Search results for: dual-SLA indicators for computing force applications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10577

Search results for: dual-SLA indicators for computing force applications

10037 Cloud-Based Dynamic Routing with Feedback in Formal Methods

Authors: Jawid Ahmad Baktash, Mursal Dawodi, Tomokazu Nagata

Abstract:

With the rapid growth of Cloud Computing, Formal Methods became a good choice for the refinement of message specification and verification for Dynamic Routing in Cloud Computing. Cloud-based Dynamic Routing is becoming increasingly popular. We propose feedback in Formal Methods for Dynamic Routing and Cloud Computing; the model and topologies show how to send messages from index zero to all others formally. The responsibility of proper verification becomes crucial with Dynamic Routing in the cloud. Formal Methods can play an essential role in the routing and development of Networks, and the testing of distributed systems. Event-B is a formal technique that consists of describing the problem rigorously and introduces solutions or details in the refinement steps. Event-B is a variant of B, designed for developing distributed systems and message passing of the dynamic routing. In Event-B and formal methods, the events consist of guarded actions occurring spontaneously rather than being invoked.

Keywords: cloud, dynamic routing, formal method, Pro-B, event-B

Procedia PDF Downloads 412
10036 Agent-Base Modeling of IoT Applications by Using Software Product Line

Authors: Asad Abbas, Muhammad Fezan Afzal, Muhammad Latif Anjum, Muhammad Azmat

Abstract:

The Internet of Things (IoT) is used to link up real objects that use the internet to interact. IoT applications allow handling and operating the equipment in accordance with environmental needs, such as transportation and healthcare. IoT devices are linked together via a number of agents that act as a middleman for communications. The operation of a heat sensor differs indoors and outside because agent applications work with environmental variables. In this article, we suggest using Software Product Line (SPL) to model IoT agents and applications' features on an XML-based basis. The contextual diversity within the same domain of application can be handled, and the reusability of features is increased by XML-based feature modelling. For the purpose of managing contextual variability, we have embraced XML for modelling IoT applications, agents, and internet-connected devices.

Keywords: IoT agents, IoT applications, software product line, feature model, XML

Procedia PDF Downloads 84
10035 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 234
10034 Complementary Mathematical Model for Underwater Vehicles under Load Variation Test Conditions

Authors: Erim Koyun

Abstract:

This paper aim to construct a mathematical model for Underwater vehicles under load variation test conditions. Propeller effects on underwater vehicle are investigated. Body with counter rotating propeller model is analyzed by CFD methods, thus forces and moment are obtained. Propeller effects of vehicle’s hydrodynamic performance under load variation conditions will be investigated. Additionally, pressure contour is examined for differences between different load conditions. Axial force equation is established using hydrodynamic coefficients, which contains resistance, thrust, and additional coefficients occurs due to load variations. Additional coefficients helps to express completely axial force on underwater vehicle. When the vehicle accelerates, additional force occurs besides thrust force increment. This is propeller effect on the body. Hence, mathematical model cover this effect. For CFD analysis, the incompressible, three-dimensional, and unsteady Reynolds Averaged Navier-Stokes equations will be used Numerical results is verified with experimental results for verification. The overall goal of this study is to present complementary mathematical model for body with counter rotating propeller.

Keywords: counter rotating propeller, CFD, hydrodynamic mathematic model, hydrodynamics analysis, thrust deduction

Procedia PDF Downloads 132
10033 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 131
10032 Spatial Analysis of Flood Vulnerability in Highly Urbanized Area: A Case Study in Taipei City

Authors: Liang Weichien

Abstract:

Without adequate information and mitigation plan for natural disaster, the risk to urban populated areas will increase in the future as populations grow, especially in Taiwan. Taiwan is recognized as the world's high-risk areas, where an average of 5.7 times of floods occur per year should seek to strengthen coherence and consensus in how cities can plan for flood and climate change. Therefore, this study aims at understanding the vulnerability to flooding in Taipei city, Taiwan, by creating indicators and calculating the vulnerability of each study units. The indicators were grouped into sensitivity and adaptive capacity based on the definition of vulnerability of Intergovernmental Panel on Climate Change. The indicators were weighted by using Principal Component Analysis. However, current researches were based on the assumption that the composition and influence of the indicators were the same in different areas. This disregarded spatial correlation that might result in inaccurate explanation on local vulnerability. The study used Geographically Weighted Principal Component Analysis by adding geographic weighting matrix as weighting to get the different main flood impact characteristic in different areas. Cross Validation Method and Akaike Information Criterion were used to decide bandwidth and Gaussian Pattern as the bandwidth weight scheme. The ultimate outcome can be used for the reduction of damage potential by integrating the outputs into local mitigation plan and urban planning.

