Search results for: bare machine computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3921

Search results for: bare machine computing

1791 The Tribological Behaviors of Vacuum Gas Nitriding Titanium and Steel Substrates at Different Process Temperatures

Authors: Hikmet Cicek

Abstract:

Metal nitrides show excellence tribological properties and they used for especially on machine parts. In this work, the vacuum gas nitriding proses were applied to the titanium, D2 and 52100 steel substrates at three different proses temperatures (500 °C, 600°C and 700 °C). Structural, mechanical and tribological properties of the samples were characterized. X-Ray diffractometer, scanning electron microscope and energy dispersive spectroscopy analyses were conducted to determine structural properties. Microhardness test and pin-on-disc wear test were made to observe tribological properties. Coefficient of friction, wear rate and wear traces were examined comparatively. According to the test results, the process temperature very effective parameter for the vacuum gas nitriding method.

Keywords: gas nitriding, tribology, wear, coating

Procedia PDF Downloads 203
1790 On Fault Diagnosis of Asynchronous Sequential Machines with Parallel Composition

Authors: Jung-Min Yang

Abstract:

Fault diagnosis of composite asynchronous sequential machines with parallel composition is addressed in this paper. An adversarial input can infiltrate one of two submachines comprising the composite asynchronous machine, causing an unauthorized state transition. The objective is to characterize the condition under which the controller can diagnose any fault occurrence. Two control configurations, state feedback and output feedback, are considered in this paper. In the case of output feedback, the exact estimation of the state is impossible since the current state is inaccessible and the output feedback is given as the form of burst. A simple example is provided to demonstrate the proposed methodology.

Keywords: asynchronous sequential machines, parallel composition, fault diagnosis, corrective control

Procedia PDF Downloads 300
1789 Designing AI-Enabled Smart Maintenance Scheduler: Enhancing Object Reliability through Automated Management

Authors: Arun Prasad Jaganathan

Abstract:

In today's rapidly evolving technological landscape, the need for efficient and proactive maintenance management solutions has become increasingly evident across various industries. Traditional approaches often suffer from drawbacks such as reactive strategies, leading to potential downtime, increased costs, and decreased operational efficiency. In response to these challenges, this paper proposes an AI-enabled approach to object-based maintenance management aimed at enhancing reliability and efficiency. The paper contributes to the growing body of research on AI-driven maintenance management systems, highlighting the transformative impact of intelligent technologies on enhancing object reliability and operational efficiency.

Keywords: AI, machine learning, predictive maintenance, object-based maintenance, expert team scheduling

Procedia PDF Downloads 64
1788 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 38
1787 Evolution of Web Development Progress in Modern Information Technology

Authors: Abdul Basit Kiani

Abstract:

Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.

Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design

Procedia PDF Downloads 58
1786 Recirculation Type Photocatalytic Reactor for Degradation of Monocrotophos Using TiO₂ and W-TiO₂ Coated Immobilized Clay Beads

Authors: Abhishek Sraw, Amit Sobti, Yamini Pandey, R. K. Wanchoo, Amrit Pal Toor

Abstract:

Monocrotophos (MCP) is a widely used pesticide in India, which belong to an extremely toxic organophosphorus family, is persistent in nature and its toxicity is widely reported in all environmental segments in the country. Advanced Oxidation Process (AOP) is a promising solution to the problem of water pollution. TiO₂ is being widely used as a photocatalyst because of its many advantages, but it has a large band gap, due to which it is modified using metal and nonmetal dopant to make it active under sunlight and visible light. The use of nanosized powdered catalysts makes the recovery process extremely complicated. Hence the aim is to use low cost, easily available, eco-friendly clay material in form of bead as the support for the immobilization of catalyst, to solve the problem of post-separation of suspended catalyst from treated water. A recirculation type photocatalytic reactor (RTPR), using ultraviolet light emitting source (blue black lamp) was designed which work effectively for both suspended catalysts and catalyst coated clay beads. The bare, TiO₂ and W-TiO₂ coated clay beads were characterized by scanning electron microscopy (SEM), electron dispersive spectroscopy (EDS) and N₂ adsorption–desorption measurements techniques (BET) for their structural, textural and electronic properties. The study involved variation of different parameters like light conditions, recirculation rate, light intensity and initial MCP concentration under UV and sunlight for the degradation of MCP. The degradation and mineralization studies of the insecticide solution were performed using UV-Visible spectrophotometer, and COD vario-photometer and GC-MS analysis respectively. The main focus of the work lies in checking the recyclability of the immobilized TiO₂ over clay beads in the developed RTPR up to 30 continuous cycles without reactivation of catalyst. The results demonstrated the economic feasibility of the utilization of developed RTPR for the efficient purification of pesticide polluted water. The prepared TiO₂ clay beads delivered 75.78% degradation of MCP under UV light with negligible catalyst loss. Application of W-TiO₂ coated clay beads filled RTPR for the degradation of MCP under sunlight, however, shows 32% higher degradation of MCP than the same system based on undoped TiO₂. The COD measurements of TiO₂ coated beads led to 73.75% COD reduction while W-TiO₂ resulted in 87.89% COD reduction. The GC-MS analysis confirms the efficient breakdown of complex MCP molecules into simpler hydrocarbons. This supports the promising application of clay beads as a support for the photocatalyst and proves its eco-friendly nature, excellent recyclability, catalyst holding capacity, and economic viability.

Keywords: immobilized clay beads, monocrotophos, recirculation type photocatalytic reactor, TiO₂

Procedia PDF Downloads 184
1785 The Influence of the Method of Cooling Coffee Beans After Roasting on Their Mechanical Strength

Authors: Marek Gancarz, Katarzyna Grądecka-Jakubowska

Abstract:

The aim of the study was to analyze the cooling process of coffee beans after roasting in order to determine their mechanical strength. Arabica coffee beans came from two varieties of coffee: Brazil Diamantina and Ethiopia Refisha. Coffee beans were cooled with air or liquid nitrogen. The mechanical properties of roasted and then cooled coffee beans were determined using an INSTRON machine. It is equipped with a measuring head and a cylindrical probe that destroys the sample. The maximum force of the head used is 250 N. The process of cooling coffee beans using air was characterized by the lower mechanical strength of coffee beans compared to cooling with liquid nitrogen.

Keywords: coffee beans, cooling process, liquid nitrogen, mechanical properties

Procedia PDF Downloads 9
1784 Study on Liquid Nitrogen Gravity Circulation Loop for Cryopumps in Large Space Simulator

Authors: Weiwei Shan, Wenjing Ding, Juan Ning, Chao He, Zijuan Wang

Abstract:

Gravity circulation loop for the cryopumps of the space simulator is introduced, and two phase mathematic model of flow heat transfer is analyzed as well. Based on this model, the liquid nitrogen (LN2) gravity circulation loop including its equipment and layout is designed and has served as LN2 feeding system for cryopumps in one large space simulator. With the help of control software and human machine interface, this system can be operated flexibly, simply, and automatically under four conditions. When running this system, the results show that the cryopumps can be cooled down and maintained under the required temperature, 120 K.

Keywords: cryopumps, gravity circulation loop, liquid nitrogen, two-phase

Procedia PDF Downloads 405
1783 Evaluating the Performance of Color Constancy Algorithm

Authors: Damanjit Kaur, Avani Bhatia

Abstract:

Color constancy is significant for human vision since color is a pictorial cue that helps in solving different visions tasks such as tracking, object recognition, or categorization. Therefore, several computational methods have tried to simulate human color constancy abilities to stabilize machine color representations. Two different kinds of methods have been used, i.e., normalization and constancy. While color normalization creates a new representation of the image by canceling illuminant effects, color constancy directly estimates the color of the illuminant in order to map the image colors to a canonical version. Color constancy is the capability to determine colors of objects independent of the color of the light source. This research work studies the most of the well-known color constancy algorithms like white point and gray world.

