Search results for: form of communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3121

Search results for: form of communication

2131 An Architecture Based on Capsule Networks for the Identification of Handwritten Signature Forgery

Authors: Luisa Mesquita Oliveira Ribeiro, Alexei Manso Correa Machado

Abstract:

Handwritten signature is a unique form for recognizing an individual, used to discern documents, carry out investigations in the criminal, legal, banking areas and other applications. Signature verification is based on large amounts of biometric data, as they are simple and easy to acquire, among other characteristics. Given this scenario, signature forgery is a worldwide recurring problem and fast and precise techniques are needed to prevent crimes of this nature from occurring. This article carried out a study on the efficiency of the Capsule Network in analyzing and recognizing signatures. The chosen architecture achieved an accuracy of 98.11% and 80.15% for the CEDAR and GPDS databases, respectively.

Keywords: Biometrics, deep learning, handwriting, signature forgery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 53
2130 Segmentation Free Nastalique Urdu OCR

Authors: Sobia T. Javed, Sarmad Hussain, Ameera Maqbool, Samia Asloob, Sehrish Jamil, Huma Moin

Abstract:

The electronically available Urdu data is in image form which is very difficult to process. Printed Urdu data is the root cause of problem. So for the rapid progress of Urdu language we need an OCR systems, which can help us to make Urdu data available for the common person. Research has been carried out for years to automata Arabic and Urdu script. But the biggest hurdle in the development of Urdu OCR is the challenge to recognize Nastalique Script which is taken as standard for writing Urdu language. Nastalique script is written diagonally with no fixed baseline which makes the script somewhat complex. Overlap is present not only in characters but in the ligatures as well. This paper proposes a method which allows successful recognition of Nastalique Script.

Keywords: HMM, Image processing, Optical CharacterRecognition, Urdu OCR.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2138
2129 Depth-Averaged Modelling of Erosion and Sediment Transport in Free-Surface Flows

Authors: Thomas Rowan, Mohammed Seaid

Abstract:

A fast finite volume solver for multi-layered shallow water flows with mass exchange and an erodible bed is developed. This enables the user to solve a number of complex sediment-based problems including (but not limited to), dam-break over an erodible bed, recirculation currents and bed evolution as well as levy and dyke failure. This research develops methodologies crucial to the under-standing of multi-sediment fluvial mechanics and waterway design. In this model mass exchange between the layers is allowed and, in contrast to previous models, sediment and fluid are able to transfer between layers. In the current study we use a two-step finite volume method to avoid the solution of the Riemann problem. Entrainment and deposition rates are calculated for the first time in a model of this nature. In the first step the governing equations are rewritten in a non-conservative form and the intermediate solutions are calculated using the method of characteristics. In the second stage, the numerical fluxes are reconstructed in conservative form and are used to calculate a solution that satisfies the conservation property. This method is found to be considerably faster than other comparative finite volume methods, it also exhibits good shock capturing. For most entrainment and deposition equations a bed level concentration factor is used. This leads to inaccuracies in both near bed level concentration and total scour. To account for diffusion, as no vertical velocities are calculated, a capacity limited diffusion coefficient is used. The additional advantage of this multilayer approach is that there is a variation (from single layer models) in bottom layer fluid velocity: this dramatically reduces erosion, which is often overestimated in simulations of this nature using single layer flows. The model is used to simulate a standard dam break. In the dam break simulation, as expected, the number of fluid layers utilised creates variation in the resultant bed profile, with more layers offering a higher deviation in fluid velocity . These results showed a marked variation in erosion profiles from standard models. The overall the model provides new insight into the problems presented at minimal computational cost.

Keywords: Erosion, finite volume method, sediment transport, shallow water equations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 962
2128 Smart Security Concept in the East Mediterranean: Anti-Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel, Osman Gül, İskender Cahit Şafak

Abstract:

This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities.

Keywords: Partnership, A3D, Maritime Security, Centers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1858
2127 Developing a Smart Card Using Internet of Things: Uni-C

Authors: Shatha S. Alshehri, Enji E. Alzamzami, Roaa H. Alansari, Rahaf J. Alwafi, Kholod A. Almwallad, Aeshah A. Alsiyami

Abstract:

This paper demonstrates a system that helps solve the congestion problem at the entrance gates and limits the spread of viruses among people in crowded environments, such as COVID-19, using the IoT (Internet of Things). Uni-C system may assist in organizing the campus entry process efficiently by developing a smart card application supported by NFC (Near Field Communication) technology through which users' information could be sent to a reader to share it with the server and allow the server to perform its tasks and send a confirmation response for the request either by acceptance or rejection.

