WorldWideScience

Sample records for model iot transform

  1. IOT technology application model research of transportation industry in China

    Institute of Scientific and Technical Information of China (English)

    Lai Mingyong; Zhou Tang; Liu Zhengchi

    2013-01-01

    The paper studied the connection between intemet of things (IOT) technology and transportation industry.Meanwhile,the definition of IOT in transportation was given.Concerning that many problems occurred during the process of traditional intelligent transportation system,the paper proposed a promising model of IOT in transportation.The advantage of the information utilization model from information to function was confirmed through comparative study.Finally,the model presented that a real interconnection of transportation would be achieved based on the unified information collection.It can greatly save cost on technology transfer,exploit potential value of information,and promote the emergence of a sustainable information service market and the industrial upgrade.

  2. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  3. Model Transformations? Transformation Models!

    NARCIS (Netherlands)

    Bézivin, J.; Büttner, F.; Gogolla, M.; Jouault, F.; Kurtev, I.; Lindow, A.

    2006-01-01

    Much of the current work on model transformations seems essentially operational and executable in nature. Executable descriptions are necessary from the point of view of implementation. But from a conceptual point of view, transformations can also be viewed as descriptive models by stating only the

  4. Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems

    DEFF Research Database (Denmark)

    Tomlein, Matus; Grønbæk, Kaj

    2016-01-01

    have also identified a need to model their deployment topology and functionality in order to enable their seamless integration into the platform. In this paper, we draw from research in related fields and present a model of IoT applications. It is built using semantic annotations and uses semantic...... conclude that it is suitable for modeling applications in IoT software ecosystems since it is more adaptable and expressive than the alternatives....

  5. Semantic Model of Variability and Capabilities of IoT Applications for Embedded Software Ecosystems

    DEFF Research Database (Denmark)

    Tomlein, Matus; Grønbæk, Kaj

    have also identified a need to model their deployment topology and functionality in order to enable their seamless integration into the platform. In this paper, we draw from research in related fields and present a model of IoT applications. It is built using semantic annotations and uses semantic...... conclude that it is suitable for modeling applications in IoT software ecosystems since it is more adaptable and expressive than the alternatives....

  6. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  7. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  8. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  9. Futures Business Models for an IoT Enabled Healthcare Sector: A Causal Layered Analysis Perspective

    Directory of Open Access Journals (Sweden)

    Julius Francis Gomes

    2016-12-01

    Full Text Available Purpose: To facilitate futures business research by proposing a novel way to combine business models as a conceptual tool with futures research techniques. Design: A futures perspective is adopted to foresight business models of the Internet of Things (IoT enabled healthcare sector by using business models as a futures business research tool. In doing so, business models is coupled with one of the most prominent foresight methodologies, Causal Layered Analysis (CLA. Qualitative analysis provides deeper understanding of the phenomenon through the layers of CLA; litany, social causes, worldview and myth. Findings: It is di cult to predict the far future for a technology oriented sector like healthcare. This paper presents three scenarios for short-, medium- and long-term future. Based on these scenarios we also present a set of business model elements for different future time frames. This paper shows a way to combine business models with CLA, a foresight methodology; in order to apply business models in futures business research. Besides offering early results for futures business research, this study proposes a conceptual space to work with individual business models for managerial stakeholders. Originality / Value: Much research on business models has offered conceptualization of the phenomenon, innovation through business model and transformation of business models. However, existing literature does not o er much on using business model as a futures research tool. Enabled by futures thinking, we collected key business model elements and building blocks for the futures market and ana- lyzed them through the CLA framework.

  10. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  11. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  12. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  13. A Reference Model for Monitoring IoT WSN-Based Applications

    Directory of Open Access Journals (Sweden)

    Juan Vicente Capella

    2016-10-01

    Full Text Available The Internet of Things (IoT is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP, which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN’s behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  14. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  15. IoT Development Trend and Future Business Model Analysis%物联网发展趋势及未来商业模式解析

    Institute of Scientific and Technical Information of China (English)

    朱敏

    2016-01-01

    为了研究物联网发展趋势及未来的商业模式,首先对国内外物联网业务发展新特征进行了梳理,并重点剖析互联网时代背景下物联网的潜在商业模式,在此基础上提出电信运营商在物联网发展方面的策略及建议,希望为产业链成员提供商业模式转型的参考。%To study IoT development trend and its future business model, this paper ifrst summarized the domestic and foreign IoT business development features, and focused on analysis of the future potential business models in the Internet era. On this basis, the paper proposed IoT development strategy and suggestions for telecom operators, wishing to provide reference to the transformation of business model for members of the industry chain.

  16. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection

    Directory of Open Access Journals (Sweden)

    Declan T. Delaney

    2016-12-01

    Full Text Available No single network solution for Internet of Things (IoT networks can provide the required level of Quality of Service (QoS for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks.

  17. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection.

    Science.gov (United States)

    Delaney, Declan T; O'Hare, Gregory M P

    2016-12-01

    No single network solution for Internet of Things (IoT) networks can provide the required level of Quality of Service (QoS) for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks.

  18. A Framework to Implement IoT Network Performance Modelling Techniques for Network Solution Selection †

    Science.gov (United States)

    Delaney, Declan T.; O’Hare, Gregory M. P.

    2016-01-01

    No single network solution for Internet of Things (IoT) networks can provide the required level of Quality of Service (QoS) for all applications in all environments. This leads to an increasing number of solutions created to fit particular scenarios. Given the increasing number and complexity of solutions available, it becomes difficult for an application developer to choose the solution which is best suited for an application. This article introduces a framework which autonomously chooses the best solution for the application given the current deployed environment. The framework utilises a performance model to predict the expected performance of a particular solution in a given environment. The framework can then choose an apt solution for the application from a set of available solutions. This article presents the framework with a set of models built using data collected from simulation. The modelling technique can determine with up to 85% accuracy the solution which performs the best for a particular performance metric given a set of solutions. The article highlights the fractured and disjointed practice currently in place for examining and comparing communication solutions and aims to open a discussion on harmonising testing procedures so that different solutions can be directly compared and offers a framework to achieve this within IoT networks. PMID:27916929

  19. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a multi-si

  20. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a

  1. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a multi-si

  2. An Overview of Information Security Model for IOT%物联网信息安全模型综述

    Institute of Scientific and Technical Information of China (English)

    邵华; 范红

    2014-01-01

    The internet of things is the extension of the internet, should not only to face the traditional security issues, but also deal with new and specific security problem, which made higher requirements for security model. This article from the security protection object and way to classify the information security model for IOT, summarizes the current popular information security model for IOT, analysis the advantages and disadvantages of the existing security model, and predicts the trend of the development of the IOT information security model.%物联网是互联网的延伸,不仅传统的安全问题继续困扰物联网,而且新的、特有的安全问题也不断呈现,这些均对物联网安全模型提出了更高的要求。本文从安全防护对象以及方式对物联网信息安全模型进行分类,综述了当前比较流行的物联网信息安全模型,分析了现有安全模型优势与劣势,展望了物联网信息安全模型发展的趋势。

  3. Security Analysis and Security Model Research on IOT%物联网安全问题分析及安全模型研究

    Institute of Scientific and Technical Information of China (English)

    刘波; 陈晖; 王海涛; 付鹰

    2012-01-01

    As a new generation network model,the IOT is the integration and expansion of the traditional network,the traditional network security and technical security issues still exist in the IOT system. And the IOT also joins more private information as well as some involving confidential information, need a higher requirements for information security management, security protection, and other Security mechanisms. Firstly, the IOT concept,architecture and core technology is given a simple description and summary,and then have the security issues of IOT detailed analysis, on this basis, a IOT security model based on P2DR2 is proposed, and the core technology of the model are studied at the same time.%物联网作为新一代网络模式,是对传统网络和技术的融合和扩展,传统的网络安全和技术安全问题依然存在于物联网系统中,同时物联网中又加入了更多的私人信息以及一些涉密信息,对信息的安全管理、安全防护等安全问题提出了更高的要求.该文首先对物联网概念、体系架构以及核心技术进行简单的描述和总结,然后对物联网安全问题进行了详细的分析,在此基础上,提出了一种基于P2DR2的动态防御物联网安全模型,并对该模型的相关核心技术进行了研究.

  4. Initially Researches for the Development of SSME under the Background of IOT

    Science.gov (United States)

    Han, Kun; Liu, Shurong; Zhang, Dacheng; Han, Ying

    The Internet Of Things (IOT) is proposed in the 1990s. The original intention has been put forward is people to things and things to things can deliver information like person as. IOT broke the human traditional thinking. This paper researches the practical function of IOT to expand the theory of Services Sciences, Management and Engineering (SSME). On the analysis of the key technology and model of IOT, the events-driven SSME model based on IOT, and the IOT framework based on SSME, it further studies the importance of IOT in the field of SSME.

  5. Cost Effectiveness of the Instrumentalism in Occupational Therapy (IOT) Conceptual Model as a Guide for Intervention with Adolescents with Emotional and Behavioral Disorders (EBD)

    Science.gov (United States)

    Ikiugu, Moses N.; Anderson, Lynne

    2007-01-01

    The purpose of this paper was to demonstrate the cost-effectiveness of using the Instrumentalism in Occupational Therapy (IOT) conceptual practice model as a guide for intervention to assist teenagers with emotional and behavioral disorders (EBD) transition successfully into adulthood. The cost effectiveness analysis was based on a project…

  6. Virtualization Framework for Energy Efficient IoT Networks

    OpenAIRE

    Al-Azez, ZTS; Lawey, AQ; El-Gorashi, TEH; Elmirghani, JMH

    2015-01-01

    In this paper, we introduce a Mixed Integer Linear Programming (MILP) model to design an energy efficient cloud computing platform for Internet of Things (IoT) networks. In our model, the IoT network consisted of four layers. The first (lowest) layer consisted of IoT devices, e.g. temperature sensors. The networking elements (relays, coordinators and gateways) are located within the upper three layers, respectively. These networking elements perform the tasks of data aggregation and processin...

  7. Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT

    Directory of Open Access Journals (Sweden)

    Vijender Kumar Solanki

    2017-03-01

    Full Text Available Keeping in mind the need to preserve energy as well as utilize the available at its best the need was felt to develop a module that would be able to sort out the problem where resources such as water and electricity were wasted, in urban as well as rural area. Resource (electricity was wasted as beside the point operation of Highway and High Mast Lamp; while wastage of water followed by improper trends and methodologies imparted for watering of city park, road side plantation and highway plantation. Thus as per Energy survey statistics of a City (Lucknow, India it was found that major portion of resources (water and electricity were being wasted due to negligent activities of officials who were in charge of resource management. So to facilitate energy saving trends and to completely modernize it to autonomous system, module below is proposed which incorporates modern technological peripheral and has its base ingrained in IoT (Internet of Things which when put into consideration would result in large scale resource and energy saving.This developed module incorporates the peripherals such as Arduino, Texas Instruments ultra low power kits etc. in accordance with software technology including Lab View which help to monitor as well as control the various operation from the base station, located far away from the site. Lab View Interface interacts with all the module located at various city parks, subways and highway lighting modules. Later below in several section a detailed pattern and application frame has been put up.

  8. Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT

    Directory of Open Access Journals (Sweden)

    Seung-Hoon Chae

    2014-01-01

    Full Text Available Internet of Things (IoT brings telemedicine a new chance. This enables the specialist to consult the patient’s condition despite the fact that they are in different places. Medical image segmentation is needed for analysis, storage, and protection of medical image in telemedicine. Therefore, a variety of methods have been researched for fast and accurate medical image segmentation. Performing segmentation in various organs, the accurate judgment of the region is needed in medical image. However, the removal of region occurs by the lack of information to determine the region in a small region. In this paper, we researched how to reconstruct segmentation region in a small region in order to improve the segmentation results. We generated predicted segmentation of slices using volume data with linear equation and proposed improvement method for small regions using the predicted segmentation. In order to verify the performance of the proposed method, lung region by chest CT images was segmented. As a result of experiments, volume data segmentation accuracy rose from 0.978 to 0.981 and from 0.281 to 0.187 with a standard deviation improvement confirmed.

  9. Scalable Models Using Model Transformation

    Science.gov (United States)

    2008-07-13

    and the following companies: Agilent, Bosch, HSBC , Lockheed-Martin, National Instruments, and Toyota. Scalable Models Using Model Transformation...parametrization, and workflow automation. (AFRL), the State of California Micro Program, and the following companies: Agi- lent, Bosch, HSBC , Lockheed

  10. A General SDN-Based IoT Framework with NVF Implementation

    Institute of Scientific and Technical Information of China (English)

    Jie Li; Eitan Altman; Corinne Touati

    2015-01-01

    The emerging technologies of Internet of Things (IoT), soft⁃ware defined networking (SDN), and network function virtual⁃ization (NFV) have great potential for the information service innovation in the cloud and big data era. The architecture models of IoT, SDN with NFV implementation are studied in this paper. A general SDN⁃based IoT framework with NFV implantation is presented. This framework takes advantages of SDN and NFV and improves IoT architecture.

  11. An IOT Security Risk Autonomic Assessment Algorithm

    Directory of Open Access Journals (Sweden)

    Zhengchao Ma

    2013-02-01

    Full Text Available In terms of Internet of Things (IOT system with the possibility criterion of fuzziness and randomness security risk, we qualitatively analyze the security risk level of IOT security scene by describing generalization metrics the potential impact and likelihood of occurrence of every major threat scenarios. On this basis, we proposed self-assessment algorithm of IOT security risk, adopting three-dimensional normal cloud model integrated consideration of risk indicators, researching the multi-rule mapping relationship between the qualitative input of safety indicators and the quantitative reasoning of self-assessment. Finally, we build security risk assessment simulation platform, and verify the validity and accuracy of the algorithm in the premise of substantiating the risk level and the safety criterion domain.

  12. Building Models of Installations to Recommend Applications in IoT Software Ecosystems

    DEFF Research Database (Denmark)

    Tomlein, Matus; Grønbæk, Kaj

    2016-01-01

    integration into the platforms is a challenge. In this paper, we propose to use semantic reasoning to select and configure applications in software ecosystems. Our prototype builds a model of the installation and the user goals through several steps. It processes application descriptions created...

  13. MCC: A Model Transformation Environment

    NARCIS (Netherlands)

    Kleppe, A.G.

    2006-01-01

    In the model driven software development process, software is built by constructing one or more models and transforming these into other models. In turn these output models may be transformed into another set of models until finally the output consists of program code that can be executed. Ultimatel

  14. Building Models of Installations to Recommend Applications in IoT Software Ecosystems

    DEFF Research Database (Denmark)

    Tomlein, Matus; Grønbæk, Kaj

    Internet of Things devices are driven by applications. To stimulate innovation on their platforms, manufacturers of embedded products are creating software ecosystems that enable third-parties develop applications for their devices. Since such applications are developed externally, their seamless...... integration into the platforms is a challenge. In this paper, we propose to use semantic reasoning to select and configure applications in software ecosystems. Our prototype builds a model of the installation and the user goals through several steps. It processes application descriptions created...

  15. A multi-domain trust management model for supporting RFID applications of IoT.

    Science.gov (United States)

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  16. IOT Overview Polarimetry

    Science.gov (United States)

    Ageorges, N.

    This contribution concentrates on the polarimetric modes offered by different instruments at ESO. In the introduction, I will demonstrate the importance of polarimetry, the kind of science it permits to achieve and list the instruments which offer these modes. Sects. 2 and 3 will present the involved modes in more details as well as the currently related calibrations, as part of the calibration plans.ESO does not offer any pure polarimetric instrument. As a consequence the polarimetric modes are just one (or more) mode(s) of the given instruments. Polarimetric modes might be mentioned in the related IOT but are not followed up thoroughly as is e.g. spectroscopy.

  17. INFORMATION MODEL OF SOCIAL TRANSFORMATIONS

    Directory of Open Access Journals (Sweden)

    Мария Васильевна Комова

    2013-09-01

    Full Text Available The social transformation is considered as a process of qualitative changes of the society, creating a new level of organization in all areas of life, in different social formations, societies of different types of development. The purpose of the study is to create a universal model for studying social transformations based on their understanding as the consequence of the information exchange processes in the society. After defining the conceptual model of the study, the author uses the following methods: the descriptive method, analysis, synthesis, comparison.Information, objectively existing in all elements and systems of the material world, is an integral attribute of the society transformation as well. The information model of social transformations is based on the definition of the society transformation as the change in the information that functions in the society’s information space. The study of social transformations is the study of information flows circulating in the society and being characterized by different spatial, temporal, and structural states. Social transformations are a highly integrated system of social processes and phenomena, the nature, course and consequences of which are affected by the factors representing the whole complex of material objects. The integrated information model of social transformations foresees the interaction of the following components: social memory, information space, and the social ideal. To determine the dynamics and intensity of social transformations the author uses the notions of "information threshold of social transformations" and "information pressure".Thus, the universal nature of information leads to considering social transformations as a system of information exchange processes. Social transformations can be extended to any episteme actualized by social needs. The establishment of an information threshold allows to simulate the course of social development, to predict the

  18. IOT Semantic Community Evolution Model Based on Game Theory%基于博弈论的物联网语义社区演化模型

    Institute of Scientific and Technical Information of China (English)

    王杨; 张林静; 黄亚坤; 赵传信; 陈付龙

    2012-01-01

    In order to discover the evolution principle of the semantic community in the Internet of things (IOT) ,a new semantic community evolution model based on game theory is proposed. The concept of the Internet of Thing Semantic Community (ITSC) and its characteristics are presented. Then a dynamic game theory based ITSC evolution model is proposed. The Semantic Community Preprocessing Algorithm (SCPA),the Game Node Strategy Selection Algorithm (GNSA) and the Game Theory based semantic community Evolution Algorithm (GTEA) are given. In addition, we also perform the performance analysis about these algorithms. The experiment results show that the proposed model can reflect the basic principle of the semantic community in the IOT. Meanwhile,the simulation results also indicate that the proposed algorithm is effective and feasible when the actual network data set is input.%针对物联网环境下的语义社区演化问题,提出了一种基于博弈论的语义社区动态演化模型.首先给出物联网语义社区(Internet of Things Semantic Community,ITSC)的定义和特征;然后提出了一种基于动态博弈论的物联网语义社区演化模型,给出了物联网语义社区预处理算法(SCPA)、博弈节点选择算法(GNSA)、基于博弈的语义社区演化算法(GTEA)及算法的性能分析.通过实际网络社区数据的仿真实验表明,演化模型能够真实地反映物联网语义社区的演化规律.

  19. Logistic Model to Support Service Modularity for the Promotion of Reusability in a Web Objects-Enabled IoT Environment.

    Science.gov (United States)

    Kibria, Muhammad Golam; Ali, Sajjad; Jarwar, Muhammad Aslam; Kumar, Sunil; Chong, Ilyoung

    2017-09-22

    Due to a very large number of connected virtual objects in the surrounding environment, intelligent service features in the Internet of Things requires the reuse of existing virtual objects and composite virtual objects. If a new virtual object is created for each new service request, then the number of virtual object would increase exponentially. The Web of Objects applies the principle of service modularity in terms of virtual objects and composite virtual objects. Service modularity is a key concept in the Web Objects-Enabled Internet of Things (IoT) environment which allows for the reuse of existing virtual objects and composite virtual objects in heterogeneous ontologies. In the case of similar service requests occurring at the same, or different locations, the already-instantiated virtual objects and their composites that exist in the same, or different ontologies can be reused. In this case, similar types of virtual objects and composite virtual objects are searched and matched. Their reuse avoids duplication under similar circumstances, and reduces the time it takes to search and instantiate them from their repositories, where similar functionalities are provided by similar types of virtual objects and their composites. Controlling and maintaining a virtual object means controlling and maintaining a real-world object in the real world. Even though the functional costs of virtual objects are just a fraction of those for deploying and maintaining real-world objects, this article focuses on reusing virtual objects and composite virtual objects, as well as discusses similarity matching of virtual objects and composite virtual objects. This article proposes a logistic model that supports service modularity for the promotion of reusability in the Web Objects-enabled IoT environment. Necessary functional components and a flowchart of an algorithm for reusing composite virtual objects are discussed. Also, to realize the service modularity, a use case scenario is

  20. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  1. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  2. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-01-01

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds. PMID:27367695

  3. 一种基于REST的物联网资源模型和分布策略%A IoT Resources Model and Placement Strategy Based on REST

    Institute of Scientific and Technical Information of China (English)

    王二伟; 姚文斌

    2015-01-01

    The Internet of Things is a typical representative of new generation of information technology.With sig-nificant development of sensor networks,embedded technology and wireless communication,the number of IoT re-sources is growing rapidly and the type of IoT resources is more and more complex.According to the characteristics of the IoT resources,this paper puts forward a rest-based IoT resource model and description method.On the Internet of things mass resources storage problem,this paper uses distributed storage strategy based on consistent hashing, moreover.As for the problem that time consumption is too large caused by distributed query during the resources access based on random data placement strategy,this paper puts forward a random data placement strategy based on IoT re-source model and does some relevant tests for process of data resources creating and querying and analyze the advan-tages of the improved strategy on the process of accessing to IoT resources.%物联网是新一代信息技术的典型代表,随着传感器网络、嵌入式技术和无线通信等物联网技术的不断发展成熟,物联网资源数量不断增多,类型愈加复杂.针对物联网资源特点,提出了一种基于 REST 物联网资源模型和资源描述方法.此外,针对物联网海量资源的存储问题,采用基于一致性哈希的分布存储策略,并针对随机数据数据分布在资源访问时分散查询引起的时间开销较大的问题,提出了一种基于物联网资源模型的非随机数据分布策略,对数据资源的存入和获取过程做了相关的测试,分析了该策略相对于随机一致性哈希分布策略在获取资源请求上的优势.

  4. 一种面向移动智能设备的物联网中间件服务模型%An IOT Middleware Service Model for Mobile Intelligent Devices

    Institute of Scientific and Technical Information of China (English)

    罗剑

    2016-01-01

    An IOT middleware service model for mobile intelligent devices is described. The system architecture is composed of sensor network interface layer,device service layer, data transmission layer and Android resource layer. Through building the communication interfaces with heterogeneous WSN devices,and the status monitoring and remote control functions offered by encapsulating sensing devices,the model opens universal access service to mobile devices,to implement technical aspects with commonality for IOT application,provide facilitation for secondary development of mobile intelligent devices orienting IOT. The existing application cases verify the reliability, practicability and technical commonalities of the service model; the model may effectively upgrade the efficiency of application and development of IOT in various industries.%描述了一种面向移动智能设备的物联网中间件服务模型,系统架构由传感网接口层、设备服务层、数据传输层和安卓资源层组成.该模型通过建立与无线传感器网络异构设备的通信接口,封装感知设备提供的状态监测和远程控制功能,向移动端开放统一的物联网接入服务,实现物联网应用带有共性的技术环节,为移动智能设备面向物联网的二次开发提供便利.已有的应用案例证明了服务模型的可靠性、实用性和技术共性,可以有效提升物联网不同行业应用开发的效率.

  5. Students versus IoT Security

    CERN Document Server

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  6. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities...... and information flow. In this paper, we seek to illustrate and classify insider threats in relation to the IoT (by ‘smart insiders’), exhibiting attack vectors for their characterisation. To model the attacks we apply a method of formal modelling of Insider Threats in the interactive theorem prover Isabelle....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  7. Monitoring in IOT enabled devices

    Directory of Open Access Journals (Sweden)

    Udit Gupta

    2015-07-01

    Full Text Available As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT, it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs and their overall effectiveness.

  8. BLENDING IOT AND BIG DATA ANALYTICS

    OpenAIRE

    Tulasi.B*; Girish J Vemulkar

    2016-01-01

    Internet is continuously evolving and changing. Internet of Things (IoT) can be considered as the future of Internet applications which involves machine to machine learning (M2M). The actionable intelligence can be derived through fusion of Big Data and real time analytics with IoT. Big Data and IoT can be viewed as two sides of a coin. With the connection between Big Data and the objects on Internet benefits of IoT can be easily reaped. The applications of IoT spread across various domains l...

  9. Integrable Bogoliubov Transform and Integrable Model

    Institute of Scientific and Technical Information of China (English)

    王宁

    2003-01-01

    By defining Bogoliubov transform as a function of parameters, the integrability of the Bogoliubov transform in parameter space is investigated. It is shown that integrable Bogoliubov transform is closely related to the known integrable model. The relation between the integrable Bogoliubov transform and geometric phase of vacuum induced by the Bogoliubov transform is also discussed.

  10. Transparent Model Transformation: Turning Your Favourite Model Editor into a Transformation Tool

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2015-01-01

    Current model transformation languages are supported by dedicated editors, often closely coupled to a single execution engine. We introduce Transparent Model Transformation, a paradigm enabling modelers to specify transformations using a familiar tool: their model editor. We also present VMTL......, the first transformation language implementing the principles of Transparent Model Transformation: syntax, environment, and execution transparency. VMTL works by weaving a transformation aspect into its host modeling language. We show how our implementation of VMTL turns any model editor into a flexible...

  11. Model Validation in Ontology Based Transformations

    Directory of Open Access Journals (Sweden)

    Jesús M. Almendros-Jiménez

    2012-10-01

    Full Text Available Model Driven Engineering (MDE is an emerging approach of software engineering. MDE emphasizes the construction of models from which the implementation should be derived by applying model transformations. The Ontology Definition Meta-model (ODM has been proposed as a profile for UML models of the Web Ontology Language (OWL. In this context, transformations of UML models can be mapped into ODM/OWL transformations. On the other hand, model validation is a crucial task in model transformation. Meta-modeling permits to give a syntactic structure to source and target models. However, semantic requirements have to be imposed on source and target models. A given transformation will be sound when source and target models fulfill the syntactic and semantic requirements. In this paper, we present an approach for model validation in ODM based transformations. Adopting a logic programming based transformational approach we will show how it is possible to transform and validate models. Properties to be validated range from structural and semantic requirements of models (pre and post conditions to properties of the transformation (invariants. The approach has been applied to a well-known example of model transformation: the Entity-Relationship (ER to Relational Model (RM transformation.

  12. IOT Based Inline Errands IBIE

    Directory of Open Access Journals (Sweden)

    Ramesh G

    2015-08-01

    Full Text Available The Internet of Things IoT is an emerging technology that is creating an enormous network of things communicating with one another. It involves a broad set of technologies hardware and software stacks. Data humans devices and communication are critical elements of an IoT ecosystem. The primary purpose of this research paper is to provide an advantageous application in day to day life in redeemable time factor. Now a days shopping at malls is a daily or weekly activity of domestic life. Survey states during the initial week of month and weekends are the peak sale periods at shopping malls and super markets. Often equivalent time is taken for billing and payment as time taken for shopping. The Application introduced in this paper provides smart solution to redeemable time.

  13. Managing Green Business Model Transformations

    CERN Document Server

    Sommer, Axel

    2012-01-01

    Environmental sustainability creates both tremendous business opportunities and formidable threats to established companies across virtually all industry sectors. Yet many companies tackle the issue in a superficial or passive way through increased environmental reporting, the use of “greenspeak” in their corporate communication activities or isolated efforts to create green products or reduce pollution. In contrast, there are a small but increasing number of firms that employ a holistic approach to sustainability and consider fundamental changes to their existing business models. By ignoring the opportunities of Green Business Model Transformations, companies exclude themselves from a large variety of potential means to create economic value. In addition to ordinary product and process innovations, they can change “the rules of the game” within an industry towards environmental sustainability. This can facilitate the commercialisation of new green products that would not be competitive otherwise targ...

  14. 公私合作制下公立医院改革IOT模式引论%IOT model as used in public hospitals reform in PPP scenario

    Institute of Scientific and Technical Information of China (English)

    赵宁; 范晶

    2014-01-01

    运用公私合作制对公立医院进行存量调整,对社会办医进行增量发展,是落实医改政策、优化医疗服务资源配置的有益探索.IOT是公私合作制的一种模式,将其应用于公立医院改革是一种体制创新.本研究在对IOT模式进行溯源并辨析其内涵、形式、优劣势的基础上,从政策、理论、实践三个层面对其进行可行性分析,并对我国已有的IOT项目实践进行案例讨论,以期供大家谈讨.%Public-private partnership(PPP)serves as a useful attempt for an adjustment of existing number of public hospitals and incremental development of private hospitals in an effort to implement policies of the health reform and optimize the allocation of medical resources.Investment-OperationTurnover(IOT) is a way to introduce the PPP practice,regarded as an institutional innovation in reforming public hospitals.This paper traced back the IOT model in its development and analyzed its connotation and form,as well as its strengths and weaknesses in a feasibility study,and presented the existing IOT projects in China for reference and open discussion.

  15. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  16. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  17. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  18. Distributed Service-Based Approach for Sensor Data Fusion in IoT Environments

    Directory of Open Access Journals (Sweden)

    Sandra Rodríguez-Valenzuela

    2014-10-01

    Full Text Available The Internet of Things (IoT enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  19. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  20. Modelling the pulse transformer in SPICE

    Science.gov (United States)

    Godlewska, Malgorzata; Górecki, Krzysztof; Górski, Krzysztof

    2016-01-01

    The paper is devoted to modelling pulse transformers in SPICE. It shows the character of the selected models of this element, points out their advantages and disadvantages, and presents the results of experimental verification of the considered models. These models are characterized by varying degrees of complexity - from linearly coupled linear coils to nonlinear electrothermal models. The study was conducted for transformer with ring cores made of a variety of ferromagnetic materials, while exciting the sinusoidal signal of a frequency 100 kHz and different values of load resistance. The transformers operating conditions under which the considered models ensure the acceptable accuracy of calculations are indicated.

  1. On the interoperability of model-to-model transformation languages

    NARCIS (Netherlands)

    Jouault, Frédéric; Kurtev, Ivan

    2007-01-01

    Transforming models is a crucial activity in Model Driven Engineering (MDE). With the adoption of the OMG QVT standard for model transformation languages, it is anticipated that the experience in applying model transformations in various domains will increase. However, the QVT standard is just one p

  2. 物联网的边界计算模型:雾计算%A boundary calculation model of IoT fog computing

    Institute of Scientific and Technical Information of China (English)

    杨志和

    2014-01-01

    在物联网和云计算带来技术变革和带动产业发展的过程中,由于网络接入设备激增,而网络带宽有限的情况下,思科公司推出了雾计算的概念。首先探讨雾计算的特征和应用模式,然后分析雾计算的“雾节点”与云计算的“云节点”以及物联网的“物节点”的互操作方法,并总结了雾计算的用例,最后给出了前景展望。%During the process of technological change and industry development brought by IoT and cloud computing, Cisco Corporation launched the concept of fog computing because of the surging network access equipments and limited network bandwidth. First, the characteristics and application mode of fog computing are discussed. Then the interoperation method among“the fog nodes”of fog computing,“the cloud nodes”of cloud computing and“the entity nodes”of IoT is analyzed. The examples of fog computing are summarized. The prospect forecast is put forward.

  3. Has the Nordic Welfare Model Been Transformed?

    DEFF Research Database (Denmark)

    Greve, Bent; Kvist, Jon

    2011-01-01

    The Nordic welfare model is undergoing a fundamental transformation. Using Denmark we show how a universal welfare state model is gradually being transformed into an emergent multi-tiered welfare state. Whereas the Danish pension system's having become multi-tiered in the 1990s, with private...

  4. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  5. Modeling of austenite to ferrite transformation

    Indian Academy of Sciences (India)

    Mohsen Kazeminezhad

    2012-06-01

    In this research, an algorithm based on the -state Potts model is presented for modeling the austenite to ferrite transformation. In the algorithm, it is possible to exactly track boundary migration of the phase formed during transformation. In the algorithm, effects of changes in chemical free energy, strain free energy and interfacial energies of austenite–austenite, ferrite–ferrite and austenite–ferrite during transformation are considered. From the algorithm, the kinetics of transformation and mean ferrite grain size for different cooling rates are calculated. It is found that there is a good agreement between the calculated and experimental results.

  6. Quantum decoration transformation for spin models

    Science.gov (United States)

    Braz, F. F.; Rodrigues, F. C.; de Souza, S. M.; Rojas, Onofre

    2016-09-01

    It is quite relevant the extension of decoration transformation for quantum spin models since most of the real materials could be well described by Heisenberg type models. Here we propose an exact quantum decoration transformation and also showing interesting properties such as the persistence of symmetry and the symmetry breaking during this transformation. Although the proposed transformation, in principle, cannot be used to map exactly a quantum spin lattice model into another quantum spin lattice model, since the operators are non-commutative. However, it is possible the mapping in the "classical" limit, establishing an equivalence between both quantum spin lattice models. To study the validity of this approach for quantum spin lattice model, we use the Zassenhaus formula, and we verify how the correction could influence the decoration transformation. But this correction could be useless to improve the quantum decoration transformation because it involves the second-nearest-neighbor and further nearest neighbor couplings, which leads into a cumbersome task to establish the equivalence between both lattice models. This correction also gives us valuable information about its contribution, for most of the Heisenberg type models, this correction could be irrelevant at least up to the third order term of Zassenhaus formula. This transformation is applied to a finite size Heisenberg chain, comparing with the exact numerical results, our result is consistent for weak xy-anisotropy coupling. We also apply to bond-alternating Ising-Heisenberg chain model, obtaining an accurate result in the limit of the quasi-Ising chain.

  7. Ontology Based Model Transformation Infrastructure

    NARCIS (Netherlands)

    Göknil, A.; Topaloglu, N.Y.

    2005-01-01

    Using MDA in ontology development has been investigated in several works recently. The mappings and transformations between the UML constructs and the OWL elements to develop ontologies are the main concern of these research projects. We propose another approach in order to achieve the collaboration

  8. Light Weight and Tree-Based Forwarding Model in IPv6 IoT Subnet%面向IPv6物联子网的轻量级树型转发模型

    Institute of Scientific and Technical Information of China (English)

    肖融; 陈文龙; 孙波

    2014-01-01

    RPL has received universal acceptance in IPv6 routing of the Internet of things (IoT). However, for large-scale multi-hops networks, the RPL routing model is faced with the problem that some IoT nodes heavily consume routing table storage. Besides, the flattened address architecture in IoT subnet makes this problem more prominent. In this paper, TFAD (tree forwarding model with address automatically distributed), a light-weight and tree-based forwarding model, is proposed to support automatic IPv6 address assignment. TFAD constructs a forwarding-level-tree for all the IoT nodes that make the IPv6 addresses of nodes aggregate highly in each sub-tree. In TFAD, each node only needs to maintain a few forwarding entries, the number of which is equivalent to the number of its direct son-nodes. Moreover, the backup mechanism of parent node in TFAD is designed. This mechanism supports the network topology reconstitution based on the whole sub-tree, achieving fast route-recovery from network failure. The experiments based on real sensor nodes prove that TFAD model possesses not only high performance on routing table storage but also rapidity on routing table learning and routing recovery from failure.%在IPv6物联网中,RPL路由模型已得到广泛的认可。然而对于规模较大的多跳网络结构,RPL面临着部分转发节点路由容量较大的问题。而且物联子网中扁平化的地址结构使得这一问题更为突出。设计了支持IPv6地址自动分配的轻量级树型转发模型TFAD(tree forwarding model with address automatically distributed),将物联子网中的节点构造成一棵层次转发树,树节点的IPv6地址在子树范围内高度聚合。各节点只需存储与其子节点数相当的转发项,即可完成TFAD模型的数据转发。此外,设计了TFAD模型的备份父节点机制,当网络出现故障时能够以子树为单位进行网络拓扑重构,实现物联子网的快速路由恢复。实验验证了 TFAD 模型

  9. Flood simulation and verification with IoT sensors

    Science.gov (United States)

    Chang, Che-Hao; Hsu, Chih-Tsung; Wu, Shiang-Jen; Huang, Sue-Wei

    2017-04-01

    2D flood dynamic simulation is a vivid tool to demonstrate the possible expose area that sustain impact of high rise of water level. Along with progress in high resolution digital terrain model, the simulation results are quite convinced yet not proved to be close to what is really happened. Due to the dynamic and uncertain essence, the expose area usually could not be well defined during a flood event. Recent development in IoT sensors bring a low power and long distance communication which help us to collect real time flood depths. With these time series of flood depths at different locations, we are capable of verifying the simulation results corresponding to the flood event. 16 flood gauges with IoT specification as well as two flood events in Annan district, Tainan city, Taiwan are examined in this study. During the event in 11, June, 2016, 12 flood gauges works well and 8 of them provide observation match to simulation.

  10. Towards Internet of Services - SDN-enabled IMS Architecture for IoT Integration

    DEFF Research Database (Denmark)

    Katov, Anton Nikolaev; Anggorojati, Bayu; Kyriazakos, Sofoklis

    2016-01-01

    to be combined and offered as "services". The use of a local cloud of gateways that aggregate and analyze the data of different heterogeneous IoT devices and expose unified service oriented interfaces in support of machine-to-machine (M2M) applications has been presented in earlier works. This paper proposes......The Internet of Things (IoT) paradigm is gaining tremendous popularity and the number of connected devices, or "things", is continuously growing, aiming to transform our everyday life. In order to address the real needs of the end user, the capabilities of the individual "things" have...

  11. 采用物联网技术的便携式健身产品商务模式研究%Research on business model of portable iftness products base on the IOT technology

    Institute of Scientific and Technical Information of China (English)

    于翔; 李雪涛; 朱亚欣; 李晓东; 赵莉彬; 邱成

    2013-01-01

    With the popularity of smartphones, the market of portable iftness system based on the IOT technology is growing up gradually in the iftness industry. Differ from the traditional iftness products, according to the characteristics of citizen life, with intelligent operation technique and network technique, the portable iftness products makes the mobile phone a fun IOT sensor. Then the body data is collected by a speciifc setting of the device. Face the market opportunities brought by the new products, what kind of business model should be adopt is the key factors affect the iftness market in future. Focus on this issue and according to the product features, the business model is researched.%随着智能手机的普及,基于物联网技术的便携式健身系统市场逐渐在健身行业孕育起来。区别于传统健身产品,便携式健身产品针对都市人群的生活特点,同时结合智能操作技术与网络技术,就可以将手机变成一个寓教于乐的物联网传感器,然后通过特定的场景设置来收集携带者身体指标数据,提供健身建议。面对新产品带来的市场机遇,采用何种商务模式是影响未来健身市场走势的关键因素。针对这一问题,并依托产品特点进行了商务模式的研究。

  12. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  13. 湖南农业云物联网建设对策分析%The countermeasure analysis of Hunan cloud agriculture IOT construction

    Institute of Scientific and Technical Information of China (English)

    刘波; 郭平; 沈岳; 丁毅

    2013-01-01

      To meet the demand that Hunan is taken as the pilot province of national rural information, base on the research analysis in the grassroots during the implementation process of the Hunan agriculture IOT program, and learn from the implementation result of Yixing of Jiangsu agriculture IOT program, some specific countermeasures is provided. It is proposed that to build Hunan agriculture IOT should first break the mature industries of pig, aquaculture and greenhouse cultivation, and take the university technical supports and corporate operation as mainly model, focus on the resource integration, demonstrate first, and then popularize, so that accelerates the IOT research achievement transformation.%  针对湖南作为国家农村信息化试点省份的需求导向,以湖南农业物联网项目实施过程中多次下基层调研分析为基础,同时借鉴江苏省宜兴市农业物联网的实施成果,针对湖南省农业物联网的实际情况,结合湖南农业云平台的应用,提出湖南农业物联网建设必须优先突破当前比较成熟的生猪、水产、大棚栽培等物联网建设,以高校技术支持、企业运作为主轴,以资源整合为重点,先示范后推广,加快湖南省农业物联网研究成果转化的具体对策。

  14. 智能电网物联网技术架构及信息安全防护体系研究%Research on technical framework and cyber security protection system of IOT in smart grid

    Institute of Scientific and Technical Information of China (English)

    赵婷; 高昆仑; 郑晓崑; 徐兴坤

    2012-01-01

    物联网作为能够全面实现信息感知、可靠传输及高效信息处理的先进技术,在智能电网发电、输电、变电、配电、调度、用电等环节应用广泛且前景广阔.解决物联网的信息安全问题,实现物联网在智能电网中的安全应用既必要又迫切.探讨了智能电网中典型的物联网系统,分析了通用的技术架构及系统面临的信息安全风险,最后提出了智能电网中物联网系统信息安全防范的技术体系和关键的安全防护措施.%As an advanced technology for information sensing and transmission, Internet of things (IOT) has been applied extensively in power generation, transmission, transformation, distribution, utilization and other processes, and will develop with broad prospect in smart grid. Therefore, it is necessary to resolve security problems and decrease cyber security risks, which aims to guarantee steady IOT operating in smart grid. The typical IOT system structure applied in smart grid is identified and modeled. The existing cyber security risks are assessed. Furthermore, a cyber security protection system and key protection measures for IOT in smart grid are presented, which provided an available guidance for IOT applied in smart grid.

  15. Modeling and testing of ethernet transformers

    Science.gov (United States)

    Bowen, David

    2011-12-01

    Twisted-pair Ethernet is now the standard home and office last-mile network technology. For decades, the IEEE standard that defines Ethernet has required electrical isolation between the twisted pair cable and the Ethernet device. So, for decades, every Ethernet interface has used magnetic core Ethernet transformers to isolate Ethernet devices and keep users safe in the event of a potentially dangerous fault on the network media. The current state-of-the-art Ethernet transformers are miniature (explored which are capable of exceptional miniaturization or on-chip fabrication. This dissertation thoroughly explores the performance of the current commercial Ethernet transformers to both increase understanding of the device's behavior and outline performance parameters for replacement devices. Lumped element and distributed circuit models are derived; testing schemes are developed and used to extract model parameters from commercial Ethernet devices. Transfer relation measurements of the commercial Ethernet transformers are compared against the model's behavior and it is found that the tuned, distributed models produce the best transfer relation match to the measured data. Process descriptions and testing results on fabricated thin-film dielectric-core toroid transformers are presented. The best results were found for a 32-turn transformer loaded with 100Ω, the impedance of twisted pair cable. This transformer gave a flat response from about 10MHz to 40MHz with a height of approximately 0.45. For the fabricated transformer structures, theoretical methods to determine resistance, capacitance and inductance are presented. A special analytical and numerical analysis of the fabricated transformer inductance is presented. Planar cuts of magnetic slope fields around the dielectric-core toroid are shown that describe the effect of core height and winding density on flux uniformity without a magnetic core.

  16. Modeling and simulating of unloading welding transformer

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The simulation model of an unloading welding transformer was established on the basis of MATLAB software, and the modeling principle was described in detail in the paper. The model was made up of three sub-models, i.e. the linear inductor sub-model, the non-linear inductor sub-model and series connection sub-model controlled by current, and these sub-models were jointed together by means of segmented linearization. The simulating results showed that, in the conditions of the high convert frequency and the large cross section of the magnet core of a welding transformer, the non-linear inductor sub-model can be substituted by a linear inductor sub-model in the model; and the leakage reactance in the welding transformer is one of the main reasons of producing over-current and over-voltage in the inverter. The simulation results demonstrate that the over-voltage produced by leakage reactance is nearly two times of the input voltage supplied to the transformer, and the lasting time of over-voltage depends on time constant τ1. With reducing of τ1, the amplitude of the over-current will increase, and the lasting time becomes shorter. Contrarily, with increasing of τ1, the amplitude of the over-current will decrease, and the lasting time becomes longer. The model has played the important role for the development of the inverter resistance welding machine.

