Search results for: Dynamic access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2771

Search results for: Dynamic access

1391 A Simplified Model for Mechanical Loads under Angular Misalignment and Unbalance

Authors: Úrsula B. Ferraz, Paulo F. Seixas, Webber E. Aguiar

Abstract:

This paper presents a dynamic model for mechanical loads of an electric drive, including angular misalignment and including load unbalance. The misalignment model represents the effects of the universal joint between the motor and the mechanical load. Simulation results are presented for an induction motor driving a mechanical load with angular misalignment for both flexible and rigid coupling. The models presented are very useful in the study of mechanical fault detection in induction motors, using mechanical and electrical signals already available in a drive system, such as speed, torque and stator currents.

Keywords: Angular misalignment, fault modeling, unbalance, universal joint.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2722
1390 Analysis of a WDM System for Tanzania

Authors: Shaban Pazi, Chris Chatwin, Rupert Young, Philip Birch

Abstract:

Internet infrastructures in most places of the world have been supported by the advancement of optical fiber technology, most notably wavelength division multiplexing (WDM) system. Optical technology by means of WDM system has revolutionized long distance data transport and has resulted in high data capacity, cost reductions, extremely low bit error rate, and operational simplification of the overall Internet infrastructure. This paper analyses and compares the system impairments, which occur at data transmission rates of 2.5Gb/s and 10 Gb/s per wavelength channel in our proposed optical WDM system for Internet infrastructure in Tanzania. The results show that the data transmission rate of 2.5 Gb/s has minimum system impairments compared with a rate of 10 Gb/s per wavelength channel, and achieves a sufficient system performance to provide a good Internet access service.

Keywords: Internet infrastructure, WDM system, standard single mode fibers, system impairments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1662
1389 Assessment of the Effect of Feed Plate Location on Interactions for a Binary Distillation Column

Authors: A. Khelassi, R. Bendib

Abstract:

The paper considers the effect of feed plate location on the interactions in a seven plate binary distillation column. The mathematical model of the distillation column is deduced based on the equations of mass and energy balances for each stage, detailed model for both reboiler and condenser, and heat transfer equations. The Dynamic Relative Magnitude Criterion, DRMC is used to assess the interactions in different feed plate locations for a seven plate (Benzene-Toluene) binary distillation column ( the feed plate is originally at stage 4). The results show that whenever we go far from the optimum feed plate position, the level of interaction augments.

Keywords: Distillation column, assessment of interactions, feedplate location, DRMC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2397
1388 The Impact of ERP Systems on Accounting Processes

Authors: Despina Galani, Efthymios Gravas, Antonios Stavropoulos

Abstract:

Advances in information technology, recent changes in business environment, globalization, deregulation, privatization have made running a successful business more difficult than ever before. To remain successful and to be competitive have forced companies to react to the new changes in order to survive and succeed. The implementation of an Enterprise Resource planning (ERP) system improves information flow, reduce costs, establish linkage with suppliers and reduce response time to customer needs. This paper focuses on a sample of Greek companies, investigates the ERP market in Greece, the reasons why the Greek companies are investing in ERP systems, the benefits that users have achieved and the influence of ERP systems on the use of new accounting practices. The results indicate a greater level on information integration, flexibility in information access and greater functionality provided by ERP systems but little influence on the use of new accounting practices.

Keywords: Advanced Accounting Practices, EnterpriseResource Planning, Management Accounting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10489
1387 New Approach in Diagnostics Method for Milling Process using Envelope Analysis

Authors: C. Bisu, M. Zapciu, A. Gérard

Abstract:

This paper proposes a method to vibration analysis in order to on-line monitoring and predictive maintenance during the milling process. Adapting envelope method to diagnostics and the analysis for milling tool materials is an important contribution to the qualitative and quantitative characterization of milling capacity and a step by modeling the three-dimensional cutting process. An experimental protocol was designed and developed for the acquisition, processing and analyzing three-dimensional signal. The vibration envelope analysis is proposed to detect the cutting capacity of the tool with the optimization application of cutting parameters. The research is focused on Hilbert transform optimization to evaluate the dynamic behavior of the machine/ tool/workpiece.

