WorldWideScience

Sample records for model iot transform

  1. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  2. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  3. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  5. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  6. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  7. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  8. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.

    Science.gov (United States)

    Kim, Jonghyuk; Hwangbo, Hyunwoo

    2018-03-23

    We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  9. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT

    Directory of Open Access Journals (Sweden)

    Jonghyuk Kim

    2018-03-01

    Full Text Available We introduce current home Internet of Things (IoT technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  10. Futures Business Models for an IoT Enabled Healthcare Sector: A Causal Layered Analysis Perspective

    Directory of Open Access Journals (Sweden)

    Julius Francis Gomes

    2016-12-01

    Full Text Available Purpose: To facilitate futures business research by proposing a novel way to combine business models as a conceptual tool with futures research techniques. Design: A futures perspective is adopted to foresight business models of the Internet of Things (IoT enabled healthcare sector by using business models as a futures business research tool. In doing so, business models is coupled with one of the most prominent foresight methodologies, Causal Layered Analysis (CLA. Qualitative analysis provides deeper understanding of the phenomenon through the layers of CLA; litany, social causes, worldview and myth. Findings: It is di cult to predict the far future for a technology oriented sector like healthcare. This paper presents three scenarios for short-, medium- and long-term future. Based on these scenarios we also present a set of business model elements for different future time frames. This paper shows a way to combine business models with CLA, a foresight methodology; in order to apply business models in futures business research. Besides offering early results for futures business research, this study proposes a conceptual space to work with individual business models for managerial stakeholders. Originality / Value: Much research on business models has offered conceptualization of the phenomenon, innovation through business model and transformation of business models. However, existing literature does not o er much on using business model as a futures research tool. Enabled by futures thinking, we collected key business model elements and building blocks for the futures market and ana- lyzed them through the CLA framework.

  11. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  12. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  13. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  14. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  15. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  16. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  17. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  18. Futures Business Models for an IoT Enabled Healthcare Sector: A Causal Layered Analysis Perspective

    OpenAIRE

    Julius Francis Gomes; Sara Moqaddemerad

    2016-01-01

    Purpose: To facilitate futures business research by proposing a novel way to combine business models as a conceptual tool with futures research techniques. Design: A futures perspective is adopted to foresight business models of the Internet of Things (IoT) enabled healthcare sector by using business models as a futures business research tool. In doing so, business models is coupled with one of the most prominent foresight methodologies, Causal Layered Analysis (CLA). Qualitative analysis...

  19. Energy Modeling of IoT Mobile Terminals on WiFi Environmental Impacts †.

    Science.gov (United States)

    Sun, Yuxia; Chen, Junxian; Tang, Yong; Chen, Yanjia

    2018-05-28

    With the popularity of various IoT mobile terminals such as mobile phones and sensors, the energy problems of IoT mobile terminals have attracted increasingly more attention. In this paper, we explore the impacts of some important factors of WiFi environments on the energy consumption of mobile phones, which are typical IoT end devices. The factors involve the WiFi signal strength under good signal conditions, the type and the amount of protocol packets that are initiated by WiFi APs (Access Points) to maintain basic network communication with the phones. Controlled experiments are conducted to quantitatively study the phone energy impacts by the above WiFi environmental factors. To describe such impacts, we construct a time-based signal strength-aware energy model and packet type/amount-aware energy models. The models constructed in the paper corroborate the following user experience on phone energy consumption: (1) a phone's energy is drawn faster under higher WiFi signal strengths than under lower ones even in normal signal conditions; (2) phones consume energy faster in a public WiFi network than in a private one even in the basic phone state. The energy modeling methods proposed in the paper enable ordinary developers to analyze phone energy draw conveniently by utilizing inexpensive power meters as measurement tools. The modeling methods are general and are able to be used for phones of any type and any platform.

  20. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  1. Improving UWB-Based Localization in IoT Scenarios with Statistical Models of Distance Error.

    Science.gov (United States)

    Monica, Stefania; Ferrari, Gianluigi

    2018-05-17

    Interest in the Internet of Things (IoT) is rapidly increasing, as the number of connected devices is exponentially growing. One of the application scenarios envisaged for IoT technologies involves indoor localization and context awareness. In this paper, we focus on a localization approach that relies on a particular type of communication technology, namely Ultra Wide Band (UWB). UWB technology is an attractive choice for indoor localization, owing to its high accuracy. Since localization algorithms typically rely on estimated inter-node distances, the goal of this paper is to evaluate the improvement brought by a simple (linear) statistical model of the distance error. On the basis of an extensive experimental measurement campaign, we propose a general analytical framework, based on a Least Square (LS) method, to derive a novel statistical model for the range estimation error between a pair of UWB nodes. The proposed statistical model is then applied to improve the performance of a few illustrative localization algorithms in various realistic scenarios. The obtained experimental results show that the use of the proposed statistical model improves the accuracy of the considered localization algorithms with a reduction of the localization error up to 66%.

  2. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection

    Directory of Open Access Journals (Sweden)

    Declan T. Delaney

    2016-12-01

    Full Text Available No single network solution for Internet of Things (IoT networks can provide the required level of Quality of Service (QoS for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks.

  3. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection.

    Science.gov (United States)

    Delaney, Declan T; O'Hare, Gregory M P

    2016-12-01

    No single network solution for Internet of Things (IoT) networks can provide the required level of Quality of Service (QoS) for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks.

  4. A New Perceptual Mapping Model Using Lifting Wavelet Transform

    OpenAIRE

    Taha TahaBasheer; Ehkan Phaklen; Ngadiran Ruzelita

    2017-01-01

    Perceptual mappingapproaches have been widely used in visual information processing in multimedia and internet of things (IOT) applications. Accumulative Lifting Difference (ALD) is proposed in this paper as texture mapping model based on low-complexity lifting wavelet transform, and combined with luminance masking for creating an efficient perceptual mapping model to estimate Just Noticeable Distortion (JND) in digital images. In addition to low complexity operations, experiments results sho...

  5. A Model of Socially Connected Web Objects for IoT Applications

    OpenAIRE

    Ali, Sajjad; Kibria, Muhammad Golam; Jarwar, Muhammad Aslam; Lee, Hoon Ki; Chong, Ilyoung

    2018-01-01

    The Internet of Things (IoT) is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT), emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT application...

  6. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a

  7. Comparisons of Ballistic Trajectory Simulations Using Artillery Meteorological Messages Derived from Local Balloon Data and Battlescale Forecast Model Data for the 1998 SADARM IOT&E Firings

    National Research Council Canada - National Science Library

    Jameson, Terry C; Luces, Saba A; Knapp, Dave

    2001-01-01

    .... Due to the complex terrain and local wind conditions encountered in the test area during the IOT AND E, the Met study was proposed as a way to evaluate current and future artillery Met forecasting...

  8. A New Perceptual Mapping Model Using Lifting Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Taha TahaBasheer

    2017-01-01

    Full Text Available Perceptual mappingapproaches have been widely used in visual information processing in multimedia and internet of things (IOT applications. Accumulative Lifting Difference (ALD is proposed in this paper as texture mapping model based on low-complexity lifting wavelet transform, and combined with luminance masking for creating an efficient perceptual mapping model to estimate Just Noticeable Distortion (JND in digital images. In addition to low complexity operations, experiments results show that the proposed modelcan tolerate much more JND noise than models proposed before

  9. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  10. Challenges when bringing IoT into Industrial Automation

    OpenAIRE

    Lennvall, Tomas; Gidlund, Mikael; Åkerberg, Johan

    2017-01-01

    The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people’s lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial automation domain. This paperaims to present realistic requirements and highlights identified ...

  11. Initially Researches for the Development of SSME under the Background of IOT

    Science.gov (United States)

    Han, Kun; Liu, Shurong; Zhang, Dacheng; Han, Ying

    The Internet Of Things (IOT) is proposed in the 1990s. The original intention has been put forward is people to things and things to things can deliver information like person as. IOT broke the human traditional thinking. This paper researches the practical function of IOT to expand the theory of Services Sciences, Management and Engineering (SSME). On the analysis of the key technology and model of IOT, the events-driven SSME model based on IOT, and the IOT framework based on SSME, it further studies the importance of IOT in the field of SSME.

  12. Cost Effectiveness of the Instrumentalism in Occupational Therapy (IOT) Conceptual Model as a Guide for Intervention with Adolescents with Emotional and Behavioral Disorders (EBD)

    Science.gov (United States)

    Ikiugu, Moses N.; Anderson, Lynne

    2007-01-01

    The purpose of this paper was to demonstrate the cost-effectiveness of using the Instrumentalism in Occupational Therapy (IOT) conceptual practice model as a guide for intervention to assist teenagers with emotional and behavioral disorders (EBD) transition successfully into adulthood. The cost effectiveness analysis was based on a project…

  13. Level Design as Model Transformation

    NARCIS (Netherlands)

    Dormans, Joris

    2011-01-01

    This paper frames the process of designing a level in a game as a series of model transformations. The transformations correspond to the application of particular design principles, such as the use of locks and keys to transform a linear mission into a branching space. It shows that by using rewrite

  14. Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT

    Directory of Open Access Journals (Sweden)

    Seung-Hoon Chae

    2014-01-01

    Full Text Available Internet of Things (IoT brings telemedicine a new chance. This enables the specialist to consult the patient’s condition despite the fact that they are in different places. Medical image segmentation is needed for analysis, storage, and protection of medical image in telemedicine. Therefore, a variety of methods have been researched for fast and accurate medical image segmentation. Performing segmentation in various organs, the accurate judgment of the region is needed in medical image. However, the removal of region occurs by the lack of information to determine the region in a small region. In this paper, we researched how to reconstruct segmentation region in a small region in order to improve the segmentation results. We generated predicted segmentation of slices using volume data with linear equation and proposed improvement method for small regions using the predicted segmentation. In order to verify the performance of the proposed method, lung region by chest CT images was segmented. As a result of experiments, volume data segmentation accuracy rose from 0.978 to 0.981 and from 0.281 to 0.187 with a standard deviation improvement confirmed.

  15. Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT

    Directory of Open Access Journals (Sweden)

    Vijender Kumar Solanki

    2017-03-01

    Full Text Available Keeping in mind the need to preserve energy as well as utilize the available at its best the need was felt to develop a module that would be able to sort out the problem where resources such as water and electricity were wasted, in urban as well as rural area. Resource (electricity was wasted as beside the point operation of Highway and High Mast Lamp; while wastage of water followed by improper trends and methodologies imparted for watering of city park, road side plantation and highway plantation. Thus as per Energy survey statistics of a City (Lucknow, India it was found that major portion of resources (water and electricity were being wasted due to negligent activities of officials who were in charge of resource management. So to facilitate energy saving trends and to completely modernize it to autonomous system, module below is proposed which incorporates modern technological peripheral and has its base ingrained in IoT (Internet of Things which when put into consideration would result in large scale resource and energy saving.This developed module incorporates the peripherals such as Arduino, Texas Instruments ultra low power kits etc. in accordance with software technology including Lab View which help to monitor as well as control the various operation from the base station, located far away from the site. Lab View Interface interacts with all the module located at various city parks, subways and highway lighting modules. Later below in several section a detailed pattern and application frame has been put up.

  16. INFORMATION MODEL OF SOCIAL TRANSFORMATIONS

    Directory of Open Access Journals (Sweden)

    Мария Васильевна Комова

    2013-09-01

    Full Text Available The social transformation is considered as a process of qualitative changes of the society, creating a new level of organization in all areas of life, in different social formations, societies of different types of development. The purpose of the study is to create a universal model for studying social transformations based on their understanding as the consequence of the information exchange processes in the society. After defining the conceptual model of the study, the author uses the following methods: the descriptive method, analysis, synthesis, comparison.Information, objectively existing in all elements and systems of the material world, is an integral attribute of the society transformation as well. The information model of social transformations is based on the definition of the society transformation as the change in the information that functions in the society’s information space. The study of social transformations is the study of information flows circulating in the society and being characterized by different spatial, temporal, and structural states. Social transformations are a highly integrated system of social processes and phenomena, the nature, course and consequences of which are affected by the factors representing the whole complex of material objects. The integrated information model of social transformations foresees the interaction of the following components: social memory, information space, and the social ideal. To determine the dynamics and intensity of social transformations the author uses the notions of "information threshold of social transformations" and "information pressure".Thus, the universal nature of information leads to considering social transformations as a system of information exchange processes. Social transformations can be extended to any episteme actualized by social needs. The establishment of an information threshold allows to simulate the course of social development, to predict the

  17. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  18. WAVELET TRANSFORM AND LIP MODEL

    Directory of Open Access Journals (Sweden)

    Guy Courbebaisse

    2011-05-01

    Full Text Available The Fourier transform is well suited to the study of stationary functions. Yet, it is superseded by the Wavelet transform for the powerful characterizations of function features such as singularities. On the other hand, the LIP (Logarithmic Image Processing model is a mathematical framework developed by Jourlin and Pinoli, dedicated to the representation and processing of gray tones images called hereafter logarithmic images. This mathematically well defined model, comprising a Fourier Transform "of its own", provides an effective tool for the representation of images obtained by transmitted light, such as microscope images. This paper presents a Wavelet transform within the LIP framework, with preservation of the classical Wavelet Transform properties. We show that the fast computation algorithm due to Mallat can be easily used. An application is given for the detection of crests.

  19. Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems

    DEFF Research Database (Denmark)

    Tomlein, Matus; Grønbæk, Kaj

    2016-01-01

    reasoning to resolve context requirements. We present the implications on the architecture of the ecosystem and the concepts defined in the model. Finally, we discuss the evaluation of the model and its benefits and liabilities. Although the approach results in more complex descriptions of applications, we...

  20. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  1. FOURIER SERIES MODELS THROUGH TRANSFORMATION

    African Journals Online (AJOL)

    DEPT

    monthly temperature data (1996 – 2005) collected from the National Root ... KEY WORDS: Fourier series, square transformation, multiplicative model, ... fluctuations or movements are often periodic(Ekpeyong,2005). .... significant trend or not, if the trend is not significant, the grand mean may be used as an estimate of trend.

  2. From BPM to IoT

    OpenAIRE

    Cherrier , Sylvain; Deshpande , Varun

    2017-01-01

    International audience; IoT’s presence is increasingly felt. There are already more connected devices to the internet than total human population and sales are starting to rise. As there is extensive research ongoing in order to propose a global architecture to build IoT applications, the domain will rise as soon as a common solution will be widespread. Further, we would need to integrate IoT applications into the legacy data processing solutions. Business Process Model, for example, is a com...

  3. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  4. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  5. Economics of Internet of Things (IoT): An Information Market Approach

    OpenAIRE

    Niyato, D.; Lu, X.; Wang, P.; Kim, D. I.; Han, Z.

    2015-01-01

    Internet of things (IoT) has been proposed to be a new paradigm of connecting devices and providing services to various applications, e.g., transportation, energy, smart city, and healthcare. In this paper, we focus on an important issue, i.e., economics of IoT, that can have a great impact to the success of IoT applications. In particular, we adopt and present the information economics approach with its applications in IoT. We first review existing economic models developed for IoT services....

  6. Designing the IoT sandbox

    NARCIS (Netherlands)

    Frens, Joep; Funk, Mathias; van Hout, Bastiaan; Le Blanc, Joep

    2018-01-01

    This pictorial describes the design and design process of the IoT Sandbox: a (scale model of a) smart home equipped with actuators and a modular interface that controls the interactive aspects of the smart home. This modular interface can 'grow" together with the house it controls whereby it offers

  7. IoT for Smart Living

    Indian Academy of Sciences (India)

    Professor. Robert Bosch Centre for Cyber-Physical Systems, ... Develop Information models/Knowledge structures to capture “Cities” to enable Intelligent apps. IoT Technology is now easily accessible for anyone to experiment with. Build very ...

  8. Transparent Model Transformation: Turning Your Favourite Model Editor into a Transformation Tool

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2015-01-01

    Current model transformation languages are supported by dedicated editors, often closely coupled to a single execution engine. We introduce Transparent Model Transformation, a paradigm enabling modelers to specify transformations using a familiar tool: their model editor. We also present VMTL, th...... model transformation tool sharing the model editor’s benefits, transparently....

  9. Model Validation in Ontology Based Transformations

    Directory of Open Access Journals (Sweden)

    Jesús M. Almendros-Jiménez

    2012-10-01

    Full Text Available Model Driven Engineering (MDE is an emerging approach of software engineering. MDE emphasizes the construction of models from which the implementation should be derived by applying model transformations. The Ontology Definition Meta-model (ODM has been proposed as a profile for UML models of the Web Ontology Language (OWL. In this context, transformations of UML models can be mapped into ODM/OWL transformations. On the other hand, model validation is a crucial task in model transformation. Meta-modeling permits to give a syntactic structure to source and target models. However, semantic requirements have to be imposed on source and target models. A given transformation will be sound when source and target models fulfill the syntactic and semantic requirements. In this paper, we present an approach for model validation in ODM based transformations. Adopting a logic programming based transformational approach we will show how it is possible to transform and validate models. Properties to be validated range from structural and semantic requirements of models (pre and post conditions to properties of the transformation (invariants. The approach has been applied to a well-known example of model transformation: the Entity-Relationship (ER to Relational Model (RM transformation.

  10. Managing Green Business Model Transformations

    CERN Document Server

    Sommer, Axel

    2012-01-01

    Environmental sustainability creates both tremendous business opportunities and formidable threats to established companies across virtually all industry sectors. Yet many companies tackle the issue in a superficial or passive way through increased environmental reporting, the use of “greenspeak” in their corporate communication activities or isolated efforts to create green products or reduce pollution. In contrast, there are a small but increasing number of firms that employ a holistic approach to sustainability and consider fundamental changes to their existing business models. By ignoring the opportunities of Green Business Model Transformations, companies exclude themselves from a large variety of potential means to create economic value. In addition to ordinary product and process innovations, they can change “the rules of the game” within an industry towards environmental sustainability. This can facilitate the commercialisation of new green products that would not be competitive otherwise targ...

  11. IOT Overview Polarimetry

    Science.gov (United States)

    Ageorges, N.

    This contribution concentrates on the polarimetric modes offered by different instruments at ESO. In the introduction, I will demonstrate the importance of polarimetry, the kind of science it permits to achieve and list the instruments which offer these modes. Sects. 2 and 3 will present the involved modes in more details as well as the currently related calibrations, as part of the calibration plans.ESO does not offer any pure polarimetric instrument. As a consequence the polarimetric modes are just one (or more) mode(s) of the given instruments. Polarimetric modes might be mentioned in the related IOT but are not followed up thoroughly as is e.g. spectroscopy.

  12. Enabling IoT ecosystems through platform interoperability

    OpenAIRE

    Bröring, Arne; Schmid, Stefan; Schindhelm, Corina-Kim; Khelil, Abdelmajid; Kabisch, Sebastian; Kramer, Denis; Le Phuoc, Danh; Mitic, Jelena; Anicic, Darko; Teniente López, Ernest

    2017-01-01

    Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broa...

  13. Logistic Model to Support Service Modularity for the Promotion of Reusability in a Web Objects-Enabled IoT Environment.

    Science.gov (United States)

    Kibria, Muhammad Golam; Ali, Sajjad; Jarwar, Muhammad Aslam; Kumar, Sunil; Chong, Ilyoung

    2017-09-22

    Due to a very large number of connected virtual objects in the surrounding environment, intelligent service features in the Internet of Things requires the reuse of existing virtual objects and composite virtual objects. If a new virtual object is created for each new service request, then the number of virtual object would increase exponentially. The Web of Objects applies the principle of service modularity in terms of virtual objects and composite virtual objects. Service modularity is a key concept in the Web Objects-Enabled Internet of Things (IoT) environment which allows for the reuse of existing virtual objects and composite virtual objects in heterogeneous ontologies. In the case of similar service requests occurring at the same, or different locations, the already-instantiated virtual objects and their composites that exist in the same, or different ontologies can be reused. In this case, similar types of virtual objects and composite virtual objects are searched and matched. Their reuse avoids duplication under similar circumstances, and reduces the time it takes to search and instantiate them from their repositories, where similar functionalities are provided by similar types of virtual objects and their composites. Controlling and maintaining a virtual object means controlling and maintaining a real-world object in the real world. Even though the functional costs of virtual objects are just a fraction of those for deploying and maintaining real-world objects, this article focuses on reusing virtual objects and composite virtual objects, as well as discusses similarity matching of virtual objects and composite virtual objects. This article proposes a logistic model that supports service modularity for the promotion of reusability in the Web Objects-enabled IoT environment. Necessary functional components and a flowchart of an algorithm for reusing composite virtual objects are discussed. Also, to realize the service modularity, a use case scenario is

  14. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Lathifah Arief

    2017-08-01

    Full Text Available Ekosistem Internet of Things (IoT berkembang dengan sangat cepat dan diperkirakan akan menghubungkan 5-20 miliar perangkat pada tahun 2020. Data yang dihimpun dari perangkat ini akan mencapai jumlah yang sangat besar. Saat ini, ekosistem IoT pada umumnya menggunakan model sistem terpusat. Model tersebut memiliki beberapa kelemahan, seperti biaya pemeliharaan yang relatif tinggi, Sistem terdistribusi dapat menjadi alternatif solusi. Blockchain, teknologi ledger terditribusi, memungkinkan transaksi peer-to-peer tanpa perlu adanya perantara pihak ketiga yang terpercaya. Paper ini bertujuan untuk mengeksplorasi potensi pengintegrasian Blockchain ke dalam ekosistem IoT. Hasil penelitian berupa model dan use-case pemanfaatan Blockchain dalam IoT.

  15. A NEW OS ARCHITECTURE FOR IOT

    Directory of Open Access Journals (Sweden)

    Jean Y. Astier

    2018-03-01

    Full Text Available Current computer operating systems architectures are not well suited for the coming world of connected objects, known as the Internet of Things (IoT for multiple reasons: poor communication performances in both point-to-point and broadcast cases, poor operational reliability and network security, excessive requirements both in terms of processor power and memory size leading to excessive electrical power consumption. We introduce a new computer operating system architecture well adapted to IoT, from the most modest to the most complex, and more generally able to significantly raise the input/output capacities of any communicating computer. This architecture rests on the principles of the Von Neumann hardware model, and is composed of two types of asymmetric distributed containers, which communicate by message passing. We describe the sub-systems of both of these types of containers, where each sub-system has its own scheduler, and a dedicated execution level.

  16. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  17. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh, Hossein; Burkhalter, Lukas; Hithnawi, Anwar; Duquennoy, Simon

    2017-01-01

    Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management. We depart from the current trust model that delega...

  18. Modelling the pulse transformer in SPICE

    International Nuclear Information System (INIS)

    Godlewska, Malgorzata; Górecki, Krzysztof; Górski, Krzysztof

    2016-01-01

    The paper is devoted to modelling pulse transformers in SPICE. It shows the character of the selected models of this element, points out their advantages and disadvantages, and presents the results of experimental verification of the considered models. These models are characterized by varying degrees of complexity - from linearly coupled linear coils to nonlinear electrothermal models. The study was conducted for transformer with ring cores made of a variety of ferromagnetic materials, while exciting the sinusoidal signal of a frequency 100 kHz and different values of load resistance. The transformers operating conditions under which the considered models ensure the acceptable accuracy of calculations are indicated

  19. Fourier series models through transformation | Omekara | Global ...

    African Journals Online (AJOL)

    As a result, the square transformation which outperforms the others is adopted. Consequently, each of the multiplicative and additive FSA models fitted to the transformed data are then subjected to a test for white noise based on spectral analysis. The result of this test shows that only the multiplicative model is adequate.

  20. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  1. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  2. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

    Directory of Open Access Journals (Sweden)

    Kirshna Kumar

    2017-12-01

    Full Text Available Energy efficiency is a significant characteristic of battery-run devices such as sensors, RFID and mobile phones. In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment. IoT network success and performance enhancement depend heavily on optimization of energy consumption that enhance the lifetime of IoT nodes and the network. In this context, this paper presents a comprehensive review on energy efficiency techniques used in IoT environments. The techniques proposed by researchers have been categorized based on five different layers of the energy architecture of IoT. These five layers are named as sensing, local processing and storage, network/communication, cloud processing and storage, and application. Specifically, the significance of energy efficiency in IoT environments is highlighted. A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments. Following the taxonomy, a critical review of literature is performed focusing on major functional models, strengths and weaknesses. Open research challenges related to energy efficiency in IoT are identified as future research directions in the area. The survey should benefit IoT industry practitioners and researchers, in terms of augmenting the understanding of energy efficiency and its IoT-related trends and issues.

  3. Quantum decoration transformation for spin models

    Energy Technology Data Exchange (ETDEWEB)

    Braz, F.F.; Rodrigues, F.C.; Souza, S.M. de; Rojas, Onofre, E-mail: ors@dfi.ufla.br

    2016-09-15

    It is quite relevant the extension of decoration transformation for quantum spin models since most of the real materials could be well described by Heisenberg type models. Here we propose an exact quantum decoration transformation and also showing interesting properties such as the persistence of symmetry and the symmetry breaking during this transformation. Although the proposed transformation, in principle, cannot be used to map exactly a quantum spin lattice model into another quantum spin lattice model, since the operators are non-commutative. However, it is possible the mapping in the “classical” limit, establishing an equivalence between both quantum spin lattice models. To study the validity of this approach for quantum spin lattice model, we use the Zassenhaus formula, and we verify how the correction could influence the decoration transformation. But this correction could be useless to improve the quantum decoration transformation because it involves the second-nearest-neighbor and further nearest neighbor couplings, which leads into a cumbersome task to establish the equivalence between both lattice models. This correction also gives us valuable information about its contribution, for most of the Heisenberg type models, this correction could be irrelevant at least up to the third order term of Zassenhaus formula. This transformation is applied to a finite size Heisenberg chain, comparing with the exact numerical results, our result is consistent for weak xy-anisotropy coupling. We also apply to bond-alternating Ising–Heisenberg chain model, obtaining an accurate result in the limit of the quasi-Ising chain.

  4. Quantum decoration transformation for spin models

    International Nuclear Information System (INIS)

    Braz, F.F.; Rodrigues, F.C.; Souza, S.M. de; Rojas, Onofre

    2016-01-01

    It is quite relevant the extension of decoration transformation for quantum spin models since most of the real materials could be well described by Heisenberg type models. Here we propose an exact quantum decoration transformation and also showing interesting properties such as the persistence of symmetry and the symmetry breaking during this transformation. Although the proposed transformation, in principle, cannot be used to map exactly a quantum spin lattice model into another quantum spin lattice model, since the operators are non-commutative. However, it is possible the mapping in the “classical” limit, establishing an equivalence between both quantum spin lattice models. To study the validity of this approach for quantum spin lattice model, we use the Zassenhaus formula, and we verify how the correction could influence the decoration transformation. But this correction could be useless to improve the quantum decoration transformation because it involves the second-nearest-neighbor and further nearest neighbor couplings, which leads into a cumbersome task to establish the equivalence between both lattice models. This correction also gives us valuable information about its contribution, for most of the Heisenberg type models, this correction could be irrelevant at least up to the third order term of Zassenhaus formula. This transformation is applied to a finite size Heisenberg chain, comparing with the exact numerical results, our result is consistent for weak xy-anisotropy coupling. We also apply to bond-alternating Ising–Heisenberg chain model, obtaining an accurate result in the limit of the quasi-Ising chain.

  5. Ontology Based Model Transformation Infrastructure

    NARCIS (Netherlands)

    Göknil, Arda; Topaloglu, N.Y.

    2005-01-01

    Using MDA in ontology development has been investigated in several works recently. The mappings and transformations between the UML constructs and the OWL elements to develop ontologies are the main concern of these research projects. We propose another approach in order to achieve the collaboration

  6. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  7. Kinetics model of bainitic transformation with stress

    Science.gov (United States)

    Zhou, Mingxing; Xu, Guang; Hu, Haijiang; Yuan, Qing; Tian, Junyu

    2018-01-01

    Thermal simulations were conducted on a Gleeble 3800 simulator. The main purpose is to investigate the effects of stress on the kinetics of bainitic transformation in a Fe-C-Mn-Si advanced high strength bainitic steel. Previous studies on modeling the kinetics of stress affected bainitic transformation only considered the stress below the yield strength of prior austenite. In the present study, the stress above the yield strength of prior austenite is taken into account. A new kinetics model of bainitic transformation dependent on the stress (including the stresses below and above the yield strength of prior austenite) and the transformation temperature is proposed. The new model presents a good agreement with experimental results. In addition, it is found that the acceleration degree of stress on bainitic transformation increases with the stress whether its magnitude is below or above the yield strength of austenite, but the increasing rate gradually slows down when the stress is above the yield strength of austenite.

  8. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  9. Has the Nordic Welfare Model Been Transformed?

    DEFF Research Database (Denmark)

    Greve, Bent; Kvist, Jon

    2011-01-01

    The Nordic welfare model is undergoing a fundamental transformation. Using Denmark we show how a universal welfare state model is gradually being transformed into an emergent multi-tiered welfare state. Whereas the Danish pension system's having become multi-tiered in the 1990s, with private...... and the sick. Although Denmark still offers universal coverage in core welfare state areas, the increased use of occupational and fiscal welfare as well as changes in public schemes has gradually transformed the nation into a multi-tiered welfare state that is more dualistic and individualistic...

  10. Model based analysis of piezoelectric transformers.

    Science.gov (United States)

    Hemsel, T; Priya, S

    2006-12-22

    Piezoelectric transformers are increasingly getting popular in the electrical devices owing to several advantages such as small size, high efficiency, no electromagnetic noise and non-flammable. In addition to the conventional applications such as ballast for back light inverter in notebook computers, camera flash, and fuel ignition several new applications have emerged such as AC/DC converter, battery charger and automobile lighting. These new applications demand high power density and wide range of voltage gain. Currently, the transformer power density is limited to 40 W/cm(3) obtained at low voltage gain. The purpose of this study was to investigate a transformer design that has the potential of providing higher power density and wider range of voltage gain. The new transformer design utilizes radial mode both at the input and output port and has the unidirectional polarization in the ceramics. This design was found to provide 30 W power with an efficiency of 98% and 30 degrees C temperature rise from the room temperature. An electro-mechanical equivalent circuit model was developed to describe the characteristics of the piezoelectric transformer. The model was found to successfully predict the characteristics of the transformer. Excellent matching was found between the computed and experimental results. The results of this study will allow to deterministically design unipoled piezoelectric transformers with specified performance. It is expected that in near future the unipoled transformer will gain significant importance in various electrical components.

  11. Mathematical model of three winding auto transformer

    International Nuclear Information System (INIS)

    Volcko, V.; Eleschova, Z.; Belan, A.; Janiga, P.

    2012-01-01

    This article deals with the design of mathematical model of three-winding auto transformer for steady state analyses. The article is focused on model simplicity for the purposes of the use in complex transmission systems and authenticity of the model taking into account different types of step-voltage regulator. (Authors)

  12. Graph and model transformation tools for model migration : empirical results from the transformation tool contest

    NARCIS (Netherlands)

    Rose, L.M.; Herrmannsdoerfer, M.; Mazanek, S.; Van Gorp, P.M.E.; Buchwald, S.; Horn, T.; Kalnina, E.; Koch, A.; Lano, K.; Schätz, B.; Wimmer, M.

    2014-01-01

    We describe the results of the Transformation Tool Contest 2010 workshop, in which nine graph and model transformation tools were compared for specifying model migration. The model migration problem—migration of UML activity diagrams from version 1.4 to version 2.2—is non-trivial and practically

  13. Six Sigma Driven Enterprise Model Transformation

    Directory of Open Access Journals (Sweden)

    Raymond Vella

    2009-10-01

    Full Text Available Enterprise architecture methods provide a structured system to understand enterprise activities. However, existing enterprise modelling methodologies take static views of the enterprise and do not naturally lead to a path of improvement during enterprise model transformation. This paper discusses the need for a methodology to facilitate changes for improvement in an enterprise. The six sigma methodology is proposed as the tool to facilitate progressive and continual Enterprise Model Transformation to allow businesses to adapt to meet increased customer expectation and global competition. An alignment of six sigma with phases of GERAM life cycle is described with inclusion of Critical-To-Satisfaction (CTS requirements. The synergies of combining the two methodologies are presented in an effort to provide a more culturally embedded framework for Enterprise Model Transformation that builds on the success of six sigma.

  14. Blockchain for the IoT: Opportunities and Challenges

    OpenAIRE

    Ramachandran, Gowri Sankar; Krishnamachari, Bhaskar

    2018-01-01

    Blockchain technology has been transforming the financial industry and has created a new crypto-economy in the last decade. The foundational concepts such as decentralized trust and distributed ledger are promising for distributed, and large-scale Internet of Things (IoT) applications. However, the applications of Blockchain beyond cryptocurrencies in this domain are few and far between because of the lack of understanding and inherent architectural challenges. In this paper, we describe the ...

  15. Oil transformation sector modelling: price interactions

    International Nuclear Information System (INIS)

    Maurer, A.

    1992-01-01

    A global oil and oil product prices evolution model is proposed that covers the transformation sector incidence and the final user price establishment together with price interactions between gaseous and liquid hydrocarbons. High disparities among oil product prices in the various consumer zones (North America, Western Europe, Japan) are well described and compared with the low differences between oil supply prices in these zones. Final user price fluctuations are shown to be induced by transformation differences and competition; natural gas market is also modelled

  16. Transformation of UML models to CSP : a case study for graph transformation tools

    NARCIS (Netherlands)

    Varró, D.; Asztalos, M.; Bisztray, D.; Boronat, A.; Dang, D.; Geiß, R.; Greenyer, J.; Van Gorp, P.M.E.; Kniemeyer, O.; Narayanan, A.; Rencis, E.; Weinell, E.; Schürr, A.; Nagl, M.; Zündorf, A.

    2008-01-01

    Graph transformation provides an intuitive mechanism for capturing model transformations. In the current paper, we investigate and compare various graph transformation tools using a compact practical model transformation case study carried out as part of the AGTIVE 2007 Tool Contest [22]. The aim of

  17. Acceleration transforms and statistical kinetic models

    International Nuclear Information System (INIS)

    LuValle, M.J.; Welsher, T.L.; Svoboda, K.

    1988-01-01

    For a restricted class of problems a mathematical model of microscopic degradation processes, statistical kinetics, is developed and linked through acceleration transforms to the information which can be obtained from a system in which the only observable sign of degradation is sudden and catastrophic failure. The acceleration transforms were developed in accelerated life testing applications as a tool for extrapolating from the observable results of an accelerated life test to the dynamics of the underlying degradation processes. A particular concern of a physicist attempting to interpreted the results of an analysis based on acceleration transforms is determining the physical species involved in the degradation process. These species may be (a) relatively abundant or (b) relatively rare. The main results of this paper are a theorem showing that for an important subclass of statistical kinetic models, acceleration transforms cannot be used to distinguish between cases a and b, and an example showing that in some cases falling outside the restrictions of the theorem, cases a and b can be distinguished by their acceleration transforms

  18. IOT Based Inline Errands IBIE

    Directory of Open Access Journals (Sweden)

    Ramesh G

    2015-08-01

    Full Text Available The Internet of Things IoT is an emerging technology that is creating an enormous network of things communicating with one another. It involves a broad set of technologies hardware and software stacks. Data humans devices and communication are critical elements of an IoT ecosystem. The primary purpose of this research paper is to provide an advantageous application in day to day life in redeemable time factor. Now a days shopping at malls is a daily or weekly activity of domestic life. Survey states during the initial week of month and weekends are the peak sale periods at shopping malls and super markets. Often equivalent time is taken for billing and payment as time taken for shopping. The Application introduced in this paper provides smart solution to redeemable time.

  19. Modeling of austenite to ferrite transformation

    Indian Academy of Sciences (India)

    395–398. c Indian Academy of Sciences. Modeling of austenite to ferrite transformation. MOHSEN KAZEMINEZHAD. ∗. Department of Materials Science and Engineering, Sharif University of Technology, Azadi Avenue, Tehran, Iran. MS received 17 January 2011; revised 9 July 2011. Abstract. In this research, an algorithm ...

  20. Numerical modeling of transformer inrush currents

    Energy Technology Data Exchange (ETDEWEB)

    Cardelli, E. [Department of Industrial Engineering, University of Perugia, I-06125 Perugia (Italy); Center for Electric and Magnetic Applied Research (Italy); Faba, A., E-mail: faba@unipg.it [Department of Industrial Engineering, University of Perugia, I-06125 Perugia (Italy); Center for Electric and Magnetic Applied Research (Italy)

    2014-02-15

    This paper presents an application of a vector hysteresis model to the prediction of the inrush current due the arbitrary initial excitation of a transformer after a fault. The approach proposed seems promising in order to predict the transient overshoot in current and the optimal time to close the circuit after the fault.

  1. Nonlinear Model of Tape Wound Core Transformers

    Directory of Open Access Journals (Sweden)

    A. Vahedi

    2015-03-01

    Full Text Available Recently, tape wound cores due to their excellent magnetic properties, are widely used in different types of transformers. Performance prediction of these transformers needs an accurate model with ability to determine flux distribution within the core and magnetic loss. Spiral structure of tape wound cores affects the flux distribution and always cause complication of analysis. In this paper, a model based on reluctance networks method is presented for analysis of magnetic flux in wound cores. Using this model, distribution of longitudinal and transverse fluxes within the core can be determined. To consider the nonlinearity of the core, a dynamic hysteresis model is included in the presented model. Having flux density in different points of the core, magnetic losses can be calculated. To evaluate the validity of the model, results are compared with 2-D FEM simulations. In addition, a transformer designed for series-resonant converter and simulation results are compared with experimental measurements. Comparisons show accuracy of the model besides simplicity and fast convergence

  2. QAaaS in a Cloud IoT Ecosystem

    Directory of Open Access Journals (Sweden)

    Bogdan GHILIC-MICU

    2017-01-01

    Full Text Available The current transition state of the global society, both from economic and (mostly technological perspective, goes – again – into overtime. Borrowed from fundamental domains and applied into science and research, the latest technological developments are built on graphene, silicene, phosphorene and stanene. The fourth industrial revolution changes perceptions and redefines the status of the individual, transforming him from con-sumer into pro-sumer of energy. Spintronics stimulates the production of accessories specific to the Internet of Things (IoT, like smart clothes connected to internet and implanted phones. Additionally, technology influences software development methodologies facing us with paradigms that transcend philosophies like green, grid, cloud computing and advance toward a superior manifestation of computer programming: Fog Computing (with the next level being presumably Rainbow Computing. Within this avalanche of transformations, technologies and paradigms, one aspect that has to evolve continuously is the quality assurance (QA. Hidden under various concept or methodology encapsulations, quality assurance in all fields and mostly in technological development and software paradigm play a key role. In an ecosystem defined by the context of Cloud IoT, quality assurance as service becomes a real challenge. In this paper we highlight the ways the ecosystem engages in its development not only things, beings, energies, sensors or objects but also technologies. One such popular technology is cloud computing which, in the context of IoT, sees a spectacular development of its own cluster of services, a potential such service being QAaaS.

