A Comparison among Three Entropy Alternatives for the Population-Based Incremental Learning Algorithm
Sacanamboy, Maribell; Bolaños, Freddy; Bernal, Álvaro (Colombia)
ABSTRACT:
Population-Based Incremental Learning (PBIL) algorithm, stands as a heuristic optimization tool which exhibits a good tradeoff between performance and quality of the solutions found. PBIL combines features of both genetic algorithms and competitive learning neural networks. The adaptive PBIL approach is based on the measuring of the entropy of a probability array, which serves both for adjusting the convergence speed, and determining if the stopping condition has already been met. Although the entropy measurement has been often performed by means of the Shannon formulation, there are other alternatives to perform such computation. This paper describes a comparison performed over three forms of entropy (Shannon, Tsallis, and Rényi), in order to provide the adaptive feature to a PBIL optimization algorithm. The optimization problem used for implementing an instance of the PBIL algorithm corresponds to a tasks-mapping over a Wireless Network on Chip architecture which is considered a NP-hard problem. The results obtained are promising, and show that in general, Rényi entropy may serve to increase the PBIL algorithm performance, without substantially degrading the quality of the optimal solutions found.
A Pre-Conceptual-Schema-Based Representation of Time Events Coming from Scientific Software Domain
Noreña-Cardona, Paola Andrea; Zapata-Jaramillo, Carlos Mario (Colombia)
ABSTRACT:
Timer is a trigger event used for generating and simulating processes by using a defined time in scientific software domains. Such domains comprise areas with scientific knowledge based on mathematical models. The time events are graphically and linguistically represented by using computational modeling tools and mathematically represented by using scientific modeling tools. Thus, scientific and business analysts lack a model, which integrate scientific and software components. Pre-conceptual schema (PS) is a software engineering model used for modeling domain knowledge. The PS notation integrates elements for representing trigger events in a domain. However, PS lacks elements for representing time events from scientific software domains. Consequently, in this paper we propose new elements from scientific software domains for representing time events by using the PS. Scientific and business analysts can represent time events in the PS for tracking process time from scientific software domains.
Advancing the Agile Software Process: The Case of Modernizing the Army Community Service’s Information Technology Infrastructure
Pater, Jessica; Lie-Tjauw, Samantha; González, Margarita; Kim, Moon; Isbell, Sheila; Severson, David (United States)
ABSTRACT:
There is a gap between the promises of big data, interoperability, and service-oriented systems and what most governmental agencies currently receive in return from their information systems. Such disparity is apparent in the domain of health and human services, as government organizations are grappling with the challenge of streamlining their business processes and delivery of care to adhere to a person-centered approach that relies on interoperable systems and meaningful data exchange. Since 2014, the Georgia Tech Research Institute has supported the U.S. Department of the Army in this endeavor by modernizing a suite of information systems used to provide family-centric social services, in support of family readiness and inclusive of child wellbeing, healthy marriages and parenting, and the treatment and prevention of domestic violence and child abuse. In this paper, we discuss how agile software development methodology on its own is not conducive to modernization efforts where legacy systems, data, and human processes cannot be replaced entirely. Instead, the authors propose an adapted model that combines agile development with enhanced user-centered design techniques as a socio-technical approach to software modernization. We will describe our process, reflect on lessons learned, and discuss select future implications associated with this type of work.
An Exploration in the Influence of Social Media on University Students’ Relationships
Chukwuere, Joshua Ebere; Bonga, Spesihle Olwethu Yanga (South Africa)
ABSTRACT:
The inception of social media (SM) started during 1997, when Six Degree was the first social media platform that allows users to set up their profiles, upload pictures and interact with people of similar interests and mind-sets. Ever since then, until the present, many social networking sites have emerged that allow continuous communication, interactions, exchange of information, contents and many more, whereby many people use SM for different reasons, which include getting into a relationship and maintaining it. Therefore, this study sought to comprehend the influence of SM on university students’ relationships. A quantitative research methodology, together with the underlying model of the technology acceptance model (TAM), was considered to elicit responses from 271 respondents through questionnaires. The findings indicated that several students utilised SM and social networking sites excessively. Furthermore, the study found that students have favourable perceptions about SM toward their relationships. Nonetheless, not all students used SM for relationship reasons, though the platform has an influence on their relationship in general.
