Search results for: cohesive devices
2274 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 3172273 The Examination of Parents’ Perceptions and Motivations Regarding Type 1 Diabetes Management Technologies
Authors: Maria Dora Horvath, Norbert Buzas, Zsanett Tesch
Abstract:
Diabetes management poses many unique challenges for children and their parents. The use of a diabetes management device should not be one of these challenges as the purpose of these devices is to make the management more convenient. The objective of our study was to examine how demographical, psychological and diabetes-related factors determine the choices parents make regarding their child’s diabetes management technologies and how they perceive advanced devices. We conducted the study using an online questionnaire with 318 parents (mostly mothers). The questions of the survey were about demographical, diabetes-related and psychological factors (diabetes management problems, diabetes management competence). In addition, we asked the parents opinions about advanced diabetes management devices. We expanded our data with semi-structured in-depth interviews. 61 % of the participants Self-Monitored Blood Glucose (SMBG), and 39 % used a Continuous Glucose Monitoring System (CGM). Considering insulin administration, 58 % used Multiple Daily Insulin Injections (MDII) and 42 % used Continuous Subcutaneous Insulin Infusion (CSII). Parents who used diverse combinations of diabetes management devices showed significant differences in age (parents’ and child’s), the monthly cost of diabetes, the duration of diabetes, the highest level of education and average monthly household income. CGM users perceived diabetes management problems significantly more severe than SMBG users and CSII users felt significantly more competent in diabetes management than MDII users. Avoiding CGM use due to lack of financial resources was determined by diagnosis duration. While avoiding its use by the cause of the child rejecting, it was determined by the child’s age and diabetes competence. Using MDII instead of CSII because of the child’s rejection was determined by the monthly cost of diabetes and child’s age. We conducted a complex empirical study in which we examined perceptions and experiences of advanced and less advanced diabetes management technologies comprehensively. Our study highlights the factors that fundamentally influence parents’ motivations and choices about diabetes management technologies. These results could contribute to developing diabetes management technologies more suitable for children living with type 1 diabetes and their parents.Keywords: advanced diabetes management technologies, children living with type 1 diabetes, diabetes management, motivation, parents
Procedia PDF Downloads 1352272 Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks
Authors: Jayesh M. Patel, Bharat P. Modi
Abstract:
The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity.Keywords: cellular, Wi-Fi, mobile, smart phone
Procedia PDF Downloads 3652271 Fracture Mechanics Modeling of a Shear-Cracked RC Beams Shear-Strengthened with FRP Sheets
Authors: Shahriar Shahbazpanahi, Alaleh Kamgar
Abstract:
So far, the conventional experimental and theoretical analysis in fracture mechanics have been applied to study concrete flexural- cracked beams, which are strengthened using fiber reinforced polymer (FRP) composite sheets. However, there is still little knowledge about the shear capacity of a side face FRP- strengthened shear-cracked beam. A numerical analysis is herein presented to model the fracture mechanics of a four-point RC beam, with two inclined initial notch on the supports, which is strengthened with side face FRP sheets. In the present study, the shear crack is forced to conduct by using an initial notch in supports. The ABAQUS software is used to model crack propagation by conventional cohesive elements. It is observed that the FRP sheets play important roles in preventing the propagation of shear cracks.Keywords: crack, FRP, shear, strengthening
Procedia PDF Downloads 5502270 Study of Mechanical Properties of Large Scale Flexible Silicon Solar Modules on the Various Substrates
Authors: M. Maleczek, Leszek Bogdan, Kazimierz Drabczyk, Agnieszka Iwan
Abstract:
Crystalline silicon (Si) solar cells are the main product in the market among the various photovoltaic technologies concerning such advantages as: material richness, high carrier mobilities, broad spectral absorption range and established technology. However, photovoltaic technology on the stiff substrates are heavier, more fragile and less cost-effective than devices on the flexible substrates to be applied in special applications. The main goal of our work was to incorporate silicon solar cells into various fabric, without any change of the electrical and mechanical parameters of devices. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management. In our work, the polyamide or polyester fabrics were used as a flexible substrate in the created devices. Applied fabrics differ in tensile and tear strength. All investigated polyamide fabrics are resistant to weathering and UV, while polyester ones is resistant to ozone, water and ageing. The examined fabrics are tight at 100 cm water per 2 hours. In our work, commercial silicon solar cells with the size 156 × 156 mm were cut into nine parts (called single solar cells) by diamond saw and laser. Gap and edge after cutting of solar cells were checked by transmission electron microscope (TEM) to study morphology and quality of the prepared single solar cells. Modules with the size of 160 × 70 cm (containing about 80 single solar cells) were created and investigated by electrical and mechanical methods. Weight of constructed module is about 1.9 kg. Three types of solar cell architectures such as: -fabric/EVA/Si solar cell/EVA/film for lamination, -backsheet PET/EVA/Si solar cell/EVA/film for lamination, -fabric/EVA/Si solar cell/EVA/tempered glass, were investigated taking into consideration type of fabric and lamination process together with the size of solar cells. In investigated devices EVA, it is ethylene-vinyl acetate, while PET - polyethylene terephthalate. Depend on the lamination process and compatibility of textile with solar cell an efficiency of investigated flexible silicon solar cells was in the range of 9.44-16.64 %. Multi folding and unfolding of flexible module has no impact on its efficiency as was detected by Instron equipment. Power (P) of constructed solar module is 30 W, while voltage about 36 V. Finally, solar panel contains five modules with the polyamide fabric and tempered glass will be produced commercially for different applications (dual use).Keywords: flexible devices, mechanical properties, silicon solar cells, textiles
Procedia PDF Downloads 1732269 Passive Attenuation with Multiple Resonator Rings for Musical Instruments Equalization
Authors: Lorenzo Bonoldi, Gianluca Memoli, Abdelhalim Azbaid El Ouahabi
Abstract:
In this paper, a series of ring-shaped attenuators utilizing Helmholtz and quarter wavelength resonators in variable, fixed, and combined configurations have been manufactured using a 3D printer. We illustrate possible uses by incorporating such devices into musical instruments (e.g. in acoustic guitar sound holes) and audio speakers with a view to controlling such devices tonal emissions without electronic equalization systems. Numerical investigations into the transmission loss values of these ring-shaped attenuators using finite element method simulations (COMSOL Multiphysics) have been presented in the frequency range of 100– 1000 Hz. We compare such results for each attenuator model with experimental measurements using different driving sources such as white noise, a maximum-length sequence (MLS), square and sine sweep pulses, and point scans in the frequency domain. Finally, we present a preliminary discussion on the comparison of numerical and experimental results.Keywords: equaliser, metamaterials, musical, instruments
Procedia PDF Downloads 1742268 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution
Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic
Abstract:
Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network
Procedia PDF Downloads 2642267 A New Mechanical Architecture Design of a Multifunctional Bed for Bedridden Healthcare
Authors: Rogelio Portillo Vélez, Eduardo Vázquez-Santacruz, Mariano Gamboa-Zúñiga
Abstract:
In this paper a new mechanical architecture design of a multi functional robot bed, is presented. The importance of this design relies on the fact that in next years the need of assistive devices development will increase in such way that elderly patients will use this kind of devices. This mechanical design implies following specific mechanisms which attend Mexican hospital requirements. This design is the base of next step of this kind of development given that it shows all technical details of the mechanical systems which are needed in order to construct the bed. This is first hospital bed design which could responds to the Latin America hospital requirements. We have obtained these hospital requirements using our diagnosis methodology [14]. From these results we have designed the mechanical system. This is the mechanical base of the hospital robotic bed which is being developed in our robotics laboratory. It will be useful in different hospital environments for elderly and disabled patients.Keywords: assistive robotics, methodology, feasibility analysis, robotics, operational feasibility, assistive technology, viability analysis matrix, social impact
