Search results for: Higher Order Cumulants
6729 Measurement Tools of the Maturity Model for IT Service Outsourcing in Higher Education Institutions
Authors: Victoriano Valencia García, Luis Usero Aragonés, Eugenio J. Fernández Vicente
Abstract:
Nowadays, the successful implementation of ICTs is vital for almost any kind of organization. Good governance and ICT management are essential for delivering value, managing technological risks, managing resources and performance measurement. In addition, outsourcing is a strategic IT service solution which complements IT services provided internally in organizations. This paper proposes the measurement tools of a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38500, and the frameworks and best practices of ITIL and COBIT, with a specific focus on IT outsourcing. These measurement tools allow independent validation and practical application in the field of higher education, using a questionnaire, metrics tables, and continuous improvement plan tables as part of the measurement process. Guidelines and standards are proposed in the model for facilitating adaptation to universities and achieving excellence in the outsourcing of IT services.
Keywords: IT Governance, IT Management, IT Services, Maturity Model, Measurement Tools, Outsourcing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27906728 Effect of Plant Biostimulants on Fruit Set, Yield, and Quality Attributes of “Farbaly” Apricot Cultivar
Authors: A. Tarantino, F. Lops, G. Disciglio, E. Tarantino
Abstract:
Apulia region (southern Italy) is excellent for heavy production of apricot (Prunus armeniaca L.). Fruit quality is a combination of physical, chemical and nutritional characteristics. The present experiment was laid in the commercial orchard in Cerignola (Foggia district, Apulia region, 41°15’49’’N; 15°53’59’’E; 126 a.s.l.) during the 2014-2015 season. The experiment consisted of the use of three biostimulant treatments (Hendophyt®, Ergostim® and Radicon®) compared with untreated control on ‘Farbaly’ apricot cultivar, in order to evaluate the vegeto-productive and fruit qualitative attributes. Foliar spray of biostimulants was applied at different times during the growth season (at red ball, fruit setting and fruit development stages). Experimental data showed some specific differences among the biostimulant treatments, which fruit set, growth and productivity were affected. Moderate influences were found regarding the qualitative attributes of fruits. The soluble solid content was positively affected by Hendophyt® treatment. Antioxidant capacity was significantly higher in Hendophyt® and Radicon® treatments respect to the untreated control.Keywords: Prunus Armeniaca L., biostimulants, fruit set, fruit quality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12966727 Effect of the Support Shape on Fischer-Tropsch Cobalt Catalyst Performance
Authors: Jian Huang, Weixin Qian, Hongfang Ma, Haitao Zhang, Weiyong Ying
Abstract:
Cobalt catalysts were supported on extruded silica carrier and different-type (SiO2, γ-Al2O3) commercial supports with different shapes and sizes to produce heavy hydrocarbons for Fischer-Tropsch synthesis. The catalysts were characterized by N2 physisorption and H2-TPR. The catalytic performance of the catalysts was tested in a fixed bed reactor. The results of Fischer-Tropsch synthesis performance showed that the cobalt catalyst supported on spherical silica supports displayed a higher activity and a higher selectivity to C5+ products, due to the fact that the active components were only distributed in the surface layer of spherical carrier, and the influence of gas diffusion restriction on catalytic performance was weakened. Therefore, it can be concluded that the eggshell cobalt catalyst was superior to precious metals modified catalysts in the synthesis of heavy hydrocarbons.
