We consider the problem of calibrating range measurements of a Light Detection and Ranging (lidar) sensor that is dealing with the sensor nonlinearity and heteroskedastic, range-dependent, measurement error. We solved the calibration problem without using additional hardware, but rather exploiting assumptions on the environment surrounding the sensor during the calibration procedure. More specifically we consider the assumption of calibrating the sensor by placing it in an environment so that its measurements lie in a 2D plane that is parallel to the ground. Then, its measurements come from fixed objects that develop orthogonally w.r.t. the ground, so that they may be considered as fixed points in an inertial reference frame. Moreover, we consider the intuition that moving the distance sensor within this environment implies that its measurements should be such that the relative distances and angles among the fixed points above remain the same. We thus exploit this intuition to cast the sensor calibration problem as making its measurements comply with this assumption that “fixed features shall have fixed relative distances and angles”. The resulting calibration procedure does thus not need to use additional (typically expensive) equipment, nor deploy special hardware. As for the proposed estimation strategies, from a mathematical perspective we consider models that lead to analytically solvable equations, so to enable deployment in embedded systems. Besides proposing the estimators we moreover analyze their statistical performance both in simulation and with field tests. We report the dependency of the MSE performance of the calibration procedure as a function of the sensor noise levels, and observe that in field tests the approach can lead to a tenfold improvement in the accuracy of the raw measurements.
Ultrasonic extraction is an inexpensive, simple and efficient alternative to conventional extraction techniques, as compared with other novel extraction techniques such as microwave-assisted extraction & supercritical fluid extraction techniques, the ultrasound apparatus is cheaper and its operation is easier. Ultrasound assisted extraction has risen rapidly in the latest decade, and for most applications it has proven to be effective compared to traditional extraction techniques. In this paper, a method of ultrasonic-assisted extraction was used to extract Inulin from tubers of Jerusalem artichoke, which have been reported to have several medicinal properties and uses. Inulin is a storage carbohydrate found in many plants especially
... Show MoreThis study aims to find the effect of water-cement ratio on the compressive strength of concrete by using ultrasonic pulse velocity test (UPVT). Over 230 standard cube specimens were used in this study, with dimensions of 150mm, and concrete cubes were cured in water at 20 °C. Also, the specimens used in the study were made of concrete with varied water-cement ratio contents from 0.48 to 0.59. The specimens were taken from Diyarbakir-Turkey concrete centers and tested at the structure and material science lab, civil engineering, faculty of engineering from Dicle University. The UPV measurement and compressive strength tests were carried out at the concrete age of 28 days. Their UPV and compressive strength ranged
... Show MoreThis paper has dealing with experimentally works which includes properties of materials and testing program. The testing program includes rotine characterization tests, chemical, and physical tests for samples of gypseous soil. Samples of disturbed and undisturbed soil was obtained of seven different locations of Salah-Aldeen province. The unified classification system was adopted of study region. Except sample 7, soil categorization (as poorly graded sand) was a good graded sand soil. Samples had non plasticity rate (NP). The results of laboratory tests (by using Arc-Map GIS program) were enhanced by spatial interpolation mapping utilizing Inverse Distance Weighted Scheme.
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
This study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse
... Show MoreThe railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show More