Search results for: wear mechanism
891 Using a Trust-Based Environment Key for Mobile Agent Code Protection
Authors: Salima Hacini, Zahia Guessoum, Zizette Boufaïda
Abstract:
Human activities are increasingly based on the use of remote resources and services, and on the interaction between remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with various environmental security conditions. The aim of this paper is to propose a trust based mechanism to improve the security of mobile agents and allow their execution in various environments. Thus, an adaptive trust mechanism is proposed. It is based on the dynamic interaction between the agent and the environment. Information collected during the interaction enables generation of an environment key. This key informs on the host-s trust degree and permits the mobile agent to adapt its execution. Trust estimation is based on concrete parameters values. Thus, in case of distrust, the source of problem can be located and a mobile agent appropriate behavior can be selected.Keywords: Internet security, malicious host, mobile agent security, trust management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1414890 Object Negotiation Mechanism for an Intelligent Environment Using Event Agents
Authors: Chiung-Hui Chen
Abstract:
With advancements in science and technology, the concept of the Internet of Things (IoT) has gradually developed. The development of the intelligent environment adds intelligence to objects in the living space by using the IoT. In the smart environment, when multiple users share the living space, if different service requirements from different users arise, then the context-aware system will have conflicting situations for making decisions about providing services. Therefore, the purpose of establishing a communication and negotiation mechanism among objects in the intelligent environment is to resolve those service conflicts among users. This study proposes developing a decision-making methodology that uses “Event Agents” as its core. When the sensor system receives information, it evaluates a user’s current events and conditions; analyses object, location, time, and environmental information; calculates the priority of the object; and provides the user services based on the event. Moreover, when the event is not single but overlaps with another, conflicts arise. This study adopts the “Multiple Events Correlation Matrix” in order to calculate the degree values of incidents and support values for each object. The matrix uses these values as the basis for making inferences for system service, and to further determine appropriate services when there is a conflict.
Keywords: Internet of things, intelligent object, event agents, negotiation mechanism, degree of similarity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1190889 Blockchain-Based Assignment Management System
Authors: Amogh Katti, J. Sai Asritha, D. Nivedh, M. Kalyan Srinivas, B. Somnath Chakravarthi
Abstract:
Today's modern education system uses Learning Management System (LMS) portals for the scoring and grading of student performances, to maintain student records, and teachers are instructed to accept assignments through online submissions of .pdf, .doc, .ppt, etc. There is a risk of data tampering in the traditional portals; we will apply the Blockchain model instead of this traditional model to avoid data tampering and also provide a decentralized mechanism for overall fairness. Blockchain technology is a better and also recommended model because of the following features: consensus mechanism, decentralized system, cryptographic encryption, smart contracts, Ethereum blockchain. The proposed system ensures data integrity and tamper-proof assignment submission and grading, which will be helpful for both students and also educators.
Keywords: Education technology, learning management system, decentralized applications, blockchain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 166888 Interactive PTZ Camera Control System Using Wii Remote and Infrared Sensor Bar
Authors: A. H. W. Goh, Y. S. Yong, C. H. Chan, S. J. Then, L. P. Chu, S. W. Chau, H. W. Hon
Abstract:
This paper proposes an alternative control mechanism for an interactive Pan/Tilt/Zoom (PTZ) camera control system. Instead of using a mouse or a joystick, the proposed mechanism utilizes a Nintendo Wii remote and infrared (IR) sensor bar. The Wii remote has buttons that allows the user to control the movement of a PTZ camera through Bluetooth connectivity. In addition, the Wii remote has a built-in motion sensor that allows the user to give control signals to the PTZ camera through pitch and roll movement. A stationary IR sensor bar, placed at some distance away opposite the Wii remote, enables the detection of yaw movement. In addition, the Wii remote-s built-in IR camera has the ability to detect its spatial position, and thus generates a control signal when the user moves the Wii remote. Some experiments are carried out and their performances are compared with an industry-standard PTZ joystick.Keywords: Bluetooth, Infrared, Pan/Tilt/Zoom, PTZ Camera, Visual Surveillance, Wii Remote
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2100887 Using Information Theory to Observe Natural Intelligence and Artificial Intelligence
Authors: Lipeng Zhang, Limei Li, Yanming Pearl Zhang
Abstract:
This paper takes a philosophical view as axiom, and reveals the relationship between information theory and Natural Intelligence and Artificial Intelligence under real world conditions. This paper also derives the relationship between natural intelligence and nature. According to communication principle of information theory, Natural Intelligence can be divided into real part and virtual part. Based on information theory principle that Information does not increase, the restriction mechanism of Natural Intelligence creativity is conducted. The restriction mechanism of creativity reveals the limit of natural intelligence and artificial intelligence. The paper provides a new angle to observe natural intelligence and artificial intelligence.Keywords: Natural intelligence, artificial intelligence, creativity, information theory.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1980886 Surviving Abiotic Stress: The Relationship between High Light and High Salt Tolerance