  17. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  18. Application of an analytical phase transformation model

    Institute of Scientific and Technical Information of China (English)

    LIU Feng; WANG Hai-feng; YANG Chang-lin; CHEN Zheng; YANG Wei; YANG Gen-cang

    2006-01-01

    Employing isothermal and isochronal differential scanning calorimetry, an analytical phase transformation model was used to study the kinetics of crystallization of amorphous Mg82.3Cu17.7 and Pd40Cu30P20Ni10 alloys. The analytical model comprised different combinations of various nucleation and growth mechanisms for a single transformation. Applying different combinations of nucleation and growth mechanisms, the nucleation and growth modes and the corresponding kinetic and thermodynamic parameters, have been determined. The influence of isothermal pre-annealing on subsequent isochronal crystallization kinetics with the increase of pre-annealing can be analyzed. The results show that the changes of the growth exponent, n, and the effective overall activation energy Q, occurring as function of the degree of transformation, do not necessarily imply a change of nucleation and growth mechanisms, i.e. such changes can occur while the transformation is isokinetic.

  19. Six Sigma Driven Enterprise Model Transformation

    Directory of Open Access Journals (Sweden)

    Raymond Vella

    2009-10-01

    Full Text Available Enterprise architecture methods provide a structured system to understand enterprise activities. However, existing enterprise modelling methodologies take static views of the enterprise and do not naturally lead to a path of improvement during enterprise model transformation. This paper discusses the need for a methodology to facilitate changes for improvement in an enterprise. The six sigma methodology is proposed as the tool to facilitate progressive and continual Enterprise Model Transformation to allow businesses to adapt to meet increased customer expectation and global competition. An alignment of six sigma with phases of GERAM life cycle is described with inclusion of Critical-To-Satisfaction (CTS requirements. The synergies of combining the two methodologies are presented in an effort to provide a more culturally embedded framework for Enterprise Model Transformation that builds on the success of six sigma.

  20. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...... of knowledge on IoT and pinpointing the most influential ideas to-date on the topic....

  1. Modeling of Pulsed Transformer with Nanocrystalline Cores

    Directory of Open Access Journals (Sweden)

    Amir Baktash

    2014-07-01

    Full Text Available Recently tape wound cores, due to their excellent properties, are widely used in transformers for pulsed or high frequency applications. The spiral structure of these cores affects the flux distribution inside the core and causes complication of the magnetic analysis and consequently the circuit analysis. In this paper, a model based on reluctance networks method is used to analyze the magnetic flux in toroidal wound cores and losses calculation. A Preisach based hysteresis model is included in the model to consider the nonlinear characteristic of the core. Magnetic losses are calculated by having the flux density in different points of the core and using the hysteresis model. A transformer for using in a series resonant converter is modeled and implemented. The modeling results are compared with experimental measurements and FEM results to evaluate the validity of the model. Comparisons show the accuracy of the model besides its simplicity and fast convergence.

  2. Modeling of Current Transformers Under Saturation Conditions

    Directory of Open Access Journals (Sweden)

    Martin Prochazka

    2006-01-01

    Full Text Available During a short circuit the input signal of the relay can be distort by the magnetic core saturation of the current transformer. It is useful to verify the behavior of CT by a mathematical model. The paper describes one phase and three phase models and it presents some methods of how to analyze and classify a deformed secondary current

  3. Analysis of Crosscutting in Model Transformations

    NARCIS (Netherlands)

    Berg, van den K.G.; Tekinerdogan, B.; Nguyen, H.; Aagedal, J.; Neple, T.; Oldevik, J.

    2006-01-01

    This paper describes an approach for the analysis of crosscutting in model transformations in the Model Driven Architecture (MDA). Software architectures should be amenable to changes in user requirements and technological platforms. Impact analysis of changes can be based on traceability of archite

  4. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  5. Involuntary outpatient treatment (IOT) in Spain.

    Science.gov (United States)

    Hernández-Viadel, M; Cañete-Nicolás, C; Bellido-Rodriguez, C; Asensio-Pascual, P; Lera-Calatayud, G; Calabuig-Crespo, R; Leal-Cercós, C

    2015-01-01

    In recent decades there have been significant legislative changes in Spain. Society develops faster than laws, however, and new challenges have emerged. In 2004, the Spanish Association of Relatives of the Mentally Ill (FEAFES) proposed amending the existing legislation to allow for the implementation of involuntary outpatient treatment (IOT) for patients with severe mental illness. Currently, and after having made several attempts at change, there is no specific legislation governing the application of this measure. Although IOT may be implemented in local programmes, we consider legal regulation to be needed in this matter. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Theory and Model for Martensitic Transformations

    DEFF Research Database (Denmark)

    Lindgård, Per-Anker; Mouritsen, Ole G.

    1986-01-01

    Martensitic transformations are shown to be driven by the interplay between two fluctuating strain components. No soft mode is needed, but a central peak occurs representing the dynamics of strain clusters. A two-dimensional magnetic-analog model with the martensitic-transition symmetry...

  7. Numerical modeling of transformer inrush currents

    Science.gov (United States)

    Cardelli, E.; Faba, A.

    2014-02-01

    This paper presents an application of a vector hysteresis model to the prediction of the inrush current due the arbitrary initial excitation of a transformer after a fault. The approach proposed seems promising in order to predict the transient overshoot in current and the optimal time to close the circuit after the fault.

  8. Numerical modeling of transformer inrush currents

    Energy Technology Data Exchange (ETDEWEB)

    Cardelli, E. [Department of Industrial Engineering, University of Perugia, I-06125 Perugia (Italy); Center for Electric and Magnetic Applied Research (Italy); Faba, A., E-mail: faba@unipg.it [Department of Industrial Engineering, University of Perugia, I-06125 Perugia (Italy); Center for Electric and Magnetic Applied Research (Italy)

    2014-02-15

    This paper presents an application of a vector hysteresis model to the prediction of the inrush current due the arbitrary initial excitation of a transformer after a fault. The approach proposed seems promising in order to predict the transient overshoot in current and the optimal time to close the circuit after the fault.

  9. NOVEL CONTEXT-AWARE CLUSTERING WITH HIERARCHICAL ADDRESSING (CCHA) FOR THE INTERNET OF THINGS (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2013-01-01

    -hoc network, interaction between these nomadic devices to provide seamless service extend the need of new identi-ties to the things, addressing and IdM in the IoT. New identities and identifier format to alleviate the perfor-mance issue is introduced in this paper. This paper pre-sents novel Context....... Furthermore, this paper also presents the framework for IdM in the IoT and mathematical model for queuing analysis.......As computing technology becomes more tightly coupled into dynamic and mobile world of the Internet of Things (IoT), security mechanism becomes more stringent, less flexible and intrusive. Scalability issue in the IoT makes Identity Management (IdM) of ubiquitous things more challenging. Forming ad...

  10. Industry 4.0, M2m, Iot&S - All Equal?

    Science.gov (United States)

    Dobrin, Carmen

    2014-11-01

    Similarity between Industry 4.0, M2M, IOT&S. Advantages and disadvantages obtained using this three important methods. Decreasing costs while components are getting smaller and smaller in a world with better networking. Influence of business management applications integrated in smart factory logistic. The most important impacts in merging virtual and real production world, with the improvement of best processes having the same goal: creating value by open innovation

  11. Modeling of open bank disturbution transformer connections

    OpenAIRE

    Lorber, Christa Kaye

    1995-01-01

    Distribution transformers are an essential part of any power distribution system. In order to thoroughly simulate and analyze such a system, accurate models must be developed that make use of readily available field data. In addition, unbalanced loading situations, which are encountered frequently in distribution transfonner utilization, must be handled properly. These requirements form the basis for the modeling of the open-wye/open-delta and open-delta/open-delta distribution...

  12. Optimization of Wireless Node Discovery in an IoT Network

    DEFF Research Database (Denmark)

    Vasilev, Vladislav; Iliev, Georgi; Poulkov, Vladimir

    2015-01-01

    in the decrease in discovery costs. The proposed model covers well the dynamics of the complex sensor network, such as the one that maybe employed in an Internet of Things (IoT) scenario, where nodes need to act autonomously during the communication process. We apply the Lotka-Voltera model to increase...

  13. Multiphase Transformer Modelling using Finite Element Method

    Directory of Open Access Journals (Sweden)

    Nor Azizah Mohd Yusoff

    2015-03-01

    Full Text Available In the year of 1970 saw the starting invention of the five-phase motor as the milestone in advanced electric motor. Through the years, there are many researchers, which passionately worked towards developing for multiphase drive system. They developed a static transformation system to obtain a multiphase supply from the available three-phase supply. This idea gives an influence for further development in electric machines as an example; an efficient solution for bulk power transfer. This paper highlighted the detail descriptions that lead to five-phase supply with fixed voltage and frequency by using Finite-Element Method (FEM. Identifying of specification on a real transformer had been done before applied into software modeling. Therefore, Finite-Element Method provides clearly understandable in terms of visualize the geometry modeling, connection scheme and output waveform.

  14. An IoT Knowledge Reengineering Framework for Semantic Knowledge Analytics for BI-Services

    OpenAIRE

    Nilamadhab Mishra; Hsien-Tsung Chang; Chung-Chih Lin

    2015-01-01

    In a progressive business intelligence (BI) environment, IoT knowledge analytics are becoming an increasingly challenging problem because of rapid changes of knowledge context scenarios along with increasing data production scales with business requirements that ultimately transform a working knowledge base into a superseded state. Such a superseded knowledge base lacks adequate knowledge context scenarios, and the semantics, rules, frames, and ontology contents may not meet the latest requir...

  15. Coaching Model + Clinical Playbook = Transformative Learning.

    Science.gov (United States)

    Fletcher, Katherine A; Meyer, Mary

    2016-01-01

    Health care employers demand that workers be skilled in clinical reasoning, able to work within complex interprofessional teams to provide safe, quality patient-centered care in a complex evolving system. To this end, there have been calls for radical transformation of nursing education including the development of a baccalaureate generalist nurse. Based on recommendations from the American Association of Colleges of Nursing, faculty concluded that clinical education must change moving beyond direct patient care by applying the concepts associated with designer, manager, and coordinator of care and being a member of a profession. To accomplish this, the faculty utilized a system of focused learning assignments (FLAs) that present transformative learning opportunities that expose students to "disorienting dilemmas," alternative perspectives, and repeated opportunities to reflect and challenge their own beliefs. The FLAs collected in a "Playbook" were scaffolded to build the student's competencies over the course of the clinical experience. The FLAs were centered on the 6 Quality and Safety Education for Nurses competencies, with 2 additional concepts of professionalism and systems-based practice. The FLAs were competency-based exercises that students performed when not assigned to direct patient care or had free clinical time. Each FLA had a lesson plan that allowed the student and faculty member to see the competency addressed by the lesson, resources, time on task, student instructions, guide for reflection, grading rubric, and recommendations for clinical instructor. The major advantages of the model included (a) consistent implementation of structured learning experiences by a diverse teaching staff using a coaching model of instruction; (b) more systematic approach to present learning activities that build upon each other; (c) increased time for faculty to interact with students providing direct patient care; (d) guaranteed capture of selected transformative

  16. Comparing relational model transformation technologies: implementing Query/View/Transformation with Triple Graph Grammars

    DEFF Research Database (Denmark)

    Greenyer, Joel; Kindler, Ekkart

    2010-01-01

    The Model Driven Architecture (MDA) is an approach to develop software based on different models. There are separate models for the business logic and for platform specific details. Moreover, code can be generated automatically from these models. This makes transformations a core technology for MDA...... and for model-based software engineering approaches in general. QVT (Query/View/Transformation) is the transformation technology recently proposed for this purpose by the OMG. TGGs (Triple Graph Grammars) are another transformation technology proposed in the mid-nineties, used for example in the FUJABA CASE...... tool. In contrast to many other transformation technologies, both QVT and TGGs declaratively define the relation between two models. With this definition, a transformation engine can execute a transformation in either direction and, based on the same definition, can also propagate changes from one...

  17. Micromanaging the IoT space

    Science.gov (United States)

    Mayer, Irak Vicarte

    2017-05-01

    The speed of IoT devices currently connected in our daily lives has drastically accelerated in the last couple of years. The lack of standardization, regulation, and an efficient process to integrate these devices to our ecosystem has led to a relaxed security and an ineffective use of the data generated. This paper presents a new approach to the IoT ecosystem management that improves data sharing and security by categorizing and micromanaging the connected devices. The use of micromanaging multiple access points (M2AP) allows the architecture to respond faster and efficiently to events and attacks to the digital hive. The "local beehive"/ "master beehive" approach seals a compromise of delegating tasks and improving the network management capacity. Finally, an efficient data storage and compact reports of the raw information collected can then be transmitted to cloud services for further analysis if required.

  18. Inventory transparency for agricultural produce through IOT

    Science.gov (United States)

    Srinivasan, S. P.; Sorna Shanthi, D.; Anand, Aashish V.

    2017-06-01

    Re-structuring the practices of traditional inventory management is becoming more essential to optimize the supply chain transparency and accuracy of agricultural produce. A flexible and transparent inventory management system is becoming the need of any agricultural commodity. It was noticed that the major setback for the farmers who are the suppliers of the farm produce is due to poor supply chain integration. The recent advent technologies and IT explosion can bring up a greater impact in the process of storing, tracking, distributing and monitoring perishable agriculture produce of day to day life. The primary focus of this paper is to integrate IoT into inventory management and other inbound logistics management of agriculture produce. The unique features of agricultural produce like a prediction of supply, demand, the location of warehouses, distribution and tracking of inventory can be integrated through IoT. This paper proposes a conceptual framework for inventory management transparency involved in the supply chain of agriculture produce.

  19. TRANSFORM - TRANsient Simulation Framework of Reconfigurable Models

    Energy Technology Data Exchange (ETDEWEB)

    2017-09-01

    Existing development tools for early stage design and scoping of energy systems are often time consuming to use, proprietary, and do not contain the necessary function to model complete systems (i.e., controls, primary, and secondary systems) in a common platform. The Modelica programming language based TRANSFORM tool (1) provides a standardized, common simulation environment for early design of energy systems (i.e., power plants), (2) provides a library of baseline component modules to be assembled into full plant models using available geometry, design, and thermal-hydraulic data, (3) defines modeling conventions for interconnecting component models, and (4) establishes user interfaces and support tools to facilitate simulation development (i.e., configuration and parameterization), execution, and results display and capture.

  20. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  1. A systemic and cognitive approach for IoT security

    OpenAIRE

    Riahi, Arbia; Natalizio, Enrico; Challal, Yacine; Mitton, Nathalie; Iera, Antonio

    2014-01-01

    Invited Paper; International audience; The Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, technol...

  2. A Software-Defined Approach to IoT Networking

    Institute of Scientific and Technical Information of China (English)

    Christian Jacquenet; Mohamed Boucadair

    2016-01-01

    It is foreseen that the Internet of Things (IoT) will comprise billions of connected devices, and this will make the provi⁃sioning and operation of some IoT connectivity services more challenging. Indeed, IoT services are very different from lega⁃cy Internet services because of their dimensioning figures and also because IoT services differ dramatically in terms of na⁃ture and constraints. For example, IoT services often rely on energy and CPU⁃constrained sensor technologies, regardless of whether the service is for home automation, smart building, e⁃health, or power or water metering on a regional or national scale. Also, some IoT services, such as dynamic monitoring of biometric data, manipulation of sensitive information, and pri⁃vacy needs to be safeguarded whenever this information is for⁃warded over the underlying IoT network infrastructure. This paper discusses how software⁃defined networking (SDN) can facilitate the deployment and operation of some advanced IoT services regardless of their nature or scope. SDN introduces a high degree of automation in service delivery and operation—from dynamic IoT service parameter exposure and negotiation to resource allocation, service fulfillment, and assurance. This paper does not argue that all IoT services must adopt SDN. Rather, it is left to the discretion of operators to decide which IoT services can best leverage SDN capabilities. This paper only discusses managed IoT services, i.e., services that are op⁃erated by a service provider.

  3. IoT interoperability:a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  4. IoT interoperability:a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  5. Laplace transform in tracer kinetic modeling

    Energy Technology Data Exchange (ETDEWEB)

    Hauser, Eliete B., E-mail: eliete@pucrs.br [Instituto do Cerebro (InsCer/FAMAT/PUC-RS), Porto Alegre, RS, (Brazil). Faculdade de Matematica

    2013-07-01

    The main objective this paper is to quantify the pharmacokinetic processes: absorption, distribution and elimination of radiopharmaceutical(tracer), using Laplace transform method. When the drug is administered intravenously absorption is complete and is available in the bloodstream to be distributed throughout the whole body in all tissues and fluids, and to be eliminated. Mathematical modeling seeks to describe the processes of distribution and elimination through compartments, where distinct pools of tracer (spatial location or chemical state) are assigned to different compartments. A compartment model is described by a system of differential equations, where each equation represents the sum of all the transfer rates to and from a specific compartment. In this work a two-tissue irreversible compartment model is used for description of tracer, [{sup 18}F]2-fluor-2deoxy-D-glucose. In order to determine the parameters of the model, it is necessary to have information about the tracer delivery in the form of an input function representing the time-course of tracer concentration in arterial blood or plasma. We estimate the arterial input function in two stages and apply the Levenberg-Marquardt Method to solve nonlinear regressions. The transport of FDG across de arterial blood is very fast in the first ten minutes and then decreases slowly. We use de Heaviside function to represent this situation and this is the main contribution of this study. We apply the Laplace transform and the analytical solution for two-tissue irreversible compartment model is obtained. The only approach is to determinate de arterial input function. (author)

  6. Register Allocation By Model Transformer Semantics

    CERN Document Server

    Wang, Yin

    2012-01-01

    Register allocation has long been formulated as a graph coloring problem, coloring the conflict graph with physical registers. Such a formulation does not fully capture the goal of the allocation, which is to minimize the traffic between registers and memory. Linear scan has been proposed as an alternative to graph coloring, but in essence, it can be viewed as a greedy algorithm for graph coloring: coloring the vertices not in the order of their degrees, but in the order of their occurence in the program. Thus it suffers from almost the same constraints as graph coloring. In this article, I propose a new method of register allocation based on the ideas of model transformer semantics (MTS) and static cache replacement (SCR). Model transformer semantics captures the semantics of registers and the stack. Static cache replacement relaxes the assumptions made by graph coloring and linear scan, aiming directly at reducing register-memory traffic. The method explores a much larger solution space than that of graph c...

  7. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  8. VMTL: a language for end-user model transformation

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2016-01-01

    , these languages are largely ill-equipped for adoption by end-user modelers in areas such as requirements engineering, business process management, or enterprise architecture. We aim to introduce a model transformation language addressing the skills and requirements of end-user modelers. With this contribution, we......Model transformation is a key enabling technology of Model-Driven Engineering (MDE). Existing model transformation languages are shaped by and for MDE practitioners—a user group with needs and capabilities which are not necessarily characteristic of modelers in general. Consequently...... hope to broaden the application scope of model transformation and MDE technology in general. We discuss the profile of end-user modelers and propose a set of design guidelines for model transformation languages addressing them. We then introduce Visual Model Transformation Language (VMTL) following...

  9. Crystal Level Continuum Modeling of Phase Transformations: The (alpha) <--> (epsilon) Transformation in Iron

    Energy Technology Data Exchange (ETDEWEB)

    Barton, N R; Benson, D J; Becker, R; Bykov, Y; Caplan, M

    2004-10-18

    We present a crystal level model for thermo-mechanical deformation with phase transformation capabilities. The model is formulated to allow for large pressures (on the order of the elastic moduli) and makes use of a multiplicative decomposition of the deformation gradient. Elastic and thermal lattice distortions are combined into a single lattice stretch to allow the model to be used in conjunction with general equation of state relationships. Phase transformations change the mass fractions of the material constituents. The driving force for phase transformations includes terms arising from mechanical work, from the temperature dependent chemical free energy change on transformation, and from interaction energy among the constituents. Deformation results from both these phase transformations and elasto-viscoplastic deformation of the constituents themselves. Simulation results are given for the {alpha} to {epsilon} phase transformation in iron. Results include simulations of shock induced transformation in single crystals and of compression of polycrystals. Results are compared to available experimental data.

  10. Test-driven verification/validation of model transformations

    Institute of Scientific and Technical Information of China (English)

    László LENGYEL; Hassan CHARAF

    2015-01-01

    Why is it important to verify/validate model transformations? The motivation is to improve the quality of the trans-formations, and therefore the quality of the generated software artifacts. Verified/validated model transformations make it possible to ensure certain properties of the generated software artifacts. In this way, verification/validation methods can guarantee different requirements stated by the actual domain against the generated/modified/optimized software products. For example, a verified/ validated model transformation can ensure the preservation of certain properties during the model-to-model transformation. This paper emphasizes the necessity of methods that make model transformation verified/validated, discusses the different scenarios of model transformation verification and validation, and introduces the principles of a novel test-driven method for verifying/ validating model transformations. We provide a solution that makes it possible to automatically generate test input models for model transformations. Furthermore, we collect and discuss the actual open issues in the field of verification/validation of model transformations.

  11. Anàlisi normatiu i operacional de l’aplicació de les energies renovables en un iot Oyster 30

    OpenAIRE

    2015-01-01

    Aquest projecte final del Grau en Nàutica i Transport Marítim pretén analitzar la viabilitat normativa i operacional de la implantació de fonts d\\'energia renovables a bord d\\'un iot determinat. El model de iot és el Oyster 30 de la marca Sessa Marine i registre marítim espanyol. Aquest projecte final del Grau en Nàutica i Transport Marítim pretén analitzar la viabilitat normativa i operacional de la implantació de fonts d'energia renovables a bord d'un iot determinat. El model de iot és e...

  12. The IoT Spartans Challenge

    OpenAIRE

    Libelium

    2016-01-01

    La Universidad Politécnica de Cartagena (UPCT) ha destacado en la primera edición de la competición internacional IoT Spartans Challenge, organizada por Libelium. Catorce de sus estudiantes se han quedado entre los cien primeros clasificados de entre los 1.200 participantes de una decena de universidades y uno de ellos, el alumno de Ingeniería Telemática Sergio López, ha sido el tercer mejor desarrollador, logrando un premio de 500 euros y licencias gratuitas de Microsoft. La competición es a...

  13. A (IoT) chairy tale

    OpenAIRE

    Ligos Masafrets, Marc

    2014-01-01

    “A (IoT) Chairy Tale” es un proyecto de investigación teóricopráctico que, mediante el uso del Diseño de Ficción y la construcción de un prototipo diegético, trabaja sobre las dificultades éticas que plantea la penetración de una tecnología como el Internet de las Cosas y los cambios sociales y políticos que puede conllevar para que su implantación sea posible.

  14. T:XML: A Tool Supporting User Interface Model Transformation

    Science.gov (United States)

    López-Jaquero, Víctor; Montero, Francisco; González, Pascual

    Model driven development of user interfaces is based on the transformation of an abstract specification into the final user interface the user will interact with. The design of transformation rules to carry out this transformation process is a key issue in any model-driven user interface development approach. In this paper, we introduce T:XML, an integrated development environment for managing, creating and previewing transformation rules. The tool supports the specification of transformation rules by using a graphical notation that works on the basis of the transformation of the input model into a graph-based representation. T:XML allows the design and execution of transformation rules in an integrated development environment. Furthermore, the designer can also preview how the generated user interface looks like after the transformations have been applied. These previewing capabilities can be used to quickly create prototypes to discuss with the users in user-centered design methods.

  15. F-Alloy: An Alloy Based Model Transformation Language

    OpenAIRE

    Gammaitoni, Loïc; Kelsen, Pierre

    2015-01-01

    Model transformations are one of the core artifacts of a model-driven engineering approach. The relational logic language Alloy has been used in the past to verify properties of model transformations. In this paper we introduce the concept of functional Alloy modules. In essence a functional Alloy module can be viewed as an Alloy module representing a model transformation. We describe a sublanguage of Alloy called F-Alloy that allows the specification of functional Alloy modules. Module...

  16. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  17. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  18. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  19. An IoT Knowledge Reengineering Framework for Semantic Knowledge Analytics for BI-Services

    Directory of Open Access Journals (Sweden)

    Nilamadhab Mishra

    2015-01-01

    Full Text Available In a progressive business intelligence (BI environment, IoT knowledge analytics are becoming an increasingly challenging problem because of rapid changes of knowledge context scenarios along with increasing data production scales with business requirements that ultimately transform a working knowledge base into a superseded state. Such a superseded knowledge base lacks adequate knowledge context scenarios, and the semantics, rules, frames, and ontology contents may not meet the latest requirements of contemporary BI-services. Thus, reengineering a superseded knowledge base into a renovated knowledge base system can yield greater business value and is more cost effective and feasible than standardising a new system for the same purpose. Thus, in this work, we propose an IoT knowledge reengineering framework (IKR framework for implementation in a neurofuzzy system to build, organise, and reuse knowledge to provide BI-services to the things (man, machines, places, and processes involved in business through the network of IoT objects. The analysis and discussion show that the IKR framework can be well suited to creating improved anticipation in IoT-driven BI-applications.

  20. Controlling reuse in pattern-based model-to-model transformations

    OpenAIRE

    Guerra, Esther,; De Lara, Juan,; Orejas, Fernando

    2010-01-01

    Model-to-model transformation is a central activity in Model-Driven Engineering that consists of transforming models from a source to a target language. Pattern-based model-to-model transformation is our approach for specifying transformations in a declarative, relational and formal style. The approach relies on patterns describing allowed or forbidden relations between two models. These patterns are compiled into operational mechanisms to perform forward and backward transformations. Inspire...

  1. A hybrid Scatter/Transform cloaking model

    Directory of Open Access Journals (Sweden)

    Gad Licht

    2015-01-01

    Full Text Available A new Scatter/Transform cloak is developed that combines the light bending of refraction characteristic of a Transform cloak with the scatter cancellation characteristic of a Scatter cloak. The hybrid cloak incorporates both Transform’s variable index of refraction with modified linear intrusions to maximize the Scatter cloak effect. Scatter/Transform improved the scattering cross-section of cloaking in a 2-dimensional space to 51.7% compared to only 39.6% or 45.1% respectively with either Scatter or Transform alone. Metamaterials developed with characteristics based on the new ST hybrid cloak will exhibit superior cloaking capabilities.

  2. Performance in model transformations: experiments with ATL and QVT

    NARCIS (Netherlands)

    van Amstel, Marcel; Bosems, S.; Ivanov, Ivan; Ferreira Pires, Luis; Cabot, Jordi; Visser, Eelco

    Model transformations are increasingly being incorporated in software development processes. However, as systems being developed with transformations grow in size and complexity, the performance of the transformations tends to degrade. In this paper we investigate the factors that have an impact on

  3. On the Computational Expressiveness of Model Transformation Languages

    DEFF Research Database (Denmark)

    Al-Sibahi, Ahmad Salim

    2015-01-01

    Common folklore in the model transformation community dictates that most transformation languages are Turing-complete. It is however seldom that a proof or an explanation is provided on why such property holds; due to the widely different features and execution models in these language, it is not......Common folklore in the model transformation community dictates that most transformation languages are Turing-complete. It is however seldom that a proof or an explanation is provided on why such property holds; due to the widely different features and execution models in these language......, it is not immediately obvious what their computational expressiveness is. In this paper we present an analysis that clarifies the computational expressiveness of a large number of model transformation languages. The analysis confirms the folklore for all model transformation languages, except the bidirectional ones...

  4. A Distributed Model of Four-Port Monolithic Transformer

    OpenAIRE

    Lee, Dong Ho; Ko, Sangsoo; Jeon, Sang-Hoon; Park, Jae-Woo; Hong, Songcheol

    2004-01-01

    This paper deals with modeling of a monolithic spiral transformer. The transformer is designed and fabricated as a symmetrical octagonal spiral structure using two-metal layer process on GaAs substrate for input balun applications of 2 GHz and 5 GHz push-pull power amplifiers. A distributed model of the transformer is developed to fit in wide frequency range with four ports. The model includes the skin effect which describes increase in series resistance with frequency. Six different se...

  5. SARC Model for Three-Dimensional Coordinate Transformation

    Institute of Scientific and Technical Information of China (English)

    YAO Jili; WANG Shuguang; SUN Yating

    2006-01-01

    In this paper, a transformation model named SARC(static-filter adjustment with restricted condition) is presented, which is more practical and more rigorous in theory and fitting any angle of rotation parameter. The transformation procedure is divided into 4 steps: ① the original and object coordinates can be regarded as observations with errors; ② rigorous formula is firstly deduced in order to compute the first approximation of the transformation parameters by use of four common points and the transformation equation is linearized; ③ calculate the most probable values and variances of the seven transformation parameters by SARC model; ④ to demonstrate validity of SARC , an example is given.

  6. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  7. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  8. Development and verification of printed circuit board toroidal transformer model

    DEFF Research Database (Denmark)

    Pejtersen, Jens; Mønster, Jakob Døllner; Knott, Arnold

    2013-01-01

    by comparing calculated parameters with 3D finite element simulations and experimental measurement results. The developed transformer model shows good agreement with the simulated and measured results. The model can be used to predict the parameters of printed circuit board toroidal transformer configurations......An analytical model of an air core printed circuit board embedded toroidal transformer configuration is presented. The transformer has been developed for galvanic isolation of very high frequency switch-mode dc-dc power converter applications. The theoretical model is developed and verified...

  9. A transformation approach to modelling multi-modal diffusions

    DEFF Research Database (Denmark)

    Forman, Julie Lyng; Sørensen, Michael

    2014-01-01

    This paper demonstrates that flexible and statistically tractable multi-modal diffusion models can be attained by transformation of simple well-known diffusion models such as the Ornstein–Uhlenbeck model, or more generally a Pearson diffusion. The transformed diffusion inherits many properties...

  10. Clone Detection for Graph-Based Model Transformation Languages

    DEFF Research Database (Denmark)

    Strüber, Daniel; Plöger, Jennifer; Acretoaie, Vlad

    2016-01-01

    has been proposed for programming and modeling languages; yet no specific ones have emerged for model transformation languages. In this paper, we explore clone detection for graph-based model transformation languages. We introduce potential use cases for such techniques in the context of constructive...

  11. An ontological model of the practice transformation process.

    Science.gov (United States)

    Sen, Arun; Sinha, Atish P

    2016-06-01

    Patient-centered medical home is defined as an approach for providing comprehensive primary care that facilitates partnerships between individual patients and their personal providers. The current state of the practice transformation process is ad hoc and no methodological basis exists for transforming a practice into a patient-centered medical home. Practices and hospitals somehow accomplish the transformation and send the transformation information to a certification agency, such as the National Committee for Quality Assurance, completely ignoring the development and maintenance of the processes that keep the medical home concept alive. Many recent studies point out that such a transformation is hard as it requires an ambitious whole-practice reengineering and redesign. As a result, the practices suffer change fatigue in getting the transformation done. In this paper, we focus on the complexities of the practice transformation process and present a robust ontological model for practice transformation. The objective of the model is to create an understanding of the practice transformation process in terms of key process areas and their activities. We describe how our ontology captures the knowledge of the practice transformation process, elicited from domain experts, and also discuss how, in the future, that knowledge could be diffused across stakeholders in a healthcare organization. Our research is the first effort in practice transformation process modeling. To build an ontological model for practice transformation, we adopt the Methontology approach. Based on the literature, we first identify the key process areas essential for a practice transformation process to achieve certification status. Next, we develop the practice transformation ontology by creating key activities and precedence relationships among the key process areas using process maturity concepts. At each step, we employ a panel of domain experts to verify the intermediate representations of the

  12. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...

  13. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications.

    Science.gov (United States)

    Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying

    2016-09-22

    Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  14. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications

    Science.gov (United States)

    Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying

    2016-01-01

    Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices. PMID:27669243

  15. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications

    Directory of Open Access Journals (Sweden)

    Hui-Ling Chang

    2016-09-01

    Full Text Available Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN and Constrained Application Protocol (CoAP are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK before retransmission timeout (RTO expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  16. Transformer Model in Wide Frequency Bandwidth for Power Electronics Systems

    Directory of Open Access Journals (Sweden)

    Carlos Gonzalez-Garcia

    2013-01-01

    Full Text Available The development of the smart grids leads to new challenges on the power electronics equipment and power transformers. The use of power electronic transformer presents several advantages, but new problems related with the application of high frequency voltage and current components come across. Thus, an accurate knowledge of the transformer behavior in a wide frequency range is mandatory. A novel modeling procedure to relate the transformer physical behavior and its frequency response by means of electrical parameters is presented. Its usability is demonstrated by an example where a power transformer is used as filter and voltage reducer in an AC-DC-AC converter.

  17. Wireless Home Automation System using IoT

    Directory of Open Access Journals (Sweden)

    Alexandra MIHALACHE

    2017-01-01

    Full Text Available Nowadays, the chance of having an automated home is no longer a fancy luxury, but a reality accessible to a wide range of consumers, because smart home systems have replaced those that only automated the home in the past. More and more solutions based on IoT are being devel-oped to transform homes into smart ones, but the problem is that the benefits of home automa-tion are still not clear to everyone as they are not promoted enough, so we cannot talk about a broad mass of consumers already using integrated or DIY solutions to improve their lives. In this paper, I will present a home automation system using Arduino Uno integrated with rele-vant modules which are used to allow remote control of lights or fans, changes being made on the basis of different sensors data. The system is designed to be low cost and expandable, bring-ing accessibility, convenience and energy efficiency.

  18. An improved equivalent circuit model of radial mode piezoelectric transformer.

    Science.gov (United States)

    Huang, Yihua; Huang, Wei

    2011-05-01

    In this paper, both the equivalent circuit models of the radial mode and the coupled thickness vibration mode of the radial mode piezoelectric transformer are deduced, and then with the Y-parameter matrix method and the dual-port network theory, an improved equivalent circuit model for the multilayer radial mode piezoelectric transformer is established. A radial mode transformer sample is tested to verify the equivalent circuit model. The experimental results show that the model proposed in this paper is more precise than the typical model.

  19. Using IoT Device Technology in Spacecraft Checkout Systems

    Science.gov (United States)

    Plummer, Chris

    2015-09-01

    The Internet of Things (IoT) has become a common theme in both the technical and popular press in recent years because many of the enabling technologies that are required to make IoT a reality have now matured. Those technologies are revolutionising the way industrial systems and products are developed because they offer significant advantages over older technologies. This paper looks at how IoT device technology can be used in spacecraft checkout systems to achieve smaller, more capable, and more scalable solutions than are currently available. It covers the use of IoT device technology for classical spacecraft test systems as well as for hardware-in-the-loop simulation systems used to support spacecraft checkout.

  20. IoT Service Clustering for Dynamic Service Matchmaking

    National Research Council Canada - National Science Library

    Shuai Zhao; Le Yu; Bo Cheng; Junliang Chen

    2017-01-01

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them...

  1. Active Versus Passive: Receiver Model Transforms for Diffusive Molecular Communication

    CERN Document Server

    Noel, Adam; Makrakis, Dimitrios; Hafid, Abdelhakim

    2016-01-01

    This paper presents an analytical comparison of the active and passive receiver models in diffusive molecular communication. In the active model, molecules are absorbed when they collide with the receiver surface. In the passive model, the receiver is a virtual boundary that does not affect molecule behavior. Two approaches are presented to derive transforms between the active and passive receiver signals. As an example, we unify the two models for an unbounded diffusion-only molecular communication system with a spherical receiver. As time increases in the three-dimensional system, the transform functions have constant scaling factors, such that the receiver models are effectively equivalent. Methods are presented to enable the transformation of stochastic simulations, which are used to verify the transforms and demonstrate that transforming the simulation of a passive receiver can be more efficient and more accurate than the direct simulation of an absorbing receiver.

  2. Differential barometric-based positioning technique for indoor elevation measurement in IoT medical applications.

    Science.gov (United States)

    Wang, Hua; Wen, Yingyou; Zhao, Dazhe

    2017-07-20

    Medical applications have begun to benefit from Internet of Things (IoT) technology through the introduction of wearable devices. Several medical applications require accurate patient location as various changes affect pressure parameters inside the body. This study aims to develop a system to measure indoor altitude for IoT medical applications. We propose a differential barometric-based positioning system to estimate the altitude between a reference sensor and a localizing sensor connected to the human body. The differential barometric altimetry model is introduced to estimate indoor elevations and eliminate environmental artifacts. In addition, a Gaussian filter processing is adopted to remove noise from the elevation measurements. The proposed system is then investigated through extensive experiments, using various evaluation criteria. The results indicate that the proposed system yielded good accuracy with reduced implementation complexity and fewer costs. The proposed system is resilient compared to other indoor localization approaches, even when numerous environmental artifacts in indoor environments are present.

  3. Modeling of IoT applications

    OpenAIRE

    Krevl, Andrej

    2016-01-01

    V delu definiramo internet stvari kot skupino infrastruktur, ki omogočajo dostop, upravljanje in rudarjenje na podatkih, ki jih generirajo glede na okolico in interakcijo z uporabniki. Infrastrukture sestavljajo stvari, posredniki, podatkovne storitve, programski vmesniki, spletne in druge storitve, skupaj pa omogočajo prenos obdelavo in dostop podatkov s senzorjev ter nadzor aktuatorjev in spreminjanje notranjega stanja stvari. Stvari so naprave z določeno funkcijo, s senzorji za zaznavanje ...

  4. Multiphase model for transformation induced plasticity. Extended Leblond's model

    Science.gov (United States)

    Weisz-Patrault, Daniel

    2017-09-01

    Transformation induced plasticity (TRIP) classically refers to plastic strains observed during phase transitions that occur under mechanical loads (that can be lower than the yield stress). A theoretical approach based on homogenization is proposed to deal with multiphase changes and to extend the validity of the well known and widely used model proposed by Leblond (1989). The approach is similar, but several product phases are considered instead of one and several assumptions have been released. Thus, besides the generalization for several phases, one can mention three main improvements in the calculation of the local equivalent plastic strain: the deviatoric part of the phase transformation is taken into account, both parent and product phases are elastic-plastic with linear isotropic hardening and the applied stress is considered. Results show that classical issues of singularities arising in the Leblond's model (corrected by ad hoc numerical functions or thresholding) are solved in this contribution excepted when the applied equivalent stress reaches the yield stress. Indeed, in this situation the parent phase is entirely plastic as soon as the phase transformation begins and the same singularity as in the Leblond's model arises. A physical explanation of the cutoff function is introduced in order to regularize the singularity. Furthermore, experiments extracted from the literature dealing with multiphase transitions and multiaxial loads are compared with the original Leblond's model and the proposed extended version. For the extended version, very good agreement is observed without any fitting procedures (i.e., material parameters are extracted from other dedicated experiments) and for the original version results are more qualitative.

  5. VMTL: a language for end-user model transformation

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald; Strüber, Daniel

    2016-01-01

    these guidelines. VMTL draws on our previous work on the usability-oriented Visual Model Query Language. We implement VMTL using the Henshin model transformation engine, and empirically investigate its learnability via two user experiments and a think-aloud protocol analysis. Our experiments, although conducted...... on computer science students exhibiting only some of the characteristics of end-user modelers, show that VMTL compares favorably in terms of learnability with two state-of the-art model transformation languages: Epsilon and Henshin. Our think-aloud protocol analysis confirms many of the design decisions......Model transformation is a key enabling technology of Model-Driven Engineering (MDE). Existing model transformation languages are shaped by and for MDE practitioners—a user group with needs and capabilities which are not necessarily characteristic of modelers in general. Consequently...

  6. Tracing where IoT data are collected and aggregated

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart objects that automatically collect and exchange data of various kinds, directly gathered from sensors or generated by aggregations. Suitable coordination primitives and analysis mechanisms are in order to design and reason about IoT systems, and to intercept the implied technological shifts. We address these issues from a foundational point of view. To study them, we define IoT-LySa, a process ca...

  7. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  8. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  9. A Systemic Approach for IoT Security

    OpenAIRE

    Riahi, Arbia; Challal, Yacine; Natalizio, Enrico; Chtourou, Zied; Bouabdallah, Abdelmadjid

    2013-01-01

    International audience; In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet of Things (IoT). We claim that the usual approach to security issues, typical of more classical systems and networks, does not grab all the aspects related to this new paradigm of communication, sharing and actuation. In fact, the IoT paradigm involves new features, mechanisms and dangers that cannot be completely taken into consideration through the...

  10. DevOps for the Urban IoT

    OpenAIRE

    Moore, John; Kortuem, Gerd; Smith, Andrew; Chowdhury, Niaz; Cavero, Jose; Gooch, Daniel

    2016-01-01

    Choosing the right technologies to build an urban-scale IoT system can be challenging. There is often a focus on low-level architectural details such as the scalability of message handling. In our experience building an IoT information system requires a high-level holistic approach that mixes traditional data collection from vendor-specific cloud backends, together with data collected directly from embedded hardware and mobile devices. Supporting this heterogeneous environment can prove chall...

  11. IOT RF Power Sources for Pulsed and CW Linacs

    CERN Document Server

    Bohlen, H P

    2004-01-01

    For many years, klystrons have been the preferred RF power amplifiers for both pulsed and CW linacs at UHF and higher frequencies. Their properties have earned them that position. But in recent years in UHF terrestrial television transmitters the earlier predominant klystron has been replaced the Inductive Output Tube (IOT) because the IOT provides higher efficiency and, due to its excellent linearity, can handle the simultaneous amplification of both the vision and the sound signal. Its robustness and life expectancy equals that of a klystron, and it more than compensates its lower gain by a lower price and a smaller size. For linac operation, derivates of UHF TV IOTs, capable of up to 80 kW CW output power, are already available and operating. In L-Band, they are presently joined by recently developed 15 to 30 kW CW IOTs. HOM-IOTs are expected to extend the CW range in UHF to 1 MW and beyond. Pulsed operation of an IOT can be achieved without a high-voltage modulator. Since the beam current is grid-controll...

  12. Modeling of Incubation Time for Austenite to Ferrite Phase Transformation

    Institute of Scientific and Technical Information of China (English)

    ZHOU Xiao-guang; LIU Zhen-yu; WU Di; WANG Wei; JIAO Si-hai

    2006-01-01

    On the basis of the classical nucleation theory, a new model of incubation time for austenite to ferrite transformation has been developed, in which the effect of deformation on austenite has been taken into consideration. To prove the precision of modeling, ferrite transformation starting temperature (Ar3) has been calculated using the Scheil′s additivity rule, and the Ar3 values were measured using a Gleeble 1500 thermomechanical simulator. The Ar3 values provided by the modeling method coincide with the measured ones, indicating that the model is precise in predicting the incubation time for austenite to ferrite transformation in hot deformed steels.

