scholarly journals Statistical Deadband: A Novel Approach for Event-Based Data Reporting

Informatics ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 5
Author(s):  
Nunzio Torrisi

Deadband algorithms are implemented inside industrial gateways to reduce the volume of data sent across different networks. By tuning the deadband sampling resolution by a preset interval Δ , it is possible to estimate the balance between the traffic rates of networks connected by industrial SCADA gateways. This work describes the design and implementation of two original deadband algorithms based on statistical concepts derived by John Bollinger in his financial technical analysis. The statistical algorithms proposed do not require the setup of a preset interval—this is required by non-statistical algorithms. All algorithms were evaluated and compared by computing the effectiveness and fidelity over a public collection of random pseudo-periodic signals. The overall performance measured in the simulations showed better results, in terms of effectiveness and fidelity, for the statistical algorithms, while the measured computing resources were not as efficient as for the non-statistical deadband algorithms.

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Matthias Suter ◽  
Olivier Huguenin-Elie ◽  
Andreas Lüscher

AbstractAssessing the overall performance of ecosystems requires a quantitative evaluation of multifunctionality. We investigated plant species diversity effects on individual functions and overall multifunctionality in a grassland experiment with sown monocultures and mixtures comprising four key grass and legume species. Nitrogen fertilisation rates were 50, 150, and 450 kg N ha−1 yr−1 (N50, N150, N450). Ten functions were measured representing forage production, N cycling, and forage quality, all being related to either productivity or environmental footprint. Multifunctionality was analysed by a novel approach using the mean log response ratio across functions. Over three experimental years, mixture effects benefited all forage production and N cycling functions, while sustaining high forage quality. Thus, mixture effects did not provoke any trade-off among the analysed functions. High N fertilisation rates generally diminished mixture benefits. Multifunctionality of four-species mixtures was considerably enhanced, and mixture overall performance was up to 1.9 (N50), 1.8 (N150), and 1.6 times (N450) higher than in averaged monocultures. Multifunctionality of four-species mixtures at N50 was at least as high as in grass monocultures at N450. Sown grass–legume mixtures combining few complementary species at low to moderate N fertilisation sustain high multifunctionality and are a ‘ready-to-use’ option for the sustainable intensification of agriculture.


Axioms ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 36
Author(s):  
Norma P. Rodríguez-Cándido ◽  
Rafael A. Espin-Andrade ◽  
Efrain Solares ◽  
Witold Pedrycz

This work presents a novel approach to prediction of financial asset prices. Its main contribution is the combination of compensatory fuzzy logic and the classical technical analysis to build an efficient prediction model. The interpretability properties of the model allow its users to incorporate and consider virtually any set of rules from technical analysis, in addition to the investors’ knowledge related to the actual market conditions. This knowledge can be incorporated into the model in the form of subjective assessments made by investors. Such assessments can be obtained, for example, from the graphical analysis commonly performed by traders. The effectiveness of the model was assessed through its systematic application in the stock and cryptocurrency markets. From the results, we conclude that when the model shows a high degree of recommendation, the actual financial assets show high effectiveness.


2002 ◽  
Vol 17 (4) ◽  
pp. 359-388 ◽  
Author(s):  
LUDGER FIEGE ◽  
GERO MÜHL ◽  
FELIX C. GÄRTNER

Event-based systems are developed and used to integrate components in loosely coupled systems. Research and product development have focused so far on efficiency issues but neglected methodological support to build such systems. In this article, the modular design and implementation of an event system is presented which supports scopes and event mappings, two new and powerful structuring methods that facilitate engineering and coordination of components in event-based systems. We give a formal specification of scopes and event mappings within a trace-based formalism adapted from temporal logic. This is complemented by a comprehensive introduction to the event-based style, its benefits and requirements.


