WorldWideScience

Sample records for model iot transform

  1. Incorporating a 360 Degree Evaluation Model IOT Transform the USMC Performance Evaluation System

    Science.gov (United States)

    2005-02-08

    Incorporating a 360 Evaluation Model IOT Transform the USMC Performance Evaluation System EWS 2005 Subject Area Manpower...Incorporating a 360 Evaluation Model IOT Transform the USMC Performance Evaluation System” Contemporary...COVERED 00-00-2005 to 00-00-2005 4. TITLE AND SUBTITLE Incorporating a 360 Evaluation Model IOT Transform the USMC Performance

  2. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  3. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  5. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  6. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  7. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.

    Science.gov (United States)

    Kim, Jonghyuk; Hwangbo, Hyunwoo

    2018-03-23

    We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  8. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT

    Directory of Open Access Journals (Sweden)

    Jonghyuk Kim

    2018-03-01

    Full Text Available We introduce current home Internet of Things (IoT technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  9. Futures Business Models for an IoT Enabled Healthcare Sector: A Causal Layered Analysis Perspective

    Directory of Open Access Journals (Sweden)

    Julius Francis Gomes

    2016-12-01

    Full Text Available Purpose: To facilitate futures business research by proposing a novel way to combine business models as a conceptual tool with futures research techniques. Design: A futures perspective is adopted to foresight business models of the Internet of Things (IoT enabled healthcare sector by using business models as a futures business research tool. In doing so, business models is coupled with one of the most prominent foresight methodologies, Causal Layered Analysis (CLA. Qualitative analysis provides deeper understanding of the phenomenon through the layers of CLA; litany, social causes, worldview and myth. Findings: It is di cult to predict the far future for a technology oriented sector like healthcare. This paper presents three scenarios for short-, medium- and long-term future. Based on these scenarios we also present a set of business model elements for different future time frames. This paper shows a way to combine business models with CLA, a foresight methodology; in order to apply business models in futures business research. Besides offering early results for futures business research, this study proposes a conceptual space to work with individual business models for managerial stakeholders. Originality / Value: Much research on business models has offered conceptualization of the phenomenon, innovation through business model and transformation of business models. However, existing literature does not o er much on using business model as a futures research tool. Enabled by futures thinking, we collected key business model elements and building blocks for the futures market and ana- lyzed them through the CLA framework.

  10. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  11. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  12. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  13. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  14. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  15. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  16. Futures Business Models for an IoT Enabled Healthcare Sector: A Causal Layered Analysis Perspective

    OpenAIRE

    Julius Francis Gomes; Sara Moqaddemerad

    2016-01-01

    Purpose: To facilitate futures business research by proposing a novel way to combine business models as a conceptual tool with futures research techniques. Design: A futures perspective is adopted to foresight business models of the Internet of Things (IoT) enabled healthcare sector by using business models as a futures business research tool. In doing so, business models is coupled with one of the most prominent foresight methodologies, Causal Layered Analysis (CLA). Qualitative analysis...

  17. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  18. A Reference Model for Monitoring IoT WSN-Based Applications

    Directory of Open Access Journals (Sweden)

    Juan Vicente Capella

    2016-10-01

    Full Text Available The Internet of Things (IoT is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP, which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN’s behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  19. Comparisons of Ballistic Trajectory Simulations Using Artillery Meteorological Messages Derived from Local Balloon Data and Battlescale Forecast Model Data for the 1998 SADARM IOT&E Firings

    Science.gov (United States)

    2001-11-01

    Evaluation ( IOT &E) firings that occurred during the summer of 1998 at Fort Greeley, Alaska. Due to the complex terrain and local wind conditions encountered...in the test area during the IOT &E, the Met study was proposed as a way to evaluate current and future artillery Met forecasting capabilities to improve...SADARM targeting accuracy. This report includes Ballistic trajectory simulation analyses using raw and forecast Met values and corresponding actual impact data front the IOT &E firings.

  20. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection †

    Science.gov (United States)

    Delaney, Declan T.; O’Hare, Gregory M. P.

    2016-01-01

    No single network solution for Internet of Things (IoT) networks can provide the required level of Quality of Service (QoS) for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks. PMID:27916929

  1. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection.

    Science.gov (United States)

    Delaney, Declan T; O'Hare, Gregory M P

    2016-12-01

    No single network solution for Internet of Things (IoT) networks can provide the required level of Quality of Service (QoS) for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks.

  2. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection

    Directory of Open Access Journals (Sweden)

    Declan T. Delaney

    2016-12-01

    Full Text Available No single network solution for Internet of Things (IoT networks can provide the required level of Quality of Service (QoS for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks.

  3. A Reference Model for Monitoring IoT WSN-Based Applications

    OpenAIRE

    Capella, Juan Vicente; Campelo, Jos? Carlos; Bonastre, Alberto; Ors, Rafael

    2016-01-01

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility ...

  4. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a

  5. Initially Researches for the Development of SSME under the Background of IOT

    Science.gov (United States)

    Han, Kun; Liu, Shurong; Zhang, Dacheng; Han, Ying

    The Internet Of Things (IOT) is proposed in the 1990s. The original intention has been put forward is people to things and things to things can deliver information like person as. IOT broke the human traditional thinking. This paper researches the practical function of IOT to expand the theory of Services Sciences, Management and Engineering (SSME). On the analysis of the key technology and model of IOT, the events-driven SSME model based on IOT, and the IOT framework based on SSME, it further studies the importance of IOT in the field of SSME.

  6. F-106 Tow System (IOT&E).

    Science.gov (United States)

    1982-04-01

    UAIMTES TACTICAL AI COMMANO LANGLEY AM FORCE BASE VA INN ATmop DR wummc Draft Test Plan, TAC/USAFADWC Project 82C-185A, F-106 Tow System ( IOT &E...34 - " fl"S ’" . : TAC ORDER: F-106 Tow System ( IOT -E) . = ’ . .... .. -*OR s se . .s..... ." . . ".. . ... PROJECT ORDER NO.: -185A...i a7 .fi * - 5. -Test Plan: The IOT &E test plan will be prepared by 475 TESTS, and submitted by the USAFADWC Commander to IQ TAC for approval IAW

  7. Cost Effectiveness of the Instrumentalism in Occupational Therapy (IOT) Conceptual Model as a Guide for Intervention with Adolescents with Emotional and Behavioral Disorders (EBD)

    Science.gov (United States)

    Ikiugu, Moses N.; Anderson, Lynne

    2007-01-01

    The purpose of this paper was to demonstrate the cost-effectiveness of using the Instrumentalism in Occupational Therapy (IOT) conceptual practice model as a guide for intervention to assist teenagers with emotional and behavioral disorders (EBD) transition successfully into adulthood. The cost effectiveness analysis was based on a project…

  8. Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT

    Directory of Open Access Journals (Sweden)

    Vijender Kumar Solanki

    2017-03-01

    Full Text Available Keeping in mind the need to preserve energy as well as utilize the available at its best the need was felt to develop a module that would be able to sort out the problem where resources such as water and electricity were wasted, in urban as well as rural area. Resource (electricity was wasted as beside the point operation of Highway and High Mast Lamp; while wastage of water followed by improper trends and methodologies imparted for watering of city park, road side plantation and highway plantation. Thus as per Energy survey statistics of a City (Lucknow, India it was found that major portion of resources (water and electricity were being wasted due to negligent activities of officials who were in charge of resource management. So to facilitate energy saving trends and to completely modernize it to autonomous system, module below is proposed which incorporates modern technological peripheral and has its base ingrained in IoT (Internet of Things which when put into consideration would result in large scale resource and energy saving.This developed module incorporates the peripherals such as Arduino, Texas Instruments ultra low power kits etc. in accordance with software technology including Lab View which help to monitor as well as control the various operation from the base station, located far away from the site. Lab View Interface interacts with all the module located at various city parks, subways and highway lighting modules. Later below in several section a detailed pattern and application frame has been put up.

  9. Level Design as Model Transformation

    NARCIS (Netherlands)

    Dormans, Joris

    2011-01-01

    This paper frames the process of designing a level in a game as a series of model transformations. The transformations correspond to the application of particular design principles, such as the use of locks and keys to transform a linear mission into a branching space. It shows that by using rewrite

  10. INFORMATION MODEL OF SOCIAL TRANSFORMATIONS

    Directory of Open Access Journals (Sweden)

    Мария Васильевна Комова

    2013-09-01

    Full Text Available The social transformation is considered as a process of qualitative changes of the society, creating a new level of organization in all areas of life, in different social formations, societies of different types of development. The purpose of the study is to create a universal model for studying social transformations based on their understanding as the consequence of the information exchange processes in the society. After defining the conceptual model of the study, the author uses the following methods: the descriptive method, analysis, synthesis, comparison.Information, objectively existing in all elements and systems of the material world, is an integral attribute of the society transformation as well. The information model of social transformations is based on the definition of the society transformation as the change in the information that functions in the society’s information space. The study of social transformations is the study of information flows circulating in the society and being characterized by different spatial, temporal, and structural states. Social transformations are a highly integrated system of social processes and phenomena, the nature, course and consequences of which are affected by the factors representing the whole complex of material objects. The integrated information model of social transformations foresees the interaction of the following components: social memory, information space, and the social ideal. To determine the dynamics and intensity of social transformations the author uses the notions of "information threshold of social transformations" and "information pressure".Thus, the universal nature of information leads to considering social transformations as a system of information exchange processes. Social transformations can be extended to any episteme actualized by social needs. The establishment of an information threshold allows to simulate the course of social development, to predict the

  11. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  12. Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems

    DEFF Research Database (Denmark)

    Tomlein, Matus; Grønbæk, Kaj

    2016-01-01

    Applications in embedded open software ecosystems for Internet of Things devices open new challenges regarding how their variability and capabilities should be modeled. In collaboration with an industrial partner, we have recognized that such applications have complex constraints on the context. We...

  13. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  14. A multi-domain trust management model for supporting RFID applications of IoT.

    Science.gov (United States)

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  15. FOURIER SERIES MODELS THROUGH TRANSFORMATION

    African Journals Online (AJOL)

    DEPT

    This study considers the application of Fourier series analysis (FSA) to seasonal time series data. The ultimate objective of the study is to construct an FSA model that can lead to reliable forecast. Specifically, the study evaluates data for the assumptions of time series analysis; applies the necessary transformation to the ...

  16. IOT Overview Polarimetry

    Science.gov (United States)

    Ageorges, N.

    This contribution concentrates on the polarimetric modes offered by different instruments at ESO. In the introduction, I will demonstrate the importance of polarimetry, the kind of science it permits to achieve and list the instruments which offer these modes. Sects. 2 and 3 will present the involved modes in more details as well as the currently related calibrations, as part of the calibration plans.ESO does not offer any pure polarimetric instrument. As a consequence the polarimetric modes are just one (or more) mode(s) of the given instruments. Polarimetric modes might be mentioned in the related IOT but are not followed up thoroughly as is e.g. spectroscopy.

  17. Logistic Model to Support Service Modularity for the Promotion of Reusability in a Web Objects-Enabled IoT Environment.

    Science.gov (United States)

    Kibria, Muhammad Golam; Ali, Sajjad; Jarwar, Muhammad Aslam; Kumar, Sunil; Chong, Ilyoung

    2017-09-22

    Due to a very large number of connected virtual objects in the surrounding environment, intelligent service features in the Internet of Things requires the reuse of existing virtual objects and composite virtual objects. If a new virtual object is created for each new service request, then the number of virtual object would increase exponentially. The Web of Objects applies the principle of service modularity in terms of virtual objects and composite virtual objects. Service modularity is a key concept in the Web Objects-Enabled Internet of Things (IoT) environment which allows for the reuse of existing virtual objects and composite virtual objects in heterogeneous ontologies. In the case of similar service requests occurring at the same, or different locations, the already-instantiated virtual objects and their composites that exist in the same, or different ontologies can be reused. In this case, similar types of virtual objects and composite virtual objects are searched and matched. Their reuse avoids duplication under similar circumstances, and reduces the time it takes to search and instantiate them from their repositories, where similar functionalities are provided by similar types of virtual objects and their composites. Controlling and maintaining a virtual object means controlling and maintaining a real-world object in the real world. Even though the functional costs of virtual objects are just a fraction of those for deploying and maintaining real-world objects, this article focuses on reusing virtual objects and composite virtual objects, as well as discusses similarity matching of virtual objects and composite virtual objects. This article proposes a logistic model that supports service modularity for the promotion of reusability in the Web Objects-enabled IoT environment. Necessary functional components and a flowchart of an algorithm for reusing composite virtual objects are discussed. Also, to realize the service modularity, a use case scenario is

  18. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Lathifah Arief

    2017-08-01

    Full Text Available Ekosistem Internet of Things (IoT berkembang dengan sangat cepat dan diperkirakan akan menghubungkan 5-20 miliar perangkat pada tahun 2020. Data yang dihimpun dari perangkat ini akan mencapai jumlah yang sangat besar. Saat ini, ekosistem IoT pada umumnya menggunakan model sistem terpusat. Model tersebut memiliki beberapa kelemahan, seperti biaya pemeliharaan yang relatif tinggi, Sistem terdistribusi dapat menjadi alternatif solusi. Blockchain, teknologi ledger terditribusi, memungkinkan transaksi peer-to-peer tanpa perlu adanya perantara pihak ketiga yang terpercaya. Paper ini bertujuan untuk mengeksplorasi potensi pengintegrasian Blockchain ke dalam ekosistem IoT. Hasil penelitian berupa model dan use-case pemanfaatan Blockchain dalam IoT.

  19. Transparent Model Transformation: Turning Your Favourite Model Editor into a Transformation Tool

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2015-01-01

    Current model transformation languages are supported by dedicated editors, often closely coupled to a single execution engine. We introduce Transparent Model Transformation, a paradigm enabling modelers to specify transformations using a familiar tool: their model editor. We also present VMTL, th...... model transformation tool sharing the model editor’s benefits, transparently....

  20. Towards Translating Graph Transformation Approaches by Model Transformations

    NARCIS (Netherlands)

    Hermann, F.; Kastenberg, H.; Modica, T.; Karsai, G.; Taentzer, G.

    2006-01-01

    Recently, many researchers are working on semantics preserving model transformation. In the field of graph transformation one can think of translating graph grammars written in one approach to a behaviourally equivalent graph grammar in another approach. In this paper we translate graph grammars

  1. Model Validation in Ontology Based Transformations

    Directory of Open Access Journals (Sweden)

    Jesús M. Almendros-Jiménez

    2012-10-01

    Full Text Available Model Driven Engineering (MDE is an emerging approach of software engineering. MDE emphasizes the construction of models from which the implementation should be derived by applying model transformations. The Ontology Definition Meta-model (ODM has been proposed as a profile for UML models of the Web Ontology Language (OWL. In this context, transformations of UML models can be mapped into ODM/OWL transformations. On the other hand, model validation is a crucial task in model transformation. Meta-modeling permits to give a syntactic structure to source and target models. However, semantic requirements have to be imposed on source and target models. A given transformation will be sound when source and target models fulfill the syntactic and semantic requirements. In this paper, we present an approach for model validation in ODM based transformations. Adopting a logic programming based transformational approach we will show how it is possible to transform and validate models. Properties to be validated range from structural and semantic requirements of models (pre and post conditions to properties of the transformation (invariants. The approach has been applied to a well-known example of model transformation: the Entity-Relationship (ER to Relational Model (RM transformation.

  2. Managing Green Business Model Transformations

    CERN Document Server

    Sommer, Axel

    2012-01-01

    Environmental sustainability creates both tremendous business opportunities and formidable threats to established companies across virtually all industry sectors. Yet many companies tackle the issue in a superficial or passive way through increased environmental reporting, the use of “greenspeak” in their corporate communication activities or isolated efforts to create green products or reduce pollution. In contrast, there are a small but increasing number of firms that employ a holistic approach to sustainability and consider fundamental changes to their existing business models. By ignoring the opportunities of Green Business Model Transformations, companies exclude themselves from a large variety of potential means to create economic value. In addition to ordinary product and process innovations, they can change “the rules of the game” within an industry towards environmental sustainability. This can facilitate the commercialisation of new green products that would not be competitive otherwise targ...

  3. A NEW OS ARCHITECTURE FOR IOT

    Directory of Open Access Journals (Sweden)

    Jean Y. Astier

    2018-03-01

    Full Text Available Current computer operating systems architectures are not well suited for the coming world of connected objects, known as the Internet of Things (IoT for multiple reasons: poor communication performances in both point-to-point and broadcast cases, poor operational reliability and network security, excessive requirements both in terms of processor power and memory size leading to excessive electrical power consumption. We introduce a new computer operating system architecture well adapted to IoT, from the most modest to the most complex, and more generally able to significantly raise the input/output capacities of any communicating computer. This architecture rests on the principles of the Von Neumann hardware model, and is composed of two types of asymmetric distributed containers, which communicate by message passing. We describe the sub-systems of both of these types of containers, where each sub-system has its own scheduler, and a dedicated execution level.

  4. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-01-01

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds. PMID:27367695

  5. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

    Directory of Open Access Journals (Sweden)

    Kirshna Kumar

    2017-12-01

    Full Text Available Energy efficiency is a significant characteristic of battery-run devices such as sensors, RFID and mobile phones. In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment. IoT network success and performance enhancement depend heavily on optimization of energy consumption that enhance the lifetime of IoT nodes and the network. In this context, this paper presents a comprehensive review on energy efficiency techniques used in IoT environments. The techniques proposed by researchers have been categorized based on five different layers of the energy architecture of IoT. These five layers are named as sensing, local processing and storage, network/communication, cloud processing and storage, and application. Specifically, the significance of energy efficiency in IoT environments is highlighted. A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments. Following the taxonomy, a critical review of literature is performed focusing on major functional models, strengths and weaknesses. Open research challenges related to energy efficiency in IoT are identified as future research directions in the area. The survey should benefit IoT industry practitioners and researchers, in terms of augmenting the understanding of energy efficiency and its IoT-related trends and issues.

  6. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  7. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  8. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  9. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  10. Has the Nordic Welfare Model Been Transformed?

    DEFF Research Database (Denmark)

    Greve, Bent; Kvist, Jon

    2011-01-01

    The Nordic welfare model is undergoing a fundamental transformation. Using Denmark we show how a universal welfare state model is gradually being transformed into an emergent multi-tiered welfare state. Whereas the Danish pension system's having become multi-tiered in the 1990s, with private sche...

  11. Modeling of austenite to ferrite transformation

    Indian Academy of Sciences (India)

    Abstract. In this research, an algorithm based on the Q-state Potts model is presented for modeling the austenite to ferrite transformation. In the algorithm, it is possible to exactly track boundary migration of the phase formed during transformation. In the algorithm, effects of changes in chemical free energy, strain free energy ...

  12. BLENDING IOT AND BIG DATA ANALYTICS

    OpenAIRE

    Tulasi.B*; Girish J Vemulkar

    2016-01-01

    Internet is continuously evolving and changing. Internet of Things (IoT) can be considered as the future of Internet applications which involves machine to machine learning (M2M). The actionable intelligence can be derived through fusion of Big Data and real time analytics with IoT. Big Data and IoT can be viewed as two sides of a coin. With the connection between Big Data and the objects on Internet benefits of IoT can be easily reaped. The applications of IoT spread across various domains l...

  13. Quantum decoration transformation for spin models

    International Nuclear Information System (INIS)

    Braz, F.F.; Rodrigues, F.C.; Souza, S.M. de; Rojas, Onofre

    2016-01-01

    It is quite relevant the extension of decoration transformation for quantum spin models since most of the real materials could be well described by Heisenberg type models. Here we propose an exact quantum decoration transformation and also showing interesting properties such as the persistence of symmetry and the symmetry breaking during this transformation. Although the proposed transformation, in principle, cannot be used to map exactly a quantum spin lattice model into another quantum spin lattice model, since the operators are non-commutative. However, it is possible the mapping in the “classical” limit, establishing an equivalence between both quantum spin lattice models. To study the validity of this approach for quantum spin lattice model, we use the Zassenhaus formula, and we verify how the correction could influence the decoration transformation. But this correction could be useless to improve the quantum decoration transformation because it involves the second-nearest-neighbor and further nearest neighbor couplings, which leads into a cumbersome task to establish the equivalence between both lattice models. This correction also gives us valuable information about its contribution, for most of the Heisenberg type models, this correction could be irrelevant at least up to the third order term of Zassenhaus formula. This transformation is applied to a finite size Heisenberg chain, comparing with the exact numerical results, our result is consistent for weak xy-anisotropy coupling. We also apply to bond-alternating Ising–Heisenberg chain model, obtaining an accurate result in the limit of the quasi-Ising chain.

  14. A Model of Transformative Collaboration

    Science.gov (United States)

    Swartz, Ann L.; Triscari, Jacqlyn S.

    2011-01-01

    Two collaborative writing partners sought to deepen their understanding of transformative learning by conducting several spirals of grounded theory research on their own collaborative relationship. Drawing from adult education, business, and social science literature and including descriptive analysis of their records of activity and interaction…

  15. Reliability state space model of Power Transformer

    OpenAIRE

    REENA JHARANIYA; M.AHFAZ KHAN

    2011-01-01

    In electrical power network, transformer is one of the most important electrical equipment in power system, which running status is directly concerned with the reliability of power system. Reliability of a power system is considerably influenced by its equipments. Power transformers are one of the most critical and expensive equipments of a power system and their proper functions are vital for the substations and utilities .Therefore, reliability model of power transformer is very important i...

  16. Model based analysis of piezoelectric transformers.

    Science.gov (United States)

    Hemsel, T; Priya, S

    2006-12-22

    Piezoelectric transformers are increasingly getting popular in the electrical devices owing to several advantages such as small size, high efficiency, no electromagnetic noise and non-flammable. In addition to the conventional applications such as ballast for back light inverter in notebook computers, camera flash, and fuel ignition several new applications have emerged such as AC/DC converter, battery charger and automobile lighting. These new applications demand high power density and wide range of voltage gain. Currently, the transformer power density is limited to 40 W/cm(3) obtained at low voltage gain. The purpose of this study was to investigate a transformer design that has the potential of providing higher power density and wider range of voltage gain. The new transformer design utilizes radial mode both at the input and output port and has the unidirectional polarization in the ceramics. This design was found to provide 30 W power with an efficiency of 98% and 30 degrees C temperature rise from the room temperature. An electro-mechanical equivalent circuit model was developed to describe the characteristics of the piezoelectric transformer. The model was found to successfully predict the characteristics of the transformer. Excellent matching was found between the computed and experimental results. The results of this study will allow to deterministically design unipoled piezoelectric transformers with specified performance. It is expected that in near future the unipoled transformer will gain significant importance in various electrical components.

  17. IOT Based Inline Errands IBIE

    Directory of Open Access Journals (Sweden)

    Ramesh G

    2015-08-01

    Full Text Available The Internet of Things IoT is an emerging technology that is creating an enormous network of things communicating with one another. It involves a broad set of technologies hardware and software stacks. Data humans devices and communication are critical elements of an IoT ecosystem. The primary purpose of this research paper is to provide an advantageous application in day to day life in redeemable time factor. Now a days shopping at malls is a daily or weekly activity of domestic life. Survey states during the initial week of month and weekends are the peak sale periods at shopping malls and super markets. Often equivalent time is taken for billing and payment as time taken for shopping. The Application introduced in this paper provides smart solution to redeemable time.

  18. QAaaS in a Cloud IoT Ecosystem

    Directory of Open Access Journals (Sweden)

    Bogdan GHILIC-MICU

    2017-01-01

    Full Text Available The current transition state of the global society, both from economic and (mostly technological perspective, goes – again – into overtime. Borrowed from fundamental domains and applied into science and research, the latest technological developments are built on graphene, silicene, phosphorene and stanene. The fourth industrial revolution changes perceptions and redefines the status of the individual, transforming him from con-sumer into pro-sumer of energy. Spintronics stimulates the production of accessories specific to the Internet of Things (IoT, like smart clothes connected to internet and implanted phones. Additionally, technology influences software development methodologies facing us with paradigms that transcend philosophies like green, grid, cloud computing and advance toward a superior manifestation of computer programming: Fog Computing (with the next level being presumably Rainbow Computing. Within this avalanche of transformations, technologies and paradigms, one aspect that has to evolve continuously is the quality assurance (QA. Hidden under various concept or methodology encapsulations, quality assurance in all fields and mostly in technological development and software paradigm play a key role. In an ecosystem defined by the context of Cloud IoT, quality assurance as service becomes a real challenge. In this paper we highlight the ways the ecosystem engages in its development not only things, beings, energies, sensors or objects but also technologies. One such popular technology is cloud computing which, in the context of IoT, sees a spectacular development of its own cluster of services, a potential such service being QAaaS.

  19. Six Sigma Driven Enterprise Model Transformation

    Directory of Open Access Journals (Sweden)

    Raymond Vella

    2009-10-01

    Full Text Available Enterprise architecture methods provide a structured system to understand enterprise activities. However, existing enterprise modelling methodologies take static views of the enterprise and do not naturally lead to a path of improvement during enterprise model transformation. This paper discusses the need for a methodology to facilitate changes for improvement in an enterprise. The six sigma methodology is proposed as the tool to facilitate progressive and continual Enterprise Model Transformation to allow businesses to adapt to meet increased customer expectation and global competition. An alignment of six sigma with phases of GERAM life cycle is described with inclusion of Critical-To-Satisfaction (CTS requirements. The synergies of combining the two methodologies are presented in an effort to provide a more culturally embedded framework for Enterprise Model Transformation that builds on the success of six sigma.

  20. Analysis of Crosscutting in Model Transformations

    NARCIS (Netherlands)

    van den Berg, Klaas; Tekinerdogan, B.; Nguyen, H.; Aagedal, J.; Neple, T.; Oldevik, J.

    2006-01-01

    This paper describes an approach for the analysis of crosscutting in model transformations in the Model Driven Architecture (MDA). Software architectures should be amenable to changes in user requirements and technological platforms. Impact analysis of changes can be based on traceability of

  1. Modeling of austenite to ferrite transformation

    Indian Academy of Sciences (India)

    It should be noted that the values of the parameters in modeling procedure can be found in an earlier study (Tong et al 2004). 4. Results and discussion. In figures 1(a)–(c), the achieved results from the modeling of austenite to ferrite transformation are exhibited. In figure 1(a), the austenite grains achieved from the normal ...

  2. Modeling of Current Transformers Under Saturation Conditions

    Directory of Open Access Journals (Sweden)

    Martin Prochazka

    2006-01-01

    Full Text Available During a short circuit the input signal of the relay can be distort by the magnetic core saturation of the current transformer. It is useful to verify the behavior of CT by a mathematical model. The paper describes one phase and three phase models and it presents some methods of how to analyze and classify a deformed secondary current

  3. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  4. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  5. Towards Internet of Services - SDN-enabled IMS Architecture for IoT Integration

    DEFF Research Database (Denmark)

    Katov, Anton Nikolaev; Anggorojati, Bayu; Kyriazakos, Sofoklis

    2016-01-01

    The Internet of Things (IoT) paradigm is gaining tremendous popularity and the number of connected devices, or "things", is continuously growing, aiming to transform our everyday life. In order to address the real needs of the end user, the capabilities of the individual "things" have to be combi......The Internet of Things (IoT) paradigm is gaining tremendous popularity and the number of connected devices, or "things", is continuously growing, aiming to transform our everyday life. In order to address the real needs of the end user, the capabilities of the individual "things" have...

  6. Oil transformation sector modelling: price interactions

    International Nuclear Information System (INIS)

    Maurer, A.

    1992-01-01

    A global oil and oil product prices evolution model is proposed that covers the transformation sector incidence and the final user price establishment together with price interactions between gaseous and liquid hydrocarbons. High disparities among oil product prices in the various consumer zones (North America, Western Europe, Japan) are well described and compared with the low differences between oil supply prices in these zones. Final user price fluctuations are shown to be induced by transformation differences and competition; natural gas market is also modelled

  7. Model transformation based information system modernization

    Directory of Open Access Journals (Sweden)

    Olegas Vasilecas

    2013-03-01

    Full Text Available Information systems begin to date increasingly faster because of rapidly changing business environment. Usually, small changes are not sufficient to adapt complex legacy information systems to changing business needs. A new functionality should be installed with the requirement of putting business data in the smallest possible risk. Information systems modernization problems are beeing analyzed in this paper and a method for information system modernization is proposed. It involves programming code transformation into abstract syntax tree metamodel (ASTM and model based transformation from ASTM into knowledge discovery model (KDM. The method is validated on example for SQL language.

  8. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    . This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  9. Fourier series models through transformation | Omekara | Global ...

    African Journals Online (AJOL)

    This study considers the application of Fourier series analysis (FSA) to seasonal time series data. The ultimate objective of the study is to construct an FSA model that can lead to reliable forecast. Specifically, the study evaluates data for the assumptions of time series analysis; applies the necessary transformation to the ...

  10. Application of reflection in model transformation languages

    NARCIS (Netherlands)

    Ivanov, Ivan

    Computational reflection is a well known technique applied in many existing programming languages ranging from functional to object-oriented languages. In this paper we study the possibilities and benefits of introducing and using reflection in rule-based model transformation languages. The paper

  11. Development and energization of IOT based RF amplifier

    International Nuclear Information System (INIS)

    Mandal, A.; Som, S.; Raj, P.R.; Manna, S.K.; Ghosh, S.; Seth, S.; Thakurta, S.; Thakur, S.K.; Saha, S.; Panda, U.S.

    2013-01-01

    A 704 MHz IOT based CW RF amplifier has been developed in VECC. It can also be used with proper tuning to power cavity modules operating at 650 MHz in high energy high intensity proton linear accelerator proposed to be built for ADSS/SNS programme in India and Project-X at Fermilab, USA. This IOT based amplifier provides up to 60 kW continuous wave RF power at 700 MHz. It required various power supplies, LCW cooling and forced air cooling for its operation. The auxiliary power supplies like Grid, Filament and Ion-pump, are floated and mounted on an isolated frame, i.e., HV deck. The mains inputs are electrically isolated by means of isolation transformer. Also, a Programmable Logic Controller (PLC) based interlocks along with high voltage collector power supply has been designed and developed for the safe operation of the RF amplifier. This paper discusses about various developments and energization of the IOT based RF amplifier with high power dummy load. (author)

  12. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  13. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  14. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  15. Theory and Model for Martensitic Transformations

    DEFF Research Database (Denmark)

    Lindgård, Per-Anker; Mouritsen, Ole G.

    1986-01-01

    Martensitic transformations are shown to be driven by the interplay between two fluctuating strain components. No soft mode is needed, but a central peak occurs representing the dynamics of strain clusters. A two-dimensional magnetic-analog model with the martensitic-transition symmetry is constr...... is constructed and analyzed by computer simulation and by a theory which accounts for correlation effects. Dramatic precursor effects at the first-order transition are demonstrated. The model is also of relevance for surface reconstruction transitions.......Martensitic transformations are shown to be driven by the interplay between two fluctuating strain components. No soft mode is needed, but a central peak occurs representing the dynamics of strain clusters. A two-dimensional magnetic-analog model with the martensitic-transition symmetry...

  16. Modelling of transformations in TRIP steels

    Energy Technology Data Exchange (ETDEWEB)

    Katsamas, A.I.; Haidemenopoulos, G.N.; Aravas, N. [Dept. of Mechanical and Industrial Engineering, Univ. of Thessaly, Volos (Greece)

    2004-11-01

    Industrial processing of low-alloy Transformation Induced Plasticity (TRIP) steels involves various stages of heat-treating, such as Intercritical Annealing (IA) and Bainitic Isothermal Treatment (BIT), in order to produce a dispersion of retained austenite ({gamma}{sub R}) particles and bainite ({alpha}{sub B}) in a ferritic matrix ({alpha}). Retained austenite then transforms to martensite ({alpha}') during forming processes undergone by the steel. In the present work an effort was made to model these stages of processing, i.e. IA, BIT and the {gamma}{sub R}{yields}{alpha}' strain-induced transformation. Simulation of heat-treatment stages was implemented using computational kinetics methods. Investigation of the strain-induced {gamma}{sub R}{yields}{alpha}' transformation kinetics was performed by means of a simple analytical model. Simulation of IA and comparison with available experimental data showed that the amount of austenite ({gamma}) forming during IA reaches the values predicted by thermodynamic equilibrium only at high annealing temperatures (>825 C). It was also observed that kinetic and thermodynamic predictions set a lower and an upper limit, respectively, within which the actual amount of austenite experimentally observed is contained. Results from the simulation of the BIT indicated considerable carbon enrichment, and thus stabilization of {gamma}{sub R}, in agreement with recent experimental observations. As regards the strain-induced {gamma}{sub R}{yields}{alpha}' transformation, the analytical model employed in the present work was fitted to available experimental results, showing reasonably good adaptation to the kinetic behaviour of the microstructure during plastic deformation. (orig.)

  17. A transformational leadership model for managing change and ...

    African Journals Online (AJOL)

    Owing to its relationship with change and transformation, transformational leadership theory should be relevant to managing change and transformation linked to diversifi cation investments. However, the question of what model of transformational leadership would be appropriate for managing change and transformation ...

  18. Modeling nonhomogeneous Markov processes via time transformation.

    Science.gov (United States)

    Hubbard, R A; Inoue, L Y T; Fann, J R

    2008-09-01

    Longitudinal studies are a powerful tool for characterizing the course of chronic disease. These studies are usually carried out with subjects observed at periodic visits giving rise to panel data. Under this observation scheme the exact times of disease state transitions and sequence of disease states visited are unknown and Markov process models are often used to describe disease progression. Most applications of Markov process models rely on the assumption of time homogeneity, that is, that the transition rates are constant over time. This assumption is not satisfied when transition rates depend on time from the process origin. However, limited statistical tools are available for dealing with nonhomogeneity. We propose models in which the time scale of a nonhomogeneous Markov process is transformed to an operational time scale on which the process is homogeneous. We develop a method for jointly estimating the time transformation and the transition intensity matrix for the time transformed homogeneous process. We assess maximum likelihood estimation using the Fisher scoring algorithm via simulation studies and compare performance of our method to homogeneous and piecewise homogeneous models. We apply our methodology to a study of delirium progression in a cohort of stem cell transplantation recipients and show that our method identifies temporal trends in delirium incidence and recovery.

  19. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  20. Retail business model transformation in multichannel environment

    OpenAIRE

    Chapagain, B. (Bimala)

    2015-01-01

    Abstract With the advent of internet and e-commerce, the way of carrying out business and transactions has changed to a great extent. Consumers are continuously changing the way they do shopping and this has forced retail business to transform their traditional brick and mortar into adopting multi-channel business models. Retailing is one of the most dynamic and competitive areas of business organization. Effective marketin...

  1. A numerical model of peritectoid transformation

    International Nuclear Information System (INIS)

    Das, A.; Manna, I.; Pabi, S.K.

    1999-01-01

    A rigorous numerical model of the diffusion-controlled peritectoid transformation based on the isoconcentration contour migration method is presented here. The model is capable of considering the concentration dependence of diffusivity in the participating phases. The predictions from the model show an encouraging kinetics in the Ni-Mo diffusion couple. An extensive parametric study through the present formulation indicates that the peritectoid kinetics may be considerably affected by the diffusivities and phase field widths (in the equilibrium diagram) of the concerned solids. In this regard, the field width and diffusivity in the peritectoid phase appear to exert the most significant influence on the reaction rate. The numerically calculated transformation kinetics have been effectively rationalized by means of two dimensionless parameters, φ 1 and φ 2 , which are functions of the concerned phase field widths and diffusivity in the product phase. In addition, these parameters enable prediction of the minimum time required for the completion of peritectoid transformation without going through any rigorous computation

  2. Next Generation Weather Radar (NEXRAD) Initial Operational Test and Evaluation. Phase 2. (IOT&E(2))

    Science.gov (United States)

    1989-12-01

    11 [ IOT &E(2)] FINAL REPORT (U) 00 DECEMBER 1989 Approved for public release; Dis ~ distribution is unlimited. gvaluakon peli.Dssmcopoii FR8 4 DE7TA iid...RADAR (NEXRAD) INITIAL OPERATIONAL TEST AND EVALUATION PHASE II ( IOT &E(2)) FINAL REPORT DECEMBER 1989 Prepared by: JAMES C. WEYMAN, Lt Colonel, USAF...Evaluation Phase II ( IOT &E(2)) of the Next Generation Weather Radar (NEXRAD) system. The test team conducted IOT &E(2) between 6 March and 6 August 1989 at

  3. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  4. Research on lightning stroke model and characteristics of electronic transformer

    Directory of Open Access Journals (Sweden)

    Li Mu

    2018-01-01

    Full Text Available In order to improve the reliability of power supply, a large number of electronic voltage and current transformers are used in digital substations. In this paper, the mathematical model of the electronic transformer is analyzed firstly, and its circuit model is given. According to the difference of working characteristics between voltage transformer and current transformer, the circuit model of voltage type electronic transformer and current type electronic transformer is given respectively. By analyzing their broadband transmission characteristics, the accuracy of the model is verified, and their lightning analysis models are obtained.

  5. Comparing relational model transformation technologies: implementing Query/View/Transformation with Triple Graph Grammars

    DEFF Research Database (Denmark)

    Greenyer, Joel; Kindler, Ekkart

    2010-01-01

    tool. In contrast to many other transformation technologies, both QVT and TGGs declaratively define the relation between two models. With this definition, a transformation engine can execute a transformation in either direction and, based on the same definition, can also propagate changes from one......The Model Driven Architecture (MDA) is an approach to develop software based on different models. There are separate models for the business logic and for platform specific details. Moreover, code can be generated automatically from these models. This makes transformations a core technology for MDA...... and for model-based software engineering approaches in general. QVT (Query/View/Transformation) is the transformation technology recently proposed for this purpose by the OMG. TGGs (Triple Graph Grammars) are another transformation technology proposed in the mid-nineties, used for example in the FUJABA CASE...

  6. TRANSFORM - TRANsient Simulation Framework of Reconfigurable Models

    Energy Technology Data Exchange (ETDEWEB)

    2017-09-01

    Existing development tools for early stage design and scoping of energy systems are often time consuming to use, proprietary, and do not contain the necessary function to model complete systems (i.e., controls, primary, and secondary systems) in a common platform. The Modelica programming language based TRANSFORM tool (1) provides a standardized, common simulation environment for early design of energy systems (i.e., power plants), (2) provides a library of baseline component modules to be assembled into full plant models using available geometry, design, and thermal-hydraulic data, (3) defines modeling conventions for interconnecting component models, and (4) establishes user interfaces and support tools to facilitate simulation development (i.e., configuration and parameterization), execution, and results display and capture.

  7. Modeling Transformation and Conjugation in Bacteria Populations

    Science.gov (United States)

    Russo, John; Dong, J. J.

    The rise of antibiotic resistance in bacteria populations is a growing threat to medical treatment of diseases. Transformation, where a cell absorbs a plasmid from its environment, and conjugation, direct transfer of a plasmid from one cell to another, are the two main mechanisms of emergence of antibiotic resistance. We model the processes using a combined approach of Kinetic Monte Carlo simulation and differential equations to describe the plasmid-carrying and plasmid-free populations. Through analysis of our results, we characterize the conditions that lead to dominance of the antibiotic resistant population. NSF-DMR #1248387.

  8. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  9. Laplace transform in tracer kinetic modeling

    International Nuclear Information System (INIS)

    Hauser, Eliete B.

