127 research outputs found

    Detectability Of Fuzzy Discrete Event Systems

    Get PDF
    Dynamic systems that can be modeled in terms of discrete states and a synchronous events are known as discrete event systems (DES). A DES is defined in terms of states, events, transition dynamics, and initial state. Knowing the system’s state is crucial in many applications for certain actions (events) to be taken. A DES system is considered a fuzzy discrete event system (FDES) if its states and events are vague in nature; for such systems, the system can be in more than one state at the same time with different degrees of possibility (membership). In this research we introduce a fuzzy discrete event system with constraints (FDESwC) and investigate its detectabilities. This research aims to address the gap in previous studies and extend existing definitions of detectability of DES to include the detectability in systems with substantial vagueness such as FDES. These definitions are first reformulated to introduce N-detectability for DES, which are further extended to define four main types of detectabilities for FDES: strong N-detectability, (weak) N-detectability, strong periodic N-detectability, and (weak) periodic N-detectability. We first partition the FDES into trajectories of a length dictated by the depth of the event’s string (length of the event sequence); each trajectory consists of a number of nodes, which are further investigated for detectability by examining them against the newly introduced certainty criterion. Matrix computation algorithms and fuzzy logic operations are adopted to calculate the state estimates based on the current state and the occurring events. Vehicle dynamics control example is used to demonstrate the practical aspect of developed theorems in real-world applications

    Valorization of Vase Dam by the addition of the cement kiln Dust (CKD)

    Get PDF
    This study is the valuation of the mud dam Charef - Djelfa Wilaya in basic layers of material by the chemical stabilization process based on the addition of cement kiln dust (CKD) who considered under product from the manufacture of cement. In this context we came through particle size analysis tests, plasticity, chemical analysis, compaction, and simple compression on different samples of mud treated with different percentages of CKD and stored at a period of 28 days to change the consistency of the untreated mud and was a firm consistency to a hard and stable consistency by adding a percentage of 20% CKD

    On sequential and fixed designs for estimation with comparisons and applications

    Get PDF
    A fully sequential approach to the estimation of the difference of two population means for distributions belonging to the exponential family of distributions is adopted and compared with the best fixed design. Results on the lower bound for the Bayes risk due to estimation and expected cost are presented and shown to be of first order efficiency. Applications involving the Poisson and exponential distributions with gamma priors as well as the Bernoulli distribution with beta priors are given. Finally, some numerical results are presented.Adoptem un plantejament complet i exhaustiu per estudiar les diferències entre les mitjanes poblacionals per a distribucions de la família exponencial, que comparem amb el millor disseny d'efectes fixs. Presentem resultats sobre la cota inferior del risc de Bayes lligat a l'estimació i provem la seva eficiència de primer ordre. Donem aplicacions implicant les distribucions de Poisson i exponencial amb priors gammas així com la distribució de Bernoulli amb priors beta. Finalment, presentem alguns resultats numèrics

    Fault-tolerant and QoS based Network Layer for Security Management

    Get PDF
    Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets

    Impact of the Integration of a STATCOM Controlled by LQG/H2 Regulator in an Energy System

    Get PDF
    © The Author(s); licensee IIETA, Edmonton, Canada. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY), https://creativecommons.org/licenses/by/4.0/Nowadays, the reactive power consumption is becoming a serious problem for electricity network management. To overcome this problem, several solutions are proposed in the literature. In the present study, the static reactive power compensator (STATCOM) solution is used to keep the network voltage within its rated range. The STATCOM is modeled in the axes of Park reference frame and is driven controlled by a SVPWM strategy. Its control scheme is based on a multivariable Linear Quadratic Gaussian (LQG/H2) controller, which has the advantage of being applied to systems whose condition is not measured. Simulations are performed using the MATLAB/SIMULINK software. Results are presented, compared and discussed.Peer reviewe

    Seroprevalence of hepatitis B and C virus infections among health students and health care workers in the Najran region, southwestern Saudi Arabia: The need for national guidelines for health students

    Get PDF
    BACKGROUND: The objectives of the study were to study the seroprevalence of hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among health college students (HS) and health care workers (HCWs) in the Najran Region of south-western Saudi Arabia and to study the students’ knowledge of occupational exposure to blood-borne viral infections. METHODS: A cross-sectional study of a representative sample of 300 HS and 300 HCWs was conducted. RESULTS: An overall seroprevalence of HBV of 1.7% and 8.7% was found among HS and HCWs, respectively. Two-thirds of HS (66.7%, 200) and 23.3% (70) of HCWs lack anti-HBs and are susceptible to HBV infection. An overall seroprevalence of HCV of 0% and 0.3% was found among the HS and HCWs, respectively. The present study indicates poor knowledge among HS and moderate knowledge among HCWs regarding occupationally transmitted blood-borne diseases, safe injection practices, and standard precautions to prevent occupationally transmitted blood-borne infections. CONCLUSION: It is mandatory to develop a structured program to raise awareness among HS, and current health colleges’ curricula should be upgraded to address these issues early. The HS should be considered new recruits to health services in terms of their initial screening for blood-borne infections and vaccination against HBV. The development of a novel continuing medical education and pre-employment awareness program for HCWs is recommended to address the following: blood-borne diseases transmitted occupationally, standard precautions to prevent occupationally transmitted blood borne infections, and safe injection practices