Keywords: diagnostics, envelope, milling, vibration

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1935
1386 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: Cloud computing, intrusion detection system, privacy, trust.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1099
1385 Knowledge Management and e-Learning –An Agent-Based Approach

Authors: Teodora Bakardjieva, Galya Gercheva

Abstract:

In this paper an open agent-based modular framework for personalized and adaptive curriculum generation in e-learning environment is proposed. Agent-based approaches offer several potential advantages over alternative approaches. Agent-based systems exhibit high levels of flexibility and robustness in dynamic or unpredictable environments by virtue of their intrinsic autonomy. The presented framework enables integration of different types of expert agents, various kinds of learning objects and user modeling techniques. It creates possibilities for adaptive e-learning process. The KM e-learning system is in a process of implementation in Varna Free University and will be used for supporting the educational process at the University.

Keywords: agents, e-Learning, knowledge management, knowledge sharing, artificial intelligence

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2166
1384 W-CAS: A Central Users Authentication and Authorization System for Enterprise Wide Web Applications

Authors: Sharil Tumin, Sylvia Encheva

Abstract:

Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.

Keywords: Authentication, Authorization, Security, Protected Web-based Applications

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1552
1383 An Empirical Formula for Seismic Test of Telecommunication Equipments

Authors: Young Hoon Lee, Bong Jin Kang, Won Ho Kang

Abstract:

Antiseismic property of telecommunication equipment is very important for the grasp of the damage and the restoration after earthquake. Telecommunication business operators are regulating seismic standard for their equipments. These standards are organized to simulate the real seismic situations and usually define the minimum value of first natural frequency of the equipments or the allowable maximum displacement of top of the equipments relative to bottom. Using the finite element analysis, natural frequency can be obtained with high accuracy but the relative displacement of top of the equipments is difficult to predict accurately using the analysis. Furthermore, in the case of simulating the equipments with access floor, predicting the relative displacement of top of the equipments become more difficult. In this study, using enormous experimental datum, an empirical formula is suggested to forecast the relative displacement of top of the equipments. Also it can be known that which physical quantities are related with the relative displacement.

Keywords: Empirical formula, First natural frequency, Seismic test, Telecommunication equipments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1801
1382 A Study on Reducing Malicious Replies on the Internet: An Approach by Game Theory

Authors: Sanghun Lee

Abstract:

Since the advent of the information era, the Internet has brought various positive effects in everyday life. Nevertheless, recently, problems and side-effects have been noted. Internet witch-trials and spread of pornography are only a few of these problems.In this study, problems and causes of malicious replies on internet boards were analyzed, using the key ideas of game theory. The study provides a mathematical model for the internet reply game to devise three possible plans that could efficiently counteract malicious replies. Furthermore, seven specific measures that comply with one of the three plans were proposed and evaluated according to the importance and utility of each measure using the orthogonal array survey and SPSS conjoint analysis.The conclusion was that the most effective measure would be forbidding unsigned user access to malicious replies. Also notable was that some analytically proposed measures, when implemented, could backfire and encourage malicious replies.

Keywords: Conjoint Analysis, Game Theory, Internet, MaliciousReplies, Prisoner's Dilemma

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1842
1381 Agriculture in the Dominican Republic: Competitiveness in a New Trade Regime and Lessons for Cuba

Authors: Sarita D. Jackson

Abstract:

Agriculture remains a sensitive issue during multilateral trade negotiations within the World Trade Organization (WTO). Similar problems arise at the bilateral level, as in the case of trade talks between the United States and the Dominican Republic. The study explores the determinant of agricultural industry competitiveness in the 21st century, particularly in the case of U.S. and Dominican agriculture in each other’s market. Complementing existing scholarship on industry competitiveness, the study argues that trade rules that are established under preferential access programs and trade agreements play a significant role in shaping an industry’s ability to compete. The final analysis is used to offer recommendations to the same sector in Cuba. Cuba currently relies heavily on U.S. food imports and is experiencing the gradual opening of trade with the United States.