    2013-01-01

    The main objective this paper is to quantify the pharmacokinetic processes: absorption, distribution and elimination of radiopharmaceutical(tracer), using Laplace transform method. When the drug is administered intravenously absorption is complete and is available in the bloodstream to be distributed throughout the whole body in all tissues and fluids, and to be eliminated. Mathematical modeling seeks to describe the processes of distribution and elimination through compartments, where distinct pools of tracer (spatial location or chemical state) are assigned to different compartments. A compartment model is described by a system of differential equations, where each equation represents the sum of all the transfer rates to and from a specific compartment. In this work a two-tissue irreversible compartment model is used for description of tracer, [ 18 F]2-fluor-2deoxy-D-glucose. In order to determine the parameters of the model, it is necessary to have information about the tracer delivery in the form of an input function representing the time-course of tracer concentration in arterial blood or plasma. We estimate the arterial input function in two stages and apply the Levenberg-Marquardt Method to solve nonlinear regressions. The transport of FDG across de arterial blood is very fast in the first ten minutes and then decreases slowly. We use de Heaviside function to represent this situation and this is the main contribution of this study. We apply the Laplace transform and the analytical solution for two-tissue irreversible compartment model is obtained. The only approach is to determinate de arterial input function. (author)

  10. Laplace transform in tracer kinetic modeling

    Energy Technology Data Exchange (ETDEWEB)

    Hauser, Eliete B., E-mail: eliete@pucrs.br [Instituto do Cerebro (InsCer/FAMAT/PUC-RS), Porto Alegre, RS, (Brazil). Faculdade de Matematica

    2013-07-01

    The main objective this paper is to quantify the pharmacokinetic processes: absorption, distribution and elimination of radiopharmaceutical(tracer), using Laplace transform method. When the drug is administered intravenously absorption is complete and is available in the bloodstream to be distributed throughout the whole body in all tissues and fluids, and to be eliminated. Mathematical modeling seeks to describe the processes of distribution and elimination through compartments, where distinct pools of tracer (spatial location or chemical state) are assigned to different compartments. A compartment model is described by a system of differential equations, where each equation represents the sum of all the transfer rates to and from a specific compartment. In this work a two-tissue irreversible compartment model is used for description of tracer, [{sup 18}F]2-fluor-2deoxy-D-glucose. In order to determine the parameters of the model, it is necessary to have information about the tracer delivery in the form of an input function representing the time-course of tracer concentration in arterial blood or plasma. We estimate the arterial input function in two stages and apply the Levenberg-Marquardt Method to solve nonlinear regressions. The transport of FDG across de arterial blood is very fast in the first ten minutes and then decreases slowly. We use de Heaviside function to represent this situation and this is the main contribution of this study. We apply the Laplace transform and the analytical solution for two-tissue irreversible compartment model is obtained. The only approach is to determinate de arterial input function. (author)

  11. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  12. Investigation of Transformer Model for TRV Calculation by EMTP

    Science.gov (United States)

    Thein, Myo Min; Ikeda, Hisatoshi; Harada, Katsuhiko; Ohtsuka, Shinya; Hikita, Masayuki; Haginomori, Eiichi; Koshiduka, Tadashi

    Analysis of the EMTP transformer model was performed with the 4kVA two windings low voltage transformer with the current injection (CIJ) measurement method to study a transient recovery voltage (TRV) at the transformer limited fault (TLF) current interrupting condition. Tested transformer's impedance was measured by the frequency response analyzer (FRA). From FRA measurement graphs leakage inductance, stray capacitance and resistance were calculated. The EMTP transformer model was constructed with those values. The EMTP simulation was done for a current injection circuit by using transformer model. The experiment and simulation results show a reasonable agreement.

  13. Interaction of the IoT Traffic Generated by a Smart City Segment with SDN Core Network

    OpenAIRE

    Volkov, Artem; Khakimov, Abdukodir; Muthanna, Ammar; Kirichek, Ruslan; Vladyko, Andrei; Koucheryavy, Andrey

    2017-01-01

    Part 3: Network Design and Planning; International audience; The main purpose of this article is to test IoT management system based on SDN core network, as well as interaction IoT traffic with SDN-switches. To conduct investigation of management system and network infrastructure behavior we carried out several IoT traffic tests, which were generated based on partnership project oneM2M specification. In this work, we considered “Smart city” model for Central district of Saint-Petersburg (Russ...

  14. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  15. Unifying approach for model transformations in the MOF metamodeling architecture

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas

    2004-01-01

    In the Meta Object Facility (MOF) metamodeling architecture a number of model transformation scenarios can be identified. It could be expected that a metamodeling architecture will be accompanied by a transformation technology supporting the model transformation scenarios in a uniform way. Despite

  16. IOT for Agriculture: Food Quality and Safety

    Science.gov (United States)

    Witjaksono, Gunawan; Abdelkreem Saeed Rabih, Almur; Yahya, Noorhana bt; Alva, Sagir

    2018-03-01

    Food is the main energy source for the living beings; as such food quality and safety have been in the highest demand throughout the human history. Internet of things (IOT) is a technology with a vision to connect anything at anytime and anywhere. Utilizing IOT in the food supply chain (FSC) is believed to enhance the quality of life by tracing and tracking the food conditions and live-sharing the obtained data with the consumers or the FSC supervisors. Currently, full application of IOT in the FSC is still in the developing stage and there is a big gap for improvements. The purpose of this paper is to explore the possibility of applying IOT for agriculture to trace and track food quality and safety. Mobile application for food freshness investigation was successfully developed and the results showed that consumer mobile camera could be used to test the freshness of food. By applying the IOT technology this information could be shared with all the consumers and also the supervisors.

  17. IoT for Smart City Services: Lifecycle Approach

    OpenAIRE

    Hefnawy , Ahmed; Bouras , Abdelaziz; Cherifi , Chantal

    2016-01-01

    International audience; " Internet of Things " (IoT) and " Smart City " are widely recognized to address the complexity of modern city operation. Concentration of population, scarcity of resources and environmental concerns are the main challenges that face city operators, and make ordinary service provisioning less efficient. In city environment, IoT sensors can be sources of real-time data; and, IoT actuators can execute real-time actions in the physical domain. IoT systems range from domai...

  18. A Look into the Effectiveness of TAC IOT and E.

    Science.gov (United States)

    1974-05-01

    The combined DT and E/ IOT and E concept instituted in 1971 by David Packard is explained. An investigation of IOT and E effectiveness is performed...and TAC IOT and E project managers were all used. Data indicates positive attitudes and high acceptance of the new combined testing concept. Definite...group opinions verified through statistical analysis indicate excellent IOT and E performance by TAC. Recommend further emphasis be placed on

  19. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  20. IOT and E of an AWADS Radar Imagery Recorder

    Science.gov (United States)

    1975-05-01

    Attn: DOQ, Scott AFB, IL 62225. MAC ltr, 28 Aug 1975 MAC PROJECT 74C-110U IOT &E OF AN AW ADS RADAR IMAGERY RECORDER IOT &E FINAL REPORT May 1975...Paragraph 1. Introduction 1 2. Purpose of IOT §E 1 3. Method of Accomplishment 2 4. Results and Discussion 3 5. Integration Into Force Structure 23

  1. IOT Based Smart Public Transport System

    Directory of Open Access Journals (Sweden)

    Parag Gawade

    2017-07-01

    Full Text Available Internet of Things IoT joins the objects of this present reality to the virtual world and empowers at whatever time anyplace network for anything that has a turn ON and turn OFF switch. It constitutes to a world where physical things and humans and other living things and virtual information and situations collaborate with each other. Substantial measure of information is created as expansive number of gadgets is associated with the web. So this expansive measure of information must be controlled and changed over to helpful data keeping in mind the end goal to create productive frameworks. In this paper we concentrate on to a urban IoT framework that is utilized to construct Intelligent Transportation System ITS. IoT based intelligent transportation systems are intended to bolster the Smart City vision which intends to utilize the progressed and capable communication systems for the organization of the city and the residents.

  2. Involuntary outpatient treatment (IOT) in Spain.

    Science.gov (United States)

    Hernández-Viadel, M; Cañete-Nicolás, C; Bellido-Rodriguez, C; Asensio-Pascual, P; Lera-Calatayud, G; Calabuig-Crespo, R; Leal-Cercós, C

    2015-01-01

    In recent decades there have been significant legislative changes in Spain. Society develops faster than laws, however, and new challenges have emerged. In 2004, the Spanish Association of Relatives of the Mentally Ill (FEAFES) proposed amending the existing legislation to allow for the implementation of involuntary outpatient treatment (IOT) for patients with severe mental illness. Currently, and after having made several attempts at change, there is no specific legislation governing the application of this measure. Although IOT may be implemented in local programmes, we consider legal regulation to be needed in this matter. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. VMTL: a language for end-user model transformation

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2016-01-01

    Model transformation is a key enabling technology of Model-Driven Engineering (MDE). Existing model transformation languages are shaped by and for MDE practitioners—a user group with needs and capabilities which are not necessarily characteristic of modelers in general. Consequently, these langua......Model transformation is a key enabling technology of Model-Driven Engineering (MDE). Existing model transformation languages are shaped by and for MDE practitioners—a user group with needs and capabilities which are not necessarily characteristic of modelers in general. Consequently......, these languages are largely ill-equipped for adoption by end-user modelers in areas such as requirements engineering, business process management, or enterprise architecture. We aim to introduce a model transformation language addressing the skills and requirements of end-user modelers. With this contribution, we...... hope to broaden the application scope of model transformation and MDE technology in general. We discuss the profile of end-user modelers and propose a set of design guidelines for model transformation languages addressing them. We then introduce Visual Model Transformation Language (VMTL) following...

  4. Performance in model transformations: experiments with ATL and QVT

    NARCIS (Netherlands)

    van Amstel, Marcel; Bosems, S.; Ivanov, Ivan; Ferreira Pires, Luis; Cabot, Jordi; Visser, Eelco

    Model transformations are increasingly being incorporated in software development processes. However, as systems being developed with transformations grow in size and complexity, the performance of the transformations tends to degrade. In this paper we investigate the factors that have an impact on

  5. Transformer Model in Wide Frequency Bandwidth for Power Electronics Systems

    OpenAIRE

    Gonzalez-Garcia, Carlos; Pleite, Jorge

    2013-01-01

    The development of the smart grids leads to new challenges on the power electronics equipment and power transformers. The use of power electronic transformer presents several advantages, but new problems related with the application of high frequency voltage and current components come across. Thus, an accurate knowledge of the transformer behavior in a wide frequency range is mandatory. A novel modeling procedure to relate the transformer physical behavior and its frequency response by means...

  6. Industry 4.0, M2m, Iot&S - All Equal?

    Science.gov (United States)

    Dobrin, Carmen

    2014-11-01

    Similarity between Industry 4.0, M2M, IOT&S. Advantages and disadvantages obtained using this three important methods. Decreasing costs while components are getting smaller and smaller in a world with better networking. Influence of business management applications integrated in smart factory logistic. The most important impacts in merging virtual and real production world, with the improvement of best processes having the same goal: creating value by open innovation

  7. Development and verification of printed circuit board toroidal transformer model

    DEFF Research Database (Denmark)

    Pejtersen, Jens; Mønster, Jakob Døllner; Knott, Arnold

    2013-01-01

    by comparing calculated parameters with 3D finite element simulations and experimental measurement results. The developed transformer model shows good agreement with the simulated and measured results. The model can be used to predict the parameters of printed circuit board toroidal transformer configurations......An analytical model of an air core printed circuit board embedded toroidal transformer configuration is presented. The transformer has been developed for galvanic isolation of very high frequency switch-mode dc-dc power converter applications. The theoretical model is developed and verified...

  8. Transforming Cobol Legacy Software to a Generic Imperative Model

    National Research Council Canada - National Science Library

    Moraes, DinaL

    1999-01-01

    .... This research develops a transformation system to convert COBOL code into a generic imperative model, recapturing the initial design and deciphering the requirements implemented by the legacy code...

  9. Building adaptable and reusable XML applications with model transformations

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas

    2005-01-01

    We present an approach in which the semantics of an XML language is defined by means of a transformation from an XML document model (an XML schema) to an application specific model. The application specific model implements the intended behavior of documents written in the language. A transformation

  10. Optimization of Wireless Node Discovery in an IoT Network

    DEFF Research Database (Denmark)

    Vasilev, Vladislav; Iliev, Georgi; Poulkov, Vladimir

    2015-01-01

    in the decrease in discovery costs. The proposed model covers well the dynamics of the complex sensor network, such as the one that maybe employed in an Internet of Things (IoT) scenario, where nodes need to act autonomously during the communication process. We apply the Lotka-Voltera model to increase...

  11. Foundations for Streaming Model Transformations by Complex Event Processing.

    Science.gov (United States)

    Dávid, István; Ráth, István; Varró, Dániel

    2018-01-01

    Streaming model transformations represent a novel class of transformations to manipulate models whose elements are continuously produced or modified in high volume and with rapid rate of change. Executing streaming transformations requires efficient techniques to recognize activated transformation rules over a live model and a potentially infinite stream of events. In this paper, we propose foundations of streaming model transformations by innovatively integrating incremental model query, complex event processing (CEP) and reactive (event-driven) transformation techniques. Complex event processing allows to identify relevant patterns and sequences of events over an event stream. Our approach enables event streams to include model change events which are automatically and continuously populated by incremental model queries. Furthermore, a reactive rule engine carries out transformations on identified complex event patterns. We provide an integrated domain-specific language with precise semantics for capturing complex event patterns and streaming transformations together with an execution engine, all of which is now part of the Viatra reactive transformation framework. We demonstrate the feasibility of our approach with two case studies: one in an advanced model engineering workflow; and one in the context of on-the-fly gesture recognition.

  12. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  13. Transformer Model in Wide Frequency Bandwidth for Power Electronics Systems

    Directory of Open Access Journals (Sweden)

    Carlos Gonzalez-Garcia

    2013-01-01

    Full Text Available The development of the smart grids leads to new challenges on the power electronics equipment and power transformers. The use of power electronic transformer presents several advantages, but new problems related with the application of high frequency voltage and current components come across. Thus, an accurate knowledge of the transformer behavior in a wide frequency range is mandatory. A novel modeling procedure to relate the transformer physical behavior and its frequency response by means of electrical parameters is presented. Its usability is demonstrated by an example where a power transformer is used as filter and voltage reducer in an AC-DC-AC converter.

  14. On the Computational Expressiveness of Model Transformation Languages

    DEFF Research Database (Denmark)

    Al-Sibahi, Ahmad Salim

    2015-01-01

    , it is not immediately obvious what their computational expressiveness is. In this paper we present an analysis that clarifies the computational expressiveness of a large number of model transformation languages. The analysis confirms the folklore for all model transformation languages, except the bidirectional ones...

  15. A GROOVE Solution for the BPMN to BPEL Model Transformation

    NARCIS (Netherlands)

    de Mol, M.J.; Zimakova, M.V.

    In this paper we present a solution of a model transformation between two standard languages for business process modeling BPMN and BPEL, using the GROOVE tool set. GROOVE is a tool for graph transformations that uses directed, edge labelled simple graphs and the SPO approach [Ren04]. Given a graph

  16. Modelling of phase transformations in substitutional alloys

    Czech Academy of Sciences Publication Activity Database

    Svoboda, Jiří; Vala, J.; Gamsjäger, E.; Fischer, F. D.

    237-240, - (2005), s. 647-652 ISSN 1012-0386. [DIMAT 2004 /6./. Krakow, 18.07.2004-23.07.2004] R&D Projects: GA AV ČR(CZ) 1QS200410502 Institutional research plan: CEZ:AV0Z20410507 Keywords : phase transformations Subject RIV: BM - Solid Matter Physics ; Magnetism Impact factor: 0.483, year: 2005

  17. Defect modelling of martensitic transformations in NiTi

    International Nuclear Information System (INIS)

    Pond, R.C.; Nixon, T.

    2000-01-01

    Recent advances in the theoretical understanding of interfacial defects enable both the deformation and extent of diffusional flux associated with defect motion during phase transformation to be determined quantitatively. In the present paper this appreciation is used to show that transformations which proceed by the generation, motion and interaction of interfacial defects can only be diffusionless when special crystallographic circumstances pertain. The principal steps in modelling such transformations are outlined, and the results for the case of NiTi are presented. (orig.)

  18. Micromanaging the IoT space

    Science.gov (United States)

    Mayer, Irak Vicarte

    2017-05-01

    The speed of IoT devices currently connected in our daily lives has drastically accelerated in the last couple of years. The lack of standardization, regulation, and an efficient process to integrate these devices to our ecosystem has led to a relaxed security and an ineffective use of the data generated. This paper presents a new approach to the IoT ecosystem management that improves data sharing and security by categorizing and micromanaging the connected devices. The use of micromanaging multiple access points (M2AP) allows the architecture to respond faster and efficiently to events and attacks to the digital hive. The "local beehive"/ "master beehive" approach seals a compromise of delegating tasks and improving the network management capacity. Finally, an efficient data storage and compact reports of the raw information collected can then be transmitted to cloud services for further analysis if required.

  19. Inventory transparency for agricultural produce through IOT

    Science.gov (United States)

    Srinivasan, S. P.; Sorna Shanthi, D.; Anand, Aashish V.

    2017-06-01

    Re-structuring the practices of traditional inventory management is becoming more essential to optimize the supply chain transparency and accuracy of agricultural produce. A flexible and transparent inventory management system is becoming the need of any agricultural commodity. It was noticed that the major setback for the farmers who are the suppliers of the farm produce is due to poor supply chain integration. The recent advent technologies and IT explosion can bring up a greater impact in the process of storing, tracking, distributing and monitoring perishable agriculture produce of day to day life. The primary focus of this paper is to integrate IoT into inventory management and other inbound logistics management of agriculture produce. The unique features of agricultural produce like a prediction of supply, demand, the location of warehouses, distribution and tracking of inventory can be integrated through IoT. This paper proposes a conceptual framework for inventory management transparency involved in the supply chain of agriculture produce.

  20. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  1. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  2. The Drivers of Success in Business Model Transformation

    Directory of Open Access Journals (Sweden)

    Nenad Savič

    2016-01-01

    Full Text Available Existing empirical literature on business models is still inconclusive about the key drivers of successful business model transformation. The paper explores this issue by using a single longitudinal case study design in combination with grounded theory approach on a medium-sized, high-tech and globally oriented company. Based on on-site visits, interviews and secondary documentation data analysis, the study identifies six generic drivers of successful business model transformation: transformational leadership, discovery driven decision-making, industry improvement – customer specific orientation, content-oriented communication, self-initiative collaborators, and phased separation strategy. The new drivers supplement our existing knowledge on how successful transformation takes place and add to existing drivers, while extensive discussion of their implications may help the managers to execute business transformations more effectively.

  3. IoT interoperability:a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  4. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  5. MISTRAL : A Language for Model Transformations in the MOF Meta-modeling Architecture

    NARCIS (Netherlands)

    Kurtev, Ivan; van den Berg, Klaas; Aßmann, Uwe; Aksit, Mehmet; Rensink, Arend

    2005-01-01

    n the Meta Object Facility (MOF) meta-modeling architecture a number of model transformation scenarios can be identified. It could be expected that a meta-modeling architecture will be accompanied by a transformation technology supporting the model transformation scenarios in a uniform way. Despite

  6. Design and development of power supplies for high power IOT based RF amplifier

    International Nuclear Information System (INIS)

    Kumar, Yashwant; Kumari, S.; Ghosh, M.K.; Bera, A.; Sadhukhan, A.; Pal, S.S.; Khare, V.K.; Tiwari, T.P.; Thakur, S.K.; Saha, S.

    2013-01-01

    Design, development, circuit topology, function of system components and key system specifications of different power supplies for biasing electrodes of Thales Inductive Output Tube (IOT) based high power RF amplifier are presented in this paper. A high voltage power supply (-30 kV, 3.2A dc) with fast (∼microsecond) crowbar protection circuit is designed, developed and commissioned at VECC for testing the complete setup. Other power supplies for biasing grid electrode (300V, 0.5A dc) and Ion Pump (3 kV, 0.1mA dc) of IOT are also designed, developed and tested with actual load. A HV Deck (60kV Isolation) is specially designed in house to place these power supplies which are floating at 30 kV. All these power supplies are powered by an Isolation Transformer (5 kVA, 60 kV isolation) designed and developed in VECC. (author)

  7. Tail modeling in a stretched magnetosphere. I - Methods and transformations

    Science.gov (United States)

    Stern, David P.

    1987-01-01

    A new method is developed for representing the magnetospheric field B as a distorted dipole field. Because Delta-B = 0 must be maintained, such a distortion may be viewed as a transformation of the vector potential A. The simplest form is a one-dimensional 'stretch transformation' along the x axis, concisely represented by the 'stretch function' f(x), which is also a convenient tool for representing features of the substorm cycle. One-dimensional stretch transformations are extended to spherical, cylindrical, and parabolic coordinates and then to arbitrary coordinates. It is shown that distortion transformations can be viewed as mappings of field lines from one pattern to another; the final result only requires knowledge of the field and not of the potentials. General transformations in Cartesian and arbitrary coordinates are derived, and applications to field modeling, field line motion, MHD modeling, and incompressible fluid dynamics are considered.

  8. Design Transformations for Rule-based Procedural Modeling

    KAUST Repository

    Lienhard, Stefan

    2017-05-24

    We introduce design transformations for rule-based procedural models, e.g., for buildings and plants. Given two or more procedural designs, each specified by a grammar, a design transformation combines elements of the existing designs to generate new designs. We introduce two technical components to enable design transformations. First, we extend the concept of discrete rule switching to rule merging, leading to a very large shape space for combining procedural models. Second, we propose an algorithm to jointly derive two or more grammars, called grammar co-derivation. We demonstrate two applications of our work: we show that our framework leads to a larger variety of models than previous work, and we show fine-grained transformation sequences between two procedural models.

  9. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  10. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology

    Directory of Open Access Journals (Sweden)

    K. C. Okafor

    2017-01-01

    Full Text Available With the Internet of Everything (IoE paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. Besides, the scalability requirements found in the current IoT data processing (in the cloud can hardly be used for applications such as assisted living systems, Big Data analytic solutions, and smart embedded applications. This paper proposes an extended cloud IoT model that optimizes bandwidth while allowing edge devices (Internet-connected objects/devices to smartly process data without relying on a cloud network. Its integration with a massively scaled spine-leaf (SL network topology is highlighted. This is contrasted with a legacy multitier layered architecture housing network services and routing policies. The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application without impacting QoS performance. Consequently, a spine-leaf Fog computing network (SL-FCN is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. This approach is cost-effective as it maximizes bandwidth while maintaining redundancy and resiliency against failures in mission critical applications.

  11. E3value to BPMN model transformation

    NARCIS (Netherlands)

    Fatemi, Hassan; van Sinderen, Marten J.; Wieringa, Roelf J.; Wieringa, P.A.; Camarinha-Matos, Luis M.; Pereira Klen, Alexandra; Afsarmanesh, Hamidesh

    2011-01-01

    Business value and coordination process perspectives need to be taken into consideration while modeling business collaborations. The need for these two models stems from the importance of separating the how from the what concerns. A business value model shows what is offered by whom to whom while a

  12. Modelling of magnetostriction of transformer magnetic core for vibration analysis

    Directory of Open Access Journals (Sweden)

    Marks Janis

    2017-12-01

    Full Text Available Magnetostriction is a phenomenon occurring in transformer core in normal operation mode. Yet in time, it can cause the delamination of magnetic core resulting in higher level of vibrations that are measured on the surface of transformer tank during diagnostic tests. The aim of this paper is to create a model for evaluating elastic deformations in magnetic core that can be used for power transformers with intensive vibrations in order to eliminate magnetostriction as a their cause. Description of the developed model in Matlab and COMSOL software is provided including restrictions concerning geometry and properties of materials, and the results of performed research on magnetic core anisotropy are provided. As a case study modelling of magnetostriction for 5-legged 200 MVA power transformer with the rated voltage of 13.8/137kV is conducted, based on which comparative analysis of vibration levels and elastic deformations is performed.

  13. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  14. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  15. Modelling societal transitions with agent transformation

    NARCIS (Netherlands)

    M.P. Schilperoord (Michel); J. Rotmans (Jan); N. Bergman (Noam)

    2008-01-01

    textabstractTransition models explain long-term and large-scale processes fundamentally changing the structure of a societal system. Our concern is that most transition models are too static. Although they capture a move of focus from static equilibria to transitions between dynamic equilibria, they

  16. TRANSFORMATION

    Energy Technology Data Exchange (ETDEWEB)

    LACKS,S.A.

    2003-10-09

    Transformation, which alters the genetic makeup of an individual, is a concept that intrigues the human imagination. In Streptococcus pneumoniae such transformation was first demonstrated. Perhaps our fascination with genetics derived from our ancestors observing their own progeny, with its retention and assortment of parental traits, but such interest must have been accelerated after the dawn of agriculture. It was in pea plants that Gregor Mendel in the late 1800s examined inherited traits and found them to be determined by physical elements, or genes, passed from parents to progeny. In our day, the material basis of these genetic determinants was revealed to be DNA by the lowly bacteria, in particular, the pneumococcus. For this species, transformation by free DNA is a sexual process that enables cells to sport new combinations of genes and traits. Genetic transformation of the type found in S. pneumoniae occurs naturally in many species of bacteria (70), but, initially only a few other transformable species were found, namely, Haemophilus influenzae, Neisseria meningitides, Neisseria gonorrheae, and Bacillus subtilis (96). Natural transformation, which requires a set of genes evolved for the purpose, contrasts with artificial transformation, which is accomplished by shocking cells either electrically, as in electroporation, or by ionic and temperature shifts. Although such artificial treatments can introduce very small amounts of DNA into virtually any type of cell, the amounts introduced by natural transformation are a million-fold greater, and S. pneumoniae can take up as much as 10% of its cellular DNA content (40).

  17. Optic Fiber Sensing IOT Technology and Application Research

    Directory of Open Access Journals (Sweden)

    Wenjuan Zeng

    2014-10-01

    Full Text Available The growth of the Internet of Things (IOT industry has become a new mark of the communication domain. As the development of the technology of the IOT and the fiber-optical sensor, the combination of the both is a big question to be discussed, and the fiber-optical IOT also has a good development prospect. This article first introduces IOT’s current status, the key technology, the theoretical frame and the applications. Then, it discusses the classification of the optical fiber sensor as well as the development and its application’s situation. Lastly, it puts the optical fiber sensing technology into the IOT, and introduces a specific application which is used in the mine safety based on the fiber-optical IOT.

  18. TIME SERIES ANALYSIS USING A UNIQUE MODEL OF TRANSFORMATION

    Directory of Open Access Journals (Sweden)

    Goran Klepac

    2007-12-01

    Full Text Available REFII1 model is an authorial mathematical model for time series data mining. The main purpose of that model is to automate time series analysis, through a unique transformation model of time series. An advantage of this approach of time series analysis is the linkage of different methods for time series analysis, linking traditional data mining tools in time series, and constructing new algorithms for analyzing time series. It is worth mentioning that REFII model is not a closed system, which means that we have a finite set of methods. At first, this is a model for transformation of values of time series, which prepares data used by different sets of methods based on the same model of transformation in a domain of problem space. REFII model gives a new approach in time series analysis based on a unique model of transformation, which is a base for all kind of time series analysis. The advantage of REFII model is its possible application in many different areas such as finance, medicine, voice recognition, face recognition and text mining.

  19. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  20. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  1. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  2. Modelling spatial density using continuous wavelet transforms

    Indian Academy of Sciences (India)

    Space debris; wavelets; Mexican hat; Laplace distribution; random search; parameter estimation. ... Author Affiliations. D Sudheer Reddy1 N Gopal Reddy2 A K Anilkumar3. Digital Mapping and Modelling Division, Advanced Data Processing Research Institute, Secunderabad 500 009, India; Department of Mathematics, ...

  3. Modelling spatial density using continuous wavelet transforms

    Indian Academy of Sciences (India)

    A K ANILKUMAR3. 1Digital Mapping and Modelling Division, Advanced Data Processing Research .... probability of conjunction is very high and the miss distance between active satellite and debri object is less ... particularly helpful in tackling problems involving signal identification and detection of hidden transients (hard ...

  4. Ontological perspective in metamodeling for model transformations.

    NARCIS (Netherlands)

    Göknil, Arda; Topaloglu, N.Y.

    2005-01-01

    Model Driven Engineering (MDE) aims to facilitate building larger and more complex, reliable software systems by introducing a higher abstraction level than the code level. The technical space concept discusses how the basic MDE principles may be mapped onto modern platform support and several

  5. Modelling Nitrogen Transformation in Horizontal Subsurface Flow ...

    African Journals Online (AJOL)

    A mathematical model was developed to permit dynamic simulation of nitrogen interaction in a pilot horizontal subsurface flow constructed wetland receiving effluents from primary facultative pond. The system was planted with Phragmites mauritianus, which was provided with root zone depth of 75 cm. The root zone was ...

  6. TRANSFORMER

    Science.gov (United States)

    Baker, W.R.

    1959-08-25

    Transformers of a type adapted for use with extreme high power vacuum tubes where current requirements may be of the order of 2,000 to 200,000 amperes are described. The transformer casing has the form of a re-entrant section being extended through an opening in one end of the cylinder to form a coaxial terminal arrangement. A toroidal multi-turn primary winding is disposed within the casing in coaxial relationship therein. In a second embodiment, means are provided for forming the casing as a multi-turn secondary. The transformer is characterized by minimized resistance heating, minimized external magnetic flux, and an economical construction.

  7. The Unfolding of Value Sources During Online Business Model Transformation

    Directory of Open Access Journals (Sweden)

    Nadja Hoßbach

    2016-12-01

    Full Text Available Purpose: In the magazine publishing industry, viable online business models are still rare to absent. To prepare for the ‘digital future’ and safeguard their long-term survival, many publishers are currently in the process of transforming their online business model. Against this backdrop, this study aims to develop a deeper understanding of (1 how the different building blocks of an online business model are transformed over time and (2 how sources of value creation unfold during this transformation process. Methodology: To answer our research question, we conducted a longitudinal case study with a leading German business magazine publisher (called BIZ. Data was triangulated from multiple sources including interviews, internal documents, and direct observations. Findings: Based on our case study, we nd that BIZ used the transformation process to differentiate its online business model from its traditional print business model along several dimensions, and that BIZ’s online business model changed from an efficiency- to a complementarity- to a novelty-based model during this process. Research implications: Our findings suggest that different business model transformation phases relate to different value sources, questioning the appropriateness of value source-based approaches for classifying business models. Practical implications: The results of our case study highlight the need for online-offline business model differentiation and point to the important distinction between service and product differentiation. Originality: Our study contributes to the business model literature by applying a dynamic and holistic perspective on the link between online business model changes and unfolding value sources.

  8. Mathematical Model of Bainitic Transformation in Austempered Ductile Iron

    Directory of Open Access Journals (Sweden)

    Olejarczyk-Wożeńska I.

    2017-12-01

    Full Text Available A mathematical model of austenite - bainite transformation in austempered ductile cast iron has been presented. The model is based on a model developed by Bhadeshia [1, 2] for modelling the bainitic transformation in high-silicon steels with inhibited carbide precipitation. A computer program has been developed that calculates the incubation time, the transformation time at a preset temperature, the TTT diagram and carbon content in unreacted austenite as a function of temperature. Additionally, the program has been provided with a module calculating the free energy of austenite and ferrite as well as the maximum driving force of transformation. Model validation was based on the experimental research and literature data. Experimental studies included the determination of austenite grain size, plotting the TTT diagram and analysis of the effect of heat treatment parameters on the microstructure of ductile iron. The obtained results show a relatively good compatibility between the theoretical calculations and experimental studies. Using the developed program it was possible to examine the effect of austenite grain size on the rate of transformation.

  9. Transforming Systems Engineering through Model Centric Engineering

    Science.gov (United States)

    2017-08-08

    for Creative Technologies ( ICT ). Section 5 describes research into the use of mission and system modeling and simulation, and its relationships to...be used in MDAO (UC03).  The metamodel provided by ICT represents information and metrics captured while observing the users of the gaming...Engineering Simulation MDAO 4.2 GRAPHICAL CONOPS (USC ICT – RICHMOND VIEW) The USC Institute for Creative Technologies ( ICT ) will support this use

  10. Logarithmic transformed statistical models in calibration

    International Nuclear Information System (INIS)

    Zeis, C.D.

    1975-01-01

    A general type of statistical model used for calibration of instruments having the property that the standard deviations of the observed values increase as a function of the mean value is described. The application to the Helix Counter at the Rocky Flats Plant is primarily from a theoretical point of view. The Helix Counter measures the amount of plutonium in certain types of chemicals. The method described can be used also for other calibrations. (U.S.)

  11. Transformation

    DEFF Research Database (Denmark)

    Peters, Terri

    2011-01-01

    Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi....

  12. Comprehensive Power Losses Model for Electronic Power Transformer

    DEFF Research Database (Denmark)

    Yue, Quanyou; Li, Canbing; Cao, Yijia

    2018-01-01

    and considering the impact of the non-unity power factor and the three-phase unbalanced current, the overall power losses in the distribution network when using the EPT to replace the conventional transformer is analyzed, and the conditions in which the application of the EPT can cause less power losses...... reduced power losses in the distribution network require a comprehensive consideration when comparing the power losses of theEPT and conventional transformer. In this paper, a comprehensive power losses analysis model for the EPT in distribution networks is proposed. By analyzing the EPT self-losses......The electronic power transformer (EPT) has highe rpower losses than the conventional transformer. However, the EPT can correct the power factor, compensate the unbalanced current and reduce the line power losses in the distribution network.Therefore, the higher losses of the EPT and the consequent...

  13. Comprehensive Power Losses Model for Electronic Power Transformer

    DEFF Research Database (Denmark)

    Yue, Quanyou; Li, Canbing; Cao, Yijia

    2018-01-01

    The electronic power transformer (EPT) has highe rpower losses than the conventional transformer. However, the EPT can correct the power factor, compensate the unbalanced current and reduce the line power losses in the distribution network.Therefore, the higher losses of the EPT and the consequent......-losses and considering the impact of the non-unity power factor and the three-phase unbalanced current, the overall power losses in the distribution network when using the EPT to replace the conventional transformer is analyzed, and the conditions in which the application of the EPT can cause less power losses...... reduced power losses in the distribution network require a comprehensive consideration when comparing the power losses of theEPT and conventional transformer. In this paper, a comprehensive power losses analysis model for the EPT in distribution networks is proposed. By analyzing the EPT self...

  14. Transfer Function Identification Using Orthogonal Fourier Transform Modeling Functions

    Science.gov (United States)

    Morelli, Eugene A.

    2013-01-01

    A method for transfer function identification, including both model structure determination and parameter estimation, was developed and demonstrated. The approach uses orthogonal modeling functions generated from frequency domain data obtained by Fourier transformation of time series data. The method was applied to simulation data to identify continuous-time transfer function models and unsteady aerodynamic models. Model fit error, estimated model parameters, and the associated uncertainties were used to show the effectiveness of the method for identifying accurate transfer function models from noisy data.

  15. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  16. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  17. An enhanced Brinson model with modified kinetics for martensite transformation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young-Jin; Lee, Jung Ju [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Jeong, Ju-Won [Korea Aerospace Research Institute, Daejeon (Korea, Republic of); Lim, Jae Hyuk [Chonbuk National University, Jeonju (Korea, Republic of)

    2017-03-15

    We propose an enhanced Brinson model with modified kinetics for martensite transformation. Two additional material constants are considered to follow the stress-temperature diagram above austenite start temperature (As) along with treatment to keep the continuity of the martensite volume fraction and the path dependency of the phase transformation. To demonstrate the performance of the proposed model, we implement this algorithm into ABAQUS user subroutine, then conduct several numerical simulations and compare their results with SMA wire experiments as well as those of three-dimensional SMA constitutive models. From the results, it turns out that the proposed model is as accurate as the three-dimensional models and shows better accuracy over original Brinson model in terms of recovery stress.

  18. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications

    Directory of Open Access Journals (Sweden)

    Hui-Ling Chang

    2016-09-01

    Full Text Available Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN and Constrained Application Protocol (CoAP are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK before retransmission timeout (RTO expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  19. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications.

    Science.gov (United States)

    Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying

    2016-09-22

    Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  20. The role of technology and engineering models in transforming healthcare.

    Science.gov (United States)

    Pavel, Misha; Jimison, Holly Brugge; Wactlar, Howard D; Hayes, Tamara L; Barkis, Will; Skapik, Julia; Kaye, Jeffrey

    2013-01-01

    The healthcare system is in crisis due to challenges including escalating costs, the inconsistent provision of care, an aging population, and high burden of chronic disease related to health behaviors. Mitigating this crisis will require a major transformation of healthcare to be proactive, preventive, patient-centered, and evidence-based with a focus on improving quality-of-life. Information technology, networking, and biomedical engineering are likely to be essential in making this transformation possible with the help of advances, such as sensor technology, mobile computing, machine learning, etc. This paper has three themes: 1) motivation for a transformation of healthcare; 2) description of how information technology and engineering can support this transformation with the help of computational models; and 3) a technical overview of several research areas that illustrate the need for mathematical modeling approaches, ranging from sparse sampling to behavioral phenotyping and early detection. A key tenet of this paper concerns complementing prior work on patient-specific modeling and simulation by modeling neuropsychological, behavioral, and social phenomena. The resulting models, in combination with frequent or continuous measurements, are likely to be key components of health interventions to enhance health and wellbeing and the provision of healthcare.

  1. Experimental studies on power transformer model winding provided with MOVs

    Directory of Open Access Journals (Sweden)

    G.H. Kusumadevi

    2017-05-01

    Full Text Available Surge voltage distribution across a HV transformer winding due to appearance of very fast rise time (rise time of order 1 μs transient voltages is highly non-uniform along the length of the winding for initial time instant of occurrence of surge. In order to achieve nearly uniform initial time instant voltage distribution along the length of the HV winding, investigations have been carried out on transformer model winding. By connecting similar type of metal oxide varistors across sections of HV transformer model winding, it is possible to improve initial time instant surge voltage distribution across length of the HV transformer winding. Transformer windings with α values 5.3, 9.5 and 19 have been analyzed. The experimental studies have been carried out using high speed oscilloscope of good accuracy. The initial time instant voltage distribution across sections of winding with MOV remains nearly uniform along length of the winding. Also results of fault diagnostics carried out with and without connection of MOVs across sections of winding are reported.

  2. Transformation of UML Behavioral Diagrams to Support Software Model Checking

    Directory of Open Access Journals (Sweden)

    Luciana Brasil Rebelo dos Santos

    2014-04-01

    Full Text Available Unified Modeling Language (UML is currently accepted as the standard for modeling (object-oriented software, and its use is increasing in the aerospace industry. Verification and Validation of complex software developed according to UML is not trivial due to complexity of the software itself, and the several different UML models/diagrams that can be used to model behavior and structure of the software. This paper presents an approach to transform up to three different UML behavioral diagrams (sequence, behavioral state machines, and activity into a single Transition System to support Model Checking of software developed in accordance with UML. In our approach, properties are formalized based on use case descriptions. The transformation is done for the NuSMV model checker, but we see the possibility in using other model checkers, such as SPIN. The main contribution of our work is the transformation of a non-formal language (UML to a formal language (language of the NuSMV model checker towards a greater adoption in practice of formal methods in software development.

  3. Innovating Science Teaching with a Transformative Learning Model

    Science.gov (United States)

    Gudiño Paredes, Sandra

    2018-01-01

    This exploratory study aimed to describe the impact of the 'Science in Family project', as a transformative learning model for science teachers trying to improve student's attitudes toward STEM subjects. This study took place in a public elementary school in Monterrey, Mexico, which has been developing this project for more than thirteen years…

  4. Application of reflection in a model transformation language

    NARCIS (Netherlands)

    Ivanov, Ivan

    2010-01-01

    Computational reflection is a well-known technique applied in many existing programming languages ranging from functional to object-oriented languages. In this paper we study the possibilities and benefits of introducing and using reflection in a rule-based model transformation language. The paper

  5. Transformations among CE–CVM model parameters for ...

    Indian Academy of Sciences (India)

    Unknown

    parameters which exclusively represent interactions of the higher order systems. Such a procedure is presen- ted in detail in this communication. Furthermore, the details of transformations required to express the model parameters in one basis from those defined in another basis for the same system are also presented.

  6. Transformations among CE–CVM model parameters for ...

    Indian Academy of Sciences (India)

    ... of parameters which exclusively represent interactions of the higher order systems. Such a procedure is presented in detail in this communication. Furthermore, the details of transformations required to express the model parameters in one basis from those defined in another basis for the same system are also presented.

  7. Use of the Collegial Leadership Model of Emancipation to transform ...

    African Journals Online (AJOL)

    Use of the Collegial Leadership Model of Emancipation to transform traditional management practices in secondary schools. P Singh. Abstract. No Abstract Available South African Journal of Education Vol.25(1) 2005: 11-18. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT ...

