23 research outputs found

    Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral

    Get PDF
    The Pythagorean Probabilistic Hesitant Fuzzy (PyPHF) Environment is an amalgamation of the Pythagorean fuzzy set and the probabilistic hesitant fuzzy set that is intended for some unsatisfactory, ambiguous, and conflicting situations where each element has a few different values created by the reality of the situation membership hesitant function and the falsity membership hesitant function with probability. The decision-maker can efficiently gather and analyze the information with the use of a strategic decision-making technique. In contrast, ambiguity will be a major factor in our daily lives while gathering information. We describe a decision-making technique in the PyPHF environment to deal with such data uncertainty. The fundamental operating principles for PyPHF information under Choquet Integral were initially established in this study. Then, we put up a set of new aggregation operator names, including Pythagorean probabilistic hesitant fuzzy Choquet integral average and Pythagorean probabilistic hesitant fuzzy Choquet integral geometric aggregation operators. Finally, we explore a multi-attribute decision-making (MADM) algorithm based on the suggested operators to address the issues in the PyPHF environment. To demonstrate the work and contrast the findings with those of previous studies, a numerical example is provided. Additionally, the paper provides sensitivity analysis and the benefits of the stated method to support and reinforce the research

    Optimizing the Gamma Ray-Based Detection System to Measure the Scale Thickness in Three-Phase Flow through Oil and Petrochemical Pipelines in View of Stratified Regime

    Get PDF
    As the oil and petrochemical products pass through the oil pipeline, the sediment scale settles, which can cause many problems in the oil fields. Timely detection of the scale inside the pipes and taking action to solve it prevents problems such as a decrease in the efficiency of oil equipment, the wastage of energy, and the increase in repair costs. In this research, an accurate detection system of the scale thickness has been introduced, which its performance is based on the attenuation of gamma rays. The detection system consists of a dual-energy gamma source ( 241 Am and 133 Ba radioisotopes) and a sodium iodide detector. This detection system is placed on both sides of a test pipe, which is used to simulate a three-phase flow in the stratified regime. The three-phase flow includes water, gas, and oil, which have been investigated in different volume percentages. An asymmetrical scale inside the pipe, made of barium sulfate, is simulated in different thicknesses. After irradiating the gamma-ray to the test pipe and receiving the intensity of the photons by the detector, time characteristics with the names of sample SSR, sample mean, sample skewness, and sample kurtosis were extracted from the received signal, and they were introduced as the inputs of a GMDH neural network. The neural network was able to predict the scale thickness value with an RMSE of less than 0.2, which is a very low error compared to previous research. In addition, the feature extraction technique made it possible to predict the scale value with high accuracy using only one detector

    Daubechies Versus Biorthogonal Wavelets for Moving Object Detection in Traffic Monitoring Systems

    Get PDF
    Moving object detection is a fundamental task for a variety of traffic applications. In this paper the Daubechies and biorthogonal wavelet families are exploited for extracting the relevant movement information in moving image sequences in a 3D wavelet-based segmentation algorithm. The proposed algorithm is applied for traffic monitoring systems. The objective and subjective experimental results obtained by applying both wavelet types are compared and interpreted in terms of the different wavelet properties and the characteristics of the image sequences. The comparisons show the superior performance of the symmetric biorthogonal wavelets in the presence of noisy images and changing lighting conditions when compared to the application of high order Daubechies wavelets. The algorithm is evaluated using simulated images in the Matlab environment. Index Terms — 3D wavelet transform, Image segmentation, Biorthogonal wavelets, Daubechies wavelets, traffic monitoring systems

    Position estimation of binaural sound source in reverberant environments

    No full text
    Most binaural sound source systems perform localization in either direction or distance perception. However, in real scenarios both perceptions are important to estimate source position in various environment conditions especially with the rapid technological growth in smart machines and their involvement in human daily life. This paper introduces an approach for azimuth and distance of binaural sound source localization in different reverberating environments using only two microphones. The algorithm is based on statistical features of the binaural cues and the difference of the binaural magnitude spectra of the binaural signal. Gaussian Mixture Models (GMMs) are used to jointly learn both distances and azimuths in different reverberant rooms. The proposed system does not require any prior knowledge of head related transfer function (HRTF), acoustical environment or room parameters. The performance has been evaluated at different aspects and conditions and reported effective and robust results, especially in the case of training set mismatch

    Deep Machine Learning Based Possible Atmospheric and Ionospheric Precursors of the 2021 Mw 7.1 Japan Earthquake

