Search results for: user equipment (UE)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3633

Search results for: user equipment (UE)

1563 A Framework to Assess the Maturity of Customer Involvement in the Service Design of Product-Service Systems

Authors: Taghreed Abu-Salim

Abstract:

This paper develops and investigates a framework for the assessment of customer involvement in the service design process of result oriented product-service systems in order to improve the service offering in a business to business (B2B) context. The framework comprises five main criteria and fifteen sub-criteria that contribute to customer involvement in a hierarchy using a maturity grid to highlight the strengths and weaknesses for each criterion. To develop the customer involvement framework, an extensive literature review related to service design, result oriented product-service system (PSS) and customer involvement in service design was carried out. Key factors that significantly influence customer involvement from industry and literature were identified to develop an initial framework. This framework was tested in six companies from four different sectors of industry: district cooling, medical equipment, transportation and oil storage. Validation of the framework was carried out using expert opinions and industrial case studies. A major contribution of the developed framework includes a hierarchy of appropriate criteria for assessing customer involvement in the service design process within results oriented PSS; the definition of four maturity levels which are suitable to describe the whole spectrum of customer involvement in the service design process; and finally, The paper concludes by enabling service providers to: take proactive decisions; screen and evaluate new services; improve perceived service quality; and provide barriers against imitation.

Keywords: customer involvement, maturity grid, new service development, result oriented product-service system, service design

Procedia PDF Downloads 519
1562 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information

Authors: A. Preetha Priyadharshini, S. B. M. Priya

Abstract:

In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.

Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information

Procedia PDF Downloads 804
1561 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography

Procedia PDF Downloads 227
1560 Monitoring System for Electronic Procurement Systems

Authors: Abdulah Fajar

Abstract:

Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.

Keywords: procurement system, SNMP, LKPP, LPSE

Procedia PDF Downloads 411
1559 5G Future Hyper-Dense Networks: An Empirical Study and Standardization Challenges

Authors: W. Hashim, H. Burok, N. Ghazaly, H. Ahmad Nasir, N. Mohamad Anas, A. F. Ismail, K. L. Yau

Abstract:

Future communication networks require devices that are able to work on a single platform but support heterogeneous operations which lead to service diversity and functional flexibility. This paper proposes two cognitive mechanisms termed cognitive hybrid function which is applied in multiple broadband user terminals in order to maintain reliable connectivity and preventing unnecessary interferences. By employing such mechanisms especially for future hyper-dense network, we can observe their performances in terms of optimized speed and power saving efficiency. Results were obtained from several empirical laboratory studies. It was found that selecting reliable network had shown a better optimized speed performance up to 37% improvement as compared without such function. In terms of power adjustment, our evaluation of this mechanism can reduce the power to 5dB while maintaining the same level of throughput at higher power performance. We also discuss the issues impacting future telecommunication standards whenever such devices get in place.

Keywords: dense network, intelligent network selection, multiple networks, transmit power adjustment

Procedia PDF Downloads 364
1558 A Real-Time Simulation Environment for Avionics Software Development and Qualification

Authors: Ferdinando Montemari, Antonio Vitale, Nicola Genito, Luca Garbarino, Urbano Tancredi, Domenico Accardo, Michele Grassi, Giancarmine Fasano, Anna Elena Tirri

Abstract:

The development of guidance, navigation and control algorithms and avionic procedures requires the disposability of suitable analysis and verification tools, such as simulation environments, which support the design process and allow detecting potential problems prior to the flight test, in order to make new technologies available at reduced cost, time and risk. This paper presents a simulation environment for avionic software development and qualification, especially aimed at equipment for general aviation aircrafts and unmanned aerial systems. The simulation environment includes models for short and medium-range radio-navigation aids, flight assistance systems, and ground control stations. All the software modules are able to simulate the modeled systems both in fast-time and real-time tests, and were implemented following component oriented modeling techniques and requirement based approach. The paper describes the specific models features, the architectures of the implemented software systems and its validation process. Performed validation tests highlighted the capability of the simulation environment to guarantee in real-time the required functionalities and performance of the simulated avionics systems, as well as to reproduce the interaction between these systems, thus permitting a realistic and reliable simulation of a complete mission scenario.