  13. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  14. Considerations Concerning Matrix Diagram Transformations Associated with Mathematical Model Study of a Three-phase Transformer

    Directory of Open Access Journals (Sweden)

    Mihaela Poienar

    2014-09-01

    Full Text Available The clock hour figure mathematical model of a threephase transformer can be expressed, in the most plain form, through a 3X3 square matrix, called code matrix. The lines position reflect the modification in the high voltage windings terminal and the columns position reflect the modification in the low voltage winding terminal. The main changes on the transformer winding terminal are: the circular permutation of connection between windings; terminal supply reversal; reverse direction for the phase winding wrapping; reversal the beginning with the end for a phase winding; the connection conversion from N in Z between phase winding or inverse. The analytical form of these changes actually affect the configuration of the mathematical model expressed through a transformations diagram proposed and analyzed in two ways: bipolar version and unipolar version (fanwise. In the end of the paper are presented about the practical exploitation of the transformations diagram.

  15. Modeling and Control of the Saturation’s Transformer

    Directory of Open Access Journals (Sweden)

    Arif J. Abbas

    2013-05-01

    Full Text Available This paper investigates the saturable transformer from modeling and control point of view. After implementing the Simulink model of the three phase transformer   simulation of a three  phase,  two-winding transformer is used  to examine the transformer under  two operating conditions.The first is the secondary terminal short circuited and the second is the secondary terminals connected to a non-unity power factor load  to verify the results obtained with those predicted from any analysis using the equivalent circuit. The graphical user interface is used for  modeling  transformer parameters, obtaining the results, check  the stability of the control system, the settling time, the Bode plot, Nyquist and Nicols chart  finally recording all currents, voltages and phase shift between them in the steady state condition, initial values of states variables for the nonlinear circuit  parameters.

  16. The Drivers of Success in Business Model Transformation

    Directory of Open Access Journals (Sweden)

    Nenad Savič

    2016-01-01

    Full Text Available Existing empirical literature on business models is still inconclusive about the key drivers of successful business model transformation. The paper explores this issue by using a single longitudinal case study design in combination with grounded theory approach on a medium-sized, high-tech and globally oriented company. Based on on-site visits, interviews and secondary documentation data analysis, the study identifies six generic drivers of successful business model transformation: transformational leadership, discovery driven decision-making, industry improvement – customer specific orientation, content-oriented communication, self-initiative collaborators, and phased separation strategy. The new drivers supplement our existing knowledge on how successful transformation takes place and add to existing drivers, while extensive discussion of their implications may help the managers to execute business transformations more effectively.

  17. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  18. Typical Phases of Transformative Learning: A Practice-Based Model

    Science.gov (United States)

    Nohl, Arnd-Michael

    2015-01-01

    Empirical models of transformative learning offer important insights into the core characteristics of this concept. Whereas previous analyses were limited to specific social groups or topical terrains, this article empirically typifies the phases of transformative learning on the basis of a comparative analysis of various social groups and topical…

  19. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  20. MISTRAL: A language for model transformations in the MOF meta-modeling architecture

    NARCIS (Netherlands)

    Kurtev, I.; Berg, van den K.G.

    2005-01-01

    In the Meta Object Facility (MOF) meta-modeling architecture a number of model transformation scenarios can be identified. It could be expected that a meta-modeling architecture will be accompanied by a transformation technology supporting the model transformation scenarios in a uniform way. Despite

  1. Application of mobile agent in IOT%物联网中移动代理的应用研究

    Institute of Scientific and Technical Information of China (English)

    魏葆春

    2013-01-01

    通过对物联网网络管理技术的研究,分析了物联网网络管理中存在的问题。针对物联网无线化、移动化的发展趋势,给出了基于分布式网络代理管理模型,该模型通过引入移动代理技术,能够使之更好地适应物联网的管理需求。%The problems existing in IOT network management are analyzed on the basis of research on the network management technology of IOT. A management model based on the distributed network proxy was established in allusion to the development trend of IOT wireless running and mobilization. The model can adapt to the management demands of IOT much better through introduction of the mobile agent technology.

  2. Application of Majoritarian Element to Improve IoT Communication

    Directory of Open Access Journals (Sweden)

    Tornike Dvali

    2016-06-01

    Full Text Available The work introduces the circle of the basic ideas and methods of error-free recovery of the binary signal to the multichannel digital technology based on the model of formal (artificial neuron and aims to contribute to the further development of this theo-ry of reliability. The work is useful for reservation or for exchange of a highly valuable information. During communication be-tween machines, connection related problems could occur and this work will be of a great help for machines to choose right channel for connection. Work also is a successful attempt of figuring out binary signal error recovery probability of minimum highest value. Moreover, binary channels optimization problems addressed by using threshold model and exploring three differ-ent approaches. In the future, this work will be used in Internet of Things (IoT for the exact communication between machines. Work will be used with threshold model for minimizing errors in the communication between things.

  3. An Extended Model Driven Framework for End-to-End Consistent Model Transformation

    Directory of Open Access Journals (Sweden)

    Mr. G. Ramesh

    2016-08-01

    Full Text Available Model Driven Development (MDD results in quick transformation from models to corresponding systems. Forward engineering features of modelling tools can help in generating source code from models. To build a robust system it is important to have consistency checking in the design models and the same between design model and the transformed implementation. Our framework named as Extensible Real Time Software Design Inconsistency Checker (XRTSDIC proposed in our previous papers supports consistency checking in design models. This paper focuses on automatic model transformation. An algorithm and defined transformation rules for model transformation from UML class diagram to ERD and SQL are being proposed. The model transformation bestows many advantages such as reducing cost of development, improving quality, enhancing productivity and leveraging customer satisfaction. Proposed framework has been enhanced to ensure that the transformed implementations conform to their model counterparts besides checking end-to-end consistency.

  4. Design Transformations for Rule-based Procedural Modeling

    KAUST Repository

    Lienhard, Stefan

    2017-05-24

    We introduce design transformations for rule-based procedural models, e.g., for buildings and plants. Given two or more procedural designs, each specified by a grammar, a design transformation combines elements of the existing designs to generate new designs. We introduce two technical components to enable design transformations. First, we extend the concept of discrete rule switching to rule merging, leading to a very large shape space for combining procedural models. Second, we propose an algorithm to jointly derive two or more grammars, called grammar co-derivation. We demonstrate two applications of our work: we show that our framework leads to a larger variety of models than previous work, and we show fine-grained transformation sequences between two procedural models.

  5. The Internet of Things (IoT: An Overview

    Directory of Open Access Journals (Sweden)

    Antar Shaddad Abdul-Qawy

    2015-12-01

    Full Text Available Information and Communications Technology (ICT controls our daily behaviors. It becomes a main part of our life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples, to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This opens a new future direction in the society of ICT: the Internet of Things (IoT. Nowadays, the IoT, early defined as Machine-to-Machine (M2M communications, becomes a key concern of ICT world and research communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread applications. This overview can help those who start approaching the IoT world aiming to understand and participate to its development.

  6. Feasibility Study of a HOM IOT for TESLA

    Science.gov (United States)

    Schütt, Petra; Weiland, Thomas; Gamp, Alexander; Lu, Fuhai

    1997-05-01

    For the TESLA linear collider 1.3 GHz RF sources with 10 MW peak power and about 70% efficiency are needed. As an alternative to the development of a Multibeam-Klystron, we investigate the feasibility of an IOT (Inductive Output Tube). This is a very compact RF source: The time structure of the beam is produced by a gated emission cathode and the output cavity is directly adjacent to the anode. Unlike IOTs, conventional klystrons lose some of their design efficiency when they are operated below saturation, because only the RF component of the beam is reduced and not the DC beam current. In contrast to this the cathode current of an IOT is controlled by the drive power. In order to keep the gun voltage low, we investigate a device with a hollow beam where the output cavity is excited in a higher order mode (HOM), as was recently suggested by CPI(E.Lien, H.Bohlen, US Patent Application Serial No. 08/413,034). Computer simulations are carried out with the CAD-system MAFIA. First, an existing Klystrode TM IOT built by CPI is analysed. Simulation results will be shown and compared to experimental data. Based upon this experience, a design strategy is discussed for the HOM IOT.

  7. A transformation approach for collaboration based requirement models

    CERN Document Server

    Harbouche, Ahmed; Mokhtari, Aicha

    2012-01-01

    Distributed software engineering is widely recognized as a complex task. Among the inherent complexities is the process of obtaining a system design from its global requirement specification. This paper deals with such transformation process and suggests an approach to derive the behavior of a given system components, in the form of distributed Finite State Machines, from the global system requirements, in the form of an augmented UML Activity Diagrams notation. The process of the suggested approach is summarized in three steps: the definition of the appropriate source Meta-Model (requirements Meta-Model), the definition of the target Design Meta-Model and the definition of the rules to govern the transformation during the derivation process. The derivation process transforms the global system requirements described as UML diagram activities (extended with collaborations) to system roles behaviors represented as UML finite state machines. The approach is implemented using Atlas Transformation Language (ATL).

  8. K factor estimation in distribution transformers using linear regression models

    Directory of Open Access Journals (Sweden)

    Juan Miguel Astorga Gómez

    2016-06-01

    Full Text Available Background: Due to massive incorporation of electronic equipment to distribution systems, distribution transformers are subject to operation conditions other than the design ones, because of the circulation of harmonic currents. It is necessary to quantify the effect produced by these harmonic currents to determine the capacity of the transformer to withstand these new operating conditions. The K-factor is an indicator that estimates the ability of a transformer to withstand the thermal effects caused by harmonic currents. This article presents a linear regression model to estimate the value of the K-factor, from total current harmonic content obtained with low-cost equipment.Method: Two distribution transformers that feed different loads are studied variables, current total harmonic distortion factor K are recorded, and the regression model that best fits the data field is determined. To select the regression model the coefficient of determination R2 and the Akaike Information Criterion (AIC are used. With the selected model, the K-factor is estimated to actual operating conditions.Results: Once determined the model it was found that for both agricultural cargo and industrial mining, present harmonic content (THDi exceeds the values that these transformers can drive (average of 12.54% and minimum 8,90% in the case of agriculture and average value of 18.53% and a minimum of 6.80%, for industrial mining case.Conclusions: When estimating the K factor using polynomial models it was determined that studied transformers can not withstand the current total harmonic distortion of their current loads. The appropriate K factor for studied transformer should be 4; this allows transformers support the current total harmonic distortion of their respective loads.

  9. Distributed Danger Assessment Model for the Internet of Things Based on Immunology

    OpenAIRE

    Run Chen; Jiliu Zhou; Caiming Liu

    2013-01-01

    The Internet of Things (IoT) confronts complicated and changeful security threats. It harms IoT and brings IoT potential danger. However, the research achievements of the danger assessment technology for IoT are rare. To calculate the danger value of IoT with many dispersive sense nodes, the theoretical model of distributed danger assessment for IoT is explored in this paper. The principles and mechanisms of Artificial Immune System (AIS) are introduced into the proposed model. Data packets i...

  10. 47 CFR 69.303 - Information origination/termination equipment (IOT).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Information origination/termination equipment (IOT). 69.303 Section 69.303 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... origination/termination equipment (IOT). Investment in all other IOT shall be apportioned between the Special...

  11. New Models of Mechanisms for the Motion Transformation

    Science.gov (United States)

    Petrović, Tomislav; Ivanov, Ivan

    In this paper two new mechanisms for the motion transformations are presented: screw mechanism for the transformation of one-way circular into two-way linear motion with impulse control and worm-planetary gear train with extremely height gear ratio. Both mechanisms represent new models of construction solutions for which patent protection has been achieved. These mechanisms are based on the application of the differential gearbox with two degrees of freedom. They are characterized by series of kinematic impacts at motion transformation and the possibility of temporary or permanent changes in the structure by subtracting the redundant degree of freedom. Thus the desired characteristic of the motion transformation is achieved. For each mechanism separately the principles of motion and transformation are described and the basic equations that describe the interdependence of geometric and kinematic and kinetic parameters of the system dynamics are given. The basic principles of controlling new mechanisms for motion transformation have been pointed to and the basic constructional performances which may find practical application have been given. The physical models of new systems of motion transformation have been designed and their operation has been presented. Performed experimental researches confirmed the theoretical results and very favorable kinematic characteristics of the mechanisms.

  12. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  13. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  14. Modelling spatial density using continuous wavelet transforms

    Indian Academy of Sciences (India)

    D Sudheer Reddy; N Gopal Reddy; A K Anilkumar

    2013-02-01

    Due to increase in the satelite launch activities from many countries around the world the orbital debris issue has become a major concern for the space agencies to plan a collision-free orbit design. The risk of collisions is calculated using the in situ measurements and available models. Spatial density models are useful in understanding the long-term likelihood of a collision in a particular region of space and also helpful in pre-launch orbit planning. In this paper, we present a method of estimating model parameters such as number of peaks and peak locations of spatial density model using continuous wavelets. The proposed methodology was experimented with two line element data and the results are presented.

  15. Theory and Modeling of Phase Transformations under Stress in Steel

    Institute of Scientific and Technical Information of China (English)

    T.Y. Hsu (XU Zu-yao)

    2004-01-01

    Thermodynamic prediction of the increment of the formation temperature of proeutectoid ferrite by applied stress is nearly consistent with the experimental data. Kinetics models for ferrite, pearlite and bainite transformations can be shown as modified Johnson-Mehl-Avrami equation in which parameter b(σ) varies with the level of applied stress.The effects of tensile and compressive stresses on enhancement of the ferrite/pearlite and bainite transformations are discussed. The necessity and approach of modification of additivity hypothesis are introduced and the results from modified equation in which some parameters are obtained by regression of two experimental results or taken from TTT and CCT diagrams of a certain steel are superior than that from Scheil's equation. Thermodynamic calculation of Ms and nucleation kinetics equations of martensitic transformation under stress are suggested. Modeling of phase transformations under stress in ferrous alloys is briefly described.

  16. TIME SERIES ANALYSIS USING A UNIQUE MODEL OF TRANSFORMATION

    Directory of Open Access Journals (Sweden)

    Goran Klepac

    2007-12-01

    Full Text Available REFII1 model is an authorial mathematical model for time series data mining. The main purpose of that model is to automate time series analysis, through a unique transformation model of time series. An advantage of this approach of time series analysis is the linkage of different methods for time series analysis, linking traditional data mining tools in time series, and constructing new algorithms for analyzing time series. It is worth mentioning that REFII model is not a closed system, which means that we have a finite set of methods. At first, this is a model for transformation of values of time series, which prepares data used by different sets of methods based on the same model of transformation in a domain of problem space. REFII model gives a new approach in time series analysis based on a unique model of transformation, which is a base for all kind of time series analysis. The advantage of REFII model is its possible application in many different areas such as finance, medicine, voice recognition, face recognition and text mining.

  17. TRANSFORMATION

    Energy Technology Data Exchange (ETDEWEB)

    LACKS,S.A.

    2003-10-09

    Transformation, which alters the genetic makeup of an individual, is a concept that intrigues the human imagination. In Streptococcus pneumoniae such transformation was first demonstrated. Perhaps our fascination with genetics derived from our ancestors observing their own progeny, with its retention and assortment of parental traits, but such interest must have been accelerated after the dawn of agriculture. It was in pea plants that Gregor Mendel in the late 1800s examined inherited traits and found them to be determined by physical elements, or genes, passed from parents to progeny. In our day, the material basis of these genetic determinants was revealed to be DNA by the lowly bacteria, in particular, the pneumococcus. For this species, transformation by free DNA is a sexual process that enables cells to sport new combinations of genes and traits. Genetic transformation of the type found in S. pneumoniae occurs naturally in many species of bacteria (70), but, initially only a few other transformable species were found, namely, Haemophilus influenzae, Neisseria meningitides, Neisseria gonorrheae, and Bacillus subtilis (96). Natural transformation, which requires a set of genes evolved for the purpose, contrasts with artificial transformation, which is accomplished by shocking cells either electrically, as in electroporation, or by ionic and temperature shifts. Although such artificial treatments can introduce very small amounts of DNA into virtually any type of cell, the amounts introduced by natural transformation are a million-fold greater, and S. pneumoniae can take up as much as 10% of its cellular DNA content (40).

  18. Transformation

    DEFF Research Database (Denmark)

    Peters, Terri

    2011-01-01

    Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi.......Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi....

  19. Transformation

    DEFF Research Database (Denmark)

    Peters, Terri

    2011-01-01

    Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi.......Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi....

  20. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  1. Theoretical Model of Transformation Superlastic Diffusion Bonding for Eutectoid Steel

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Based on current theories of diffusion and creep cavity closure at high temperature, a theoretical analysis of phase transformation diffusion bonding for T8/T8 eutectoid steel is carried out. The diffusion bonding is mainly described as two-stage process: Ⅰ The interfacial cavity with shape change from diamond to cylinder.Ⅱ The radius of the cylindrical cavity are reduced and eliminated gradually. A new theoretical model is established for the process of transformation superplastic diffusion bonding (TSDB) ...

  2. Application of cyclic partial phase transformations for identifying kinetic transitions during solid-state phase transformations: Experiments and modeling

    Energy Technology Data Exchange (ETDEWEB)

    Chen Hao, E-mail: hao.chen@tudelft.nl [Faculty of Aerospace Engineering, Delft University of Technology, Kluyverweg 1, 2629 HS Delft (Netherlands); Appolaire, Benoit [LEM, CNRS/ONERA, 29 Av. Division Leclerc, BP 72, F-92322 Chatillon Cedex (France); Zwaag, Sybrand van der [Faculty of Aerospace Engineering, Delft University of Technology, Kluyverweg 1, 2629 HS Delft (Netherlands)

    2011-10-15

    A series of cyclic partial phase transformation experiments has been performed to investigate the growth kinetics of the austenite to ferrite phase transformation, and vice versa, in Fe-Mn-C alloys. Unlike the usual phase transformation experiments (100% parent phase {yields} 100% new phase), in the case of cyclic partial transformations two special stages are observed: a stagnant stage in which the degree of transformation does not vary while the temperature changes, and an inverse phase transformation stage, during which the phase transformation proceeds in a direction contradictory to the temperature change. The experimental results have been analyzed using paraequilibrium and local equilibrium diffusional growth models. Only the local equilibrium model was shown to predict the new features of the cyclic phase transformation kinetics. The stagnant stage was found to be due to Mn partitioning, while the inverse phase transformation is caused by non-equilibrium conditions when switching from cooling to heating and vice versa.

  3. Models for thermal and mechanical monitoring of power transformers

    Energy Technology Data Exchange (ETDEWEB)

    Vilaithong, Rummiya

    2011-07-01

    At present, for economic reasons, there is an increasing emphasis on keeping transformers in service for longer than in the past. A condition-based maintenance using an online monitoring and diagnostic system is one option to ensure reliability of the transformer operation. The key parameters for effectively monitoring equipment can be selected by failure statistics and estimated failure consequences. In this work, two key aspects of transformer condition monitoring are addressed in depth: thermal behaviour and behaviour of on-load tap changers. In the first part of the work, transformer thermal behaviour is studied, focussing on top-oil temperatures. Through online comparison of a measured value of the top-oil temperature and its calculated value, some rapidly developing failures in power transformers such as malfunction of the cooling unit may be detected. Predictions of top-oil temperature can be obtained by means of a mathematical model. Long-term investigations on some dynamic top-oil temperature models are presented for three different types of transformer units. The last-state top-oil temperature, load current, ambient temperature and the operating state of pumps and fans are applied as inputs of the top-oil temperature models. In the fundamental physical models presented, some constant parameters are required and can be estimated using a least-squares optimization technique. Multilayer Feed-forward and Recurrent neural network models are also proposed and investigated. The neural network models are trained with three different Backpropagation training algorithms: Levenberg-Marquardt, Scaled Conjugate Gradient and Automated Bayesian Regularization. The effect of varying operating conditions of the cooling units and the non-steady-state behaviour of loading conditions, as well as ambient temperature are noted. Results show sophisticated temperature prediction is possible using the neural network models that is generally more accurate than with the physical

  4. An IoT application development using IoTSuite

    OpenAIRE

    Chauhan, Saurabh; Patel, Pankesh

    2016-01-01

    Application development in the Internet of Things (IoT) is challenging because it involves dealing with issues that attribute to different life-cycle phases. First, the application logic has to be analyzed and then separated into a set of distributed tasks for an underlying network. Then, the tasks have to be implemented for the specific hardware. Moreover, we take different IoT applications and present development of these applications using IoTSuite. In this paper, we introduce a design and...

  5. Experimental performance evaluation of IoT security solutions

    OpenAIRE

    Martínez Caro, José Manuel

    2016-01-01

    [SPA]Internet de las Cosas (Internet of Things, IoT) plantea dudas importantes e introduce nuevos retos en la privacidad de las personas y en la seguridad de los sistemas y de los procesos. Algunas aplicaciones de IoT están estrechamente vinculadas a infraestructuras sensibles y servicios estratégicos tales como la distribución de agua y electricidad. Otras aplicaciones manejan información sensible acerca de las personas, tales como su ubicación y sus desplazamientos, o sus preferencias de sa...

  6. The Transformation of the Getzels Model.

    Science.gov (United States)

    McPherson, R. Bruce

    The author describes the model of social behavior in a social system first framed by Jacob Getzels, with the assistance of Egon Guba, in the middle 1950s. Significant changes in the conceptualization of organizational functioning have occurred in the years since then, though the methodological processes for studying that functioning have remained…

  7. The Unfolding of Value Sources During Online Business Model Transformation

    Directory of Open Access Journals (Sweden)

    Nadja Hoßbach

    2016-12-01

    Full Text Available Purpose: In the magazine publishing industry, viable online business models are still rare to absent. To prepare for the ‘digital future’ and safeguard their long-term survival, many publishers are currently in the process of transforming their online business model. Against this backdrop, this study aims to develop a deeper understanding of (1 how the different building blocks of an online business model are transformed over time and (2 how sources of value creation unfold during this transformation process. Methodology: To answer our research question, we conducted a longitudinal case study with a leading German business magazine publisher (called BIZ. Data was triangulated from multiple sources including interviews, internal documents, and direct observations. Findings: Based on our case study, we nd that BIZ used the transformation process to differentiate its online business model from its traditional print business model along several dimensions, and that BIZ’s online business model changed from an efficiency- to a complementarity- to a novelty-based model during this process. Research implications: Our findings suggest that different business model transformation phases relate to different value sources, questioning the appropriateness of value source-based approaches for classifying business models. Practical implications: The results of our case study highlight the need for online-offline business model differentiation and point to the important distinction between service and product differentiation. Originality: Our study contributes to the business model literature by applying a dynamic and holistic perspective on the link between online business model changes and unfolding value sources.

  8. TRANSFORMER

    Science.gov (United States)

    Baker, W.R.

    1959-08-25

    Transformers of a type adapted for use with extreme high power vacuum tubes where current requirements may be of the order of 2,000 to 200,000 amperes are described. The transformer casing has the form of a re-entrant section being extended through an opening in one end of the cylinder to form a coaxial terminal arrangement. A toroidal multi-turn primary winding is disposed within the casing in coaxial relationship therein. In a second embodiment, means are provided for forming the casing as a multi-turn secondary. The transformer is characterized by minimized resistance heating, minimized external magnetic flux, and an economical construction.

  9. Modelling and Simulation of the Diode Split Transformer

    DEFF Research Database (Denmark)

    Østergaard, Leo

    a significant influence on the picture quality. The most critical component is undoubtedly the diode split transformer (DST). Therefore, if developing a simulation model of the DST is possible, a significant step has been taken in the attempt to model the entire horizontal deflection circuit and to obtain...

  10. Rule-based transformations for geometric modelling

    Directory of Open Access Journals (Sweden)

    Thomas Bellet

    2011-02-01

    Full Text Available The context of this paper is the use of formal methods for topology-based geometric modelling. Topology-based geometric modelling deals with objects of various dimensions and shapes. Usually, objects are defined by a graph-based topological data structure and by an embedding that associates each topological element (vertex, edge, face, etc. with relevant data as their geometric shape (position, curve, surface, etc. or application dedicated data (e.g. molecule concentration level in a biological context. We propose to define topology-based geometric objects as labelled graphs. The arc labelling defines the topological structure of the object whose topological consistency is then ensured by labelling constraints. Nodes have as many labels as there are different data kinds in the embedding. Labelling constraints ensure then that the embedding is consistent with the topological structure. Thus, topology-based geometric objects constitute a particular subclass of a category of labelled graphs in which nodes have multiple labels.

  11. Rule-based transformations for geometric modelling

    CERN Document Server

    Bellet, Thomas; Gall, Pascale Le; 10.4204/EPTCS.48.5

    2011-01-01

    The context of this paper is the use of formal methods for topology-based geometric modelling. Topology-based geometric modelling deals with objects of various dimensions and shapes. Usually, objects are defined by a graph-based topological data structure and by an embedding that associates each topological element (vertex, edge, face, etc.) with relevant data as their geometric shape (position, curve, surface, etc.) or application dedicated data (e.g. molecule concentration level in a biological context). We propose to define topology-based geometric objects as labelled graphs. The arc labelling defines the topological structure of the object whose topological consistency is then ensured by labelling constraints. Nodes have as many labels as there are different data kinds in the embedding. Labelling constraints ensure then that the embedding is consistent with the topological structure. Thus, topology-based geometric objects constitute a particular subclass of a category of labelled graphs in which nodes hav...

  12. Model refinements of transformers via a subproblem finite element method

    OpenAIRE

    Dular, Patrick; Kuo-Peng, Patrick; Ferreira Da Luz, Mauricio,; Krähenbühl, Laurent

    2015-01-01

    International audience; A progressive modeling of transformers is performed via a subproblem finite element method. A complete problem is split into subproblems with different adapted overlapping meshes. Model refinements are performed from ideal to real flux tubes, 1-D to 2-D to 3-D models, linear to nonlinear materials, perfect to real materials, single wire to volume conductor windings, and homogenized to fine models of cores and coils, with any coupling of these changes. The proposed unif...

  13. Application of IoT in monitoring and controlling agricultural production

    OpenAIRE

    Marković, Dušan; Koprivica, Ranko; Pešović, Uroš; Randić, Siniša

    2015-01-01

    Internet of Things (IoT) is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring ...

  14. Application of IoT in monitoring and controlling agricultural production

    OpenAIRE

    Marković Dušan; Koprivica Ranko; Pešović Uroš; Randić Siniša

    2015-01-01

    Internet of Things (IoT) is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring ...

  15. Transformative leadership: an ethical stewardship model for healthcare.

    Science.gov (United States)

    Caldwell, Cam; Voelker, Carolyn; Dixon, Rolf D; LeJeune, Adena

    2008-01-01

    The need for effective leadership is a compelling priority for those who would choose to govern in public, private, and nonprofit organizations, and applies as much to the healthcare profession as it does to other sectors of the economy (Moody, Horton-Deutsch, & Pesut, 2007). Transformative Leadership, an approach to leadership and governance that incorporates the best characteristics of six other highly respected leadership models, is an integrative theory of ethical stewardship that can help healthcare professionals to more effectively achieve organizational efficiencies, build stakeholder commitment and trust, and create valuable synergies to transform and enrich today's healthcare systems (cf. Caldwell, LeJeune, & Dixon, 2007). The purpose of this article is to introduce the concept of Transformative Leadership and to explain how this model applies within a healthcare context. We define Transformative Leadership and identify its relationship to Transformational, Charismatic, Level 5, Principle-Centered, Servant, and Covenantal Leadership--providing examples of each of these elements of Transformative Leadership within a healthcare leadership context. We conclude by identifying contributions of this article to the healthcare leadership literature.

  16. Transform Coding for Point Clouds Using a Gaussian Process Model.

    Science.gov (United States)

    De Queiroz, Ricardo; Chou, Philip A

    2017-04-28

    We propose using stationary Gaussian Processes (GPs) to model the statistics of the signal on points in a point cloud, which can be considered samples of a GP at the positions of the points. Further, we propose using Gaussian Process Transforms (GPTs), which are Karhunen-Lo`eve transforms of the GP, as the basis of transform coding of the signal. Focusing on colored 3D point clouds, we propose a transform coder that breaks the point cloud into blocks, transforms the blocks using GPTs, and entropy codes the quantized coefficients. The GPT for each block is derived from both the covariance function of the GP and the locations of the points in the block, which are separately encoded. The covariance function of the GP is parameterized, and its parameters are sent as side information. The quantized coefficients are sorted by eigenvalues of the GPTs, binned, and encoded using an arithmetic coder with bin-dependent Laplacian models whose parameters are also sent as side information. Results indicate that transform coding of 3D point cloud colors using the proposed GPT and entropy coding achieves superior compression performance on most of our data sets.

  17. Transformer real-time reliability model based on operating conditions

    Institute of Scientific and Technical Information of China (English)

    HE Jian; CHENG Lin; SUN Yuan-zhang

    2007-01-01

    Operational reliability evaluation theory reflects real-time reliability level of power system. The component failure rate varies with operating conditions. The impact of real-time operating conditions such as ambient temperature and transformer MVA (megavolt-ampere) loading on transformer insulation life is studied in this paper. The formula of transformer failure rate based on the winding hottest-spot temperature (HST) is given. Thus the real-time reliability model of transformer based on operating conditions is presented. The work is illustrated using the 1979 IEEE Reliability Test System. The changes of operating conditions are simulated by using hourly load curve and temperature curve, so the curves of real-time reliability indices are obtained by using operational reliability evaluation.

  18. Semiparametric Additive Transformation Model under Current Status Data

    CERN Document Server

    Cheng, Guang

    2011-01-01

    We consider the efficient estimation of the semiparametric additive transformation model with current status data. A wide range of survival models and econometric models can be incorporated into this general transformation framework. We apply the B-spline approach to simultaneously estimate the linear regression vector, the nondecreasing transformation function, and a set of nonparametric regression functions. We show that the parametric estimate is semiparametric efficient in the presence of multiple nonparametric nuisance functions. An explicit consistent B-spline estimate of the asymptotic variance is also provided. All nonparametric estimates are smooth, and shown to be uniformly consistent and have faster than cubic rate of convergence. Interestingly, we observe the convergence rate interfere phenomenon, i.e., the convergence rates of B-spline estimators are all slowed down to equal the slowest one. The constrained optimization is not required in our implementation. Numerical results are used to illustra...

  19. A TRANSFORMATION APPROACH FOR COLLABORATION BASED REQUIREMENT MODELS

    Directory of Open Access Journals (Sweden)

    Ahmed Harbouche

    2012-02-01

    Full Text Available Distributed software engineering is widely recognized as a complex task. Among the inherent complexitiesis the process of obtaining a system design from its global requirement specification. This paper deals withsuch transformation process and suggests an approach to derive the behavior of a given systemcomponents, in the form of distributed Finite State Machines, from the global system requirements, in theform of an augmented UML Activity Diagrams notation. The process of the suggested approach issummarized in three steps: the definition of the appropriate source Meta-Model (requirements Meta-Model, the definition of the target Design Meta-Model and the definition of the rules to govern thetransformation during the derivation process. The derivation process transforms the global systemrequirements described as UML diagram activities (extended with collaborations to system rolesbehaviors represented as UML finite state machines. The approach is implemented using AtlasTransformation Language (ATL.

  20. Transfer Function Identification Using Orthogonal Fourier Transform Modeling Functions

    Science.gov (United States)

    Morelli, Eugene A.

    2013-01-01

    A method for transfer function identification, including both model structure determination and parameter estimation, was developed and demonstrated. The approach uses orthogonal modeling functions generated from frequency domain data obtained by Fourier transformation of time series data. The method was applied to simulation data to identify continuous-time transfer function models and unsteady aerodynamic models. Model fit error, estimated model parameters, and the associated uncertainties were used to show the effectiveness of the method for identifying accurate transfer function models from noisy data.

  1. An enhanced Brinson model with modified kinetics for martensite transformation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young-Jin; Lee, Jung Ju [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Jeong, Ju-Won [Korea Aerospace Research Institute, Daejeon (Korea, Republic of); Lim, Jae Hyuk [Chonbuk National University, Jeonju (Korea, Republic of)

    2017-03-15

    We propose an enhanced Brinson model with modified kinetics for martensite transformation. Two additional material constants are considered to follow the stress-temperature diagram above austenite start temperature (As) along with treatment to keep the continuity of the martensite volume fraction and the path dependency of the phase transformation. To demonstrate the performance of the proposed model, we implement this algorithm into ABAQUS user subroutine, then conduct several numerical simulations and compare their results with SMA wire experiments as well as those of three-dimensional SMA constitutive models. From the results, it turns out that the proposed model is as accurate as the three-dimensional models and shows better accuracy over original Brinson model in terms of recovery stress.

  2. Establishment of Enterprise Logistics Information Platform Based on IOT%基于物联网的企业物流信息平台的构建

    Institute of Scientific and Technical Information of China (English)

    胡文海

    2012-01-01

    In this paper, we first analyzed the application of IOT in the establishment of the logistics information platform, then studied the operational model of the enterprise IOT logistics information platform, and finally proposed the planning and construction of the overall architecture of the enterprise logistics information platform based on IOT.%首先分析了物联网在物流信息平台构建中的应用,接着研究了企业物联网物流信息平台的构建运作模式,最后提出了基于物联网的企业物流信息平台总体框架的构建和规划.

  3. Interoperability for smart appliances in the IoT world

    NARCIS (Netherlands)

    Daniele, L.; Solanki, M.; Hartog, F. den; Roes, J.

    2016-01-01

    Household appliances are set to become highly intelligent, smart and networked devices in the near future. Systematically deployed on the Internet of Things (IoT), they would be able to form complete energy consuming, producing, and managing ecosystems. Smart systems are technically very

  4. Research on Intelligent Public Transport System Integrated IOT Elements

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    This paper will discuss how to provide a series of services,including the quick vehicle rescue,video surveillance & control,Real Time Localization,Real-Time Scheduling,Emergency Call,Information Services,Route Optimization Computing,and Historical path playback,to bus passengers or other customers,by using RFID and some other technologies related to IOT.

  5. Transformations for temperature flux in multiscale models of the tropics

    Energy Technology Data Exchange (ETDEWEB)

    Biello, Joseph A.; Majda, Andrew J. [New York University, Courant Institute of Mathematical Sciences, New York, NY (United States)

    2006-11-15

    How much of the observed planetary-scale heating in the tropics is due to eddy flux convergence? A mathematical framework to address this important practical issue is developed here. We describe a pair of velocity transformations that remove components of the upscale temperature flux in the multiscale intraseasonal, planetary, equatorial synoptic-scale dynamics (IPESD) framework derived by Majda and Klein [J. Atmos. Sci. 60: 393-408, (2003)]. Using examples from the models of the Madden-Julian Oscillation of Biello and Majda [Proc. Natl. Acad. Sci. 101: 4736-4741, (2004); J. Atmos. Sci. 62: 1694-1721, (2005); Dyn. Oceans Atmos., in press] we demonstrate that the transformation for the meridional temperature flux convergence is possible with any restrictions on the heating profile, we show under which conditions the transformation for the vertical temperature flux convergence exists and, further, that the meridional transformation leads to a reinterpretation of lower troposphere Ekman dissipation as active heating plus zonal momentum drag. The meridional temperature flux transformation and induced meridional circulation is a new, tropical wave example of the transformed Eulerian mean theory in the case of strong vertical stratification of potential temperature. The asymptotic ordering of the flows means that the removal of the meridional temperature flux convergence has implications for how planetary-scale heating rates are inferred from velocity convergence measurements. (orig.)

  6. MODEL TRANSFORMATION DEVELOPMENT USING MOLA MAPPINGS AND TEMPLATE MOLA

    OpenAIRE

    Kalniņa, Elīna

    2012-01-01

    Darbā pētīta modeļu transformāciju izstrāde 3 specializētos problēmu apgabalos: transformācijas modeļ-bāzētai izstrādei, transformācijas grafisku modelēšanas valodu rīku būvei un transformācijas, kas sintezē transformācijas. Secināts, ka valodā, kas pielāgota konkrētajam apgabalam, transformāciju izstrāde ir vienkāršāka un ātrāka. Visiem trim pētītajiem apgabaliem tika izstrādātas tiem pielāgotas valodas. Divas no izstrādātajām valodām balstās uz attēlojumu principiem. Abos gadījumos tika sec...

  7. Modeling mechanical effects on promotion and retardation of martensitic transformation

    Energy Technology Data Exchange (ETDEWEB)

    Maalekian, Mehran, E-mail: mehran.maalekian@ubc.ca [Department of Materials Engineering, University of British Columbia, 309-6350 Stores Road, Vancouver, B.C. V61Z4 (Canada); Kozeschnik, Ernst [Christian Doppler Laboratory for ' Early Stages of Precipitation' , Institute of Materials Science and Technology, Vienna University of Technology (Austria)

    2011-01-25

    Research highlights: {yields} Compressive elastic stresses up to 250 MPa are applied in continuous cooling. {yields} Using the thermodynamic data and maximum value of the mechanical driving force the predicted increase in M{sub s} ({approx}0.1 K/MPa) is in agreement with experiment {yields} Austenite was deformed plastically at different temperatures (800 deg. C-1100 deg. C). {yields} High deformation temperature (i.e. 1100 deg. C) as well as low plastic strain (i.e. {epsilon}{sub ave} {approx} 30%) do not affect martensite transformation noticeably, whereas lower deformation temperature (e.g. 900 deg. C) and large plastic strain (i.e. {epsilon}{sub ave} {approx} 70%) retards martensite transformation. {yields} The theory of mechanical stabilization predicts the depression of M{sub s}. - Abstract: The influence of compressive stress and prior plastic deformation of austenite on the martensite transformation in a eutectoid steel is studied both experimentally and theoretically. It is demonstrated that martensite formation is assisted by stress but it is retarded when transformation occurs from deformed austenite. With the quantitative modeling of the problem based on the theory of displacive shear transformation, the explanation of the two opposite roles of mechanical treatment prior to or simultaneously to martensite transformation is presented.

  8. The role of technology and engineering models in transforming healthcare.

    Science.gov (United States)

    Pavel, Misha; Jimison, Holly Brugge; Wactlar, Howard D; Hayes, Tamara L; Barkis, Will; Skapik, Julia; Kaye, Jeffrey

    2013-01-01

    The healthcare system is in crisis due to challenges including escalating costs, the inconsistent provision of care, an aging population, and high burden of chronic disease related to health behaviors. Mitigating this crisis will require a major transformation of healthcare to be proactive, preventive, patient-centered, and evidence-based with a focus on improving quality-of-life. Information technology, networking, and biomedical engineering are likely to be essential in making this transformation possible with the help of advances, such as sensor technology, mobile computing, machine learning, etc. This paper has three themes: 1) motivation for a transformation of healthcare; 2) description of how information technology and engineering can support this transformation with the help of computational models; and 3) a technical overview of several research areas that illustrate the need for mathematical modeling approaches, ranging from sparse sampling to behavioral phenotyping and early detection. A key tenet of this paper concerns complementing prior work on patient-specific modeling and simulation by modeling neuropsychological, behavioral, and social phenomena. The resulting models, in combination with frequent or continuous measurements, are likely to be key components of health interventions to enhance health and wellbeing and the provision of healthcare.

  9. Lie algebraic similarity transformed Hamiltonians for lattice model systems

    Science.gov (United States)

    Wahlen-Strothman, Jacob M.; Jiménez-Hoyos, Carlos A.; Henderson, Thomas M.; Scuseria, Gustavo E.

    2015-01-01

    We present a class of Lie algebraic similarity transformations generated by exponentials of two-body on-site Hermitian operators whose Hausdorff series can be summed exactly without truncation. The correlators are defined over the entire lattice and include the Gutzwiller factor ni ↑ni ↓ , and two-site products of density (ni ↑+ni ↓) and spin (ni ↑-ni ↓) operators. The resulting non-Hermitian many-body Hamiltonian can be solved in a biorthogonal mean-field approach with polynomial computational cost. The proposed similarity transformation generates locally weighted orbital transformations of the reference determinant. Although the energy of the model is unbound, projective equations in the spirit of coupled cluster theory lead to well-defined solutions. The theory is tested on the one- and two-dimensional repulsive Hubbard model where it yields accurate results for small and medium sized interaction strengths.

  10. Development and Validation of a Tokamak Skin Effect Transformer model

    CERN Document Server

    Romero, J A; Coda, S; Felici, F; Garrido, I

    2012-01-01

    A control oriented, lumped parameter model for the tokamak transformer including the slow flux penetration in the plasma (skin effect transformer model) is presented. The model does not require detailed or explicit information about plasma profiles or geometry. Instead, this information is lumped in system variables, parameters and inputs. The model has an exact mathematical structure built from energy and flux conservation theorems, predicting the evolution and non linear interaction of the plasma current and internal inductance as functions of the primary coil currents, plasma resistance, non-inductive current drive and the loop voltage at a specific location inside the plasma (equilibrium loop voltage). Loop voltage profile in the plasma is substituted by a three-point discretization, and ordinary differential equations are used to predict the equilibrium loop voltage as function of the boundary and resistive loop voltages. This provides a model for equilibrium loop voltage evolution, which is reminiscent ...

  11. Experimental studies on power transformer model winding provided with MOVs

    Directory of Open Access Journals (Sweden)

    G.H. Kusumadevi

    2017-05-01

    Full Text Available Surge voltage distribution across a HV transformer winding due to appearance of very fast rise time (rise time of order 1 μs transient voltages is highly non-uniform along the length of the winding for initial time instant of occurrence of surge. In order to achieve nearly uniform initial time instant voltage distribution along the length of the HV winding, investigations have been carried out on transformer model winding. By connecting similar type of metal oxide varistors across sections of HV transformer model winding, it is possible to improve initial time instant surge voltage distribution across length of the HV transformer winding. Transformer windings with α values 5.3, 9.5 and 19 have been analyzed. The experimental studies have been carried out using high speed oscilloscope of good accuracy. The initial time instant voltage distribution across sections of winding with MOV remains nearly uniform along length of the winding. Also results of fault diagnostics carried out with and without connection of MOVs across sections of winding are reported.

  12. LAPLACE TRANSFORM OF THE SURVIVAL PROBABILITY UNDER SPARRE ANDERSEN MODEL

    Institute of Scientific and Technical Information of China (English)

    Sun Chuanguang

    2007-01-01

    In this paper a class of risk processes in which claims occur as a renewal process is studied. A clear expression for Laplace transform of the survival probability is well given when the claim amount distribution is Erlang distribution or mixed Erlang distribution. The expressions for moments of the time to ruin with the model above are given.

  13. Transforming a School of Education via the Accelerated Schools Model.

    Science.gov (United States)

    Mims, J. Sabrina; Slovacek, Simeon; Wong, Gay Yuen

    This paper describes how the Accelerated Schools Model has served as a catalyst for transforming the Charter School of Education at California State University, Los Angeles. The Accelerated Schools Project has been one of the largest and most comprehensive school restructuring movements of the last decade. The focus of Accelerated Schools is…

  14. Model Transformation for a System of Systems Dependability Safety Case

    Science.gov (United States)

    Murphy, Judy; Driskell, Steve

    2011-01-01

    The presentation reviews the dependability and safety effort of NASA's Independent Verification and Validation Facility. Topics include: safety engineering process, applications to non-space environment, Phase I overview, process creation, sample SRM artifact, Phase I end result, Phase II model transformation, fault management, and applying Phase II to individual projects.

