scholarly journals Using CME and FCME Algorithms for the Task of Detecting Human Steps

2021 ◽  
Vol 7 (8) ◽  
pp. 2001-2008
Author(s):  
Yevhen Vistyzenko ◽  

Currently, global trends in the development of perimeter security technology lead to the general miniaturization of devices and systems and the increase of their autonomy. The primary trend in developing these systems is the maximum processing and classification of signals by built-in tools. The article presents the study results on the possibility of using blind algorithms to calculate the level of operation of the threshold detector CME and FCME in detecting human steps in seismic perimeter security detectors using low-power computing modules. The algorithms were tested on actual data recorded during the experiments. As a result of applying algorithms for the seismic signal envelope, the human steps of the probability of false positives for the CME and FCME algorithms were 23% and 10%, respectively. Neutralizing the signal trend allowed obtaining values of false alarms of 16% for the CME algorithm and 7% for the FCME algorithm, and normalization of the signal amplitude within one analysis interval allowed obtaining the probability of false alarms at 0% for both algorithms. The obtained results give complete information when choosing the type of algorithm depending on the input data. In detecting seismic data by an autonomous sensor, it is most appropriate to use the SME algorithm with pre-normalization of the signal amplitude due to less computational complexity.

2011 ◽  
Vol 52-54 ◽  
pp. 713-716
Author(s):  
Xiao Ying Gan ◽  
Bin Liu

Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.


Author(s):  
I.F. Lozovskiy

The use of broadband souding signals in radars, which has become real in recent years, leads to a significant reduction in the size of resolution elements in range and, accordingly, in the size of the window in which the training sample is formed, which is used to adapt the detection threshold in signal detection algorithms with a constant level of false alarms. In existing radars, such a window would lead to huge losses. The purpose of the work was to study the most rational options for constructing detectors with a constant level of false alarms in radars with broadband sounding signals. The problem was solved for the Rayleigh distribution of the envelope of the noise and a number of non-Rayleigh laws — Weibull and the lognormal, the appearance of which is associated with a decrease in the number of reflecting elements in the resolution volume. For Rayleigh interference, an algorithm is proposed with a multi-channel in range incoherent signal amplitude storage and normalization to the larger of the two estimates of the interference power in the range segments. The detection threshold in it adapts not only to the interference power, but also to the magnitude of the «power jump» in range, which allows reducing the number of false alarms during sudden changes in the interference power – the increase in the probability of false alarms did not exceed one order of magnitude. In this algorithm, there is a certain increase in losses associated with incoherent accumulation of signals reflected from target elements, and losses can be reduced by certain increasing the size of the distance segments that make up the window. Algorithms for detecting broadband signals against interference with non-Rayleigh laws of distribution of the envelope – Weibull and lognormal, based on the addition of the algorithm for detecting signals by non-linear transformation of sample counts into counts with a Rayleigh distribution, are studied. The structure of the detection algorithm remains unchanged in practice. The options for detectors of narrowband and broadband signals are considered. It was found that, in contrast to algorithms designed for the Rayleigh distribution, these algorithms provide a stable level of false alarms regardless of the values of the parameters of non-Rayleigh interference. To reduce losses due to interference with the distribution of amplitudes according to the Rayleigh law, detectors consisting of two channels are used, in which one of the channels is tuned for interference with the Rayleigh distribution, and the other for lognormal or Weibull interference. Channels are switched according to special distribution type recognition algorithms. In such detectors, however, there is a certain increase in the probability of false alarms in a rather narrow range of non-Rayleigh interference parameters, where their distribution approaches the Rayleigh distribution. It is shown that when using broadband signals, there is a noticeable decrease in detection losses in non-Rayleigh noise due to lower detection thresholds for in range signal amplitudes incoherent storage.


CosmoGov ◽  
2017 ◽  
Vol 3 (2) ◽  
pp. 148
Author(s):  
Muliadi Anangkota

The system of government that practiced in many countries today tend to experience the changes. Some countries have special characteristics of its own in the event of the existence of the country. Characteristic of the country one is to have a system of government. This article is the result of the study the theoretical concept about the classification system of government that until now still practiced in various countries. Study method using the methods of the study of literature with descriptive approach. Study results showed that in the classification of the system of government is currently consists of the parliamentary system, presidential, mixture and a referendum. The system of government to be one of the determining factors in the sustainability of the statehood. On the other the government will run effectively and normal where the old system that is selected and used in accordance with the social political conditions character state.


Author(s):  
S. Mirzaee ◽  
M. Motagh ◽  
H. Arefi ◽  
M. Nooryazdan

Due to its special imaging characteristics, Synthetic Aperture Radar (SAR) has become an important source of information for a variety of remote sensing applications dealing with environmental changes. SAR images contain information about both phase and intensity in different polarization modes, making them sensitive to geometrical structure and physical properties of the targets such as dielectric and plant water content. In this study we investigate multi temporal changes occurring to different crop types due to phenological changes using high-resolution TerraSAR-X imagers. The dataset includes 17 dual-polarimetry TSX data acquired from June 2012 to August 2013 in Lorestan province, Iran. Several features are extracted from polarized data and classified using support vector machine (SVM) classifier. Training samples and different features employed in classification are also assessed in the study. Results show a satisfactory accuracy for classification which is about 0.91 in kappa coefficient.