Authors: Rutanachai Thaipratum
Abstract:
The mechanism of abiotic stress tolerance is crucial for plants to survive in harsh condition and the knowledge of this mechanism can be use to solve the problem of declining productivity of plants or crops around the world. However in-depth description is still unclear and it is argued, in particular that there is a relationship between high salinity tolerance and the ability to tolerate high light condition. In this study, Dunaliella salina, which can withstand high salt was used as a model. Chlorophyll fluorometer for nonphotochemical quenching (NPQ) measurement and high-performance liquid chromatography for pigment determination was used. The results show that NPQ value and the amount of pigment were increased along with the levels of salinity. However, it establish a clear relationship between high salt and high light but the further study to optimized the solutions mentioned above is still required.Keywords: Abiotic stress tolerance, Dunaliella salina, Nonphotochemical quenching, Zeaxanthin.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1636885 Coupling Compensation of 6-DOF Parallel Robot Based on Screw Theory
Authors: Ming Cong, Yinghua Wu, Dong Liu, Haiying Wen, Junfa Yu
Abstract:
In order to improve control performance and eliminate steady, a coupling compensation for 6-DOF parallel robot is presented. Taking dynamic load Tank Simulator as the research object, this paper analyzes the coupling of 6-DOC parallel robot considering the degree of freedom of the 6-DOF parallel manipulator. The coupling angle and coupling velocity are derived based on inverse kinematics model. It uses the mechanism-model combined method which takes practical moving track that considering the performance of motion controller and motor as its input to make the study. Experimental results show that the coupling compensation improves motion stability as well as accuracy. Besides, it decreases the dither amplitude of dynamic load Tank Simulator.
Keywords: coupling compensation, screw theory, parallel robot, mechanism-model combined motion
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1682884 Experimental Evaluation of Mobility Anchor Point Selection Scheme in Hierarchical Mobile IPv6
Authors: Zulkeflee Kusin, Mohamad Shanudin Zakaria
Abstract:
Hierarchical Mobile IPv6 (HMIPv6) was designed to support IP micro-mobility management in the Next Generation Networks (NGN) framework. The main design behind this protocol is the usage of Mobility Anchor Point (MAP) located at any level router of network to support hierarchical mobility management. However, the distance MAP selection in HMIPv6 causes MAP overloaded and increase frequent binding update as the network grows. Therefore, to address the issue in designing MAP selection scheme, we propose a dynamic load control mechanism integrates with a speed detection mechanism (DMS-DLC). From the experimental results we obtain that the proposed scheme gives better distribution in MAP load and increase handover speed.Keywords: Dynamic load control, HMIPv6, Mobility AnchorPoint, MAP selection scheme
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1802883 Multimedia E-Books for Digital Mechanism and Gear Library
Authors: Rike Brecht, Heidi Krömker, Adrian Kühlewind
Abstract:
This paper presents a digital engineering library – the Digital Mechanism and Gear Library, DMG-Lib – providing a multimedia collection of e-books, pictures, videos and animations in the domain of mechanisms and machines. The specific characteristic about DMG-Lib is the enrichment and cross-linking of the different sources. DMG-Lib e-books not only present pages as pixel images but also selected figures augmented with interactive animations. The presentation of animations in e-books increases the clearness of the information. To present the multimedia e-books and make them available in the DMG-Lib internet portal a special e-book reader called StreamBook was developed for optimal presentation of digitized books and to enable reading the e-books as well as working efficiently and individually with the enriched information. The objective is to support different user tasks ranging from information retrieval to development and design of mechanisms.Keywords: E-books, digital library, multimedia, enrichment and cross-linking
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1632882 The Characteristics of a Fair and Efficient Tax Auditing Information System as a Tool against Tax Evasion: A Theoretical Framework
Authors: Dimitris Balios, Stefanos Tantos
Abstract:
Economic growth and social evolution are connected to trust relationships in a society. The quality of the accounting information, the tax information system and the tax audit mechanism evolve multiple benefits in an economy. Tax evasion, the illegal practice where people and companies do not pay taxes, is a crime because of the negative effect in economy and society. In this paper, we describe a theoretical framework on the characteristics of a fair and efficient tax auditing information system which could be a tool against tax evasion, a tool for an economy to grow, especially in countries that face fluctuations in economic activity. We conclude that a fair and efficient tax auditing information system increases the reliability of tax administration, improves taxpayers’ tax compliance and causes a developmental trajectory for the economy.