  15. A Concept Transformation Learning Model for Architectural Design Learning Process

    Science.gov (United States)

    Wu, Yun-Wu; Weng, Kuo-Hua; Young, Li-Ming

    2016-01-01

    Generally, in the foundation course of architectural design, much emphasis is placed on teaching of the basic design skills without focusing on teaching students to apply the basic design concepts in their architectural designs or promoting students' own creativity. Therefore, this study aims to propose a concept transformation learning model to…

  16. A Concept Transformation Learning Model for Architectural Design Learning Process

    Science.gov (United States)

    Wu, Yun-Wu; Weng, Kuo-Hua; Young, Li-Ming

    2016-01-01

    Generally, in the foundation course of architectural design, much emphasis is placed on teaching of the basic design skills without focusing on teaching students to apply the basic design concepts in their architectural designs or promoting students' own creativity. Therefore, this study aims to propose a concept transformation learning model to…

  17. A Microscale Model for Ausferritic Transformation of Austempered Ductile Irons

    Science.gov (United States)

    Boccardo, Adrián D.; Dardati, Patricia M.; Celentano, Diego J.; Godoy, Luis A.

    2017-01-01

    This paper presents a new metallurgical model for the ausferritic transformation of ductile cast iron. The model allows predicting the evolution of phases in terms of the chemical composition, austenitization and austempering temperatures, graphite nodule count, and distribution of graphite nodule size. The ferrite evolution is predicted according to the displacive growth mechanism. A representative volume element is employed at the microscale to consider the phase distributions, the inhomogeneous austenite carbon content, and the nucleation of ferrite subunits at the graphite nodule surface and at the tips of existing ferrite subunits. The performance of the model is evaluated by comparison with experimental results. The results indicate that the increment of the ausferritic transformation rate, which is caused by increments of austempering temperature and graphite nodule count, is adequately represented by this model.

  18. Transformation of equations in analysis of proportionality through referent models

    CERN Document Server

    Romay, E O

    2006-01-01

    In proportionality of objects, samples or populations, usually we work with Z score of proportionality calculated through referent models, instead directly with the variables of the objects in itself. In these studies we have the necessity to transform, the equations that use the variables of the object, in equations that directly use like variables Z score. In the present work a method is developed to transform the parametric equations, in equations in variables Z using like example the studies of human proportionality from the Phantom stratagem of Ross and Wilson.

  19. Assessing biocomputational modelling in transforming clinical guidelines for osteoporosis management.

    Science.gov (United States)

    Thiel, Rainer; Viceconti, Marco; Stroetmann, Karl

    2011-01-01

    Biocomputational modelling as developed by the European Virtual Physiological Human (VPH) Initiative is the area of ICT most likely to revolutionise in the longer term the practice of medicine. Using the example of osteoporosis management, a socio-economic assessment framework is presented that captures how the transformation of clinical guidelines through VPH models can be evaluated. Applied to the Osteoporotic Virtual Physiological Human Project, a consequent benefit-cost analysis delivers promising results, both methodologically and substantially.

  20. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  1. Ontological Modeling of Transformation in Heart Defect Diagrams

    OpenAIRE

    Viswanath, Venkatesh; Tong, Tuanjie; Dinakarpandian, Deendayal; Lee, Yugyung

    2006-01-01

    The accurate portrayal of a large volume data of variable heart defects is crucial to providing good patient care in pediatric cardiology. Our research aims to span the universe of congenital heart defects by generating illustrative diagrams that enhance data interpretation. To accommodate the range and severity of defects to be represented, we base our diagrams on transformation models applied to a normal heart rather than a static set of defects. These models are based on a domain-specific ...

  2. Dislocation Model and Morphology Simulation of bcc fcc Martensitic Transformation

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    By using molecular dynamics computer simulation at atomic level, the effects of single dislocation and dipole dislocations on nucleation and growth of martensitic transformation have been studied. It was found that only the location of tension or compression stress fields of the dislocations are favorable for martensite nucleation in NiAl alloy and the dislocations can move to accommodate partly the transformation strain during the nucleation and growth of martensite. Combined with the molecular dynamics simulation, a two dimensional simulation for martensite morphology based on a dislocation model bas been performed. Many factors related to martensitic transformation were considered, such as supercooling, interface energy, shear strain, normal strain and hydrostatic pressure. Different morphologies of martensites, similar to lath, lenticular, thin plate, couple-plate and lenticular couple-plate martensites observed in Fe-C and Fe-Ni-C alloys, were obtained.

  3. Similarity transformation approach to identifiability analysis of nonlinear compartmental models.

    Science.gov (United States)

    Vajda, S; Godfrey, K R; Rabitz, H

    1989-04-01

    Through use of the local state isomorphism theorem instead of the algebraic equivalence theorem of linear systems theory, the similarity transformation approach is extended to nonlinear models, resulting in finitely verifiable sufficient and necessary conditions for global and local identifiability. The approach requires testing of certain controllability and observability conditions, but in many practical examples these conditions prove very easy to verify. In principle the method also involves nonlinear state variable transformations, but in all of the examples presented in the paper the transformations turn out to be linear. The method is applied to an unidentifiable nonlinear model and a locally identifiable nonlinear model, and these are the first nonlinear models other than bilinear models where the reason for lack of global identifiability is nontrivial. The method is also applied to two models with Michaelis-Menten elimination kinetics, both of considerable importance in pharmacokinetics, and for both of which the complicated nature of the algebraic equations arising from the Taylor series approach has hitherto defeated attempts to establish identifiability results for specific input functions.

  4. Multimodal electromechanical model of piezoelectric transformers by Hamilton's principle.

    Science.gov (United States)

    Nadal, Clement; Pigache, Francois

    2009-11-01

    This work deals with a general energetic approach to establish an accurate electromechanical model of a piezoelectric transformer (PT). Hamilton's principle is used to obtain the equations of motion for free vibrations. The modal characteristics (mass, stiffness, primary and secondary electromechanical conversion factors) are also deduced. Then, to illustrate this general electromechanical method, the variational principle is applied to both homogeneous and nonhomogeneous Rosen-type PT models. A comparison of modal parameters, mechanical displacements, and electrical potentials are presented for both models. Finally, the validity of the electrodynamical model of nonhomogeneous Rosen-type PT is confirmed by a numerical comparison based on a finite elements method and an experimental identification.

  5. High frequency modeling of power transformers. Stresses and diagnostics

    Energy Technology Data Exchange (ETDEWEB)

    Bjerkan, Eilert

    2005-05-15

    In this thesis a reliable, versatile and rigorous method for high frequency power transformer modeling is searched and established. The purpose is to apply this model to sensitivity analysis of FRA (Frequency Response Analysis) which is a quite new diagnostic method for assessing the mechanical integrity of power transformer windings on-site. The method should be versatile in terms of being able to estimate internal and external over voltages and resonances. Another important aspect is that the method chosen is suitable for real transformer geometries. In order to verify the suitability of the model for real transformers, a specific test-object is used. This is a 20MVA transformer, and details are given in chapter 1.4. The high frequency power transformer model is established from geometrical and constructional information from the manufacturer, together with available material characteristics. All circuit parameters in the lumped circuit representation are calculated based on these data. No empirical modifications need to be performed. Comparison shows capability of reasonable accuracy in the range from 10 khz to 1 MHz utilizing a disc-to-disc representation. A compromise between accuracy of model due to discretization and complexity of the model in a turn-to-turn representation is inevitable. The importance of the iron core is emphasized through a comparison of representations with/without the core included. Frequency-dependent phenomena are accurately represented using an isotropic equivalent for windings and core, even with a coarse mesh for the FEM-model. This is achieved through a frequency-dependent complex permeability representation of the materials. This permeability is deduced from an analytical solution of the frequency-dependent magnetic field inside the conductors and the core. The importance of dielectric losses in a transformer model is also assessed. Since published data on the high frequency properties of press board are limited, some initial

  6. Transforming High School Physics with Modeling and Computation

    CERN Document Server

    Aiken, John M

    2013-01-01

    The Engage to Excel (PCAST) report, the National Research Council's Framework for K-12 Science Education, and the Next Generation Science Standards all call for transforming the physics classroom into an environment that teaches students real scientific practices. This work describes the early stages of one such attempt to transform a high school physics classroom. Specifically, a series of model-building and computational modeling exercises were piloted in a ninth grade Physics First classroom. Student use of computation was assessed using a proctored programming assignment, where the students produced and discussed a computational model of a baseball in motion via a high-level programming environment (VPython). Student views on computation and its link to mechanics was assessed with a written essay and a series of think-aloud interviews. This pilot study shows computation's ability for connecting scientific practice to the high school science classroom.

  7. Tensor product model transformation based decoupled terminal sliding mode control

    Science.gov (United States)

    Zhao, Guoliang; Li, Hongxing; Song, Zhankui

    2016-06-01

    The main objective of this paper is to propose a tensor product model transformation based decoupled terminal sliding mode controller design methodology. The methodology is divided into two steps. In the first step, tensor product model transformation is applied to the single-input-multi-output system and a parameter-varying weighted linear time-invariant system is obtained. Then, decoupled terminal sliding mode controller is designed based on the linear time-invariant systems. The main novelty of this paper is that the nonsingular terminal sliding mode control design is based on a numerical model rather than an analytical one. Finally, simulations are tested on cart-pole system and translational oscillations with a rotational actuator system.

  8. Development of Transformations from Business Process Models to Implementations by Reuse

    NARCIS (Netherlands)

    Dirgahayu, Teduh; Quartel, Dick; Sinderen, van Marten

    2007-01-01

    This paper presents an approach for developing transformations from business process models to implementations that facilitates reuse. A transformation is developed as a composition of three smaller tasks: pattern recognition, pattern realization and activity transformation. The approach allows one

  9. Development of transformations from business process models to implementations by reuse

    NARCIS (Netherlands)

    Dirgahayu, Teduh; Quartel, Dick; Sinderen, van Marten; Ferreira Pires, L.; Hammoudi, S.

    2007-01-01

    This paper presents an approach for developing transformations from business process models to implementations that facilitates reuse. A transformation is developed as a composition of three smaller tasks: pattern recognition, pattern realization and activity transformation. The approach allows one

  10. Stable Eutectoid Transformation in Nodular Cast Iron: Modeling and Validation

    Science.gov (United States)

    Carazo, Fernando D.; Dardati, Patricia M.; Celentano, Diego J.; Godoy, Luis A.

    2016-10-01

    This paper presents a new microstructural model of the stable eutectoid transformation in a spheroidal cast iron. The model takes into account the nucleation and growth of ferrite grains and the growth of graphite spheroids. Different laws are assumed for the growth of both phases during and below the intercritical stable eutectoid. At a microstructural level, the initial conditions for the phase transformations are obtained from the microstructural simulation of solidification of the material, which considers the divorced eutectic and the subsequent growth of graphite spheroids up to the initiation of the stable eutectoid transformation. The temperature field is obtained by solving the energy equation by means of finite elements. The microstructural (phase change) and macrostructural (energy balance) models are coupled by a sequential multiscale procedure. Experimental validation of the model is achieved by comparison with measured values of fractions and radius of 2D view of ferrite grains. Agreement with such experiments indicates that the present model is capable of predicting ferrite phase fraction and grain size with reasonable accuracy.

  11. Stable Eutectoid Transformation in Nodular Cast Iron: Modeling and Validation

    Science.gov (United States)

    Carazo, Fernando D.; Dardati, Patricia M.; Celentano, Diego J.; Godoy, Luis A.

    2017-01-01

    This paper presents a new microstructural model of the stable eutectoid transformation in a spheroidal cast iron. The model takes into account the nucleation and growth of ferrite grains and the growth of graphite spheroids. Different laws are assumed for the growth of both phases during and below the intercritical stable eutectoid. At a microstructural level, the initial conditions for the phase transformations are obtained from the microstructural simulation of solidification of the material, which considers the divorced eutectic and the subsequent growth of graphite spheroids up to the initiation of the stable eutectoid transformation. The temperature field is obtained by solving the energy equation by means of finite elements. The microstructural (phase change) and macrostructural (energy balance) models are coupled by a sequential multiscale procedure. Experimental validation of the model is achieved by comparison with measured values of fractions and radius of 2D view of ferrite grains. Agreement with such experiments indicates that the present model is capable of predicting ferrite phase fraction and grain size with reasonable accuracy.

  12. Model-to-model transformations of architecture descriptions of an integration platform

    Directory of Open Access Journals (Sweden)

    Tomasz Górski

    2014-04-01

    Full Text Available Model transformations play a key role in any software development project based on Mod-el-Driven Engineering (MDE principles. However, little attention has been paid to the ap-plication of MDE principles to automate the design of integration solutions. The aim of the paper is to present transformations of a model-to-model type, used to automate the process of integration platform's architecture description. The transformations have been designed to enable the generation of model elements, according to the '1+5' architectural views model adjusted to the integration solutions description. Design and implementation of transformations were performed in the IBM Rational Software Architect (RSA environ-ment. Authorial UML profiles: UML Profile for Integration Platform and UML Profile for Integration Flows have been used. The paper covers transformations between models in the following architectural views: Integrated Processes; Use Cases; Logical and Integrated Services. The transformations occur at the levels of business processes, requirements speci-fication and system design. Using the transformations, it is possible to generate models, diagrams, model elements and relationships between them. The complete environment has been obtained to automate architectural description of an integration solution. Transfor-mations ensure completeness of the architectural description and consistency of elements between models.

  13. Internet of Things (IoT Platform for Structure Health Monitoring

    Directory of Open Access Journals (Sweden)

    Ahmed Abdelgawad

    2017-01-01

    Full Text Available Increase in the demand for reliable structural health information led to the development of Structural Health Monitoring (SHM. Prediction of upcoming accidents and estimation of useful life span of a structure are facilitated through SHM. While data sensing is the core of any SHM, tracking the data anytime anywhere is a prevailing challenge. With the advancement in information technology, the concept of Internet of Things (IoT has made it possible to integrate SHM with Internet to track data anytime anywhere. In this paper, a SHM platform embedded with IoT is proposed to detect the size and location of damage in structures. The proposed platform consists of a Wi-Fi module, a Raspberry Pi, an Analog to Digital Converter (ADC, a Digital to Analog Converter (DAC, a buffer, and piezoelectric (PZT sensors. The piezoelectric sensors are mounted as a pair in the structure. Data collected from the piezoelectric sensors will be used to detect the size and location of damage using a proposed mathematical model. Implemented on a Raspberry Pi, the proposed mathematical model will estimate the size and location of structural damage, if any, and upload the data to Internet. This data will be stored and can be checked remotely from any mobile device. The system has been validated using a real test bed in the lab.

  14. Spatial Modeling of Iron Transformations Within Artificial Soil Aggregates

    Science.gov (United States)

    Kausch, M.; Meile, C.; Pallud, C.

    2008-12-01

    Structured soils exhibit significant variations in transport characteristics at the aggregate scale. Preferential flow occurs through macropores while predominantly diffusive exchange takes place in intra-aggregate micropores. Such environments characterized by mass transfer limitations are conducive to the formation of small-scale chemical gradients and promote strong spatial variation in processes controlling the fate of redox-sensitive elements such as Fe. In this study, we present a reactive transport model used to spatially resolve iron bioreductive processes occurring within a spherical aggregate at the interface between advective and diffusive domains. The model is derived from current conceptual models of iron(hydr)oxide (HFO) transformations and constrained by literature and experimental data. Data were obtained from flow-through experiments on artificial soil aggregates inoculated with Shewanella putrefaciens strain CN32, and include the temporal evolution of the bulk solution composition, as well as spatial information on the final solid phase distribution within aggregates. With all iron initially in the form of ferrihydrite, spatially heterogeneous formation of goethite/lepidocrocite, magnetite and siderite was observed during the course of the experiments. These transformations were reproduced by the model, which ascribes a central role to divalent iron as a driver of HFO transformations and master variable in the rate laws of the considered reaction network. The predicted dissolved iron breakthrough curves also match the experimental ones closely. Thus, the computed chemical concentration fields help identify factors governing the observed trends in the solid phase distribution patterns inside the aggregate. Building on a mechanistic description of transformation reactions, fluid flow and solute transport, the model was able to describe the observations and hence illustrates the importance of small-scale gradients and dynamics of bioreductive

  15. Transforming business models through big data in the textile industry

    DEFF Research Database (Denmark)

    Aagaard, Annabeth

    as stressed by Zott et al. (2011), Weill et al. (2011) and David J. Teece (2010: 174), who states that: “the concept of a business model lacks theoretical grounding in economics or in business studies”. With the acceleration of digitization and use of big data analytics quality data are accessible......, such as textile, and have led to disruption of established business models (Westerman et al., 2014; Weill and Woerner, 2015). Yet, little is known of the managerial process and facilitation of the digital transformation of business models through big data (McAfee and Brynjolfsson, 2012; Markus and Loebbecke, 2013)....

  16. Unitary transformation method for solving generalized Jaynes-Cummings models

    Indian Academy of Sciences (India)

    Sudha Singh

    2006-03-01

    Two fully quantized generalized Jaynes-Cummings models for the interaction of a two-level atom with radiation field are treated, one involving intensity dependent coupling and the other involving multiphoton interaction between the field and the atom. The unitary transformation method presented here not only solves the time dependent problem but also allows a determination of the eigensolutions of the interacting Hamiltonian at the same time.

  17. A transformation model for Laminaria Japonica (Phaeophyta, Laminariales)

    Science.gov (United States)

    Qin, Song; Jiang, Peng; Li, Xin-Ping; Wang, Xi-Hua; Zeng, Cheng-Kui

    1998-03-01

    A genetic transformation model for the seaweed Laminaria japonica mainly includes the following aspects: 1. The method to introduce foreign genes into the kelp, L. japonica Biolistic bombardment has been proved to be an effective method to bombard foreign DNA through cell walls into intact cells of both sporophytes and gametophytes. The expression of cat and lacZ was detected in regenerated sporophytes, which suggests that this method could induce random integration of foreign genes. Promoters to drive gene expression

  18. Coupled modified baker's transformations for the Ising model.

    Science.gov (United States)

    Sakaguchi, H

    1999-12-01

    An invertible coupled map lattice is proposed for the Ising model. Each elemental map is a modified baker's transformation, which is a two-dimensional map of X and Y. The time evolution of the spin variable is memorized in the binary representation of the Y variable. The temporal entropy and time correlation of the spin variable are calculated from the snapshot configuration of the Y variables.

  19. Comparative Analysis of Cryptography Library in IoT

    Science.gov (United States)

    Kumar, Uday; Borgohain, Tuhin; Sanyal, Sugata

    2015-05-01

    The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cryptography libraries specifically aimed for application in the field of Internet of Things. The various libraries and their performance analysis listed down in this paper are consolidated from various sources with the aim of providing a single comprehensive repository for reference to the various cryptography libraries and the comparative analysis of their features in IoT.

  20. Optical fiber sensors for IoT and smart devices

    CERN Document Server

    Domingues, Maria de Fátima F

    2017-01-01

    This brief provides a review of the evolution of optical fiber sensing solutions and related applications. Unique production methods are presented and discussed, highlighting their evolution and analyzing their complexity. Under this scope, this brief presents the existing silica optical fiber sensors and polymer optical fiber sensors solutions, comparing its field of action (sensitivity, accuracy), complexity of manufacture and economic cost. Special attention is given to low-cost production methods. This brief evaluates the different existing techniques, assessing the accuracy and suitability of these sensors for possible Internet of Things (IoT) integration in different considered scenarios. Critical analytical techniques, also covered in this brief, are expected to play a key role in the world of IoT and the smart city of tomorrow.

  1. Transportable IOT measurement station for direct-broadcast satellites

    Science.gov (United States)

    Ulbricht, Michael

    A transportable 11.7-12.5-GHz flux-density measurement facility for use in the in-orbit testing (IOT) of the FRG TV-Sat direct-broadcast satellites is described. Major components include a 1.2-m-diameter antenna, the fluxmeter, a radiometer to determine atmospheric attenuation, a weather station, and a control and data-processing computer; all of the components are mounted on a 5.10 x 2.35 x 2.70-m trailer. IOT performance parameters include gain/temperature ratio 15.9 dB/K, measurement range -97 to -117 dBW/sq m, measurement accuracy less than 0.5 dB rms, and measurement rate 250-650 msec. Photographs and a block diagram are provided.

  2. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  3. An efficient visual saliency detection model based on Ripplet transform

    Indian Academy of Sciences (India)

    A DIANA ANDRUSHIA; R THANGARAJAN

    2017-05-01

    Even though there have been great advancements in computer vision tasks, the development of human visual attention models is still not well investigated. In day-to-day life, one can find ample applications of saliency detection in image and video processing. This paper presents an efficient visual saliency detectionmodel based on Ripplet transform, which aims at detecting the salient region and achieving higher Receiver Operating Characteristics (ROC). Initially the feature maps are obtained from Ripplet transform in different scales and different directions of the image. The global and local saliency maps are computed based on the global probability density distribution and feature distribution of local areas, which are combined together to get the final saliency map. Ripplet-transform-based visual saliency detection is the novel approach carried out in this paper. Experimental results indicate that the proposed method based on Ripplet transformation can give excellent performance in terms of precision, recall, F measure and Mean Absolute Error (MAE), and is compared with 10 state-of-the-art methods on five benchmark datasets.

  4. IFCIoT: Integrated Fog Cloud IoT Architectural Paradigm for Future Internet of Things

    OpenAIRE

    Munir, Arslan; Kansakar, Prasanna; Khan, Samee U.

    2017-01-01

    We propose a novel integrated fog cloud IoT (IFCIoT) architectural paradigm that promises increased performance, energy efficiency, reduced latency, quicker response time, scalability, and better localized accuracy for future IoT applications. The fog nodes (e.g., edge servers, smart routers, base stations) receive computation offloading requests and sensed data from various IoT devices. To enhance performance, energy efficiency, and real-time responsiveness of applications, we propose a reco...

  5. Challenges in Materials Transformation Modeling for Polyolefins Industry

    Science.gov (United States)

    Lai, Shih-Yaw; Swogger, Kurt W.

    2004-06-01

    Unlike most published polymer processing and/or forming research, the transformation of polyolefins to fabricated articles often involves non-confined flow or so-called free surface flow (e.g. fiber spinning, blown films, and cast films) in which elongational flow takes place during a fabrication process. Obviously, the characterization and validation of extensional rheological parameters and their use to develop rheological constitutive models are the focus of polyolefins materials transformation research. Unfortunately, there are challenges that remain with limited validation for non-linear, non-isothermal constitutive models for polyolefins. Further complexity arises in the transformation of polyolefins in the elongational flow system as it involves stress-induced crystallization process. The complicated nature of elongational, non-linear rheology and non-isothermal crystallization kinetics make the development of numerical methods very challenging for the polyolefins materials forming modeling. From the product based company standpoint, the challenges of materials transformation research go beyond elongational rheology, crystallization kinetics and its numerical modeling. In order to make models useful for the polyolefin industry, it is critical to develop links between molecular parameters to both equipment and materials forming parameters. The recent advances in the constrained geometry catalysis and materials sciences understanding (INSITE technology and molecular design capability) has made industrial polyolefinic materials forming modeling more viable due to the fact that the molecular structure of the polymer can be well predicted and controlled during the polymerization. In this paper, we will discuss inter-relationship (models) among molecular parameters such as polymer molecular weight (Mw), molecular weight distribution (MWD), long chain branching (LCB), short chain branching (SCB or comonomer types and distribution) and their affects on shear and

  6. Valorising the IoT Databox: Creating Value for Everyone

    OpenAIRE

    Perera, Charith; Wakenshaw, Susan; Baarslag, Tim; Haddadi, Hamed; Bandara, Arosha; Mortier, Richard; Crabtree, Andy; Ng, Irene; McAuley, Derek; Crowcroft, Jon

    2016-01-01

    The Internet of Things (IoT) is expected to generate large amounts of heterogeneous data from diverse sources including physical sensors, user devices, and social media platforms. Over the last few years, significant attention has been focused on personal data, particularly data generated by smart wearable and smart home devices. Making personal data available for access and trade is expected to become a part of the data driven digital economy. In this position paper, we review the research c...

  7. THREE-PHASE TRANSFORMER PARAMETERS CALCULATION CONSIDERING THE CORE SATURATION FOR THE MATLAB-SIMULINK TRANSFORMER MODEL

    Directory of Open Access Journals (Sweden)

    I. V. Novash

    2015-01-01

    Full Text Available This article describes the parameters calculation for the three-phase two-winding power transformer model taken from the SimPowerSystems library, which is the part of the MatLab- Simulink environment. Presented methodology is based on the power transformer nameplate data usage. Particular attention is paid to the power transformer magnetization curve para- meters  calculation.  The  methodology  of  the  three-phase  two-winding  power  transformer model parameters calculation considering the magnetization curve nonlinearity isn’t presented in Russian-and English-language sources. Power transformers demo models described in the SimPowerSystems user’s guide have already calculated parameters, but without reference to the sources of their determination. A power transformer is a nonlinear element of the power system, that’s why for its performance analysis in different modes of operation is necessary to have the magnetization curve parameters.The process analysis during no-load energizing of the power transformer is of special interest. This regime is accompanied by the inrush current on the supply side of the power transformer, which is several times larger than the transformer rated current. Sharp rising of the magnetizing current is explained by the magnetic core saturation. Therefore, magnetiza- tion characteristic accounting during transformer no-load energizing modeling is a mandatory requirement. Article authors attempt to put all calculating formulas in a more convenient form and validate the power transformer nonlinear magnetization characteristics parameters calcu- lation. Inrush current oscillograms obtained during the simulation experiment confirmed the adequacy of the calculated model parameters.

  8. An IoT Reader for Wireless Passive Electromagnetic Sensors.

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-03-28

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain.

  9. Cloud IoT Based Greenhouse Monitoring System

    Directory of Open Access Journals (Sweden)

    Keerthi.v

    2015-10-01

    Full Text Available This project explains the design and implementation of an electronic system based on GSM (Global System for Mobile communication, cloud computing and Internet of Things (IoT for sensing the climatic parameters in the greenhouse. Based on the characteristics of accurate perception, efficient transmission and intelligent synthesis of Internet of Things and cloud computing, the system can obtain real-time environmental information for crop growth and then be transmitted. The system can monitor a variety of environmental parameters in greenhouse effectively and meet the actual agricultural production requirements. Devices such as temperature sensor, light sensor, relative humidity sensor and soil moisture sensor are integrated to demonstrate the proposed system. This research focuses on developing a system that can automatically measure and monitor changes of temperature, light, Humidity and moisture level in the greenhouse. The quantity and quality of production in greenhouses can be increased. The procedure used in our system provides the owner with the details online irrespective of their presence onsite. The main system collects environmental parameters inside greenhouse tunnel every 30 seconds. The parameters that are collected by a network of sensors are being logged and stored online using cloud computing and Internet of Things (IoT together called as Cloud Iot.

  10. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  11. SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM

    Directory of Open Access Journals (Sweden)

    L. Nachabe

    2016-08-01

    Full Text Available In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will generate tremendous unstructured or semi structured data that should be shared between different devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus, mechanisms for data interoperability and automatic service discovery and delivery should be offered. Although many approaches have been suggested in the state of art, none of these researches provide a fully interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service management through service oriented paradigm. It proposes sensors/actuators and scenarios independent flexible context aware and distributed architecture for IoT systems, in particular smart home systems.

  12. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  13. Standard-based IoT platforms interworking: Implementation, experiences, and lessons learned

    OpenAIRE

    Kim, Jaeho; Yun, Jaseok; Choi, Sung-Chan; Seed, Dale N.; Lu, Guang; Bauer, Martin; Al-Hezmi, Adel; Campowsky, Konrad; Song, JaSeung

    2016-01-01

    The Internet-of-Things (IoT) provides a great opportunity to many vertical industries because IoT interconnects various devices such as sensors and actuators and collects/processes data from them in order to improve services and reduce costs. As there exists many IoT technologies in the market, global standards and interworking mechanisms are critical to the success of the IoT. This article introduces standardized interworking interfaces and procedures based on oneM2M global standards, and te...

  14. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  15. Involuntary outpatient treatment (iot) for severe mental patients: current situation in Spain.

    Science.gov (United States)

    Cañete-Nicolás, Carlos; Hernández-Viadel, Miguel; Bellido-Rodríguez, Carmen; Lera-Calatayud, Guillem; Asensio-Pascual, Pedro; Pérez-Prieto, Juan F; Calabuig-Crespo, Roman; Leal-Cercós, Carmen

    2012-01-01

    Involuntary Outpatient Treatment (IOT) expects to improve treatment compliance and, therefore, prevent the impairment of patients with severe mental illness, as well as the risk for them and others. Besides IOT introduction defenders and opponent's states, scientific literature offers contradictory results. Legislative changes have been taken in the vast majority of our neighbouring countries in order to regulate IOT application. There is no legal regulation in Spain; however, OIT application is possible in certain Spanish cities. This article reviews IOT in Spain and surrounding countries.

  16. Internet of Things (IoT Applicability in a Metropolitan City

    Directory of Open Access Journals (Sweden)

    Dr. D Mohammed

    2015-03-01

    Full Text Available Internet of Things (IoTis defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan needs in San Antonio, Texas.

  17. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    National Research Council Canada - National Science Library

    Calvo, Isidro; Gil-García, José; Recio, Igor; López, Asier; Quesada, Jerónimo

    2016-01-01

    Typical Internet of Things (IoT) applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers...

  18. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  19. APPLYING BLACK-BOX TESTING TO MODEL TRANSFORMATIONS IN THE MODEL DRIVEN ARCHITECTURE CONTEXT

    Directory of Open Access Journals (Sweden)

    Luciane Telinski Wiedermann Agner

    2014-01-01

    Full Text Available Testing model transformations has played a leading role with the dissemination of MDA in software development processes. Software testing based on black-box testing, together with the “category partitioning” method, can be efficiently used in order to conduct the verification of model transformations. This study employs software testing techniques to an ATL model transformation in the MDA context and points out their benefits. The black-box testing method was adapted to the MT-PROAPES model transformation based on profiles and platform models. The platform models define the range of input models of the MT-PROAPES and are used for the creation of the test cases. The test cases were selected so as to meet certain requirements and increase the ability to detect errors in the model transformation. This approach makes the test process more agile and does not require any abstraction of behavioral properties of the transformations. The field of transformation testing and verification still faces significant challenges and requires a lot of research. Although having some limitations, black-box testing conforms to various situations, besides allowing its integration with other test strategies.

  20. 港口物联网驱动的区域产业布局%Layout of Regional Industries Driven by Port IOT

    Institute of Scientific and Technical Information of China (English)

    王林

    2015-01-01

    In this paper, on the basis of the industrial organization and layout theory, we first proposed the open system model of the organization and layout of the IOT industry, then in connection with the smart port oriented IOT technological framework, established the smart port driven IOT industry layout diamond model, and at the end, presented the layout plan of the IOT industry of the coastal regions of Hebei.%基于产业组织与布局理论,首先提出物联网产业组织与布局开放系统模型,然后结合面向智慧港口的物联网技术框架,提出智慧港口驱动的物联网产业布局钻石模型,最后给出基于该模型的河北沿海地区物联网产业布局策略。

  1. Transformations among CE–CVM model parameters for multicomponent systems

    Indian Academy of Sciences (India)

    B Nageswara Sarma; Shrikant Lele

    2005-06-01

    In the development of thermodynamic databases for multicomponent systems using the cluster expansion–cluster variation methods, we need to have a consistent procedure for expressing the model parameters (CECs) of a higher order system in terms of those of the lower order subsystems and to an independent set of parameters which exclusively represent interactions of the higher order systems. Such a procedure is presented in detail in this communication. Furthermore, the details of transformations required to express the model parameters in one basis from those defined in another basis for the same system are also presented.

  2. Transforming PLC Programs into Formal Models for Verification Purposes

    CERN Document Server

    Darvas, D; Blanco, E

    2013-01-01

    Most of CERN’s industrial installations rely on PLC-based (Programmable Logic Controller) control systems developed using the UNICOS framework. This framework contains common, reusable program modules and their correctness is a high priority. Testing is already applied to find errors, but this method has limitations. In this work an approach is proposed to transform automatically PLC programs into formal models, with the goal of applying formal verification to ensure their correctness. We target model checking which is a precise, mathematical-based method to check formalized requirements automatically against the system.

  3. Dynamic modeling and simulation of power transformer maintenance costs

    Directory of Open Access Journals (Sweden)

    Ristić Olga

    2016-01-01

    Full Text Available The paper presents the dynamic model of maintenance costs of the power transformer functional components. Reliability is modeled combining the exponential and Weibull's distribution. The simulation was performed with the aim of corrective maintenance and installation of the continuous monitoring system of the most critical components. Simulation Dynamic System (SDS method and VENSIM PLE software was used to simulate the cost. In this way, significant savings in maintenance costs will be achieved with a small initial investment. [Projekat Ministarstva nauke Republike Srbije, br. III 41025 i br. OI 171007

  4. A biofilm model for prediction of pollutant transformation in sewers.

    Science.gov (United States)

    Jiang, Feng; Leung, Derek Hoi-Wai; Li, Shiyu; Chen, Guang-Hao; Okabe, Satoshi; van Loosdrecht, Mark C M

    2009-07-01

    This study developed a new sewer biofilm model to simulate the pollutant transformation and biofilm variation in sewers under aerobic, anoxic and anaerobic conditions. The biofilm model can describe the activities of heterotrophic, autotrophic, and sulfate-reducing bacteria (SRB) in the biofilm as well as the variations in biofilm thickness, the spatial profiles of SRB population and biofilm density. The model can describe dynamic biofilm growth, multiple biomass evolution and competitions among organic oxidation, denitrification, nitrification, sulfate reduction and sulfide oxidation in a heterogeneous biofilm growing in a sewer. The model has been extensively verified by three different approaches, including direct verification by measurement of the spatial concentration profiles of dissolved oxygen, nitrate, ammonia, and hydrogen sulfide in sewer biofilm. The spatial distribution profile of SRB in sewer biofilm was determined from the fluorescent in situ hybridization (FISH) images taken by a confocal laser scanning microscope (CLSM) and were predicted well by the model.

  5. Pessimistic Predicate/Transform Model for Long Running Business Processes

    Institute of Scientific and Technical Information of China (English)

    WANG Jinling; JIN Beihong; LI Jing

    2005-01-01

    Many business processes in enterprise applications are both long running and transactional in nature. However, no current transaction model can provide full transaction support for such long running business processes. This paper proposes a new transaction model, the pessimistic predicate/transform (PP/T) model, which can provide full transaction support for long running business processes. A framework was proposed on the enterprise JavaBeans platform to implement the PP/T model. The framework enables application developers to focus on the business logic, with the underlying platform providing the required transactional semantics. The development and maintenance effort are therefore greatly reduced. Simulations show that the model has a sound concurrency management ability for long running business processes.

  6. Constructing the barley model for genetic transformation in Triticeae

    Institute of Scientific and Technical Information of China (English)

    LÜ Bo; WU Jia-jie; FU Dao-lin

    2015-01-01

    Barley (Hordeum vulgare L.) is one of the oldest domesticated crops, showing dramatic adaptation to various climate and environmental conditions. As a major cereal crop, barley ranks the 4th after wheat, maize and rice in terms of planting area and production al over the world. Due to its diploid nature, the cultivated barley is considered as an ideal model to study the polyploid wheat and other Triticeae species. Here, we reviewed the development, optimization, and application of transgenic approaches in barley. The most efifcient and robust genetic transformation has been built on the Agrobacterium-mediated transfer in conjunction with the immature embryo-based regeneration. We then discussed future considerations of using more practical technologies in barley transformation, such as the T-DNA/transposon tagging and the genome editing. As a cereal crop amenable to genetic transformation, barley wil serve as the most valuable carrier for global functional genomics in Triticeae and is becoming the most practical model for generating value-added products.

  7. Transformative Professional Development: A Model for Urban Science Education Reform

    Science.gov (United States)

    Johnson, Carla C.; Marx, Sherry

    2009-04-01

    This study presents a model of Transformative Professional Development (TPD) for use in sustained, collaborative, professional development of teachers in urban middle school science. TPD focuses on urban science teacher change and is responsive to school climate, teacher needs, and teacher beliefs with the intention of promoting change in practice. In this study, TPD was used to meet the needs of individual teachers and the collective needs of schools in reform efforts. The experiences of the eight teachers engaged in this process of professional growth, including their changes in practices and beliefs, provide the focus of this paper. Findings in this study revealed that through the use of TPD, participants in this study improved science teaching effectiveness and began to transform their negative school climate and create positive classroom learning environments.

  8. Neural Network based Modeling and Simulation of Transformer Inrush Current

    Directory of Open Access Journals (Sweden)

    Puneet Kumar Singh

    2012-05-01

    Full Text Available Inrush current is a very important phenomenon which occurs during energization of transformer at no load due to temporary over fluxing. It depends on several factors like magnetization curve, resistant and inductance of primary winding, supply frequency, switching angle of circuit breaker etc. Magnetizing characteristics of core represents nonlinearity which requires improved nonlinearity solving technique to know the practical behavior of inrush current. Since several techniques still working on modeling of transformer inrush current but neural network ensures exact modeling with experimental data. Therefore, the objective of this study was to develop an Artificial Neural Network (ANN model based on data of switching angle and remanent flux for predicting peak of inrush current. Back Propagation with Levenberg-Marquardt (LM algorithm was used to train the ANN architecture and same was tested for the various data sets. This research work demonstrates that the developed ANN model exhibits good performance in prediction of inrush current’s peak with an average of percentage error of -0.00168 and for modeling of inrush current with an average of percentage error of -0.52913.

  9. Comparison of Parameter Estimation Methods for Transformer Weibull Lifetime Modelling

    Institute of Scientific and Technical Information of China (English)

    ZHOU Dan; LI Chengrong; WANG Zhongdong

    2013-01-01

    Two-parameter Weibull distribution is the most widely adopted lifetime model for power transformers.An appropriate parameter estimation method is essential to guarantee the accuracy of a derived Weibull lifetime model.Six popular parameter estimation methods (i.e.the maximum likelihood estimation method,two median rank regression methods including the one regressing X on Y and the other one regressing Y on X,the Kaplan-Meier method,the method based on cumulative hazard plot,and the Li's method) are reviewed and compared in order to find the optimal one that suits transformer's Weibull lifetime modelling.The comparison took several different scenarios into consideration:10 000 sets of lifetime data,each of which had a sampling size of 40 ~ 1 000 and a censoring rate of 90%,were obtained by Monte-Carlo simulations for each scienario.Scale and shape parameters of Weibull distribution estimated by the six methods,as well as their mean value,median value and 90% confidence band are obtained.The cross comparison of these results reveals that,among the six methods,the maximum likelihood method is the best one,since it could provide the most accurate Weibull parameters,i.e.parameters having the smallest bias in both mean and median values,as well as the shortest length of the 90% confidence band.The maximum likelihood method is therefore recommended to be used over the other methods in transformer Weibull lifetime modelling.

  10. TP-model transformation-based-control design frameworks

    CERN Document Server

    Baranyi, Péter

    2016-01-01

    This book covers new aspects and frameworks of control, design, and optimization based on the TP model transformation and its various extensions. The author outlines the three main steps of polytopic and LMI based control design: 1) development of the qLPV state-space model, 2) generation of the polytopic model; and 3) application of LMI to derive controller and observer. He goes on to describe why literature has extensively studied LMI design, but has not focused much on the second step, in part because the generation and manipulation of the polytopic form was not tractable in many cases. The author then shows how the TP model transformation facilitates this second step and hence reveals new directions, leading to powerful design procedures and the formulation of new questions. The chapters of this book, and the complex dynamical control tasks which they cover, are organized so as to present and analyze the beneficial aspect of the family of approaches (control, design, and optimization). Additionally, the b...

  11. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  12. 面向工程建设的物联网人才培养探讨%Discussion on Cultivating Project-oriented IOT Talents

    Institute of Scientific and Technical Information of China (English)

    朱朝平

    2016-01-01

    物联网掀起了信息产业的第三次浪潮,物联网方向的人才需求也直线上升,培养优秀的物联网技术人才成为各大高校的光荣任务。文章分析了现存的高校物联网专业方向的人才培养存在诸多弊端,提出了面向工程建设的物联网人才培养模式,为师生解决了“为什么学”和“学什么”的问题。%While internet of things(IOT) sets off a third wave of the information industry, the talent demand for IOT are skyrocketing. So to cultivate outstanding IOT talents becomes the glorious task of every college. This paper ifrst analyzes that the existing UniversityIOT talents training has many shortcomings, then proposes a Project-Oriented training model, which can answer the questions"Why should we learn" and "How to learn" for students and teachers.

  13. Measurement of noise associated with model transformer cores

    Energy Technology Data Exchange (ETDEWEB)

    Snell, David [Cogent Power Ltd., Development and Market Research, Orb Electrical Steels, Corporation Road, Newport, South Wales NP19 OXT (United Kingdom)], E-mail: Dave.snell@cogent-power.com

    2008-10-15

    The performance of a transformer core may be considered in terms of power loss and by the noise generated by the core, both of which should be minimised. This paper discusses the setting up of a suitable system for evaluation of noise in a large model transformer core (500 kV A) and issues associated with noise measurement. The equivalent continuous sound pressure level (LAeq) was used as a measure of the A-weighted sound level and measurements were made in the range 16 Hz-25 kHz for various step lap core configurations. The selection of optimum sound insulation materials between core and ground support and for enclosing the transformer is essential for minimisation of background noise. Core clamping pressure must be optimised in order to minimise noise. The use of two laminations per layer instead of one leads to an increase in noise arising from the core. Provided care is taken in building the core, good reproducibility of results can be obtained for analysis.

  14. 区域物联网产业市场构成及市场效用分析%Analysis of Composition and Utility of Market of Regional IOT Industry

    Institute of Scientific and Technical Information of China (English)

    张永云; 曾建潮; 任利成; 鲁锦涛

    2013-01-01

    在综述前人对物联网相关研究的基础上,对物联网技术架构进行分析,提取分层要素,构建区域物联网产业市场模型;借鉴效用函数,提出区域物联网产业市场效用函数;并围绕市场模型和效用函数,挖掘区域物联网产业市场路径选择影响因素及其效用;以期通过分析区域物联网产业市场构成及相关效用,揭示区域物联网产业市场的构成脉络和运作规律。%In this paper, on the basis of previous studies on IOT, we analyzed the technical architecture of IOT, extracted the hierarchical factors and built the model of the regional IOT industrial market;then by drawing on the utility function, we proposed the utility function of the regional IOT industrial market;then surrounding the model and the utility model, we uncovered the influence factors of the path selection of the regional IOT industrial market and their utility, with which we expected to analyze the composition and relevant utility of the market and to reveal its operational pattern.

  15. Development and validation of a tokamak skin effect transformer model

    Science.gov (United States)

    Romero, J. A.; Moret, J.-M.; Coda, S.; Felici, F.; Garrido, I.