Keywords: COVID-19, IoT, NFC technology, Uni-C.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 128
2126 A Close Study on the Nitrate Fertilizer Use and Environmental Pollution for Human Health in Iran

Authors: Saeed Rezaeian, M. Rezaee Boroon

Abstract:

Nitrogen accumulates in soils during the process of fertilizer addition to promote the plant growth. When the organic matter decomposes, the form of available nitrogen produced is in the form of nitrate, which is highly mobile. The most significant health effect of nitrate ingestion is methemoglobinemia in infants under six months of age (blue baby syndrome). The mobile nutrients, like nitrate nitrogen, are not stored in the soil as the available forms for the long periods and in large amounts. It depends on the needs for the crops such as vegetables. On the other hand, the vegetables will compete actively for nitrate nitrogen as a mobile nutrient and water. The mobile nutrients must be shared. The fewer the plants, the larger this share is for each plant. Also, this nitrate nitrogen is poisonous for the people who use these vegetables. Nitrate is converted to nitrite by the existing bacteria in the stomach and the Gastro-Intestinal (GI) tract. When nitrite is entered into the blood cells, it converts the hemoglobin to methemoglobin, which causes the anoxemia and cyanosis. The increasing use of pesticides and chemical fertilizers, especially the fertilizers with nitrates compounds, which have been common for the increased production of agricultural crops, has caused the nitrate pollution in the (soil, water, and environment). They have caused a lot of damage to humans and animals. In this research, the nitrate accumulation in different kind of vegetables such as; green pepper, tomatoes, egg plants, watermelon, cucumber, and red pepper were observed in the suburbs of Mashhad, Neisabour, and Sabzevar cities. In some of these cities, the information forms of agronomical practices collected were such as; different vegetable crops fertilizer recommendations, varieties, pesticides, irrigation schedules, etc., which were filled out by some of our colleagues in the research areas mentioned above. Analysis of the samples was sent to the soil and water laboratory in our department in Mashhad. The final results from the chemical analysis of samples showed that the mean levels of nitrates from the samples of the fruit crops in the mentioned cities above were all lower than the critical levels. These fruit crop samples were in the order of: 35.91, 8.47, 24.81, 6.03, 46.43, 2.06 mg/kg dry matter, for the following crops such as; tomato, cucumber, eggplant, watermelon, green pepper, and red pepper. Even though, this study was conducted with limited samples and by considering the mean levels, the use of these crops from the nutritional point of view will not cause the poisoning of humans.

Keywords: Environmental pollution, human health, nitrate accumulations, nitrate fertilizers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1156
2125 Efficient Frontier - Comparing Different Volatility Estimators

Authors: Tea Poklepović, Zdravka Aljinović, Mario Matković

Abstract:

Modern Portfolio Theory (MPT) according to Markowitz states that investors form mean-variance efficient portfolios which maximizes their utility. Markowitz proposed the standard deviation as a simple measure for portfolio risk and the lower semi-variance as the only risk measure of interest to rational investors. This paper uses a third volatility estimator based on intraday data and compares three efficient frontiers on the Croatian Stock Market. The results show that range-based volatility estimator outperforms both mean-variance and lower semi-variance model.

Keywords: Variance, lower semi-variance, range-based volatility.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2560
2124 A Comparative Case Study of the Impact of Square and Yurt-Shape Buildings on Energy Efficiency

Authors: Valeriya Tyo, Serikbolat Yessengabulov

Abstract:

Regions with extreme climate conditions such as Astana city require energy saving measures to increase energy performance of buildings which are responsible for more than 40% of total energy consumption. Identification of optimal building geometry is one of key factors to be considered. Architectural form of a building has impact on space heating and cooling energy use, however the interrelationship between the geometry and resultant energy use is not always readily apparent. This paper presents a comparative case study of two prototypical buildings with compact building shape to assess its impact on energy performance.

