scholarly journals TDMR Detection System with Local Area Influence Probabilistic a Priori Detector

Author(s):  
Jinlu Shen ◽  
Xueliang Sun ◽  
Krishnamoorthy Sivakumar ◽  
Benjamin J. Belzer ◽  
Kheong Sann Chan ◽  
...  
Keyword(s):  
A Priori ◽  
Author(s):  
A.A. Kuzmitsky ◽  
M.I. Truphanov ◽  
O.B. Tarasova ◽  
D.V. Fedosenko

One of the key tasks associated with the fast identification of powerful tropical hurricanes, the assessment of the growth of their power, is the formation of such an input dataset, which is based on data that are technically easy and accurately recorded and calculated using existing sources located in the open accessibility. The presented work is based on the analysis of satellite images as the main data sources, and on weather data as peripheral. An obvious advantage of satellite images in comparison with other sources of data on weather conditions is their high spatial resolution, as well as the ability to obtain data from various satellites, which increases the timeliness and accuracy of retrieving primary information. The developed approach consists in performing the following main interconnected iteratively performed groups of subtasks: calculation of feature points describing the location of individual cloud areas at different points in time by using different descriptors; comparison of the same cloud areas at specified times to analyze the local directions of cloud movements; tracking of cloudiness for specified time intervals; calculation of local features for selected points of cloudiness to recognize the origin and analyze turbulence; the formation of the dynamics of changes in the local area near the trajectory of the point; recognition of primary characteristic features characterizing the transformation of local turbulences into a stable vortex formation; identification of signs of the growing of a hurricane and assessment of the primary dynamics of the increase in its power; generalization and refinement of a priori given features by analyzing similar features of known cyclones. To detect points, a modified algorithm for finding them has been introduced. To describe the points, additional descriptors are introduced based on the normalized gradient measured for the neighborhood of neighboring points and cyclically changing in the polar coordinate system. A comparative analysis of the results of applying the created method and algorithm when compared with known similar solutions revealed the following distinctive features: introduction of additional invariant orientations of features when describing characteristic points and greater stability of detecting characteristic points when analyzing cloudiness, identification of cloudiness turbulence and analysis of changes in their local characteristics and movement parameters, formation of a set of generalizing distributions when analyzing a set of moving points for the subsequent recognition of the signs of a hurricane at its initial stages of formation. The developed approach was tested experimentally in the analysis of hurricanes video recordings and their movement in the Atlantic region for the period from 2010 to 2020. The developed general approach and a specific algorithm for estimating hurricane parameters based on cloud analysis are presented. The approach is applicable for practical implementation and allows accumulating data for detecting hurricanes in real time based on publicly available data for the development of a physical and mathematical model.


2019 ◽  
Vol 37 (2) ◽  
pp. 26-42
Author(s):  
B. Kommey ◽  
E. O. Addo ◽  
K. A. Adjei

Location of appropriate seats in seating areas of theaters remains a significant challenge that patrons of these enterprises face. There is therefore, the need for seat occupancy monitoring system to provide readily accessible seat occupancy information to clients and management of these halls. This paper presents the design and implementation of a low cost seat occupancy detection and display system which is capable of monitoring seat occupancy in halls efficiently.  The system uses capacitive seat sensors which is designed based on the loading mode technology. It detects the presence of a human occupant using a single electrode. Occupancy data is relayed to a WiFi-enabled microcontroller unit which processes the data and wirelessly transfers the processed data to a central base station over a local area network for graphical and numerical display. Commands are also transferred from the base station to the microcontroller units when needed. Theoretical and empirical results show that the system is able to achieve seat occupancy monitoring accurately, neatly and cost effectively.Keywords: Capacitive sensing, seat occupancy, sensor cluster, microstrip transmission line, Wi-Fi 