    2012-02-01

    A lumped parameter, state space model for a tokamak transformer including the slow flux penetration in the plasma (skin effect transformer model) is presented. The model does not require detailed or explicit information about plasma profiles or geometry. Instead, this information is lumped in system variables, parameters and inputs. The model has an exact mathematical structure built from energy and flux conservation theorems, predicting the evolution and non-linear interaction of plasma current and internal inductance as functions of the primary coil currents, plasma resistance, non-inductive current drive and the loop voltage at a specific location inside the plasma (equilibrium loop voltage). Loop voltage profile in the plasma is substituted by a three-point discretization, and ordinary differential equations are used to predict the equilibrium loop voltage as a function of the boundary and resistive loop voltages. This provides a model for equilibrium loop voltage evolution, which is reminiscent of the skin effect. The order and parameters of this differential equation are determined empirically using system identification techniques. Fast plasma current modulation experiments with random binary signals have been conducted in the TCV tokamak to generate the required data for the analysis. Plasma current was modulated under ohmic conditions between 200 and 300 kA with 30 ms rise time, several times faster than its time constant L/R ≈ 200 ms. A second-order linear differential equation for equilibrium loop voltage is sufficient to describe the plasma current and internal inductance modulation with 70% and 38% fit parameters, respectively. The model explains the most salient features of the plasma current transients, such as the inverse correlation between plasma current ramp rates and internal inductance changes, without requiring detailed or explicit information about resistivity profiles. This proves that a lumped parameter modelling approach can be used to

  16. High frequency modeling of power transformers. Stresses and diagnostics

    Energy Technology Data Exchange (ETDEWEB)

    Bjerkan, Eilert

    2005-05-15

    In this thesis a reliable, versatile and rigorous method for high frequency power transformer modeling is searched and established. The purpose is to apply this model to sensitivity analysis of FRA (Frequency Response Analysis) which is a quite new diagnostic method for assessing the mechanical integrity of power transformer windings on-site. The method should be versatile in terms of being able to estimate internal and external over voltages and resonances. Another important aspect is that the method chosen is suitable for real transformer geometries. In order to verify the suitability of the model for real transformers, a specific test-object is used. This is a 20MVA transformer, and details are given in chapter 1.4. The high frequency power transformer model is established from geometrical and constructional information from the manufacturer, together with available material characteristics. All circuit parameters in the lumped circuit representation are calculated based on these data. No empirical modifications need to be performed. Comparison shows capability of reasonable accuracy in the range from 10 khz to 1 MHz utilizing a disc-to-disc representation. A compromise between accuracy of model due to discretization and complexity of the model in a turn-to-turn representation is inevitable. The importance of the iron core is emphasized through a comparison of representations with/without the core included. Frequency-dependent phenomena are accurately represented using an isotropic equivalent for windings and core, even with a coarse mesh for the FEM-model. This is achieved through a frequency-dependent complex permeability representation of the materials. This permeability is deduced from an analytical solution of the frequency-dependent magnetic field inside the conductors and the core. The importance of dielectric losses in a transformer model is also assessed. Since published data on the high frequency properties of press board are limited, some initial

  17. Model Transformation for Model Driven Development of Semantic Web Enabled Multi-Agent Systems

    NARCIS (Netherlands)

    Kardas, G.; Göknil, Arda; Dikenelli, O.; Topaloglu, N.Y.; Weyns, D.; Holvoet, T.

    2007-01-01

    Model Driven Development (MDD) provides an infrastructure that simplifies Multi-agent System (MAS) development by increasing the abstraction level. In addition to defining models, transformation process for those models is also crucial in MDD. On the other hand, MAS modeling should also take care of

  18. Model Transformation for Model Driven Development of Semantic Web Enabled Multi-Agent Systems

    NARCIS (Netherlands)

    Kardas, G.; Göknil, A.; Dikenelli, O.; Topaloglu, N.Y.

    2007-01-01

    Model Driven Development (MDD) provides an infrastructure that simplifies Multi-agent System (MAS) development by increasing the abstraction level. In addition to defining models, transformation process for those models is also crucial in MDD. On the other hand, MAS modeling should also take care of

  19. Active Shape Models Using Scale Invariant Feature Transform

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    A new active shape models (ASMs) was presented, which is driven by scale invariant feature transform (SIFT) local descriptor instead of normalizing first order derivative profiles in the original formulation, to segment lung fields from chest radiographs. The modified SIFT local descriptor, more distinctive than the general intensity and gradient features, is used to characterize the image features in the vicinity of each pixel at each resolution level during the segmentation optimization procedure. Experimental results show that the proposed method is more robust and accurate than the original ASMs in terms of an average overlap percentage and average contour distance in segmenting the lung fields from an available public database.

  20. ASYMPTOTICS OF MEAN TRANSFORMATION ESTIMATORS WITH ERRORS IN VARIABLES MODEL

    Institute of Scientific and Technical Information of China (English)

    CUI Hengjian

    2005-01-01

    This paper addresses estimation and its asymptotics of mean transformation θ = E[h(X)] of a random variable X based on n iid. Observations from errors-in-variables model Y = X + v, where v is a measurement error with a known distribution and h(.) is a known smooth function. The asymptotics of deconvolution kernel estimator for ordinary smooth error distribution and expectation extrapolation estimator are given for normal error distribution respectively. Under some mild regularity conditions, the consistency and asymptotically normality are obtained for both type of estimators. Simulations show they have good performance.

  1. Text-Independent Speaker Identification Using the Histogram Transform Model

    DEFF Research Database (Denmark)

    Ma, Zhanyu; Yu, Hong; Tan, Zheng-Hua;

    2017-01-01

    In this paper, we propose a novel probabilistic method for the task of text-independent speaker identification (SI). In order to capture the dynamic information during SI, we design a super-MFCCs features by cascading three neighboring Mel-frequency Cepstral coefficients (MFCCs) frames together....... These super-MFCC vectors are utilized for probabilistic model training such that the speaker’s characteristics can be sufficiently captured. The probability density function (PDF) of the aforementioned super-MFCCs features is estimated by the recently proposed histogram transform (HT) method. To recedes...

  2. Culture models of human mammary epithelial cell transformation

    Energy Technology Data Exchange (ETDEWEB)

    Stampfer, Martha R.; Yaswen, Paul

    2000-11-10

    Human pre-malignant breast diseases, particularly ductal carcinoma in situ (DCIS)3 already display several of the aberrant phenotypes found in primary breast cancers, including chromosomal abnormalities, telomerase activity, inactivation of the p53 gene and overexpression of some oncogenes. Efforts to model early breast carcinogenesis in human cell cultures have largely involved studies in vitro transformation of normal finite lifespan human mammary epithelial cells (HMEC) to immortality and malignancy. We present a model of HMEC immortal transformation consistent with the know in vivo data. This model includes a recently described, presumably epigenetic process, termed conversion, which occurs in cells that have overcome stringent replicative senescence and are thus able to maintain proliferation with critically short telomeres. The conversion process involves reactivation of telomerase activity, and acquisition of good uniform growth in the absence and presence of TFGB. We propose th at overcoming the proliferative constraints set by senescence, and undergoing conversion, represent key rate-limiting steps in human breast carcinogenesis, and occur during early stage breast cancer progression.

  3. Coupling capacitor voltage transformer: A model for electromagnetic transient studies

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, D.; Neves, W.L.A. [Department of Electrical Engineering, Federal University of Campina Grande, Av. Aprigio Veloso, 882 Bodocongo, 58.109-970 Campina Grande, PB (Brazil); Vasconcelos, J.C.A. [Companhia Hidro Eletrica do Sao Francisco, Rua Delmiro Gouveia, 333 Bongi, 50.761-901 Recife, PE (Brazil)

    2007-02-15

    In this work, an accurate coupling capacitor voltage transformer (CCVT) model for electromagnetic transient studies is presented. The model takes into account linear and nonlinear elements. A support routine was developed to compute the linear 230kV CCVT parameters (resistances, inductances and capacitances) from frequency response data. The magnetic core and surge arrester nonlinear characteristics were estimated from laboratory measurements as well. The model is used in connection with the electromagnetic transients program (EMTP) to predict the CCVT performance when it is submitted to transient overvoltages, as are the cases of voltages due to the ferroresonance phenomenon and circuit breaker switching. The difference between simulated and measured results is fairly small. Simulations had shown that transient overvoltages produced inside the CCVT, when a short circuit is cleared at the CCVT secondary side, are effectively damped out by the ferroresonance suppression circuit and the protection circuit. (author)

  4. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  5. Diagnostic and Prognostic Models for Generator Step-Up Transformers

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Nancy J. Lybeck; Binh T. Pham

    2014-09-01

    In 2014, the online monitoring (OLM) of active components project under the Light Water Reactor Sustainability program at Idaho National Laboratory (INL) focused on diagnostic and prognostic capabilities for generator step-up transformers. INL worked with subject matter experts from the Electric Power Research Institute (EPRI) to augment and revise the GSU fault signatures previously implemented in the Electric Power Research Institute’s (EPRI’s) Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. Two prognostic models were identified and implemented for GSUs in the FW-PHM Suite software. INL and EPRI demonstrated the use of prognostic capabilities for GSUs. The complete set of fault signatures developed for GSUs in the Asset Fault Signature Database of the FW-PHM Suite for GSUs is presented in this report. Two prognostic models are described for paper insulation: the Chendong model for degree of polymerization, and an IEEE model that uses a loading profile to calculates life consumption based on hot spot winding temperatures. Both models are life consumption models, which are examples of type II prognostic models. Use of the models in the FW-PHM Suite was successfully demonstrated at the 2014 August Utility Working Group Meeting, Idaho Falls, Idaho, to representatives from different utilities, EPRI, and the Halden Research Project.

  6. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that...

  7. Transforming graphical system models to graphical attack models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that he

  8. Internet of Things (IoT): Definitions, Challenges and Recent Research Directions

    National Research Council Canada - National Science Library

    Zainab H Ali; Hesham A Ali; Mahmoud M Badawy

    2015-01-01

    In this paper, we seek to highlight the concept of Internet of Things (IoT) in general, as well as reviewing the main challenges of the IoT environment by focusing on the recent research directions in this topic...

  9. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a...

  10. A design approach to adapting maker community projects to the IoT constrained device philosophy

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2016-05-01

    Full Text Available weather station with an IoT system and in so doing identified the low energy design philosophy as a challenge not previously significant in Internet-connected systems. This challenge highlights some of the restrictions that the IoT design philosophy poses...

  11. System dynamics modeling of the impact of Internet-of-Things on intelligent urban transportation

    OpenAIRE

    Marshall, Phil

    2015-01-01

    Urban transportation systems are at the cusp of a major transformation that capitalizes on the proliferation of the Internet-of-Things (IoT), autonomous and cooperative vehicular and intelligent roadway technologies, advanced traffic management systems, and big data analytics. The benefits of these smart-transportation technologies were investigated using System Dynamics modeling, with particular emphasis towards vehicle sharing, intelligent highway systems, and smart-parking solutions. The m...

  12. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  13. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  14. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  15. Internet of Things (IoT : Charity Automation

    Directory of Open Access Journals (Sweden)

    Maher Omar Alshammari

    2017-02-01

    Full Text Available People are living in cities and villages based on their profession and their earnings. Those who have better earnings can live their live nicely. However, those who do not have good earnings are facing difficulties to survive their lives even for their basic necessities such as food and clothes. Government and limited charity organizations are trying to help them. In the Kingdom of Saudi Arabia few charity organizations placed few donation boxes around the city to collect donations on donor’s ease, but it has become hard for them to monitor them regularly, which affect the donation condition. Involving the Internet of Technology (IoT will give the donors' comfort and fast way to communicate with the charity, which will make the donation process efficient, easier and in well-organized as well. This paper presents a smart solution which is based on advanced technologies namely; Smart Charity (SC that will help charity organizations, donators and needy people by involving IoT. SC working mechanism based on two folds, 1Web-Based Application and 2Android-based smart Application that will enable donors to donate through their mobiles anywhere and anytime, as well they can suggest the best time for them so the charity organization’s representative can visit and collect the desired donations. SC will enable the charity organization to know the location of donors and needy people through GPS as well. In addition, SC introduces Smart Donation Box (SDB concept by involving IoT, which will have the capability to communicate with charity organizations about its current status such as quarterly, half or fully filled.

  16. Transformation of Neural State Space Models into LFT Models for Robust Control Design

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, Klaus

    2000-01-01

    This paper considers the extraction of linear state space models and uncertainty models from neural networks trained as state estimators with direct application to robust control. A new method for writing a neural state space model in a linear fractional transformation form in a non...

  17. Study of unified identification and addressing based on service platform of IOT%基于物联网服务平台的统一标识寻址研究设计

    Institute of Scientific and Technical Information of China (English)

    袁璞; 艾中良; 汪涵

    2015-01-01

    Some problems of unified identification and addressing in IOT are studied in this paper. The characteristics and demands of IOT are discussed. A design scheme and service platform of IOT are put forward according to the analysis results. The object coding unified mapping and centralized management of object terminals were realized on the basis of the service plat⁃form of IOT. A addressing model with unified identification of IOT was designed with the reference of DNS protocol. The genera⁃tion and addressing process of the unified identification is introduced by means of an example of EPC coding.%在此研究物联网标识及寻址存在的问题,讨论了物联网标识及寻址的特点及需求,根据分析的结果提出一套设计方案。从物联网标识寻址的特点出发,提出物联网服务平台,基于物联网服务平台实现了编码统一映射及物体终端的集中管理,参考DNS协议设计了物联网统一标识的寻址模型。最后通过EPC编码为例介绍了物联网统一标识的生成过及寻址过程。

  18. Wave Transformation Modeling with Effective Higher-Order Finite Elements

    Directory of Open Access Journals (Sweden)

    Tae-Hwa Jung

    2016-01-01

    Full Text Available This study introduces a finite element method using a higher-order interpolation function for effective simulations of wave transformation. Finite element methods with a higher-order interpolation function usually employ a Lagrangian interpolation function that gives accurate solutions with a lesser number of elements compared to lower order interpolation function. At the same time, it takes a lot of time to get a solution because the size of the local matrix increases resulting in the increase of band width of a global matrix as the order of the interpolation function increases. Mass lumping can reduce computation time by making the local matrix a diagonal form. However, the efficiency is not satisfactory because it requires more elements to get results. In this study, the Legendre cardinal interpolation function, a modified Lagrangian interpolation function, is used for efficient calculation. Diagonal matrix generation by applying direct numerical integration to the Legendre cardinal interpolation function like conducting mass lumping can reduce calculation time with favorable accuracy. Numerical simulations of regular, irregular and solitary waves using the Boussinesq equations through applying the interpolation approaches are carried out to compare the higher-order finite element models on wave transformation and examine the efficiency of calculation.

  19. An Effective Semantic Event Matching System in the Internet of Things (IoT) Environment.

    Science.gov (United States)

    Alhakbani, Noura; Hassan, Mohammed Mehedi; Ykhlef, Mourad

    2017-09-02

    IoT sensors use the publish/subscribe model for communication to benefit from its decoupled nature with respect to space, time, and synchronization. Because of the heterogeneity of communicating parties, semantic decoupling is added as a fourth dimension. The added semantic decoupling complicates the matching process and reduces its efficiency. Our proposed algorithm clusters subscriptions and events according to topic and performs the matching process within these clusters, which increases the throughput by reducing the matching time from the range of 16-18 ms to 2-4 ms. Moreover, the accuracy of matching is improved when subscriptions must be fully approximated, as demonstrated by an over 40% increase in F-score results. This work shows the benefit of clustering, as well as the improvement in the matching accuracy and efficiency achieved using this approach.

  20. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  1. M109 Family of Vehicles, Paladin Integrated Management (PIM): Operational Assessment of the Initial Operational Test and Evaluation (IOT and E)

    Science.gov (United States)

    2017-01-01

    Operational Test and Evaluation (IOT&E) at Fort Hood, Texas , with a six-howitzer firing battery and support personnel during the period of September 25...points. Further logistical analysis will occur as part of a second IOT&E. Resupply operations for repair parts and petroleum products reflected a

  2. From UML Activities to TAAL: Towards behaviour-preserving model transformations

    NARCIS (Netherlands)

    Engels, G.; Kleppe, A.G.; Rensink, A.; Semenyak, M.; Soltenborn, Ch.; Wehrheim, H.; Hartman, A.; Schieferdecker, I.

    2008-01-01

    Model transformations support a model-driven design by providing an automatic translation of abstract models into more concrete ones, and eventually program code. Crucial to a successful application of model transformations is their correctness, in the sense that the meaning (semantics) of the model

  3. Combining Wavelet Transform and Hidden Markov Models for ECG Segmentation

    Directory of Open Access Journals (Sweden)

    Jérôme Boudy

    2007-01-01

    Full Text Available This work aims at providing new insights on the electrocardiogram (ECG segmentation problem using wavelets. The wavelet transform has been originally combined with a hidden Markov models (HMMs framework in order to carry out beat segmentation and classification. A group of five continuous wavelet functions commonly used in ECG analysis has been implemented and compared using the same framework. All experiments were realized on the QT database, which is composed of a representative number of ambulatory recordings of several individuals and is supplied with manual labels made by a physician. Our main contribution relies on the consistent set of experiments performed. Moreover, the results obtained in terms of beat segmentation and premature ventricular beat (PVC detection are comparable to others works reported in the literature, independently of the type of the wavelet. Finally, through an original concept of combining two wavelet functions in the segmentation stage, we achieve our best performances.

  4. A lumped element transformer model including core losses and winding impedances

    OpenAIRE

    Ribbenfjärd, David

    2007-01-01

    In order to design a power transformer it is important to understand its internal electromagnetic behaviour. That can be obtained by measurements on physical transformers, analytical expressions and computer simulations. One benefit with simulations is that the transformer can be studied before it is built physically and that the consequences of changing dimensions and parameters easily can be tested. In this thesis a time-domain transformer model is presented. The model includes core losses ...

  5. An IoT Middleware Framework for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Nicoleta-Cristina Gaitan

    2016-09-01

    Full Text Available Starting from the RFID and the wireless sensor networks, the Internet of connected things has attracted the attention of major IT companies and later, of the industrial environment that recognized the concept as one of their key axes for future growth and development. The implementation of IoT in the industrial environment raises some significant issues related to the diversity of fieldbuses, the large number of devices and their configuration. The requirements related to reliability, security and real-time are very important. This paper proposes an industrial IoT and communications at the edge framework which has some outstanding features related to: the easy integration of fieldbuses and devices used in industrial environments with automatic configuration features, integration of multiple middleware technologies (CORBA, OPC and DDS, the uncoupling of the industrial activity from the publishing data on the Internet, security at different levels of the framework. Another important feature of the proposed framework is that it is based on mature standards and on open source or public implementations of these standards. The framework is modular, allowing the easy integration of new fieldbus protocols, middleware technologies and new objects in the client application. This paper is focused mainly on CORBA and DDS approaches.

  6. A model transformation method for transforming BPMN to JPDL%一种BPMN到JPDL的模型转换方法

    Institute of Scientific and Technical Information of China (English)

    张元青; 聂兰顺

    2012-01-01

    Model transformation plays a key role in MDA and MDD. In this study, the transformation between BPMN and JBPM is investigated. Firstly, the elelements in this two kinds of models are analyzed and compared. Secondly, transformation rules are estabilished in two levels, i.e. one is the transformation among elements, and the other is the transformation among the properties and semantics of the elements. Then, the format and syntax of transformation rule file is well defined. Finally, a depth-first algorithm for searching and executing rule is proposed for transforming BPMN model to JBPM model. A case from campus service domain is used to demonstrate the effectiveness of the approach.%模型转换是模型驱动体系结构和模型驱动软件开发的核心技术。以流程模型为研究对象,研究了BPMN模型与JBPM模型之间的转换方法。首先,分析了两种模型的构成;其次,从模型元素之间的转换和模型元素内属性、语义之间的转换两方面建立了 BPMN 与JBPM模型间的转换规则;再次,基于XML定义了转换规则文件的格式和语法;最后,提出了基于深度优先的转换规则搜索与执行算法,实现了BPMN模型到JBPM模型的正确转换。以校园服务领域的典型业务流程为例,验证了方法和算法的有效性。

  7. ADAPTIVE TCHEBICHEF MOMENT TRANSFORM IMAGE COMPRESSION USING PSYCHOVISUAL MODEL

    Directory of Open Access Journals (Sweden)

    Ferda Ernawan

    2013-01-01

    Full Text Available An extension of the standard JPEG image compression known as JPEG-3 allows rescaling of the quantization matrix to achieve a certain image output quality. Recently, Tchebichef Moment Transform (TMT has been introduced in the field of image compression. TMT has been shown to perform better than the standard JPEG image compression. This study presents an adaptive TMT image compression. This task is obtained by generating custom quantization tables for low, medium and high image output quality levels based on a psychovisual model. A psychovisual model is developed to approximate visual threshold on Tchebichef moment from image reconstruction error. The contribution of each moment will be investigated and analyzed in a quantitative experiment. The sensitivity of TMT basis functions can be measured by evaluating their contributions to image reconstruction for each moment order. The psychovisual threshold model allows a developer to design several custom TMT quantization tables for a user to choose from according to his or her target output preference. Consequently, these quantization tables produce lower average bit length of Huffman code while still retaining higher image quality than the extended JPEG scaling scheme.

  8. Application of IoT in monitoring and controlling agricultural production

    Directory of Open Access Journals (Sweden)

    Marković Dušan

    2015-01-01

    Full Text Available Internet of Things (IoT is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring and control systems used in farm production processes. IoT devices play a key role, with a focus on their realization by available microcontroller platforms and appropriate sensors such as Arduino products. Autonomous sensor devices gather data within monitoring systems and participate in the control process by sending signals to the actuators. Such an IoT based system provides users with the opportunity to remotely monitor conditions and production process. This system enables users to accomplish savings in inputs, achieve cost reduction and trace the production process on the farm.

  9. HARVESTED ENERGY-ADAPTIVE MAC PROTOCOL FOR ENERGY HARVESTING IOT NETWORKS

    Directory of Open Access Journals (Sweden)

    Hyeong-Kyu Lee

    2015-12-01

    Full Text Available In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA Medium Access Control (MAC protocol utilizes the fixed frame size, the resource efficiency can be reduced. In this paper, we propose a Harvested Energy-adaptive Medium Access Control (HEMAC protocol where an IoT Access Point (AP allocates slots in accordance with the number of IoT devices that try to transmit data in a frame. The proposed HE-MAC protocol improves the resource efficiency of the F-ALOHA MAC protocol. We show that the resource efficiency of the HE-MAC protocol is superior to those of the F-ALOHA MAC protocol through simulations.

  10. Effect of Multipoint Heterogeneity on Nonlinear Transformations for Geological Modeling: Porosity-Permeability Relations Revisited

    Institute of Scientific and Technical Information of China (English)

    J A Vargas-Guzmán

    2008-01-01

    An analysis of statistical expected values for transformations is performed in this study to quantify the effect of heterogeneity on spatial geological modeling and evaluations. Algebraic transformations are frequently applied to data from logging to allow for the modeling of geological properties. Transformations may be powers, products, and exponential operations which are commonly used in well-known relations (e.g., porosity-permeability transforms). The results of this study show that correct computations must account for residual transformation terms which arise due to lack of independence among heterogeneous geological properties. In the case of an exponential porosity-permeability transform, the values may be positive. This proves that a simple exponential model back-transformed from linear regression underestimates permeability. In the case of transformations involving two or more properties, residual terms may represent the contribution of heterogeneous components which occur when properties vary together, regardless of a pair-wise linear independence. A consequence of power- and product-transform models is that regression equationswithin those transformations need corrections via residual cumulants. A generalization of this result isthat transformations of multivariate spatial attributes require multiple-point random variable relations. This analysis provides practical solutions leading to a methodology for nonlinear modeling using correct back transformations in geology.

  11. Modeling of Heavy Metal Transformation in Soil Ecosystem

    Science.gov (United States)

    Kalinichenko, Kira; Nikovskaya, Galina N.

    2017-04-01

    The intensification of industrial activity leads to an increase in heavy metals pollution of soils. In our opinion, sludge from biological treatment of municipal waste water, stabilized under aerobic-anaerobic conditions (commonly known as biosolid), may be considered as concentrate of natural soil. In their chemical, physical and chemical and biological properties these systems are similar gel-like nanocomposites. These contain microorganisms, humic substances, clay, clusters of nanoparticles of heavy metal compounds, and so on involved into heteropolysaccharides matrix. It is known that microorganisms play an important role in the transformation of different nature substances in soil and its health maintenance. The regularities of transformation of heavy metal compounds in soil ecosystem were studied at the model of biosolid. At biosolid swelling its structure changing (gel-sol transition, weakening of coagulation contacts between metal containing nanoparticles, microbial cells and metabolites, loosening and even destroying of the nanocomposite structure) can occur [1, 2]. The promotion of the sludge heterotrophic microbial activities leads to solubilization of heavy metal compounds in the system. The microbiological process can be realized in alcaligeneous or acidogeneous regimes in dependence on the type of carbon source and followed by the synthesis of metabolites with the properties of flocculants and heavy metals extragents [3]. In this case the heavy metals solubilization (bioleaching) in the form of nanoparticles of hydroxycarbonate complexes or water soluble complexes with oxycarbonic acids is observed. Under the action of biosolid microorganisms the heavy metals-oxycarbonic acids complexes can be transformed (catabolised) into nano-sizing heavy metals- hydroxycarbonates complexes. These ecologically friendly complexes and microbial heteropolysaccharides are able to interact with soil colloids, stay in the top soil profile, and improve soil structure due

  12. Computationally efficient method for Fourier transform of highly chirped pulses for laser and parametric amplifier modeling.

    Science.gov (United States)

    Andrianov, Alexey; Szabo, Aron; Sergeev, Alexander; Kim, Arkady; Chvykov, Vladimir; Kalashnikov, Mikhail

    2016-11-14

    We developed an improved approach to calculate the Fourier transform of signals with arbitrary large quadratic phase which can be efficiently implemented in numerical simulations utilizing Fast Fourier transform. The proposed algorithm significantly reduces the computational cost of Fourier transform of a highly chirped and stretched pulse by splitting it into two separate transforms of almost transform limited pulses, thereby reducing the required grid size roughly by a factor of the pulse stretching. The application of our improved Fourier transform algorithm in the split-step method for numerical modeling of CPA and OPCPA shows excellent agreement with standard algorithms.

  13. Dedicated networks for IoT : PHY / MAC state of the art and challenges

    OpenAIRE

    Goursaud, Claire; Gorce, Jean-Marie

    2015-01-01

    International audience; This paper focuses on the the emerging transmission technologies dedicated to IoT networks. We first analyze the classical cellular network technologies when taking into account the IoT requirements, and point out the need of dedicated technologies for IoT. Then, we present the PHY and MAC layers of the technologies that are already deployed, or likely to be deployed: UNB by SigFox, CSS by LoRa T M , Weighless, and RPMA by Ingenu. We then compare their performances to ...

  14. Modeling of the Austenite-Martensite Transformation in Stainless and TRIP Steels

    NARCIS (Netherlands)

    Geijselaers, H.J.M.; Hilkhuijsen, P.; Bor, T.C.; Perdahcioglu, E.S.; Boogaard, van den A.H.; Zhang, S.-H.; Liu, X.-H.; Gheng, M.; Li, J.

    2013-01-01

    The transformation of austenite to martensite is a dominant factor in the description of the constitutive behavior during forming of TRIP assisted steels. To predict this transformation different models are currently available. In this paper the transformation is regarded as a stress induced process

  15. Martensitic transformations in nanostructured nitinol: Finite element modeling of grain size and distribution effects

    DEFF Research Database (Denmark)

    Liu, Hong-Sheng; Mishnaevsky, Leon

    2013-01-01

    A computational model of martensitic phase transformation in nanostructured nitinol is developed which takes into account the grain size effect. On the basis of the theoretical analysis of the thermodynamic transformation criterion and the energy barrier for phase transformation, it was demonstra...... between the coarse and fine grained regions, and expand inside the region with small grains along the shear band direction....

  16. Transformation of Neural State Space Models into LFT Models for Robust Control Design

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, Klaus

    2000-01-01

    This paper considers the extraction of linear state space models and uncertainty models from neural networks trained as state estimators with direct application to robust control. A new method for writing a neural state space model in a linear fractional transformation form in a non-conservative ......This paper considers the extraction of linear state space models and uncertainty models from neural networks trained as state estimators with direct application to robust control. A new method for writing a neural state space model in a linear fractional transformation form in a non......-conservative way is proposed, and it is demonstrated how a standard robust control law can be designed for a system described by means of a multi layer perceptron....

  17. Design theory, modelling and the application for the Internet of Things service

    Science.gov (United States)

    Shang, Xiaopu; Zhang, Runtong; Zhu, Xiaomin; Zhou, Quan

    2016-03-01

    The Internet of Things (IoT) makes it possible for us to sense the physical world and locate objects in it using the enabling technologies associated with IoT. Compared with traditional information systems, IoT enabling technologies can help acquire real-time data necessary for managing enterprise business process. An IoT system should have an ability beyond integrating enabling technologies and traditional information systems that are only used to access environmental data. This paper begins with a literature review of IoT-related issues and a discussion of the difference between traditional information service and IoT service. Three principles for IoT service design from the perceptive of service classification, coordination and compatibility are proposed. The paper also proposes a utility model for resource allocation in order to improve IoT service performance, and an application involving a cold chain visibility platform is given to illustrate our research.

  18. DYNAMICS MODEL OF MOISTURE IN PAPER INSULATION-TRANSFORMER OIL SYSTEM IN NON-STATIONARY THERMAL MODES OF THE POWER TRANSFORMER

    Directory of Open Access Journals (Sweden)

    V.V. Vasilevskij

    2016-06-01

    Full Text Available Introduction. An important problem in power transformers resource prognosis is the formation of moisture dynamics trends of transformer insulation. Purpose. Increasing the accuracy of power transformer insulation resource assessment based on accounting of moisture dynamics in interrelation with temperature dynamics. Working out of moisture dynamics model in paper insulation-transformer oil system in conjunction with thermodynamic model, load model and technical maintenance model. Methodology. The mathematical models used for describe the moisture dynamics are grounded on nonlinear differential equations. Interrelation moisture dynamics model with thermodynamic, load and technical maintenance models described by UML model. For confirming the adequacy of model used computer simulation. Results. We have implemented the model of moisture dynamics in power transformers insulation in interrelation with other models, which describe the state of power transformer in operation. The proposed model allows us to form detailed trends of moisture dynamics in power transformers insulation basing on monitoring data or power transformers operational factors simulation results. We have performed computer simulation of moisture exchange processes and calculation of transformer insulation resource for different moisture trends. Originality. The offered model takes into account moisture dynamics in power transformers insulation under the influence of changes of the power transformers thermal mode and operational factors. Practical value. The offered model can be used in power transformers monitoring systems for automation of resource assessment of oil-immersed power transformers paper insulation at different phase of lifecycle. Model also can be used for assessment of projected economic efficiency of power transformers exploitation in projected operating conditions.

  19. Institutional Transformation Version 2.5 Modeling and Planning.

    Energy Technology Data Exchange (ETDEWEB)

    Villa, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mizner, Jack H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Passell, Howard D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gallegos, Gerald R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Vetter, Douglas W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Christopher A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Malczynski, Leonard A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Addison, Marlin [Arizona State Univ., Mesa, AZ (United States); Schaffer, Matthew A. [Bridgers and Paxton Engineering Firm, Albuquerque, NM (United States); Higgins, Matthew W. [Vibrantcy, Albuquerque, NM (United States)

    2017-02-01

    Reducing the resource consumption and emissions of large institutions is an important step toward a sustainable future. Sandia National Laboratories' (SNL) Institutional Transformation (IX) project vision is to provide tools that enable planners to make well-informed decisions concerning sustainability, resource conservation, and emissions reduction across multiple sectors. The building sector has been the primary focus so far because it is the largest consumer of resources for SNL. The IX building module allows users to define the evolution of many buildings over time. The module has been created so that it can be generally applied to any set of DOE-2 ( http://doe2.com ) building models that have been altered to include parameters and expressions required by energy conservation measures (ECM). Once building models have been appropriately prepared, they are checked into a Microsoft Access (r) database. Each building can be represented by many models. This enables the capability to keep a continuous record of models in the past, which are replaced with different models as changes occur to the building. In addition to this, the building module has the capability to apply climate scenarios through applying different weather files to each simulation year. Once the database has been configured, a user interface in Microsoft Excel (r) is used to create scenarios with one or more ECMs. The capability to include central utility buildings (CUBs) that service more than one building with chilled water has been developed. A utility has been created that joins multiple building models into a single model. After using the utility, several manual steps are required to complete the process. Once this CUB model has been created, the individual contributions of each building are still tracked through meters. Currently, 120 building models from SNL's New Mexico and California campuses have been created. This includes all buildings at SNL greater than 10,000 sq. ft

  20. Comparing Transformation Possibilities of Topological Functioning Model and BPMN in the Context of Model Driven Architecture

    Directory of Open Access Journals (Sweden)

    Solomencevs Artūrs

    2016-05-01

    Full Text Available The approach called “Topological Functioning Model for Software Engineering” (TFM4SE applies the Topological Functioning Model (TFM for modelling the business system in the context of Model Driven Architecture. TFM is a mathematically formal computation independent model (CIM. TFM4SE is compared to an approach that uses BPMN as a CIM. The comparison focuses on CIM modelling and on transformation to UML Sequence diagram on the platform independent (PIM level. The results show the advantages and drawbacks the formalism of TFM brings into the development.

  1. High-Performance Work Systems: American Models of Workplace Transformation.

    Science.gov (United States)

    Appelbaum, Eileen; Batt, Rosemary

    Rising competition in world and domestic markets for the past 2 decades has necessitated that U.S. companies undergo significant transformations to improve their performance with respect to a wide array of efficiency and quality indicators. Research on the transformations recently undertaken by some U.S. companies to boost performance revealed two…

  2. On Telecom Operators Build "Cloud & Pipeline & Terminal" to Assist IoT Development%电信运营商构建“云管端”助力发展物联网浅谈

    Institute of Scientific and Technical Information of China (English)

    梁渭雄

    2016-01-01

    为了研究电信运营商如何通过构建“云管端”来更好地发展物联网产业,分析了其发展物联网所面临的机会和威胁、优势和劣势,指出目前物联网正处于产业大发展的前夜,电信运营商应该把握这个重大机遇,结合自身优势,在“云管端”全面布局,打造物联网开放平台,研发物联网拳头产品,推广物联网应用和数据服务,形成行之有效的商业模式,以构建物联网发展的优势。%For telecom operators to figure out how to better develop the IoT industry by building "Cloud & Pipeline & Terminal", this paper made the SWOT analysis, pointed out that the IoT industry is in the eve of great development. Telecom operators should seize this great opportunity, bring into play their advantages, deploy altogether in the "Cloud & Pipeline & Terminal", create an open platform for IoT, research and develop outstanding products of IoT, promote applications and data services of IoT, construct effective business model, and form the new developing advantages of IoT.

  3. Modelling and study on the output flow characteristics of expansion energy used hydropneumatic transformer

    Energy Technology Data Exchange (ETDEWEB)

    Shi, Yan; Wu, Tiecheng; Cai, Maolin; Liu, Chong [Beihang University, Beijing (China)

    2016-03-15

    Hydropneumatic transformer (short for HP transformer) is used to pump pressurized hydraulic oil. Whereas, due to its insufficient usage of energy and low efficiency, a new kind of HP transformer: EEUHP transformer (Expansion energy used hydropneumatic transformer) was proposed. To illustrate the characteristics of the EEUHP transformer, a mathematical model was built. To verify the mathematical model, an experimental prototype was setup and studied. Through simulation and experimental study on the EEUHP transformer, the influence of five key parameters on the output flow of the EEUHP transformer were obtained, and some conclusions can be drawn. Firstly, the mathematical model was proved to be valid. Furthermore, the EEUHP transformer costs fewer of compressed air than the normal HP transformer when the output flow of the two kinds of transformers are almost same. Moreover, with an increase in the output pressure, the output flow decreases sharply. Finally, with an increase in the effective area of hydraulic output port, the output flow increases distinctly. This research can be referred to in the performance and design optimization of the EEUHP transformers.

  4. Modelling of mineral matter transformation and deposition in furnaces

    Energy Technology Data Exchange (ETDEWEB)

    Magda, Adrian

    2012-07-01

    In this work, a CFD (Computational Fluid Dynamics) tool was developed to simulate the ash deposition on the heat transfer surfaces of furnaces. The effects of such slagging and fouling deposits on boiler operation and pollutants formation was investigated. Major particles physical transformations are reviewed in Chapter 2, while Chapter 3, encompasses an intensive literature review on the main mineral components in coals. Differentiating between mineral species is of great importance as minerals with low softening /melting temperature or eutectic points formed between different mineral inclusions facilitate deposition. For each individual mineral specie the known chemical and physical processes and effects with regard to deposition are presented in detail. The complexity and variability of the coal mineralogy points towards the use of chemical mechanisms that account for as many as possible chemical compounds and interactions. Reliable and accurate thermochemical data are therefore needed. For this purpose a mineral matter, coal and biomass and chemical activity databases were generated. Each mineral description is compiled into several subset databases. One subset refers to the polynomial format to calculate the mineral thermodynamic properties, e.g. enthalpy, entropy and specific heat capacity. The mineral database contains detailed descriptions for 200 individual mineral species, while the coal and biomass database contains 110 biomass and coal chemical analyses. The chemical reactions and their kinetic details sum up 70 entries, Chapter 4. Florean is a three-dimensional simulation program developed at the Institute for Fuel and Heat Technology. Besides conservation equations for mass, momentum and energy, FLOREAN has the capability to calculate chemical reactions and pollutants formation. The main conservation equations and program modelling capabilities are presented in Chapter 5. The EnSight Gold format and the ParaView post-processor are implemented for data

  5. Transformation of Malaysian Construction Industry with Building Information Modelling (BIM

    Directory of Open Access Journals (Sweden)

    Latiffi Aryani Ahmad

    2016-01-01

    Full Text Available Building Information Modelling (BIM is a revolution of technology and a process that transformed the way building is planned, designed, analysed, constructed and managed. The revolution of technology and process could increase the quality of construction projects. The knowledge of BIM has been expanding in many countries including Malaysia. Since its inception, the use of BIM has broadened up widely with different purposes. The aims of this paper is to investigate the BIM implementation and uses in Malaysian construction projects. The methodologies adopted for structuring this paper are by using literature review and semi-structured interview with construction players that have experienced and being involved in projects using BIM. The purpose of literature review is to illustrate on the pervious research on the subject matter. Meanwhile, the purpose of interviews is to explore the involvement of construction players, years of experience in projects using BIM and BIM uses in construction projects. The findings revealed that BIM has been implemented in Malaysia since 2007 by various construction players, which are client, architect, C&S engineer, M&E engineer, QS, contractor, facilities manager and BIM consultant. The findings also revealed that BIM is used for project’ visualisation, improving project design, detecting design clashes, quantity take off and operation and maintenance. Further work will be focused on the current practices of construction players in projects using BIM.

  6. An IoT Based Predictive Connected Car Maintenance Approach

    Directory of Open Access Journals (Sweden)

    Rohit Dhall

    2017-03-01

    Full Text Available Internet of Things (IoT is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.

  7. Transformation strategies in nations based on the socialist model: North Korean companies and their transformation strategies

    OpenAIRE

    Futagami, Shiho

    2000-01-01

    This paper discusses the possibility of the transformation of North Korean socialistic companies. In this paper, three possible future scenarios concerning North Korean companies are presented. The first one is based on the traditional trend which you have seen already. In this scenario, North Korea will keep the principle of national self-reliance and realize the autarky. It will not have a big impact on Northeast Asian economies. The possibility for such a scenario is low, because of the da...

  8. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  9. Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    , and receipt of their authentication request at the same time. Therefore, secure, and efficient group authentication, and authorization scheme is required that authenticates a group of devices at once in the context of resource constrained IoT. This paper presents novel Threshold Cryptography-based Group...... Authentication (TCGA) scheme for the IoT which verifies authenticity of all the devices taking part in the group communication. This paper also presents TCGA framework which is flexible and secure. The proposed TCGA scheme is implemented for WI-FI environment, and the result shows that TCGA scheme is lightweight......Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices...

  10. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    National Research Council Canada - National Science Library

    Hu, Jin-Xin; Chen, Chin-Ling; Fan, Chun-Long; Wang, Kun-hao

    2017-01-01

    ... of the Internet of Things (IoT), medical sensors, and Internet applications, online medical service has become possible in recent years. It is noteworthy that the number of elders with chronic ...

  11. Wide band modeling of large power transformer windings for very fast transient overvoltage (VFTO) analysis

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    There are some difficulties in using multi-transmission-line (MTL) model for wide band modeling of whole windings of the large power transformer. In this paper, the normalized MTL model is firstly de- rived, with which not only the difficulty of modeling windings with different turn-lengths using MTL can be solved, but also the model can be extended to the modeling of the multi-winding transformer. Secondly, both MTL model and the lumped circuit model on turn basis are mathematically compared in validation of the frequency range and it is pointed out that the lumped circuit model on turn basis is generally valid below 2.5 MHz for EHV and UHV power transformers. Finally, based on the MTL equations, a novel lumped circuit model is derived and it is shown that the valid frequency range of the new circuit is extended to about 4 MHz for modeling large EHV and UHV power transformer windings.

  12. Towards automated software model checking using graph transformation systems and Bogor

    Institute of Scientific and Technical Information of China (English)

    Vahid RAFE; Adel T.RAHMANI

    2009-01-01

    Graph transformation systems have become a general formal modeling language to describe many models in software development process. Behavioral modeling of dynamic systems and model-to-model transformations are only a few examples in which graphs have been used to software development. But even the perfect graph transformation system must be equipped with automated analysis capabilities to let users understand whether such a formal specification fulfills their requirements. In this paper,we present a new solution to verify graph transformation systems using the Bogor model checker. The attributed graph grammars (AGG)-Iike graph transformation systems are translated to Bandera intermediate representation (BIR), the input language of Bogor,and Bogor verifies the model against some interesting properties defined by combining linear temporal logic (LTL) and special-purpose graph rules. Experimental results are encouraging, showing that in most cases oar solution improves existing approaches in terms of both performance and expressiveness.

  13. NUMERICAL MODELING OF HEAVY METAL POLLUTANT TRANSPORT-TRANSFORMATION IN FLUVIAL RIVERS:A REVIEW

    Institute of Scientific and Technical Information of China (English)

    S. L. HUANG; Z. H. WAN; P. SMITH

    2007-01-01

    A detailed discussion of existing three kinds of mathematical models of heavy metal pollutant transport-transformation in fluvial rivers is presented, with an emphasis on the mathematical model of heavy metal pollutant transport-transformation dynamics. The imperfection of two kinds of mathematical models, that is, mathematical model of chemical thermodynamic equilibrium and that of chemical reaction kinetics, and the shortcoming of existing mathematical models of heavy metal pollutant transport-transformation dynamics are pointed out. Furthermore, the structure of mathematical model of heavy metal pollutant transport-transformation dynamics in fluvial rivers is suggested. Equations in the mathematical model of heavy metal pollutant transport-transformation dynamics in fluvial rivers will be discussed in the following paper.