Keywords: Building geometry, energy efficiency, heat gain, heat loss.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2505
2123 Generator of Hypotheses an Approach of Data Mining Based on Monotone Systems Theory

Authors: Rein Kuusik, Grete Lind

Abstract:

Generator of hypotheses is a new method for data mining. It makes possible to classify the source data automatically and produces a particular enumeration of patterns. Pattern is an expression (in a certain language) describing facts in a subset of facts. The goal is to describe the source data via patterns and/or IF...THEN rules. Used evaluation criteria are deterministic (not probabilistic). The search results are trees - form that is easy to comprehend and interpret. Generator of hypotheses uses very effective algorithm based on the theory of monotone systems (MS) named MONSA (MONotone System Algorithm).

Keywords: data mining, monotone systems, pattern, rule.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1238
2122 Leatherback Turtle (Dermochelys coriacea) after Incubation Eggshell in Andaman Sea, Thailand Study: Microanalysis on Ultrastructure and Elemental Composition

Authors: M. Areekijseree, M. Pumipaiboon, S. Nuamsukon, K. Kittiwattanawong, C. Thongchai, S. Sikiwat, T. Chuen-Im

Abstract:

There are few studies on eggshell of leatherback turtle which is endangered species in Thailand. This study was focusing on the ultrastructure and elemental composition of leatherback turtle eggshells collected from Andaman Sea Shore, Thailand during the nesting season using scanning electron microscope (SEM). Three eggshell layers of leatherback turtle; the outer cuticle layer or calcareous layer, the middle layer or middle multistrata layer and the inner fibrous layer were recognized. The outer calcareous layer was thick and porosity which consisted of loose nodular units of various crystal shapes and sizes. The loose attachment between these units resulted in numerous spaces and openings. The middle layer was compact thick with several multistrata and contained numerous openings connecting to both outer cuticle layer and inner fibrous layer. The inner fibrous layer was compact and thin, and composed of numerous reticular fibers. Energy dispersive X-ray microanalysis detector revealed energy spectrum of X-rays character emitted from all elements on each layer. The percentages of all elements were found in the following order: carbon (C) > oxygen (O) > calcium (Ca) > sulfur (S) > potassium (K) > aluminum (Al) > iodine (I) > silicon (Si) > chlorine (Cl) > sodium (Na) > fluorine (F) > phosphorus (P) > magnesium (Mg). Each layer consisted of high percentage of CaCO3 (approximately 98%) implying that it was essential for turtle embryonic development. A significant difference was found in the percentages of Ca and Mo in the 3layers. Moreover, transition metal, metal and toxic non-metal contaminations were found in leatherback turtle eggshell samples. These were palladium (Pd), molybdenum (Mo), copper (Cu), aluminum (Al), lead (Pb), and bromine (Br). The contamination elements were seen in the outer layers except for Mo. All elements were readily observed and mapped using Smiling program. X-ray images which mapped the location of all elements were showed. Calcium containing in the eggshell appeared in high contents and was widely distributing in clusters of the outer cuticle layer to form CaCO3 structure. Moreover, the accumulation of Na and Cl was observed to form NaCl which was widely distributing in 3 eggshell layers. The results from this study would be valuable on assessing the emergent success in this endangered species.

Keywords: Leatherback turtle (Dermochelys coriacea), SEM (SEI/EDX), turtle eggshell.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1972
2121 Health Effects of Trihalomethanes as Chlorinated Disinfection by Products: A Review Article

Authors: M. R. Mohamadshafiee, L. Taghavi

Abstract:

Trihalomethanes (THMs) were among the first disinfection byproducts to be discovered in chlorinated water. The substances form during a reaction between chlorine and organic matter in the water. Trihalomethanes are suspected to have negative effects on birth such as, low birth weight, intrauterine growth retardation in term births, as well as gestational age and preterm delivery. There are also some evidences showing these by-products to be mutagenic and carcinogenic, the greatest amount of evidence being related to the bladder cancer. However, there exist inconsistencies regarding such effects of THMs as different studies have provided different results in this regard. The aim of the present study is to provide a review of the related researches about the above mentioned health effects of THMs.

Keywords: Trihalomethans, by-products, disinfection, carcinogenic

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4698
2120 The Approximate Solution of Linear Fuzzy Fredholm Integral Equations of the Second Kind by Using Iterative Interpolation

Authors: N. Parandin, M. A. Fariborzi Araghi

Abstract:

in this paper, we propose a numerical method for the approximate solution of fuzzy Fredholm functional integral equations of the second kind by using an iterative interpolation. For this purpose, we convert the linear fuzzy Fredholm integral equations to a crisp linear system of integral equations. The proposed method is illustrated by some fuzzy integral equations in numerical examples.

