835 research outputs found

    Evaluation of the performance of a composite profile at elevated temperatures using finite element and hybrid artificial intelligence techniques

    Get PDF
    It is very important to keep structures and constructional elements in service during and after exposure to elevated temperatures. Investigation of the structural behaviour of different components and structures at elevated temperatures is an approach to manipulate the serviceability of the structures during heat exposure. Channel connectors are widely used shear connectors not only for their appealing mechanical properties but also for their workability and cost-effective nature. In this study, a finite element (FE) evaluation was performed on an authentic composite model, and the behaviour of the channel shear connector at elevated temperature was examined. Furthermore, a novel hybrid intelligence algorithm based on a feature-selection trait with the incorporation of particle swarm optimization (PSO) and multi-layer perceptron (MLP) algorithms has been developed to predict the slip response of the channel. The hybrid intelligence algorithm that uses artificial neural networks is performed on derived data from the FE study. Finally, the obtained numerical results are compared with extreme learning machine (ELM) and radial basis function (RBF) results. The MLP-PSO represented dramatically accurate results for slip value prediction at elevated temperatures. The results proved the active presence of the channels, especially to improve the stiffness and loading capacity of the composite beam. Although the height enhances the ductility, stiffness is significantly reduced at elevated temperatures. According to the results, temperature, failure load, the height of connector and concrete block strength are the key governing parameters for composite floor design against high temperatures

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques

    Get PDF
    Intrusions on computer network systems are major security issues these days. Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. Therefore, accurate detection of network attack is imperative. A variety of intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. Such weaknesses of the existing techniques have motivated the research presented in this thesis. One of the weaknesses of the existing intrusion detection approaches is the usage of a raw dataset for classification but the classifier may get confused due to redundancy and hence may not classify correctly. To overcome this issue, Principal Component Analysis (PCA) has been employed to transform raw features into principal features space and select the features based on their sensitivity. The sensitivity is determined by the values of eigenvalues. The recent approaches use PCA to project features space to principal feature space and select features corresponding to the highest eigenvalues, but the features corresponding to the highest eigenvalues may not have the optimal sensitivity for the classifier due to ignoring many sensitive features. Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. The performance of this approach was analyzed and compared with existing approaches. The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates

    A Review of Rule Learning Based Intrusion Detection Systems and Their Prospects in Smart Grids

    Get PDF

    Self-organizing maps in computer security

    Get PDF

    An investigation into adaptive power reduction techniques for neural hardware

    No full text
    In light of the growing applicability of Artificial Neural Network (ANN) in the signal processing field [1] and the present thrust of the semiconductor industry towards lowpower SOCs for mobile devices [2], the power consumption of ANN hardware has become a very important implementation issue. Adaptability is a powerful and useful feature of neural networks. All current approaches for low-power ANN hardware techniques are ‘non-adaptive’ with respect to the power consumption of the network (i.e. power-reduction is not an objective of the adaptation/learning process). In the research work presented in this thesis, investigations on possible adaptive power reduction techniques have been carried out, which attempt to exploit the adaptability of neural networks in order to reduce the power consumption. Three separate approaches for such adaptive power reduction are proposed: adaptation of size, adaptation of network weights and adaptation of calculation precision. Initial case studies exhibit promising results with significantpower reduction

    Modeling strategies for multiple scenarios and fast simulations in large systems: applications to fire safety and energy engineering

    Get PDF
    The use of computational modeling has become very popular and important in many engineering and physical fields, as it is considered a fast and inexpensive technique to support and often substitute experimental analysis. In fact system design and analysis can be carried out through computational studies instead of experiments, that are typically demanding in terms of cost and technical resources; sometimes the systems characteristics and the technical problems make the experiments impossible to perform and the use of computational tools is the only feasible option. Demand of resources for realistic simulation is increasing due to the interest in studying complex and large systems. In these framework smart modeling approaches and model reduction techniques play a crucial role for making complex and large system suitable for simulations. Moreover, it should be considered that often more than one simulation is requested in order to perform an analysis. For instance, if a heuristic method is applied to the optimization of a component, the model has to be run a certain number of times. The same problem arises when a certain level of uncertainty affect the system parameters; in this case also many simulation are required for obtaining the desired information. This is the reason why the use of technique that allows to obtain compact model is an interesting topic nowadays. In this PhD thesis different reduction approaches and strategies have been used in order to analyze three energetic systems involving large domain and long time, one for each reduction approach categories. In all the topic considered, a smart model has been adopted and, when data were available, tested using experimental data. All the model are characterized by large domain and the time involved in the analysis are high in all the cases, therefore a method for compact model achievement is used in all the cases. The considered topics are: • Groundwater temperature perturbations due to geothermal heat pump installations, analyzed trough a multi-level model. • District heating networks (DHN), studied from both the fluid-dynamic and thermal point of view and applied to one of the larger network in Europe, the Turin district heating system (DHS), trough a Proper Orthogonal Decomposition - Radial Basis Function model. • Forest fire propagation simulation carried out using a Proper Orthogonal Decomposition projection model

    Boosting precision crop protection towards agriculture 5.0 via machine learning and emerging technologies: A contextual review

    Get PDF
    Crop protection is a key activity for the sustainability and feasibility of agriculture in a current context of climate change, which is causing the destabilization of agricultural practices and an increase in the incidence of current or invasive pests, and a growing world population that requires guaranteeing the food supply chain and ensuring food security. In view of these events, this article provides a contextual review in six sections on the role of artificial intelligence (AI), machine learning (ML) and other emerging technologies to solve current and future challenges of crop protection. Over time, crop protection has progressed from a primitive agriculture 1.0 (Ag1.0) through various technological developments to reach a level of maturity closelyin line with Ag5.0 (section 1), which is characterized by successfully leveraging ML capacity and modern agricultural devices and machines that perceive, analyze and actuate following the main stages of precision crop protection (section 2). Section 3 presents a taxonomy of ML algorithms that support the development and implementation of precision crop protection, while section 4 analyses the scientific impact of ML on the basis of an extensive bibliometric study of >120 algorithms, outlining the most widely used ML and deep learning (DL) techniques currently applied in relevant case studies on the detection and control of crop diseases, weeds and plagues. Section 5 describes 39 emerging technologies in the fields of smart sensors and other advanced hardware devices, telecommunications, proximal and remote sensing, and AI-based robotics that will foreseeably lead the next generation of perception-based, decision-making and actuation systems for digitized, smart and real-time crop protection in a realistic Ag5.0. Finally, section 6 highlights the main conclusions and final remarks

    Non-Gaussian Hybrid Transfer Functions: Memorizing Mine Survivability Calculations

    Get PDF
    Hybrid algorithms and models have received significant interest in recent years and are increasingly used to solve real-world problems. Different from existing methods in radial basis transfer function construction, this study proposes a novel nonlinear-weight hybrid algorithm involving the non-Gaussian type radial basis transfer functions. The speed and simplicity of the non-Gaussian type with the accuracy and simplicity of radial basis function are used to produce fast and accurate on-the-fly model for survivability of emergency mine rescue operations, that is, the survivability under all conditions is precalculated and used to train the neural network. The proposed hybrid uses genetic algorithm as a learning method which performs parameter optimization within an integrated analytic framework, to improve network efficiency. Finally, the network parameters including mean iteration, standard variation, standard deviation, convergent time, and optimized error are evaluated using the mean squared error. The results demonstrate that the hybrid model is able to reduce the computation complexity, increase the robustness and optimize its parameters. This novel hybrid model shows outstanding performance and is competitive over other existing models
    • …
    corecore