Search results for: active user control
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15016

Search results for: active user control

14836 Interfacing Photovoltaic Systems to the Utility Grid: A Comparative Simulation Study to Mitigate the Impact of Unbalanced Voltage Dips

Authors: Badr M. Alshammari, A. Rabeh, A. K. Mohamed

Abstract:

This paper presents the modeling and the control of a grid-connected photovoltaic system (PVS). Firstly, the MPPT control of the PVS and its associated DC/DC converter has been analyzed in order to extract the maximum of available power. Secondly, the control system of the grid side converter (GSC) which is a three-phase voltage source inverter (VSI) has been presented. A special attention has been paid to the control algorithms of the GSC converter during grid voltages imbalances. Especially, three different control objectives are to achieve; the mitigation of the grid imbalance adverse effects, at the point of common coupling (PCC), on the injected currents, the elimination of double frequency oscillations in active power flow, and the elimination of double frequency oscillations in reactive power flow. Simulation results of two control strategies have been performed via MATLAB software in order to demonstrate the particularities of each control strategy according to power quality standards.

Keywords: renewable energies, photovoltaic systems, dc link, voltage source inverter, space vector SVPWM, unbalanced voltage dips, symmetrical components

Procedia PDF Downloads 347
14835 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 444
14834 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 367
14833 Symbolic Analysis of Input Impedance of CMOS Floating Active Inductors with Application in Fully Differential Bandpass Amplifier

Authors: Kittipong Tripetch

Abstract:

This paper proposes studies of input impedance of two types of the CMOS active inductor. It derives two input impedance formulas. The first formula is the input impedance of a grounded active inductor. The second formula is an input impedance of floating active inductor. After that, these formulas can be used to simulate magnitude and phase response of input impedance as a function of current consumption with MATLAB. Common mode rejection ratio (CMRR) of a fully differential bandpass amplifier is derived based on superposition principle. CMRR as a function of input frequency is plotted as a function of current consumption

Keywords: grounded active inductor, floating active inductor, fully differential bandpass amplifier

Procedia PDF Downloads 396
14832 Control Scheme for Single-Stage Boost Inverter for Grid-Connected Photovoltaic

Authors: Mohammad Reza Ebrahimi, Behnaz Mahdaviani

Abstract:

Increasing renewable sources such photovoltaic are the reason of environmental pollution. Because photovoltaic generates power in low voltage, first, generated power should increase. Usually, distributed generation injects their power to AC-Grid, hence after voltage increasing an inverter is needed to convert DC power to AC power. This results in utilization two series converter that grows cost, complexity, and low efficiency. In this paper a single stage inverter is utilized to boost and invert in one stage. Control of this scheme is easier, and its initial cost decreases comparing to conventional double stage inverters. A simple control scheme is used to control active power as well as minimum total harmonic distortion (THD) in injected current. Simulations in MATLAB demonstrate better outputs comparing with conventional approaches.

Keywords: maximum power point tracking, boost inverter, control strategy, three phase inverter

Procedia PDF Downloads 339
14831 Powerful Laser Diode Matrixes for Active Vision Systems

Authors: Dzmitry M. Kabanau, Vladimir V. Kabanov, Yahor V. Lebiadok, Denis V. Shabrov, Pavel V. Shpak, Gevork T. Mikaelyan, Alexandr P. Bunichev

Abstract:

This article is deal with the experimental investigations of the laser diode matrixes (LDM) based on the AlGaAs/GaAs heterostructures (lasing wavelength 790-880 nm) to find optimal LDM parameters for active vision systems. In particular, the dependence of LDM radiation pulse power on the pulse duration and LDA active layer heating as well as the LDM radiation divergence are discussed.

Keywords: active vision systems, laser diode matrixes, thermal properties, radiation divergence

Procedia PDF Downloads 573
14830 Proposal of a Damage Inspection Tool After Earthquakes: Case of Algerian Buildings

Authors: Akkouche Karim, Nekmouche Aghiles, Bouzid Leyla

Abstract:

This study focuses on the development of a multifunctional Expert System (ES) called post-seismic damage inspection tool (PSDIT), a powerful tool which allows the evaluation, the processing and the archiving of the collected data stock after earthquakes. PSDIT can be operated by two user types; an ordinary user (engineer, expert or architect) for the damage visual inspection and an administrative user for updating the knowledge and / or for adding or removing the ordinary user. The knowledge acquisition is driven by a hierarchical knowledge model, the Information from investigation reports and those acquired through feedback from expert / engineer questionnaires are part.