  3. Theory and Model for Martensitic Transformations

    DEFF Research Database (Denmark)

    Lindgård, Per-Anker; Mouritsen, Ole G.

    1986-01-01

    Martensitic transformations are shown to be driven by the interplay between two fluctuating strain components. No soft mode is needed, but a central peak occurs representing the dynamics of strain clusters. A two-dimensional magnetic-analog model with the martensitic-transition symmetry is constr......Martensitic transformations are shown to be driven by the interplay between two fluctuating strain components. No soft mode is needed, but a central peak occurs representing the dynamics of strain clusters. A two-dimensional magnetic-analog model with the martensitic-transition symmetry...... is constructed and analyzed by computer simulation and by a theory which accounts for correlation effects. Dramatic precursor effects at the first-order transition are demonstrated. The model is also of relevance for surface reconstruction transitions....

  4. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  5. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  6. Modeling nonhomogeneous Markov processes via time transformation.

    Science.gov (United States)

    Hubbard, R A; Inoue, L Y T; Fann, J R

    2008-09-01

    Longitudinal studies are a powerful tool for characterizing the course of chronic disease. These studies are usually carried out with subjects observed at periodic visits giving rise to panel data. Under this observation scheme the exact times of disease state transitions and sequence of disease states visited are unknown and Markov process models are often used to describe disease progression. Most applications of Markov process models rely on the assumption of time homogeneity, that is, that the transition rates are constant over time. This assumption is not satisfied when transition rates depend on time from the process origin. However, limited statistical tools are available for dealing with nonhomogeneity. We propose models in which the time scale of a nonhomogeneous Markov process is transformed to an operational time scale on which the process is homogeneous. We develop a method for jointly estimating the time transformation and the transition intensity matrix for the time transformed homogeneous process. We assess maximum likelihood estimation using the Fisher scoring algorithm via simulation studies and compare performance of our method to homogeneous and piecewise homogeneous models. We apply our methodology to a study of delirium progression in a cohort of stem cell transplantation recipients and show that our method identifies temporal trends in delirium incidence and recovery.

  7. A new General Lorentz Transformation model

    International Nuclear Information System (INIS)

    Novakovic, Branko; Novakovic, Alen; Novakovic, Dario

    2000-01-01

    A new general structure of Lorentz Transformations, in the form of General Lorentz Transformation model (GLT-model), has been derived. This structure includes both Lorentz-Einstein and Galilean Transformations as its particular (special) realizations. Since the free parameters of GLT-model have been identified in a gravitational field, GLT-model can be employed both in Special and General Relativity. Consequently, the possibilities of an unification of Einstein's Special and General Theories of Relativity, as well as an unification of electromagnetic and gravitational fields are opened. If GLT-model is correct then there exist four new observation phenomena (a length and time neutrality, and a length dilation and a time contraction). Besides, the well-known phenomena (a length contraction, and a time dilation) are also the constituents of GLT-model. It means that there is a symmetry in GLT-model, where the center of this symmetry is represented by a length and a time neutrality. A time and a length neutrality in a gravitational field can be realized if the velocity of a moving system is equal to the free fall velocity. A time and a length neutrality include an observation of a particle mass neutrality. A special consideration has been devoted to a correlation between GLT-model and a limitation on particle velocities in order to investigate the possibility of a travel time reduction. It is found out that an observation of a particle speed faster then c=299 792 458 m/s, is possible in a gravitational field, if certain conditions are fulfilled

  8. Transforming Systems Engineering through Model Centric Engineering

    Science.gov (United States)

    2017-08-08

    Contract No. HQ0034-13-D-0004 Report No. SERC-2017-TR-110 Date: August 8, 2017 Transforming Systems Engineering through Model-Centric... Engineering Technical Report SERC-2017-TR-110 Update: August 8, 2017 Principal Investigator: Mark Blackburn, Stevens Institute of Technology Co...Evangelista Sponsor: U.S. Army Armament Research, Development and Engineering Center (ARDEC), Office of the Deputy Assistant Secretary of Defense for

  9. Retail business model transformation in multichannel environment

    OpenAIRE

    Chapagain, B. (Bimala)

    2015-01-01

    Abstract With the advent of internet and e-commerce, the way of carrying out business and transactions has changed to a great extent. Consumers are continuously changing the way they do shopping and this has forced retail business to transform their traditional brick and mortar into adopting multi-channel business models. Retailing is one of the most dynamic and competitive areas of business organization. Effective marketin...

  10. Dilatation transformation in the string model

    Energy Technology Data Exchange (ETDEWEB)

    Chikashige, Y [Tokyo Univ. (Japan). Coll. of General Education; Hosoda, M; Saito, S

    1975-05-01

    Dilatation transformation is discussed in the string model. We show that it becomes meaningful in the infinite slope limit of Regge trajectories for the motion of a free string. It turns out to be equivalent to the high energy limit of the dual amplitudes, with the Regge slope kept finite, in the case of interacting strings. The scaling phenomenon is explained from this point of view.

  11. Madrasah Culture Based Transformational Leadership Model

    OpenAIRE

    Nur Khoiri

    2016-01-01

    Leadership is the ability to influence, direct behavior, and have a particular expertise in the field of the group who want to achieve the goals. A dynamic organization requires transformational leadership model. A school principal as a leader at school aims to actualize good learning leadership. Leadership learning focuses on learning which components include curriculum, teaching and learning process, assessment, teacher assessment and development, good service in learning, and developing a ...

  12. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  13. Development and energization of IOT based RF amplifier

    International Nuclear Information System (INIS)

    Mandal, A.; Som, S.; Raj, P.R.; Manna, S.K.; Ghosh, S.; Seth, S.; Thakurta, S.; Thakur, S.K.; Saha, S.; Panda, U.S.

    2013-01-01

    A 704 MHz IOT based CW RF amplifier has been developed in VECC. It can also be used with proper tuning to power cavity modules operating at 650 MHz in high energy high intensity proton linear accelerator proposed to be built for ADSS/SNS programme in India and Project-X at Fermilab, USA. This IOT based amplifier provides up to 60 kW continuous wave RF power at 700 MHz. It required various power supplies, LCW cooling and forced air cooling for its operation. The auxiliary power supplies like Grid, Filament and Ion-pump, are floated and mounted on an isolated frame, i.e., HV deck. The mains inputs are electrically isolated by means of isolation transformer. Also, a Programmable Logic Controller (PLC) based interlocks along with high voltage collector power supply has been designed and developed for the safe operation of the RF amplifier. This paper discusses about various developments and energization of the IOT based RF amplifier with high power dummy load. (author)

  14. Madrasah Culture Based Transformational Leadership Model

    Directory of Open Access Journals (Sweden)

    Nur Khoiri

    2016-10-01

    Full Text Available Leadership is the ability to influence, direct behavior, and have a particular expertise in the field of the group who want to achieve the goals. A dynamic organization requires transformational leadership model. A school principal as a leader at school aims to actualize good learning leadership. Leadership learning focuses on learning which components include curriculum, teaching and learning process, assessment, teacher assessment and development, good service in learning, and developing a learning community in schools based on organizational culture as value, assumption, belief evolved from the roots of member thought of the organization and believed by all members of the organization and implemented in everyday life that could give meaning Keywords: leadership, transformational leadership, headmaster, instructional leadership, organizational culture.

  15. Coaching Model + Clinical Playbook = Transformative Learning.

    Science.gov (United States)

    Fletcher, Katherine A; Meyer, Mary

    2016-01-01

    Health care employers demand that workers be skilled in clinical reasoning, able to work within complex interprofessional teams to provide safe, quality patient-centered care in a complex evolving system. To this end, there have been calls for radical transformation of nursing education including the development of a baccalaureate generalist nurse. Based on recommendations from the American Association of Colleges of Nursing, faculty concluded that clinical education must change moving beyond direct patient care by applying the concepts associated with designer, manager, and coordinator of care and being a member of a profession. To accomplish this, the faculty utilized a system of focused learning assignments (FLAs) that present transformative learning opportunities that expose students to "disorienting dilemmas," alternative perspectives, and repeated opportunities to reflect and challenge their own beliefs. The FLAs collected in a "Playbook" were scaffolded to build the student's competencies over the course of the clinical experience. The FLAs were centered on the 6 Quality and Safety Education for Nurses competencies, with 2 additional concepts of professionalism and systems-based practice. The FLAs were competency-based exercises that students performed when not assigned to direct patient care or had free clinical time. Each FLA had a lesson plan that allowed the student and faculty member to see the competency addressed by the lesson, resources, time on task, student instructions, guide for reflection, grading rubric, and recommendations for clinical instructor. The major advantages of the model included (a) consistent implementation of structured learning experiences by a diverse teaching staff using a coaching model of instruction; (b) more systematic approach to present learning activities that build upon each other; (c) increased time for faculty to interact with students providing direct patient care; (d) guaranteed capture of selected transformative

  16. Research on lightning stroke model and characteristics of electronic transformer

    Directory of Open Access Journals (Sweden)

    Li Mu

    2018-01-01

    Full Text Available In order to improve the reliability of power supply, a large number of electronic voltage and current transformers are used in digital substations. In this paper, the mathematical model of the electronic transformer is analyzed firstly, and its circuit model is given. According to the difference of working characteristics between voltage transformer and current transformer, the circuit model of voltage type electronic transformer and current type electronic transformer is given respectively. By analyzing their broadband transmission characteristics, the accuracy of the model is verified, and their lightning analysis models are obtained.

  17. Understanding IoT systems: a life cycle approach

    NARCIS (Netherlands)

    Rahman, Leila Fatmasari; Ozcelebi, Tanir; Lukkien, Johan

    2018-01-01

    Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The

  18. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  19. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  20. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  1. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  2. Comparing relational model transformation technologies: implementing Query/View/Transformation with Triple Graph Grammars

    DEFF Research Database (Denmark)

    Greenyer, Joel; Kindler, Ekkart

    2010-01-01

    and for model-based software engineering approaches in general. QVT (Query/View/Transformation) is the transformation technology recently proposed for this purpose by the OMG. TGGs (Triple Graph Grammars) are another transformation technology proposed in the mid-nineties, used for example in the FUJABA CASE...

  3. Laplace transform in tracer kinetic modeling

    Energy Technology Data Exchange (ETDEWEB)

    Hauser, Eliete B., E-mail: eliete@pucrs.br [Instituto do Cerebro (InsCer/FAMAT/PUC-RS), Porto Alegre, RS, (Brazil). Faculdade de Matematica

    2013-07-01

    The main objective this paper is to quantify the pharmacokinetic processes: absorption, distribution and elimination of radiopharmaceutical(tracer), using Laplace transform method. When the drug is administered intravenously absorption is complete and is available in the bloodstream to be distributed throughout the whole body in all tissues and fluids, and to be eliminated. Mathematical modeling seeks to describe the processes of distribution and elimination through compartments, where distinct pools of tracer (spatial location or chemical state) are assigned to different compartments. A compartment model is described by a system of differential equations, where each equation represents the sum of all the transfer rates to and from a specific compartment. In this work a two-tissue irreversible compartment model is used for description of tracer, [{sup 18}F]2-fluor-2deoxy-D-glucose. In order to determine the parameters of the model, it is necessary to have information about the tracer delivery in the form of an input function representing the time-course of tracer concentration in arterial blood or plasma. We estimate the arterial input function in two stages and apply the Levenberg-Marquardt Method to solve nonlinear regressions. The transport of FDG across de arterial blood is very fast in the first ten minutes and then decreases slowly. We use de Heaviside function to represent this situation and this is the main contribution of this study. We apply the Laplace transform and the analytical solution for two-tissue irreversible compartment model is obtained. The only approach is to determinate de arterial input function. (author)

  4. Towards Internet of Services - SDN-enabled IMS Architecture for IoT Integration

    DEFF Research Database (Denmark)

    Katov, Anton Nikolaev; Anggorojati, Bayu; Kyriazakos, Sofoklis

    2016-01-01

    The Internet of Things (IoT) paradigm is gaining tremendous popularity and the number of connected devices, or "things", is continuously growing, aiming to transform our everyday life. In order to address the real needs of the end user, the capabilities of the individual "things" have...

  5. VMTL: a language for end-user model transformation

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2016-01-01

    , these languages are largely ill-equipped for adoption by end-user modelers in areas such as requirements engineering, business process management, or enterprise architecture. We aim to introduce a model transformation language addressing the skills and requirements of end-user modelers. With this contribution, we......Model transformation is a key enabling technology of Model-Driven Engineering (MDE). Existing model transformation languages are shaped by and for MDE practitioners—a user group with needs and capabilities which are not necessarily characteristic of modelers in general. Consequently...... hope to broaden the application scope of model transformation and MDE technology in general. We discuss the profile of end-user modelers and propose a set of design guidelines for model transformation languages addressing them. We then introduce Visual Model Transformation Language (VMTL) following...

  6. Flood simulation and verification with IoT sensors

    Science.gov (United States)

    Chang, Che-Hao; Hsu, Chih-Tsung; Wu, Shiang-Jen; Huang, Sue-Wei

    2017-04-01

    2D flood dynamic simulation is a vivid tool to demonstrate the possible expose area that sustain impact of high rise of water level. Along with progress in high resolution digital terrain model, the simulation results are quite convinced yet not proved to be close to what is really happened. Due to the dynamic and uncertain essence, the expose area usually could not be well defined during a flood event. Recent development in IoT sensors bring a low power and long distance communication which help us to collect real time flood depths. With these time series of flood depths at different locations, we are capable of verifying the simulation results corresponding to the flood event. 16 flood gauges with IoT specification as well as two flood events in Annan district, Tainan city, Taiwan are examined in this study. During the event in 11, June, 2016, 12 flood gauges works well and 8 of them provide observation match to simulation.

  7. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  8. Unifying approach for model transformations in the MOF metamodeling architecture

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas

    2004-01-01

    In the Meta Object Facility (MOF) metamodeling architecture a number of model transformation scenarios can be identified. It could be expected that a metamodeling architecture will be accompanied by a transformation technology supporting the model transformation scenarios in a uniform way. Despite

  9. Test-driven verification/validation of model transformations

    Institute of Scientific and Technical Information of China (English)

    László LENGYEL; Hassan CHARAF

    2015-01-01

    Why is it important to verify/validate model transformations? The motivation is to improve the quality of the trans-formations, and therefore the quality of the generated software artifacts. Verified/validated model transformations make it possible to ensure certain properties of the generated software artifacts. In this way, verification/validation methods can guarantee different requirements stated by the actual domain against the generated/modified/optimized software products. For example, a verified/ validated model transformation can ensure the preservation of certain properties during the model-to-model transformation. This paper emphasizes the necessity of methods that make model transformation verified/validated, discusses the different scenarios of model transformation verification and validation, and introduces the principles of a novel test-driven method for verifying/ validating model transformations. We provide a solution that makes it possible to automatically generate test input models for model transformations. Furthermore, we collect and discuss the actual open issues in the field of verification/validation of model transformations.

  10. Data Compatibility to Enhance Sustainable Capabilities for Autonomous Analytics in IoT

    Directory of Open Access Journals (Sweden)

    Kaleem Razzaq Malik

    2017-05-01

    Full Text Available The collection of raw data is based on sensors embedded in devices or the environment for real-time data extraction. Nowadays, the Internet of Things (IoT environment is used to support autonomous data collection by reducing human involvement. It is hard to analyze such data, especially when working with the sensors in a real-time environment. On using data analytics in IoT with the help of RDF, many issues can be resolved. Resultant data will have a better chance of quality analytics by reforming data into the semantical annotation. Industrial correspondence through data will be improved by the induction of semantics at large due to efficient data capturing, whereas one popular medium of sensors’ data storage is Relational Database (RDB. This study provides a complete automated mechanism to transform from loosely structured data stored in RDB into RDF. These data are obtained from sensors in semantically annotated RDF stores. The given study comprises methodology for improving compatibility by introducing bidirectional transformation between classical DB and RDF data stores to enhance the sustainable capabilities of IoT systems for autonomous analytics. Two case studies, one on weather and another on heart-rate measurement collections through IoT sensors, are used to show the transformation process in operation.

  11. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  12. Metrics for analyzing the quality of model transformations

    NARCIS (Netherlands)

    Amstel, van M.F.; Lange, C.F.J.; Brand, van den M.G.J.; Falcone, G.; Guéhéneuc, Y.G.; Lange, C.F.J.; Porkoláb, Z.; Sahraoui, H.A.

    2008-01-01

    Model transformations become increasingly important with the emergence of model driven engineering of, amongst others, objectoriented software systems. It is therefore necessary to define and evaluate the quality of model transformations. The goal of our research is to make the quality of model

  13. A hybrid Scatter/Transform cloaking model

    Directory of Open Access Journals (Sweden)

    Gad Licht

    2015-01-01

    Full Text Available A new Scatter/Transform cloak is developed that combines the light bending of refraction characteristic of a Transform cloak with the scatter cancellation characteristic of a Scatter cloak. The hybrid cloak incorporates both Transform’s variable index of refraction with modified linear intrusions to maximize the Scatter cloak effect. Scatter/Transform improved the scattering cross-section of cloaking in a 2-dimensional space to 51.7% compared to only 39.6% or 45.1% respectively with either Scatter or Transform alone. Metamaterials developed with characteristics based on the new ST hybrid cloak will exhibit superior cloaking capabilities.

  14. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  15. Reliability Model of Power Transformer with ONAN Cooling

    OpenAIRE

    M. Sefidgaran; M. Mirzaie; A. Ebrahimzadeh

    2010-01-01

    Reliability of a power system is considerably influenced by its equipments. Power transformers are one of the most critical and expensive equipments of a power system and their proper functions are vital for the substations and utilities. Therefore, reliability model of power transformer is very important in the risk assessment of the engineering systems. This model shows the characteristics and functions of a transformer in the power system. In this paper the reliability model...

  16. Transforming Cobol Legacy Software to a Generic Imperative Model

    National Research Council Canada - National Science Library

    Moraes, DinaL

    1999-01-01

    .... This research develops a transformation system to convert COBOL code into a generic imperative model, recapturing the initial design and deciphering the requirements implemented by the legacy code...

  17. Development and verification of printed circuit board toroidal transformer model

    DEFF Research Database (Denmark)

    Pejtersen, Jens; Mønster, Jakob Døllner; Knott, Arnold

    2013-01-01

    An analytical model of an air core printed circuit board embedded toroidal transformer configuration is presented. The transformer has been developed for galvanic isolation of very high frequency switch-mode dc-dc power converter applications. The theoretical model is developed and verified...... by comparing calculated parameters with 3D finite element simulations and experimental measurement results. The developed transformer model shows good agreement with the simulated and measured results. The model can be used to predict the parameters of printed circuit board toroidal transformer configurations...

  18. Building adaptable and reusable XML applications with model transformations

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas

    2005-01-01

    We present an approach in which the semantics of an XML language is defined by means of a transformation from an XML document model (an XML schema) to an application specific model. The application specific model implements the intended behavior of documents written in the language. A transformation

  19. IOT for Agriculture: Food Quality and Safety

    Science.gov (United States)

    Witjaksono, Gunawan; Abdelkreem Saeed Rabih, Almur; Yahya, Noorhana bt; Alva, Sagir

    2018-03-01

    Food is the main energy source for the living beings; as such food quality and safety have been in the highest demand throughout the human history. Internet of things (IOT) is a technology with a vision to connect anything at anytime and anywhere. Utilizing IOT in the food supply chain (FSC) is believed to enhance the quality of life by tracing and tracking the food conditions and live-sharing the obtained data with the consumers or the FSC supervisors. Currently, full application of IOT in the FSC is still in the developing stage and there is a big gap for improvements. The purpose of this paper is to explore the possibility of applying IOT for agriculture to trace and track food quality and safety. Mobile application for food freshness investigation was successfully developed and the results showed that consumer mobile camera could be used to test the freshness of food. By applying the IOT technology this information could be shared with all the consumers and also the supervisors.

  20. Foundations for Streaming Model Transformations by Complex Event Processing.

    Science.gov (United States)

    Dávid, István; Ráth, István; Varró, Dániel

    2018-01-01

    Streaming model transformations represent a novel class of transformations to manipulate models whose elements are continuously produced or modified in high volume and with rapid rate of change. Executing streaming transformations requires efficient techniques to recognize activated transformation rules over a live model and a potentially infinite stream of events. In this paper, we propose foundations of streaming model transformations by innovatively integrating incremental model query, complex event processing (CEP) and reactive (event-driven) transformation techniques. Complex event processing allows to identify relevant patterns and sequences of events over an event stream. Our approach enables event streams to include model change events which are automatically and continuously populated by incremental model queries. Furthermore, a reactive rule engine carries out transformations on identified complex event patterns. We provide an integrated domain-specific language with precise semantics for capturing complex event patterns and streaming transformations together with an execution engine, all of which is now part of the Viatra reactive transformation framework. We demonstrate the feasibility of our approach with two case studies: one in an advanced model engineering workflow; and one in the context of on-the-fly gesture recognition.

  1. Choosing your IoT programming framework : architectural aspects

    NARCIS (Netherlands)

    Rahman, L.F.; Ozcelebi, T.; Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) is turning into practice. To drive innovations, it is crucial that programmers have means to develop IoT applications in the form of IoT programming frameworks. These are toolkits to develop applications according to a certain style or method and that let developers

  2. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  3. IOT Based Smart Public Transport System

    Directory of Open Access Journals (Sweden)

    Parag Gawade

    2017-07-01

    Full Text Available Internet of Things IoT joins the objects of this present reality to the virtual world and empowers at whatever time anyplace network for anything that has a turn ON and turn OFF switch. It constitutes to a world where physical things and humans and other living things and virtual information and situations collaborate with each other. Substantial measure of information is created as expansive number of gadgets is associated with the web. So this expansive measure of information must be controlled and changed over to helpful data keeping in mind the end goal to create productive frameworks. In this paper we concentrate on to a urban IoT framework that is utilized to construct Intelligent Transportation System ITS. IoT based intelligent transportation systems are intended to bolster the Smart City vision which intends to utilize the progressed and capable communication systems for the organization of the city and the residents.

  4. A discrete dislocation–transformation model for austenitic single crystals

    International Nuclear Information System (INIS)

    Shi, J; Turteltaub, S; Remmers, J J C; Van der Giessen, E

    2008-01-01

    A discrete model for analyzing the interaction between plastic flow and martensitic phase transformations is developed. The model is intended for simulating the microstructure evolution in a single crystal of austenite that transforms non-homogeneously into martensite. The plastic flow in the untransformed austenite is simulated using a plane-strain discrete dislocation model. The phase transformation is modeled via the nucleation and growth of discrete martensitic regions embedded in the austenitic single crystal. At each instant during loading, the coupled elasto-plasto-transformation problem is solved using the superposition of analytical solutions for the discrete dislocations and discrete transformation regions embedded in an infinite homogeneous medium and the numerical solution of a complementary problem used to enforce the actual boundary conditions and the heterogeneities in the medium. In order to describe the nucleation and growth of martensitic regions, a nucleation criterion and a kinetic law suitable for discrete regions are specified. The constitutive rules used in discrete dislocation simulations are supplemented with additional evolution rules to account for the phase transformation. To illustrate the basic features of the model, simulations of specimens under plane-strain uniaxial extension and contraction are analyzed. The simulations indicate that plastic flow reduces the average stress at which transformation begins, but it also reduces the transformation rate when compared with benchmark simulations without plasticity. Furthermore, due to local stress fluctuations caused by dislocations, martensitic systems can be activated even though transformation would not appear to be favorable based on the average stress. Conversely, the simulations indicate that the plastic hardening behavior is influenced by the reduction in the effective austenitic grain size due to the evolution of transformation. During cyclic simulations, the coupled plasticity-transformation

  5. Involuntary outpatient treatment (IOT) in Spain.

    Science.gov (United States)

    Hernández-Viadel, M; Cañete-Nicolás, C; Bellido-Rodriguez, C; Asensio-Pascual, P; Lera-Calatayud, G; Calabuig-Crespo, R; Leal-Cercós, C

    2015-01-01

    In recent decades there have been significant legislative changes in Spain. Society develops faster than laws, however, and new challenges have emerged. In 2004, the Spanish Association of Relatives of the Mentally Ill (FEAFES) proposed amending the existing legislation to allow for the implementation of involuntary outpatient treatment (IOT) for patients with severe mental illness. Currently, and after having made several attempts at change, there is no specific legislation governing the application of this measure. Although IOT may be implemented in local programmes, we consider legal regulation to be needed in this matter. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Klasifikace v oblasti IoT

    OpenAIRE

    Flégl, Jaroslav

    2017-01-01

    This bachelor thesis is focused on classification of IoT. The aim of this thesis is classifying and categorizing IoT using systematic literature review. Several steps are needed to fulfill this aim. First part of this thesis focuses on defining IoT. Top ten companies, which invest the most to IoT are introduced with their view on IoT. Then follows characterization of classification and categorization including differences between them. Second part focuses on describing SLR. First of all the p...

  7. A transformational leadership model for managing change

    African Journals Online (AJOL)

    kirstam

    between transformational leadership and diversification strategies.Using a qualitative .... House's (1997) concepts of charisma and vision formulation became the pillars of contemporary ... Laissez-faire is applied in cases where a leadership- .... in market demands and preferences in favour of the products or services of new.

  8. Industry 4.0, M2m, Iot&S - All Equal?

    Science.gov (United States)

    Dobrin, Carmen

    2014-11-01

    Similarity between Industry 4.0, M2M, IOT&S. Advantages and disadvantages obtained using this three important methods. Decreasing costs while components are getting smaller and smaller in a world with better networking. Influence of business management applications integrated in smart factory logistic. The most important impacts in merging virtual and real production world, with the improvement of best processes having the same goal: creating value by open innovation

  9. LEVERAGING THE MICROSERVICE ARCHITECTURE FOR NEXT-GENERATION IOT APPLICATIONS

    Directory of Open Access Journals (Sweden)

    Logica BANICA

    2017-12-01

    Full Text Available This paper aims to present two modern technologies that contribute to the development of the Internet-of-Things (IoT, namely the microservice architecture for application development, and their execution in the Fog/Edge computing layer, closer to the data sources, which leads to better performance. For this purpose, a four-level model is proposed and the functions of each are specified. It also introduces some platforms for building and deploying microservices launched on the Information Technology (IT market by major companies.

  10. Considerations Concerning Matrix Diagram Transformations Associated with Mathematical Model Study of a Three-phase Transformer

    Directory of Open Access Journals (Sweden)

    Mihaela Poienar

    2014-09-01

    Full Text Available The clock hour figure mathematical model of a threephase transformer can be expressed, in the most plain form, through a 3X3 square matrix, called code matrix. The lines position reflect the modification in the high voltage windings terminal and the columns position reflect the modification in the low voltage winding terminal. The main changes on the transformer winding terminal are: the circular permutation of connection between windings; terminal supply reversal; reverse direction for the phase winding wrapping; reversal the beginning with the end for a phase winding; the connection conversion from N in Z between phase winding or inverse. The analytical form of these changes actually affect the configuration of the mathematical model expressed through a transformations diagram proposed and analyzed in two ways: bipolar version and unipolar version (fanwise. In the end of the paper are presented about the practical exploitation of the transformations diagram.

  11. Optimization of Wireless Node Discovery in an IoT Network

    DEFF Research Database (Denmark)

    Vasilev, Vladislav; Iliev, Georgi; Poulkov, Vladimir

    2015-01-01

    in the decrease in discovery costs. The proposed model covers well the dynamics of the complex sensor network, such as the one that maybe employed in an Internet of Things (IoT) scenario, where nodes need to act autonomously during the communication process. We apply the Lotka-Voltera model to increase...

  12. The Drivers of Success in Business Model Transformation

    Directory of Open Access Journals (Sweden)

    Nenad Savič

    2016-01-01

    Full Text Available Existing empirical literature on business models is still inconclusive about the key drivers of successful business model transformation. The paper explores this issue by using a single longitudinal case study design in combination with grounded theory approach on a medium-sized, high-tech and globally oriented company. Based on on-site visits, interviews and secondary documentation data analysis, the study identifies six generic drivers of successful business model transformation: transformational leadership, discovery driven decision-making, industry improvement – customer specific orientation, content-oriented communication, self-initiative collaborators, and phased separation strategy. The new drivers supplement our existing knowledge on how successful transformation takes place and add to existing drivers, while extensive discussion of their implications may help the managers to execute business transformations more effectively.

  13. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  14. Modelling of stresses generated in steels by phase transformations

    International Nuclear Information System (INIS)

    Dudek, K.; Glowacki, M.; Pietrzyk, M.

    1999-01-01

    Numerical model describing stresses arising during phase transformations in steels products is presented. The full model consists of three components. The first component uses finite element solution of Fourier equation for an evaluation of the temperature field inside the sample. The second component predicts kinetics of phase transformation occurring during cooling of steel products. Coupling of these two components allows prediction of structure and properties of final products at room temperature. The third component uses elastic-plastic finite element model for prediction of stresses caused by non-uniform temperatures and by changes of volume during transformations. Typical results of simulations performed for cooling of rails after hot rolling are presented. (author)

  15. MISTRAL : A Language for Model Transformations in the MOF Meta-modeling Architecture

    NARCIS (Netherlands)

    Kurtev, Ivan; van den Berg, Klaas; Aßmann, Uwe; Aksit, Mehmet; Rensink, Arend

    2005-01-01

    n the Meta Object Facility (MOF) meta-modeling architecture a number of model transformation scenarios can be identified. It could be expected that a meta-modeling architecture will be accompanied by a transformation technology supporting the model transformation scenarios in a uniform way. Despite

  16. Code Generation by Model Transformation : A Case Study in Transformation Modularity

    NARCIS (Netherlands)

    Hemel, Z.; Kats, L.C.L.; Visser, E.

    2008-01-01

    Preprint of paper published in: Theory and Practice of Model Transformations (ICMT 2008), Lecture Notes in Computer Science 5063; doi:10.1007/978-3-540-69927-9_13 The realization of model-driven software development requires effective techniques for implementing code generators for domain-specific

  17. Performance Analysis of Dual-Polarized Massive MIMO System with Human-Care IoT Devices for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jun-Ki Hong

    2018-01-01

    Full Text Available The performance analysis of the dual-polarized massive multiple-input multiple-output (MIMO system with Internet of things (IoT devices is studied when outdoor human-care IoT devices are connected to a cellular network via a dual-polarized massive MIMO system. The research background of the performance analysis of dual-polarized massive MIMO system with IoT devices is that recently the data usage of outdoor human-care IoT devices has increased. Therefore, the outdoor human-care IoT devices are necessary to connect with 5G cellular networks which can expect 1000 times higher performance compared with 4G cellular networks. Moreover, in order to guarantee the safety of the patient for emergency cases, a human-care Iot device must be connected to cellular networks which offer more stable communication for outdoors compared to short-range communication technologies such as Wi-Fi, Zigbee, and Bluetooth. To analyze the performance of the dual-polarized massive MIMO system for human-care IoT devices, a dual-polarized MIMO spatial channel model (SCM is proposed which considers depolarization effect between the dual-polarized transmit-antennas and the receive-antennas. The simulation results show that the performance of the dual-polarized massive MIMO system is improved about 16% to 92% for 20 to 150 IoT devices compared to conventional single-polarized massive MIMO system for identical size of the transmit array.

  18. Design Transformations for Rule-based Procedural Modeling

    KAUST Repository

    Lienhard, Stefan; Lau, Cheryl; Mü ller, Pascal; Wonka, Peter; Pauly, Mark

    2017-01-01

    We introduce design transformations for rule-based procedural models, e.g., for buildings and plants. Given two or more procedural designs, each specified by a grammar, a design transformation combines elements of the existing designs to generate new designs. We introduce two technical components to enable design transformations. First, we extend the concept of discrete rule switching to rule merging, leading to a very large shape space for combining procedural models. Second, we propose an algorithm to jointly derive two or more grammars, called grammar co-derivation. We demonstrate two applications of our work: we show that our framework leads to a larger variety of models than previous work, and we show fine-grained transformation sequences between two procedural models.

  19. Design Transformations for Rule-based Procedural Modeling

    KAUST Repository

    Lienhard, Stefan

    2017-05-24

    We introduce design transformations for rule-based procedural models, e.g., for buildings and plants. Given two or more procedural designs, each specified by a grammar, a design transformation combines elements of the existing designs to generate new designs. We introduce two technical components to enable design transformations. First, we extend the concept of discrete rule switching to rule merging, leading to a very large shape space for combining procedural models. Second, we propose an algorithm to jointly derive two or more grammars, called grammar co-derivation. We demonstrate two applications of our work: we show that our framework leads to a larger variety of models than previous work, and we show fine-grained transformation sequences between two procedural models.

  20. The comparison study among several data transformations in autoregressive modeling

    Science.gov (United States)

    Setiyowati, Susi; Waluyo, Ramdhani Try

    2015-12-01

    In finance, the adjusted close of stocks are used to observe the performance of a company. The extreme prices, which may increase or decrease drastically, are often become particular concerned since it can impact to bankruptcy. As preventing action, the investors have to observe the future (forecasting) stock prices comprehensively. For that purpose, time series analysis could be one of statistical methods that can be implemented, for both stationary and non-stationary processes. Since the variability process of stocks prices tend to large and also most of time the extreme values are always exist, then it is necessary to do data transformation so that the time series models, i.e. autoregressive model, could be applied appropriately. One of popular data transformation in finance is return model, in addition to ratio of logarithm and some others Tukey ladder transformation. In this paper these transformations are applied to AR stationary models and non-stationary ARCH and GARCH models through some simulations with varying parameters. As results, this work present the suggestion table that shows transformations behavior for some condition of parameters and models. It is confirmed that the better transformation is obtained, depends on type of data distributions. In other hands, the parameter conditions term give significant influence either.

  1. E3value to BPMN model transformation

    NARCIS (Netherlands)

    Fatemi, Hassan; van Sinderen, Marten J.; Wieringa, Roelf J.; Wieringa, P.A.; Camarinha-Matos, Luis M.; Pereira Klen, Alexandra; Afsarmanesh, Hamidesh

    2011-01-01

    Business value and coordination process perspectives need to be taken into consideration while modeling business collaborations. The need for these two models stems from the importance of separating the how from the what concerns. A business value model shows what is offered by whom to whom while a

  2. Modelling of magnetostriction of transformer magnetic core for vibration analysis

    Science.gov (United States)

    Marks, Janis; Vitolina, Sandra

    2017-12-01

    Magnetostriction is a phenomenon occurring in transformer core in normal operation mode. Yet in time, it can cause the delamination of magnetic core resulting in higher level of vibrations that are measured on the surface of transformer tank during diagnostic tests. The aim of this paper is to create a model for evaluating elastic deformations in magnetic core that can be used for power transformers with intensive vibrations in order to eliminate magnetostriction as a their cause. Description of the developed model in Matlab and COMSOL software is provided including restrictions concerning geometry and properties of materials, and the results of performed research on magnetic core anisotropy are provided. As a case study modelling of magnetostriction for 5-legged 200 MVA power transformer with the rated voltage of 13.8/137kV is conducted, based on which comparative analysis of vibration levels and elastic deformations is performed.

  3. Modelling of magnetostriction of transformer magnetic core for vibration analysis

    Directory of Open Access Journals (Sweden)

    Marks Janis

    2017-12-01

    Full Text Available Magnetostriction is a phenomenon occurring in transformer core in normal operation mode. Yet in time, it can cause the delamination of magnetic core resulting in higher level of vibrations that are measured on the surface of transformer tank during diagnostic tests. The aim of this paper is to create a model for evaluating elastic deformations in magnetic core that can be used for power transformers with intensive vibrations in order to eliminate magnetostriction as a their cause. Description of the developed model in Matlab and COMSOL software is provided including restrictions concerning geometry and properties of materials, and the results of performed research on magnetic core anisotropy are provided. As a case study modelling of magnetostriction for 5-legged 200 MVA power transformer with the rated voltage of 13.8/137kV is conducted, based on which comparative analysis of vibration levels and elastic deformations is performed.

  4. Transformation

    DEFF Research Database (Denmark)

    Bock, Lars Nicolai

    2011-01-01

    Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi.......Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi....

  5. TRANSFORMATION

    Energy Technology Data Exchange (ETDEWEB)

    LACKS,S.A.

    2003-10-09

    Transformation, which alters the genetic makeup of an individual, is a concept that intrigues the human imagination. In Streptococcus pneumoniae such transformation was first demonstrated. Perhaps our fascination with genetics derived from our ancestors observing their own progeny, with its retention and assortment of parental traits, but such interest must have been accelerated after the dawn of agriculture. It was in pea plants that Gregor Mendel in the late 1800s examined inherited traits and found them to be determined by physical elements, or genes, passed from parents to progeny. In our day, the material basis of these genetic determinants was revealed to be DNA by the lowly bacteria, in particular, the pneumococcus. For this species, transformation by free DNA is a sexual process that enables cells to sport new combinations of genes and traits. Genetic transformation of the type found in S. pneumoniae occurs naturally in many species of bacteria (70), but, initially only a few other transformable species were found, namely, Haemophilus influenzae, Neisseria meningitides, Neisseria gonorrheae, and Bacillus subtilis (96). Natural transformation, which requires a set of genes evolved for the purpose, contrasts with artificial transformation, which is accomplished by shocking cells either electrically, as in electroporation, or by ionic and temperature shifts. Although such artificial treatments can introduce very small amounts of DNA into virtually any type of cell, the amounts introduced by natural transformation are a million-fold greater, and S. pneumoniae can take up as much as 10% of its cellular DNA content (40).

  6. Inventory transparency for agricultural produce through IOT

    Science.gov (United States)

    Srinivasan, S. P.; Sorna Shanthi, D.; Anand, Aashish V.

    2017-06-01

    Re-structuring the practices of traditional inventory management is becoming more essential to optimize the supply chain transparency and accuracy of agricultural produce. A flexible and transparent inventory management system is becoming the need of any agricultural commodity. It was noticed that the major setback for the farmers who are the suppliers of the farm produce is due to poor supply chain integration. The recent advent technologies and IT explosion can bring up a greater impact in the process of storing, tracking, distributing and monitoring perishable agriculture produce of day to day life. The primary focus of this paper is to integrate IoT into inventory management and other inbound logistics management of agriculture produce. The unique features of agricultural produce like a prediction of supply, demand, the location of warehouses, distribution and tracking of inventory can be integrated through IoT. This paper proposes a conceptual framework for inventory management transparency involved in the supply chain of agriculture produce.