Keywords: ADS-B, avionics, NAVAIDs, real-time simulation, TCAS, UAS ground control station

Procedia PDF Downloads 212
1557 Bone Fracture Detection with X-Ray Images Using Mobilenet V3 Architecture

Authors: Ashlesha Khanapure, Harsh Kashyap, Abhinav Anand, Sanjana Habib, Anupama Bidargaddi

Abstract:

Technologies that are developing quickly are being developed daily in a variety of disciplines, particularly the medical field. For the purpose of detecting bone fractures in X-ray pictures of different body segments, our work compares the ResNet-50 and MobileNetV3 architectures. It evaluates accuracy and computing efficiency with X-rays of the elbow, hand, and shoulder from the MURA dataset. Through training and validation, the models are evaluated on normal and fractured images. While ResNet-50 showcases superior accuracy in fracture identification, MobileNetV3 showcases superior speed and resource optimization. Despite ResNet-50’s accuracy, MobileNetV3’s swifter inference makes it a viable choice for real-time clinical applications, emphasizing the importance of balancing computational efficiency and accuracy in medical imaging. We created a graphical user interface (GUI) for MobileNet V3 model bone fracture detection. This research underscores MobileNetV3’s potential to streamline bone fracture diagnoses, potentially revolutionizing orthopedic medical procedures and enhancing patient care.

Keywords: CNN, MobileNet V3, ResNet-50, healthcare, MURA, X-ray, fracture detection

Procedia PDF Downloads 37
1556 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 102
1555 A Two Level Load Balancing Approach for Cloud Environment

Authors: Anurag Jain, Rajneesh Kumar

Abstract:

Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling

Procedia PDF Downloads 414
1554 Application of Powder Metallurgy Technologies for Gas Turbine Engine Wheel Production

Authors: Liubov Magerramova, Eugene Kratt, Pavel Presniakov

Abstract:

A detailed analysis has been performed for several schemes of Gas Turbine Wheels production based on additive and powder technologies including metal, ceramic, and stereolithography 3-D printing. During the process of development and debugging of gas turbine engine components, different versions of these components must be manufactured and tested. Cooled blades of the turbine are among of these components. They are usually produced by traditional casting methods. This method requires long and costly design and manufacture of casting molds. Moreover, traditional manufacturing methods limit the design possibilities of complex critical parts of engine, so capabilities of Powder Metallurgy Techniques (PMT) were analyzed to manufacture the turbine wheel with air-cooled blades. PMT dramatically reduce time needed for such production and allow creating new complex design solutions aimed at improving the technical characteristics of the engine: improving fuel efficiency and environmental performance, increasing reliability, and reducing weight. To accelerate and simplify the blades manufacturing process, several options based on additive technologies were used. The options were implemented in the form of various casting equipment for the manufacturing of blades. Methods of powder metallurgy were applied for connecting the blades with the disc. The optimal production scheme and a set of technologies for the manufacturing of blades and turbine wheel and other parts of the engine can be selected on the basis of the options considered.

Keywords: additive technologies, gas turbine engine, powder technology, turbine wheel

Procedia PDF Downloads 304
1553 Investigation of Spatial Changes in the Context of Cultural Sustainability

Authors: Aslı Taş, Şebnem Ertaş

Abstract:

Culture consists of material and spiritual values adopted by the emerging societies during the historical and social processes and continues to exist from past to present by being transferred through generations. Culture and cultural sustainability are interdependent concepts. Cultural sustainability exists when the requirements established cultural expression are added to the social life as lifestyle and habits. However, sustainability renders change inevitable. Changes that take place in the culture of a society also shows the impact in the daily life places. Functional changes occur in the spaces in order to adapt particularly to cultural change that appear in the aftermath of the user change, to modern technology and living standards. In this context, in this study, it was aimed to investigate the effect of the time-dependent functional changes that took place in the housing where non-Muslim population who was subject to population exchange and Muslim population lived after the population exchange in the vacated housing in Sille. Therefore, the changed and newly added venues in the house belonging to Ali Oğuz in Hacı Ali Ağa Street were investigated over the generated graphic in order to clearly perceive the cultural exchange on the housing and settlement and the functional changes were demonstrated.

Keywords: culture, house, spatial changes, sustainability

Procedia PDF Downloads 370
1552 Development of Industry Oriented Undergraduate Research Program

Authors: Sung Ryong Kim, Hyung Sup Han, Jae-Yup Kim

Abstract:

Many engineering students feel uncomfortable in solving the industry related problems. There are many ways to strengthen the engineering student’s ability to solve the assigned problem when they get a job. Korea National University of Transportation has developed an industry-oriented undergraduate research program (URP). An URP program is designed for engineering students to provide an experience of solving a company’s research problem. The URP project is carried out for 6 months. Each URP team consisted of 1 company mentor, 1 professor, and 3-4 engineering students. A team of different majors is strongly encouraged to integrate different perspectives of multidisciplinary background. The corporate research projects proposed by companies are chosen by the major-related student teams. A company mentor gives the detailed technical background of the project to the students, and he/she also provides a basic data, raw materials and so forth. The company allows students to use the company's research equipment. An assigned professor has adjusted the project scope and level to the student’s ability after discussing with a company mentor. Monthly meeting is used to check the progress, to exchange ideas, and to help the students. It is proven as an effective engineering education program not only to provide an experience of company research but also to motivate the students in their course work. This program provides a premier interdisciplinary platform for undergraduate students to perform the practical challenges encountered in their major-related companies and it is especially helpful for students who want to get a job from a company that proposed the project.

Keywords: company mentor, industry oriented, interdisciplinary platform, undergraduate research program

Procedia PDF Downloads 234
1551 The Relationship between Infill Development Indicators and Quality of Life in Urban Neighborhoods

Authors: S. Mohammad Reza Khatibi

Abstract:

Statistics on urbanization in Iran and around the world show that urbanization rate and urban population had had an increasing growth and, during five decades, this trend shows the fact that growth will still continue for a long time. Therefore, instead of an irregular horizontal city development and growth, a sustainable development is achievable by filling the existing city fabric, organizing the density and changing the use of incompatible old or urban buildings. One approach is the infill development. Infill development is the development of vacant land or wasteland abandoned within built areas or where there already exist facilities and equipment. Simply put, infill development is the use of empty spaces or those lacking intra-city use for city development. Additionally, fulfillment of social justice and creating a safe, secure and desirable atmosphere for citizens to live and stay active along with acquiring equal life opportunities, are among the goals of vision plan of Iran in conflict with which, certain environments have been created by city neighborhoods having physical, social, economic, etc. problems. Accordingly, in order to meet the extensive need of many cities for openness to growing population, this paper aims to investigate the relationship between infill development indicators and life quality in urban neighborhoods, using descriptive-analytical research method. Findings show that infill development indicators in three physical, social and economic categories can be adapted with quality components of urban environments, especially urban neighborhoods, and related guidelines can be offered.

