Search results for: Supervisory Control and Data Acquisition System
3197 Complex Energy Signal Model for Digital Human Fingerprint Matching
Authors: Jason Zalev, Reza Sedaghat
Abstract:
This paper describes a complex energy signal model that is isomorphic with digital human fingerprint images. By using signal models, the problem of fingerprint matching is transformed into the signal processing problem of finding a correlation between two complex signals that differ by phase-rotation and time-scaling. A technique for minutiae matching that is independent of image translation, rotation and linear-scaling, and is resistant to missing minutiae is proposed. The method was tested using random data points. The results show that for matching prints the scaling and rotation angles are closely estimated and a stronger match will have a higher correlation.Keywords: Affine Invariant, Fingerprint Recognition, Matching, Minutiae.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13183196 A Robust Al-Hawalees Gaming Automation using Minimax and BPNN Decision
Authors: Ahmad Sharieh, R Bremananth
Abstract:
Artificial Intelligence based gaming is an interesting topic in the state-of-art technology. This paper presents an automation of a tradition Omani game, called Al-Hawalees. Its related issues are resolved and implemented using artificial intelligence approach. An AI approach called mini-max procedure is incorporated to make a diverse budges of the on-line gaming. If number of moves increase, time complexity will be increased in terms of propositionally. In order to tackle the time and space complexities, we have employed a back propagation neural network (BPNN) to train in off-line to make a decision for resources required to fulfill the automation of the game. We have utilized Leverberg- Marquardt training in order to get the rapid response during the gaming. A set of optimal moves is determined by the on-line back propagation training fashioned with alpha-beta pruning. The results and analyses reveal that the proposed scheme will be easily incorporated in the on-line scenario with one player against the system.
Keywords: Artificial neural network, back propagation gaming, Leverberg-Marquardt, minimax procedure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19373195 On Estimating the Headcount Index by Using the Logistic Regression Estimator
Authors: Encarnación Álvarez, Rosa M. García-Fernández, Juan F. Muñoz, Francisco J. Blanco-Encomienda
Abstract:
The problem of estimating a proportion has important applications in the field of economics, and in general, in many areas such as social sciences. A common application in economics is the estimation of the headcount index. In this paper, we define the general headcount index as a proportion. Furthermore, we introduce a new quantitative method for estimating the headcount index. In particular, we suggest to use the logistic regression estimator for the problem of estimating the headcount index. Assuming a real data set, results derived from Monte Carlo simulation studies indicate that the logistic regression estimator can be more accurate than the traditional estimator of the headcount index.
Keywords: Poverty line, poor, risk of poverty, sample, Monte Carlo simulations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20973194 Chinese Event Detection Technique Based on Dependency Parsing and Rule Matching
Authors: Weitao Lin
Abstract:
To quickly extract adequate information from large-scale unstructured text data, this paper studies the representation of events in Chinese scenarios and performs the regularized abstraction. It proposes a Chinese event detection technique based on dependency parsing and rule matching. The method first performs dependency parsing on the original utterance, then performs pattern matching at the word or phrase granularity based on the results of dependent syntactic analysis, filters out the utterances with prominent non-event characteristics, and obtains the final results. The experimental results show the effectiveness of the method.
Keywords: Natural Language Processing, Chinese event detection, rules matching, dependency parsing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1753193 Prediction of Soil Liquefaction by Using UBC3D-PLM Model in PLAXIS
Authors: A. Daftari, W. Kudla
Abstract:
Liquefaction is a phenomenon in which the strength and stiffness of a soil is reduced by earthquake shaking or other rapid cyclic loading. Liquefaction and related phenomena have been responsible for huge amounts of damage in historical earthquakes around the world. Modeling of soil behavior is the main step in soil liquefaction prediction process. Nowadays, several constitutive models for sand have been presented. Nevertheless, only some of them can satisfy this mechanism. One of the most useful models in this term is UBCSAND model. In this research, the capability of this model is considered by using PLAXIS software. The real data of superstition hills earthquake 1987 in the Imperial Valley was used. The results of the simulation have shown resembling trend of the UBC3D-PLM model.