  7. IoT E-business applications

    OpenAIRE

    Radu BUCEA-MANEA-TONIS; Rocsana B. Manea Tonis

    2017-01-01

    “Internet of things” (IoT) will develop soon an ecosystem of internet-connected things, that facilitate the mobile commerce experiences and the client need to be informed all the time. It will be associated with a feeling of freedom and capacity of doing very easy what was considered difficult in the past. Nevertheless, these opportunities will not be capitalized upon without overcoming a series of obstacles, including addressing consumer privacy concerns, the long replacement cycles of du...

  8. IOT Based Smart Public Transport System

    OpenAIRE

    Parag Gawade; Meeankshi A

    2017-01-01

    Internet of Things IoT joins the objects of this present reality to the virtual world and empowers at whatever time anyplace network for anything that has a turn ON and turn OFF switch. It constitutes to a world where physical things and humans and other living things and virtual information and situations collaborate with each other. Substantial measure of information is created as expansive number of gadgets is associated with the web. So this expansive measure of information must be contro...

  9. Automatic Integration of IoT Devices

    OpenAIRE

    Pêgo, Pedro Ruben Januário

    2016-01-01

    During the last years a new concept has gained prominence in the technology world. With an increasingly dominant role in our days, Internet of Things (IoT) is a technological revolution that is changing our lives. The imagination is the limit for the new devices that may appear in the market. This phenomenon is derived from both, the technological evolution and the growing acceptance of this type of products in our social life. Faced with a fast growth, an increasing diversity ...

  10. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  11. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  12. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  13. A balance principle approach for modeling phase transformation kinetics

    International Nuclear Information System (INIS)

    Lusk, M.; Krauss, G.; Jou, H.J.

    1995-01-01

    A balance principle is offered to model volume fraction kinetics of phase transformation kinetics at a continuum level. This microbalance provides a differential equation for transformation kinetics which is coupled to the differential equations governing the mechanical and thermal aspects of the process. Application here is restricted to diffusive transformations for the sake of clarity, although the principle is discussed for martensitic phase transitions as well. Avrami-type kinetics are shown to result from a special class of energy functions. An illustrative example using a 0.5% C Chromium steel demonstrates how TTT and CCT curves can be generated using a particularly simple effective energy function. (orig.)

  14. TIME SERIES ANALYSIS USING A UNIQUE MODEL OF TRANSFORMATION

    Directory of Open Access Journals (Sweden)

    Goran Klepac

    2007-12-01

    Full Text Available REFII1 model is an authorial mathematical model for time series data mining. The main purpose of that model is to automate time series analysis, through a unique transformation model of time series. An advantage of this approach of time series analysis is the linkage of different methods for time series analysis, linking traditional data mining tools in time series, and constructing new algorithms for analyzing time series. It is worth mentioning that REFII model is not a closed system, which means that we have a finite set of methods. At first, this is a model for transformation of values of time series, which prepares data used by different sets of methods based on the same model of transformation in a domain of problem space. REFII model gives a new approach in time series analysis based on a unique model of transformation, which is a base for all kind of time series analysis. The advantage of REFII model is its possible application in many different areas such as finance, medicine, voice recognition, face recognition and text mining.

  15. IoT interoperability : a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  16. Ranking System for IoT Industry Platform

    OpenAIRE

    Mukherjee, Somshree

    2016-01-01

    The Internet of Things (IoT) has seen a huge growth spurt in the last few years which has resulted in the need for more standardised IoT technology. Because of this, numerous IoT platforms have sprung up that offer a variety of features and use different technologies which may not necessarily be compliant with each other or with other technologies. Companies that wish to enter theIoT market are in constant need to find the most suitable IoT platform for their business and have a certain set o...

  17. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  18. TRANSFORMER

    Science.gov (United States)

    Baker, W.R.

    1959-08-25

    Transformers of a type adapted for use with extreme high power vacuum tubes where current requirements may be of the order of 2,000 to 200,000 amperes are described. The transformer casing has the form of a re-entrant section being extended through an opening in one end of the cylinder to form a coaxial terminal arrangement. A toroidal multi-turn primary winding is disposed within the casing in coaxial relationship therein. In a second embodiment, means are provided for forming the casing as a multi-turn secondary. The transformer is characterized by minimized resistance heating, minimized external magnetic flux, and an economical construction.

  19. Development of a kinetic model for bainitic isothermal transformation in transformation-induced plasticity steels

    International Nuclear Information System (INIS)

    Li, S.; Zhu, R.; Karaman, I.; Arróyave, R.

    2013-01-01

    In this work, we modify existing models to simulate the kinetics of bainitic transformation during the bainitic isothermal transformation (BIT) stage of a typical two-stage heat treatment – BIT is preceded by an intercritical annealing treatment – for TRIP steels. This effort is motivated by experiments performed in a conventional TRIP steel alloy (Fe–0.32C–1.42Mn–1.56Si) that suggest that thermodynamics alone are not sufficient to predict the amount of retained austenite after BIT. The model implemented in this work considers the non-homogeneous distribution of carbon – resulting from finite carbon diffusion rates – within the retained austenite during bainitic transformation. This non-homogeneous distribution is responsible for average austenite carbon enrichments beyond the so-called T 0 line, the temperature at which the chemical driving force for the bainitic transformation is exhausted. In order to attain good agreement with experiments, the existence of carbon-rich austenite films adjacent to bainitic ferrite plates is posited. The presence of this austenite film is motivated by earlier experimental work published by other groups in the past decade. The model is compared with experimental results and good qualitative agreement is found

  20. Transforming community access to space science models

    Science.gov (United States)

    MacNeice, Peter; Hesse, Michael; Kuznetsova, Maria; Maddox, Marlo; Rastaetter, Lutz; Berrios, David; Pulkkinen, Antti

    2012-04-01

    Researching and forecasting the ever changing space environment (often referred to as space weather) and its influence on humans and their activities are model-intensive disciplines. This is true because the physical processes involved are complex, but, in contrast to terrestrial weather, the supporting observations are typically sparse. Models play a vital role in establishing a physically meaningful context for interpreting limited observations, testing theory, and producing both nowcasts and forecasts. For example, with accurate forecasting of hazardous space weather conditions, spacecraft operators can place sensitive systems in safe modes, and power utilities can protect critical network components from damage caused by large currents induced in transmission lines by geomagnetic storms.

  1. Models for thermal and mechanical monitoring of power transformers

    Energy Technology Data Exchange (ETDEWEB)

    Vilaithong, Rummiya

    2011-07-01

    At present, for economic reasons, there is an increasing emphasis on keeping transformers in service for longer than in the past. A condition-based maintenance using an online monitoring and diagnostic system is one option to ensure reliability of the transformer operation. The key parameters for effectively monitoring equipment can be selected by failure statistics and estimated failure consequences. In this work, two key aspects of transformer condition monitoring are addressed in depth: thermal behaviour and behaviour of on-load tap changers. In the first part of the work, transformer thermal behaviour is studied, focussing on top-oil temperatures. Through online comparison of a measured value of the top-oil temperature and its calculated value, some rapidly developing failures in power transformers such as malfunction of the cooling unit may be detected. Predictions of top-oil temperature can be obtained by means of a mathematical model. Long-term investigations on some dynamic top-oil temperature models are presented for three different types of transformer units. The last-state top-oil temperature, load current, ambient temperature and the operating state of pumps and fans are applied as inputs of the top-oil temperature models. In the fundamental physical models presented, some constant parameters are required and can be estimated using a least-squares optimization technique. Multilayer Feed-forward and Recurrent neural network models are also proposed and investigated. The neural network models are trained with three different Backpropagation training algorithms: Levenberg-Marquardt, Scaled Conjugate Gradient and Automated Bayesian Regularization. The effect of varying operating conditions of the cooling units and the non-steady-state behaviour of loading conditions, as well as ambient temperature are noted. Results show sophisticated temperature prediction is possible using the neural network models that is generally more accurate than with the physical

  2. Modelling Nitrogen Transformation in Horizontal Subsurface Flow ...

    African Journals Online (AJOL)

    A mathematical model was developed to permit dynamic simulation of nitrogen interaction in a pilot horizontal subsurface flow constructed wetland receiving effluents from primary facultative pond. The system was planted with Phragmites mauritianus, which was provided with root zone depth of 75 cm. The root zone was ...

  3. Design and development of power supplies for high power IOT based RF amplifier

    International Nuclear Information System (INIS)

    Kumar, Yashwant; Kumari, S.; Ghosh, M.K.; Bera, A.; Sadhukhan, A.; Pal, S.S.; Khare, V.K.; Tiwari, T.P.; Thakur, S.K.; Saha, S.

    2013-01-01

    Design, development, circuit topology, function of system components and key system specifications of different power supplies for biasing electrodes of Thales Inductive Output Tube (IOT) based high power RF amplifier are presented in this paper. A high voltage power supply (-30 kV, 3.2A dc) with fast (∼microsecond) crowbar protection circuit is designed, developed and commissioned at VECC for testing the complete setup. Other power supplies for biasing grid electrode (300V, 0.5A dc) and Ion Pump (3 kV, 0.1mA dc) of IOT are also designed, developed and tested with actual load. A HV Deck (60kV Isolation) is specially designed in house to place these power supplies which are floating at 30 kV. All these power supplies are powered by an Isolation Transformer (5 kVA, 60 kV isolation) designed and developed in VECC. (author)

  4. The Unfolding of Value Sources During Online Business Model Transformation

    Directory of Open Access Journals (Sweden)

    Nadja Hoßbach

    2016-12-01

    Full Text Available Purpose: In the magazine publishing industry, viable online business models are still rare to absent. To prepare for the ‘digital future’ and safeguard their long-term survival, many publishers are currently in the process of transforming their online business model. Against this backdrop, this study aims to develop a deeper understanding of (1 how the different building blocks of an online business model are transformed over time and (2 how sources of value creation unfold during this transformation process. Methodology: To answer our research question, we conducted a longitudinal case study with a leading German business magazine publisher (called BIZ. Data was triangulated from multiple sources including interviews, internal documents, and direct observations. Findings: Based on our case study, we nd that BIZ used the transformation process to differentiate its online business model from its traditional print business model along several dimensions, and that BIZ’s online business model changed from an efficiency- to a complementarity- to a novelty-based model during this process. Research implications: Our findings suggest that different business model transformation phases relate to different value sources, questioning the appropriateness of value source-based approaches for classifying business models. Practical implications: The results of our case study highlight the need for online-offline business model differentiation and point to the important distinction between service and product differentiation. Originality: Our study contributes to the business model literature by applying a dynamic and holistic perspective on the link between online business model changes and unfolding value sources.

  5. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  6. Logarithmic transformed statistical models in calibration

    International Nuclear Information System (INIS)

    Zeis, C.D.

    1975-01-01

    A general type of statistical model used for calibration of instruments having the property that the standard deviations of the observed values increase as a function of the mean value is described. The application to the Helix Counter at the Rocky Flats Plant is primarily from a theoretical point of view. The Helix Counter measures the amount of plutonium in certain types of chemicals. The method described can be used also for other calibrations. (U.S.)

  7. Modelling and Simulation of the Diode Split Transformer

    DEFF Research Database (Denmark)

    Østergaard, Leo

    a significant influence on the picture quality. The most critical component is undoubtedly the diode split transformer (DST). Therefore, if developing a simulation model of the DST is possible, a significant step has been taken in the attempt to model the entire horizontal deflection circuit and to obtain...

  8. An efficient visual saliency detection model based on Ripplet transform

    Indian Academy of Sciences (India)

    A Diana Andrushia

    human visual attention models is still not well investigated. ... Ripplet transform; visual saliency model; Receiver Operating Characteristics (ROC); .... proposed method has the same resolution as that of an input ... regions are obtained, which are independent of their sizes. ..... impact than those far away from the attention.

  9. How to transform local energy systems towards bioenergy? Three strategy models for transformation

    International Nuclear Information System (INIS)

    Martensson, Kjell; Westerberg, Karin

    2007-01-01

    During the last decades, the actors within the energy sector in Sweden-as well as in many other countries-have faced increasing demands to transform the energy system towards ecological sustainability. In Sweden these demands have led to numerous policies and economic incentives promoting the use of renewables (which in the Swedish discourse often also includes a connotation of 'indigenous energy sources'), and especially the promotion of bioenergy. To be successful, however, these policies and economic incentives need to be interpreted and adapted to different local contexts and translated into actual transformation processes. In Sweden the municipal authorities have played an important role as interpreters of such institutional frameworks and implementers of local transformation processes. In this article, we re-construct three transformation processes implemented by local municipal authorities, chiselling out the different strategy models developed through them. We argue that such re-constructions help to make visible the different and complex interactions between national institutional frameworks and local contexts as well as interactions within such local contexts. We hope that the strategy models presented can contribute to the understanding of the different kinds of local actions that can foster a further implementation of bioenergy into the energy system

  10. Tail modeling in a stretched magnetosphere 1. Methods and transformations

    International Nuclear Information System (INIS)

    Stern, D.P.

    1987-01-01

    A new method is developed for representing the magnetospheric field B as a distorted dipole field. Because delxB = 0 must be maintained,such a distortion may be viewed as a transformation of the vector potential A. The simplest form is a one-dimensional ''stretch transformation'' along the x axis, a generalization of a method introduced by Voigt. The transformation is concisely represented by the ''stretch function'' f(x), which is also a convenient tool for representing features of the substorm cycle. Onedimensional stretch transformations are extended to spherical, cylindrical, and parabolic coordinates and then to arbitrary coordinates. It is next shown that distortion transformations can be viewed as mappings of field lines from one pattern to another: Euler potentials are used in the derivation, but the final result only requires knowledge of the field and not of the potentials. General transformations in Cartesian and arbitrary coordinates are then derived,and applications to field modeling, field line motion, MHD modeling, and incompressible fluid dynamics are considered. copyrightAmerican Geophysical Union 1987

  11. Transformative leadership: an ethical stewardship model for healthcare.

    Science.gov (United States)

    Caldwell, Cam; Voelker, Carolyn; Dixon, Rolf D; LeJeune, Adena

    2008-01-01

    The need for effective leadership is a compelling priority for those who would choose to govern in public, private, and nonprofit organizations, and applies as much to the healthcare profession as it does to other sectors of the economy (Moody, Horton-Deutsch, & Pesut, 2007). Transformative Leadership, an approach to leadership and governance that incorporates the best characteristics of six other highly respected leadership models, is an integrative theory of ethical stewardship that can help healthcare professionals to more effectively achieve organizational efficiencies, build stakeholder commitment and trust, and create valuable synergies to transform and enrich today's healthcare systems (cf. Caldwell, LeJeune, & Dixon, 2007). The purpose of this article is to introduce the concept of Transformative Leadership and to explain how this model applies within a healthcare context. We define Transformative Leadership and identify its relationship to Transformational, Charismatic, Level 5, Principle-Centered, Servant, and Covenantal Leadership--providing examples of each of these elements of Transformative Leadership within a healthcare leadership context. We conclude by identifying contributions of this article to the healthcare leadership literature.

  12. Comprehensive Power Losses Model for Electronic Power Transformer

    DEFF Research Database (Denmark)

    Yue, Quanyou; Li, Canbing; Cao, Yijia

    2018-01-01

    and considering the impact of the non-unity power factor and the three-phase unbalanced current, the overall power losses in the distribution network when using the EPT to replace the conventional transformer is analyzed, and the conditions in which the application of the EPT can cause less power losses...... reduced power losses in the distribution network require a comprehensive consideration when comparing the power losses of theEPT and conventional transformer. In this paper, a comprehensive power losses analysis model for the EPT in distribution networks is proposed. By analyzing the EPT self-losses......The electronic power transformer (EPT) has highe rpower losses than the conventional transformer. However, the EPT can correct the power factor, compensate the unbalanced current and reduce the line power losses in the distribution network.Therefore, the higher losses of the EPT and the consequent...

  13. Comprehensive Power Losses Model for Electronic Power Transformer

    DEFF Research Database (Denmark)

    Yue, Quanyou; Li, Canbing; Cao, Yijia

    2018-01-01

    The electronic power transformer (EPT) has highe rpower losses than the conventional transformer. However, the EPT can correct the power factor, compensate the unbalanced current and reduce the line power losses in the distribution network.Therefore, the higher losses of the EPT and the consequent...... reduced power losses in the distribution network require a comprehensive consideration when comparing the power losses of theEPT and conventional transformer. In this paper, a comprehensive power losses analysis model for the EPT in distribution networks is proposed. By analyzing the EPT self......-losses and considering the impact of the non-unity power factor and the three-phase unbalanced current, the overall power losses in the distribution network when using the EPT to replace the conventional transformer is analyzed, and the conditions in which the application of the EPT can cause less power losses...

  14. Desain dan Aplikasi Internet of Thing (IoT untuk Smart Grid Power Sistem

    Directory of Open Access Journals (Sweden)

    Nur Asyik Hidayatullah

    2017-04-01

    Full Text Available Jaringan listrik cerdas atau yang lebih dikenal dengan istilah Smart Grid merupakan salah satu bentuk transformasi dan reformasi teknologi di industri ketenagalistrikan. Smart Grid adalah jaringan energi listrik modern yang secara cerdas dapat mengintegrasikan jaringan listrik dengan perangkat komunikasi yang mendukung pembangkit dan jaringan transmisi distribusi listrik menjadi lebih atraktif, komunikatif dan berkualitas. Smart Grid juga mampu untuk mencegah dan mengisolasi gangguan dengan cepat serta menyajikan informasi data kelistrikan secara real time. Sedangkan Internet of Thing (IoT adalah sebuah metode yang bertujuan untuk memaksimalkan manfaat dari konektivitas internet untuk melakukan transfer dan pemrosesan data-data atau informasi melalui sebuah jaringan internet secara nirkabel, virtual dan otonom. IoT secara teknis dapat mendorong dalam mengembangkan jaringan smart grid dengan mengintegrasikan insfrastruktur utama power sistem mulai dari sisi pembangkit sampai dengan konsumen akhir melalui wireless sensor network secara otomatis. Dengan pemanfaatan IoT diharapkan dapat meningkatkan keandalan sistem informasi dari jaringan listrik serta meningkatkan efisiensi terhadap insfrastruktur listrik yang sudah tersedia. Artikel ini akan menyajikan konsep teknologi smart grid, internet of thing dan membahas model desain dan aplikasi IoT di jaringan smart grid.

  15. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  16. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology

    Directory of Open Access Journals (Sweden)

    K. C. Okafor

    2017-01-01

    Full Text Available With the Internet of Everything (IoE paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. Besides, the scalability requirements found in the current IoT data processing (in the cloud can hardly be used for applications such as assisted living systems, Big Data analytic solutions, and smart embedded applications. This paper proposes an extended cloud IoT model that optimizes bandwidth while allowing edge devices (Internet-connected objects/devices to smartly process data without relying on a cloud network. Its integration with a massively scaled spine-leaf (SL network topology is highlighted. This is contrasted with a legacy multitier layered architecture housing network services and routing policies. The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application without impacting QoS performance. Consequently, a spine-leaf Fog computing network (SL-FCN is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. This approach is cost-effective as it maximizes bandwidth while maintaining redundancy and resiliency against failures in mission critical applications.

  17. Transfer Function Identification Using Orthogonal Fourier Transform Modeling Functions

    Science.gov (United States)

    Morelli, Eugene A.

    2013-01-01

    A method for transfer function identification, including both model structure determination and parameter estimation, was developed and demonstrated. The approach uses orthogonal modeling functions generated from frequency domain data obtained by Fourier transformation of time series data. The method was applied to simulation data to identify continuous-time transfer function models and unsteady aerodynamic models. Model fit error, estimated model parameters, and the associated uncertainties were used to show the effectiveness of the method for identifying accurate transfer function models from noisy data.

  18. An enhanced Brinson model with modified kinetics for martensite transformation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young-Jin; Lee, Jung Ju [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Jeong, Ju-Won [Korea Aerospace Research Institute, Daejeon (Korea, Republic of); Lim, Jae Hyuk [Chonbuk National University, Jeonju (Korea, Republic of)

    2017-03-15

    We propose an enhanced Brinson model with modified kinetics for martensite transformation. Two additional material constants are considered to follow the stress-temperature diagram above austenite start temperature (As) along with treatment to keep the continuity of the martensite volume fraction and the path dependency of the phase transformation. To demonstrate the performance of the proposed model, we implement this algorithm into ABAQUS user subroutine, then conduct several numerical simulations and compare their results with SMA wire experiments as well as those of three-dimensional SMA constitutive models. From the results, it turns out that the proposed model is as accurate as the three-dimensional models and shows better accuracy over original Brinson model in terms of recovery stress.

  19. Modeling mechanical effects on promotion and retardation of martensitic transformation

    Energy Technology Data Exchange (ETDEWEB)

    Maalekian, Mehran, E-mail: mehran.maalekian@ubc.ca [Department of Materials Engineering, University of British Columbia, 309-6350 Stores Road, Vancouver, B.C. V61Z4 (Canada); Kozeschnik, Ernst [Christian Doppler Laboratory for ' Early Stages of Precipitation' , Institute of Materials Science and Technology, Vienna University of Technology (Austria)

    2011-01-25

    Research highlights: {yields} Compressive elastic stresses up to 250 MPa are applied in continuous cooling. {yields} Using the thermodynamic data and maximum value of the mechanical driving force the predicted increase in M{sub s} ({approx}0.1 K/MPa) is in agreement with experiment {yields} Austenite was deformed plastically at different temperatures (800 deg. C-1100 deg. C). {yields} High deformation temperature (i.e. 1100 deg. C) as well as low plastic strain (i.e. {epsilon}{sub ave} {approx} 30%) do not affect martensite transformation noticeably, whereas lower deformation temperature (e.g. 900 deg. C) and large plastic strain (i.e. {epsilon}{sub ave} {approx} 70%) retards martensite transformation. {yields} The theory of mechanical stabilization predicts the depression of M{sub s}. - Abstract: The influence of compressive stress and prior plastic deformation of austenite on the martensite transformation in a eutectoid steel is studied both experimentally and theoretically. It is demonstrated that martensite formation is assisted by stress but it is retarded when transformation occurs from deformed austenite. With the quantitative modeling of the problem based on the theory of displacive shear transformation, the explanation of the two opposite roles of mechanical treatment prior to or simultaneously to martensite transformation is presented.

  20. Bringing Partnership Home: A Model of Family Transformation

    Directory of Open Access Journals (Sweden)

    Julie de Azevedo Hanks

    2015-07-01

    Full Text Available Eisler’s cultural transformation theory suggests that the global crises we face can be addressed only through movement to a partnership model of social organization. Drawing on cultural transformation theory and systems theory, a partnership model of family organization (PMFO is outlined as a practical framework to guide families toward partnership relations. Eight components of PMFO are presented and expanded on as a path toward furthering familial and societal transformation. The eight tenets of a PMFO are: 1 cooperative adult leadership, 2 connecting orientation, 3 caretaking emphasis, 4 collaborative roles and rules, 5 celebration of unique contributions, 6 compassionate communication, 7 conscious language use, and 8 collection and creation of partnership stories. Finally, specific strategies of application of the PMFO will be discussed.

  1. The role of technology and engineering models in transforming healthcare.

    Science.gov (United States)

    Pavel, Misha; Jimison, Holly Brugge; Wactlar, Howard D; Hayes, Tamara L; Barkis, Will; Skapik, Julia; Kaye, Jeffrey

    2013-01-01

    The healthcare system is in crisis due to challenges including escalating costs, the inconsistent provision of care, an aging population, and high burden of chronic disease related to health behaviors. Mitigating this crisis will require a major transformation of healthcare to be proactive, preventive, patient-centered, and evidence-based with a focus on improving quality-of-life. Information technology, networking, and biomedical engineering are likely to be essential in making this transformation possible with the help of advances, such as sensor technology, mobile computing, machine learning, etc. This paper has three themes: 1) motivation for a transformation of healthcare; 2) description of how information technology and engineering can support this transformation with the help of computational models; and 3) a technical overview of several research areas that illustrate the need for mathematical modeling approaches, ranging from sparse sampling to behavioral phenotyping and early detection. A key tenet of this paper concerns complementing prior work on patient-specific modeling and simulation by modeling neuropsychological, behavioral, and social phenomena. The resulting models, in combination with frequent or continuous measurements, are likely to be key components of health interventions to enhance health and wellbeing and the provision of healthcare.

  2. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  3. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  4. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman; Shihada, Basem; Cavdar, Cicek

    2018-01-01

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where

  5. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  6. Bayesian spatial transformation models with applications in neuroimaging data.

    Science.gov (United States)

    Miranda, Michelle F; Zhu, Hongtu; Ibrahim, Joseph G

    2013-12-01

    The aim of this article is to develop a class of spatial transformation models (STM) to spatially model the varying association between imaging measures in a three-dimensional (3D) volume (or 2D surface) and a set of covariates. The proposed STM include a varying Box-Cox transformation model for dealing with the issue of non-Gaussian distributed imaging data and a Gaussian Markov random field model for incorporating spatial smoothness of the imaging data. Posterior computation proceeds via an efficient Markov chain Monte Carlo algorithm. Simulations and real data analysis demonstrate that the STM significantly outperforms the voxel-wise linear model with Gaussian noise in recovering meaningful geometric patterns. Our STM is able to reveal important brain regions with morphological changes in children with attention deficit hyperactivity disorder. © 2013, The International Biometric Society.

  7. Optic Fiber Sensing IOT Technology and Application Research

    Directory of Open Access Journals (Sweden)

    Wenjuan Zeng

    2014-10-01

    Full Text Available The growth of the Internet of Things (IOT industry has become a new mark of the communication domain. As the development of the technology of the IOT and the fiber-optical sensor, the combination of the both is a big question to be discussed, and the fiber-optical IOT also has a good development prospect. This article first introduces IOT’s current status, the key technology, the theoretical frame and the applications. Then, it discusses the classification of the optical fiber sensor as well as the development and its application’s situation. Lastly, it puts the optical fiber sensing technology into the IOT, and introduces a specific application which is used in the mine safety based on the fiber-optical IOT.

  8. Transformation of UML Behavioral Diagrams to Support Software Model Checking

    Directory of Open Access Journals (Sweden)

    Luciana Brasil Rebelo dos Santos

    2014-04-01

    Full Text Available Unified Modeling Language (UML is currently accepted as the standard for modeling (object-oriented software, and its use is increasing in the aerospace industry. Verification and Validation of complex software developed according to UML is not trivial due to complexity of the software itself, and the several different UML models/diagrams that can be used to model behavior and structure of the software. This paper presents an approach to transform up to three different UML behavioral diagrams (sequence, behavioral state machines, and activity into a single Transition System to support Model Checking of software developed in accordance with UML. In our approach, properties are formalized based on use case descriptions. The transformation is done for the NuSMV model checker, but we see the possibility in using other model checkers, such as SPIN. The main contribution of our work is the transformation of a non-formal language (UML to a formal language (language of the NuSMV model checker towards a greater adoption in practice of formal methods in software development.

  9. A Professionalism Curricular Model to Promote Transformative Learning Among Residents.

    Science.gov (United States)

    Foshee, Cecile M; Mehdi, Ali; Bierer, S Beth; Traboulsi, Elias I; Isaacson, J Harry; Spencer, Abby; Calabrese, Cassandra; Burkey, Brian B

    2017-06-01

    Using the frameworks of transformational learning and situated learning theory, we developed a technology-enhanced professionalism curricular model to build a learning community aimed at promoting residents' self-reflection and self-awareness. The RAPR model had 4 components: (1) R ecognize : elicit awareness; (2) A ppreciate : question assumptions and take multiple perspectives; (3) P ractice : try new/changed perspectives; and (4) R eflect : articulate implications of transformed views on future actions. The authors explored the acceptability and practicality of the RAPR model in teaching professionalism in a residency setting, including how residents and faculty perceive the model, how well residents carry out the curricular activities, and whether these activities support transformational learning. A convenience sample of 52 postgraduate years 1 through 3 internal medicine residents participated in the 10-hour curriculum over 4 weeks. A constructivist approach guided the thematic analysis of residents' written reflections, which were a required curricular task. A total of 94% (49 of 52) of residents participated in 2 implementation periods (January and March 2015). Findings suggested that RAPR has the potential to foster professionalism transformation in 3 domains: (1) attitudinal, with participants reporting they viewed professionalism in a more positive light and felt more empathetic toward patients; (2) behavioral, with residents indicating their ability to listen to patients increased; and (3) cognitive, with residents indicating the discussions improved their ability to reflect, and this helped them create meaning from experiences. Our findings suggest that RAPR offers an acceptable and practical strategy to teach professionalism to residents.

  10. Constitutive modeling of multiphase materials including phase transformations

    NARCIS (Netherlands)

    Perdahcioglu, Emin Semih; Geijselaers, Hubertus J.M.; Khan, A.S.; Meredith, C; Farrokh, B

    2011-01-01

    A constitutive model is developed for materials involving two or more different phases in their microstructure such as DP (Dual Phase) or TRIP (TRansformation Induced Plasticity) steels. Homogenization of the response of the phases is achieved by the Mean-Field method. One of the phases in TRIP

  11. Model Transformation for a System of Systems Dependability Safety Case

    Science.gov (United States)

    Murphy, Judy; Driskell, Steve

    2011-01-01

    The presentation reviews the dependability and safety effort of NASA's Independent Verification and Validation Facility. Topics include: safety engineering process, applications to non-space environment, Phase I overview, process creation, sample SRM artifact, Phase I end result, Phase II model transformation, fault management, and applying Phase II to individual projects.

  12. A Concept Transformation Learning Model for Architectural Design Learning Process

    Science.gov (United States)

    Wu, Yun-Wu; Weng, Kuo-Hua; Young, Li-Ming

    2016-01-01

    Generally, in the foundation course of architectural design, much emphasis is placed on teaching of the basic design skills without focusing on teaching students to apply the basic design concepts in their architectural designs or promoting students' own creativity. Therefore, this study aims to propose a concept transformation learning model to…

  13. Hydrolysis and biotic transformation in water in the pesticide model

    NARCIS (Netherlands)

    Horst, ter M.M.S.; Beltman, W.H.J.; Adriaanse, P.I.; Mulder, H.M.

    2017-01-01

    The TOXSWA model has been extended with the functionality to simulate hydrolysis and biotic transformation in water. TOXSWA simulates the fate of pesticides in water bodies to calculate exposure calculations for aquatic organisms or sediment-dwelling organisms as part of the aquatic risk assessment

  14. Plasticity induced by phase transformation in steel: experiment vs modeling

    International Nuclear Information System (INIS)

    Tahimi, Abdeladhim

    2011-01-01

    The objectives of this work are: (i) understand the mechanisms and phenomena involved in the plasticity of steels in the presence of a diffusive or martensitic phase transformation. (ii) develop tools for predicting TRIP, which are able to correctly reproduce the macroscopic deformation for cases of complex loading and could also provide information about local elasto-visco-plastic interactions between product and parent phases. To this purpose, new experimental tests are conducted on 35NCD16 steel for austenite to martensite transformation and on 100C6 steel for austenite to pearlite transformation. The elasto viscoplastic properties of austenite and pearlite of the 100C6 steel are characterized through tension compression and relaxation tests. The parameters of macro-homogeneous and crystal-based constitutive laws could then be identified such as to analyse different models with respect to the experimental TRIP: the analytical models of Leblond (1989) and Taleb and Sidoroff (2003) but also, above all, different numerical models which can be distinguished by the prevailing assumptions concerning the local kinetics and the constitutive laws. An extension of the single-grain model dedicated to martensitic transformations developed during the thesis of S. Meftah (2007) is proposed. It consists in introducing the polycrystalline character of the austenite through a process of homogenization based on a self-consistent scheme by calculating the properties of an Equivalent Homogeneous Medium environment (EHM). (author)

  15. INTERNET OF THINGS (IOT) - APPLICATIONS AND CHALLENGES

    OpenAIRE

    K. Lathika

    2016-01-01

    The internet of things (IoT) as the new influence to the human world and machine world is emerging as a new high tide wave in the development of internet. Internet of things is expected to have massive impact on the customer of electric equipment’s, business which will all be integrated and synchronized and also the fact is these are the early days. Looking at the potential of the wide suitability to all most all the vectors of the core areas like business, industries, manufacturing consumer...

  16. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... It can be expected in the future that the number of such clusters will grow exponentially, leading to an ultradense environment of interconnected devices belonging to the same or different clusters with the human user as the center point for the information being sensed, gathered, and processed...

  17. RFID and IOT for Attendance Monitoring System

    Directory of Open Access Journals (Sweden)

    Dedy Irawan Joseph

    2018-01-01

    Full Text Available In recent years, RFID technology has been widely used in various sectors, such as in-education, transportation, agriculture, animal husbandry, store sales and other sectors. RFID utilization in education is student attendance monitoring system, by using Internet of Things (IoT and Cloud technology, it will produce a real time attendance monitoring system that can be accessed by various parties, such as lecturer, campus administration and parents. With this monitoring system if there are students who are not present can be immediately discovered and can be taken immediate action and the learning process can run smoothly.

  18. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Waleed Shahjehan; Dr. Mohammad Haseeb Zafar

    2017-01-01

    One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency is created in Internet Pr...

  19. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  20. Evaluation of IPV6 and MOFI IOT

    OpenAIRE

    Shahjehan , Waleed; Zafar , Mohammad ,; Hussain , Irshad; Farooq , Muhammad

    2017-01-01

    International audience; One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information that has been combined by other things.. The basic design of the IPV6 was that only end devices are the one with high intelligence and network is used for delivery of packets simply. In present Internet it is observed that inefficiency i...

  1. An IoT Knowledge Reengineering Framework for Semantic Knowledge Analytics for BI-Services

    Directory of Open Access Journals (Sweden)

    Nilamadhab Mishra

    2015-01-01

    Full Text Available In a progressive business intelligence (BI environment, IoT knowledge analytics are becoming an increasingly challenging problem because of rapid changes of knowledge context scenarios along with increasing data production scales with business requirements that ultimately transform a working knowledge base into a superseded state. Such a superseded knowledge base lacks adequate knowledge context scenarios, and the semantics, rules, frames, and ontology contents may not meet the latest requirements of contemporary BI-services. Thus, reengineering a superseded knowledge base into a renovated knowledge base system can yield greater business value and is more cost effective and feasible than standardising a new system for the same purpose. Thus, in this work, we propose an IoT knowledge reengineering framework (IKR framework for implementation in a neurofuzzy system to build, organise, and reuse knowledge to provide BI-services to the things (man, machines, places, and processes involved in business through the network of IoT objects. The analysis and discussion show that the IKR framework can be well suited to creating improved anticipation in IoT-driven BI-applications.

  2. Clone Detection for Graph-Based Model Transformation Languages

    DEFF Research Database (Denmark)

    Strüber, Daniel; Plöger, Jennifer; Acretoaie, Vlad

    2016-01-01

    and analytical quality assurance. From these use cases, we derive a set of key requirements. We describe our customization of existing model clone detection techniques allowing us to address these requirements. Finally, we provide an experimental evaluation, indicating that our customization of ConQAT, one......Cloning is a convenient mechanism to enable reuse across and within software artifacts. On the downside, it is also a practice related to significant long-term maintainability impediments, thus generating a need to identify clones in affected artifacts. A large variety of clone detection techniques...... has been proposed for programming and modeling languages; yet no specific ones have emerged for model transformation languages. In this paper, we explore clone detection for graph-based model transformation languages. We introduce potential use cases for such techniques in the context of constructive...

  3. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  4. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  5. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  6. Assessing biocomputational modelling in transforming clinical guidelines for osteoporosis management.

    Science.gov (United States)

    Thiel, Rainer; Viceconti, Marco; Stroetmann, Karl

    2011-01-01

    Biocomputational modelling as developed by the European Virtual Physiological Human (VPH) Initiative is the area of ICT most likely to revolutionise in the longer term the practice of medicine. Using the example of osteoporosis management, a socio-economic assessment framework is presented that captures how the transformation of clinical guidelines through VPH models can be evaluated. Applied to the Osteoporotic Virtual Physiological Human Project, a consequent benefit-cost analysis delivers promising results, both methodologically and substantially.

  7. MODELING CONTROLLED ASYNCHRONOUS ELECTRIC DRIVES WITH MATCHING REDUCERS AND TRANSFORMERS

    Directory of Open Access Journals (Sweden)

    V. S. Petrushin

    2015-04-01

    Full Text Available Purpose. Working out of mathematical models of the speed-controlled induction electric drives ensuring joint consideration of transformers, motors and loadings, and also matching reducers and transformers, both in static, and in dynamic regimes for the analysis of their operating characteristics. Methodology. At mathematical modelling are considered functional, mass, dimensional and cost indexes of reducers and transformers that allows observing engineering and economic aspects of speed-controlled induction electric drives. The mathematical models used for examination of the transitive electromagnetic and electromechanical processes, are grounded on systems of nonlinear differential equations with nonlinear coefficients (parameters of equivalent circuits of motors, varying in each operating point, including owing to appearances of saturation of magnetic system and current displacement in a winding of a rotor of an induction motor. For the purpose of raise of level of adequacy of models a magnetic circuit iron, additional and mechanical losses are considered. Results. Modelling of the several speed-controlled induction electric drives, different by components, but working on a loading equal on character, magnitude and a demanded control range is executed. At use of characteristic families including mechanical, at various parameters of regulating on which performances of the load mechanism are superimposed, the adjusting characteristics representing dependences of a modification of electrical, energy and thermal magnitudes from an angular speed of motors are gained. Originality. The offered complex models of speed-controlled induction electric drives with matching reducers and transformers, give the chance to realize well-founded sampling of components of drives. They also can be used as the design models by working out of speed-controlled induction motors. Practical value. Operating characteristics of various speed-controlled induction electric

  8. Multimodal electromechanical model of piezoelectric transformers by Hamilton's principle.

    Science.gov (United States)

    Nadal, Clement; Pigache, Francois

    2009-11-01

    This work deals with a general energetic approach to establish an accurate electromechanical model of a piezoelectric transformer (PT). Hamilton's principle is used to obtain the equations of motion for free vibrations. The modal characteristics (mass, stiffness, primary and secondary electromechanical conversion factors) are also deduced. Then, to illustrate this general electromechanical method, the variational principle is applied to both homogeneous and nonhomogeneous Rosen-type PT models. A comparison of modal parameters, mechanical displacements, and electrical potentials are presented for both models. Finally, the validity of the electrodynamical model of nonhomogeneous Rosen-type PT is confirmed by a numerical comparison based on a finite elements method and an experimental identification.

  9. Laplace transform analysis of a multiplicative asset transfer model

    Science.gov (United States)

    Sokolov, Andrey; Melatos, Andrew; Kieu, Tien

    2010-07-01

    We analyze a simple asset transfer model in which the transfer amount is a fixed fraction f of the giver’s wealth. The model is analyzed in a new way by Laplace transforming the master equation, solving it analytically and numerically for the steady-state distribution, and exploring the solutions for various values of f∈(0,1). The Laplace transform analysis is superior to agent-based simulations as it does not depend on the number of agents, enabling us to study entropy and inequality in regimes that are costly to address with simulations. We demonstrate that Boltzmann entropy is not a suitable (e.g. non-monotonic) measure of disorder in a multiplicative asset transfer system and suggest an asymmetric stochastic process that is equivalent to the asset transfer model.