  14. RIoTBench: A Real-time IoT Benchmark for Distributed Stream Processing Platforms

    OpenAIRE

    Shukla, Anshu; Chaturvedi, Shilpa; Simmhan, Yogesh

    2017-01-01

    The Internet of Things (IoT) is an emerging technology paradigm where millions of sensors and actuators help monitor and manage, physical, environmental and human systems in real-time. The inherent closedloop responsiveness and decision making of IoT applications make them ideal candidates for using low latency and scalable stream processing platforms. Distributed Stream Processing Systems (DSPS) hosted on Cloud data-centers are becoming the vital engine for real-time data processing and anal...

  15. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    OpenAIRE

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years...

  16. Analysis on different Data mining Techniques and algorithms used in IOT

    Directory of Open Access Journals (Sweden)

    Shweta Bhatia

    2015-11-01

    Full Text Available In this paper, we discusses about five functionalities of data mining in IOT that affects the performance and that are: Data anomaly detection, Data clustering, Data classification, feature selection, time series prediction. Some important algorithm has also been reviewed here of each functionalities that show advantages and limitations as well as some new algorithm that are in research direction. Here we had represent knowledge view of data mining in IOT.

  17. BeC3 : Behaviour Crowd Centric Composition for IoT applications

    OpenAIRE

    Cherrier, Sylvain; Ghamri-Doudane, Yacine; Lohier, Stephane; Salhi, Ismail; Valembois, Philippe

    2013-01-01

    International audience; Service Oriented Computing (SOC) is a common way to build applications/services by composing distributed bricks of logic. Recently, the SOC paradigm has been considered for the design and implementation of Internet of Things (IoT) applications by abstracting objects as service providers or consumers. Based on this trend, we proposed in a previous work D-LITe: a lightweight RESTful virtual machine that allows ubiquitous logic description and deployment for IoT applicati...

  18. Immunohistochemical study of IOT-10 natural killer cells in brain metastases.

    Science.gov (United States)

    Vaquero, J; Coca, S; Escandón, J; Magallón, R; Martínez, R

    1990-01-01

    The presence of NK-cells in a series of 40 metastatic brain tumours has been studied by means of the monoclonal antibody IOT-10. There appeared IOT-10 NK-cells in all tumours studied, but in most cases these cells represented less than 10% of the tumour infiltrating lymphocytes (TIL). In the present series, the obtained data suggest that the number of NK-cells in brain metastases can be influenced by other factors than the mere quantity of TIL.

  19. Nonlinear model of a distribution transformer appropriate for evaluating the effects of unbalanced loads

    Science.gov (United States)

    Toman, Matej; Štumberger, Gorazd; Štumberger, Bojan; Dolinar, Drago

    Power packages for calculation of power system transients are often used when studying and designing electromagnetic power systems. An accurate model of a distribution transformer is needed in order to obtain realistic values from these calculations. This transformer model must be derived in such a way that it is applicable when calculating those operating conditions appearing in practice. Operation conditions where transformers are loaded with nonlinear and unbalanced loads are especially challenging. The purpose of this work is to derive a three-phase transformer model that is appropriate for evaluating the effects of nonlinear and unbalanced loads. A lumped parameter model instead of a finite element (FE) model is considered in order to ensure that the model can be used in power packages for the calculation of power system transients. The transformer model is obtained by coupling electric and magnetic equivalent circuits. The magnetic equivalent circuit contains only three nonlinear reluctances, which represent nonlinear behaviour of the transformer. They are calculated by the inverse Jiles-Atherton (J-A) hysteresis model, while parameters of hysteresis are identified using differential evolution (DE). This considerably improves the accuracy of the derived transformer model. Although the obtained transformer model is simple, the simulation results show good agreement between measured and calculated results.

  20. Transform-both-sides nonlinear models for in vitro pharmacokinetic experiments.

    Science.gov (United States)

    Latif, A H M Mahbub; Gilmour, Steven G

    2015-06-01

    Transform-both-sides nonlinear models have proved useful in many experimental applications including those in pharmaceutical sciences and biochemistry. The maximum likelihood method is commonly used to fit transform-both-sides nonlinear models, where the regression and transformation parameters are estimated simultaneously. In this paper, an analysis of variance-based method is described in detail for estimating transform-both-sides nonlinear models from randomized experiments. It estimates the transformation parameter from the full treatment model and then the regression parameters are estimated conditionally on this estimate of the transformation parameter. The analysis of variance method is computationally simpler compared with the maximum likelihood method of estimation and allows a more natural separation of different sources of lack of fit. Simulation studies show that the analysis of variance method can provide unbiased estimators of complex transform-both-sides nonlinear models, such as transform-both-sides random coefficient nonlinear regression models and transform-both-sides fixed coefficient nonlinear regression models with random block effects.

  1. Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages

    DEFF Research Database (Denmark)

    Mendling, Jan; Lassen, Kristian Bisgaard; Zdun, Uwe

    2006-01-01

    Much recent research work discusses the transformation between different process modelling languages. This work, however, is mainly focussed on specific process modelling languages, and thus the general reusability of the applied transformation concepts is rather limited. In this paper, we aim...... to abstract from concrete transformation strategies by distinguishing two major paradigms for representing control flow in process modelling languages: block-oriented languages (such as BPEL and BPML) and graph-oriented languages (such as EPCs and YAWL). The contribution of this paper are generic strategies...... for transforming from block-oriented process languages to graph-oriented languages, and vice versa....

  2. Internet of Things building blocks and business models

    CERN Document Server

    Hussain, Fatima

    2017-01-01

    This book describes the building blocks and introductory business models for Internet of Things (IoT). The author provide an overview of the entire IoT architecture and constituent layers, followed by detail description of each block . Various inter-connecting technologies and sensors are discussed in context of IoT networks. In addition to this, concepts of Big Data and Fog Computing are presented and characterized as per data generated by versatile IoT applications . Smart parking system and context aware services are presented as an hybrid model of cloud and Fog Afterwards, various IoT applications and respective business models are discussed. Finally, author summarizes the IoT building blocks and identify research issues in each, and suggest potential research projects worthy of pursuing. .

  3. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  4. A Thermo-Plastic-Martensite Transformation Coupled Constitutive Model for Hot Stamping

    Science.gov (United States)

    Bin, Zhu; WeiKang, Liang; Zhongxiang, Gui; Kai, Wang; Chao, Wang; Yilin, Wang; Yisheng, Zhang

    2017-03-01

    In this study, a thermo-plastic-martensite transformation coupled model based on the von Mises yield criterion and the associated plastic flow rule is developed to further improve the accuracy of numerical simulation during hot stamping. The constitutive model is implemented into the finite element program ABAQUS using user subroutine VUMAT. The martensite transformation, transformation-induced plasticity and volume expansion during the austenite-to-martensite transformation are included in the constitutive model. For this purpose, isothermal tensile tests are performed to obtain the flow stress, and non-isothermal tensile tests were carried out to validate the constitutive model. The non-isothermal tensile numerical simulation demonstrates that the thermo-plastic-martensite transformation coupled constitutive model provides a reasonable prediction of force-displacement curves upon loading, which is expected to be applied for modeling and simulation of hot stamping.

  5. A COMPREHENSIVE MODEL FOR THE POWER TRANSFORMER DIGITAL DIFFERENTIAL PROTECTION FUNCTIONING RESEARCH

    Directory of Open Access Journals (Sweden)

    Yu. V. Rumiantsev

    2016-01-01

    Full Text Available This article presents a comprehensive model for the two-winding power transformer digital differential protection functioning research. Considered comprehensive model is developed in MatLab-Simulink dynamic simulation environment with the help of SimPowerSystems component library and includes the following elements: power supply, three-phase power transformer, wye-connected current transformers and two-winding power transformer digital differential protection model. Each element of the presented model is described in the degree sufficient for its implementation in the dynamic simulation environment. Particular attention is paid to the digital signal processing principles and to the ways of differential and restraining currents forming of the considered comprehensive model main element – power transformer digital differential protection. With the help of this model the power transformer digital differential protection functioning was researched during internal and external faults: internal short-circuit, external short-circuit with and without current transformers saturation on the power transformer low-voltage side. Each experiment is illustrated with differential and restraining currents waveforms of the digital differential protection under research. Particular attention was paid to the digital protection functioning analysis during power transformer abnormal modes: overexcitation and inrush current condition. Typical current waveforms during these modes were showed and their harmonic content was investigated. The causes of these modes were analyzed in details. Digital differential protection blocking algorithms based on the harmonic content were considered. Drawbacks of theses algorithms were observed and the need of their further technical improvement was marked.

  6. Implementation of three-phase transformer model in radial load-flow analysis

    Directory of Open Access Journals (Sweden)

    Mamdouh Abdel-Akher

    2013-03-01

    Full Text Available This paper presents an efficient approach for developing three-phase transformer admittance matrices in the radial power-flow analysis. The proposed transformer model overcomes the singularity problem of the nodal admittance submatrices of ungrounded transformer configurations. This has been achieved by applying symmetrical components modeling. The classical (6 × 6 transformer nodal admittance matrix written in phase components is converted to sequence components instead of the (3 × 3 admittance submatrices. In this model, the phase shifts accompanied with special transformer connections are included in the radial power-flow solution process without any convergence problems. The final model of the transformer is represented by a generalized power-flow equation written in phase components. The developed equation is applicable for all transformer connections. The transformer model is integrated into the radial power-flow and tested using the IEEE radial feeders. The results have shown that the developed transformer model is very efficient and the radial power-flow has robust convergence characteristics.

  7. Tumor-infiltrating lymphocytes expressing IOT-10 marker. An immunohistochemical study of a series of 185 brain tumors.

    Science.gov (United States)

    Zurita, M; Vaquero, J; Coca, S; Oya, S; Garcia, N

    1993-04-01

    The presence of IOT-10-positive lymphocytes among the tumor-infiltrating-lymphocyte (TIL) population was studied in a series of 185 brain tumors. In most of the tumors, IOT-10-positive lymphocytes were identified, but generally they were scarce and masked among the tumor cells, suggesting that NK-cells exercise a poor participation in the tissular response against brain tumors. Isolated tumor cells showing IOT-10-positivity were found in low-grade astrocytomas, neurinomas and medulloblastomas. IOT-10-positivity on both tumor neuropil and tumor cells was considered a characteristic finding in oligodendrogliomas. The number of IOT-10-positive NK-cells in brain metastases and in cerebellar hemangioblastomas was comparatively greater than in other types of brain tumor. Since in brain metastases, the presence of IOT-10-positive NK-cells can be related to the tissular response to an extracerebral malignancy, their considerable presence in cerebellar hemangioblastomas is an enigmatic finding that deserves further attention.

  8. Comparison of BrainTool to other UML modeling and model transformation tools

    Science.gov (United States)

    Nikiforova, Oksana; Gusarovs, Konstantins

    2017-07-01

    In the last 30 years there were numerous model generated software systems offered targeting problems with the development productivity and the resulting software quality. CASE tools developed due today's date are being advertised as having "complete code-generation capabilities". Nowadays the Object Management Group (OMG) is calling similar arguments in regards to the Unified Modeling Language (UML) models at different levels of abstraction. It is being said that software development automation using CASE tools enables significant level of automation. Actual today's CASE tools are usually offering a combination of several features starting with a model editor and a model repository for a traditional ones and ending with code generator (that could be using a scripting or domain-specific (DSL) language), transformation tool to produce the new artifacts from the manually created and transformation definition editor to define new transformations for the most advanced ones. Present paper contains the results of CASE tool (mainly UML editors) comparison against the level of the automation they are offering.

  9. On the injectivity of the generalized Radon transform arising in a model of mathematical economics

    Science.gov (United States)

    Agaltsov, A. D.

    2016-11-01

    In the present article we consider the uniqueness problem for the generalized Radon transform arising in a mathematical model of production. We prove uniqueness theorems for this transform and for the profit function in the corresponding model of production. Our approach is based on the multidimensional Wiener’s approximation theorems.

  10. A transformer model based on the Jiles-Atherton theory of ferromagnetic hysteresis

    Directory of Open Access Journals (Sweden)

    Cundeva Snezana

    2008-01-01

    Full Text Available This paper presents a transformer model that is useful for lowfrequency applications. To describe the iron-core magnetic behavior, the Jiles Atherton hysteresis model is used, which is able to generate minor asymmetric loops and remanent flux. The obtained results are compared with those measured in the laboratory on a commercial resistance welding transformer.

  11. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  12. Transformative learning during nursing education: a model of interconnectivity.

    Science.gov (United States)

    Kear, Tamara M

    2013-09-01

    Higher education strives to transform students by opening their minds to different world views. This study investigated the transformative experiences of students using narrative analysis methodology to describe the experience of learning during nursing education. Phases of Transformative Learning Theory guided the analysis of narratives. The study yielded 5 narrative threads: 1) the multi-faceted process of learning, 2) experiential learning, 3) human interactions as central to defining nursing and caring, 4) personal life experiences intertwining with nursing, and 5) transformative learning. Results indicated that students perceived the greatest learning and transformation through experiential learning with humans. Such experiences included caring for immigrants, children in lower socioeconomic environments, and patients with a variety of physical and mental health needs in numerous settings. Other participants described personal experiences that took on new meaning or contributed to learning as a result of academic experiences. Some students entered with a personal history of service and charity work that provided a foundation for their educational experiences. Copyright © 2012 Elsevier Ltd. All rights reserved.

  13. Towards an automatic model transformation mechanism from UML state machines to DEVS models

    Directory of Open Access Journals (Sweden)

    Ariel González

    2015-08-01

    Full Text Available The development of complex event-driven systems requires studies and analysis prior to deployment with the goal of detecting unwanted behavior. UML is a language widely used by the software engineering community for modeling these systems through state machines, among other mechanisms. Currently, these models do not have appropriate execution and simulation tools to analyze the real behavior of systems. Existing tools do not provide appropriate libraries (sampling from a probability distribution, plotting, etc. both to build and to analyze models. Modeling and simulation for design and prototyping of systems are widely used techniques to predict, investigate and compare the performance of systems. In particular, the Discrete Event System Specification (DEVS formalism separates the modeling and simulation; there are several tools available on the market that run and collect information from DEVS models. This paper proposes a model transformation mechanism from UML state machines to DEVS models in the Model-Driven Development (MDD context, through the declarative QVT Relations language, in order to perform simulations using tools, such as PowerDEVS. A mechanism to validate the transformation is proposed. Moreover, examples of application to analyze the behavior of an automatic banking machine and a control system of an elevator are presented.

  14. High-Level Models for Transformation-Oriented Design of Hardware and Embedded Systems

    Directory of Open Access Journals (Sweden)

    DAMASEVICIUS, R.

    2008-06-01

    Full Text Available Evolution of design methodologies follows a common trail: technology scaling leads to growing design complexity and rising abstraction level in the domain. Introduction of new (higher abstraction levels emphasizes the importance of reuse and transformations. The design process can be seen as a sequence of high-level transformations from the higher-level specification to the lower-level one. We analyze high-level modeling and metaprogramming techniques for supporting transformations based on domain variability models. Next, we present a reuse evolution model for domain component design at a higher abstraction level to support the transformation-oriented approaches. Finally, high-level modeling techniques (UML-domain language metamodels for domain code generation, parameterized UML classes for template metaprogramming, feature models for explicit representation of variability for specification of transformations and metaprograms are analyzed.

  15. Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT for Aquaculture

    Directory of Open Access Journals (Sweden)

    Yingyi Chen

    2017-01-01

    Full Text Available In the Internet of Things (IoT equipment used for aquaculture is often deployed in outdoor ponds located in remote areas. Faults occur frequently in these tough environments and the staff generally lack professional knowledge and pay a low degree of attention in these areas. Once faults happen, expert personnel must carry out maintenance outdoors. Therefore, this study presents an intelligent method for fault diagnosis based on fault tree analysis and a fuzzy neural network. In the proposed method, first, the fault tree presents a logic structure of fault symptoms and faults. Second, rules extracted from the fault trees avoid duplicate and redundancy. Third, the fuzzy neural network is applied to train the relationship mapping between fault symptoms and faults. In the aquaculture IoT, one fault can cause various fault symptoms, and one symptom can be caused by a variety of faults. Four fault relationships are obtained. Results show that one symptom-to-one fault, two symptoms-to-two faults, and two symptoms-to-one fault relationships can be rapidly diagnosed with high precision, while one symptom-to-two faults patterns perform not so well, but are still worth researching. This model implements diagnosis for most kinds of faults in the aquaculture IoT.

  16. Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT) for Aquaculture.

    Science.gov (United States)

    Chen, Yingyi; Zhen, Zhumi; Yu, Huihui; Xu, Jing

    2017-01-14

    In the Internet of Things (IoT) equipment used for aquaculture is often deployed in outdoor ponds located in remote areas. Faults occur frequently in these tough environments and the staff generally lack professional knowledge and pay a low degree of attention in these areas. Once faults happen, expert personnel must carry out maintenance outdoors. Therefore, this study presents an intelligent method for fault diagnosis based on fault tree analysis and a fuzzy neural network. In the proposed method, first, the fault tree presents a logic structure of fault symptoms and faults. Second, rules extracted from the fault trees avoid duplicate and redundancy. Third, the fuzzy neural network is applied to train the relationship mapping between fault symptoms and faults. In the aquaculture IoT, one fault can cause various fault symptoms, and one symptom can be caused by a variety of faults. Four fault relationships are obtained. Results show that one symptom-to-one fault, two symptoms-to-two faults, and two symptoms-to-one fault relationships can be rapidly diagnosed with high precision, while one symptom-to-two faults patterns perform not so well, but are still worth researching. This model implements diagnosis for most kinds of faults in the aquaculture IoT.

  17. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT

    Science.gov (United States)

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-01-01

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0–1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing. PMID:28212317

  18. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT.

    Science.gov (United States)

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-02-16

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0-1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing.

  19. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT

    Directory of Open Access Journals (Sweden)

    Xin Chen

    2017-02-01

    Full Text Available The Internet of Things (IoT is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP and femtocell holders (FHs as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0–1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing.

  20. Distributed Danger Assessment Model for the Internet of Things Based on Immunology

    Directory of Open Access Journals (Sweden)

    Run Chen

    2013-05-01

    Full Text Available The Internet of Things (IoT confronts complicated and changeful security threats. It harms IoT and brings IoT potential danger. However, the research achievements of the danger assessment technology for IoT are rare. To calculate the danger value of IoT with many dispersive sense nodes, the theoretical model of distributed danger assessment for IoT is explored in this paper. The principles and mechanisms of Artificial Immune System (AIS are introduced into the proposed model. Data packets in IoT are captured in each gateway and converted into antigens in the simulated immune environment. Detectors use self-learning and self-adaptation mechanisms in AIS to evolve themselves to adapt the local IoT environment and detect security threats. The mechanism of antibody density is simulated to reflect the intensity of security threats which are happening. Through the detected security threats and their intensity, the values of IoT property and security threats’ harm are combined to assess the quantitative value of danger for IoT. Theoretical analysis shows that the proposed model is significative of theory and practice.

  1. Equivalent circuit of radio frequency-plasma with the transformer model.

    Science.gov (United States)

    Nishida, K; Mochizuki, S; Ohta, M; Yasumoto, M; Lettry, J; Mattei, S; Hatayama, A

    2014-02-01

    LINAC4 H(-) source is radio frequency (RF) driven type source. In the RF system, it is required to match the load impedance, which includes H(-) source, to that of final amplifier. We model RF plasma inside the H(-) source as circuit elements using transformer model so that characteristics of the load impedance become calculable. It has been shown that the modeling based on the transformer model works well to predict the resistance and inductance of the plasma.

  2. A physically based model for the isothermal martensitic transformation in a maraging steel

    Science.gov (United States)

    Kruijver, S. O.; Blaauw, H. S.; Beyer, J.; Post, J.

    2003-10-01

    Isothermal transformation from austenite to martensite in steel products during or after the production process often show residual stresses which can create unacceptable dimensional changes in the final product. Tn order to gain more insight in the effects infiuencing the isothermai transformation, the overall kinetics in a low Carbon-Nickel maraging steel is investigated. The influence of the austenitizing température, time and quenching rate on the transformation is measured magnetically and yields information about the transformation rate and final amount of transformation. A physically based model describing the nucleation and growth of martensite is used to explain the observed effects. The results show a very good fit of the experimental values and the model description of the transformation, within the limitations of the inhomogeneities (carbides and intermetallics, size and distribution in the material and stress state) and experimental conditions.

  3. A Two-Dimensional Cloud Model for Condition Assessment of HVDC Converter Transformers

    Directory of Open Access Journals (Sweden)

    Linjie Zhao

    2012-01-01

    Full Text Available Converter transformers are the key and the most important components in high voltage direct current (HVDC power transmission systems. Statistics show that the failure rate of HVDC converter transformers is approximately twice of that of transformers in AC power systems. This paper presents an approach integrated with a two-dimensional cloud model and an entropy-based weight model to evaluate the condition of HVDC converter transformers. The integrated approach can describe the complexity of HVDC converter transformers and achieve an effective assessment of their condition. Data from electrical testing, DGA, oil testing, and visual inspection were chosen to form the double-level assessment index system. Analysis results show that the integrated approach is capable of providing a relevant and effective assessment which in turn, provides valuable information for the maintenance of HVDC converter transformers.

  4. A Probabilistic Model for Face Transformation with Application to Person Identification

    Directory of Open Access Journals (Sweden)

    Rose Kenneth

    2004-01-01

    Full Text Available A novel approach for content-based image retrieval and its specialization to face recognition are described. While most face recognition techniques aim at modeling faces, our goal is to model the transformation between face images of the same person. As a global face transformation may be too complex to be modeled directly, it is approximated by a collection of local transformations with a constraint that imposes consistency between neighboring transformations. Local transformations and neighborhood constraints are embedded within a probabilistic framework using two-dimensional hidden Markov models (2D HMMs. We further introduce a new efficient technique, called turbo-HMM (T-HMM for approximating intractable 2D HMMs. Experimental results on a face identification task show that our novel approach compares favorably to the popular eigenfaces and fisherfaces algorithms.

  5. Hysteresis Loop for a No-loaded, Delta-connected Transformer Model Deduced from Measurements

    Science.gov (United States)

    Corrodi, Yves; Kamei, Kenji; Kohyama, Haruhiko; Ito, Hiroki

    At a transformer's steady-state condition, whereby a transformer and its load are constantly supplied by a sinusoidal source, the current-flux pair within the transformer core and its windings will cycle along a hysteresis loop. This nonlinear current-flux characteristic becomes important while at transformer gets reenergized. A remaining residual flux and the fact that a transformer is typically used up to its saturation level can lead to high-amplitude magnetizing inrush currents and associated voltage disturbances. These disturbances can be reduced by controlled transformer switching. In order to pre-evaluate the effect of a specific controlled transformer energization, pre-simulations can be applied. In that case the hysteresis loop and its saturation characteristic will become the most important model parameter. If the corresponding manufacturer specifications are not available a standard hysteresis loops can be used, but might come up with an inaccurate simulation result. Therefore, this paper analyses the measured 3-phase currents from two delta-connected power transformers by “Fourier Series” in order to deduce a single-phase hysteresis loop, which can be implemented into a typical 3-phase transformer model. Additionally, the saturation behavior of a power-transformer will be estimated and a comparison of ATP/EMTP simulations will conclude this paper.

  6. IoT in Action: Design and Implementation of a Building Evacuation Service

    Directory of Open Access Journals (Sweden)

    Selahattin Gokceli

    2017-01-01

    Full Text Available With the development of sensor technologies, various application areas have emerged. The usage of these technologies and exploitation of recent improvements have clear benefits on building applications. Such use-cases can improve smart functions of buildings and can increase the end-user comfort. As a similar notion, building automation systems (BAS are smart systems that target to provide automated management of various control services and to improve resource usage efficiency. However, buildings generally contain hardware and control services from a diverse set of characteristics. The automated and central management of such functions can be challenging. In order to overcome such issues, an Emergency Evacuation Service is proposed for BAS, where requirements of such central management model are analyzed and model content and subservice definitions are prepared. A crucial scenario, which could be a necessity for future BAS, is defined and an approach for evacuation of people in the buildings at emergency situations is proposed. For real-life scenarios, the Evacuation Service is implemented by using a low-cost design, which is appropriate for Internet of Things (IoT based BAS applications. As demonstrated, the proposed service model can provide effective performance in real-life deployments.

  7. Evaluation of display technologies for Internet of Things (IoT)

    Science.gov (United States)

    Sabo, Julia; Fegert, Tobias; Cisowski, Matthäus Stephanus; Marsal, Anatolij; Eichberger, Domenik; Blankenbach, Karlheinz

    2017-02-01

    Internet of Things (IoT) is a booming industry. We investigated several (semi-) professional IoT devices in combination with displays (focus on reflective technologies) and LEDs. First, these displays were compared for reflectance and ambient light performance. Two measurement set-ups with diffuse conditions were used for simulating typical indoor lighting conditions of IoT displays. E-paper displays were evaluated best as they combine a relative high reflectance with large contrast ratio. Reflective monochrome LCDs show a lower reflectance but are widely available. Second we studied IoT microprocessors interfaces to displays. A µP can drive single LEDs and one or two Seg 8 LED digits directly by GPIOs. Other display technologies require display controllers with a parallel or serial interface to the microprocessor as they need dedicated waveforms for driving the pixels. Most suitable are display modules with built-in display RAM as only pixel data have to be transferred which changes. A HDMI output (e.g. Raspberry Pi) results in high cost for the displays, therefore AMLCDs are not suitable for low to medium cost IoT systems. We compared and evaluated furthermore status indicators, icons, text and graphics IoT display systems regarding human machine interface (HMI) characteristics and effectiveness as well as power consumption. We found out that low resolution graphics bistable e-paper displays are the most appropriate display technology for IoT systems as they show as well information after a power failure or power switch off during maintenance or e.g. QR codes for installation. LED indicators are the most cost effective approach which has however very limited HMI capabilities.

  8. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  9. Code generation by model transformation: a case study in transformation modularity

    NARCIS (Netherlands)

    Hemel, Z.; Kats, L.C.L.; Groenewegen, D.M.; Viser, E.

    2009-01-01

    The realization of model-driven software development requires effective techniques for implementing code generators for domain-specific languages. This paper identifies techniques for improving separation of concerns in the implementation of generators. The core technique is code generation by model

  10. Assessment of model uncertainty during the river export modelling of pesticides and transformation products

    Science.gov (United States)

    Gassmann, Matthias; Olsson, Oliver; Kümmerer, Klaus

    2013-04-01

    The modelling of organic pollutants in the environment is burdened by a load of uncertainties. Not only parameter values are uncertain but often also the mass and timing of pesticide application. By introducing transformation products (TPs) into modelling, further uncertainty coming from the dependence of these substances on their parent compounds and the introduction of new model parameters are likely. The purpose of this study was the investigation of the behaviour of a parsimonious catchment scale model for the assessment of river concentrations of the insecticide Chlorpyrifos (CP) and two of its TPs, Chlorpyrifos Oxon (CPO) and 3,5,6-trichloro-2-pyridinol (TCP) under the influence of uncertain input parameter values. Especially parameter uncertainty and pesticide application uncertainty were investigated by Global Sensitivity Analysis (GSA) and the Generalized Likelihood Uncertainty Estimation (GLUE) method, based on Monte-Carlo sampling. GSA revealed that half-lives and sorption parameters as well as half-lives and transformation parameters were correlated to each other. This means, that the concepts of modelling sorption and degradation/transformation were correlated. Thus, it may be difficult in modelling studies to optimize parameter values for these modules. Furthermore, we could show that erroneous pesticide application mass and timing were compensated during Monte-Carlo sampling by changing the half-life of CP. However, the introduction of TCP into the calculation of the objective function was able to enhance identifiability of pesticide application mass. The GLUE analysis showed that CP and TCP were modelled successfully, but CPO modelling failed with high uncertainty and insensitive parameters. We assumed a structural error of the model which was especially important for CPO assessment. This shows that there is the possibility that a chemical and some of its TPs can be modelled successfully by a specific model structure, but for other TPs, the model

  11. Development status and demand analysis of IOT in vocational schools%物联网在职业学校中的发展现状及需求分析

    Institute of Scientific and Technical Information of China (English)

    李萌; 蒋莉

    2014-01-01

    With the proposing of IOT concept and the relative technology becoming matures, the applications of IOT is increasingly widespread. The development status and the demands of IOT applied in vocational schools intelligent teaching, campus security, and logistics services are analyzed. The result shows that the application of IOT will cause the revolution in teaching mode and management models, and ultimately enhance the level of education informationization. At the same time, it will help to improve the education quality.%随着物联网概念的提出和相关技术的发展成熟,物联网的应用领域日趋广泛,文章就物联网在职业学校智能教学、校园安全、后勤服务等方面的应用发展现状及需求进行了分析,结果认为,物联网的应用必将引起教学模式和管理模式的变革,并最终提升教育信息化水平,同时有利于教育质量的提高。

  12. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  13. Enabling Awareness Driven Differentiated data service in IOT

    Directory of Open Access Journals (Sweden)

    Haoming Guo

    2011-11-01

    Full Text Available IOT needs to organize sensor resources to monitor events in real world for all time. As result, huge number of data will be concentrated in the system. Due to difference of sensors’ awareness on event, the concentrated data’s qualities are different. The data process task’s performance will be affected without discrimination of data’s quality. This paper introduced an approach, called Awareness Driven Schedule (ADS that enables involved sensor resources to provide differentiated data service by their awareness, to address the issue. In the approach, higher a sensor resource’s awareness on the event is, more detailed data service it should provide. Requirement that specify relation of sensors’ awareness and rules of data collect job will be submitted initially. Constant and continuous data channels are created to organize sensors. In accordance of their awareness and task initial requirement, sensor resources are scheduled to collect data and aggregate to task through the channels. Sensor resource’s involvement and service depend on it’s awareness and task’s requirement.  Upon ADS, a middleware is built for CEA’s(China Earthquake Administration SPON(Seismological Precursors Observation Net and applied for China’s earthquake research applications. In the applications, Dull data of low awareness sensors could be banned out, applications may by more efficient.

  14. Comparison research on iot oriented image classification algorithms

    Directory of Open Access Journals (Sweden)

    Du Ke

    2016-01-01

    Full Text Available Image classification belongs to the machine learning and computer vision fields, it aims to recognize and classify objects in the image contents. How to apply image classification algorithms to large-scale data in the IoT framework is the focus of current research. Based on Anaconda, this article implement sk-NN, SVM, Softmax and Neural Network algorithms by Python, performs data normalization, random search, HOG and colour histogram feature extraction to enhance the algorithms, experiments on them in CIFAR-10 datasets, then conducts comparison from three aspects of training time, test time and classification accuracy. The experimental results show that: the vectorized implementation of the algorithms is more efficient than the loop implementation; The training time of k-NN is the shortest, SVM and Softmax spend more time, and the training time of Neural Network is the longest; The test time of SVM, Softmax and Neural Network are much shorter than of k-NN; Neural Network gets the highest classification accuracy, SVM and Softmax get lower and approximate accuracies, and k-NN gets the lowest accuracy. The effects of three algorithm improvement methods are obvious.

  15. Computer-Aided Transformation of PDE Models: Languages, Representations, and a Calculus of Operations

    Science.gov (United States)

    2016-01-05

    Computer-aided transformation of PDE models: languages, representations, and a calculus of operations A domain-specific embedded language called...languages, representations, and a calculus of operations Report Title A domain-specific embedded language called ibvp was developed to model initial...Computer-aided transformation of PDE models: languages, representations, and a calculus of operations 1 Vision and background Physical and engineered systems

  16. STLIS: A Scalable Two-Level Index Scheme for Big Data in IoT

    Directory of Open Access Journals (Sweden)

    Yonglin Leng

    2016-01-01

    Full Text Available The rapid development of the Internet of Things causes the dramatic growth of data, which poses an important challenge on the storage and quick retrieval of big data. As an effective representation model, RDF receives the most attention. More and more storage and index schemes have been developed for RDF model. For the large-scale RDF data, most of them suffer from a large number of self-joins, high storage cost, and many intermediate results. In this paper, we propose a scalable two-level index scheme (STLIS for RDF data. In the first level, we devise a compressed path template tree (CPTT index based on S-tree to retrieve the candidate sets of full path. In the second level, we create a hierarchical edge index (HEI and a node-predicate (NP index to accelerate the match. Extensive experiments are executed on two representative RDF benchmarks and one real RDF dataset in IoT by comparison with three representative index schemes, that is, RDF-3X, Bitmat, and TripleBit. Results demonstrate that our proposed scheme can respond to the complex query in real time and save much storage space compared with RDF-3X and Bitmat.

  17. A model for the epigenetic switch linking inflammation to cell transformation: deterministic and stochastic approaches.

    Directory of Open Access Journals (Sweden)

    Claude Gérard

    2014-01-01

    Full Text Available Recently, a molecular pathway linking inflammation to cell transformation has been discovered. This molecular pathway rests on a positive inflammatory feedback loop between NF-κB, Lin28, Let-7 microRNA and IL6, which leads to an epigenetic switch allowing cell transformation. A transient activation of an inflammatory signal, mediated by the oncoprotein Src, activates NF-κB, which elicits the expression of Lin28. Lin28 decreases the expression of Let-7 microRNA, which results in higher level of IL6 than achieved directly by NF-κB. In turn, IL6 can promote NF-κB activation. Finally, IL6 also elicits the synthesis of STAT3, which is a crucial activator for cell transformation. Here, we propose a computational model to account for the dynamical behavior of this positive inflammatory feedback loop. By means of a deterministic model, we show that an irreversible bistable switch between a transformed and a non-transformed state of the cell is at the core of the dynamical behavior of the positive feedback loop linking inflammation to cell transformation. The model indicates that inhibitors (tumor suppressors or activators (oncogenes of this positive feedback loop regulate the occurrence of the epigenetic switch by modulating the threshold of inflammatory signal (Src needed to promote cell transformation. Both stochastic simulations and deterministic simulations of a heterogeneous cell population suggest that random fluctuations (due to molecular noise or cell-to-cell variability are able to trigger cell transformation. Moreover, the model predicts that oncogenes/tumor suppressors respectively decrease/increase the robustness of the non-transformed state of the cell towards random fluctuations. Finally, the model accounts for the potential effect of competing endogenous RNAs, ceRNAs, on the dynamics of the epigenetic switch. Depending on their microRNA targets, the model predicts that ceRNAs could act as oncogenes or tumor suppressors by regulating

  18. Rheology and friction along the Vema transform fault (Central Atlantic) inferred by thermal modeling

    Science.gov (United States)

    Cuffaro, Marco; Ligi, Marco

    2016-04-01

    We investigate with 3-D finite element simulations the temperature distribution beneath the Vema transform that offsets the Mid-Atlantic Ridge by ~300 km in the Central Atlantic. The developed thermal model includes the effects of mantle flow beneath a ridge-transform-ridge geometry and the lateral heat conduction across the transform fault, and of the shear heating generated along the fault. Numerical solutions are presented for a 3-D domain, discretized with a non-uniform tetrahedral mesh, where relative plate kinematics is used as boundary condition, providing passive mantle upwelling. Mantle is modelled as a temperature-dependent viscous fluid, and its dynamics can be described by Stokes and advection-conduction heat equations. The results show that shear heating raises significantly the temperature along the transform fault. In order to test model results, we calculated the thermal structure simulating the mantle dynamics beneath an accretionary plate boundary geometry that duplicates the Vema transform fault, assuming the present-day spreading rate and direction of the Mid Atlantic Ridge at 11 °N. Thus, the modelled heat flow at the surface has been compared with 23 heat flow measurements carried out along the Vema Transform valley. Laboratory studies on the frictional stability of olivine aggregates show that the depth extent of oceanic faulting is thermally controlled and limited by the 600 °C isotherm. The depth of isotherms of the thermal model were compared to the depths of earthquakes along transform faults. Slip on oceanic transform faults is primarily aseismic, only 15% of the tectonic offset is accommodated by earthquakes. Despite extensive fault areas, few large earthquakes occur on the fault and few aftershocks follow large events. Rheology constrained by the thermal model combined with geology and seismicity of the Vema Transform fault allows to better understand friction and the spatial distribution of strength along the fault and provides

  19. Potential transformation of trace species including aircraft exhaust in a cloud environment. The `Chedrom model`

    Energy Technology Data Exchange (ETDEWEB)

    Ozolin, Y.E.; Karol, I.L. [Main Geophysical Observatory, St. Petersburg (Russian Federation); Ramaroson, R. [Office National d`Etudes et de Recherches Aerospatiales (ONERA), 92 - Chatillon (France)

    1997-12-31

    Box model for coupled gaseous and aqueous phases is used for sensitivity study of potential transformation of trace gases in a cloud environment. The rate of this transformation decreases with decreasing of pH in droplets, with decreasing of photodissociation rates inside the cloud and with increasing of the droplet size. Model calculations show the potential formation of H{sub 2}O{sub 2} in aqueous phase and transformation of gaseous HNO{sub 3} into NO{sub x} in a cloud. This model is applied for exploration of aircraft exhausts evolution in plume inside a cloud. (author) 10 refs.

  20. IEEE 802.11ah: A Technology to Face the IoT Challenge

    Directory of Open Access Journals (Sweden)

    Victor Baños-Gonzalez

    2016-11-01

    Full Text Available Since the conception of the Internet of things (IoT, a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  1. The PMIPv6-Based Group Binding Update for IoT Devices

    Directory of Open Access Journals (Sweden)

    Jianfeng Guan

    2016-01-01

    Full Text Available Internet of Things (IoT has been booming with rapid increase of the various wearable devices, vehicle embedded devices, and so on, and providing the effective mobility management for these IoT devices becomes a challenge due to the different application scenarios as well as the limited energy and bandwidth. Recently, lots of researchers have focused on this topic and proposed several solutions based on the combination of IoT features and traditional mobility management protocols, in which most of these schemes take the IoT devices as mobile networks and adopt the NEtwork MObility (NEMO and its variants to provide the mobility support. However, these solutions are in face of the heavy signaling cost problem. Since IoT devices are generally combined to realize the complex functions, these devices may have similar movement behaviors. Clearly analyzing these characters and using them in the mobility management will reduce the signaling cost and improve the scalability. Motivated by this, we propose a PMIPv6-based group binding update method. In particular, we describe its group creation procedure, analyze its impact on the mobility management, and derive its reduction ratio in terms of signaling cost. The final results show that the introduction of group binding update can remarkably reduce the signaling cost.

  2. An IoT virtualization Framework for Fast and Lossless Communication

    DEFF Research Database (Denmark)

    Patil, Sulakshana; Mihovska, Albena D.; Prasad, Ramjee

    2014-01-01

    An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design and evalua......An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design...... and evaluation of a management framework for an IoT scenario. This paper proposes IoT applications and a global framework to improve the applications performance under various practical. The proposed global framework is designed with network of communication systems, in which the communication has to be fast...... enough and lossless. The virtualization of the network allows for low computational complexity and improved processing efficiency. The various contributions have been made in the applications that were found by IoT. The proposed global framework controls data transmission delay, reduces the data loss...

  3. Constraints in the IoT: The World in 2020 and Beyond

    Directory of Open Access Journals (Sweden)

    Asma Haroon

    2016-11-01

    Full Text Available The Internet of Things (IoT, often referred as the future Internet; is a collection of interconnected devices integrated into the world-wide network that covers almost everything and could be available anywhere. IoT is an emerging technology and aims to play an important role in saving money, conserving energy, eliminating gap and better monitoring for intensive management on a routine basis. On the other hand, it is also facing certain design constraints such as technical challenges, social challenges, compromising privacy and performance tradeoffs. This paper surveys major technical limitations that are hindering the successful deployment of the IoT such as standardization, interoperability, networking issues, addressing and sensing issues, power and storage restrictions, privacy and security, etc. This paper categorizes the existing research on the technical constraints that have been published in the recent years. With this categorization, we aim to provide an easy and concise view of the technical aspects of the IoT. Furthermore, we forecast the changes influenced by the IoT. This paper predicts the future and provides an estimation of the world in year 2020 and beyond.

  4. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  5. Phase field modeling of tetragonal to monoclinic phase transformation in zirconia

    Science.gov (United States)

    Mamivand, Mahmood

    Zirconia based ceramics are strong, hard, inert, and smooth, with low thermal conductivity and good biocompatibility. Such properties made zirconia ceramics an ideal material for different applications form thermal barrier coatings (TBCs) to biomedicine applications like femoral implants and dental bridges. However, this unusual versatility of excellent properties would be mediated by the metastable tetragonal (or cubic) transformation to the stable monoclinic phase after a certain exposure at service temperatures. This transformation from tetragonal to monoclinic, known as LTD (low temperature degradation) in biomedical application, proceeds by propagation of martensite, which corresponds to transformation twinning. As such, tetragonal to monoclinic transformation is highly sensitive to mechanical and chemomechanical stresses. It is known in fact that this transformation is the source of the fracture toughening in stabilized zirconia as it occurs at the stress concentration regions ahead of the crack tip. This dissertation is an attempt to provide a kinetic-based model for tetragonal to monoclinic transformation in zirconia. We used the phase field technique to capture the temporal and spatial evolution of monoclinic phase. In addition to morphological patterns, we were able to calculate the developed internal stresses during tetragonal to monoclinic transformation. The model was started form the two dimensional single crystal then was expanded to the two dimensional polycrystalline and finally to the three dimensional single crystal. The model is able to predict the most physical properties associated with tetragonal to monoclinic transformation in zirconia including: morphological patterns, transformation toughening, shape memory effect, pseudoelasticity, surface uplift, and variants impingement. The model was benched marked with several experimental works. The good agreements between simulation results and experimental data, make the model a reliable tool for

  6. APPLICATIONS OF HAMILTONIAN AND LAPLACE TRANSFORM IN AN ECONOMIC MODEL

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This paper analyzes the long-run effects and short-run effects of foreign aid on the domestic economy by using the Hamilton system and Laplace transform.It is found that an increase in the foreign aid has no long-run effect on the foreign borrowing,domestic capital accumulation and the foreign direct investment in the home country,but increases the steady-state consumption level the same amount.However,the short-run analysis presents that increasing foreign aid does not affect the initial consumption level and the initial consumption increase rate; but it affects the initial savings positively.

  7. T-duality transformation of gauged linear sigma model with F-term

    Directory of Open Access Journals (Sweden)

    Tetsuji Kimura

    2014-10-01

    Full Text Available We develop the duality transformation rules in two-dimensional theories in the superfield formalism. Even if the chiral superfield which we dualize involves an F-term, we can dualize it by virtue of the property of chiral superfields. We apply the duality transformation rule of the neutral chiral superfield to the N=(4,4 gauged linear sigma model for five-branes. We also investigate the duality transformation rule of the charged chiral superfield in the N=(4,4 gauged linear sigma model for the A1-type ALE space. In both cases we obtain the dual Lagrangians in the superfield formalism. In the low energy limit we find that their duality transformations are interpreted as T-duality transformations consistent with the Buscher rule.