    No full text
    Global Navigation Satellite System (GNSS)- and Remote Sensing (RS)-based Earth observations have a significant approach on the monitoring of natural disasters. Since the evolution and appearance of earthquake precursors exhibit complex behavior, the need for different methods on multiple satellite data for earthquake precursors is vital for prior and after the impending main shock. This study provided a new approach of deep machine learning (ML)-based detection of ionosphere and atmosphere precursors. In this study, we investigate multi-parameter precursors of different physical nature defining the states of ionosphere and atmosphere associated with the event in Japan on 13 February 2021 (Mw 7.1). We analyzed possible precursors from surface to ionosphere, including Sea Surface Temperature (SST), Air Temperature (AT), Relative Humidity (RH), Outgoing Longwave Radiation (OLR), and Total Electron Content (TEC). Furthermore, the aim is to find a possible pre-and post-seismic anomaly by implementing standard deviation (STDEV), wavelet transformation, the Nonlinear Autoregressive Network with Exogenous Inputs (NARX) model, and the Long Short-Term Memory Inputs (LSTM) network. Interestingly, every method shows anomalous variations in both atmospheric and ionospheric precursors before and after the earthquake. Moreover, the geomagnetic irregularities are also observed seven days after the main shock during active storm days (Kp > 3.7; Dst < −30 nT). This study demonstrates the significance of ML techniques for detecting earthquake anomalies to support the Lithosphere-Atmosphere-Ionosphere Coupling (LAIC) mechanism for future studies

    Application of a novel metaheuristic algorithm based two-fold hysteresis current controller for a grid connected PV system using real time OPAL-RT based simulator

    No full text
    Grid connected photovoltaic (GCPV) rooftop systems have been considered as fast development and promising renewable energy sources due to low maintenance cost, secure investment, noise-free and do not require additional space for installation. Various factors considered for the installation of GCPV are mathematical models of PV module, sizing methods based on techno-economic objectives, PV panels and configurations, selection of the final optimum configuration and environmental criteria. Selection of appropriate controller and its optimal design for power electronic based converters also plays a crucial role in the performance of GCPV. Therefore in this article, a two-fold hysteresis current controller (TFHCC) based on an Improved Arithmetic Optimization Algorithm (IAOA) is introduced and investigated for the first time, for a GCPV system to minimize the switching loss and total harmonic distortion (THD). A novel multi-objective function considering switching frequency and current error is proposed by assigning appropriate weights to obtain the optimal values of duty cycle and hysteresis bands using IAOA, AOA, Forensic Based Investigation (FBI), Differential Evolution (DE) and Particle Swarm Optimization (PSO) algorithms. TFHCC utilizes zero level of the inverter by properly switching it on for a half cycle only and either on or off for the other cycle. Comparative performance analysis of the optimal TFHCC obtained with different algorithms is presented and it is proved that IAOA based TFHCC exhibits substantial reductions in variation and magnitude of the average switching frequency by 2.82 kHz and THD by 0.65%. Initially, the study is carried out with MATLAB Simulink environment and then experimentally validated with real time simulator based on OPAL-RT 4510

    Predicting Infection Positivity, Risk Estimation, and Disease Prognosis in Dengue Infected Patients by ML Expert System

    No full text
    Dengue fever has earned the title of a rapidly growing global epidemic since the disease-causing mosquito has adapted to colder countries, breaking the notion of dengue being a tropical/subtropical disease only. This infectious time bomb demands timely and proper treatment as it affects vital body functions, often resulting in multiple organ failures once thrombocytopenia and internal bleeding manifest in the patients, adding to morbidity and mortality. In this paper, a tool is used for data collection and analysis for predicting dengue infection presence and estimating risk levels to identify which group of dengue infections the patient suffers from, using a machine-learning-based tertiary classification technique. Based on symptomatic and clinical investigations, the system performs real-time diagnosis. It uses warning indicators to alert the patient of possible internal hemorrhage, warning them to seek medical assistance in case of this disease-related emergency. The proposed model predicts infection levels in a patient based on the classification provided by the World Health Organization, i.e., dengue fever, dengue hemorrhagic fever, and dengue shock syndrome, acquiring considerably high accuracy of over 90% along with high sensitivity and specificity values. The experimental evaluation of the proposed model acknowledges performance efficiency and utilization through statistical approaches