2016 ◽  
Vol 6 (2) ◽  
pp. 1-23 ◽  
Author(s):  
Surbhi Bhatia ◽  
Manisha Sharma ◽  
Komal Kumar Bhatia

Due to the sudden and explosive increase in web technologies, huge quantity of user generated content is available online. The experiences of people and their opinions play an important role in the decision making process. Although facts provide the ease of searching information on a topic but retrieving opinions is still a crucial task. Many studies on opinion mining have to be undertaken efficiently in order to extract constructive opinionated information from these reviews. The present work focuses on the design and implementation of an Opinion Crawler which downloads the opinions from various sites thereby, ignoring rest of the web. Besides, it also detects web pages which frequently undergo updation by calculating the timestamp for its revisit in order to extract relevant opinions. The performance of the Opinion Crawler is justified by taking real data sets that prove to be much more accurate in terms of precision and recall quality attributes.


Measurement ◽  
2020 ◽  
Vol 165 ◽  
pp. 108192 ◽  
Author(s):  
Lenin Alexander Bulla-Cruz ◽  
Aliaksei Laureshyn ◽  
Liliana Lyons

2007 ◽  
Vol 28 (2) ◽  
pp. 302-311 ◽  
Author(s):  
Xianren Wu ◽  
Tomas Drabek ◽  
Samuel A Tisherman ◽  
Jeremy Henchir ◽  
S William Stezoski ◽  
...  

We have used a rapid induction of profound hypothermia (> 10°C) with delayed resuscitation using cardiopulmonary bypass (CPB) as a novel approach for resuscitation from exsanguination cardiac arrest (ExCA). We have defined this approach as emergency preservation and resuscitation (EPR). We observed that 2 h but not 3 h of preservation could be achieved with favorable outcome using ice-cold normal saline flush to induce profound hypothermia. We tested the hypothesis that adding energy substrates to saline during induction of EPR would allow intact recovery after 3 h CA. Dogs underwent rapid ExCA. Two minutes after CA, EPR was induced with arterial ice-cold flush. Four treatments ( n = 6/group) were defined by a flush solution with or without 2.5% glucose (G + or G–) and with either oxygen or nitrogen (O + or O–) rapidly targeting tympanic temperature of 8°C. At 3 h after CA onset, delayed resuscitation was initiated with CPB, followed by intensive care to 72 h. At 72 h, all dogs in the O + G + group regained consciousness, and the group had better neurological deficit scores and overall performance categories than the O—groups (both P < 0.05). In the O + G—group, four of the six dogs regained consciousness. All but one dog in the O—groups remained comatose. Brain histopathology in the O—G + was worse than the other three groups ( P < 0.05). We conclude that EPR induced with a flush solution containing oxygen and glucose allowed satisfactory recovery of neurological function after a 3 h of CA, suggesting benefit from substrate delivery during induction or maintenance of a profound hypothermic CA.


2011 ◽  
Vol 403-408 ◽  
pp. 2134-2137
Author(s):  
Lian Long Yan ◽  
Sheng Hua Xu

This paper first analyzed embedded protocol converter system, then the system involved in the TCP/IP data structure ,data reporting format and frame format of CAN protocol was designed, protocol conversion was achieved by defining network interface data structure.


With the presence of computer and internet, a developing variety of hoodlums are utilizing the web to spread a wide extend of illicit materials and wrong information universally in mysterious manner, making criminal personality following troublesome in the cybercrime examination handle. The virtual world provides criminals with an anonymous environment to conduct malicious activities such as malware, sending random messages, spamming, stealing intellectual property and sending ransom e-mails. All of these activities are text in somehow. Therefore, there is a need for a tool in order to identify the author or creator of this criminality by analyzing the text. Text-based Authorship Attribution techniques are used to identify the most possible author from a bunch of potential suspects of text. In this paper, the novel approach is presented for authorship attribution in English text using ASCII based processing approach Using this ASCII based method for authorship attribution help us to obtain better result in terms of accuracy and computational efficiency. The result is based on the text which is posted on social media considering real world data set.


2021 ◽  
Vol 13 (12) ◽  
pp. 299
Author(s):  
Guma Ali ◽  
Mussa Ally Dida ◽  
Anael Elikana Sam

With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.


Sign in / Sign up

Export Citation Format

Share Document