Keywords: Fuzzy function integral equations, Iterative method, Linear systems, Parametric form of fuzzy number.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1385
2119 Laban Movement Analysis Using Kinect

Authors: Ran Bernstein, Tal Shafir, Rachelle Tsachor, Karen Studd, Assaf Schuster

Abstract:

Laban Movement Analysis (LMA), developed in the dance community over the past seventy years, is an effective method for observing, describing, notating, and interpreting human movement to enhance communication and expression in everyday and professional life. Many applications that use motion capture data might be significantly leveraged if the Laban qualities will be recognized automatically. This paper presents an automated recognition method of Laban qualities from motion capture skeletal recordings and it is demonstrated on the output of Microsoft’s Kinect V2 sensor.

Keywords: Laban Movement Analysis, Kinect, Machine Learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2791
2118 Unsupervised Texture Segmentation via Applying Geodesic Active Regions to Gaborian Feature Space

Authors: Yuan He, Yupin Luo, Dongcheng Hu

Abstract:

In this paper, we propose a novel variational method for unsupervised texture segmentation. We use a Gabor filter bank to extract texture features. Some of the filtered channels form a multidimensional Gaborian feature space. To avoid deforming contours directly in a vector-valued space we use a Gaussian mixture model to describe the statistical distribution of this space and get the boundary and region probabilities. Then a framework of geodesic active regions is applied based on them. In the end, experimental results are presented, and show that this method can obtain satisfied boundaries between different texture regions.

Keywords: Texture segmentation, Gabor filter, snakes, Geodesicactive regions

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1742
2117 Preservation of Molecular Ozone in a Clathrate Hydrate : Three-Phase (Gas + Liquid + Hydrate) Equilibrium Measurements for O3 + O2 + CO2 + H2O Systems

Authors: Kazutoshi Shishido, Sanehiro Muromachi, Ryo Ohmura

Abstract:

This paper reports the three-phase (gas + liquid + hydrate) equilibrium pressure versus temperature data for a (O3 + O2 + CO2 + H2O) system for developing the hydrate-based technology to preserve ozone, a chemically unstable substance, for various industrial, medical and consumer uses. These data cover the temperature range from 272 K to 277 K, corresponding to pressures from 1.6 MPa to 3.1 MPa, for each of the three different (O3 + O2)-to-CO2 or O2-to-CO2 molar ratios in the gas phase, which are approximately 4 : 6, 5 : 5, respectively. The mole fraction of ozone in the gas phase was ~0.03 , which are the densest ozone fraction to artificially form O3 containing hydrate ever reported in the literature. Based on these data, the formation of hydrate containing high-concentration ozone, as high as 1 mass %, will be expected.

Keywords: Clathrate hydrate, Ozone, Molecule storage, Sterilization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1483
2116 Consumer Load Profile Determination with Entropy-Based K-Means Algorithm

Authors: Ioannis P. Panapakidis, Marios N. Moschakis

Abstract:

With the continuous increment of smart meter installations across the globe, the need for processing of the load data is evident. Clustering-based load profiling is built upon the utilization of unsupervised machine learning tools for the purpose of formulating the typical load curves or load profiles. The most commonly used algorithm in the load profiling literature is the K-means. While the algorithm has been successfully tested in a variety of applications, its drawback is the strong dependence in the initialization phase. This paper proposes a novel modified form of the K-means that addresses the aforementioned problem. Simulation results indicate the superiority of the proposed algorithm compared to the K-means.

Keywords: Clustering, load profiling, load modeling, machine learning, energy efficiency and quality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1177
2115 Web Application for Evaluating Tests in Distance Learning Systems

Authors: Bogdan Walek, Vladimir Bradac, Radim Farana

Abstract:

Distance learning systems offer useful methods of learning and usually contain a final course test or another form of test. The paper proposes a web application for evaluating tests using an expert system in distance learning systems. The proposed web application is appropriate for didactic tests or tests with results for subsequent studying follow-up courses. The web application works with test questions and uses an expert system and LFLC tool for test evaluation. After test evaluation, the results are visualized and shown to the student.

