Search results for: embedded discontinuities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1134

Search results for: embedded discontinuities

1074 Modeling of Gas Migration in High-Pressure–High-Temperature Fields

Authors: Deane Roehl, Roberto Quevedo

Abstract:

Gas migration from pressurized formations is a problem reported in the oil and gas industry. This means increased risks for drilling, production, well integrity, and hydrocarbon escape. Different processes can contribute to the development of pressurized formations, particularly in High-Pressure–High-Temperature (HPHT) gas fields. Over geological time-scales, the different formations of those fields have maintained and/or developed abnormal pressures owing to low permeability and the presence of an impermeable seal. However, if this seal is broken, large volumes of gas could migrate into other less pressurized formations. Three main mechanisms for gas migration have been identified in the literature –molecular diffusion, continuous-phase flow, and continuous-phase flow coupled with mechanical effects. In relation to the latter, gas migration can occur as a consequence of the mechanical effects triggered by reservoir depletion. The compaction of the reservoir can redistribute the in-situ stresses sufficiently to induce deformations that may increase the permeability of rocks and lead to fracture processes or reactivate nearby faults. The understanding of gas flow through discontinuities is still under development. However, some models based on porosity changes and fracture aperture have been developed in order to obtain enhanced permeabilities in numerical simulations. In this work, a simple relationship to integrate fluid flow through rock matrix and discontinuities has been implemented in a fully thermo-hydro-mechanical simulator developed in-house. Numerical simulations of hydrocarbon production in an HPHT field were carried out. Results suggest that rock permeability can be considerably affected by the deformation of the field, creating preferential flow paths for the transport of large volumes of gas.

Keywords: gas migration, pressurized formations, fractured rocks, numerical modeling

Procedia PDF Downloads 148
1073 Microscopic Analysis of Bulk, High-Tc Superconductors by Transmission Kikuchi Diffraction

Authors: Anjela Koblischka-Veneva, Michael R. Koblischka

Abstract:

In this contribution, the Transmission-Kikuchi Diffraction (TKD, or sometimes called t-EBSD) is applied to bulk, melt-grown YBa₂Cu₃O₇ (YBCO) superconductors prepared by the MTMG (melt-textured melt-grown) technique and the infiltration growth (IG) technique. TEM slices required for the analysis were prepared by means of Focused Ion-Beam (FIB) milling using mechanically polished sample surfaces, which enable a proper selection of the interesting regions for investigations. The required optical transparency was reached by an additional polishing step of the resulting surfaces using FIB-Ga-ion and Ar-ion milling. The improved spatial resolution of TKD enabled the investigation of the tiny YBa₂Cu₃O₅ (Y-211) particles having a diameter of about 50-100 nm embedded within the YBCO matrix and of other added secondary phase particles. With the TKD technique, the microstructural properties of the YBCO matrix are studied in detail. It is observed that the matrix shows the effects of stress/strain, depending on the size and distribution of the embedded particles, which are important for providing additional flux pinning centers in such superconducting bulk samples. Using the Kernel Average Misorientation (KAM) maps, the strain induced in the superconducting matrix around the particles, which increases the flux pinning effectivity, can be clearly revealed. This type of analysis of the EBSD/TKD data is, therefore, also important for other material systems, where nanoparticles are embedded in a matrix.

Keywords: transmission Kikuchi diffraction, EBSD, TKD, embedded particles, superconductors YBa₂Cu₃O₇

Procedia PDF Downloads 135
1072 The Design of Intelligent Classroom Management System with Raspberry PI

Authors: Sathapath Kilaso

Abstract:

Attendance checking in the classroom for student is object to record the student’s attendance in order to support the learning activities in the classroom. Despite the teaching trend in the 21st century is the student-center learning and the lecturer duty is to mentor and give an advice, the classroom learning is still important in order to let the student interact with the classmate and the lecturer or for a specific subject which the in-class learning is needed. The development of the system prototype by applied the microcontroller technology and embedded system with the “internet of thing” trend and the web socket technique will allow the lecturer to be alerted immediately whenever the data is updated.

Keywords: arduino, embedded system, classroom, raspberry PI

Procedia PDF Downloads 374
1071 Model-Based Automotive Partitioning and Mapping for Embedded Multicore Systems

Authors: Robert Höttger, Lukas Krawczyk, Burkhard Igel

Abstract:

This paper introduces novel approaches to partitioning and mapping in terms of model-based embedded multicore system engineering and further discusses benefits, industrial relevance and features in common with existing approaches. In order to assess and evaluate results, both approaches have been applied to a real industrial application as well as to various prototypical demonstrative applications, that have been developed and implemented for different purposes. Evaluations show, that such applications improve significantly according to performance, energy efficiency, meeting timing constraints and covering maintaining issues by using the AMALTHEA platform and the implemented approaches. Further- more, the model-based design provides an open, expandable, platform independent and scalable exchange format between OEMs, suppliers and developers on different levels. Our proposed mechanisms provide meaningful multicore system utilization since load balancing by means of partitioning and mapping is effectively performed with regard to the modeled systems including hardware, software, operating system, scheduling, constraints, configuration and more data.