Keywords: Fischer-Tropsch synthesis, cobalt catalyst, support shape, heavy hydrocarbons.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7656726 A Novel Method For evaluating Parameters Of Ongoing Calls In Low Earth Orbit Mobile Satellite System
Authors: Wassila Kiamouche, Malek Benslama
Abstract:
In order to derive important parameters concerning mobile subscriber MS with ongoing calls in Low Earth Orbit Mobile Satellite Systems LEO MSSs, a positioning system had to be integrated into MSS in order to localize mobile subscribers MSs and track them during the connection. Such integration is regarded as a complex implementation. We propose in this paper a novel method based on advantages of mobility model of Low Earth Orbit Mobile Satellite System LEO MSS called Evaluation Parameters Method EPM which allows for such systems the evaluation of different information concerning a MS with a call in progress even if its location is unknown.Keywords: Cellular layout, LEO mobile satellite system, mobilitymodel, positioning system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13266725 Monitoring and Fault-Recovery Capacity with Waveguide Grating-based Optical Switch over WDM/OCDMA-PON
Authors: Yao-Tang Chang, Chuen-Ching Wang, Shu-Han Hu
Abstract:
In order to implement flexibility as well as survivable capacities over passive optical network (PON), a new automatic random fault-recovery mechanism with array-waveguide-grating based (AWG-based) optical switch (OSW) is presented. Firstly, wavelength-division-multiplexing and optical code-division multiple-access (WDM/OCDMA) scheme are configured to meet the various geographical locations requirement between optical network unit (ONU) and optical line terminal (OLT). The AWG-base optical switch is designed and viewed as central star-mesh topology to prohibit/decrease the duplicated redundant elements such as fiber and transceiver as well. Hence, by simple monitoring and routing switch algorithm, random fault-recovery capacity is achieved over bi-directional (up/downstream) WDM/OCDMA scheme. When error of distribution fiber (DF) takes place or bit-error-rate (BER) is higher than 10-9 requirement, the primary/slave AWG-based OSW are adjusted and controlled dynamically to restore the affected ONU groups via the other working DFs immediately.Keywords: Random fault recovery mechanism, Array-waveguide-grating based optical switch (AWG- based OSW), wavelength-division-multiplexing and optical code-divisionmultiple-access (WDM/ OCDMA)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16406724 Investigation into Heterotrophic Activities and Algal Biomass in Surface Flow Stormwater Wetlands
Authors: Wendong Tao
Abstract:
Stormwater wetlands have been mainly designed in an empirical approach for water quality improvement, with little quantitative understanding of the internal microbial processes. This study investigated into heterotrophic bacterial production rate, heterotrophic bacterial mineralization percentage, and algal biomass in hypertrophic and eutrophic surface flow stormwater wetlands. Compared to a nearby wood leachate treatment wetland, the stormwater wetlands had much higher chlorophyll-a concentrations. The eutrophic stormwater wetland had improved water quality, whereas the hypertrophic stormwater wetland had degraded water quality. Heterotrophic bacterial activities in water were limited in the stormwater wetlands due to competition of algal growth for nutrients. The relative contribution of biofilms to the overall heterotrophic activities was higher in the stormwater wetlands than that in the wood leachate treatment wetland.Keywords: chlorophyll-a, constructed wetland, heterotrophicproduction, mineralization, stormwater
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14876723 A Novel Digital Watermarking Technique Basedon ISB (Intermediate Significant Bit)
Authors: Akram M. Zeki, Azizah A. Manaf
Abstract:
Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the least significant bit of the image data with a bit of the watermark data. The disadvantage of LSB is that it is not robust against attacks. In this study intermediate significant bit (ISB) has been used in order to improve the robustness of the watermarking system. The aim of this model is to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. The technique is based on testing the value of the watermark pixel according to the range of each bit-plane.Keywords: Watermarking, LSB, ISB, Robustness.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17086722 Iris Recognition Based On the Low Order Norms of Gradient Components
Authors: Iman A. Saad, Loay E. George
Abstract:
Iris pattern is an important biological feature of human body; it becomes very hot topic in both research and practical applications. In this paper, an algorithm is proposed for iris recognition and a simple, efficient and fast method is introduced to extract a set of discriminatory features using first order gradient operator applied on grayscale images. The gradient based features are robust, up to certain extents, against the variations may occur in contrast or brightness of iris image samples; the variations are mostly occur due lightening differences and camera changes. At first, the iris region is located, after that it is remapped to a rectangular area of size 360x60 pixels. Also, a new method is proposed for detecting eyelash and eyelid points; it depends on making image statistical analysis, to mark the eyelash and eyelid as a noise points. In order to cover the features localization (variation), the rectangular iris image is partitioned into N overlapped sub-images (blocks); then from each block a set of different average directional gradient densities values is calculated to be used as texture features vector. The applied gradient operators are taken along the horizontal, vertical and diagonal directions. The low order norms of gradient components were used to establish the feature vector. Euclidean distance based classifier was used as a matching metric for determining the degree of similarity between the features vector extracted from the tested iris image and template features vectors stored in the database. Experimental tests were performed using 2639 iris images from CASIA V4-Interival database, the attained recognition accuracy has reached up to 99.92%.
