Search results for: security design
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5674

Search results for: security design

3724 Delineato: Designing Distraction-Free GUIs

Authors: Fernando Miguel Campos, Fernando Jesus Aguiar, Pedro Campos

Abstract:

A large amount of software products offer a wide range and number of features. This is called featuritis or creeping featurism and tends to rise with each release of the product. Feautiris often adds unnecessary complexity to software, leading to longer learning curves and overall confusing the users and degrading their experience. We take a look to a new design approach tendency that has been coming up, the so-called “What You Get is What You Need” concept that argues that products should be very focused, simple and with minimalistic interfaces in order to help users conduct their tasks in distraction-free ambiences. This isn’t as simple to implement as it might sound and the developers need to cut down features. Our contribution illustrates and evaluates this design method through a novel distraction-free diagramming tool named Delineato Pro for Mac OS X in which the user is confronted with an empty canvas when launching the software and where tools only show up when really needed.

Keywords: Diagramming, HCI, usability, user interface.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1384
3723 Removal of Malachite Green from Aqueous Solution using Hydrilla verticillata -Optimization, Equilibrium and Kinetic Studies

Authors: R. Rajeshkannan, M. Rajasimman, N. Rajamohan

Abstract:

In this study, the sorption of Malachite green (MG) on Hydrilla verticillata biomass, a submerged aquatic plant, was investigated in a batch system. The effects of operating parameters such as temperature, adsorbent dosage, contact time, adsorbent size, and agitation speed on the sorption of Malachite green were analyzed using response surface methodology (RSM). The proposed quadratic model for central composite design (CCD) fitted very well to the experimental data that it could be used to navigate the design space according to ANOVA results. The optimum sorption conditions were determined as temperature - 43.5oC, adsorbent dosage - 0.26g, contact time - 200min, adsorbent size - 0.205mm (65mesh), and agitation speed - 230rpm. The Langmuir and Freundlich isotherm models were applied to the equilibrium data. The maximum monolayer coverage capacity of Hydrilla verticillata biomass for MG was found to be 91.97 mg/g at an initial pH 8.0 indicating that the optimum sorption initial pH. The external and intra particle diffusion models were also applied to sorption data of Hydrilla verticillata biomass with MG, and it was found that both the external diffusion as well as intra particle diffusion contributes to the actual sorption process. The pseudo-second order kinetic model described the MG sorption process with a good fitting.

Keywords: Response surface methodology, Hydrilla verticillata, malachite green, adsorption, central composite design

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1969
3722 Removal of Aggregates of Monoclonal Antibodies by Ion Exchange Chromatography

Authors: Ishan Arora, Anurag S. Rathore

Abstract:

The primary objective of this work was to study the effect of resin chemistry, pH and molarity of binding and elution buffer on aggregate removal using Cation Exchange Chromatography and find the optimum conditions which can give efficient aggregate removal with minimum loss of yield. Four different resins were used for carrying out the experiments: Fractogel EMD SO3 -(S), Fractogel EMD COO-(M), Capto SP ImpRes and S Ceramic HyperD. Runs were carried out on the AKTA Avant system. Design of Experiments (DOE) was used for analysis using the JMP software. The dependence of the yield obtained using different resins on the operating conditions was studied. Success has been achieved in obtaining yield greater than 90% using Capto SP ImpRes and Fractogel EMD COO-(M) resins. It has also been found that a change in the operating conditions generally has different effects on the yields obtained using different resins.

Keywords: Aggregates, cation exchange chromatography, design of experiments, monoclonal antibodies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2912
3721 Inflating the Public: A Series of Urban Interventions

Authors: Veronika Antoniou, Rene Carraz, Yiorgos Hadjichristou

Abstract:

The Green Urban Lab took the form of public installations that were placed at various locations in four cities in Cyprus. These installations - through which a series of events, activities, workshops and research took place - were the main tools in regenerating a series of urban public spaces in Cyprus. The purpose of this project was to identify issues and opportunities related to public space and to offer guidelines on how design and participatory democracy improvements could strengthen civil society, while raising the quality of the urban public scene. Giant inflatable structures were injected in important urban fragments in order to accommodate series of events. The design and playful installation generated a wide community engagement. The fluid presence of the installations acted as a catalyst for social interaction. They were accessed and viewed effortlessly and surprisingly, creating opportunities to rediscover public spaces.