Procedia PDF Downloads 3972266 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2952265 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 872264 Design and Māori Values: A Rebrand Project for the Social Enterprise Sector
Authors: M. Kiarna, S. Junjira, S. Casey, M. Nolwazi, M. S. Marcos, A. T. Tatiana, L. Cassandra
Abstract:
This paper details a rebrand design project developed for a non-profitable organization called Te Roopu Waiora (TRW), which is currently located in Auckland, Aotearoa New Zealand. This social enterprise is dedicated to supporting the Māori community living with sensorial, physical and intellectual disabilities (whānau hauā). As part of a year three bachelor design brief, the rebrand project enabled students to reflect on Kaupapa Māori principles and appropriately address the values of the organisation. As such, the methodology used a pragmatic paradigm approach and mixed methods design practices involving a human-centred design to problem solving. As result, the student project culminated in the development in a range of cohesive design artefacts, aiming to improve the rentability and perception of the brand with the audience and stakeholders.Keywords: design in Aotearoa New Zealand, Kaupapa Māori, branding, design education, human-centered design
Procedia PDF Downloads 1352263 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 872262 Adjustable Counter-Weight for Full Turn Rotary Systems
Authors: G. Karakaya, C. Türker, M. Anaklı
Abstract:
It is necessary to test to see if optical devices such as camera, night vision devices are working properly. Therefore, a precision biaxial rotary system (gimbal) is required for mounting Unit Under Test, UUT. The Gimbal systems can be utilized for precise positioning of the UUT; hence, optical test can be performed with high accuracy. The weight of UUT, which is placed outside the axis of rotation, causes an off-axis moment to the mounting armature. The off-axis moment can act against the direction of movement for some orientation, thus the electrical motor, which rotates the gimbal axis, has to apply higher level of torque to guide and stabilize the system. Moreover, UUT and its mounting fixture to the gimbal can be changed, which causes change in applied resistance moment to the gimbals electrical motor. In this study, a preloaded spring is added to the gimbal system for minimizing applied off axis moment with the help of four bar mechanism. Two different possible methods for preloading spring are introduced and system optimization is performed to eliminate all moment which is created by off axis weight.Keywords: adaptive, balancing, gimbal, mechanics, spring
Procedia PDF Downloads 1212261 Lean Comic GAN (LC-GAN): a Light-Weight GAN Architecture Leveraging Factorized Convolution and Teacher Forcing Distillation Style Loss Aimed to Capture Two Dimensional Animated Filtered Still Shots Using Mobile Phone Camera and Edge Devices
Authors: Kaustav Mukherjee
Abstract:
In this paper we propose a Neural Style Transfer solution whereby we have created a Lightweight Separable Convolution Kernel Based GAN Architecture (SC-GAN) which will very useful for designing filter for Mobile Phone Cameras and also Edge Devices which will convert any image to its 2D ANIMATED COMIC STYLE Movies like HEMAN, SUPERMAN, JUNGLE-BOOK. This will help the 2D animation artist by relieving to create new characters from real life person's images without having to go for endless hours of manual labour drawing each and every pose of a cartoon. It can even be used to create scenes from real life images.This will reduce a huge amount of turn around time to make 2D animated movies and decrease cost in terms of manpower and time. In addition to that being extreme light-weight it can be used as camera filters capable of taking Comic Style Shots using mobile phone camera or edge device cameras like Raspberry Pi 4,NVIDIA Jetson NANO etc. Existing Methods like CartoonGAN with the model size close to 170 MB is too heavy weight for mobile phones and edge devices due to their scarcity in resources. Compared to the current state of the art our proposed method which has a total model size of 31 MB which clearly makes it ideal and ultra-efficient for designing of camera filters on low resource devices like mobile phones, tablets and edge devices running OS or RTOS. .Owing to use of high resolution input and usage of bigger convolution kernel size it produces richer resolution Comic-Style Pictures implementation with 6 times lesser number of parameters and with just 25 extra epoch trained on a dataset of less than 1000 which breaks the myth that all GAN need mammoth amount of data. Our network reduces the density of the Gan architecture by using Depthwise Separable Convolution which does the convolution operation on each