Keywords: color constancy, gray world, white patch, modified white patch

Procedia PDF Downloads 324
1782 Formulation and Characterization of Active Edible Films from Cassava Starch for Snacks and Savories

Authors: P. Raajeswari, S. M. Devatha, S. Yuvajanani, U. Rashika

Abstract:

Edible food packaging are the need of the hour to save life on land and under water by eliminating waste cycle and replacing Single Use Plastics at grass root level as it can be eaten or composted as such. Cassava (Manihot esculenta) selected for making edible films are rich source of starch, and also it exhibit good sheeting propertiesdue to the high amylose: amylopectin content. Cassava starch was extracted by manual method at a laboratory scale and yielded 65 per cent. Edible films were developed by adding food grade plasticizers and water. Glycerol showed good plasticizing property as compared to sorbitol and polylactic acid in both manual (petri dish) and machine (film making machine) production. The thickness of the film is 0.25±0.03 mm. Essential oil and components from peels like pomegranate, orange, pumpkin, onion, and banana brat, and herbs like tulsi and country borage was extracted through the standardized aqueous and alkaline method. In the standardized film, the essential oil and components from selected peel and herbs were added to the casting solution separately and casted the film. It was added to improve the anti-oxidant, anti-microbial and optical properties. By inclusion of extracts, it reduced the bubble formation while casting. FTIR, Water Vapor and Oxygen Transmission Rate (WVTR and OTR), tensile strength, microbial load, shelf life, and degradability of the films were done to analyse the mechanical property of the standardized films. FTIR showed the presence of essential oil. WVTR and OTR of the film was improved after inclusion of essential oil and extracts from 1.312 to 0.811 cm₃/m₂ and 15.12 to 17.81 g/ m₂.d. Inclusion of essential oil from herbs showed better WVTR and OTR than the inclusion of peel extract and standard. Tensile strength and Elongation at break has not changed by essential oil and extracts at 0.86 ± 0.12 mpa and 14 ± 2 at 85 N force. By inclusion of extracts, an optical property of the film enhanced, and it increases the appearance of the packaging material. The films were completely degraded on 84thdays and partially soluble in water. Inclusion of essential oil does not have impact on degradability and solubility. The microbial loads of the active films were decreased from 15 cfu/gm to 7 cfu/gm. The films can be stored at frozen state for 24 days and 48 days at atmospheric temperature when packed with South Indian snacks and savories.

Keywords: active films, cassava starch, plasticizer, characterization

Procedia PDF Downloads 85
1781 On Block Vandermonde Matrix Constructed from Matrix Polynomial Solvents

Authors: Malika Yaici, Kamel Hariche

Abstract:

In control engineering, systems described by matrix fractions are studied through properties of block roots, also called solvents. These solvents are usually dealt with in a block Vandermonde matrix form. Inverses and determinants of Vandermonde matrices and block Vandermonde matrices are used in solving problems of numerical analysis in many domains but require costly computations. Even though Vandermonde matrices are well known and method to compute inverse and determinants are many and, generally, based on interpolation techniques, methods to compute the inverse and determinant of a block Vandermonde matrix have not been well studied. In this paper, some properties of these matrices and iterative algorithms to compute the determinant and the inverse of a block Vandermonde matrix are given. These methods are deducted from the partitioned matrix inversion and determinant computing methods. Due to their great size, parallelization may be a solution to reduce the computations cost, so a parallelization of these algorithms is proposed and validated by a comparison using algorithmic complexity.

