Search results for: perception control system security strategy
30162 PID Sliding Mode Control with Sliding Surface Dynamics based Continuous Control Action for Robotic Systems
Authors: Wael M. Elawady, Mohamed F. Asar, Amany M. Sarhan
Abstract:
This paper adopts a continuous sliding mode control scheme for trajectory tracking control of robot manipulators with structured and unstructured uncertain dynamics and external disturbances. In this algorithm, the equivalent control in the conventional sliding mode control is replaced by a PID control action. Moreover, the discontinuous switching control signal is replaced by a continuous proportional-integral (PI) control term such that the implementation of the proposed control algorithm does not require the prior knowledge of the bounds of unknown uncertainties and external disturbances and completely eliminates the chattering phenomenon of the conventional sliding mode control approach. The closed-loop system with the adopted control algorithm has been proved to be globally stable by using Lyapunov stability theory. Numerical simulations using the dynamical model of robot manipulators with modeling uncertainties demonstrate the superiority and effectiveness of the proposed approach in high speed trajectory tracking problems.Keywords: PID, robot, sliding mode control, uncertainties
Procedia PDF Downloads 50830161 Ontology-Based Backpropagation Neural Network Classification and Reasoning Strategy for NoSQL and SQL Databases
Authors: Hao-Hsiang Ku, Ching-Ho Chi
Abstract:
Big data applications have become an imperative for many fields. Many researchers have been devoted into increasing correct rates and reducing time complexities. Hence, the study designs and proposes an Ontology-based backpropagation neural network classification and reasoning strategy for NoSQL big data applications, which is called ON4NoSQL. ON4NoSQL is responsible for enhancing the performances of classifications in NoSQL and SQL databases to build up mass behavior models. Mass behavior models are made by MapReduce techniques and Hadoop distributed file system based on Hadoop service platform. The reference engine of ON4NoSQL is the ontology-based backpropagation neural network classification and reasoning strategy. Simulation results indicate that ON4NoSQL can efficiently achieve to construct a high performance environment for data storing, searching, and retrieving.Keywords: Hadoop, NoSQL, ontology, back propagation neural network, high distributed file system
Procedia PDF Downloads 26230160 Beef Cattle Farmers Perception toward Urea Mineral Molasses Block
Authors: Veronica Sri Lestari, Djoni Prawira Rahardja, Tanrigiling Rasyid, Aslina Asnawi, Ikrar Muhammad Saleh, Ilham Rasyid
Abstract:
Urea Mineral Molasses Block is very important for beef cattle, because it can increase beef production. The purpose of this research was to know beef cattle farmers’ perception towards Urea Mineral Molasses Block (UMMB). This research was conducted in Gowa Regency, South Sulawesi, Indonesia in 2016. The population of this research were all beef cattle farmers. Sample was chosen through purposive sampling. Data were collected through observation and face to face with deep interview using questionnaire. Variables of perception consisted of relative advantage, compatibility, complexity, observability and triability. There were 10 questions. The answer for each question was scored by 1, 2, 3 which refer to disagree, agree enough, strongly agree. The data were analyzed descriptively using frequency distribution. The research revealed that beef cattle farmers’ perception towards UMMB was categorized as strongly agree.Keywords: beef cattle, farmers, perception, urea mineral molasses block
Procedia PDF Downloads 34730159 User Authentication Using Graphical Password with Sound Signature
Authors: Devi Srinivas, K. Sindhuja
Abstract:
This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.Keywords: security, graphical password, persuasive cued click points
Procedia PDF Downloads 53730158 Research on Transmission Parameters Determination Method Based on Dynamic Characteristic Analysis
Authors: Baoshan Huang, Fanbiao Bao, Bing Li, Lianghua Zeng, Yi Zheng
Abstract:
Parameter control strategy based on statistical characteristics can analyze the choice of the transmission ratio of an automobile transmission. According to the difference of the transmission gear, the number and spacing of the gear can be determined. Transmission ratio distribution of transmission needs to satisfy certain distribution law. According to the statistic characteristics of driving parameters, the shift control strategy of the vehicle is analyzed. CVT shift schedule adjustment algorithm based on statistical characteristic parameters can be seen from the above analysis, if according to the certain algorithm to adjust the size of, can adjust the target point are in the best efficiency curve and dynamic curve between the location, to alter the vehicle characteristics. Based on the dynamic characteristics and the practical application of the vehicle, this paper presents the setting scheme of the transmission ratio.Keywords: vehicle dynamics, transmission ratio, transmission parameters, statistical characteristics