Keywords: Auditing information system, auditing mechanism, tax evasion, taxation, quality of accounting information.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1113881 The Effects of Adding External Mass and Localised Fatigue upon Static and Dynamic Balance
Authors: K. Abuzayan, H. Alabed, S. Ali
Abstract:
The influence of physical (external added weight) and neurophysiological (fatigue) factors on static and dynamic balance in sport related activities was typified statically by the Romberg test (one foot flat, eyes open) and dynamically by jumping and hopping in both horizontal and vertical directions. Twenty healthy males were participated in this study. In Static condition, added weight increased body-s inertia and therefore decreased body sway in AP direction though not significantly. Dynamically, added weight significantly increased body sway in both ML and AP directions, indicating instability, and the use of the counter rotating segments mechanism to maintain balance was demonstrated. Fatigue on the other hand significantly increased body sway during static balance as a neurophysiological adaptation primarily to the inverted pendulum mechanism. Dynamically, fatigue significantly increased body sway in both ML and AP directions again indicating instability but with a greater use of counter rotating segments mechanism. Differential adaptations for each of the two balance mechanisms (inverted pendulum and counter rotating segments) were found between one foot flat and two feet flat dynamic conditions, as participants relied more heavily on the first in the one foot flat conditions and relied more on the second in the two feet flat conditions.Keywords: Adding external mass, Dynamic balance, Localised fatigue, Static balance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1728880 Avoiding Pin Ball Routing Problem in Network Mobility Hand-Off Management
Authors: M. Dinakaran, P. Balasubramanie
Abstract:
With the demand of mobility by users, wireless technologies have become the hotspot developing arena. Internet Engineering Task Force (IETF) working group has developed Mobile IP to support node mobility. The concept of node mobility indicates that in spite of the movement of the node, it is still connected to the internet and all the data transactions are preserved. It provides location-independent access to Internet. After the incorporation of host mobility, network mobility has undergone intense research. There are several intricacies faced in the real world implementation of network mobility significantly the problem of nested networks and their consequences. This article is concerned regarding a problem of nested network called pinball route problem and proposes a solution to eliminate the above problem. The proposed mechanism is implemented using NS2 simulation tool and it is found that the proposed mechanism efficiently reduces the overload caused by the pinball route problem.Keywords: Mobile IP, Pinball routing problem, NEMO
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1846879 Temporal Change of Fractal Dimension of Explosion Earthquakes and Harmonic Tremors at Semeru Volcano, East Java, Indonesia, using Critical Exponent Method
Authors: Sukir Maryanto, Iyan Mulyana
Abstract:
Fractal analyses of successive event of explosion earthquake and harmonic tremor recorded at Semeru volcano were carried out to investigate the dynamical system regarding to their generating mechanism. The explosive eruptions accompanied by explosion earthquakes and following volcanic tremor which are generated by continuous emission of volcanic ash. The fractal dimension of successive event of explosion and harmonic tremor was estimated by Critical Exponent Method (CEM). It was found that the method yield a higher fractal dimension of explosion earthquakes and gradually decrease during the occurrence of harmonic tremor, and can be considerably as correlated complexity of the source mechanism from the variance of fractal dimension.Keywords: Fractal dimension, Semeru volcano, explosionearthquake, harmonic tremor, Critical Exponent Method
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1762878 Analysis of Detecting Wormhole Attack in Wireless Networks
Authors: Khin Sandar Win
Abstract:
In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network. In which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In this paper, we analyze wormhole attack nature in ad hoc and sensor networks and existing methods of the defending mechanism to detect wormhole attacks without require any specialized hardware. This analysis able to provide in establishing a method to reduce the rate of refresh time and the response time to become more faster.Keywords: Ad hoc network, Sensor network, Wormhole attack, defending mechanism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2300877 Substantial Fatigue Similarity of a New Small-Scale Test Rig to Actual Wheel-Rail System
Authors: Meysam Naeimi, Zili Li, Roumen Petrov, Rolf Dollevoet, Jilt Sietsma, Jun Wu
Abstract:
The substantial similarity of fatigue mechanism in a new test rig for rolling contact fatigue (RCF) has been investigated. A new reduced-scale test rig is designed to perform controlled RCF tests in wheel-rail materials. The fatigue mechanism of the rig is evaluated in this study using a combined finite element-fatigue prediction approach. The influences of loading conditions on fatigue crack initiation have been studied. Furthermore, the effects of some artificial defects (squat-shape) on fatigue lives are examined. To simulate the vehicle-track interaction by means of the test rig, a threedimensional finite element (FE) model is built up. The nonlinear material behaviour of the rail steel is modelled in the contact interface. The results of FE simulations are combined with the critical plane concept to determine the material points with the greatest possibility of fatigue failure. Based on the stress-strain responses, by employing of previously postulated criteria for fatigue crack initiation (plastic shakedown and ratchetting), fatigue life analysis is carried out. The results are reported for various loading conditions and different defect sizes. Afterward, the cyclic mechanism of the test rig is evaluated from the operational viewpoint. The results of fatigue life predictions are compared with the expected number of cycles of the test rig by its cyclic nature. Finally, the estimative duration of the experiments until fatigue crack initiation is roughly determined.