Keywords: Bottom-up initiatives, creativity, public space, social innovation, urban environments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2438
3720 A Novel Plausible Deniability Scheme in Secure Steganography

Authors: Farshad Amin, Majid Soleimanipour, Alireza Karimi

Abstract:

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we propose a novel plausible deniability scheme in steganography by using a diversionary message and encrypt it with a DES-based algorithm. Then, we compress the secret message and encrypt it by the receiver-s public key along with the stego key and embed both messages in a carrier using an embedding algorithm. It will be demonstrated how this method can support plausible deniability and is robust against steganalysis.

Keywords: Steganography, Cryptography, Information Hiding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2166
3719 Evaluating Psychologist Practice Competencies through Multisource Feedback: An International Research Design

Authors: Jac W. Andrews, J. B. Hale

Abstract:

Effective practicing psychologists require ongoing skill development that is constructivist and recursive in nature, with mentor, colleague, co-worker, and patient feedback critical to successful acquisition and maintenance of professional competencies. This paper will provide an overview of the nature and scope of psychologist skill development through multisource feedback (MSF) or 360 degree evaluation, present a rationale for its use for assessing practicing psychologist performance, and advocate its use in psychology given the demonstrated model utility in other health professions. The paper will conclude that an international research design is needed to assess the feasibility, reliability, and validity of MSF system ratings intended to solicit feedback from mentors, colleagues, coworkers, and patients about psychologist competencies. If adopted, the MSF model could lead to enhanced skill development that fosters patient satisfaction within and across countries.

 

Keywords: Psychologist, multisource feedback, psychologist competency, professionalism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2206
3718 A Study on the Effect of Variation of the Cross-sectional Area of Spiral Volute Casing for Centrifugal Pump

Authors: Hyun Bae Jin, Myung Jin Kim, Wui Jun Chung

Abstract:

The impeller and the casing are the key components of a centrifugal pump. Although there have been many studies on the impeller and the volute casing of centrifugal pump, further study of the volute casing to improve the performance of centrifugal pumps is needed. In this paper, the effect of cross-sectional area on the performance of volute casing was investigated using a commercial CFD code. The performance characteristics, not only at the off-design point but also for a full type model are required these days. So we conducted numerical analysis for all operating points by using complete geometry through transient analysis. Transient analysis on the complete geometry of a real product has the advantage of simulating realistic flow. The results of this study show the variation of a performance curve by modifying the above-mentioned design parameter.

Keywords: Centrifugal Pump, Volute Casing, Cross-Section area, CFD

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3716
3717 Study and Evaluation of Added Stresses under Foundation due to Adjacent Structure

Authors: Alireza M. goltabar, Issa shooshpasha , Reza Shamstabar kami , Mostafa Habibi

Abstract:

Added stresses due to adjacent structure should be considered in foundation design and stress control in soil under the structure. This case is considered less than other cases in design and calculation whereas stresses in implementation are greater than analytical stress. Structure load are transmitted to earth by foundation and role of foundation is propagation of load on the continuous and half extreme soil. This act cause that, present stresses lessen to allowable strength of soil. Some researchers such as Boussinesq and westergaurd by using of some assumption studied on this issue, theorically. Target of this paper is study and evaluation of added stresses under structure due to adjacent structure. For this purpose, by using of assumption, theoric relation and numeral methods, effects of adjacent structure with 4 to 10 storeys on the main structure with 4 storeys are studied and effect of parameters and sensitivity of them are evaluated.