Author(s):  
سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي

Wireless networks in the lives of people at work, at home, and in public places, plays a decisive role. Given the widespread demand for wireless networks, providers deploy wireless local area networks (WLAN) to provide access to broadband Internet Within the range of a public wireless LAN hotspot such as in airports or hotels, users can access their e-mails and browse the Internet either for free or, most often, against a fee. However, as the number of users rises, so does the risk that users may misbehave. Misbehaving users can to a large extent increase their share of bandwidth at the expense of other paid users by slightly modifying the driver of the network adapter. As the use of such networks grows, users will demand secure yet efficient, low-latency communications. Intruders’ detection is one of the key techniques that can be used to protect a network against outsiders. Many Intrusion Detection Systems (IDSs) have been designed for wired networks. Unfortunately, most of these IDSs do not give the expected results when used with wireless networks and are especially poor at addressing the Media Access Control (MAC) layer problem. In this sheet, we present the design and implementation of an IDS tool that is chosen for WLANs and addresses misbehavior at the MAC layer properly. Keywords: IDS, WLAN, MAC layer, Misbehavior


Author(s):  
Achmad Hambali Hambali ◽  
Siti Nurmiati

Flooding Data adalah jenis serangan Denial of Service (DOS) di mana data flooding menyerangkomputer atau server di jaringan lokal atau internet dengan menghabiskan sumber daya yang dimiliki olehkomputer hingga komputer tidak dapat menjalankan fungsinya dengan baik sehingga tidak secara langsungmencegah pengguna lain dari mendapatkan akses ke layanan dari komputer yang diserang. Penelitian ini untukmenganalisis indikasi serangan dan menjaga keamanan sistem dari ancaman banjir data. Untuk itu kitamembutuhkan alat deteksi yang dapat mengenali keberadaan serangan flooding data dengan mengetuk paketdata dan kemudian membandingkannya dengan aturan basis data IDS (berisi paket serangan tanda tangan).Mesin IDS akan membaca peringatan dari IDS (seperti jenis serangan dan penyadap alamat IP) untukmeminimalkan data serangan flooding terhadap LAN (Local Area Network) dan server. Metode pengujian dataserangan banjir dengan menggunakan metode pengujian penetrasi. Tiga sampel uji adalah serangan floodingdata terhadap ICMP, UDP dan protokol TCP menggunakan aplikasi Flooding data. Hasil yang diperolehketika menguji data serangan flooding di mana sensor sensor deteksi dapat mendeteksi semua serangan dansemua sampel serangan dapat dicegah atau disaring menggunakan sistem keamanan jaringan berbasisfirewall.


2013 ◽  
Vol 16 (6) ◽  
pp. 678-688 ◽  
Author(s):  
Jun-Ho Huh ◽  
Myeong-Ho Hong ◽  
JeongMin Lee ◽  
Kyungryong Seo

Energies ◽  
2021 ◽  
Vol 14 (15) ◽  
pp. 4454
Author(s):  
Tong Liu ◽  
Li Liu ◽  
Yufang He ◽  
Mengfei Sun ◽  
Jian Liu ◽  
...  

Solar energy has been extensively used in industry and everyday life. A more suitable solar collector orientation can increase its utilization. Many studies have explored the best orientation of the solar collector installation from the perspective of data analysis and local-area cases. Investigating the optimal tilt angle of a collector from the perspective of data analysis, or guiding the angle of solar collector installation, requires an a priori theoretical tilt angle as a support. However, none of the current theoretical studies have taken the real motion of the Sun into account. Furthermore, a complete set of theoretical optimal tilt angles for solar energy is necessary for worldwide locations. Therefore, from the view of astronomical mechanics, considering the true orbit of the Sun, a mathematical model that is universal across the globe is proposed: the Kepler motion model is constructed from the solar orbit and transformed into the local Earth coordinate system. After that, the calculation of the optimal tilt angle solution is given. Finally, several examples are shown to demonstrate the variation of the optimal solar angle with month and latitude. The results show that for daily fixed solar collectors, the altitude angle of the collector should be about 6° above the noon solar altitude angle in summer and 6° lower in winter. For annual fixed collectors, the tilt angle should be slightly higher than the latitude. In summary, this study demonstrates that when a location is specified, this model can be used to calculate the theoretical optimum tilt angle of solar collectors for that position.


Author(s):  
Hamizan Suhaimi ◽  
Saiful Izwan Suliman ◽  
Afdallyna Fathiyah Harun ◽  
Roslina Mohamad ◽  
Yuslinda Wati Mohamad Yusof ◽  
...  

<span>Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In Network Intrusion Detection System (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of Genetic Algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   </span>


Sign in / Sign up

Export Citation Format

Share Document