Keywords: partitioning, mapping, distributed systems, scheduling, embedded multicore systems, model-based, system analysis

Procedia PDF Downloads 620
1070 Embedded Test Framework: A Solution Accelerator for Embedded Hardware Testing

Authors: Arjun Kumar Rath, Titus Dhanasingh

Abstract:

Embedded product development requires software to test hardware functionality during development and finding issues during manufacturing in larger quantities. As the components are getting integrated, the devices are tested for their full functionality using advanced software tools. Benchmarking tools are used to measure and compare the performance of product features. At present, these tests are based on a variety of methods involving varying hardware and software platforms. Typically, these tests are custom built for every product and remain unusable for other variants. A majority of the tests goes undocumented, not updated, unusable when the product is released. To bridge this gap, a solution accelerator in the form of a framework can address these issues for running all these tests from one place, using an off-the-shelf tests library in a continuous integration environment. There are many open-source test frameworks or tools (fuego. LAVA, AutoTest, KernelCI, etc.) designed for testing embedded system devices, with each one having several unique good features, but one single tool and framework may not satisfy all of the testing needs for embedded systems, thus an extensible framework with the multitude of tools. Embedded product testing includes board bring-up testing, test during manufacturing, firmware testing, application testing, and assembly testing. Traditional test methods include developing test libraries and support components for every new hardware platform that belongs to the same domain with identical hardware architecture. This approach will have drawbacks like non-reusability where platform-specific libraries cannot be reused, need to maintain source infrastructure for individual hardware platforms, and most importantly, time is taken to re-develop test cases for new hardware platforms. These limitations create challenges like environment set up for testing, scalability, and maintenance. A desirable strategy is certainly one that is focused on maximizing reusability, continuous integration, and leveraging artifacts across the complete development cycle during phases of testing and across family of products. To get over the stated challenges with the conventional method and offers benefits of embedded testing, an embedded test framework (ETF), a solution accelerator, is designed, which can be deployed in embedded system-related products with minimal customizations and maintenance to accelerate the hardware testing. Embedded test framework supports testing different hardwares including microprocessor and microcontroller. It offers benefits such as (1) Time-to-Market: Accelerates board brings up time with prepacked test suites supporting all necessary peripherals which can speed up the design and development stage(board bring up, manufacturing and device driver) (2) Reusability-framework components isolated from the platform-specific HW initialization and configuration makes the adaptability of test cases across various platform quick and simple (3) Effective build and test infrastructure with multiple test interface options and preintegrated with FUEGO framework (4) Continuos integration - pre-integrated with Jenkins which enabled continuous testing and automated software update feature. Applying the embedded test framework accelerator throughout the design and development phase enables to development of the well-tested systems before functional verification and improves time to market to a large extent.

Keywords: board diagnostics software, embedded system, hardware testing, test frameworks

Procedia PDF Downloads 145
1069 Mechanical Design of External Pressure Vessel to an AUV

Authors: Artur Siqueira Nóbrega de Freitas

Abstract:

The Autonomous Underwater Vehicles (AUV), as well the Remotely Operated Vehicles (ROV), are unmanned technologies used in oceanographic investigations, offshore oil extraction, military applications, among others. Differently from AUVs, ROVs uses a physical connection with the surface for energy supply e data traffic. The AUVs use batteries and embedded data acquisition systems. These technologies have progressed, supported by studies in the areas of robotics, embedded systems, naval engineering, etc. This work presents a methodology for external pressure vessel design, responsible for contain and keep the internal components of the vehicle, such as on-board electronics and sensors, isolated from contact with water, creating a pressure differential between the inner and external regions.