Procedia PDF Downloads 40430157 Back Stepping Sliding Mode Control of Blood Glucose for Type I Diabetes
Authors: N. Tadrisi Parsa, A. R. Vali, R. Ghasemi
Abstract:
Diabetes is a growing health problem in worldwide. Especially, the patients with Type 1 diabetes need strict glycemic control because they have deficiency of insulin production. This paper attempts to control blood glucose based on body mathematical body model. The Bergman minimal mathematical model is used to develop the nonlinear controller. A novel back-stepping based sliding mode control (B-SMC) strategy is proposed as a solution that guarantees practical tracking of a desired glucose concentration. In order to show the performance of the proposed design, it is compared with conventional linear and fuzzy controllers which have been done in previous researches. The numerical simulation result shows the advantages of sliding mode back stepping controller design to linear and fuzzy controllers.Keywords: bergman model, nonlinear control, back stepping, sliding mode control
Procedia PDF Downloads 38230156 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map
Authors: Hongmin Deng, Qionghua Wang
Abstract:
A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID
Procedia PDF Downloads 40130155 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019
Authors: Anas Abdulrahman A. Almiman
Abstract:
In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic
Procedia PDF Downloads 19730154 Technical Aspects of Closing the Loop in Depth-of-Anesthesia Control
Authors: Gorazd Karer
Abstract:
When performing a diagnostic procedure or surgery in general anesthesia (GA), a proper introduction and dosing of anesthetic agents are one of the main tasks of the anesthesiologist. However, depth of anesthesia (DoA) also seems to be a suitable process for closed-loop control implementation. To implement such a system, one must be able to acquire the relevant signals online and in real-time, as well as stream the calculated control signal to the infusion pump. However, during a procedure, patient monitors and infusion pumps are purposely unable to connect to an external (possibly medically unapproved) device for safety reasons, thus preventing closed-loop control. The paper proposes a conceptual solution to the aforementioned problem. First, it presents some important aspects of contemporary clinical practice. Next, it introduces the closed-loop-control-system structure and the relevant information flow. Focusing on transferring the data from the patient to the computer, it presents a non-invasive image-based system for signal acquisition from a patient monitor for online depth-of-anesthesia assessment. Furthermore, it introduces a UDP-based communication method that can be used for transmitting the calculated anesthetic inflow to the infusion pump. The proposed system is independent of a medical device manufacturer and is implemented in Matlab-Simulink, which can be conveniently used for DoA control implementation. The proposed scheme has been tested in a simulated GA setting and is ready to be evaluated in an operating theatre. However, the proposed system is only a step towards a proper closed-loop control system for DoA, which could routinely be used in clinical practice.Keywords: closed-loop control, depth of anesthesia (DoA), modeling, optical signal acquisition, patient state index (PSi), UDP communication protocol
Procedia PDF Downloads 21730153 Neural Adaptive Controller for a Class of Nonlinear Pendulum Dynamical System
Authors: Mohammad Reza Rahimi Khoygani, Reza Ghasemi
Abstract:
In this paper, designing direct adaptive neural controller is applied for a class of a nonlinear pendulum dynamic system. The radial basis function (RBF) is used for the Neural network (NN). The adaptive neural controller is robust in presence of external and internal uncertainties. Both the effectiveness of the controller and robustness against disturbances are the merits of this paper. The promising performance of the proposed controllers investigates in simulation results.Keywords: adaptive control, pendulum dynamical system, nonlinear control, adaptive neural controller, nonlinear dynamical, neural network, RBF, driven pendulum, position control