Keywords: infill development, life quality, urban neighborhoods, indicator

Procedia PDF Downloads 343
1550 Dynamic Risk Identification Using Fuzzy Failure Mode Effect Analysis in Fabric Process Industries: A Research Article as Management Perspective

Authors: A. Sivakumar, S. S. Darun Prakash, P. Navaneethakrishnan

Abstract:

In and around Erode District, it is estimated that more than 1250 chemical and allied textile processing fabric industries are affected, partially closed and shut off for various reasons such as poor management, poor supplier performance, lack of planning for productivity, fluctuation of output, poor investment, waste analysis, labor problems, capital/labor ratio, accumulation of stocks, poor maintenance of resources, deficiencies in the quality of fabric, low capacity utilization, age of plant and equipment, high investment and input but low throughput, poor research and development, lack of energy, workers’ fear of loss of jobs, work force mix and work ethic. The main objective of this work is to analyze the existing conditions in textile fabric sector, validate the break even of Total Productivity (TP), analyze, design and implement fuzzy sets and mathematical programming for improvement of productivity and quality dimensions in the fabric processing industry. It needs to be compatible with the reality of textile and fabric processing industries. The highly risk events from productivity and quality dimension were found by fuzzy systems and results are wrapped up among the textile fabric processing industry.

Keywords: break even point, fuzzy crisp data, fuzzy sets, productivity, productivity cycle, total productive maintenance

Procedia PDF Downloads 320
1549 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program

Authors: Ming Wen, Nasim Nezamoddini

Abstract:

Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.

Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM

Procedia PDF Downloads 99
1548 How Educational Settings Can Influence Development of Creativity through Play in Young Children

Authors: D. M. W. Munasinghe

Abstract:

This study focuses on how teachers view and use play to influence creativity in preschool children. Play is strongly featured in most of the discussions about creativity in young children. Hence, it was noted through direct observation that most preschool teachers are not concerned with promoting play to develop the child’s creativity. Therefore, this study attempts to investigate how the teachers use play, for the development of creativity in the preschool environment. The survey method was used as the research design and interviews, observations and document perusal were used as data collection methods. The sample consisted of 20 preschools from selected administrative divisions in the Colombo district. It was revealed that a majority of preschool teachers used folk games as a means of involving children in play. Teachers assume that this type of guided play will motivate the child learn new words, memorization and provide enjoyment. Eighty percent of the preschool teachers used the play equipment installed in the preschool premises to encourage children to get involved in activities calculated at promoting the physical development of the child. In 40% of the preschools visited it was noticed that when children were given their break they created their own forms of free play and enjoyed themselves thoroughly in the little time available to them. Also, about 20% of preschool teachers promoted imaginative play with their preschoolers. There was also the situation where the role of play was interpreted negatively by the teachers who assigned the children to copy letters and numerals during the time assigned for play. This has a negative impact on the child’s creativity. In conclusion, it was felt that the teachers do not make the best use of the opportunity available to use the child’s enthusiasm to stimulate creative actions his/her and that there is no suitable environment to develop creativity through play.

Keywords: creativity, preschool children, preschool environment, play method

Procedia PDF Downloads 374
1547 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 268
1546 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics

Authors: Daniele Baldacci, Remo Pareschi

Abstract:

Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.

Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits

Procedia PDF Downloads 105
1545 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application

Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa

Abstract:

Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.

Keywords: bio medical, mental helath care, empower youths & adults, counselling

Procedia PDF Downloads 140
1544 Alumina Supported Copper-Manganese Catalysts for Combustion of Exhaust Gases: Effect of Preparation Method

Authors: Krasimir Ivanov, Elitsa Kolentsova, Dimitar Dimitrov

Abstract:

The development of active and stable catalysts without noble metals for low temperature oxidation of exhaust gases remains a significant challenge. The purpose of this study is to determine the influence of the preparation method on the catalytic activity of the supported copper-manganese mixed oxides in terms of VOCs oxidation. The catalysts were prepared by impregnation of γ-Al2O3 with copper and manganese nitrates and acetates and the possibilities for CO, CH3OH and dimethyl ether (DME) oxidation were evaluated using continuous flow equipment with a four-channel isothermal stainless steel reactor. Effect of the support, Cu/Mn mole ratio, heat treatment of the precursor and active component loading were investigated. Highly active alumina supported Cu-Mn catalysts for CO and VOCs oxidation were synthesized. The effect of preparation conditions on the activity behavior of the catalysts was discussed. The synergetic interaction between copper and manganese species increases the activity for complete oxidation over mixed catalysts. Type of support, calcination temperature and active component loading along with catalyst composition are important factors, determining catalytic activity. Cu/Mn molar ratio of 1:5, heat treatment at 450oC and 20 % active component loading are the best compromise for production of active catalyst for simultaneous combustion of CO, CH3OH and DME.