Keywords: Iris recognition, contrast stretching, gradient features, texture features, Euclidean metric.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19656721 Improvement on a CNC Gantry Machine Structure Design for Higher Machining Speed Capability
Authors: Ahmed A. D. Sarhan, S. R. Besharaty, Javad Akbaria, M. Hamdi
Abstract:
The capability of CNC gantry milling machines in manufacturing long components has caused the expanded use of such machines. On the other hand, the machines’ gantry rigidity can reduce under severe loads or vibration during operation. Indeed, the quality of machining is dependent on the machine’s dynamic behavior throughout the operating process. For this reason, these types of machines have always been used widely and are not efficient. Therefore, they can usually be employed for rough machining and may not produce adequate surface finishing. In this paper, a CNC gantry milling machine with the potential to produce good surface finish has been designed and analyzed. The lowest natural frequency of this machine is 202 Hz corresponding to 12000 rpm at all motion amplitudes with a full range of suitable frequency responses. Meanwhile, the maximum deformation under dead loads for the gantry machine is 0.565*m, indicating that this machine tool is capable of producing higher product quality.
Keywords: Finite element, frequency response, gantry design, gantry machine, static and dynamic analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 60346720 An Efficient Architecture for Interleaved Modular Multiplication
Authors: Ahmad M. Abdel Fattah, Ayman M. Bahaa El-Din, Hossam M.A. Fahmy
Abstract:
Modular multiplication is the basic operation in most public key cryptosystems, such as RSA, DSA, ECC, and DH key exchange. Unfortunately, very large operands (in order of 1024 or 2048 bits) must be used to provide sufficient security strength. The use of such big numbers dramatically slows down the whole cipher system, especially when running on embedded processors. So far, customized hardware accelerators - developed on FPGAs or ASICs - were the best choice for accelerating modular multiplication in embedded environments. On the other hand, many algorithms have been developed to speed up such operations. Examples are the Montgomery modular multiplication and the interleaved modular multiplication algorithms. Combining both customized hardware with an efficient algorithm is expected to provide a much faster cipher system. This paper introduces an enhanced architecture for computing the modular multiplication of two large numbers X and Y modulo a given modulus M. The proposed design is compared with three previous architectures depending on carry save adders and look up tables. Look up tables should be loaded with a set of pre-computed values. Our proposed architecture uses the same carry save addition, but replaces both look up tables and pre-computations with an enhanced version of sign detection techniques. The proposed architecture supports higher frequencies than other architectures. It also has a better overall absolute time for a single operation.Keywords: Montgomery multiplication, modular multiplication, efficient architecture, FPGA, RSA
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24566719 The Loyalty of Banks’ Employees in the Context of the Acceptance of Clients’ Needs and Their Own Productivity. A Case Study from the Czech and Slovak Republic
Authors: J. Belás, E. Cipovová, M. Holec
Abstract:
The aim of this article was to analyze the relationship between the loyalty of banks´ employees and the acceptance of clients’ needs and to analyze the relationship between the loyalty of banks’ employees and the lack of their productivity in the Czech and Slovak banking sector. Our research has been realized through a questionnaire survey.
The loyalty of banks’ employees was higher in the Czech Republic than in Slovak Republic which has been transformed into a higher acceptance rate of customers’ needs and lower lack of employees’ productivity. Within both countries, it has been found that the approach of loyal employees to the acceptance of clients’ needs is not statistically significantly different from the approach of other employees. It has been also discovered that loyal employees did not work more intensively and did not feel statistically significant lower lack of their own productivity.