Keywords: buildings, earthquake, seismic damage, damage assessment, expert system

Procedia PDF Downloads 44
14829 Sliding Mode Control of a Bus Suspension System

Authors: Mujde Turkkan, Nurkan Yagiz

Abstract:

The vibrations, caused by the irregularities of the road surface, are to be suppressed via suspension systems. In this paper, sliding mode control for a half bus model with air suspension system is presented. The bus is modelled as five degrees of freedom (DoF) system. The mathematical model of the half bus is developed using Lagrange Equations. For time domain analysis, the bus model is assumed to travel at certain speed over the bump road. The numerical results of the analysis indicate that the sliding mode controllers can be effectively used to suppress the vibrations and to improve the ride comfort of the busses.

Keywords: active suspension system, air suspension, bus model, sliding mode control

Procedia PDF Downloads 362
14828 Control Strategies for a Robot for Interaction with Children with Autism Spectrum Disorder

Authors: Vinicius Binotte, Guilherme Baldo, Christiane Goulart, Carlos Valadão, Eliete Caldeira, Teodiano Bastos

Abstract:

Socially assistive robotic has become increasingly active and it is present in therapies of people affected for several neurobehavioral conditions, such as Autism Spectrum Disorder (ASD). In fact, robots have played a significant role for positive interaction with children with ASD, by stimulating their social and cognitive skills. This work introduces a mobile socially-assistive robot, which was built for interaction with children with ASD, using non-linear control techniques for this interaction.

Keywords: socially assistive robotics, mobile robot, autonomous control, autism

Procedia PDF Downloads 451
14827 Adaptive Control of Magnetorheological Damper Using Duffing-Like Model

Authors: Hung-Jiun Chi, Cheng-En Tsai, Jia-Ying Tu

Abstract:

Semi-active control of Magnetorheological (MR) dampers for vibration reduction of structural systems has received considerable attention in civil and earthquake engineering, because the effective stiffness and damping properties of MR fluid can change in a very short time in reaction to external loading, requiring only a low level of power. However, the inherent nonlinear dynamics of hysteresis raise challenges in the modeling and control processes. In order to control the MR damper, an innovative Duffing-like equation is proposed to approximate the hysteresis dynamics in a deterministic and systematic manner than previously has been possible. Then, the model-reference adaptive control technique based on the Duffing-like model and the Lyapunov method is discussed. Parameter identification work with experimental data is presented to show the effectiveness of the Duffing-like model. In addition, simulation results show that the resulting adaptive gains enable the MR damper force to track the desired response of the reference model satisfactorily, verifying the effectiveness of the proposed modeling and control techniques.

Keywords: magnetorheological damper, duffing equation, model-reference adaptive control, Lyapunov function, hysteresis

Procedia PDF Downloads 341
14826 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 410
14825 Development of an Optimization Method for Myoelectric Signal Processing by Active Matrix Sensing in Robot Rehabilitation

Authors: Noriyoshi Yamauchi, Etsuo Horikawa, Takunori Tsuji

Abstract:

Training by exoskeleton robot is drawing attention as a rehabilitation method for body paralysis seen in many cases, and there are many forms that assist with the myoelectric signal generated by exercise commands from the brain. Rehabilitation requires more frequent training, but it is one of the reasons that the technology is required for the identification of the myoelectric potential derivation site and attachment of the device is preventing the spread of paralysis. In this research, we focus on improving the efficiency of gait training by exoskeleton type robots, improvement of myoelectric acquisition and analysis method using active matrix sensing method, and improvement of walking rehabilitation and walking by optimization of robot control.

Keywords: active matrix sensing, brain machine interface (BMI), the central pattern generator (CPG), myoelectric signal processing, robot rehabilitation

Procedia PDF Downloads 359
14824 Direct Power Control Applied on 5-Level Diode Clamped Inverter Powered by a Renewable Energy Source

Authors: A. Elnady

Abstract:

This paper presents an improved Direct Power Control (DPC) scheme applied to the multilevel inverter that forms a Distributed Generation Unit (DGU). This paper demonstrates the performance of active and reactive power injected by the DGU to the smart grid. The DPC is traditionally operated by the hysteresis controller with the Space Vector Modulation (SVM) which is applied on the 2-level inverters or 3-level inverters. In this paper, the DPC is operated by the PI controller with the Phase-Disposition Pulse Width Modulation (PD-PWM) applied to the 5-level diode clamped inverter. The new combination of the DPC, PI controller, PD-PWM and multilevel inverter proves that its performance is much better than the conventional hysteresis-SVM based DPC. Simulations results have been presented to validate the performance of the suggested control scheme in the grid-connected mode.