Analysis of Profitability in Peer to Peer Lending Market Based on Linear Regression
Mukase, Sandrine; Qiu, Zhongpan; Han, Shuihua (China)
ABSTRACT:
Machine learning algorithms are filling our everyday life. In profit scoring systems, machine learning techniques has the potential to classify and regress. Here, we report the use of multivariate linear regression technique to predict the impact of profitability in p2p lending markets, using data collected from Lending Club where (152,167) p2p loans from 2008 to 2014 are examined in this study. We proposed to use Net Present Value(NPV) of each loan as a profitability measure. Before p2p lending used credit scoring systems to estimate the loan default probability, even though failed borrowers do not pay back the entire loan, certain amounts may be recovered. In addition, the loans that are risky have a high probability of default, and they have to pay high interest rates to finish the loss they can cause. Unlike previous studies that focused on probability of default in peer to peer lending, we focused on impacts that profitability of investing in p2p lending has using multivariate linear regression as a data mining technique and this study shows that some customers with a high probability of default may be profitable. This novel application of a linear regression, embedded in profit scoring systems could offer significant improvements in profitability in p2p lending markets.
Analysis of Social Media Content and Search Behavior Related to Seasonal Topics Using the Sociophysics Approach
Ishii, Akira; Wakabayashi, Toshimichi; Okano, Nozomi; Kawahata, Yasuko (Japan)
ABSTRACT:
We studied the time interval between posting social media content and search action related to seasonal topics. The analysis was performed using a mathematical model of the search behavior as in the theory of sociophysics. As seasonal topics, the word “cherry blossom” was considered for spring, “bikini” for summer, “autumn leaves” for fall, and “skiing” for winter. We examined the influence of blogs and Twitter posts given the search behavior and found a
time deviation of interest on these topics.
Approach of the Hierarchical Analytic Process Diffuse to Manage the Vehicular Traffic
Cevallos-Torres, Lorenzo J.; Guijarro-Rodríguez, Alfonso A.; Tapia-Celi, Jorge; Valencia-Núñez, Edison R.; Crespo-Mendoza, Roberto (Ecuador)
ABSTRACT:
This article seeks to provide a solution to the problem of vehicular congestion, through the formulation of a control algorithm, which is essentially based on a multi-criteria decision- making process, and supported by a diffuse hierarchical analytical process (HAP Fuzzy); This is intended, since various criteria given by the traditional methods used to solve problems over saturation in the avenues, to propose a method of solution based on uncertainty that analyzes the values of variables, using a scale of quality measurement, in such a way that it could result in a new way to control the vehicular flow, with different applications within the behavior of fuzzy logic and fuzzy sets theory , and thus obtain a better alternative that justifies using HAP Fuzzy efficiently, using the "Matlab" software for the evaluation of the results.
Automating Change Detection in Use Case Diagrams and Descriptions
Javaid, Shahid; Sindhu, Muddassar (Pakistan)
ABSTRACT:
Change is a necessary part in the development of any software system. Software engineering artifacts, such as UML diagrams and descriptions, continue to evolve with time resulting in several versions. Efficient techniques and tools are needed to automatically find changes in these artifacts. This paper presents the basic concepts and constructs of a simple and efficient algorithm, UCDdiff that automatically detects structural and logical changes in different versions of a use case diagram. UCDdiff is implemented in a prototypical tool to facilitate the user to visualize the differences in a user friendly graphical format. This paper also presents an approach for the automation of computing some change metrics in use case descriptions. These were studied manually in an earlier work. We validate both change detection methods i.e. for use case diagrams and descriptions with example case studies. The results show the usefulness of the approach.