  8. A Concept Transformation Learning Model for Architectural Design Learning Process

    Science.gov (United States)

    Wu, Yun-Wu; Weng, Kuo-Hua; Young, Li-Ming

    2016-01-01

    Generally, in the foundation course of architectural design, much emphasis is placed on teaching of the basic design skills without focusing on teaching students to apply the basic design concepts in their architectural designs or promoting students' own creativity. Therefore, this study aims to propose a concept transformation learning model to…

  9. Plasticity induced by phase transformation in steel: experiment vs modeling

    International Nuclear Information System (INIS)

    Tahimi, Abdeladhim

    2011-01-01

    The objectives of this work are: (i) understand the mechanisms and phenomena involved in the plasticity of steels in the presence of a diffusive or martensitic phase transformation. (ii) develop tools for predicting TRIP, which are able to correctly reproduce the macroscopic deformation for cases of complex loading and could also provide information about local elasto-visco-plastic interactions between product and parent phases. To this purpose, new experimental tests are conducted on 35NCD16 steel for austenite to martensite transformation and on 100C6 steel for austenite to pearlite transformation. The elasto viscoplastic properties of austenite and pearlite of the 100C6 steel are characterized through tension compression and relaxation tests. The parameters of macro-homogeneous and crystal-based constitutive laws could then be identified such as to analyse different models with respect to the experimental TRIP: the analytical models of Leblond (1989) and Taleb and Sidoroff (2003) but also, above all, different numerical models which can be distinguished by the prevailing assumptions concerning the local kinetics and the constitutive laws. An extension of the single-grain model dedicated to martensitic transformations developed during the thesis of S. Meftah (2007) is proposed. It consists in introducing the polycrystalline character of the austenite through a process of homogenization based on a self-consistent scheme by calculating the properties of an Equivalent Homogeneous Medium environment (EHM). (author)

  10. Hydrolysis and biotic transformation in water in the pesticide model

    NARCIS (Netherlands)

    Horst, ter M.M.S.; Beltman, W.H.J.; Adriaanse, P.I.; Mulder, H.M.

    2017-01-01

    The TOXSWA model has been extended with the functionality to simulate hydrolysis and biotic transformation in water. TOXSWA simulates the fate of pesticides in water bodies to calculate exposure calculations for aquatic organisms or sediment-dwelling organisms as part of the aquatic risk assessment

  11. Wireless Home Automation System using IoT

    Directory of Open Access Journals (Sweden)

    Alexandra MIHALACHE

    2017-01-01

    Full Text Available Nowadays, the chance of having an automated home is no longer a fancy luxury, but a reality accessible to a wide range of consumers, because smart home systems have replaced those that only automated the home in the past. More and more solutions based on IoT are being devel-oped to transform homes into smart ones, but the problem is that the benefits of home automa-tion are still not clear to everyone as they are not promoted enough, so we cannot talk about a broad mass of consumers already using integrated or DIY solutions to improve their lives. In this paper, I will present a home automation system using Arduino Uno integrated with rele-vant modules which are used to allow remote control of lights or fans, changes being made on the basis of different sensors data. The system is designed to be low cost and expandable, bring-ing accessibility, convenience and energy efficiency.

  12. To transform or not to transform: using generalized linear mixed models to analyse reaction time data

    Science.gov (United States)

    Lo, Steson; Andrews, Sally

    2015-01-01

    Linear mixed-effect models (LMMs) are being increasingly widely used in psychology to analyse multi-level research designs. This feature allows LMMs to address some of the problems identified by Speelman and McGann (2013) about the use of mean data, because they do not average across individual responses. However, recent guidelines for using LMM to analyse skewed reaction time (RT) data collected in many cognitive psychological studies recommend the application of non-linear transformations to satisfy assumptions of normality. Uncritical adoption of this recommendation has important theoretical implications which can yield misleading conclusions. For example, Balota et al. (2013) showed that analyses of raw RT produced additive effects of word frequency and stimulus quality on word identification, which conflicted with the interactive effects observed in analyses of transformed RT. Generalized linear mixed-effect models (GLMM) provide a solution to this problem by satisfying normality assumptions without the need for transformation. This allows differences between individuals to be properly assessed, using the metric most appropriate to the researcher's theoretical context. We outline the major theoretical decisions involved in specifying a GLMM, and illustrate them by reanalysing Balota et al.'s datasets. We then consider the broader benefits of using GLMM to investigate individual differences. PMID:26300841

  13. Model Driven Development of Simulation Models : Defining and Transforming Conceptual Models into Simulation Models by Using Metamodels and Model Transformations

    NARCIS (Netherlands)

    Küçükkeçeci Çetinkaya, D.

    2013-01-01

    Modeling and simulation (M&S) is an effective method for analyzing and designing systems and it is of interest to scientists and engineers from all disciplines. This thesis proposes the application of a model driven software development approach throughout the whole set of M&S activities and it

  14. A Microscale Model for Ausferritic Transformation of Austempered Ductile Irons

    Science.gov (United States)

    Boccardo, Adrián D.; Dardati, Patricia M.; Celentano, Diego J.; Godoy, Luis A.

    2017-01-01

    This paper presents a new metallurgical model for the ausferritic transformation of ductile cast iron. The model allows predicting the evolution of phases in terms of the chemical composition, austenitization and austempering temperatures, graphite nodule count, and distribution of graphite nodule size. The ferrite evolution is predicted according to the displacive growth mechanism. A representative volume element is employed at the microscale to consider the phase distributions, the inhomogeneous austenite carbon content, and the nucleation of ferrite subunits at the graphite nodule surface and at the tips of existing ferrite subunits. The performance of the model is evaluated by comparison with experimental results. The results indicate that the increment of the ausferritic transformation rate, which is caused by increments of austempering temperature and graphite nodule count, is adequately represented by this model.

  15. Clone Detection for Graph-Based Model Transformation Languages

    DEFF Research Database (Denmark)

    Strüber, Daniel; Plöger, Jennifer; Acretoaie, Vlad

    2016-01-01

    Cloning is a convenient mechanism to enable reuse across and within software artifacts. On the downside, it is also a practice related to significant long-term maintainability impediments, thus generating a need to identify clones in affected artifacts. A large variety of clone detection techniques...... has been proposed for programming and modeling languages; yet no specific ones have emerged for model transformation languages. In this paper, we explore clone detection for graph-based model transformation languages. We introduce potential use cases for such techniques in the context of constructive...... and analytical quality assurance. From these use cases, we derive a set of key requirements. We describe our customization of existing model clone detection techniques allowing us to address these requirements. Finally, we provide an experimental evaluation, indicating that our customization of ConQAT, one...

  16. Modelling of phase transformations occurring in low activation martensitic steels

    International Nuclear Information System (INIS)

    Brachet, J.-C.; Gavard, L.; Boussidan, C.; Lepoittevin, C.; Servant, C.

    1998-01-01

    The main objective of this paper is to summarize modelling of on-heating and on-cooling phase transformations occurring in low activation martensitic (LAM) steels. Calculations of thermodynamic equilibrium phase fractions and kinetic aspects of phase transformations have been performed by using different approaches from experimental data (CCT and TTT diagrams obtained by dilatometry). All the calculated data have been compared to an important and systematic set of experimental data obtained on different LAM steels of the 7.5-11% CrWVT a type. (orig.)

  17. Modelling of phase transformations occurring in low activation martensitic steels

    Science.gov (United States)

    Brachet, J.-C.; Gavard, L.; Boussidan, C.; Lepoittevin, C.; Denis, S.; Servant, C.

    1998-10-01

    The main objective of this paper is to summarize modelling of on-heating and on-cooling phase transformations occurring in Low Activation Martensitic (LAM) steels. Calculations of thermodynamic equilibrium phase fractions and kinetic aspects of phase transformations have been performed by using different approaches from experimental data (CCT and TTT diagrams obtained by dilatometry). All the calculated data have been compared to an important and systematic set of experimental data obtained on different LAM steels of the 7.5-11% CrWVT a type.

  18. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  19. Assessing biocomputational modelling in transforming clinical guidelines for osteoporosis management.

    Science.gov (United States)

    Thiel, Rainer; Viceconti, Marco; Stroetmann, Karl

    2011-01-01

    Biocomputational modelling as developed by the European Virtual Physiological Human (VPH) Initiative is the area of ICT most likely to revolutionise in the longer term the practice of medicine. Using the example of osteoporosis management, a socio-economic assessment framework is presented that captures how the transformation of clinical guidelines through VPH models can be evaluated. Applied to the Osteoporotic Virtual Physiological Human Project, a consequent benefit-cost analysis delivers promising results, both methodologically and substantially.

  20. Differential barometric-based positioning technique for indoor elevation measurement in IoT medical applications.

    Science.gov (United States)

    Wang, Hua; Wen, Yingyou; Zhao, Dazhe

    2017-07-20

    Medical applications have begun to benefit from Internet of Things (IoT) technology through the introduction of wearable devices. Several medical applications require accurate patient location as various changes affect pressure parameters inside the body. This study aims to develop a system to measure indoor altitude for IoT medical applications. We propose a differential barometric-based positioning system to estimate the altitude between a reference sensor and a localizing sensor connected to the human body. The differential barometric altimetry model is introduced to estimate indoor elevations and eliminate environmental artifacts. In addition, a Gaussian filter processing is adopted to remove noise from the elevation measurements. The proposed system is then investigated through extensive experiments, using various evaluation criteria. The results indicate that the proposed system yielded good accuracy with reduced implementation complexity and fewer costs. The proposed system is resilient compared to other indoor localization approaches, even when numerous environmental artifacts in indoor environments are present.

  1. Integration of Bim, Web Maps and Iot for Supporting Comfort Analysis

    Science.gov (United States)

    Gunduz, M.; Isikdag, U.; Basaraner, M.

    2017-11-01

    The use of the Internet is expanding and the technological capabilities of electronic devices are evolving. Today, Internet of Things (IoT) solutions can be developed that were never even imaginable before. In this paper, a case study is presented on the joint use of Building Information Model (BIM), Geographical Information Systems (GIS) and Internet of Things (IoT) technologies. It is a part of an ongoing study that intends to overcome some problems about the management of complex facilities. In the study, a BIM has been converted and displayed in 2D on Google Maps, and information on various sensors have been represented on the web with geographic coordinates in real-time.

  2. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    a security perspective, this IoT revolution represents a potential disaster. This plethora of IoT devices that flooded the market were very badly protected, thus an easy prey for several families of malwares that can enslave and incorporate them in very large botnets. This, eventually, brought back......The Internet of Things (IoT) revolution promises to make our lives easier by providing cheap and always connected smart embedded devices, which can interact on the Internet and create added values for human needs. But all that glitters is not gold. Indeed, the other side of the coin is that, from......, in terms of their nature and evolution through the years. It also explores the additional offensive capabilities that this arsenal of IoT malwares has available, to mine the security of Internet users and systems. We think that this up-to-date picture will be a valuable reference to the scientific...

  3. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  4. MODELING CONTROLLED ASYNCHRONOUS ELECTRIC DRIVES WITH MATCHING REDUCERS AND TRANSFORMERS

    Directory of Open Access Journals (Sweden)

    V. S. Petrushin

    2015-04-01

    Full Text Available Purpose. Working out of mathematical models of the speed-controlled induction electric drives ensuring joint consideration of transformers, motors and loadings, and also matching reducers and transformers, both in static, and in dynamic regimes for the analysis of their operating characteristics. Methodology. At mathematical modelling are considered functional, mass, dimensional and cost indexes of reducers and transformers that allows observing engineering and economic aspects of speed-controlled induction electric drives. The mathematical models used for examination of the transitive electromagnetic and electromechanical processes, are grounded on systems of nonlinear differential equations with nonlinear coefficients (parameters of equivalent circuits of motors, varying in each operating point, including owing to appearances of saturation of magnetic system and current displacement in a winding of a rotor of an induction motor. For the purpose of raise of level of adequacy of models a magnetic circuit iron, additional and mechanical losses are considered. Results. Modelling of the several speed-controlled induction electric drives, different by components, but working on a loading equal on character, magnitude and a demanded control range is executed. At use of characteristic families including mechanical, at various parameters of regulating on which performances of the load mechanism are superimposed, the adjusting characteristics representing dependences of a modification of electrical, energy and thermal magnitudes from an angular speed of motors are gained. Originality. The offered complex models of speed-controlled induction electric drives with matching reducers and transformers, give the chance to realize well-founded sampling of components of drives. They also can be used as the design models by working out of speed-controlled induction motors. Practical value. Operating characteristics of various speed-controlled induction electric

  5. Efficient Data Management with Applications to IoT

    OpenAIRE

    Belli, Laura

    2016-01-01

    The Internet of Things (IoT) consists of a worldwide “network of networks,” composed by billions of interconnected heterogeneous devices denoted as things or “Smart Objects” (SOs). Significant research efforts have been dedicated to port the experience gained in the design of the Internet to the IoT, with the goal of maximizing interoperability, using the Internet Protocol (IP) and designing specific protocols like the Constrained Application Protocol (CoAP), which have been widel...

  6. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  7. Industry IoT Gateway for Cloud Connectivity

    OpenAIRE

    Zolotová, Iveta; Bundzel, Marek; Lojka, Tomáš

    2015-01-01

    Part 2: Open Cloud Computing Architecture for Smart Manufacturing and Cyber Physical Production Systems; International audience; New approaches and technologies like Internet of Things (IoT), cloud computing and Big Data are giving rise to another industrial revolution. We propose here an implementation of an industrial gateway architecture adopting the idea of IoT, intelligent methods, Machine-to-Machine and Cyber-Physical Systems. The proposed gateway creates a virtual representation of the...

  8. Multimodal electromechanical model of piezoelectric transformers by Hamilton's principle.

    Science.gov (United States)

    Nadal, Clement; Pigache, Francois

    2009-11-01

    This work deals with a general energetic approach to establish an accurate electromechanical model of a piezoelectric transformer (PT). Hamilton's principle is used to obtain the equations of motion for free vibrations. The modal characteristics (mass, stiffness, primary and secondary electromechanical conversion factors) are also deduced. Then, to illustrate this general electromechanical method, the variational principle is applied to both homogeneous and nonhomogeneous Rosen-type PT models. A comparison of modal parameters, mechanical displacements, and electrical potentials are presented for both models. Finally, the validity of the electrodynamical model of nonhomogeneous Rosen-type PT is confirmed by a numerical comparison based on a finite elements method and an experimental identification.

  9. Moving-Target Position Estimation Using GPU-Based Particle Filter for IoT Sensing Applications

    Directory of Open Access Journals (Sweden)

    Seongseop Kim

    2017-11-01

    Full Text Available A particle filter (PF has been introduced for effective position estimation of moving targets for non-Gaussian and nonlinear systems. The time difference of arrival (TDOA method using acoustic sensor array has normally been used to for estimation by concealing the location of a moving target, especially underwater. In this paper, we propose a GPU -based acceleration of target position estimation using a PF and propose an efficient system and software architecture. The proposed graphic processing unit (GPU-based algorithm has more advantages in applying PF signal processing to a target system, which consists of large-scale Internet of Things (IoT-driven sensors because of the parallelization which is scalable. For the TDOA measurement from the acoustic sensor array, we use the generalized cross correlation phase transform (GCC-PHAT method to obtain the correlation coefficient of the signal using Fast Fourier Transform (FFT, and we try to accelerate the calculations of GCC-PHAT based TDOA measurements using FFT with GPU compute unified device architecture (CUDA. The proposed approach utilizes a parallelization method in the target position estimation algorithm using GPU-based PF processing. In addition, it could efficiently estimate sudden movement change of the target using GPU-based parallel computing which also can be used for multiple target tracking. It also provides scalability in extending the detection algorithm according to the increase of the number of sensors. Therefore, the proposed architecture can be applied in IoT sensing applications with a large number of sensors. The target estimation algorithm was verified using MATLAB and implemented using GPU CUDA. We implemented the proposed signal processing acceleration system using target GPU to analyze in terms of execution time. The execution time of the algorithm is reduced by 55% from to the CPU standalone operation in target embedded board, NVIDIA Jetson TX1. Also, to apply large

  10. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  11. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  12. Development of transformations from business process models to implementations by reuse

    NARCIS (Netherlands)

    Dirgahayu, T.; Quartel, Dick; van Sinderen, Marten J.; Ferreira Pires, Luis; Hammoudi, S.

    2007-01-01

    This paper presents an approach for developing transformations from business process models to implementations that facilitates reuse. A transformation is developed as a composition of three smaller tasks: pattern recognition, pattern realization and activity transformation. The approach allows one

  13. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  14. Transforming business models through big data in the textile industry

    DEFF Research Database (Denmark)

    Aagaard, Annabeth

    as stressed by Zott et al. (2011), Weill et al. (2011) and David J. Teece (2010: 174), who states that: “the concept of a business model lacks theoretical grounding in economics or in business studies”. With the acceleration of digitization and use of big data analytics quality data are accessible......, such as textile, and have led to disruption of established business models (Westerman et al., 2014; Weill and Woerner, 2015). Yet, little is known of the managerial process and facilitation of the digital transformation of business models through big data (McAfee and Brynjolfsson, 2012; Markus and Loebbecke, 2013)....

  15. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  16. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  17. Modeling and analysis on ring-type piezoelectric transformers.

    Science.gov (United States)

    Ho, Shine-Tzong

    2007-11-01

    This paper presents an electromechanical model for a ring-type piezoelectric transformer (PT). To establish this model, vibration characteristics of the piezoelectric ring with free boundary conditions are analyzed in advance. Based on the vibration analysis of the piezoelectric ring, the operating frequency and vibration mode of the PT are chosen. Then, electromechanical equations of motion for the PT are derived based on Hamilton's principle, which can be used to simulate the coupled electromechanical system for the transformer. Such as voltage stepup ratio, input impedance, output impedance, input power, output power, and efficiency are calculated by the equations. The optimal load resistance and the maximum efficiency for the PT will be presented in this paper. Experiments also were conducted to verify the theoretical analysis, and a good agreement was obtained.

  18. Application of Majoritarian Element to Improve IoT Communication

    Directory of Open Access Journals (Sweden)

    Tornike Dvali

    2016-06-01

    Full Text Available The work introduces the circle of the basic ideas and methods of error-free recovery of the binary signal to the multichannel digital technology based on the model of formal (artificial neuron and aims to contribute to the further development of this theo-ry of reliability. The work is useful for reservation or for exchange of a highly valuable information. During communication be-tween machines, connection related problems could occur and this work will be of a great help for machines to choose right channel for connection. Work also is a successful attempt of figuring out binary signal error recovery probability of minimum highest value. Moreover, binary channels optimization problems addressed by using threshold model and exploring three differ-ent approaches. In the future, this work will be used in Internet of Things (IoT for the exact communication between machines. Work will be used with threshold model for minimizing errors in the communication between things.

  19. Failed oceanic transform models: experience of shaking the tree

    Science.gov (United States)

    Gerya, Taras

    2017-04-01

    In geodynamics, numerical modeling is often used as a trial-and-error tool, which does not necessarily requires full understanding or even a correct concept for a modeled phenomenon. Paradoxically, in order to understand an enigmatic process one should simply try to model it based on some initial assumptions, which must not even be correct… The reason is that our intuition is not always well "calibrated" for understanding of geodynamic phenomena, which develop on space- and timescales that are very different from our everyday experience. We often have much better ideas about physical laws governing geodynamic processes than on how these laws should interact on geological space- and timescales. From this prospective, numerical models, in which these physical laws are self-consistently implemented, can gradually calibrate our intuition by exploring what scenarios are physically sensible and what are not. I personally went through this painful learning path many times and one noteworthy example was my 3D numerical modeling of oceanic transform faults. As I understand in retrospective, my initial literature-inspired concept of how and why transform faults form and evolve was thermomechanically inconsistent and based on two main assumptions (btw. both were incorrect!): (1) oceanic transforms are directly inherited from the continental rifting and breakup stages and (2) they represent plate fragmentation structures having peculiar extension-parallel orientation due to the stress rotation caused by thermal contraction of the oceanic lithosphere. During one year (!) of high-resolution thermomechanical numerical experiments exploring various physics (including very computationally demanding thermal contraction) I systematically observed how my initially prescribed extension-parallel weak transform faults connecting ridge segments rotated away from their original orientation and get converted into oblique ridge sections… This was really an epic failure! However, at the

  20. THREE-PHASE TRANSFORMER PARAMETERS CALCULATION CONSIDERING THE CORE SATURATION FOR THE MATLAB-SIMULINK TRANSFORMER MODEL

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2015-01-01

    Full Text Available This article describes the parameters calculation for the three-phase two-winding power transformer model taken from the SimPowerSystems library, which is the part of the MatLab- Simulink environment. Presented methodology is based on the power transformer nameplate data usage. Particular attention is paid to the power transformer magnetization curve para- meters  calculation.  The  methodology  of  the  three-phase  two-winding  power  transformer model parameters calculation considering the magnetization curve nonlinearity isn’t presented in Russian-and English-language sources. Power transformers demo models described in the SimPowerSystems user’s guide have already calculated parameters, but without reference to the sources of their determination. A power transformer is a nonlinear element of the power system, that’s why for its performance analysis in different modes of operation is necessary to have the magnetization curve parameters.The process analysis during no-load energizing of the power transformer is of special interest. This regime is accompanied by the inrush current on the supply side of the power transformer, which is several times larger than the transformer rated current. Sharp rising of the magnetizing current is explained by the magnetic core saturation. Therefore, magnetiza- tion characteristic accounting during transformer no-load energizing modeling is a mandatory requirement. Article authors attempt to put all calculating formulas in a more convenient form and validate the power transformer nonlinear magnetization characteristics parameters calcu- lation. Inrush current oscillograms obtained during the simulation experiment confirmed the adequacy of the calculated model parameters.

  1. Transforming PLC Programs into Formal Models for Verification Purposes

    CERN Document Server

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  2. Transformational change in health care systems: an organizational model.

    Science.gov (United States)

    Lukas, Carol VanDeusen; Holmes, Sally K; Cohen, Alan B; Restuccia, Joseph; Cramer, Irene E; Shwartz, Michael; Charns, Martin P

    2007-01-01

    The Institute of Medicine's 2001 report Crossing the Quality Chasm argued for fundamental redesign of the U.S. health care system. Six years later, many health care organizations have embraced the report's goals, but few have succeeded in making the substantial transformations needed to achieve those aims. This article offers a model for moving organizations from short-term, isolated performance improvements to sustained, reliable, organization-wide, and evidence-based improvements in patient care. Longitudinal comparative case studies were conducted in 12 health care systems using a mixed-methods evaluation design based on semistructured interviews and document review. Participating health care systems included seven systems funded through the Robert Wood Johnson Foundation's Pursuing Perfection Program and five systems with long-standing commitments to improvement and high-quality care. Five interactive elements appear critical to successful transformation of patient care: (1) Impetus to transform; (2) Leadership commitment to quality; (3) Improvement initiatives that actively engage staff in meaningful problem solving; (4) Alignment to achieve consistency of organization goals with resource allocation and actions at all levels of the organization; and (5) Integration to bridge traditional intra-organizational boundaries among individual components. These elements drive change by affecting the components of the complex health care organization in which they operate: (1) Mission, vision, and strategies that set its direction and priorities; (2) Culture that reflects its informal values and norms; (3) Operational functions and processes that embody the work done in patient care; and (4) Infrastructure such as information technology and human resources that support the delivery of patient care. Transformation occurs over time with iterative changes being sustained and spread across the organization. The conceptual model holds promise for guiding health care

  3. Chemical Transformation Motifs --- Modelling Pathways as Integer Hyperflows

    DEFF Research Database (Denmark)

    Andersen, Jakob L.; Flamm, Christoph; Merkle, Daniel

    2018-01-01

    We present an elaborate framework for formally modelling pathways in chemical reaction networks on a mechanistic level. Networks are modelled mathematically as directed multi-hypergraphs, with vertices corresponding to molecules and hyperedges to reactions. Pathways are modelled as integer...... hyperflows and we expand the network model by detailed routing constraints. In contrast to the more traditional approaches like Flux Balance Analysis or Elementary Mode analysis we insist on integer-valued flows. While this choice makes it necessary to solve possibly hard integer linear programs, it has...... the advantage that more detailed mechanistic questions can be formulated. It is thus possible to query networks for general transformation motifs, and to automatically enumerate optimal and near-optimal pathways. Similarities and differences between our work and traditional approaches in metabolic network...

  4. TP-model transformation-based-control design frameworks

    CERN Document Server

    Baranyi, Péter

    2016-01-01

    This book covers new aspects and frameworks of control, design, and optimization based on the TP model transformation and its various extensions. The author outlines the three main steps of polytopic and LMI based control design: 1) development of the qLPV state-space model, 2) generation of the polytopic model; and 3) application of LMI to derive controller and observer. He goes on to describe why literature has extensively studied LMI design, but has not focused much on the second step, in part because the generation and manipulation of the polytopic form was not tractable in many cases. The author then shows how the TP model transformation facilitates this second step and hence reveals new directions, leading to powerful design procedures and the formulation of new questions. The chapters of this book, and the complex dynamical control tasks which they cover, are organized so as to present and analyze the beneficial aspect of the family of approaches (control, design, and optimization). Additionally, the b...

  5. Designing Efficient Access Control to Comply Massive-Multiservice IoT over Cellular Networks

    OpenAIRE

    Hossain, Mohammad Istiak

    2017-01-01

    Internet of Things (IoT) has come in reality to improve our living quality. Automation is embraced in all the possible business verticals that have diverse communication needs ranged from static devices’ sporadic transmission to mobile devices’ every minute transmission. Despite, there are many technologies available today to support IoT services; cellular systems can play a vital role for IoT services, like wearables, vehicular, and industrial IoT, rollout which have either mobility or secur...

  6. 3-D ICs as a Platform for IoT Devices

    Science.gov (United States)

    2017-03-01

    3-D ICs are a natural platform for IoT devices.IoT devices exhibit a small footprint, integrate disparatetechnologies, and require long term...sustainability (extremelylow power or self powered). The 3-D structure exhibits opportunitiesessential for IoT devices, including heterogeneity,small form...factor, and reduced power dissipation, making3-D integration a favorable candidate for IoT devices. Thechallenges of IoT devices and related

  7. Role of Non-Volatile Memories in Automotive and IoT Markets

    Science.gov (United States)

    2017-03-01

    Role of Non-Volatile Memories in Automotive and IoT Markets Vipin Tiwari Director, Business Development and Product Marketing SST – A Wholly Own...automotive and Internet of Things ( IoT ) markets. Keywords: Embedded flash; Microcontrollers, Automotive; Internet of Things, IoT ; Non-volatile memories...volatile memory. The Internet of Things ( IoT ) is centered on providing distributed intelligence, sensing and connectivity to electronics around

  8. High frequency modeling of power transformers. Stresses and diagnostics

    Energy Technology Data Exchange (ETDEWEB)

    Bjerkan, Eilert

    2005-05-15

    In this thesis a reliable, versatile and rigorous method for high frequency power transformer modeling is searched and established. The purpose is to apply this model to sensitivity analysis of FRA (Frequency Response Analysis) which is a quite new diagnostic method for assessing the mechanical integrity of power transformer windings on-site. The method should be versatile in terms of being able to estimate internal and external over voltages and resonances. Another important aspect is that the method chosen is suitable for real transformer geometries. In order to verify the suitability of the model for real transformers, a specific test-object is used. This is a 20MVA transformer, and details are given in chapter 1.4. The high frequency power transformer model is established from geometrical and constructional information from the manufacturer, together with available material characteristics. All circuit parameters in the lumped circuit representation are calculated based on these data. No empirical modifications need to be performed. Comparison shows capability of reasonable accuracy in the range from 10 khz to 1 MHz utilizing a disc-to-disc representation. A compromise between accuracy of model due to discretization and complexity of the model in a turn-to-turn representation is inevitable. The importance of the iron core is emphasized through a comparison of representations with/without the core included. Frequency-dependent phenomena are accurately represented using an isotropic equivalent for windings and core, even with a coarse mesh for the FEM-model. This is achieved through a frequency-dependent complex permeability representation of the materials. This permeability is deduced from an analytical solution of the frequency-dependent magnetic field inside the conductors and the core. The importance of dielectric losses in a transformer model is also assessed. Since published data on the high frequency properties of press board are limited, some initial

  9. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics

  10. 47 CFR 69.303 - Information origination/termination equipment (IOT).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Information origination/termination equipment (IOT). 69.303 Section 69.303 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... origination/termination equipment (IOT). Investment in all other IOT shall be apportioned between the Special...

  11. Text-Independent Speaker Identification Using the Histogram Transform Model

    DEFF Research Database (Denmark)

    Ma, Zhanyu; Yu, Hong; Tan, Zheng-Hua

    2016-01-01

    In this paper, we propose a novel probabilistic method for the task of text-independent speaker identification (SI). In order to capture the dynamic information during SI, we design a super-MFCCs features by cascading three neighboring Mel-frequency Cepstral coefficients (MFCCs) frames together....... These super-MFCC vectors are utilized for probabilistic model training such that the speaker’s characteristics can be sufficiently captured. The probability density function (PDF) of the aforementioned super-MFCCs features is estimated by the recently proposed histogram transform (HT) method. To recedes...

  12. Semiparametric analysis of linear transformation models with covariate measurement errors.

    Science.gov (United States)

    Sinha, Samiran; Ma, Yanyuan

    2014-03-01

    We take a semiparametric approach in fitting a linear transformation model to a right censored data when predictive variables are subject to measurement errors. We construct consistent estimating equations when repeated measurements of a surrogate of the unobserved true predictor are available. The proposed approach applies under minimal assumptions on the distributions of the true covariate or the measurement errors. We derive the asymptotic properties of the estimator and illustrate the characteristics of the estimator in finite sample performance via simulation studies. We apply the method to analyze an AIDS clinical trial data set that motivated the work. © 2013, The International Biometric Society.

  13. Culture models of human mammary epithelial cell transformation

    Energy Technology Data Exchange (ETDEWEB)

    Stampfer, Martha R.; Yaswen, Paul

    2000-11-10

    Human pre-malignant breast diseases, particularly ductal carcinoma in situ (DCIS)3 already display several of the aberrant phenotypes found in primary breast cancers, including chromosomal abnormalities, telomerase activity, inactivation of the p53 gene and overexpression of some oncogenes. Efforts to model early breast carcinogenesis in human cell cultures have largely involved studies in vitro transformation of normal finite lifespan human mammary epithelial cells (HMEC) to immortality and malignancy. We present a model of HMEC immortal transformation consistent with the know in vivo data. This model includes a recently described, presumably epigenetic process, termed conversion, which occurs in cells that have overcome stringent replicative senescence and are thus able to maintain proliferation with critically short telomeres. The conversion process involves reactivation of telomerase activity, and acquisition of good uniform growth in the absence and presence of TFGB. We propose th at overcoming the proliferative constraints set by senescence, and undergoing conversion, represent key rate-limiting steps in human breast carcinogenesis, and occur during early stage breast cancer progression.

  14. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  15. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  16. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  17. Diagnostic and Prognostic Models for Generator Step-Up Transformers

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Nancy J. Lybeck; Binh T. Pham

    2014-09-01

    In 2014, the online monitoring (OLM) of active components project under the Light Water Reactor Sustainability program at Idaho National Laboratory (INL) focused on diagnostic and prognostic capabilities for generator step-up transformers. INL worked with subject matter experts from the Electric Power Research Institute (EPRI) to augment and revise the GSU fault signatures previously implemented in the Electric Power Research Institute’s (EPRI’s) Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. Two prognostic models were identified and implemented for GSUs in the FW-PHM Suite software. INL and EPRI demonstrated the use of prognostic capabilities for GSUs. The complete set of fault signatures developed for GSUs in the Asset Fault Signature Database of the FW-PHM Suite for GSUs is presented in this report. Two prognostic models are described for paper insulation: the Chendong model for degree of polymerization, and an IEEE model that uses a loading profile to calculates life consumption based on hot spot winding temperatures. Both models are life consumption models, which are examples of type II prognostic models. Use of the models in the FW-PHM Suite was successfully demonstrated at the 2014 August Utility Working Group Meeting, Idaho Falls, Idaho, to representatives from different utilities, EPRI, and the Halden Research Project.

  18. Proof of Concept of Home IoT Connected Vehicles

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants’ intention correctly and to gain the required trust regarding the remote execution of tasks. PMID:28587246

  19. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  20. Experimental performance evaluation of IoT security solutions

    OpenAIRE

    Martínez Caro, José Manuel

    2016-01-01

    [SPA]Internet de las Cosas (Internet of Things, IoT) plantea dudas importantes e introduce nuevos retos en la privacidad de las personas y en la seguridad de los sistemas y de los procesos. Algunas aplicaciones de IoT están estrechamente vinculadas a infraestructuras sensibles y servicios estratégicos tales como la distribución de agua y electricidad. Otras aplicaciones manejan información sensible acerca de las personas, tales como su ubicación y sus desplazamientos, o sus preferencias de sa...

  1. An Novel Architecture of Large-scale Communication in IOT

    Science.gov (United States)

    Ma, Wubin; Deng, Su; Huang, Hongbin

    2018-03-01

    In recent years, many scholars have done a great deal of research on the development of Internet of Things and networked physical systems. However, few people have made the detailed visualization of the large-scale communications architecture in the IOT. In fact, the non-uniform technology between IPv6 and access points has led to a lack of broad principles of large-scale communications architectures. Therefore, this paper presents the Uni-IPv6 Access and Information Exchange Method (UAIEM), a new architecture and algorithm that addresses large-scale communications in the IOT.

  2. Discrete shear-transformation-zone plasticity modeling of notched bars

    Science.gov (United States)

    Kondori, Babak; Amine Benzerga, A.; Needleman, Alan

    2018-02-01

    Plane strain tension analyses of un-notched and notched bars are carried out using discrete shear transformation zone plasticity. In this framework, the carriers of plastic deformation are shear transformation zones (STZs) which are modeled as Eshelby inclusions. Superposition is used to represent a boundary value problem solution in terms of discretely modeled Eshelby inclusions, given analytically for an infinite elastic medium, and an image solution that enforces the prescribed boundary conditions. The image problem is a standard linear elastic boundary value problem that is solved by the finite element method. Potential STZ activation sites are randomly distributed in the bars and constitutive relations are specified for their evolution. Results are presented for un-notched bars, for bars with blunt notches and for bars with sharp notches. The computed stress-strain curves are serrated with the magnitude of the associated stress-drops depending on bar size, notch acuity and STZ evolution. Cooperative deformation bands (shear bands) emerge upon straining and, in some cases, high stress levels occur within the bands. Effects of specimen geometry and size on the stress-strain curves are explored. Depending on STZ kinetics, notch strengthening, notch insensitivity or notch weakening are obtained. The analyses provide a rationale for some conflicting findings regarding notch effects on the mechanical response of metallic glasses.

  3. Using two coefficients modeling of nonsubsampled Shearlet transform for despeckling

    Science.gov (United States)

    Jafari, Saeed; Ghofrani, Sedigheh

    2016-01-01

    Synthetic aperture radar (SAR) images are inherently affected by multiplicative speckle noise. Two approaches based on modeling the nonsubsampled Shearlet transform (NSST) coefficients are presented. Two-sided generalized Gamma distribution and normal inverse Gaussian probability density function have been used to model the statistics of NSST coefficients. Bayesian maximum a posteriori estimator is applied to the corrupted NSST coefficients in order to estimate the noise-free NSST coefficients. Finally, experimental results, according to objective and subjective criteria, carried out on both artificially speckled images and the true SAR images, demonstrate that the proposed methods outperform other state of art references via two points of view, speckle noise reduction and image quality preservation.

  4. Modeling human endothelial cell transformation in vascular neoplasias.

    Science.gov (United States)

    Wen, Victoria W; MacKenzie, Karen L

    2013-09-01

    Endothelial cell (EC)-derived neoplasias range from benign hemangioma to aggressive metastatic angiosarcoma, which responds poorly to current treatments and has a very high mortality rate. The development of treatments that are more effective for these disorders will be expedited by insight into the processes that promote abnormal proliferation and malignant transformation of human ECs. The study of primary endothelial malignancy has been limited by the rarity of the disease; however, there is potential for carefully characterized EC lines and animal models to play a central role in the discovery, development and testing of molecular targeted therapies for vascular neoplasias. This review describes molecular alterations that have been identified in EC-derived neoplasias, as well as the processes that underpin the immortalization and tumorigenic conversion of ECs. Human EC lines, established through the introduction of defined genetic elements or by culture of primary tumor tissue, are catalogued and discussed in relation to their relevance as models of vascular neoplasia.

  5. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  6. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  7. Regenerative-Relational Tritangtu: Sundanese Triadic Transformation Model

    Directory of Open Access Journals (Sweden)

    Wanda Listiani

    2013-06-01

    Full Text Available ABSTRACT   Tritangtu or Trinity mindset is a Sundanese and Minang community cosmology that consists of three entities (three patterns. Tritangtu as the local wisdom is also underlying the creative actors mental structure on making their works either in the form of performance, artifacts philosophy value, or in other cultural products in Indonesian community. This study used ethnographic method with data collection techniques were participant observation in-depth interviews and documentation. The object of study is the creative actors practice at the design field in Bandung. The result of study pointed out the Sundanese Tritangtu transformation from the permanent struc- ture to dynamic structure. The change in the structure is determined by the relation between the de- sign elements forming structure with the global market segmentation. Lending Sundanese identity markers, especially the folk culture or the past traditions is regenerative efforts to harmonize the three patterns in encountering and winning the free-market competition in Indonesia.   Keyword:  Tritangtu, Sundanese Triadic Transformation ModelAbstrak   Tritangtu atau pola pikir tritunggal merupakan kosmologi masyarakat Sunda dan Minang yang terdiri dari tiga entitas (pola tiga. Tritangtu sebagai kearifan lokal juga melatarbelakangi struktur mental pelaku kreatif dalam membuat karya baik berupa pertunjukan, nilai filosofi artefak mau- pun produk budaya lainnya di masyarakat Indonesia. Penelitian ini menggunakan metode etnografi dengan teknik pengumpulan data observasi partisipasi, wawancara mendalam dan dokumentasi. Obyek penelitian ini adalah praktik pelaku kreatif di bidang desain di Bandung. Hasil penelitian ini menunjukkan adanya transformasi tritangtu Sunda dari struktur yang tetap menjadi struktur dinamis. Perubahan struktur ini ditentukan oleh relasi antar struktur pembentuk unsur desain de- ngan segmentasi pasar global. Peminjaman penanda identitas Sunda khususnya budaya

  8. Modeling of magnetization reversal processes in magnetic circuits of measuring transformers

    OpenAIRE

    Lebedev, Vladimir; Makarov, Arkadiy; Yablokov, Andrey; Filatova, Galina

    2015-01-01

    The article describes methods for modeling transient regimes in current and voltage transformers. In most studies measuring transformers are modeled in a stationary mode to determine their metrological characteristics. However, for safe uninterrupted operation of transformers and electrical networks it is necessary to carry out their research in dynamic mode. In particular, the study of the transformers stability to the ferroresonant phenomena occurring during switching o...

  9. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-01-01

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home. PMID:29019964

  10. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Directory of Open Access Journals (Sweden)

    Sheik Mohammad Mostakim Fattah

    2017-10-01

    Full Text Available An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP. In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills through light and speaker at home but also wrist band and smartphone even outside the home.

  11. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products.

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-10-11

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer's disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors' ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called 'aging in place' (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home.

  12. Behavioural informatics for improving water hygiene practice based on IoT environment.

    Science.gov (United States)

    Fu, Yang; Wu, Wenyan

    2018-02-01

    The development of Internet of Things (IoT) and latest Information and Communication Technologies (ICT) have changed the nature of healthcare monitoring and health behaviour intervention in many applications. Water hygiene and water conservation behaviour intervention as important influence factors to human health are gaining much attentions for improving sustained sanitation practice. Based on face-to-face delivery, typical behaviour intervention method is costly and hardly to provide all day access to personalised intervention guidance and feedbacks. In this study, we presented a behavioural information system and water use behaviour model using IoT platform. Using Expanded Theory of Planned Behaviour (ETPB) and adopted structure equation model, this study offers a solution for understanding the behaviour intervention mechanism and methodology for developing empirical model. A case study of behaviour intervention model is presented by utilising residential water conservation behaviour data collected in China. Results suggested that cultural differences have significant influences on the understanding of intervention drivers, promoting projects and increasing awareness, which could improve the behaviour intervention efficiency and further facilitate the improvement of water hygiene practice. The performance evaluation of water saving dimension is discussed as well in the paper. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. A macroscopic model to simulate the mechanically induced martensitic transformation in metastable austenitic stainless steels

    International Nuclear Information System (INIS)

    Perdahcıoğlu, E.S.; Geijselaers, H.J.M.

    2012-01-01

    Mechanically induced martensitic transformation and the associated transformation plasticity phenomena in austenitic stainless steels are studied. The mechanisms responsible for the transformation are investigated and put into perspective based on experimental evidence. The stress and strain partitioning into the austenite and martensite phases are formulated using a mean-field homogenization approach. At this intermediate length-scale the average stress in the austenite phase is computed and utilized to compute the mechanical driving force resolved in the material. The amount of transformation and the transformation plasticity is derived as a function of the driving force. The mechanical response of the material is obtained by combining the homogenization and the transformation models. The model is verified by mechanical tests under biaxial loading conditions during which different transformation rates are observed. As a final verification of the model, a bending test is used which manifests the stress-state dependency of the transformation.