Keywords: block vandermonde matrix, solvents, matrix polynomial, matrix inverse, matrix determinant, parallelization

Procedia PDF Downloads 246
1780 Stability of a Self-Excited Machine Due to the Mechanical Coupling

Authors: M. Soltan Rezaee, M. R. Ghazavi, A. Najafi, W.-H. Liao

Abstract:

Generally, different rods in shaft systems can be misaligned based on the mechanical system usages. These rods can be linked together via U-coupling easily. The system is self-stimulated and may cause instabilities due to the inherent behavior of the coupling. In this study, each rod includes an elastic shaft with an angular stiffness and structural damping. Moreover, the mass of shafts is considered via attached solid disks. The impact of the system architecture and shaft mass on the instability of such mechanism are studied. Stability charts are plotted via a method based on Floquet theory. Eventually, the unstable points have been found and analyzed in detail. The results show that stabilizing the driveline is feasible by changing the system characteristics which include shaft mass and architecture.

Keywords: coupling, mechanical systems, oscillations, rotating shafts

Procedia PDF Downloads 185
1779 Managing Networks and Systems in the Modern Security Landscape: An Integrated Approach to Infrastructure Resilience

Authors: Oussama Yadine, Abdellah Jamali

Abstract:

The rapid evolution of today's technology ecosystem, marked by the fusion of cloud computing, IoT, and distributed systems, has introduced complex security challenges in network and systems administration. Our research develops a framework that seamlessly merges contemporary systems administration with advanced security engineering methodologies, particularly focusing on DevSecOps implementation and zero-trust architectural principles. Comprehensive testing and analysis across diverse organizational environments reveal that this unified approach achieves remarkable results: a 47% decrease in security-related incidents while consistently maintaining 99.9% system uptime. The framework delivers actionable guidelines for deploying secure infrastructure architectures, automating compliance oversight, and implementing dynamic security protocols. This integration effectively eliminates the historical divide between systems administration and security engineering, fostering an environment where operational efficiency and security resilience coexist harmoniously.

Keywords: network security, systems administration, security engineering, infrastructure resilience

Procedia PDF Downloads 5
1778 Generating Ideas to Improve Road Intersections Using Design with Intent Approach

Authors: Omar Faruqe Hamim, M. Shamsul Hoque, Rich C. McIlroy, Katherine L. Plant, Neville A. Stanton

Abstract:

Road safety has become an alarming issue, especially in low-middle income developing countries. The traditional approaches lack the out of the box thinking, making engineers confined to applying usual techniques in making roads safer. A socio-technical approach has recently been introduced in improving road intersections through designing with intent. This Design With Intent (DWI) approach aims to give practitioners a more nuanced approach to design and behavior, working with people, people’s understanding, and the complexities of everyday human experience. It's a collection of design patterns —and a design and research approach— for exploring the interactions between design and people’s behavior across products, services, and environments, both digital and physical. Through this approach, it can be seen that how designing with people in behavior change can be applied to social and environmental problems, as well as commercially. It has a total of 101 cards across eight different lenses, such as architectural, error-proofing, interaction, ludic, perceptual, cognitive, Machiavellian, and security lens each having its own distinct characteristics of extracting ideas from the participant of this approach. For this research purpose, a three-legged accident blackspot intersection of a national highway has been chosen to perform the DWI workshop. Participants from varying fields such as civil engineering, naval architecture and marine engineering, urban and regional planning, and sociology actively participated for a day long workshop. While going through the workshops, the participants were given a preamble of the accident scenario and a brief overview of DWI approach. Design cards of varying lenses were distributed among 10 participants and given an hour and a half for brainstorming and generating ideas to improve the safety of the selected intersection. After the brainstorming session, the participants spontaneously went through roundtable discussions regarding the ideas they have come up with. According to consensus of the forum, ideas were accepted or rejected. These generated ideas were then synthesized and agglomerated to bring about an improvement scheme for the intersection selected in our study. To summarize the improvement ideas from DWI approach, color coding of traffic lanes for separate vehicles, channelizing the existing bare intersection, providing advance warning traffic signs, cautionary signs and educational signs motivating road users to drive safe, using textured surfaces at approach with rumble strips before the approach of intersection were the most significant one. The motive of this approach is to bring about new ideas from the road users and not just depend on traditional schemes to increase the efficiency, safety of roads as well and to ensure the compliance of road users since these features are being generated from the minds of users themselves.