Keywords: vessel, external pressure, AUV, buckling

Procedia PDF Downloads 522
1068 Acquisition of Overt Pronoun Constraint in L2 Turkish by Adult Korean Speakers

Authors: Oktay Cinar

Abstract:

The aim of this study is to investigate the acquisition of Overt Pronoun Constraint (OPC) by adult Korean L2 Turkish speakers in order to find out how constraints regulating the syntax of null and overt subjects are acquired. OPC is claimed to be a universal feature of all null subject languages restricting the co-indexation between overt embedded pronoun and quantified or wh-question antecedents. However, there is no such restriction when the embedded subject is null or the antecedent is a referential subject. Considered as a principle of Universal Grammar (UG), OPC knowledge of L2 speakers has been widely tested with different language pairs. In the light of previous studies on OPC, it can be argued that L2 learners display early sensitivity to OPC constraints during their interlanguage grammar development. Concerning this, the co-indexation between overt embedded pronoun o (third person pronoun) and referential matrix subject is claimed to be controversial in Turkish, which poses problems with the universality of OPC. However, the current study argues against this claim by providing evidence from advanced Korean speakers that OPC is universal to all null subject languages and OPC knowledge can be accessed with direct access to UG. In other words, the performances of adult Korean speakers on the syntax of null and overt subjects are tested to support this claim. In order to test this, OPC task is used. 15 advanced speakers and a control group of adult native Turkish participants are instructed to determine the co-reference relationship between the subject of embedded clause, either overt pronominal o or null, and the subject of the matrix clause, either quantified pronoun and wh-question or referential antecedent. They are asked to select the interpretation of the embedded subject, either as the same person as in the matrix subject or another person who is not the same person in the matrix subject. These relations are represented with four conditions, and each condition has four questions (16 questions in total). The results claim that both control group and Korean L2 Turkish speakers display sensitivity to all constraints that OPC has, which suggests that OPC works in Turkish as well.

Keywords: adult Korean speakers, binding theory, generative second language acquisition, overt pronoun constraint

Procedia PDF Downloads 309
1067 A Comparative Study of GTC and PSP Algorithms for Mining Sequential Patterns Embedded in Database with Time Constraints

Authors: Safa Adi

Abstract:

This paper will consider the problem of sequential mining patterns embedded in a database by handling the time constraints as defined in the GSP algorithm (level wise algorithms). We will compare two previous approaches GTC and PSP, that resumes the general principles of GSP. Furthermore this paper will discuss PG-hybrid algorithm, that using PSP and GTC. The results show that PSP and GTC are more efficient than GSP. On the other hand, the GTC algorithm performs better than PSP. The PG-hybrid algorithm use PSP algorithm for the two first passes on the database, and GTC approach for the following scans. Experiments show that the hybrid approach is very efficient for short, frequent sequences.

Keywords: database, GTC algorithm, PSP algorithm, sequential patterns, time constraints

Procedia PDF Downloads 389
1066 Improving the Optoacoustic Signal by Monitoring the Changes of Coupling Medium

Authors: P. Prasannakumar, L. Myoung Young, G. Seung Kye, P. Sang Hun, S. Chul Gyu

Abstract:

In this paper, we discussed the coupling medium in the optoacoustic imaging. The coupling medium is placed between the scanned object and the ultrasound transducers. Water with varying temperature was used as the coupling medium. The water temperature is gradually varied between 25 to 40 degrees. This heating process is taken with care in order to avoid the bubble formation. Rise in the photoacoustic signal is noted through an unfocused transducer with frequency of 2.25 MHz as the temperature increases. The temperature rise is monitored using a NTC thermistor and the values in degrees are calculated using an embedded evaluation kit. Also the temperature is transmitted to PC through a serial communication. All these processes are synchronized using a trigger signal from the laser source.

Keywords: embedded, optoacoustic, ultrasound , unfocused transducer

Procedia PDF Downloads 349
1065 Development of AUTOSAR Software Components of MDPS System

Authors: Jae-Woo Kim, Kyung-Joong Lee, Hyun-Sik Ahn

Abstract:

This paper describes the development of a Motor-Driven Power Steering (MDPS) system using Automotive Open System Architecture (AUTOSAR) methodology. The MDPS system is a new power steering technology for vehicles and it can enhance driver’s convenience and fuel efficiency. AUTOSAR defines common standards for the implementation of embedded automotive software. Some aspects of safety and timing requirements are analyzed. Through the AUTOSAR methodology, the embedded software becomes more flexible, reusable and maintainable than ever. Hence, we first design software components (SW-C) for MDPS control based on AUTOSAR and implement SW-Cs for MDPS control using authoring tool following AUTOSAR standards.