Automating Open Source Software License Information Generation in Software Projects
Dyck, Sergius; Haferkorn, Daniel; Kerth, Christian; Schoebel, André (Germany)
ABSTRACT:
This publication deals with Open Source Software (OSS) compliance. In a previous publication [1], we presented an organizational-technical concept for ensuring basic OSS compliance. Based on this concept, we now address further
aspects that are essential to OSS compliance. Our focus is on methods for avoiding license infringements by automated generation of OSS notice lists.
We describe means to manage OSS license (OSSL) information of directly and indirectly used OSS. We use methods for establishing a common domain language based on a Domain-Driven Design (DDD) approach that leads to a
better communication between experts from different fields, e.g., technical and domain experts, when discussing OSS compliance and developing our solutions. Furthermore, we present already existing Maven tools as well as selfdeveloped
Java tools, which make it possible to store the information that has been gained during the OSS compliance process in a structured way. With the aid of said tools, this information can then be used to create the lists of used OSS
suitable for internal audits, external software deployments and software deliveries automatically to reduce manual effort and risk of errors.
Critical Infrastructure in the Railway Transport System
Fuchs, Pavel; Soušek, Radovan; Šustr, Martin; Rozová, Dana; Šohajek, Petr (Czech Republic)
ABSTRACT:
The critical infrastructure in the railway transport is very dynamic system. In the last years are created new critical infrastructure elements. The new critical infrastructure element must be protected, like origin, as well. The most critical infrastructure elements are related to the IT development. The new systems haven’t sufficient resilience. This article describes the new crisis infrastructure elements in the railway transport. This article suggests ways to improve resilience, too.
Data and Services Security Issues and Challenges in Cloud Computing Environments
Rot, Artur (Poland)
ABSTRACT:
Cloud computing is a new paradigm of IT services delivery. The main risks for the cloud services are related to the areas of authentication, data security and privacy, interfaces with internal systems, system availability and business continuity. Among these factors, safety and privacy are the most important area, because the data in this case are stored outside the organizations. On the one hand, the model of cloud computing is more secure than the traditional model, but on the other hand, the company gives away a certain part of the control over its IT resources. These aspects of cloud computing raise the highest concern for the potential users. However, they are often groundless because the level of security that is guaranteed by the service provider is often higher than the level of security in a single company. This article presents the cloud computing as a business model, which uses the latest technologies, and in particular indicates the most significant challenges facing it, especially those related to of data and services security issues.
Delegation of Digital Access and Privilege in a Secure Enterprise
Foltz, Kevin E.; Simpson, William R. (United States)
ABSTRACT:
The Enterprise Level Security (ELS) architecture provides secure digital identity and access management for an enterprise. It provides a core set of security services that facilitate automated access and privilege determination for all enterprise users to all enterprise applications and services. This core set of services is designed for simplicity in common use cases, but in a large enterprise there are many exceptions that require local adjustments to access rules. This paper discusses delegation, which is the controlled sharing of one individual's discretionary access and privilege with another entity. Mandatory access requirements must be met by the delegate. Delegation enables authorized individuals and groups within the enterprise to locally enact access rules that are not addressed by the core enterprise services. This provides two benefits. First, local complications, uncommon scenarios, and unforeseen situations need not be escalated to enterprise-wide changes when they are confined to a single application or service. Delegation keeps small changes local. Second, the visibility that delegation provides enables identification of enterprise-wide patterns that may be better addressed by permanent solutions, such as provision by the enterprise of additional information needed by applications and services. Instead of an accumulation of hidden back-door access methods, delegation keeps the access modifications visible and accountable. Delegation is provided as an enterprise service, with individual delegation policies set by the data owners, and it preserves standard ELS authentication, authorization, and auditing protections. This paper discusses enterprise delegation and its implementation within the ELS architecture.
Detection of Minimal Set of Trips Causing the Necessity to Use Extra Vehicle for Vehicle Scheduling Problem
Pastirčáková, Kateřina; Šulc, Jaromír (Czech Republic)
ABSTRACT:
Vehicle scheduling problem addresses the task of assigning vehicles to cover all trips in a timetable. Minimum number m of vehicles is determined by the number of trips in the peak hours of demand (highest density of trips). In this paper, we propose an approach to detect the minimal set of trips (critical trips), such that omitting them allows to use only m — k vehicles. Results of the algorithm can be used also for increasing the efficiency of the vehicle scheduling problem, which leads to additional cost savings for the transport company. The algorithm was used for public transport vehicle scheduling in several cities within the Czech Republic and the solution stepped up the efficiency by up to 2%.