Keywords: Liquefaction, Plaxis, Pore-Water pressure, UBC3D-PLM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 71053192 Does Leisure Time Use Contribute to a Wage Increase of the Thai People?
Authors: Siriwan Saksiriruthai
Abstract:
This paper develops models to analyze the relationship between leisure time and wage change. Using Thailand-s Time Use Survey and Labor Force Survey data, the estimation of wage changes in response to leisure time change indicates that media receiving, personal care and social participation and volunteer activities are the ones that significantly raise hourly wages. Thus, the finding suggests the stimulation in time use for media access to enhance knowledge and productivity, personal care for attractiveness and healthiness in order to raise productivity, and social activities to develop connections for possible future opportunities including wage increase. These activities should be promoted for productive leisure time and for welfare improvement.Keywords: Leisure, wage, time use, Thailand.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15883191 Effect of Temperature of Exposure on Properties of Cement Mortar with MSWI Bottom Ash
Authors: Z. Pavlík, M. Keppert, J. Žumár, M. Pavlíková, A. Trník, R. Černý
Abstract:
Effect of high temperature exposure on properties of cement mortar containing municipal solid waste incineration (MSWI) bottom ash as partial natural aggregate replacement is analyzed in the paper. The measurements of mechanical properties, bulk density, matrix density, total open porosity, sorption and desorption isotherms are done on samples exposed to the temperatures of 20°C to 1000°C. TGA analysis is performed as well. Finally, the studied samples are analyzed by IR spectroscopy in order to evaluate TGA data.
Keywords: Cement mortar, high temperature exposure, MSWI bottom ash, natural aggregate replacement, mechanical properties
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18593190 Variable Input Range Continuous-time Switched Current Delta-sigma Analog Digital Converter for RFID CMOS Biosensor Applications
Authors: Boram Kim, Shigeyasu Uno, Kazuo Nakazato
Abstract:
Continuous-time delta-sigma analog digital converter (ADC) for radio frequency identification (RFID) complementary metal oxide semiconductor (CMOS) biosensor has been reported. This delta-sigma ADC is suitable for digital conversion of biosensor signal because of small process variation, and variable input range. As the input range of continuous-time switched current delta-sigma ADC (Dynamic range : 50 dB) can be limited by using current reference, amplification of biosensor signal is unnecessary. The input range is switched to wide input range mode or narrow input range mode by command of current reference. When the narrow input range mode, the input range becomes ± 0.8 V. The measured power consumption is 5 mW and chip area is 0.31 mm^2 using 1.2 um standard CMOS process. Additionally, automatic input range detecting system is proposed because of RFID biosensor applications.
Keywords: continuous time, delta sigma, A/D converter, RFID, biosensor, CMOS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15633189 Performance Analysis of Deterministic Stable Election Protocol Using Fuzzy Logic in Wireless Sensor Network
Authors: Sumanpreet Kaur, Harjit Pal Singh, Vikas Khullar
Abstract:
In Wireless Sensor Network (WSN), the sensor containing motes (nodes) incorporate batteries that can lament at some extent. To upgrade the energy utilization, clustering is one of the prototypical approaches for split sensor motes into a number of clusters where one mote (also called as node) proceeds as a Cluster Head (CH). CH selection is one of the optimization techniques for enlarging stability and network lifespan. Deterministic Stable Election Protocol (DSEP) is an effectual clustering protocol that makes use of three kinds of nodes with dissimilar residual energy for CH election. Fuzzy Logic technology is used to expand energy level of DSEP protocol by using fuzzy inference system. This paper presents protocol DSEP using Fuzzy Logic (DSEP-FL) CH by taking into account four linguistic variables such as energy, concentration, centrality and distance to base station. Simulation results show that our proposed method gives more effective results in term of a lifespan of network and stability as compared to the performance of other clustering protocols.