Keywords: copper-manganese catalysts, CO, VOCs oxidation, exhaust gases

Procedia PDF Downloads 398
1543 Improved Simultaneous Performance in the Time Domain and in the Frequency Domain

Authors: Azeddine Ghodbane, David Bensoussan, Maher Hammami

Abstract:

An innovative approach for controlling unstable and invertible systems has demonstrated superior performance compared to conventional controllers. It has been successfully applied to a levitation system and drone control. Simulations have yielded satisfactory performances when applied to a satellite antenna controller. This design method, based on sensitivity analysis, has also been extended to handle multivariable unstable and invertible systems that exhibit dominant diagonal characteristics at high frequencies, enabling decentralized control. Furthermore, this control method has been expanded to the realm of adaptive control. In this study, we introduce an alternative adaptive architecture that enhances both time and frequency performance, helpfully mitigating the effects of disturbances from the input plant and external disturbances affecting the output. To facilitate superior performance in both the time and frequency domains, we have developed user-friendly interactive design methods using the GeoGebra platform.

Keywords: control theory, decentralized control, sensitivity theory, input-output stability theory, robust multivariable feedback control design

Procedia PDF Downloads 96
1542 Application of GPRS in Water Quality Monitoring System

Authors: V. Ayishwarya Bharathi, S. M. Hasker, J. Indhu, M. Mohamed Azarudeen, G. Gowthami, R. Vinoth Rajan, N. Vijayarangan

Abstract:

Identification of water quality conditions in a river system based on limited observations is an essential task for meeting the goals of environmental management. The traditional method of water quality testing is to collect samples manually and then send to laboratory for analysis. However, it has been unable to meet the demands of water quality monitoring today. So a set of automatic measurement and reporting system of water quality has been developed. In this project specifies Water quality parameters collected by multi-parameter water quality probe are transmitted to data processing and monitoring center through GPRS wireless communication network of mobile. The multi parameter sensor is directly placed above the water level. The monitoring center consists of GPRS and micro-controller which monitor the data. The collected data can be monitor at any instant of time. In the pollution control board they will monitor the water quality sensor data in computer using Visual Basic Software. The system collects, transmits and processes water quality parameters automatically, so production efficiency and economy benefit are improved greatly. GPRS technology can achieve well within the complex environment of poor water quality non-monitored, and more specifically applicable to the collection point, data transmission automatically generate the field of water analysis equipment data transmission and monitoring.

Keywords: multiparameter sensor, GPRS, visual basic software, RS232

Procedia PDF Downloads 391
1541 Investigation of the Effect of Plasticization Temperature on Polymer Thin Film Stability through Spin Coating Process

Authors: Bilge Bozdogan, Selda T. Sendogdular, Levent Sendogdular

Abstract:

We report a technique to control chain conformation during the plasticization process to achieve homogeneous and stable thin films, which allows to reduce post-process annealing times along with enhanced properties like controlled irreversible adsorbed layer (Guiselin brushes) formation. In this study, spin coating temperature was considered as a parameter; hence, all equipment, including the spin coater, substrate, vials, and the solution, was kept inside the same heated fume hood where solution was spin-coated after the temperature was stabilized at a desired value. AFM and SEM results revealed severe difference for solid and air interface between ambient and temperature-controlled samples, which suggest that enthalpic contribution dynamically helps to control film stability in a way where chain entanglements and conformational restrictions are avoided before film growing and allowing to control grafting density through spin coating temperature. The adsorbed layer was also characterized with SEM and Raman-spectroscopy technique right after seeding the adsorbed layer with gold nanoparticles. Stabilized gold nanoparticles and their surface distribution manifest the existence of a controllable polymer brush structure. Acknowledgments: This study was funded by Erciyes University Scientific Research Projects (BAP) Funding(Project ID:10058)

Keywords: chain stability, Guiselin brushes, polymer thin film, spin coating temperature

Procedia PDF Downloads 200
1540 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 76
1539 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh

Authors: Md. Golam Mostafa

Abstract:

This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.

Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh

Procedia PDF Downloads 109
1538 Leveraging Quality Metrics in Voting Model Based Thread Retrieval

Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim

Abstract:

Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.

Keywords: content quality, forum search, thread retrieval, voting techniques

Procedia PDF Downloads 200
1537 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)

Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat

Abstract:

The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.

Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring

Procedia PDF Downloads 382
1536 A Real-Time Snore Detector Using Neural Networks and Selected Sound Features

Authors: Stelios A. Mitilineos, Nicolas-Alexander Tatlas, Georgia Korompili, Lampros Kokkalas, Stelios M. Potirakis

Abstract:

Obstructive Sleep Apnea Hypopnea Syndrome (OSAHS) is a widespread chronic disease that mostly remains undetected, mainly due to the fact that it is diagnosed via polysomnography which is a time and resource-intensive procedure. Screening the disease’s symptoms at home could be used as an alternative approach in order to alert individuals that potentially suffer from OSAHS without compromising their everyday routine. Since snoring is usually linked to OSAHS, developing a snore detector is appealing as an enabling technology for screening OSAHS at home using ubiquitous equipment like commodity microphones (included in, e.g., smartphones). In this context, this study developed a snore detection tool and herein present the approach and selection of specific sound features that discriminate snoring vs. environmental sounds, as well as the performance of the proposed tool. Furthermore, a Real-Time Snore Detector (RTSD) is built upon the snore detection tool and employed in whole-night sleep sound recordings resulting to a large dataset of snoring sound excerpts that are made freely available to the public. The RTSD may be used either as a stand-alone tool that offers insight to an individual’s sleep quality or as an independent component of OSAHS screening applications in future developments.

Keywords: obstructive sleep apnea hypopnea syndrome, apnea screening, snoring detection, machine learning, neural networks

Procedia PDF Downloads 193
1535 Design and Optimization of a Mini High Altitude Long Endurance (HALE) Multi-Role Unmanned Aerial Vehicle

Authors: Vishaal Subramanian, Annuatha Vinod Kumar, Santosh Kumar Budankayala, M. Senthil Kumar

Abstract:

This paper discusses the aerodynamic and structural design, simulation and optimization of a mini-High Altitude Long Endurance (HALE) UAV. The applications of this mini HALE UAV vary from aerial topological surveys, quick first aid supply, emergency medical blood transport, search and relief activates to border patrol, surveillance and estimation of forest fire progression. Although classified as a mini UAV according to UVS International, our design is an amalgamation of the features of ‘mini’ and ‘HALE’ categories, combining the light weight of the ‘mini’ and the high altitude ceiling and endurance of the HALE. Designed with the idea of implementation in India, it is in strict compliance with the UAS rules proposed by the office of the Director General of Civil Aviation. The plane can be completely automated or have partial override control and is equipped with an Infra-Red camera and a multi coloured camera with on-board storage or live telemetry, GPS system with Geo Fencing and fail safe measures. An additional of 1.5 kg payload can be attached to three major hard points on the aircraft and can comprise of delicate equipment or releasable payloads. The paper details the design, optimization process and the simulations performed using various software such as Design Foil, XFLR5, Solidworks and Ansys.

Keywords: aircraft, endurance, HALE, high altitude, long range, UAV, unmanned aerial vehicle

Procedia PDF Downloads 385
1534 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 240