Developing an Environment for Cost Calculation of Rural School Transportation
Porto, Marcelo Franco; Machado, Aline Anacleto; Nunes, Nilson Tadeu Ramos; Alves, Lucas Vinícius Ribeiro; Tavares, Rafael Henrique Carneiro; Porto, Patrícia Baracho (Brazil)
ABSTRACT:
The Transcolar Rural project comes with the purpose of improving the student transportation system within the countryside. The government of Brazilian state of Espírito Santo, through its secretary of state for education (SEDU), formed a partnership with the Universidade Federal de Minas Gerais (UFMG) to use the Transcolar solution for managing its rural student transportation system. After concluding preliminary studies, data collection, database formatting and feeding, the optimization phase generates new routes with the given data. With the trips defined, the system calculates the cost and creates reports that summarize the entire process. The automatic procedure of cost calculation seeks to complete the developed intelligent transportation system towards its complete independency. The main objective of the whole Transcolar Rural project is to optimize the use of funds, reduce travel distances and standardize vehicles and procedures regarding public student transportation of rural areas.
Discrete Active Disturbance Rejection Control for Chemical Processes
Zheng, Qing; Ghaweta, Ahmad (United States)
ABSTRACT:
In this paper the discrete active disturbance rejection control (DADRC) is applied to two chemical process problems. In the DADRC framework, the external disturbances and internal dynamics associated with chemical processes are
treated as the generalized disturbance to be estimated and compensated for in real time. The current discrete extended state observer is employed for estimating the generalized disturbance and therefore improves the performance of the closed-loop system.
Extreme Learning Machine for Salient Object Detection in Images
Kulkarni, Mukta; An, Yogitha; Patil, Nagamma (India)
ABSTRACT:
Salient areas within an image are natural points of focus for a typical human eye. Identification of these areas is a key step for further applications like object detection, segmentation, recognition and so on. We aim to develop a fast and accurate learning based model for image saliency detection. We use learning based method to replace the traditional contrast based low level feature oriented methods. In this paper, an effective technique which makes use of Extreme Learning Machine (ELM) for detection of salient areas within an image is proposed. These salient areas are identified at the superpixel level. We
use the existing methods which moderately detect salient areas to generate prior maps. Through these, training samples are collected in order to train the classifier. We present a detailed comparison of features used for training
the classifier and an optimal set of features that should be used for training for improving the state of the art methods.
Finite-Fixed Switching Predictive Control Technique for a 7-Level Cascaded H-Bridge Multilevel Active Power Filter. A Comparative Study
Gregor, Raúl; Rodas, Jorge (Paraguay)
ABSTRACT:
This paper presents a finite-fixed predictive control technique applied to the three-wire cascade H-bridge multilevel converters for active power filter applications. The focus of this paper is to examine the impacts of the use of optimum modulation techniques combined with predictive current control in
order to increase the control performance in terms of reactive power compensation and total harmonic distortion. The proposed approach predicts the future behavior of the control actions considering all possible switching states considering an increased prediction horizon in order to select the optimal
switching vector by using an optimization process considering a defined cost function. Finally, the proposed control technique applies an optimum modulation technique. The effectiveness of the proposed control approach will be evaluated through simulations.