Keywords: Deterministic stable election protocol, energy model, fuzzy logic, wireless sensor network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9783188 Safety Practices among Bus Operators during Wee Hour Operations
Authors: M.R. Osman, F. Abas, M.S. Noh, A. Mohamad Suffian, O. Ilhamah, H.Z. Zarir, A.B. Wahida, P. Noor Faradila, M.F. Siti Atiqah
Abstract:
Safety Health and Environment Code of Practice (SHE COP) was developed to help road transportation operators to manage its operation in a systematic and safe manner. A study was conducted to determine the effectiveness of SHE COP implementation during non-OPS period. The objective of the study is to evaluate the implementations of SHE COP among bus operators during wee hour operations. The data was collected by completing a set of checklist after observing the activities during pre departure, during the trip, and upon arrival. The results show that there are seven widely practiced SHE COP elements. 22% of the buses have average speed exceeding the maximum permissible speed on the highways (90 km/h), with 13% of the buses were travelling at the speed of more than 100 km/h. The statistical analysis shows that there is only one significant association which relates speeding with prior presence of enforcement officers.Keywords: Safety practices, speeding, wee hour.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15633187 Toward Community-Based Personal Cloud Computing
Authors: Weichang Du
Abstract:
This paper proposes a new of cloud computing for individual computer users to share applications in distributed communities, called community-based personal cloud computing (CPCC). The paper also presents a prototype design and implementation of CPCC. The users of CPCC are able to share their computing applications with other users of the community. Any member of the community is able to execute remote applications shared by other members. The remote applications behave in the same way as their local counterparts, allowing the user to enter input, receive output as well as providing the access to the local data of the user. CPCC provides a peer-to-peer (P2P) environment where each peer provides applications which can be used by the other peers that are connected CPCC.
Keywords: applications, cloud computing, services, software.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20533186 Construction and Analysis of Samurai Sudoku
Authors: A. Danbaba
Abstract:
Samurai Sudoku consists of five Sudoku square designs each having nine treatments in each row (column or sub-block) only once such the five Sudoku designs overlaps. Two or more Samurai designs can be joint together to give an extended Samurai design. In addition, two Samurai designs, each containing five Sudoku square designs, are mutually orthogonal (Graeco). If we superimpose two Samurai designs and obtained a pair of Latin and Greek letters in each row (column or sub-block) of the five Sudoku designs only once, then we have Graeco Samurai design. In this paper, simple method of constructing Samurai designs and mutually orthogonal Samurai design are proposed. In addition, linear models and methods of data analysis for the designs are proposed.
Keywords: Samurai design, Graeco samurai design, sudoku design, row or column swap.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14863185 Human Induced Dynamic Loading on Stairs
Authors: L. Gaile, I. Radinsh
Abstract:
Based on experimental data using accelerometry technology there was developed an analytical model that approximates human induced ground reaction forces in vertical, longitudinal and lateral directions ascending and descending the stairs. Proposed dynamic loading factors and corresponding phase shifts for the first five harmonics of continuous walking force history in case of stair ascend and descend. Into account is taken imperfectness of individual footfall forcing functions, differences between continuous walking force histories among individuals. There is proposed mean synthetic continuous walking force history that can be used in numerical simulations of human movement on the stairs.