  14. Energy-Neutral Data Collection Rate Control for IoT Animal Behavior Monitors

    Directory of Open Access Journals (Sweden)

    Jay Wilhelm

    2017-11-01

    Full Text Available Energy-neutral operation (ENO is a major concern for Internet of things (IoT sensor systems. Animals can be tagged with IoT sensors to monitor their movement and behavior. These sensors wirelessly upload collected data and can receive parameters to change their operation. Typically, the behavior monitors are powered by a battery where the system relies upon harvesting solar radiation for sustainable operation. Solar panels typically are used as the harvesting mechanism and can have a level of uncertainty regarding consistent energy delivery due to factors such as adverse weather, foliage, time of day, and individual animal behavior. The variability of available energy inevitably creates a trade-off in the rate at which data can be collected with respect to incoming and stored energy. The objective of this research was to investigate and simulate methods and parameters that can control the data collection rate of an IoT behavior monitor to achieve sustained operation with unknown and random energy harvesting. Analysis and development of a control system were performed by creating a software model of energy consumption and then simulating using different initial conditions and random energy harvesting rates for evaluation. The contribution of this effort was the exploration into the usage of a discrete-time gain scheduled Proportional–Integral–Derivative (PID that was tuned to a specific device configuration, using battery state of charge as an input, and found to maintain a battery level set-point, reject small solar harvesting energy disturbances, and maintain a consistent data collection rate throughout the day.

  15. Modeling of Heavy Metal Transformation in Soil Ecosystem

    Science.gov (United States)

    Kalinichenko, Kira; Nikovskaya, Galina N.

    2017-04-01

    The intensification of industrial activity leads to an increase in heavy metals pollution of soils. In our opinion, sludge from biological treatment of municipal waste water, stabilized under aerobic-anaerobic conditions (commonly known as biosolid), may be considered as concentrate of natural soil. In their chemical, physical and chemical and biological properties these systems are similar gel-like nanocomposites. These contain microorganisms, humic substances, clay, clusters of nanoparticles of heavy metal compounds, and so on involved into heteropolysaccharides matrix. It is known that microorganisms play an important role in the transformation of different nature substances in soil and its health maintenance. The regularities of transformation of heavy metal compounds in soil ecosystem were studied at the model of biosolid. At biosolid swelling its structure changing (gel-sol transition, weakening of coagulation contacts between metal containing nanoparticles, microbial cells and metabolites, loosening and even destroying of the nanocomposite structure) can occur [1, 2]. The promotion of the sludge heterotrophic microbial activities leads to solubilization of heavy metal compounds in the system. The microbiological process can be realized in alcaligeneous or acidogeneous regimes in dependence on the type of carbon source and followed by the synthesis of metabolites with the properties of flocculants and heavy metals extragents [3]. In this case the heavy metals solubilization (bioleaching) in the form of nanoparticles of hydroxycarbonate complexes or water soluble complexes with oxycarbonic acids is observed. Under the action of biosolid microorganisms the heavy metals-oxycarbonic acids complexes can be transformed (catabolised) into nano-sizing heavy metals- hydroxycarbonates complexes. These ecologically friendly complexes and microbial heteropolysaccharides are able to interact with soil colloids, stay in the top soil profile, and improve soil structure due

  16. Transformer core modeling for magnetizing inrush current investigation

    OpenAIRE

    A.Yahiou; A. Bayadi

    2014-01-01

    The inrush currents generated during an energization of power transformer can reach very high values and may cause many problems in power system. This magnetizing inrush current which occurs at the time of energization of a transformer is due to temporary overfluxing in the transformer core. Its magnitude mainly depends on switching parameters such as the resistance of the primary winding and the point-on-voltage wave (switching angle). This paper describes a system for measuring the inrush c...

  17. Modeling of the Austenite-Martensite Transformation in Stainless and TRIP Steels

    NARCIS (Netherlands)

    Geijselaers, Hubertus J.M.; Hilkhuijsen, P.; Bor, Teunis Cornelis; Perdahcioglu, Emin Semih; van den Boogaard, Antonius H.; Zhang, S.-H.; Liu, X.-H.; Gheng, M.; Li, J.

    2013-01-01

    The transformation of austenite to martensite is a dominant factor in the description of the constitutive behavior during forming of TRIP assisted steels. To predict this transformation different models are currently available. In this paper the transformation is regarded as a stress induced process

  18. Rule-based modularization in model transformation languages illustrated with ATL

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas; Jouault, Frédéric

    2007-01-01

    This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are identified on the basis of relations between source and target metamodels and on the base of generic transformation

  19. Evaluation of Rule-based Modularization in Model Transformation Languages illustrated with ATL

    NARCIS (Netherlands)

    Ivanov, Ivan; van den Berg, Klaas; Jouault, Frédéric

    This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are identified on the base of the relations between source and target metamodels and on the base of generic transformation

  20. Institutional Transformation Version 2.5 Modeling and Planning.

    Energy Technology Data Exchange (ETDEWEB)

    Villa, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mizner, Jack H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Passell, Howard D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gallegos, Gerald R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Vetter, Douglas W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Christopher A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Addison, Marlin [Arizona State Univ., Mesa, AZ (United States); Schaffer, Matthew A. [Bridgers and Paxton Engineering Firm, Albuquerque, NM (United States); Higgins, Matthew W. [Vibrantcy, Albuquerque, NM (United States)

    2017-02-01

    Reducing the resource consumption and emissions of large institutions is an important step toward a sustainable future. Sandia National Laboratories' (SNL) Institutional Transformation (IX) project vision is to provide tools that enable planners to make well-informed decisions concerning sustainability, resource conservation, and emissions reduction across multiple sectors. The building sector has been the primary focus so far because it is the largest consumer of resources for SNL. The IX building module allows users to define the evolution of many buildings over time. The module has been created so that it can be generally applied to any set of DOE-2 ( http://doe2.com ) building models that have been altered to include parameters and expressions required by energy conservation measures (ECM). Once building models have been appropriately prepared, they are checked into a Microsoft Access (r) database. Each building can be represented by many models. This enables the capability to keep a continuous record of models in the past, which are replaced with different models as changes occur to the building. In addition to this, the building module has the capability to apply climate scenarios through applying different weather files to each simulation year. Once the database has been configured, a user interface in Microsoft Excel (r) is used to create scenarios with one or more ECMs. The capability to include central utility buildings (CUBs) that service more than one building with chilled water has been developed. A utility has been created that joins multiple building models into a single model. After using the utility, several manual steps are required to complete the process. Once this CUB model has been created, the individual contributions of each building are still tracked through meters. Currently, 120 building models from SNL's New Mexico and California campuses have been created. This includes all buildings at SNL greater than 10,000 sq. ft

  1. Transformation of Neural State Space Models into LFT Models for Robust Control Design

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, Klaus

    2000-01-01

    This paper considers the extraction of linear state space models and uncertainty models from neural networks trained as state estimators with direct application to robust control. A new method for writing a neural state space model in a linear fractional transformation form in a non-conservative ......-conservative way is proposed, and it is demonstrated how a standard robust control law can be designed for a system described by means of a multi layer perceptron....

  2. DYNAMICS MODEL OF MOISTURE IN PAPER INSULATION-TRANSFORMER OIL SYSTEM IN NON-STATIONARY THERMAL MODES OF THE POWER TRANSFORMER

    Directory of Open Access Journals (Sweden)

    V.V. Vasilevskij

    2016-06-01

    Full Text Available Introduction. An important problem in power transformers resource prognosis is the formation of moisture dynamics trends of transformer insulation. Purpose. Increasing the accuracy of power transformer insulation resource assessment based on accounting of moisture dynamics in interrelation with temperature dynamics. Working out of moisture dynamics model in paper insulation-transformer oil system in conjunction with thermodynamic model, load model and technical maintenance model. Methodology. The mathematical models used for describe the moisture dynamics are grounded on nonlinear differential equations. Interrelation moisture dynamics model with thermodynamic, load and technical maintenance models described by UML model. For confirming the adequacy of model used computer simulation. Results. We have implemented the model of moisture dynamics in power transformers insulation in interrelation with other models, which describe the state of power transformer in operation. The proposed model allows us to form detailed trends of moisture dynamics in power transformers insulation basing on monitoring data or power transformers operational factors simulation results. We have performed computer simulation of moisture exchange processes and calculation of transformer insulation resource for different moisture trends. Originality. The offered model takes into account moisture dynamics in power transformers insulation under the influence of changes of the power transformers thermal mode and operational factors. Practical value. The offered model can be used in power transformers monitoring systems for automation of resource assessment of oil-immersed power transformers paper insulation at different phase of lifecycle. Model also can be used for assessment of projected economic efficiency of power transformers exploitation in projected operating conditions.

  3. Comparing Transformation Possibilities of Topological Functioning Model and BPMN in the Context of Model Driven Architecture

    Directory of Open Access Journals (Sweden)

    Solomencevs Artūrs

    2016-05-01

    Full Text Available The approach called “Topological Functioning Model for Software Engineering” (TFM4SE applies the Topological Functioning Model (TFM for modelling the business system in the context of Model Driven Architecture. TFM is a mathematically formal computation independent model (CIM. TFM4SE is compared to an approach that uses BPMN as a CIM. The comparison focuses on CIM modelling and on transformation to UML Sequence diagram on the platform independent (PIM level. The results show the advantages and drawbacks the formalism of TFM brings into the development.

  4. Internet of Things (IoT Platform for Structure Health Monitoring

    Directory of Open Access Journals (Sweden)

    Ahmed Abdelgawad

    2017-01-01

    Full Text Available Increase in the demand for reliable structural health information led to the development of Structural Health Monitoring (SHM. Prediction of upcoming accidents and estimation of useful life span of a structure are facilitated through SHM. While data sensing is the core of any SHM, tracking the data anytime anywhere is a prevailing challenge. With the advancement in information technology, the concept of Internet of Things (IoT has made it possible to integrate SHM with Internet to track data anytime anywhere. In this paper, a SHM platform embedded with IoT is proposed to detect the size and location of damage in structures. The proposed platform consists of a Wi-Fi module, a Raspberry Pi, an Analog to Digital Converter (ADC, a Digital to Analog Converter (DAC, a buffer, and piezoelectric (PZT sensors. The piezoelectric sensors are mounted as a pair in the structure. Data collected from the piezoelectric sensors will be used to detect the size and location of damage using a proposed mathematical model. Implemented on a Raspberry Pi, the proposed mathematical model will estimate the size and location of structural damage, if any, and upload the data to Internet. This data will be stored and can be checked remotely from any mobile device. The system has been validated using a real test bed in the lab.

  5. Value Creation in the Internet of Things: Mapping Business Models and Ecosystem Roles

    Directory of Open Access Journals (Sweden)

    Heini Ikävalko

    2018-03-01

    Full Text Available The increasing connectivity provided by the Internet of Things (IoT supports novel business opportunities for actors in overlapping service systems. Therefore, the co-creative nature of IoT business needs to be further studied. This article reports an empirical study on a European IoT initiative. It contributes to the understudied area of IoT ecosystem dynamics by describing different actor roles and activities in the IoT use cases, and their implications for value creation in IoT ecosystems. Our findings show how IoT ecosystem actors may take the roles of ideator, designer, or intermediary in different IoT design layers, and we recommend this perspective to better understand and describe ecosystem business models. We also discuss the theoretical and managerial implications of our findings.

  6. Full Semantics Preservation in Model Transformation - A Comparison of Proof Techniques

    NARCIS (Netherlands)

    Hülsbusch, Mathias; König, Barbara; Rensink, Arend; Semenyak, Maria; Soltenborn, Christian; Wehrheim, Heike

    Model transformation is a prime technique in modern, model-driven software design. One of the most challenging issues is to show that the semantics of the models is not affected by the transformation. So far, there is hardly any research into this issue, in particular in those cases where the source

  7. Transformation of Malaysian Construction Industry with Building Information Modelling (BIM

    Directory of Open Access Journals (Sweden)

    Latiffi Aryani Ahmad

    2016-01-01

    Full Text Available Building Information Modelling (BIM is a revolution of technology and a process that transformed the way building is planned, designed, analysed, constructed and managed. The revolution of technology and process could increase the quality of construction projects. The knowledge of BIM has been expanding in many countries including Malaysia. Since its inception, the use of BIM has broadened up widely with different purposes. The aims of this paper is to investigate the BIM implementation and uses in Malaysian construction projects. The methodologies adopted for structuring this paper are by using literature review and semi-structured interview with construction players that have experienced and being involved in projects using BIM. The purpose of literature review is to illustrate on the pervious research on the subject matter. Meanwhile, the purpose of interviews is to explore the involvement of construction players, years of experience in projects using BIM and BIM uses in construction projects. The findings revealed that BIM has been implemented in Malaysia since 2007 by various construction players, which are client, architect, C&S engineer, M&E engineer, QS, contractor, facilities manager and BIM consultant. The findings also revealed that BIM is used for project’ visualisation, improving project design, detecting design clashes, quantity take off and operation and maintenance. Further work will be focused on the current practices of construction players in projects using BIM.

  8. Modelling of Diffusive and Massive Phase Transformations in Binary Systems – Thick Interface Parametric Model

    Czech Academy of Sciences Publication Activity Database

    Svoboda, Jiří; Gamsjäger, E.

    2011-01-01

    Roč. 102, č. 6 (2011), s. 666-673 ISSN 1862-5282 R&D Projects: GA MŠk(CZ) OC10029 Institutional research plan: CEZ:AV0Z20410507 Keywords : modelling * phase transformation * ediffusion Subject RIV: BJ - Thermodynamics Impact factor: 0.830, year: 2011

  9. Optical fiber sensors for IoT and smart devices

    CERN Document Server

    Domingues, Maria de Fátima F

    2017-01-01

    This brief provides a review of the evolution of optical fiber sensing solutions and related applications. Unique production methods are presented and discussed, highlighting their evolution and analyzing their complexity. Under this scope, this brief presents the existing silica optical fiber sensors and polymer optical fiber sensors solutions, comparing its field of action (sensitivity, accuracy), complexity of manufacture and economic cost. Special attention is given to low-cost production methods. This brief evaluates the different existing techniques, assessing the accuracy and suitability of these sensors for possible Internet of Things (IoT) integration in different considered scenarios. Critical analytical techniques, also covered in this brief, are expected to play a key role in the world of IoT and the smart city of tomorrow.

  10. SMART CITY SERVICES DRIVEN BY IOT: A SYSTEMATIC REVIEW

    Directory of Open Access Journals (Sweden)

    Marko Mijac

    2017-09-01

    Full Text Available The central role in development of information society is taken by smart cities and their novel services through the use of modern technology and smart solutions. The key enabler and driver of smart cities is Internet of Things (IoT. In this paper, we have conducted a systematic literature review in order to investigate proposed smart city services driven by IoT. We have formulated the review protocol to define the research question/s, search strategy, selection criteria, study quality assessment, and data extraction strategy. We have defined the following main research question: What are the reported applications of Internet of Things in the development of smart city services? The papers were categorized by the smart city services they proposed or described. We have recognized the following categories: traffic and transport; environment monitoring; accessibility & healthcare; waste management; public lighting; energy management; city infrastructure; and other.

  11. An Upper-Ontology-Based Approach for Automatic Construction of IOT Ontology

    OpenAIRE

    Yuan Xu; Chunhong Zhang; Yang Ji

    2014-01-01

    Ontology gives us a reliable group of concepts and the relations between concepts in an IOT system. It does not only save words of format but also accurately transfers semantic data between human users and the computers. Hence, the usefulness of resources in IOT system depends on whether the domain ontology can be constructed effectively and correctly. In this paper we propose an automated method to construct the IOT ontology. First, we explain the necessity of introducing ontology automatic ...

  12. Transformer core modeling for magnetizing inrush current investigation

    Directory of Open Access Journals (Sweden)

    A.Yahiou

    2014-03-01

    Full Text Available The inrush currents generated during an energization of power transformer can reach very high values and may cause many problems in power system. This magnetizing inrush current which occurs at the time of energization of a transformer is due to temporary overfluxing in the transformer core. Its magnitude mainly depends on switching parameters such as the resistance of the primary winding and the point-on-voltage wave (switching angle. This paper describes a system for measuring the inrush current which is composed principally of an acquisition card (EAGLE, and LabVIEW code. The system is also capable of presetting various combinations of switching parameters for the energization of a 2 kVA transformer via an electronic card. Moreover, an algorithm for calculating the saturation curve is presented taking the iron core reactive losses into account, thereby producing a nonlinear inductance. This curve is used to simulate the magnetizing inrush current using the ATP-EMTP software.

  13. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke

    2017-01-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219

  14. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  15. An Energy-Efficient Compressive Image Coding for Green Internet of Things (IoT).

    Science.gov (United States)

    Li, Ran; Duan, Xiaomeng; Li, Xu; He, Wei; Li, Yanling

    2018-04-17

    Aimed at a low-energy consumption of Green Internet of Things (IoT), this paper presents an energy-efficient compressive image coding scheme, which provides compressive encoder and real-time decoder according to Compressive Sensing (CS) theory. The compressive encoder adaptively measures each image block based on the block-based gradient field, which models the distribution of block sparse degree, and the real-time decoder linearly reconstructs each image block through a projection matrix, which is learned by Minimum Mean Square Error (MMSE) criterion. Both the encoder and decoder have a low computational complexity, so that they only consume a small amount of energy. Experimental results show that the proposed scheme not only has a low encoding and decoding complexity when compared with traditional methods, but it also provides good objective and subjective reconstruction qualities. In particular, it presents better time-distortion performance than JPEG. Therefore, the proposed compressive image coding is a potential energy-efficient scheme for Green IoT.

  16. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  17. DIGITAL TRANSFORMATION : HOW APIS DRIVE BUSINESS MODEL CHANGE AND INNOVATION

    OpenAIRE

    Hellbe, Simon; Leung, Peter

    2015-01-01

    Over the years, information technology has created opportunities to improve and extend businesses and to start conducting business in new ways. With the evolution of IT, all businesses and industries are becoming increasingly digitized. This process, or coevolution, of IT and business coming together is called digital transformation. One of the recent trends in this digital transformation is the use of application programmable interfaces (APIs). APIs are standardized digital communication int...

  18. Martensitic transformations in nanostructured nitinol: Finite element modeling of grain size and distribution effects

    DEFF Research Database (Denmark)

    Liu, Hong-Sheng; Mishnaevsky, Leon

    2013-01-01

    A computational model of martensitic phase transformation in nanostructured nitinol is developed which takes into account the grain size effect. On the basis of the theoretical analysis of the thermodynamic transformation criterion and the energy barrier for phase transformation, it was demonstra......A computational model of martensitic phase transformation in nanostructured nitinol is developed which takes into account the grain size effect. On the basis of the theoretical analysis of the thermodynamic transformation criterion and the energy barrier for phase transformation...... transformation are totally suppressed. Graded and localized distributions of grain sizes of nitinol were compared with nitinol samples with homogeneous grain size distribution. In the materials with localized region of small grains, it was observed that the martensite rich regions form first on the border...

  19. An IoT Reader for Wireless Passive Electromagnetic Sensors

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-01-01

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain. PMID:28350356

  20. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  1. An IoT Reader for Wireless Passive Electromagnetic Sensors.

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-03-28

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain.

  2. Seedbed based on IoT: A Case Study

    Directory of Open Access Journals (Sweden)

    J. Kalathas

    2016-05-01

    Full Text Available Nowadays, the Wireless Sensors Network (WSN and the Internet of Things (IOT are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed breeding procedure. Using the basic principles of Internet and WSN technology, precision agriculture systems based on the Internet of Things (IoT technology are explained in detail, especially in network architecture, hardware architecture and software process control of the precision seed breeding monitoring system. The implemented automation system monitors data from the sensors in a feedback loop which activates the control devices based on threshold value. The implementation of WSN in seedbed monitoring (SM will optimize the control of air temperature and humidity, soil humidity, air capacity, luminance while it will minimize the time of seed breeding and it will also maximize the number of seeds which become plants ready for transplantation.

  3. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  4. Transformation of standardized clinical models based on OWL technologies: from CEM to OpenEHR archetypes.

    Science.gov (United States)

    Legaz-García, María del Carmen; Menárguez-Tortosa, Marcos; Fernández-Breis, Jesualdo Tomás; Chute, Christopher G; Tao, Cui

    2015-05-01

    The semantic interoperability of electronic healthcare records (EHRs) systems is a major challenge in the medical informatics area. International initiatives pursue the use of semantically interoperable clinical models, and ontologies have frequently been used in semantic interoperability efforts. The objective of this paper is to propose a generic, ontology-based, flexible approach for supporting the automatic transformation of clinical models, which is illustrated for the transformation of Clinical Element Models (CEMs) into openEHR archetypes. Our transformation method exploits the fact that the information models of the most relevant EHR specifications are available in the Web Ontology Language (OWL). The transformation approach is based on defining mappings between those ontological structures. We propose a way in which CEM entities can be transformed into openEHR by using transformation templates and OWL as common representation formalism. The transformation architecture exploits the reasoning and inferencing capabilities of OWL technologies. We have devised a generic, flexible approach for the transformation of clinical models, implemented for the unidirectional transformation from CEM to openEHR, a series of reusable transformation templates, a proof-of-concept implementation, and a set of openEHR archetypes that validate the methodological approach. We have been able to transform CEM into archetypes in an automatic, flexible, reusable transformation approach that could be extended to other clinical model specifications. We exploit the potential of OWL technologies for supporting the transformation process. We believe that our approach could be useful for international efforts in the area of semantic interoperability of EHR systems. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  6. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  7. Involuntary outpatient treatment (iot) for severe mental patients: current situation in Spain.

    Science.gov (United States)

    Cañete-Nicolás, Carlos; Hernández-Viadel, Miguel; Bellido-Rodríguez, Carmen; Lera-Calatayud, Guillem; Asensio-Pascual, Pedro; Pérez-Prieto, Juan F; Calabuig-Crespo, Roman; Leal-Cercós, Carmen

    2012-01-01

    Involuntary Outpatient Treatment (IOT) expects to improve treatment compliance and, therefore, prevent the impairment of patients with severe mental illness, as well as the risk for them and others. Besides IOT introduction defenders and opponent's states, scientific literature offers contradictory results. Legislative changes have been taken in the vast majority of our neighbouring countries in order to regulate IOT application. There is no legal regulation in Spain; however, OIT application is possible in certain Spanish cities. This article reviews IOT in Spain and surrounding countries.

  8. Semantic Gateway as a Service architecture for IoT Interoperability

    OpenAIRE

    Desai, Pratikkumar; Sheth, Amit; Anantharam, Pramod

    2014-01-01

    The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable arc...

  9. Understanding Service Composition with Non-functional Properties Using Declarative Model-to-model Transformations

    Directory of Open Access Journals (Sweden)

    Max Mäuhlhäuser

    2011-01-01

    Full Text Available Developing applications comprising service composition is a complex task. Therefore, to lower the skill barrier for developers, it is important to describe the problem at hand on an abstract level and not to focus on implementation details. This can be done using declarative programming which allows to describe only the result of the problem (which is what the developer wants rather than the description of the implementation. We therefore use purely declarative model-to-model transformations written in a universal model transformation language which is capable of handling even non functional properties using optimization and mathematical programming. This makes it easier to understand and describe service composition and non-functional properties for the developer.

  10. Comparison of BrainTool to other UML modeling and model transformation tools

    Science.gov (United States)

    Nikiforova, Oksana; Gusarovs, Konstantins

    2017-07-01

    In the last 30 years there were numerous model generated software systems offered targeting problems with the development productivity and the resulting software quality. CASE tools developed due today's date are being advertised as having "complete code-generation capabilities". Nowadays the Object Management Group (OMG) is calling similar arguments in regards to the Unified Modeling Language (UML) models at different levels of abstraction. It is being said that software development automation using CASE tools enables significant level of automation. Actual today's CASE tools are usually offering a combination of several features starting with a model editor and a model repository for a traditional ones and ending with code generator (that could be using a scripting or domain-specific (DSL) language), transformation tool to produce the new artifacts from the manually created and transformation definition editor to define new transformations for the most advanced ones. Present paper contains the results of CASE tool (mainly UML editors) comparison against the level of the automation they are offering.

  11. Transformative learning during nursing education: a model of interconnectivity.

    Science.gov (United States)

    Kear, Tamara M

    2013-09-01

    Higher education strives to transform students by opening their minds to different world views. This study investigated the transformative experiences of students using narrative analysis methodology to describe the experience of learning during nursing education. Phases of Transformative Learning Theory guided the analysis of narratives. The study yielded 5 narrative threads: 1) the multi-faceted process of learning, 2) experiential learning, 3) human interactions as central to defining nursing and caring, 4) personal life experiences intertwining with nursing, and 5) transformative learning. Results indicated that students perceived the greatest learning and transformation through experiential learning with humans. Such experiences included caring for immigrants, children in lower socioeconomic environments, and patients with a variety of physical and mental health needs in numerous settings. Other participants described personal experiences that took on new meaning or contributed to learning as a result of academic experiences. Some students entered with a personal history of service and charity work that provided a foundation for their educational experiences. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Towards an automatic model transformation mechanism from UML state machines to DEVS models

    Directory of Open Access Journals (Sweden)

    Ariel González

    2015-08-01

    Full Text Available The development of complex event-driven systems requires studies and analysis prior to deployment with the goal of detecting unwanted behavior. UML is a language widely used by the software engineering community for modeling these systems through state machines, among other mechanisms. Currently, these models do not have appropriate execution and simulation tools to analyze the real behavior of systems. Existing tools do not provide appropriate libraries (sampling from a probability distribution, plotting, etc. both to build and to analyze models. Modeling and simulation for design and prototyping of systems are widely used techniques to predict, investigate and compare the performance of systems. In particular, the Discrete Event System Specification (DEVS formalism separates the modeling and simulation; there are several tools available on the market that run and collect information from DEVS models. This paper proposes a model transformation mechanism from UML state machines to DEVS models in the Model-Driven Development (MDD context, through the declarative QVT Relations language, in order to perform simulations using tools, such as PowerDEVS. A mechanism to validate the transformation is proposed. Moreover, examples of application to analyze the behavior of an automatic banking machine and a control system of an elevator are presented.

  13. Efficient Finite Element Models for Calculation of the No-load losses of the Transformer

    Directory of Open Access Journals (Sweden)

    Kamran Dawood

    2017-10-01

    Full Text Available Different transformer models are examined for the calculation of the no-load losses using finite element analysis. Two-dimensional and three-dimensional finite element analyses are used for the simulation of the transformer. Results of the finite element method are also compared with the experimental results. The Result shows that 3-dimensional provide high accuracy as compared to the 2 dimensional full and half model. However, the 2-dimensional half model is the less time-consuming method as compared to the 3 and 2-dimensional full model. Simulation time duration taken by the different models of the transformer is also compared. The difference between the 3-dimensional finite element method and experimental results are less than 3%. These numerical methods can help transformer designers to minimize the development of the prototype transformers.

  14. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  15. A vision based top-view transformation model for a vehicle parking assistant.

    Science.gov (United States)

    Lin, Chien-Chuan; Wang, Ming-Shi

    2012-01-01

    This paper proposes the Top-View Transformation Model for image coordinate transformation, which involves transforming a perspective projection image into its corresponding bird's eye vision. A fitting parameters searching algorithm estimates the parameters that are used to transform the coordinates from the source image. Using this approach, it is not necessary to provide any interior and exterior orientation parameters of the camera. The designed car parking assistant system can be installed at the rear end of the car, providing the driver with a clearer image of the area behind the car. The processing time can be reduced by storing and using the transformation matrix estimated from the first image frame for a sequence of video images. The transformation matrix can be stored as the Matrix Mapping Table, and loaded into the embedded platform to perform the transformation. Experimental results show that the proposed approaches can provide a clearer and more accurate bird's eye view to the vehicle driver.

  16. Initial Operational Test and Evaluation (IOT&E) of ASVAB (Armed Services Vocational Aptitude Battery) Forms 11, 12, and 13: Parallelism of the New Forms. Volume 1

    Science.gov (United States)

    1988-07-01

    AFHRL-TR-87-65( I) INITIAL OPERATIONAL TEST AND EVALUATIONI R FO RC E ( IOT &E) OF ASVAB FORMS 11, 12, AND 13:PARALLELISM OF THE NEW FORMS l 3 :Q In H...UNfT B A c ELEMENT NO NO NO ACCESSION NO 62703F 7719 18 42 I1. TITLE (Include Security Cltasficaton) Initial Operational Test and Evaluation ( IOT &E...of the Initial Operational Test and Evaluation ( IOT &E) of Forms ]a, lib, 12a, 12b, 13a, and 13b of the Armed Services Vocational Aptitude Battery

  17. Origin and model of transform faults in the Okinawa Trough

    Science.gov (United States)

    Liu, Bo; Li, Sanzhong; Jiang, Suhua; Suo, Yanhui; Guo, Lingli; Wang, Yongming; Zhang, Huixuan

    2017-06-01

    Transform faults in back-arc basins are the key to revealing the opening and development of marginal seas. The Okinawa Trough (OT) represents an incipient and active back-arc or marginal sea basin oriented in a general NE-SW direction. To determine the strikes and spatial distribution of transform faults in the OT, this paper dissects the NW- and NNE-SN-trending fault patterns on the basis of seismic profiles, gravity anomalies and region geological data. There are three main NW-trending transpressional faults in the OT, which are the seaward propagation of NW-trending faults in the East China Continent. The NNE-SN-trending faults with right-stepping distribution behave as right-lateral shearing. The strike-slip pull-apart process or transtensional faulting triggered the back-arc rifting or extension, and these faults evolved into transform faults with the emergence of oceanic crust. Thus, the transform fault patterns are inherited from pre-existing oblique transtensional faults at the offsets between rifting segments. Therefore, the OT performs the oblique spreading mechanism similar to nascent oceans such as the Red Sea and Gulf of Aden.

  18. The Living Dead: Transformative Experiences in Modelling Natural Selection

    Science.gov (United States)

    Petersen, Morten Rask

    2017-01-01

    This study considers how students change their coherent conceptual understanding of natural selection through a hands-on simulation. The results show that most students change their understanding. In addition, some students also underwent a transformative experience and used their new knowledge in a leisure time activity. These transformative…

  19. Transformations among CE–CVM model parameters for ...

    Indian Academy of Sciences (India)

    Unknown

    (CECs) of a higher order system in terms of those of the lower order subsystems and to an independent set of parameters which exclusively represent interactions of the higher order systems. Such a procedure is presen- ted in detail in this communication. Furthermore, the details of transformations required to express the ...

  20. An Ontology-Based Transformation Model for the Digital Forensics Domain

    OpenAIRE

    Grigaliunas, Sarunas; Toldinas, Jevgenijus; Venckauskas, Algimantas

    2017-01-01

    The creation of an ontology makes it possible to form common information structures, to reuse knowledge, to make assumptions within a domain and to analyse every piece of knowledge. In this paper, we aim to create an ontologybased transformation model and a framework to develop an ontology-based transformation system in the digital forensics domain. We describe the architecture of the ontology-based transformation system and its components for assisting computer forensics experts in the appro...

  1. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities...

  2. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  3. The relevance of technological autonomy in the acceptance of IoT services in retail

    NARCIS (Netherlands)

    Constantinides, Efthymios; Kahlert, Marius; de Vries, Sjoerd A.

    2017-01-01

    The Internet of Things (IoT) represents a shift towards a digitally enriched environment connecting smart objects and users that promises to provide retailers with innovative ways to approach their customers. IoT technologies differ from previous innovations as they are ubiquitous, intelligent and

  4. A self-supporting wireless IoT node that uses kinetic energy harvesting

    DEFF Research Database (Denmark)

    Lynggaard, Per

    2017-01-01

    The Internet-of-Things (IoT) is expected to be the next revolution of the internet where trillions of IoT nodes will be deployed on a global scale. It is foreseen that a considerable part of these will be deployed in smart buildings and smart homes where they will provide innovative solutions...

  5. Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices...

  6. Adopting the Essence Framework to Derive a Practice Library for the Development of IoT Systems

    NARCIS (Netherlands)

    Giray, Görkem; Tekinerdogan, B.; Tüzün, E.

    2018-01-01

    The Internet of Things (IoT) is a global network of smart devices which enables these objects to collect and exchange data. Research in the IoT is still progressing, and it is now being applied in various domains. One of the key observations is that the development of IoT systems is not trivial and

  7. Computer-Aided Transformation of PDE Models: Languages, Representations, and a Calculus of Operations

    Science.gov (United States)

    2016-01-05

    Computer-aided transformation of PDE models: languages, representations, and a calculus of operations A domain-specific embedded language called...languages, representations, and a calculus of operations Report Title A domain-specific embedded language called ibvp was developed to model initial...Computer-aided transformation of PDE models: languages, representations, and a calculus of operations 1 Vision and background Physical and engineered systems

  8. Esscher transforms and the minimal entropy martingale measure for exponential Lévy models

    DEFF Research Database (Denmark)

    Hubalek, Friedrich; Sgarra, C.

    In this paper we offer a systematic survey and comparison of the Esscher martingale transform for linear processes, the Esscher martingale transform for exponential processes, and the minimal entropy martingale measure for exponential lévy models and present some new results in order to give...

  9. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-01-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications. PMID:27043578

  10. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  11. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  12. Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages

    DEFF Research Database (Denmark)

    Mendling, Jan; Lassen, Kristian Bisgaard; Zdun, Uwe

    2006-01-01

    to abstract from concrete transformation strategies by distinguishing two major paradigms for representing control flow in process modelling languages: block-oriented languages (such as BPEL and BPML) and graph-oriented languages (such as EPCs and YAWL). The contribution of this paper are generic strategies......Much recent research work discusses the transformation between different process modelling languages. This work, however, is mainly focussed on specific process modelling languages, and thus the general reusability of the applied transformation concepts is rather limited. In this paper, we aim...

  13. Potential transformation of trace species including aircraft exhaust in a cloud environment. The `Chedrom model`

    Energy Technology Data Exchange (ETDEWEB)

    Ozolin, Y.E.; Karol, I.L. [Main Geophysical Observatory, St. Petersburg (Russian Federation); Ramaroson, R. [Office National d`Etudes et de Recherches Aerospatiales (ONERA), 92 - Chatillon (France)

    1997-12-31

    Box model for coupled gaseous and aqueous phases is used for sensitivity study of potential transformation of trace gases in a cloud environment. The rate of this transformation decreases with decreasing of pH in droplets, with decreasing of photodissociation rates inside the cloud and with increasing of the droplet size. Model calculations show the potential formation of H{sub 2}O{sub 2} in aqueous phase and transformation of gaseous HNO{sub 3} into NO{sub x} in a cloud. This model is applied for exploration of aircraft exhausts evolution in plume inside a cloud. (author) 10 refs.

  14. Modelling and analysis of the transformer current resonance in dual active bridge converters

    DEFF Research Database (Denmark)

    Qin, Zian; Shen, Zhan; Blaabjerg, Frede

    2017-01-01

    . In order to study the generation mechanism of this current resonance, the impedance of the transformer and inductor with parasitic components is modelled in this digest. Then, based on the impedance model, an approach is proposed to mitigate the current resonance. Finally, both the impedance model......Due to the parasitic capacitances of the transformer and inductor in Dual Active Bridge (DAB) converters, resonance happens in the transformer currents. This high frequency resonant current flowing into the full bridges will worsen their soft-switching performance and thereby reduce its efficiency...

  15. The method for determination of parameters of the phenomenological continual model of soil organic matter transformation

    Directory of Open Access Journals (Sweden)

    S. I. Bartsev

    2015-06-01

    Full Text Available A possible method for experimental determination of parameters of the previously proposed continual mathematical model of soil organic matter transformation is theoretically considered in this paper. The previously proposed by the authors continual model of soil organic matter transformation, based on using the rate of matter transformation as a continual scale of its recalcitrance, describes the transformation process phenomenologically without going into detail of microbiological mechanisms of transformation. Thereby simplicity of the model is achieved. The model is represented in form of one differential equation in first­order partial derivatives, which has an analytical solution in elementary functions. The model equation contains a small number of empirical parameters which generally characterize environmental conditions where the matter transformation process occurs and initial properties of the plant litter. Given the values of these parameters, it is possible to calculate dynamics of soil organic matter stocks and its distribution over transformation rate. In the present study, possible approaches for determination of the model parameters are considered and a simple method of their experimental measurement is proposed. An experiment of an incubation of chemically homogeneous samples in soil and multiple sequential measurement of the sample mass loss with time is proposed. An equation of time dynamics of mass loss of incubated homogeneous sample is derived from the basic assumption of the presented soil organic matter transformation model. Thus, fitting by the least squares method the parameters of sample mass loss curve calculated according the proposed mass loss dynamics equation allows to determine the parameters of the general equation of soil organic transformation model.

  16. BIG data based on healthcare analysis using IOT devices

    Science.gov (United States)

    Priyanka, A.; Parimala, M.; Sudheer, K.; Thippareddy; Kaluri, Rajesh; Lakshmanna, Kuruva; Reddy, M. Praveen Kumar

    2017-11-01

    IOT (INTERNET OF THINGS) makes the brilliant protest in social insurance. The heterogeneous registering, remotely imparting arrangement of gadget that interfaces with human body and wellbeing gave to analyse, screen, track and store virtual factual and restorative data. In this paper, quiet individual data and wellbeing condition will be dissect by the specialist and they can see the patient condition and furthermore give the correct answer for the patient. The more number of information (huge information) will store and move into the specific association record framework. It makes conceivable to social occasion of rich data demonstrative of our physical and psychological wellness.

  17. Self-organizing spiking neural model for learning fault-tolerant spatio-motor transformations.

    Science.gov (United States)

    Srinivasa, Narayan; Cho, Youngkwan

    2012-10-01

    In this paper, we present a spiking neural model that learns spatio-motor transformations. The model is in the form of a multilayered architecture consisting of integrate and fire neurons and synapses that employ spike-timing-dependent plasticity learning rule to enable the learning of such transformations. We developed a simple 2-degree-of-freedom robot-based reaching task which involves the learning of a nonlinear function. Computer simulations demonstrate the capability of such a model for learning the forward and inverse kinematics for such a task and hence to learn spatio-motor transformations. The interesting aspect of the model is its capacity to be tolerant to partial absence of sensory or motor inputs at various stages of learning. We believe that such a model lays the foundation for learning other complex functions and transformations in real-world scenarios.