Keywords: stress, soil, adjacent structure, foundation, loading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1437
3716 Quantitative Analysis of PCA, ICA, LDA and SVM in Face Recognition

Authors: Liton Jude Rozario, Mohammad Reduanul Haque, Md. Ziarul Islam, Mohammad Shorif Uddin

Abstract:

Face recognition is a technique to automatically identify or verify individuals. It receives great attention in identification, authentication, security and many more applications. Diverse methods had been proposed for this purpose and also a lot of comparative studies were performed. However, researchers could not reach unified conclusion. In this paper, we are reporting an extensive quantitative accuracy analysis of four most widely used face recognition algorithms: Principal Component Analysis (PCA), Independent Component Analysis (ICA), Linear Discriminant Analysis (LDA) and Support Vector Machine (SVM) using AT&T, Sheffield and Bangladeshi people face databases under diverse situations such as illumination, alignment and pose variations.

Keywords: PCA, ICA, LDA, SVM, face recognition, noise.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2408
3715 Decoder Design for a New Single Error Correcting/Double Error Detecting Code

Authors: M. T. Anwar, P. K. Lala, P. Thenappan

Abstract:

This paper presents the decoder design for the single error correcting and double error detecting code proposed by the authors in an earlier paper. The speed of error detection and correction of a code is largely dependent upon the associated encoder and decoder circuits. The complexity and the speed of such circuits are determined by the number of 1?s in the parity check matrix (PCM). The number of 1?s in the parity check matrix for the code proposed by the authors are fewer than in any currently known single error correcting/double error detecting code. This results in simplified encoding and decoding circuitry for error detection and correction.

Keywords: Decoder, Hsiao code, Parity Check Matrix, Syndrome Pattern.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2057
3714 Identification of Individual Objects at the Intelligent Assembly Cell

Authors: Ružarovský, Roman, Danišová, Nina, Velíšek, Karol

Abstract:

In this contribution is presented a complex design of individual objects identification in the workplace of intelligent assembly cell. Intelligent assembly cell is situated at Institute of Manufacturing Systems and Applied Mechanics and is used for pneumatic actuator assembly. Pneumatic actuator components are pneumatic roller, cover, piston and spring. Two identification objects alternatives for assembly are designed in the workplace of industrial robot. In the contribution is evaluated and selected suitable alternative for identification – 2D codes reader. The complex design of individual object identification is going out of intelligent manufacturing systems knowledge. Intelligent assembly and manufacturing systems as systems of new generation are gradually loaded in to the mechanical production, when they are removeing human operation out of production process and they also short production times.

Keywords: system, cell, intelligent, mechanics, device

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1427
3713 Design Methodology through Risk Assessment of Massive Water Retaining Structures

Authors: A. Rouili

Abstract:

In the present paper the results of a numerical study are presented, numerical models were developed to simulate the behaviour of vertical massive dikes. The proposed models were developed according to the geometry, boundary conditions, loading conditions and initial conditions of a physical model taken as reference. The results obtained were compared to the experimental data. As far as the overall behaviour, the displacements and the failure mechanisms of the dikes is concerned, the numerical results were in good agreement with the experimental results, which clearly indicates a good quality of numerical modelling. The validated numerical models were used in a parametric study were the displacements and failure mechanisms were fully investigated. Out of the results obtained, some conclusions and recommendations related to the design of massive dikes are proposed.

Keywords: Water conservation, dikes, risk assessment and numerical modelling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1528
3712 Evaluating Service Quality of Online Auction by Fuzzy MCDM

Authors: Wei-Hsuan Lee, Chien-Hua Wang, Chin-Tzong Pang

Abstract:

This paper applies fuzzy set theory to evaluate the service quality of online auction. Service quality is a composition of various criteria. Among them many intangible attributes are difficult to measure. This characteristic introduces the obstacles for respondent in replying to the survey. So as to overcome this problem, we invite fuzzy set theory into the measurement of performance. By using AHP in obtaining criteria and TOPSIS in ranking, we found the most concerned dimension of service quality is Transaction Safety Mechanism and the least is Charge Item. Regarding to the most concerned attributes are information security, accuracy and information.