Procedia PDF Downloads 67030152 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics
Authors: Gizem Ertürk, Nursena Dinç
Abstract:
The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.Keywords: migration, biopolitics, Frontex, security, European union, securitization
Procedia PDF Downloads 13830151 6-Degree-Of-Freedom Spacecraft Motion Planning via Model Predictive Control and Dual Quaternions
Authors: Omer Burak Iskender, Keck Voon Ling, Vincent Dubanchet, Luca Simonini
Abstract:
This paper presents Guidance and Control (G&C) strategy to approach and synchronize with potentially rotating targets. The proposed strategy generates and tracks a safe trajectory for space servicing missions, including tasks like approaching, inspecting, and capturing. The main objective of this paper is to validate the G&C laws using a Hardware-In-the-Loop (HIL) setup with realistic rendezvous and docking equipment. Throughout this work, the assumption of full relative state feedback is relaxed by onboard sensors that bring realistic errors and delays and, while the proposed closed loop approach demonstrates the robustness to the above mentioned challenge. Moreover, G&C blocks are unified via the Model Predictive Control (MPC) paradigm, and the coupling between translational motion and rotational motion is addressed via dual quaternion based kinematic description. In this work, G&C is formulated as a convex optimization problem where constraints such as thruster limits and the output constraints are explicitly handled. Furthermore, the Monte-Carlo method is used to evaluate the robustness of the proposed method to the initial condition errors, the uncertainty of the target's motion and attitude, and actuator errors. A capture scenario is tested with the robotic test bench that has onboard sensors which estimate the position and orientation of a drifting satellite through camera imagery. Finally, the approach is compared with currently used robust H-infinity controllers and guidance profile provided by the industrial partner. The HIL experiments demonstrate that the proposed strategy is a potential candidate for future space servicing missions because 1) the algorithm is real-time implementable as convex programming offers deterministic convergence properties and guarantee finite time solution, 2) critical physical and output constraints are respected, 3) robustness to sensor errors and uncertainties in the system is proven, 4) couples translational motion with rotational motion.Keywords: dual quaternion, model predictive control, real-time experimental test, rendezvous and docking, spacecraft autonomy, space servicing
Procedia PDF Downloads 14630150 Sensor Validation Using Bottleneck Neural Network and Variable Reconstruction
Authors: Somia Bouzid, Messaoud Ramdani
Abstract:
The success of any diagnosis strategy critically depends on the sensors measuring process variables. This paper presents a detection and diagnosis sensor faults method based on a Bottleneck Neural Network (BNN). The BNN approach is used as a statistical process control tool for drinking water distribution (DWD) systems to detect and isolate the sensor faults. Variable reconstruction approach is very useful for sensor fault isolation, this method is validated in simulation on a nonlinear system: actual drinking water distribution system. Several results are presented.Keywords: fault detection, localization, PCA, NLPCA, auto-associative neural network
Procedia PDF Downloads 38930149 The Role of Reading Self-Efficacy and Perception of Difficulty in English Reading among Chinese ESL Learners
Authors: Kevin Chan, Kevin K. H. Chung, Patcy P. S. Yeung, H. L. Ip, Bill T. C. Chung, Karen M. K. Chung
Abstract:
Purpose: Recent evidence shows that reading self-efficacy and students perceived difficulty in reading are significantly associated with word reading and reading fluency. However, little is known about these relationships among students learning to read English as a second language, particularly in Chinese students. This study examined the contributions of reading self-efficacy, perception of difficulty in reading, and cognitive-linguistic skills to performance on English word reading and reading fluency in Chinese students. Method: A sample of 122 second-and third-grade students in Hong Kong, China, participated in this study. Students completed the measures of reading self-efficacy and perception of difficulty in reading. They were assessed on their English cognitive-linguistic and reading skills: rapid automatized naming, nonword reading, phonological awareness, word reading, and one-minute word reading. Results: Results of path analysis indicated that when students’ grades were controlled, reading self-efficacy was a significant correlate of word reading and reading fluency, whereas perception of difficulty in reading negatively predicted word reading. Conclusion: These findings underscore the importance of taking students’ reading self-efficacy and perception of difficulty in reading and their cognitive-linguistic skills into consideration when designing reading intervention and instructions for students learning English as a second language.Keywords: self-efficacy, perception of difficulty in reading, english as a second language, word reading