  18. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  19. TOPOLOGICAL TRANSIENT MODELS OF THREE-PHASE FIVE-LIMB TRANSFORMER

    Directory of Open Access Journals (Sweden)

    S. E. Zirka

    2018-02-01

    Full Text Available Purpose. To show capabilities of topological models of three-phase, five-limb transformer to correctly represent transformer operation in regimes with high flux densities in the core. As a practically important example, time domain response of transformer subjected to geomagnetically induced currents (GIC is analyzed and compared with results of a comprehensive field experiment.Methodology.  Transformer magnetic model, which takes into account geometry of the core and windings, is transformed in a dual electric equivalent scheme, whose transient is calculated by using EMTP-ATP. The results obtained demonstrate the importance of incorporating the positive and zero sequence impedances of power network.Findings. A simple and reliable model of five-limb transformer is proposed. It was found that the presence of the transformer tank can be effectively accounted for by linear inductances representing the paths of the off-core fluxes from yoke to yoke. The modeling of GIC events represented in the paper is the most accurate ever obtained for three-phase, five-leg transformers. The model is validated by close agreement of the predicted values and waveforms of the phase currents and reactive power with those measured in tests performed on two 400 MVA transformers connected back-to-back and to a 400 kV power network. Originality. It is shown that a simplified non-hysteresis model developed portrays the behavior of the of five-limb transformer under GIC condition with the same good accuracy as its hysteresis model. Both the transformer models are well grounded. So, the paper dispels some misconceptions about the influence of the hysteresis properties of the core material and tank in transient modeling of five-leg transformers.Practical value. The practical value and significance of the paper is caused by the fact that the model proposed is a simple and reliable tool for power system studies. The paper warns of using unnecessary complicated models whose

  20. Phase field modeling of tetragonal to monoclinic phase transformation in zirconia

    Science.gov (United States)

    Mamivand, Mahmood

    Zirconia based ceramics are strong, hard, inert, and smooth, with low thermal conductivity and good biocompatibility. Such properties made zirconia ceramics an ideal material for different applications form thermal barrier coatings (TBCs) to biomedicine applications like femoral implants and dental bridges. However, this unusual versatility of excellent properties would be mediated by the metastable tetragonal (or cubic) transformation to the stable monoclinic phase after a certain exposure at service temperatures. This transformation from tetragonal to monoclinic, known as LTD (low temperature degradation) in biomedical application, proceeds by propagation of martensite, which corresponds to transformation twinning. As such, tetragonal to monoclinic transformation is highly sensitive to mechanical and chemomechanical stresses. It is known in fact that this transformation is the source of the fracture toughening in stabilized zirconia as it occurs at the stress concentration regions ahead of the crack tip. This dissertation is an attempt to provide a kinetic-based model for tetragonal to monoclinic transformation in zirconia. We used the phase field technique to capture the temporal and spatial evolution of monoclinic phase. In addition to morphological patterns, we were able to calculate the developed internal stresses during tetragonal to monoclinic transformation. The model was started form the two dimensional single crystal then was expanded to the two dimensional polycrystalline and finally to the three dimensional single crystal. The model is able to predict the most physical properties associated with tetragonal to monoclinic transformation in zirconia including: morphological patterns, transformation toughening, shape memory effect, pseudoelasticity, surface uplift, and variants impingement. The model was benched marked with several experimental works. The good agreements between simulation results and experimental data, make the model a reliable tool for

  1. Intelligent Models Performance Improvement Based on Wavelet Algorithm and Logarithmic Transformations in Suspended Sediment Estimation

    Directory of Open Access Journals (Sweden)

    R. Hajiabadi

    2016-10-01

    Full Text Available Introduction One reason for the complexity of hydrological phenomena prediction, especially time series is existence of features such as trend, noise and high-frequency oscillations. These complex features, especially noise, can be detected or removed by preprocessing. Appropriate preprocessing causes estimation of these phenomena become easier. Preprocessing in the data driven models such as artificial neural network, gene expression programming, support vector machine, is more effective because the quality of data in these models is important. Present study, by considering diagnosing and data transformation as two different preprocessing, tries to improve the results of intelligent models. In this study two different intelligent models, Artificial Neural Network and Gene Expression Programming, are applied to estimation of daily suspended sediment load. Wavelet transforms and logarithmic transformation is used for diagnosing and data transformation, respectively. Finally, the impacts of preprocessing on the results of intelligent models are evaluated. Materials and Methods In this study, Gene Expression Programming and Artificial Neural Network are used as intelligent models for suspended sediment load estimation, then the impacts of diagnosing and logarithmic transformations approaches as data preprocessor are evaluated and compared to the result improvement. Two different logarithmic transforms are considered in this research, LN and LOG. Wavelet transformation is used to time series denoising. In order to denoising by wavelet transforms, first, time series can be decomposed at one level (Approximation part and detail part and second, high-frequency part (detail will be removed as noise. According to the ability of gene expression programming and artificial neural network to analysis nonlinear systems; daily values of suspended sediment load of the Skunk River in USA, during a 5-year period, are investigated and then estimated.4 years of

  2. A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices

    Directory of Open Access Journals (Sweden)

    Fang Liu

    2018-01-01

    Full Text Available Wearable technology is one of the greatest applications of the Internet of Things. The popularity of wearable devices has led to a massive scale of personal (user-specific data. Generally, data holders (manufacturers of wearable devices are willing to share these data with others to get benefits. However, significant privacy concerns would arise when sharing the data with the third party in an improper manner. In this paper, we first propose a specific threat model about the data sharing process of wearable devices’ data. Then we propose a K-anonymity method based on clustering to preserve privacy of wearable IoT devices’ data and guarantee the usability of the collected data. Experiment results demonstrate the effectiveness of the proposed method.

  3. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  4. An Effective Semantic Event Matching System in the Internet of Things (IoT) Environment.

    Science.gov (United States)

    Alhakbani, Noura; Hassan, Mohammed Mehedi; Ykhlef, Mourad

    2017-09-02

    IoT sensors use the publish/subscribe model for communication to benefit from its decoupled nature with respect to space, time, and synchronization. Because of the heterogeneity of communicating parties, semantic decoupling is added as a fourth dimension. The added semantic decoupling complicates the matching process and reduces its efficiency. Our proposed algorithm clusters subscriptions and events according to topic and performs the matching process within these clusters, which increases the throughput by reducing the matching time from the range of 16-18 ms to 2-4 ms. Moreover, the accuracy of matching is improved when subscriptions must be fully approximated, as demonstrated by an over 40% increase in F-score results. This work shows the benefit of clustering, as well as the improvement in the matching accuracy and efficiency achieved using this approach.

  5. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments.

    Science.gov (United States)

    Lee, JongHyup

    2018-02-13

    [-12]In the complicated settings of WSN (Wireless Sensor Networks) and IoT (Internet of Things) environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness.

  6. Patch Transporter: Incentivized, Decentralized Software Patch System for WSN and IoT Environments

    Directory of Open Access Journals (Sweden)

    JongHyup Lee

    2018-02-01

    Full Text Available In the complicated settings of WSN (Wireless Sensor Networks and IoT (Internet of Things environments, keeping a number of heterogeneous devices updated is a challenging job, especially with respect to effectively discovering target devices and rapidly delivering the software updates. In this paper, we convert the traditional software update process to a distributed service. We set an incentive system for faithfully transporting the patches to the recipient devices. The incentive system motivates independent, self-interested transporters for helping the devices to be updated. To ensure the system correctly operates, we employ the blockchain system that enforces the commitment in a decentralized manner. We also present a detailed specification for the proposed protocol and validate it by model checking and simulations for correctness.

  7. T-duality transformation of gauged linear sigma model with F-term

    Directory of Open Access Journals (Sweden)

    Tetsuji Kimura

    2014-10-01

    Full Text Available We develop the duality transformation rules in two-dimensional theories in the superfield formalism. Even if the chiral superfield which we dualize involves an F-term, we can dualize it by virtue of the property of chiral superfields. We apply the duality transformation rule of the neutral chiral superfield to the N=(4,4 gauged linear sigma model for five-branes. We also investigate the duality transformation rule of the charged chiral superfield in the N=(4,4 gauged linear sigma model for the A1-type ALE space. In both cases we obtain the dual Lagrangians in the superfield formalism. In the low energy limit we find that their duality transformations are interpreted as T-duality transformations consistent with the Buscher rule.

  8. Army Business Transformation: The Utility of Using Corporate Business Models within the Institutional Army

    National Research Council Canada - National Science Library

    Bailer, Jr., John J

    2007-01-01

    .... This study finds that working corporate models, such as Lean Six Sigma (LSS), are available which are already enabling the transformation of a very specific aspect within the institutional Army...

  9. Wave Transformation Over Reefs: Evaluation of One-Dimensional Numerical Models

    National Research Council Canada - National Science Library

    Demirbilek, Zeki; Nwogu, Okey G; Ward, Donald L; Sanchez, Alejandro

    2009-01-01

    Three one-dimensional (1D) numerical wave models are evaluated for wave transformation over reefs and estimates of wave setup, runup, and ponding levels in an island setting where the beach is fronted by fringing reef and lagoons...

  10. Quantitative structure-activity relationship models of chemical transformations from matched pairs analyses.

    Science.gov (United States)

    Beck, Jeremy M; Springer, Clayton

    2014-04-28

    The concepts of activity cliffs and matched molecular pairs (MMP) are recent paradigms for analysis of data sets to identify structural changes that may be used to modify the potency of lead molecules in drug discovery projects. Analysis of MMPs was recently demonstrated as a feasible technique for quantitative structure-activity relationship (QSAR) modeling of prospective compounds. Although within a small data set, the lack of matched pairs, and the lack of knowledge about specific chemical transformations limit prospective applications. Here we present an alternative technique that determines pairwise descriptors for each matched pair and then uses a QSAR model to estimate the activity change associated with a chemical transformation. The descriptors effectively group similar transformations and incorporate information about the transformation and its local environment. Use of a transformation QSAR model allows one to estimate the activity change for novel transformations and therefore returns predictions for a larger fraction of test set compounds. Application of the proposed methodology to four public data sets results in increased model performance over a benchmark random forest and direct application of chemical transformations using QSAR-by-matched molecular pairs analysis (QSAR-by-MMPA).

  11. Multihop Data Delivery Virtualization for Green Decentralized IoT

    Directory of Open Access Journals (Sweden)

    Lifeng Zhang

    2017-01-01

    Full Text Available Decentralized communication technologies (i.e., ad hoc networks provide more opportunities for emerging wireless Internet of Things (IoT due to the flexibility and expandability of distributed architecture. However, the performance degradation of wireless communications with the increase of the number of hops becomes the main obstacle in the development of decentralized wireless IoT systems. The main challenges come from the difficulty in designing a resource and energy efficient multihop communication protocol. Transmission control protocol (TCP, the most frequently used transport layer protocol for achieving reliable end-to-end communications, cannot achieve a satisfactory result in multihop wireless scenarios as it uses end-to-end acknowledgment which could not work well in a lossy scenario. In this paper, we propose a multihop data delivery virtualization approach which uses multiple one-hop reliable transmissions to perform multihop data transmissions. Since the proposed protocol utilizes hop-by-hop acknowledgment instead of end-to-end feedback, the congestion window size at each TCP sender node is not affected by the number of hops between the source node and the destination node. The proposed protocol can provide a significantly higher throughput and shorter transmission time as compared to the end-to-end approach. We conduct real-world experiments as well as computer simulations to show the performance gain from our proposed protocol.

  12. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman

    2018-01-15

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where different prioritized DD system, i.e., Low-Priority (LP) and High-Priority (HP) systems, co-exist and share the spectrum. We maximize the EE of each system by proposing two schemes. The first scheme optimizes the individual transmission power and the spatial density of each system. The second scheme optimizes the transmission power ratio of both systems and the spatial density of each one. We also construct and analytically solve a multi- objective optimization problem that combines and jointly maximizes both HP and LP EE performance. Unique structures of the addressed problems are verified. Via numerical results we show that the system which dominates the overall EE (combined EEs of both HP and LP) is the system corresponding to the lowest power for low/high power ratio (between HP and LP systems). However, if the power ratio is close to one, the dominating EE corresponds to the system with higher weight.

  13. Cognitive IoT incorporating intelligence in building smart environment

    Science.gov (United States)

    Sarker, Dishari; Sumathy, S.

    2017-11-01

    The Internet of Things (IoT) is an invention of this century which also can be called as Internet which makes life more logical and electronic. According to research in the industrial field about which aspect in IoT contributes more for GDP is the concept which can be applied in various aspects of our life to make life logical and easier. We are very much aware of the increasing population and the pollution that is caused by the vehicles and many other sources such as harmful gas producers. So, this work focuses in determining the level of pollution in a specific area and predict how much more greenery has to be increased in that area. With its widespread application, this paper proposes an idea with a social cause in order to exhibit the concern towards the environment and mankind. This proposal will benefit farmers and others in polluted cities. The language to be used is Embedded C programming and Arduino IDE open source platform with both hardware and software interaction. The display will involve an android app called Blynk App.

  14. Application of Tissue Culture and Transformation Techniques in Model Species Brachypodium distachyon.

    Science.gov (United States)

    Sogutmaz Ozdemir, Bahar; Budak, Hikmet

    2018-01-01

    Brachypodium distachyon has recently emerged as a model plant species for the grass family (Poaceae) that includes major cereal crops and forage grasses. One of the important traits of a model species is its capacity to be transformed and ease of growing both in tissue culture and in greenhouse conditions. Hence, plant transformation technology is crucial for improvements in agricultural studies, both for the study of new genes and in the production of new transgenic plant species. In this chapter, we review an efficient tissue culture and two different transformation systems for Brachypodium using most commonly preferred gene transfer techniques in plant species, microprojectile bombardment method (biolistics) and Agrobacterium-mediated transformation.In plant transformation studies, frequently used explant materials are immature embryos due to their higher transformation efficiencies and regeneration capacity. However, mature embryos are available throughout the year in contrast to immature embryos. We explain a tissue culture protocol for Brachypodium using mature embryos with the selected inbred lines from our collection. Embryogenic calluses obtained from mature embryos are used to transform Brachypodium with both plant transformation techniques that are revised according to previously studied protocols applied in the grasses, such as applying vacuum infiltration, different wounding effects, modification in inoculation and cocultivation steps or optimization of bombardment parameters.

  15. A systematic model identification method for chemical transformation pathways - the case of heroin biomarkers in wastewater.

    Science.gov (United States)

    Ramin, Pedram; Valverde-Pérez, Borja; Polesel, Fabio; Locatelli, Luca; Plósz, Benedek Gy

    2017-08-24

    This study presents a novel statistical approach for identifying sequenced chemical transformation pathways in combination with reaction kinetics models. The proposed method relies on sound uncertainty propagation by considering parameter ranges and associated probability distribution obtained at any given transformation pathway levels as priors for parameter estimation at any subsequent transformation levels. The method was applied to calibrate a model predicting the transformation in untreated wastewater of six biomarkers, excreted following human metabolism of heroin and codeine. The method developed was compared to parameter estimation methods commonly encountered in literature (i.e., estimation of all parameters at the same time and parameter estimation with fix values for upstream parameters) by assessing the model prediction accuracy, parameter identifiability and uncertainty analysis. Results obtained suggest that the method developed has the potential to outperform conventional approaches in terms of prediction accuracy, transformation pathway identification and parameter identifiability. This method can be used in conjunction with optimal experimental designs to effectively identify model structures and parameters. This method can also offer a platform to promote a closer interaction between analytical chemists and modellers to identify models for biochemical transformation pathways, being a prominent example for the emerging field of wastewater-based epidemiology.

  16. Requirements Traceability and Transformation Conformance in Model-Driven Development

    NARCIS (Netherlands)

    Andrade Almeida, João; van Eck, Pascal; Iacob, Maria Eugenia

    2006-01-01

    The variety of design artefacts (models) produced in a model-driven design process results in an intricate rela-tionship between requirements and the various models. This paper proposes a methodological framework that simplifies management of this relationship. This frame-work is a basis for tracing

  17. A Poisson-Fault Model for Testing Power Transformers in Service

    Directory of Open Access Journals (Sweden)

    Dengfu Zhao

    2014-01-01

    Full Text Available This paper presents a method for assessing the instant failure rate of a power transformer under different working conditions. The method can be applied to a dataset of a power transformer under periodic inspections and maintenance. We use a Poisson-fault model to describe failures of a power transformer. When investigating a Bayes estimate of the instant failure rate under the model, we find that complexities of a classical method and a Monte Carlo simulation are unacceptable. Through establishing a new filtered estimate of Poisson process observations, we propose a quick algorithm of the Bayes estimate of the instant failure rate. The proposed algorithm is tested by simulation datasets of a power transformer. For these datasets, the proposed estimators of parameters of the model have better performance than other estimators. The simulation results reveal the suggested algorithms are quickest among three candidates.

  18. Application of IoT in monitoring and controlling agricultural production

    Directory of Open Access Journals (Sweden)

    Marković Dušan

    2015-01-01

    Full Text Available Internet of Things (IoT is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring and control systems used in farm production processes. IoT devices play a key role, with a focus on their realization by available microcontroller platforms and appropriate sensors such as Arduino products. Autonomous sensor devices gather data within monitoring systems and participate in the control process by sending signals to the actuators. Such an IoT based system provides users with the opportunity to remotely monitor conditions and production process. This system enables users to accomplish savings in inputs, achieve cost reduction and trace the production process on the farm.

  19. Organoids as Models for Neoplastic Transformation | Office of Cancer Genomics

    Science.gov (United States)

    Cancer models strive to recapitulate the incredible diversity inherent in human tumors. A key challenge in accurate tumor modeling lies in capturing the panoply of homo- and heterotypic cellular interactions within the context of a three-dimensional tissue microenvironment. To address this challenge, researchers have developed organotypic cancer models (organoids) that combine the 3D architecture of in vivo tissues with the experimental facility of 2D cell lines.

  20. Modeling and Design of Anti-Impact Vibration System for Clamp-On Optical Current Transformers

    Science.gov (United States)

    Ye, Yuan-bo; Zheng, Hao; Wang, Wei; Wang, Gui-zhong; Li, Hong-bo; Zhang, Guo-qing

    2018-02-01

    Optical current transformers, which possess excellent transient characteristics, are able to accurately reflect the full waveform of primary current, and have a wide range of potential applications. The clamp is the sensing unit of the optical current transformer that is mounted directly to the gas-insulated switchgear (GIS) casing and has advantages such as simple structure and ease of maintenance. However, vibration of the casing due to the operation of the GIS circuit breaker has a significant effect on the output of the optical current transformer, and may cause the malfunction of protective relays. This paper proposes the use of damping rubber as the main means of reducing vibration in transformers. A vibration damping system for the clamp-on optical current transformer was designed using the optimal parameters obtained from the modeling and analysis of an anti-impact vibration system. A test system was set up to perform experiments on the designed vibration damping system.

  1. Design theory, modelling and the application for the Internet of Things service

    Science.gov (United States)

    Shang, Xiaopu; Zhang, Runtong; Zhu, Xiaomin; Zhou, Quan

    2016-03-01

    The Internet of Things (IoT) makes it possible for us to sense the physical world and locate objects in it using the enabling technologies associated with IoT. Compared with traditional information systems, IoT enabling technologies can help acquire real-time data necessary for managing enterprise business process. An IoT system should have an ability beyond integrating enabling technologies and traditional information systems that are only used to access environmental data. This paper begins with a literature review of IoT-related issues and a discussion of the difference between traditional information service and IoT service. Three principles for IoT service design from the perceptive of service classification, coordination and compatibility are proposed. The paper also proposes a utility model for resource allocation in order to improve IoT service performance, and an application involving a cold chain visibility platform is given to illustrate our research.

  2. Flexibility of three differential constitutive models evaluated by large amplitude oscillatory shear and Fourier transform rheology

    Czech Academy of Sciences Publication Activity Database

    Pivokonský, Radek; Filip, Petr; Zelenková, Jana

    2016-01-01

    Roč. 104, č. 8 (2016), s. 171-178 ISSN 0032-3861 Institutional support: RVO:67985874 Keywords : LAOS * fourier transform rheology * Giesekus model * PTT model * modified XPP model * poly( ethylene oxide ) Subject RIV: BK - Fluid Dynamics Impact factor: 3.684, year: 2016

  3. Flexibility of three differential constitutive models evaluated by large amplitude oscillatory shear and Fourier transform rheology

    Czech Academy of Sciences Publication Activity Database

    Pivokonský, Radek; Filip, Petr; Zelenková, Jana

    2016-01-01

    Roč. 104, č. 8 (2016), s. 171-178 ISSN 0032-3861 Institutional support: RVO:67985874 Keywords : LAOS * fourier transform rheology * Giesekus model * PTT model * modified XPP model * poly(ethylene oxide) Subject RIV: BK - Fluid Dynamics Impact factor: 3.684, year: 2016

  4. Degenerate Blume-Emery-Griffiths model for the martensitic transformation

    DEFF Research Database (Denmark)

    Vives, E.; Castan, T.; Lindgård, Per-Anker

    1996-01-01

    A generalization of the Blume-Emery-Griffiths model is introduced in which an entropy stabilization of the high-temperature phase is controlled by a degeneracy parameter p greater than or equal to 1. The model describes a first- and a second-order phase transition as a function of temperature...

  5. Modelling of Sudan’s Energy Supply, Transformation, and Demand

    Directory of Open Access Journals (Sweden)

    Ali A. Rabah

    2016-01-01

    Full Text Available The study aimed to develop energy flow diagram (Sankey diagram of Sudan for the base year 2014. The developed Sankey diagram is the first of its kind in Sudan. The available energy balance for the base year 2012 is a simple line draw and did not count the energy supply by private and mixed sectors such as sugar and oil industries and marine and civil aviation. The private and mixed sectors account for about 7% of the national grid electric power. Four energy modules are developed: resources, transformation, demand, and export and import modules. The data are obtained from relevant Sudanese ministries and directorates and Sudan Central Bank. “e!Sankey 4 pro” software is used to develop the Sankey diagram. The main primary types of energy in Sudan are oil, hydro, biomass, and renewable energy. Sudan has a surplus of gasoline, petroleum coke, and biomass and deficit in electric power, gasoil, jet oil, and LPG. The surplus of gasoline is exported; however, the petroleum coke is kept as reserve. The deficit is covered by import. The overall useful energy is 76% and the loss is 24%. The useful energy is distributed among residential (38%, transportation (33%, industry (12%, services (16%, and agriculture (1% sectors.

  6. Characterization, Modeling, and Energy Harvesting of Phase Transformations in Ferroelectric Materials

    Science.gov (United States)

    Dong, Wenda

    Solid state phase transformations can be induced through mechanical, electrical, and thermal loading in ferroelectric materials that are compositionally close to morphotropic phase boundaries. Large changes in strain, polarization, compliance, permittivity, and coupling properties are typically observed across the phase transformation regions and are phenomena of interest for energy harvesting and transduction applications where increased coupling behavior is desired. This work characterized and modeled solid state phase transformations in ferroelectric materials and assessed the potential of phase transforming materials for energy harvesting applications. Two types of phase transformations were studied. The first type was ferroelectric rhombohedral to ferroelectric orthorhombic observed in lead indium niobate lead magnesium niobate lead titanate (PIN-PMN-PT) and driven by deviatoric stress, temperature, and electric field. The second type of phase transformation is ferroelectric to antiferroelectric observed in lead zirconate titanate (PZT) and driven by pressure, temperature, and electric field. Experimental characterizations of the phase transformations were conducted in both PIN-PMN-PT and PZT in order to understand the thermodynamic characteristics of the phase transformations and map out the phase stability of both materials. The ferroelectric materials were characterized under combinations of stress, electric field, and temperature. Material models of phase transforming materials were developed using a thermodynamic based variant switching technique and thermodynamic observations of the phase transformations. These models replicate the phase transformation behavior of PIN-PMN-PT and PZT under mechanical and electrical loading conditions. The switching model worked in conjunction with linear piezoelectric equations as ferroelectric/ferroelastic constitutive equations within a finite element framework that solved the mechanical and electrical field equations

  7. Comparison of multi-media transport and transformation models: regional fugacity model vs. CalTOX.

    Science.gov (United States)

    Maddalena, R L; McKone, T E; Layton, D W; Hsieh, D P

    1995-03-01

    Two multimedia environmental transport and transformation computer models are summarized and compared. The regional fugacity model published by Mackay and Paterson (1991), termed Fug3ONT, is a four compartment steady-state model designed to simulate the relative distribution of nonionic organic chemicals in a multimedia system. CalTOX is a seven compartment multimedia total exposure model for hazardous waste sites. Both models are based on the principles of fugacity. CalTOX, however, separates the soil into three layers (surface, root, and vadose) and uses a different approach to estimate the diffusive mass transfer rate in soil. These differences result in lower estimates of the steady-state contaminant concentrations of six environmentally relevant chemicals in the root soil of CalTOX as compared to the bulk soil of Fug3ONT. The difference is greatest for compounds with low mobility in soil such as 2,3,7,8-Tetrachlorodibenzo-p-dioxin and Benzo(a)pyrene where estimates from CalTOX and Fug3ONT differ by more than 3 orders of magnitude. Otherwise, the models provide similar estimates for the distribution of the six chemicals among the air, water, sediment and surface soil.

  8. Uncoordinated access schemes for the IoT: approaches, regulations, and performance

    OpenAIRE

    Zucchetto, Daniel; Zanella, Andrea

    2017-01-01

    Internet of Things (IoT) devices communicate using a variety of protocols, differing in many aspects, with the channel access method being one of the most important. Most of the transmission technologies explicitly designed for IoT and Machine-to-Machine (M2M) communication use either an ALOHA-based channel access or some type of Listen Before Talk (LBT) strategy, based on carrier sensing. In this paper, we provide a comparative overview of the uncoordinated channel access methods for IoT tec...

  9. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  10. Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA

    Directory of Open Access Journals (Sweden)

    Martin Kardos

    2010-06-01

    Full Text Available Information system’s models on higher level of abstraction have become a daily routine in many software companies. The concept of Model Driven Architecture (MDA published by standardization body OMG1 since 2001 has become a concept for creation of software applications and information systems. MDA specifies four levels of abstraction: top three levels are created as graphical models and the last one as implementation code model. Many research works of MDA are focusing on the lower levels and transformations between each other. The top level of abstraction, called Computation Independent Model (CIM and its transformation to the lower level called Platform Independent Model (PIM is not so extensive research topic. Considering to a great importance and usability of this level in practice of IS2Keywords: transformation, MDA, CIM, PIM, UML, DFD. development now our research activity is focused to this highest level of abstraction – CIM and its possible transformation to the lower PIM level. In this article we are presenting a possible solution of CIM modeling and its analytic method of transformation to PIM.

  11. Transforming Systems Engineering through Model-Centric Engineering

    Science.gov (United States)

    2018-02-28

    Department of Defense stakeholders . This report covers research performed against the RT-157 objectives, and at the request of our sponsor has expanded to...Technical Report We have also produced models, demonstrations, videos, examples and assembled tools for an Integrated Modeling Environment (IME) for the...information and its use will be provided in future technical reports . 54 Figure 21. Integrating and Interoperability Framework (IoIF) 55

  12. Business model transformation process in the context of business ecosystem

    OpenAIRE

    Heikkinen, A.-M. (Anne-Mari)

    2014-01-01

    Abstract It is current phenomena that business environment has changed and has set new requirements for companies. Companies must adapt to the changes comes from outside its normal business environment and take into consideration wider business environment where it operates. These changes also have set new demands for company business model. Companies Business models need to be changed to match state of art business environ...

  13. Modular transformations of conformal blocks in WZW models on Riemann surfaces of higher genus

    International Nuclear Information System (INIS)

    Miao Li; Ming Yu.

    1989-05-01

    We derive the modular transformations for conformal blocks in Wess-Zumino-Witten models on Riemann surfaces of higher genus. The basic ingredient consists of using the Chern-Simons theory developed by Witten. We find that the modular transformations generated by Dehn twists are linear combinations of Wilson line operators, which can be expressed in terms of braiding matrices. It can also be shown that modular transformation matrices for g > 0 Riemann surfaces depend only on those for g ≤ 3. (author). 13 refs, 15 figs

  14. [Job crisis and transformations in the new model of accumulation].

    Science.gov (United States)

    Zerda-Sarmiento, Alvaro

    2012-06-01

    The general and structural crisis capitalism is going through is the token of the difficulties accumulation model has been dealing with since 70's in developed countries. This model has been trying to settle down again on the basis of neoliberal principle and a new technical-economical paradigm. The new accumulation pattern has had a effect in employment sphere which have been made evident at all the elements that constitute work relationships. In Colombia, this model implementation has been partial and segmented. However, its consequences (and the long-term current crisis) have been evident in unemployment, precarious work, segmentation, informal work and restricted and private health insurance. Besides, financial accumulation makes labour profits flow at different levels. The economic model current government has aimed to implement leads to strengthening exports, so making population life conditions more difficult. In order to overcome the current state of affairs, the work sphere needs to become more creative. This creative approach should look for new schemes for expression and mobilization of work sphere's claims. This is supposed to be done by establishing a different economic model aimed to build a more inclusive future, with social justice.

  15. The Dynamics of Oceanic Transform Faults: Constraints from Geophysical, Geochemical and Geodynamical Modeling

    Science.gov (United States)

    2008-06-01

    magma chain- of 2,550 kg m -3 of the mantle where temperatures are <Sl5t0 -(2 Iter riLav exist beostth the enitire segnent and feed dvkcN front the...best explain the gravity-derived crustal thickness variations observed at the Siqueiros transform. Furthermore, a mantle potential temperature of...excess magma supply and increasing crustal production within the transform fault domain. These findings directly contradict the classic models of crustal

  16. Application of differential transformation method for solving dengue transmission mathematical model

    Science.gov (United States)

    Ndii, Meksianis Z.; Anggriani, Nursanti; Supriatna, Asep K.

    2018-03-01

    The differential transformation method (DTM) is a semi-analytical numerical technique which depends on Taylor series and has application in many areas including Biomathematics. The aim of this paper is to employ the differential transformation method (DTM) to solve system of non-linear differential equations for dengue transmission mathematical model. Analytical and numerical solutions are determined and the results are compared to that of Runge-Kutta method. We found a good agreement between DTM and Runge-Kutta method.

  17. Modelling and Simulation of the Diode Split Transformer

    DEFF Research Database (Denmark)

    Østergaard, Leo

    The development of horizontal deflection circuits for television receivers is commonly based on experiments and trial-and-error methods. This design practice is expensive due to the long development process, and the designers of the circuit face the problem of reducing the development time...... interaction with the rest of the horizontal deflection circuit and its characteristic frequency behaviour. Also, a survey of the physical properties of the windings, the ferrite core, and the discrete components in the DST is given. Based on this information, the overall requirements of the model...... characteristics of the DST. Thus, the first model requires that the DST has already been designed and constructed, while the second model can be set up prior to the actual construction of the DST. The two-winding equivalent circuit diagram is derived from a two-port description of the inductive, the resistive...

  18. Internet of Things building blocks and business models

    CERN Document Server

    Hussain, Fatima

    2017-01-01

    This book describes the building blocks and introductory business models for Internet of Things (IoT). The author provide an overview of the entire IoT architecture and constituent layers, followed by detail description of each block . Various inter-connecting technologies and sensors are discussed in context of IoT networks. In addition to this, concepts of Big Data and Fog Computing are presented and characterized as per data generated by versatile IoT applications . Smart parking system and context aware services are presented as an hybrid model of cloud and Fog Afterwards, various IoT applications and respective business models are discussed. Finally, author summarizes the IoT building blocks and identify research issues in each, and suggest potential research projects worthy of pursuing. .

  19. Population-Dynamic Modeling of Bacterial Horizontal Gene Transfer by Natural Transformation.

    Science.gov (United States)

    Mao, Junwen; Lu, Ting

    2016-01-05

    Natural transformation is a major mechanism of horizontal gene transfer (HGT) and plays an essential role in bacterial adaptation, evolution, and speciation. Although its molecular underpinnings have been increasingly revealed, natural transformation is not well characterized in terms of its quantitative ecological roles. Here, by using Neisseria gonorrhoeae as an example, we developed a population-dynamic model for natural transformation and analyzed its dynamic characteristics with nonlinear tools and simulations. Our study showed that bacteria capable of natural transformation can display distinct population behaviors ranging from extinction to coexistence and to bistability, depending on their HGT rate and selection coefficient. With the model, we also illustrated the roles of environmental DNA sources-active secretion and passive release-in impacting population dynamics. Additionally, by constructing and utilizing a stochastic version of the model, we examined how noise shapes the steady and dynamic behaviors of the system. Notably, we found that distinct waiting time statistics for HGT events, namely a power-law distribution, an exponential distribution, and a mix of the both, are associated with the dynamics in the regimes of extinction, coexistence, and bistability accordingly. This work offers a quantitative illustration of natural transformation by revealing its complex population dynamics and associated characteristics, therefore advancing our ecological understanding of natural transformation as well as HGT in general. Copyright © 2016 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  20. An efficient visual saliency detection model based on Ripplet transform

    Indian Academy of Sciences (India)

    A Diana Andrushia

    Many of these computational models find application in adaptive image compression, segmentation of object-of-interest in an image, automatic image thumb- nailing, object detection and recognition, visual tracking, automatic creation of image collage, content-aware image resizing, non-photo realistic rendering, etc. [2].

  1. Microscopic Models and Network Transformations for Automated Railway Traffic Planning

    NARCIS (Netherlands)

    Besinovic, Nikola; Goverde, R.M.P.; Quaglietta, Egidio

    2016-01-01

    This article tackles the real-world planning problem of railway operations. Improving the timetable planning process will result in more reliable product plans and a higher quality of service for passengers and freight operators. We focus on the microscopic models for computing accurate track

  2. Transformations among CE–CVM model parameters for ...

    Indian Academy of Sciences (India)

    In the development of thermodynamic databases for multicomponent systems using the cluster expansion–cluster variation methods, we need to have a consistent procedure for expressing the model parameters (CECs) of a higher order system in terms of those of the lower order subsystems and to an independent set of ...

  3. A transformation approach to modeling multi-modal diffusions

    DEFF Research Database (Denmark)

    Forman, Julie Lyng; Sørensen, Michael

    2014-01-01

    of the underlying simple diffusion including its mixing rates and distributions of first passage times. Likelihood inference and martingale estimating functions are considered in the case of a discretely observed bimodal diffusion. It is further demonstrated that model parameters can be identified and estimated...

  4. Shared Curriculum Model: A Promising Practice for Education Transformation.

    Science.gov (United States)

    Close, Liz; Gorski, Mary Sue; Sroczynski, Maureen; Farmer, Pat; Wortock, Jean

    2015-12-01

    The shared curriculum model is one of four successful models of academic progression identified through a consensus-building process facilitated by The Future of Nursing: Campaign for Action, with support from the Robert Wood Johnson Foundation, AARP, and the AARP Foundation. Seamless academic progression from the associate degree in nursing (ADN) to the baccalaureate degree in nursing (BSN) is achieved either by simultaneously revising both ADN and BSN curricula or by making targeted adjustments in ADN or BSN curricula to create a unified academic progression. Systematic vetting and definitive agreement on nursing prerequisites and corequisites, general education courses, nursing major content, and general degree requirements are necessary to ensure coordinated degree progression. A standardized set of expectations for beginning professional practice and for unique baccalaureate nursing knowledge ensures vital nursing content across the ADN-to-BSN continuum. Examples of state and regional ADN-to-BSN progression programs using the shared curriculum model are highlighted. The shared curriculum model is a promising practical and sustainable approach to seamless ADN-to-BSN academic progression. Copyright 2015, SLACK Incorporated.

  5. Single Channel Quantum Color Image Encryption Algorithm Based on HSI Model and Quantum Fourier Transform

    Science.gov (United States)

    Gong, Li-Hua; He, Xiang-Tao; Tan, Ru-Chao; Zhou, Zhi-Hong

    2018-01-01

    In order to obtain high-quality color images, it is important to keep the hue component unchanged while emphasize the intensity or saturation component. As a public color model, Hue-Saturation Intensity (HSI) model is commonly used in image processing. A new single channel quantum color image encryption algorithm based on HSI model and quantum Fourier transform (QFT) is investigated, where the color components of the original color image are converted to HSI and the logistic map is employed to diffuse the relationship of pixels in color components. Subsequently, quantum Fourier transform is exploited to fulfill the encryption. The cipher-text is a combination of a gray image and a phase matrix. Simulations and theoretical analyses demonstrate that the proposed single channel quantum color image encryption scheme based on the HSI model and quantum Fourier transform is secure and effective.

  6. A mathematical model describes the malignant transformation of low grade gliomas: Prognostic implications.

    Directory of Open Access Journals (Sweden)

    Magdalena U Bogdańska

    Full Text Available Gliomas are the most frequent type of primary brain tumours. Low grade gliomas (LGGs, WHO grade II gliomas may grow very slowly for the long periods of time, however they inevitably cause death due to the phenomenon known as the malignant transformation. This refers to the transition of LGGs to more aggressive forms of high grade gliomas (HGGs, WHO grade III and IV gliomas. In this paper we propose a mathematical model describing the spatio-temporal transition of LGGs into HGGs. Our modelling approach is based on two cellular populations with transitions between them being driven by the tumour microenvironment transformation occurring when the tumour cell density grows beyond a critical level. We show that the proposed model describes real patient data well. We discuss the relationship between patient prognosis and model parameters. We approximate tumour radius and velocity before malignant transformation as well as estimate the onset of this process.

  7. An inexpensive environmental monitoring system with IoT agents

    Directory of Open Access Journals (Sweden)

    Czerwinski Dariusz

    2017-01-01

    Full Text Available Air quality is of great importance for human health and life expectancy. It becomes crucial to monitor atmospheric dust in the air of cities. In connection with the development of mobile networks and low-cost sensory agents, it has become possible to create inexpensive environmental monitoring systems. The paper presents results of studies on the system monitoring dust concentration in city air. The system consists of moving IoT agents placed on vehicles (taxies, busses, private cars and measure the dust concentration. Agents, using a wireless connection, are sending the data to the recording server. The server application collects the data and visualises them on the map in a certain colour, depending on the dust concentration in the air and the values acceptable by standards. The system architecture, the algorithm of measurements and the agent-server data exchange protocol were presented in the article, as well as the example of data visualisation.

  8. The Occupancy Rate Modeling of Kendari Hotel Room using Mexican Hat Transformation and Partial Least Squares

    Directory of Open Access Journals (Sweden)

    Margaretha Ohyver

    2016-12-01

    Full Text Available Partial Least Squares (PLS method was developed in 1960 by Herman Wold. The method particularly suits with construct a regression model when the number of independent variables is many and highly collinear. The PLS can be combined with other methods, one of which is a Continuous Wavelet Transformation (CWT. By considering that the presence of outliers can lead to a less reliable model, and this kind of transformation may be required at a stage of pre-processing, the data is free of noise or outliers. Based on the previous study, Kendari hotel room occupancy rate was affected by the outlier, and it had a low value of R2. Therefore, this research aimed to obtain a good model by combining the PLS method and CWT transformation using the Mexican Hats them other wavelet of CWT. The research concludes that merging the PLS and the Mexican Hat transformation has resulted in a better model compared to the model that combined the PLS and the Haar wavelet transformation as shown in the previous study. The research shows that by changing the mother of the wavelet, the value of R2 can be improved significantly. The result provides information on how to increase the value of R2. The other advantage is the information for hotel managements to notice the age of the hotel, the maximum rates, the facilities, and the number of rooms to increase the number of visitors.

  9. Phenomenological Model for Phase Transformation Characteristics of Textured Shape Memory Alloys

    Science.gov (United States)

    Chatziathanasiou, Dimitris; Chemisky, Yves; Meraghni, Fodil; Chatzigeorgiou, George; Patoor, Etienne

    In the present study, a new transformation criterion that includes the effect of tension-compression asymmetry and texture-induced anisotropy is proposed and combined with a thermodynamical model to describe the thermomechanical behavior of polycrystalline shape memory alloys. An altered Prager criterion has been developed, introducing a general transformation of the axes in the stress space. A convexity analysis of such criterion is included along with an identification strategy aimed at extracting the model parameters related to tension-compression asymmetry and anisotropy. These are identified from a numerical simulation of a SMA polycrystal, using a self-consistent micromechanical model previously developed by Patoor et al. (Patoor, E., Eberhardt, A., Berveiller, M., 1996. Micromechanical Modelling of Superelasticity in Shape Memory Alloys. Journal de Physique IV 6, C1 277) for several loading cases on isotropic, rolled and drawn textures. Transformation surfaces in the stress and transformation strain spaces are obtained and compared with those predicted by the micromechanical model. The good agreement obtained between the macroscopic and the microscopic polycrystalline simulations states that the proposed criterion and transformation strain evolution equation can capture phenomenologically the effects of texture on anisotropy and asymmetry in SMAs.

  10. An IoT Based Predictive Connected Car Maintenance Approach

    Directory of Open Access Journals (Sweden)

    Rohit Dhall

    2017-03-01

    Full Text Available Internet of Things (IoT is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.

  11. NitroScape: A model to integrate nitrogen transfers and transformations in rural landscapes

    Energy Technology Data Exchange (ETDEWEB)

    Duretz, S. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Drouet, J.L., E-mail: Jean-Louis.Drouet@grignon.inra.fr [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Durand, P. [INRA-AgroCampus, UMR 1069 Sol Agro et hydrosysteme Spatialisation (SAS), 35042 Rennes cedex (France); Hutchings, N.J. [Department of Agroecology, Faculty of Agricultural Sciences, University of Aarhus (AU), Blichers Alle, 8830 Tjele (Denmark); Theobald, M.R. [Department of Chemistry and Agricultural Analysis, Technical University of Madrid (UPM), 28040 Madrid (Spain); Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Salmon-Monviola, J. [INRA-AgroCampus, UMR 1069 Sol Agro et hydrosysteme Spatialisation (SAS), 35042 Rennes cedex (France); Dragosits, U. [Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Maury, O. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Sutton, M.A. [Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Cellier, P. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France)

    2011-11-15

    Modelling nitrogen transfer and transformation at the landscape scale is relevant to estimate the mobility of the reactive forms of nitrogen (N{sub r}) and the associated threats to the environment. Here we describe the development of a spatially and temporally explicit model to integrate N{sub r} transfer and transformation at the landscape scale. The model couples four existing models, to simulate atmospheric, farm, agro-ecosystem and hydrological N{sub r} fluxes and transformations within a landscape. Simulations were carried out on a theoretical landscape consisting of pig-crop farms interspersed with unmanaged ecosystems. Simulation results illustrated the effect of spatial interactions between landscape elements on N{sub r} fluxes and losses to the environment. More than 10% of the total N{sub 2}O emissions were due to indirect emissions. The nitrogen budgets and transformations of the unmanaged ecosystems varied considerably, depending on their location within the landscape. The model represents a new tool for assessing the effect of changes in landscape structure on N{sub r} fluxes. - Highlights: > The landscape scale is relevant to study how spatial interactions affect N{sub r} fate. > The NitroScape model integrates N{sub r} transfer and transformation at landscape scale. > NitroScape couples existing atmospheric, farm, agro-ecosystem and hydrological models. > Data exchanges within NitroScape are dynamic and spatially distributed. > More than 10% of the simulated N{sub 2}O emissions are due to indirect emissions. - A model integrating terrestrial, hydrological and atmospheric processes of N{sub r} transfer and transformation at the landscape scale has been developed to simulate the effect of spatial interactions between landscape elements on N{sub r} fate.