  10. Development of transformations from business process models to implementations by reuse

    NARCIS (Netherlands)

    Dirgahayu, T.; Quartel, Dick; van Sinderen, Marten J.; Ferreira Pires, Luis; Hammoudi, S.

    2007-01-01

    This paper presents an approach for developing transformations from business process models to implementations that facilitates reuse. A transformation is developed as a composition of three smaller tasks: pattern recognition, pattern realization and activity transformation. The approach allows one

  11. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  12. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  13. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications.

    Science.gov (United States)

    Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying

    2016-09-22

    Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  14. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications

    Directory of Open Access Journals (Sweden)

    Hui-Ling Chang

    2016-09-01

    Full Text Available Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN and Constrained Application Protocol (CoAP are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK before retransmission timeout (RTO expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  15. Modeling and analysis on ring-type piezoelectric transformers.

    Science.gov (United States)

    Ho, Shine-Tzong

    2007-11-01

    This paper presents an electromechanical model for a ring-type piezoelectric transformer (PT). To establish this model, vibration characteristics of the piezoelectric ring with free boundary conditions are analyzed in advance. Based on the vibration analysis of the piezoelectric ring, the operating frequency and vibration mode of the PT are chosen. Then, electromechanical equations of motion for the PT are derived based on Hamilton's principle, which can be used to simulate the coupled electromechanical system for the transformer. Such as voltage stepup ratio, input impedance, output impedance, input power, output power, and efficiency are calculated by the equations. The optimal load resistance and the maximum efficiency for the PT will be presented in this paper. Experiments also were conducted to verify the theoretical analysis, and a good agreement was obtained.

  16. Knowledge driven discovery for opportunistic IoT networking.

    OpenAIRE

    Pozza, Riccardo

    2015-01-01

    So far, the Internet of Things (IoT) has been concerned with the objective of connecting every-thing, or any object to the Internet world. By collaborating towards the creation of new services, the IoT has introduced the opportunity to add smartness to our cities, homes, buildings and healthcare systems, as well as businesses and products. In many scenarios, objects or IoT devices are not always statically deployed, but they may be free to move around being carried by people or vehicles, whil...

  17. Transforming Systems Engineering through Model-Centric Engineering

    Science.gov (United States)

    2018-02-28

    Contract No. HQ0034-13-D-0004 Research Tasks: 48, 118, 141, 157, 170 Report No. SERC-2018-TR-103 Transforming Systems Engineering through...Model-Centric Engineering Technical Report SERC-2018-TR-103 February 28, 2018 Principal Investigator Dr. Mark Blackburn, Stevens Institute of...Systems Engineering Research Center This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the

  18. Chemical Transformation Motifs --- Modelling Pathways as Integer Hyperflows

    DEFF Research Database (Denmark)

    Andersen, Jakob L.; Flamm, Christoph; Merkle, Daniel

    2018-01-01

    analysis are discussed in detail. To demonstrate the applicability of the mathematical framework to real-life problems we first explore the design space of possible non-oxidative glycolysis pathways and show that recent manually designed pathways can be further optimised. We then use a model of sugar...... chemistry to investigate pathways in the autocatalytic formose process. A graph transformation-based approach is used to automatically generate the reaction networks of interest....

  19. Feasibility of EPC to BPEL Model Transformations based on Ontology and Patterns

    NARCIS (Netherlands)

    Meertens, Lucas O.; Iacob, Maria Eugenia; Eckartz, Silja M.; Rinderle-Ma, Stefanie; Sadiq, Shazia; Leymann, Frank

    2010-01-01

    Model-Driven Engineering holds the promise of transforming business models into code automatically. This requires the concept of model transformation. In this paper, we assess the feasibility of model transformations from Event-driven Process Chain models to Business Process Execution Language

  20. Challenges in Materials Transformation Modeling for Polyolefins Industry

    Science.gov (United States)

    Lai, Shih-Yaw; Swogger, Kurt W.

    2004-06-01

    Unlike most published polymer processing and/or forming research, the transformation of polyolefins to fabricated articles often involves non-confined flow or so-called free surface flow (e.g. fiber spinning, blown films, and cast films) in which elongational flow takes place during a fabrication process. Obviously, the characterization and validation of extensional rheological parameters and their use to develop rheological constitutive models are the focus of polyolefins materials transformation research. Unfortunately, there are challenges that remain with limited validation for non-linear, non-isothermal constitutive models for polyolefins. Further complexity arises in the transformation of polyolefins in the elongational flow system as it involves stress-induced crystallization process. The complicated nature of elongational, non-linear rheology and non-isothermal crystallization kinetics make the development of numerical methods very challenging for the polyolefins materials forming modeling. From the product based company standpoint, the challenges of materials transformation research go beyond elongational rheology, crystallization kinetics and its numerical modeling. In order to make models useful for the polyolefin industry, it is critical to develop links between molecular parameters to both equipment and materials forming parameters. The recent advances in the constrained geometry catalysis and materials sciences understanding (INSITE technology and molecular design capability) has made industrial polyolefinic materials forming modeling more viable due to the fact that the molecular structure of the polymer can be well predicted and controlled during the polymerization. In this paper, we will discuss inter-relationship (models) among molecular parameters such as polymer molecular weight (Mw), molecular weight distribution (MWD), long chain branching (LCB), short chain branching (SCB or comonomer types and distribution) and their affects on shear and

  1. Wireless Home Automation System using IoT

    Directory of Open Access Journals (Sweden)

    Alexandra MIHALACHE

    2017-01-01

    Full Text Available Nowadays, the chance of having an automated home is no longer a fancy luxury, but a reality accessible to a wide range of consumers, because smart home systems have replaced those that only automated the home in the past. More and more solutions based on IoT are being devel-oped to transform homes into smart ones, but the problem is that the benefits of home automa-tion are still not clear to everyone as they are not promoted enough, so we cannot talk about a broad mass of consumers already using integrated or DIY solutions to improve their lives. In this paper, I will present a home automation system using Arduino Uno integrated with rele-vant modules which are used to allow remote control of lights or fans, changes being made on the basis of different sensors data. The system is designed to be low cost and expandable, bring-ing accessibility, convenience and energy efficiency.

  2. Mesoscale modeling of amorphous metals by shear transformation zone dynamics

    International Nuclear Information System (INIS)

    Homer, Eric R.; Schuh, Christopher A.

    2009-01-01

    A new mesoscale modeling technique for the thermo-mechanical behavior of metallic glasses is proposed. The modeling framework considers the shear transformation zone (STZ) as the fundamental unit of deformation, and coarse-grains an amorphous collection of atoms into an ensemble of STZs on a mesh. By employing finite element analysis and a kinetic Monte Carlo algorithm, the modeling technique is capable of simulating glass processing and deformation on time and length scales greater than those usually attainable by atomistic modeling. A thorough explanation of the framework is presented, along with a specific two-dimensional implementation for a model metallic glass. The model is shown to capture the basic behaviors of metallic glasses, including high-temperature homogeneous flow following the expected constitutive law, and low-temperature strain localization into shear bands. Details of the effects of processing and thermal history on the glass structure and properties are also discussed.

  3. Transforming business models through big data in the textile industry

    DEFF Research Database (Denmark)

    Aagaard, Annabeth

    , such as textile, and have led to disruption of established business models (Westerman et al., 2014; Weill and Woerner, 2015). Yet, little is known of the managerial process and facilitation of the digital transformation of business models through big data (McAfee and Brynjolfsson, 2012; Markus and Loebbecke, 2013).......The extensive stream of work on business models (BM) and business model innovation (BMI) has generated many important insights (Amit & Zott, 2001; Osterwalder, 2004; Markides, 2008, 2013; Chesbrough 2010; Teece, 2010; Zott et al, 2011). Yet, our understanding of business models remains fragmented...... as stressed by Zott et al. (2011), Weill et al. (2011) and David J. Teece (2010: 174), who states that: “the concept of a business model lacks theoretical grounding in economics or in business studies”. With the acceleration of digitization and use of big data analytics quality data are accessible...

  4. THREE-PHASE TRANSFORMER PARAMETERS CALCULATION CONSIDERING THE CORE SATURATION FOR THE MATLAB-SIMULINK TRANSFORMER MODEL

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2015-01-01

    Full Text Available This article describes the parameters calculation for the three-phase two-winding power transformer model taken from the SimPowerSystems library, which is the part of the MatLab- Simulink environment. Presented methodology is based on the power transformer nameplate data usage. Particular attention is paid to the power transformer magnetization curve para- meters  calculation.  The  methodology  of  the  three-phase  two-winding  power  transformer model parameters calculation considering the magnetization curve nonlinearity isn’t presented in Russian-and English-language sources. Power transformers demo models described in the SimPowerSystems user’s guide have already calculated parameters, but without reference to the sources of their determination. A power transformer is a nonlinear element of the power system, that’s why for its performance analysis in different modes of operation is necessary to have the magnetization curve parameters.The process analysis during no-load energizing of the power transformer is of special interest. This regime is accompanied by the inrush current on the supply side of the power transformer, which is several times larger than the transformer rated current. Sharp rising of the magnetizing current is explained by the magnetic core saturation. Therefore, magnetiza- tion characteristic accounting during transformer no-load energizing modeling is a mandatory requirement. Article authors attempt to put all calculating formulas in a more convenient form and validate the power transformer nonlinear magnetization characteristics parameters calcu- lation. Inrush current oscillograms obtained during the simulation experiment confirmed the adequacy of the calculated model parameters.

  5. Modelling a single phase voltage controlled rectifier using Laplace transforms

    Science.gov (United States)

    Kraft, L. Alan; Kankam, M. David

    1992-01-01

    The development of a 20 kHz, AC power system by NASA for large space projects has spurred a need to develop models for the equipment which will be used on these single phase systems. To date, models for the AC source (i.e., inverters) have been developed. It is the intent of this paper to develop a method to model the single phase voltage controlled rectifiers which will be attached to the AC power grid as an interface for connected loads. A modified version of EPRI's HARMFLO program is used as the shell for these models. The results obtained from the model developed in this paper are quite adequate for the analysis of problems such as voltage resonance. The unique technique presented in this paper uses the Laplace transforms to determine the harmonic content of the load current of the rectifier rather than a curve fitting technique. Laplace transforms yield the coefficient of the differential equations which model the line current to the rectifier directly.

  6. Modelling of Singapore's topographic transformation based on DEMs

    Science.gov (United States)

    Wang, Tao; Belle, Iris; Hassler, Uta

    2015-02-01

    Singapore's topography has been heavily transformed by industrialization and urbanization processes. To investigate topographic changes and evaluate soil mass flows, historical topographic maps of 1924 and 2012 were employed, and basic topographic features were vectorized. Digital elevation models (DEMs) for the two years were reconstructed based on vector features. Corresponding slope maps, a surface difference map and a scatter plot of elevation changes were generated and used to quantify and categorize the nature of the topographic transformation. The surface difference map is aggregated into five main categories of changes: (1) areas without significant height changes, (2) lowered-down areas where hill ranges were cut down, (3) raised-up areas where valleys and swamps were filled in, (4) reclaimed areas from the sea, and (5) new water-covered areas. Considering spatial proximity and configurations of different types of changes, topographic transformation can be differentiated as either creating inland flat areas or reclaiming new land from the sea. Typical topographic changes are discussed in the context of Singapore's urbanization processes. The two slope maps and elevation histograms show that generally, the topographic surface of Singapore has become flatter and lower since 1924. More than 89% of height changes have happened within a range of 20 m and 95% have been below 40 m. Because of differences in land surveying and map drawing methods, uncertainties and inaccuracies inherent in the 1924 topographic maps are discussed in detail. In this work, a modified version of a traditional scatter plot is used to present height transformation patterns intuitively. This method of deriving categorical maps of topographical changes from a surface difference map can be used in similar studies to qualitatively interpret transformation. Slope maps and histograms were also used jointly to reveal additional patterns of topographic change.

  7. Dynamic modeling and simulation of power transformer maintenance costs

    Directory of Open Access Journals (Sweden)

    Ristić Olga

    2016-01-01

    Full Text Available The paper presents the dynamic model of maintenance costs of the power transformer functional components. Reliability is modeled combining the exponential and Weibull's distribution. The simulation was performed with the aim of corrective maintenance and installation of the continuous monitoring system of the most critical components. Simulation Dynamic System (SDS method and VENSIM PLE software was used to simulate the cost. In this way, significant savings in maintenance costs will be achieved with a small initial investment. [Projekat Ministarstva nauke Republike Srbije, br. III 41025 i br. OI 171007

  8. Transforming PLC Programs into Formal Models for Verification Purposes

    CERN Document Server

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  9. Differential barometric-based positioning technique for indoor elevation measurement in IoT medical applications.

    Science.gov (United States)

    Wang, Hua; Wen, Yingyou; Zhao, Dazhe

    2017-07-20

    Medical applications have begun to benefit from Internet of Things (IoT) technology through the introduction of wearable devices. Several medical applications require accurate patient location as various changes affect pressure parameters inside the body. This study aims to develop a system to measure indoor altitude for IoT medical applications. We propose a differential barometric-based positioning system to estimate the altitude between a reference sensor and a localizing sensor connected to the human body. The differential barometric altimetry model is introduced to estimate indoor elevations and eliminate environmental artifacts. In addition, a Gaussian filter processing is adopted to remove noise from the elevation measurements. The proposed system is then investigated through extensive experiments, using various evaluation criteria. The results indicate that the proposed system yielded good accuracy with reduced implementation complexity and fewer costs. The proposed system is resilient compared to other indoor localization approaches, even when numerous environmental artifacts in indoor environments are present.

  10. INTEGRATION OF BIM, WEB MAPS AND IOT FOR SUPPORTING COMFORT ANALYSIS

    Directory of Open Access Journals (Sweden)

    M. Gunduz

    2017-11-01

    Full Text Available The use of the Internet is expanding and the technological capabilities of electronic devices are evolving. Today, Internet of Things (IoT solutions can be developed that were never even imaginable before. In this paper, a case study is presented on the joint use of Building Information Model (BIM, Geographical Information Systems (GIS and Internet of Things (IoT technologies. It is a part of an ongoing study that intends to overcome some problems about the management of complex facilities. In the study, a BIM has been converted and displayed in 2D on Google Maps, and information on various sensors have been represented on the web with geographic coordinates in real-time.

  11. Integration of Bim, Web Maps and Iot for Supporting Comfort Analysis

    Science.gov (United States)

    Gunduz, M.; Isikdag, U.; Basaraner, M.

    2017-11-01

    The use of the Internet is expanding and the technological capabilities of electronic devices are evolving. Today, Internet of Things (IoT) solutions can be developed that were never even imaginable before. In this paper, a case study is presented on the joint use of Building Information Model (BIM), Geographical Information Systems (GIS) and Internet of Things (IoT) technologies. It is a part of an ongoing study that intends to overcome some problems about the management of complex facilities. In the study, a BIM has been converted and displayed in 2D on Google Maps, and information on various sensors have been represented on the web with geographic coordinates in real-time.

  12. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  13. Transformational change in health care systems: an organizational model.

    Science.gov (United States)

    Lukas, Carol VanDeusen; Holmes, Sally K; Cohen, Alan B; Restuccia, Joseph; Cramer, Irene E; Shwartz, Michael; Charns, Martin P

    2007-01-01

    The Institute of Medicine's 2001 report Crossing the Quality Chasm argued for fundamental redesign of the U.S. health care system. Six years later, many health care organizations have embraced the report's goals, but few have succeeded in making the substantial transformations needed to achieve those aims. This article offers a model for moving organizations from short-term, isolated performance improvements to sustained, reliable, organization-wide, and evidence-based improvements in patient care. Longitudinal comparative case studies were conducted in 12 health care systems using a mixed-methods evaluation design based on semistructured interviews and document review. Participating health care systems included seven systems funded through the Robert Wood Johnson Foundation's Pursuing Perfection Program and five systems with long-standing commitments to improvement and high-quality care. Five interactive elements appear critical to successful transformation of patient care: (1) Impetus to transform; (2) Leadership commitment to quality; (3) Improvement initiatives that actively engage staff in meaningful problem solving; (4) Alignment to achieve consistency of organization goals with resource allocation and actions at all levels of the organization; and (5) Integration to bridge traditional intra-organizational boundaries among individual components. These elements drive change by affecting the components of the complex health care organization in which they operate: (1) Mission, vision, and strategies that set its direction and priorities; (2) Culture that reflects its informal values and norms; (3) Operational functions and processes that embody the work done in patient care; and (4) Infrastructure such as information technology and human resources that support the delivery of patient care. Transformation occurs over time with iterative changes being sustained and spread across the organization. The conceptual model holds promise for guiding health care

  14. Moving-Target Position Estimation Using GPU-Based Particle Filter for IoT Sensing Applications

    Directory of Open Access Journals (Sweden)

    Seongseop Kim

    2017-11-01

    Full Text Available A particle filter (PF has been introduced for effective position estimation of moving targets for non-Gaussian and nonlinear systems. The time difference of arrival (TDOA method using acoustic sensor array has normally been used to for estimation by concealing the location of a moving target, especially underwater. In this paper, we propose a GPU -based acceleration of target position estimation using a PF and propose an efficient system and software architecture. The proposed graphic processing unit (GPU-based algorithm has more advantages in applying PF signal processing to a target system, which consists of large-scale Internet of Things (IoT-driven sensors because of the parallelization which is scalable. For the TDOA measurement from the acoustic sensor array, we use the generalized cross correlation phase transform (GCC-PHAT method to obtain the correlation coefficient of the signal using Fast Fourier Transform (FFT, and we try to accelerate the calculations of GCC-PHAT based TDOA measurements using FFT with GPU compute unified device architecture (CUDA. The proposed approach utilizes a parallelization method in the target position estimation algorithm using GPU-based PF processing. In addition, it could efficiently estimate sudden movement change of the target using GPU-based parallel computing which also can be used for multiple target tracking. It also provides scalability in extending the detection algorithm according to the increase of the number of sensors. Therefore, the proposed architecture can be applied in IoT sensing applications with a large number of sensors. The target estimation algorithm was verified using MATLAB and implemented using GPU CUDA. We implemented the proposed signal processing acceleration system using target GPU to analyze in terms of execution time. The execution time of the algorithm is reduced by 55% from to the CPU standalone operation in target embedded board, NVIDIA Jetson TX1. Also, to apply large

  15. Proof of Concept of Home IoT Connected Vehicles

    OpenAIRE

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the con...

  16. Seedbed based on IoT: A Case Study

    OpenAIRE

    J. Kalathas; D.V. Bandekas; A. Kosmidis; V. Kanakaris

    2016-01-01

    Nowadays, the Wireless Sensors Network (WSN) and the Internet of Things (IOT) are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed...

  17. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  18. A Step Towards Checking Security in IoT

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  19. Security Framework for the Web of IoT Platforms

    OpenAIRE

    Atarah, Ivan Akoribila

    2017-01-01

    Connected devices of IoT platforms are known to produce, process and exchange vast amounts of data, most of it sensitive or personal, that need to be protected. However, achieving minimal data protection requirements such as confidentiality, integrity, availability and non-repudiation in IoT platforms is a non-trivial issue. For one reason, the trillions of interacting devices provide larger attack surfaces. Secondly, high levels of personal and private data sharing in this ubiquitous and het...

  20. 5G IoT Industry Verticals and Network Requirements

    OpenAIRE

    Condoluci, Massimo; Lema Rosas, Maria Angel; Mahmoodi, Toktam; Dohler, Michael

    2017-01-01

    The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requ...

  1. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  2. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  3. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  4. TP-model transformation-based-control design frameworks

    CERN Document Server

    Baranyi, Péter

    2016-01-01

    This book covers new aspects and frameworks of control, design, and optimization based on the TP model transformation and its various extensions. The author outlines the three main steps of polytopic and LMI based control design: 1) development of the qLPV state-space model, 2) generation of the polytopic model; and 3) application of LMI to derive controller and observer. He goes on to describe why literature has extensively studied LMI design, but has not focused much on the second step, in part because the generation and manipulation of the polytopic form was not tractable in many cases. The author then shows how the TP model transformation facilitates this second step and hence reveals new directions, leading to powerful design procedures and the formulation of new questions. The chapters of this book, and the complex dynamical control tasks which they cover, are organized so as to present and analyze the beneficial aspect of the family of approaches (control, design, and optimization). Additionally, the b...

  5. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  6. Phase field theory of proper displacive phase transformations: Structural anisotropy and directional flexibility, a vector model, and the transformation kinetics

    Energy Technology Data Exchange (ETDEWEB)

    Rao Weifeng [Department of Materials Science and Engineering, Rutgers University, 607 Taylor Road, Piscataway, NJ 08854 (United States); Khachaturyan, Armen G., E-mail: khach@jove.rutgers.edu [Department of Materials Science and Engineering, Rutgers University, 607 Taylor Road, Piscataway, NJ 08854 (United States)

    2011-06-15

    A phase field theory of proper displacive transformations is developed to address the microstructure evolution and its response to applied fields in decomposing and martensitic systems. The theory is based on the explicit equation for the non-equilibrium free energy function of the transformation strain obtained by a consistent separation of the total strain into transformation and elastic strains. The transformation strain is considered to be a relaxing long-range order parameter evolving in accordance with the system energetics rather than as a fixed material constant used in the conventional Eshelby theory of coherent inclusions. The elastic strain is defined as a coherency strain recovering the crystal lattice compatibility. The obtained free energy function of the transformation strain leads to the concepts of structural anisotropy and directional flexibility of low symmetry phases. The formulated vector model of displacive transformation makes apparent a similarity between proper displacive transformation and ferromagnetic/ferroelectric transformation and, in particular, a similarity between the structural anisotropy and magnetic/polar anisotropy of ferromagnetic/ferroelectric materials. It even predicts the feasibility of a glass-like structural state with unlimited directional flexibility of the transformation strain that is conceptually similar to a ferromagnetic glass. The thermodynamics of the equilibrium between low symmetry phases and the thermodynamic conditions leading to the formation of adaptive states are formulated.

  7. High frequency modeling of power transformers. Stresses and diagnostics

    Energy Technology Data Exchange (ETDEWEB)

    Bjerkan, Eilert

    2005-05-15

    In this thesis a reliable, versatile and rigorous method for high frequency power transformer modeling is searched and established. The purpose is to apply this model to sensitivity analysis of FRA (Frequency Response Analysis) which is a quite new diagnostic method for assessing the mechanical integrity of power transformer windings on-site. The method should be versatile in terms of being able to estimate internal and external over voltages and resonances. Another important aspect is that the method chosen is suitable for real transformer geometries. In order to verify the suitability of the model for real transformers, a specific test-object is used. This is a 20MVA transformer, and details are given in chapter 1.4. The high frequency power transformer model is established from geometrical and constructional information from the manufacturer, together with available material characteristics. All circuit parameters in the lumped circuit representation are calculated based on these data. No empirical modifications need to be performed. Comparison shows capability of reasonable accuracy in the range from 10 khz to 1 MHz utilizing a disc-to-disc representation. A compromise between accuracy of model due to discretization and complexity of the model in a turn-to-turn representation is inevitable. The importance of the iron core is emphasized through a comparison of representations with/without the core included. Frequency-dependent phenomena are accurately represented using an isotropic equivalent for windings and core, even with a coarse mesh for the FEM-model. This is achieved through a frequency-dependent complex permeability representation of the materials. This permeability is deduced from an analytical solution of the frequency-dependent magnetic field inside the conductors and the core. The importance of dielectric losses in a transformer model is also assessed. Since published data on the high frequency properties of press board are limited, some initial

  8. Development and validation of a tokamak skin effect transformer model

    International Nuclear Information System (INIS)

    Romero, J.A.; Moret, J.-M.; Coda, S.; Felici, F.; Garrido, I.

    2012-01-01

    A lumped parameter, state space model for a tokamak transformer including the slow flux penetration in the plasma (skin effect transformer model) is presented. The model does not require detailed or explicit information about plasma profiles or geometry. Instead, this information is lumped in system variables, parameters and inputs. The model has an exact mathematical structure built from energy and flux conservation theorems, predicting the evolution and non-linear interaction of plasma current and internal inductance as functions of the primary coil currents, plasma resistance, non-inductive current drive and the loop voltage at a specific location inside the plasma (equilibrium loop voltage). Loop voltage profile in the plasma is substituted by a three-point discretization, and ordinary differential equations are used to predict the equilibrium loop voltage as a function of the boundary and resistive loop voltages. This provides a model for equilibrium loop voltage evolution, which is reminiscent of the skin effect. The order and parameters of this differential equation are determined empirically using system identification techniques. Fast plasma current modulation experiments with random binary signals have been conducted in the TCV tokamak to generate the required data for the analysis. Plasma current was modulated under ohmic conditions between 200 and 300 kA with 30 ms rise time, several times faster than its time constant L/R ≈ 200 ms. A second-order linear differential equation for equilibrium loop voltage is sufficient to describe the plasma current and internal inductance modulation with 70% and 38% fit parameters, respectively. The model explains the most salient features of the plasma current transients, such as the inverse correlation between plasma current ramp rates and internal inductance changes, without requiring detailed or explicit information about resistivity profiles. This proves that a lumped parameter modelling approach can be used to

  9. Text-Independent Speaker Identification Using the Histogram Transform Model

    DEFF Research Database (Denmark)

    Ma, Zhanyu; Yu, Hong; Tan, Zheng-Hua

    2016-01-01

    In this paper, we propose a novel probabilistic method for the task of text-independent speaker identification (SI). In order to capture the dynamic information during SI, we design a super-MFCCs features by cascading three neighboring Mel-frequency Cepstral coefficients (MFCCs) frames together....... These super-MFCC vectors are utilized for probabilistic model training such that the speaker’s characteristics can be sufficiently captured. The probability density function (PDF) of the aforementioned super-MFCCs features is estimated by the recently proposed histogram transform (HT) method. To recedes...

  10. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  11. Culture models of human mammary epithelial cell transformation

    Energy Technology Data Exchange (ETDEWEB)

    Stampfer, Martha R.; Yaswen, Paul

    2000-11-10

    Human pre-malignant breast diseases, particularly ductal carcinoma in situ (DCIS)3 already display several of the aberrant phenotypes found in primary breast cancers, including chromosomal abnormalities, telomerase activity, inactivation of the p53 gene and overexpression of some oncogenes. Efforts to model early breast carcinogenesis in human cell cultures have largely involved studies in vitro transformation of normal finite lifespan human mammary epithelial cells (HMEC) to immortality and malignancy. We present a model of HMEC immortal transformation consistent with the know in vivo data. This model includes a recently described, presumably epigenetic process, termed conversion, which occurs in cells that have overcome stringent replicative senescence and are thus able to maintain proliferation with critically short telomeres. The conversion process involves reactivation of telomerase activity, and acquisition of good uniform growth in the absence and presence of TFGB. We propose th at overcoming the proliferative constraints set by senescence, and undergoing conversion, represent key rate-limiting steps in human breast carcinogenesis, and occur during early stage breast cancer progression.

  12. Administratörsverktyg för IOT-enheter

    OpenAIRE

    Wahlman, Johan

    2015-01-01

    IoT (Internet of Things) are devices which are usually equipped with different kinds of sensors, these sensor values are then sent to a server where these values are somehow processed. It’s predicted that the usage of IoT devices will increase significantly during the upcoming years.   Microsoft has a service named Azure IoT Hub, which is designed for easy administration of IoT devices, but Azure IoT Hub provides no user interface to administer these IoT devices. The task of this project is t...

  13. On the road to secure and privacy-preserving IoT ecosystems

    OpenAIRE

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan

    2017-01-01

    The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ecosystems. BIG IoT aims to facilitate cross-platform and cross-domain application developments and establish centralized marketplaces to allow resource monetization. This combination of multi-platform applications, heterogeneity of the IoT, as well as enabling marketing and a...

  14. Infinite conformal symmetries and Riemann-Hilbert transformation in super principal chiral model

    International Nuclear Information System (INIS)

    Hao Sanru; Li Wei

    1989-01-01

    This paper shows a new symmetric transformation - C transformation in super principal chiral model and discover an infinite dimensional Lie algebra related to the Virasoro algebra without central extension. By using the Riemann-Hilbert transformation, the physical origination of C transformation is discussed

  15. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  16. A General Cross-Layer Cloud Scheduling Framework for Multiple IoT Computer Tasks.

    Science.gov (United States)

    Wu, Guanlin; Bao, Weidong; Zhu, Xiaomin; Zhang, Xiongtao

    2018-05-23

    The diversity of IoT services and applications brings enormous challenges to improving the performance of multiple computer tasks' scheduling in cross-layer cloud computing systems. Unfortunately, the commonly-employed frameworks fail to adapt to the new patterns on the cross-layer cloud. To solve this issue, we design a new computer task scheduling framework for multiple IoT services in cross-layer cloud computing systems. Specifically, we first analyze the features of the cross-layer cloud and computer tasks. Then, we design the scheduling framework based on the analysis and present detailed models to illustrate the procedures of using the framework. With the proposed framework, the IoT services deployed in cross-layer cloud computing systems can dynamically select suitable algorithms and use resources more effectively to finish computer tasks with different objectives. Finally, the algorithms are given based on the framework, and extensive experiments are also given to validate its effectiveness, as well as its superiority.

  17. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  18. Modeling biochemical transformation processes and information processing with Narrator

    Directory of Open Access Journals (Sweden)

    Palfreyman Niall M

    2007-03-01

    Full Text Available Abstract Background Software tools that model and simulate the dynamics of biological processes and systems are becoming increasingly important. Some of these tools offer sophisticated graphical user interfaces (GUIs, which greatly enhance their acceptance by users. Such GUIs are based on symbolic or graphical notations used to describe, interact and communicate the developed models. Typically, these graphical notations are geared towards conventional biochemical pathway diagrams. They permit the user to represent the transport and transformation of chemical species and to define inhibitory and stimulatory dependencies. A critical weakness of existing tools is their lack of supporting an integrative representation of transport, transformation as well as biological information processing. Results Narrator is a software tool facilitating the development and simulation of biological systems as Co-dependence models. The Co-dependence Methodology complements the representation of species transport and transformation together with an explicit mechanism to express biological information processing. Thus, Co-dependence models explicitly capture, for instance, signal processing structures and the influence of exogenous factors or events affecting certain parts of a biological system or process. This combined set of features provides the system biologist with a powerful tool to describe and explore the dynamics of life phenomena. Narrator's GUI is based on an expressive graphical notation which forms an integral part of the Co-dependence Methodology. Behind the user-friendly GUI, Narrator hides a flexible feature which makes it relatively easy to map models defined via the graphical notation to mathematical formalisms and languages such as ordinary differential equations, the Systems Biology Markup Language or Gillespie's direct method. This powerful feature facilitates reuse, interoperability and conceptual model development. Conclusion Narrator is a

  19. Modeling biochemical transformation processes and information processing with Narrator.

    Science.gov (United States)

    Mandel, Johannes J; Fuss, Hendrik; Palfreyman, Niall M; Dubitzky, Werner

    2007-03-27

    Software tools that model and simulate the dynamics of biological processes and systems are becoming increasingly important. Some of these tools offer sophisticated graphical user interfaces (GUIs), which greatly enhance their acceptance by users. Such GUIs are based on symbolic or graphical notations used to describe, interact and communicate the developed models. Typically, these graphical notations are geared towards conventional biochemical pathway diagrams. They permit the user to represent the transport and transformation of chemical species and to define inhibitory and stimulatory dependencies. A critical weakness of existing tools is their lack of supporting an integrative representation of transport, transformation as well as biological information processing. Narrator is a software tool facilitating the development and simulation of biological systems as Co-dependence models. The Co-dependence Methodology complements the representation of species transport and transformation together with an explicit mechanism to express biological information processing. Thus, Co-dependence models explicitly capture, for instance, signal processing structures and the influence of exogenous factors or events affecting certain parts of a biological system or process. This combined set of features provides the system biologist with a powerful tool to describe and explore the dynamics of life phenomena. Narrator's GUI is based on an expressive graphical notation which forms an integral part of the Co-dependence Methodology. Behind the user-friendly GUI, Narrator hides a flexible feature which makes it relatively easy to map models defined via the graphical notation to mathematical formalisms and languages such as ordinary differential equations, the Systems Biology Markup Language or Gillespie's direct method. This powerful feature facilitates reuse, interoperability and conceptual model development. Narrator is a flexible and intuitive systems biology tool. It is

  20. In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2018-01-01

    Full Text Available Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes. Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.

  1. Diagnostic and Prognostic Models for Generator Step-Up Transformers

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Nancy J. Lybeck; Binh T. Pham

    2014-09-01

    In 2014, the online monitoring (OLM) of active components project under the Light Water Reactor Sustainability program at Idaho National Laboratory (INL) focused on diagnostic and prognostic capabilities for generator step-up transformers. INL worked with subject matter experts from the Electric Power Research Institute (EPRI) to augment and revise the GSU fault signatures previously implemented in the Electric Power Research Institute’s (EPRI’s) Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. Two prognostic models were identified and implemented for GSUs in the FW-PHM Suite software. INL and EPRI demonstrated the use of prognostic capabilities for GSUs. The complete set of fault signatures developed for GSUs in the Asset Fault Signature Database of the FW-PHM Suite for GSUs is presented in this report. Two prognostic models are described for paper insulation: the Chendong model for degree of polymerization, and an IEEE model that uses a loading profile to calculates life consumption based on hot spot winding temperatures. Both models are life consumption models, which are examples of type II prognostic models. Use of the models in the FW-PHM Suite was successfully demonstrated at the 2014 August Utility Working Group Meeting, Idaho Falls, Idaho, to representatives from different utilities, EPRI, and the Halden Research Project.

  2. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  3. Application of Majoritarian Element to Improve IoT Communication

    Directory of Open Access Journals (Sweden)

    Tornike Dvali

    2016-06-01

    Full Text Available The work introduces the circle of the basic ideas and methods of error-free recovery of the binary signal to the multichannel digital technology based on the model of formal (artificial neuron and aims to contribute to the further development of this theo-ry of reliability. The work is useful for reservation or for exchange of a highly valuable information. During communication be-tween machines, connection related problems could occur and this work will be of a great help for machines to choose right channel for connection. Work also is a successful attempt of figuring out binary signal error recovery probability of minimum highest value. Moreover, binary channels optimization problems addressed by using threshold model and exploring three differ-ent approaches. In the future, this work will be used in Internet of Things (IoT for the exact communication between machines. Work will be used with threshold model for minimizing errors in the communication between things.

  4. How IoT, AAI Can Contribute to Smart Home and Smart Cities Services - the Role of Innovation

    DEFF Research Database (Denmark)

    Skouby, Knud Erik; Lynggaard, Per; Windekilde, Iwona Maria

    between ICT based infrastructure and innovation. The theory of innovation will be used to explain the phenomenon by which the technological and service innovation transforms existing cities into smart cities. We will demonstrate the innovative use of distributed IoT, CoT, AAI to solve problems in the area...... non-static concepts that evolve over time. To address these challenges the latest information and communication technology (ICT) including its available services is needed. ICT offers a concept that fuels sustainable economic development and a high quality of life together with a wise management...... of natural resources. A valuable smart city ICT infrastructure must be able to integrate the smart homes into a coherent smart city concept. Vitale elements in this concept are Internet of Things (IoT), Clouds of Things (CoT), and Artificial Intelligence (AI). The integration of a smart city, its embedded...

  5. Modeling of Solid State Transformer for the FREEDM System Demonstration

    Science.gov (United States)

    Jiang, Youyuan

    The Solid State Transformer (SST) is an essential component in the FREEDM system. This research focuses on the modeling of the SST and the controller hardware in the loop (CHIL) implementation of the SST for the support of the FREEDM system demonstration. The energy based control strategy for a three-stage SST is analyzed and applied. A simplified average model of the three-stage SST that is suitable for simulation in real time digital simulator (RTDS) has been developed in this study. The model is also useful for general time-domain power system analysis and simulation. The proposed simplified av-erage model has been validated in MATLAB and PLECS. The accuracy of the model has been verified through comparison with the cycle-by-cycle average (CCA) model and de-tailed switching model. These models are also implemented in PSCAD, and a special strategy to implement the phase shift modulation has been proposed to enable the switching model simulation in PSCAD. The implementation of the CHIL test environment of the SST in RTDS is described in this report. The parameter setup of the model has been discussed in detail. One of the dif-ficulties is the choice of the damping factor, which is revealed in this paper. Also the grounding of the system has large impact on the RTDS simulation. Another problem is that the performance of the system is highly dependent on the switch parameters such as voltage and current ratings. Finally, the functionalities of the SST have been realized on the platform. The distributed energy storage interface power injection and reverse power flow have been validated. Some limitations are noticed and discussed through the simulation on RTDS.

  6. Multi-linear model of transformation of runoff in river-basins

    International Nuclear Information System (INIS)

    Szolgay, J.; Kubes, R.

    2005-01-01

    The component part of atmospheric precipitations-runoff model of Hron River is a individual model of transformation of flows in river network, too, which transforms runoff from separate partial catchment basin into terminal profile. This component of precipitations-runoff model can also be used as individual hydrologic transformation model of runoff waves in river-basin. Identification and calibration of this model is realised independently on precipitations-runoff model of Hron River, which is described in this chapter in detail.

  7. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS ... Keywords: IoT; Cooja framework; Contiki OS; packet monitoring.

  8. Fault diagnosis model for power transformers based on information fusion

    Science.gov (United States)

    Dong, Ming; Yan, Zhang; Yang, Li; Judd, Martin D.

    2005-07-01

    Methods used to assess the insulation status of power transformers before they deteriorate to a critical state include dissolved gas analysis (DGA), partial discharge (PD) detection and transfer function techniques, etc. All of these approaches require experience in order to correctly interpret the observations. Artificial intelligence (AI) is increasingly used to improve interpretation of the individual datasets. However, a satisfactory diagnosis may not be obtained if only one technique is used. For example, the exact location of PD cannot be predicted if only DGA is performed. However, using diverse methods may result in different diagnosis solutions, a problem that is addressed in this paper through the introduction of a fuzzy information infusion model. An inference scheme is proposed that yields consistent conclusions and manages the inherent uncertainty in the various methods. With the aid of information fusion, a framework is established that allows different diagnostic tools to be combined in a systematic way. The application of information fusion technique for insulation diagnostics of transformers is proved promising by means of examples.

  9. Computer simulation of the martensite transformation in a model two-dimensional body

    International Nuclear Information System (INIS)

    Chen, S.; Khachaturyan, A.G.; Morris, J.W. Jr.