Flexible Optoelectronic Organic Sensor
Guedes, Andre F. S.; Tartari, Simone; Guedes, Vilmar P.; Cunha, Idaulo J. (Brazil)
ABSTRACT:
The development of Flexible Optoelectronic Organic Sensor (FOOS), using an optically transparent substrate material and organic semiconductor materials, has been widely utilized by the electronic industry when producing new technological products. The greatest interest in studying organic semiconductor materials has been connected to its already known potential applications, such as: batteries, organic solar cells, flexible organic solar cells, organic light emitting diodes, organic sensors and others. Phototherapy makes use of different radiation sources, and the treatment of hyperbilirubinemia the most common therapeutic intervention occurs in the neonatal period. In this work we developed an organic optoelectronic sensor capable of detecting and determining the radiation dose rate emitted by the radiation source of neonatal phototherapy equipment. The sensors were developed using optically transparent substrate with Nanostructured thin film layers of Poly(9-Vinylcarbazole) covered by a layer of Poly(P-Phenylene Vinylene). The samples were characterized by UV-Vis Spectroscopy, Electrical Measurements and SEM. With the results obtained from this study can be developed dosimeters organics to the neonatal phototherapy equipment
Flexible Organic Battery Technology Applied in OLED
Guedes, Andre F. S.; Tartari, Simone; Guedes, Vilmar P.; Cunha, Idaulo J. (Brazil)
ABSTRACT:
The development of Flexible Organic Battery Technology applied in Organic Light Emitting Diode (OLED), using an flexible optically transparent substrate material and organic semiconductor materials, has been widely utilized by the electronic industry when producing new technological products. The Organic Battery are the base Polyaniline, PANI, Lithium Perchlorate, LiClO4, and Polymethylmethacrylate, PMMA, were deposited in Indium Tin Oxide, ITO, and characterized by UV-Visible Spectroscopy (UV-Vis), Electrical Parameters (EP) and Scanning Electron Microscopy (SEM). In addition, the thin film obtained by the deposition of PANI, prepared in perchloric acid solution, was identified through PANI-X1. The result obtained by UV-Vis has demonstrated that the PVDC/ITO/PANI-X1 layer does not have displacement of absorption for wavelengths greaters after spin-coating and electrodeposition. Also, both electrodes have been united by an electrolyte solution prepared with Lithium Perchlorate, LiClO4, and Polymethylmethacrylate, PMMA. Thus, the result obtained through electrical measurements has demonstrated that the flexible organic battery presented the characteristic curve of standard battery after spin-coating and electrodeposition. Accordingly, the results obtained with optical and electrical characterization have revealed that the flexible organic battery demonstrated some change in optical absorption, when subjected to a many of charge and electric discharge. Moreover, the inclusion of the PANI-X1 layer reduced the effects of degradation that this charge and electric discharge caused. Studies on Scanning Electron Microscopy (SEM) have found out that the surface of PANI-X1 layers can be strongly conditioned by the surface morphology of the dielectric.
Human Management System with BLE Beacon Devices for Natural Disasters Recovery Operations
Naito, Katsuhiro; Murase, Mizuki; Tanaka, Katsuyuki (Japan)
ABSTRACT:
Local governmental units in Japan have stepped up contingency planning after the great east Japan earthquake in 2011. Due to expensive update cost and operation cost of special community wireless systems for disasters, more reasonable disaster support systems are required in many local governmental units. Management of staff during disaster-relief activities is strictly important to quick rescue and recovery. On the contrary, it is typically difficult in practical situations because many staffs should go on patrol to check on damages of a disaster. As a result, local governmental units cannot optimize disaster- relief activities according to the latest situation of staffs. This paper develops a human management system with BLE beacon devices in natural disasters. A location of each staff is very important information to optimize disaster-relief activities. The developed system consists of BLE beacon devices, a special
smartphone application, and a management cloud. Each staff can control the operation of their BLE beacon device to protect their privacy by turning off the device. The smartphone application can collect a beacon from BLE beacon devices around the smartphone, and can upload their location information to
the management cloud automatically. Emergency management headquarters can optimize their operations according to the location information on the management cloud.