Keywords: direct power control, PI controller, PD-PWM, and power control

Procedia PDF Downloads 217
14823 Portable Hands-Free Process Assistant for Gas Turbine Maintenance

Authors: Elisabeth Brandenburg, Robert Woll, Rainer Stark

Abstract:

This paper presents how smart glasses and voice commands can be used for improving the maintenance process of industrial gas turbines. It presents the process of inspecting a gas turbine’s combustion chamber and how it is currently performed using a set of paper-based documents. In order to improve this process, a portable hands-free process assistance system has been conceived. In the following, it will be presented how the approach of user-centered design and the method of paper prototyping have been successfully applied in order to design a user interface and a corresponding workflow model that describes the possible interaction patterns between the user and the interface. The presented evaluation of these results suggests that the assistance system could help the user by rendering multiple manual activities obsolete, thus allowing him to work hands-free and to save time for generating protocols.

Keywords: paper prototyping, smart glasses, turbine maintenance, user centered design

Procedia PDF Downloads 286
14822 Social Media Diffusion And Implications For Opinion Leadership In Northcentral Nigeria

Authors: Chuks Odiegwu-Enwerem

Abstract:

The classical notion of opinion leadership presupposes that the media is at the center of an effective and successful opinion leadership. Under this idea, an opinion leader is an active media user who consumes, understands, digests and interprets the messages for the understanding and acceptance/adoption by lower-end media users – whose access and understanding of media content are supposedly low. Because of their unique access to and presumed understanding of media functions and their content, opinion leaders are typically esteemed by those who look forward to and accept their opinions. Lazarsfeld and Katz’s two-step flow of communication theory is the basis of opinion leadership – propelled by limited access to the media. With the emergence and spread of social media and its unlimited access by all and sundry, however, the study interrogates the relevance and application of opinion leaders and, by implication, the two-step flow communication theory in Nigeria’s Northcentral region. It seeks to determine whether opinion leaders still exist in the picture and if they still exert considerable influence, especially in matters of political conversations and decision-making among the citizens of this area. It further explores whether the diffusion of social media is a reality and how the ‘low-end’ media users react to the new-found freedom of access to media, and how they are using it to inform their decisions on important matters as well as examines if they are still glued to their opinion leaders. This study explores the empirical dimensions of the two-step flow hypothesis in relation to the activities of social media to determine if a change has occurred and in what direction, using mixed methos of Survey and in-depth interviews. Our understanding and belief in some theoretical assumptions may be enhanced or challenged by the study outcome.

Keywords: Opinion Leadership, Active Media User, Two-Step-Flow, Social media, Northcentral Nigeria

Procedia PDF Downloads 42
14821 Facilitating Active Reading Strategies through Caps Chart to Foster Elementary EFL Learners’ Reading Skills and Reading Competency

Authors: Michelle Bulawan, Mei-Hua Chen

Abstract:

Reading comprehension is crucial for acquiring information, analyzing critically, and achieving academic proficiency. However, there is a lack of growth in reading comprehension skills beyond fourth grade. The developmental shift from "learning to read" to "reading to learn" occurs around this stage. Factual knowledge and diverse views in articles enhance reading comprehension abilities. Nevertheless, some face difficulties due to evolving textual requirements, such as expanding vocabulary and using longer, more complex terminology. Most research on reading strategies has been conducted at the tertiary and secondary levels, while few have focused on the elementary levels. Furthermore, the use of character, ask, problem, solution (CAPS) charts in teaching reading has also been hardly explored. Thus, the researcher decided to explore the facilitation of active reading strategies through the CAPS chart and address the following research questions: a) What differences existed in elementary EFL learners' reading competency among those who engaged in active reading strategies and those who did not? b) What are the learners’ metacognitive skills of those who engage in active reading strategies and those who do not, and what are their effects on their reading competency? c) For those participants who engage in active reading activities, what are their perceptions about incorporating active reading activities into their English classroom learning? Two groups of elementary EFL learners, each with 18 students of the same level of English proficiency, participated in this study. Group A served as the control group, while Group B served as the experimental group. Two teachers also participated in this research; one of them was the researcher who handled the experimental group. The treatment lasts for one whole semester or seventeen weeks. In addition to the CAPS chart, the researcher also used the metacognitive awareness of reading strategy inventory (MARSI) and a ten-item, five-point Likert scale survey.