  12. NitroScape: A model to integrate nitrogen transfers and transformations in rural landscapes

    International Nuclear Information System (INIS)

    Duretz, S.; Drouet, J.L.; Durand, P.; Hutchings, N.J.; Theobald, M.R.; Salmon-Monviola, J.; Dragosits, U.; Maury, O.; Sutton, M.A.; Cellier, P.

    2011-01-01

    Modelling nitrogen transfer and transformation at the landscape scale is relevant to estimate the mobility of the reactive forms of nitrogen (N r ) and the associated threats to the environment. Here we describe the development of a spatially and temporally explicit model to integrate N r transfer and transformation at the landscape scale. The model couples four existing models, to simulate atmospheric, farm, agro-ecosystem and hydrological N r fluxes and transformations within a landscape. Simulations were carried out on a theoretical landscape consisting of pig-crop farms interspersed with unmanaged ecosystems. Simulation results illustrated the effect of spatial interactions between landscape elements on N r fluxes and losses to the environment. More than 10% of the total N 2 O emissions were due to indirect emissions. The nitrogen budgets and transformations of the unmanaged ecosystems varied considerably, depending on their location within the landscape. The model represents a new tool for assessing the effect of changes in landscape structure on N r fluxes. - Highlights: → The landscape scale is relevant to study how spatial interactions affect N r fate. → The NitroScape model integrates N r transfer and transformation at landscape scale. → NitroScape couples existing atmospheric, farm, agro-ecosystem and hydrological models. → Data exchanges within NitroScape are dynamic and spatially distributed. → More than 10% of the simulated N 2 O emissions are due to indirect emissions. - A model integrating terrestrial, hydrological and atmospheric processes of N r transfer and transformation at the landscape scale has been developed to simulate the effect of spatial interactions between landscape elements on N r fate.

  13. Model Transformation in context of Driver Assistance System

    OpenAIRE

    Kappattanavar, Abhishek Mallikarjuna

    2016-01-01

    In today’s world we see that Embedded Systems forms a major part in the life of a human being. Almost every device today has an electronic chip embedded in it. When it comes to automotive, these electronic devices are multiplying. This has resulted in innovative methods of developing Embedded Systems. Among them, Model Based Development has become very popular and a standard way of developing embedded systems. Now, we can see that most embedded systems, especially the automotive systems, are ...

  14. Modelling laser-induced phase transformations in semiconductors

    Czech Academy of Sciences Publication Activity Database

    Gatskevich, E.; Přikryl, Petr; Ivlev, G.

    2007-01-01

    Roč. 76, č. 1 (2007), s. 65-72 ISSN 0378-4754. [MODELLING 2005. Plzeň, 04.07.2005-08.07.2005] R&D Projects: GA ČR GA201/04/1503 Institutional research plan: CEZ:AV0Z10190503 Keywords : laser-induced phase transitions * moving boundary problem * non-equilibrium phase changer Subject RIV: BA - General Mathematics Impact factor: 0.738, year: 2007

  15. Role of transformational leadership on employee productivity of teaching hospitals: using structural equation modeling.

    Science.gov (United States)

    Vatankhah, Soudabeh; Alirezaei, Samira; Khosravizadeh, Omid; Mirbahaeddin, Seyyed Elmira; Alikhani, Mahtab; Alipanah, Mobarakeh

    2017-08-01

    In today's transforming world, increased productivity and efficient use of existing facilities are practically beyond a choice and become a necessity. In this line, attention to change and transformation is one of the affecting factors on the growth of productivity in organizations, especially in hospitals. To examine the effect of transformational leadership on the productivity of employees in teaching hospitals affiliated to Iran University of Medical Sciences. This cross-sectional study was conducted on 254 participants from educational and medical centers affiliated to Iran University of Medical Sciences (Tehran, Iran) in 2016. The standard questionnaires of Bass & Avolio and of Hersi & Goldsmith were used to respectively assess transformational leadership and level of productivity. The research assumptions were tested in a significance level of 0.05 by applying descriptive statistics and structural equations modeling (SEM) using SPSS 19 and Amos 24. Results of the fitting indicators of the assessing model after amending includes Chi-square two to degrees of freedom of 2.756, CFI indicator 0.95, IFI indicator 0.92, Root mean square error of approximation (RMSEA) indicator 0.10. These results indicate that the assessing model is well fitting after the amendment. Also, analysis of the model's assumptions and the final model of the research reveals the effect of transformational leadership on employees' productivity with a significance level of 0.83 (p=0.001). This research indicates that the more the leadership and decision-making style in hospitals lean towards transformational mode, the more positive outcomes it brings among employees and the organization due to increased productivity. Therefore, it is essential to pay focused attention to training/educational programs in organizations to create and encourage transformational leadership behaviors which hopefully lead to more productive employees.

  16. Modeling positional effects of regulatory sequences with spline transformations increases prediction accuracy of deep neural networks.

    Science.gov (United States)

    Avsec, Žiga; Barekatain, Mohammadamin; Cheng, Jun; Gagneur, Julien

    2017-11-16

    Regulatory sequences are not solely defined by their nucleic acid sequence but also by their relative distances to genomic landmarks such as transcription start site, exon boundaries, or polyadenylation site. Deep learning has become the approach of choice for modeling regulatory sequences because of its strength to learn complex sequence features. However, modeling relative distances to genomic landmarks in deep neural networks has not been addressed. Here we developed spline transformation, a neural network module based on splines to flexibly and robustly model distances. Modeling distances to various genomic landmarks with spline transformations significantly increased state-of-the-art prediction accuracy of in vivo RNA-binding protein binding sites for 120 out of 123 proteins. We also developed a deep neural network for human splice branchpoint based on spline transformations that outperformed the current best, already distance-based, machine learning model. Compared to piecewise linear transformation, as obtained by composition of rectified linear units, spline transformation yields higher prediction accuracy as well as faster and more robust training. As spline transformation can be applied to further quantities beyond distances, such as methylation or conservation, we foresee it as a versatile component in the genomics deep learning toolbox. Spline transformation is implemented as a Keras layer in the CONCISE python package: https://github.com/gagneurlab/concise. Analysis code is available at goo.gl/3yMY5w. avsec@in.tum.de; gagneur@in.tum.de. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  17. Higher Order Moments Generation by Mellin Transform for Compound Models of Clutter

    OpenAIRE

    Bhattacharya, C

    2008-01-01

    The compound models of clutter statistics are found suitable to describe the nonstationary nature of radar backscattering from high-resolution observations. In this letter, we show that the properties of Mellin transform can be utilized to generate higher order moments of simple and compound models of clutter statistics in a compact manner.

  18. Estimation of Higher Order Moments for Compound Models of Clutter by Mellin Transform

    OpenAIRE

    Bhattacharya, C

    2008-01-01

    The compound models of clutter statistics are found suitable to describe the nonstationary nature of radar backscattering from high-resolution observations. In this letter, we show that the properties of Mellin transform can be utilized to generate higher order moments of simple and compound models of clutter statistics in a compact manner

  19. Analysis of errors in spectral reconstruction with a Laplace transform pair model

    International Nuclear Information System (INIS)

    Archer, B.R.; Bushong, S.C.

    1985-01-01

    The sensitivity of a Laplace transform pair model for spectral reconstruction to random errors in attenuation measurements of diagnostic x-ray units has been investigated. No spectral deformation or significant alteration resulted from the simulated attenuation errors. It is concluded that the range of spectral uncertainties to be expected from the application of this model is acceptable for most scientific applications. (author)

  20. Climate change induced transformations of agricultural systems: insights from a global model

    International Nuclear Information System (INIS)

    Leclère, D; Havlík, P; Mosnier, A; Walsh, B; Valin, H; Khabarov, N; Obersteiner, M; Fuss, S; Schmid, E; Herrero, M

    2014-01-01

    Climate change might impact crop yields considerably and anticipated transformations of agricultural systems are needed in the coming decades to sustain affordable food provision. However, decision-making on transformational shifts in agricultural systems is plagued by uncertainties concerning the nature and geography of climate change, its impacts, and adequate responses. Locking agricultural systems into inadequate transformations costly to adjust is a significant risk and this acts as an incentive to delay action. It is crucial to gain insight into how much transformation is required from agricultural systems, how robust such strategies are, and how we can defuse the associated challenge for decision-making. While implementing a definition related to large changes in resource use into a global impact assessment modelling framework, we find transformational adaptations to be required of agricultural systems in most regions by 2050s in order to cope with climate change. However, these transformations widely differ across climate change scenarios: uncertainties in large-scale development of irrigation span in all continents from 2030s on, and affect two-thirds of regions by 2050s. Meanwhile, significant but uncertain reduction of major agricultural areas affects the Northern Hemisphere’s temperate latitudes, while increases to non-agricultural zones could be large but uncertain in one-third of regions. To help reducing the associated challenge for decision-making, we propose a methodology exploring which, when, where and why transformations could be required and uncertain, by means of scenario analysis. (letter)

  1. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  2. NOVEL CANDHIKALA KAPURANTA SEBAGAI ALTERNATIF PENYELESAIAN DEHUMANISASI PADA ERA INTERNET OF THINGS (IOT

    Directory of Open Access Journals (Sweden)

    Krisna Pebryawan

    2018-03-01

    Full Text Available AbstractThis study aims to describe the cultural value in Candhikala Kapuranta novel as an alternative to dehumanization settlement in IoT era. The research method used is qualitative descriptive. The data source used is Candhikala Kapuranta's novel by Sugiarto Sriwibawa. Data collection techniques used is the technique of referring note, while the technique of data analysis using interactive analysis techniques. Based on the research that has been done, the results of his research as follows. First, the cultural values in Candhikala Kapuranta's novel include religious values and social values. Second, dehumanization in the IoT era is individualism, pornography, and intolerance. Thirdly, the cultural values contained in Candhikala Kapuranta's novel as an alternative to dehumanization settlement in the IoT era.Keywords: Cultural Values, Dehumanization, Era IoT, Novel

  3. The transformational model for professional practice: a system integration focus.

    Science.gov (United States)

    Wolf, Gail A; Hayden, Margaret; Bradle, Judith A

    2004-04-01

    Healthcare organizations face the increasingly difficult challenge of providing services that are of high quality, reasonable cost, and easy accessibility for their constituents. Mergers and acquisitions are one strategy for accomplishing this, but in doing so it is critical to have a "road map" to create an integrated system, rather than merely a consortium of hospitals. The University of Pittsburgh Medical Center has successfully created an integrated healthcare system of 19 hospitals. The authors describe the professional practice model used as a framework for success in integrating patient care.

  4. Towards Stream-based Reasoning and Machine Learning for IoT Applications

    OpenAIRE

    Endler , Markus; Briot , Jean-Pierre; Almeida , Vitor P.; Silva e Silva , Francisco; Haeusler , Edward ,

    2017-01-01

    International audience; As distributed IoT applications become larger and more complex, the pure processing of raw sensor and actuation data streams becomes impractical.Instead, data streams must be fused into tangible facts and these pieces of information must be combined with a background knowledge to infer new pieces of knowledge. And since many IoT applications require almost real-time reactivity to stimulus of the environment, such information inference process has to be performed in a c...

  5. Towards Stream-based Reasoning and Machine Learning for IoT Applications

    OpenAIRE

    Endler, Markus; Briot, Jean-Pierre; Almeida, Vitor P.; Silva e Silva, Francisco; Haeusler, Edward,

    2017-01-01

    To appear in Proceedings of the IEEE Intelligent Systems Conference (IntelliSys'2017), London, U.K, September 2017.; As distributed IoT applications become larger and more complex, the pure processing of raw sensor and actuation data streams becomes impractical. Instead, data streams must be fused into tangible facts and these pieces of information must be combined with a background knowledge to infer new pieces of knowledge. And since many IoT applications require almost real-time reactivity...

  6. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  7. Enterprise-Oriented IoT Name Service for Agricultural Product Supply Chain Management

    OpenAIRE

    Yi Liu; He Wang; Junyu Wang; Kan Qian; Ning Kong; Kaijiang Wang; Lirong Zheng; Yiwei Shi; Daniel W. Engels

    2015-01-01

    Internet of Things (IoT) technologies have a great potential to improve the safety and quality of agricultural products. By providing near continuous monitoring from planting through harvesting and to our homes, IoT technologies are able to provide farm to fork visibility with all of the resulting benefits that accrue from that visibility. Unique identification provides the foundation of these benefits with a name service enabling efficient storage and retrieval of the data associated with ea...

  8. Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices

    OpenAIRE

    Danzi, Pietro; Kalør, Anders Ellersgaard; Stefanović, Čedomir; Popovski, Petar

    2017-01-01

    Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing capabilities and low power consumption, as well as sporadic and low-bandwidth wireless connectiv...

  9. Modelling Sporangiospore-yeast transformation of Dimorphomyces strain.

    Science.gov (United States)

    Omoifo, C O

    1996-01-01

    Two types of buffered media, strictly defined-Ammonium sulphate-basal salts and complex Peptone-basal salts, were used for the cultivation of Dimorphomyces pleomorphis, one of two dimorphic fungi isolated from fermenting juice of soursop fruit, Annona muricata L. The growth count was taken every twenty-four hours. Transient morphologies were observed to change from sporangiospores through enlarged globose cells, to granular particles and eventually, polar budding yeast cells in the strictly defined medium at 15 degrees, 20 degrees, or 37 degrees C, but the complex medium casually terminally induced polar budding yeast cells and multipolar budding yeast like cells in between the growth phases, at 15 degrees and 20 degrees C, while mainly multipolar budding yeastlike morphology was observed at elevated temperature. There was obvious influence of nutritional factor or morphological expression (p < 0.01). After analysis of variance, the growth data could not fit into predictive quadratic polynomial model because the organism's response curves were incongruent with basic assumptions of the model. Furthermore, a stepwise regression analysis gave very low coefficients of determination, r2, for the interactive combinations. They were therefore, considered unfit for the data. Construction of the pII-profiles led to inference being drawn from the chemiosmotic theory, polyelectrolyte theory to account for the behaviour in the buffered multiionic media. It was also thought that inherent cellular mitotic division and glycolytic activity led to a prelogarithmic growth response.

  10. Design and Modeling of an Integrated Micro-Transformer in a Flyback Converter

    Directory of Open Access Journals (Sweden)

    M. Derkaoui

    2013-11-01

    Full Text Available This paper presents the design and modeling of a square micro-transformer for its integration in a flyback converter. From the specifications of the switching power supply, we determined the geometric parameters of this micro-transformer. The π-electrical model of this micro-transformer highlights all parasitic effects generated by stacking of different material layers and permits to calculate the technological parameters by using the S-parameters. A good dimensioning of the geometrical parameters reduces efficiently the energy losses in the micro-transformer and permits to reach the desirable value of the converter output voltage. We have also simulated the electromagnetic effects with the help of the software FEMLAB3.1 in two cases. The first case, without ferromagnetic core, the second case with ferromagnetic core, in order to choose the micro-transformer that has better electromagnetic compatibility with the vicinity components. To validate dimensioning of the geometrical and technological parameters, we have simulated with the help of the software PSIM6.0, the equivalent electrical circuit of the converter containing the electrical circuit of the dimensioned planar micro-transformer.

  11. Symbolic computation of equivalence transformations and parameter reduction for nonlinear physical models

    Science.gov (United States)

    Cheviakov, Alexei F.

    2017-11-01

    An efficient systematic procedure is provided for symbolic computation of Lie groups of equivalence transformations and generalized equivalence transformations of systems of differential equations that contain arbitrary elements (arbitrary functions and/or arbitrary constant parameters), using the software package GeM for Maple. Application of equivalence transformations to the reduction of the number of arbitrary elements in a given system of equations is discussed, and several examples are considered. The first computational example of generalized equivalence transformations where the transformation of the dependent variable involves an arbitrary constitutive function is presented. As a detailed physical example, a three-parameter family of nonlinear wave equations describing finite anti-plane shear displacements of an incompressible hyperelastic fiber-reinforced medium is considered. Equivalence transformations are computed and employed to radically simplify the model for an arbitrary fiber direction, invertibly reducing the model to a simple form that corresponds to a special fiber direction, and involves no arbitrary elements. The presented computation algorithm is applicable to wide classes of systems of differential equations containing arbitrary elements.

  12. ANIMATION STRATEGIES FOR SMOOTH TRANSFORMATIONS BETWEEN DISCRETE LODS OF 3D BUILDING MODELS

    Directory of Open Access Journals (Sweden)

    M. Kada

    2016-06-01

    Full Text Available The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advanced techniques to improve the quality and time response of dynamic scenes. The main focus of this article concentrates on the discussion of strategies for smooth transformation between two discrete levels of detail (LOD of 3D building models that are represented as restricted triangle meshes. Because the operation order determines the geometrical and topological properties of the transformation process as well as its visual perception by a human viewer, three different strategies are proposed and subsequently analyzed. The simplest one orders transformation operations by the length of the edges to be collapsed, while the other two strategies introduce a general transformation direction in the form of a moving plane. This plane either pushes the nodes that need to be removed, e.g. during the transformation of a detailed LOD model to a coarser one, towards the main building body, or triggers the edge collapse operations used as transformation paths for the cartographic generalization.

  13. BOX-COX transformation and random regression models for fecal egg count data

    Directory of Open Access Journals (Sweden)

    Marcos Vinicius Silva

    2012-01-01

    Full Text Available Accurate genetic evaluation of livestock is based on appropriate modeling of phenotypic measurements. In ruminants fecal egg count (FEC is commonly used to measure resistance to nematodes. FEC values are not normally distributed and logarithmic transformations have been used to achieve normality before analysis. However, the transformed data are often not normally distributed, especially when data are extremely skewed. A series of repeated FEC measurements may provide information about the population dynamics of a group or individual. A total of 6,375 FEC measures were obtained for 410 animals between 1992 and 2003 from the Beltsville Agricultural Research Center Angus herd. Original data were transformed using an extension of the Box-Cox transformation to approach normality and to estimate (covariance components. We also proposed using random regression models (RRM for genetic and non-genetic studies of FEC. Phenotypes were analyzed using RRM and restricted maximum likelihood. Within the different orders of Legendre polynomials used, those with more parameters (order 4 adjusted FEC data best. Results indicated that the transformation of FEC data utilizing the Box-Cox transformation family was effective in reducing the skewness and kurtosis, and dramatically increased estimates of heritability, and measurements of FEC obtained in the period between 12 and 26 weeks in a 26-week experimental challenge period are genetically correlated.

  14. Analytical calculation of detailed model parameters of cast resin dry-type transformers

    International Nuclear Information System (INIS)

    Eslamian, M.; Vahidi, B.; Hosseinian, S.H.

    2011-01-01

    Highlights: → In this paper high frequency behavior of cast resin dry-type transformers was simulated. → Parameters of detailed model were calculated using analytical method and compared with FEM results. → A lab transformer was constructed in order to compare theoretical and experimental results. -- Abstract: Non-flammable characteristic of cast resin dry-type transformers make them suitable for different kind of usages. This paper presents an analytical method of how to obtain parameters of detailed model of these transformers. The calculated parameters are compared and verified with the corresponding FEM results and if it was necessary, correction factors are introduced for modification of the analytical solutions. Transient voltages under full and chopped test impulses are calculated using the obtained detailed model. In order to validate the model, a setup was constructed for testing on high-voltage winding of cast resin dry-type transformer. The simulation results were compared with the experimental data measured from FRA and impulse tests.

  15. A prediction method based on wavelet transform and multiple models fusion for chaotic time series

    International Nuclear Information System (INIS)

    Zhongda, Tian; Shujiang, Li; Yanhong, Wang; Yi, Sha

    2017-01-01

    In order to improve the prediction accuracy of chaotic time series, a prediction method based on wavelet transform and multiple models fusion is proposed. The chaotic time series is decomposed and reconstructed by wavelet transform, and approximate components and detail components are obtained. According to different characteristics of each component, least squares support vector machine (LSSVM) is used as predictive model for approximation components. At the same time, an improved free search algorithm is utilized for predictive model parameters optimization. Auto regressive integrated moving average model (ARIMA) is used as predictive model for detail components. The multiple prediction model predictive values are fusion by Gauss–Markov algorithm, the error variance of predicted results after fusion is less than the single model, the prediction accuracy is improved. The simulation results are compared through two typical chaotic time series include Lorenz time series and Mackey–Glass time series. The simulation results show that the prediction method in this paper has a better prediction.

  16. From PCK to TPACK: Developing a Transformative Model for Pre-Service Science Teachers

    Science.gov (United States)

    Jang, Syh-Jong; Chen, Kuan-Chung

    2010-12-01

    New science teachers should be equipped with the ability to integrate and design the curriculum and technology for innovative teaching. How to integrate technology into pre-service science teachers' pedagogical content knowledge is the important issue. This study examined the impact on a transformative model of integrating technology and peer coaching for developing technological pedagogical and content knowledge (TPACK) of pre-service science teachers. A transformative model and an online system were designed to restructure science teacher education courses. Participants of this study included an instructor and 12 pre-service teachers. The main sources of data included written assignments, online data, reflective journals, videotapes and interviews. This study expanded four views, namely, the comprehensive, imitative, transformative and integrative views to explore the impact of TPACK. The model could help pre-service teachers develop technological pedagogical methods and strategies of integrating subject-matter knowledge into science lessons, and further enhanced their TPACK.

  17. Numerical model of phase transformation of steel C80U during hardening

    Directory of Open Access Journals (Sweden)

    T. Domański

    2007-12-01

    Full Text Available The article concerns numerical modelling of the phase transformations in solid state hardening of tool steel C80U. The transformations were assumed: initial structure – austenite, austenite – perlite, bainite and austenite – martensite. Model for evaluation of fractions of phases and their kinetics based on continuous heating diagram (CHT and continuous cooling diagram (CCT. The dilatometric tests on the simulator of thermal cycles were performed. The results of dilatometric tests were compared with the results of the test numerical simulations. In this way the derived models for evaluating phase content and kinetics of transformations in heating and cooling processes were verified. The results of numerical simulations confirm correctness of the algorithm that were worked out. In the numerical example the simulated estimation of the phase fraction in the hardened axisimmetrical element was performed.

  18. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  19. Transforming anaerobic digestion with the Model T of digesters

    Energy Technology Data Exchange (ETDEWEB)

    Martin, J.F.; Ciotola, R.; Castano, J.; Eger, C.; Schlea, D. [Ohio State Univ., Columbus, OH (United States). Ecological Engineering Program

    2010-07-01

    Most livestock farmers in the United States do not take advantage of anaerobic digester technology because of the high cost and large scale. These limitations therefore reduce the production of renewable energy from farmlands. In order to expand anaerobic digestion methods and improve environmental quality, affordable and smaller-scale digesters should be developed to enable most livestock farmers to convert manure to methane. Doing so would improve their economic efficiency and environmental sustainability. This paper provided an analogy to the development of the Model T to better explain the need and potential for this technology. A modified fixed-dome digester was installed on the Ohio State University dairy in Columbus, Ohio. The digester was unheated, buried, had a volume of 1 m{sup 3} and received diluted dairy manure as feedstock. Biogas was produced at digester temperatures as low 10 degrees C during colder ambient temperatures. Water quality also improved. Results from the first year of operation will be analyzed to improve performance and enable future development of this technology.

  20. A Transformative Model for Undergraduate Quantitative Biology Education

    Science.gov (United States)

    Driscoll, Tobin A.; Dhurjati, Prasad; Pelesko, John A.; Rossi, Louis F.; Schleiniger, Gilberto; Pusecker, Kathleen; White, Harold B.

    2010-01-01

    The BIO2010 report recommended that students in the life sciences receive a more rigorous education in mathematics and physical sciences. The University of Delaware approached this problem by (1) developing a bio-calculus section of a standard calculus course, (2) embedding quantitative activities into existing biology courses, and (3) creating a new interdisciplinary major, quantitative biology, designed for students interested in solving complex biological problems using advanced mathematical approaches. To develop the bio-calculus sections, the Department of Mathematical Sciences revised its three-semester calculus sequence to include differential equations in the first semester and, rather than using examples traditionally drawn from application domains that are most relevant to engineers, drew models and examples heavily from the life sciences. The curriculum of the B.S. degree in Quantitative Biology was designed to provide students with a solid foundation in biology, chemistry, and mathematics, with an emphasis on preparation for research careers in life sciences. Students in the program take core courses from biology, chemistry, and physics, though mathematics, as the cornerstone of all quantitative sciences, is given particular prominence. Seminars and a capstone course stress how the interplay of mathematics and biology can be used to explain complex biological systems. To initiate these academic changes required the identification of barriers and the implementation of solutions. PMID:20810949

  1. A transformative model for undergraduate quantitative biology education.

    Science.gov (United States)

    Usher, David C; Driscoll, Tobin A; Dhurjati, Prasad; Pelesko, John A; Rossi, Louis F; Schleiniger, Gilberto; Pusecker, Kathleen; White, Harold B

    2010-01-01

    The BIO2010 report recommended that students in the life sciences receive a more rigorous education in mathematics and physical sciences. The University of Delaware approached this problem by (1) developing a bio-calculus section of a standard calculus course, (2) embedding quantitative activities into existing biology courses, and (3) creating a new interdisciplinary major, quantitative biology, designed for students interested in solving complex biological problems using advanced mathematical approaches. To develop the bio-calculus sections, the Department of Mathematical Sciences revised its three-semester calculus sequence to include differential equations in the first semester and, rather than using examples traditionally drawn from application domains that are most relevant to engineers, drew models and examples heavily from the life sciences. The curriculum of the B.S. degree in Quantitative Biology was designed to provide students with a solid foundation in biology, chemistry, and mathematics, with an emphasis on preparation for research careers in life sciences. Students in the program take core courses from biology, chemistry, and physics, though mathematics, as the cornerstone of all quantitative sciences, is given particular prominence. Seminars and a capstone course stress how the interplay of mathematics and biology can be used to explain complex biological systems. To initiate these academic changes required the identification of barriers and the implementation of solutions.

  2. Detailed High Frequency Models of Various Winding Types in Power Transformers

    DEFF Research Database (Denmark)

    Pedersen, Kenneth; Lunow, Morten Erlandsson; Holbøll, Joachim

    2005-01-01

    Abstract--In this paper, techniques are described which demonstrate how a highly detailed internal transformer model can be obtained systematically with Matlab and how it can be prepared for subsequent transient analysis. The input of such a model will mainly be the description of the cross section...... of a single transformer leg, including all turns and windings. From the input data a three phase equivalent circuit is calculated and corresponding nodal impedance matrices are found for appropriate frequencies. Vector fitting is then applied which produces an excellent rational function approximation...

  3. Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages

    DEFF Research Database (Denmark)

    Mendling, Jan; Lassen, Kristian Bisgaard; Zdun, Uwe

    Much recent research work discusses the transformation between differentprocess modelling languages. This work, however, is mainly focussed on specific processmodelling languages, and thus the general reusability of the applied transformationconcepts is rather limited. In this paper, we aim...... to abstract from concrete transformationstrategies by distinguishing two major paradigms for process modelling languages:block-oriented languages (such as BPEL and BPML) and graph-oriented languages(such as EPCs and YAWL). The contribution of this paper are generic strategiesfor transforming from block......-oriented process languages to graph-oriented languages,and vice versa. We also present two case studies of applying our strategies....

  4. Software-defined networking model for smart transformers with ISO/IEC/IEEE 21451 sensors

    Directory of Open Access Journals (Sweden)

    Longhua Guo

    2017-06-01

    Full Text Available The advanced IEC 61850 smart transformer has shown an improved performance in monitoring, controlling, and protecting the equipment in smart substations. However, heterogeneity, feasibility, and network control problems have limited the smart transformer’s performance in networks. To address these issues, a software-defined networking model was proposed using ISO/IEC/IEEE 21451 networks. An IEC-61850-based network controller was designed as a new kind of intelligent electrical device (IED. The proposed data and information models enhanced the network awareness ability and facilitated the access of smart sensors in transformer to communication networks. The performance evaluation results showed an improved efficiency.

  5. A Prediction Mechanism of Energy Consumption in Residential Buildings Using Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Israr Ullah

    2018-02-01

    Full Text Available Internet of Things (IoT is considered as one of the future disruptive technologies, which has the potential to bring positive change in human lifestyle and uplift living standards. Many IoT-based applications have been designed in various fields, e.g., security, health, education, manufacturing, transportation, etc. IoT has transformed conventional homes into Smart homes. By attaching small IoT devices to various appliances, we cannot only monitor but also control indoor environment as per user demand. Intelligent IoT devices can also be used for optimal energy utilization by operating the associated equipment only when it is needed. In this paper, we have proposed a Hidden Markov Model based algorithm to predict energy consumption in Korean residential buildings using data collected through smart meters. We have used energy consumption data collected from four multi-storied buildings located in Seoul, South Korea for model validation and results analysis. Proposed model prediction results are compared with three well-known prediction algorithms i.e., Support Vector Machine (SVM, Artificial Neural Network (ANN and Classification and Regression Trees (CART. Comparative analysis shows that our proposed model achieves 2.96 % better than ANN results in terms of root mean square error metric, 6.09 % better than SVM and 9.03 % better than CART results. To further establish and validate prediction results of our proposed model, we have performed temporal granularity analysis. For this purpose, we have evaluated our proposed model for hourly, daily and weekly data aggregation. Prediction accuracy in terms of root mean square error metric for hourly, daily and weekly data is 2.62, 1.54 and 0.46, respectively. This shows that our model prediction accuracy improves for coarse grain data. Higher prediction accuracy gives us confidence to further explore its application in building control systems for achieving better energy efficiency.

  6. Cole-Hopf Transformation Based Lattice Boltzmann Model for One-dimensional Burgers’ Equation

    Science.gov (United States)

    Qi, Xiao-Tong; Shi, Bao-Chang; Chai, Zhen-Hua

    2018-03-01

    In this paper, we present a Cole-Hopf transformation based lattice Boltzmann (LB) model for solving one-dimensional Burgers’ equation, and compared to available LB models, the effect of nonlinear convection term can be eliminated. Through Chapman-Enskog analysis, it can be found that the converted diffusion equation based on the Cole-Hopf transformation can be recovered correctly from present LB model. Some numerical tests are also performed to validate the present LB model, and the numerical results show that, similar to previous LB models, the present model also has a second-order convergence rate in space, but it is more accurate than the previous ones. Supported by the National Natural Science Foundation of China under Grant No. 51576079

  7. Finite-strain micromechanical model of stress-induced martensitic transformations in shape memory alloys

    International Nuclear Information System (INIS)

    Stupkiewicz, S.; Petryk, H.

    2006-01-01

    A micromechanical model of stress-induced martensitic transformation in single crystals of shape memory alloys is developed. This model is a finite-strain counterpart to the approach presented recently in the small-strain setting [S. Stupkiewicz, H. Petryk, J. Mech. Phys. Solids 50 (2002) 2303-2331]. The stress-induced transformation is assumed to proceed by the formation and growth of parallel martensite plates within the austenite matrix. Propagation of phase transformation fronts is governed by a rate-independent thermodynamic criterion with a threshold value for the thermodynamic driving force, including in this way the intrinsic dissipation due to phase transition. This criterion selects the initial microstructure at the onset of transformation and governs the evolution of the laminated microstructure at the macroscopic level. A multiplicative decomposition of the deformation gradient into elastic and transformation parts is assumed, with full account for the elastic anisotropy of the phases. The pseudoelastic behavior of Cu-Zn-Al single crystal in tension and compression is studied as an application of the model

  8. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  9. Analysis of grain size effects on transformation-induced plasticity based on a discrete dislocation-transformation model

    NARCIS (Netherlands)

    Shi, J.; Turteltaub, S.; Van der Giessen, E.

    2010-01-01

    There is much interest recently in the possibility of combining two strengthening effects, namely the reduction of grain size (Hall-Fetch effect) and the transformation-induced plasticity effect (strengthening due to a martensitic transformation). The present work is concerned with the analysis of

  10. A systematic model identification method for chemical transformation pathways – the case of heroin biomarkers in wastewater

    DEFF Research Database (Denmark)

    Ramin, Pedram; Valverde Pérez, Borja; Polesel, Fabio

    2017-01-01

    at any given transformation pathway levels as priors for parameter estimation at any subsequent transformation levels. The method was applied to calibrate a model predicting the transformation in untreated wastewater of six biomarkers, excreted following human metabolism of heroin and codeine. The method...

  11. Homotopy perturbation transform method for pricing under pure diffusion models with affine coefficients

    Directory of Open Access Journals (Sweden)

    Claude Rodrigue Bambe Moutsinga

    2018-01-01

    Full Text Available Most existing multivariate models in finance are based on diffusion models. These models typically lead to the need of solving systems of Riccati differential equations. In this paper, we introduce an efficient method for solving systems of stiff Riccati differential equations. In this technique, a combination of Laplace transform and homotopy perturbation methods is considered as an algorithm to the exact solution of the nonlinear Riccati equations. The resulting technique is applied to solving stiff diffusion model problems that include interest rates models as well as two and three-factor stochastic volatility models. We show that the present approach is relatively easy, efficient and highly accurate.

  12. Nine-Phase Induction Motor Dynamic Model Based On 3x9 Transformation Matrix

    Directory of Open Access Journals (Sweden)

    Mauridhi Heri Purnomo

    2013-07-01

    Full Text Available A dynamic model of multi-phase induction motors in term qdn is used to simplify analysis and separate armature and field of the motor. However, to generate dynamic model qdn, square matrices are always applied to all the analysis and based on two reference frames and a circuit of magnetically coupled transformer. In order to gain the qdn dynamic model of the nine-phase induction motors in easy, simple, quick and consistent way, the analysis is done through the equivalent circuit T model until it obtains the equations in matrix form. The 3x9 transformation matrix qdn is substituted into the equation form abc so that the matrix equation of qdn is obtained. Then qdn equation results a similar qd equivalent circuit, which has different methods n that is, based the circuit of magnetically coupled transformer. Simulation results show that the two-bases circuit is magnetically coupled into the transformer model and has similar angular speed and torque response to the motor though the load changes.

  13. Wavelet transform-vector quantization compression of supercomputer ocean model simulation output

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J N; Brislawn, C M

    1992-11-12

    We describe a new procedure for efficient compression of digital information for storage and transmission purposes. The algorithm involves a discrete wavelet transform subband decomposition of the data set, followed by vector quantization of the wavelet transform coefficients using application-specific vector quantizers. The new vector quantizer design procedure optimizes the assignment of both memory resources and vector dimensions to the transform subbands by minimizing an exponential rate-distortion functional subject to constraints on both overall bit-rate and encoder complexity. The wavelet-vector quantization method, which originates in digital image compression. is applicable to the compression of other multidimensional data sets possessing some degree of smoothness. In this paper we discuss the use of this technique for compressing the output of supercomputer simulations of global climate models. The data presented here comes from Semtner-Chervin global ocean models run at the National Center for Atmospheric Research and at the Los Alamos Advanced Computing Laboratory.

  14. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT.

    Science.gov (United States)

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-02-16

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0-1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing.

  15. Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT) for Aquaculture.

    Science.gov (United States)

    Chen, Yingyi; Zhen, Zhumi; Yu, Huihui; Xu, Jing

    2017-01-14

    In the Internet of Things (IoT) equipment used for aquaculture is often deployed in outdoor ponds located in remote areas. Faults occur frequently in these tough environments and the staff generally lack professional knowledge and pay a low degree of attention in these areas. Once faults happen, expert personnel must carry out maintenance outdoors. Therefore, this study presents an intelligent method for fault diagnosis based on fault tree analysis and a fuzzy neural network. In the proposed method, first, the fault tree presents a logic structure of fault symptoms and faults. Second, rules extracted from the fault trees avoid duplicate and redundancy. Third, the fuzzy neural network is applied to train the relationship mapping between fault symptoms and faults. In the aquaculture IoT, one fault can cause various fault symptoms, and one symptom can be caused by a variety of faults. Four fault relationships are obtained. Results show that one symptom-to-one fault, two symptoms-to-two faults, and two symptoms-to-one fault relationships can be rapidly diagnosed with high precision, while one symptom-to-two faults patterns perform not so well, but are still worth researching. This model implements diagnosis for most kinds of faults in the aquaculture IoT.

  16. Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT for Aquaculture

    Directory of Open Access Journals (Sweden)

    Yingyi Chen

    2017-01-01

    Full Text Available In the Internet of Things (IoT equipment used for aquaculture is often deployed in outdoor ponds located in remote areas. Faults occur frequently in these tough environments and the staff generally lack professional knowledge and pay a low degree of attention in these areas. Once faults happen, expert personnel must carry out maintenance outdoors. Therefore, this study presents an intelligent method for fault diagnosis based on fault tree analysis and a fuzzy neural network. In the proposed method, first, the fault tree presents a logic structure of fault symptoms and faults. Second, rules extracted from the fault trees avoid duplicate and redundancy. Third, the fuzzy neural network is applied to train the relationship mapping between fault symptoms and faults. In the aquaculture IoT, one fault can cause various fault symptoms, and one symptom can be caused by a variety of faults. Four fault relationships are obtained. Results show that one symptom-to-one fault, two symptoms-to-two faults, and two symptoms-to-one fault relationships can be rapidly diagnosed with high precision, while one symptom-to-two faults patterns perform not so well, but are still worth researching. This model implements diagnosis for most kinds of faults in the aquaculture IoT.

  17. About the use of rank transformation in sensitivity analysis of model output

    International Nuclear Information System (INIS)

    Saltelli, Andrea; Sobol', Ilya M

    1995-01-01

    Rank transformations are frequently employed in numerical experiments involving a computational model, especially in the context of sensitivity and uncertainty analyses. Response surface replacement and parameter screening are tasks which may benefit from a rank transformation. Ranks can cope with nonlinear (albeit monotonic) input-output distributions, allowing the use of linear regression techniques. Rank transformed statistics are more robust, and provide a useful solution in the presence of long tailed input and output distributions. As is known to practitioners, care must be employed when interpreting the results of such analyses, as any conclusion drawn using ranks does not translate easily to the original model. In the present note an heuristic approach is taken, to explore, by way of practical examples, the effect of a rank transformation on the outcome of a sensitivity analysis. An attempt is made to identify trends, and to correlate these effects to a model taxonomy. Employing sensitivity indices, whereby the total variance of the model output is decomposed into a sum of terms of increasing dimensionality, we show that the main effect of the rank transformation is to increase the relative weight of the first order terms (the 'main effects'), at the expense of the 'interactions' and 'higher order interactions'. As a result the influence of those parameters which influence the output mostly by way of interactions may be overlooked in an analysis based on the ranks. This difficulty increases with the dimensionality of the problem, and may lead to the failure of a rank based sensitivity analysis. We suggest that the models can be ranked, with respect to the complexity of their input-output relationship, by mean of an 'Association' index I y . I y may complement the usual model coefficient of determination R y 2 as a measure of model complexity for the purpose of uncertainty and sensitivity analysis

  18. The Rigorous Model for Similarity Transformation under Intra-frame and Inter-frame Covariance

    Directory of Open Access Journals (Sweden)

    ZENG Anmin

    2017-01-01

    Full Text Available The coordinates are obtained from observations by using least-squares method, so their precision should be contaminated by observation errors and the covariance also exists between common points and non-common points. The coordinate errors don't only exist in the initial frame but also in the target frame. But the classical stepwise approach for coordinate frame transformation usually takes the coordinate errors of the initial frame into account and overlooks the stochastic correlation between common points and non-common points. A new rigorous unified model is proposed for coordinate frame transformation that takes into account both the errors of all coordinates in both fame and inter-frame coordinate covariance between common points and non-common points, and the corresponding estimator for the transformed coordinates are derived and involve appropriate corrections to the standard approach, in which the transformation parameters and the transformed coordinates for all points are computed in a single-step least squares approach. The inter frame coordinate covariance should be consistent to their uncertainties, but in practice their uncertainties are not consistent. To balance the covariance matrices of both frames, a new adaptive estimator for the unified model is thus derived in which the corresponding adaptive factor is constructed by the ratio computed by Helmert covariance component estimation, reasonable and consistent covariance matrices are arrived through the adjustment of the adaptive factor. Finally, an actual experiments with 2000 points from the crustal movement observation network of China (abbreviated CMONOC is carried out to verify the implement of the new model, the results show that the proposed model can significantly improve the precision of the coordinate transformation.