Keywords: Acceptance of clients’ needs, loyalty of banks’ employees, productivity of employees.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24636718 Direct Numerical Simulation of Oxygen Transfer at the Air-Water Interface in a Convective Flow Environment and Comparison to Experiments
Authors: B. Kubrak J. Wissink H. Herlina
Abstract:
Two-dimensional Direct Numerical Simulation (DNS) of high Schmidt number mass transfer in a convective flow environment (Rayleigh-B'enard) is carried out and results are compared to experimental data. A fourth-order accurate WENO-scheme has been used for scalar transport in order to aim for a high accuracy in areas of high concentration gradients. It was found that the typical spatial distance between downward plumes of cold high concentration water and the eddy size are in good agreement with experiments using a combined PIV-LIF technique for simultaneous and spatially synoptic measurements of 2D velocity and concentration fields.Keywords: Air-Water Interface, DNS, Gas Transfer, LIF.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13296717 Discrete Modified Internal Model Control for a nth-order Plant with an Integrator and Dead-time
Authors: Manato Ono, Hiromitsu Ogawa, Naohiro Ban, Yoshihisa Ishida
Abstract:
This paper deals with a design method of a discrete modified Internal Model Control (IMC) for a plant with an integrator and dead time. If there is a load disturbance in the input or output side of the plant, the proposed control system can eliminate the steady-state error caused by it. The disturbance compensator in this method is simple and its order is low regardless of that of a plant. The simulation studies show that the proposed method has superior performance for a load disturbance rejection and robustness.Keywords: Internal Model Control, Smith Predictor, Dead time, Integrator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16596716 An Analysis of Eco-efficiency and GHG Emission of Olive Oil Production in Northeast of Portugal
Authors: M. Feliciano, F. Maia, A. Gonçalves
Abstract:
Olive oil production sector plays an important role in Portuguese economy. It had a major growth over the last decade, increasing its weight in the overall national exports. International market penetration for Mediterranean traditional products is increasingly more demanding, especially in the Northern European markets, where consumers are looking for more sustainable products. Trying to support this growing demand this study addresses olive oil production under the environmental and eco-efficiency perspectives. The analysis considers two consecutive product life cycle stages: olive trees farming; and olive oil extraction in mills. Addressing olive farming, data collection covered two different organizations: a middle-size farm (~12ha) (F1) and a large-size farm (~100ha) (F2). Results from both farms show that olive collection activities are responsible for the largest amounts of Green House Gases (GHG) emissions. In this activities, estimate for the Carbon Footprint per olive was higher in F2 (188g CO2e/kgolive) than in F1 (148g CO2e/kgolive). Considering olive oil extraction, two different mills were considered: one using a two-phase system (2P) and other with a three-phase system (3P). Results from the study of two mills show that there is a much higher use of water in 3P. Energy intensity (EI) is similar in both mills. When evaluating the GHG generated, two conditions are evaluated: a biomass neutral condition resulting on a carbon footprint higher in 3P (184g CO2e/Lolive oil) than in 2P (92g CO2e/Lolive oil); and a non-neutral biomass condition in which 2P increase its carbon footprint to 273g CO2e/Lolive oil. When addressing the carbon footprint of possible combinations among studied subsystems, results suggest that olive harvesting is the major source for GHG.
Keywords: Carbon footprint, environmental indicators, farming subsystem, industrial subsystem, olive oil.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29186715 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies, and therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and thus the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.
Keywords: Cyberattacks, detection, first-order logic, Metaverse, privacy, security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 686714 Effect of Incremental Forming Parameters on Titanium Alloys Properties
Authors: Petr Homola, Lucie Novakova, Vaclav Kafka, Mariluz P. Oscoz
Abstract:
Shear spinning is closely related to the asymmetric incremental sheet forming (AISF) that could significantly reduce costs incurred by the fabrication of complex aeronautical components with a minimal environmental impact. The spinning experiments were carried out on commercially pure titanium (Ti-Gr2) and Ti-6Al-4V (Ti-Gr5) alloy. Three forming modes were used to characterize the titanium alloys properties from the point of view of different spinning parameters. The structure and properties of the materials were assessed by means of metallographic analyses and microhardness measurements. The highest value wall angle failure limit was achieved using spinning parameters mode for both materials. The feed rate effect was observed only in the samples from the Ti-Gr2 material, when a refinement of the grain microstructure with lower feed rate and higher tangential speed occurred. Ti-Gr5 alloy exhibited a decrease of the microhardness at higher straining due to recovery processes.