of the RGB channels separately then we use a Point-Wise Convolution to bring back the network into required channel number using 1 by 1 kernel.This reduces the number of parameters substantially and makes it extreme light-weight and suitable for mobile phones and edge devices. The architecture mentioned in the present paper make use of Parameterised Batch Normalization Goodfellow etc al. (Deep Learning OPTIMIZATION FOR TRAINING DEEP MODELS page 320) which makes the network to use the advantage of Batch Norm for easier training while maintaining the non-linear feature capture by inducing the learnable parametersKeywords: comic stylisation from camera image using GAN, creating 2D animated movie style custom stickers from images, depth-wise separable convolutional neural network for light-weight GAN architecture for EDGE devices, GAN architecture for 2D animated cartoonizing neural style, neural style transfer for edge, model distilation, perceptual loss
Procedia PDF Downloads 1322260 Localization of Near Field Radio Controlled Unintended Emitting Sources
Authors: Nurbanu Guzey, S. Jagannathan
Abstract:
Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)
Procedia PDF Downloads 5262259 Simulation of Stretching and Fragmenting DNA by Microfluidic for Optimizing Microfluidic Devices
Authors: Shuyi Wu, Chuang Li, Quanshui Zheng, Luping Xu
Abstract:
Stretching and snipping DNA molecule by microfluidic has important application value in gene analysis by lab on a chip. Movement, deformation and fragmenting of DNA in microfluidic are typical fluid-solid coupling problems. An efficient and common simulation system for researching the movement, deformation and fragmenting of DNA by microfluidic has not been well developed. In our study, Brownian dynamics-finite element method (BD-FEM) is used to simulate the dynamic process of stretching and fragmenting DNA by contraction flow. The shape and parameters of micro-channels are changed to optimize the stretching and fragmenting properties of DNA. Our results indicate that strain rate, resulting from contraction microchannel, is the main control parameter for stretching and fragmenting DNA. There is good consistency between the simulation data and previous experimental result about the single DNA molecule behavior and averaged fragmenting properties in this study. BD-FEM method is an efficient calculating tool to research stretching and fragmenting behavior of single DNA molecule and optimize microfluidic devices for manipulating, stretching and fragmenting DNA.Keywords: fragmenting, DNA, microfluidic, optimize.
Procedia PDF Downloads 3282258 Injunctions, Disjunctions, Remnants: The Reverse of Unity
Authors: Igor Guatelli
Abstract:
The universe of aesthetic perception entails impasses about sensitive divergences that each text or visual object may be subjected to. If approached through intertextuality that is not based on the misleading notion of kinships or similarities a priori admissible, the possibility of anachronistic, heterogeneous - and non-diachronic - assemblies can enhance the emergence of interval movements, intermediate, and conflicting, conducive to a method of reading, interpreting, and assigning meaning that escapes the rigid antinomies of the mere being and non-being of things. In negative, they operate in a relationship built by the lack of an adjusted meaning set by their positive existences, with no remainders; the generated interval becomes the remnant of each of them; it is the opening that obscures the stable positions of each one. Without the negative of absence, of that which is always missing or must be missing in a text, concept, or image made positive by history, nothing is perceived beyond what has been already given. Pairings or binary oppositions cannot lead only to functional syntheses; on the contrary, methodological disturbances accumulated by the approximation of signs and entities can initiate a process of becoming as an opening to an unforeseen other, transformation until a moment when the difficulties of [re]conciliation become the mainstay of a future of that sign/entity, not envisioned a priori. A counter-history can emerge from these unprecedented, misadjusted approaches, beginnings of unassigned injunctions and disjunctions, in short, difficult alliances that open cracks in a supposedly cohesive history, chained in its apparent linearity with no remains, understood as a categorical historical imperative. Interstices are minority fields that, because of their opening, are capable of causing opacity in that which, apparently, presents itself with irreducible clarity. Resulting from an incomplete and maladjusted [at the least dual] marriage between the signs/entities that originate them, this interval may destabilize and cause disorder in these entities and their own