Keywords: flood vulnerability, geographically weighted principal components analysis, GWPCA, highly urbanized area, spatial correlation

Procedia PDF Downloads 280
10031 Analysis of Drilling Parameters for Al-Mg2-Si Metal Matrix Composite

Authors: S. Jahangir, S. H. I. Jaffery, M. Khan, Z. Zareef, A. Yar, A. Mubashir, S. Butt, L. Ali

Abstract:

In this work, drilling responses and behavior of MMC was investigated in Al-Mg2Si composites. For the purpose Al-15% wt. Mg2Si, was selected from the hypereutectic region of Al- Mg2Si phase diagram. Based on hardness and tensile strength, drill bit of appropriate material and morphology was selected. The performance of different drill bits of different morphology and material was studied and analysed using experimental data. For theoretical calculations of axial thrust force and required power calculation, material factor “K” was obtained from different data charts and at the same time cutting forces (drilling forces) were practically obtained using a Peizo electric force dynamometer. These results show the role of reinforcement particles on the machinability of MMCs and provide a useful guide for a better control and optimized drilling parameters for the drilling process. Furthermore, in this work, comparison of MMC with non -reinforced Aluminum Alloy regarding drilling operation was also studied.

Keywords: drilling, metal matrix composite (MMC), cutting forces, thrust force

Procedia PDF Downloads 423
10030 Review of Theories and Applications of Genetic Programing in Sediment Yield Modeling

Authors: Adesoji Tunbosun Jaiyeola, Josiah Adeyemo

Abstract:

Sediment yield can be considered to be the total sediment load that leaves a drainage basin. The knowledge of the quantity of sediments present in a river at a particular time can lead to better flood capacity in reservoirs and consequently help to control over-bane flooding. Furthermore, as sediment accumulates in the reservoir, it gradually loses its ability to store water for the purposes for which it was built. The development of hydrological models to forecast the quantity of sediment present in a reservoir helps planners and managers of water resources systems, to understand the system better in terms of its problems and alternative ways to address them. The application of artificial intelligence models and technique to such real-life situations have proven to be an effective approach of solving complex problems. This paper makes an extensive review of literature relevant to the theories and applications of evolutionary algorithms, and most especially genetic programming. The successful applications of genetic programming as a soft computing technique were reviewed in sediment modelling and other branches of knowledge. Some fundamental issues such as benchmark, generalization ability, bloat and over-fitting and other open issues relating to the working principles of GP, which needs to be addressed by the GP community were also highlighted. This review aim to give GP theoreticians, researchers and the general community of GP enough research direction, valuable guide and also keep all stakeholders abreast of the issues which need attention during the next decade for the advancement of GP.

Keywords: benchmark, bloat, generalization, genetic programming, over-fitting, sediment yield

Procedia PDF Downloads 440
10029 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 376
10028 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 109
10027 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 316
10026 The Role of Graphene Oxide on Titanium Dioxide Performance for Photovoltaic Applications

Authors: Abdelmajid Timoumi, Salah Alamri, Hatem Alamri

Abstract:

TiO₂ Graphene Oxide (TiO₂-GO) nanocomposite was prepared using the spin coating technique of suspension of Graphene Oxide (GO) nanosheets and Titanium Tetra Isopropoxide (TIP). The prepared nanocomposites samples were characterized by X-ray diffractometer, Scanning Electron Microscope and Atomic Force Microscope to examine their structures and morphologies. UV-vis transmittance and reflectance spectroscopy was employed to estimate band gap energies. From the TiO₂-GO samples, a 0.25 μm thin layer on a piece of glass 2x2 cm was created. The X-ray diffraction analysis revealed that the as-deposited layers are amorphous in nature. The surface morphology images demonstrate that the layers grew in distributed with some spherical/rod-like and partially agglomerated TiGO on the surface of the composite. The Atomic Force Microscopy indicated that the films are smooth with slightly larger surface roughness. The analysis of optical absorption data of the layers showed that the values of band gap energy decreased from 3.46 eV to 1.40 eV, depending on the grams of GO doping. This reduction might be attributed to electron and/or hole trapping at the donor and acceptor levels in the TiO₂ band structure. Observed results have shown that the inclusion of GO in the TiO₂ matrix have exhibited significant and excellent properties, which would be promising for application in the photovoltaic application.