    1979-05-01

    An analytical model of a martensitic transformation in an idealized body is constructed and used to carry out a computer simulation of the transformation in a pseudo-two-dimensional crystal. The reaction is assumed to proceed through the sequential transformation of elementary volumes (elementary martensitic particles, EMP) via the Bain strain. The elastic interaction between these volumes is computed and the transformation path chosen so as to minimize the total free energy. The model transformation shows interesting qualitative correspondencies with the known features of martensitic transformations in typical solids

  10. Computer simulation of the martensite transformation in a model two-dimensional body

    International Nuclear Information System (INIS)

    Chen, S.; Khachaturyan, A.G.; Morris, J.W. Jr.

    1979-06-01

    An analytical model of a martensitic transformation in an idealized body is constructed and used to carry out a computer simulation of the transformation in a pseudo-two-dimensional crystal. The reaction is assumed to proceed through the sequential transformation of elementary volumes (elementary martensitic particles, EMP) via the Bain strain. The elastic interaction between these volumes is computed and the transformation path chosen so as to minimize the total free energy. The model transformation shows interesting qualitative correspondencies with the known features of martensitic transformations in typical solids

  11. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  12. Modeling of magnetization reversal processes in magnetic circuits of measuring transformers

    OpenAIRE

    Lebedev, Vladimir; Makarov, Arkadiy; Yablokov, Andrey; Filatova, Galina

    2015-01-01

    The article describes methods for modeling transient regimes in current and voltage transformers. In most studies measuring transformers are modeled in a stationary mode to determine their metrological characteristics. However, for safe uninterrupted operation of transformers and electrical networks it is necessary to carry out their research in dynamic mode. In particular, the study of the transformers stability to the ferroresonant phenomena occurring during switching o...

  13. 47 CFR 69.303 - Information origination/termination equipment (IOT).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Information origination/termination equipment (IOT). 69.303 Section 69.303 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... origination/termination equipment (IOT). Investment in all other IOT shall be apportioned between the Special...

  14. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics

  15. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  16. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  17. Atomistic modelling of diffusional phase transformations with elastic strain

    International Nuclear Information System (INIS)

    Mason, D R; Rudd, R E; Sutton, A P

    2004-01-01

    Phase transformations in 2xxx series aluminium alloys (Al-Cu-Mg) are investigated with an off-lattice atomistic kinetic Monte Carlo simulation incorporating the effects of strain around misfitting atoms and vacancies. Atomic interactions are modelled by Finnis-Sinclair potentials constructed for these simulations. Vacancy diffusion is modelled by comparing the energies of trial states, where the system is partially relaxed for each trial state. No special requirements are made about the description of atomic interactions, making our approach suitable for more fundamentally based models such as tight binding if sufficient computational resources are available. Only a limited precision is required for the energy of each trial state, determined by the value of k B T. Since the change in the relaxation displacement field caused by a vacancy hop decays as 1/r 3 , it is sufficient to determine the next move by relaxing only those atoms in a sphere of finite radius centred on the moving vacancy. However, once the next move has been selected, the entire system is relaxed. Simulations of the early stages of phase separation in Al-Cu with elastic relaxation show an enhanced rate of clustering compared to those performed on the same system with a rigid lattice

  18. A macroscopic model to simulate the mechanically induced martensitic transformation in metastable austenitic stainless steels

    International Nuclear Information System (INIS)

    Perdahcıoğlu, E.S.; Geijselaers, H.J.M.

    2012-01-01

    Mechanically induced martensitic transformation and the associated transformation plasticity phenomena in austenitic stainless steels are studied. The mechanisms responsible for the transformation are investigated and put into perspective based on experimental evidence. The stress and strain partitioning into the austenite and martensite phases are formulated using a mean-field homogenization approach. At this intermediate length-scale the average stress in the austenite phase is computed and utilized to compute the mechanical driving force resolved in the material. The amount of transformation and the transformation plasticity is derived as a function of the driving force. The mechanical response of the material is obtained by combining the homogenization and the transformation models. The model is verified by mechanical tests under biaxial loading conditions during which different transformation rates are observed. As a final verification of the model, a bending test is used which manifests the stress-state dependency of the transformation.

  19. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  20. Proof of Concept of Home IoT Connected Vehicles

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants’ intention correctly and to gain the required trust regarding the remote execution of tasks. PMID:28587246

  1. Modeling of Heavy Metal Transformation in Soil Ecosystem

    Science.gov (United States)

    Kalinichenko, Kira; Nikovskaya, Galina N.

    2017-04-01

    The intensification of industrial activity leads to an increase in heavy metals pollution of soils. In our opinion, sludge from biological treatment of municipal waste water, stabilized under aerobic-anaerobic conditions (commonly known as biosolid), may be considered as concentrate of natural soil. In their chemical, physical and chemical and biological properties these systems are similar gel-like nanocomposites. These contain microorganisms, humic substances, clay, clusters of nanoparticles of heavy metal compounds, and so on involved into heteropolysaccharides matrix. It is known that microorganisms play an important role in the transformation of different nature substances in soil and its health maintenance. The regularities of transformation of heavy metal compounds in soil ecosystem were studied at the model of biosolid. At biosolid swelling its structure changing (gel-sol transition, weakening of coagulation contacts between metal containing nanoparticles, microbial cells and metabolites, loosening and even destroying of the nanocomposite structure) can occur [1, 2]. The promotion of the sludge heterotrophic microbial activities leads to solubilization of heavy metal compounds in the system. The microbiological process can be realized in alcaligeneous or acidogeneous regimes in dependence on the type of carbon source and followed by the synthesis of metabolites with the properties of flocculants and heavy metals extragents [3]. In this case the heavy metals solubilization (bioleaching) in the form of nanoparticles of hydroxycarbonate complexes or water soluble complexes with oxycarbonic acids is observed. Under the action of biosolid microorganisms the heavy metals-oxycarbonic acids complexes can be transformed (catabolised) into nano-sizing heavy metals- hydroxycarbonates complexes. These ecologically friendly complexes and microbial heteropolysaccharides are able to interact with soil colloids, stay in the top soil profile, and improve soil structure due

  2. An Novel Architecture of Large-scale Communication in IOT

    Science.gov (United States)

    Ma, Wubin; Deng, Su; Huang, Hongbin

    2018-03-01

    In recent years, many scholars have done a great deal of research on the development of Internet of Things and networked physical systems. However, few people have made the detailed visualization of the large-scale communications architecture in the IOT. In fact, the non-uniform technology between IPv6 and access points has led to a lack of broad principles of large-scale communications architectures. Therefore, this paper presents the Uni-IPv6 Access and Information Exchange Method (UAIEM), a new architecture and algorithm that addresses large-scale communications in the IOT.

  3. The right tool for the right job : assessing model transformation quality

    NARCIS (Netherlands)

    Amstel, van M.F.

    2010-01-01

    Model-Driven Engineering (MDE) is a software engineering discipline in which models play a central role. One of the key concepts of MDE is model transformations. Because of the crucial role of model transformations in MDE, they have to be treated in a similar way as traditional software artifacts.

  4. Predicting birth weight with conditionally linear transformation models.

    Science.gov (United States)

    Möst, Lisa; Schmid, Matthias; Faschingbauer, Florian; Hothorn, Torsten

    2016-12-01

    Low and high birth weight (BW) are important risk factors for neonatal morbidity and mortality. Gynecologists must therefore accurately predict BW before delivery. Most prediction formulas for BW are based on prenatal ultrasound measurements carried out within one week prior to birth. Although successfully used in clinical practice, these formulas focus on point predictions of BW but do not systematically quantify uncertainty of the predictions, i.e. they result in estimates of the conditional mean of BW but do not deliver prediction intervals. To overcome this problem, we introduce conditionally linear transformation models (CLTMs) to predict BW. Instead of focusing only on the conditional mean, CLTMs model the whole conditional distribution function of BW given prenatal ultrasound parameters. Consequently, the CLTM approach delivers both point predictions of BW and fetus-specific prediction intervals. Prediction intervals constitute an easy-to-interpret measure of prediction accuracy and allow identification of fetuses subject to high prediction uncertainty. Using a data set of 8712 deliveries at the Perinatal Centre at the University Clinic Erlangen (Germany), we analyzed variants of CLTMs and compared them to standard linear regression estimation techniques used in the past and to quantile regression approaches. The best-performing CLTM variant was competitive with quantile regression and linear regression approaches in terms of conditional coverage and average length of the prediction intervals. We propose that CLTMs be used because they are able to account for possible heteroscedasticity, kurtosis, and skewness of the distribution of BWs. © The Author(s) 2014.

  5. Evaluation of Rule-based Modularization in Model Transformation Languages illustrated with ATL

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas; Jouault, Frédéric

    This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are identified on the base of the relations between source and target metamodels and on the base of generic transformation

  6. Rule-based modularization in model transformation languages illustrated with ATL

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas; Jouault, Frédéric

    2007-01-01

    This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are identified on the basis of relations between source and target metamodels and on the base of generic transformation

  7. Modeling of the Austenite-Martensite Transformation in Stainless and TRIP Steels

    NARCIS (Netherlands)

    Geijselaers, Hubertus J.M.; Hilkhuijsen, P.; Bor, Teunis Cornelis; Perdahcioglu, Emin Semih; van den Boogaard, Antonius H.; Zhang, S.-H.; Liu, X.-H.; Gheng, M.; Li, J.

    2013-01-01

    The transformation of austenite to martensite is a dominant factor in the description of the constitutive behavior during forming of TRIP assisted steels. To predict this transformation different models are currently available. In this paper the transformation is regarded as a stress induced process

  8. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  9. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  10. IoT European Large-Scale Pilots – Integration, Experimentation and Testing

    OpenAIRE

    Guillén, Sergio Gustavo; Sala, Pilar; Fico, Giuseppe; Arredondo, Maria Teresa; Cano, Alicia; Posada, Jorge; Gutierrez, Germán; Palau, Carlos; Votis, Konstantinos; Verdouw, Cor N.; Wolfert, Sjaak; Beers, George; Sundmaeker, Harald; Chatzikostas, Grigoris; Ziegler, Sébastien

    2017-01-01

    The IoT European Large-Scale Pilots Programme includes the innovation consortia that are collaborating to foster the deployment of IoT solutions in Europe through the integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions. The programme projects are targeted, goal-driven initiatives that propose IoT approaches to specific real-life industrial/societal challe...

  11. Institutional Transformation Version 2.5 Modeling and Planning.

    Energy Technology Data Exchange (ETDEWEB)

    Villa, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mizner, Jack H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Passell, Howard D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gallegos, Gerald R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Vetter, Douglas W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Christopher A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Addison, Marlin [Arizona State Univ., Mesa, AZ (United States); Schaffer, Matthew A. [Bridgers and Paxton Engineering Firm, Albuquerque, NM (United States); Higgins, Matthew W. [Vibrantcy, Albuquerque, NM (United States)

    2017-02-01

    Reducing the resource consumption and emissions of large institutions is an important step toward a sustainable future. Sandia National Laboratories' (SNL) Institutional Transformation (IX) project vision is to provide tools that enable planners to make well-informed decisions concerning sustainability, resource conservation, and emissions reduction across multiple sectors. The building sector has been the primary focus so far because it is the largest consumer of resources for SNL. The IX building module allows users to define the evolution of many buildings over time. The module has been created so that it can be generally applied to any set of DOE-2 ( http://doe2.com ) building models that have been altered to include parameters and expressions required by energy conservation measures (ECM). Once building models have been appropriately prepared, they are checked into a Microsoft Access (r) database. Each building can be represented by many models. This enables the capability to keep a continuous record of models in the past, which are replaced with different models as changes occur to the building. In addition to this, the building module has the capability to apply climate scenarios through applying different weather files to each simulation year. Once the database has been configured, a user interface in Microsoft Excel (r) is used to create scenarios with one or more ECMs. The capability to include central utility buildings (CUBs) that service more than one building with chilled water has been developed. A utility has been created that joins multiple building models into a single model. After using the utility, several manual steps are required to complete the process. Once this CUB model has been created, the individual contributions of each building are still tracked through meters. Currently, 120 building models from SNL's New Mexico and California campuses have been created. This includes all buildings at SNL greater than 10,000 sq. ft

  12. DYNAMICS MODEL OF MOISTURE IN PAPER INSULATION-TRANSFORMER OIL SYSTEM IN NON-STATIONARY THERMAL MODES OF THE POWER TRANSFORMER

    Directory of Open Access Journals (Sweden)

    V.V. Vasilevskij

    2016-06-01

    Full Text Available Introduction. An important problem in power transformers resource prognosis is the formation of moisture dynamics trends of transformer insulation. Purpose. Increasing the accuracy of power transformer insulation resource assessment based on accounting of moisture dynamics in interrelation with temperature dynamics. Working out of moisture dynamics model in paper insulation-transformer oil system in conjunction with thermodynamic model, load model and technical maintenance model. Methodology. The mathematical models used for describe the moisture dynamics are grounded on nonlinear differential equations. Interrelation moisture dynamics model with thermodynamic, load and technical maintenance models described by UML model. For confirming the adequacy of model used computer simulation. Results. We have implemented the model of moisture dynamics in power transformers insulation in interrelation with other models, which describe the state of power transformer in operation. The proposed model allows us to form detailed trends of moisture dynamics in power transformers insulation basing on monitoring data or power transformers operational factors simulation results. We have performed computer simulation of moisture exchange processes and calculation of transformer insulation resource for different moisture trends. Originality. The offered model takes into account moisture dynamics in power transformers insulation under the influence of changes of the power transformers thermal mode and operational factors. Practical value. The offered model can be used in power transformers monitoring systems for automation of resource assessment of oil-immersed power transformers paper insulation at different phase of lifecycle. Model also can be used for assessment of projected economic efficiency of power transformers exploitation in projected operating conditions.

  13. Comparing Transformation Possibilities of Topological Functioning Model and BPMN in the Context of Model Driven Architecture

    Directory of Open Access Journals (Sweden)

    Solomencevs Artūrs

    2016-05-01

    Full Text Available The approach called “Topological Functioning Model for Software Engineering” (TFM4SE applies the Topological Functioning Model (TFM for modelling the business system in the context of Model Driven Architecture. TFM is a mathematically formal computation independent model (CIM. TFM4SE is compared to an approach that uses BPMN as a CIM. The comparison focuses on CIM modelling and on transformation to UML Sequence diagram on the platform independent (PIM level. The results show the advantages and drawbacks the formalism of TFM brings into the development.

  14. Modelling and study on the output flow characteristics of expansion energy used hydropneumatic transformer

    Energy Technology Data Exchange (ETDEWEB)

    Shi, Yan; Wu, Tiecheng; Cai, Maolin; Liu, Chong [Beihang University, Beijing (China)

    2016-03-15

    Hydropneumatic transformer (short for HP transformer) is used to pump pressurized hydraulic oil. Whereas, due to its insufficient usage of energy and low efficiency, a new kind of HP transformer: EEUHP transformer (Expansion energy used hydropneumatic transformer) was proposed. To illustrate the characteristics of the EEUHP transformer, a mathematical model was built. To verify the mathematical model, an experimental prototype was setup and studied. Through simulation and experimental study on the EEUHP transformer, the influence of five key parameters on the output flow of the EEUHP transformer were obtained, and some conclusions can be drawn. Firstly, the mathematical model was proved to be valid. Furthermore, the EEUHP transformer costs fewer of compressed air than the normal HP transformer when the output flow of the two kinds of transformers are almost same. Moreover, with an increase in the output pressure, the output flow decreases sharply. Finally, with an increase in the effective area of hydraulic output port, the output flow increases distinctly. This research can be referred to in the performance and design optimization of the EEUHP transformers.

  15. Excitation spectrum and staggering transformations in lattice quantum models.

    Science.gov (United States)

    Faria da Veiga, Paulo A; O'Carroll, Michael; Schor, Ricardo

    2002-08-01

    We consider the energy-momentum excitation spectrum of diverse lattice Hamiltonian operators: the generator of the Markov semigroup of Ginzburg-Landau models with Langevin stochastic dynamics, the Hamiltonian of a scalar quantum field theory, and the Hamiltonian associated with the transfer matrix of a classical ferromagnetic spin system at high temperature. The low-lying spectrum consists of a one-particle state and a two-particle band. The two-particle spectrum is determined using a lattice version of the Bethe-Salpeter equation. In addition to the two-particle band, depending on the lattice dimension and on the attractive or repulsive character of the interaction between the particles of the system, there is, respectively, a bound state below or above the two-particle band. We show how the existence or nonexistence of these bound states can be understood in terms of a nonrelativistic single-particle lattice Schrödinger Hamiltonian with a delta potential. A staggering transformation relates the spectra of the attractive and the repulsive cases.

  16. Transformation of Malaysian Construction Industry with Building Information Modelling (BIM

    Directory of Open Access Journals (Sweden)

    Latiffi Aryani Ahmad

    2016-01-01

    Full Text Available Building Information Modelling (BIM is a revolution of technology and a process that transformed the way building is planned, designed, analysed, constructed and managed. The revolution of technology and process could increase the quality of construction projects. The knowledge of BIM has been expanding in many countries including Malaysia. Since its inception, the use of BIM has broadened up widely with different purposes. The aims of this paper is to investigate the BIM implementation and uses in Malaysian construction projects. The methodologies adopted for structuring this paper are by using literature review and semi-structured interview with construction players that have experienced and being involved in projects using BIM. The purpose of literature review is to illustrate on the pervious research on the subject matter. Meanwhile, the purpose of interviews is to explore the involvement of construction players, years of experience in projects using BIM and BIM uses in construction projects. The findings revealed that BIM has been implemented in Malaysia since 2007 by various construction players, which are client, architect, C&S engineer, M&E engineer, QS, contractor, facilities manager and BIM consultant. The findings also revealed that BIM is used for project’ visualisation, improving project design, detecting design clashes, quantity take off and operation and maintenance. Further work will be focused on the current practices of construction players in projects using BIM.

  17. Account of External Cooling Medium Temperature while Modeling Thermal Processes in Power Oil-Immersed Transformers

    OpenAIRE

    Yu. A. Rounov; O. G. Shirokov; D. I. Zalizny; D. M. Los

    2004-01-01

    The paper proposes a thermal model of a power oil-immersed transformer as a system of four homogeneous bodies: winding, oil, core and cooling medium. On the basis of experimental data it is shown that such model describes more precisely actual thermal processes taking place in a transformer than the thermal model accepted in GOST 14209-85.

  18. Account of External Cooling Medium Temperature while Modeling Thermal Processes in Power Oil-Immersed Transformers

    Directory of Open Access Journals (Sweden)

    Yu. A. Rounov

    2004-01-01

    Full Text Available The paper proposes a thermal model of a power oil-immersed transformer as a system of four homogeneous bodies: winding, oil, core and cooling medium. On the basis of experimental data it is shown that such model describes more precisely actual thermal processes taking place in a transformer than the thermal model accepted in GOST 14209-85.

  19. Modeling the transformation of atmospheric CO2 into microalgal biomass.

    Science.gov (United States)

    Hasan, Mohammed Fahad; Vogt, Frank

    2017-10-23

    Marine phytoplankton acts as a considerable sink of atmospheric CO 2 as it sequesters large quantities of this greenhouse gas for biomass production. To assess microalgae's counterbalancing of global warming, the quantities of CO 2 they fix need to be determined. For this task, it is mandatory to understand which environmental and physiological parameters govern this transformation from atmospheric CO 2 to microalgal biomass. However, experimental analyses are challenging as it has been found that the chemical environment has a major impact on the physiological properties of the microalgae cells (diameter typ. 5-20 μm). Moreover, the cells can only chemically interact with their immediate vicinity and thus compound sequestration needs to be studied on a microscopic spatial scale. Due to these reasons, computer simulations are a more promising approach than the experimental studies. Modeling software has been developed that describes the dissolution of atmospheric CO 2 into oceans followed by the formation of HCO 3 - which is then transported to individual microalgae cells. The second portion of this model describes the competition of different cell species for this HCO 3 - , a nutrient, as well as its uptake and utilization for cell production. Two microalgae species, i.e. Dunaliella salina and Nannochloropsis oculata, were cultured individually and in a competition situation under different atmospheric CO 2 conditions. It is shown that this novel model's predictions of biomass production are in very good agreement with the experimental flow cytometry results. After model validation, it has been applied to long-term prediction of phytoplankton generation. These investigations were motivated by the question whether or not cell production slows down as cultures grow. This is of relevance as a reduced cell production rate means that the increase in a culture's CO 2 -sinking capacity slows down as well. One implication resulting from this is that an increase in

  20. An IoT architecture for cloud connected electric vehicles

    NARCIS (Netherlands)

    Ramamurthy, P.

    2015-01-01

    This report presents the EV-user scenario as an use-case of a hyper-connected environment. The need for efforts on standardisation in the IoT world is explained with a detailed view of the software architecture to achieve it.

  1. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  2. Interoperability for smart appliances in the IoT world

    NARCIS (Netherlands)

    Daniele, L.; Solanki, M.; Hartog, F. den; Roes, J.

    2016-01-01

    Household appliances are set to become highly intelligent, smart and networked devices in the near future. Systematically deployed on the Internet of Things (IoT), they would be able to form complete energy consuming, producing, and managing ecosystems. Smart systems are technically very

  3. Modelling of Diffusive and Massive Phase Transformations in Binary Systems – Thick Interface Parametric Model

    Czech Academy of Sciences Publication Activity Database

    Svoboda, Jiří; Gamsjäger, E.

    2011-01-01

    Roč. 102, č. 6 (2011), s. 666-673 ISSN 1862-5282 R&D Projects: GA MŠk(CZ) OC10029 Institutional research plan: CEZ:AV0Z20410507 Keywords : modelling * phase transformation * ediffusion Subject RIV: BJ - Thermodynamics Impact factor: 0.830, year: 2011

  4. On the conformal transformations in the massless Thirring model

    International Nuclear Information System (INIS)

    Hadjiivanov, L.K.; Mikhov, S.G.; Stoyanov, D.T.

    1977-01-01

    On the basis of solutions for the massless scalar field in the two dimensional space-time the fields satisfying the renormalized Thirring equation are constructed. Both infinitesimal and global transformations with respect to the two-dimensional conformal group for these fields are obtained. The latter do not coincide with the standard ones. The renormalized Thirring equation is proved to be covariant under infinitesimal conformal group transformations as well as under the global transformations belonging to the universal covering of the conformal group

  5. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products.

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-10-11

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer's disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors' ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called 'aging in place' (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home.

  6. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Directory of Open Access Journals (Sweden)

    Sheik Mohammad Mostakim Fattah

    2017-10-01

    Full Text Available An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP. In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills through light and speaker at home but also wrist band and smartphone even outside the home.

  7. Transformer core modeling for magnetizing inrush current investigation

    Directory of Open Access Journals (Sweden)

    A.Yahiou

    2014-03-01

    Full Text Available The inrush currents generated during an energization of power transformer can reach very high values and may cause many problems in power system. This magnetizing inrush current which occurs at the time of energization of a transformer is due to temporary overfluxing in the transformer core. Its magnitude mainly depends on switching parameters such as the resistance of the primary winding and the point-on-voltage wave (switching angle. This paper describes a system for measuring the inrush current which is composed principally of an acquisition card (EAGLE, and LabVIEW code. The system is also capable of presetting various combinations of switching parameters for the energization of a 2 kVA transformer via an electronic card. Moreover, an algorithm for calculating the saturation curve is presented taking the iron core reactive losses into account, thereby producing a nonlinear inductance. This curve is used to simulate the magnetizing inrush current using the ATP-EMTP software.

  8. Modelling skin penetration using the Laplace transform technique.

    Science.gov (United States)

    Anissimov, Y G; Watkinson, A

    2013-01-01

    The Laplace transform is a convenient mathematical tool for solving ordinary and partial differential equations. The application of this technique to problems arising in drug penetration through the skin is reviewed in this paper. © 2013 S. Karger AG, Basel.

  9. DIGITAL TRANSFORMATION : HOW APIS DRIVE BUSINESS MODEL CHANGE AND INNOVATION

    OpenAIRE

    Hellbe, Simon; Leung, Peter

    2015-01-01

    Over the years, information technology has created opportunities to improve and extend businesses and to start conducting business in new ways. With the evolution of IT, all businesses and industries are becoming increasingly digitized. This process, or coevolution, of IT and business coming together is called digital transformation. One of the recent trends in this digital transformation is the use of application programmable interfaces (APIs). APIs are standardized digital communication int...

  10. Behavioural informatics for improving water hygiene practice based on IoT environment.

    Science.gov (United States)

    Fu, Yang; Wu, Wenyan

    2018-02-01

    The development of Internet of Things (IoT) and latest Information and Communication Technologies (ICT) have changed the nature of healthcare monitoring and health behaviour intervention in many applications. Water hygiene and water conservation behaviour intervention as important influence factors to human health are gaining much attentions for improving sustained sanitation practice. Based on face-to-face delivery, typical behaviour intervention method is costly and hardly to provide all day access to personalised intervention guidance and feedbacks. In this study, we presented a behavioural information system and water use behaviour model using IoT platform. Using Expanded Theory of Planned Behaviour (ETPB) and adopted structure equation model, this study offers a solution for understanding the behaviour intervention mechanism and methodology for developing empirical model. A case study of behaviour intervention model is presented by utilising residential water conservation behaviour data collected in China. Results suggested that cultural differences have significant influences on the understanding of intervention drivers, promoting projects and increasing awareness, which could improve the behaviour intervention efficiency and further facilitate the improvement of water hygiene practice. The performance evaluation of water saving dimension is discussed as well in the paper. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages

    DEFF Research Database (Denmark)

    Mendling, Jan; Lassen, Kristian Bisgaard; Zdun, Uwe

    2006-01-01

    Much recent research work discusses the transformation between different process modelling languages. This work, however, is mainly focussed on specific process modelling languages, and thus the general reusability of the applied transformation concepts is rather limited. In this paper, we aim...... to abstract from concrete transformation strategies by distinguishing two major paradigms for representing control flow in process modelling languages: block-oriented languages (such as BPEL and BPML) and graph-oriented languages (such as EPCs and YAWL). The contribution of this paper are generic strategies...... for transforming from block-oriented process languages to graph-oriented languages, and vice versa....

  12. Transformation of standardized clinical models based on OWL technologies: from CEM to OpenEHR archetypes.

    Science.gov (United States)

    Legaz-García, María del Carmen; Menárguez-Tortosa, Marcos; Fernández-Breis, Jesualdo Tomás; Chute, Christopher G; Tao, Cui

    2015-05-01

    The semantic interoperability of electronic healthcare records (EHRs) systems is a major challenge in the medical informatics area. International initiatives pursue the use of semantically interoperable clinical models, and ontologies have frequently been used in semantic interoperability efforts. The objective of this paper is to propose a generic, ontology-based, flexible approach for supporting the automatic transformation of clinical models, which is illustrated for the transformation of Clinical Element Models (CEMs) into openEHR archetypes. Our transformation method exploits the fact that the information models of the most relevant EHR specifications are available in the Web Ontology Language (OWL). The transformation approach is based on defining mappings between those ontological structures. We propose a way in which CEM entities can be transformed into openEHR by using transformation templates and OWL as common representation formalism. The transformation architecture exploits the reasoning and inferencing capabilities of OWL technologies. We have devised a generic, flexible approach for the transformation of clinical models, implemented for the unidirectional transformation from CEM to openEHR, a series of reusable transformation templates, a proof-of-concept implementation, and a set of openEHR archetypes that validate the methodological approach. We have been able to transform CEM into archetypes in an automatic, flexible, reusable transformation approach that could be extended to other clinical model specifications. We exploit the potential of OWL technologies for supporting the transformation process. We believe that our approach could be useful for international efforts in the area of semantic interoperability of EHR systems. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Energy-Neutral Data Collection Rate Control for IoT Animal Behavior Monitors

    Directory of Open Access Journals (Sweden)

    Jay Wilhelm

    2017-11-01

    Full Text Available Energy-neutral operation (ENO is a major concern for Internet of things (IoT sensor systems. Animals can be tagged with IoT sensors to monitor their movement and behavior. These sensors wirelessly upload collected data and can receive parameters to change their operation. Typically, the behavior monitors are powered by a battery where the system relies upon harvesting solar radiation for sustainable operation. Solar panels typically are used as the harvesting mechanism and can have a level of uncertainty regarding consistent energy delivery due to factors such as adverse weather, foliage, time of day, and individual animal behavior. The variability of available energy inevitably creates a trade-off in the rate at which data can be collected with respect to incoming and stored energy. The objective of this research was to investigate and simulate methods and parameters that can control the data collection rate of an IoT behavior monitor to achieve sustained operation with unknown and random energy harvesting. Analysis and development of a control system were performed by creating a software model of energy consumption and then simulating using different initial conditions and random energy harvesting rates for evaluation. The contribution of this effort was the exploration into the usage of a discrete-time gain scheduled Proportional–Integral–Derivative (PID that was tuned to a specific device configuration, using battery state of charge as an input, and found to maintain a battery level set-point, reject small solar harvesting energy disturbances, and maintain a consistent data collection rate throughout the day.

  14. A COMPREHENSIVE MODEL FOR THE POWER TRANSFORMER DIGITAL DIFFERENTIAL PROTECTION FUNCTIONING RESEARCH

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents a comprehensive model for the two-winding power transformer digital differential protection functioning research. Considered comprehensive model is developed in MatLab-Simulink dynamic simulation environment with the help of SimPowerSystems component library and includes the following elements: power supply, three-phase power transformer, wye-connected current transformers and two-winding power transformer digital differential protection model. Each element of the presented model is described in the degree sufficient for its implementation in the dynamic simulation environment. Particular attention is paid to the digital signal processing principles and to the ways of differential and restraining currents forming of the considered comprehensive model main element – power transformer digital differential protection. With the help of this model the power transformer digital differential protection functioning was researched during internal and external faults: internal short-circuit, external short-circuit with and without current transformers saturation on the power transformer low-voltage side. Each experiment is illustrated with differential and restraining currents waveforms of the digital differential protection under research. Particular attention was paid to the digital protection functioning analysis during power transformer abnormal modes: overexcitation and inrush current condition. Typical current waveforms during these modes were showed and their harmonic content was investigated. The causes of these modes were analyzed in details. Digital differential protection blocking algorithms based on the harmonic content were considered. Drawbacks of theses algorithms were observed and the need of their further technical improvement was marked.

  15. Understanding Service Composition with Non-functional Properties Using Declarative Model-to-model Transformations

    Directory of Open Access Journals (Sweden)

    Max Mäuhlhäuser

    2011-01-01

    Full Text Available Developing applications comprising service composition is a complex task. Therefore, to lower the skill barrier for developers, it is important to describe the problem at hand on an abstract level and not to focus on implementation details. This can be done using declarative programming which allows to describe only the result of the problem (which is what the developer wants rather than the description of the implementation. We therefore use purely declarative model-to-model transformations written in a universal model transformation language which is capable of handling even non functional properties using optimization and mathematical programming. This makes it easier to understand and describe service composition and non-functional properties for the developer.

  16. Comparison of BrainTool to other UML modeling and model transformation tools

    Science.gov (United States)

    Nikiforova, Oksana; Gusarovs, Konstantins

    2017-07-01

    In the last 30 years there were numerous model generated software systems offered targeting problems with the development productivity and the resulting software quality. CASE tools developed due today's date are being advertised as having "complete code-generation capabilities". Nowadays the Object Management Group (OMG) is calling similar arguments in regards to the Unified Modeling Language (UML) models at different levels of abstraction. It is being said that software development automation using CASE tools enables significant level of automation. Actual today's CASE tools are usually offering a combination of several features starting with a model editor and a model repository for a traditional ones and ending with code generator (that could be using a scripting or domain-specific (DSL) language), transformation tool to produce the new artifacts from the manually created and transformation definition editor to define new transformations for the most advanced ones. Present paper contains the results of CASE tool (mainly UML editors) comparison against the level of the automation they are offering.

  17. Efficient Finite Element Models for Calculation of the No-load losses of the Transformer

    Directory of Open Access Journals (Sweden)

    Kamran Dawood

    2017-10-01

    Full Text Available Different transformer models are examined for the calculation of the no-load losses using finite element analysis. Two-dimensional and three-dimensional finite element analyses are used for the simulation of the transformer. Results of the finite element method are also compared with the experimental results. The Result shows that 3-dimensional provide high accuracy as compared to the 2 dimensional full and half model. However, the 2-dimensional half model is the less time-consuming method as compared to the 3 and 2-dimensional full model. Simulation time duration taken by the different models of the transformer is also compared. The difference between the 3-dimensional finite element method and experimental results are less than 3%. These numerical methods can help transformer designers to minimize the development of the prototype transformers.

  18. Towards an automatic model transformation mechanism from UML state machines to DEVS models

    Directory of Open Access Journals (Sweden)

    Ariel González

    2015-08-01

    Full Text Available The development of complex event-driven systems requires studies and analysis prior to deployment with the goal of detecting unwanted behavior. UML is a language widely used by the software engineering community for modeling these systems through state machines, among other mechanisms. Currently, these models do not have appropriate execution and simulation tools to analyze the real behavior of systems. Existing tools do not provide appropriate libraries (sampling from a probability distribution, plotting, etc. both to build and to analyze models. Modeling and simulation for design and prototyping of systems are widely used techniques to predict, investigate and compare the performance of systems. In particular, the Discrete Event System Specification (DEVS formalism separates the modeling and simulation; there are several tools available on the market that run and collect information from DEVS models. This paper proposes a model transformation mechanism from UML state machines to DEVS models in the Model-Driven Development (MDD context, through the declarative QVT Relations language, in order to perform simulations using tools, such as PowerDEVS. A mechanism to validate the transformation is proposed. Moreover, examples of application to analyze the behavior of an automatic banking machine and a control system of an elevator are presented.

  19. A vision based top-view transformation model for a vehicle parking assistant.

    Science.gov (United States)

    Lin, Chien-Chuan; Wang, Ming-Shi

    2012-01-01

    This paper proposes the Top-View Transformation Model for image coordinate transformation, which involves transforming a perspective projection image into its corresponding bird's eye vision. A fitting parameters searching algorithm estimates the parameters that are used to transform the coordinates from the source image. Using this approach, it is not necessary to provide any interior and exterior orientation parameters of the camera. The designed car parking assistant system can be installed at the rear end of the car, providing the driver with a clearer image of the area behind the car. The processing time can be reduced by storing and using the transformation matrix estimated from the first image frame for a sequence of video images. The transformation matrix can be stored as the Matrix Mapping Table, and loaded into the embedded platform to perform the transformation. Experimental results show that the proposed approaches can provide a clearer and more accurate bird's eye view to the vehicle driver.

  20. Transformation of renormalization groups in 2N-component fermion hierarchical model

    International Nuclear Information System (INIS)

    Stepanov, R.G.

    2006-01-01

    The 2N-component fermion model on the hierarchical lattice is studied. The explicit formulae for renormalization groups transformation in the space of coefficients setting the Grassmannian-significant density of the free measure are presented. The inverse transformation of the renormalization group is calculated. The definition of immovable points of renormalization groups is reduced to solving the set of algebraic equations. The interesting connection between renormalization group transformations in boson and fermion hierarchical models is found out. It is shown that one transformation is obtained from other one by the substitution of N on -N [ru

  1. Internet of Things (IoT Platform for Structure Health Monitoring

    Directory of Open Access Journals (Sweden)

    Ahmed Abdelgawad

    2017-01-01

    Full Text Available Increase in the demand for reliable structural health information led to the development of Structural Health Monitoring (SHM. Prediction of upcoming accidents and estimation of useful life span of a structure are facilitated through SHM. While data sensing is the core of any SHM, tracking the data anytime anywhere is a prevailing challenge. With the advancement in information technology, the concept of Internet of Things (IoT has made it possible to integrate SHM with Internet to track data anytime anywhere. In this paper, a SHM platform embedded with IoT is proposed to detect the size and location of damage in structures. The proposed platform consists of a Wi-Fi module, a Raspberry Pi, an Analog to Digital Converter (ADC, a Digital to Analog Converter (DAC, a buffer, and piezoelectric (PZT sensors. The piezoelectric sensors are mounted as a pair in the structure. Data collected from the piezoelectric sensors will be used to detect the size and location of damage using a proposed mathematical model. Implemented on a Raspberry Pi, the proposed mathematical model will estimate the size and location of structural damage, if any, and upload the data to Internet. This data will be stored and can be checked remotely from any mobile device. The system has been validated using a real test bed in the lab.

  2. Transforming Collaborative Process Models into Interface Process Models by Applying an MDA Approach

    Science.gov (United States)

    Lazarte, Ivanna M.; Chiotti, Omar; Villarreal, Pablo D.

    Collaborative business models among enterprises require defining collaborative business processes. Enterprises implement B2B collaborations to execute these processes. In B2B collaborations the integration and interoperability of processes and systems of the enterprises are required to support the execution of collaborative processes. From a collaborative process model, which describes the global view of the enterprise interactions, each enterprise must define the interface process that represents the role it performs in the collaborative process in order to implement the process in a Business Process Management System. Hence, in this work we propose a method for the automatic generation of the interface process model of each enterprise from a collaborative process model. This method is based on a Model-Driven Architecture to transform collaborative process models into interface process models. By applying this method, interface processes are guaranteed to be interoperable and defined according to a collaborative process.

  3. Approach for an integral power transformer reliability model

    NARCIS (Netherlands)

    Schijndel, van A.; Wouters, P.A.A.F.; Steennis, E.F.; Wetzer, J.M.

    2012-01-01

    In electrical power transmission and distribution networks power transformers represent a crucial group of assets both in terms of reliability and investments. In order to safeguard the required quality at acceptable costs, decisions must be based on a reliable forecast of future behaviour. The aim

  4. The Living Dead: Transformative Experiences in Modelling Natural Selection

    Science.gov (United States)

    Petersen, Morten Rask

    2017-01-01

    This study considers how students change their coherent conceptual understanding of natural selection through a hands-on simulation. The results show that most students change their understanding. In addition, some students also underwent a transformative experience and used their new knowledge in a leisure time activity. These transformative…

  5. Remaining lifetime modelling for replacement of power transformer populations

    NARCIS (Netherlands)

    Schijndel, van A.; Wetzer, J.; Wouters, P.A.A.F.

    2008-01-01

    The age of the majority of power transformers applied in the western electricity network varies between 25 and 50 years. Depending on the load history and time of operation, replacement on short term is imminent. A technically sound policy concerning the replacement of these assets must be based on

  6. Value Creation in the Internet of Things: Mapping Business Models and Ecosystem Roles

    Directory of Open Access Journals (Sweden)

    Heini Ikävalko

    2018-03-01

    Full Text Available The increasing connectivity provided by the Internet of Things (IoT supports novel business opportunities for actors in overlapping service systems. Therefore, the co-creative nature of IoT business needs to be further studied. This article reports an empirical study on a European IoT initiative. It contributes to the understudied area of IoT ecosystem dynamics by describing different actor roles and activities in the IoT use cases, and their implications for value creation in IoT ecosystems. Our findings show how IoT ecosystem actors may take the roles of ideator, designer, or intermediary in different IoT design layers, and we recommend this perspective to better understand and describe ecosystem business models. We also discuss the theoretical and managerial implications of our findings.

