Using data mining and numerical simulations for on-line monitoring of long span bridges

2015 ◽  
pp. 915-922
1998 ◽  
Vol 11 (5-6) ◽  
pp. 331-338 ◽  
Author(s):  
Robert Milne ◽  
Mike Drummond ◽  
Patrick Renoux
Keyword(s):  
On Line ◽  

In today era credit card are extensively used for day to day business as well as other transactions. Ascent within the variety of transactions through master card has junction rectifier to rise in the dishonest activities. In trendy day's fraud is one in every of the most important concern within the monetary loses not solely to the merchants however additionally to the individual purchasers. Data processing had competed a commanding role within the detection of credit card in on-line group action. Our aim is to first of all establish the categories of the fraud secondly, the techniques like K-nearest neighbor, Hidden Markov model, SVM, logistic regression, decision tree and neural network. So fraud detection systems became essential for the banks to attenuate their loses. In this paper we have research about the various detecting techniques to identify and detect the fraud through varied techniques of data mining


2015 ◽  
Vol 771 ◽  
pp. 16-35 ◽  
Author(s):  
Shaopeng Li ◽  
Mingshui Li ◽  
Haili Liao

The three-dimensional effects of turbulence cannot be neglected when the spanwise wavelength of the incident turbulence is not effectively infinite with respect to the chord, which may invalidate the strip assumption. Based on three-dimensional theory, a general approach, expressed in terms of a two-dimensional Fourier transform of the correlation of the buffeting force, is proposed to identify the two-wavenumber spectrum and aerodynamic admittance of the lift force on an aerofoil. It is essential that the approach presented can be validated in wind tunnel experiments. The coherence of the lift force on an aerofoil in grid-generated turbulence is obtained by simultaneous measurements of unsteady surface pressures around several chordwise strips on a stiff sectional model, which controls the accuracy of results. For the purpose of the Fourier transform, three empirical coherence models of the lift force are presented to fit the experimental results. Compared with the linearized theory, the two-wavenumber aerodynamic admittance can describe well the pressure distribution and the pattern of energy transition in an isotropic turbulence field. Thus, the failure mechanism of the traditional strip assumption can be demonstrated explicitly. In addition, the results obtained also validate the theory proposed by Graham (Aeronaut. Q., vol. 21, 1970, pp. 182–198; Aeronaut. Q., vol. 22, 1971, pp. 83–100). The present approach can be extended to study the three-dimensionality of the buffeting force on line-like structures with arbitrary cross-configurations, such as long-span bridges and high-rise buildings.


2015 ◽  
Vol 76 (12) ◽  
Author(s):  
Mohd Afizi Mohd Shukran ◽  
Kamaruzaman Maskat

Network Intrusion Detection is to detect malicious attacks to the networks for different uses from military to enterprise. Currently available approaches either rely on the known network attacks or have high proportion of normal network traffics that were erroneously reported as anomalous traffics. The aim of this paper is to develop an efficient algorithm for intrusion detection without prior knowledge of network attacks. Uniquely, our approach will integrate a newly developed data mining technique for data feature classification with techniques commonly used for human detection. The key idea is to achieve on-line and automated learning of new attacks for precise and real-time intrusion detection.


The existing data sharing systems relates with the on-line social networks (OSNs) suggest encoding of information before sharing, the multiparty get to the executives of scrambled information has turned into a troublesome issue. A safe information sharing subject proposed in OSNs upheld figure content approach trait based and Elliptic Curve Cryptography algorithmic principle re-encryption and mystery sharing. The work relates the gatekeeper clients' delicate information grants clients to redo get to approaches of their information thus source scrambled information to the OSNs administration provider. The proposed technique displays a multiparty get to the executive’s model that enables the communicator to refresh the entrance strategy of figure content. The characteristics fulfill the common access strategy. The work needs a fractional mystery composing development inside which the calculation overhead of client is essentially diminished by strengthening the vast majority of the mystery composing activities to the OSNs administration provider. Moreover, the check capacity on the outcomes originated from the OSNs administration provider to guarantee the rightness of fractional decoded figure content. The present subject partner affordable properties disavowal philosophy that accomplishes each forward and in reverse mystery. The insurance and execution examination results demonstrate that the arranged subject is secure and efficient in OSNs.


Author(s):  
Javier García-Tobar

This research has focused on a radon measurement campaign that was carried out in two dwellings in a residential building located in Madrid. A new methodology has been used in this field, such as the use of cubes based on On-Line Analytical Processing in SQL Server Analysis Services. The application of this methodology can be of particular interest in analysing thousands of radon measurements and complementary variables, which are easily obtained in any radon measurement campaign.


PCI Journal ◽  
1980 ◽  
Vol 25 (4) ◽  
pp. 48-58
Author(s):  
Felix Kulka
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document