    A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment

    No full text
    Software-Defined Networking (SDN) is now a well-established approach in 5G, Internet of Things (IoT) and Cloud Computing. The primary idea behind its immense popularity is the separation of its underlying intelligence from the data-carrying components like routers and switches. The intelligence of the SDN-based networks lies in the central point, popularly known as the SDN controller. It is the central control hub of the SDN-based network, which has full privileges and a global view over the entire network. Providing security to SDN controllers is one such important task. Whenever one wishes to implement SDN into their data center or network, they are required to provide the website to SDN controllers. Several attacks are becoming a hurdle in the exponential growth of SDN, and among all one such attack is a Distributed Denial of Service (DDoS) attack. In a couple of years, several new SDN controllers will be available. Among many, Open Networking Operating System (ONOS) and OpenDayLight (ODL) are two popular SDN controllers laying the foundation for many other controllers. These SDN controllers are now being used by numerous businesses, including Cisco, Juniper, IBM, Google, etc. In this paper, vulnerability analysis is carried out against DDoS attacks on the latest released versions of both ODL and ONOS SDN controllers in real-time cloud data centers. For this, we have considered distributed SDN controllers (located at different locations) on two different clouds (AWS and Azure). These controllers are connected through the Internet and work on different networks. DDoS attacks are bombarded on the distributed SDN controllers, and vulnerability is analyzed. It was observed with experimentation that, under five different scenarios (malicious traffic generated), ODL-3 node cluster controller had performed better than ONOS. In these five different scenarios, the amount of malicious traffic was incregradually increased. It also observed that, in terms of disk utilization, memory utilization, and CPU utilization, the ODL 3-node cluster was way ahead of the SDN controller

    A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment

    No full text
    Software-Defined Networking (SDN) is now a well-established approach in 5G, Internet of Things (IoT) and Cloud Computing. The primary idea behind its immense popularity is the separation of its underlying intelligence from the data-carrying components like routers and switches. The intelligence of the SDN-based networks lies in the central point, popularly known as the SDN controller. It is the central control hub of the SDN-based network, which has full privileges and a global view over the entire network. Providing security to SDN controllers is one such important task. Whenever one wishes to implement SDN into their data center or network, they are required to provide the website to SDN controllers. Several attacks are becoming a hurdle in the exponential growth of SDN, and among all one such attack is a Distributed Denial of Service (DDoS) attack. In a couple of years, several new SDN controllers will be available. Among many, Open Networking Operating System (ONOS) and OpenDayLight (ODL) are two popular SDN controllers laying the foundation for many other controllers. These SDN controllers are now being used by numerous businesses, including Cisco, Juniper, IBM, Google, etc. In this paper, vulnerability analysis is carried out against DDoS attacks on the latest released versions of both ODL and ONOS SDN controllers in real-time cloud data centers. For this, we have considered distributed SDN controllers (located at different locations) on two different clouds (AWS and Azure). These controllers are connected through the Internet and work on different networks. DDoS attacks are bombarded on the distributed SDN controllers, and vulnerability is analyzed. It was observed with experimentation that, under five different scenarios (malicious traffic generated), ODL-3 node cluster controller had performed better than ONOS. In these five different scenarios, the amount of malicious traffic was incregradually increased. It also observed that, in terms of disk utilization, memory utilization, and CPU utilization, the ODL 3-node cluster was way ahead of the SDN controller

    Real-Time Dynamic and Multi-View Gait-Based Gender Classification Using Lower-Body Joints

    No full text
    Gender classification based on gait is a challenging problem because humans may walk in different directions at different speeds and with varying gait patterns. The majority of investigations in the literature relied on gender-specific joints, whereas the comparison of the lower-body joints in the literature received little attention. When considering the lower-body joints, it is important to identify the gender of a person based on his or her walking style using the Kinect Sensor. In this paper, a logistic-regression-based model for gender classification using lower-body joints is proposed. The proposed approach is divided into several parts, including feature extraction, gait feature selection, and human gender classification. Different joints’ (3-dimensional) features were extracted using the Kinect Sensor. To select a significant joint, a variety of statistical techniques were used, including Cronbach’s alpha, correlation, T-test, and ANOVA techniques. The average result from the Coronbach’s alpha approach was 99.74%, which shows the reliability of the lower-body joints in gender classification. Similarly, the correlation data show a significant difference between the joints of males and females during gait. As the p-value for each of the lower-body joints is zero and less than 1%, the T-test and ANOVA techniques demonstrated that all nine joints are statistically significant for gender classification. Finally, the binary logistic regression model was implemented to classify the gender based on the selected features. The experiments in a real situation involved one hundred and twenty (120) individuals. The suggested method correctly classified gender using 3D data captured from lower-body joints in real-time using the Kinect Sensor with 98.3% accuracy. The proposed method outperformed the existing image-based gender classification systems
    corecore