Keywords: design with intent, road safety, human experience, behavior

Procedia PDF Downloads 145
1777 Heuristic Evaluation of Children’s Authoring Tool for Game Making

Authors: Laili Farhana Md Ibharim, Maizatul Hayati Mohamad Yatim

Abstract:

The main purpose of this study is to evaluate the heuristic inspection of children’s authoring tools to develop games. The researcher has selected 15 authoring tools for making games specifically for educational purposes. Nine students from Diploma of Game Design and Development course and four lecturers from the computing department involved in this evaluation. A set of usability heuristic checklist used as a guideline for the students and lecturers to observe and test the authoring tools selected. The study found that there are just a few authoring tools that fulfill most of the heuristic requirement and suitable to apply to children. In this evaluation, only six out of fifteen authoring tools have passed above than five elements in the heuristic inspection checklist. The researcher identified that in order to develop a usable authoring tool developer has to emphasis children acceptance and interaction of the authoring tool. Furthermore, the authoring tool can be a tool to enhance their mental development especially in creativity and skill.

Keywords: authoring tool, children, game making, heuristic

Procedia PDF Downloads 351
1776 ICT Education: Digital History Learners

Authors: Lee Bih Ni, Elvis Fung

Abstract:

This article is to review and understand the new generation of students to understand their expectations and attitudes. There are a group of students on school projects, creative work, educational software and digital signal source, the use of social networking tools to communicate with friends and a part in the competition. Today's students have been described as the new millennium students. They use information and communication technology in a more creative and innovative at home than at school, because the information and communication technologies for different purposes, in the home, usually occur in school. They collaborate and communicate more effectively when they are at home. Most children enter school, they will bring about how to use information and communication technologies, some basic skills and some tips on how to use information and communication technology will provide a more advanced than most of the school's expectations. Many teachers can help students, however, still a lot of work, "tradition", without a computer, and did not see the "new social computing networks describe young people to learn and new ways of working life in the future", in the education system of the benefits of using a computer.

Keywords: ICT education, digital history, new generation of students, benefits of using a computer

Procedia PDF Downloads 408
1775 Adjusted LOLE and EENS Indices for the Consideration of Load Excess Transfer in Power Systems Adequacy Studies

Authors: François Vallée, Jean-François Toubeau, Zacharie De Grève, Jacques Lobry

Abstract:

When evaluating the capacity of a generation park to cover the load in transmission systems, traditional Loss of Load Expectation (LOLE) and Expected Energy not Served (EENS) indices can be used. If those indices allow computing the annual duration and severity of load non-covering situations, they do not take into account the fact that the load excess is generally shifted from one penury state (hour or quarter of an hour) to the following one. In this paper, a sequential Monte Carlo framework is introduced in order to compute adjusted LOLE and EENS indices. Practically, those adapted indices permit to consider the effect of load excess transfer on the global adequacy of a generation park, providing thus a more accurate evaluation of this quantity.

Keywords: expected energy not served, loss of load expectation, Monte Carlo simulation, reliability, wind generation

Procedia PDF Downloads 416
1774 Radar-Based Classification of Pedestrian and Dog Using High-Resolution Raw Range-Doppler Signatures

Authors: C. Mayr, J. Periya, A. Kariminezhad

Abstract:

In this paper, we developed a learning framework for the classification of vulnerable road users (VRU) by their range-Doppler signatures. The frequency-modulated continuous-wave (FMCW) radar raw data is first pre-processed to obtain robust object range-Doppler maps per coherent time interval. The complex-valued range-Doppler maps captured from our outdoor measurements are further fed into a convolutional neural network (CNN) to learn the classification. This CNN has gone through a hyperparameter optimization process for improved learning. By learning VRU range-Doppler signatures, the three classes 'pedestrian', 'dog', and 'noise' are classified with an average accuracy of almost 95%. Interestingly, this classification accuracy holds for a combined longitudinal and lateral object trajectories.