    Histopathological Features of Whipple Pancreaticoduodenectomy in Sudan: A Single-center Experience

    Get PDF
    Background: Periampullary tumors (PATs) are rare and Whipple pancreaticoduodenectomy is the commonest surgical approach for its management. The aim of this study was to analyze the histopathological features of Whipple-resected periampullary tumors in Sudanese patients.Methods: This retrospective descriptive study included 62 cases of Whipple resection seen in a center in Khartoum, Sudan from January 2016 to June 2021. The specimens were assessed for nine features of the tumor: site of the tumor (whether within the periampullary region), size of the tumor, histological type of the tumor, grade, perineural invasion, lymph vascular invasion, surgical margin status, lymph node metastasis status, and the pathological stage (pTNM).Results: In total, 62 cases, 40 (64.5%) males and 22 (35.5%) females, were included. Age ranged from 20 to 90 years with a mean age of 56.08 years (±12.98 SD). Of the 62 cases, 58 were malignant (93.5%), while 4 cases were benign (6.5%). The pancreas was the commonest site for malignant tumors (53.4%), followed by the ampulla (24.1%), duodenum (15.5%), and distal common bile duct tumors (DCBD) (7%). The maximum tumor size was 8 cm, and the number of lymph nodes resected ranged from 3 to 33. Pancreatic ductal adenocarcinomas (PDACs) showed the highest percentage of perineural (62.1%) and lymphovascular (55.2%) invasions, and a positive margin was seen in four cases. The most common tumor stage was pT3pN1pMx.Conclusion: PATs in the Sudanese population showed histological diversity regarding subtyping, grading, and staging. Further studies involving molecular prognostic features will support improving patient management. Keywords: periampullary tumors; Whipple pancreaticoduodenectomy; resection; histological features; Suda

    ProMap: Effective Bilingual Lexicon Induction via Language Model Prompting

    Full text link
    Bilingual Lexicon Induction (BLI), where words are translated between two languages, is an important NLP task. While noticeable progress on BLI in rich resource languages using static word embeddings has been achieved. The word translation performance can be further improved by incorporating information from contextualized word embeddings. In this paper, we introduce ProMap, a novel approach for BLI that leverages the power of prompting pretrained multilingual and multidialectal language models to address these challenges. To overcome the employment of subword tokens in these models, ProMap relies on an effective padded prompting of language models with a seed dictionary that achieves good performance when used independently. We also demonstrate the effectiveness of ProMap in re-ranking results from other BLI methods such as with aligned static word embeddings. When evaluated on both rich-resource and low-resource languages, ProMap consistently achieves state-of-the-art results. Furthermore, ProMap enables strong performance in few-shot scenarios (even with less than 10 training examples), making it a valuable tool for low-resource language translation. Overall, we believe our method offers both exciting and promising direction for BLI in general and low-resource languages in particular. ProMap code and data are available at \url{https://github.com/4mekki4/promap}.Comment: To appear in IJCNLP-AACL 202

    Android based vehicle tracking system / Omer Ali Abubakr Abd Elrhman … [et al.]

    Get PDF
    Android, as an operating system, has provided users with great opportunity to innovate and get things done in a mobile device. This paper presents how to use the GPS technology in Android devices to complete an interactive application which can be used to monitor a fleet of vehicles and display their positions on Google Maps. By using SMS messages, this information can be transmitted to the server. It provides a telemonitoring system for distribution or transportation vehicles owned by a specific company. The whole system is made of two key parts. The first one is the client, which represents an Android application that is installed in the vehicle. During a vehicle’s motion, its location can be reported by SMS messages. The second is the server, which is a computer programme representing a map using Google Maps to show the last known locations of all tracked vehicles. The current system is able to provide the monitoring process from anywhere. The purpose of this system is to use the Android platform to provide the following features: i) Location information (longitude, latitude). ii) Real time tracking using SMS. iii) Map View of all vehicles’ locations. This system is needed by many companies to monitor illegal and unethical use of their vehicles. It also provides assurance that the location of the vehicle is known in the case of robbery
    • …
    corecore