Keywords: titanium dioxide, graphene oxide, thin films, solar cells

Procedia PDF Downloads 158
10025 Ecological and Economical Indicators of Successful Community Based Forest Management: A Case of Lowland Community Forestry in Nepal

Authors: Bikram Jung Kunwar, Pralhad Kunwor

Abstract:

The Community-Based Forest Management (CBFM) approach is often glorified as the best forest management alternatives in the developing countries. However, how the approach has been understood by the local user households, who implement it is remained unanswered for many planners, policy makers, and sometimes researcher as well. The study attempts to assess the understanding of ecology and economics of CBFM in Nepal, where community forest program has been implemented since the 1970s. In order to understand the impacts of the program, eight criteria and sixteen indicators for ecological conservation and similarly same number of criteria and indicators for socio-economic impacts of the program were designed and compared between before and after the program implementation. The community forestry program has positive effects in forest ecology conservation and at the same time rural livelihood improvement of local people. The study revealed that collective understanding of forest ecology and economics leads the CBFM approach towards the sustainability of the program in a win-win situation. The recommendations of the study are expected to be useful to natural resource managers, planners, and policy makers.

Keywords: community, forest management, ecology, economics, Nepal

Procedia PDF Downloads 390
10024 Sustainable Land Use Evaluation Based on Preservative Approach: Neighborhoods of Susa City

Authors: Somaye Khademi, Elahe Zoghi Hoseini, Mostafa Norouzi

Abstract:

Determining the manner of land-use and the spatial structure of cities on the one hand, and the economic value of each piece of land, on the other hand, land-use planning is always considered as the main part of urban planning. In this regard, emphasizing the efficient use of land, the sustainable development approach has presented a new perspective on urban planning and consequently on its most important pillar, i.e. land-use planning. In order to evaluate urban land-use, it has been attempted in this paper to select the most significant indicators affecting urban land-use and matching sustainable development indicators. Due to the significance of preserving ancient monuments and the surroundings as one of the main pillars of achieving sustainability, in this research, sustainability indicators have been selected emphasizing the preservation of ancient monuments and historical observance of the city of Susa as one of the historical cities of Iran. It has also been attempted to integrate these criteria with other land-use sustainability indicators. For this purpose, Kernel Density Estimation (KDE) and the AHP model have been used for providing maps displaying spatial density and combining layers as well as providing final maps respectively. Moreover, the rating of sustainability will be studied in different districts of the city of Shush so as to evaluate the status of land sustainability in different parts of the city. The results of the study show that different neighborhoods of Shush do not have the same sustainability in land-use such that neighborhoods located in the eastern half of the city, i.e. the new neighborhoods, have a higher sustainability than those of the western half. It seems that the allocation of a high percentage of these areas to arid lands and historical areas is one of the main reasons for their sustainability.

Keywords: city of Susa, historical heritage, land-use evaluation, urban sustainable development

Procedia PDF Downloads 372
10023 Biocellulose as Platform for the Development of Multifunctional Materials

Authors: Junkal Gutierrez, Hernane S. Barud, Sidney J. L. Ribeiro, Agnieszka Tercjak

Abstract:

Nowadays the interest on green nanocomposites and on the development of more environmental friendly products has been increased. Bacterial cellulose has been recently investigated as an attractive environmentally friendly material for the preparation of low-cost nanocomposites. The formation of cellulose by laboratory bacterial cultures is an interesting and attractive biomimetic access to obtain pure cellulose with excellent properties. Additionally, properties as molar mass, molar mass distribution, and the supramolecular structure could be control using different bacterial strain, culture mediums and conditions, including the incorporation of different additives. This kind of cellulose is a natural nanomaterial, and therefore, it has a high surface-to-volume ratio which is highly advantageous in composites production. Such property combined with good biocompatibility, high tensile strength, and high crystallinity makes bacterial cellulose a potential material for applications in different fields. The aim of this investigation work was the fabrication of novel hybrid inorganic-organic composites based on bacterial cellulose, cultivated in our laboratory, as a template. This kind of biohybrid nanocomposites gathers together excellent properties of bacterial cellulose with the ones displayed by typical inorganic nanoparticles like optical, magnetic and electrical properties, luminescence, ionic conductivity and selectivity, as well as chemical or biochemical activity. In addition, the functionalization of cellulose with inorganic materials opens new pathways for the fabrication of novel multifunctional hybrid materials with promising properties for a wide range of applications namely electronic paper, flexible displays, solar cells, sensors, among others. In this work, different pathways for fabrication of multifunctional biohybrid nanopapers with tunable properties based on BC modified with amphiphilic poly(ethylene oxide-b-propylene oxide-b-ethylene oxide) (EPE) block copolymer, sol-gel synthesized nanoparticles (titanium, vanadium and a mixture of both oxides) and functionalized iron oxide nanoparticles will be presented. In situ (biosynthesized) and ex situ (at post-production level) approaches were successfully used to modify BC membranes. Bacterial cellulose based biocomposites modified with different EPE block copolymer contents were developed by in situ technique. Thus, BC growth conditions were manipulated to fabricate EPE/BC nanocomposite during the biosynthesis. Additionally, hybrid inorganic/organic nanocomposites based on BC membranes and inorganic nanoparticles were designed via ex-situ method, by immersion of never-dried BC membranes into different nanoparticle solutions. On the one hand, sol-gel synthesized nanoparticles (titanium, vanadium and a mixture of both oxides) and on the other hand superparamagnetic iron oxide nanoparticles (SPION), Fe2O3-PEO solution. The morphology of designed novel bionanocomposites hybrid materials was investigated by atomic force microscopy (AFM) and scanning electron microscopy (SEM). In order to characterized obtained materials from the point of view of future applications different techniques were employed. On the one hand, optical properties were analyzed by UV-vis spectroscopy and spectrofluorimetry and on the other hand electrical properties were studied at nano and macroscale using electric force microscopy (EFM), tunneling atomic force microscopy (TUNA) and Keithley semiconductor analyzer, respectively. Magnetic properties were measured by means of magnetic force microscopy (MFM). Additionally, mechanical properties were also analyzed.

Keywords: bacterial cellulose, block copolymer, advanced characterization techniques, nanoparticles

Procedia PDF Downloads 227
10022 Sliding Mode Control of Bilateral Teleoperation System with Time Delay

Authors: Ahmad Forouzantabar, Mohammad Azadi

Abstract:

This paper presents sliding mode controller for bilateral teleoperation systems with robotic master and slave under constant communication delays. We extend the passivity-based coordination architecture to enhance position and force tracking in the presence of offset in initial conditions, environmental contacts and unknown parameters such as friction coefficient. To address these difficulties, a nonlinear sliding mode controller is designed to approximate the nonlinear dynamics of master and slave robots and improve both position and force tracking. Using the Lyapunov theory, the boundedness of master- slave tracking errors and the stability of the teleoperation system are also guaranteed. Numerical simulations show that proposed controller position and force tracking performances are superior to that of conventional coordination controller tracking performances.

Keywords: Lyapunov stability, teleoperation system, time delay, sliding mode controller

Procedia PDF Downloads 378
10021 Integrated Teaching of Hardware Courses for the Undergraduates of Computer Science and Engineering to Attain Focused Outcomes

Authors: Namrata D. Hiremath, Mahalaxmi Bhille, P. G. Sunitha Hiremath

Abstract:

Computer systems play an integral role in all facets of the engineering profession. This calls for an understanding of the processor-level components of computer systems, their design and operation, and their impact on the overall performance of the systems. Systems users are always in need of faster, more powerful, yet cheaper computer systems. The focus of Computer Science engineering graduates is inclined towards software oriented base. To be an efficient programmer there is a need to understand the role of hardware architecture towards the same. It is essential for the students of Computer Science and Engineering to know the basic building blocks of any computing device and how the digital principles can be used to build them. Hence two courses Digital Electronics of 3 credits, which is associated with lab of 1.5 credits and Computer Organization of 5 credits, were introduced at the sophomore level. Activity was introduced with the objective to teach the hardware concepts to the students of Computer science engineering through structured lab. The students were asked to design and implement a component of a computing device using MultiSim simulation tool and build the same using hardware components. The experience of the activity helped the students to understand the real time applications of the SSI and MSI components. The impact of the activity was evaluated and the performance was measured. The paper explains the achievement of the ABET outcomes a, c and k.

