401 research outputs found

    Automated extraction of water bodies from NIR and RGB aerial imagery in northern Alaska using supervised and unsupervised machine learning techniques

    Get PDF
    Thawing and freezing of permafrost ground are affected by various reasons: air temperature, vegetation, snow accumulation, subsurface physical properties, and moisture. Due to the rising of air temperature, the permafrost temperature and the thermokarst activity increase. Thermokarst instability causes an imbalance for the hydrology system, topography, soils, sediment and nutrient cycle to lakes and streams. Hence the lakes and ponds are ubiquitous in permafrost region. The plants and animals fulfil their nutrient needs from water in the environment. Other animals acquire their needs from the plants and animals that they consume. Therefore the influence of degradation of lakes and ponds strongly affect biogeochemical cycles. This research aims to implement an automated workflow to map the water bodies caused by permafrost thawing. The scientific challenge is to test the machine learning techniques adaptability to assist the observation and mapping of the water bodies using aerial imagery. The study area is mainly located in northern Alaska and consists of five different locations: Ikpikpuk, Teschekpuk Central, Teshekpuk East, Tesheckpuk West, Meade East, and Meade West. To estimate the degradation of the high centred polygons distribution and potential degradation of ice wedges, I mapped the polygonal terrain and ice-wedge melt ponds using areal photogrammetry data of NIR and RGB bands captured by Thaw Trend Air 2019 flight campaign. The techniques used are unsupervised K-mean classification, supervised segment mean shift, and supervised random forest classification to model the water polygons from airborne photogrammetry. There are two phases to perform the machine learning classification; the first step is to test the accuracy of each technique and get to a conclusion about the most adapted method. The second is to prepare the Orthomosaic data, run the chosen workflow, and visualize the final results. The morphology filter with opening option application and clean boundary filters are practical before classification as they sharpen the image features. The conclusion is to use the Random forest classification as it was helpful in all NIR Orthomosaics; however, the RGB images required downsampling to provide adequate accuracy

    Efficient and Virtualized Scheduling for OFDM-Based High Mobility Wireless Communications Objects

    Get PDF
    Services providers (SPs) in the radio platform technology standard long term evolution (LTE) systems are enduring many challenges in order to accommodate the rapid expansion of mobile data usage. The modern technologies demonstrate new challenges to SPs, for example, reducing the cost of the capital and operating expenditures while supporting high data throughput per customer, extending battery life-per-charge of the cell phone devices, and supporting high mobility communications with fast and seamless handover (HO) networking architecture. In this thesis, a variety of optimized techniques aimed at providing innovative solutions for such challenges are explored. The thesis is divided into three parts. The first part outlines the benefits and challenges of deploying virtualized resource sharing concept. Wherein, SPs achieving a different schedulers policy are sharing evolved network B, allowing SPs to customize their efforts and provide service requirements; as a promising solution for reducing operational and capital expenditures, leading to potential energy savings, and supporting higher peak rates. The second part, formulates the optimized power allocation problem in a virtualized scheme in LTE uplink systems, aiming to extend the mobile devices’ battery utilization time per charge. While, the third part extrapolates a proposed hybrid-HO (HY-HO) technique, that can enhance the system performance in terms of latency and HO reliability at cell boundary for high mobility objects (up to 350 km/hr; wherein, HO will occur more frequent). The main contributions of this thesis are in designing optimal binary integer programmingbased and suboptimal heuristic (with complexity reduction) scheduling algorithms subject to exclusive and contiguous allocation, maximum transmission power, and rate constraints. Moreover, designing the HY-HO based on the combination of soft and hard HO was able to enhance the system performance in term of latency, interruption time and reliability during HO. The results prove that the proposed solutions effectively contribute in addressing the challenges caused by the demand for high data rates and power transmission in mobile networks especially in virtualized resources sharing scenarios that can support high data rates with improving quality of services (QoSs)

    Wave Interaction With Epsilon-znd-Mu-Near-Zero (emnz) Platforms and Nonreciprocal Metastructures