Keywords: Fatigue, test rig, crack initiation, life, rail, squats.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2170876 Content Based Sampling over Transactional Data Streams
Authors: Mansour Tarafdar, Mohammad Saniee Abade
Abstract:
This paper investigates the problem of sampling from transactional data streams. We introduce CFISDS as a content based sampling algorithm that works on a landmark window model of data streams and preserve more informed sample in sample space. This algorithm that work based on closed frequent itemset mining tasks, first initiate a concept lattice using initial data, then update lattice structure using an incremental mechanism.Incremental mechanism insert, update and delete nodes in/from concept lattice in batch manner. Presented algorithm extracts the final samples on demand of user. Experimental results show the accuracy of CFISDS on synthetic and real datasets, despite on CFISDS algorithm is not faster than exist sampling algorithms such as Z and DSS.
Keywords: Sampling, data streams, closed frequent item set mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1710875 Debye Layer Confinement of Nucleons in Nuclei by Laser Ablated Plasma
Authors: M. Ghanaatian, N. Ghahramany, A. Bazrafshan
Abstract:
Following the laser ablation studies leading to a theory of nuclei confinement by a Debye layer mechanism, we present here numerical evaluations for the known stable nuclei where the Coulomb repulsion is included as a rather minor component especially for lager nuclei. In this research paper the required physical conditions for the formation and stability of nuclei particularly endothermic nuclei with mass number greater than to which is an open astrophysical question have been investigated. Using the Debye layer mechanism, nuclear surface energy, Fermi energy and coulomb repulsion energy it is possible to find conditions under which the process of nucleation is permitted in early universe. Our numerical calculations indicate that about 200 second after the big bang at temperature of about 100 KeV and subrelativistic region with nucleon density nearly equal to normal nuclear density namely, 10cm all endothermic and exothermic nuclei have been formed.Keywords: Endothermic nuclear synthesis, Fermi energy, Surface tension, Debye length.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1576874 A 3D Virtual Navigation System Integrating User Positioning and Pre-Download Mechanism
Authors: Ching-Sheng Wang, Yu-Hung Su, Ching-Yang Hong
Abstract:
This paper takes the actual scene of Aletheia University campus – the Class 2 national monument, the first educational institute in northern Taiwan as an example, to present a 3D virtual navigation system which supports user positioning and pre-download mechanism. The proposed system was designed based on the principle of Voronoi Diagra) to divide the virtual scenes and its multimedia information, which combining outdoor GPS positioning and the indoor RFID location detecting function. When users carry mobile equipments such as notebook computer, UMPC, EeePC...etc., walking around the actual scenes of indoor and outdoor areas of campus, this system can automatically detect the moving path of users and pre-download the needed data so that users will have a smooth and seamless navigation without waiting.Keywords: GPS, Positioning, RFID, Virtual Navigation, Voronoi Diagram.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1405873 A New Tool for Global Optimization Problems- Cuttlefish Algorithm
Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman
Abstract:
This paper presents a new meta-heuristic bio-inspired optimization algorithm which is called Cuttlefish Algorithm (CFA). The algorithm mimics the mechanism of color changing behavior of the cuttlefish to solve numerical global optimization problems. The colors and patterns of the cuttlefish are produced by reflected light from three different layers of cells. The proposed algorithm considers mainly two processes: reflection and visibility. Reflection process simulates light reflection mechanism used by these layers, while visibility process simulates visibility of matching patterns of the cuttlefish. To show the effectiveness of the algorithm, it is tested with some other popular bio-inspired optimization algorithms such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Bees Algorithm (BA) that have been previously proposed in the literature. Simulations and obtained results indicate that the proposed CFA is superior when compared with these algorithms.