Keywords: footfall, ground reaction forces, human loads, serviceability, stair vibration, walking
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22473184 Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
Authors: Dong-Young Yoo, Jong-Whoi Shin, Gang Shin Lee, Jae-Il Lee
Abstract:
As the disfunctions of the information society and social development progress, intrusion problems such as malicious replies, spam mail, private information leakage, phishing, and pharming, and side effects such as the spread of unwholesome information and privacy invasion are becoming serious social problems. Illegal access to information is also becoming a problem as the exchange and sharing of information increases on the basis of the extension of the communication network. On the other hand, as the communication network has been constructed as an international, global system, the legal response against invasion and cyber-attack from abroad is facing its limit. In addition, in an environment where the important infrastructures are managed and controlled on the basis of the information communication network, such problems pose a threat to national security. Countermeasures to such threats are developed and implemented on a yearly basis to protect the major infrastructures of information communication. As a part of such measures, we have developed a methodology for assessing the information protection level which can be used to establish the quantitative object setting method required for the improvement of the information protection level.Keywords: Information Security Evaluation Methodology, Critical Information Infrastructure Protection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16603183 On the Use of Correlated Binary Model in Social Network Analysis
Authors: Elsayed A. Habib Elamir
Abstract:
In social network analysis the mean nodal degree and density of the graph can be considered as a measure of the activity of all actors in the network and this is an important property of a graph and for making comparisons among networks. Since subjects in a family or organization are subject to common environment factors, it is prime interest to study the association between responses. Therefore, we study the distribution of the mean nodal degree and density of the graph under correlated binary units. The cross product ratio is used to capture the intra-units association among subjects. Computer program and an application are given to show the benefits of the method.Keywords: Correlated Binary data, cross product ratio, densityof the graph, multiplicative binomial distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14513182 Smart Help at theWorkplace for Persons with Disabilities (SHW-PWD)
Authors: Ghassan Kbar, Shady Aly, Ibraheem Elsharawy, Akshay Bhatia, Nur Alhasan, Ronaldo Enriquez
Abstract:
The Smart Help for persons with disability (PWD) is a part of the project SMARTDISABLE which aims to develop relevant solution for PWD that target to provide an adequate workplace environment for them. It would support PWD needs smartly through smart help to allow them access to relevant information and communicate with other effectively and flexibly, and smart editor that assist them in their daily work. It will assist PWD in knowledge processing and creation as well as being able to be productive at the work place. The technical work of the project involves design of a technological scenario for the Ambient Intelligence (AmI) - based assistive technologies at the workplace consisting of an integrated universal smart solution that suits many different impairment conditions and will be designed to empower the Physically disabled persons (PDP) with the capability to access and effectively utilize the ICTs in order to execute knowledge rich working tasks with minimum efforts and with sufficient comfort level. The proposed technology solution for PWD will support voice recognition along with normal keyboard and mouse to control the smart help and smart editor with dynamic auto display interface that satisfies the requirements for different PWD group. In addition, a smart help will provide intelligent intervention based on the behavior of PWD to guide them and warn them about possible misbehavior. PWD can communicate with others using Voice over IP controlled by voice recognition. Moreover, Auto Emergency Help Response would be supported to assist PWD in case of emergency. This proposed technology solution intended to make PWD very effective at the work environment and flexible using voice to conduct their tasks at the work environment. The proposed solution aims to provide favorable outcomes that assist PWD at the work place, with the opportunity to participate in PWD assistive technology innovation market which is still small and rapidly growing as well as upgrading their quality of life to become similar to the normal people at the workplace. Finally, the proposed smart help solution is applicable in all workplace setting, including offices, manufacturing, hospital, etc.
Keywords: Ambient Intelligence, ICT, Persons with disability PWD, Smart application.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25413181 The Effect of Acute Toxicity and Thyroid Hormone Treatments on Hormonal Changes during Embryogenesis of Acipenser persicus
Authors: Samaneh Nazeri, Bagher Mojazi Amiri, Hamid Farahmand
Abstract:
Production of high quality fish eggs with reasonable hatching rate makes a success in aquaculture industries. It is influenced by the environmental stimulators and inhibitors. Diazinon is a widely-used pesticide in Golestan province (Southern Caspian Sea, North of Iran) which is washed to the aquatic environment (3 mg/L in the river). It is little known about the effect of this pesticide on the embryogenesis of sturgeon fish, the valuable species of the Caspian Sea. Hormonal content of the egg is an important factor to guaranty the successful passes of embryonic stages. In this study, the fate of Persian sturgeon embryo to 24, 48, 72, and 96-hours exposure of diazinon (LC50 dose) was tested. Also, the effect of thyroid hormones (T3 and T4) on these embryos was tested concurrently or separately with diazinon LC 50 dose. Fertilized eggs are exposed to T3 (low dose: 1 ng/ml, high dose: 10 ng/ml), T4 (low dose: 1 ng/ml, high dose: 10 ng/ml). Six eggs were randomly selected from each treatment (with three replicates) in five developmental stages (two cell- division, neural, heart present, heart beaten, and hatched larvae). The possibility of changing T3, T4, and cortisol contents of the embryos were determined in all treated groups and in every mentioned embryonic stage. The hatching rate in treated groups was assayed at the end of the embryogenesis to clarify the effect of thyroid hormones and diazinon. The results indicated significant differences in thyroid hormone contents, but no significant differences were recognized in cortisol levels at various early life stages of embryos. There was also significant difference in thyroid hormones in (T3, T4) + diazinon treated embryos (P˂0.05), while no significant difference between control and treatments in cortisol levels was observed. The highest hatching rate was recorded in HT3 treatment, while the lowest hatching rate was recorded for diazinon LC50 treatment. The result confirmed that Persian sturgeon embryo is less sensitive to diazinon compared to teleost embryos, and thyroid hormones may increase hatching rate even in the presence of diazinon.Keywords: Persian sturgeon, diazinon, thyroid hormones, cortisol, embryo.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12933180 Ontology-based Domain Modelling for Consistent Content Change Management
Authors: Muhammad Javed, Yalemisew M. Abgaz, Claus Pahl
Abstract:
Ontology-based modelling of multi-formatted software application content is a challenging area in content management. When the number of software content unit is huge and in continuous process of change, content change management is important. The management of content in this context requires targeted access and manipulation methods. We present a novel approach to deal with model-driven content-centric information systems and access to their content. At the core of our approach is an ontology-based semantic annotation technique for diversely formatted content that can improve the accuracy of access and systems evolution. Domain ontologies represent domain-specific concepts and conform to metamodels. Different ontologies - from application domain ontologies to software ontologies - capture and model the different properties and perspectives on a software content unit. Interdependencies between domain ontologies, the artifacts and the content are captured through a trace model. The annotation traces are formalised and a graph-based system is selected for the representation of the annotation traces.Keywords: Consistent Content Management, Impact Categorisation, Trace Model, Ontology Evolution
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16843179 Stochastic Resonance in Nonlinear Signal Detection
Authors: Youguo Wang, Lenan Wu
Abstract:
Stochastic resonance (SR) is a phenomenon whereby the signal transmission or signal processing through certain nonlinear systems can be improved by adding noise. This paper discusses SR in nonlinear signal detection by a simple test statistic, which can be computed from multiple noisy data in a binary decision problem based on a maximum a posteriori probability criterion. The performance of detection is assessed by the probability of detection error Per . When the input signal is subthreshold signal, we establish that benefit from noise can be gained for different noises and confirm further that the subthreshold SR exists in nonlinear signal detection. The efficacy of SR is significantly improved and the minimum of Per can dramatically approach to zero as the sample number increases. These results show the robustness of SR in signal detection and extend the applicability of SR in signal processing.Keywords: Probability of detection error, signal detection, stochastic resonance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15333178 Sport and Exercise Behavior of Students in Suan Sunandha Rajabhat University
Authors: Pimporn Thongmuang
Abstract:
The purpose of this research is to study sport and exercise behavior of students in Suan Sunandha Rajabhat University in September of 2012. The sample group used in this research was a group of regular students in undergraduate school enrolled in faculty of science and technology. This sample group consisted of 1,858 students. The research tool used to collect result was the checklist. The data was calculated by statistical percentage. From the research, it was discovered that most students did exercise in previous month. 71.6% of students exercised by running. 61.1% of students exercised in their neighborhood. 60.4% of students exercised in order to keep fit. 60.2% of students agreed that the result from this research can be educational and inspirational for students in campus in terms of living healthily by exercise.Keywords: Exercise behavior, sport behavior, students.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8653177 Leukocyte Detection Using Image Stitching and Color Overlapping Windows