Human Smart Cities. Co-Creation Methodologies and Technologies
Oliveira, Álvaro; Santos, Irani (Brazil)
ABSTRACT:
This paper argues that current technology-driven implementations of Smart Cities, although being an important step in the right direction, fall short in exploiting the most important human dimension of cities. In a Human Smart City, people rather than technology are the true actors of the urban “smartness”. The urban transformation is driven by the citizens through their empowerment and motivation allowing major city challenges to be addressed, including sustainable behaviour transformations. The Human Smart Cities concept builds upon emergent sustainable models for urban living, working and governance, enabled by Open Platforms and Digital Services. At the core of the vision is the citizen-centric and participatory approach to the co-design, development, and production of smart city services. Such services exploit the technical "smartness" of sensors, meters and infrastructures in a context favouring citizen empowerment, social interaction in physical urban settings, public-citizens use of open data and data analytics and partnerships. The authors argue that the city challenges are more effectively addressed at the scale of neighbourhood and they provide cases and experiences that demonstrate the viability, importance and impact of this model in Europe and beyond.
Information Gathering System Based on BLE Communication for Bus Information Sharing
Naito, Katsuhiro; Tanaka, Katsuyuki (Japan)
ABSTRACT:
Information gathering system is focused to manage service status in public transportation. The traditional systems employ a special device to collect various information such as a location, a number of passengers, an operational status, etc. to enhance service quality. On the contrary, the cost of the special device
is relatively expensive compared to consumer devices. As a result, some researchers have tried to use a consumer device to collect the information.
Smartphones are first candidate devices for this purpose because they have an internet connection through a cellular network. Additionally, participatory sensing methods, where many common people collaborate to collect information on their own smartphone, have been focused for information gathering. Participants are requested to collect demanded information by a sensing system in participatory sensing methods. Therefore, flexible information can be collectable. On the contrary, participatory sensing methods may not be enough
to collect information continuously because ordinary people may not exist in a service area. In addition, only smartphone devices are not enough to collect special information for public transportation service. This paper proposes a collaborative mechanism with BLE devices with sensors and smartphones to realize the information gathering system. The proposed mechanism employs Bluetooth Low Energy (BLE) devices as a beacon device that triggers our special application for smartphones. Additionally, BLE devices also store demanded information with sensors. The special application can be automatically launched when a beacon message arrives on the smartphone, and can obtain the
demanded information from the BLE device. The benefit of the proposed system is hands-free operation of the smartphone application because information gathering process is performed in a background process. Experimental results demonstrate that the developed application can measure its position with a GPS
receiver and can upload the obtained location to the cloud automatically.
Interface Translation of Webpages for International Communication
Matsuyama, Hiroki; Miyazaki, Mitsuyuki; Okada, Isamu; Miyazaki, Dawn Lavelle; Yokoyama, Shoichi; Ehara, Terumasa; Miyazawa, Shinichiro (Japan)
ABSTRACT:
The advancement of automatic translation systems has increased the demands for more accurate and seamless translations. Translation technique is not the only requirement for successful communication; equally important is the adequate translation technique of the interfaces. Few studies, however, have examined issues associated with interface translation. This paper explored technical issues to be solved concerning the translation of webpage interfaces through the following procedures. First, standard test items were defined through the consolidation of HTML grammar frequently used on webpages.
Next, nine of the leading commercial translation sites were manually evaluated using the standard tests items. Finally, the results of these tests were categorized into five classes. It has become evident that the principle technical issues of the interface translation concern the restoration of character
information embedded in data recorded as different formats. Moreover, it has proven effective to evaluate technically possible attributes on every site and present the indicator of the performance ratios of translation reproducibility.
Machine Learning Based IP Network Traffic Classification Using Feature Significance Analysis
Chou, Te-Shun; Pickard, John; Popoviciu, Ciprian (United States)
ABSTRACT:
This paper studied network traffic collected from 600 US government websites that were all reported to have Domain Name Services (DNS) and Web services accessible over IPv4 and IPv6. Cloud based, Internet distributed monitoring agents were deployed in eight geographic locations to collect data. Both feature selection algorithms, filter and wrapper, were applied to the dataset and the classification accuracy was then studied.
Methodology for GIS-Based Assessment of Rural School Transport Routes in Espírito Santo, Brazil
Porto, Marcelo Franco; Nunes, Nilson Tadeu Ramos; Teixeira, Raphael Bruno Alves; Baracho, Renata Maria A.; Alves, Lucas Vinícius Ribeiro; Porto, Patrícia Baracho (Brazil)
ABSTRACT:
Given the difficulties and high costs of providing school transportation in rural areas, the UFMG School of Engineering, in partnership with the government of Espirito Santo, have developed a route optimization software. The present article presents a methodology for the assessment of existing routes using ArcGIS software. The municipality of Linhares was chosen as a case study. The results of the GIS-based analysis and the optimization demonstrate that it is possible to significantly reduce the cost, and therefore excessive spending
of public funds in rural school transportation.
