scholarly journals Mathematical tools and software for the distributed geophone network of Prognoz-ADS geomechanical monitoring system

Author(s):  
Aleksandr V. Konstantinov ◽  
◽  
Maksim I. Rasskazov ◽  
Denis I. Tsoi ◽  
◽  
...  

Introduction. The article considers the problems of the present-day algorithm of acoustic emission events location in Prognoz-ADS geomechanical monitoring system. The ways of solving the flaws in the applied algorithm have been proposed with the account of the specified requirements. Research aim is to propose certain solutions aimed at achieving higher accuracy of seismoacoustic events coordinates calculation; to solve the flat antenna problem and get the opportunity of assessing the efficiency of separate observing network elements; develop the structure of a new location algorithm and calculate its preliminary complexity. Methodology. It is proposed to correct the problems of the existing algorithm by constructing the velocity map of the controlled object and assessing the efficiency of seismoacoustic receivers and data on the observing network sensitivity in various sections of the rock mass. Results. The article provides logical structure of the developed algorithm with complexity O(n). It is proposed to solve the flat antenna problem by using data on seismic receivers complex sensitivity. Certain media of collecting information on the observing network state and signal propagation velocities at the controlled object have been introduced. Summary. The designed algorithm provides for multiple parameters variation, many of them are not taken into account in the existing location method of Prognoz-ADS system. The indicated characteristics selection and the efficient use of the calculating tool’s hardware resources will make it possible to obtain a more accurate and universal location algorithm.

2014 ◽  
Vol 26 (2) ◽  
pp. 598-614 ◽  
Author(s):  
Julia Poirier ◽  
GY Zou ◽  
John Koval

Cluster randomization trials, in which intact social units are randomized to different interventions, have become popular in the last 25 years. Outcomes from these trials in many cases are positively skewed, following approximately lognormal distributions. When inference is focused on the difference between treatment arm arithmetic means, existent confidence interval procedures either make restricting assumptions or are complex to implement. We approach this problem by assuming log-transformed outcomes from each treatment arm follow a one-way random effects model. The treatment arm means are functions of multiple parameters for which separate confidence intervals are readily available, suggesting that the method of variance estimates recovery may be applied to obtain closed-form confidence intervals. A simulation study showed that this simple approach performs well in small sample sizes in terms of empirical coverage, relatively balanced tail errors, and interval widths as compared to existing methods. The methods are illustrated using data arising from a cluster randomization trial investigating a critical pathway for the treatment of community acquired pneumonia.


2018 ◽  
Vol 14 (06) ◽  
pp. 191
Author(s):  
Chao Huang ◽  
Yuang Mao

<p class="0abstract"><span lang="EN-US">T</span><span lang="EN-US">o further study the basic principle and localization process of DV-Hop location algorithm, the location error reason of traditional location algorithm caused by the minimum hop number </span><span lang="EN-US">wa</span><span lang="EN-US">s analyzed and demonstrated in detail.</span><span lang="EN-US"> The RSSI ranging technology was introduced to modify the minimum hops stage, and the minimum hop number was improved by the DV-Hop algorithm. </span><span lang="EN-US">For the location error caused by the average hop distance, the hop distance of the original algorithm </span><span lang="EN-US">wa</span><span lang="EN-US">s optimized. The improved location algorithm of DV-Hop average hop distance </span><span lang="EN-US">wa</span><span lang="EN-US">s used to modify the average range calculation by introducing the proportion of beacon nodes and the optimal threshold value. The optimization algorithm of the two different stages </span><span lang="EN-US">wa</span><span lang="EN-US">s combined into an improved location algorithm based on hop distance optimization, and the advantages of the two algorithms </span><span lang="EN-US">we</span><span lang="EN-US">re taken into account.</span><span lang="EN-US">Finally, the traditional DV-Hop location algorithm and the three improved location algorithms </span><span lang="EN-US">we</span><span lang="EN-US">re simulated and analyzed by beacon node ratio and node communication radius with multi angle. The experimental results show</span><span lang="EN-US">ed</span><span lang="EN-US"> that the improved algorithm </span><span lang="EN-US">wa</span><span lang="EN-US">s better than the original algorithm in the positioning stability and positioning accuracy.</span></p>


2018 ◽  
Vol 48 (3) ◽  
pp. 157-162
Author(s):  
L. Y. LI ◽  
J. YANG ◽  
Y. LEI ◽  
K. H. XIONG ◽  
W. H. CHEN ◽  
...  

Based on large data analysis method and automatic detection technology, this paper designs a test system, which can realize intelligent online monitoring of seawater. Based on the theory of large data, the data preprocessing method of large data is applied by relying on the information transmitted by integrated sensors. Using data cleaning, data integration, data conversion and data reduction technology, a large number of data collected by marine monitoring devices are processed accurately. An automatic seawater monitoring system is designed on a software platform. Finally, combined with the experimental data of a certain sea area, the test results are analyzed, which proves the feasibility and effectiveness of the designed seawater online monitoring system. It has achieved the effect of seawater environmental analysis and early warning.


Author(s):  
MariusVasile Ursachianu ◽  
Ovidiu Bejenaru ◽  
Catalin Lazarescu ◽  
Alexandru Salceanu ◽  
Marius Paulet

Author(s):  
Murizah Kassim, Muhammad Ahlami Ashraf Roslan

Analytics provides insight to people based on the analytics of past usage by using techniques such as statistics, data mining, machine learning and artificial intelligence. Lack of monitoring system of browsing causes low engagements that reduce the growth of certain businesses caused by unnecessary browsing for students learning time. This paper presents an analysis on browsing behavior that classifies browsed words followed their ethical word-groups browsing. An Analytic platform is created as a monitoring system of browsing behavior. Data mining, indexing and classification method are used in this research as data is the essential key of creating a predictive model and four types of ethical groups have been filtered based on the browsing behaviors. The browsed words are categorized into four types of browsing called queries, applications, social media, Campus-related sites. The research method uses software tools and data mining process on the browsing data and analytics is presented on the development of the dashboard mainly using the R programming language. Few unethical words using the indexing method are generated in analytic graphs based on the type of browsing versus time. Data collected from the browsing behaviors of students’analysis taken from browsing database of personal computer and laboratory computer in the campus network. The result shows that othercategories are the highest categories which reached79.6% for personals' computer browsing compared to72.4% browsing at the laboratory computers. It is identified that about 21% of the browsing behavior was filtered during the data mined processed. The other category is still on the research portfolio where these libraries must be filtered in detail to identify whether they are learning or non-learning activities. This research is significant in that helps to increase the effectiveness of suggestions applications, optimize the internet usage by blocking unnecessary words or webpages, and even campus guide systems by monitoring the surrounding browsing behavior of the students’ usages of the campus network computer labs.


Sign in / Sign up

Export Citation Format

Share Document