Keywords: machine learning, radar, signal processing, autonomous driving

Procedia PDF Downloads 250
1773 Overview and Future Opportunities of Sarcasm Detection on Social Media Communications

Authors: Samaneh Nadali, Masrah Azrifah Azmi Murad, Nurfadhlina Mohammad Sharef

Abstract:

Sarcasm is a common phenomenon in social media which is a nuanced form of language for stating the opposite of what is implied. Due to the intentional ambiguity, analysis of sarcasm is a difficult task not only for a machine but even for a human. Although sarcasm detection has an important effect on sentiment, it is usually ignored in social media analysis because sarcasm analysis is too complicated. While there is a few systems exist which can detect sarcasm, almost no work has been carried out on a study and the review of the existing work in this area. This survey presents a nearly full image of sarcasm detection techniques and the related fields with brief details. The main contributions of this paper include the illustration of the recent trend of research in the sarcasm analysis and we highlight the gaps and propose a new framework that can be explored.

Keywords: sarcasm detection, sentiment analysis, social media, sarcasm analysis

Procedia PDF Downloads 459
1772 A Pervasive System Architecture for Smart Environments in Internet of Things Context

Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço

Abstract:

Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.

Keywords: internet of things, cloud, intelligent personal assistant, architecture

Procedia PDF Downloads 517
1771 Tolerating Input Faults in Asynchronous Sequential Machines

Authors: Jung-Min Yang

Abstract:

A method of tolerating input faults for input/state asynchronous sequential machines is proposed. A corrective controller is placed in front of the considered asynchronous machine to realize model matching with a reference model. The value of the external input transmitted to the closed-loop system may change by fault. We address the existence condition for the controller that can counteract adverse effects of any input fault while maintaining the objective of model matching. A design procedure for constructing the controller is outlined. The proposed reachability condition for the controller design is validated in an illustrative example.

Keywords: asynchronous sequential machines, corrective control, fault tolerance, input faults, model matching

Procedia PDF Downloads 424
1770 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 323
1769 Experimental Characterization of Fatigue Crack Initiation of AA320 Alloy under Combined Thermal Cycling (CTC) and Mechanical Loading (ML) during Four Point Rotating and Bending Fatigue Testing Machine

Authors: Rana Atta Ur Rahman, Daniel Juhre

Abstract:

Initiation of crack during fatigue of casting alloys are noticed mainly on the basis of experimental results. Crack initiation and strength of fatigue of AA320 are summarized here. Load sequence effect is applied to notify initiation phase life. Crack initiation at notch root and fatigue life is calculated under single & two-step mechanical loading (ML) with and without combined thermal cycling (CTC). An Experimental setup is proposed to create the working temperature as per alloy applications. S-N curves are plotted, and a comparison is made between crack initiation leading to failure under different ML with & without thermal loading (TL).

Keywords: fatigue, initiation, SN curve, alloy

Procedia PDF Downloads 413
1768 Design of 100 kW Induction Generator for Wind Power Plant at Tamanjaya Village-Sukabumi

Authors: Andri Setiyoso, Agus Purwadi, Nanda Avianto Wicaksono

Abstract:

This paper present about induction generator design for 100kW power output capacity. Induction machine had been chosen because of the capability for energy conversion from electric energy to mechanical energy and vise-versa with operation on variable speed condition. Stator Controlled Induction Generator (SCIG) was applied as wind power plant in Desa Taman Jaya, Sukabumi, Indonesia. Generator was designed to generate power 100 kW with wind speed at 12 m/s and survival condition at speed 21 m/s.