Keywords: Cuttlefish Algorithm, bio-inspired algorithms, optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3833872 Smart Motion
Authors: Arpita Soni, Sapna Mittal
Abstract:
Austenite and Martensite indicate the phases of solids undergoing phase transformation which we usually associate with materials and not with living organisms. This article provides an overview of bacterial proteins and structures that are undergoing phase transformation and suggests its probable effect on mechanical behavior. The context is mainly within the role of phase transformations occurring in the flagellum of bacteria. The current knowledge of molecular mechanism leading to phase variation in living organisms is reviewed. Since in bacteria, each flagellum is driven by a separate motor, similarity to a Differential drive in case of four-wheeled vehicles is suggested. It also suggests the application of the mechanism in which bacteria changes its direction of movement to facilitate single point turning of a multi-wheeled vehicle. Finally, examples are presented to illustrate that the motion due to phase transformation of flagella in bacteria can start a whole new research on motion mechanisms.
Keywords: Flagella, Phase Transformation, Nanobots, Differential Drive, Single point turn, Biomimetics
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1571871 Canonical PSO based Nanorobot Control for Blood Vessel Repair
Authors: Pinfa Boonrong, Boonserm Kaewkamnerdpong
Abstract:
As nanotechnology advances, the use of nanotechnology for medical purposes in the field of nanomedicine seems more promising; the rise of nanorobots for medical diagnostics and treatments could be arriving in the near future. This study proposes a swarm intelligence based control mechanism for swarm nanorobots that operate as artificial platelets to search for wounds. The canonical particle swarm optimization algorithm is employed in this study. A simulation in the circulatory system is constructed and used for demonstrating the movement of nanorobots with essential characteristics to examine the performance of proposed control mechanism. The effects of three nanorobot capabilities including their perception range, maximum velocity and respond time are investigated. The results show that canonical particle swarm optimization can be used to control the early version nanorobots with simple behaviors and actions.
Keywords: Artificial platelets, canonical particle swarm optimization, nanomedicine, nanorobot, swarm intelligence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2689870 Determining the Workability of the New Metallurgical Materials
Authors: Ondrej Dupala, Josef Brychta, Robert Cep, Adam Janasek
Abstract:
The aim of this paper is to experimentally discover the workability coefficient of the Inconel 718 material by using a slide turning machining. Two different types of cutting inserts, one made of carbide and the other one made of ceramic, are being used. The purpose is to compare measured results and recommend the appropriate materials and cutting parameters for a machining of the Inconel 718. Furthermore, the durability of inserts with the chosen wear criterion is being compared for different cutting speeds. Machinability of these materials is a crucial characteristic as it allows us to shorten the technological cycle time and increase the machining productivity. And this is of great importance from an economic point of view.
Keywords: Workability, Inconel 718, Turning Machining, Durability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1643869 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.
Keywords: Hybrid MAC protocol, data integrity, lightweight encryption, Neighbor based key sharing, Sensor node data processing, Z-MAC.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 571868 Clarifications on the Damping Mechanism Related to the Hunting Motion of the Wheel Axle of a High-Speed Railway Vehicle
Authors: Barenten Suciu
Abstract:
In order to explain the damping mechanism, related to the hunting motion of the wheel axle of a high-speed railway vehicle, a generalized dynamic model is proposed. Based on such model, analytic expressions for the damping coefficient and damped natural frequency are derived, without imposing restrictions on the ratio between the lateral and vertical creep coefficients. Influence of the travelling speed, wheel conicity, dimensionless mass of the wheel axle, ratio of the creep coefficients, ratio of the track span to the yawing diameter, etc. on the damping coefficient and damped natural frequency, is clarified.