Keywords: digital, computer organization, ABET, structured enquiry, course activity

Procedia PDF Downloads 489
10020 Design and Fabrication of a Programmable Stiffness-Sensitive Gripper for Object Handling

Authors: Mehdi Modabberifar, Sanaz Jabary, Mojtaba Ghodsi

Abstract:

Stiffness sensing is an important issue in medical diagnostic, robotics surgery, safe handling, and safe grasping of objects in production lines. Detecting and obtaining the characteristics in dwelling lumps embedded in a soft tissue and safe removing and handling of detected lumps is needed in surgery. Also in industry, grasping and handling an object without damaging in a place where it is not possible to access a human operator is very important. In this paper, a method for object handling is presented. It is based on the use of an intelligent gripper to detect the object stiffness and then setting a programmable force for grasping the object to move it. The main components of this system includes sensors (sensors for measuring force and displacement), electrical (electrical and electronic circuits, tactile data processing and force control system), mechanical (gripper mechanism and driving system for the gripper) and the display unit. The system uses a rotary potentiometer for measuring gripper displacement. A microcontroller using the feedback received by the load cell, mounted on the finger of the gripper, calculates the amount of stiffness, and then commands the gripper motor to apply a certain force on the object. Results of Experiments on some samples with different stiffness show that the gripper works successfully. The gripper can be used in haptic interfaces or robotic systems used for object handling.

Keywords: gripper, haptic, stiffness, robotic

Procedia PDF Downloads 352
10019 1D Convolutional Networks to Compute Mel-Spectrogram, Chromagram, and Cochleogram for Audio Networks

Authors: Elias Nemer, Greg Vines

Abstract:

Time-frequency transformation and spectral representations of audio signals are commonly used in various machine learning applications. Training networks on frequency features such as the Mel-Spectrogram or Cochleogram have been proven more effective and convenient than training on-time samples. In practical realizations, these features are created on a different processor and/or pre-computed and stored on disk, requiring additional efforts and making it difficult to experiment with different features. In this paper, we provide a PyTorch framework for creating various spectral features as well as time-frequency transformation and time-domain filter-banks using the built-in trainable conv1d() layer. This allows computing these features on the fly as part of a larger network and enabling easier experimentation with various combinations and parameters. Our work extends the work in the literature developed for that end: First, by adding more of these features and also by allowing the possibility of either starting from initialized kernels or training them from random values. The code is written as a template of classes and scripts that users may integrate into their own PyTorch classes or simply use as is and add more layers for various applications.

Keywords: neural networks Mel-Spectrogram, chromagram, cochleogram, discrete Fourrier transform, PyTorch conv1d()

Procedia PDF Downloads 225
10018 New Modification Negative Stiffness Device with Constant Force-Displacement Characteristic for Seismic Protection of Structures

Authors: Huan Li, Jianchun Li, Yancheng Li, Yang Yu

Abstract:

As a seismic protection method of civil and engineering structures, weakening and damping is effective during the elastic region, while it somehow leads to the early yielding of the entire structure accompanying with large excursions and permanent deformations. Adaptive negative stiffness device is attractive for realizing yielding property without changing the stiffness of the primary structure. In this paper, a new modification negative stiffness device (MNSD) with constant force-displacement characteristic is proposed by combining a magnetic negative stiffness spring, a piecewise linear positive spring and a passive damper with a certain adaptive stiffness device. The proposed passive control MNSD preserves no effect under small excitation. When the displacement amplitude increases beyond the pre-defined yielding point, the force-displacement characteristics of the system with MNSD will keep constant. The seismic protection effect of the MNSD is evaluated by employing it to a single-degree-of-freedom system under sinusoidal excitation, and real earthquake waves. By comparative analysis, the system with MNSD performs better on reducing acceleration and displacement response under different displacement amplitudes than the scenario without it and the scenario with unmodified certain adaptive stiffness device.

