1,197 research outputs found

    Energy production predication via Internet of Thing based machine learning system

    Get PDF
    © 2019 Elsevier B.V. Wind energy is an interesting source of alternative energy to complement the Brazilian energy matrix. However, one of the great challenges lies in managing this resource, due to its uncertainty behavior. This study addresses the estimation of the electric power generation of a wind turbine, so that this energy can be used efficiently and sustainable. Real wind and power data generated in set of wind turbines installed in a wind farm in Ceará State, Brazil, were used to obtain the power curve from a wind turbine using logistic regression, integrated with Nonlinear Autoregressive neural networks to forecast wind speeds. In our system the average error in power generation estimate is of 29 W for 5 days ahead forecast. We decreased the error in the manufacturer\u27s power curve in 63%, with a logics regression approach, providing a 2.7 times more accurate estimate. The results have a large potential impact for the wind farm managers since it could drive not only the operation and maintenance but management level of energy sells

    Günther Anders’ Theory of Media and Communication: Developing a Conception of Technological Domination, Alienation and Ideology with Marx beyond Marx

    Get PDF
    In this thesis, I contribute to the emergent English-language scholarship on little-known 20th century German-Austrian philosopher Günther Anders (1902-1992), whose work is unique for its critical focus on technology. Anders studied under Husserl and Heidegger and was Hannah Arendt’s first husband. He also knew members of the Frankfurt School such as Marcuse and Adorno. However, he gained little notoriety during most of his life and has been described as an outsider of philosophy. In 1936, Anders fled Europe for the United States to escape Nazi persecution owing to his Jewish heritage. He returned to Vienna in the 1950s and dedicated the second half of his life to the struggle against nuclear weapons and the Vietnam War. In this thesis I argue that, despite often being associated with Heidegger, Anders’ experience of the Second World War led him to undergo an epistemological break. He turned away from Heidegger and towards Marx. Anders can therefore be viewed as a humanist-Marxist. His work updates Marx’s view of domination, alienation and ideology, applying it to the question of industrial warfare, nuclear annihilation and post-war consumer technologies. I show how aspects of contemporary digital societies illustrate Anders’ critical theory of technology. I choose two case studies: military drones and dating apps. I show that Anders’ theory can help us understand how these technologies are involved in modern forms of domination, alienation and ideology. I do this by using critical discourse analysis (CDA) to evaluate the written and spoken accounts of military drone operators. I moreover conduct 18 semi-structured interviews with dating app users, which I equally analyse using CDA. According to Anders, modern technologies allowed humans to act absent-mindedly without identifying with the consequences of these actions. This meant that terrible atrocities could be committed without the accompanying moral feelings of empathy and regret. I show how military drone operators and dating app users equally convey the sense of a conflicted identification with their own actions. However, I derive the concept of technological splitting to update Anders’ concept of Promethean shame. With technological splitting affects are not absent but expressed in a raw, overtly direct fashion. They can consequently be compartmentalised and split off from operators' and users' sense of self

    Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks

    Get PDF
    With the advent of digital technology, computer networks have developed rapidly at an unprecedented pace contributing tremendously to social and economic development. They have become the backbone for all critical sectors and all the top Multi-National companies. Unfortunately, security threats for computer networks have increased dramatically over the last decade being much brazen and bolder. Intrusions or attacks on computers and networks are activities or attempts to jeopardize main system security objectives, which called as confidentiality, integrity and availability. They lead mostly in great financial losses, massive sensitive data leaks, thereby decreasing efficiency and the quality of productivity of an organization. There is a great need for an effective Network Intrusion Detection System (NIDS), which are security tools designed to interpret the intrusion attempts in incoming network traffic, thereby achieving a solid line of protection against inside and outside intruders. In this work, we propose to optimize a very popular soft computing tool prevalently used for intrusion detection namely Back Propagation Neural Network (BPNN) using a novel machine learning framework called “ISAGASAA”, based on Improved Self-Adaptive Genetic Algorithm (ISAGA) and Simulated Annealing Algorithm (SAA). ISAGA is our variant of standard Genetic Algorithm (GA), which is developed based on GA improved through an Adaptive Mutation Algorithm (AMA) and optimization strategies. The optimization strategies carried out are Parallel Processing (PP) and Fitness Value Hashing (FVH) that reduce execution time, convergence time and save processing power. While, SAA was incorporated to ISAGA in order to optimize its heuristic search. Experimental results based on Kyoto University benchmark dataset version 2015 demonstrate that our optimized NIDS based BPNN called “ANID BPNN-ISAGASAA” outperforms several state-of-art approaches in terms of detection rate and false positive rate. Moreover, improvement of GA through FVH and PP saves processing power and execution time. Thus, our model is very much convenient for network anomaly detection.

    The Being of Analogy

    Get PDF
    Similarity has long been excluded from reality in both the analytical and continental traditions. Because it exists in the aesthetic realm, and because aesthetics is thought to be divorced from objective reality, similarity has been confined to the prison of the subject. In The Being of Analogy, Noah Roderick unleashes similarity onto the world of objects. Inspired by object-oriented theories of causality, Roderick argues that similarity is ever present at the birth of new objects. This includes the emergent similarity of new mental objects, such as categories—a phenomenon we recognize as analogy. Analogy, Roderick contends, is at the very heart of cognition and communication, and it is through analogy that we can begin dismantling the impossible wall between knowing and being

    The Being of Analogy

    Get PDF
    Similarity has long been excluded from reality in both the analytical and continental traditions. Because it exists in the aesthetic realm, and because aesthetics is thought to be divorced from objective reality, similarity has been confined to the prison of the subject. In The Being of Analogy, Noah Roderick unleashes similarity onto the world of objects. Inspired by object-oriented theories of causality, Roderick argues that similarity is ever present at the birth of new objects. This includes the emergent similarity of new mental objects, such as categories—a phenomenon we recognize as analogy. Analogy, Roderick contends, is at the very heart of cognition and communication, and it is through analogy that we can begin dismantling the impossible wall between knowing and being

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Liberal economics and a liberal education in Canada : leading theorists, apologists, and "imaginary expressions" of value

    Get PDF
    The structure of this dissertation is roughly three parts. Chapters one and two focus on the historical and current idea of higher education in Canada. Chapters three and four expand the scope, situating the Canadian university in the geo-political context of globalisation, globalisation's impact on labour generally, and intellectual labour specifically. Chapter four introduces theoretical debates within Marxism in order to formulate, in chapter five, a critical position better suited to resisting the political and ideological forces acting to reconstruct the Canadian university in the image of the globalised market
    • …
    corecore