2020 ◽  
Vol 11 (31) ◽  
pp. 550-558
Author(s):  
Evgenia E. Abrosimova

The aim of the article is to address the socialization processes of modern children and adolescents, in the context of the characteristics of the information society and the constant presence of the Internet in their lives. A new but emerging phenomenon is emerging, video blogging, which is part of Internet socialization. The main characteristic of this phenomenon is the potential opportunity that children and adolescents have to create an independent video blogging process, which affects the socialization process in general. The empirical data were collected using quantitative and qualitative sociological methods: survey and interview with children. The combination of these methods provides more complete information to understand the problem. The main result of this study is the evidence that around 30% of children and adolescents are not only viewers of videoblogs, they not only consume the information disseminated by this part of the global network, but also become independent authors of videoblogs. The study results reflect the fact that many children's authors try to imitate their favorite video bloggers. Young Internet users perceive the process of creating a video blog as a certain type of creativity.


Author(s):  
Nadezhda Stalyanova ◽  

The article examines the manifestations of verbal aggression among students and draws attention to one aspect of it – the insulting words as a component of aggressive human behavior. The study is based on surveys conducted in 19 schools across Bulgaria. A classification of offensive vocabulary has been made. The study registers global trends in modern society, asking questions to psychologists, teachers, sociologists, namely – can aggression be prevented, transformed into a constructive type of behavior, whether the individual could affect the hostile environment etc.


2020 ◽  
Vol 75 (5) ◽  
pp. 1091-1098 ◽  
Author(s):  
S Rogers Van Katwyk ◽  
J M Grimshaw ◽  
M Nkangu ◽  
M Mendelson ◽  
M Taljaard ◽  
...  

Abstract Background Countries are currently seeking evidence-informed policy options to address antimicrobial resistance (AMR). While rigorous evaluations of AMR interventions are the ideal, they are far from the current reality. Additionally, poor reporting and documentation of AMR interventions impede efforts to use evidence to inform future evaluations and policy interventions. Objectives To critically evaluate reporting quality gaps in AMR intervention research. Methods To evaluate the reporting quality of studies, we conducted a descriptive synthesis and comparative analysis of studies that were included in a recent systematic review of government policy interventions aiming to reduce human antimicrobial use. Reporting quality was assessed using the SQUIRE 2.0 checklist of 18 items for reporting system-level interventions to improve healthcare. Two reviewers independently applied the checklist to 66 studies identified in the systematic review. Results None of the studies included complete information on all 18 SQUIRE items (median score = 10, IQR = 8–11). Reporting quality varied across SQUIRE items, with 3% to 100% of studies reporting the recommended information for each SQUIRE item. Only 20% of studies reported the elements of the intervention in sufficient detail for replication and only 24% reported the mechanism through which the intervention was expected to work. Conclusions Gaps in the reporting of impact evaluations pose challenges for interpreting and replicating study results. Failure to improve reporting practice of policy evaluations is likely to impede efforts to tackle the growing health, social and economic threats posed by AMR.


2019 ◽  
Vol 1 (1) ◽  
pp. 12-22 ◽  
Author(s):  
Michel Planat ◽  
Raymond Aschheim ◽  
Marcelo M. Amaral ◽  
Klee Irwin

The fundamental group π 1 ( L ) of a knot or link L may be used to generate magic states appropriate for performing universal quantum computation and simultaneously for retrieving complete information about the processed quantum states. In this paper, one defines braids whose closure is the L of such a quantum computer model and computes their braid-induced Seifert surfaces and the corresponding Alexander polynomial. In particular, some d-fold coverings of the trefoil knot, with d = 3 , 4, 6, or 12, define appropriate links L, and the latter two cases connect to the Dynkin diagrams of E 6 and D 4 , respectively. In this new context, one finds that this correspondence continues with Kodaira’s classification of elliptic singular fibers. The Seifert fibered toroidal manifold Σ ′ , at the boundary of the singular fiber E 8 ˜ , allows possible models of quantum computing.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6491
Author(s):  
Le Zhang ◽  
Jeyan Thiyagalingam ◽  
Anke Xue ◽  
Shuwen Xu

Classification of clutter, especially in the context of shore based radars, plays a crucial role in several applications. However, the task of distinguishing and classifying the sea clutter from land clutter has been historically performed using clutter models and/or coastal maps. In this paper, we propose two machine learning, particularly neural network, based approaches for sea-land clutter separation, namely the regularized randomized neural network (RRNN) and the kernel ridge regression neural network (KRR). We use a number of features, such as energy variation, discrete signal amplitude change frequency, autocorrelation performance, and other statistical characteristics of the respective clutter distributions, to improve the performance of the classification. Our evaluation based on a unique mixed dataset, which is comprised of partially synthetic clutter data for land and real clutter data from sea, offers improved classification accuracy. More specifically, the RRNN and KRR methods offer 98.50% and 98.75% accuracy, outperforming the conventional support vector machine and extreme learning based solutions.


Author(s):  
Raed Latif Ugla ◽  
Mohamad Jafre Zainol Abidin

This study was aimed at exploring apology strategies of English used by Iraqi EFL students, apology strategies in Iraqi Arabic and the pragmatic strategies of Iraqi EFL students in relation to the use of apology as a speech act. The data analyzed in this study were collected in Al-Yarmouk University College and University of Diyala. The study was mixed method in nature using a questionnaire and an interview adapted from previous studies. The quantitative data was obtained from fifty-five Iraqi EFL students using Discourse Completion Task Questionnaires (DCTQ) while the qualitative data obtained from individual interviews carried out with twelve Iraqi EFL students. The results were showed different kinds of apology strategies used by Iraqi EFL students. A new classification of apology strategies was provided in this study. Results of the study showed that Iraqi EFL students used a variation of apology strategies, they were well aware of how to use adequate apology forms to meet the requirements of specific situations and relationships, and they felt the need for explaining and avoiding interpretation of their response as an apology.


Sign in / Sign up

Export Citation Format

Share Document