3,641 research outputs found

    Individual device active cooling for enhanced system-level power density and more uniform temperature distribution

    Get PDF
    This paper provides a method of individual device active cooling system to balance the temperature distribution of system-level power density. 3L-ANPC GaN inverter was used to test and prove the feasibility of it in using multi-level systems

    Enhancement performance of random forest algorithm via one hot encoding for IoT IDS

    Get PDF
    The random forest algorithm is one of important supervised machine learning (ML) algorithms. In the present paper, the accuracy of the results of the random forest (RF) algorithm has been improved by the use of the One Hot Encoding method. The Intrusion Detection System (IDS) can be defined as a system that can predict security vulnerabilities within network traffic and is located out of range on a network infrastructure. It does not affect the efficiency of the built-in network because it analyzes a copy of the built-in traffic flow and reports results to the administrator by giving alerts. However, since IDS is a listening system only, it cannot take automatic action to prevent an attack or security vulnerability detected from infecting the system, it provides information about the source address to start the break-in, the address of the target and the type of suspected attack. The IoTID20 dataset is used to verify the improved algorithm, where this dataset is having three targets, the proposed system is compared with the state-of-art approaches and shows superiority over them

    Matrix Elements of Random Operators and Discrete Symmetry Breaking in Nuclei

    Get PDF
    It is shown that several effects are responsible for deviations of the intensity distributions from the Porter-Thomas law. Among these are genuine symmetry breaking, such as isospin; the nature of the transition operator; truncation of the Hilbert space in shell model calculations and missing transitionsComment: 8 pages, 3 figure

    Action Recognition Based on Joint Trajectory Maps Using Convolutional Neural Networks

    Get PDF
    Recently, Convolutional Neural Networks (ConvNets) have shown promising performances in many computer vision tasks, especially image-based recognition. How to effectively use ConvNets for video-based recognition is still an open problem. In this paper, we propose a compact, effective yet simple method to encode spatio-temporal information carried in 3D3D skeleton sequences into multiple 2D2D images, referred to as Joint Trajectory Maps (JTM), and ConvNets are adopted to exploit the discriminative features for real-time human action recognition. The proposed method has been evaluated on three public benchmarks, i.e., MSRC-12 Kinect gesture dataset (MSRC-12), G3D dataset and UTD multimodal human action dataset (UTD-MHAD) and achieved the state-of-the-art results

    Some new results of completion t^ω- Normed approach space

    Get PDF
    In this paper , the completion of t^ω-approach spaces, isometric in t^ω-approach space and equivalent sequences are defined. Every t^ω-approach normed space can be embedded in t^ω-approach Banach space is proved, χ ̃ and an isometry ψ from χ onto the subspace F of χ ̃ which is dense in χ ̃ are introduced, as well as, the completion is shown an uniquely up to an isometry. In addition, to what is mentioned above, some essential definitions, examples, and important theorems are included to illustrate some of our work

    Architecture Students Self-Report Wellbeing Assessment Based On Quality Learning Environment in Design Studio

    Get PDF
    Higher education students’ difficulties, especially students in architecture education lead students to health problems. The design studio is the heart of architecture education and students spent most of their time with staff. Students tend to do various activities in the studio such as demonstrating, model-making, drawing, and lecturing. Therefore, the learning environment in the studio should attract students to spend most of their time in the studio happily. This research focused on a mixed method to assess the relationship between students’ wellbeing and the quality learning environment in the design studio. The students’ self-report assessment for the wellbeing situation has been used that depends on students experience in the design studio. For this reason, architecture design studios at private universities in Erbil city have been selected as a case study. The statistical program SPSS has been used to test hypotheses and analyze data. The findings of this study represent the significant positive relationship between students’ wellbeing and the quality learning environment in the design studio. Furthermore, the study illustrates the significance of the quality learning environment in the design studio and its role in the development of the student’s wellbeing

    Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

    Get PDF
    Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios

    Deformed Gaussian Orthogonal Ensemble Analysis of the Interacting Boson Model

    Full text link
    A Deformed Gaussian Orthogonal Ensemble (DGOE) which interpolates between the Gaussian Orthogonal Ensemble and a Poissonian Ensemble is constructed. This new ensemble is then applied to the analysis of the chaotic properties of the low lying collective states of nuclei described by the Interacting Boson Model (IBM). This model undergoes a transition order-chaos-order from the SU(3)SU(3) limit to the O(6)O(6) limit. Our analysis shows that the quantum fluctuations of the IBM Hamiltonian, both of the spectrum and the eigenvectors, follow the expected behaviour predicted by the DGOE when one goes from one limit to the other.Comment: 10 pages, 4 figures (avaiable upon request), IFUSP/P-1086 Replaced version: in the previous version the name of one of the authors was omitte

    Enhancement performance of random forest algorithm via one hot encoding for IoT IDS

    Get PDF
    The random forest algorithm is one of important supervised machine learning (ML) algorithms. In the present paper, the accuracy of the results of the random forest (RF) algorithm has been improved by the use of the One Hot Encoding method. The Intrusion Detection System (IDS) can be defined as a system that can predict security vulnerabilities within network traffic and is located out of range on a network infrastructure. It does not affect the efficiency of the built-in network because it analyzes a copy of the built-in traffic flow and reports results to the administrator by giving alerts. However, since IDS is a listening system only, it cannot take automatic action to prevent an attack or security vulnerability detected from infecting the system, it provides information about the source address to start the break-in, the address of the target and the type of suspected attack. The IoTID20 dataset is used to verify the improved algorithm, where this dataset is having three targets, the proposed system is compared with the state-of-art approaches and shows superiority over them

    Morphometric parameters and histological study of the filum terminale of adult human cadavers and magnetic resonance images

    Get PDF
    Background: Morphology and histology of filum terminale (FT) has a role in the pathophysiology of tethered cord syndrome (TCS). This research was implemented to investigate the morphometric parameters and histological structure of normal FT in adult human cadavers and magnetic resonance imaging (MRI) scans to correlate them with the pathophysiology of TCS.   Materials and methods: Twenty five adult human cadavers (15 males, 10 females) and 100 MRI echo scans of lumbosacral region (50 males and 50 females), were used in this study. MRI patients were divided into 21–40 and 41–60 age groups. The cadavers were dissected at the prone position to explore their fila. The length of FT, filum terminale internum (FTI), filum terminale externum (FTE), vertebral level of beginning, dural piercing and termination of FT, and the initial, midpoint, and mid-FTE diameters were determined. Four segments were excised from lower conus, upper, middle, and lower thirds of FT. The specimens were processed for light microscopic examination. Statistical analysis was done for these parameters.   Results: MRI morphometrical parameters of FT, except FTI length, revealed no age effect or sex differences, where length of FTI, FTE, initial diameter, level of conus medullaris termination (CMT) and dural sac termination (DST) were 174.1 ± 16.8, 75.8 ± 9.5, 1.6 ± 0.21, L1-2 and S2U in males and 166.9 ± 18.9, 74.1 ± 9.3, 1.53 ± 0.25, L1-2 and S2M vertebrae in females, respectively. However, non-significant sex difference was observed in morphometric parameters of cadaveric FT, where length of FTI and FTE, initial diameter, CMT and DST levels were 164.2 ± 11.6, 76.7 ± 8.1, 1.7 ± 0.14, L1L and S2U vertebrae in males and 159.2 ± 10.1, 71.02 ± 7.3, 1.6 ± 0.29, L1L and S2U in females, respectively. Moreover, CMT below L2 vertebra was seen in 5% of MRI scans and 8% of cadavers. Also, the initial diameter of FT > 2 mm was recorded in 7% of MRI and 8% of cadaveric cases. Histologically, the structure of FT showed gradual reduction in nervous, glial, and vascular tissues with converse increase in collagen content in FTE compared with those of FTI.   Conclusions: Knowledge of the morphometric parameters and the histological structure of FT are necessary for clinicians who dealing with diagnosis or treatment of tethered cord syndrome
    corecore