Procedia PDF Downloads 18930148 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 8430147 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project
Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth
Abstract:
Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security
Procedia PDF Downloads 43730146 Language Learning Strategies of Chinese Students at Suan Sunandha Rajabhat University in Thailand
Authors: Gunniga Anugkakul, Suwaree Yordchim
Abstract:
The objectives were to study language learning strategies (LLSs) employed by Chinese students, and the frequency of LLSs they used, and examine the relationship between the use of LLSs and gender. The Strategy Inventory for Language Learning (SILL) by Oxford was administered to thirty-six Chinese students at Suan Sunandha Rajabhat University in Thailand. The data obtained was analyzed using descriptive statistics and chi-square tests. Three useful findings were found on the use of LLSs reported by Chinese students. First, Chinese students used overall LLSs at a high level. Second, among the six strategy groups, Chinese students employed compensation strategy most frequently and memory strategy least frequently. Third, the research results also revealed that gender had significant effect on Chinese Student’s use of overall LLSs.Keywords: English language, language learning strategy, Chinese students, compensation strategy
Procedia PDF Downloads 67930145 Development of a Drive Cycle Based Control Strategy for the KIIRA-EV SMACK Hybrid
Authors: Richard Madanda, Paul Isaac Musasizi, Sandy Stevens Tickodri-Togboa, Doreen Orishaba, Victor Tumwine
Abstract:
New vehicle concepts targeting specific geographical markets are designed to satisfy a unique set of road and load requirements. The KIIRA-EV SMACK (KES) hybrid vehicle is designed in Uganda for the East African market. The engine and generator added to the KES electric power train serve both as the range extender and the power assist. In this paper, the design consideration taken to achieve the proper management of the on-board power from the batteries and engine-generator based on the specific drive cycle are presented. To harness the fuel- efficiency benefits of the power train, a specific control philosophy operating the engine and generator at the most efficient speed- torque and speed-power regions is presented. By using a suitable model developed in MATLAB using Simulink and Stateflow, preliminary results show that the steady-state response of the vehicle for a particular hypothetical drive cycle mimicking the expected drive conditions in the city and highway traffic is sufficient.Keywords: control strategy, drive cycle, hybrid vehicle, simulation
Procedia PDF Downloads 38030144 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels
Authors: Malul Miki, Rafi Bar-El, Eithan Hourie
Abstract:
In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.Keywords: calling, loss aversion, job security, status quo bias
Procedia PDF Downloads 10430143 Speech Perception by Monolingual and Bilingual Dravidian Speakers under Adverse Listening Conditions
Authors: S. B. Rathna Kumar, Sale Kranthi, Sandya K. Varudhini
Abstract:
The precise perception of spoken language is influenced by several variables, including the listeners’ native language, distance between speaker and listener, reverberation and background noise. When noise is present in an acoustic environment, it masks the speech signal resulting in reduction in the redundancy of the acoustic and linguistic cues of speech. There is strong evidence that bilinguals face difficulty in speech perception for their second language compared with monolingual speakers under adverse listening conditions such as presence of background noise. This difficulty persists even for speakers who are highly proficient in their second language and is greater in those who have learned the second language later in life. The present study aimed to assess the performance of monolingual (Telugu speaking) and bilingual (Tamil as first language and Telugu as second language) speakers on Telugu speech perception task under quiet and noisy environments. The results indicated that both the groups performed similar in both quiet and noisy environments. The findings of the present study are not in accordance with the findings of previous studies which strongly report poorer speech perception in adverse listening conditions such as noise with bilingual speakers for their second language compared with monolinguals.Keywords: monolingual, bilingual, second language, speech perception, quiet, noise