Keywords: AHP, Fuzzy set theory, TOPSIS, Online auction, Servicequality

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766
3711 Structural Behaviour of Partially Filled Steel Grid Composite Deck

Authors: Hyun-Seop Shin, Chin-Hyung Lee, Ki-Tae Park

Abstract:

In order to apply partially filled steel grid composite deck as the horizontal supporting structure of various kinds of infrastructures, the variation of its flexural strength according to design parameters such as cross and longitudinal bars constituting the steel grid and the type of shear connection is evaluated and compared experimentally. The result shows that the design sensitivity of the deck to the spacing of the cross bars is insignificant in the case of structure with low risk of punching failure or without load distribution problem. By means of shear connection composed by transverse rebar and longitudinal bar without additional shear stud bolts, the complete interaction between steel grid and concrete slab is able to be achieved and the composite deck can develop its bending resistance capacity.

Keywords: bending strength, composite action, shear connection, steel grid composite deck

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1601
3710 Security Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and its Improvement

Authors: Songyi Kim, Kwangwoo Lee, Seungjoo Kim, Dongho Won

Abstract:

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many researchers have proposed the solution of the problems. However, they still have the problem, such as location privacy, mutual authentication. In this paper, we show the problems of the previous protocols, and then we propose a more secure and efficient RFID authentication protocol.

Keywords: RFID, mutual authentication, serverless, anonymity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1907
3709 A Comparison between Russian and Western Approach for Deep Foundation Design

Authors: Saeed Delara, Kendra MacKay

Abstract:

Varying methodologies are considered for pile design for both Russian and Western approaches. Although both approaches rely on toe and side frictional resistances, different calculation methods are proposed to estimate pile capacity. The Western approach relies on compactness (internal friction angle) of soil for cohesionless soils and undrained shear strength for cohesive soils. The Russian approach relies on grain size for cohesionless soils and liquidity index for cohesive soils. Though most recommended methods in the Western approaches are relatively simple methods to predict pile settlement, the Russian approach provides a detailed method to estimate single pile and pile group settlement. Details to calculate pile axial capacity and settlement using the Russian and Western approaches are discussed and compared against field test results.

Keywords: Pile capacity, pile settlement, Russian approach, western approach.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 818
3708 Comments on He et al.’s Robust Biometric-based User Authentication Scheme for WSNs

Authors: Eun-Jun Yoon, Kee-Young Yoo

Abstract:

In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers- attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.-s scheme has some drawbacks: poor reparability problem, user impersonation attack, and sensor node impersonate attack.

Keywords: Security, authentication, biometrics, poor reparability, impersonation attack, wireless sensor networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1848
3707 Managing Legal, Consumers and Commerce Risks in Phishing

Authors: Dinna N. M. N., Leau Y. B., Habeeb S. A. H., Yanti A. S.

Abstract:

Phishing scheme is a new emerged security issue of E-Commerce Crime in globalization. In this paper, the legal scaffold of Malaysia, United States and United Kingdom are analyzed and followed by discussion on critical issues that rose due to phishing activities. The result revealed that inadequacy of current legal framework is the main challenge to govern this epidemic. However, lack of awareness among consumers, crisis on merchant-s responsibility and lack of intrusion reports and incentive arrangement contributes to phishing proliferating. Prevention is always better than curb. By the end of this paper, some best practices for consumers and corporations are suggested.

