential in accurate predicting of in vivo hemodynamics and may motivate further study on any possibility of reflection of secondary flow on vascular remodeling and pathophysiology.Keywords: Secondary curvature, Sinusoidal wavy tubes, Mixing Characteristics, Pulsatile flow, Hemodynamics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1594593 An AK-Chart for the Non-Normal Data
Authors: Chia-Hau Liu, Tai-Yue Wang
Abstract:
Traditional multivariate control charts assume that measurement from manufacturing processes follows a multivariate normal distribution. However, this assumption may not hold or may be difficult to verify because not all the measurement from manufacturing processes are normal distributed in practice. This study develops a new multivariate control chart for monitoring the processes with non-normal data. We propose a mechanism based on integrating the one-class classification method and the adaptive technique. The adaptive technique is used to improve the sensitivity to small shift on one-class classification in statistical process control. In addition, this design provides an easy way to allocate the value of type I error so it is easier to be implemented. Finally, the simulation study and the real data from industry are used to demonstrate the effectiveness of the propose control charts.
Keywords: Multivariate control chart, statistical process control, one-class classification method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2270