  7. Optical fiber sensors for IoT and smart devices

    CERN Document Server

    Domingues, Maria de Fátima F

    2017-01-01

    This brief provides a review of the evolution of optical fiber sensing solutions and related applications. Unique production methods are presented and discussed, highlighting their evolution and analyzing their complexity. Under this scope, this brief presents the existing silica optical fiber sensors and polymer optical fiber sensors solutions, comparing its field of action (sensitivity, accuracy), complexity of manufacture and economic cost. Special attention is given to low-cost production methods. This brief evaluates the different existing techniques, assessing the accuracy and suitability of these sensors for possible Internet of Things (IoT) integration in different considered scenarios. Critical analytical techniques, also covered in this brief, are expected to play a key role in the world of IoT and the smart city of tomorrow.

  8. SMART CITY SERVICES DRIVEN BY IOT: A SYSTEMATIC REVIEW

    Directory of Open Access Journals (Sweden)

    Marko Mijac

    2017-09-01

    Full Text Available The central role in development of information society is taken by smart cities and their novel services through the use of modern technology and smart solutions. The key enabler and driver of smart cities is Internet of Things (IoT. In this paper, we have conducted a systematic literature review in order to investigate proposed smart city services driven by IoT. We have formulated the review protocol to define the research question/s, search strategy, selection criteria, study quality assessment, and data extraction strategy. We have defined the following main research question: What are the reported applications of Internet of Things in the development of smart city services? The papers were categorized by the smart city services they proposed or described. We have recognized the following categories: traffic and transport; environment monitoring; accessibility & healthcare; waste management; public lighting; energy management; city infrastructure; and other.

  9. Transportable IOT measurement station for direct-broadcast satellites

    Science.gov (United States)

    Ulbricht, Michael

    A transportable 11.7-12.5-GHz flux-density measurement facility for use in the in-orbit testing (IOT) of the FRG TV-Sat direct-broadcast satellites is described. Major components include a 1.2-m-diameter antenna, the fluxmeter, a radiometer to determine atmospheric attenuation, a weather station, and a control and data-processing computer; all of the components are mounted on a 5.10 x 2.35 x 2.70-m trailer. IOT performance parameters include gain/temperature ratio 15.9 dB/K, measurement range -97 to -117 dBW/sq m, measurement accuracy less than 0.5 dB rms, and measurement rate 250-650 msec. Photographs and a block diagram are provided.

  10. System dynamics modeling of the impact of Internet-of-Things on intelligent urban transportation

    OpenAIRE

    Marshall, Phil

    2015-01-01

    Urban transportation systems are at the cusp of a major transformation that capitalizes on the proliferation of the Internet-of-Things (IoT), autonomous and cooperative vehicular and intelligent roadway technologies, advanced traffic management systems, and big data analytics. The benefits of these smart-transportation technologies were investigated using System Dynamics modeling, with particular emphasis towards vehicle sharing, intelligent highway systems, and smart-parking solutions. The m...

  11. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  12. Successive canonical transformation in model two-body electrodynamics

    International Nuclear Information System (INIS)

    Raha, S.

    1978-10-01

    The possibility is investigated of bypassing the no interaction theorum of Currie, Jordan and Sudarshan for direct action Lagrangians. Starting with the field theoretic description of a two-body electrodynamic problem, the field variable is solved for in terms of the particle variables, which paves the way to write an action-at-a-distance Hamiltonian for the problem. A suitable transformation is found which uncouples the field and the particle variables in the interaction up to order e 2 . It is shown that this transformation leaves the statement of Newton's 2nd law unchanged which also agrees with the standard results of electrodynamics. This allows for the identification of canonical variables for the proper action-at-a-distance problem. 19 references

  13. Semantic Description of IoT Security for Smart Grid

    OpenAIRE

    Ayele, Getinet

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and counter measures for the main components of SHEMS such as Smart Meter, Smart Appliance, Home Gateway, and Billing data. The ontology extends the SAREF energy management ontology with s...

  14. IoT enabled Insurance Ecosystem - Possibilities Challenges and Risks

    OpenAIRE

    Manral, Jai

    2015-01-01

    Internet of Thing (IoT) is looking over to overhaul the business processes of many industries including insurance domain. The current line of business such as Property and Casualty, Health, and Life Insurance can avail tremendous benefits from the contextual and relevant data being generated from billions of connected devices; Smartphone's, wearable gadget and other electronic smart sensors. For P&C insurer's the biggest challenges is not the rapidly changing environment but tackling these ch...

  15. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh , Hossein; Hithnawi , Anwar; Duquennoy , Simon

    2017-01-01

    International audience; Today the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of ...

  16. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  17. An Energy-Efficient Compressive Image Coding for Green Internet of Things (IoT).

    Science.gov (United States)

    Li, Ran; Duan, Xiaomeng; Li, Xu; He, Wei; Li, Yanling

    2018-04-17

    Aimed at a low-energy consumption of Green Internet of Things (IoT), this paper presents an energy-efficient compressive image coding scheme, which provides compressive encoder and real-time decoder according to Compressive Sensing (CS) theory. The compressive encoder adaptively measures each image block based on the block-based gradient field, which models the distribution of block sparse degree, and the real-time decoder linearly reconstructs each image block through a projection matrix, which is learned by Minimum Mean Square Error (MMSE) criterion. Both the encoder and decoder have a low computational complexity, so that they only consume a small amount of energy. Experimental results show that the proposed scheme not only has a low encoding and decoding complexity when compared with traditional methods, but it also provides good objective and subjective reconstruction qualities. In particular, it presents better time-distortion performance than JPEG. Therefore, the proposed compressive image coding is a potential energy-efficient scheme for Green IoT.

  18. An Energy-Efficient Compressive Image Coding for Green Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Ran Li

    2018-04-01

    Full Text Available Aimed at a low-energy consumption of Green Internet of Things (IoT, this paper presents an energy-efficient compressive image coding scheme, which provides compressive encoder and real-time decoder according to Compressive Sensing (CS theory. The compressive encoder adaptively measures each image block based on the block-based gradient field, which models the distribution of block sparse degree, and the real-time decoder linearly reconstructs each image block through a projection matrix, which is learned by Minimum Mean Square Error (MMSE criterion. Both the encoder and decoder have a low computational complexity, so that they only consume a small amount of energy. Experimental results show that the proposed scheme not only has a low encoding and decoding complexity when compared with traditional methods, but it also provides good objective and subjective reconstruction qualities. In particular, it presents better time-distortion performance than JPEG. Therefore, the proposed compressive image coding is a potential energy-efficient scheme for Green IoT.

  19. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  20. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke

    2017-01-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219

  1. Warped linear mixed models for the genetic analysis of transformed phenotypes.

    Science.gov (United States)

    Fusi, Nicolo; Lippert, Christoph; Lawrence, Neil D; Stegle, Oliver

    2014-09-19

    Linear mixed models (LMMs) are a powerful and established tool for studying genotype-phenotype relationships. A limitation of the LMM is that the model assumes Gaussian distributed residuals, a requirement that rarely holds in practice. Violations of this assumption can lead to false conclusions and loss in power. To mitigate this problem, it is common practice to pre-process the phenotypic values to make them as Gaussian as possible, for instance by applying logarithmic or other nonlinear transformations. Unfortunately, different phenotypes require different transformations, and choosing an appropriate transformation is challenging and subjective. Here we present an extension of the LMM that estimates an optimal transformation from the observed data. In simulations and applications to real data from human, mouse and yeast, we show that using transformations inferred by our model increases power in genome-wide association studies and increases the accuracy of heritability estimation and phenotype prediction.

  2. An IoT Reader for Wireless Passive Electromagnetic Sensors.

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-03-28

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain.

  3. Seedbed based on IoT: A Case Study

    Directory of Open Access Journals (Sweden)

    J. Kalathas

    2016-05-01

    Full Text Available Nowadays, the Wireless Sensors Network (WSN and the Internet of Things (IOT are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed breeding procedure. Using the basic principles of Internet and WSN technology, precision agriculture systems based on the Internet of Things (IoT technology are explained in detail, especially in network architecture, hardware architecture and software process control of the precision seed breeding monitoring system. The implemented automation system monitors data from the sensors in a feedback loop which activates the control devices based on threshold value. The implementation of WSN in seedbed monitoring (SM will optimize the control of air temperature and humidity, soil humidity, air capacity, luminance while it will minimize the time of seed breeding and it will also maximize the number of seeds which become plants ready for transplantation.

  4. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  5. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  6. Computer-Aided Transformation of PDE Models: Languages, Representations, and a Calculus of Operations

    Science.gov (United States)

    2016-01-05

    Computer-aided transformation of PDE models: languages, representations, and a calculus of operations A domain-specific embedded language called...languages, representations, and a calculus of operations Report Title A domain-specific embedded language called ibvp was developed to model initial...Computer-aided transformation of PDE models: languages, representations, and a calculus of operations 1 Vision and background Physical and engineered systems

  7. MODELING AND SHIFTING FOCUS AS A FACILITATOR FOR INTENTIONAL EMERGENCE IN TRANSFORMATION DESIGN

    DEFF Research Database (Denmark)

    Nielsen, Louise Møller; Hansen, Poul H. Kyvsgård; Mabogunje, Ade

    2009-01-01

    In this paper we discuss the phenomenon "intentional emergence" in a transformation design context. We examine modeling and play enablers for intentional emergence and report on experiences with the Lego Serious Play method. The empirical observations are based on a real-time transformation design...

  8. Modelling the interaction between plasticity and the austenite-martensite transformation

    NARCIS (Netherlands)

    Kouznetsova, V.G.; Geers, M.G.D.

    2007-01-01

    Many advanced steels, such as high strength steels and TRIP steels, owe their excellent combination of strength and ductility to the complex microstructural behaviour involving the austenite to martensite phase transformation. In this paper a physically-based model for martensitic transformation

  9. Esscher transforms and the minimal entropy martingale measure for exponential Lévy models

    DEFF Research Database (Denmark)

    Hubalek, Friedrich; Sgarra, C.

    In this paper we offer a systematic survey and comparison of the Esscher martingale transform for linear processes, the Esscher martingale transform for exponential processes, and the minimal entropy martingale measure for exponential lévy models and present some new results in order to give...

  10. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  11. Proceedings First Workshop on Architectures, Languages and Paradigms for IoT

    OpenAIRE

    Pianini, Danilo; Salvaneschi, Guido

    2018-01-01

    The 1st workshop on Architectures, Languages and Paradigms for IoT (ALP4IoT 2017), was held in Turin on September 19th, 2017. ALP4IoT was a satellite event of the 13th International Conference on integrated Formal Methods (iFM 2017). The workshop aimed at critically reviewing the state-of-the-art and the state-of-the-practice of formal techniques and software methods for the IoT, presenting open problems and challenges and triggering a discussion among the participants with different views an...

  12. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  13. Involuntary outpatient treatment (iot) for severe mental patients: current situation in Spain.

    Science.gov (United States)

    Cañete-Nicolás, Carlos; Hernández-Viadel, Miguel; Bellido-Rodríguez, Carmen; Lera-Calatayud, Guillem; Asensio-Pascual, Pedro; Pérez-Prieto, Juan F; Calabuig-Crespo, Roman; Leal-Cercós, Carmen

    2012-01-01

    Involuntary Outpatient Treatment (IOT) expects to improve treatment compliance and, therefore, prevent the impairment of patients with severe mental illness, as well as the risk for them and others. Besides IOT introduction defenders and opponent's states, scientific literature offers contradictory results. Legislative changes have been taken in the vast majority of our neighbouring countries in order to regulate IOT application. There is no legal regulation in Spain; however, OIT application is possible in certain Spanish cities. This article reviews IOT in Spain and surrounding countries.

  14. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  15. Modelling of stresses generated in steels by phase transformations; Modelowanie naprezen wywolanych przemianami fazowymi w stalach

    Energy Technology Data Exchange (ETDEWEB)

    Dudek, K; Glowacki, M; Pietrzyk, M [Akademia Gorniczo-Hutnicza, Cracow (Poland)

    1999-07-01

    Numerical model describing stresses arising during phase transformations in steels products is presented. The full model consists of three components. The first component uses finite element solution of Fourier equation for an evaluation of the temperature field inside the sample. The second component predicts kinetics of phase transformation occurring during cooling of steel products. Coupling of these two components allows prediction of structure and properties of final products at room temperature. The third component uses elastic-plastic finite element model for prediction of stresses caused by non-uniform temperatures and by changes of volume during transformations. Typical results of simulations performed for cooling of rails after hot rolling are presented. (author)

  16. Potential transformation of trace species including aircraft exhaust in a cloud environment. The `Chedrom model`

    Energy Technology Data Exchange (ETDEWEB)

    Ozolin, Y.E.; Karol, I.L. [Main Geophysical Observatory, St. Petersburg (Russian Federation); Ramaroson, R. [Office National d`Etudes et de Recherches Aerospatiales (ONERA), 92 - Chatillon (France)

    1997-12-31

    Box model for coupled gaseous and aqueous phases is used for sensitivity study of potential transformation of trace gases in a cloud environment. The rate of this transformation decreases with decreasing of pH in droplets, with decreasing of photodissociation rates inside the cloud and with increasing of the droplet size. Model calculations show the potential formation of H{sub 2}O{sub 2} in aqueous phase and transformation of gaseous HNO{sub 3} into NO{sub x} in a cloud. This model is applied for exploration of aircraft exhausts evolution in plume inside a cloud. (author) 10 refs.

  17. Potential transformation of trace species including aircraft exhaust in a cloud environment. The `Chedrom model`

    Energy Technology Data Exchange (ETDEWEB)

    Ozolin, Y E; Karol, I L [Main Geophysical Observatory, St. Petersburg (Russian Federation); Ramaroson, R [Office National d` Etudes et de Recherches Aerospatiales (ONERA), 92 - Chatillon (France)

    1998-12-31

    Box model for coupled gaseous and aqueous phases is used for sensitivity study of potential transformation of trace gases in a cloud environment. The rate of this transformation decreases with decreasing of pH in droplets, with decreasing of photodissociation rates inside the cloud and with increasing of the droplet size. Model calculations show the potential formation of H{sub 2}O{sub 2} in aqueous phase and transformation of gaseous HNO{sub 3} into NO{sub x} in a cloud. This model is applied for exploration of aircraft exhausts evolution in plume inside a cloud. (author) 10 refs.

  18. Modelling and analysis of the transformer current resonance in dual active bridge converters

    DEFF Research Database (Denmark)

    Qin, Zian; Shen, Zhan; Blaabjerg, Frede

    2017-01-01

    Due to the parasitic capacitances of the transformer and inductor in Dual Active Bridge (DAB) converters, resonance happens in the transformer currents. This high frequency resonant current flowing into the full bridges will worsen their soft-switching performance and thereby reduce its efficiency....... In order to study the generation mechanism of this current resonance, the impedance of the transformer and inductor with parasitic components is modelled in this digest. Then, based on the impedance model, an approach is proposed to mitigate the current resonance. Finally, both the impedance model...

  19. The method for determination of parameters of the phenomenological continual model of soil organic matter transformation

    Directory of Open Access Journals (Sweden)

    S. I. Bartsev

    2015-06-01

    Full Text Available A possible method for experimental determination of parameters of the previously proposed continual mathematical model of soil organic matter transformation is theoretically considered in this paper. The previously proposed by the authors continual model of soil organic matter transformation, based on using the rate of matter transformation as a continual scale of its recalcitrance, describes the transformation process phenomenologically without going into detail of microbiological mechanisms of transformation. Thereby simplicity of the model is achieved. The model is represented in form of one differential equation in first­order partial derivatives, which has an analytical solution in elementary functions. The model equation contains a small number of empirical parameters which generally characterize environmental conditions where the matter transformation process occurs and initial properties of the plant litter. Given the values of these parameters, it is possible to calculate dynamics of soil organic matter stocks and its distribution over transformation rate. In the present study, possible approaches for determination of the model parameters are considered and a simple method of their experimental measurement is proposed. An experiment of an incubation of chemically homogeneous samples in soil and multiple sequential measurement of the sample mass loss with time is proposed. An equation of time dynamics of mass loss of incubated homogeneous sample is derived from the basic assumption of the presented soil organic matter transformation model. Thus, fitting by the least squares method the parameters of sample mass loss curve calculated according the proposed mass loss dynamics equation allows to determine the parameters of the general equation of soil organic transformation model.

  20. Intelligent Models Performance Improvement Based on Wavelet Algorithm and Logarithmic Transformations in Suspended Sediment Estimation

    Directory of Open Access Journals (Sweden)

    R. Hajiabadi

    2016-10-01

    Full Text Available Introduction One reason for the complexity of hydrological phenomena prediction, especially time series is existence of features such as trend, noise and high-frequency oscillations. These complex features, especially noise, can be detected or removed by preprocessing. Appropriate preprocessing causes estimation of these phenomena become easier. Preprocessing in the data driven models such as artificial neural network, gene expression programming, support vector machine, is more effective because the quality of data in these models is important. Present study, by considering diagnosing and data transformation as two different preprocessing, tries to improve the results of intelligent models. In this study two different intelligent models, Artificial Neural Network and Gene Expression Programming, are applied to estimation of daily suspended sediment load. Wavelet transforms and logarithmic transformation is used for diagnosing and data transformation, respectively. Finally, the impacts of preprocessing on the results of intelligent models are evaluated. Materials and Methods In this study, Gene Expression Programming and Artificial Neural Network are used as intelligent models for suspended sediment load estimation, then the impacts of diagnosing and logarithmic transformations approaches as data preprocessor are evaluated and compared to the result improvement. Two different logarithmic transforms are considered in this research, LN and LOG. Wavelet transformation is used to time series denoising. In order to denoising by wavelet transforms, first, time series can be decomposed at one level (Approximation part and detail part and second, high-frequency part (detail will be removed as noise. According to the ability of gene expression programming and artificial neural network to analysis nonlinear systems; daily values of suspended sediment load of the Skunk River in USA, during a 5-year period, are investigated and then estimated.4 years of

  1. A Power Transformers Fault Diagnosis Model Based on Three DGA Ratios and PSO Optimization SVM

    Science.gov (United States)

    Ma, Hongzhe; Zhang, Wei; Wu, Rongrong; Yang, Chunyan

    2018-03-01

    In order to make up for the shortcomings of existing transformer fault diagnosis methods in dissolved gas-in-oil analysis (DGA) feature selection and parameter optimization, a transformer fault diagnosis model based on the three DGA ratios and particle swarm optimization (PSO) optimize support vector machine (SVM) is proposed. Using transforming support vector machine to the nonlinear and multi-classification SVM, establishing the particle swarm optimization to optimize the SVM multi classification model, and conducting transformer fault diagnosis combined with the cross validation principle. The fault diagnosis results show that the average accuracy of test method is better than the standard support vector machine and genetic algorithm support vector machine, and the proposed method can effectively improve the accuracy of transformer fault diagnosis is proved.

  2. Army Business Transformation: The Utility of Using Corporate Business Models within the Institutional Army

    National Research Council Canada - National Science Library

    Bailer, Jr., John J

    2007-01-01

    .... This study finds that working corporate models, such as Lean Six Sigma (LSS), are available which are already enabling the transformation of a very specific aspect within the institutional Army...

  3. Wave Transformation Over Reefs: Evaluation of One-Dimensional Numerical Models

    National Research Council Canada - National Science Library

    Demirbilek, Zeki; Nwogu, Okey G; Ward, Donald L; Sanchez, Alejandro

    2009-01-01

    Three one-dimensional (1D) numerical wave models are evaluated for wave transformation over reefs and estimates of wave setup, runup, and ponding levels in an island setting where the beach is fronted by fringing reef and lagoons...

  4. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  5. Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars - Extended Version

    OpenAIRE

    Hermann, Frank; Ehrig, Hartmut; Orejas, Fernando; Ulrike, Golas

    2010-01-01

    Triple Graph Grammars (TGGs) are a well-established concept for the specification of model transformations. In previous work we have formalized and analyzed already crucial properties of model transformations like termination, correctness and completeness, but functional behaviour - especially local confluence - is missing up to now. In order to close this gap we generate forward translation rules, which extend standard forward rules by translation attributes keeping track of the elements whi...

  6. Prospective of Transformation of Current Models of the Global Pharmaceutical Market

    Directory of Open Access Journals (Sweden)

    Yuriy Solodkovskyy

    2012-02-01

    Full Text Available This article thoroughly analyzes the current state of the global pharmaceutical market, defines the key factors for its development and outlines the promising areas of transformation of existing business models of top companies. The forecasted data relating to the market development until 2015 have been investigated. The global, market, technological and organizational factors of transformation of modern model of the global pharmaceutical market have been identified.

  7. Day-ahead electricity price forecasting using wavelet transform combined with ARIMA and GARCH models

    International Nuclear Information System (INIS)

    Tan, Zhongfu; Zhang, Jinliang; Xu, Jun; Wang, Jianhui

    2010-01-01

    This paper proposes a novel price forecasting method based on wavelet transform combined with ARIMA and GARCH models. By wavelet transform, the historical price series is decomposed and reconstructed into one approximation series and some detail series. Then each subseries can be separately predicted by a suitable time series model. The final forecast is obtained by composing the forecasted results of each subseries. This proposed method is examined on Spanish and PJM electricity markets and compared with some other forecasting methods. (author)

  8. Kinetic model for transformation from nano-sized amorphous $TiO_2$ to anatase

    OpenAIRE

    Madras, Giridhar; McCoy, Benjamin J

    2006-01-01

    We propose a kinetic model for the transformation of nano-sized amorphous $TiO_2$ to anatase with associated coarsening by coalescence. Based on population balance (distribution kinetics) equations for the size distributions, the model applies a first-order rate expression for transformation combined with Smoluchowski coalescence for the coarsening particles. Size distribution moments (number and mass of particles) lead to dynamic expressions for extent of reaction and average anatase particl...

  9. Application of Tissue Culture and Transformation Techniques in Model Species Brachypodium distachyon.

    Science.gov (United States)

    Sogutmaz Ozdemir, Bahar; Budak, Hikmet

    2018-01-01

    Brachypodium distachyon has recently emerged as a model plant species for the grass family (Poaceae) that includes major cereal crops and forage grasses. One of the important traits of a model species is its capacity to be transformed and ease of growing both in tissue culture and in greenhouse conditions. Hence, plant transformation technology is crucial for improvements in agricultural studies, both for the study of new genes and in the production of new transgenic plant species. In this chapter, we review an efficient tissue culture and two different transformation systems for Brachypodium using most commonly preferred gene transfer techniques in plant species, microprojectile bombardment method (biolistics) and Agrobacterium-mediated transformation.In plant transformation studies, frequently used explant materials are immature embryos due to their higher transformation efficiencies and regeneration capacity. However, mature embryos are available throughout the year in contrast to immature embryos. We explain a tissue culture protocol for Brachypodium using mature embryos with the selected inbred lines from our collection. Embryogenic calluses obtained from mature embryos are used to transform Brachypodium with both plant transformation techniques that are revised according to previously studied protocols applied in the grasses, such as applying vacuum infiltration, different wounding effects, modification in inoculation and cocultivation steps or optimization of bombardment parameters.

  10. Kinetic modeling of solid-state partitioning phase transformation with simultaneous misfit accommodation

    International Nuclear Information System (INIS)

    Song, Shaojie; Liu, Feng

    2016-01-01

    Considering a spherical misfitting precipitate growing into a finite elastic-perfectly plastic supersaturated matrix, a kinetic modeling for such solid-state partitioning phase transformation is presented, where the interactions of interface migration, solute diffusion and misfit accommodation are analyzed. The linkage between interface migration and solute diffusion proceeds through interfacial composition and interface velocity; their effects on misfit accommodation are mainly manifested in an effective transformation strain, which depends on instantaneous composition field and precipitate size. Taking γ to α transformation of a binary Fe-0.5 at.% C alloy under both isothermal and continuous cooling conditions as examples, the effects of misfit accommodation on the coupling interface migration and solute diffusion are well evaluated and discussed. For the isothermal transformation, a counterbalancing influence between mechanical and chemical driving forces is found so that the mixed-mode transformation kinetics is not sensitive with respect to the elastic–plastic accommodation of the effective misfit strain. Different from the isothermal process, during the continuous cooling condition, the effects of misfit accommodation on the kinetics of solid-state partitioning phase transformation are mainly manifested in the great decrease of the transformation starting temperature and the thermodynamic equilibrium composition. The present kinetic modeling was applied to predict the experimentally measured γ/α transformation of Fe-0.47 at.% C alloy conducted with a cooling rate of 10 K min −1 and a good agreement was achieved.

  11. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  12. The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  13. Give me a hint: An ID-free small data transmission protocol for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Huang, Teng-Wei; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  14. Theory of the Anderson impurity model: The Schrieffer endash Wolff transformation reexamined

    International Nuclear Information System (INIS)

    Kehrein, S.K.; Mielke, A.

    1996-01-01

    We test the method of infinitesimal unitary transformations recently introduced by Wegner on the Anderson single impurity model. It is demonstrated that infinitesimal unitary transformations in contrast to the Schrieffer endash Wolff transformation allow the construction of an effective Kondo Hamiltonian consistent with the established results in this well understood model. The main reason for this is the intrinsic energy scale separation of Wegner close-quote s approach with respect to arbitrary energy differences coupled by matrix elements. This allows the construction of an effective Hamiltonian without facing a vanishing energy denominator problem. Similar energy denominator problems are troublesome in many models. Infinitesimal unitary transformations have the potential to provide a general framework for the systematic derivation of effective Hamiltonians without such problems. Copyright copyright 1996 Academic Press, Inc

  15. A Poisson-Fault Model for Testing Power Transformers in Service

    Directory of Open Access Journals (Sweden)

    Dengfu Zhao

    2014-01-01

    Full Text Available This paper presents a method for assessing the instant failure rate of a power transformer under different working conditions. The method can be applied to a dataset of a power transformer under periodic inspections and maintenance. We use a Poisson-fault model to describe failures of a power transformer. When investigating a Bayes estimate of the instant failure rate under the model, we find that complexities of a classical method and a Monte Carlo simulation are unacceptable. Through establishing a new filtered estimate of Poisson process observations, we propose a quick algorithm of the Bayes estimate of the instant failure rate. The proposed algorithm is tested by simulation datasets of a power transformer. For these datasets, the proposed estimators of parameters of the model have better performance than other estimators. The simulation results reveal the suggested algorithms are quickest among three candidates.

  16. An extended analytical model for solid-state phase transformation upon continuous heating and cooling processes: Application in γ/α transformation

    International Nuclear Information System (INIS)

    Jiang, Y.-H.; Liu, F.; Song, S.-J.

    2012-01-01

    An extended analytical model is derived for non-isothermal solid-state phase transformation assuming interface-controlled growth mode, e.g. polymorphic or allotropic transformation. In the modeling, incorporation of thermodynamic factor into kinetics of nucleation and growth is performed, so that the model can be used to describe the transformation occurring either near or far from the equilibrium state. Furthermore, the effect of the initial transformation temperature is included through a special treatment for the “temperature integral”, so that the model can be used to depict the transformation during either continuous heating or continuous cooling. Numerical calculations demonstrate that the extended analytical model is accurate enough for practical use. On this basis, a general rate equation for non-isothermal (isochronal heating and cooling) transformation is derived. Applying the present model, the overall kinetic behavior of γ/α transformation in binary substitutional Fe-based alloys (e.g. Fe–Mn and Fe–Cu) upon cooling, measured by dilatometry, is described successfully. Compared with previous work, where a site saturation assumption is generally made, the prevalence of continuous nucleation deduced using the present model prediction seems more reasonable.

  17. Organoids as Models for Neoplastic Transformation | Office of Cancer Genomics

    Science.gov (United States)

    Cancer models strive to recapitulate the incredible diversity inherent in human tumors. A key challenge in accurate tumor modeling lies in capturing the panoply of homo- and heterotypic cellular interactions within the context of a three-dimensional tissue microenvironment. To address this challenge, researchers have developed organotypic cancer models (organoids) that combine the 3D architecture of in vivo tissues with the experimental facility of 2D cell lines.

  18. Ultra-low power analog-digital converters for IoT

    NARCIS (Netherlands)

    Harpe, P.J.A.; Alioto, Massimo

    2017-01-01

    This chapter addresses ADCs for IoT nodes, which are needed to digitize sensor information before processing, storage or wireless transmission. ADCs are also required for the radio communication channel. This chapter focusses on successive approximation (SAR) ADCs, a popular architecture for IoT

  19. The relevance of technological autonomy in the acceptance of IoT services in retail

    NARCIS (Netherlands)

    Constantinides, Efthymios; Kahlert, Marius; de Vries, Sjoerd A.

    2017-01-01

    The Internet of Things (IoT) represents a shift towards a digitally enriched environment connecting smart objects and users that promises to provide retailers with innovative ways to approach their customers. IoT technologies differ from previous innovations as they are ubiquitous, intelligent and

  20. Enabling interoperability-as-a-service for connected IoT infrastructures and Smart Objects

    DEFF Research Database (Denmark)

    Hovstø, Asbjørn; Guan, Yajuan; Quintero, Juan Carlos Vasquez

    2018-01-01

    Lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of non-interoperable infrastructu...

  1. IoT: Tecnologías, usos, tendencias y desarrollo futuro

    OpenAIRE

    Bliznakoff del Valle, David J.

    2015-01-01

    Trabajo de investigación sobre el estado del IoT en el año 2014, previsiones de crecimiento y tecnologías futuras. Treball de recerca sobre l'estat del IoT l'any 2014, previsions de creixement i tecnologies futures. Master thesis for the Telecommunication Technologies program.

  2. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  3. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid; Elsawy, Hesham; Zhu, Quanyan; Alouini, Mohamed-Slim

    2017-01-01

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple

  4. A self-supporting wireless IoT node that uses kinetic energy harvesting

    DEFF Research Database (Denmark)

    Lynggaard, Per

    2017-01-01

    The Internet-of-Things (IoT) is expected to be the next revolution of the internet where trillions of IoT nodes will be deployed on a global scale. It is foreseen that a considerable part of these will be deployed in smart buildings and smart homes where they will provide innovative solutions...

  5. Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices...

  6. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  7. Flexibility of three differential constitutive models evaluated by large amplitude oscillatory shear and Fourier transform rheology

    Czech Academy of Sciences Publication Activity Database

    Pivokonský, Radek; Filip, Petr; Zelenková, Jana

    2016-01-01

    Roč. 104, č. 8 (2016), s. 171-178 ISSN 0032-3861 Institutional support: RVO:67985874 Keywords : LAOS * fourier transform rheology * Giesekus model * PTT model * modified XPP model * poly(ethylene oxide) Subject RIV: BK - Fluid Dynamics Impact factor: 3.684, year: 2016

  8. Modeling of soft impingement effect during solid-state partitioning phase transformations in binary alloys

    NARCIS (Netherlands)

    Chen, H.; Van der Zwaag, S.

    2010-01-01

    The soft impingement effect at the later stage of partitioning phase transformations has been modeled both for the diffusion-controlled growth model and for the mixed-mode model. Instead of the linear and exponential approximations for the concentration gradient in front of the interface used in the

  9. Adopting the Essence Framework to Derive a Practice Library for the Development of IoT Systems

    NARCIS (Netherlands)

    Giray, Görkem; Tekinerdogan, B.; Tüzün, E.

    2018-01-01

    The Internet of Things (IoT) is a global network of smart devices which enables these objects to collect and exchange data. Research in the IoT is still progressing, and it is now being applied in various domains. One of the key observations is that the development of IoT systems is not trivial and

  10. Digital Modulation Identification Model Using Wavelet Transform and Statistical Parameters

    Directory of Open Access Journals (Sweden)

    P. Prakasam

    2008-01-01

    Full Text Available A generalized modulation identification scheme is developed and presented. With the help of this scheme, the automatic modulation classification and recognition of wireless communication signals with a priori unknown parameters are possible effectively. The special features of the procedure are the possibility to adapt it dynamically to nearly all modulation types, and the capability to identify. The developed scheme based on wavelet transform and statistical parameters has been used to identify M-ary PSK, M-ary QAM, GMSK, and M-ary FSK modulations. The simulated results show that the correct modulation identification is possible to a lower bound of 5 dB. The identification percentage has been analyzed based on the confusion matrix. When SNR is above 5 dB, the probability of detection of the proposed system is more than 0.968. The performance of the proposed scheme has been compared with existing methods and found it will identify all digital modulation schemes with low SNR.

  11. Modelling of Sudan’s Energy Supply, Transformation, and Demand

    Directory of Open Access Journals (Sweden)

    Ali A. Rabah

    2016-01-01

    Full Text Available The study aimed to develop energy flow diagram (Sankey diagram of Sudan for the base year 2014. The developed Sankey diagram is the first of its kind in Sudan. The available energy balance for the base year 2012 is a simple line draw and did not count the energy supply by private and mixed sectors such as sugar and oil industries and marine and civil aviation. The private and mixed sectors account for about 7% of the national grid electric power. Four energy modules are developed: resources, transformation, demand, and export and import modules. The data are obtained from relevant Sudanese ministries and directorates and Sudan Central Bank. “e!Sankey 4 pro” software is used to develop the Sankey diagram. The main primary types of energy in Sudan are oil, hydro, biomass, and renewable energy. Sudan has a surplus of gasoline, petroleum coke, and biomass and deficit in electric power, gasoil, jet oil, and LPG. The surplus of gasoline is exported; however, the petroleum coke is kept as reserve. The deficit is covered by import. The overall useful energy is 76% and the loss is 24%. The useful energy is distributed among residential (38%, transportation (33%, industry (12%, services (16%, and agriculture (1% sectors.

  12. Degenerate Blume-Emery-Griffiths model for the martensitic transformation

    DEFF Research Database (Denmark)

    Vives, E.; Castan, T.; Lindgård, Per-Anker

    1996-01-01

    A generalization of the Blume-Emery-Griffiths model is introduced in which an entropy stabilization of the high-temperature phase is controlled by a degeneracy parameter p greater than or equal to 1. The model describes a first- and a second-order phase transition as a function of temperature bet...

  13. The linear transformation model with frailties for the analysis of item response times.

    Science.gov (United States)

    Wang, Chun; Chang, Hua-Hua; Douglas, Jeffrey A

    2013-02-01

    The item response times (RTs) collected from computerized testing represent an underutilized source of information about items and examinees. In addition to knowing the examinees' responses to each item, we can investigate the amount of time examinees spend on each item. In this paper, we propose a semi-parametric model for RTs, the linear transformation model with a latent speed covariate, which combines the flexibility of non-parametric modelling and the brevity as well as interpretability of parametric modelling. In this new model, the RTs, after some non-parametric monotone transformation, become a linear model with latent speed as covariate plus an error term. The distribution of the error term implicitly defines the relationship between the RT and examinees' latent speeds; whereas the non-parametric transformation is able to describe various shapes of RT distributions. The linear transformation model represents a rich family of models that includes the Cox proportional hazards model, the Box-Cox normal model, and many other models as special cases. This new model is embedded in a hierarchical framework so that both RTs and responses are modelled simultaneously. A two-stage estimation method is proposed. In the first stage, the Markov chain Monte Carlo method is employed to estimate the parametric part of the model. In the second stage, an estimating equation method with a recursive algorithm is adopted to estimate the non-parametric transformation. Applicability of the new model is demonstrated with a simulation study and a real data application. Finally, methods to evaluate the model fit are suggested. © 2012 The British Psychological Society.

  14. Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA

    Directory of Open Access Journals (Sweden)

    Martin Kardos

    2010-06-01

    Full Text Available Information system’s models on higher level of abstraction have become a daily routine in many software companies. The concept of Model Driven Architecture (MDA published by standardization body OMG1 since 2001 has become a concept for creation of software applications and information systems. MDA specifies four levels of abstraction: top three levels are created as graphical models and the last one as implementation code model. Many research works of MDA are focusing on the lower levels and transformations between each other. The top level of abstraction, called Computation Independent Model (CIM and its transformation to the lower level called Platform Independent Model (PIM is not so extensive research topic. Considering to a great importance and usability of this level in practice of IS2Keywords: transformation, MDA, CIM, PIM, UML, DFD. development now our research activity is focused to this highest level of abstraction – CIM and its possible transformation to the lower PIM level. In this article we are presenting a possible solution of CIM modeling and its analytic method of transformation to PIM.

  15. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  16. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  17. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  18. BIG data based on healthcare analysis using IOT devices

    Science.gov (United States)

    Priyanka, A.; Parimala, M.; Sudheer, K.; Thippareddy; Kaluri, Rajesh; Lakshmanna, Kuruva; Reddy, M. Praveen Kumar

    2017-11-01

    IOT (INTERNET OF THINGS) makes the brilliant protest in social insurance. The heterogeneous registering, remotely imparting arrangement of gadget that interfaces with human body and wellbeing gave to analyse, screen, track and store virtual factual and restorative data. In this paper, quiet individual data and wellbeing condition will be dissect by the specialist and they can see the patient condition and furthermore give the correct answer for the patient. The more number of information (huge information) will store and move into the specific association record framework. It makes conceivable to social occasion of rich data demonstrative of our physical and psychological wellness.

  19. An IoT Based Predictive Connected Car Maintenance Approach

    OpenAIRE

    Rohit Dhall; Vijender Kumar Solanki

    2017-01-01

    Internet of Things (IoT) is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This pape...

  20. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  1. Business model transformation process in the context of business ecosystem

    OpenAIRE

    Heikkinen, A.-M. (Anne-Mari)

    2014-01-01

    Abstract It is current phenomena that business environment has changed and has set new requirements for companies. Companies must adapt to the changes comes from outside its normal business environment and take into consideration wider business environment where it operates. These changes also have set new demands for company business model. Companies Business models need to be changed to match state of art business environ...

  2. Modular transformations of conformal blocks in WZW models on Riemann surfaces of higher genus

    International Nuclear Information System (INIS)

    Miao Li; Ming Yu.