Keywords: active reading, EFL learners, metacognitive skills, reading competency, student’s perception

Procedia PDF Downloads 42
14820 CFD Simulation for Development of Cooling System in a Cooking Oven

Authors: V. Jagadish, Mathiyalagan V.

Abstract:

Prediction of Door Touch temperature of a Cooking Oven using CFD Simulation. Self-Clean cycle is carried out in Cooking ovens to convert food spilling into ashes which makes cleaning easy. During this cycle cavity of oven is exposed to high temperature around 460 C. At this operating point the user may prone to touch the Door surfaces, Side Shield, Control Panel. To prevent heat experienced by user, cooling system is built in oven. The most effective cooling system is developed with existing design constraints through CFD Simulations. Cross Flow fan is used for Cooling system due to its cost effectiveness and it can give more air flow with low pressure drop.

Keywords: CFD, MRF, RBM, RANS, new product development, simulation, thermal analysis

Procedia PDF Downloads 125
14819 Harmonic Assessment and Mitigation in Medical Diagonesis Equipment

Authors: S. S. Adamu, H. S. Muhammad, D. S. Shuaibu

Abstract:

Poor power quality in electrical power systems can lead to medical equipment at healthcare centres to malfunction and present wrong medical diagnosis. Equipment such as X-rays, computerized axial tomography, etc. can pollute the system due to their high level of harmonics production, which may cause a number of undesirable effects like heating, equipment damages and electromagnetic interferences. The conventional approach of mitigation uses passive inductor/capacitor (LC) filters, which has some drawbacks such as, large sizes, resonance problems and fixed compensation behaviours. The current trends of solutions generally employ active power filters using suitable control algorithms. This work focuses on assessing the level of Total Harmonic Distortion (THD) on medical facilities and various ways of mitigation, using radiology unit of an existing hospital as a case study. The measurement of the harmonics is conducted with a power quality analyzer at the point of common coupling (PCC). The levels of measured THD are found to be higher than the IEEE 519-1992 standard limits. The system is then modelled as a harmonic current source using MATLAB/SIMULINK. To mitigate the unwanted harmonic currents a shunt active filter is developed using synchronous detection algorithm to extract the fundamental component of the source currents. Fuzzy logic controller is then developed to control the filter. The THD without the active power filter are validated using the measured values. The THD with the developed filter show that the harmonics are now within the recommended limits.

Keywords: power quality, total harmonics distortion, shunt active filters, fuzzy logic

Procedia PDF Downloads 450
14818 Simulator Dynamic Positioning System with Azimuthal Thruster

Authors: Robson C. Santos, Christian N. Barreto, Gerson G. Cunha, Severino J. C. Neto

Abstract:

This paper aims to project the construction of a prototype azimuthal thruster, mounted with materials of low cost and easy access, testing in a controlled environment to measure their performance, characteristics and feasibility of future projects. The construction of the simulation of dynamic positioning software, responsible for simulating a vessel and reposition it when necessary . Tests for partial and full validation of the model were conducted, operates independently of the control system and executes the commands and commands of the helix of rotation azimuth. The system provides an interface to the user and simulates the conditions unfavorable positioning of a vessel, accurately calculates the azimuth angle, the direction of rotation of the helix and the time that this should be turned on so that the vessel back to position original. There is a serial communication that connects the Simulation Dynamic Positioning System with Embedded System causing the user-generated data to simulate the DP system arrives in the form of control signals to the motors of the propellant. This article addresses issues in the marine industry employees.

Keywords: azimuthal thruster, dynamic positioning, embedded system, simulator dynamic positioning

Procedia PDF Downloads 431
14817 Control of a Wind Energy Conversion System Works in Tow Operating Modes (Hyper Synchronous and Hypo Synchronous)

Authors: A. Moualdia, D. J. Boudana, O. Bouchhida, A. Medjber

Abstract:

Wind energy has many advantages, it does not pollute and it is an inexhaustible source. However, the cost of this energy is still too high to compete with traditional fossil fuels, especially on sites less windy. The performance of a wind turbine depends on three parameters: the power of wind, the power curve of the turbine and the generator's ability to respond to wind fluctuations. This paper presents a control chain conversion based on a double-fed asynchronous machine and flow-oriented. The supply system comprises of two identical converters, one connected to the rotor and the other one connected to the network via a filter. The architecture of the device is up by three commands are necessary for the operation of the turbine control extraction of maximum power of the wind to control itself (MPPT) control of the rotor side converter controlling the electromagnetic torque and stator reactive power and control of the grid side converter by controlling the DC bus voltage and active power and reactive power exchanged with the network. The proposed control has been validated in both modes of operation of the three-bladed wind 7.5 kW, using Matlab/Simulink. The results of simulation control technology study provide good dynamic performance and static.