Keywords: High-speed railway vehicle, hunting motion, wheel axle, damping, creep, vibration model, analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1255867 Mechanism of Alcohol Related Disruption of the Error Monitoring and Processing System
Authors: M. O. Welcome, Y. E. Razvodovsky, E. V. Pereverzeva, V. A. Pereverzev
Abstract:
The error monitoring and processing system, EMPS is the system located in the substantia nigra of the midbrain, basal ganglia and cortex of the forebrain, and plays a leading role in error detection and correction. The main components of EMPS are the dopaminergic system and anterior cingulate cortex. Although, recent studies show that alcohol disrupts the EMPS, the ways in which alcohol affects this system are poorly understood. Based on current literature data, here we suggest a hypothesis of alcohol-related glucose-dependent system of error monitoring and processing, which holds that the disruption of the EMPS is related to the competency of glucose homeostasis regulation, which in turn may determine the dopamine level as a major component of EMPS. Alcohol may indirectly disrupt the EMPS by affecting dopamine level through disorders in blood glucose homeostasis regulation.Keywords: Alcohol related disruption, Error monitoring andprocessing system, Mechanism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1355866 JConqurr - A Multi-Core Programming Toolkit for Java
Authors: G.A.C.P. Ganegoda, D.M.A. Samaranayake, L.S. Bandara, K.A.D.N.K. Wimalawarne
Abstract:
With the popularity of the multi-core and many-core architectures there is a great requirement for software frameworks which can support parallel programming methodologies. In this paper we introduce an Eclipse toolkit, JConqurr which is easy to use and provides robust support for flexible parallel progrmaming. JConqurr is a multi-core and many-core programming toolkit for Java which is capable of providing support for common parallel programming patterns which include task, data, divide and conquer and pipeline parallelism. The toolkit uses an annotation and a directive mechanism to convert the sequential code into parallel code. In addition to that we have proposed a novel mechanism to achieve the parallelism using graphical processing units (GPU). Experiments with common parallelizable algorithms have shown that our toolkit can be easily and efficiently used to convert sequential code to parallel code and significant performance gains can be achieved.
Keywords: Multi-core, parallel programming patterns, GPU, Java, Eclipse plugin, toolkit,
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2112865 Frictional Effects on the Dynamics of a Truncated Double-Cone Gravitational Motor
Authors: Barenten Suciu
Abstract:
In this work, effects of the friction and truncation on the dynamics of a double-cone gravitational motor, self-propelled on a straight V-shaped horizontal rail, are evaluated. Such mechanism has a variable radius of contact, and, on one hand, it is similar to a pulley mechanism that changes the potential energy into the kinetic energy of rotation, but on the other hand, it is similar to a pendulum mechanism that converts the potential energy of the suspended body into the kinetic energy of translation along a circular path. Movies of the self- propelled double-cones, made of S45C carbon steel and wood, along rails made of aluminum alloy, were shot for various opening angles of the rails. Kinematical features of the double-cones were estimated through the slow-motion processing of the recorded movies. Then, a kinematical model is derived under assumption that the distance traveled by the contact points on the rectilinear rails is identical with the distance traveled by the contact points on the truncated conical surface. Additionally, a dynamic model, for this particular contact problem, was proposed and validated against the experimental results. Based on such model, the traction force and the traction torque acting on the double-cone are identified. One proved that the rolling traction force is always smaller than the sliding friction force; i.e., the double-cone is rolling without slipping. Results obtained in this work can be used to achieve the proper design of such gravitational motor.
Keywords: Truncated double-cone, friction, rolling and sliding, dynamic model, gravitational motor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1354864 Compton Scattering of Annihilation Photons as a Short Range Quantum Key Distribution Mechanism
Authors: Roman Novak, Matjaz Vencelj
Abstract:
The angular distribution of Compton scattering of two quanta originating in the annihilation of a positron with an electron is investigated as a quantum key distribution (QKD) mechanism in the gamma spectral range. The geometry of coincident Compton scattering is observed on the two sides as a way to obtain partially correlated readings on the quantum channel. We derive the noise probability density function of a conceptually equivalent prepare and measure quantum channel in order to evaluate the limits of the concept in terms of the device secrecy capacity and estimate it at roughly 1.9 bits per 1 000 annihilation events. The high error rate is well above the tolerable error rates of the common reconciliation protocols; therefore, the proposed key agreement protocol by public discussion requires key reconciliation using classical error-correcting codes. We constructed a prototype device based on the readily available monolithic detectors in the least complex setup.Keywords: Compton scattering, gamma-ray polarization, quantumcryptography, quantum key distribution
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2259863 A Software of Intrusion Detection Mechanism for Virtual Platforms
Authors: Ying-Chuan Chen, Shuen-Tai Wang
Abstract:
Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1549862 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device
Authors: K. N. Dinesh Babu, G. R. Manjunatha, R. Ramaprabha, V. Rajini, M. V. Gopalan
Abstract:
In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an Intelligent Electronic Device (IED) is discussed. It has been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However, this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.Keywords: Transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4029