Procedia PDF Downloads 38930142 Effect of Self-Questioning Strategy on the Improvement of Reading Comprehension of ESL Learners
Authors: Muhammad Hamza
Abstract:
This research is based on the effect of self-questioning strategy on reading comprehension of second language learners at medium level. This research is conducted to find out the effects of self-questioning strategy and how self-questioning strategy helps English learners to improve their reading comprehension. In this research study the researcher has analyzed that how much self-questioning is effective in the field of learning second language and how much it helps second language learners to improve their reading comprehension. For this purpose, the researcher has studied different reading strategies, analyzed, collected data from certificate level class at NUML, Peshawar campus and then found out the effects of self-questioning strategy on reading comprehension of ESL learners. The researcher has randomly selected the participants from certificate class. The data was analyzed through pre-test and post-test and then in the final stage the results of both tests were compared. After the pre-test and post-test, the result of both pre-test and post-test indicated that if the learners start to use self-questioning strategy before reading a text, while reading a text and after reading a particular text there’ll be improvement in comprehension level of ESL learners. The present research has addressed the benefits of self-questioning strategy by taking two tests (pre and post-test).After the result of post-test it is revealed that the use of the self-questioning strategy has a significant effect on the readers’ comprehension thus, they can improve their reading comprehension by using self-questioning strategy.Keywords: strategy, self-questioning, comprehension, intermediate level ESL learner
Procedia PDF Downloads 6630141 Automated Marker Filling System
Authors: Pinisetti Swami Sairam, Meera C. S.
Abstract:
Marker pens are widely used all over the world, mainly in educational institutions due to their neat, accurate and easily erasable nature. But refilling the ink in these pens is a tedious and time consuming job. Besides, it requires careful handling of the pens and ink bottle. A fully automated marker filling system is a solution developed to overcome this problem. The system comprises of pneumatics and electronics modules as well as PLC control. The system design is done in such a way that the empty markers are dumped in a marker container which then sent through different modules of the system in order to refill it automatically. The filled markers are then collected in a marker container. Refilling of ink takes place in different stages inside the system. An ink detecting system detects the colour of the marker which is to be filled and then refilling is done. The processes like capping and uncapping of the cap as well as screwing and unscrewing of the tip are done with the help of robotic arm and gripper. We make use of pneumatics in this system in order to get the precision while performing the capping, screwing, and refilling operations. Thus with the help of this system we can achieve cleanliness, accuracy, effective and time saving in the process of filling a marker.Keywords: automated system, market filling, information technology, control and automation
Procedia PDF Downloads 49830140 Hybrid Control Strategy for Nine-Level Asymmetrical Cascaded H-Bridge Inverter
Authors: Bachir Belmadani, Rachid Taleb, M’hamed Helaimi
Abstract:
Multilevel inverters are well used in high power electronic applications because of their ability to generate a very good quality of waveforms, reducing switching frequency, and their low voltage stress across the power devices. This paper presents the hybrid pulse-width modulation (HPWM) strategy of a uniform step asymmetrical cascaded H-bridge nine-level Inverter (USACHB9LI). The HPWM approach is compared to the well-known sinusoidal pulse-width modulation (SPWM) strategy. Simulation results demonstrate the better performances and technical advantages of the HPWM controller in feeding a high power induction motor.Keywords: uniform step asymmetrical cascaded h-bridge high-level inverter, hybrid pwm, sinusoidal pwm, high power induction motor
Procedia PDF Downloads 57130139 Active Power Flow Control Using a TCSC Based Backstepping Controller in Multimachine Power System