Keywords: AUTOSAR, MDPS, simulink, software component

Procedia PDF Downloads 349
1064 Image Processing and Calculation of NGRDI Embedded System in Raspberry

Authors: Efren Lopez Jimenez, Maria Isabel Cajero, J. Irving-Vasqueza

Abstract:

The use and processing of digital images have opened up new opportunities for the resolution of problems of various kinds, such as the calculation of different vegetation indexes, among other things, differentiating healthy vegetation from humid vegetation. However, obtaining images from which these indexes are calculated is still the exclusive subject of active research. In the present work, we propose to obtain these images using a low cost embedded system (Raspberry Pi) and its processing, using a set of libraries of open code called OpenCV, in order to obtain the Normalized Red-Green Difference Index (NGRDI).

Keywords: Raspberry Pi, vegetation index, Normalized Red-Green Difference Index (NGRDI), OpenCV

Procedia PDF Downloads 291
1063 Politico-Religious Connections to the January 6th Insurrection

Authors: Kirk Johnson, Gabriel Rubin

Abstract:

The January 6th Insurrection on the United States Capitol Building has been one of the most disturbing expressions of violence in American history. While there are numerous reasons that led to such aggression, there are destructive politico-religious ideologies and understandings, known as Christian Nationalism, White Christian Nationalism, and Christian Dominionism that influenced the actions of the January 6th insurrectionists. Such ideas are deeply rooted in the unification of church and state, a theocracy, embedded within the understanding that Biblical scripture is the blueprint on which the functioning of the American government should follow. In addition, the concept of racial hierarchy is embedded in politico-religious principles of White Christian Nationalism. This paper will examine how Christian Dominionism is one factor that influenced the January 6th Insurrection.

Keywords: January 6th insurrection, dominionism, Christian nationalism, polygenism

Procedia PDF Downloads 77
1062 Pull-Out Analysis of Composite Loops Embedded in Steel Reinforced Concrete Retaining Wall Panels

Authors: Pierre van Tonder, Christoff Kruger

Abstract:

Modular concrete elements are used for retaining walls to provide lateral support. Depending on the retaining wall layout, these precast panels may be interlocking and may be tied into the soil backfill via geosynthetic strips. This study investigates the ultimate pull-out load increase, which is possible by adding varied diameter supplementary reinforcement through embedded anchor loops within concrete retaining wall panels. Full-scale panels used in practice have four embedded anchor points. However, only one anchor loop was embedded in the center of the experimental panels. The experimental panels had the same thickness but a smaller footprint (600mm x 600mm x 140mm) area than the full-sized panels to accommodate the space limitations of the laboratory and experimental setup. The experimental panels were also cast without any bending reinforcement as would typically be obtained in the full-scale panels. The exclusion of these reinforcements was purposefully neglected to evaluate the impact of a single bar reinforcement through the center of the anchor loops. The reinforcement bars had of 8 mm, 10 mm, 12 mm, and 12 mm. 30 samples of concrete panels with embedded anchor loops were tested. The panels were supported on the edges and the anchor loops were subjected to an increasing tensile force using an Instron piston. Failures that occurred were loop failures and panel failures and a mixture thereof. There was an increase in ultimate load vs. increasing diameter as expected, but this relationship persisted until the reinforcement diameter exceeded 10 mm. For diameters larger than 10 mm, the ultimate failure load starts to decrease due to the dependency of the reinforcement bond strength to the concrete matrix. Overall, the reinforced panels showed a 14 to 23% increase in the factor of safety. Using anchor loops of 66kN ultimate load together with Y10 steel reinforcement with bent ends had shown the most promising results in reducing concrete panel pull-out failure. The Y10 reinforcement had shown, on average, a 24% increase in ultimate load achieved. Previous research has investigated supplementary reinforcement around the anchor loops. This paper extends this investigation by evaluating supplementary reinforcement placed through the panel anchor loops.

Keywords: supplementary reinforcement, anchor loops, retaining panels, reinforced concrete, pull-out failure

Procedia PDF Downloads 195
1061 Case Study of Human Factors and Ergonomics in the Design and Use of Harness-Embedded Costumes in the Entertainment Industry

Authors: Marielle Hanley, Brandon Takahashi, Gerry Hanley, Gabriella Hancock

Abstract:

Safety harnesses and their protocols are very common within the construction industry, and the Occupational Safety and Health Administration has provided extensive guidelines with protocols being constantly updated to ensure the highest level of safety within construction sites. There is also extensive research on harnesses that are meant to keep people in place in moving vehicles, such as seatbelts. Though this research is comprehensive in these areas, the findings and recommendations are not generally applicable to other industry sectors where harnesses are used, such as the entertainment industry. The focus of this case study is on the design and use of harnesses used by theme park employees wearing elaborate costumes in parades and performances. The key factors of posture, kinesthetic factors, and harness engineering interact in significantly different ways when the user is performing repetitive choreography with 20 to 40 lbs. of apparatus connected to harnesses that need to be hidden from the audience’s view. Human factors and ergonomic analysis take into account the required performers’ behaviors, the physical and mental preparation and posture of the performer, the design of the harness-embedded costume, and the environmental conditions during the performance (e.g., wind) that can determine the physical stresses placed on the harness and performer. The uniqueness and expense of elaborate costumes frequently result in one or two costumes created for production, and a variety of different performers need to fit into the same costume. Consequently, the harnesses should be adjustable if they are to minimize the physical and cognitive loads on the performer, but they are frequently more a “one-size fits all”. The complexity of human and technology interactions produces a range of detrimental outcomes, from muscle strains to nerve damage, mental and physical fatigue, and reduced motivation to perform at peak levels. Based on observations conducted over four years for this case study, a number of recommendations to institutionalize the human factors and ergonomic analyses can significantly improve the safety, reliability, and quality of performances with harness-embedded costumes in the entertainment industry. Human factors and ergonomic analyses can be integrated into the engineering design of the performance costumes with embedded harnesses, the conditioning and training of the performers using the costumes, the choreography of the performances within the staged setting and the maintenance of the harness-embedded costumes. By applying human factors and ergonomic methodologies in the entertainment industry, the industry management and support staff can significantly reduce the risks of injury, improve the longevity of unique performers, increase the longevity of the harness-embedded costumes, and produce the desired entertainment value for audiences.

Keywords: ergonomics in entertainment industry, harness-embedded costumes, performer safety, injury prevention

Procedia PDF Downloads 90
1060 Error Amount in Viscoelasticity Analysis Depending on Time Step Size and Method used in ANSYS

Authors: A. Fettahoglu

Abstract:

Theory of viscoelasticity is used by many researchers to represent behavior of many materials such as pavements on roads or bridges. Several researches used analytical methods and rheology to predict the material behaviors of simple models. Today, more complex engineering structures are analyzed using Finite Element Method, in which material behavior is embedded by means of three dimensional viscoelastic material laws. As a result, structures of unordinary geometry and domain like pavements of bridges can be analyzed by means of Finite Element Method and three dimensional viscoelastic equations. In the scope of this study, rheological models embedded in ANSYS, namely, generalized Maxwell elements and Prony series, which are two methods used by ANSYS to represent viscoelastic material behavior, are presented explicitly. Subsequently, a practical problem, which has an analytical solution given in literature, is used to verify the applicability of viscoelasticity tool embedded in ANSYS. Finally, amount of error in the results of ANSYS is compared with the analytical results to indicate the influence of used method and time step size.

Keywords: generalized Maxwell model, finite element method, prony series, time step size, viscoelasticity

Procedia PDF Downloads 369
1059 A Dynamic Symplectic Manifold Analysis for Wave Propagation in Porous Media

Authors: K. I. M. Guerra, L. A. P. Silva, J. C. Leal

Abstract:

This study aims to understand with more amplitude and clarity the behavior of a porous medium where a pressure wave travels, translated into relative displacements inside the material, using mathematical tools derived from topology and symplectic geometry. The paper starts with a given partial differential equation based on the continuity and conservation theorems to describe the traveling wave through the porous body. A solution for this equation is proposed after all boundary, and initial conditions are fixed, and it’s accepted that the solution lies in a manifold U of purely spatial dimensions and that is embedded in the Real n-dimensional manifold, with spatial and kinetic dimensions. It’s shown that the U manifold of lower dimensions than IRna, where it is embedded, inherits properties of the vector spaces existing inside the topology it lies on. Then, a second manifold (U*), embedded in another space called IRnb of stress dimensions, is proposed and there’s a non-degenerative function that maps it into the U manifold. This relation is proved as a transformation in between two corresponding admissible solutions of the differential equation in distinct dimensions and properties, leading to a more visual and intuitive understanding of the whole dynamic process of a stress wave through a porous medium and also highlighting the dimensional invariance of Terzaghi’s theory for any coordinate system.