Keywords: Phishing, Online Fraud, Business risks, Consumers privacy, Legal Issue, Cyber law.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2235
3706 A method of Authentication for Quantum Networks

Authors: Stefan Rass

Abstract:

Quantum cryptography offers a way of key agreement, which is unbreakable by any external adversary. Authentication is of crucial importance, as perfect secrecy is worthless if the identity of the addressee cannot be ensured before sending important information. Message authentication has been studied thoroughly, but no approach seems to be able to explicitly counter meet-in-the-middle impersonation attacks. The goal of this paper is the development of an authentication scheme being resistant against active adversaries controlling the communication channel. The scheme is built on top of a key-establishment protocol and is unconditionally secure if built upon quantum cryptographic key exchange. In general, the security is the same as for the key-agreement protocol lying underneath.

Keywords: Meet-in-the-middle attack, quantum key distribution, quantum networks, unconditionally secure authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1888
3705 Using Combination of Optimized Recurrent Neural Network with Design of Experiments and Regression for Control Chart Forecasting

Authors: R. Behmanesh, I. Rahimi

Abstract:

recurrent neural network (RNN) is an efficient tool for modeling production control process as well as modeling services. In this paper one RNN was combined with regression model and were employed in order to be checked whether the obtained data by the model in comparison with actual data, are valid for variable process control chart. Therefore, one maintenance process in workshop of Esfahan Oil Refining Co. (EORC) was taken for illustration of models. First, the regression was made for predicting the response time of process based upon determined factors, and then the error between actual and predicted response time as output and also the same factors as input were used in RNN. Finally, according to predicted data from combined model, it is scrutinized for test values in statistical process control whether forecasting efficiency is acceptable. Meanwhile, in training process of RNN, design of experiments was set so as to optimize the RNN.

Keywords: RNN, DOE, regression, control chart.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642
3704 Proposal of Data Collection from Probes

Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik

Abstract:

In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.

Keywords: Communication, computer network, data collection, probe.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766
3703 Rheological and Computational Analysis of Crude Oil Transportation

Authors: Praveen Kumar, Satish Kumar, Jashanpreet Singh

Abstract:

Transportation of unrefined crude oil from the production unit to a refinery or large storage area by a pipeline is difficult due to the different properties of crude in various areas. Thus, the design of a crude oil pipeline is a very complex and time consuming process, when considering all the various parameters. There were three very important parameters that play a significant role in the transportation and processing pipeline design; these are: viscosity profile, temperature profile and the velocity profile of waxy crude oil through the crude oil pipeline. Knowledge of the Rheological computational technique is required for better understanding the flow behavior and predicting the flow profile in a crude oil pipeline. From these profile parameters, the material and the emulsion that is best suited for crude oil transportation can be predicted. Rheological computational fluid dynamic technique is a fast method used for designing flow profile in a crude oil pipeline with the help of computational fluid dynamics and rheological modeling. With this technique, the effect of fluid properties including shear rate range with temperature variation, degree of viscosity, elastic modulus and viscous modulus was evaluated under different conditions in a transport pipeline. In this paper, two crude oil samples was used, as well as a prepared emulsion with natural and synthetic additives, at different concentrations ranging from 1,000 ppm to 3,000 ppm. The rheological properties was then evaluated at a temperature range of 25 to 60 °C and which additive was best suited for transportation of crude oil is determined. Commercial computational fluid dynamics (CFD) has been used to generate the flow, velocity and viscosity profile of the emulsions for flow behavior analysis in crude oil transportation pipeline. This rheological CFD design can be further applied in developing designs of pipeline in the future.

Keywords: Natural surfactant, crude oil, rheology, CFD, viscosity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1637
3702 Audio User Interface for Visually Impaired Computer Users: in a Two Dimensional Audio Environment

Authors: Ravihansa Rajapakse, Malshika Dias, Kanishka Weerasekara, Anuja Dharmaratne, Prasad Wimalaratne

Abstract:

In this paper we discuss a set of guidelines which could be adapted when designing an audio user interface for the visually impaired. It is based on an audio environment that is focused on audio positioning. Unlike current applications which only interpret Graphical User Interface (GUI) for the visually impaired, this particular audio environment bypasses GUI to provide a direct auditory output. It presents the capability of two dimensional (2D) navigation on audio interfaces. This paper highlights the significance of a 2D audio environment with spatial information in the context of the visually impaired. A thorough usability study has been conducted to prove the applicability of proposed design guidelines for these auditory interfaces. While proving these guidelines, previously unearthed design aspects have been revealed in this study.