Authors: Naimi Abdelhamid, Othmane Abdelkhalek
Abstract:
With the current rise in the demand of electrical energy, present-day power systems which are large and complex, will continue to grow in both size and complexity. Flexible AC Transmission System (FACTS) controllers provide new facilities, both in steady state power flow control and dynamic stability control. Thyristor Controlled Series Capacitor (TCSC) is one of FACTS equipment, which is used for power flow control of active power in electric power system and for increase of capacities of transmission lines. In this paper, a Backstepping Power Flow Controller (BPFC) for TCSC in multimachine power system is developed and tested. The simulation results show that the TCSC proposed controller is capable of controlling the transmitted active power and improving the transient stability when compared with conventional PI Power Flow Controller (PIPFC).Keywords: FACTS, thyristor controlled series capacitor (TCSC), backstepping, BPFC, PIPFC
Procedia PDF Downloads 53030138 MPC of Single Phase Inverter for PV System
Authors: Irtaza M. Syed, Kaamran Raahemifar
Abstract:
This paper presents a model predictive control (MPC) of a utility interactive (UI) single phase inverter (SPI) for a photovoltaic (PV) system at residential/distribution level. The proposed model uses single-phase phase locked loop (PLL) to synchronize SPI with the grid and performs MPC control in a dq reference frame. SPI model consists of boost converter (BC), maximum power point tracking (MPPT) control, and a full bridge (FB) voltage source inverter (VSI). No PI regulators to tune and carrier and modulating waves are required to produce switching sequence. Instead, the operational model of VSI is used to synthesize sinusoidal current and track the reference. Model is validated using a three kW PV system at the input of UI-SPI in Matlab/Simulink. Implementation and results demonstrate simplicity and accuracy, as well as reliability of the model.Keywords: phase locked loop, voltage source inverter, single phase inverter, model predictive control, Matlab/Simulink
Procedia PDF Downloads 53230137 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 13230136 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking
Authors: Handie Pramana Putra, Ani Dijah Rahajoe
Abstract:
The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.Keywords: database, data analysis, DPNE, extended data flow, e-commerce
Procedia PDF Downloads 5630135 Personalized Email Marketing Strategy: A Reinforcement Learning Approach
Authors: Lei Zhang, Tingting Xu, Jun He, Zhenyu Yan
Abstract:
Email marketing is one of the most important segments of online marketing. It has been proved to be the most effective way to acquire and retain customers. The email content is vital to customers. Different customers may have different familiarity with a product, so a successful marketing strategy must personalize email content based on individual customers’ product affinity. In this study, we build our personalized email marketing strategy with three types of emails: nurture, promotion, and conversion. Each type of email has a different influence on customers. We investigate this difference by analyzing customers’ open rates, click rates and opt-out rates. Feature importance from response models is also analyzed. The goal of the marketing strategy is to improve the click rate on conversion-type emails. To build the personalized strategy, we formulate the problem as a reinforcement learning problem and adopt a Q-learning algorithm with variations. The simulation results show that our model-based strategy outperforms the current marketer’s strategy.Keywords: email marketing, email content, reinforcement learning, machine learning, Q-learning
Procedia PDF Downloads 19430134 Control of Photovoltaic System Interfacing Grid
Authors: Zerzouri Nora
Abstract:
In this paper, author presented the generalities of a photovoltaic system study and simulation. Author inserted the DC-DC converter to raise the voltage level and improve the operation of the PV panel by continuing the operating point at maximum power by using the Perturb and Observe technique (P&O). The connection to the network is made by inserting a three-phase voltage inverter allowing synchronization with the network the inverter is controlled by a PWM control. The simulation results allow the author to visualize the operation of the different components of the system, as well as the behavior of the system during the variation of meteorological values.Keywords: photovoltaic generator PV, boost converter, P&O MPPT, PWM inverter, three phase grid
Procedia PDF Downloads 11930133 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 684