Keywords: poremechanics, soil dynamics, symplectic geometry, wave propagation

Procedia PDF Downloads 295
1058 Embedded Visual Perception for Autonomous Agricultural Machines Using Lightweight Convolutional Neural Networks

Authors: René A. Sørensen, Søren Skovsen, Peter Christiansen, Henrik Karstoft

Abstract:

Autonomous agricultural machines act in stochastic surroundings and therefore, must be able to perceive the surroundings in real time. This perception can be achieved using image sensors combined with advanced machine learning, in particular Deep Learning. Deep convolutional neural networks excel in labeling and perceiving color images and since the cost of high-quality RGB-cameras is low, the hardware cost of good perception depends heavily on memory and computation power. This paper investigates the possibility of designing lightweight convolutional neural networks for semantic segmentation (pixel wise classification) with reduced hardware requirements, to allow for embedded usage in autonomous agricultural machines. Using compression techniques, a lightweight convolutional neural network is designed to perform real-time semantic segmentation on an embedded platform. The network is trained on two large datasets, ImageNet and Pascal Context, to recognize up to 400 individual classes. The 400 classes are remapped into agricultural superclasses (e.g. human, animal, sky, road, field, shelterbelt and obstacle) and the ability to provide accurate real-time perception of agricultural surroundings is studied. The network is applied to the case of autonomous grass mowing using the NVIDIA Tegra X1 embedded platform. Feeding case-specific images to the network results in a fully segmented map of the superclasses in the image. As the network is still being designed and optimized, only a qualitative analysis of the method is complete at the abstract submission deadline. Proceeding this deadline, the finalized design is quantitatively evaluated on 20 annotated grass mowing images. Lightweight convolutional neural networks for semantic segmentation can be implemented on an embedded platform and show competitive performance with regards to accuracy and speed. It is feasible to provide cost-efficient perceptive capabilities related to semantic segmentation for autonomous agricultural machines.

Keywords: autonomous agricultural machines, deep learning, safety, visual perception

Procedia PDF Downloads 394
1057 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 179
1056 Development of 3D Laser Scanner for Robot Navigation

Authors: Ali Emre Öztürk, Ergun Ercelebi

Abstract:

Autonomous robotic systems needs an equipment like a human eye for their movement. Robotic camera systems, distance sensors and 3D laser scanners have been used in the literature. In this study a 3D laser scanner has been produced for those autonomous robotic systems. In general 3D laser scanners are using 2 dimension laser range finders that are moving on one-axis (1D) to generate the model. In this study, the model has been obtained by a one-dimensional laser range finder that is moving in two –axis (2D) and because of this the laser scanner has been produced cheaper. Furthermore for the laser scanner a motor driver, an embedded system control board has been used and at the same time a user interface card has been used to make the communication between those cards and computer. Due to this laser scanner, the density of the objects, the distance between the objects and the necessary path ways for the robot can be calculated. The data collected by the laser scanner system is converted in to cartesian coordinates to be modeled in AutoCAD program. This study shows also the synchronization between the computer user interface, AutoCAD and the embedded systems. As a result it makes the solution cheaper for such systems. The scanning results are enough for an autonomous robot but the scan cycle time should be developed. This study makes also contribution for further studies between the hardware and software needs since it has a powerful performance and a low cost.

Keywords: 3D laser scanner, embedded system, 1D laser range finder, 3D model

Procedia PDF Downloads 274
1055 Pullout Capacity of Hybrid Anchor Piles

Authors: P. Hari Krishna, V. Ramana Murty

Abstract:

Different types of foundations are subjected to pullout or tensile loads depending on the soil in which they are embedded or due to the structural loads coming on them. In those circumstances, anchors were generally used to resist these loads. This paper presents the field pullout studies on hybrid anchor piles embedded in different types of soils. The pullout capacity and resistance of the hybrid granular anchor piles installed in the native expansive soil which is available in the campus are compared with similar hybrid concrete anchor piles which were installed in similar field conditions.

Keywords: expansive soil, hybrid concrete anchor piles, hybrid granular anchor piles, pullout tests

Procedia PDF Downloads 410
1054 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 61
1053 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 194
1052 Radiographic Evaluation of Odontogenic Keratocyst: A 14 Years Retrospective Study

Authors: Nor Hidayah Reduwan, Jira Chindasombatjaroen, Suchaya Pornprasersuk-Damrongsri, Sopee Pomsawat

Abstract:

INTRODUCTION: Odontogenic keratocyst (OKC) remain as a controversial pathologic entity under the scrutiny of many researchers and maxillofacial surgeons alike. The high recurrence rate and relatively aggressive nature of this lesion demand a meticulous analysis of the radiographic characteristic of OKC leading to the formulation of an accurate diagnosis. OBJECTIVE: This study aims to determine the radiographic characteristic of odontogenic keratocyst (OKC) using conventional radiographs and cone beam computed tomography (CBCT) images. MATERIALS AND METHODS: Patients histopathologically diagnosed as OKC from 2003 to 2016 by Oral and Maxillofacial Pathology Department were retrospectively reviewed. Radiographs of these cases from the archives of the Department of Oral and Maxillofacial Radiology, Faculty of Dentistry Mahidol University were retrieved. Assessment of the location, shape, border, cortication, locularity, the relationship of lesion to embedded tooth, displacement of adjacent tooth, root resorption and bony expansion of the lesion were conducted. RESULTS: Radiographs of 91 patients (44 males, 47 females) with the mean age of 31 years old (10 to 84 years) were analyzed. Among all patients, 5 cases were syndromic patients. Hence, a total of 103 OKCs were studied. The most common location was at the ramus of mandible (32%) followed by posterior maxilla (29%). Most cases presented as a well-defined unilocular radiolucency with smooth and corticated border. The lesion was in associated with embedded tooth in 48 lesions (47%). Eighty five percent of embedded tooth are impacted 3rd molar. Thirty-seven percentage of embedded tooth were entirely encapsulated in the lesion. The lesion attached to the embedded tooth at the cementoenamel junction (CEJ) in 40% and extended to part of root in 23% of cases. Teeth displacement and root resorption were found in 29% and 6% of cases, respectively. Bony expansion in bucco-lingual dimension was seen in 63% of cases. CONCLUSION: OKCs were predominant in the posterior region of the mandible with radiographic features of a well-defined, unilocular radiolucency with smooth and corticated margin. The lesions might relate to an embedded tooth by surrounding an entire tooth, attached to the CEJ level or extending to part of root. Bony expansion could be found but teeth displacement and root resorption were not common. These features might help in giving the differential diagnosis.

Keywords: cone beam computed tomography, imaging dentistry, odontogenic keratocyst, radiographic features

Procedia PDF Downloads 128
1051 Building Information Models Utilization for Design Improvement of Infrastructure

Authors: Keisuke Fujioka, Yuta Itoh, Masaru Minagawa, Shunji Kusayanagi

Abstract:

In this study, building information models of the underground temporary structures and adjacent embedded pipes were constructed to show the importance of the information on underground pipes adjacent to the structures to enhance the productivity of execution of construction. Next, the bar chart used in actual construction process were employed to make the Gantt chart, and the critical pass analysis was carried out to show that accurate information on the arrangement of underground existing pipes can be used for the enhancement of the productivity of the construction of underground structures. In the analyzed project, significant construction delay was not caused by unforeseeable existence of underground pipes by the management ability of the construction manager. However, in many cases of construction executions in the developing countries, the existence of unforeseeable embedded pipes often causes substantial delay of construction. Design change based on uncertainty on the position information of embedded pipe can be also important risk for contractors in domestic construction. So CPM analyses were performed by a project-management-software to the situation that influence of the tasks causing construction delay was assumed more significant. Through the analyses, the efficiency of information management on underground pipes and BIM analysis in the design stage for workability improvement was indirectly confirmed.

Keywords: building-information modelling, construction information modelling, design improvement, infrastructure

Procedia PDF Downloads 308
1050 Some Results for F-Minimal Hypersurfaces in Manifolds with Density

Authors: M. Abdelmalek

Abstract:

In this work, we study the hypersurfaces of constant weighted mean curvature embedded in weighted manifolds. We give a condition about these hypersurfaces to be minimal. This condition is given by the ellipticity of the weighted Newton transformations. We especially prove that two compact hypersurfaces of constant weighted mean curvature embedded in space forms and with the intersection in at least a point of the boundary must be transverse. The method is based on the calculus of the matrix of the second fundamental form in a boundary point and then the matrix associated with the Newton transformations. By equality, we find the weighted elementary symmetric function on the boundary of the hypersurface. We give in the end some examples and applications. Especially in Euclidean space, we use the above result to prove the Alexandrov spherical caps conjecture for the weighted case.

Keywords: weighted mean curvature, weighted manifolds, ellipticity, Newton transformations

Procedia PDF Downloads 93
1049 Self-Organization-Based Approach for Embedded Real-Time System Design

Authors: S. S. Bendib, L. W. Mouss, S. Kalla

Abstract:

This paper proposes a self-organization-based approach for real-time systems design. The addressed issue is the mapping of an application onto an architecture of heterogeneous processors while optimizing both makespan and reliability. Since this problem is NP-hard, a heuristic algorithm is used to obtain efficiently approximate solutions. The proposed approach takes into consideration the quality as well as the diversity of solutions. Indeed, an alternate treatment of the two objectives allows to produce solutions of good quality while a self-organization approach based on the neighborhood structure is used to reorganize solutions and consequently to enhance their diversity. Produced solutions make different compromises between the makespan and the reliability giving the user the possibility to select the solution suited to his (her) needs.