  8. Research on the Optical Properties of Transformers Partial Discharge Based on Different Discharge Models

    Directory of Open Access Journals (Sweden)

    Wei Bengang

    2016-01-01

    Full Text Available In this paper, the different types of discharge in transformer were simulated based on the real transformer fault model. The optical partial discharge detection system was established based on optical sensors which were capturing partial discharge accompanied by optical effects. In this research, surface discharge and suspended discharge defect model was pressurized to generate partial discharge signal. The results showed that: Partial discharge optical signals could effectively respond the production and development process of transformer partial discharge. It was able to assess discharge level also. When the discharge phenomenon stabilized, the phase of surface discharge mainly between 60°~150°and 240°~330°, the phase of suspended discharge mainly between 260°~320°. According to the phase characteristic of discharge pattern, the creeping discharge and suspended discharge phenomenon of transformer can be distinguished. It laid the foundation for the application of transformer optical partial discharge detection technology.

  9. T-duality Transformation of Gauged Linear Sigma Model with F-term

    CERN Document Server

    Kimura, Tetsuji

    2014-01-01

    We develop the duality transformation rules in two-dimensional theories in the superfield formalism. Even if the chiral superfield which we dualize is involved in F-term, we can convert the F-term to D-terms by virtue of the property of chiral superfields. We apply the duality transformation rule of the neutral chiral superfield to the ${\\cal N}=(4,4)$ gauged linear sigma model for five-branes. We also investigate the duality transformation rule of the charged chiral superfield in the ${\\cal N} = (4,4)$ gauged linear sigma model for the $A_1$-type ALE space. In both cases we obtain the dual Lagrangians in the superfield formalism. In the low energy limit we find that their duality transformations are interpreted as the T-duality transformations consistent with the Buscher rule.

  10. A Self-Learning Sensor Fault Detection Framework for Industry Monitoring IoT

    Directory of Open Access Journals (Sweden)

    Yu Liu

    2013-01-01

    Full Text Available Many applications based on Internet of Things (IoT technology have recently founded in industry monitoring area. Thousands of sensors with different types work together in an industry monitoring system. Sensors at different locations can generate streaming data, which can be analyzed in the data center. In this paper, we propose a framework for online sensor fault detection. We motivate our technique in the context of the problem of the data value fault detection and event detection. We use the Statistics Sliding Windows (SSW to contain the recent sensor data and regress each window by Gaussian distribution. The regression result can be used to detect the data value fault. Devices on a production line may work in different workloads and the associate sensors will have different status. We divide the sensors into several status groups according to different part of production flow chat. In this way, the status of a sensor is associated with others in the same group. We fit the values in the Status Transform Window (STW to get the slope and generate a group trend vector. By comparing the current trend vector with history ones, we can detect a rational or irrational event. In order to determine parameters for each status group we build a self-learning worker thread in our framework which can edit the corresponding parameter according to the user feedback. Group-based fault detection (GbFD algorithm is proposed in this paper. We test the framework with a simulation dataset extracted from real data of an oil field. Test result shows that GbFD detects 95% sensor fault successfully.

  11. 物联网生态系统构建探索%Probing into IOT Ecosystem Construction

    Institute of Scientific and Technical Information of China (English)

    曾善平; 钱守廉

    2012-01-01

      Beginning with IOT industry development requirement driven by Chinese government, it discusses the necessity of con-structing IOT ecosystem and suggestions on construction. It points out that horizontal IOT service platform and high available network are the core for the deep development of IOT industry. It enumerates the efforts of three big telecom operators for IOT development, probes into the IOT service based on cloud computing, from the aspects of IOT industry development and information technology state, commercial mode of IOT.%  从政府驱动物联网产业发展要求出发,探讨了构建物联网生态系统的必要性和务实构建的建议,指出了水平化的物联网公共服务平台和高可靠网络是物联网产业化深度发展的核心,例举了三大通信运营商近年来在物联网业务发展中所做的努力,并分别从物联网产业发展和信息技术发展现况、物联网商业模式等方面探索了基于云计算的物联网服务之道。

  12. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-12-01

    Full Text Available This paper highlights three critical aspects of the internet of things (IoTs, namely (1 energy efficiency, (2 energy balancing and (3 quality of service (QoS and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  13. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-12-02

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  14. Proposed on Device Capability based Authentication using AES-GCM for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Mahalle, Parikshit N.; Prasad, Neeli R.

    2011-01-01

    Economics of scale in Internet of Things (IoT) presents new security challenges for ubiquitous devices in terms of authentication, addressing and embedded security. Currently available cryptographic techniques require further analysis to determine applicability to IoT. We introduce...

  15. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...

  16. Solving Two Kinds of JC Models Relating to Two-Photon Process by Supersymmetric Transformation

    Institute of Scientific and Technical Information of China (English)

    FAN Hong-Yi; Wei-Jun

    2004-01-01

    We propose two kinds of new Jaynes Cummings models relating to two-photon process by using the supersymmetric unitary transformation. The corresponding energy eigenvalues and eigenvectors are obtained.

  17. Stability of GM(1,1) power model on vector transformation

    Institute of Scientific and Technical Information of China (English)

    Jinhai Guo; Xinping Xiao; Jun Liu; Shu hua Mao

    2015-01-01

    The morbidity problem of the GM(1,1) power model in parameter identification is discussed by using multiple and rota-tion transformation of vectors. Firstly we consider the morbidity problem of the special matrix and prove that the condition num-ber of the coefficient matrix is determined by the ratio of lengths and the included angle of the column vector, which could be ad-justed by multiple and rotation transformation to turn the matrix to a wel-conditioned one. Then partition the corresponding matrix of the GM(1,1) power model in accordance with the column vector and regulate the matrix to a wel-conditioned one by multiple and rotation transformation of vectors, which completely solve the in-stability problem of the GM(1,1) power model. Numerical results show that vector transformation is a new method in studying the stability problem of the GM(1,1) power model.

  18. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  19. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  20. Research on user acceptance for IOT application in EMUs maintenance%动车组维修中物联网技术的用户接受行为研究

    Institute of Scientific and Technical Information of China (English)

    孙鹏; 张惟皎

    2013-01-01

    本文结合动车组管理信息系统实践经验和物联网应用典型案例,参考技术接受模型(TAM),研究在动车组维修中物联网技术的用户接受行为及其规律.从业务领域、组织管理、技术特点和应用水平4个角度分类,整理影响物联网技术被接受的相关用户采纳因素;对物联网技术在动车组维修中的应用进行定性分析;并基于AHP层次分析理论和德尔菲专家意见法,给出定量评价方法.对物联网技术的应用有重要参考价值.%Combined with the practical experience of Electric Multiple Units (EMUs) Management Information System (MIS), typical Internet of Things (IoT) application, and Technology Acceptance Model (TAM), the paper studied on the user acceptance behavior and rules for the IoT application in EMU maintenance. Categorized the influencing factors of IoT application from the view of business domain, management, technology characteristics and application level, it was analyzed the IoT application in EMUs maintenance qualitatively. Based on AHP theory and DELPHI method, a quantitative method was also presented. This work was of great reference value for the successful implementation and sustainable development of IoT application and its project strategy.

  1. Kinetics of solid state phase transformations: Measurement and modelling of some basic issues

    Indian Academy of Sciences (India)

    S Raju; E Mohandas

    2010-01-01

    A brief review of the issues involved in modelling of the solid state transformation kinetics is presented. The fact that apart from the standard thermodynamic parameters, certain path variables like heating or cooling rate can also exert a crucial influence on the kinetic outcome is stressed. The kinetic specialties that are intrinsic to phase changes proceeding under varying thermal history are enumerated. A simple and general modelling methodology for understanding the kinetics of non-isothermal transformations is outlined.

  2. AUTO-DARBOUX TRANSFORMATION AND EXACT SOLUTIONS OF THE BRUSSELATOR REACTION DIFFUSION MODEL

    Institute of Scientific and Technical Information of China (English)

    闫振亚; 张鸿庆

    2001-01-01

    Firstly, using the improved homogeneous balance method, an auto-Darboux transformation (ADT) for the Brusselator reaction diffusion model is found. Based on the ADT, several exact solutions are obtained which contain some authors' results known.Secondly, by using a series of transformations, the model is reduced into a nonlinear reaction diffusion equation and then through using sine- cosine method, more exact solutions are found which contain soliton solutions.

  3. Day-ahead electricity price forecasting using wavelet transform combined with ARIMA and GARCH models

    Energy Technology Data Exchange (ETDEWEB)

    Tan, Zhongfu; Zhang, Jinliang; Xu, Jun [North China Electric Power University, Beijing 102206 (China); Wang, Jianhui [Argonne National Laboratory, Argonne, IL 60439 (United States)

    2010-11-15

    This paper proposes a novel price forecasting method based on wavelet transform combined with ARIMA and GARCH models. By wavelet transform, the historical price series is decomposed and reconstructed into one approximation series and some detail series. Then each subseries can be separately predicted by a suitable time series model. The final forecast is obtained by composing the forecasted results of each subseries. This proposed method is examined on Spanish and PJM electricity markets and compared with some other forecasting methods. (author)

  4. BRST analysis of the gauged SU(2) WZW model and Darboux's transformations

    CERN Document Server

    Paschalis, J E

    1996-01-01

    The four dimensional SU(2) WZW model coupled to elecromagnetism is treated as a constraint system in the context of the BFV approach. We show that the Darboux's transformations which are used to diagonalize the canonical one-form in the Faddeev-Jackiw formalism, transform the fields of the model into BRST invariant ones. The same analysis is also carried out in the case of spinor electrodynamics.

  5. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  6. High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

    Directory of Open Access Journals (Sweden)

    Sal vatore Gaglio

    2015-05-01

    Full Text Available While the vision of Internet of Things (IoT is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but e ective paradigm of executable code exchange among nodes. In this paper, we show how our methodology can be used to provide IoT resource constrained devices with reasoning abilities by implementing a Fuzzy Logic symbolic extension on deployed nodes at runtime.

  7. Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision

    DEFF Research Database (Denmark)

    Lynggaard, Per; Skouby, Knud Erik

    2016-01-01

    The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world’s population will live their lives in smart homes and in smart cities...... the “smart” vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the “big challenges” and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits...... of this infrastructure, a complex IoT system has been deployed, simulated and elaborated. This simulation deals with wastewater energy harvesting from smart buildings located in a smart city context. From the simulations, it has been found that the proposed infrastructure is able to harvest between 50% and 75...

  8. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...... a detailed survey and analysis of embedded security especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis , isolation...... , and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices Finally, this paper proposes the embedded security framework as a feature of software/hardware co...

  9. Astronauts and IoT: Toward True Human-Autonomy Teaming

    Science.gov (United States)

    Vera, Alonso

    2016-01-01

    Advances in the area of Internet of Things (IoT) or Cyber-Physical Systems will have a significant impact on many areas of human activity and commercial/technological development. One application of importance to NASA is the need to make crews on deep space missions more independent from earth in both their routine activities and handling of unexpected events. IoT will allow increasingly intelligent systems to be aware of what humans are doing, what tools/resources they are using, and what help they might need in terms of procedure execution in tasks such as assembly, maintenance, repair, and perhaps even in more complex activities like medical interventions. This talk focuses on the convergence of research and technologies that will be needed to effect such intelligent systems based on IoT.

  10. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  11. Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs

    Directory of Open Access Journals (Sweden)

    Il-Gu Lee

    2017-07-01

    Full Text Available The wireless local area network (WLAN is one of the most popular wireless technologies offering connectivity today, and one of the candidates for the internet of things (IoTs. However, WLAN’s inefficiency in terms of complexity and relatively large power consumption compared with other wireless standards has been reported as a major barrier for IoTs applications. This paper proposes an interference-aware opportunistic dynamic energy saving mechanism to improve energy efficiency for Wi-Fi enabled IoTs. The proposed scheme optimizes operating clock frequencies adaptively for signal processing when the mobile station transmits packets in partial sub-channels. Evaluation results demonstrate that the proposed scheme improves energy efficiency by approximately 34%.

  12. First Results of the IOT Based 300 kW 500 MHz Amplifier for the Diamond Light Source

    CERN Document Server

    Jensen, Morten; Maddock, Matt; Müller, Marc; Rains, Simon; Watkins, Alun V

    2005-01-01

    We present the first RF measurements of the IOT based 300 kW 500 MHz amplifier for the Diamond Light Source. Four 80 kW IOTs are combined using a waveguide combiner to achieve the RF requirement of up to 300 kW for each of three superconducting cavities for the main storage ring. The IOTs are protected by a full power circulator and a 300 kW ferrite RF load. This is the first time IOTs will be used for a synchrotron light source. This paper gives an overview of the design of the Thales amplifiers and IOTs with commissioning results including measurements of key components and overall RF performance following factory tests and the installation of the first unit

  13. A Poisson-Fault Model for Testing Power Transformers in Service

    Directory of Open Access Journals (Sweden)

    Dengfu Zhao

    2014-01-01

    Full Text Available This paper presents a method for assessing the instant failure rate of a power transformer under different working conditions. The method can be applied to a dataset of a power transformer under periodic inspections and maintenance. We use a Poisson-fault model to describe failures of a power transformer. When investigating a Bayes estimate of the instant failure rate under the model, we find that complexities of a classical method and a Monte Carlo simulation are unacceptable. Through establishing a new filtered estimate of Poisson process observations, we propose a quick algorithm of the Bayes estimate of the instant failure rate. The proposed algorithm is tested by simulation datasets of a power transformer. For these datasets, the proposed estimators of parameters of the model have better performance than other estimators. The simulation results reveal the suggested algorithms are quickest among three candidates.

  14. Constructs of analysis and assessment model of transformation restructuring in steel plants

    Directory of Open Access Journals (Sweden)

    B. Gajdzik

    2014-01-01

    Full Text Available The article presents the assumptions for construction of a transformation restructuring model which describes, in a complex way, the range of changes implemented in metallurgical enterprises in Poland in time of economical changes. The model was prepared on the basis of thorough research studies concerning restructuring in countries where transformation of the economy system took place, which is change from central planning economy into market economy. It was also based on scientific research and own experiences. Besides the presentation of the methodological assumptions of designing a model of transformation restructuring in metallurgical sector the article also shows the issue of transformation restructuring and the areas of implemented changes in particular ranges of activity in metallurgical enterprises, which allowed them to function in conditions of market economy.

  15. Phase transformations in low-carbon steels; modelling the kinetics in terms of the interface mobility

    Energy Technology Data Exchange (ETDEWEB)

    Leeuwen, Y. van; Kop, T.A.; Sietsma, J.; Zwaag, S. van der [Technische Univ. Delft (Netherlands). Lab. of Materials Science

    1999-09-01

    The mechanical properties of steel are determined by the microstructure that develops during the production process and is a joint result of effects of chemical composition and of heat treatment. This paper deals with the kinetics of the phase transformation between the high temperature FCC-phase austenite and the low temperature BCC-phase ferrite as it occurs during controlled cooling. In order to predict the transformation kinetics, a physical model has been developed that considers both composition effects and the actual lattice transformation rate. The model is verified against experimental dilatometry data for three lean carbon-manganese steel grades. Notwithstanding the model having no adjustable parameters, it yields adequate simulations of the transformation kinetics. (orig.)

  16. Using Internet of Things (IoT) technology to study environmental processes

    Science.gov (United States)

    Martinez, Kirk; Hart, Jane; Black, Andrew; Blagg, Olivia

    2016-04-01

    The Internet of Things is a term which has emerged to describe the increase of Internet connectivity of everyday objects. While wireless sensor networks have developed highly energy efficient designs they need a step-change in their interoperability and usability to become essential tools in the study of our environment. We discuss the design, deployment and results from an IoT system installed on the Cairngorm Plateau, Scotland. This is a fragile remote environment, which provides an ideal location to test IoT techniques. We have investigated cryospheric, hydrologic and ecological processes, and we report our preliminary findings.

  17. Remote Agriculture Automation using Wireless Link and IoT Gateway Infrastructure

    DEFF Research Database (Denmark)

    Nakutis, Z.; Deksnys, V.; Jaurusevicius, I.

    2015-01-01

    The publication presents a system architecture for remote agriculture process automation, involving sensors and actuators connected to IoT gateway running OPC UA server. Sensors and actuators are very general and do not need any intelligence related to the process under control. Acquired data....../actuators. Throughput of data collection channel (long range radio) and IoT gateway performance are limiting factors for real time control or observation of agriculture processes. Therefore, achievable channel "sensors-OPC UA server" throughput is investigated experimentally. Potential agriculture applications that may...

  18. Development of ship structure health monitoring system based on IOT technology

    Science.gov (United States)

    Yang, Sujun; Shi, Lei; Chen, Demin; Dong, Yuqing; Hu, Zhenyi

    2017-06-01

    It is very important to monitor the ship structure, because ships are affected by all kinds of wind wave and current environment factor. At the same time, internet of things (IOT) technology plays more and more important role of in the development of industrial process. In the paper, real-time online monitoring of the ship can be realized by means of IOT technology. Ship stress, vibration and dynamic parameters are measured. Meanwhile, data is transmitted to remote monitoring system through intelligent data gateway. Timely remote support can be realized for dangerous stage of ship. Safe navigation of ships is guaranteed through application of the system.

  19. A Speech Transformation System for Emotion Conversion using MFCC and Modeling using GMM

    Directory of Open Access Journals (Sweden)

    Ashish R. Panat

    2013-07-01

    Full Text Available Transformation of sound by using statistical techniques is significant method for a new range of digital audio effect applications. This paper talks about the data driven voice transformation algorithm, which is used to alter the timbre of a Neutral (non-emotional voice in order to reproduce a particular emotional vocal timbre i.e. (Angry emotion. Perception based mel log spectral approximation filters are used to represent the speech timbre in the form of Mel Frequency Cepstral Coefficients (MFCC. The transformation function adopts a GMM (Gaussian Mixture Model based parameterization in order to model the spectral envelope. Expectation maximization algorithm is used to find the parameters of the Gaussian mixture model. Finally a polynomial transformation function is developed for emotion transformation of the speech signal. Objective evaluation is performed by calculating Mel Cepstral distance, Prediction error and Normalized Prediction error. Mel cepstral distance between Angry and transformed Angry is found to be much lesser than mel cepstral distance between Neutral and Angry emotion. The plot of the mel cepstral distance between neutral and angry and between neutral and transformed angry also overlaps at several locations

  20. A phase-field model for incoherent martensitic transformations including plastic accommodation processes in the austenite

    Science.gov (United States)

    Kundin, J.; Raabe, D.; Emmerich, H.

    2011-10-01

    If alloys undergo an incoherent martensitic transformation, then plastic accommodation and relaxation accompany the transformation. To capture these mechanisms we develop an improved 3D microelastic-plastic phase-field model. It is based on the classical concepts of phase-field modeling of microelastic problems (Chen, L.Q., Wang Y., Khachaturyan, A.G., 1992. Philos. Mag. Lett. 65, 15-23). In addition to these it takes into account the incoherent formation of accommodation dislocations in the austenitic matrix, as well as their inheritance into the martensitic plates based on the crystallography of the martensitic transformation. We apply this new phase-field approach to the butterfly-type martensitic transformation in a Fe-30 wt%Ni alloy in direct comparison to recent experimental data (Sato, H., Zaefferer, S., 2009. Acta Mater. 57, 1931-1937). It is shown that the therein proposed mechanisms of plastic accommodation during the transformation can indeed explain the experimentally observed morphology of the martensitic plates as well as the orientation between martensitic plates and the austenitic matrix. The developed phase-field model constitutes a general simulations approach for different kinds of phase transformation phenomena that inherently include dislocation based accommodation processes. The approach does not only predict the final equilibrium topology, misfit, size, crystallography, and aspect ratio of martensite-austenite ensembles resulting from a transformation, but it also resolves the associated dislocation dynamics and the distribution, and the size of the crystals itself.

  1. Modeling of soft impingement effect during solid-state partitioning phase transformations in binary alloys

    NARCIS (Netherlands)

    Chen, H.; Van der Zwaag, S.

    2010-01-01

    The soft impingement effect at the later stage of partitioning phase transformations has been modeled both for the diffusion-controlled growth model and for the mixed-mode model. Instead of the linear and exponential approximations for the concentration gradient in front of the interface used in the

  2. Organoids as Models for Neoplastic Transformation | Office of Cancer Genomics

    Science.gov (United States)

    Cancer models strive to recapitulate the incredible diversity inherent in human tumors. A key challenge in accurate tumor modeling lies in capturing the panoply of homo- and heterotypic cellular interactions within the context of a three-dimensional tissue microenvironment. To address this challenge, researchers have developed organotypic cancer models (organoids) that combine the 3D architecture of in vivo tissues with the experimental facility of 2D cell lines.

  3. Transforming System Engineering through Model-Centric Engineering

    Science.gov (United States)

    2015-11-18

    Resilient System Conceptual Representation of Environment [63] - Enhanced.... 26 Figure 13. Measurement Collection Instrument...Model- Based Enterprise [81], which brings in more focus on manufacturability. The concept characterized as Digital Thread2 envisions a frameworks ...that merges physics- based models generated by the discipline engineers during the detailed design process with MBSE’s conceptual and top-level

  4. Modelling Transformations of Quadratic Functions: A Proposal of Inductive Inquiry

    Science.gov (United States)

    Sokolowski, Andrzej

    2013-01-01

    This paper presents a study about using scientific simulations to enhance the process of mathematical modelling. The main component of the study is a lesson whose major objective is to have students mathematise a trajectory of a projected object and then apply the model to formulate other trajectories by using the properties of function…

  5. Comparison of multi-media transport and transformation models: Regional fugacity model vs. CalTOX

    Energy Technology Data Exchange (ETDEWEB)

    Maddalena, R.L.; McKone, T.E.; Layton, D.W.; Hsieh, D.P.H. [Univ. of California, Davis, CA (United States). Dept. of Environmental Toxicology

    1994-12-31

    Two multimedia fugacity based environmental transport and transformation models are summarized and compared. The regional fugacity model published by Mackay and Paterson (1991), termed Fug3ONT, is a four compartment steady-state model designed to simulate the relative distribution of nonionic in a multimedia system. CalTOX is a seven compartment multimedia total exposure model for hazardous waste sites. Both models are based on the principles of fugacity. CalTOX, however, separates the soil into three layers and uses a new approach to estimate the diffusive mass transfer rate in soil. These differences result in lower estimates of the steady-state contaminant concentrations of six different chemicals in the root soil of CalTOX as compared to the bulk soil of Fug3ONT. The difference is greatest for compounds such as 2,3,7,8-Tetrachlorodibenzo-p-dioxin and Benzo(a)pyrene where estimates from CalTOX and Fug3ONT differ by more than 3 orders of magnitude. The models provide similar estimates, however, for the distribution of six environmentally relevant chemicals among the air, water, sediment and surface soil.

  6. Comparison of multi-media transport and transformation models: regional fugacity model vs. CalTOX.

    Science.gov (United States)

    Maddalena, R L; McKone, T E; Layton, D W; Hsieh, D P

    1995-03-01

    Two multimedia environmental transport and transformation computer models are summarized and compared. The regional fugacity model published by Mackay and Paterson (1991), termed Fug3ONT, is a four compartment steady-state model designed to simulate the relative distribution of nonionic organic chemicals in a multimedia system. CalTOX is a seven compartment multimedia total exposure model for hazardous waste sites. Both models are based on the principles of fugacity. CalTOX, however, separates the soil into three layers (surface, root, and vadose) and uses a different approach to estimate the diffusive mass transfer rate in soil. These differences result in lower estimates of the steady-state contaminant concentrations of six environmentally relevant chemicals in the root soil of CalTOX as compared to the bulk soil of Fug3ONT. The difference is greatest for compounds with low mobility in soil such as 2,3,7,8-Tetrachlorodibenzo-p-dioxin and Benzo(a)pyrene where estimates from CalTOX and Fug3ONT differ by more than 3 orders of magnitude. Otherwise, the models provide similar estimates for the distribution of the six chemicals among the air, water, sediment and surface soil.

  7. Ionospheric parameter modelling and anomaly discovery by combining the wavelet transform with autoregressive models

    Directory of Open Access Journals (Sweden)

    Oksana V. Mandrikova

    2015-11-01

    Full Text Available The paper is devoted to new mathematical tools for ionospheric parameter analysis and anomaly discovery during ionospheric perturbations. The complex structure of processes under study, their a-priori uncertainty and therefore the complex structure of registered data require a set of techniques and technologies to perform mathematical modelling, data analysis, and to make final interpretations. We suggest a technique of ionospheric parameter modelling and analysis based on combining the wavelet transform with autoregressive integrated moving average models (ARIMA models. This technique makes it possible to study ionospheric parameter changes in the time domain, make predictions about variations, and discover anomalies caused by high solar activity and lithospheric processes prior to and during strong earthquakes. The technique was tested on critical frequency foF2 and total electron content (TEC datasets from Kamchatka (a region in the Russian Far East and Magadan (a town in the Russian Far East. The mathematical models introduced in the paper facilitated ionospheric dynamic mode analysis and proved to be efficient for making predictions with time advance equal to 5 hours. Ionospheric anomalies were found using model error estimates, those anomalies arising during increased solar activity and strong earthquakes in Kamchatka.

  8. Modelling of Sudan’s Energy Supply, Transformation, and Demand

    Directory of Open Access Journals (Sweden)

    Ali A. Rabah

    2016-01-01

    Full Text Available The study aimed to develop energy flow diagram (Sankey diagram of Sudan for the base year 2014. The developed Sankey diagram is the first of its kind in Sudan. The available energy balance for the base year 2012 is a simple line draw and did not count the energy supply by private and mixed sectors such as sugar and oil industries and marine and civil aviation. The private and mixed sectors account for about 7% of the national grid electric power. Four energy modules are developed: resources, transformation, demand, and export and import modules. The data are obtained from relevant Sudanese ministries and directorates and Sudan Central Bank. “e!Sankey 4 pro” software is used to develop the Sankey diagram. The main primary types of energy in Sudan are oil, hydro, biomass, and renewable energy. Sudan has a surplus of gasoline, petroleum coke, and biomass and deficit in electric power, gasoil, jet oil, and LPG. The surplus of gasoline is exported; however, the petroleum coke is kept as reserve. The deficit is covered by import. The overall useful energy is 76% and the loss is 24%. The useful energy is distributed among residential (38%, transportation (33%, industry (12%, services (16%, and agriculture (1% sectors.

  9. Wide band modeling of large power transformer windings for very fast transient overvoltage (VFTO) analysis

    Institute of Scientific and Technical Information of China (English)

    YANG Yu; WANG ZanJi

    2009-01-01

    There are some difficulties in using multi-transmission-line (MTL) model for wide band modeling of whole windings of the large power transformer. In this paper, the normalized MTL model is firstly de-rived, with which not only the difficulty of modeling windings with different turn-lengths using MTL can be solved, but also the model can be extended to the modeling of the multi-winding transformer. Sec-ondly, both MTL model and the lumped circuit model on turn basis are mathematically compared in validation of the frequency range and it is pointed out that the lumped circuit model on turn basis is generally valid below 2.5 MHz for EHV and UHV power transformers. Finally, based on the MTL equa-tions, a novel lumped circuit model is derived and it is shown that the valid frequency range of the new circuit is extended to about 4 MHz for modeling large EHV and UHV power transformer windings.

  10. Modeling of the mineral transformation during the combustion of coal; Modellierung der Mineralumwandlung bei der Kohleverbrennung

    Energy Technology Data Exchange (ETDEWEB)

    Strelow, M.; Magda, S.; Magda, A.; Mueller, H. [Technische Universitaet Braunschweig (Germany). Institut fuer Waerme- und Brennstofftechnik

    2009-07-01

    The employment of new materials in the construction of steam generators in order to increase the steam parameters requires a detailed knowledge of the processes of transformation of the coal minerals in the steam generator with respect to forecast the slagging and contamination of the materials. Analyses of the materials in the raw coal and their integration are the basis for the modelling of the transformation processes in CFD programs. The chemical and physical processes are the release and integration of alkaline compounds which have a strong influence on the formation of first contamination layers on the heating surfaces as well as the transformation of the minerals of ash particles on their flight paths by the steam generator. For fast reactions, the modelling of the mineral transformation is carried out by acceptance of a chemical equilibrium, otherwise by kinetic reaction approaches.

  11. Constitutive modelling of stainless steels for cryogenic applications. Strain induced martensitic transformation

    CERN Document Server

    Garion, C

    2001-01-01

    The 300-series stainless steels are metastable austenitic alloys: martensitic transformation occurs at low temperatures and/or when plastic strain fields develop in the structures. The transformation influences the mechanical properties of the material. The present note aims at proposing a set of constitutive equations describing the plastic strain induced martensitic transformation in the stainless steels at cryogenic temperatures. The constitutive modelling shall create a bridge between the material sciences and the structural analysis. For the structures developing and accumulating plastic deformations at sub-zero temperatures, it is of primary importance to be able to predict the intensity of martensitic transformation and its effect on the material properties. In particular, the constitutive model has been applied to predict the behaviour of the components of the LHC interconnections, the so-called bellows expansion joints (the LHC mechanical compensation system).

  12. Comparing Parameter Estimation Techniques for an Electrical Power Transformer Oil Temperature Prediction Model

    Science.gov (United States)

    Morris, A. Terry

    1999-01-01

    This paper examines various sources of error in MIT's improved top oil temperature rise over ambient temperature model and estimation process. The sources of error are the current parameter estimation technique, quantization noise, and post-processing of the transformer data. Results from this paper will show that an output error parameter estimation technique should be selected to replace the current least squares estimation technique. The output error technique obtained accurate predictions of transformer behavior, revealed the best error covariance, obtained consistent parameter estimates, and provided for valid and sensible parameters. This paper will also show that the output error technique should be used to minimize errors attributed to post-processing (decimation) of the transformer data. Models used in this paper are validated using data from a large transformer in service.

  13. Input-to-output transformation in a model of the rat hippocampal CA1 network

    OpenAIRE

    Olypher, Andrey V; Lytton, William W; Prinz, Astrid A.

    2012-01-01

    Here we use computational modeling to gain new insights into the transformation of inputs in hippocampal field CA1. We considered input-output transformation in CA1 principal cells of the rat hippocampus, with activity synchronized by population gamma oscillations. Prior experiments have shown that such synchronization is especially strong for cells within one millimeter of each other. We therefore simulated a one-millimeter patch of CA1 with 23,500 principal cells. We used morphologically an...

  14. A multistage differential transformation method for approximate solution of Hantavirus infection model

    Science.gov (United States)

    Gökdoğan, Ahmet; Merdan, Mehmet; Yildirim, Ahmet

    2012-01-01

    The goal of this study is presented a reliable algorithm based on the standard differential transformation method (DTM), which is called the multi-stage differential transformation method (MsDTM) for solving Hantavirus infection model. The results obtanied by using MsDTM are compared to those obtained by using the Runge-Kutta method (R-K-method). The proposed technique is a hopeful tool to solving for a long time intervals in this kind of systems.

  15. Fast and Parallel Spectral Transform Algorithms for Global Shallow Water Models

    Science.gov (United States)

    Jakob, Ruediger

    1993-01-01

    This dissertation examines spectral transform algorithms for the solution of the shallow water equations on the sphere and studies their implementation and performance on shared memory vector multiprocessors. Beginning with the standard spectral transform algorithm in vorticity divergence form and its implementation in the Fortran based parallel programming language Force, two modifications are researched. First, the transforms and matrices associated with the meridional derivatives of the associated Legendre functions are replaced by corresponding operations with the spherical harmonic coefficients. Second, based on the fast Fourier transform and the fast multipole method, a lower complexity algorithm is derived that uses fast transformations between Legendre and interior Fourier nodes, fast surface spherical truncation and a fast spherical Helmholtz solver. The first modification is fully implemented, and comparative performance data are obtained for varying resolution and number of processes, showing a significant storage saving and slightly reduced execution time on a Cray Y -MP 8/864. The important performance parameters for the spectral transform algorithm and its implementation on vector multiprocessors are determined and validated with the measured performance data. The second modification is described at the algorithmic level, but only the novel fast surface spherical truncation algorithm is implemented. This new multipole algorithm has lower complexity than the standard algorithm, and requires asymptotically only order N ^2log N operations per time step for a grid with order N^2 points. Because the global shallow water equations are similar to the horizontal dynamical component of general circulation models, the results can be applied to spectral transform numerical weather prediction and climate models. In general, the derived algorithms may speed up the solution of time dependent partial differential equations in spherical geometry. A performance model

  16. A transformation approach to modelling multi-modal diffusions

    DEFF Research Database (Denmark)

    Forman, Julie Lyng; Sørensen, Michael

    2014-01-01

    when the diffusion is observed with additional measurement error. The new approach is applied to molecular dynamics data in the form of a reaction coordinate of the small Trp-zipper protein, from which the folding and unfolding rates of the protein are estimated. Because the diffusion coefficient...... is state-dependent, the new models provide a better fit to this type of protein folding data than the previous models with a constant diffusion coefficient, particularly when the effect of errors with a short time-scale is taken into account....

  17. Software-Defined Networks (SDNs and Internet of Things (IoTs: A Qualitative Prediction for 2020

    Directory of Open Access Journals (Sweden)

    Sahrish Khan Tayyaba

    2016-11-01

    Full Text Available The Internet of Things (IoT is imminent technology grabbing industries and research attention with a fast stride. Currently, more than 15 billion devices are connected to the Internet and this number is expected to reach up to 50 billion by 2020. The data generated by these IoT devices are immensely high, creating resource allocation, flow management and security jeopardises in the IoT network. Programmability and centralised control are considered an alternative solution to address IoT issues. On the other hand, a Software Define Network (SDN provides a centralised and programmable control and management for the underlying network without changing existing network architecture. This paper surveys the state of the art on the IoT integration with the SDN. A comprehensive review and the generalised solutions over the period 2010-2016 is presented for the different communication domains. Furthermore, a critical review of the IoT and the SDN technologies, current trends in research and the futuristic contributing factors form part of the paper. The comparative analysis of the existing solutions of SDN based IoT implementation provides an easy and concise view of the emerging trends. Lastly, the paper predicts the future and presents a qualitative view of the world in 2020.

  18. A novel compact model for on-chip stacked transformers in RF-CMOS technology

    Institute of Scientific and Technical Information of China (English)

    Liu Jun; Wen Jincai; Zhao Qian; Sun Lingling

    2013-01-01

    A novel compact model for on-chip stacked transformers is presented.The proposed model topology gives a clear distinction to the eddy current,resistive and capacitive losses of the primary and secondary coils in the substrate.A method to analytically determine the non-ideal parasitics between the primary coil and substrate is provided.The model is further verified by the excellent match between the measured and simulated S-parameters on the extracted parameters for a 1 ∶ 1 stacked transformer manufactured in a commercial RF-CMOS technology.

  19. Data acquisition system and network transmission in power IOT%电力物联网的数据采集系统与网络传输

    Institute of Scientific and Technical Information of China (English)

    王金峰

    2013-01-01

    阐述了电力物联网的数据采集系统模型以及数据采集的网络传输方式,给出了电力系统数据采集网络设计与数据采集网络的实现方法。%The model of data acquisition system and network transmission mode of data acquisition in power IOT are elaborated. The network design for data acquisition of the power system and implementation method of data acquisition networks are offered.

  20. Modelling wave transformation across a fringing reef using swash

    NARCIS (Netherlands)

    Zijlema, M.

    2012-01-01

    This paper presents the application of the open source non-hydrostatic wave-flow model SWASH to wave propagation over a fringing reef, and the results are discussed and compared with observations obtained from a laboratory experiment subjected to various incident wave conditions. This study focus no

  1. Modelling wave transformation across a fringing reef using SWASH

    NARCIS (Netherlands)

    Zijlema, M.

    2012-01-01

    This paper presents the application of the open source non-hydrostatic wave-flow model SWASH to wave propagation over a fringing reef, and the results are discussed and compared with observations obtained from a laboratory experiment subjected to various incident wave conditions. This study focus no

  2. Degenerate Blume-Emery-Griffiths model for the martensitic transformation

    DEFF Research Database (Denmark)

    Vives, E.; Castan, T.; Lindgård, Per-Anker

    1996-01-01

    between two ordered phases. This is relevant for the martensitic transition problem. Mean-field calculations and Monte Carlo simulations are presented. The model predicts a constant entropy change at the transition for various transition temperatures in agreement with the behavior found experimentally....

  3. The Healing Web: A Transformative Model for Nursing.

    Science.gov (United States)

    Bunkers, Sandra Schmidt

    1992-01-01

    A Navajo legend describes a web woven by Spider Woman that saved the people during a great flood. This article uses the imagery of the web to help education and service think more clearly about nursing's future. The Healing Web project seeks to educate nurses in a futuristic differentiated model. (Author/JOW)

  4. Model-driven design, refinement and transformation of abstract interactions

    NARCIS (Netherlands)

    Almeida, João Paolo A.; Dijkman, Remco; Ferreira Pires, Luis; Quartel, Dick; Sinderen, van Marten

    2006-01-01

    In a model-driven design process the interaction between application parts can be described at various levels of platform-independence. At the lowest level of platform-independence, interaction is realized by interaction mechanisms provided by specific middleware platforms. At higher levels of platf

  5. On the renormalization group transformation for scalar hierarchical models

    Energy Technology Data Exchange (ETDEWEB)

    Koch, H. (Texas Univ., Austin (USA). Dept. of Mathematics); Wittwer, P. (Geneva Univ. (Switzerland). Dept. de Physique Theorique)

    1991-06-01

    We give a new proof for the existence of a non-Gaussian hierarchical renormalization group fixed point, using what could be called a beta-function for this problem. We also discuss the asymptotic behavior of this fixed point, and the connection between the hierarchical models of Dyson and Gallavotti. (orig.).

  6. The Development Of Windows Service Based Data Log System Using Light Dependent Resistor And Thingspeak IOT Cloud Platform

    Directory of Open Access Journals (Sweden)

    Tristan Jay P. Calaguas

    2015-08-01

    Full Text Available Microcontrollers are using in control and information processing it can be used in wide application such as agriculture health care commercial facilities robotics and education. These micro controllers are computers in chip that comprises of input and output ports central processing unit registers and main memory as well as communication interface such as Ethernet interface serial interface High Definition Multimedia Interface power source and many existing interface that can be found in this type of computer. In this study the researcher decided to conceptualize an innovative application of this type of computer where it has a potential to use as tracking system in specific individuals activities. Since some of office people are complaining in CCTV camera about their privacy this innovative concept of technology is in similar purpose but if we will compare the application concept in closed circuit camera the researcher decided to use visual graph instead video data that is in high exposure In the first phase the researcher made a concept on how the simple Light Dependent Resistor will apply in Schools Office Environment Application domain using microcontroller that was used as data log system and how this can be optimized without forcing the Dean or any designated person in office to operate it in hand due to their busy working hours. In the second phase the researcher develop the proposed data log system that are acquiring data through light luminance from fluorescent light of deans office and sending it in the IOT cloud platform. The researcher used fuzzy logic theory to model the operation of the proposed data log system. This study used experimental type of research when the prototype was developed during second phase the researcher simulated the operation. As the result the proposed data log system is sending data to Thingspeak IOT Cloud platform it displays the correct output which based from the rules and it is in column graph content

  7. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  8. 物联网让电网更智能%Made power grid smarter by IOT

    Institute of Scientific and Technical Information of China (English)

    金志刚; 刘佳

    2011-01-01

    IOT is the fucus of research and the government pays attention to it. This paper gives the development of IOT and smart grid. The future of China smart grid and the application of IOT in smart grid are discussed. In this paper,the challenge in IOT for smart grid is also gived.%物联网技术近年来已成为国内外研究的热点,其发展引起了我国政府的高度重视。本文首先介绍了物联网的发展,进而介绍了智能电网的概念。重点叙述了国内未来智能电网的发展模式,以及现阶段国内外物联网技术在智能电网中的应用。最后,指出我国面向智能电网的物联网技术发展存在的问题与挑战。

  9. A Software Product Line Process to Develop Agents for the IoT.

    Science.gov (United States)

    Ayala, Inmaculada; Amor, Mercedes; Fuentes, Lidia; Troya, José M

    2015-07-01

    One of the most important challenges of this decade is the Internet of Things (IoT), which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL). Specifically, we propose to use Self-StarMASMAS, multi-agent system) agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  10. Using OSUS and node red to integrate IoT devices based on events

    Science.gov (United States)

    Klawon, Kevin; Ryan, Pat; Gold, Joshua

    2017-05-01

    The Army Research Lab's Open Standard for Unattended Sensors (OSUS) is an extensible vendor-neutral sensor controller. OSUS provides a simple user interface for connecting to sensors and a rudimentary data processing capability. Integrating Open Source Internet of Things (IoT) technology such as Node Red can greatly extend the capabilities of OSUS and improve the User Experience.

  11. Cloud Computing and Validated Learning for Accelerating Innovation in IoT

    Science.gov (United States)

    Suciu, George; Todoran, Gyorgy; Vulpe, Alexandru; Suciu, Victor; Bulca, Cristina; Cheveresan, Romulus

    2015-01-01

    Innovation in Internet of Things (IoT) requires more than just creation of technology and use of cloud computing or big data platforms. It requires accelerated commercialization or aptly called go-to-market processes. To successfully accelerate, companies need a new type of product development, the so-called validated learning process.…

  12. Research of data management in IOT%物联网数据管理研究

    Institute of Scientific and Technical Information of China (English)

    胡迎新; 马新娜; 郑丽娟

    2014-01-01

    IOT can realize thing-thing and human-thing intelligent interaction. The wide application of IOT depends on efifcient data management. The problems existing in data management are analyzed according to the data characteristic, formation and transmission process in IOT. An IOT data management framework based on cloud computing platform is presented on the basis of research on the existing techniques of data management. The functions that should be accomplished under this framework are pointed out and its realization idea is offered in this paper.%物联网可实现物与物、人与物的智能交互,而物联网的广泛应用则要依赖有效的数据管理。文中针对物联网中数据的特点、组成和数据的流转过程,分析了物联网数据管理所面临的问题,并在对现有数据管理技术进行研究的基础上,提出了物联网环境下基于云计算平台的数据管理框架,同时指出了在此框架下应完成的功能和实现思路。

  13. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2017-06-29

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the successful transmission capacity of the overall network alongside reducing the multi-hop transmission delay in order to support mission critical applications. There is a delicate interplay between the carrier sensing threshold of the contention based medium access protocol and the choice of packet forwarding strategy selected at each hop by the devices. The fundamental problem in optimizing the performance of such networks is to balance the tradeoff between conflicting performance objectives such as the spatial frequency reuse, transmission quality, and packet progress towards the destination. In this paper, we use a stochastic geometry approach to quantify the performance of multi-hop massive IoT networks in terms of the spatial frequency reuse and the transmission quality under different packet forwarding schemes. We also develop a comprehensive performance metric that can be used to optimize the system to achieve the best performance. The results can be used to select the best forwarding scheme and tune the carrier sensing threshold to optimize the performance of the network according to the delay constraints and transmission quality requirements.

  14. For Safety and Security Reasons: The Cost of Component-Isolation in IoT

    Directory of Open Access Journals (Sweden)

    Zuepke Alexander

    2016-10-01

    Full Text Available The current development trend of Internet of Things (IoT aims for a tighter integration of mobile and stationary devices via various networks. This includes communication of vehicles to roadside infrastructure (V2I, as well as intelligent sensors / actors in Logistics and smart home environments.