Keywords: Incremental forming, metallography, shear spinning, titanium alloys.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32856713 Statistical Approach to Basis Function Truncation in Digital Interpolation Filters
Authors: F. Castillo, J. Arellano, S. Sánchez
Abstract:
In this paper an alternative analysis in the time domain is described and the results of the interpolation process are presented by means of functions that are based on the rule of conditional mathematical expectation and the covariance function. A comparison between the interpolation error caused by low order filters and the classic sinc(t) truncated function is also presented. When fewer samples are used, low-order filters have less error. If the number of samples increases, the sinc(t) type functions are a better alternative. Generally speaking there is an optimal filter for each input signal which depends on the filter length and covariance function of the signal. A novel scheme of work for adaptive interpolation filters is also presented.Keywords: Interpolation, basis function, over-sampling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15566712 Modeling of Session Initiation Protocol Invite Transaction using Colored Petri Nets
Authors: Sabina Baraković, Dragan Jevtić, Jasmina Baraković Husić
Abstract:
Wireless mobile communications have experienced the phenomenal growth through last decades. The advances in wireless mobile technologies have brought about a demand for high quality multimedia applications and services. For such applications and services to work, signaling protocol is required for establishing, maintaining and tearing down multimedia sessions. The Session Initiation Protocol (SIP) is an application layer signaling protocols, based on request/response transaction model. This paper considers SIP INVITE transaction over an unreliable medium, since it has been recently modified in Request for Comments (RFC) 6026. In order to help in assuring that the functional correctness of this modification is achieved, the SIP INVITE transaction is modeled and analyzed using Colored Petri Nets (CPNs). Based on the model analysis, it is concluded that the SIP INVITE transaction is free of livelocks and dead codes, and in the same time it has both desirable and undesirable deadlocks. Therefore, SIP INVITE transaction should be subjected for additional updates in order to eliminate undesirable deadlocks. In order to reduce the cost of implementation and maintenance of SIP, additional remodeling of the SIP INVITE transaction is recommended.Keywords: Colored Petri Nets, SIP INVITE, state space, dead marking
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29186711 Cubic Trigonometric B-Spline Applied to Linear Two-Point Boundary Value Problems of Order Two
Authors: Nur Nadiah Abd Hamid , Ahmad Abd. Majid, Ahmad Izani Md. Ismail
Abstract:
Linear two-point boundary value problems of order two are solved using cubic trigonometric B-spline interpolation method (CTBIM). Cubic trigonometric B-spline is a piecewise function consisting of trigonometric equations. This method is tested on some problems and the results are compared with cubic B-spline interpolation method (CBIM) from the literature. CTBIM is found to approximate the solution slightly more accurately than CBIM if the problems are trigonometric.Keywords: trigonometric B-spline, two-point boundary valueproblem, spline interpolation, cubic spline
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25816710 Performance Analysis of Heterogeneous Cellular Networks with Multiple Connectivity
Authors: Sungkyung Kim, Jee-Hyeon Na, Dong-Seung Kwon
Abstract:
Future mobile networks following 5th generation will be characterized by one thousand times higher gains in capacity; connections for at least one hundred billion devices; user experience capable of extremely low latency and response times. To be close to the capacity requirements and higher reliability, advanced technologies have been studied, such as multiple connectivity, small cell enhancement, heterogeneous networking, and advanced interference and mobility management. This paper is focused on the multiple connectivity in heterogeneous cellular networks. We investigate the performance of coverage and user throughput in several deployment scenarios. Using the stochastic geometry approach, the SINR distributions and the coverage probabilities are derived in case of dual connection. Also, to compare the user throughput enhancement among the deployment scenarios, we calculate the spectral efficiency and discuss our results.