    Get PDF
    The concept of metamaterials has offered platforms for unconventional tailoring and manipulation of the light-matter interaction. In this dissertation, we explore several concepts and designs within this scope. We investigate some of the electromagnetic characteristics of the concept of “static optics”, i.e., wave interaction with structures in which both the relative effective permittivity and permeability attain near-zero values at a given operating frequency and thus the spatial distributions of the electric and magnetic fields exhibit curl-free features, while the fields are temporally dynamic. Using such structures, one might in principle ‘open up’ and ‘stretch’ the space, and have regions behaving electromagnetically as ‘single points’ despite being electrically large. We study some of the wave-matter interaction in these platforms and suggest possible designs for implementation of such structures in different frequency regimes and experimentally verify our findings in the microwave regime. Another research direction that is explored in this dissertation is the development of some nonreciprocal metaplatforms. We investigate theoretically an approach through which one-way electromagnetic wave flow can be achieved using properly designed nonlinearity combined with structural asymmetry. The approach is rather general and applicable for any desired frequency regime and opens doors for high performance “electromagnetic diodes” and nonreciprocal metasurfaces and metastructures. We also theoretically study the usage of time-dependent materials in achieving wave flow isolation within plasmonic waveguides environments. We also provide physical remarks on our various findings

    Sublytic Terminal Complement Components Induce Eryptosis in Autoimmune Haemolytic Anaemia Related to IgM Autoantibodies

    Get PDF
    BACKGROUND/AIMS: Eryptosis, the suicidal death of red blood cells (RBCs), is characterized by phosphatidylserine (PS) exposure at the cell surface. It can be catalysed by a variety of abnormal conditions and diseases. Until now, the many questions surrounding the physiology and pathophysiology of eryptosis have not been sufficiently answered. Recently, we demonstrated IgM and IgA autoantibodies (aab) to induce PS exposure on circulating RBCs of patients with autoimmune haemolytic anaemia (AIHA). However, it remained unclear how these aab lead to eryptosis. METHODS: Serum and plasma samples from patients with clinically relevant AIHA of cold type were used to induce eryptosis in O RBCs. Serum containing fresh complement from healthy donors, antibodies to complement component, and complement factor depleted sera were added to examine the influence of the complement on PS-exposure. RBC bound annexin V PE were analysed by flow cytometry. RESULTS: Eryptosis related to IgM aab was found to be dependent on complement activation and could be effectively inhibited by EDTA, serum heat inactivation and anti-C5. PS exposure increased with sequential activation of the sublytic terminal complement components C5b6, C5b-7 and was most significant at the C5b-8 stage. A decrease was observed following the formation of the lytic membrane attack complex C5b-9, either because of lysis of eryptotic RBCs or because of inhibition of eryptosis by C9. CONCLUSION: Our findings reflect new aspects on RBC destruction in AIHA as well the impact of the terminal complement complexes on the RBC membrane. The striking differences to nucleated cell apoptosis may even have physiological meaning of RBC acting as a buffer of the complement system

    Market Orientation in the Sudanese Manufacturing Firms (An Empirical Study)

    Get PDF
    The researcher used the stratified random sampling method. A total number of 91 companies out of 114companies participated (with a response rate of 80%).To analyze the data, the researcher used descriptive statistics including methods like tables, frequencies, and averages to assess the were tested using sophisticated methods like multiple regression analysis (stepwise regression analysis) and multivariate analysis of variance (MANOVA). The findings of this study confirm the applicability of the empirical model in Sudan. Ten antecedents/factors determine the market orientation of the manufacturing companies in Sudan that including, top management emphasis, management training, risk aversion, formalization, market based reward system, interdepartmental conflict, interdepartmental connectedness, competition, market turbulence, and general economy. Only three antecedents, formal marketing education, centralization and technological turbulence are not effective in determining the MO and its components in Sudan.  The findings also confirm that the MO significantly contributes to the achievement of superior performance, both the economic and non-economic. The most important recommendations of this research indicate that the model of MO developed for Sudan makes a significant contribution to the MO literature in that country particularly, to the manufacturing companies. The Sudanese organizations can use this model as a guide for their businesses. This model confirms that both superior economic and non-economic performance of business are determined by the level of MO of an organization. The empirical findings of this investigation have policy implications for large companies in developing countries in general and Sudan in particular. It is expected that this model will be used as a starting point for further researches and to be tested in other countries in the world, both developed and developing