Keywords: Agriculture, bargaining, competitiveness, Dominican Republic, DR-CAFTA, free trade agreement, institutions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1006
1380 Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks

Authors: N. Bhalaji, A. R. Sivaramkrishnan, Sinchan Banerjee, V. Sundar, A. Shanmugam

Abstract:

Nodes in mobile Ad Hoc Network (MANET) do not rely on a central infrastructure but relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes collaborate in routing and forwarding. For individual nodes it might be advantageous not to collaborate, though. In this conceptual paper we propose a new approach based on relationship among the nodes which makes them to cooperate in an Adhoc environment. The trust unit is used to calculate the trust values of each node in the network. The calculated trust values are being used by the relationship estimator to determine the relationship status of nodes. The proposed enhanced protocol was compared with the standard DSR protocol and the results are analyzed using the network simulator-2.

Keywords: Reliable Routing, DSR, Grudger, Adhoc network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2503
1379 Comparative Study of Ad Hoc Routing Protocols in Vehicular Ad-Hoc Networks for Smart City

Authors: Khadija Raissi, Bechir Ben Gouissem

Abstract:

In this paper, we perform the investigation of some routing protocols in Vehicular Ad-Hoc Network (VANET) context. Indeed, we study the efficiency of protocols like Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector Routing (AODV), Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing convention (OLSR) and Vehicular Multi-hop algorithm for Stable Clustering (VMASC) in terms of packet delivery ratio (PDR) and throughput. The performance evaluation and comparison between the studied protocols shows that the VMASC is the best protocols regarding fast data transmission and link stability in VANETs. The validation of all results is done by the NS3 simulator.

Keywords: VANET, smart city, AODV, OLSR, DSR, OLSR, VMASC, routing protocols, NS3.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1027
1378 Mobile Medical Operation Route Planning

Authors: K. Somprasonk, R. Boondiskulchok

Abstract:

Medical services are usually provided in hospitals; however, in developing country, some rural residences have fewer opportunities to access in healthcare services due to the limitation of transportation communication. Therefore, in Thailand, there are charitable organizations operating to provide medical treatments to these people by shifting the medical services to operation sites; this is commonly known as mobile medical service. Operation routing is important for the organization to reduce its transportation cost in order to focus more on other important activities; for instance, the development of medical apparatus. VRP is applied to solve the problem of high transportation cost of the studied organization with the searching techniques of saving algorithm to find the minimum total distance of operation route and satisfy available time constraints of voluntary medical staffs.

Keywords: Decision Support System, Mobile Medical Service Planning, Saving Algorithm, Vehicle Routing Problem

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1611
1377 Multivariable System Reduction Using Stability Equation Method and SRAM

Authors: D. Bala Bhaskar

Abstract:

An algorithm is proposed for the order reduction of large scale linear dynamic multi variable systems where the reduced order model denominator is obtained by using Stability equation method and numerator coefficients are obtained by using SRAM. The proposed algorithm produces a lower order model for an original stable high order multivariable system. The reduction procedure is easy to understand, efficient and computer oriented. To highlight the advantages of the approach, the algorithm is illustrated with the help of a numerical example and the results are compared with the other existing techniques in literature.

Keywords: Multi variable systems, order reduction, stability equation method, SRAM, time domain characteristics, ISE.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 727
1376 Real Time Adaptive Obstacle Avoidance in Dynamic Environments with Different D-S

Authors: Mohammad Javad Mollakazemi, Farhad Asadi

Abstract:

In this paper a real-time obstacle avoidance approach for both autonomous and non-autonomous dynamical systems (DS) is presented. In this approach the original dynamics of the controller which allow us to determine safety margin can be modulated. Different common types of DS increase the robot’s reactiveness in the face of uncertainty in the localization of the obstacle especially when robot moves very fast in changeable complex environments. The method is validated by simulation and influence of different autonomous and non-autonomous DS such as important characteristics of limit cycles and unstable DS. Furthermore, the position of different obstacles in complex environment is explained. Finally, the verification of avoidance trajectories is described through different parameters such as safety factor.