Authors: Lina, Arlends Chris, Bagus Mulyawan, Agus B. Dharmawan
Abstract:
Blood cell analysis plays a significant role in the diagnosis of human health. As an alternative to the traditional technique conducted by laboratory technicians, this paper presents an automatic white blood cell (leukocyte) detection system using Image Stitching and Color Overlapping Windows. The advantage of this method is to present a detection technique of white blood cells that are robust to imperfect shapes of blood cells with various image qualities. The input for this application is images from a microscope-slide translation video. The preprocessing stage is performed by stitching the input images. First, the overlapping parts of the images are determined, then stitching and blending processes of two input images are performed. Next, the Color Overlapping Windows is performed for white blood cell detection which consists of color filtering, window candidate checking, window marking, finds window overlaps, and window cropping processes. Experimental results show that this method could achieve an average of 82.12% detection accuracy of the leukocyte images.Keywords: Color overlapping windows, image stitching, leukocyte detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14923176 Influence of Inter-tube Connections on the Stress-Strain Behavior of Nanotube-Polymer Composites: Molecular Dynamics
Authors: Jianwei Zhang, Dazhi Jiang, Huaxin Peng, Chunqi Wang
Abstract:
Stress-strain curve of inter-tube connected carbon nanotube (CNT) reinforced polymer composite under axial loading generated from molecular dynamics simulation is presented. Comparison of the response to axial mechanical loading between this composite system with composite systems reinforced by long, continuous CNTs (replicated via periodic boundary conditions) and short, discontinuous CNTs has been made. Simulation results showed that the inter-tube connection improved the mechanical properties of short discontinuous CNTs dramatically. Though still weaker than long CNT/polymer composite, more remarkable increase in the stiffness relative to the polymer was observed in the inter-tube connected CNT/polymer composite than in the discontinuous CNT/polymer composite. The manually introduced bridge break process resulted in a stress-strain curve of ductile fracture mode, which is consistent with the experimental result.
Keywords: Carbon nanotube, inter-tube connection, molecular dynamics, stress-strain curve
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17723175 Distributed 2-Vertex Connectivity Test of Graphs Using Local Knowledge
Authors: Brahim Hamid, Bertrand Le Saec, Mohamed Mosbah
Abstract:
The vertex connectivity of a graph is the smallest number of vertices whose deletion separates the graph or makes it trivial. This work is devoted to the problem of vertex connectivity test of graphs in a distributed environment based on a general and a constructive approach. The contribution of this paper is threefold. First, using a preconstructed spanning tree of the considered graph, we present a protocol to test whether a given graph is 2-connected using only local knowledge. Second, we present an encoding of this protocol using graph relabeling systems. The last contribution is the implementation of this protocol in the message passing model. For a given graph G, where M is the number of its edges, N the number of its nodes and Δ is its degree, our algorithms need the following requirements: The first one uses O(Δ×N2) steps and O(Δ×logΔ) bits per node. The second one uses O(Δ×N2) messages, O(N2) time and O(Δ × logΔ) bits per node. Furthermore, the studied network is semi-anonymous: Only the root of the pre-constructed spanning tree needs to be identified.
Keywords: Distributed computing, fault-tolerance, graph relabeling systems, local computations, local knowledge, message passing system, networks, vertex connectivity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18393174 Simulation on Fuel Metering Unit Used for TurboShaft Engine Model
Authors: Bin Wang, Hengyu Ji, Zhifeng Ye
Abstract:
Fuel Metering Unit (FMU) in fuel system of an aeroengine sometimes has direct influence on the engine performance, which is neglected for the sake of easy access to mathematical model of the engine in most cases. In order to verify the influence of FMU on an engine model, this paper presents a co-simulation of a stepping motor driven FMU (digital FMU) in a turboshaft aeroengine, using AMESim and MATLAB to obtain the steady and dynamic characteristics of the FMU. For this method, mechanical and hydraulic section of the unit is modeled through AMESim, while the stepping motor is mathematically modeled through MATLAB/Simulink. Combining these two sub-models yields an AMESim/MATLAB co-model of the FMU. A simplified component level model for the turboshaft engine is established and connected with the FMU model. Simulation results on the full model show that the engine model considering FMU characteristics describes the engine more precisely especially in its transition state. An FMU dynamics will cut down the rotation speed of the high pressure shaft and the inlet pressure of the combustor during the step response. The work in this paper reveals the impact of FMU on engine operation characteristics and provides a reference to an engine model for ground tests.