Keywords: Human Computer Interaction, Audio User Interfaces, 2D Audio Environment, Visually Impaired Users

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2281
3701 Effect of Coolant on Cutting Forces and Surface Roughness in Grinding of CSM GFRP

Authors: P Chockalingam, K Kok, R Vijayaram

Abstract:

This paper presents a comparative study on dry and wet grinding through experimental investigation in the grinding of CSM glass fibre reinforced polymer laminates using a pink aluminium oxide wheel. Different sets of experiments were performed to study the effects of the independent grinding parameters such as grinding wheel speed, feed and depth of cut on dependent performance criteria such as cutting forces and surface finish. Experimental conditions were laid out using design of experiment central composite design. An effective coolant was sought in this study to minimise cutting forces and surface roughness for GFRP laminates grinding. Test results showed that the use of coolants reduces surface roughness, although not necessarily the cutting forces. These research findings provide useful economic machining solution in terms of optimized grinding conditions for grinding CSM GFRP.

Keywords: Chopped Strand Mat GFRP laminates, Dry and Wet Grinding, Cutting Forces, Surface Finish.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4220
3700 Development of an Autonomous Friction Gripper for Industrial Robots

Authors: Majid Tolouei-Rad, Peter Kalivitis

Abstract:

Industrial robots become useless without end-effectors that for many instances are in the form of friction grippers. Commonly friction grippers apply frictional forces to different objects on the basis of programmers- experiences. This puts a limitation on the effectiveness of gripping force that may result in damaging the object. This paper describes various stages of design and development of a low cost sensor-based robotic gripper that would facilitate the task of applying right gripping forces to different objects. The gripper is also equipped with range sensors in order to avoid collisions of the gripper with objects. It is a fully functional automated pick and place gripper which can be used in many industrial applications. Yet it can also be altered or further developed in order to suit a larger number of industrial activities. The current design of gripper could lead to designing completely automated robot grippers able to improve the efficiency and productivity of industrial robots.

Keywords: Control system, end-effector, robot, sensor

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2864
3699 An Electrically Small Silver Ink Printed FR4 Antenna for RF Transceiver Chip CC1101

Authors: F. Majeed, D. V. Thiel, M. Shahpari

Abstract:

An electrically small meander line antenna is designed for impedance matching with RF transceiver chip CC1101. The design provides the flexibility of tuning the reactance of the antenna over a wide range of values: highly capacitive to highly inductive. The antenna was printed with silver ink on FR4 substrate using the screen printing design process. The antenna impedance was perfectly matched to CC1101 at 433 MHz. The measured radiation efficiency of the antenna was 81.3% at resonance. The 3 dB and 10 dB fractional bandwidth of the antenna was 14.5% and 4.78%, respectively. The read range of the antenna was compared with a copper wire monopole antenna over a distance of five meters. The antenna, with a perfect impedance match with RF transceiver chip CC1101, shows improvement in the read range compared to a monopole antenna over the specified distance.

Keywords: Meander line antenna, RFID, Silver ink printing, Impedance matching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1260
3698 Plant Layout Analysis by Computer Simulation for Electronic Manufacturing Service Plant

Authors: Visuwan D., Phruksaphanrat B

Abstract:

In this research, computer simulation is used for Electronic Manufacturing Service (EMS) plant layout analysis. The current layout of this manufacturing plant is a process layout, which is not suitable due to the nature of an EMS that has high-volume and high-variety environment. Moreover, quick response and high flexibility are also needed. Then, cellular manufacturing layout design was determined for the selected group of products. Systematic layout planning (SLP) was used to analyze and design the possible cellular layouts for the factory. The cellular layout was selected based on the main criteria of the plant. Computer simulation was used to analyze and compare the performance of the proposed cellular layout and the current layout. It found that the proposed cellular layout can generate better performances than the current layout. In this research, computer simulation is used for Electronic Manufacturing Service (EMS) plant layout analysis. The current layout of this manufacturing plant is a process layout, which is not suitable due to the nature of an EMS that has high-volume and high-variety environment. Moreover, quick response and high flexibility are also needed. Then, cellular manufacturing layout design was determined for the selected group of products. Systematic layout planning (SLP) was used to analyze and design the possible cellular layouts for the factory. The cellular layout was selected based on the main criteria of the plant. Computer simulation was used to analyze and compare the performance of the proposed cellular layout and the current layout. It found that the proposed cellular layout can generate better performances than the current layout. 

Keywords: Layout, Electronic Manufacturing Service Plant (EMS), Computer Simulation, Cellular Manufacturing System (CMS).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3442
3697 Design of an Experimental Setup to Study the Drives of Battery Electric Vehicles

Authors: Valery Vodovozov, Zoja Raud, Tõnu Lehtla

Abstract:

This paper describes the design considerations of an experimental setup for research and exploring the drives of batteryfed electric vehicles. Effective setup composition and its components are discussed. With experimental setup described in this paper, durability and functional tests can be procured to the customers. Multiple experiments are performed in the form of steady-state system exploring, acceleration programs, multi-step tests (speed control, torque control), load collectives or close-to-reality driving tests (driving simulation). Main focus of the functional testing is on the measurements of power and energy efficiency and investigations in driving simulation mode, which are used for application purposes. In order to enable the examination of the drive trains beyond standard modes of operation, different other parameters can be studied also.

Keywords: Electric drive, electric vehicle, propulsion, test bench.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2903
3696 A Study of the Planning and Designing of the Built Environment under the Green Transit-Oriented Development

Authors: Wann-Ming Wey

Abstract:

In recent years, the problems of global climate change and natural disasters have induced the concerns and attentions of environmental sustainability issues for the public. Aside from the environmental planning efforts done for human environment, Transit-Oriented Development (TOD) has been widely used as one of the future solutions for the sustainable city development. In order to be more consistent with the urban sustainable development, the development of the built environment planning based on the concept of Green TOD which combines both TOD and Green Urbanism is adapted here. The connotation of the urban development under the green TOD including the design toward environment protect, the maximum enhancement resources and the efficiency of energy use, use technology to construct green buildings and protected areas, natural ecosystems and communities linked, etc. Green TOD is not only to provide the solution to urban traffic problems, but to direct more sustainable and greener consideration for future urban development planning and design. In this study, we use both the TOD and Green Urbanism concepts to proceed to the study of the built environment planning and design. Fuzzy Delphi Technique (FDT) is utilized to screen suitable criteria of the green TOD. Furthermore, Fuzzy Analytic Network Process (FANP) and Quality Function Deployment (QFD) were then developed to evaluate the criteria and prioritize the alternatives. The study results can be regarded as the future guidelines of the built environment planning and designing under green TOD development in Taiwan.

Keywords: Green transit-oriented development, built environment, fuzzy Delphi technique, quality function deployment, fuzzy analytic network process.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1498
3695 Using Agility in Building Business Process Management Solutions

Authors: Krešimir Fertalj, Mladen Matejaš

Abstract:

In turbulent modern economy, the companies need to properly manage their business processes. Well-defined and stable business processes ensure security of crucial data and applications, and provide a quality product or service to the end customer. On the other side, constant changes on the market, new regulatory provisions, and emerging new technologies require the need of issuing prompt and effective changes of business process. In this article, we explore the use of agile principles in working with business process management (BPM) solutions. We deal with difficulties in BPM development cycle, review the benefits of using agility, and choose the basic agile principles that ensure the success of a BPM project.

Keywords: Agile development, BPM environment, Kanban, SCRUM, XP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1596