Keywords: Limit cycles, Nonlinear dynamical system, Real time obstacle avoidance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1853
1375 Scene Adaptive Shadow Detection Algorithm

Authors: Mohammed Ibrahim M, Anupama R.

Abstract:

Robustness is one of the primary performance criteria for an Intelligent Video Surveillance (IVS) system. One of the key factors in enhancing the robustness of dynamic video analysis is,providing accurate and reliable means for shadow detection. If left undetected, shadow pixels may result in incorrect object tracking and classification, as it tends to distort localization and measurement information. Most of the algorithms proposed in literature are computationally expensive; some to the extent of equalling computational requirement of motion detection. In this paper, the homogeneity property of shadows is explored in a novel way for shadow detection. An adaptive division image (which highlights homogeneity property of shadows) analysis followed by a relatively simpler projection histogram analysis for penumbra suppression is the key novelty in our approach.

Keywords: homogeneity, penumbra, projection histogram, shadow correction

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1902
1374 A Flexible and Scalable Agent Platform for Multi-Agent Systems

Authors: Ae Hee Park, So Hyun Park, Hee Yong Youn

Abstract:

Multi-agent system is composed by several agents capable of reaching the goal cooperatively. The system needs an agent platform for efficient and stable interaction between intelligent agents. In this paper we propose a flexible and scalable agent platform by composing the containers with multiple hierarchical agent groups. It also allows efficient implementation of multiple domain presentations of the agents unlike JADE. The proposed platform provides both group management and individual management of agents for efficiency. The platform has been implemented and tested, and it can be used as a flexible foundation of the dynamic multi-agent system targeting seamless delivery of ubiquitous services.

Keywords: Agent platform, container, multi-agent system, services, ubiquitous computing

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1966
1373 Anisotropic Constitutive Model and its Application in Simulation of Thermal Shock Wave Propagation for Cylinder Shell Composite

Authors: Xia Huang, Wenhui Tang, Banghai Jiang, Xianwen Ran

Abstract:

In this paper, a plane-strain orthotropic elasto-plastic dynamic constitutive model is established, and with this constitutive model, the thermal shock wave induced by intense pulsed X-ray radiation in cylinder shell composite is simulated by the finite element code, then the properties of thermal shock wave propagation are discussed. The results show that the thermal shock wave exhibit different shapes under the radiation of soft and hard X-ray, and while the composite is radiated along different principal axes, great differences exist in some aspects, such as attenuation of the peak stress value, spallation and so on.

Keywords: anisotropic constitutive model, thermal shock wave, X-ray, cylinder shell composite.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1756
1372 Improving Performance of World Wide Web by Adaptive Web Traffic Reduction

Authors: Achuthsankar S. Nair, J. S. Jayasudha

Abstract:

The ever increasing use of World Wide Web in the existing network, results in poor performance. Several techniques have been developed for reducing web traffic by compressing the size of the file, saving the web pages at the client side, changing the burst nature of traffic into constant rate etc. No single method was adequate enough to access the document instantly through the Internet. In this paper, adaptive hybrid algorithms are developed for reducing web traffic. Intelligent agents are used for monitoring the web traffic. Depending upon the bandwidth usage, user-s preferences, server and browser capabilities, intelligent agents use the best techniques to achieve maximum traffic reduction. Web caching, compression, filtering, optimization of HTML tags, and traffic dispersion are incorporated into this adaptive selection. Using this new hybrid technique, latency is reduced to 20 – 60 % and cache hit ratio is increased 40 – 82 %.