Keywords: Heterogeneous networks, multiple connectivity, small cell enhancement, stochastic geometry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19656709 A Formal Approach for Proof Constructions in Cryptography
Authors: Markus Kaiser, Johannes Buchmann
Abstract:
In this article we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (σ-algebras, probability spaces and conditional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes- Formula. Besides, we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this article shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in cryptographic research, if the corresponding basic mathematical knowledge is available in a database.Keywords: prime numbers, primality tests, (conditional) probabilitydistributions, formal proof system, higher-order logic, formalverification, Bayes' Formula, Miller-Rabin primality test.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14706708 Demand and Price Evolution Forecasting as Tools for Facilitating the RoadMapping Process of the Photonic Component Industry
Authors: T. Kamalakis, I. Neokosmidis, D. Varoutas, T. Sphicopoulos
Abstract:
The photonic component industry is a highly innovative industry with a large value chain. In order to ensure the growth of the industry much effort must be devoted to road mapping activities. In such activities demand and price evolution forecasting tools can prove quite useful in order to help in the roadmap refinement and update process. This paper attempts to provide useful guidelines in roadmapping of optical components and considers two models based on diffusion theory and the extended learning curve for demand and price evolution forecasting.Keywords: Roadmapping, Photonic Components, Forecasting, Diffusion Theory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13796707 Design for Reliability and Manufacturing Yield (Study and Modeling of Defects in Integrated Circuits for their Reliability Analysis)
Authors: G. Ait Abdelmalek, R. Ziani
Abstract:
In this document, we have proposed a robust conceptual strategy, in order to improve the robustness against the manufacturing defects and thus the reliability of logic CMOS circuits. However, in order to enable the use of future CMOS technology nodes this strategy combines various types of design: DFR (Design for Reliability), techniques of tolerance: hardware redundancy TMR (Triple Modular Redundancy) for hard error tolerance, the DFT (Design for Testability. The Results on largest ISCAS and ITC benchmark circuits show that our approach improves considerably the reliability, by reducing the key factors, the area costs and fault tolerance probability.Keywords: Design for reliability, design for testability, fault tolerance, manufacturing yield.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20666706 Effects of Hidden Unit Sizes and Autoregressive Features in Mental Task Classification
Authors: Ramaswamy Palaniappan, Nai-Jen Huan
Abstract:
Classification of electroencephalogram (EEG) signals extracted during mental tasks is a technique that is actively pursued for Brain Computer Interfaces (BCI) designs. In this paper, we compared the classification performances of univariateautoregressive (AR) and multivariate autoregressive (MAR) models for representing EEG signals that were extracted during different mental tasks. Multilayer Perceptron (MLP) neural network (NN) trained by the backpropagation (BP) algorithm was used to classify these features into the different categories representing the mental tasks. Classification performances were also compared across different mental task combinations and 2 sets of hidden units (HU): 2 to 10 HU in steps of 2 and 20 to 100 HU in steps of 20. Five different mental tasks from 4 subjects were used in the experimental study and combinations of 2 different mental tasks were studied for each subject. Three different feature extraction methods with 6th order were used to extract features from these EEG signals: AR coefficients computed with Burg-s algorithm (ARBG), AR coefficients computed with stepwise least square algorithm (ARLS) and MAR coefficients computed with stepwise least square algorithm. The best results were obtained with 20 to 100 HU using ARBG. It is concluded that i) it is important to choose the suitable mental tasks for different individuals for a successful BCI design, ii) higher HU are more suitable and iii) ARBG is the most suitable feature extraction method.Keywords: Autoregressive, Brain-Computer Interface, Electroencephalogram, Neural Network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18036705 TiO2 Nanowires as Efficient Heterogeneous Photocatalysts for Waste-Water Treatment
Authors: Gul Afreen, Sreedevi Upadhyayula, Mahendra K. Sunkara
Abstract:
One-dimensional (1D) nanostructures like nanowires, nanotubes, and nanorods find variety of practical application owing to their unique physico-chemical properties. In this work, TiO2 nanowires were synthesized by direct oxidation of titanium particles in a unique microwave plasma jet reactor. The prepared TiO2 nanowires manifested the flexible features, and were characterized by using X-ray diffraction, Brunauer-Emmett-Teller (BET) surface area analyzer, UV-Visible and FTIR spectrophotometers, Scanning electron microscope, and Transmission electron microscope. Further, the photodegradation efficiency of these nanowires were tested against toxic organic dye like methylene blue (MB) and the results were compared with the commercial TiO2. It was found that TiO2 nanowires exhibited superior photocatalytic performance (89%) as compared to commercial TiO2 (75%) after 60 min of reaction. This is attributed to the lower recombination rate and increased interfacial charge transfer in TiO2 nanowire. Pseudo-first order kinetic modelling performed with the experimental results revealed that the rate constant of photodegradation in case of TiO2 nanowire was 1.3 times higher than that of commercial TiO2. Superoxide radical (O2˙−) was found to be the major contributor in the photodegradation mechanism. Based on the trapping experiments, a plausible mechanism of the photocatalytic reaction is discussed.
Keywords: Heterogeneous catalysis, photodegradation, reactive oxygen species, TiO2 nanowires.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8966704 Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
Authors: Zulkiflee M., Robiah Y., Nur Azman Abu, Shahrin S.