Keywords: Fuel metering unit, stepping motor, AMESim/MATLAB, full digital simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11943173 Forecasting the Volatility of Geophysical Time Series with Stochastic Volatility Models
Authors: Maria C. Mariani, Md Al Masum Bhuiyan, Osei K. Tweneboah, Hector G. Huizar
Abstract:
This work is devoted to the study of modeling geophysical time series. A stochastic technique with time-varying parameters is used to forecast the volatility of data arising in geophysics. In this study, the volatility is defined as a logarithmic first-order autoregressive process. We observe that the inclusion of log-volatility into the time-varying parameter estimation significantly improves forecasting which is facilitated via maximum likelihood estimation. This allows us to conclude that the estimation algorithm for the corresponding one-step-ahead suggested volatility (with ±2 standard prediction errors) is very feasible since it possesses good convergence properties.Keywords: Augmented Dickey Fuller Test, geophysical time series, maximum likelihood estimation, stochastic volatility model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8603172 Encryption Image via Mutual Singular Value Decomposition
Authors: Adil Al-Rammahi
Abstract:
Image or document encryption is needed through egovernment data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.
Keywords: Image cryptography, Singular values decomposition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20863171 Finite Element Method Analysis of Occluded-Ear Simulator and Natural Human Ear Canal
Authors: M. Sasajima, T. Yamaguchi, Y. Hu, Y. Koike
Abstract:
In this paper, we discuss the propagation of sound in the narrow pathways of an occluded-ear simulator typically used for the measurement of insert-type earphones. The simulator has a standardized frequency response conforming to the international standard (IEC60318-4). In narrow pathways, the speed and phase of sound waves are modified by viscous air damping. In our previous paper, we proposed a new finite element method (FEM) to consider the effects of air viscosity in this type of audio equipment. In this study, we will compare the results from the ear simulator FEM model, and those from a three dimensional human ear canal FEM model made from computed tomography images, with the measured frequency response data from the ear canals of 18 people.
Keywords: Ear simulator, FEM, viscosity, human ear canal.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11283170 Bank Business Models and The Changes in CEE Countries
Abstract:
The aim of this article is to assess the existing business models used by the banks operating in the CEE countries in the time period from 2006 till 2011. In order to obtain research results, the authors performed qualitative analysis of the scientific literature on bank business models, which have been grouped into clusters that consist of such components as: 1) capital and reserves; 2) assets; 3) deposits, and 4) loans. In their turn, bank business models have been developed based on the types of core activities of the banks, and have been divided into four groups: Wholesale, Investment, Retail and Universal Banks. Descriptive statistics have been used to analyse the models, determining mean, minimal and maximal values of constituent cluster components, as well as standard deviation. The analysis of the data is based on such bank variable indices as Return on Assets (ROA) and Return on Equity (ROE).Keywords: Banks, Business model, CEE, ROA, ROE.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18493169 Perspective and Challenge of Tidal Power in Bangladesh
Authors: Md. Alamgir Hossain, Md. Zakir Hossain, Md. Atiqur Rahman
Abstract:
Tidal power can play a vital role in integrating as new source of renewable energy to the off-grid power connection in isolated areas, namely Sandwip, in Bangladesh. It can reduce the present energy crisis and improve the social, environmental and economic perspective of Bangladesh. Tidal energy is becoming popular around the world due to its own facilities. The development of any country largely depends on energy sector improvement. Lack of energy sector is because of hampering progress of any country development, and the energy sector will be stable by only depend on sustainable energy sources. Renewable energy having environmental friendly is the only sustainable solution of secure energy system. Bangladesh has a huge potential of tidal power at different locations, but effective measures on this issue have not been considered sincerely. This paper summarizes the current energy scenario, and Bangladesh can produce power approximately 53.19 MW across the country to reduce the growing energy demand utilizing tidal energy as well as it is shown that Sandwip is highly potential place to produce tidal power, which is estimated approximately 16.49 MW by investing only US $10.37 million. Besides this, cost management for tidal power plant has been also discussed.
Keywords: Sustainable energy, tidal power, cost analysis, power demand, gas crisis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35433168 A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images Based On Wavelet Transform
Authors: Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, Zahid Munir
Abstract:
Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Keywords: Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), JPEG Compression, Authentication and Self- Recovery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2084