Keywords: negative stiffness, adaptive stiffness, weakening and yielding, constant force-displacement characteristic

Procedia PDF Downloads 150
10017 The Effect of Outliers on the Economic and Social Survey on Income and Living Conditions

Authors: Encarnación Álvarez, Rosa M. García-Fernández, Francisco J. Blanco-Encomienda, Juan F. Muñoz

Abstract:

The European Union Survey on Income and Living Conditions (EU-SILC) is a popular survey which provides information on income, poverty, social exclusion and living conditions of households and individuals in the European Union. The EUSILC contains variables which may contain outliers. The presence of outliers can have an impact on the measures and indicators used by the EU-SILC. In this paper, we used data sets from various countries to analyze the presence of outliers. In addition, we obtain some indicators after removing these outliers, and a comparison between both situations can be observed. Finally, some conclusions are obtained.

Keywords: poverty line, headcount index, risk of poverty, skewness coefficient

Procedia PDF Downloads 396
10016 Problem of Services Selection in Ubiquitous Systems

Authors: Malika Yaici, Assia Arab, Betitra Yakouben, Samia Zermani

Abstract:

Ubiquitous computing is nowadays a reality through the networking of a growing number of computing devices. It allows providing users with context aware information and services in a heterogeneous environment, anywhere and anytime. Selection of the best context-aware service, between many available services and providers, is a tedious problem. In this paper, a service selection method based on Constraint Satisfaction Problem (CSP) formalism is proposed. The services are considered as variables and domains; and the user context, preferences and providers characteristics are considered as constraints. The Backtrack algorithm is used to solve the problem to find the best service and provider which matches the user requirements. Even though this algorithm has an exponential complexity, but its use guarantees that the service, that best matches the user requirements, will be found. A comparison of the proposed method with the existing solutions finishes the paper.

Keywords: ubiquitous computing, services selection, constraint satisfaction problem, backtrack algorithm

Procedia PDF Downloads 234
10015 Mediating Role of Experiential Value Added by the Sales Force

Authors: Said Echchakoui

Abstract:

This paper aims to investigate how experiential value added by the salesperson mediates the relationship between perceived salesperson source characteristics and his performance. Structural equation modelling was employed to assess the proposed research model empirically. The empirical results revealed that the three dimensions of experiential value economic benefit, service productivity and enjoyable interaction, mediated the relationship between perceived salesperson source characteristics and his performance. Managerial implications are addressed.

Keywords: sales force, experiential added value, customer perceived value, performance

Procedia PDF Downloads 428
10014 Prediction of Rolling Forces and Real Exit Thickness of Strips in the Cold Rolling by Using Artificial Neural Networks

Authors: M. Heydari Vini

Abstract:

There is a complicated relation between effective input parameters of cold rolling and output rolling force and exit thickness of strips.in many mathematical models, the effect of some rolling parameters have been ignored and the outputs have not a desirable accuracy. In the other hand, there is a special relation among input thickness of strips,the width of the strips,rolling speeds,mandrill tensions and the required exit thickness of strips with rolling force and the real exit thickness of the rolled strip. First of all, in this paper the effective parameters of cold rolling process modeled using an artificial neural network according to the optimum network achieved by using a written program in MATLAB,it has been shown that the prediction of rolling stand parameters with different properties and new dimensions attained from prior rolled strips by an artificial neural network is applicable.

Keywords: cold rolling, artificial neural networks, rolling force, real rolled thickness of strips

Procedia PDF Downloads 498
10013 Indicators of Regional Development, Case Study: Bucharest-Ilfov Region

Authors: Dan Cristian Popescu

Abstract:

The new territorial identities and global dynamics have determined a change of policies of economics, social and cultural development from a vertical to a horizontal approach, which is based on cooperation networks between institutional actors, economic operators or civil society representatives. The European integration has not only generated a different patterns of competitiveness, economic growth, concentration of attractive potential, but also disparities among regions of this country, or even in the countryside within a region. To a better understanding of the dynamics of regional development and the impact of this concept on Romania, I chose as a case study the region Bucharest-Ilfov which is analyzed on the basis of predetermined indicators and of the impact of European programs.

Keywords: regional competition, regional development, rural, urban

Procedia PDF Downloads 585
10012 The Linguistic Fingerprint in Western and Arab Judicial Applications

Authors: Asem Bani Amer

Abstract:

This study handles the linguistic fingerprint in judicial applications described in a law technicality that is recent and developing. It can be adopted to discover criminals by identifying their way of speaking and their special linguistic expressions. This is achieved by understanding the expression "linguistic fingerprint," its concept, and its extended domain, then revealing some of the linguistic fingerprint tools in Western judicial applications and deducing a technical imagination for a linguistic fingerprint in the Arabic language, which is needy for such judicial applications regarding this field, through dictionaries, language rhythm, and language structure.

