12 research outputs found

    Chaotic Behavior of the Airflow in a Ventilated Room

    Get PDF
    Chaotic systems may lead to instability, extreme sensitivity and performance reduction. Therefore it is unwanted in many cases. Due to these undesirable characteristics of chaos in practical systems, it is important to recognize such a chaotic behavior. The existence of chaos has been discovered in several areas during the last 30 years. However, there is a lack of studies in relation with buildings that also can be regarded as complex dynamic systems. In this paper the chaotic behavior of the airflow in case of an ordinary ventilated room is researched. Chaotic behavior is already observed in the simulations by changing the supply air temperature from 22 oC into 21.9 oC. In the case when no buoyancy is taking into account, minor chaotic behavior is observed by a small in the air supply control parameters

    Simulation and Experimental Validation of Chaotic Behavior of Airflow in a Ventilated Room

    Get PDF
    Chaos may lead to instability, extreme sensitivity and performance reduction in dynamic systems. Therefore it is unwanted in many cases. Due to these undesirable characteristics of chaos in practical systems, it is important to recognize such a chaotic behavior. In this paper the chaotic behavior of the airflow in case of an ordinary ventilated room is researched. Computational chaotic behavior is already observed in the simulations by changing the supply air temperature from 22 oC into 21.9 oC.However, it could be the case that, despite all efforts, the chaotic behavior is a numeral artifact. Therefore laboratory experiments using a scale model were performed. It is concluded that the computational model of the experimental scale model has to be improved to simulate the experimental results more accurately.Furthermore, the presented method seems promising in detecting chaotic behaviour

    A Novel Modeling Framework for Computationally Efficient and Accurate Real‐Time Ensemble Flood Forecasting With Uncertainty Quantification

    Full text link
    A novel modeling framework that simultaneously improves accuracy, predictability, and computational efficiency is presented. It embraces the benefits of three modeling techniques integrated together for the first time: surrogate modeling, parameter inference, and data assimilation. The use of polynomial chaos expansion (PCE) surrogates significantly decreases computational time. Parameter inference allows for model faster convergence, reduced uncertainty, and superior accuracy of simulated results. Ensemble Kalman filters assimilate errors that occur during forecasting. To examine the applicability and effectiveness of the integrated framework, we developed 18 approaches according to how surrogate models are constructed, what type of parameter distributions are used as model inputs, and whether model parameters are updated during the data assimilation procedure. We conclude that (1) PCE must be built over various forcing and flow conditions, and in contrast to previous studies, it does not need to be rebuilt at each time step; (2) model parameter specification that relies on constrained, posterior information of parameters (so‐called Selected specification) can significantly improve forecasting performance and reduce uncertainty bounds compared to Random specification using prior information of parameters; and (3) no substantial differences in results exist between single and dual ensemble Kalman filters, but the latter better simulates flood peaks. The use of PCE effectively compensates for the computational load added by the parameter inference and data assimilation (up to ~80 times faster). Therefore, the presented approach contributes to a shift in modeling paradigm arguing that complex, high‐fidelity hydrologic and hydraulic models should be increasingly adopted for real‐time and ensemble flood forecasting.Key PointsA surrogate model must be built over various forcing and flow conditions and it does not need to be rebuilt at each time stepModel parameter specification for data assimilation can significantly improve forecasting performance and reduce uncertainty boundsNo substantial differences in results exists between single and dual EnKFs, but the latter better simulates flood peaksPeer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/154302/1/wrcr24506_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/154302/2/wrcr24506.pd

    A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

    Get PDF
    Currently, biometric identifiers have been used to identify or authenticate users in a biometric system to increase the security in access control systems. Nevertheless, there are several attacks on the biometric system to steal and recover the user’s biometric trait. One of the most powerful attacks is extracting the fingerprint pattern when it is transmitted over communication lines between modules. In this paper, we present a novel fingerprint image encryption scheme based on hyperchaotic Rössler map to provide high security and secrecy in user’s biometric trait, avoid identity theft, and increase the robustness of the biometric system. A complete security analysis is presented to justify the secrecy of the biometric trait by using our proposed scheme at statistical level with 100% of NPCR, low correlation, and uniform histograms. Therefore, it can be used in secure biometric access control systems

    INFORMATION SECURITY: A STUDY ON BIOMETRIC SECURITY SOLUTIONS FOR TELECARE MEDICAL INFORMATION SYSTEMS

    Get PDF
    This exploratory study provides a means for evaluating and rating Telecare medical information systems in order to provide a more effective security solution. This analysis of existing solutions was conducted via an in-depth study of Telecare security. This is a proposition for current biometric technologies as a new means for secure communication of private information over public channels. Specifically, this research was done in order to provide a means for businesses to evaluate prospective technologies from a 3 dimensional view in order to make am accurate decision on any given biometric security technology. Through identifying key aspects of what makes a security solution the most effective in minimizing risk of a patient’s confidential data being exposed we were then able to create a 3 dimensional rubric to see not only from a business view but also the users such as the patients and doctors that use Telecare medical information systems every day. Finally, we also need to understand the implications of biometric solutions from a technological standpoint

    Evolutionary Computation 2020

    Get PDF
    Intelligent optimization is based on the mechanism of computational intelligence to refine a suitable feature model, design an effective optimization algorithm, and then to obtain an optimal or satisfactory solution to a complex problem. Intelligent algorithms are key tools to ensure global optimization quality, fast optimization efficiency and robust optimization performance. Intelligent optimization algorithms have been studied by many researchers, leading to improvements in the performance of algorithms such as the evolutionary algorithm, whale optimization algorithm, differential evolution algorithm, and particle swarm optimization. Studies in this arena have also resulted in breakthroughs in solving complex problems including the green shop scheduling problem, the severe nonlinear problem in one-dimensional geodesic electromagnetic inversion, error and bug finding problem in software, the 0-1 backpack problem, traveler problem, and logistics distribution center siting problem. The editors are confident that this book can open a new avenue for further improvement and discoveries in the area of intelligent algorithms. The book is a valuable resource for researchers interested in understanding the principles and design of intelligent algorithms

    SPATIAL TRANSFORMATION PATTERN DUE TO COMMERCIAL ACTIVITY IN KAMPONG HOUSE

    Get PDF
    ABSTRACT Kampung houses are houses in kampung area of the city. Kampung House oftenly transformed into others use as urban dynamics. One of the transfomation is related to the commercial activities addition by the house owner. It make house with full private space become into mixused house with more public spaces or completely changed into full public commercial building. This study investigate the spatial transformation pattern of the kampung houses due to their commercial activities addition. Site observations, interviews and questionnaires were performed to study the spatial transformation. This study found that in kampung houses, the spatial transformation pattern was depend on type of commercial activities and owner perceptions, and there are several steps of the spatial transformation related the commercial activity addition. Keywords: spatial transformation pattern; commercial activity; owner perception, kampung house; adaptabilit
    corecore