Keywords: Distance learning, test, uncertainty, fuzzy, expert system, student.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1525
2114 Critical Issues of Inclusion of Aviation in EU Emissions Trading System

Authors: Jakub Hospodka

Abstract:

This paper dissertates about issues which may occur after next year will be major part of civil aviation in EU included into system of Emission trading. This system should help to fight against global warming and to fulfill Kyoto Protocol commitments of European countries. Main issues mentioned in this paper are connected with problem of radiative forcing from emissions and lack of their monitoring and charging in EU legislative. There are mentioned main differences between industrial emissions and emissions form aviation with notification about possible negative impacts of neglecting these differences. Special attention is dedicated to risk of possible reverse effect of inclusion aviation in EU ETS, which may theoretically occur.

Keywords: EU ETS, radiative forcing, aviation, emissiontrading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1385
2113 Study of a BVAR(p) Process Applied to U.S. Commodity Market Data

Authors: Jan Sindelar

Abstract:

The paper presents an applied study of a multivariate AR(p) process fitted to daily data from U.S. commodity futures markets with the use of Bayesian statistics. In the first part a detailed description of the methods used is given. In the second part two BVAR models are chosen one with assumption of lognormal, the second with normal distribution of prices conditioned on the parameters. For a comparison two simple benchmark models are chosen that are commonly used in todays Financial Mathematics. The article compares the quality of predictions of all the models, tries to find an adequate rate of forgetting of information and questions the validity of Efficient Market Hypothesis in the semi-strong form.

Keywords: Vector auto-regression, forecasting, financial, Bayesian, efficient markets.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1179
2112 A Novel Dual-Purpose Image Watermarking Technique

Authors: Maha Sharkas, Dahlia R. ElShafie, Nadder Hamdy

Abstract:

Image watermarking has proven to be quite an efficient tool for the purpose of copyright protection and authentication over the last few years. In this paper, a novel image watermarking technique in the wavelet domain is suggested and tested. To achieve more security and robustness, the proposed techniques relies on using two nested watermarks that are embedded into the image to be watermarked. A primary watermark in form of a PN sequence is first embedded into an image (the secondary watermark) before being embedded into the host image. The technique is implemented using Daubechies mother wavelets where an arbitrary embedding factor α is introduced to improve the invisibility and robustness. The proposed technique has been applied on several gray scale images where a PSNR of about 60 dB was achieved.

Keywords: Image watermarking, Multimedia Security, Wavelets, Image Processing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1674
2111 Korean Men’s Interest in Gonzo Pornography and Use of Condoms

Authors: Chyng Sun

Abstract:

This brief report examines correlations between Korean men’s interest in gonzo pornography, perceptions of pornography’s functional value, and use of condoms. The report found that, neither a higher interest in gonzo or the perception that pornography is a source of sexual information was directly related to condom utilization. However, interest in gonzo pornography interacted with pornography perceptions to predict condomless sex. The findings suggest that Korean men who 1) had higher interest in viewing gonzo pornography, and 2) had a tendency to view pornography as a source of sexual information, are more likely to have sex without condoms. That is, when viewers consider pornography to be a form of sexual education, they are more likely to use the learned pornographic script to inform their sexual behavior.

Keywords: Korean, male, pornography, sexuality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1141
2110 Promoting Collaborative Learning in Software Engineering by Adapting the PBL Strategy

Authors: Charlie Y. Shim, Mina Choi, Jung Y. Kim

Abstract:

Software engineering education not only embraces technical skills of software development but also necessitates communication and interaction among learners. In this paper, it is proposed to adapt the PBL methodology that is especially designed to be integrated into software engineering classroom in order to promote collaborative learning environment. This approach helps students better understand the significance of social aspects and provides a systematic framework to enhance teamwork skills. The adaptation of PBL facilitates the transition to an innovative software development environment where cooperative learning can be actualized.

Keywords: problem-based learning, software engineering, software process models, teamwork.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1694
2109 Encrypted Audio Transmission Using Synchronized Nd: YAG Lasers

Authors: R.M. López-Gutiérrez, C. Cruz-Hernández, C. Posadas-Castillo, E.E.García-Guerrero

Abstract:

Encoded information based on synchronization of coupled chaotic Nd:YAG lasers in master-slave configuration is numerically studied. Encoding, transmission, and decoding of information in optical chaotic communication with a single channel is presented. We analyze the robustness of the encrypted audio transmission in a channel noise. In order to illustrate this synchronization robustness, we present two cases of study: synchronization and transmission with a single channel without and with noise in the channel.