Keywords: Bandwidth, Congestion, Intelligent Agents, Prefetching, Web Caching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1743
1371 Polymer Aerostatic Thrust Bearing under Circular Support for High Static Stiffness

Authors: S. W. Lo, C.-H. Yu

Abstract:

A new design of aerostatic thrust bearing is proposed for high static stiffness. The bearing body, which is mead of polymer covered with metallic membrane, is held by a circular ring. Such a support helps form a concave air gap to grasp the air pressure. The polymer body, which can be made rapidly by either injection or molding is able to provide extra damping under dynamic loading. The smooth membrane not only serves as the bearing surface but also protects the polymer body. The restrictor is a capillary inside a silicone tube. It can passively compensate the variation of load by expanding the capillary diameter for more air flux. In the present example, the stiffness soars from 15.85 N/μm of typical bearing to 349.85 N/μm at bearing elevation 9.5 μm; meanwhile the load capacity also enhances from 346.86 N to 704.18 N.

Keywords: Aerostatic, bearing, polymer, static stiffness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2085
1370 Data Acquisition from Cell Phone using Logical Approach

Authors: Keonwoo Kim, Dowon Hong, Kyoil Chung, Jae-Cheol Ryou

Abstract:

Cell phone forensics to acquire and analyze data in the cellular phone is nowadays being used in a national investigation organization and a private company. In order to collect cellular phone flash memory data, we have two methods. Firstly, it is a logical method which acquires files and directories from the file system of the cell phone flash memory. Secondly, we can get all data from bit-by-bit copy of entire physical memory using a low level access method. In this paper, we describe a forensic tool to acquire cell phone flash memory data using a logical level approach. By our tool, we can get EFS file system and peek memory data with an arbitrary region from Korea CDMA cell phone.

Keywords: Forensics, logical method, acquisition, cell phone, flash memory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4123
1369 I2Navi: An Indoor Interactive NFC Navigation System for Android Smartphones

Authors: Jing Hang Choo, Soon Nyean Cheong, Yee Lien Lee, Sze Hou Teh

Abstract:

The advancement of smartphones, wireless networking and Near Field Communication (NFC) technology have opened up a new approach to indoor navigation. Although NFC technology has been used to support electronic commerce, access control, and ticketing, there is a lack of research work on building NFC-based indoor navigation system for smartphone users. This paper presents an indoor interactive navigation system (named I2Navi) based on NFC technology for users to navigate within a building with ease using their smartphones. The I2Navi system has been implemented at the Faculty of Engineering (FOE), Multimedia University (MMU) to enable students, parents, visitors who own NFC-enabled Android smartphones to navigate themselves within the faculty. An evaluation is carried out and the results show positive response to the proposed indoor navigation system using NFC and smartphone technologies.

Keywords: Near Field Communication, indoor navigation system, smartphones.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2706
1368 Investigation of Interference Conditions in BFWA System Applying Adaptive TDD

Authors: Gábor Szládek, Balázs Héder, János Bitó

Abstract:

In a BFWA (Broadband Fixed Wireless Access Network) the evolved SINR (Signal to Interference plus Noise Ratio) is relevant influenced by the applied duplex method. The TDD (Time Division Duplex), especially adaptive TDD method has some advantage contrary to FDD (Frequency Division Duplex), for example the spectrum efficiency and flexibility. However these methods are suffering several new interference situations that can-t occur in a FDD system. This leads to reduced SINR in the covered area what could cause some connection outages. Therefore, countermeasure techniques against interference are necessary to apply in TDD systems. Synchronization is one way to handling the interference. In this paper the TDD systems – applying different system synchronization degree - will be compared by the evolved SINR at different locations of the BFWA service area and the percentage of the covered area by the system.

Keywords: Adaptive TDD, BFWA networks, duplex methods, intra system interferences.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1329
1367 An Application for Web Mining Systems with Services Oriented Architecture

Authors: Thiago M. R. Dias, Gray F. Moita, Paulo E. M. Almeida

Abstract:

Although the World Wide Web is considered the largest source of information there exists nowadays, due to its inherent dynamic characteristics, the task of finding useful and qualified information can become a very frustrating experience. This study presents a research on the information mining systems in the Web; and proposes an implementation of these systems by means of components that can be built using the technology of Web services. This implies that they can encompass features offered by a services oriented architecture (SOA) and specific components may be used by other tools, independent of platforms or programming languages. Hence, the main objective of this work is to provide an architecture to Web mining systems, divided into stages, where each step is a component that will incorporate the characteristics of SOA. The separation of these steps was designed based upon the existing literature. Interesting results were obtained and are shown here.