Modeling and Simulation of the In-Wheel Motor Applied in Electric Vehicle
Shi, Peicheng; Peng, Shanshan; Wang, Xuejiao; Zhang, Rongyun (China)
ABSTRACT:
To study the ride comfort of in-wheel motor electric vehicle, it is necessary to analyze the speed ripple and torque ripple of motor. Thus, the motion differential equation of PMSM (permanent magnet synchronous motor) is presented in this paper. Based on the vector control principle of motor and the
rotor-field-orientated control, a double closed loop controlled PMSM simulation model is built through Sim Power System Toolbox. After that, the simulation analysis of the running process of motor uninfluenced and influenced by load is carried out in Matlab/Simulink. Then the performance curves of speed, torque, and stator current of motor are obtained from the simulation analysis. As last, an in-wheel motor test system is established to verify the simulation results. The research results indicate that the built motor models can reflect the running
status of real motor and the existent phenomenon of motor torque ripple has been verified, which provides a basis for the further researches on the effect of motor torque ripple on the vertical vibration of vehicle suspension.
Multisensor Data Fusion for Cyber Security in Critical Infrastructures
La Manna, Mario (Italy)
ABSTRACT:
Data Fusion is one of the main technologies used in a cyber security system for critical infrastructures. While the application of this technology has already been proposed for the implementation of specific tools, like intrusion detection systems, its extension to the overall design process of a cyber security system is far from a desired target. The development of advanced cyber security architectures based on an interdisciplinary design approach makes this extension possible, especially at the higher levels of the architecture, involving situation assessment, impact assessment and process refinement. This paper analyses one of the advanced cyber security architectures and explores the capability of this architecture to include data fusion tools at the top level of the
architecture. The effects of the generalisation of data fusion techniques are then analysed and the consequent improvements in the network security of critical infrastructures are described and quantified.
Practical Approach to Criticality Assessment
Fuchs, Pavel; Kamenicky, Jan; Zajicek, Jaroslav; Sousek, Radovan (Czech Republic)
ABSTRACT:
Throughout our career, while working in several different companies, it appeared apparent that every man has his own explanation of the term “criticality”, no matter if the company was from petrochemical, energy or automotive industry. Moreover, every man believes that his understanding of that term is the only correct one. Criticality is often used as the most important factor in the decision making process about maintenance strategy, spare parts purchases etc. There is currently no existing definition which can explain criticality in a general way, hence this paper was made to show the different points of view on this term.
Reliable Sub-Nanosecond Switching of a Perpendicular SOT-MRAM Cell without External Magnetic Field
Sverdlov, Viktor; Makarov, Alexander; Selberherr, Siegfried (Austria)
ABSTRACT:
The steady increase in performance and speed of modern integrated circuits is continuously supported by the ongoing miniaturization of complementary metal-oxide semiconductor (CMOS) devices. However, a rapid growth of the dynamic and stand-by power due to transistor leakages becomes a pressing issue.
A promising way to stop this trend is to introduce nonvolatility. The development of an electrically addressable nonvolatile memory combining high speed and high endurance is essential to achieve these goals. It is particularly promising to
employ non-volatility in the main computer memory as a replacement of conventional volatile CMOS-based DRAM. To further reduce the energy consumption, it is essential to also replace the caches (SRAM) in modern hierarchical multilevel processor memory structures with a non-volatile memory
technology. The spin-orbit torque magnetic random access memory (SOT-MRAM) combines non-volatility, high speed and high endurance and is thus suitable for applications in caches. However, its development is still impeded by the
necessity of a static in-plane magnetic field. We propose a magnetic field-free perpendicular SOTMRAM, based on a crossbar architecture and the use of two
consecutive orthogonal sub-nanosecond current pulses. In this way small layout footprint and high integration density are guaranteed.