Keywords: embedded real-time systems design, makespan, reliability, self-organization, compromises

Procedia PDF Downloads 134
1048 Coding Considerations for Standalone Molecular Dynamics Simulations of Atomistic Structures

Authors: R. O. Ocaya, J. J. Terblans

Abstract:

The laws of Newtonian mechanics allow ab-initio molecular dynamics to model and simulate particle trajectories in material science by defining a differentiable potential function. This paper discusses some considerations for the coding of ab-initio programs for simulation on a standalone computer and illustrates the approach by C language codes in the context of embedded metallic atoms in the face-centred cubic structure. The algorithms use velocity-time integration to determine particle parameter evolution for up to several thousands of particles in a thermodynamical ensemble. Such functions are reusable and can be placed in a redistributable header library file. While there are both commercial and free packages available, their heuristic nature prevents dissection. In addition, developing own codes has the obvious advantage of teaching techniques applicable to new problems.

Keywords: C language, molecular dynamics, simulation, embedded atom method

Procedia PDF Downloads 305
1047 Abandoning 'One-Time' Optional Information Literacy Workshops for Year 1 Medical Students and Gearing towards an 'Embedded Librarianship' Approach

Authors: R. L. David, E. C. P. Tan, M. A. Ferenczi

Abstract:

This study aimed to investigate the effect of a 'one-time' optional Information Literacy (IL) workshop to enhance Year 1 medical students' literature search, writing, and citation management skills as directed by a customized five-year IL framework developed for LKC Medicine students. At the end of the IL workshop, the overall rated 'somewhat difficult' when finding, citing, and using information from sources. The study method is experimental using a standardized IL test to study the cohort effect of a 'one-time' optional IL workshop on Year 1 students; experimental group in comparison to Year 2 students; control group. Test scores from both groups were compared and analyzed using mean scores and one-way analysis of variance (ANOVA). Unexpectedly, there were no statistically significant differences between group means as determined by One-Way ANOVA (F₁,₁₉₃ = 3.37, p = 0.068, ηp² = 0.017). Challenges and shortfalls posed by 'one-time' interventions raised a rich discussion to adopt an 'embedded librarianship' approach, which shifts the medial librarians' role into the curriculum and uses Team Based Learning to teach IL skills to medical students. The customized five-year IL framework developed for LKC Medicine students becomes a useful librarian-faculty model for embedding and bringing IL into the classroom.

Keywords: information literacy, 'one-time' interventions, medical students, standardized tests, embedded librarianship, curriculum, medical librarians

Procedia PDF Downloads 113
1046 Modeling Acceptability of a Personalized and Contextualized Radio Embedded in Vehicles

Authors: Ludivine Gueho, Sylvain Fleury, Eric Jamet

Abstract:

Driver distraction is known to be a major contributing factor of car accidents. Since many years, constructors have been designing embedded technologies to face this problem and reduce distraction. Being able to predict user acceptance would further be helpful in the development process to build appropriate systems. The present research aims at modelling the acceptability of a specific system, an innovative personalized and contextualized embedded radio, through an online survey of 202 people in France that assessed the psychological variables determining intentions to use the system. The questionnaire instantiated the dimensions of the extended version of the UTAUT acceptability model. Because of the specific features of the system assessed, we added 4 dimensions: perceived security, anxiety, trust and privacy concerns. Results showed that hedonic motivation, i.e., the fun or pleasure derived from using a technology, and performance expectancy, i.e., the degree to which individuals believe that the characteristics of the system meet their needs, are the most important dimensions in determining behavioral intentions about the innovative radio. To a lesser extent, social influence, i.e., the degree to which individuals think they can use the system while respecting their social group’s norms and while giving a positive image of themselves, had an effect on behavioral intentions. Moreover, trust, that is, the positive belief about the perceived reliability of, dependability of, and confidence in a person, object or process, had a significant effect, mediated by performance expectancy. In an applicative way, the present research reveals that, to be accepted, in-car embedded new technology has to address individual needs, for instance by facilitating the driving activity or by providing useful information. If it shows hedonic qualities by being entertaining, pretty or comfortable, this may improve the intentions to use it. Therefore, it is clearly important to include reflection about user experience in the design process. Finally, the users have to be reassured on the system’s reliability. For example, improving the transparency of the system by providing information about the system functioning, could improve trust. These results bring some highlights on determinant of acceptance of an in-vehicle technology and are useful for constructors to design acceptable systems.

Keywords: acceptability, innovative embedded radio, structural equation, user-centric evaluation, UTAUT

Procedia PDF Downloads 269
1045 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography

Authors: Mohammed Salem Atoum

Abstract:

The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.

Keywords: XLSB, scrambling, audio steganography, security

Procedia PDF Downloads 363