Keywords: linguistic fingerprint, judicial, application, dictionary, picture, rhythm, structure

Procedia PDF Downloads 76
10011 The Effect of Low Voltage Direct Current Applications on the Growth of Microalgae Chlorella Vulgaris

Authors: Osman Kök, İlhami̇ Tüzün, Yaşar Aluç

Abstract:

This study was conducted to explore the effect of direct current (DC) applications on the growth of microalgae Chlorella vulgaris KKU71, isolated from highly saline freshwater. Experiments were implemented based upon the cross-combinations of both the intensity and duration of electric applications, generating a full factorial design of 10V, 20V, 30V, and 5s, 30s, 60s, respectively. Growth parameters of cultures were monitored on Optical Density (OD), Cell Count (CC), Chlorophyll-a, b (Chl-a, b), and Total Carotenoids (TCar). All DC-assisted treatments stimulated the growth and thus led to higher values of growth parameters such as OD, CC, Chl-a, and TCar. Monotonically increasing with the intensity and duration of DC applications, wet and dry biomass yields of the harvested algae reached their highest level at 30V-60s in all sets of treatments. In addition, this increase between DC applications was listed as C(control)<10V<20V<30V and C<5s<30s<60s. As a result, direct current applications increased the biomass.

Keywords: Chlorella Vulgaris, direct current, growth, biomass

Procedia PDF Downloads 133
10010 Cost-Based Analysis of Cloud and Traditional ERP Systems in Small and Medium Enterprises

Authors: Indu Saini, Ashu Khanna, S. K. Peddoju

Abstract:

Cloud computing is the new buzz word today attracting high interest among various domains like business enterprises, Particularly in Small and Medium Enterprises. As it is a pay-per-use model, SMEs have high expectations that adapting this model will not only make them flexible, hassle-free but also economic. In view of such expectations, this paper analyses the possibility of adapting cloud computing technologies in SMEs in light of economic concerns. In this paper, two hypotheses are developed to compare the average annual per-user costs of using Enterprise Resource Planning systems in two ways, The traditional approach and the cloud approach. A web based survey is conducted apart from the Interviews with the peers to collect the data across the selected SMEs and t-test is performed to compare both the technologies on the proposed hypothesis. Results achieved are produced and discussed.

Keywords: cloud computing, small and medium enterprises, enterprise resource solutions, interviews

Procedia PDF Downloads 331
10009 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 155
10008 A Low-Cost of Foot Plantar Shoes for Gait Analysis

Authors: Zulkifli Ahmad, Mohd Razlan Azizan, Nasrul Hadi Johari

Abstract:

This paper presents a study on development and conducting of a wearable sensor system for gait analysis measurement. For validation, the method of plantar surface measurement by force plate was prepared. In general gait analysis, force plate generally represents a studies about barefoot in whole steps and do not allow analysis of repeating movement step in normal walking and running. The measurements that were usually perform do not represent the whole daily plantar pressures in the shoe insole and only obtain the ground reaction force. The force plate measurement is usually limited a few step and it is done indoor and obtaining coupling information from both feet during walking is not easily obtained. Nowadays, in order to measure pressure for a large number of steps and obtain pressure in each insole part, it could be done by placing sensors within an insole. With this method, it will provide a method for determine the plantar pressures while standing, walking or running of a shoe wearing subject. Inserting pressure sensors in the insole will provide specific information and therefore the point of the sensor placement will result in obtaining the critical part under the insole. In the wearable shoe sensor project, the device consists left and right shoe insole with ten FSR. Arduino Mega was used as a micro-controller that read the analog input from FSR. The analog inputs were transmitted via bluetooth data transmission that gains the force data in real time on smartphone. Blueterm software which is an android application was used as an interface to read the FSR reading on the shoe wearing subject. The subject consist of two healthy men with different age and weight doing test while standing, walking (1.5 m/s), jogging (5 m/s) and running (9 m/s) on treadmill. The data obtain will be saved on the android device and for making an analysis and comparison graph.

Keywords: gait analysis, plantar pressure, force plate, earable sensor

Procedia PDF Downloads 444