  15. Hearables in hearing care: discovering usage patterns through IoT devices

    DEFF Research Database (Denmark)

    Johansen, Benjamin; Flet-Berliac, Yannis Paul Raymond; Korzepa, Maciej Jan

    2017-01-01

    Hearables are on the rise as next generation wearables, capable of streaming audio, modifying soundscapes or functioning as biometric sensors. The recent introduction of IoT (Internet of things) connected hearing aids o er new opportunities for hearables to collect QS quantified self data...

  16. A Software Product Line Process to Develop Agents for the IoT

    Directory of Open Access Journals (Sweden)

    Inmaculada Ayala

    2015-07-01

    Full Text Available One of the most important challenges of this decade is the Internet of Things (IoT, which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL. Specifically, we propose to use Self-StarMASMAS, multi-agent system agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  17. NitroScape: A model to integrate nitrogen transfers and transformations in rural landscapes

    Energy Technology Data Exchange (ETDEWEB)

    Duretz, S. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Drouet, J.L., E-mail: Jean-Louis.Drouet@grignon.inra.fr [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Durand, P. [INRA-AgroCampus, UMR 1069 Sol Agro et hydrosysteme Spatialisation (SAS), 35042 Rennes cedex (France); Hutchings, N.J. [Department of Agroecology, Faculty of Agricultural Sciences, University of Aarhus (AU), Blichers Alle, 8830 Tjele (Denmark); Theobald, M.R. [Department of Chemistry and Agricultural Analysis, Technical University of Madrid (UPM), 28040 Madrid (Spain); Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Salmon-Monviola, J. [INRA-AgroCampus, UMR 1069 Sol Agro et hydrosysteme Spatialisation (SAS), 35042 Rennes cedex (France); Dragosits, U. [Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Maury, O. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France); Sutton, M.A. [Centre for Ecology and Hydrology (CEH), Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Cellier, P. [INRA-AgroParisTech, UMR 1091 Environnement et Grandes Cultures (EGC), 78850 Thiverval-Grignon (France)

    2011-11-15

    Modelling nitrogen transfer and transformation at the landscape scale is relevant to estimate the mobility of the reactive forms of nitrogen (N{sub r}) and the associated threats to the environment. Here we describe the development of a spatially and temporally explicit model to integrate N{sub r} transfer and transformation at the landscape scale. The model couples four existing models, to simulate atmospheric, farm, agro-ecosystem and hydrological N{sub r} fluxes and transformations within a landscape. Simulations were carried out on a theoretical landscape consisting of pig-crop farms interspersed with unmanaged ecosystems. Simulation results illustrated the effect of spatial interactions between landscape elements on N{sub r} fluxes and losses to the environment. More than 10% of the total N{sub 2}O emissions were due to indirect emissions. The nitrogen budgets and transformations of the unmanaged ecosystems varied considerably, depending on their location within the landscape. The model represents a new tool for assessing the effect of changes in landscape structure on N{sub r} fluxes. - Highlights: > The landscape scale is relevant to study how spatial interactions affect N{sub r} fate. > The NitroScape model integrates N{sub r} transfer and transformation at landscape scale. > NitroScape couples existing atmospheric, farm, agro-ecosystem and hydrological models. > Data exchanges within NitroScape are dynamic and spatially distributed. > More than 10% of the simulated N{sub 2}O emissions are due to indirect emissions. - A model integrating terrestrial, hydrological and atmospheric processes of N{sub r} transfer and transformation at the landscape scale has been developed to simulate the effect of spatial interactions between landscape elements on N{sub r} fate.

  18. Role of transformational leadership on employee productivity of teaching hospitals: using structural equation modeling.

    Science.gov (United States)

    Vatankhah, Soudabeh; Alirezaei, Samira; Khosravizadeh, Omid; Mirbahaeddin, Seyyed Elmira; Alikhani, Mahtab; Alipanah, Mobarakeh

    2017-08-01

    In today's transforming world, increased productivity and efficient use of existing facilities are practically beyond a choice and become a necessity. In this line, attention to change and transformation is one of the affecting factors on the growth of productivity in organizations, especially in hospitals. To examine the effect of transformational leadership on the productivity of employees in teaching hospitals affiliated to Iran University of Medical Sciences. This cross-sectional study was conducted on 254 participants from educational and medical centers affiliated to Iran University of Medical Sciences (Tehran, Iran) in 2016. The standard questionnaires of Bass & Avolio and of Hersi & Goldsmith were used to respectively assess transformational leadership and level of productivity. The research assumptions were tested in a significance level of 0.05 by applying descriptive statistics and structural equations modeling (SEM) using SPSS 19 and Amos 24. Results of the fitting indicators of the assessing model after amending includes Chi-square two to degrees of freedom of 2.756, CFI indicator 0.95, IFI indicator 0.92, Root mean square error of approximation (RMSEA) indicator 0.10. These results indicate that the assessing model is well fitting after the amendment. Also, analysis of the model's assumptions and the final model of the research reveals the effect of transformational leadership on employees' productivity with a significance level of 0.83 (p=0.001). This research indicates that the more the leadership and decision-making style in hospitals lean towards transformational mode, the more positive outcomes it brings among employees and the organization due to increased productivity. Therefore, it is essential to pay focused attention to training/educational programs in organizations to create and encourage transformational leadership behaviors which hopefully lead to more productive employees.

  19. Detailed High Frequency Models of Various Winding Types in Power Transformers

    DEFF Research Database (Denmark)

    Pedersen, Kenneth; Lunow, Morten Erlandsson; Holbøll, Joachim

    2005-01-01

    Abstract--In this paper, techniques are described which demonstrate how a highly detailed internal transformer model can be obtained systematically with Matlab and how it can be prepared for subsequent transient analysis. The input of such a model will mainly be the description of the cross secti...

  20. QUESTION THE VALIDITY OF ADMINISTRATIVE DECISIONS ON BIZNES TRANSFORMATION MODEL COMPANIES BASED TRANSACTIONS MERGER OR ACQUISITION

    Directory of Open Access Journals (Sweden)

    E. Kravchenko

    2014-04-01

    Full Text Available The main criteria for assessing the degree of problematical current business model. The methodical approach to determining the nature of the manifestation of the motives of mergers and acquisitions. Designed card priorities managerial decisions on the transformation business model.

  1. Analysis of errors in spectral reconstruction with a Laplace transform pair model

    Energy Technology Data Exchange (ETDEWEB)

    Archer, B.R.; Bushong, S.C. (Baylor Univ., Houston, TX (USA). Coll. of Medicine); Wagner, L.K. (Texas Univ., Houston (USA). Dept. of Radiology); Johnston, D.A.; Almond, P.R. (Anderson (M.D.) Hospital and Tumor Inst., Houston, TX (USA))

    1985-05-01

    The sensitivity of a Laplace transform pair model for spectral reconstruction to random errors in attenuation measurements of diagnostic x-ray units has been investigated. No spectral deformation or significant alteration resulted from the simulated attenuation errors. It is concluded that the range of spectral uncertainties to be expected from the application of this model is acceptable for most scientific applications.

  2. LTE和物联网融合%The Mergence of LTE & IoT

    Institute of Scientific and Technical Information of China (English)

    李铁峰; 黄耀军; 张震

    2013-01-01

      物联网被誉为是推动产业升级迈向信息社会的发动机。具有物联网特征的相关应用层出不穷。LTE和物联网是两个方兴未艾的技术,在技术和市场的推动下,二者融合得将更加紧密,LTE(Long Term Evolution)和物联网(Internet of Things)是当今炙手可热的两个话题。简要介绍了物联网和LTE技术,阐述了物联网技术中机器类型通信(MTC)的概念、架构和技术,详细说明了LTE网络在物联网中的地位、与MTC的融合应用,描绘了LTE网络在物联网应用中的美好前景,同时指出了面临的问题和挑战。%IoT (Internet of Things) is regarded as the engine for promoting industry upgrade and strding forward towards the information society, and the relevant applications of IoT emerge in an endless stream. LTE (Long Term Evolution) and IoT are the two technologies in the ascendant, and with the promotion of technical development and market, these two technologies are even more closely emerged. Nowadays LTE and IoT are the two hottest topics. This article briefly describes the technologies of LTE and IoT, tells of the concept, architecture and technology of MTC (Machine Type Communication) in IoT, and treats of the position of LTE network in IoT and the merged applications with MTC. Meanwhile it points out the problems and challenges while expounding the bright future of LTE network in the applications of IoT.

  3. Modeling the fractional magnetic states of magnetostructural transformations

    Energy Technology Data Exchange (ETDEWEB)

    Della Torre, Edward [Department of Electrical and Computer Engineering, The George Washington University, Washington, DC 20052 (United States); ElBidweihy, Hatem, E-mail: hatem@gwmail.gwu.edu [Department of Electrical and Computer Engineering, The George Washington University, Washington, DC 20052 (United States); Provenzano, Virgil [National Institute for Standards and Technology, Gaithersburg, MD 20899 (United States); Bennett, Lawrence H. [Department of Electrical and Computer Engineering, The George Washington University, Washington, DC 20052 (United States)

    2014-02-15

    The large inverse magnetocaloric effect (MCE) in the off-stoichiometric Heusler alloys occurs at a critical temperature near room temperature. At this temperature, the material is in a mixed-state and can have a variable ratio of two stable magnetic crystallographic-states; a high magnetization state (HM) and a low magnetization state (LM). The field-induced thermal hysteresis in the virgin curve of Ni{sub 50}Mn{sub 35}In{sub 15} and the virgin first-order reversal curves (VFORC) are presented. A model is introduced to describe the descending branches of these curves based on the different magnetic fields of conversion (from HM to LM). Using limited measurements, the model is used as a tool to determine the fractions of the two crystallographic-states within the mixed-state region.

  4. Transforming System Engineering through Model-Centric Engineering

    Science.gov (United States)

    2015-01-31

    can be addressed through “engineering,” and NAVAIR is making some headway on this item. As for item #3, this topic relates to a question posed by...through “engineering,” and NAVAIR is making some headway on this item. The third topic relates to a question posed by our sponsor after our review of the...ACAT Acquisition Category AFT Architecture Framework Tool of NASA/JPL AGI Analytical Graphics, Inc. AGM Acquisition Guidance Model ANSI American

  5. Transforming a Competency Model to Parameterised Questions in Assessment

    Science.gov (United States)

    Sitthisak, Onjira; Gilbert, Lester; Davis, Hugh C.

    The problem of comparing and matching different learners’ knowledge arises when assessment systems use a one-dimensional numerical value to represent “knowledge level”. Such assessment systems may measure inconsistently because they estimate this level differently and inadequately. The multi-dimensional competency model called COMpetence-Based learner knowledge for personalized Assessment (COMBA) is being developed to represent a learner’s knowledge in a multi-dimensional vector space. The heart of this model is to treat knowledge, not as possession, but as a contextualized space of capability either actual or potential. The paper discusses a system for automatically generating questions from the COMBA competency model as a “guide-on-the-side”. The system’s novel design and implementation involves an ontological database that represents the intended learning outcome to be assessed across a number of dimensions, including level of cognitive ability and subject matter. The system generates all the questions that are possible from a given learning outcome, which may then be used to test for understanding, and so could determine the degree to which learners actually acquire the desired knowledge.

  6. BOX-COX transformation and random regression models for fecal egg count data

    Directory of Open Access Journals (Sweden)

    Marcos Vinicius Silva

    2012-01-01

    Full Text Available Accurate genetic evaluation of livestock is based on appropriate modeling of phenotypic measurements. In ruminants fecal egg count (FEC is commonly used to measure resistance to nematodes. FEC values are not normally distributed and logarithmic transformations have been used to achieve normality before analysis. However, the transformed data are often not normally distributed, especially when data are extremely skewed. A series of repeated FEC measurements may provide information about the population dynamics of a group or individual. A total of 6,375 FEC measures were obtained for 410 animals between 1992 and 2003 from the Beltsville Agricultural Research Center Angus herd. Original data were transformed using an extension of the Box-Cox transformation to approach normality and to estimate (covariance components. We also proposed using random regression models (RRM for genetic and non-genetic studies of FEC. Phenotypes were analyzed using RRM and restricted maximum likelihood. Within the different orders of Legendre polynomials used, those with more parameters (order 4 adjusted FEC data best. Results indicated that the transformation of FEC data utilizing the Box-Cox transformation family was effective in reducing the skewness and kurtosis, and dramatically increased estimates of heritability, and measurements of FEC obtained in the period between 12 and 26 weeks in a 26-week experimental challenge period are genetically correlated.

  7. Design and Modeling of an Integrated Micro-Transformer in a Flyback Converter

    Directory of Open Access Journals (Sweden)

    M. Derkaoui

    2013-11-01

    Full Text Available This paper presents the design and modeling of a square micro-transformer for its integration in a flyback converter. From the specifications of the switching power supply, we determined the geometric parameters of this micro-transformer. The π-electrical model of this micro-transformer highlights all parasitic effects generated by stacking of different material layers and permits to calculate the technological parameters by using the S-parameters. A good dimensioning of the geometrical parameters reduces efficiently the energy losses in the micro-transformer and permits to reach the desirable value of the converter output voltage. We have also simulated the electromagnetic effects with the help of the software FEMLAB3.1 in two cases. The first case, without ferromagnetic core, the second case with ferromagnetic core, in order to choose the micro-transformer that has better electromagnetic compatibility with the vicinity components. To validate dimensioning of the geometrical and technological parameters, we have simulated with the help of the software PSIM6.0, the equivalent electrical circuit of the converter containing the electrical circuit of the dimensioned planar micro-transformer.

  8. ANIMATION STRATEGIES FOR SMOOTH TRANSFORMATIONS BETWEEN DISCRETE LODS OF 3D BUILDING MODELS

    Directory of Open Access Journals (Sweden)

    M. Kada

    2016-06-01

    Full Text Available The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advanced techniques to improve the quality and time response of dynamic scenes. The main focus of this article concentrates on the discussion of strategies for smooth transformation between two discrete levels of detail (LOD of 3D building models that are represented as restricted triangle meshes. Because the operation order determines the geometrical and topological properties of the transformation process as well as its visual perception by a human viewer, three different strategies are proposed and subsequently analyzed. The simplest one orders transformation operations by the length of the edges to be collapsed, while the other two strategies introduce a general transformation direction in the form of a moving plane. This plane either pushes the nodes that need to be removed, e.g. during the transformation of a detailed LOD model to a coarser one, towards the main building body, or triggers the edge collapse operations used as transformation paths for the cartographic generalization.

  9. Animation Strategies for Smooth Transformations Between Discrete Lods of 3d Building Models

    Science.gov (United States)

    Kada, Martin; Wichmann, Andreas; Filippovska, Yevgeniya; Hermes, Tobias

    2016-06-01

    The cartographic 3D visualization of urban areas has experienced tremendous progress over the last years. An increasing number of applications operate interactively in real-time and thus require advanced techniques to improve the quality and time response of dynamic scenes. The main focus of this article concentrates on the discussion of strategies for smooth transformation between two discrete levels of detail (LOD) of 3D building models that are represented as restricted triangle meshes. Because the operation order determines the geometrical and topological properties of the transformation process as well as its visual perception by a human viewer, three different strategies are proposed and subsequently analyzed. The simplest one orders transformation operations by the length of the edges to be collapsed, while the other two strategies introduce a general transformation direction in the form of a moving plane. This plane either pushes the nodes that need to be removed, e.g. during the transformation of a detailed LOD model to a coarser one, towards the main building body, or triggers the edge collapse operations used as transformation paths for the cartographic generalization.

  10. Energy Efficient IoT Data Collection in Smart Cities Exploiting D2D Communications

    Science.gov (United States)

    Orsino, Antonino; Araniti, Giuseppe; Militano, Leonardo; Alonso-Zarate, Jesus; Molinaro, Antonella; Iera, Antonio

    2016-01-01

    Fifth Generation (5G) wireless systems are expected to connect an avalanche of “smart” objects disseminated from the largest “Smart City” to the smallest “Smart Home”. In this vision, Long Term Evolution-Advanced (LTE-A) is deemed to play a fundamental role in the Internet of Things (IoT) arena providing a large coherent infrastructure and a wide wireless connectivity to the devices. However, since LTE-A was originally designed to support high data rates and large data size, novel solutions are required to enable an efficient use of radio resources to convey small data packets typically exchanged by IoT applications in “smart” environments. On the other hand, the typically high energy consumption required by cellular communications is a serious obstacle to large scale IoT deployments under cellular connectivity as in the case of Smart City scenarios. Network-assisted Device-to-Device (D2D) communications are considered as a viable solution to reduce the energy consumption for the devices. The particular approach presented in this paper consists in appointing one of the IoT smart devices as a collector of all data from a cluster of objects using D2D links, thus acting as an aggregator toward the eNodeB. By smartly adapting the Modulation and Coding Scheme (MCS) on the communication links, we will show it is possible to maximize the radio resource utilization as a function of the total amount of data to be sent. A further benefit that we will highlight is the possibility to reduce the transmission power when a more robust MCS is adopted. A comprehensive performance evaluation in a wide set of scenarios will testify the achievable gains in terms of energy efficiency and resource utilization in the envisaged D2D-based IoT data collection. PMID:27338385

  11. Energy Efficient IoT Data Collection in Smart Cities Exploiting D2D Communications

    Directory of Open Access Journals (Sweden)

    Antonino Orsino

    2016-06-01

    Full Text Available Fifth Generation (5G wireless systems are expected to connect an avalanche of “smart” objects disseminated from the largest “Smart City” to the smallest “Smart Home”. In this vision, Long Term Evolution-Advanced (LTE-A is deemed to play a fundamental role in the Internet of Things (IoT arena providing a large coherent infrastructure and a wide wireless connectivity to the devices. However, since LTE-A was originally designed to support high data rates and large data size, novel solutions are required to enable an efficient use of radio resources to convey small data packets typically exchanged by IoT applications in “smart” environments. On the other hand, the typically high energy consumption required by cellular communications is a serious obstacle to large scale IoT deployments under cellular connectivity as in the case of Smart City scenarios. Network-assisted Device-to-Device (D2D communications are considered as a viable solution to reduce the energy consumption for the devices. The particular approach presented in this paper consists in appointing one of the IoT smart devices as a collector of all data from a cluster of objects using D2D links, thus acting as an aggregator toward the eNodeB. By smartly adapting the Modulation and Coding Scheme (MCS on the communication links, we will show it is possible to maximize the radio resource utilization as a function of the total amount of data to be sent. A further benefit that we will highlight is the possibility to reduce the transmission power when a more robust MCS is adopted. A comprehensive performance evaluation in a wide set of scenarios will testify the achievable gains in terms of energy efficiency and resource utilization in the envisaged D2D-based IoT data collection.

  12. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  13. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  14. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  15. Energy Efficient IoT Data Collection in Smart Cities Exploiting D2D Communications.

    Science.gov (United States)

    Orsino, Antonino; Araniti, Giuseppe; Militano, Leonardo; Alonso-Zarate, Jesus; Molinaro, Antonella; Iera, Antonio

    2016-06-08

    Fifth Generation (5G) wireless systems are expected to connect an avalanche of "smart" objects disseminated from the largest "Smart City" to the smallest "Smart Home". In this vision, Long Term Evolution-Advanced (LTE-A) is deemed to play a fundamental role in the Internet of Things (IoT) arena providing a large coherent infrastructure and a wide wireless connectivity to the devices. However, since LTE-A was originally designed to support high data rates and large data size, novel solutions are required to enable an efficient use of radio resources to convey small data packets typically exchanged by IoT applications in "smart" environments. On the other hand, the typically high energy consumption required by cellular communications is a serious obstacle to large scale IoT deployments under cellular connectivity as in the case of Smart City scenarios. Network-assisted Device-to-Device (D2D) communications are considered as a viable solution to reduce the energy consumption for the devices. The particular approach presented in this paper consists in appointing one of the IoT smart devices as a collector of all data from a cluster of objects using D2D links, thus acting as an aggregator toward the eNodeB. By smartly adapting the Modulation and Coding Scheme (MCS) on the communication links, we will show it is possible to maximize the radio resource utilization as a function of the total amount of data to be sent. A further benefit that we will highlight is the possibility to reduce the transmission power when a more robust MCS is adopted. A comprehensive performance evaluation in a wide set of scenarios will testify the achievable gains in terms of energy efficiency and resource utilization in the envisaged D2D-based IoT data collection.

  16. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  17. MDA-BASED ATL TRANSFORMATION TO GENERATE MVC 2 WEB MODELS

    Directory of Open Access Journals (Sweden)

    Samir Mbarki

    2011-09-01

    Full Text Available Development and maintenance of Web application is still a complex and error-prone process. We need integrated techniques and tool support for automated generation of Web systems and a ready prescription for easy maintenance. The MDA approach proposes an architecture taking into account the development and maintenance of large and complex software. In this paper, we apply MDA approach for generating PSM from UML design to MVC 2Web implementation. That is why we have developed two meta-models handling UML class diagrams and MVC 2 Web applications, then we have to set up transformation rules. These last are expressed in ATL language. To specify the transformation rules (especially CRUD methods we used a UML profiles. To clearly illustrate the result generated by this transformation, weconverted the XMI file generated in an EMF (Eclipse Modeling Framework model.

  18. Decision Model for Life Cycle Assessment of Power Transformer during Load Violation

    Directory of Open Access Journals (Sweden)

    S. S. Bhandari

    2010-05-01

    Full Text Available Utility have normally planned the power transformer based on its designed load demand for the long term. Due to unexpected penetration, the actual load profile does not always follow the designed load and load violation will occur at some points during the life cycle of the power transformer for which the utility is inevitably required to make strategic decision. In the past, the decisions were mainly focused on the technical condition of the assetwithout any consideration to investment budget limitation. In this paper, an alternative methodology comprising of knowledge based model, financial model and decision criteria is proposed to make an optimal decision during load violation. A generic power system similar to Nepal Electricity Authority’s context was utilized as a case study. The result depicts that this model can effectively assess the life cycle of power transformer balancing both the financialand technical constraints.

  19. A study of a hamiltonian model for martensitic phase transformations including microkinetic energy

    CERN Document Server

    Theil, F

    1998-01-01

    How can a system in a macroscopically stable state explore energetically more favorable states, which are far away from the current equilibrium state? Based on continuum mechanical considerations we derive a Boussinesq-type equation which models the dynamics of martensitic phase transformations. The solutions of the system, which we refer to as microkinetically regularized wave equation exhibit strong oscillations after short times, thermalization can be confirmed. That means that macroscopic fluctuations of the solutions decay at the benefit of microscopic fluctuations. First analytical and numerical results on the propagation of phase boundaries and thermalization effects are presented. Despite the fact that model is conservative, it exhibits the hysteretic behavior. Such a behavior is usually interpreted in macroscopic models in terms of dissipative threshold which the driving force has to overcome to ensure that the phase transformation proceeds. The threshold value depends on the amount of the transforme...

  20. MDA-based ATL transformation to generate MVC 2 web models

    CERN Document Server

    Rahmouni, M'hamed

    2011-01-01

    Development and maintenance of Web application is still a complex and error-prone process. We need integrated techniques and tool support for automated generation of Web systems and a ready prescription for easy maintenance. The MDA approach proposes an architecture taking into account the development and maintenance of large and complex software. In this paper, we apply MDA approach for generating PSM from UML design to MVC 2Web implementation. That is why we have developed two meta-models handling UML class diagrams and MVC 2 Web applications, then we have to set up transformation rules. These last are expressed in ATL language. To specify the transformation rules (especially CRUD methods) we used a UML profiles. To clearly illustrate the result generated by this transformation, we converted the XMI file generated in an EMF (Eclipse Modeling Framework) model.

  1. A Temperature Prediction Model for Oil-immersed Transformer Based on Thermal-circuit Theory

    Institute of Scientific and Technical Information of China (English)

    WEI Ben-gang; LIN Jun; TAN Li; GAO Kai; LIU Jia-yu; LI Hua-long; LI Jiang-tao

    2012-01-01

    This paper proposed an improved temperature prediction model for oil-immersed transformer.The influences of the environmental temperature and heat-sinking capability changing with temperature were considered.When calculating the heat dissipation from the transformer tank to surroundings,the average oil temperature was selected as the node value in the thermal circuit.The new thermal models will be validated with the delivery experimental data of three transformers:a 220 kV-300 MV·A unit,a 110 kV-40 MV ·A unit and a 220 kV-75 MV ·A unit.Meanwhile,the results from the proposed model were also compared with two methods recommended in the IEC loading guide.

  2. Numerical model of phase transformation of steel C80U during hardening

    Directory of Open Access Journals (Sweden)

    T. Domański

    2007-12-01

    Full Text Available The article concerns numerical modelling of the phase transformations in solid state hardening of tool steel C80U. The transformations were assumed: initial structure – austenite, austenite – perlite, bainite and austenite – martensite. Model for evaluation of fractions of phases and their kinetics based on continuous heating diagram (CHT and continuous cooling diagram (CCT. The dilatometric tests on the simulator of thermal cycles were performed. The results of dilatometric tests were compared with the results of the test numerical simulations. In this way the derived models for evaluating phase content and kinetics of transformations in heating and cooling processes were verified. The results of numerical simulations confirm correctness of the algorithm that were worked out. In the numerical example the simulated estimation of the phase fraction in the hardened axisimmetrical element was performed.

  3. Continuous Cooling Transformation Behavior and Kinetic Models of Transformations for an Ultra-Low Carbon Bainitic Steel

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhi-min; CAI Qing-wu; YU Wei; LIXiao-lin; WANG Li-dong

    2012-01-01

    The aim was to investigate transformation behavior and transformation kinetics of an ultra-low carbon bai- nitic steel during continuous cooling. Continuous cooling transformation (CCT) curves of tested steel were measured by thermal dilatometer and metallographic structures at room temperature were observed by optical microscope. Then transformation kinetic equation of austenite to ferrite as well as austenite to bainite was established by analyzing the relationship of lnln]-l/(1--f)] and lnt in the kinetic equation on the basis of processed experimental data. Finally, the measured and calculated kinetic behaviors of the steel during continuous cooling were compared and growth pat- terns of transformed ferrite and bainite were analyzed. Results showed that calculated result was in reasonable agree- ment with the experimental data. It could be concluded that the growth modes of transformed ferrite and bainite were mainly one dimension as the Avrami exponents were between 1 and 2.

  4. Finite field-dependent BRST-anti-BRST transformations: Jacobians and application to the Standard Model

    Science.gov (United States)

    Yu. Moshin, Pavel; Reshetnyak, Alexander A.

    2016-07-01

    We continue our research1-4 and extend the class of finite BRST-anti-BRST transformations with odd-valued parameters λa, a = 1, 2, introduced in these works. In doing so, we evaluate the Jacobians induced by finite BRST-anti-BRST transformations linear in functionally-dependent parameters, as well as those induced by finite BRST-anti-BRST transformations with arbitrary functional parameters. The calculations cover the cases of gauge theories with a closed algebra, dynamical systems with first-class constraints, and general gauge theories. The resulting Jacobians in the case of linearized transformations are different from those in the case of polynomial dependence on the parameters. Finite BRST-anti-BRST transformations with arbitrary parameters induce an extra contribution to the quantum action, which cannot be absorbed into a change of the gauge. These transformations include an extended case of functionally-dependent parameters that implies a modified compensation equation, which admits nontrivial solutions leading to a Jacobian equal to unity. Finite BRST-anti-BRST transformations with functionally-dependent parameters are applied to the Standard Model, and an explicit form of functionally-dependent parameters λa is obtained, providing the equivalence of path integrals in any 3-parameter Rξ-like gauges. The Gribov-Zwanziger theory is extended to the case of the Standard Model, and a form of the Gribov horizon functional is suggested in the Landau gauge, as well as in Rξ-like gauges, in a gauge-independent way using field-dependent BRST-anti-BRST transformations, and in Rξ-like gauges using transverse-like non-Abelian gauge fields.

  5. Voices of innovation: building a model for curriculum transformation.

    Science.gov (United States)

    Phillips, Janet M; Resnick, Jerelyn; Boni, Mary Sharon; Bradley, Patricia; Grady, Janet L; Ruland, Judith P; Stuever, Nancy L

    2013-05-07

    Innovation in nursing education curriculum is critically needed to meet the demands of nursing leadership and practice while facing the complexities of today's health care environment. International nursing organizations, the Institute of Medicine, and; our health care practice partners have called for curriculum reform to ensure the quality and safety of patient care. While innovation is occurring in schools of nursing, little is being researched or disseminated. The purposes of this qualitative study were to (a) describe what innovative curricula were being implemented, (b) identify challenges faced by the faculty, and (c) explore how the curricula were evaluated. Interviews were conducted with 15 exemplar schools from a variety of nursing programs throughout the United States. Exemplar innovative curricula were identified, and a model for approaching innovation was developed based on the findings related to conceptualizing, designing, delivering, evaluating, and supporting the curriculum. The results suggest implications for nursing education, research, and practice.

  6. Transformation Strategies between Block-Oriented and Graph-Oriented Process Modelling Languages

    DEFF Research Database (Denmark)

    Mendling, Jan; Lassen, Kristian Bisgaard; Zdun, Uwe

    Much recent research work discusses the transformation between differentprocess modelling languages. This work, however, is mainly focussed on specific processmodelling languages, and thus the general reusability of the applied transformationconcepts is rather limited. In this paper, we aim...... to abstract from concrete transformationstrategies by distinguishing two major paradigms for process modelling languages:block-oriented languages (such as BPEL and BPML) and graph-oriented languages(such as EPCs and YAWL). The contribution of this paper are generic strategiesfor transforming from block......-oriented process languages to graph-oriented languages,and vice versa. We also present two case studies of applying our strategies....

  7. Power Aware Mobility Management of M2M for IoT Communications

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2015-01-01

    Full Text Available Machine-to-Machine (M2M communications framework is evolving to sustain faster networks with the potential to connect millions of devices in the following years. M2M is one of the essential competences for implementing Internet of Things (IoT. Therefore, various organizations are now focusing on enhancing improvements into their standards to support M2M communications. Thus, Heterogeneous Mobile Ad Hoc Network (HetMANET can normally be considered appropriate for M2M challenges. These challenges incorporated when a mobile node (MN selects a target network in an energy efficient scanning for efficient handover. Therefore, to cope with these constraints, we proposed a vertical handover scheme for handover triggering and selection of an appropriate network. The proposed scheme is composed of two phases. Firstly, the MNs perform handover triggering based on the optimization of the Receive Signal Strength (RSS from an access point/base station (AP/BS. Secondly, the network selection process is performed by considering the cost and energy consumption of a particular application during handover. Moreover, if there are more networks available, then the MN selects the one provided with the highest quality of service (QoS. The decision regarding the selection of available networks is made on three metrics, that is, cost, energy, and data rate. Furthermore, the selection of an AP/BS of the selected network is made on five parameters: delay, jitter, Bit Error Rate (BER, communication cost, and response time. The numerical and experimental results are compared in the context of energy consumption by an MN, traffic management on an AP/BS, and QoS of the available networks. The proposed scheme efficiently optimizes the handoff related parameters, and it shows significant improvement in the existing models used for similar purpose.

  8. 物联网安全研究%Study on IoT Security

    Institute of Scientific and Technical Information of China (English)

    刘平; 刘晓东

    2012-01-01

    IoT(internet of things) is the evolution and extension of related technologies such as computer, Internet and mobile communication network, and its security issue attracts more and more attention. An in-depth study of IoT security is done, and its architecture analyzed. Meanwhile, its application model is abstracted to things, network and applications, and its security requirements summarized as things only controlled and usecl by its owner. The things are abstracted to four categories in this paper, including perceiving things, perceived things, controlled things, perceiving and controlled things, and concrete solutions for each category are proposed. At the same time, security solutions for network and application are also proposed.%物联网是计算机、互联网与移动通信网等相关技术的演进和延伸,其安全问题愈来愈受到关注。该文对物联网安全进行深入研究,对其体系结构进行分析,并将其应用模型抽象为“物、网、应用”;将其安全需求概括为“谁家的物归谁管,谁家的物归谁用”。该文将“物”抽象为四类,即感知类物、被感知类物、被控制类物及感知和被控制类物,并针对每一类“物”的应用提出了具体的解决方案,同时也提出了“网”与“应用”的安全解决方案。

  9. Properties of Index Transforms in Modeling of Nanostructures and Plasmonic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Passian, Ali [ORNL

    2010-01-01

    In material structures with nanometer scale curvature or dimensions electrons may be excited to oscillate in confined spaces. The consequence of such geometric confinement is of great importance in nano-optics and plasmonics. Furthermore, the geometric complexity of the probe-substrate/sample assemblies of many scanning probe microscopy experiments often pose a challenging modeling prob- lem due to the high curvature of the probe apex or sample surface protrusions and indentations. Index transforms such as Mehler-Fock and Kontorovich-Lebedev, where integration occurs over the index of the function rather than over the argument, prove useful in solving the resulting differential equations when modeling optical or electronic response of such problems. By considering the scalar potential distribution of a charged probe in presence of a dielectric substrate, we discuss certain implications and criteria of the index transform and prove the existence and the inversion theorems for the Mehler- Fock transform of the order m ∈ N 0 . The probe charged to a potential V0 , measured at the apex, is modeled, in the non-contact case, as a one-sheeted hyperboloid of revolution, and in the contact case or in the limit of a very sharp probe, as a cone. Using the Mehler-Fock integral transform in the first case, and the Fourier integral transform in the second, we discuss the necessary conditions imposed on the potential distribution on the probe surface.

  10. Properties of index transforms in modeling of nanostructures and plasmonic systems

    Science.gov (United States)

    Passian, A.; Koucheckian, S.; Yakubovich, S. B.; Thundat, T.

    2010-02-01

    In material structures with nanometer scale curvature or dimensions, electrons may be excited to oscillate in confined spaces. The consequence of such geometric confinement is of great importance in nano-optics and plasmonics. Furthermore, the geometric complexity of the probe-substrate/sample assemblies of many scanning probe microscopy experiments often poses a challenging modeling problem due to the high curvature of the probe apex or sample surface protrusions and indentations. Index transforms such as Mehler-Fock and Kontorovich-Lebedev, where integration occurs over the index of the function rather than over the argument, prove useful in solving the resulting differential equations when modeling optical or electronic response of such problems. By considering the scalar potential distribution of a charged probe in the presence of a dielectric substrate, we discuss certain implications and criteria of the index transform and prove the existence and the inversion theorems for the Mehler-Fock transform of the order m ɛN0. The probe charged to a potential V0, measured at the apex, is modeled, in the noncontact case, as a one-sheeted hyperboloid of revolution, and in the contact case or in the limit of a very sharp probe, as a cone. Using the Mehler-Fock integral transform in the first case, and the Fourier integral transform in the second, we discuss the necessary conditions imposed on the potential distribution on the probe surface.

  11. CMS-Wave Model: Part 5. Full-plane Wave Transformation and Grid Nesting

    Science.gov (United States)

    2012-04-01

    are available in previous reports and CHETNs (Lin et al. 2006; Demirbilek et al. 2007). CMS -Wave is part of the Coastal Modeling System ( CMS ...the U.S. Army Corps of Engineers’ (USACE) Surface-water Modeling System (SMS). The CMS -Wave FP option is available in SMS Version 11.1 and higher...ERDC/CHL CHETN-IV-81 April 2012 Approved for public release; distribution is unlimited. CMS -Wave Model: Part 5. Full-plane Wave Transformation

  12. EFFECT OF AUSTENITIC CRYSTAL ORIENTATION IN A MULTIPHASE STEEL ANALYZED BY A DISCRETE DISLOCATION-TRANSFORMATION MODEL

    NARCIS (Netherlands)

    Shi, J.; Turteltaub, S.; Van der Giessen, E.

    2009-01-01

    A discrete dislocation-transformation model is used to analyze the response of an aggregate of ferritic and austenitic grains that can transform into martensite. In particular, the influence of the crystal orientation of the austenitic grains on the plastic and transformation behavior is studied. It

  13. Analysis of grain size effects on transformation-induced plasticity based on a discrete dislocation-transformation model

    NARCIS (Netherlands)

    Shi, J.; Turteltaub, S.; Van der Giessen, E.

    2010-01-01

    There is much interest recently in the possibility of combining two strengthening effects, namely the reduction of grain size (Hall-Fetch effect) and the transformation-induced plasticity effect (strengthening due to a martensitic transformation). The present work is concerned with the analysis of t

  14. IoT Applications with 5G Connectivity in Medical Tourism Sector Management: Third-Party Service Scenarios.

    Science.gov (United States)

    Psiha, Maria M; Vlamos, Panayiotis

    2017-01-01

    5G is the next generation of mobile communication technology. Current generation of wireless technologies is being evolved toward 5G for better serving end users and transforming our society. Supported by 5G cloud technology, personal devices will extend their capabilities to various applications, supporting smart life. They will have significant role in health, medical tourism, security, safety, and social life applications. The next wave of mobile communication is to mobilize and automate industries and industry processes via Machine-Type Communication (MTC) and Internet of Things (IoT). The current key performance indicators for the 5G infrastructure for the fully connected society are sufficient to satisfy most of the technical requirements in the healthcare sector. Thus, 5G can be considered as a door opener for new possibilities and use cases, many of which are as yet unknown. In this paper we present heterogeneous use cases in medical tourism sector, based on 5G infrastructure technologies and third-party cloud services.

  15. Effect of Colorspace Transformation, the Illuminance Component, and Color Modeling on Skin Detection

    Energy Technology Data Exchange (ETDEWEB)

    Jayaram, S; Schmugge, S; Shin, M C; Tsap, L V

    2004-03-22

    Skin detection is an important preliminary process in human motion analysis. It is commonly performed in three steps: transforming the pixel color to a non-RGB colorspace, dropping the illumination component of skin color, and classifying by modeling the skin color distribution. In this paper, we evaluate the effect of these three steps on the skin detection performance. The importance of this study is a new comprehensive colorspace and color modeling testing methodology that would allow for making the best choices for skin detection. Combinations of nine colorspaces, the presence of the absence of the illuminance component, and the two color modeling approaches are compared. The performance is measured by using a receiver operating characteristic (ROC) curve on a large dataset of 805 images with manual ground truth. The results reveal that (1) the absence of the illuminance component decreases performance, (2) skin color modeling has a greater impact than colorspace transformation, and (3) colorspace transformations can improve performance in certain instances. We found that the best performance was obtained by transforming the pixel color to the SCT, HSI, or CIELAB colorspaces, keeping the illuminance component, and modeling the color with the histogram approach.

  16. A thermo-mechanical modelling of the Tribological Transformations of Surface

    Science.gov (United States)

    Antoni, Grégory; Désoyer, Thierry; Lebon, Frédéric

    2009-09-01

    The Tribological Transformations of Surface (TTS) are observed on samples of certain steels undergoing repeated compressive loadings. They correspond to a permanent, solid-solid phase transformation localized on the surfaces of the sample on which the loading is applied. The main hypothesis of the study is that TTS are not only due to the mechanical loading but also to the thermal loading which is associated to. Thus, a thermo-mechanical model is first proposed in the present Note, which is inspired by previous works on TRansformation Induced Plasticity (TRIP). The potentialities of the model are also briefly illustrated by a simple 1D example. To cite this article: G. Antoni et al., C. R. Mecanique 337 (2009).

  17. Patient-specific modeling of facial soft tissue based on radial basis functions transformations of a standard three-dimensional finite element model

    Institute of Scientific and Technical Information of China (English)

    LOU Hang-di; CHEN Si; CHEN Gui; XU Tian-min; RONG Qi-guo

    2012-01-01

    Background An important purpose of orthodontic treatment is to gain the harmonic soft tissue profile.This article describes a novel way to build patient-specific models of facial soft tissues by transforming a standard finite element(FE)model into one that has two stages:a first transformation and a second transformation,so as to evaluate the facial soft tissue changes after orthodontic treatment for individual patients.Methods The radial basis functions(RBFs)interpolation method was used to transform the standard FE model into a patient-specific one based on landmark points.A combined strategy for selecting landmark points was developed in this study:manually for the first transformation and automatically for the second transformation.Four typical patients were chosen to validate the effectiveness of this transformation method.Results The results showed good similarity between the transformed FE models and the computed tomography(CT)models.The absolute values of average deviations were in the range of 0.375-0.700 mm at the lip-mouth region after the first transformation,and they decreased to a range of 0.116-0.286 mm after the second transformation.Conclusions The modeling results show that the second transformation resulted in enhanced accuracy compared to the first transformation.Because of these results,a third transformation is usually not necessary.

  18. Make2Learn with IoT: Engaging children into joyful design and making of interactive connected objects

    DEFF Research Database (Denmark)

    Divitini, Monica; Giannakos, Michail; Mora, Simone

    2017-01-01

    The Make2Learn workshop aims to explore the introduction in the learning processes of tools and methods for creative and joyful ideation, design and prototyping of Internet of Things (IoT) artifacts. IoT technologies offer opportunities to re-think everyday objects towards being more engaging......, playful or educational than their ordinary selves. At the same time, a variety of environments have been developed to introduce making principles to children, e.g. via activities in museum, fablabs and hackerspaces. Making IoT artefacts enable children to foster co-creativity and joy in learning processes...... and to construct knowledge; leading to STEM concepts. Making activities for IoT often have a broad perspective that includes not just digital fabrication, but also design thinking concepts such as problem elaboration, brainstorming, ideation and reflection; enabling learning activities that “alternate abstract...

  19. A Discussion about Upgrading the Quick Script Platform to Create Natural Language based IoT Systems

    DEFF Research Database (Denmark)

    Khanna, Anirudh; Das, Bhagwan; Pandey, Bishwajeet

    2016-01-01

    With the advent of AI and IoT, the idea of incorporating smart things/appliances in our day to day life is converting into a reality. The paper discusses the possibilities and potential of designing IoT systems which can be controlled via natural language, with help of Quick Script as a development...... platform. Methods/Statistical Analysis: Quick Script (or QS) is an open-source, easy to learn tool made by our team of student developers for programming virtual conversational entities. This paper focuses on a discussion about how some improvements can be made in the underlying implementation of QS...... and the resulting uncomplicated and simple platform which can be used to create natural language based IoT systems. It explores the architecture/design pattern required for creating such systems. Findings: This exploration reveals how the idea of turning a simple NLP tool to handling IoT systems can be implemented...

  20. Automated Transformation of Distributed Software Architectural Models to Finite State Process

    Directory of Open Access Journals (Sweden)

    Omid Bushehrian,

    2010-12-01

    Full Text Available Software Performance Engineering (SPE represents the collection of software engineering activities with the purpose of identification, prediction and also improvement of software performance parameters in the early stages of software development life cycle. Various models such as queuing networks, layered queues, Petri Nets and Stochastic Process Algebras are suggested for modeling distributed systems. Particular ability of a model is the prediction and estimation of non-functional characteristic of one system before it has been made. The main problem is a method by which we can easily transform architectural software models into formal simulate able models.In this paper a method for automatic transformation of UML deployment and sequence diagrams into FSP(finite state process model is presented, so that we can analyze the resulting model through discrete event simulation tools from the performance perspective. In the proposed transformation algorithm, different aspects of a software system such as: communication model of software objects, synchronization and physical deployment of objects are considered.