Keywords: Encryption, Secure coomunication, Chaos, Synchronization, Complex networks, Nd:YAG laser.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511
2108 Existence of Solutions for a Nonlinear Fractional Differential Equation with Integral Boundary Condition

Authors: Meng Hu, Lili Wang

Abstract:

This paper deals with a nonlinear fractional differential equation with integral boundary condition of the following form:  Dαt x(t) = f(t, x(t),Dβ t x(t)), t ∈ (0, 1), x(0) = 0, x(1) = 1 0 g(s)x(s)ds, where 1 < α ≤ 2, 0 < β < 1. Our results are based on the Schauder fixed point theorem and the Banach contraction principle.

Keywords: Fractional differential equation, Integral boundary condition, Schauder fixed point theorem, Banach contraction principle.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634
2107 Mapping Complex, Large – Scale Spiking Networks on Neural VLSI

Authors: Christian Mayr, Matthias Ehrlich, Stephan Henker, Karsten Wendt, René Schüffny

Abstract:

Traditionally, VLSI implementations of spiking neural nets have featured large neuron counts for fixed computations or small exploratory, configurable nets. This paper presents the system architecture of a large configurable neural net system employing a dedicated mapping algorithm for projecting the targeted biology-analog nets and dynamics onto the hardware with its attendant constraints.

Keywords: Large scale VLSI neural net, topology mapping, complex pulse communication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1661
2106 AI Applications to Metal Stamping Die Design– A Review

Authors: Vishal Naranje, Shailendra Kumar

Abstract:

Metal stamping die design is a complex, experiencebased and time-consuming task. Various artificial intelligence (AI) techniques are being used by worldwide researchers for stamping die design to reduce complexity, dependence on human expertise and time taken in design process as well as to improve design efficiency. In this paper a comprehensive review of applications of AI techniques in manufacturability evaluation of sheet metal parts, die design and process planning of metal stamping die is presented. Further the salient features of major research work published in the area of metal stamping are presented in tabular form and scope of future research work is identified.

Keywords: Artificial Intelligence, Die design, ManufacturabilityEvaluation, Metal Stamping Die.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3818
2105 Applications of Entropy Measures in Field of Queuing Theory

Authors: R.K.Tuli

Abstract:

In the present communication, we have studied different variations in the entropy measures in the different states of queueing processes. In case of steady state queuing process, it has been shown that as the arrival rate increases, the uncertainty increases whereas in the case of non-steady birth-death process, it is shown that the uncertainty varies differently. In this pattern, it first increases and attains its maximum value and then with the passage of time, it decreases and attains its minimum value.

Keywords: Entropy, Birth-death process, M/G/1 system, G/M/1system, Steady state, Non-steady state

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1572
2104 Bit Error Rate Analysis of Mobile Communication Network in Nakagami Fading Channel: Interference Considerations

Authors: Manoranjan Das, Benudhar Sahu, Urmila Bhanja

Abstract:

Co-channel interference is one of the major problems in wireless systems. The effects of co-channel interference in a Nakagami fading channel on the ABER (Average Bit Error Rate) with static nodes are well analyzed. In this paper, we derive the ABER with the presence of mobile nodes. ABER is also derived for mobile systems in the presence of co-channel interference.

Keywords: ABER, co-channel interference, Nakagami fading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1207
2103 Time-Delay Estimation Using Cross-ΨB-Energy Operator

Authors: Z. Saidi, A.O. Boudraa, J.C. Cexus, S. Bourennane

Abstract:

In this paper, a new time-delay estimation technique based on the cross IB-energy operator [5] is introduced. This quadratic energy detector measures how much a signal is present in another one. The location of the peak of the energy operator, corresponding to the maximum of interaction between the two signals, is the estimate of the delay. The method is a fully data-driven approach. The discrete version of the continuous-time form of the cross IBenergy operator, for its implementation, is presented. The effectiveness of the proposed method is demonstrated on real underwater acoustic signals arriving from targets and the results compared to the cross-correlation method.

Keywords: Teager-Kaiser energy operator, Cross-energyoperator, Time-Delay, Underwater acoustic signals.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5628
2102 Key Exchange Protocol over Insecure Channel

Authors: Alaa Fahmy

Abstract:

Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack both symmetric and public key cryptosystems through their key management. We introduce a protocol to exchange cipher keys over insecure communication channel. This protocol is based on public key cryptosystem, especially elliptic curve cryptosystem. Meanwhile, it tests the cipher keys and selects only the good keys and rejects the weak one.

Keywords: Key management and key distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1470