17,085 research outputs found

    Case studies on the use of LiveLink for MATLAB for evaluation and optimization of the heat sources in experimental borehole

    Get PDF
    In the Czech part of the Upper Silesian Coal Basin (Moravian-Silesian region, Czech Republic), there are many deposits of endogenous combustion (e.g., localized burning soil bodies, landfills containing industrial waste, or slag rocks caused by mining processes). The Hedwig mining dump represents such an example of these sites where, besides the temperature and the concentrations of toxic gases, electric and non-electric quantities are also monitored within the frame of experimentally proposed and patented technology for heat collection (the so-called "Pershing" system). Based on these quantities, this paper deals with the determination and evaluation of negative heat sources and the optimization of the positive heat source dependent on measured temperatures within evaluation points or on a thermal profile. The optimization problem is defined based on a balance of the heat sources in the steady state while searching for a local minimum of the objective function for the heat source. From an implementation point of view, it is the interconnection of the numerical model of the heat collector in COMSOL with a user optimization algorithm in MATLAB using the LiveLink for MATLAB. The results are elaborated in five case studies based on the susceptibility testing of the numerical model by input data from the evaluation points. The tests were focused on the model behavior in terms of preprocessing for measurement data from each chamber of the heat collector and for the estimated value of temperature differences at 90% and 110% of the nominal value. It turned out that the numerical model is more sensitive to the estimates in comparison with the measured data of the chambers, and this finding does not depend on the type optimization algorithm. The validation of the model by the use of the mean-square error led to the finding of optimal value, also valid with respect to the other evaluation.Web of Science205art. no. 129

    To be or not to Be? - First Evidence for Neutrinoless Double Beta Decay

    Full text link
    Double beta decay is indispensable to solve the question of the neutrino mass matrix together with ν\nu oscillation experiments. Recent analysis of the most sensitive experiment since nine years - the HEIDELBERG-MOSCOW experiment in Gran-Sasso - yields a first indication for the neutrinoless decay mode. This result is the first evidence for lepton number violation and proves the neutrino to be a Majorana particle. We give the present status of the analysis in this report. It excludes several of the neutrino mass scenarios allowed from present neutrino oscillation experiments - only degenerate scenarios and those with inverse mass hierarchy survive. This result allows neutrinos to still play an important role as dark matter in the Universe. To improve the accuracy of the present result, considerably enlarged experiments are required, such as GENIUS. A GENIUS Test Facility has been funded and will come into operation by early 2003.Comment: 16 pages, latex, 10 figures, Talk was presented at International Conference "Neutrinos and Implications for Physics Beyond the Standard Model", Oct. 11-13, 2002, Stony Brook, USA, Proc. (2003) ed. by R. Shrock, also see Home Page of Heidelberg Non-Accelerator Particle Physics Group: http://www.mpi-hd.mpg.de/non_acc

    Graph Neural Networks Meet Neural-Symbolic Computing: A Survey and Perspective

    Full text link
    Neural-symbolic computing has now become the subject of interest of both academic and industry research laboratories. Graph Neural Networks (GNN) have been widely used in relational and symbolic domains, with widespread application of GNNs in combinatorial optimization, constraint satisfaction, relational reasoning and other scientific domains. The need for improved explainability, interpretability and trust of AI systems in general demands principled methodologies, as suggested by neural-symbolic computing. In this paper, we review the state-of-the-art on the use of GNNs as a model of neural-symbolic computing. This includes the application of GNNs in several domains as well as its relationship to current developments in neural-symbolic computing.Comment: Updated version, draft of accepted IJCAI2020 Survey Pape

    Economic Integration in East Asia: Trends, Prospects, and a Possible Roadmap

    Get PDF
    This paper, which is a revised version of the ADB Working Paper on Regional Economic Integration No. 2, reviews trends in East Asian regionalism in the areas of trade and investment, money and finance, and infrastructure. It finds that trade and, to a lesser extent, financial integration is starting to increase in the region. It also finds that business cycles are starting to be more synchronized, enhancing the case for further monetary integration among these countries. The paper also outlines a roadmap for East Asian integration.

    Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

    Get PDF
    The IoT (Internet of Things) technology has been widely adopted in recent years and has profoundly changed the people's daily lives. However, in the meantime, such a fast-growing technology has also introduced new privacy issues, which need to be better understood and measured. In this work, we look into how private information can be leaked from network traffic generated in the smart home network. Although researchers have proposed techniques to infer IoT device types or user behaviors under clean experiment setup, the effectiveness of such approaches become questionable in the complex but realistic network environment, where common techniques like Network Address and Port Translation (NAPT) and Virtual Private Network (VPN) are enabled. Traffic analysis using traditional methods (e.g., through classical machine-learning models) is much less effective under those settings, as the features picked manually are not distinctive any more. In this work, we propose a traffic analysis framework based on sequence-learning techniques like LSTM and leveraged the temporal relations between packets for the attack of device identification. We evaluated it under different environment settings (e.g., pure-IoT and noisy environment with multiple non-IoT devices). The results showed our framework was able to differentiate device types with a high accuracy. This result suggests IoT network communications pose prominent challenges to users' privacy, even when they are protected by encryption and morphed by the network gateway. As such, new privacy protection methods on IoT traffic need to be developed towards mitigating this new issue
    corecore