Keywords: wind energy, induction generator, Stator Controlled Induction Generator (SCIG), variable speed generator

Procedia PDF Downloads 511
1767 Analysis of Maintenance Operations in an Industrial Bakery Line

Authors: Mehmet Savsar

Abstract:

This paper presents a practical case application of simulation modeling and analysis in a specific industrial setting. Various maintenance related parameters of the equipment in the system under consideration are determined and a simulation model is developed to study system behavior. System performance is determined based on established parameters and operational policies, which included system operation with and without preventive maintenance implementation. The results show that preventive maintenance practice has significant effects on improving system productivity. The simulation procedures outlined in this paper can be used by operation managers to perform production line analysis under different maintenance policies in various industrial settings.

Keywords: simulation, production line, machine failures, maintenance, industrial bakery

Procedia PDF Downloads 490
1766 Application of Fuzzy Approach to the Vibration Fault Diagnosis

Authors: Jalel Khelil

Abstract:

In order to improve reliability of Gas Turbine machine especially its generator equipment, a fault diagnosis system based on fuzzy approach is proposed. Three various methods namely K-NN (K-nearest neighbors), F-KNN (Fuzzy K-nearest neighbors) and FNM (Fuzzy nearest mean) are adopted to provide the measurement of relative strength of vibration defaults. Both applications consist of two major steps: Feature extraction and default classification. 09 statistical features are extracted from vibration signals. 03 different classes are used in this study which describes vibrations condition: Normal, unbalance defect, and misalignment defect. The use of the fuzzy approaches and the classification results are discussed. Results show that these approaches yield high successful rates of vibration default classification.

Keywords: fault diagnosis, fuzzy classification k-nearest neighbor, vibration

Procedia PDF Downloads 472
1765 Investigation on the Acoustical Transmission Path of Additive Printed Metals

Authors: Raphael Rehmet, Armin Lohrengel, Prof Dr-Ing

Abstract:

In terms of making machines more silent and convenient, it is necessary to analyze the transmission path of mechanical vibrations and structure-bone noise. A typical solution for the elimination of structure-bone noise would be to simply add stiffeners or additional masses to change the transmission behavior and, thereby, avoid the propagation of vibrations. Another solution could be to use materials with a different damping behavior, such as elastomers, to isolate the machine dynamically. This research approach investigates the damping behavior of additive printed components made from structural steel or titanium, which have been manufactured in the “Laser Powder Bed Fusion“-process. By using the design flexibility which this process comes with, it will be investigated how a local impedance difference will affect the transmission behavior of the specimens.

Keywords: 3D-printed, acoustics, dynamics, impedance

Procedia PDF Downloads 212
1764 Magnetic SF (Silk Fibroin) E-Gel Scaffolds Containing bFGF-Conjugated Fe3O4 Nanoparticles

Authors: Z. Karahaliloğlu, E. Yalçın, M. Demirbilek, E.B. Denkbaş

Abstract:

Critical-sized bone defects caused by trauma, bone diseases, prosthetic implant revision or tumor excision cannot be repaired by physiological regenerative processes. Current orthopedic applications for critical-sized bone defects are to use autologous bone grafts, bone allografts, or synthetic graft materials. However, these strategies are unable to solve completely the problem, and motivate the development of novel effective biological scaffolds for tissue engineering applications and regenerative medicine applications. In particular, scaffolds combined with a variety of bio-agents as fundamental tools emerge to provide the regeneration of damaged bone tissues due to their ability to promote cell growth and function. In this study, a magnetic silk fibroin (SF) hydrogel scaffold was prepared by electrogelation process of the concentrated Bombxy mori silk fibroin (8 %wt) aqueous solution. For enhancement of osteoblast-like cells (SaOS-2) growth and adhesion, basal fibroblast growth factor (bFGF) were conjugated physically to the HSA-coated magnetic nanoparticles (Fe3O4) and magnetic SF e-gel scaffolds were prepared by incorporation of Fe3O4, HSA (human serum albumin)=Fe3O4 and HSA=Fe3O4-bFGF nanoparticles. HSA=Fe3O4, HSA=Fe3O4-bFGF loaded and bare SF e-gels scaffolds were characterized using scanning electron microscopy (SEM.) For cell studies, human osteoblast-like cell line (SaOS-2) was used and an MTT assay was used to assess the cytotoxicity of magnetic silk fibroin e-gel scaffolds and cell density on these surfaces. For the evaluation osteogenic activation, ALP (alkaline phosphatase), the amount of mineralized calcium, total protein and collagen were studied. Fe3O4 nanoparticles were successfully synthesized and bFGF was conjugated to HSA=Fe3O4 nanoparticles with %97.5 of binding yield which has a particle size of 71.52±2.3 nm. Electron microscopy images of the prepared HSA and bFGF incorporated SF e-gel scaffolds showed a 3D porous morphology. In terms of water uptake results, bFGF conjugated HSA=Fe3O4 nanoparticles has the best water absorbability behavior among all groups. In the in-vitro cell culture studies realized using SaOS-2 cell line, the coating of Fe3O4 nanoparticles surface with a protein enhance the cell viability and HSA coating and bFGF conjugation, the both have an inductive effect in the cell proliferation. One of the markers of bone formation and osteoblast differentiation, according to the ALP activity and total protein results, HSA=Fe3O4-bFGF loaded SF e-gels had significantly enhanced ALP activity. Osteoblast cultured HSA=Fe3O4-bFGF loaded SF e-gels deposited more calcium compared with SF e-gel. The proposed magnetic scaffolds seem to be promising for bone tissue regeneration and used in future work for various applications.

Keywords: basic fibroblast growth factor (bFGF), e-gel, iron oxide nanoparticles, silk fibroin

Procedia PDF Downloads 294
1763 Multithreading/Multiprocessing Simulation of The International Space Station Multibody System Using A Divide and Conquer Dynamics Formulation with Flexible Bodies

Authors: Luong A. Nguyen, Elihu Deneke, Thomas L. Harman

Abstract:

This paper describes a multibody dynamics algorithm formulated for parallel implementation on multiprocessor computing platforms using the divide-and-conquer approach. The system of interest is a general topology of rigid and elastic articulated bodies with or without loops. The algorithm is an extension of Featherstone’s divide and conquer approach to include the flexible-body dynamics formulation. The equations of motion, configured for the International Space Station (ISS) with its robotic manipulator arm as a system of articulated flexible bodies, are implemented in separate computer processors. The performance of this divide-and-conquer algorithm implementation in multiple processors is compared with an existing method implemented on a single processor.

Keywords: multibody dynamics, multiple processors, multithreading, divide-and-conquer algorithm, computational efficiency, flexible body dynamics

Procedia PDF Downloads 339
1762 An ALM Matrix Completion Algorithm for Recovering Weather Monitoring Data

Authors: Yuqing Chen, Ying Xu, Renfa Li

Abstract:

The development of matrix completion theory provides new approaches for data gathering in Wireless Sensor Networks (WSN). The existing matrix completion algorithms for WSN mainly consider how to reduce the sampling number without considering the real-time performance when recovering the data matrix. In order to guarantee the recovery accuracy and reduce the recovery time consumed simultaneously, we propose a new ALM algorithm to recover the weather monitoring data. A lot of experiments have been carried out to investigate the performance of the proposed ALM algorithm by using different parameter settings, different sampling rates and sampling models. In addition, we compare the proposed ALM algorithm with some existing algorithms in the literature. Experimental results show that the ALM algorithm can obtain better overall recovery accuracy with less computing time, which demonstrate that the ALM algorithm is an effective and efficient approach for recovering the real world weather monitoring data in WSN.

Keywords: wireless sensor network, matrix completion, singular value thresholding, augmented Lagrange multiplier

Procedia PDF Downloads 387