meanings. The interstitials offer a hyphenated relationship: a simultaneous union and separation, a spacing between the entity’s identity and its otherness or, alterity. One and the other may no longer be seen without the crack or fissure that now separates them, uniting, by a space-time lapse. Ontological, semantic shifts are caused by this fissure, an absence between one and the other, one with and against the other. Based on an improbable approximation between some conceptual and semantic shifts within the design production of architect Rem Koolhaas and the textual production of the philosopher Jacques Derrida, this article questions the notion of unity, coherence, affinity, and complementarity in the process of construction of thought from these ontological, epistemological, and semiological fissures that rattle the signs/entities and their stable meanings. Fissures in a thought that is considered coherent, cohesive, formatted are the negativity that constitutes the interstices that allow us to move towards what still remains as non-identity, which allows us to begin another story.Keywords: clearing, interstice, negative, remnant, spectrum
Procedia PDF Downloads 1342257 Molecular Dynamics Simulations of the Structural, Elastic and Thermodynamic Properties of Cubic GaBi
Authors: M. Zemouli, K. Amara, M. Elkeurti, Y. Benallou
Abstract:
We present the molecular dynamic simulations results of the structural and dynamical properties of the zinc-blende GaBi over a wide range of temperature (300-1000) K. Our simulation where performed in the framework of the three-body Tersoff potential, which accurately reproduces the lattice constants and elastic constants of the GaBi. A good agreement was found between our calculated results and the available theoretical data of the lattice constant, the bulk modulus and the cohesive energy. Our study allows us to predict the thermodynamic properties such as the specific heat and the lattice thermal expansion. In addition, this method allows us to check its ability to predict the phase transition of this compound. In particular, the transition pressure to the rock-salt phase is calculated and the results are compared with other available works.Keywords: Gallium compounds, molecular dynamics simulations, interatomic potential thermodynamic properties, structural phase transition
Procedia PDF Downloads 4452256 Distributed Framework for Pothole Detection and Monitoring Using Federated Learning
Authors: Ezil Sam Leni, Shalen S.
Abstract:
Transport service monitoring and upkeep are essential components of smart city initiatives. The main risks to the relevant departments and authorities are the ever-increasing vehicular traffic and the conditions of the roads. In India, the economy is greatly impacted by the road transport sector. In 2021, the Ministry of Road Transport and Highways Transport, Government of India, produced a report with statistical data on traffic accidents. The data included the number of fatalities, injuries, and other pertinent criteria. This study proposes a distributed infrastructure for the monitoring, detection, and reporting of potholes to the appropriate authorities. In a distributed environment, the nodes are the edge devices, and local edge servers, and global servers. The edge devices receive the initial model to be employed from the global server. The YOLOv8 model for pothole detection is used in the edge devices. The edge devices run the pothole detection model, gather the pothole images on their path, and send the updates to the nearby edge server. The local edge server selects the clients for its aggregation process, aggregates the model updates and sends the updates to the global server. The global server collects the updates from the local edge servers, performs aggregation and derives the updated model. The updated model has the information about the potholes received from the local edge servers and notifies the updates to the local edge servers and concerned authorities for monitoring and maintenance of road conditions. The entire process is implemented in FedCV distributed environment with the implementation using the client-server model and aggregation entities. After choosing the clients for its aggregation process, the local edge server gathers the model updates and transmits them to the global server. After gathering the updates from the regional edge servers, the global server aggregates them and creates the updated model. Performance indicators and the experimentation environment are assessed, discussed, and presented. Accelerometer data may be taken into consideration for improved performance in the future development of this study, in addition to the images captured from the transportation routes.Keywords: federated Learning, pothole detection, distributed framework, federated averaging