    Secure Control of Cyber-Physical Systems

    Get PDF
    Cyber-Physical Systems (CPS) are smart co-engineered interacting networks of physical and computational components. They refer to a large class of technologies and infrastructure in almost all life aspects including, for example, smart grids, autonomous vehicles, Internet of Things (IoT), advanced medical devices, and water supply systems. The development of CPS aims to improve the capabilities of traditional engineering systems by introducing advanced computational capacity and communications among system entities. On the other hand, the adoption of such technologies introduces a threat and exposes the system to cyber-attacks. Given the unique properties of CPSs, i.e. physically interacting with its environment, malicious parties might be interested in exploiting the physical properties of the system in the form of a cyber-physical attack. In a large class of CPSs, the physical systems are controlled using a feedback control loop. In this thesis, we investigate, from many angles, how CPSs' control systems can be prone to cyber-physical attacks and how to defend them against such attacks using arguments drawn from control theory. In our first contribution, by considering Smart Grid applications, we address the problem of designing a Denial of Service (DoS)-resilient controller for recovering the system's transient stability robustly. We propose a Model Predictive Control (MPC) controller based on the set-theoretic (ST) arguments, which is capable of dealing with both model uncertainties, actuator limitations, and DoS. Unlike traditional MPC solutions, the proposed controller has the capability of moving most of the required computations into an offline phase. The online phase requires the solution of a quadratic programming problem, which can be efficiently solved in real-time. Then, stemming from the same ST based MPC controller idea, we propose a novel physical watermarking technique for the active detection of replay attacks in CPSs. The proposed strategy exploits the ST-MPC paradigm to design control inputs that, whenever needed, can be safely and continuously applied to the system for an apriori known number of steps. Such a control scheme enables the design of a physical watermarked control signal. We prove that, in the attack-free case, the generators' transient stability is achieved for all admissible watermarking signals and that the closed-loop system enjoys uniformly ultimately bounded stability. In our second contribution, we address the attacker's ability to collect useful information about the control system in the reconnaissance phase of a cyber-physical attack. By using existing system identification tools, an attacker who has access to the control loop can identify the dynamics of the underlying control system. We develop a decoy-based moving target defense mechanism by leveraging an auxiliary set of virtual state-based decoy systems. Simulation results show that the provided solution degrades the attacker's ability to identify the underlying state-space model of the considered system from the intercepted control inputs and sensor measurements. It also does not impose any penalty on the control performance of the underlying system. Finally, in our third contribution, we introduce a covert channel technique, enabling a compromised networked controller to leak information to an eavesdropper who has access to the measurement channel. We show that this can be achieved without establishing any additional explicit communication channels by properly altering the control logic and exploiting robust reachability arguments. A dual-mode receding horizon MPC strategy is used as an illustrative example to show how such an undetectable covert channel can be established

    Median sternotomy in penetrating cardiac trauma , does it make a difference ?

    Get PDF
    Background: Studies comparing the outcomes of left lateral thoracotomy and median sternotomy in the management of penetrating cardiac trauma in the Egyptian setting are lacking, which motivated us to conduct the current study. This study aimed to compare the perioperative and short-term outcomes between median sternotomy and left anterior thoracotomy in the management of patients with penetrating cardiac injuries. Methods: A total of 40 patients with penetrating cardiac trauma were included: 34 were males (85%), and 6 were females (15%). The mean age was 35.00 ± 10.83 years. Patients were allocated into two groups: Group A (n= 20) was managed with median sternotomy, and Group B (n= 20) was managed with left lateral thoracotomy. The study outcomes included operative time, intraoperative blood loss, postoperative pain score, duration of mechanical ventilation, length of ICU stay, postoperative complications and mortality. Results: The right ventricle was the most common injury site (60% vs. 50%, p= 0.619 in Groups A and B, respectively). Left lateral thoracotomy was associated with longer operation times [3750 (1500 – 6000) vs. 185 (70 - 260) mins, p= 0.002]. Left lateral thoracotomy patients had longer ICU stays [5 (2 – 7) vs. 3 (2 – 5) days, p= 0.004] and hospital stays [7 (4 – 12) vs. 5 (4 – 7) days, p= 0.001]. There were no differences in wound infection, pericardial effusion, or mortality between the groups. The pain score was lower in the median sternotomy group postoperatively from day 2 to day 7. Conclusion: Median sternotomy was associated with a significant decrease in operation time, blood loss, pain score, duration of ICU stay, and hospitalization period. The median sternotomy approach could be preferred over the thoracotomy approach in patients with penetrating cardiac injury
    • 

    corecore