14,154 research outputs found

    Supporting User-Defined Functions on Uncertain Data

    Get PDF
    Uncertain data management has become crucial in many sensing and scientific applications. As user-defined functions (UDFs) become widely used in these applications, an important task is to capture result uncertainty for queries that evaluate UDFs on uncertain data. In this work, we provide a general framework for supporting UDFs on uncertain data. Specifically, we propose a learning approach based on Gaussian processes (GPs) to compute approximate output distributions of a UDF when evaluated on uncertain input, with guaranteed error bounds. We also devise an online algorithm to compute such output distributions, which employs a suite of optimizations to improve accuracy and performance. Our evaluation using both real-world and synthetic functions shows that our proposed GP approach can outperform the state-of-the-art sampling approach with up to two orders of magnitude improvement for a variety of UDFs. 1

    Required flows for aquatic ecosystems in Ma River, Vietnam

    Full text link
    Ecological flow requirements for the Ma River in dry season were assessed in three reaches of Ma – Buoi, Ma – Len and Ma – Chu. 5 indictor fish species was chosen based on biodiversity survey and roles of those species in aquatic ecosystem as well as local communities. Biological and hydrological data (dry season of 2016- 2017) and 35 year recorded hydrological data were collected and analyzed as input data for a physical habitat model River HYdraulic and HABitat SImulation Model – RHYHABSIM. Model results shown that the optimal flows of the reaches were very much higher compare with the minimum annual low flow - MALF. In this study, MALF7day were applied to calculate the recommended minimum flows of the three reaches. The recommended required minimum flows for Ma – Buoi, Ma – Len and Ma – Chu reaches were 51 m3/s, 49 m3/s and 61 m3/s, respectively. It must be stressed that this study only assessed whether or not there is enough habitat available for the river to sustain a healthy ecosystem

    Sequential optimal control of the nuclear fuel reload mechanism

    Full text link
    The BN-800 reactor overload system is designed to overload fuel assemblies and consists of a set of nodes that provide guidance for the reload mechanism at given coordinates, grabbing, lifting, lowering and rotating assemblies. On the throat of the BN-800 reactor there are three rotary plugs, the smaller of which is located inside the middle one and the middle one inside the large one. On a smaller tube placed the capture mechanism of the fuel assembly. The plugs, which are the reactor cover, perform the role of thermal and biological protection, as well as, guide the reload mechanism to the given coordinates of the core in order to capture the fuel assembly and move it to the required zone with the given coordinates. In this paper, we will consider the problem of minimal-time cast a gripper located on a smaller traffic jam to a given fuel assembly, assuming that the traffic jams will turn in series and at each moment only one traffic jam can be turned. The solution of such a task will contribute to the reduction of the stopping time of the power unit for carrying out operations on refueling. For this problem, a mathematical model was constructed to describe the movement of three connected plugs. Based on that, an algorithm for constructing optimal control was proposed considering given assumptions. © 2019 Author(s).Ural Branch, Russian Academy of Sciences, UB RAS: 18-1-1-9The research was supported by the Integrated Scientific Program of the Ural Branch of Russian Academy of Sciences, Project 18-1-1-9 “Estimation of the Dynamics of Nonlinear Control Systems and Route Optimization”

    Number Fluctuation in an interacting trapped gas in one and two dimensions

    Full text link
    It is well-known that the number fluctuation in the grand canonical ensemble, which is directly proportional to the compressibility, diverges for an ideal bose gas as T -> 0. We show that this divergence is removed when the atoms interact in one dimension through an inverse square two-body interaction. In two dimensions, similar results are obtained using a self-consistent Thomas-Fermi (TF) model for a repulsive zero-range interaction. Both models may be mapped on to a system of non-interacting particles obeying the Haldane-Wu exclusion statistics. We also calculate the number fluctuation from the ground state of the gas in these interacting models, and compare the grand canonical results with those obtained from the canonical ensemble.Comment: 11 pages, 1 appendix, 3 figures. Submitted to J. Phys. B: Atomic, Molecular & Optica

    Titanium dioxide - activated carbon composite for photoelectrochemical degradation of phenol

    Get PDF
    In this study, titanium dioxide (TiO2) and titanium dioxide – activated carbon composite (TiO2–AC) were prepared by sol-gel method for photoelectrochemical (PEC) applications. Characterization of the materials was performed by scanning electron microscope, energy dispersive X-ray analysis, Fourier transform infrared spectroscopy, X-ray diffraction, and diffuse reflectance spectroscopy. The results show that TiO2 was successfully loaded on activated carbon (AC), producing TiO2–AC with 2.61 eV of bandgap energy, lower than that of TiO2 (3.15 eV). Photoanodes based on TiO2 and TiO2–AC were fabricated and applied to PEC experiments for phenol degradation. In comparison with the TiO2 photoanode, the TiO2–AC one exhibited superior photocatalytic activity, which was indicated by a high current density and effective phenol removal. A mechanism of phenol PEC degradation on the TiO2–AC photoanode was proposed, which includes interaction between protonated phenol and active sites bearing oxygen on the photoanode surface. A kinetic model according to this mechanism was also established and fitted to experimental findings, resulting in rate constants of elementary reactions

    Defending against Sybil Devices in Crowdsourced Mapping Services

    Full text link
    Real-time crowdsourced maps such as Waze provide timely updates on traffic, congestion, accidents and points of interest. In this paper, we demonstrate how lack of strong location authentication allows creation of software-based {\em Sybil devices} that expose crowdsourced map systems to a variety of security and privacy attacks. Our experiments show that a single Sybil device with limited resources can cause havoc on Waze, reporting false congestion and accidents and automatically rerouting user traffic. More importantly, we describe techniques to generate Sybil devices at scale, creating armies of virtual vehicles capable of remotely tracking precise movements for large user populations while avoiding detection. We propose a new approach to defend against Sybil devices based on {\em co-location edges}, authenticated records that attest to the one-time physical co-location of a pair of devices. Over time, co-location edges combine to form large {\em proximity graphs} that attest to physical interactions between devices, allowing scalable detection of virtual vehicles. We demonstrate the efficacy of this approach using large-scale simulations, and discuss how they can be used to dramatically reduce the impact of attacks against crowdsourced mapping services.Comment: Measure and integratio
    corecore