Studying Artificial Intelligence and Artificial Sociality in Natural Sciences, Engineering, and Social Sciences: Possibility and Reality
Rezaev, Andrey V.; Ivanova, Anastasia A. (Russian Federation)
ABSTRACT:
The paper highlights issues of studying artificial intelligence (AI). The path taken here is to engage the reader in a discussion of interdisciplinarity/crossdisciplinarity of AI studies. It begins with a basic assumption and key argument that anti-disciplinarity rather than inter- or multi-disciplinarity will bring a new dynamic to scientific research dealing with “artificial intelligence” and “artificial sociality”. Discussion of the social scientists’ concerns and problems is reported in what follows. On this base the authors develop their ideas which may help theorists and empirical researchers to tackle questions of AI development in a society. In a conclusion the paper makes correlations of the research outcomes with a reality of higher education.
The Development of a Cybersecurity Competency List for the Internet of Things (IoT)
Poe, La’Reshia; Dittman, Kevin (United States)
ABSTRACT:
The purpose of this study is to identify core competencies that current and future Internet of Things (IoT) cybersecurity professionals will need to possess. This research combines historical and future predictions from authors who have published public research. The researcher combined the most common security competencies from past research and security forecasts. The proposed IoT cybersecurity competency list includes such topics as: Network Security and Telecommunications, Information Systems Operations, and Strategic Cybersecurity Management. The Internet of Things (IoT) specific cybersecurity competencies include: IoT Architecture, IoT protocols, and applications of IoT. A survey on the IoT architecture reveals that a basic understanding of an IoT structural design should be understood before implementing security practices. The IoT environment introduces many unfamiliar technologies to security professionals. Finally, a thorough understanding of IoT basic devices, protocols and environments must be understood prior to implementing the appropriate security design.
The Fault Diagnosis of Wind Turbine Bearing Based on ISAPSO-SVM
Jiao, Bin; Zhou, Zekun (China)
ABSTRACT:
Bearing is an important part of wind turbine gearbox. Its state will directly affect the safe and stable operation of wind turbine, so it’s very important to diagnose the fault of bearing. The support vector machine (SVM) can do the classification work, but its classification accuracy is not good enough. Basic particle swarm optimization (PSO) has disadvantages about premature convergence and particles are easy to fall into local optimal solution. This paper proposed an effective fault diagnosis algorithm called ISAPSO-SVM (using improved simulated annealing particle swarm optimization to optimize SVM). Experimental results showed that, based on applying ISAPSO to solve the parameter selection problems in SVM, UCI database were used to do a series of classification experiments and the classification accuracy of ISAPSO-SVM was verified. Finally, the ISAPSO—SVM model was applied in wind turbine bearing diagnosis and a good result was achieved.
The Methodology and Implementation of Unique Technology Focused Entrepreneurship/Intrepreneurship Programs
Szygenda, Stephen A.; Easton, Diana M. (United States)
ABSTRACT:
This paper describes a unique methodology for technical
entrepreneurship education and it’s application to real world
situations. The methodology provides a general domain
independent approach, which has evolved over a number of
years, and been adopted in universities and technology start-ups. We believe that this approach can have additional domain
specibic imact and one such case is presented herein.
Using Statistical Properties for Author Identification
Osman, Ziad; Hamandi, Lama; Zantout, Rached (Lebanon)
ABSTRACT:
Languages in general are highly redundant which makes text highly compressible. In this paper, English language redundancy is exploited to predict the author of English text. The method developed starts by training the system using texts with known authors. Distinct blocks for texts written by each author
are determined. Those blocks are then filtered to produce, for each author, a set of unique blocks that occur in his/her writings but not in other authors’ texts. In the normal operation mode, text to be categorized is processed to determine the distinct blocks in that text. A comparison between this set of distinct blocks and the unique set of distinct blocks for each author results in correct author categorization. The method described in this paper was proven to work successfully in text classification and author categorization and has the potential to be a universal method since it was tested on English and Arabic texts.