Procedia PDF Downloads 1032255 Estimation of Hysteretic Damping in Steel Dual Systems with Buckling Restrained Brace and Moment Resisting Frame
Authors: Seyed Saeid Tabaee, Omid Bahar
Abstract:
Nowadays, using energy dissipation devices has been commonly used in structures. A high rate of energy absorption during earthquakes is the benefit of using such devices, which results in damage reduction of structural elements specifically columns. The hysteretic damping capacity of energy dissipation devices is the key point that it may adversely complicate analysis and design of such structures. This effect may be generally represented by equivalent viscous damping. The equivalent viscous damping may be obtained from the expected hysteretic behavior under the design or maximum considered displacement of a structure. In this paper, the hysteretic damping coefficient of a steel moment resisting frame (MRF), which its performance is enhanced by a buckling restrained brace (BRB) system has been evaluated. Having the foresight of damping fraction between BRB and MRF is inevitable for seismic design procedures like Direct Displacement-Based Design (DDBD) method. This paper presents an approach to calculate the damping fraction for such systems by carrying out the dynamic nonlinear time history analysis (NTHA) under harmonic loading, which is tuned to the natural frequency of the system. Two steel moment frame structures, one equipped with BRB, and the other without BRB are simultaneously studied. The extensive analysis shows that proportion of each system damping fraction may be calculated by its shear story portion. In this way, the contribution of each BRB in the floors and their general contribution in the structural performance may be clearly recognized, in advance.Keywords: buckling restrained brace, direct displacement based design, dual systems, hysteretic damping, moment resisting frames
Procedia PDF Downloads 4342254 One Step Further: Pull-Process-Push Data Processing
Authors: Romeo Botes, Imelda Smit
Abstract:
In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list
Procedia PDF Downloads 2442253 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 2332252 White Light Emitting Carbon Dots- Surface Modification of Carbon Dots Using Auxochromes
Authors: Manasa Perikala, Asha Bhardwaj
Abstract:
Fluorescent carbon dots (CDs), a young member of Carbon nanomaterial family, has gained a lot of research attention across the globe due to its highly luminescent emission properties, non-toxic behavior, stable emission properties, and zero re-absorption lose. These dots have the potential to replace the use of traditional semiconductor quantum dots in light-emitting devices (LED’s, fiber lasers) and other photonic devices (temperature sensor, UV detector). However, One major drawback of Carbon dots is that, till date, the actual mechanism of photoluminescence (PL) in carbon dots is still an open topic of discussion among various researchers across the globe. PL mechanism of CDs based on wide particle size distribution, the effect of surface groups, hybridization in carbon, and charge transfer mechanisms have been proposed. Although these mechanisms explain PL of CDs to an extent, no universally accepted mechanism to explain complete PL behavior of these dots is put forth. In our work, we report parameters affecting the size and surface of CDs, such as time of the reaction, synthesis temperature and concentration of precursors and their effects on the optical properties of the carbon dots. The effect of auxochromes on the emission properties and re-modification of carbon surface using an external surface functionalizing agent is discussed in detail. All the explanations have been supported by UV-Visible absorption, emission spectroscopies, Fourier transform infrared spectroscopy and Transmission electron microscopy and X-Ray diffraction techniques. Once the origin of PL in CDs is understood, parameters affecting PL centers can be modified to tailor the optical properties of these dots, which can enhance their applications in the fabrication of LED’s and other photonic devices out of these carbon dots.Keywords: carbon dots, photoluminescence, size effects on emission in CDs, surface modification of carbon dots
Procedia PDF Downloads 1352251 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 112250 Social Affiliation Effects of Technology in 2022
Authors: Johanna Goeß
Abstract:
In this field study, it is hypothesised that affiliation motivation is relevant to dark terminal technology readiness. The theoretical basis for this work was the TAM 2, focusing on the social process variables and the short-scale technology readiness. Two hypotheses to be tested are the focus of consideration: H1: The TAM constructs are independently positively related to dark device use. H2: Sense of social belonging is positively related to dark device use. In this quantitative study, 30 male subjects participated with their dark devices. Using a post-basket exercise, affiliation is manipulated by content items on the website to investigate whether affiliation between computers and people and smartphones and people leads to similar effects as an affiliation between people. The entire scientific study, including the questionnaire, took about 30 minutes. This study contributes to the current literature and draws attention to the fact that male users' terminal devices have an influence in the form of affiliation effects.Keywords: human-computer-interaction, computers, smartphones, addiction, social affiliation effects, TAM 2, pyramid of needs, social actors
Procedia PDF Downloads 1172249 A Pervasive System Architecture for Smart Environments in Internet of Things Context
Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço
Abstract:
Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.Keywords: internet of things, cloud, intelligent personal assistant, architecture
Procedia PDF Downloads 5142248 Molecular Dynamics Simulations of the Structural, Elastic, and Thermodynamic Properties of Cubic AlBi
Authors: M. Zemouli, K. Amara, M. Elkeurti, Y. Benallou
Abstract:
We present a theoretical study of the structural, elastic and thermodynamic properties of the zinc-blende AlBi for a wide temperature range. The simulation calculation is performed in the framework of the molecular dynamics method using the three-body Tersoff potential which reproduces provide, with reasonable accuracy, the lattice constants and elastic constants. Our results for the lattice constant, the bulk modulus and cohesive energy are in good agreement with other theoretical available works. Other thermodynamic properties such as the specific heat and the lattice thermal expansion can also be predicted. In addition, this method allows us to check its ability to predict the phase transition of this compound. In particular, the transition pressure to the rock-salt phase is calculated and the results are compared with other available works.Keywords: aluminium compounds, molecular dynamics simulations, interatomic potential, thermodynamic properties, structural phase transition
Procedia PDF Downloads 3052247 Learning through Gaming with Mobile Devices
Authors: Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander, Alberto Lamadrid Alvarez, Héctor Fernando Valencia Pérez
Abstract:
Financial education is among the areas of opportunity in the Spanish-speaking from an early age to high school, through mobile devices such as cell phones and tablets using ludic and fun applications like interactive games, children can learn money management and investment through time, thereby fostering the habit of saving and/or sound management of cash and family business resources, having interaction with an uncontrolled environment such as the involvement of other players in the external decisions of the environment in which the game is play. The application proposed in Phase 1 (design and development) was designed in multi-user environments, under methodologies of hybrid programming for any platform on the market and designed under CMMI standards that allow for quality production over time, following up on these improvements counting with continuous user feedback and usage statistics.Keywords: mobile educational games, ludic games, children, multiuser, design and software development
Procedia PDF Downloads 3822246 Optimum Parameter of a Viscous Damper for Seismic and Wind Vibration
Authors: Soltani Amir, Hu Jiaxin
Abstract:
Determination of optimal parameters of a passive control system device is the primary objective of this study. Expanding upon the use of control devices in wind and earthquake hazard reduction has led to development of various control systems. The advantage of non-linearity characteristics in a passive control device and the optimal control method using LQR algorithm are explained in this study. Finally, this paper introduces a simple approach to determine optimum parameters of a nonlinear viscous damper for vibration control of structures. A MATLAB program is used to produce the dynamic motion of the structure considering the stiffness matrix of the SDOF frame and the non-linear damping effect. This study concluded that the proposed system (variable damping system) has better performance in system response control than a linear damping system. Also, according to the energy dissipation graph, the total energy loss is greater in non-linear damping system than other systems.Keywords: passive control system, damping devices, viscous dampers, control algorithm
Procedia PDF Downloads 4702245 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 40