Abstract:
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Keywords: Dual-Stack, Malware, Worm, IPv6;IDS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20056703 Computer Verification in Cryptography
Authors: Markus Kaiser, Johannes Buchmann
Abstract:
In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (o--algebras, probability spaces and condi¬tional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes' Formula. Besides we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this paper shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in crypto-graphic research, if the corresponding basic mathematical knowledge is available in a database.
Keywords: prime numbers, primality tests, (conditional) proba¬bility distributions, formal proof system, higher-order logic, formal verification, Bayes' Formula, Miller-Rabin primality test.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21816702 Tuning a Fractional Order PID Controller with Lead Compensator in Frequency Domain
Authors: Tahmine. V. Moghaddam, N. Bigdeli, K. Afshar
Abstract:
To achieve the desired specifications of gain and phase margins for plants with time-delay that stabilized with FO-PID controller a lead compensator is designed. At first the range of controlled system stability based on stability boundary criteria is determined. Using stability boundary locus method in frequency domain the fractional order controller parameters are tuned and then with drawing bode diagram in frequency domain accessing to desired gain and phase margin are shown. Numerical examples are given to illustrate the shapes of the stabilizing region and to show the design procedure.Keywords: Fractional controller, Lead compensator, Stabilityregions, Stability boundary locus
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25886701 Fuzzy Control of the Air Conditioning System at Different Operating Pressures
Authors: Mohanad Alata , Moh'd Al-Nimr, Rami Al-Jarrah
Abstract:
The present work demonstrates the design and simulation of a fuzzy control of an air conditioning system at different pressures. The first order Sugeno fuzzy inference system is utilized to model the system and create the controller. In addition, an estimation of the heat transfer rate and water mass flow rate injection into or withdraw from the air conditioning system is determined by the fuzzy IF-THEN rules. The approach starts by generating the input/output data. Then, the subtractive clustering algorithm along with least square estimation (LSE) generates the fuzzy rules that describe the relationship between input/output data. The fuzzy rules are tuned by Adaptive Neuro-Fuzzy Inference System (ANFIS). The results show that when the pressure increases the amount of water flow rate and heat transfer rate decrease within the lower ranges of inlet dry bulb temperatures. On the other hand, and as pressure increases the amount of water flow rate and heat transfer rate increases within the higher ranges of inlet dry bulb temperatures. The inflection in the pressure effect trend occurs at lower temperatures as the inlet air humidity increases.
Keywords: Air Conditioning, ANFIS, Fuzzy Control, Sugeno System.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 33676700 Effects of Biostimulant Application on Quali-Quantitative Characteristics of Cauliflower, Pepper and Fennel Crops under Organic and Conventional Fertilization
Authors: E. Tarantino, G. Disciglio, L. Frabboni, A. Libutti, G. Gatta, A. Gagliaridi, A. Tarantino
Abstract:
Nowadays, the main goal for modern horticultural production is an increase the quality. In recent years, the use of organic fertilizers or biostimulants that can be applied in agriculture to improve quali-quantitative crop yields has encountered increasing interest. Biostimulants are gaining importance also for their possible use in organic and sustainable agriculture, to avoid excessive fertilizer applications. Consecutive experimental trials were carried out in the Apulia region (southern Italy) on three herbaceous crops (cauliflower, pepper, fennel) grown in pots under conventional and organic fertilization systems without and with biostimulants. The aim was to determine the effects of three biostimulants (Siapton®10L, Micotech L, Lysodin Alga-Fert) on quali-quantitative yield characteristics. At harvest, the quali-quantitative yield characteristics of each crop were determined. All of the experimental data were subjected to analysis of variance (ANOVA), and when significant effects were detected, the means were compared using Tukey’s tests. These data show large differences in these yield characteristics between conventional and organic crops, particularly highlighting higher yields for the conventional crops, while variable results were generally observed when the biostimulants were applied. In this context, there were no effects of the biostimulants on the quantitative yield, whereas there were low positive effects on the qualitative characteristics, as related to higher dry matter content of cauliflower, and higher soluble solids content of pepper. Moreover, there were evident positive effects of the biostimulants with fennel, due to the lower nitrate content. These latter data are in line with most of the published literature obtained for other herbaceous crops.Keywords: Biostimulants, cauliflower, pepper, fennel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3571