    1989-05-01

    We derive the modular transformations for conformal blocks in Wess-Zumino-Witten models on Riemann surfaces of higher genus. The basic ingredient consists of using the Chern-Simons theory developed by Witten. We find that the modular transformations generated by Dehn twists are linear combinations of Wilson line operators, which can be expressed in terms of braiding matrices. It can also be shown that modular transformation matrices for g > 0 Riemann surfaces depend only on those for g ≤ 3. (author). 13 refs, 15 figs

  3. Doubly sparse factor models for unifying feature transformation and feature selection

    International Nuclear Information System (INIS)

    Katahira, Kentaro; Okanoya, Kazuo; Okada, Masato; Matsumoto, Narihisa; Sugase-Miyamoto, Yasuko

    2010-01-01

    A number of unsupervised learning methods for high-dimensional data are largely divided into two groups based on their procedures, i.e., (1) feature selection, which discards irrelevant dimensions of the data, and (2) feature transformation, which constructs new variables by transforming and mixing over all dimensions. We propose a method that both selects and transforms features in a common Bayesian inference procedure. Our method imposes a doubly automatic relevance determination (ARD) prior on the factor loading matrix. We propose a variational Bayesian inference for our model and demonstrate the performance of our method on both synthetic and real data.

  4. Doubly sparse factor models for unifying feature transformation and feature selection

    Energy Technology Data Exchange (ETDEWEB)

    Katahira, Kentaro; Okanoya, Kazuo; Okada, Masato [ERATO, Okanoya Emotional Information Project, Japan Science Technology Agency, Saitama (Japan); Matsumoto, Narihisa; Sugase-Miyamoto, Yasuko, E-mail: okada@k.u-tokyo.ac.j [Human Technology Research Institute, National Institute of Advanced Industrial Science and Technology, Ibaraki (Japan)

    2010-06-01

    A number of unsupervised learning methods for high-dimensional data are largely divided into two groups based on their procedures, i.e., (1) feature selection, which discards irrelevant dimensions of the data, and (2) feature transformation, which constructs new variables by transforming and mixing over all dimensions. We propose a method that both selects and transforms features in a common Bayesian inference procedure. Our method imposes a doubly automatic relevance determination (ARD) prior on the factor loading matrix. We propose a variational Bayesian inference for our model and demonstrate the performance of our method on both synthetic and real data.

  5. Modeling of nitrogen transformation in an integrated multi-trophic aquaculture (IMTA)

    Science.gov (United States)

    Silfiana; Widowati; Putro, S. P.; Udjiani, T.

    2018-03-01

    The dynamic model of nitrogen transformation in IMTA (Integrated Multi-Trophic Aquaculture) is purposed. IMTA is a polyculture with several biotas maintained in it to optimize waste recycling as a food source. The purpose of this paper is to predict nitrogen decrease and nitrogen transformation in IMTA consisting of ammonia (NH3), Nitrite (NO2) and Nitrate (NO3). Nitrogen transformation of several processes, nitrification, assimilation, and volatilization. Numerical simulations are performed by providing initial parameters and values based on a review of previous research. The numerical results show that the rate of change in nitrogen concentration in IMTA decrease and reaches stable at different times.

  6. Constitutive modelling of stainless steels for cryogenic applications. Strain induced martensitic transformation

    CERN Document Server

    Garion, C

    2001-01-01

    The 300-series stainless steels are metastable austenitic alloys: martensitic transformation occurs at low temperatures and/or when plastic strain fields develop in the structures. The transformation influences the mechanical properties of the material. The present note aims at proposing a set of constitutive equations describing the plastic strain induced martensitic transformation in the stainless steels at cryogenic temperatures. The constitutive modelling shall create a bridge between the material sciences and the structural analysis. For the structures developing and accumulating plastic deformations at sub-zero temperatures, it is of primary importance to be able to predict the intensity of martensitic transformation and its effect on the material properties. In particular, the constitutive model has been applied to predict the behaviour of the components of the LHC interconnections, the so-called bellows expansion joints (the LHC mechanical compensation system).

  7. Application of the Analog Method to Modelling Heat Waves: A Case Study with Power Transformers

    Science.gov (United States)

    2017-04-21

    UNCLASSIFIED Massachusetts Institute of Technology Lincoln Laboratory APPLICATION OF THE ANALOG METHOD TO MODELLING HEAT WAVES: A CASE STUDY WITH...18 2 Calibration and validation statistics with the use of five atmospheric vari- ables to construct analogue diagnostics for JJA of transformer T2...electrical grid as a series of nodes (transformers) and edges (transmission lines) so that basic mathematical anal- ysis can be performed. The mathematics

  8. Transform Methods for Precision Nonlinear Wave Models of Flexible space Structures

    Science.gov (United States)

    1990-08-20

    developed, each of which has motivated a structural control methodology in a natural way. The Transform Element Modelling (TEM) approach uses the Laplace...IEk A L 2 = -, c G= ( C .3 a ,b ) Talng the Laplace transfor-m (neglecting initial conditions) )ields [1+tjSZ-(,s) +S ((X’S) + al2a~ pS4 (X’S) j(X’s) (04

  9. Application of differential transformation method for solving dengue transmission mathematical model

    Science.gov (United States)

    Ndii, Meksianis Z.; Anggriani, Nursanti; Supriatna, Asep K.

    2018-03-01

    The differential transformation method (DTM) is a semi-analytical numerical technique which depends on Taylor series and has application in many areas including Biomathematics. The aim of this paper is to employ the differential transformation method (DTM) to solve system of non-linear differential equations for dengue transmission mathematical model. Analytical and numerical solutions are determined and the results are compared to that of Runge-Kutta method. We found a good agreement between DTM and Runge-Kutta method.

  10. [Job crisis and transformations in the new model of accumulation].

    Science.gov (United States)

    Zerda-Sarmiento, Alvaro

    2012-06-01

    The general and structural crisis capitalism is going through is the token of the difficulties accumulation model has been dealing with since 70's in developed countries. This model has been trying to settle down again on the basis of neoliberal principle and a new technical-economical paradigm. The new accumulation pattern has had a effect in employment sphere which have been made evident at all the elements that constitute work relationships. In Colombia, this model implementation has been partial and segmented. However, its consequences (and the long-term current crisis) have been evident in unemployment, precarious work, segmentation, informal work and restricted and private health insurance. Besides, financial accumulation makes labour profits flow at different levels. The economic model current government has aimed to implement leads to strengthening exports, so making population life conditions more difficult. In order to overcome the current state of affairs, the work sphere needs to become more creative. This creative approach should look for new schemes for expression and mobilization of work sphere's claims. This is supposed to be done by establishing a different economic model aimed to build a more inclusive future, with social justice.

  11. An Effective Semantic Event Matching System in the Internet of Things (IoT) Environment.

    Science.gov (United States)

    Alhakbani, Noura; Hassan, Mohammed Mehedi; Ykhlef, Mourad

    2017-09-02

    IoT sensors use the publish/subscribe model for communication to benefit from its decoupled nature with respect to space, time, and synchronization. Because of the heterogeneity of communicating parties, semantic decoupling is added as a fourth dimension. The added semantic decoupling complicates the matching process and reduces its efficiency. Our proposed algorithm clusters subscriptions and events according to topic and performs the matching process within these clusters, which increases the throughput by reducing the matching time from the range of 16-18 ms to 2-4 ms. Moreover, the accuracy of matching is improved when subscriptions must be fully approximated, as demonstrated by an over 40% increase in F-score results. This work shows the benefit of clustering, as well as the improvement in the matching accuracy and efficiency achieved using this approach.

  12. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments

    Science.gov (United States)

    Lee, JongHyup

    2018-01-01

    In the complicated settings of WSN (Wireless Sensor Networks) and IoT (Internet of Things) environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness. PMID:29438337

  13. A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices

    Directory of Open Access Journals (Sweden)

    Fang Liu

    2018-01-01

    Full Text Available Wearable technology is one of the greatest applications of the Internet of Things. The popularity of wearable devices has led to a massive scale of personal (user-specific data. Generally, data holders (manufacturers of wearable devices are willing to share these data with others to get benefits. However, significant privacy concerns would arise when sharing the data with the third party in an improper manner. In this paper, we first propose a specific threat model about the data sharing process of wearable devices’ data. Then we propose a K-anonymity method based on clustering to preserve privacy of wearable IoT devices’ data and guarantee the usability of the collected data. Experiment results demonstrate the effectiveness of the proposed method.

  14. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments.

    Science.gov (United States)

    Lee, JongHyup

    2018-02-13

    [-12]In the complicated settings of WSN (Wireless Sensor Networks) and IoT (Internet of Things) environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness.

  15. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments

    Directory of Open Access Journals (Sweden)

    JongHyup Lee

    2018-02-01

    Full Text Available In the complicated settings of WSN (Wireless Sensor Networks and IoT (Internet of Things environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness.

  16. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  17. Transforming Internal Activities of Business Process Models to Services Compositions

    NARCIS (Netherlands)

    Dirgahayu, Teduh; Quartel, Dick; van Sinderen, Marten J.; Mostefaoui, S.K.; Maamar, Z.; Ferreira Pires, L.; Hammoudi, S.; Rinderle-Ma, S.; Sadiq, S.; Schulz, K.

    As a service composition language, BPEL imposes as constraint that a business process model should consist only of activities for interacting with other business processes. BPEL provides limited support for implementing internal activities, i.e. activities that are performed by a single business

  18. Shared Curriculum Model: A Promising Practice for Education Transformation.

    Science.gov (United States)

    Close, Liz; Gorski, Mary Sue; Sroczynski, Maureen; Farmer, Pat; Wortock, Jean

    2015-12-01

    The shared curriculum model is one of four successful models of academic progression identified through a consensus-building process facilitated by The Future of Nursing: Campaign for Action, with support from the Robert Wood Johnson Foundation, AARP, and the AARP Foundation. Seamless academic progression from the associate degree in nursing (ADN) to the baccalaureate degree in nursing (BSN) is achieved either by simultaneously revising both ADN and BSN curricula or by making targeted adjustments in ADN or BSN curricula to create a unified academic progression. Systematic vetting and definitive agreement on nursing prerequisites and corequisites, general education courses, nursing major content, and general degree requirements are necessary to ensure coordinated degree progression. A standardized set of expectations for beginning professional practice and for unique baccalaureate nursing knowledge ensures vital nursing content across the ADN-to-BSN continuum. Examples of state and regional ADN-to-BSN progression programs using the shared curriculum model are highlighted. The shared curriculum model is a promising practical and sustainable approach to seamless ADN-to-BSN academic progression. Copyright 2015, SLACK Incorporated.

  19. Assessing and improving the quality of model transformations

    NARCIS (Netherlands)

    Amstel, van M.F.

    2012-01-01

    Software is pervading our society more and more and is becoming increasingly complex. At the same time, software quality demands remain at the same, high level. Model-driven engineering (MDE) is a software engineering paradigm that aims at dealing with this increasing software complexity and

  20. Application of a Laplace transform pair model for high-energy x-ray spectral reconstruction.

    Science.gov (United States)

    Archer, B R; Almond, P R; Wagner, L K

    1985-01-01

    A Laplace transform pair model, previously shown to accurately reconstruct x-ray spectra at diagnostic energies, has been applied to megavoltage energy beams. The inverse Laplace transforms of 2-, 6-, and 25-MV attenuation curves were evaluated to determine the energy spectra of these beams. The 2-MV data indicate that the model can reliably reconstruct spectra in the low megavoltage range. Experimental limitations in acquiring the 6-MV transmission data demonstrate the sensitivity of the model to systematic experimental error. The 25-MV data result in a physically realistic approximation of the present spectrum.

  1. A novel compact model for on-chip stacked transformers in RF-CMOS technology

    Science.gov (United States)

    Jun, Liu; Jincai, Wen; Qian, Zhao; Lingling, Sun

    2013-08-01

    A novel compact model for on-chip stacked transformers is presented. The proposed model topology gives a clear distinction to the eddy current, resistive and capacitive losses of the primary and secondary coils in the substrate. A method to analytically determine the non-ideal parasitics between the primary coil and substrate is provided. The model is further verified by the excellent match between the measured and simulated S -parameters on the extracted parameters for a 1 : 1 stacked transformer manufactured in a commercial RF-CMOS technology.

  2. The Occupancy Rate Modeling of Kendari Hotel Room using Mexican Hat Transformation and Partial Least Squares

    Directory of Open Access Journals (Sweden)

    Margaretha Ohyver

    2016-12-01

    Full Text Available Partial Least Squares (PLS method was developed in 1960 by Herman Wold. The method particularly suits with construct a regression model when the number of independent variables is many and highly collinear. The PLS can be combined with other methods, one of which is a Continuous Wavelet Transformation (CWT. By considering that the presence of outliers can lead to a less reliable model, and this kind of transformation may be required at a stage of pre-processing, the data is free of noise or outliers. Based on the previous study, Kendari hotel room occupancy rate was affected by the outlier, and it had a low value of R2. Therefore, this research aimed to obtain a good model by combining the PLS method and CWT transformation using the Mexican Hats them other wavelet of CWT. The research concludes that merging the PLS and the Mexican Hat transformation has resulted in a better model compared to the model that combined the PLS and the Haar wavelet transformation as shown in the previous study. The research shows that by changing the mother of the wavelet, the value of R2 can be improved significantly. The result provides information on how to increase the value of R2. The other advantage is the information for hotel managements to notice the age of the hotel, the maximum rates, the facilities, and the number of rooms to increase the number of visitors.

  3. NitroScape: A model to integrate nitrogen transfers and transformations in rural landscapes

    Energy Technology Data Exchange (ETDEWEB)

    Duretz, S. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Drouet, J.L., E-mail: Jean-Louis.Drouet@grignon.inra.fr [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Durand, P. [INRA-AgroCampus, UMR 1069 Sol Agro et hydrosysteme Spatialisation (SAS), 35042 Rennes cedex (France); Hutchings, N.J. [Department of Agroecology, Faculty of Agricultural Sciences, University of Aarhus (AU), Blichers Alle, 8830 Tjele (Denmark); Theobald, M.R. [Department of Chemistry and Agricultural Analysis, Technical University of Madrid (UPM), 28040 Madrid (Spain); Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Salmon-Monviola, J. [INRA-AgroCampus, UMR 1069 Sol Agro et hydrosysteme Spatialisation (SAS), 35042 Rennes cedex (France); Dragosits, U. [Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Maury, O. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Sutton, M.A. [Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Cellier, P. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France)

    2011-11-15

    Modelling nitrogen transfer and transformation at the landscape scale is relevant to estimate the mobility of the reactive forms of nitrogen (N{sub r}) and the associated threats to the environment. Here we describe the development of a spatially and temporally explicit model to integrate N{sub r} transfer and transformation at the landscape scale. The model couples four existing models, to simulate atmospheric, farm, agro-ecosystem and hydrological N{sub r} fluxes and transformations within a landscape. Simulations were carried out on a theoretical landscape consisting of pig-crop farms interspersed with unmanaged ecosystems. Simulation results illustrated the effect of spatial interactions between landscape elements on N{sub r} fluxes and losses to the environment. More than 10% of the total N{sub 2}O emissions were due to indirect emissions. The nitrogen budgets and transformations of the unmanaged ecosystems varied considerably, depending on their location within the landscape. The model represents a new tool for assessing the effect of changes in landscape structure on N{sub r} fluxes. - Highlights: > The landscape scale is relevant to study how spatial interactions affect N{sub r} fate. > The NitroScape model integrates N{sub r} transfer and transformation at landscape scale. > NitroScape couples existing atmospheric, farm, agro-ecosystem and hydrological models. > Data exchanges within NitroScape are dynamic and spatially distributed. > More than 10% of the simulated N{sub 2}O emissions are due to indirect emissions. - A model integrating terrestrial, hydrological and atmospheric processes of N{sub r} transfer and transformation at the landscape scale has been developed to simulate the effect of spatial interactions between landscape elements on N{sub r} fate.

  4. NitroScape: A model to integrate nitrogen transfers and transformations in rural landscapes

    International Nuclear Information System (INIS)

    Duretz, S.; Drouet, J.L.; Durand, P.; Hutchings, N.J.; Theobald, M.R.; Salmon-Monviola, J.; Dragosits, U.; Maury, O.; Sutton, M.A.; Cellier, P.

    2011-01-01

    Modelling nitrogen transfer and transformation at the landscape scale is relevant to estimate the mobility of the reactive forms of nitrogen (N r ) and the associated threats to the environment. Here we describe the development of a spatially and temporally explicit model to integrate N r transfer and transformation at the landscape scale. The model couples four existing models, to simulate atmospheric, farm, agro-ecosystem and hydrological N r fluxes and transformations within a landscape. Simulations were carried out on a theoretical landscape consisting of pig-crop farms interspersed with unmanaged ecosystems. Simulation results illustrated the effect of spatial interactions between landscape elements on N r fluxes and losses to the environment. More than 10% of the total N 2 O emissions were due to indirect emissions. The nitrogen budgets and transformations of the unmanaged ecosystems varied considerably, depending on their location within the landscape. The model represents a new tool for assessing the effect of changes in landscape structure on N r fluxes. - Highlights: → The landscape scale is relevant to study how spatial interactions affect N r fate. → The NitroScape model integrates N r transfer and transformation at landscape scale. → NitroScape couples existing atmospheric, farm, agro-ecosystem and hydrological models. → Data exchanges within NitroScape are dynamic and spatially distributed. → More than 10% of the simulated N 2 O emissions are due to indirect emissions. - A model integrating terrestrial, hydrological and atmospheric processes of N r transfer and transformation at the landscape scale has been developed to simulate the effect of spatial interactions between landscape elements on N r fate.

  5. Role of transformational leadership on employee productivity of teaching hospitals: using structural equation modeling.

    Science.gov (United States)

    Vatankhah, Soudabeh; Alirezaei, Samira; Khosravizadeh, Omid; Mirbahaeddin, Seyyed Elmira; Alikhani, Mahtab; Alipanah, Mobarakeh

    2017-08-01

    In today's transforming world, increased productivity and efficient use of existing facilities are practically beyond a choice and become a necessity. In this line, attention to change and transformation is one of the affecting factors on the growth of productivity in organizations, especially in hospitals. To examine the effect of transformational leadership on the productivity of employees in teaching hospitals affiliated to Iran University of Medical Sciences. This cross-sectional study was conducted on 254 participants from educational and medical centers affiliated to Iran University of Medical Sciences (Tehran, Iran) in 2016. The standard questionnaires of Bass & Avolio and of Hersi & Goldsmith were used to respectively assess transformational leadership and level of productivity. The research assumptions were tested in a significance level of 0.05 by applying descriptive statistics and structural equations modeling (SEM) using SPSS 19 and Amos 24. Results of the fitting indicators of the assessing model after amending includes Chi-square two to degrees of freedom of 2.756, CFI indicator 0.95, IFI indicator 0.92, Root mean square error of approximation (RMSEA) indicator 0.10. These results indicate that the assessing model is well fitting after the amendment. Also, analysis of the model's assumptions and the final model of the research reveals the effect of transformational leadership on employees' productivity with a significance level of 0.83 (p=0.001). This research indicates that the more the leadership and decision-making style in hospitals lean towards transformational mode, the more positive outcomes it brings among employees and the organization due to increased productivity. Therefore, it is essential to pay focused attention to training/educational programs in organizations to create and encourage transformational leadership behaviors which hopefully lead to more productive employees.

  6. Climate change induced transformations of agricultural systems: insights from a global model

    Science.gov (United States)

    Leclère, D.; Havlík, P.; Fuss, S.; Schmid, E.; Mosnier, A.; Walsh, B.; Valin, H.; Herrero, M.; Khabarov, N.; Obersteiner, M.

    2014-12-01

    Climate change might impact crop yields considerably and anticipated transformations of agricultural systems are needed in the coming decades to sustain affordable food provision. However, decision-making on transformational shifts in agricultural systems is plagued by uncertainties concerning the nature and geography of climate change, its impacts, and adequate responses. Locking agricultural systems into inadequate transformations costly to adjust is a significant risk and this acts as an incentive to delay action. It is crucial to gain insight into how much transformation is required from agricultural systems, how robust such strategies are, and how we can defuse the associated challenge for decision-making. While implementing a definition related to large changes in resource use into a global impact assessment modelling framework, we find transformational adaptations to be required of agricultural systems in most regions by 2050s in order to cope with climate change. However, these transformations widely differ across climate change scenarios: uncertainties in large-scale development of irrigation span in all continents from 2030s on, and affect two-thirds of regions by 2050s. Meanwhile, significant but uncertain reduction of major agricultural areas affects the Northern Hemisphere’s temperate latitudes, while increases to non-agricultural zones could be large but uncertain in one-third of regions. To help reducing the associated challenge for decision-making, we propose a methodology exploring which, when, where and why transformations could be required and uncertain, by means of scenario analysis.

  7. Climate change induced transformations of agricultural systems: insights from a global model

    International Nuclear Information System (INIS)

    Leclère, D; Havlík, P; Mosnier, A; Walsh, B; Valin, H; Khabarov, N; Obersteiner, M; Fuss, S; Schmid, E; Herrero, M

    2014-01-01

    Climate change might impact crop yields considerably and anticipated transformations of agricultural systems are needed in the coming decades to sustain affordable food provision. However, decision-making on transformational shifts in agricultural systems is plagued by uncertainties concerning the nature and geography of climate change, its impacts, and adequate responses. Locking agricultural systems into inadequate transformations costly to adjust is a significant risk and this acts as an incentive to delay action. It is crucial to gain insight into how much transformation is required from agricultural systems, how robust such strategies are, and how we can defuse the associated challenge for decision-making. While implementing a definition related to large changes in resource use into a global impact assessment modelling framework, we find transformational adaptations to be required of agricultural systems in most regions by 2050s in order to cope with climate change. However, these transformations widely differ across climate change scenarios: uncertainties in large-scale development of irrigation span in all continents from 2030s on, and affect two-thirds of regions by 2050s. Meanwhile, significant but uncertain reduction of major agricultural areas affects the Northern Hemisphere’s temperate latitudes, while increases to non-agricultural zones could be large but uncertain in one-third of regions. To help reducing the associated challenge for decision-making, we propose a methodology exploring which, when, where and why transformations could be required and uncertain, by means of scenario analysis. (letter)

  8. A Vision Based Top-View Transformation Model for a Vehicle Parking Assistant

    Directory of Open Access Journals (Sweden)

    Chien-Chuan Lin

    2012-03-01

    Full Text Available This paper proposes the Top-View Transformation Model for image coordinate transformation, which involves transforming a perspective projection image into its corresponding bird’s eye vision. A fitting parameters searching algorithm estimates the parameters that are used to transform the coordinates from the source image. Using this approach, it is not necessary to provide any interior and exterior orientation parameters of the camera. The designed car parking assistant system can be installed at the rear end of the car, providing the driver with a clearer image of the area behind the car. The processing time can be reduced by storing and using the transformation matrix estimated from the first image frame for a sequence of video images. The transformation matrix can be stored as the Matrix Mapping Table, and loaded into the embedded platform to perform the transformation. Experimental results show that the proposed approaches can provide a clearer and more accurate bird’s eye view to the vehicle driver.

  9. Analysis of errors in spectral reconstruction with a Laplace transform pair model

    International Nuclear Information System (INIS)

    Archer, B.R.; Bushong, S.C.

    1985-01-01

    The sensitivity of a Laplace transform pair model for spectral reconstruction to random errors in attenuation measurements of diagnostic x-ray units has been investigated. No spectral deformation or significant alteration resulted from the simulated attenuation errors. It is concluded that the range of spectral uncertainties to be expected from the application of this model is acceptable for most scientific applications. (author)

  10. TRANSFoRm: a flexible zone model of a data privacy framework for Primary Care research.

    NARCIS (Netherlands)

    Kuchinke, W.; Veen, E.B. van; Delaney, B.C.; Verheij, R.; Taweel, A.; Ohmann, C.

    2011-01-01

    As part of the TRANSFoRm project a flexible zone model for data privacy in Primary Care research was developed. The model applies different privacy generating methods to different aspects of the research data flow and allows in this way for only minimal hindrance of research activities. This is

  11. Multihop Data Delivery Virtualization for Green Decentralized IoT

    Directory of Open Access Journals (Sweden)

    Lifeng Zhang

    2017-01-01

    Full Text Available Decentralized communication technologies (i.e., ad hoc networks provide more opportunities for emerging wireless Internet of Things (IoT due to the flexibility and expandability of distributed architecture. However, the performance degradation of wireless communications with the increase of the number of hops becomes the main obstacle in the development of decentralized wireless IoT systems. The main challenges come from the difficulty in designing a resource and energy efficient multihop communication protocol. Transmission control protocol (TCP, the most frequently used transport layer protocol for achieving reliable end-to-end communications, cannot achieve a satisfactory result in multihop wireless scenarios as it uses end-to-end acknowledgment which could not work well in a lossy scenario. In this paper, we propose a multihop data delivery virtualization approach which uses multiple one-hop reliable transmissions to perform multihop data transmissions. Since the proposed protocol utilizes hop-by-hop acknowledgment instead of end-to-end feedback, the congestion window size at each TCP sender node is not affected by the number of hops between the source node and the destination node. The proposed protocol can provide a significantly higher throughput and shorter transmission time as compared to the end-to-end approach. We conduct real-world experiments as well as computer simulations to show the performance gain from our proposed protocol.

  12. An IoT Project for Vital Signs Monitoring

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2017-01-01

    Full Text Available Nowadays, the Internet of Things (IoT projects are very popular and they are developed for numerous fields. In order to detect various medical problems on time, it is required to monitor the subjects either human or non-human. This could be used on regular or specific activities, like sport or work. It is necessary to determine the factors that could lead to medical problems. Another important aspect is to quantify the factors, to monitor them, to collect data and to make the proper interpretation. This could be achieved using dedicated sensors, controlled by an application embedded on a development board. When a dangerous value is reached, the system has to inform the subject (if human or someone else (if non-human. This paper presents an Arduino based IoT project used for monitoring the vital signs for human and non-human and the results based on its usage. The paper details the hardware and software components of this project.

  13. Cognitive IoT incorporating intelligence in building smart environment

    Science.gov (United States)

    Sarker, Dishari; Sumathy, S.

    2017-11-01

    The Internet of Things (IoT) is an invention of this century which also can be called as Internet which makes life more logical and electronic. According to research in the industrial field about which aspect in IoT contributes more for GDP is the concept which can be applied in various aspects of our life to make life logical and easier. We are very much aware of the increasing population and the pollution that is caused by the vehicles and many other sources such as harmful gas producers. So, this work focuses in determining the level of pollution in a specific area and predict how much more greenery has to be increased in that area. With its widespread application, this paper proposes an idea with a social cause in order to exhibit the concern towards the environment and mankind. This proposal will benefit farmers and others in polluted cities. The language to be used is Embedded C programming and Arduino IDE open source platform with both hardware and software interaction. The display will involve an android app called Blynk App.

  14. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman

    2018-01-15

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where different prioritized DD system, i.e., Low-Priority (LP) and High-Priority (HP) systems, co-exist and share the spectrum. We maximize the EE of each system by proposing two schemes. The first scheme optimizes the individual transmission power and the spatial density of each system. The second scheme optimizes the transmission power ratio of both systems and the spatial density of each one. We also construct and analytically solve a multi- objective optimization problem that combines and jointly maximizes both HP and LP EE performance. Unique structures of the addressed problems are verified. Via numerical results we show that the system which dominates the overall EE (combined EEs of both HP and LP) is the system corresponding to the lowest power for low/high power ratio (between HP and LP systems). However, if the power ratio is close to one, the dominating EE corresponds to the system with higher weight.

  15. BOX-COX transformation and random regression models for fecal egg count data

    Directory of Open Access Journals (Sweden)

    Marcos Vinicius Silva

    2012-01-01

    Full Text Available Accurate genetic evaluation of livestock is based on appropriate modeling of phenotypic measurements. In ruminants fecal egg count (FEC is commonly used to measure resistance to nematodes. FEC values are not normally distributed and logarithmic transformations have been used to achieve normality before analysis. However, the transformed data are often not normally distributed, especially when data are extremely skewed. A series of repeated FEC measurements may provide information about the population dynamics of a group or individual. A total of 6,375 FEC measures were obtained for 410 animals between 1992 and 2003 from the Beltsville Agricultural Research Center Angus herd. Original data were transformed using an extension of the Box-Cox transformation to approach normality and to estimate (covariance components. We also proposed using random regression models (RRM for genetic and non-genetic studies of FEC. Phenotypes were analyzed using RRM and restricted maximum likelihood. Within the different orders of Legendre polynomials used, those with more parameters (order 4 adjusted FEC data best. Results indicated that the transformation of FEC data utilizing the Box-Cox transformation family was effective in reducing the skewness and kurtosis, and dramatically increased estimates of heritability, and measurements of FEC obtained in the period between 12 and 26 weeks in a 26-week experimental challenge period are genetically correlated.

  16. Design and Modeling of an Integrated Micro-Transformer in a Flyback Converter

    Directory of Open Access Journals (Sweden)

    M. Derkaoui

    2013-11-01

    Full Text Available This paper presents the design and modeling of a square micro-transformer for its integration in a flyback converter. From the specifications of the switching power supply, we determined the geometric parameters of this micro-transformer. The π-electrical model of this micro-transformer highlights all parasitic effects generated by stacking of different material layers and permits to calculate the technological parameters by using the S-parameters. A good dimensioning of the geometrical parameters reduces efficiently the energy losses in the micro-transformer and permits to reach the desirable value of the converter output voltage. We have also simulated the electromagnetic effects with the help of the software FEMLAB3.1 in two cases. The first case, without ferromagnetic core, the second case with ferromagnetic core, in order to choose the micro-transformer that has better electromagnetic compatibility with the vicinity components. To validate dimensioning of the geometrical and technological parameters, we have simulated with the help of the software PSIM6.0, the equivalent electrical circuit of the converter containing the electrical circuit of the dimensioned planar micro-transformer.

  17. ANIMATION STRATEGIES FOR SMOOTH TRANSFORMATIONS BETWEEN DISCRETE LODS OF 3D BUILDING MODELS

    Directory of Open Access Journals (Sweden)

    M. Kada

    2016-06-01

    Full Text Available The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advanced techniques to improve the quality and time response of dynamic scenes. The main focus of this article concentrates on the discussion of strategies for smooth transformation between two discrete levels of detail (LOD of 3D building models that are represented as restricted triangle meshes. Because the operation order determines the geometrical and topological properties of the transformation process as well as its visual perception by a human viewer, three different strategies are proposed and subsequently analyzed. The simplest one orders transformation operations by the length of the edges to be collapsed, while the other two strategies introduce a general transformation direction in the form of a moving plane. This plane either pushes the nodes that need to be removed, e.g. during the transformation of a detailed LOD model to a coarser one, towards the main building body, or triggers the edge collapse operations used as transformation paths for the cartographic generalization.

  18. Animation Strategies for Smooth Transformations Between Discrete Lods of 3d Building Models

    Science.gov (United States)

    Kada, Martin; Wichmann, Andreas; Filippovska, Yevgeniya; Hermes, Tobias

    2016-06-01

    The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advanced techniques to improve the quality and time response of dynamic scenes. The main focus of this article concentrates on the discussion of strategies for smooth transformation between two discrete levels of detail (LOD) of 3D building models that are represented as restricted triangle meshes. Because the operation order determines the geometrical and topological properties of the transformation process as well as its visual perception by a human viewer, three different strategies are proposed and subsequently analyzed. The simplest one orders transformation operations by the length of the edges to be collapsed, while the other two strategies introduce a general transformation direction in the form of a moving plane. This plane either pushes the nodes that need to be removed, e.g. during the transformation of a detailed LOD model to a coarser one, towards the main building body, or triggers the edge collapse operations used as transformation paths for the cartographic generalization.

  19. Box-Cox Transformation and Random Regression Models for Fecal egg Count Data.

    Science.gov (United States)

    da Silva, Marcos Vinícius Gualberto Barbosa; Van Tassell, Curtis P; Sonstegard, Tad S; Cobuci, Jaime Araujo; Gasbarre, Louis C

    2011-01-01

    Accurate genetic evaluation of livestock is based on appropriate modeling of phenotypic measurements. In ruminants, fecal egg count (FEC) is commonly used to measure resistance to nematodes. FEC values are not normally distributed and logarithmic transformations have been used in an effort to achieve normality before analysis. However, the transformed data are often still not normally distributed, especially when data are extremely skewed. A series of repeated FEC measurements may provide information about the population dynamics of a group or individual. A total of 6375 FEC measures were obtained for 410 animals between 1992 and 2003 from the Beltsville Agricultural Research Center Angus herd. Original data were transformed using an extension of the Box-Cox transformation to approach normality and to estimate (co)variance components. We also proposed using random regression models (RRM) for genetic and non-genetic studies of FEC. Phenotypes were analyzed using RRM and restricted maximum likelihood. Within the different orders of Legendre polynomials used, those with more parameters (order 4) adjusted FEC data best. Results indicated that the transformation of FEC data utilizing the Box-Cox transformation family was effective in reducing the skewness and kurtosis, and dramatically increased estimates of heritability, and measurements of FEC obtained in the period between 12 and 26 weeks in a 26-week experimental challenge period are genetically correlated.

  20. Conservation of connectivity of model-space effective interactions under a class of similarity transformation

    International Nuclear Information System (INIS)

    Duan Changkui; Gong Yungui; Dong Huining; Reid, Michael F.

    2004-01-01

    Effective interaction operators usually act on a restricted model space and give the same energies (for Hamiltonian) and matrix elements (for transition operators, etc.) as those of the original operators between the corresponding true eigenstates. Various types of effective operators are possible. Those well defined effective operators have been shown to be related to each other by similarity transformation. Some of the effective operators have been shown to have connected-diagram expansions. It is shown in this paper that under a class of very general similarity transformations, the connectivity is conserved. The similarity transformation between Hermitian and non-Hermitian Rayleigh-Schroedinger perturbative effective operators is one of such transformations and hence the connectivity can be deducted from each other

  1. Conservation of connectivity of model-space effective interactions under a class of similarity transformation.

    Science.gov (United States)

    Duan, Chang-Kui; Gong, Yungui; Dong, Hui-Ning; Reid, Michael F

    2004-09-15

    Effective interaction operators usually act on a restricted model space and give the same energies (for Hamiltonian) and matrix elements (for transition operators, etc.) as those of the original operators between the corresponding true eigenstates. Various types of effective operators are possible. Those well defined effective operators have been shown to be related to each other by similarity transformation. Some of the effective operators have been shown to have connected-diagram expansions. It is shown in this paper that under a class of very general similarity transformations, the connectivity is conserved. The similarity transformation between Hermitian and non-Hermitian Rayleigh-Schrodinger perturbative effective operators is one of such transformations and hence the connectivity can be deducted from each other.

  2. Analytical calculation of detailed model parameters of cast resin dry-type transformers

    International Nuclear Information System (INIS)

    Eslamian, M.; Vahidi, B.; Hosseinian, S.H.

    2011-01-01

    Highlights: → In this paper high frequency behavior of cast resin dry-type transformers was simulated. → Parameters of detailed model were calculated using analytical method and compared with FEM results. → A lab transformer was constructed in order to compare theoretical and experimental results. -- Abstract: Non-flammable characteristic of cast resin dry-type transformers make them suitable for different kind of usages. This paper presents an analytical method of how to obtain parameters of detailed model of these transformers. The calculated parameters are compared and verified with the corresponding FEM results and if it was necessary, correction factors are introduced for modification of the analytical solutions. Transient voltages under full and chopped test impulses are calculated using the obtained detailed model. In order to validate the model, a setup was constructed for testing on high-voltage winding of cast resin dry-type transformer. The simulation results were compared with the experimental data measured from FRA and impulse tests.

  3. Different methods for modeling absorption heat transformer powered by solar pond

    International Nuclear Information System (INIS)

    Sencan, Arzu; Kizilkan, Onder; Bezir, Nalan C.; Kalogirou, Soteris A.

    2007-01-01

    Solar ponds are a type of solar collector used for storing solar energy at temperature below 90 o C. Absorption heat transformers (AHTs) are devices used to increase the temperature of moderately warm fluid to a more useful temperature level. In this study, a theoretical modelling of an absorption heat transformer for the temperature range obtained from an experimental solar pond with dimensions 3.5 x 3.5 x 2 m is presented. The working fluid pair in the absorption heat transformer is aqueous ternary hydroxide fluid consisting of sodium, potassium and caesium hydroxides in the proportions 40:36:24 (NaOH:KOH:CsOH). Different methods such as linear regression (LR), pace regression (PR), sequential minimal optimization (SMO), M5 model tree, M5' rules, decision table and back propagation neural network (BPNN) are used for modelling the absorption heat transformer. The best results were obtained by the back propagation neural network model. A new formulation based on the BPNN is presented to determine the flow ratio (FR) and the coefficient of performance (COP) of the absorption heat transformer. The BPNN procedure is more accurate and requires significantly less computation time than the other methods

  4. Role of transformational leadership on employee productivity of teaching hospitals: using structural equation modeling

    Science.gov (United States)

    Vatankhah, Soudabeh; Alirezaei, Samira; Khosravizadeh, Omid; Mirbahaeddin, Seyyed Elmira; Alikhani, Mahtab; Alipanah, Mobarakeh

    2017-01-01

    Background In today’s transforming world, increased productivity and efficient use of existing facilities are practically beyond a choice and become a necessity. In this line, attention to change and transformation is one of the affecting factors on the growth of productivity in organizations, especially in hospitals. Aim To examine the effect of transformational leadership on the productivity of employees in teaching hospitals affiliated to Iran University of Medical Sciences. Methods This cross-sectional study was conducted on 254 participants from educational and medical centers affiliated to Iran University of Medical Sciences (Tehran, Iran) in 2016. The standard questionnaires of Bass & Avolio and of Hersi & Goldsmith were used to respectively assess transformational leadership and level of productivity. The research assumptions were tested in a significance level of 0.05 by applying descriptive statistics and structural equations modeling (SEM) using SPSS 19 and Amos 24. Results Results of the fitting indicators of the assessing model after amending includes Chi-square two to degrees of freedom of 2.756, CFI indicator 0.95, IFI indicator 0.92, Root mean square error of approximation (RMSEA) indicator 0.10. These results indicate that the assessing model is well fitting after the amendment. Also, analysis of the model’s assumptions and the final model of the research reveals the effect of transformational leadership on employees’ productivity with a significance level of 0.83 (p=0.001). Conclusion This research indicates that the more the leadership and decision-making style in hospitals lean towards transformational mode, the more positive outcomes it brings among employees and the organization due to increased productivity. Therefore, it is essential to pay focused attention to training/educational programs in organizations to create and encourage transformational leadership behaviors which hopefully lead to more productive employees. PMID:28979731

  5. A prediction method based on wavelet transform and multiple models fusion for chaotic time series

    International Nuclear Information System (INIS)

    Zhongda, Tian; Shujiang, Li; Yanhong, Wang; Yi, Sha

    2017-01-01

    In order to improve the prediction accuracy of chaotic time series, a prediction method based on wavelet transform and multiple models fusion is proposed. The chaotic time series is decomposed and reconstructed by wavelet transform, and approximate components and detail components are obtained. According to different characteristics of each component, least squares support vector machine (LSSVM) is used as predictive model for approximation components. At the same time, an improved free search algorithm is utilized for predictive model parameters optimization. Auto regressive integrated moving average model (ARIMA) is used as predictive model for detail components. The multiple prediction model predictive values are fusion by Gauss–Markov algorithm, the error variance of predicted results after fusion is less than the single model, the prediction accuracy is improved. The simulation results are compared through two typical chaotic time series include Lorenz time series and Mackey–Glass time series. The simulation results show that the prediction method in this paper has a better prediction.