Keywords: Web Mining, Service Oriented Architecture, WebServices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1472
1366 Modelling of a Direct Drive Industrial Robot

Authors: C. Perez, O. Reinoso, N. Garcia, J. M. Sabater, L. Gracia

Abstract:

For high-speed control of robots, a good knowledge of system modelling is necessary to obtain the desired bandwidth. In this paper, we present a cartesian robot with a pan/tilt unit in end-effector (5 dof). This robot is implemented with powerful direct drive AC induction machines. The dynamic model, parameter identification and model validation of the robot are studied (including actuators). This work considers the cartesian robot coupled and non linear (contrary to normal considerations for this type of robots). The mechanical and control architecture proposed in this paper is efficient for industrial and research application in which high speed, well known model and very high accuracy are required.

Keywords: Robot modelling, parameter identification and validation, AC servo-motors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564
1365 Limit Cycle Behaviour of a Neural Controller with Delayed Bang-Bang Feedback

Authors: Travis Wiens, Greg Schoenau, Rich Burton

Abstract:

It is well known that a linear dynamic system including a delay will exhibit limit cycle oscillations when a bang-bang sensor is used in the feedback loop of a PID controller. A similar behaviour occurs when a delayed feedback signal is used to train a neural network. This paper develops a method of predicting this behaviour by linearizing the system, which can be shown to behave in a manner similar to an integral controller. Using this procedure, it is possible to predict the characteristics of the neural network driven limit cycle to varying degrees of accuracy, depending on the information known about the system. An application is also presented: the intelligent control of a spark ignition engine.

Keywords: Control and automation, artificial neural networks, limit cycle

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1278
1364 The Alignment of Information Systems and Environmental Organizations Model in Perspective Capability

Authors: Wartika, Kridanto Surendro, Husni Sastramiharja, Iping Supriana S.

Abstract:

The condition of the market is currently very dynamic, demanding organizations which is use system information to support the achievement of objectives should be necessarily improve the ability of information systems in accordance with the changes. Improved information systems capabilities need to align with the resource capabilities in internal environment of the organization, and vice versa. Alignment model between information systems and environment organizational in this capability perspective is expected can assist management in making the strategy for enhance the capability of information systems in accordance with resources internally within the organization, efficiency in the process of development, and optimization of contributions information systems in achieving organizational goals.

Keywords: Capability, alignment, information system, environmental organizations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1684
1363 VISUAL JESS: AN Expandable Visual Generator of Oriented Object Expert systems

Authors: Amel Grissa-Touzi, Habib Ounally, Aissa Boulila

Abstract:

The utility of expert system generators has been widely recognized in many applications. Several generators based on concept of the paradigm object, have been recently proposed. The generator of oriented object expert system (GSEOO) offers languages that are often complex and difficult to use. We propose in this paper an extension of the expert system generator, JESS, which permits a friendly use of this expert system. The new tool, called VISUAL JESS, bring two main improvements to JESS. The first improvement concerns the easiness of its utilization while giving back transparency to the syntax and semantic aspects of the JESS programming language. The second improvement permits an easy access and modification of the JESS knowledge basis. The implementation of VISUAL JESS is made so that it is extensible and portable.

Keywords: Generator of Systems Expert, Programming oriented object classifies, object, inheritance, polymorphism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1615
1362 Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol

Authors: Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim

Abstract:

Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.-s protocol is not secure to randomly chosen password attack and impersonation attack, and proposed an improved protocol. Their protocol provided mutual authentication and efficient password management. In this paper, we analyze the security weaknesses and point out the vulnerabilities of Wang et al.-s protocol.

Keywords: Message Alteration Attack, Impersonation Attack

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1773