  19. The patient centered medical home: mental models and practice culture driving the transformation process.

    Science.gov (United States)

    Cronholm, Peter F; Shea, Judy A; Werner, Rachel M; Miller-Day, Michelle; Tufano, Jim; Crabtree, Benjamin F; Gabbay, Robert

    2013-09-01

    The Patient-Centered Medical Home (PCMH) has become a dominant model of primary care re-design. The PCMH model is a departure from more traditional models of healthcare delivery and requires significant transformation to be realized. To describe factors shaping mental models and practice culture driving the PCMH transformation process in a large multi-payer PCMH demonstration project. Individual interviews were conducted at 17 primary care practices in South Eastern Pennsylvania. A total of 118 individual interviews were conducted with clinicians (N = 47), patient educators (N = 4), office administrators (N = 12), medical assistants (N = 26), front office staff (N = 7), nurses (N = 4), care managers (N = 11), social workers (N = 4), and other stakeholders (N = 3). A multi-disciplinary research team used a grounded theory approach to develop the key constructs describing factors shaping successful practice transformation. Three central themes emerged from the data related to changes in practice culture and mental models necessary for PCMH practice transformation: 1) shifting practice perspectives towards proactive, population-oriented care based in practice-patient partnerships; 2) creating a culture of self-examination; and 3) challenges to developing new roles within the practice through distribution of responsibilities and team-based care. The most tension in shifting the required mental models was displayed between clinician and medical assistant participants, revealing significant barriers towards moving away from clinician-centric care. Key factors driving the PCMH transformation process require shifting mental models at the individual level and culture change at the practice level. Transformation is based upon structural and process changes that support orientation of practice mental models towards perceptions of population health, self-assessment, and the development of shared decision-making. Staff buy-in to the new roles

  20. Minimizing bias in biomass allometry: Model selection and log transformation of data

    Science.gov (United States)

    Joseph Mascaro; undefined undefined; Flint Hughes; Amanda Uowolo; Stefan A. Schnitzer

    2011-01-01

    Nonlinear regression is increasingly used to develop allometric equations for forest biomass estimation (i.e., as opposed to the raditional approach of log-transformation followed by linear regression). Most statistical software packages, however, assume additive errors by default, violating a key assumption of allometric theory and possibly producing spurious models....

  1. A thick-interface model for diffusive and massiv phase transformation in substitutional alloys

    Czech Academy of Sciences Publication Activity Database

    Svoboda, Jiří; Vala, J.; Gamsjäger, E.; Fischer, F. D.

    2006-01-01

    Roč. 54, č. 15 (2006), s. 3953-3960 ISSN 1359-6454 R&D Projects: GA AV ČR IAA200410601 Institutional research plan: CEZ:AV0Z20410507 Keywords : phase transformation * diffusion * modelling Subject RIV: JG - Metallurgy Impact factor: 3.549, year: 2006

  2. Realizing joined-up government : Dynamic capabilities and stage models for transformation

    NARCIS (Netherlands)

    Klievink, B.; Janssen, M.

    2009-01-01

    Joining up remains a high priority on the e-government agenda and requires extensive transformation. Stage models are predictable patterns which exist in the growth of organizations and unfold as discrete time periods that result in discontinuity and can help e-government development towards

  3. The Federal Transformation Intervention Model in Persistently Lowest Achieving High Schools: A Mixed-Methods Study

    Science.gov (United States)

    Le Patner, Michelle B.

    2012-01-01

    This study examined the American Recovery and Reinvestment Act federal mandate of the Transformation Intervention Model (TIM) outlined by the School Improvement Grant, which was designed to turn around persistently lowest achieving schools. The study was conducted in four high schools in a large Southern California urban district that selected the…

  4. Educational Transformation in Upper-Division Physics: The Science Education Initiative Model, Outcomes, and Lessons Learned

    Science.gov (United States)

    Chasteen, Stephanie V.; Wilcox, Bethany; Caballero, Marcos D.; Perkins, Katherine K.; Pollock, Steven J.; Wieman, Carl E.

    2015-01-01

    In response to the need for a scalable, institutionally supported model of educational change, the Science Education Initiative (SEI) was created as an experiment in transforming course materials and faculty practices at two institutions--University of Colorado Boulder (CU) and University of British Columbia. We find that this departmentally…

  5. Chemical Transformation System: Cloud Based Cheminformatic Services to Support Integrated Environmental Modeling

    Science.gov (United States)

    Integrated Environmental Modeling (IEM) systems that account for the fate/transport of organics frequently require physicochemical properties as well as transformation products. A myriad of chemical property databases exist but these can be difficult to access and often do not co...

  6. On the transformation of invariance and the exact solutions of the Rabi model

    International Nuclear Information System (INIS)

    Rustamov, K.A.

    1989-12-01

    The transformations of invariance of the Rabi model describing the interaction of the two-level system with the l-mode electromagnetic field are constructed. On this basis the explicit expressions for the coherent states and the Green function of the problem are obtained. (author). 15 refs

  7. IoT in Action: Design and Implementation of a Building Evacuation Service

    Directory of Open Access Journals (Sweden)

    Selahattin Gokceli

    2017-01-01

    Full Text Available With the development of sensor technologies, various application areas have emerged. The usage of these technologies and exploitation of recent improvements have clear benefits on building applications. Such use-cases can improve smart functions of buildings and can increase the end-user comfort. As a similar notion, building automation systems (BAS are smart systems that target to provide automated management of various control services and to improve resource usage efficiency. However, buildings generally contain hardware and control services from a diverse set of characteristics. The automated and central management of such functions can be challenging. In order to overcome such issues, an Emergency Evacuation Service is proposed for BAS, where requirements of such central management model are analyzed and model content and subservice definitions are prepared. A crucial scenario, which could be a necessity for future BAS, is defined and an approach for evacuation of people in the buildings at emergency situations is proposed. For real-life scenarios, the Evacuation Service is implemented by using a low-cost design, which is appropriate for Internet of Things (IoT based BAS applications. As demonstrated, the proposed service model can provide effective performance in real-life deployments.

  8. mfpa: Extension of mfp using the ACD covariate transformation for enhanced parametric multivariable modeling.

    Science.gov (United States)

    Royston, Patrick; Sauerbrei, Willi

    2016-01-01

    In a recent article, Royston (2015, Stata Journal 15: 275-291) introduced the approximate cumulative distribution (acd) transformation of a continuous covariate x as a route toward modeling a sigmoid relationship between x and an outcome variable. In this article, we extend the approach to multivariable modeling by modifying the standard Stata program mfp. The result is a new program, mfpa, that has all the features of mfp plus the ability to fit a new model for user-selected covariates that we call fp1( p 1 , p 2 ). The fp1( p 1 , p 2 ) model comprises the best-fitting combination of a dimension-one fractional polynomial (fp1) function of x and an fp1 function of acd ( x ). We describe a new model-selection algorithm called function-selection procedure with acd transformation, which uses significance testing to attempt to simplify an fp1( p 1 , p 2 ) model to a submodel, an fp1 or linear model in x or in acd ( x ). The function-selection procedure with acd transformation is related in concept to the fsp (fp function-selection procedure), which is an integral part of mfp and which is used to simplify a dimension-two (fp2) function. We describe the mfpa command and give univariable and multivariable examples with real data to demonstrate its use.

  9. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  10. Numerical modelling of tools steel hardening. A thermal phenomena and phase transformations

    Directory of Open Access Journals (Sweden)

    T. Domański

    2010-01-01

    Full Text Available This paper the model hardening of tool steel takes into considerations of thermal phenomena and phase transformations in the solid state are presented. In the modelling of thermal phenomena the heat equations transfer has been solved by Finite Elements Method. The graph of continuous heating (CHT and continuous cooling (CCT considered steel are used in the model of phase transformations. Phase altered fractions during the continuous heating austenite and continuous cooling pearlite or bainite are marked in the model by formula Johnson-Mehl and Avrami. For rate of heating >100 K/s the modified equation Koistinen and Marburger is used. Modified equation Koistinen and Marburger identify the forming fraction of martensite.

  11. Adaptive Neuron Model: An architecture for the rapid learning of nonlinear topological transformations

    Science.gov (United States)

    Tawel, Raoul (Inventor)

    1994-01-01

    A method for the rapid learning of nonlinear mappings and topological transformations using a dynamically reconfigurable artificial neural network is presented. This fully-recurrent Adaptive Neuron Model (ANM) network was applied to the highly degenerate inverse kinematics problem in robotics, and its performance evaluation is bench-marked. Once trained, the resulting neuromorphic architecture was implemented in custom analog neural network hardware and the parameters capturing the functional transformation downloaded onto the system. This neuroprocessor, capable of 10(exp 9) ops/sec, was interfaced directly to a three degree of freedom Heathkit robotic manipulator. Calculation of the hardware feed-forward pass for this mapping was benchmarked at approximately 10 microsec.

  12. Studies of transformational leadership: evaluating two alternative models of trust and satisfaction.

    Science.gov (United States)

    Yang, Yi-Feng

    2014-06-01

    This study evaluates the influence of leadership style and employee trust in their leaders on job satisfaction. 341 personnel (164 men, 177 women; M age = 33.5 yr., SD = 5.1) from four large insurance companies in Taiwan completed the transformational leadership behavior inventory, the leadership trust scale and a short version of the Minnesota (Job) Satisfaction Questionnaire. A bootstrapping mediation and structural equation modeling revealed that the effect of transformational leadership on job satisfaction was mediated by leadership trust. This study highlights the importance of leadership trust in leadership-satisfaction relationships, and provides managers with practical ways to enhance job satisfaction.

  13. Multivariate Calibration and Model Integrity for Wood Chemistry Using Fourier Transform Infrared Spectroscopy

    OpenAIRE

    Zhou, Chengfeng; Jiang, Wei; Cheng, Qingzheng; Via, Brian K.

    2015-01-01

    This research addressed a rapid method to monitor hardwood chemical composition by applying Fourier transform infrared (FT-IR) spectroscopy, with particular interest in model performance for interpretation and prediction. Partial least squares (PLS) and principal components regression (PCR) were chosen as the primary models for comparison. Standard laboratory chemistry methods were employed on a mixed genus/species hardwood sample set to collect the original data. PLS was found to provide bet...

  14. Asset transformation and the challenges to servitize a utility business model

    International Nuclear Information System (INIS)

    Helms, Thorsten

    2016-01-01

    The traditional energy utility business model is under pressure, and energy services are expected to play an important role for the energy transition. Experts and scholars argue that utilities need to innovate their business models, and transform from commodity suppliers to service providers. The transition from a product-oriented, capital-intensive business model based on tangible assets, towards a service-oriented, expense-intensive business model based on intangible assets may present great managerial and organizational challenges. Little research exists about such transitions for capital-intensive commodity providers, and particularly energy utilities, where the challenges to servitize are expected to be greatest. This qualitative paper explores the barriers to servitization within selected Swiss and German utility companies through a series of interviews with utility managers. One of them is ‘asset transformation’, the shift from tangible to intangible assets as major input factor for the value proposition, which is proposed as a driver for the complexity of business model transitions. Managers need to carefully manage those challenges, and find ways to operate both new service and established utility business models aside. Policy makers can support the transition of utilities through more favorable regulatory frameworks for energy services, and by supporting the exchange of knowledge in the industry. - Highlights: •The paper analyses the expected transformation of utilities into service-providers. •Service and utility business models possess very different attributes. •The former is based on intangible, the latter on tangible assets. •The transformation into a service-provider is related with great challenges. •Asset transformation is proposed as a barrier for business model innovation.

  15. Thermal Error Modelling of the Spindle Using Data Transformation and Adaptive Neurofuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Yanlei Li

    2015-01-01

    Full Text Available This paper proposes a new method for predicting spindle deformation based on temperature data. The method introduces the adaptive neurofuzzy inference system (ANFIS, which is a neurofuzzy modeling approach that integrates the kernel and geometrical transformations. By utilizing data transformation, the number of ANFIS rules can be effectively reduced and the predictive model structure can be simplified. To build the predictive model, we first map the original temperature data to a feature space with Gaussian kernels. We then process the mapped data with the geometrical transformation and make the data gather in the square region. Finally, the transformed data are used as input to train the ANFIS. A verification experiment is conducted to evaluate the performance of the proposed method. Six Pt100 thermal resistances are used to monitor the spindle temperature, and a laser displacement sensor is used to detect the spindle deformation. Experimental results show that the proposed method can precisely predict the spindle deformation and greatly improve the thermal performance of the spindle. Compared with back propagation (BP networks, the proposed method is more suitable for complex working conditions in practical applications.

  16. Fault diagnostics in power transformer model winding for different alpha values

    Directory of Open Access Journals (Sweden)

    G.H. Kusumadevi

    2015-09-01

    Full Text Available Transient overvoltages appearing at line terminal of power transformer HV windings can cause failure of winding insulation. The failure can be from winding to ground or between turns or sections of winding. In most of the cases, failure from winding to ground can be detected by changes in the wave shape of surge voltage appearing at line terminal. However, detection of insulation failure between turns may be difficult due to intricacies involved in identifications of faults. In this paper, simulation investigations carried out on a power transformer model winding for identifying faults between turns of winding has been reported. The power transformer HV winding has been represented by 8 sections, 16 sections and 24 sections. Neutral current waveform has been analyzed for same model winding represented by different number of sections. The values of α (‘α’ value is the square root of total ground capacitance to total series capacitance of winding considered for windings are 5, 10 and 20. Standard lightning impulse voltage (1.2/50 μs wave shape have been considered for analysis. Computer simulations have been carried out using software PSPICE version 10.0. Neutral current and frequency response analysis methods have been used for identification of faults within sections of transformer model winding.

  17. A highly efficient transformation protocol for Micro-Tom, a model cultivar for tomato functional genomics.

    Science.gov (United States)

    Sun, Hyeon-Jin; Uchii, Sayaka; Watanabe, Shin; Ezura, Hiroshi

    2006-03-01

    We report a highly efficient protocol for the Agrobacterium-mediated genetic transformation of a miniature dwarf tomato (Lycopersicon esculentum), Micro-Tom, a model cultivar for tomato functional genomics. Cotyledon explants of tomato inoculated with Agrobacterium tumefaciens (Rhizobium radiobacter) C58C1Rif(R) harboring the binary vector pIG121Hm generated a mass of chimeric non-transgenic and transgenic adventitious buds. Repeated shoot elongation from the mass of adventitious buds on selection media resulted in the production of multiple transgenic plants that originated from independent transformation events. The transformation efficiency exceeded 40% of the explants. This protocol could become a powerful tool for functional genomics in tomato.

  18. Source Code Vulnerabilities in IoT Software Systems

    Directory of Open Access Journals (Sweden)

    Saleh Mohamed Alnaeli

    2017-08-01

    Full Text Available An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen that are well-known among research communities to cause potential risks and security concerns, thereby decreasing a system’s robustness and quality. These unsafe statements are banned by many companies (e.g., Microsoft. The use of these commands should be avoided from the start when writing code and should be removed from legacy code over time as recommended by new C/C++ language standards. Each system is analyzed and the distribution of the known unsafe commands is presented. Historical trends in the usage of the unsafe commands of 7 of the systems are presented to show how the studied systems evolved over time with respect to the vulnerable code. The results show that the most prevalent unsafe command used for most systems is memcpy, followed by strlen. These results can be used to help train software developers on secure coding practices so that they can write higher quality software systems.

  19. Comparison research on iot oriented image classification algorithms

    Directory of Open Access Journals (Sweden)

    Du Ke

    2016-01-01

    Full Text Available Image classification belongs to the machine learning and computer vision fields, it aims to recognize and classify objects in the image contents. How to apply image classification algorithms to large-scale data in the IoT framework is the focus of current research. Based on Anaconda, this article implement sk-NN, SVM, Softmax and Neural Network algorithms by Python, performs data normalization, random search, HOG and colour histogram feature extraction to enhance the algorithms, experiments on them in CIFAR-10 datasets, then conducts comparison from three aspects of training time, test time and classification accuracy. The experimental results show that: the vectorized implementation of the algorithms is more efficient than the loop implementation; The training time of k-NN is the shortest, SVM and Softmax spend more time, and the training time of Neural Network is the longest; The test time of SVM, Softmax and Neural Network are much shorter than of k-NN; Neural Network gets the highest classification accuracy, SVM and Softmax get lower and approximate accuracies, and k-NN gets the lowest accuracy. The effects of three algorithm improvement methods are obvious.

  20. Focus on connections for successful organizational transformation to model based engineering

    Science.gov (United States)

    Babineau, Guy L.

    2015-05-01

    Organizational Transformation to a Model Based Engineering Culture is a significant goal for Northrop Grumman Electronic Systems in order to achieve objectives of increased engineering performance. While organizational change is difficult, a focus on connections is creating success. Connections include model to model, program phase to program phase and organization to organization all through Model Based techniques. This presentation will address the techniques employed by Northrop Grumman to achieve these results as well as address continued focus and efforts. Model to model connections are very effective in automating implicit linkages between models for the purpose of ensuring consistency across a set of models and also for rapidly assessing impact of change. Program phase to phase connections are very important for reducing development time as well as reducing potential errors in moving from one program phase to another. Organization to organization communication is greatly facilitated using model based techniques to eliminate ambiguity and drive consistency and reuse.

  1. Micro-Tom Tomato as an Alternative Plant Model System: Mutant Collection and Efficient Transformation.

    Science.gov (United States)

    Shikata, Masahito; Ezura, Hiroshi

    2016-01-01

    Tomato is a model plant for fruit development, a unique feature that classical model plants such as Arabidopsis and rice do not have. The tomato genome was sequenced in 2012 and tomato is becoming very popular as an alternative system for plant research. Among many varieties of tomato, Micro-Tom has been recognized as a model cultivar for tomato research because it shares some key advantages with Arabidopsis including its small size, short life cycle, and capacity to grow under fluorescent lights at a high density. Mutants and transgenic plants are essential materials for functional genomics research, and therefore, the availability of mutant resources and methods for genetic transformation are key tools to facilitate tomato research. Here, we introduce the Micro-Tom mutant database "TOMATOMA" and an efficient transformation protocol for Micro-Tom.

  2. A Modified Approach to Modeling of Diffusive Transformation Kinetics from Nonisothermal Data and Experimental Verification

    Science.gov (United States)

    Chen, Xiangjun; Xiao, Namin; Cai, Minghui; Li, Dianzhong; Li, Guangyao; Sun, Guangyong; Rolfe, Bernard F.

    2016-09-01

    An inverse model is proposed to construct the mathematical relationship between continuous cooling transformation (CCT) kinetics with constant rates and the isothermal one. The kinetic parameters in JMAK equations of isothermal kinetics can be deduced from the experimental CCT kinetics. Furthermore, a generalized model with a new additive rule is developed for predicting the kinetics of nucleation and growth during diffusional phase transformation with arbitrary cooling paths based only on CCT curve. A generalized contribution coefficient is introduced into the new additivity rule to describe the influences of current temperature and cooling rate on the incubation time of nuclei. Finally, then the reliability of the proposed model is validated using dilatometry experiments of a microalloy steel with fully bainitic microstructure based on various cooling routes.

  3. IEEE 802.11ah: A Technology to Face the IoT Challenge

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M. Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-01-01

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm. PMID:27879688

  4. Clustering Approaches for Pragmatic Two-Layer IoT Architecture

    Directory of Open Access Journals (Sweden)

    J. Sathish Kumar

    2018-01-01

    Full Text Available Connecting all devices through Internet is now practical due to Internet of Things. IoT assures numerous applications in everyday life of common people, government bodies, business, and society as a whole. Collaboration among the devices in IoT to bring various applications in the real world is a challenging task. In this context, we introduce an application-based two-layer architectural framework for IoT which consists of sensing layer and IoT layer. For any real-time application, sensing devices play an important role. Both these layers are required for accomplishing IoT-based applications. The success of any IoT-based application relies on efficient communication and utilization of the devices and data acquired by the devices at both layers. The grouping of these devices helps to achieve the same, which leads to formation of cluster of devices at various levels. The clustering helps not only in collaboration but also in prolonging overall network lifetime. In this paper, we propose two clustering algorithms based on heuristic and graph, respectively. The proposed clustering approaches are evaluated on IoT platform using standard parameters and compared with different approaches reported in literature.

  5. Teaching Management System with Applications of RFID and IoT Technology

    Directory of Open Access Journals (Sweden)

    Ping Tan

    2018-02-01

    Full Text Available Currently, Internet of Things (IoT technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.

  6. An IoT virtualization Framework for Fast and Lossless Communication

    DEFF Research Database (Denmark)

    Patil, Sulakshana; Mihovska, Albena D.; Prasad, Ramjee

    2014-01-01

    An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design and evalua......An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design...... and evaluation of a management framework for an IoT scenario. This paper proposes IoT applications and a global framework to improve the applications performance under various practical. The proposed global framework is designed with network of communication systems, in which the communication has to be fast...... enough and lossless. The virtualization of the network allows for low computational complexity and improved processing efficiency. The various contributions have been made in the applications that were found by IoT. The proposed global framework controls data transmission delay, reduces the data loss...

  7. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability.

    Science.gov (United States)

    Jarwar, Muhammad Aslam; Kibria, Muhammad Golam; Ali, Sajjad; Chong, Ilyoung

    2018-01-26

    In the ubiquitous Internet of Things (IoT) environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  8. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  9. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  10. A Self-Learning Sensor Fault Detection Framework for Industry Monitoring IoT

    Directory of Open Access Journals (Sweden)

    Yu Liu

    2013-01-01

    Full Text Available Many applications based on Internet of Things (IoT technology have recently founded in industry monitoring area. Thousands of sensors with different types work together in an industry monitoring system. Sensors at different locations can generate streaming data, which can be analyzed in the data center. In this paper, we propose a framework for online sensor fault detection. We motivate our technique in the context of the problem of the data value fault detection and event detection. We use the Statistics Sliding Windows (SSW to contain the recent sensor data and regress each window by Gaussian distribution. The regression result can be used to detect the data value fault. Devices on a production line may work in different workloads and the associate sensors will have different status. We divide the sensors into several status groups according to different part of production flow chat. In this way, the status of a sensor is associated with others in the same group. We fit the values in the Status Transform Window (STW to get the slope and generate a group trend vector. By comparing the current trend vector with history ones, we can detect a rational or irrational event. In order to determine parameters for each status group we build a self-learning worker thread in our framework which can edit the corresponding parameter according to the user feedback. Group-based fault detection (GbFD algorithm is proposed in this paper. We test the framework with a simulation dataset extracted from real data of an oil field. Test result shows that GbFD detects 95% sensor fault successfully.

  11. Ultrasound elastography: efficient estimation of tissue displacement using an affine transformation model

    Science.gov (United States)

    Hashemi, Hoda Sadat; Boily, Mathieu; Martineau, Paul A.; Rivaz, Hassan

    2017-03-01

    Ultrasound elastography entails imaging mechanical properties of tissue and is therefore of significant clinical importance. In elastography, two frames of radio-frequency (RF) ultrasound data that are obtained while the tissue is undergoing deformation, and the time-delay estimate (TDE) between the two frames is used to infer mechanical properties of tissue. TDE is a critical step in elastography, and is challenging due to noise and signal decorrelation. This paper presents a novel and robust technique TDE using all samples of RF data simultaneously. We assume tissue deformation can be approximated by an affine transformation, and hence call our method ATME (Affine Transformation Model Elastography). The affine transformation model is utilized to obtain initial estimates of axial and lateral displacement fields. The affine transformation only has six degrees of freedom (DOF), and as such, can be efficiently estimated. A nonlinear cost function that incorporates similarity of RF data intensity and prior information of displacement continuity is formulated to fine-tune the initial affine deformation field. Optimization of this function involves searching for TDE of all samples of the RF data. The optimization problem is converted to a sparse linear system of equations, which can be solved in real-time. Results on simulation are presented for validation. We further collect RF data from in-vivo patellar tendon and medial collateral ligament (MCL), and show that ATME can be used to accurately track tissue displacement.

  12. Transformational leadership and organizational citizenship behavior: Modeling emotional intelligence as mediator

    Directory of Open Access Journals (Sweden)

    Majeed Nauman

    2017-12-01

    Full Text Available Leadership and organizational citizenship behavior (OCB stayed at pinnacle in the arena of organizational behavior research since decades and has attained significant consideration of scholars pursuing to define multifaceted dynamics of leadership and their influence on follower’s behavior at work. The voluntary behavior of Organizational citizenship improves organizational effectiveness, and it goes beyond formal job duties. This study attempts to explore the association amongst transformational leadership and organizational citizenship behavior of teachers in public sector higher education institutions in Pakistan. Study of organizational citizenship behavior in educational organizations and academicians is of high value that definitely requires attention. This study examines the direct and indirect influence of transformational leadership through exploring the mediating role of emotional intelligence. The model was tested by employing structural equation modelling technique on survey responses collected from academicians. Results from 220 responses indicated that relationship between transformational leadership and Organizational Citizenship Behavior is statistically significant where Emotional Intelligence plays an important role as a mediator. The results support and add to the positive effects of transformational leadership style interconnected with extra role behavior at work making it more meaningful. The findings make a significant contribution to leadership and organizational behavior literature in higher education sector and propose that organizations should implement practices that help in enhancing the level of organizational citizenship behavior in organizations.

  13. Recent Developments of the Local Effect Model (LEM) - Implications of clustered damage on cell transformation

    Science.gov (United States)

    Elsässer, Thilo

    Exposure to radiation of high-energy and highly charged ions (HZE) causes a major risk to human beings, since in long term space explorations about 10 protons per month and about one HZE particle per month hit each cell nucleus (1). Despite the larger number of light ions, the high ionisation power of HZE particles and its corresponding more complex damage represents a major hazard for astronauts. Therefore, in order to get a reasonable risk estimate, it is necessary to take into account the entire mixed radiation field. Frequently, neoplastic cell transformation serves as an indicator for the oncogenic potential of radiation exposure. It can be measured for a small number of ion and energy combinations. However, due to the complexity of the radiation field it is necessary to know the contribution to the radiation damage of each ion species for the entire range of energies. Therefore, a model is required which transfers the few experimental data to other particles with different LETs. We use the Local Effect Model (LEM) (2) with its cluster extension (3) to calculate the relative biological effectiveness (RBE) of neoplastic transformation. It was originally developed in the framework of hadrontherapy and is applicable for a large range of ions and energies. The input parameters for the model include the linear-quadratic parameters for the induction of lethal events as well as for the induction of transformation events per surviving cell. Both processes of cell inactivation and neoplastic transformation per viable cell are combined to eventually yield the RBE for cell transformation. We show that the Local Effect Model is capable of predicting the RBE of neoplastic cell transformation for a broad range of ions and energies. The comparison of experimental data (4) with model calculations shows a reasonable agreement. We find that the cluster extension results in a better representation of the measured RBE values. With this model it should be possible to better

  14. Wireless Sensors and IoT Platform for Intelligent HVAC Control

    Directory of Open Access Journals (Sweden)

    António Ruano

    2018-03-01

    Full Text Available Energy consumption of buildings (residential and non-residential represents approximately 40% of total world electricity consumption, with half of this energy consumed by HVAC systems. Model-Based Predictive Control (MBPC is perhaps the technique most often proposed for HVAC control, since it offers an enormous potential for energy savings. Despite the large number of papers on this topic during the last few years, there are only a few reported applications of the use of MBPC for existing buildings, under normal occupancy conditions and, to the best of our knowledge, no commercial solution yet. A marketable solution has been recently presented by the authors, coined the IMBPC HVAC system. This paper describes the design, prototyping and validation of two components of this integrated system, the Self-Powered Wireless Sensors and the IOT platform developed. Results for the use of IMBPC in a real building under normal occupation demonstrate savings in the electricity bill while maintaining thermal comfort during the whole occupation schedule.

  15. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-12-01

    Full Text Available This paper highlights three critical aspects of the internet of things (IoTs, namely (1 energy efficiency, (2 energy balancing and (3 quality of service (QoS and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  16. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-12-02

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  17. Fostering business and software ecosystems for large-scale uptake of IoT in food and farming

    NARCIS (Netherlands)

    Verdouw, C.N.; Wolfert, J.; Beers, G.; Sundmaeker, Harald; Chatzikostas, Grigoris

    2017-01-01

    The Internet of Things (IoT) is expected to be a real game changer that will drastically improve productivity and sustainability in food and farming. However, current IoT applications in this domain are still fragmentary and mainly used by a small group of early adopters. The Internet of Food and

  18. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-01-01

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones. PMID:27918424

  19. Make2Learn with IoT: Engaging children into joyful design and making of interactive connected objects

    DEFF Research Database (Denmark)

    Divitini, Monica; Giannakos, Michail; Mora, Simone

    2017-01-01

    The Make2Learn workshop aims to explore the introduction in the learning processes of tools and methods for creative and joyful ideation, design and prototyping of Internet of Things (IoT) artifacts. IoT technologies offer opportunities to re-think everyday objects towards being more engaging...

  20. MANER : Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper, we introduce dual radio based IoT network architecture for wildlife monitoring system (WMS). This solution will facilitate an IoT devices to be deployed for sustainable wildlife monitoring applications. In addition we present MANER, a managed data dissemination scheme for WMS. In

  1. Improved virtual channel noise model for transform domain Wyner-Ziv video coding

    DEFF Research Database (Denmark)

    Huang, Xin; Forchhammer, Søren

    2009-01-01

    Distributed video coding (DVC) has been proposed as a new video coding paradigm to deal with lossy source coding using side information to exploit the statistics at the decoder to reduce computational demands at the encoder. A virtual channel noise model is utilized at the decoder to estimate...... the noise distribution between the side information frame and the original frame. This is one of the most important aspects influencing the coding performance of DVC. Noise models with different granularity have been proposed. In this paper, an improved noise model for transform domain Wyner-Ziv video...

  2. Modeling the Pulse Signal by Wave-Shape Function and Analyzing by Synchrosqueezing Transform.

    Directory of Open Access Journals (Sweden)

    Hau-Tieng Wu

    Full Text Available We apply the recently developed adaptive non-harmonic model based on the wave-shape function, as well as the time-frequency analysis tool called synchrosqueezing transform (SST to model and analyze oscillatory physiological signals. To demonstrate how the model and algorithm work, we apply them to study the pulse wave signal. By extracting features called the spectral pulse signature, and based on functional regression, we characterize the hemodynamics from the radial pulse wave signals recorded by the sphygmomanometer. Analysis results suggest the potential of the proposed signal processing approach to extract health-related hemodynamics features.

  3. On phase transformation models for thermo-mechanically coupled response of Nitinol

    KAUST Repository

    Sengupta, Arkaprabha

    2011-03-31

    Fully coupled thermomechanical models for Nitinol at the grain level are developed in this work to capture the inter-dependence between deformation and temperature under non-isothermal conditions. The martensite transformation equations are solved using a novel algorithm which imposes all relevant constraints on the volume fractions. The numerical implementation of the resulting models within the finite element method is effected by the monolithic solution of the momentum and energy equations. Validation of the models is achieved by means of thin-tube experiments at different strain rates. © 2011 Springer-Verlag.

  4. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  5. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  6. Transformative Learning Model for Youth Life Skills Entrepreneurs in Poor Weavers Songket Palembang

    Directory of Open Access Journals (Sweden)

    Ayi Olim

    2015-05-01

    Full Text Available Non-formal education serves to develop the potential of students with an emphasis on the mastery of knowledge and functional skills and professional attitude and personality development, is now understood as an alternative approach to the future education with an emphasis on the mastery of skills. transformative learning, life skills and entrepreneurship as a modality of model development. learner/ prospective participants learn from the lower-middle group (in the shadow of the transmission of learning should be the owner of the learning process and should be able to identify the capabilities and environmental problems, reflect and take action in developing entrepreneurial abilities. The model requires changing patterns of transformative learning and utilization participants life skills learning, facilitation and management support from stakeholders

  7. Minimal models from W-constrained hierarchies via the Kontsevich-Miwa transform

    CERN Document Server

    Gato-Rivera, Beatriz

    1992-01-01

    A direct relation between the conformal formalism for 2d-quantum gravity and the W-constrained KP hierarchy is found, without the need to invoke intermediate matrix model technology. The Kontsevich-Miwa transform of the KP hierarchy is used to establish an identification between W constraints on the KP tau function and decoupling equations corresponding to Virasoro null vectors. The Kontsevich-Miwa transform maps the $W^{(l)}$-constrained KP hierarchy to the $(p^\\prime,p)$ minimal model, with the tau function being given by the correlator of a product of (dressed) $(l,1)$ (or $(1,l)$) operators, provided the Miwa parameter $n_i$ and the free parameter (an abstract $bc$ spin) present in the constraints are expressed through the ratio $p^\\prime/p$ and the level $l$.

  8. Astronauts and IoT: Toward True Human-Autonomy Teaming

    Science.gov (United States)

    Vera, Alonso

    2016-01-01

    Advances in the area of Internet of Things (IoT) or Cyber-Physical Systems will have a significant impact on many areas of human activity and commercial/technological development. One application of importance to NASA is the need to make crews on deep space missions more independent from earth in both their routine activities and handling of unexpected events. IoT will allow increasingly intelligent systems to be aware of what humans are doing, what tools/resources they are using, and what help they might need in terms of procedure execution in tasks such as assembly, maintenance, repair, and perhaps even in more complex activities like medical interventions. This talk focuses on the convergence of research and technologies that will be needed to effect such intelligent systems based on IoT.

  9. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  10. High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

    Directory of Open Access Journals (Sweden)

    Sal vatore Gaglio

    2015-05-01

    Full Text Available While the vision of Internet of Things (IoT is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but e ective paradigm of executable code exchange among nodes. In this paper, we show how our methodology can be used to provide IoT resource constrained devices with reasoning abilities by implementing a Fuzzy Logic symbolic extension on deployed nodes at runtime.

  11. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  12. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availa...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices.......The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...

  13. First Results of the IOT Based 300 kW 500 MHz Amplifier for the Diamond Light Source

    CERN Document Server

    Jensen, Morten; Maddock, Matt; Müller, Marc; Rains, Simon; Watkins, Alun V

    2005-01-01

    We present the first RF measurements of the IOT based 300 kW 500 MHz amplifier for the Diamond Light Source. Four 80 kW IOTs are combined using a waveguide combiner to achieve the RF requirement of up to 300 kW for each of three superconducting cavities for the main storage ring. The IOTs are protected by a full power circulator and a 300 kW ferrite RF load. This is the first time IOTs will be used for a synchrotron light source. This paper gives an overview of the design of the Thales amplifiers and IOTs with commissioning results including measurements of key components and overall RF performance following factory tests and the installation of the first unit

  14. Smart Garbage Based on Internet of Things (IoT)

    Science.gov (United States)

    Joni, K.; Haryanto; Rohim, D. F.

    2018-01-01

    Trash is one of serious problems in Indonesia. It leads to another problems which deal with social, culture and economic, most of cities inindonesia have some problems in managing the trush. It is because the government doesn’t have the standard of trash management. The schedule to take the trash usually discover a problems with a lateness. The lack of trashmanagement and people’s habbit who don’t care about the trash impact effect to more serious problems that dealwith the trash. Such as, enviromental problems. Based on the problems the researcher makes a system called “Smart Garbage Based On Internet of things”. The system applies the technology of temporary garbage used internal system. This system creates in order to fix the problem of punctuality. Which makes the trash management more effective and afficient. The process of uploading the information in the internal awerness of based on the “real time” ativity this system can increase the peurity and health. Because the trash is controlled and not aculamulated arround people. The ultrasonic sensor and nodeMCU are used as a module of IoT to discover the temporary garbage. Grapical user Interface dekstop and android are also used in order to observe the level of trash in temporary garbage. The notification system can be access in mobile and dekstop interface. Furthermore the temporary garbage location can find by using google map the result of research shows that the system is running well. The system can onilne 12 hours/day along 2 weeks in exsperiment. The data sent by online based on “real time” activity and the result of mapping and tracking on android show the location of garbage.

  15. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  16. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  17. Protein structure analysis using the resonant recognition model and wavelet transforms

    Energy Technology Data Exchange (ETDEWEB)

    Fang, Q.; Cosic, I. [Monash University, Caulfield Campus, Melbourne, VIC (Australia). BioElectronic Group, Department of Electrical and Computer System Engineering

    1998-12-01

    An approach based on the resonant recognition model and the discrete wavelet transform is introduced here for characterising proteins` biological function. The protein sequence is converted into a numerical series by assigning the electron-ion interaction potential to each amino acid from N-terminal to C-terminal. A set of peaks is found after performing a wavelet transform onto a numerical series representing a group of homologous proteins. These peaks are related to protein structural and functional properties and named characteristic vector of that protein group. Further more, the amino acids contributing mostly to a protein`s biological functions, the so-called `hot spots` amino acids, are predicted by the continuous wavelet transform. It is found that the hot spots are clustered around the protein`s cleft structure. The wavelets approach provides a novel methods for amino acid sequence analysis as well as an expansion for the newly established macromolecular interaction model: the resonant recognition model. Copyright (1998) Australasian Physical and Engineering Sciences in Medicine 19 refs., 2 tab., 7 figs.

  18. Volatility forecasting with the wavelet transformation algorithm GARCH model: Evidence from African stock markets

    Directory of Open Access Journals (Sweden)

    Mohd Tahir Ismail

    2016-06-01

    Full Text Available The daily returns of four African countries' stock market indices for the period January 2, 2000, to December 31, 2014, were employed to compare the GARCH(1,1 model and a newly proposed Maximal Overlap Discreet Wavelet Transform (MODWT-GARCH(1,1 model. The results showed that although both models fit the returns data well, the forecast produced by the GARCH(1,1 model underestimates the observed returns whereas the newly proposed MODWT-GARCH(1,1 model generates an accurate forecast value of the observed returns. The results generally showed that the newly proposed MODWT-GARCH(1,1 model best fits returns series for these African countries. Hence the proposed MODWT-GARCH should be applied on other context to further verify its validity.

  19. Collaborative Proposal: Transforming How Climate System Models are Used: A Global, Multi-Resolution Approach

    Energy Technology Data Exchange (ETDEWEB)

    Estep, Donald

    2013-04-15

    Despite the great interest in regional modeling for both weather and climate applications, regional modeling is not yet at the stage that it can be used routinely and effectively for climate modeling of the ocean. The overarching goal of this project is to transform how climate models are used by developing and implementing a robust, efficient, and accurate global approach to regional ocean modeling. To achieve this goal, we will use theoretical and computational means to resolve several basic modeling and algorithmic issues. The first task is to develop techniques for transitioning between parameterized and high-fidelity regional ocean models as the discretization grid transitions from coarse to fine regions. The second task is to develop estimates for the error in scientifically relevant quantities of interest that provide a systematic way to automatically determine where refinement is needed in order to obtain accurate simulations of dynamic and tracer transport in regional ocean models. The third task is to develop efficient, accurate, and robust time-stepping schemes for variable spatial resolution discretizations used in regional ocean models of dynamics and tracer transport. The fourth task is to develop frequency-dependent eddy viscosity finite element and discontinuous Galerkin methods and study their performance and effectiveness for simulation of dynamics and tracer transport in regional ocean models. These four projects share common difficulties and will be approach using a common computational and mathematical toolbox. This is a multidisciplinary project involving faculty and postdocs from Colorado State University, Florida State University, and Penn State University along with scientists from Los Alamos National Laboratory. The completion of the tasks listed within the discussion of the four sub-projects will go a long way towards meeting our goal of developing superior regional ocean models that will transform how climate system models are used.

  20. Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision

    DEFF Research Database (Denmark)

    Lynggaard, Per; Skouby, Knud Erik

    2016-01-01

    The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world’s population will live their lives in smart homes and in smart cities...... the “smart” vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the “big challenges” and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits...

  1. Estrategias de IOT para lograr ciudades digitales seguras, más inclusivas y sustentables

    OpenAIRE

    Díaz, Francisco Javier; Venosa, Paula; Fava, Laura Andrea; Castro, Néstor; Vilches Antão, Diego Gastón; López, Fernando Esteban Mariano

    2017-01-01

    El término "smart cities" -ciudades inteligentes-, es más que una frase de moda: es una de las tendencias más desafiantes vinculada a otro concepto actual "Internet de las cosas" o simplemente IoT. El término IoT se refiere generalmente a escenarios donde la capacidad de cómputo y la conectividad de las redes se extienden a objetos, sensores y elementos cotidianos - no computadoras personales-, permitiendo que estos dispositivos generen, intercambien y consuman datos. En todo el mundo, más...