  6. A thick-interface model for diffusive and massive phase transformation in substitutional alloys

    International Nuclear Information System (INIS)

    Svoboda, J.; Vala, J.; Gamsjaeger, E.; Fischer, F.D.

    2006-01-01

    Based on the application of the thermodynamic extremal principle, a new model for the diffusive and massive phase transformation in multicomponent substitutional alloys is developed. Interfacial reactions such as the rearrangement of the lattice, solute drag and trans-interface diffusion are automatically considered by assigning a finite thickness and a finite mobility to the interface region. As an application of the steady-state solution of the derived evolution equations, the kinetics of the massive γ → α transformation in the Fe-rich Fe-Cr-Ni system is simulated. The thermodynamic properties of the interface may influence significantly the contact conditions at the interface as well as the conditions for the occurrence of the massive transformation and its kinetics. The model is also used for the simulation of the diffusion-induced grain boundary migration in the same system. By application of the model a realistic value for the Gibbs energy per unit interface area is obtained

  7. Numerical model of phase transformation of steel C80U during hardening

    Directory of Open Access Journals (Sweden)

    T. Domański

    2007-12-01

    Full Text Available The article concerns numerical modelling of the phase transformations in solid state hardening of tool steel C80U. The transformations were assumed: initial structure – austenite, austenite – perlite, bainite and austenite – martensite. Model for evaluation of fractions of phases and their kinetics based on continuous heating diagram (CHT and continuous cooling diagram (CCT. The dilatometric tests on the simulator of thermal cycles were performed. The results of dilatometric tests were compared with the results of the test numerical simulations. In this way the derived models for evaluating phase content and kinetics of transformations in heating and cooling processes were verified. The results of numerical simulations confirm correctness of the algorithm that were worked out. In the numerical example the simulated estimation of the phase fraction in the hardened axisimmetrical element was performed.

  8. Fog Computing: An Overview of Big IoT Data Analytics

    Directory of Open Access Journals (Sweden)

    Muhammad Rizwan Anawar

    2018-01-01

    Full Text Available A huge amount of data, generated by Internet of Things (IoT, is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.

  9. Design theory, modelling and the application for the Internet of Things service

    Science.gov (United States)

    Shang, Xiaopu; Zhang, Runtong; Zhu, Xiaomin; Zhou, Quan

    2016-03-01

    The Internet of Things (IoT) makes it possible for us to sense the physical world and locate objects in it using the enabling technologies associated with IoT. Compared with traditional information systems, IoT enabling technologies can help acquire real-time data necessary for managing enterprise business process. An IoT system should have an ability beyond integrating enabling technologies and traditional information systems that are only used to access environmental data. This paper begins with a literature review of IoT-related issues and a discussion of the difference between traditional information service and IoT service. Three principles for IoT service design from the perceptive of service classification, coordination and compatibility are proposed. The paper also proposes a utility model for resource allocation in order to improve IoT service performance, and an application involving a cold chain visibility platform is given to illustrate our research.

  10. Transforming anaerobic digestion with the Model T of digesters

    Energy Technology Data Exchange (ETDEWEB)

    Martin, J.F.; Ciotola, R.; Castano, J.; Eger, C.; Schlea, D. [Ohio State Univ., Columbus, OH (United States). Ecological Engineering Program

    2010-07-01

    Most livestock farmers in the United States do not take advantage of anaerobic digester technology because of the high cost and large scale. These limitations therefore reduce the production of renewable energy from farmlands. In order to expand anaerobic digestion methods and improve environmental quality, affordable and smaller-scale digesters should be developed to enable most livestock farmers to convert manure to methane. Doing so would improve their economic efficiency and environmental sustainability. This paper provided an analogy to the development of the Model T to better explain the need and potential for this technology. A modified fixed-dome digester was installed on the Ohio State University dairy in Columbus, Ohio. The digester was unheated, buried, had a volume of 1 m{sup 3} and received diluted dairy manure as feedstock. Biogas was produced at digester temperatures as low 10 degrees C during colder ambient temperatures. Water quality also improved. Results from the first year of operation will be analyzed to improve performance and enable future development of this technology.

  11. Solution methods for compartment models of transport through the environment using numerical inversion of Laplace transforms

    International Nuclear Information System (INIS)

    Garratt, T.J.

    1989-05-01

    Compartment models for the transport of radionuclides in the biosphere are conventionally solved using a numerical time-stepping procedure. This report examines an alternative method based on the numerical inversion of Laplace transforms, which is potentially more efficient and accurate for some classes of problem. The central problem considered is the most efficient and robust technique for solving the Laplace-transformed rate equations. The conclusion is that Gaussian elimination is the most efficient and robust solution method. A general compartment model has been implemented on a personal computer and used to solve a realistic case including radionuclide decay chains. (author)

  12. SECOND ORDER LEAST SQUARE ESTIMATION ON ARCH(1 MODEL WITH BOX-COX TRANSFORMED DEPENDENT VARIABLE

    Directory of Open Access Journals (Sweden)

    Herni Utami

    2014-03-01

    Full Text Available Box-Cox transformation is often used to reduce heterogeneity and to achieve a symmetric distribution of response variable. In this paper, we estimate the parameters of Box-Cox transformed ARCH(1 model using second-order leastsquare method and then we study the consistency and asymptotic normality for second-order least square (SLS estimators. The SLS estimation was introduced byWang (2003, 2004 to estimate the parameters of nonlinear regression models with independent and identically distributed errors

  13. Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages

    DEFF Research Database (Denmark)

    Mendling, Jan; Lassen, Kristian Bisgaard; Zdun, Uwe

    to abstract from concrete transformationstrategies by distinguishing two major paradigms for process modelling languages:block-oriented languages (such as BPEL and BPML) and graph-oriented languages(such as EPCs and YAWL). The contribution of this paper are generic strategiesfor transforming from block......Much recent research work discusses the transformation between differentprocess modelling languages. This work, however, is mainly focussed on specific processmodelling languages, and thus the general reusability of the applied transformationconcepts is rather limited. In this paper, we aim......-oriented process languages to graph-oriented languages,and vice versa. We also present two case studies of applying our strategies....

  14. Finite-strain micromechanical model of stress-induced martensitic transformations in shape memory alloys

    International Nuclear Information System (INIS)

    Stupkiewicz, S.; Petryk, H.

    2006-01-01

    A micromechanical model of stress-induced martensitic transformation in single crystals of shape memory alloys is developed. This model is a finite-strain counterpart to the approach presented recently in the small-strain setting [S. Stupkiewicz, H. Petryk, J. Mech. Phys. Solids 50 (2002) 2303-2331]. The stress-induced transformation is assumed to proceed by the formation and growth of parallel martensite plates within the austenite matrix. Propagation of phase transformation fronts is governed by a rate-independent thermodynamic criterion with a threshold value for the thermodynamic driving force, including in this way the intrinsic dissipation due to phase transition. This criterion selects the initial microstructure at the onset of transformation and governs the evolution of the laminated microstructure at the macroscopic level. A multiplicative decomposition of the deformation gradient into elastic and transformation parts is assumed, with full account for the elastic anisotropy of the phases. The pseudoelastic behavior of Cu-Zn-Al single crystal in tension and compression is studied as an application of the model

  15. [Development of Monitoring System for Infant Incubator Based on IOT Technology].

    Science.gov (United States)

    Wang, Wenfeng; Peng, Dunlu; Gu, Nan

    2017-05-30

    IOT(Internet of things) is a relatively new technology, more and more integrated into our lives. In this paper we use infant incubator for example, introduce the application of IOT technology to reduce the risk of the use of medical devices, and through the dynamic management to improve the management level and efficiency. Put forward a method of medical equipment linked. Combined with the point of IOT technology and sensor technology, we find out the actual needs of the management and use of infant incubator. For the dynamic management of medical equipment, we use sensors to control risk points. The system meets the needs of the hospital and patients in many areas.

  16. Towards an MDD Based Framework for Self Adaptive IoT Applications Development

    OpenAIRE

    Abuseta, Yousef

    2018-01-01

    As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising...

  17. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    OpenAIRE

    Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay

    2018-01-01

    IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist...

  18. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  19. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  20. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  1. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  2. Wavelet transform-vector quantization compression of supercomputer ocean model simulation output

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J N; Brislawn, C M

    1992-11-12

    We describe a new procedure for efficient compression of digital information for storage and transmission purposes. The algorithm involves a discrete wavelet transform subband decomposition of the data set, followed by vector quantization of the wavelet transform coefficients using application-specific vector quantizers. The new vector quantizer design procedure optimizes the assignment of both memory resources and vector dimensions to the transform subbands by minimizing an exponential rate-distortion functional subject to constraints on both overall bit-rate and encoder complexity. The wavelet-vector quantization method, which originates in digital image compression. is applicable to the compression of other multidimensional data sets possessing some degree of smoothness. In this paper we discuss the use of this technique for compressing the output of supercomputer simulations of global climate models. The data presented here comes from Semtner-Chervin global ocean models run at the National Center for Atmospheric Research and at the Los Alamos Advanced Computing Laboratory.

  3. The Use of Conditional Probability Integral Transformation Method for Testing Accelerated Failure Time Models

    Directory of Open Access Journals (Sweden)

    Abdalla Ahmed Abdel-Ghaly

    2016-06-01

    Full Text Available This paper suggests the use of the conditional probability integral transformation (CPIT method as a goodness of fit (GOF technique in the field of accelerated life testing (ALT, specifically for validating the underlying distributional assumption in accelerated failure time (AFT model. The method is based on transforming the data into independent and identically distributed (i.i.d Uniform (0, 1 random variables and then applying the modified Watson statistic to test the uniformity of the transformed random variables. This technique is used to validate each of the exponential, Weibull and lognormal distributions' assumptions in AFT model under constant stress and complete sampling. The performance of the CPIT method is investigated via a simulation study. It is concluded that this method performs well in case of exponential and lognormal distributions. Finally, a real life example is provided to illustrate the application of the proposed procedure.

  4. 3DXRD characterization and modeling of solid-state transformation processes

    DEFF Research Database (Denmark)

    Juul Jensen, Dorte; Offerman, S.E.; Sietsma, J.

    2008-01-01

    of metallic microstructures with much more detail than hitherto possible. Among these modeling activities are three-dimensional (3D) geometric modeling, 3D molecular dynamics modeling, 3D phase-field modeling, two-dimensional (2D) cellular automata, and 2D Monte Carlo simulations....... data valuable for validation of various models of microstructural evolution is discussed, Examples of 3DXRD measurements related to recrystallization and to solid-state phase transformations in metals are described. 3DXRD measurements have led to new modeling activity predicting the evolution...

  5. Homotopy perturbation transform method for pricing under pure diffusion models with affine coefficients

    Directory of Open Access Journals (Sweden)

    Claude Rodrigue Bambe Moutsinga

    2018-01-01

    Full Text Available Most existing multivariate models in finance are based on diffusion models. These models typically lead to the need of solving systems of Riccati differential equations. In this paper, we introduce an efficient method for solving systems of stiff Riccati differential equations. In this technique, a combination of Laplace transform and homotopy perturbation methods is considered as an algorithm to the exact solution of the nonlinear Riccati equations. The resulting technique is applied to solving stiff diffusion model problems that include interest rates models as well as two and three-factor stochastic volatility models. We show that the present approach is relatively easy, efficient and highly accurate.

  6. Backlund transformations as canonical transformations

    International Nuclear Information System (INIS)

    Villani, A.; Zimerman, A.H.

    1977-01-01

    Toda and Wadati as well as Kodama and Wadati have shown that the Backlund transformations, for the exponential lattice equation, sine-Gordon equation, K-dV (Korteweg de Vries) equation and modifies K-dV equation, are canonical transformation. It is shown that the Backlund transformation for the Boussinesq equation, for a generalized K-dV equation, for a model equation for shallow water waves and for the nonlinear Schroedinger equation are also canonical transformations [pt

  7. About the use of rank transformation in sensitivity analysis of model output

    International Nuclear Information System (INIS)

    Saltelli, Andrea; Sobol', Ilya M

    1995-01-01

    Rank transformations are frequently employed in numerical experiments involving a computational model, especially in the context of sensitivity and uncertainty analyses. Response surface replacement and parameter screening are tasks which may benefit from a rank transformation. Ranks can cope with nonlinear (albeit monotonic) input-output distributions, allowing the use of linear regression techniques. Rank transformed statistics are more robust, and provide a useful solution in the presence of long tailed input and output distributions. As is known to practitioners, care must be employed when interpreting the results of such analyses, as any conclusion drawn using ranks does not translate easily to the original model. In the present note an heuristic approach is taken, to explore, by way of practical examples, the effect of a rank transformation on the outcome of a sensitivity analysis. An attempt is made to identify trends, and to correlate these effects to a model taxonomy. Employing sensitivity indices, whereby the total variance of the model output is decomposed into a sum of terms of increasing dimensionality, we show that the main effect of the rank transformation is to increase the relative weight of the first order terms (the 'main effects'), at the expense of the 'interactions' and 'higher order interactions'. As a result the influence of those parameters which influence the output mostly by way of interactions may be overlooked in an analysis based on the ranks. This difficulty increases with the dimensionality of the problem, and may lead to the failure of a rank based sensitivity analysis. We suggest that the models can be ranked, with respect to the complexity of their input-output relationship, by mean of an 'Association' index I y . I y may complement the usual model coefficient of determination R y 2 as a measure of model complexity for the purpose of uncertainty and sensitivity analysis

  8. Higher-dimensional generalizations of the Watanabe–Strogatz transform for vector models of synchronization

    Science.gov (United States)

    Lohe, M. A.

    2018-06-01

    We generalize the Watanabe–Strogatz (WS) transform, which acts on the Kuramoto model in d  =  2 dimensions, to a higher-dimensional vector transform which operates on vector oscillator models of synchronization in any dimension , for the case of identical frequency matrices. These models have conserved quantities constructed from the cross ratios of inner products of the vector variables, which are invariant under the vector transform, and have trajectories which lie on the unit sphere S d‑1. Application of the vector transform leads to a partial integration of the equations of motion, leaving independent equations to be solved, for any number of nodes N. We discuss properties of complete synchronization and use the reduced equations to derive a stability condition for completely synchronized trajectories on S d‑1. We further generalize the vector transform to a mapping which acts in and in particular preserves the unit ball , and leaves invariant the cross ratios constructed from inner products of vectors in . This mapping can be used to partially integrate a system of vector oscillators with trajectories in , and for d  =  2 leads to an extension of the Kuramoto system to a system of oscillators with time-dependent amplitudes and trajectories in the unit disk. We find an inequivalent generalization of the Möbius map which also preserves but leaves invariant a different set of cross ratios, this time constructed from the vector norms. This leads to a different extension of the Kuramoto model with trajectories in the complex plane that can be partially integrated by means of fractional linear transformations.

  9. Internet of Things building blocks and business models

    CERN Document Server

    Hussain, Fatima

    2017-01-01

    This book describes the building blocks and introductory business models for Internet of Things (IoT). The author provide an overview of the entire IoT architecture and constituent layers, followed by detail description of each block . Various inter-connecting technologies and sensors are discussed in context of IoT networks. In addition to this, concepts of Big Data and Fog Computing are presented and characterized as per data generated by versatile IoT applications . Smart parking system and context aware services are presented as an hybrid model of cloud and Fog Afterwards, various IoT applications and respective business models are discussed. Finally, author summarizes the IoT building blocks and identify research issues in each, and suggest potential research projects worthy of pursuing. .

  10. Parameters of Models of Structural Transformations in Alloy Steel Under Welding Thermal Cycle

    Science.gov (United States)

    Kurkin, A. S.; Makarov, E. L.; Kurkin, A. B.; Rubtsov, D. E.; Rubtsov, M. E.

    2017-05-01

    A mathematical model of structural transformations in an alloy steel under the thermal cycle of multipass welding is suggested for computer implementation. The minimum necessary set of parameters for describing the transformations under heating and cooling is determined. Ferritic-pearlitic, bainitic and martensitic transformations under cooling of a steel are considered. A method for deriving the necessary temperature and time parameters of the model from the chemical composition of the steel is described. Published data are used to derive regression models of the temperature ranges and parameters of transformation kinetics in alloy steels. It is shown that the disadvantages of the active visual methods of analysis of the final phase composition of steels are responsible for inaccuracy and mismatch of published data. The hardness of a specimen, which correlates with some other mechanical properties of the material, is chosen as the most objective and reproducible criterion of the final phase composition. The models developed are checked by a comparative analysis of computational results and experimental data on the hardness of 140 alloy steels after cooling at various rates.

  11. Transforming process models : executable rewrite rules versus a formalized Java program

    NARCIS (Netherlands)

    Van Gorp, P.M.E.; Eshuis, H.; Petriu, D.C.; Rouquette, N.

    2010-01-01

    In the business process management community, transformations for process models are usually programmed using imperative languages (such as Java). The underlying mapping rules tend to be documented using informal visual rules whereas they tend to be formalized using mathematical set constructs. In

  12. Transforming process models : executable rewrite rules versus a formalized Java program

    NARCIS (Netherlands)

    Van Gorp, P.M.E.; Eshuis, H.

    2010-01-01

    In the business process management community, transformations for process models are usually programmed using imperative languages. The underlying mapping rules tend to be documented using informal visual rules whereas they tend to be formalized using mathematical set constructs. In the Graph and

  13. Chemical Transformation System: Cloud Based Cheminformatic Services to Support Integrated Environmental Modeling

    Science.gov (United States)

    Integrated Environmental Modeling (IEM) systems that account for the fate/transport of organics frequently require physicochemical properties as well as transformation products. A myriad of chemical property databases exist but these can be difficult to access and often do not co...

  14. Chemical Transformation System: Cloud Based Cheminformatic Services to Support Integrated Environmental Modeling (proceedings)

    Science.gov (United States)

    Integrated Environmental Modeling (IEM) systems that account for the fate/transport of organics frequently require physicochemical properties as well as transformation products. A myriad of chemical property databases exist but these can be difficult to access and often do not co...

  15. On the transformation of invariance and the exact solutions of the Rabi model

    International Nuclear Information System (INIS)

    Rustamov, K.A.

    1989-12-01

    The transformations of invariance of the Rabi model describing the interaction of the two-level system with the l-mode electromagnetic field are constructed. On this basis the explicit expressions for the coherent states and the Green function of the problem are obtained. (author). 15 refs

  16. A distributed parameter model of transmission line transformer for high voltage nanosecond pulse generation.

    Science.gov (United States)

    Li, Jiangtao; Zhao, Zheng; Li, Longjie; He, Jiaxin; Li, Chenjie; Wang, Yifeng; Su, Can

    2017-09-01

    A transmission line transformer has potential advantages for nanosecond pulse generation including excellent frequency response and no leakage inductance. The wave propagation process in a secondary mode line is indispensable due to an obvious inside transient electromagnetic transition in this scenario. The equivalent model of the transmission line transformer is crucial for predicting the output waveform and evaluating the effects of magnetic cores on output performance. However, traditional lumped parameter models are not sufficient for nanosecond pulse generation due to the natural neglect of wave propagations in secondary mode lines based on a lumped parameter assumption. In this paper, a distributed parameter model of transmission line transformer was established to investigate wave propagation in the secondary mode line and its influential factors through theoretical analysis and experimental verification. The wave propagation discontinuity in the secondary mode line induced by magnetic cores is emphasized. Characteristics of the magnetic core under a nanosecond pulse were obtained by experiments. Distribution and formation of the secondary mode current were determined for revealing essential wave propagation processes in secondary mode lines. The output waveform and efficiency were found to be affected dramatically by wave propagation discontinuity in secondary mode lines induced by magnetic cores. The proposed distributed parameter model was proved more suitable for nanosecond pulse generation in aspects of secondary mode current, output efficiency, and output waveform. In depth, comprehension of underlying mechanisms and a broader view of the working principle of the transmission line transformer for nanosecond pulse generation can be obtained through this research.

  17. Minimizing bias in biomass allometry: Model selection and log transformation of data

    Science.gov (United States)

    Joseph Mascaro; undefined undefined; Flint Hughes; Amanda Uowolo; Stefan A. Schnitzer

    2011-01-01

    Nonlinear regression is increasingly used to develop allometric equations for forest biomass estimation (i.e., as opposed to the raditional approach of log-transformation followed by linear regression). Most statistical software packages, however, assume additive errors by default, violating a key assumption of allometric theory and possibly producing spurious models....

  18. Improving Computational Efficiency of Prediction in Model-Based Prognostics Using the Unscented Transform

    Science.gov (United States)

    Daigle, Matthew John; Goebel, Kai Frank

    2010-01-01

    Model-based prognostics captures system knowledge in the form of physics-based models of components, and how they fail, in order to obtain accurate predictions of end of life (EOL). EOL is predicted based on the estimated current state distribution of a component and expected profiles of future usage. In general, this requires simulations of the component using the underlying models. In this paper, we develop a simulation-based prediction methodology that achieves computational efficiency by performing only the minimal number of simulations needed in order to accurately approximate the mean and variance of the complete EOL distribution. This is performed through the use of the unscented transform, which predicts the means and covariances of a distribution passed through a nonlinear transformation. In this case, the EOL simulation acts as that nonlinear transformation. In this paper, we review the unscented transform, and describe how this concept is applied to efficient EOL prediction. As a case study, we develop a physics-based model of a solenoid valve, and perform simulation experiments to demonstrate improved computational efficiency without sacrificing prediction accuracy.

  19. An IoT Based Predictive Connected Car Maintenance Approach

    Directory of Open Access Journals (Sweden)

    Rohit Dhall

    2017-03-01

    Full Text Available Internet of Things (IoT is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.

  20. Diffuse-interface model for rapid phase transformations in nonequilibrium systems.

    Science.gov (United States)

    Galenko, Peter; Jou, David

    2005-04-01

    A thermodynamic approach to rapid phase transformations within a diffuse interface in a binary system is developed. Assuming an extended set of independent thermodynamic variables formed by the union of the classic set of slow variables and the space of fast variables, we introduce finiteness of the heat and solute diffusive propagation at the finite speed of the interface advancing. To describe transformations within the diffuse interface, we use the phase-field model which allows us to follow steep but smooth changes of phase within the width of the diffuse interface. Governing equations of the phase-field model are derived for the hyperbolic model, a model with memory, and a model of nonlinear evolution of transformation within the diffuse interface. The consistency of the model is proved by the verification of the validity of the condition of positive entropy production and by outcomes of the fluctuation-dissipation theorem. A comparison with existing sharp-interface and diffuse-interface versions of the model is given.

  1. Conceptual Model Formalization in a Semantic Interoperability Service Framework: Transforming Relational Database Schemas to OWL.

    Science.gov (United States)

    Bravo, Carlos; Suarez, Carlos; González, Carolina; López, Diego; Blobel, Bernd

    2014-01-01

    Healthcare information is distributed through multiple heterogeneous and autonomous systems. Access to, and sharing of, distributed information sources are a challenging task. To contribute to meeting this challenge, this paper presents a formal, complete and semi-automatic transformation service from Relational Databases to Web Ontology Language. The proposed service makes use of an algorithm that allows to transform several data models of different domains by deploying mainly inheritance rules. The paper emphasizes the relevance of integrating the proposed approach into an ontology-based interoperability service to achieve semantic interoperability.

  2. Studies of transformational leadership: evaluating two alternative models of trust and satisfaction.

    Science.gov (United States)

    Yang, Yi-Feng

    2014-06-01

    This study evaluates the influence of leadership style and employee trust in their leaders on job satisfaction. 341 personnel (164 men, 177 women; M age = 33.5 yr., SD = 5.1) from four large insurance companies in Taiwan completed the transformational leadership behavior inventory, the leadership trust scale and a short version of the Minnesota (Job) Satisfaction Questionnaire. A bootstrapping mediation and structural equation modeling revealed that the effect of transformational leadership on job satisfaction was mediated by leadership trust. This study highlights the importance of leadership trust in leadership-satisfaction relationships, and provides managers with practical ways to enhance job satisfaction.

  3. A study on thermal characteristics analysis model of high frequency switching transformer

    Science.gov (United States)

    Yoo, Jin-Hyung; Jung, Tae-Uk

    2015-05-01

    Recently, interest has been shown in research on the module-integrated converter (MIC) in small-scale photovoltaic (PV) generation. In an MIC, the voltage boosting high frequency transformer should be designed to be compact in size and have high efficiency. In response to the need to satisfy these requirements, this paper presents a coupled electromagnetic analysis model of a transformer connected with a high frequency switching DC-DC converter circuit while considering thermal characteristics due to the copper and core losses. A design optimization procedure for high efficiency is also presented using this design analysis method, and it is verified by the experimental result.

  4. Adaptive Neuron Model: An architecture for the rapid learning of nonlinear topological transformations

    Science.gov (United States)

    Tawel, Raoul (Inventor)

    1994-01-01

    A method for the rapid learning of nonlinear mappings and topological transformations using a dynamically reconfigurable artificial neural network is presented. This fully-recurrent Adaptive Neuron Model (ANM) network was applied to the highly degenerate inverse kinematics problem in robotics, and its performance evaluation is bench-marked. Once trained, the resulting neuromorphic architecture was implemented in custom analog neural network hardware and the parameters capturing the functional transformation downloaded onto the system. This neuroprocessor, capable of 10(exp 9) ops/sec, was interfaced directly to a three degree of freedom Heathkit robotic manipulator. Calculation of the hardware feed-forward pass for this mapping was benchmarked at approximately 10 microsec.

  5. NOVEL CANDHIKALA KAPURANTA SEBAGAI ALTERNATIF PENYELESAIAN DEHUMANISASI PADA ERA INTERNET OF THINGS (IOT

    Directory of Open Access Journals (Sweden)

    Krisna Pebryawan

    2018-03-01

    Full Text Available AbstractThis study aims to describe the cultural value in Candhikala Kapuranta novel as an alternative to dehumanization settlement in IoT era. The research method used is qualitative descriptive. The data source used is Candhikala Kapuranta's novel by Sugiarto Sriwibawa. Data collection techniques used is the technique of referring note, while the technique of data analysis using interactive analysis techniques. Based on the research that has been done, the results of his research as follows. First, the cultural values in Candhikala Kapuranta's novel include religious values and social values. Second, dehumanization in the IoT era is individualism, pornography, and intolerance. Thirdly, the cultural values contained in Candhikala Kapuranta's novel as an alternative to dehumanization settlement in the IoT era.Keywords: Cultural Values, Dehumanization, Era IoT, Novel

  6. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  7. Numerical modelling of tools steel hardening. A thermal phenomena and phase transformations

    Directory of Open Access Journals (Sweden)

    T. Domański

    2010-01-01

    Full Text Available This paper the model hardening of tool steel takes into considerations of thermal phenomena and phase transformations in the solid state are presented. In the modelling of thermal phenomena the heat equations transfer has been solved by Finite Elements Method. The graph of continuous heating (CHT and continuous cooling (CCT considered steel are used in the model of phase transformations. Phase altered fractions during the continuous heating austenite and continuous cooling pearlite or bainite are marked in the model by formula Johnson-Mehl and Avrami. For rate of heating >100 K/s the modified equation Koistinen and Marburger is used. Modified equation Koistinen and Marburger identify the forming fraction of martensite.

  8. Variational data assimilation schemes for transport and transformation models of atmospheric chemistry

    Science.gov (United States)

    Penenko, Alexey; Penenko, Vladimir; Tsvetova, Elena; Antokhin, Pavel

    2016-04-01

    The work is devoted to data assimilation algorithm for atmospheric chemistry transport and transformation models. In the work a control function is introduced into the model source term (emission rate) to provide flexibility to adjust to data. This function is evaluated as the constrained minimum of the target functional combining a control function norm with a norm of the misfit between measured data and its model-simulated analog. Transport and transformation processes model is acting as a constraint. The constrained minimization problem is solved with Euler-Lagrange variational principle [1] which allows reducing it to a system of direct, adjoint and control function estimate relations. This provides a physically-plausible structure of the resulting analysis without model error covariance matrices that are sought within conventional approaches to data assimilation. High dimensionality of the atmospheric chemistry models and a real-time mode of operation demand for computational efficiency of the data assimilation algorithms. Computational issues with complicated models can be solved by using a splitting technique. Within this approach a complex model is split to a set of relatively independent simpler models equipped with a coupling procedure. In a fine-grained approach data assimilation is carried out quasi-independently on the separate splitting stages with shared measurement data [2]. In integrated schemes data assimilation is carried out with respect to the split model as a whole. We compare the two approaches both theoretically and numerically. Data assimilation on the transport stage is carried out with a direct algorithm without iterations. Different algorithms to assimilate data on nonlinear transformation stage are compared. In the work we compare data assimilation results for both artificial and real measurement data. With these data we study the impact of transformation processes and data assimilation to the performance of the modeling system [3]. The

  9. Detailed High Frequency Models of Various Winding Types in Power Transformers

    DEFF Research Database (Denmark)

    Pedersen, Kenneth; Lunow, Morten Erlandsson; Holbøll, Joachim

    2005-01-01

    Abstract--In this paper, techniques are described which demonstrate how a highly detailed internal transformer model can be obtained systematically with Matlab and how it can be prepared for subsequent transient analysis. The input of such a model will mainly be the description of the cross secti...... equivalent circuit. Finally a new circuit extraction technique is proposed for vector fitted impedance matrices for more efficient computation....

  10. Multivariate Calibration and Model Integrity for Wood Chemistry Using Fourier Transform Infrared Spectroscopy

    OpenAIRE

    Zhou, Chengfeng; Jiang, Wei; Cheng, Qingzheng; Via, Brian K.

    2015-01-01

    This research addressed a rapid method to monitor hardwood chemical composition by applying Fourier transform infrared (FT-IR) spectroscopy, with particular interest in model performance for interpretation and prediction. Partial least squares (PLS) and principal components regression (PCR) were chosen as the primary models for comparison. Standard laboratory chemistry methods were employed on a mixed genus/species hardwood sample set to collect the original data. PLS was found to provide bet...

  11. Asset transformation and the challenges to servitize a utility business model

    International Nuclear Information System (INIS)

    Helms, Thorsten

    2016-01-01

    The traditional energy utility business model is under pressure, and energy services are expected to play an important role for the energy transition. Experts and scholars argue that utilities need to innovate their business models, and transform from commodity suppliers to service providers. The transition from a product-oriented, capital-intensive business model based on tangible assets, towards a service-oriented, expense-intensive business model based on intangible assets may present great managerial and organizational challenges. Little research exists about such transitions for capital-intensive commodity providers, and particularly energy utilities, where the challenges to servitize are expected to be greatest. This qualitative paper explores the barriers to servitization within selected Swiss and German utility companies through a series of interviews with utility managers. One of them is ‘asset transformation’, the shift from tangible to intangible assets as major input factor for the value proposition, which is proposed as a driver for the complexity of business model transitions. Managers need to carefully manage those challenges, and find ways to operate both new service and established utility business models aside. Policy makers can support the transition of utilities through more favorable regulatory frameworks for energy services, and by supporting the exchange of knowledge in the industry. - Highlights: •The paper analyses the expected transformation of utilities into service-providers. •Service and utility business models possess very different attributes. •The former is based on intangible, the latter on tangible assets. •The transformation into a service-provider is related with great challenges. •Asset transformation is proposed as a barrier for business model innovation.

  12. Modeling of a ring rosen-type piezoelectric transformer by Hamilton's principle.

    Science.gov (United States)

    Nadal, Clément; Pigache, Francois; Erhart, Jiří

    2015-04-01

    This paper deals with the analytical modeling of a ring Rosen-type piezoelectric transformer. The developed model is based on a Hamiltonian approach, enabling to obtain main parameters and performance evaluation for the first radial vibratory modes. Methodology is detailed, and final results, both the input admittance and the electric potential distribution on the surface of the secondary part, are compared with numerical and experimental ones for discussion and validation.

  13. Expectation Maximization Algorithm for Box-Cox Transformation Cure Rate Model and Assessment of Model Misspecification Under Weibull Lifetimes.

    Science.gov (United States)

    Pal, Suvra; Balakrishnan, Narayanaswamy

    2018-05-01

    In this paper, we develop likelihood inference based on the expectation maximization algorithm for the Box-Cox transformation cure rate model assuming the lifetimes to follow a Weibull distribution. A simulation study is carried out to demonstrate the performance of the proposed estimation method. Through Monte Carlo simulations, we also study the effect of model misspecification on the estimate of cure rate. Finally, we analyze a well-known data on melanoma with the model and the inferential method developed here.

  14. Fault diagnostics in power transformer model winding for different alpha values

    Directory of Open Access Journals (Sweden)

    G.H. Kusumadevi

    2015-09-01

    Full Text Available Transient overvoltages appearing at line terminal of power transformer HV windings can cause failure of winding insulation. The failure can be from winding to ground or between turns or sections of winding. In most of the cases, failure from winding to ground can be detected by changes in the wave shape of surge voltage appearing at line terminal. However, detection of insulation failure between turns may be difficult due to intricacies involved in identifications of faults. In this paper, simulation investigations carried out on a power transformer model winding for identifying faults between turns of winding has been reported. The power transformer HV winding has been represented by 8 sections, 16 sections and 24 sections. Neutral current waveform has been analyzed for same model winding represented by different number of sections. The values of α (‘α’ value is the square root of total ground capacitance to total series capacitance of winding considered for windings are 5, 10 and 20. Standard lightning impulse voltage (1.2/50 μs wave shape have been considered for analysis. Computer simulations have been carried out using software PSPICE version 10.0. Neutral current and frequency response analysis methods have been used for identification of faults within sections of transformer model winding.

  15. Thermal Error Modelling of the Spindle Using Data Transformation and Adaptive Neurofuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Yanlei Li

    2015-01-01

    Full Text Available This paper proposes a new method for predicting spindle deformation based on temperature data. The method introduces the adaptive neurofuzzy inference system (ANFIS, which is a neurofuzzy modeling approach that integrates the kernel and geometrical transformations. By utilizing data transformation, the number of ANFIS rules can be effectively reduced and the predictive model structure can be simplified. To build the predictive model, we first map the original temperature data to a feature space with Gaussian kernels. We then process the mapped data with the geometrical transformation and make the data gather in the square region. Finally, the transformed data are used as input to train the ANFIS. A verification experiment is conducted to evaluate the performance of the proposed method. Six Pt100 thermal resistances are used to monitor the spindle temperature, and a laser displacement sensor is used to detect the spindle deformation. Experimental results show that the proposed method can precisely predict the spindle deformation and greatly improve the thermal performance of the spindle. Compared with back propagation (BP networks, the proposed method is more suitable for complex working conditions in practical applications.

  16. The Search for Hydrologic Signatures: The Effect of Data Transformations on Bayesian Model Calibration

    Science.gov (United States)

    Sadegh, M.; Vrugt, J. A.

    2011-12-01

    In the past few years, several contributions have begun to appear in the hydrologic literature that introduced and analyzed the benefits of using a signature based approach to watershed analysis. This signature-based approach abandons the standard single criteria model-data fitting paradigm in favor of a diagnostic approach that better extracts the available information from the available data. Despite the prospects of this new viewpoint, rather ad-hoc criteria have hitherto been proposed to improve watershed modeling. Here, we aim to provide a proper mathematical foundation to signature based analysis. We analyze the information content of different data transformation by analyzing their convergence speed with Markov Chain Monte Carlo (MCMC) simulation using the Generalized Likelihood function of Schousp and Vrugt (2010). We compare the information content of the original discharge data against a simple square root and Box-Cox transformation of the streamflow data. We benchmark these results against wavelet and flow duration curve transformations that temporally disaggregate the discharge data. Our results conclusive demonstrate that wavelet transformations and flow duration curves significantly reduce the information content of the streamflow data and consequently unnecessarily increase the uncertainty of the HYMOD model parameters. Hydrologic signatures thus need to be found in the original data, without temporal disaggregation.

  17. Kinetics of transformations nucleated on random parallel planes: analytical modelling and computer simulation

    International Nuclear Information System (INIS)

    Rios, Paulo R; Assis, Weslley L S; Ribeiro, Tatiana C S; Villa, Elena

    2012-01-01

    In a classical paper, Cahn derived expressions for the kinetics of transformations nucleated on random planes and lines. He used those as a model for nucleation on the boundaries, edges and vertices of a polycrystal consisting of equiaxed grains. In this paper it is demonstrated that Cahn's expression for random planes may be used in situations beyond the scope envisaged in Cahn's original paper. For instance, we derived an expression for the kinetics of transformations nucleated on random parallel planes that is identical to that formerly obtained by Cahn considering random planes. Computer simulation of transformations nucleated on random parallel planes is carried out. It is shown that there is excellent agreement between simulated results and analytical solutions. Such an agreement is to be expected if both the simulation and the analytical solution are correct. (paper)

  18. Harmonic Domain Modelling of Transformer Core Nonlinearities Using the DIgSILENT PowerFactory Software

    DEFF Research Database (Denmark)

    Bak, Claus Leth; Bak-Jensen, Birgitte; Wiechowski, Wojciech

    2008-01-01

    This paper demonstrates the results of implementation and verification of an already existing algorithm that allows for calculating saturation characteristics of singlephase power transformers. The algorithm was described for the first time in 1993. Now this algorithm has been implemented using...... the DIgSILENT Programming Language (DPL) as an external script in the harmonic domain calculations of a power system analysis tool PowerFactory [10]. The algorithm is verified by harmonic measurements on a single-phase power transformer. A theoretical analysis of the core nonlinearities phenomena...... in single and three-phase transformers is also presented. This analysis leads to the conclusion that the method can be applied for modelling nonlinearities of three-phase autotransformers....

  19. Case Study: IoT Data Integration for Higher Education Institution

    Directory of Open Access Journals (Sweden)

    Pinka Krišjānis

    2016-12-01

    Full Text Available Nowadays the Internet of Things (IoT is one of the most trending technologies. It is expected that by year 2020 there will be 50 billion of Internet-connected devices. Fields like smart cities and smart homes largely rely on IoT phenomena by using a wide variety of sensors for data collection, analysis and corresponding actions. The paper describes how this trending and relatively new technology is applied at Riga Technical University for educational purposes.

  20. Security and Privacy Issues for an IoT based Smart Home

    OpenAIRE

    GENEIATAKIS DIMITRIOS; KOUNELIS IOANNIS; NEISSE RICARDO; NAI FOVINO IGOR; STERI GARY; BALDINI GIANMARCO

    2017-01-01

    Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide new advanced services for users, their limited processing capabilities make them vulnerable...