Keywords: D.F.I.G, variable wind speed, hypersynchrone, energy quality, hyposynchrone

Procedia PDF Downloads 340
14816 Evaluation of the Diagnostic Potential of IL-2 after Specific Antigen Stimulation with PE35 (Rv3872) and PPE68 (Rv3873) for the Discrimination of Active and Latent Tuberculosis

Authors: Shima Mahmoudi, Babak Pourakbari, Setareh Mamishi, Mostafa Teymuri, Majid Marjani

Abstract:

Although cytokine analysis has greatly contributed to the understanding of tuberculosis (TB) pathogenesis, data on cytokine profiles that might distinguish progression from latency of TB infection are scarce. Since PE/PPE proteins are known to induce strong humoral and cellular immune responses, the aim of this study was to evaluate the diagnostic potential of interleukin-2 (IL-2) as biomarker after specific antigen stimulation with PE35 and PPE68 for the discrimination of active and latent tuberculosis infection (LTBI). The production of IL-2 was measured in the antigen-stimulated whole-blood supernatants following stimulation with recombinant PE35 and PPE68. All the patients with active TB and LTBI had positive QuantiFERON-TB Gold in Tube test. The level of IL-2 following stimulation with recombinant PE35 and PPE68 were significantly higher in LTBI group than in patients with active TB infection or control group. The discrimination performance (assessed by the area under ROC curve) for IL-2 following stimulation with recombinant PE35 and PPE68 between LTBI and patients with active TB were 0.837 (95%CI: 0.72-0.97) and 0.75 (95%CI: 0.63-0.89), respectively. Applying the 12.4 pg/mL cut-off for IL-2 induced by PE35 in the present study population resulted in sensitivity of 78%, specificity of 78%, PPV of 78% and NPV of 100%. In addition, a sensitivity of 81%, specificity of 70%, PPV of 67% and 87% of NPV was reported based on the 4.4 pg/mL cut-off for IL-2 induced by PPE68. In conclusion, peptides of the antigen PE35 and PPE68, absent from commonly used BCG strains, stimulated strong IL-2- positive T cell responses in patients with LTBI. This study confirms IL-2 induced by PE35 and PPE68 as a sensitive and specific biomarker and highlights IL-2 as new promising adjunct markers for discriminating of LTBI and Active TB infection.

Keywords: IL-2, PE35, PPE68, tuberculosis

Procedia PDF Downloads 378
14815 Semantic Platform for Adaptive and Collaborative e-Learning

Authors: Massra M. Sabeima, Myriam lamolle, Mohamedade Farouk Nanne

Abstract:

Adapting the learning resources of an e-learning system to the characteristics of the learners is an important aspect to consider when designing an adaptive e-learning system. However, this adaptation is not a simple process; it requires the extraction, analysis, and modeling of user information. This implies a good representation of the user's profile, which is the backbone of the adaptation process. Moreover, during the e-learning process, collaboration with similar users (same geographic province or knowledge context) is important. Productive collaboration motivates users to continue or not abandon the course and increases the assimilation of learning objects. The contribution of this work is the following: we propose an adaptive e-learning semantic platform to recommend learning resources to learners, using ontology to model the user profile and the course content, furthermore an implementation of a multi-agent system able to progressively generate the learning graph (taking into account the user's progress, and the changes that occur) for each user during the learning process, and to synchronize the users who collaborate on a learning object.

Keywords: adaptative learning, collaboration, multi-agent, ontology

Procedia PDF Downloads 144
14814 Design and Implementation of Remote Control Application for Elderly People Who Live Alone

Authors: Cristina Nieves Perdomo Delgado

Abstract:

The study consists of the design and use of an application for cell phones called “Me Cuido” that consists of remote control of elderly people who live alone with their families. The objective of the study is to analyze the usability of the application by 40-year-olds using the Questionnaire for User Interaction Satisfaction (QUIS) method. The results highlight that the application has a design adapted to the elderly and that it is easy to use and understand.

Keywords: design, assistive technology, elderly people, independence

Procedia PDF Downloads 213
14813 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 510
14812 Motor Controller Implementation Using Model Based Design

Authors: Cau Tran, Tu Nguyen, Tien Pham

Abstract:

Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.

Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol

Procedia PDF Downloads 70
14811 Active Features Determination: A Unified Framework

Authors: Meenal Badki

Abstract:

We address the issue of active feature determination, where the objective is to determine the set of examples on which additional data (such as lab tests) needs to be gathered, given a large number of examples with some features (such as demographics) and some examples with all the features (such as the complete Electronic Health Record). We note that certain features may be more costly, unique, or laborious to gather. Our proposal is a general active learning approach that is independent of classifiers and similarity metrics. It allows us to identify examples that differ from the full data set and obtain all the features for the examples that match. Our comprehensive evaluation shows the efficacy of this approach, which is driven by four authentic clinical tasks.

Keywords: feature determination, classification, active learning, sample-efficiency

Procedia PDF Downloads 29
14810 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 306
14809 Evaluation of Multi-Sectoral Schistosomiasis Control in Indonesia

Authors: Hayani Anastasia, Junus Widjaja, Anis Nur Widayati

Abstract:

In Indonesia, schistosomiasis is caused by Schistosoma japonicum with Oncomelania hupensis lindoensis as the intermediate host. Schistosomiasis can infect humans and all species of mammals. In order to achieve schistosomiasis elimination by 2020, schistosomiasis control, including environmental management, has been carried out by multi-sector. A cross-sectional study was conducted in 2018 to evaluate the multi-sectoral schistosomiasis control program. Data were collected by depth interviews of stakeholders, stool surveys, snail surveys, observation, and document reviews. About 53.6% of control programs in the schistosomiasis control roadmap were not achieved. The number of foci area found in 2018 are not significantly different compared to before the control programs. Moreover, the prevalence of schistosomiasis in the human was 0-5.1% and in mammals was the range from 0 to 10%. In order to overcome the problems, a policy about schistosomiasis as a priority program in ministries and agencies other than the Ministry of Health is needed. Innovative health promotion with interactive media also needs to be applied. Also, the schistosomiasis work team needs to be more active with the Agency of Regional Development as the leading sector.

Keywords: evaluation, Indonesia, multi-sector, schistosomiasis

Procedia PDF Downloads 97
14808 Excitation and Active Control of Charge Density Waves at Degenerately Doped PN++ Junctions

Authors: R. K. Vinnakota, D. A. Genov, Z. Dong, A. F. Briggs, L. Nordin, S. R. Bank, D. Wasserman

Abstract:

We present a semiconductor-based plasmonic electro-optic modulator based on excitation and active control of surface plasmon polaritons (SPPs) at the interface of degenerately doped In₀.₅₃Ga₀.₄₇As pn++ junctions. Set of devices, which we refer to as a surface plasmon polariton diode (SPPD), are fabricated and characterized electrically and optically. Optical characterization predicts far-field voltage-aided reflectivity modulation for mid-IR wavelengths. Numerical device characterizations using a self-consistent electro-optic multiphysics model have been performed to confirm the experimental findings were predicting data rates up to 1Gbits/s and 3dB bandwidth as high as 2GHz. Our findings also show that decreasing the device dimensions can potentially lead to data rates of more than 50Gbits/s, thus potentially providing a pathway toward fast all-semiconductor-based plasmotronic devices.

Keywords: plasmonics, optoelectronics, PN junctions, surface plasmon polaritons

Procedia PDF Downloads 78
14807 Automated User Story Driven Approach for Web-Based Functional Testing

Authors: Mahawish Masud, Muhammad Iqbal, M. U. Khan, Farooque Azam

Abstract:

Manual writing of test cases from functional requirements is a time-consuming task. Such test cases are not only difficult to write but are also challenging to maintain. Test cases can be drawn from the functional requirements that are expressed in natural language. However, manual test case generation is inefficient and subject to errors.  In this paper, we have presented a systematic procedure that could automatically derive test cases from user stories. The user stories are specified in a restricted natural language using a well-defined template.  We have also presented a detailed methodology for writing our test ready user stories. Our tool “Test-o-Matic” automatically generates the test cases by processing the restricted user stories. The generated test cases are executed by using open source Selenium IDE.  We evaluate our approach on a case study, which is an open source web based application. Effectiveness of our approach is evaluated by seeding faults in the open source case study using known mutation operators.  Results show that the test case generation from restricted user stories is a viable approach for automated testing of web applications.

Keywords: automated testing, natural language, restricted user story modeling, software engineering, software testing, test case specification, transformation and automation, user story, web application testing

Procedia PDF Downloads 361