  2. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.

    Science.gov (United States)

    Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong

    2018-03-23

    It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.

  3. Remote Agriculture Automation using Wireless Link and IoT Gateway Infrastructure

    DEFF Research Database (Denmark)

    Nakutis, Z.; Deksnys, V.; Jaurusevicius, I.

    2015-01-01

    The publication presents a system architecture for remote agriculture process automation, involving sensors and actuators connected to IoT gateway running OPC UA server. Sensors and actuators are very general and do not need any intelligence related to the process under control. Acquired data....../actuators. Throughput of data collection channel (long range radio) and IoT gateway performance are limiting factors for real time control or observation of agriculture processes. Therefore, achievable channel "sensors-OPC UA server" throughput is investigated experimentally. Potential agriculture applications that may...

  4. Development of ship structure health monitoring system based on IOT technology

    Science.gov (United States)

    Yang, Sujun; Shi, Lei; Chen, Demin; Dong, Yuqing; Hu, Zhenyi

    2017-06-01

    It is very important to monitor the ship structure, because ships are affected by all kinds of wind wave and current environment factor. At the same time, internet of things (IOT) technology plays more and more important role of in the development of industrial process. In the paper, real-time online monitoring of the ship can be realized by means of IOT technology. Ship stress, vibration and dynamic parameters are measured. Meanwhile, data is transmitted to remote monitoring system through intelligent data gateway. Timely remote support can be realized for dangerous stage of ship. Safe navigation of ships is guaranteed through application of the system.

  5. An Open Virtual Neighbourhood Network to Connect IoT Infrastructures and Smart Objects – VICINITY

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2017-01-01

    The lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of isolated islands that do...... not constitute a real Internet, preventing the exploitation of the huge potential expected by Information and communications technology (ICT) visionaries and unfolding business opportunities facilitated by digitalization and automation. The VICINITY project will build and demonstrate a platform linking various...

  6. Using Internet of Things (IoT) technology to study environmental processes

    Science.gov (United States)

    Martinez, Kirk; Hart, Jane; Black, Andrew; Blagg, Olivia

    2016-04-01

    The Internet of Things is a term which has emerged to describe the increase of Internet connectivity of everyday objects. While wireless sensor networks have developed highly energy efficient designs they need a step-change in their interoperability and usability to become essential tools in the study of our environment. We discuss the design, deployment and results from an IoT system installed on the Cairngorm Plateau, Scotland. This is a fragile remote environment, which provides an ideal location to test IoT techniques. We have investigated cryospheric, hydrologic and ecological processes, and we report our preliminary findings.

  7. Development and Validation of a Materials Preparation Model from the Perspective of Transformative Pedagogy

    Directory of Open Access Journals (Sweden)

    Hamed Barjesteh

    2015-12-01

    Full Text Available This study is a report on the design, development, and validation of a model within the main tenets of critical pedagogy (CP with a hope to implement in education in general and applied linguistics in particular. To develop a transformative L2 materials preparation (TLMP model, the researchers drew on Crawford’s (1978 principles of CP as a springboard. These principles provide the theoretical framework of the ELT program in general, but they need to be adapted to the specific features of L2 materials development. To this end, Nation and Macalister’s (2010 model of materials development were utilized to base different aspects of materials preparation. The newly developed model has driven 22 principles which was validated through a stepwise process. It was administered among 110 participants in 15 cities of Iran. Exploratory and confirmatory factor analyses were performed. The results indicated a high level of internal consistency and satisfactory construct validity. The TLMP model could be conducive for language policy makers, ELT professionals, materials and curriculum developers. Keywords: Critical pedagogy, materials development, transformative model, ELT community, development, validation

  8. A High-Rate, Single-Crystal Model including Phase Transformations, Plastic Slip, and Twinning

    Energy Technology Data Exchange (ETDEWEB)

    Addessio, Francis L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Theoretical Division; Bronkhorst, Curt Allan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Theoretical Division; Bolme, Cynthia Anne [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Explosive Science and Shock Physics Division; Brown, Donald William [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Materials Science and Technology Division; Cerreta, Ellen Kathleen [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Materials Science and Technology Division; Lebensohn, Ricardo A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Materials Science and Technology Division; Lookman, Turab [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Theoretical Division; Luscher, Darby Jon [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Theoretical Division; Mayeur, Jason Rhea [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Theoretical Division; Morrow, Benjamin M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Materials Science and Technology Division; Rigg, Paulo A. [Washington State Univ., Pullman, WA (United States). Dept. of Physics. Inst. for Shock Physics

    2016-08-09

    An anisotropic, rate-­dependent, single-­crystal approach for modeling materials under the conditions of high strain rates and pressures is provided. The model includes the effects of large deformations, nonlinear elasticity, phase transformations, and plastic slip and twinning. It is envisioned that the model may be used to examine these coupled effects on the local deformation of materials that are subjected to ballistic impact or explosive loading. The model is formulated using a multiplicative decomposition of the deformation gradient. A plate impact experiment on a multi-­crystal sample of titanium was conducted. The particle velocities at the back surface of three crystal orientations relative to the direction of impact were measured. Molecular dynamics simulations were conducted to investigate the details of the high-­rate deformation and pursue issues related to the phase transformation for titanium. Simulations using the single crystal model were conducted and compared to the high-­rate experimental data for the impact loaded single crystals. The model was found to capture the features of the experiments.

  9. A nitrogen transformation model for multi-layer enhanced groundwater remediation technology.

    Science.gov (United States)

    Yang, Yu; Ma, Zhifei; Jiang, Yonghai; Lian, Xinying; Xi, Beidou; Pei, Yu

    2017-09-19

    The multi-layer enhanced groundwater remediation technology (MET) is an innovative platform that integrates physical chemistry, bioremediation, and phytoremediation technology to safely and effectively remediate ammonia nitrogen in groundwater. A nitrogen transformation model was established to study the mechanism of nitrogen transformation within ammonia nitrogen removal in the MET. The model considered organic nitrogen, ammonia nitrogen, and nitrate nitrogen as the variables, and ammonification, nitrification, denitrification, microbial assimilation, plant absorption, adsorption-desorption, and volatilization as the influencing factors. The unknown parameters of the model were obtained by fitting the data from a bench-scale experiment, and the results of the model validation and comparison showed that under the experimental initial conditions (the hydraulic load of the influent is 14.68 m 3 /(m 2  d) and the concentration of the ammonia nitrogen is 25.0 mg/L) and after the device ran for 45d continuously, the simulated and measured average concentration values of ammonia nitrogen in the effluent were 1.701 mg/L and 1.775 m/L, respectively, and the relative deviation was 4.17%. The simulated and measured average concentration values of nitrate nitrogen in effluent were 11.474 mg/L and 11.244 m/L, respectively, and the relative deviation was 2.05%, and the total removal rate was 92.07%. Thus it can be seen that the predicted values of the nitrogen transformation model were in good agreement with the measured values, and the model could be applied to forecast the long-term remediation effects of nitrogen in groundwater by MET.

  10. A High-Resolution Model of Water Mass Transformation and Transport in the Weddell Sea

    Science.gov (United States)

    Hazel, J.; Stewart, A.

    2016-12-01

    The ocean circulation around the Antarctic margins has a pronounced impact on the global ocean and climate system. One of these impacts includes closing the global meridional overturning circulation (MOC) via formation of dense Antarctic Bottom Water (AABW), which ventilates a large fraction of the subsurface ocean. AABW is also partially composed of modified Circumpolar Deep Water (CDW), a warm, mid-depth water mass whose transport towards the continent has the potential to induce rapid retreat of marine-terminating glaciers. Previous studies suggest that these water mass exchanges may be strongly influenced by high-frequency processes such as downslope gravity currents, tidal flows, and mesoscale/submesoscale eddy transport. However, evaluating the relative contributions of these processes to near-Antarctic water mass transports is hindered by the region's relatively small scales of motion and the logistical difficulties in taking measurements beneath sea ice.In this study we develop a regional model of the Weddell Sea, the largest established source of AABW. The model is forced by an annually-repeating atmospheric state constructed from the Antarctic Mesoscale Prediction System data and by annually-repeating lateral boundary conditions constructed from the Southern Ocean State Estimate. The model incorporates the full Filchner-Ronne cavity and simulates the thermodynamics and dynamics of sea ice. To analyze the role of high-frequency processes in the transport and transformation of water masses, we compute the model's overturning circulation, water mass transformations, and ice sheet basal melt at model horizontal grid resolutions ranging from 1/2 degree to 1/24 degree. We temporally decompose the high-resolution (1/24 degree) model circulation into components due to mean, eddy and tidal flows and discuss the geographical dependence of these processes and their impact on water mass transformation and transport.

  11. Spatially-Explicit Bayesian Information Entropy Metrics for Calibrating Landscape Transformation Models

    Directory of Open Access Journals (Sweden)

    Kostas Alexandridis

    2013-06-01

    Full Text Available Assessing spatial model performance often presents challenges related to the choice and suitability of traditional statistical methods in capturing the true validity and dynamics of the predicted outcomes. The stochastic nature of many of our contemporary spatial models of land use change necessitate the testing and development of new and innovative methodologies in statistical spatial assessment. In many cases, spatial model performance depends critically on the spatially-explicit prior distributions, characteristics, availability and prevalence of the variables and factors under study. This study explores the statistical spatial characteristics of statistical model assessment of modeling land use change dynamics in a seven-county study area in South-Eastern Wisconsin during the historical period of 1963–1990. The artificial neural network-based Land Transformation Model (LTM predictions are used to compare simulated with historical land use transformations in urban/suburban landscapes. We introduce a range of Bayesian information entropy statistical spatial metrics for assessing the model performance across multiple simulation testing runs. Bayesian entropic estimates of model performance are compared against information-theoretic stochastic entropy estimates and theoretically-derived accuracy assessments. We argue for the critical role of informational uncertainty across different scales of spatial resolution in informing spatial landscape model assessment. Our analysis reveals how incorporation of spatial and landscape information asymmetry estimates can improve our stochastic assessments of spatial model predictions. Finally our study shows how spatially-explicit entropic classification accuracy estimates can work closely with dynamic modeling methodologies in improving our scientific understanding of landscape change as a complex adaptive system and process.

  12. Differential Transform Method for Mathematical Modeling of Jamming Transition Problem in Traffic Congestion Flow

    DEFF Research Database (Denmark)

    Ganji, S.; Barari, Amin; Ibsen, Lars Bo

    2012-01-01

    . In current research the authors utilized the Differential Transformation Method (DTM) for solving the nonlinear problem and compared the analytical results with those ones obtained by the 4th order Runge-Kutta Method (RK4) as a numerical method. Further illustration embedded in this paper shows the ability...... of DTM in solving nonlinear problems when a so accurate solution is required.......In this paper we aim to find an analytical solution for jamming transition in traffic flow. Generally the Jamming Transition Problem (JTP) can be modeled via Lorentz system. So, in this way, the governing differential equation achieved is modeled in the form of a nonlinear damped oscillator...

  13. Differential Transform Method for Mathematical Modeling of Jamming Transition Problem in Traffic Congestion Flow

    DEFF Research Database (Denmark)

    Ganji, S. S.; Barari, Amin; Ibsen, Lars Bo

    2010-01-01

    . In current research the authors utilized the Differential Transformation Method (DTM) for solving the nonlinear problem and compared the analytical results with those ones obtained by the 4th order Runge-Kutta Method (RK4) as a numerical method. Further illustration embedded in this paper shows the ability...... of DTM in solving nonlinear problems when a so accurate solution is required.......In this paper we aim to find an analytical solution for jamming transition in traffic flow. Generally the Jamming Transition Problem (JTP) can be modeled via Lorentz system. So, in this way, the governing differential equation achieved is modeled in the form of a nonlinear damped oscillator...

  14. On estimation of linear transformation models with nested case-control sampling.

    Science.gov (United States)

    Lu, Wenbin; Liu, Mengling

    2012-01-01

    Nested case-control (NCC) sampling is widely used in large epidemiological cohort studies for its cost effectiveness, but its data analysis primarily relies on the Cox proportional hazards model. In this paper, we consider a family of linear transformation models for analyzing NCC data and propose an inverse selection probability weighted estimating equation method for inference. Consistency and asymptotic normality of our estimators for regression coefficients are established. We show that the asymptotic variance has a closed analytic form and can be easily estimated. Numerical studies are conducted to support the theory and an application to the Wilms' Tumor Study is also given to illustrate the methodology.

  15. Application of a partnership model for transformative and sustainable international development.

    Science.gov (United States)

    Powell, Dorothy L; Gilliss, Catherine L; Hewitt, Hermi H; Flint, Elizabeth P

    2010-01-01

    There are differences of intent and impact between short-term and long-term engagement of U.S. academic institutions with communities of need in developing nations. Global health programs that produce long-term transformative change rather than transient relief are more likely to be sustainable and in ethical harmony with expressed needs of a region or community. This article explores characteristics of successful ethical partnerships in global health and the challenges that threaten them, introducing a consensus community engagement model as a framework for building relationships, evolving an understanding of needs, and collaboratively developing solutions and responses to priority health needs in underserved regions of the world. The community engagement model is applied to a case study of an initiative by a U.S. school of nursing to establish long-term relationships with the nursing community in the Caribbean region with the goal of promoting transformative change through collaborative development of programs and services addressing health care needs of the region's growing elderly population and the increasing prevalence of noncommunicable chronic diseases. Progress of this ongoing long-term relationship is analyzed in the context of the organizational, philosophical, ethical, and resource commitments embodied in this approach to initiation of transformative and sustainable improvements in public health.

  16. A modelling of AC voltage stabilizer based on a hybrid transformer with matrix converter

    Directory of Open Access Journals (Sweden)

    Szcześniak Paweł

    2017-06-01

    Full Text Available This article presents a study of an AC voltage stabilizer based on a three-phase hybrid transformer combined with a matrix converter. The proposed solution is used to control AC voltage amplitude and phase shift. By adjustment of these voltage parameters we can reduce the effects of overvoltage, voltage dips or lamp flicker. Such negative phenomena are very significant, particularly from the perspective of the final consumer and sensitive loads connected to the power network. Often the voltage in the power system can be adjusted using a mechanical or thyristor controlled regulator, which in a stepwise manner switches the taps of the electromagnetic transformer. The method for obtaining continuous control of the voltage magnitude and phase shift with the use of a conventional transformer with two output windings and a matrix converter is presented in this paper. The operating principles, mathematical model and properties of the proposed voltage stabilizers are discussed in this paper. The main part of the article will be devoted to the mathematical model which is based on an averaged equation. Computer simulation results are presented and compared with the results of a mathematical study.

  17. Policy insights from the nutritional food market transformation model: the case of obesity prevention.

    Science.gov (United States)

    Struben, Jeroen; Chan, Derek; Dubé, Laurette

    2014-12-01

    This paper presents a system dynamics policy model of nutritional food market transformation, tracing over-time interactions between the nutritional quality of supply, consumer food choice, population health, and governmental policy. Applied to the Canadian context and with body mass index as the primary outcome, we examine policy portfolios for obesity prevention, including (1) industry self-regulation efforts, (2) health- and nutrition-sensitive governmental policy, and (3) efforts to foster health- and nutrition-sensitive innovation. This work provides novel theoretical and practical insights on drivers of nutritional market transformations, highlighting the importance of integrative policy portfolios to simultaneously shift food demand and supply for successful and self-sustaining nutrition and health sensitivity. We discuss model extensions for deeper and more comprehensive linkages of nutritional food market transformation with supply, demand, and policy in agrifood and health/health care. These aim toward system design and policy that can proactively, and with greater impact, scale, and resilience, address single as well as double malnutrition in varying country settings. © 2014 New York Academy of Sciences.

  18. Micro-thermomechanical constitutive model of transformation induced plasticity and its application on armour steel

    International Nuclear Information System (INIS)

    Sun, C.Y.; Fang, G.; Lei, L.P.; Zeng, P.

    2009-01-01

    Based on the crystallographic theory of martensitic transformation and internal variable constitutive theory, a micromechanical constitutive model of martensitic transformation induced plasticity was developed. Plastic strains of product and parent phases as well as the volume fraction of each martensitic variant were considered as internal variables describing the microstructure evolution. The plasticity flow both in austenite and martensitic variants domain is described by J 2 flow theory. The thermodynamic driving force acting on these internal variables was obtained through the determination of the intrinsic dissipation due to plastic flow and the growth of martensitic domains. The evolution laws of the internal variables are derived, furthermore macroscopic response due to the change of internal variables is obtained. Thermomechanical behavior of armour steel under uniaxial loading was tested which showed a good agreement with experimental results

  19. Constitutive Model Of Graded Micro-Structure Obtained Via Strain Induced Phase Transformation

    CERN Document Server

    Ortwein, Rafał

    The literature review has been divided into three main sub-chapters. The first one is concentrated on the general information about stainless steels and their applications. It is important to perform a general overview and get an idea where the results of the present thesis could be applied. Description of all the brands of stainless steels, their microstructures and properties are important, as similar characteristics can be found in the newly created functionally graded structures. The second sub-chapter is an overview of the most important constitutive models and the experimental results for materials that undergo plastic strain induced phase transformation. Finally, the last one is devoted to functionally graded microstructures obtained via strain induced martensitic transformation – the subject of particular importance for the present thesis. As a general note, the literature review is organized mainly in a chronological order. In some cases similar publications or publications of the same Authors were...

  20. Position-specific isotope modeling of organic micropollutants transformation through different reaction pathways.

    Science.gov (United States)

    Jin, Biao; Rolle, Massimo

    2016-03-01

    The degradation of organic micropollutants occurs via different reaction pathways. Compound specific isotope analysis is a valuable tool to identify such degradation pathways in different environmental systems. We propose a mechanism-based modeling approach that provides a quantitative framework to simultaneously evaluate concentration as well as bulk and position-specific multi-element isotope evolution during the transformation of organic micropollutants. The model explicitly simulates position-specific isotopologues for those atoms that experience isotope effects and, thereby, provides a mechanistic description of isotope fractionation occurring at different molecular positions. To demonstrate specific features of the modeling approach, we simulated the degradation of three selected organic micropollutants: dichlorobenzamide (BAM), isoproturon (IPU) and diclofenac (DCF). The model accurately reproduces the multi-element isotope data observed in previous experimental studies. Furthermore, it precisely captures the dual element isotope trends characteristic of different reaction pathways as well as their range of variation consistent with observed bulk isotope fractionation. It was also possible to directly validate the model capability to predict the evolution of position-specific isotope ratios with available experimental data. Therefore, the approach is useful both for a mechanism-based evaluation of experimental results and as a tool to explore transformation pathways in scenarios for which position-specific isotope data are not yet available. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Leader emotional intelligence, transformational leadership, trust and team commitment: Testing a model within a team context

    Directory of Open Access Journals (Sweden)

    Anton F. Schlechter

    2008-06-01

    Full Text Available This exploratory study tested a model within a team context consisting of transformational-leadership behaviour, team-leader emotional intelligence, trust (both in the team leader and in the team members and team commitment. It was conducted within six manufacturing plants, with 25 teams participating. Of the 320 surveys distributed to these teams, 178 were received (which equals a 56% response rate. The surveys consisted of the multi-factor leadership questionnaire (MLQ, the Swinburne University emotional intelligence test (SUEIT, the organisational-commitment scale (OCS (adapted for team commitment and the workplace trust survey (WTS. The validity of these scales was established using exploratory factor analysis (EFA and confrmatory factor analysis (CFA. The Cronbach alpha was used to assess the reliability of the scales. The model was tested using structural equation modelling (SEM; an acceptable level of model ft was found. Signifcant positive relationships were further found among all the constructs. Such an integrated model has not been tested in a team context before and the positive fndings therefore add to existing teamwork literature. The fnding that transformational leadership and leader emotional intelligence are positively related to team commitment and trust further emphasises the importance of effective leadership behaviour in team dynamics and performance.

  2. Leader emotional intelligence, transformational leadership, trust and team commitment: Testing a model within a team context

    Directory of Open Access Journals (Sweden)

    Anton F. Schlechter

    2008-09-01

    Full Text Available This exploratory study tested a model within a team context consisting of transformational-leadership behaviour, team-leader emotional intelligence, trust (both in the team leader and in the team members and team commitment. It was conducted within six manufacturing plants, with 25 teams participating. Of the 320 surveys distributed to these teams, 178 were received (which equals a 56% response rate. The surveys consisted of the multi-factor leadership questionnaire (MLQ, the Swinburne University emotional intelligence test (SUEIT, the organisational-commitment scale (OCS (adapted for team commitment and the workplace trust survey (WTS. The validity of these scales was established using exploratory factor analysis (EFA and confrmatory factor analysis (CFA. The Cronbach alpha was used to assess the reliability of the scales. The model was tested using structural equation modelling (SEM; an acceptable level of model ft was found. Signifcant positive relationships were further found among all the constructs. Such an integrated model has not been tested in a team context before and the positive fndings therefore add to existing teamwork literature. The fnding that transformational leadership and leader emotional intelligence are positively related to team commitment and trust further emphasises the importance of effective leadership behaviour in team dynamics and performance.

  3. Standardizing effect size from linear regression models with log-transformed variables for meta-analysis.

    Science.gov (United States)

    Rodríguez-Barranco, Miguel; Tobías, Aurelio; Redondo, Daniel; Molina-Portillo, Elena; Sánchez, María José

    2017-03-17

    Meta-analysis is very useful to summarize the effect of a treatment or a risk factor for a given disease. Often studies report results based on log-transformed variables in order to achieve the principal assumptions of a linear regression model. If this is the case for some, but not all studies, the effects need to be homogenized. We derived a set of formulae to transform absolute changes into relative ones, and vice versa, to allow including all results in a meta-analysis. We applied our procedure to all possible combinations of log-transformed independent or dependent variables. We also evaluated it in a simulation based on two variables either normally or asymmetrically distributed. In all the scenarios, and based on different change criteria, the effect size estimated by the derived set of formulae was equivalent to the real effect size. To avoid biased estimates of the effect, this procedure should be used with caution in the case of independent variables with asymmetric distributions that significantly differ from the normal distribution. We illustrate an application of this procedure by an application to a meta-analysis on the potential effects on neurodevelopment in children exposed to arsenic and manganese. The procedure proposed has been shown to be valid and capable of expressing the effect size of a linear regression model based on different change criteria in the variables. Homogenizing the results from different studies beforehand allows them to be combined in a meta-analysis, independently of whether the transformations had been performed on the dependent and/or independent variables.

  4. Standardizing effect size from linear regression models with log-transformed variables for meta-analysis

    Directory of Open Access Journals (Sweden)

    Miguel Rodríguez-Barranco

    2017-03-01

    Full Text Available Abstract Background Meta-analysis is very useful to summarize the effect of a treatment or a risk factor for a given disease. Often studies report results based on log-transformed variables in order to achieve the principal assumptions of a linear regression model. If this is the case for some, but not all studies, the effects need to be homogenized. Methods We derived a set of formulae to transform absolute changes into relative ones, and vice versa, to allow including all results in a meta-analysis. We applied our procedure to all possible combinations of log-transformed independent or dependent variables. We also evaluated it in a simulation based on two variables either normally or asymmetrically distributed. Results In all the scenarios, and based on different change criteria, the effect size estimated by the derived set of formulae was equivalent to the real effect size. To avoid biased estimates of the effect, this procedure should be used with caution in the case of independent variables with asymmetric distributions that significantly differ from the normal distribution. We illustrate an application of this procedure by an application to a meta-analysis on the potential effects on neurodevelopment in children exposed to arsenic and manganese. Conclusions The procedure proposed has been shown to be valid and capable of expressing the effect size of a linear regression model based on different change criteria in the variables. Homogenizing the results from different studies beforehand allows them to be combined in a meta-analysis, independently of whether the transformations had been performed on the dependent and/or independent variables.

  5. idSpace D2.3 – Semantic meta-model integration and transformations v2

    DEFF Research Database (Denmark)

    Dolog, Peter; Grube, Pascal; Schmid, Klaus

    2009-01-01

    This deliverable discusses an extended set of requirements for transformations and metamodel for creativity techniques. Based on the requirements, the deliverable provides refined meta-model. The metamodel allows for more advanced transforma-tion concepts besides the previously delivered graph tr...

  6. A coupled kinetic Monte Carlo–finite element mesoscale model for thermoelastic martensitic phase transformations in shape memory alloys

    International Nuclear Information System (INIS)

    Chen, Ying; Schuh, Christopher A.

    2015-01-01

    A mesoscale modeling framework integrating thermodynamics, kinetic Monte Carlo (KMC) and finite element mechanics (FEM) is developed to simulate displacive thermoelastic transformations between austenite and martensite in shape memory alloys (SMAs). The model is based on a transition state approximation for the energy landscape of the two phases under loading or cooling, which leads to the activation energy and rate for transformation domains incorporating local stress states. The evolved stress state after each domain transformation event is calculated by FEM, and is subsequently used in the stochastic KMC algorithm to determine the next domain to transform. The model captures transformation stochasticity, and predicts internal phase and stress distributions and evolution throughout the entire incubation, nucleation and growth process. It also relates the critical transformation stresses or temperatures to internal activation energies. It therefore enables quantitative exploration of transformation dynamics and transformation–microstructure interactions. The model is used to simulate superelasticity (mechanically induced transformation) under both load control and strain control in single-crystal SMAs under uniaxial tension

  7. Position-specific isotope modeling of organic micropollutants transformation through different reaction pathways

    International Nuclear Information System (INIS)

    Jin, Biao; Rolle, Massimo

    2016-01-01

    The degradation of organic micropollutants occurs via different reaction pathways. Compound specific isotope analysis is a valuable tool to identify such degradation pathways in different environmental systems. We propose a mechanism-based modeling approach that provides a quantitative framework to simultaneously evaluate concentration as well as bulk and position-specific multi-element isotope evolution during the transformation of organic micropollutants. The model explicitly simulates position-specific isotopologues for those atoms that experience isotope effects and, thereby, provides a mechanistic description of isotope fractionation occurring at different molecular positions. To demonstrate specific features of the modeling approach, we simulated the degradation of three selected organic micropollutants: dichlorobenzamide (BAM), isoproturon (IPU) and diclofenac (DCF). The model accurately reproduces the multi-element isotope data observed in previous experimental studies. Furthermore, it precisely captures the dual element isotope trends characteristic of different reaction pathways as well as their range of variation consistent with observed bulk isotope fractionation. It was also possible to directly validate the model capability to predict the evolution of position-specific isotope ratios with available experimental data. Therefore, the approach is useful both for a mechanism-based evaluation of experimental results and as a tool to explore transformation pathways in scenarios for which position-specific isotope data are not yet available. - Highlights: • Mechanism-based, position-specific isotope modeling of micropollutants degradation. • Simultaneous description of concentration and primary and secondary isotope effects. • Key features of the model are demonstrated with three illustrative examples. • Model as a tool to explore reaction mechanisms and to design experiments. - We propose a modeling approach incorporating mechanistic information and

  8. Examining Competing Models of Transformational Leadership, Leadership Trust, Change Commitment, and Job Satisfaction.

    Science.gov (United States)

    Yang, Yi-Feng

    2016-08-01

    This study discusses the influence of transformational leadership on job satisfaction through assessing six alternative models related to the mediators of leadership trust and change commitment utilizing a data sample (N = 341; M age = 32.5 year, SD = 5.2) for service promotion personnel in Taiwan. The bootstrap sampling technique was used to select the better fitting model. The tool of hierarchical nested model analysis was applied, along with the approaches of bootstrapping mediation, PRODCLIN2, and structural equation modeling comparison. The results overall demonstrate that leadership is important and that leadership role identification (trust) and workgroup cohesiveness (commitment) form an ordered serial relationship. © The Author(s) 2016.

  9. A SIMPLIFIED MODEL OF THREE-PHASE BANK OF CURRENT TRANSFORMERS IN THE DYNAMIC SIMULATION SYSTEM

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2015-01-01

    Full Text Available  The article presents and substantiates a simplified mathematical simulation model realization technique for a three-phase bank of current transformers (CT based on their nameplate data. The secondary windings and load of the current transformers form a Y-connected circuit with neutral conductor. Consistent with the presented technique the simplified mathematical simulation realizes in the dynamic-modeling environment of MatLab–Simulink–SimPowerSystems. This simulation allows obtaining the secondary current curve shape entering only the nameplate data of the CT being simulated. Thus, the simulation under consideration enables the assessment of technical feasibility of the CT from viewpoint of correct functioning of the relay protective devices during transient processes in the electric energy systems.Employing the model, the authors conduct computational experiments simulating the CT typical operating modes: short-circuit current passage with presence/absence of the direct component and short-circuit current passage with presence of the direct component and residual magnetic induction of the CT. The paper examines the modes of automatic re-closing failure at different stages of the breaker closure with oscillograms drawn illustrating each characteristic case.The authors compare two methods for the CT iron magnetization-curve assigning: manual approximation and the Ollendorf-formula approximation. Relying on this comparison they conclude on feasability of application of the magnetization-curve approximating function for the CT operating analysis during transient processes in the electric energy systems. An elaborated user-friendly graphic interface provides a means of visual assigning the CT nominal parameters, the residual magnetic induction, and the method of the transformer iron magnetization curve approximation. The results of conducted computational experiments prove feasibility of the CT-bank simulation model.

  10. A new method for determination of parameters in sewer pollutant transformation process model.

    Science.gov (United States)

    Jiang, F; Leung, H W D; Li, S Y; Lin, G S; Chen, G H

    2007-11-01

    Understanding pollutant transformation in sewers is important in controlling odor emission from pressure mains as well as in assessing organic pollutant removal capacity of gravity sewers. Sewer process models have thus been developed to quantify the pollutant transformation processes under various sewer conditions. The quantification largely depends on model parameter values, in particular the kinetic and stoichiometric parameters related to microbial activities. The current approaches not only involve a large amount of experimental work but also may induce significant errors when microbial reactions cannot be differentiated effectively during the experiments. Therefore, this study is aimed at developing a new method that can reduce experimental work significantly. The proposed method utilizes a genetic algorithm (GA) to enable the determination with a single set of batch experiments. To study the feasibility of the proposed method, a set of 72-hr batch experiments was first conducted for determining the parameters of a sewer model developed in this study, which adopted a full version of the International Water Association (IWA) Activated Sludge Model No. 3 (ASM3) to describe the microbial activities in sewers. The results were then verified with two different sets of the batch experiments. Furthermore, dynamic variation data of dissolved oxygen level were collected at the outlet of a 1.5-km gravity sewer to validate the determined parameters. All the results showed that the proposed parameter determination method is effective.

  11. Modeling size effects on the transformation behavior of shape memory alloy micropillars

    International Nuclear Information System (INIS)

    Hernandez, Edwin A Peraza; Lagoudas, Dimitris C

    2015-01-01

    The size dependence of the thermomechanical response of shape memory alloys (SMAs) at the micro and nano-scales has gained increasing attention in the engineering community due to existing and potential uses of SMAs as solid-state actuators and components for energy dissipation in small scale devices. Particularly, their recent uses in microelectromechanical systems (MEMS) have made SMAs attractive options as active materials in small scale devices. One factor limiting further application, however, is the inability to effectively and efficiently model the observed size dependence of the SMA behavior for engineering applications. Therefore, in this work, a constitutive model for the size-dependent behavior of SMAs is proposed. Experimental observations are used to motivate the extension of an existing thermomechanical constitutive model for SMAs to account for the scale effects. It is proposed that such effects can be captured via characteristic length dependent material parameters in a power-law manner. The size dependence of the transformation behavior of NiFeGa micropillars is investigated in detail and used as model prediction cases. The constitutive model is implemented in a finite element framework and used to simulate and predict the response of SMA micropillars with different sizes. The results show a good agreement with experimental data. A parametric study performed using the calibrated model shows that the influence of micropillar aspect ratio and taper angle on the compression response is significantly smaller than that of the micropillar average diameter. It is concluded that the model is able to capture the size dependent transformation response of the SMA micropillars. In addition, the simplicity of the calibration and implementation of the proposed model make it practical for the design and numerical analysis of small scale SMA components that exhibit size dependent responses. (paper)

  12. Modeling size effects on the transformation behavior of shape memory alloy micropillars

    Science.gov (United States)

    Peraza Hernandez, Edwin A.; Lagoudas, Dimitris C.

    2015-07-01

    The size dependence of the thermomechanical response of shape memory alloys (SMAs) at the micro and nano-scales has gained increasing attention in the engineering community due to existing and potential uses of SMAs as solid-state actuators and components for energy dissipation in small scale devices. Particularly, their recent uses in microelectromechanical systems (MEMS) have made SMAs attractive options as active materials in small scale devices. One factor limiting further application, however, is the inability to effectively and efficiently model the observed size dependence of the SMA behavior for engineering applications. Therefore, in this work, a constitutive model for the size-dependent behavior of SMAs is proposed. Experimental observations are used to motivate the extension of an existing thermomechanical constitutive model for SMAs to account for the scale effects. It is proposed that such effects can be captured via characteristic length dependent material parameters in a power-law manner. The size dependence of the transformation behavior of NiFeGa micropillars is investigated in detail and used as model prediction cases. The constitutive model is implemented in a finite element framework and used to simulate and predict the response of SMA micropillars with different sizes. The results show a good agreement with experimental data. A parametric study performed using the calibrated model shows that the influence of micropillar aspect ratio and taper angle on the compression response is significantly smaller than that of the micropillar average diameter. It is concluded that the model is able to capture the size dependent transformation response of the SMA micropillars. In addition, the simplicity of the calibration and implementation of the proposed model make it practical for the design and numerical analysis of small scale SMA components that exhibit size dependent responses.

  13. The Development Of Windows Service Based Data Log System Using Light Dependent Resistor And Thingspeak IOT Cloud Platform

    Directory of Open Access Journals (Sweden)

    Tristan Jay P. Calaguas

    2017-03-01

    Full Text Available Microcontrollers are using in control and information processing it can be used in wide application such as agriculture health care commercial facilities robotics and education. These micro controllers are computers in chip that comprises of input and output ports central processing unit registers and main memory as well as communication interface such as Ethernet interface serial interface High Definition Multimedia Interface power source and many existing interface that can be found in this type of computer. In this study the researcher decided to conceptualize an innovative application of this type of computer where it has a potential to use as tracking system in specific individuals activities. Since some of office people are complaining in CCTV camera about their privacy this innovative concept of technology is in similar purpose but if we will compare the application concept in closed circuit camera the researcher decided to use visual graph instead video data that is in high exposure In the first phase the researcher made a concept on how the simple Light Dependent Resistor will apply in Schools Office Environment Application domain using microcontroller that was used as data log system and how this can be optimized without forcing the Dean or any designated person in office to operate it in hand due to their busy working hours. In the second phase the researcher develop the proposed data log system that are acquiring data through light luminance from fluorescent light of deans office and sending it in the IOT cloud platform. The researcher used fuzzy logic theory to model the operation of the proposed data log system. This study used experimental type of research when the prototype was developed during second phase the researcher simulated the operation. As the result the proposed data log system is sending data to Thingspeak IOT Cloud platform it displays the correct output which based from the rules and it is in column graph content

  14. A random effects meta-analysis model with Box-Cox transformation.

    Science.gov (United States)

    Yamaguchi, Yusuke; Maruo, Kazushi; Partlett, Christopher; Riley, Richard D

    2017-07-19

    In a random effects meta-analysis model, true treatment effects for each study are routinely assumed to follow a normal distribution. However, normality is a restrictive assumption and the misspecification of the random effects distribution may result in a misleading estimate of overall mean for the treatment effect, an inappropriate quantification of heterogeneity across studies and a wrongly symmetric prediction interval. We focus on problems caused by an inappropriate normality assumption of the random effects distribution, and propose a novel random effects meta-analysis model where a Box-Cox transformation is applied to the observed treatment effect estimates. The proposed model aims to normalise an overall distribution of observed treatment effect estimates, which is sum of the within-study sampling distributions and the random effects distribution. When sampling distributions are approximately normal, non-normality in the overall distribution will be mainly due to the random effects distribution, especially when the between-study variation is large relative to the within-study variation. The Box-Cox transformation addresses this flexibly according to the observed departure from normality. We use a Bayesian approach for estimating parameters in the proposed model, and suggest summarising the meta-analysis results by an overall median, an interquartile range and a prediction interval. The model can be applied for any kind of variables once the treatment effect estimate is defined from the variable. A simulation study suggested that when the overall distribution of treatment effect estimates are skewed, the overall mean and conventional I 2 from the normal random effects model could be inappropriate summaries, and the proposed model helped reduce this issue. We illustrated the proposed model using two examples, which revealed some important differences on summary results, heterogeneity measures and prediction intervals from the normal random effects model. The

  15. A modelling framework for the transport, transformation and biouptake of manufactured nanoparticles in the aquatic environment

    Science.gov (United States)

    Lofts, Stephen; Keller, Virginie; Dumont, Egon; Williams, Richard; Praetorius, Antonia; von der Kammer, Frank

    2016-04-01

    The development of innovative new chemical products is a key aspect of the modern economy, yet society demands that such development is environmentally sustainable. Developing knowledge of how new classes of chemicals behave following release to the environment is key to understanding the hazards that will potentially result. Nanoparticles are a key example of a class of chemicals that have undergone a significant expansion in production and use in recent years and so there is a need to develop tools to predict their potential hazard following their deliberate or incidental release to the environment. Generalising the understanding of the environmental behaviour of manufactured nanoparticles in general is challenging, as they are chemically and physically diverse (e.g. metals, metal oxides, carbon nanotubes, cellulose, quantum dots). Furthermore, nanoparticles may be manufactured with capping agents to modify their desired behaviour in industrial applications; such agents may also influence their environmental behaviour. Also, nanoparticles may become significantly modified from their as-manufactured forms both prior to and after the point of environmental release. Tools for predicting nanoparticle behaviour and hazard need to be able to consider a wide range of release scenarios and aspects of nanoparticle behaviour in the environment (e.g. dissolution, transformation of capping agents, agglomeration and aggregation behaviour), where such behaviours are not shared by all types of nanoparticle. This implies the need for flexible, futureproofed tools capable of being updated to take new understanding of behavioural processes into account as such knowledge emerges. This presentation will introduce the NanoFASE model system, a multimedia modelling framework for the transport, transformation and biouptake of manufactured nanoparticles. The complete system will comprise atmospheric, terrestrial and aquatic compartments to allow holistic simulation of nanoparticles; this

  16. A design approach to adapting maker community projects to the IoT constrained device philosophy

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2016-05-01

    Full Text Available Internet of Things (IoT) advocates promise huge benefits but what technical challenges does the maker community face in order to participate in this new technological wave? We report on our experience in incorporating a maker community friendly...

  17. A Software Product Line Process to Develop Agents for the IoT

    Science.gov (United States)

    Ayala, Inmaculada; Amor, Mercedes; Fuentes, Lidia; Troya, José M.

    2015-01-01

    One of the most important challenges of this decade is the Internet of Things (IoT), which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL). Specifically, we propose to use Self-StarMASMAS, multi-agent system) agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes. PMID:26140350

  18. Intelligent IPv6 based iot network monitoring and altering system on ...

    African Journals Online (AJOL)

    On the basis of these, this paper discusses and addresses the issues of packet monitoring of IoT device simulations in Cooja framework. Addressing this issue is tantamount to addressing the security and packet loss issue in Cooja framework; a simulator provided by Contiki operating system to test, develop and run IoT ...

  19. Using OSUS and node red to integrate IoT devices based on events

    Science.gov (United States)

    Klawon, Kevin; Ryan, Pat; Gold, Joshua

    2017-05-01

    The Army Research Lab's Open Standard for Unattended Sensors (OSUS) is an extensible vendor-neutral sensor controller. OSUS provides a simple user interface for connecting to sensors and a rudimentary data processing capability. Integrating Open Source Internet of Things (IoT) technology such as Node Red can greatly extend the capabilities of OSUS and improve the User Experience.

  20. Cloud Computing and Validated Learning for Accelerating Innovation in IoT

    Science.gov (United States)

    Suciu, George; Todoran, Gyorgy; Vulpe, Alexandru; Suciu, Victor; Bulca, Cristina; Cheveresan, Romulus

    2015-01-01

    Innovation in Internet of Things (IoT) requires more than just creation of technology and use of cloud computing or big data platforms. It requires accelerated commercialization or aptly called go-to-market processes. To successfully accelerate, companies need a new type of product development, the so-called validated learning process.…