Design problems of flexible computer systems for physiological researches are discussed. The widespread case of employing of commercial medical devices as parts of the resulting computer system is analyzed. To overcome most of the arising difficulties, we propose using of the universal synchronizing device and the modular script-based software. The prospects of such computer systems are outlined as an evolution of them into cyber-physical systems with on-demand plugging in of required hardware modules.
This document discusses sociotechnical systems and systems engineering. It defines sociotechnical systems as systems that include both technical systems (e.g. hardware and software) as well as operational processes and people. Sociotechnical systems have emergent properties that depend on the interactions between system components. They are also non-deterministic since human behavior introduces unpredictability. Developing sociotechnical systems requires an interdisciplinary approach involving areas like software engineering, organizational design, and human factors.
Measurement and Evaluation of Reliability, Availability and Maintainability o...
The growing complexity of equipments and systems often lead to failures and as a consequence the
aspects of reliability, maintainability and availability have come into forefront. The failure of machineries and
equipments causes disruption in production resulting from a loss of availability of the system and also increases
the cost of maintenance. The present study deals with the determination of reliability and availability aspects of
one of the significant constituent in a Railway Diesel Locomotive Engine. In order to assess the availability
performance of these components, a broad set of studies has been carried out to gather accurate information at
the level of detail considered suitable to meet the availability analysis target. The Reliability analysis is
performed using the Weibull Distribution and the various data plots as well as failure rate information help in
achieving results that may be utilized in the near future by the Railway Locomotive Engines for reducing the
unexpected breakdowns and will enhance the reliability and availability of the Engine. In this work, ABC
analysis has been used for the maintenance of spare parts inventory. Here, Power pack assemblies, Engine
System are used to focus on the reliability, maintainability and availability aspects
Metric for Evaluating Availability of an Information System : A Quantitative ...
The purpose of the paper is to present a metric for availability based on the design of the information
system. The availability metric proposed in this paper is twofold, based on the operating program and
network delay metric of the information system (For the local bound component composition the
availability metric is purely based on the software/operating program, for the remote bound component
composition the metric incorporates the delay metric of the network). The aim of the paper is to present a
quantitative availability metric derived from the component composition of an Information System, based
on the dependencies among the individual measurable components of the system. The metric is used for
measuring and evaluating availability of an information system from the security perspective, the
measurements may be done during the design phase or may also be done after the system is fully
functional. The work in the paper provides a platform for further research regarding the quantitative
security metric (based on the components of an information system i.e. user, hardware, operating
program and the network.) for an information system that addresses all the attributes of information and
network security.
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
The computation overhead is of major concern when
going for increased accuracy in online power system security
assessment (OPSSA). This paper proposes a scalable solution
technique based on distributed computing architecture to
mitigate the problem. A variant of the master/slave pattern is
used for deploying the cluster of workstations (COW), which
act as the computational engine for the OPSSA. Owing to the
inherent parallel structure in security analysis algorithm, to
exploit the potential of distributed computing, domain
decomposition is adopted instead of functional decomposition.
The security assessment is performed utilizing the developed
composite security index that can accurately differentiate the
secure and non-secure cases and has been defined as a function
of bus voltage and line flow limit violations. Validity of
proposed architecture is demonstrated by the results obtained
from an intensive experimentation using the benchmark IEEE
57 bus test system. The proposed framework, which is scalable,
can be further extended to intelligent monitoring and control
of power system
Application Of UML In Real-Time Embedded Systemsijseajournal
The UML was designed as a graphical notation for use with object-oriented systems and applications.
Because of its popularity, now it is emerging in the field of embedded systems design as a modeling
language. The UML notation is useful in capturing the requirements, documenting the structure,
decomposing into objects and defining relationships between objects. It is a notational language that is
very useful in modelling the real-time embedded systems. This paper presents the requirements and
analysis modelling of a real-time embedded system related to a control system application for platform
stabilization using COMET method of design with UML notation. These applications involve designing of
electromechanical systems that are controlled by multi-processors.
Stream Processing Environmental Applications in Jordan ValleyCSCJournals
This document discusses stream processing applications for environmental monitoring in Jordan Valley. It presents statistical data collected from weather stations in different Jordan Valley locations. Stream processing is important for continuous monitoring systems to detect events in real-time. The document outlines considerations for stream processing engine design like communication, computation, and flexibility. It also describes Jordan's Irrigation Management Information System, which uses real-time meteorological data from weather stations to optimize water usage for agriculture.
This document discusses sociotechnical systems and systems engineering. It defines sociotechnical systems as systems that include both technical systems (e.g. hardware and software) as well as operational processes and people. Sociotechnical systems have emergent properties that depend on the interactions between system components. They are also non-deterministic since human behavior introduces unpredictability. Developing sociotechnical systems requires an interdisciplinary approach involving areas like software engineering, organizational design, and human factors.
Measurement and Evaluation of Reliability, Availability and Maintainability o...IOSR Journals
The growing complexity of equipments and systems often lead to failures and as a consequence the
aspects of reliability, maintainability and availability have come into forefront. The failure of machineries and
equipments causes disruption in production resulting from a loss of availability of the system and also increases
the cost of maintenance. The present study deals with the determination of reliability and availability aspects of
one of the significant constituent in a Railway Diesel Locomotive Engine. In order to assess the availability
performance of these components, a broad set of studies has been carried out to gather accurate information at
the level of detail considered suitable to meet the availability analysis target. The Reliability analysis is
performed using the Weibull Distribution and the various data plots as well as failure rate information help in
achieving results that may be utilized in the near future by the Railway Locomotive Engines for reducing the
unexpected breakdowns and will enhance the reliability and availability of the Engine. In this work, ABC
analysis has been used for the maintenance of spare parts inventory. Here, Power pack assemblies, Engine
System are used to focus on the reliability, maintainability and availability aspects
Metric for Evaluating Availability of an Information System : A Quantitative ...IJNSA Journal
The purpose of the paper is to present a metric for availability based on the design of the information
system. The availability metric proposed in this paper is twofold, based on the operating program and
network delay metric of the information system (For the local bound component composition the
availability metric is purely based on the software/operating program, for the remote bound component
composition the metric incorporates the delay metric of the network). The aim of the paper is to present a
quantitative availability metric derived from the component composition of an Information System, based
on the dependencies among the individual measurable components of the system. The metric is used for
measuring and evaluating availability of an information system from the security perspective, the
measurements may be done during the design phase or may also be done after the system is fully
functional. The work in the paper provides a platform for further research regarding the quantitative
security metric (based on the components of an information system i.e. user, hardware, operating
program and the network.) for an information system that addresses all the attributes of information and
network security.
Synchronization of the GPS Coordinates Between Mobile Device and Oracle Datab...idescitation
The article describes an architecture and implementation of module for
acquiring a synchronization of GPS data between mobile device and central database
system. The process of data exchange is inspired by SAMD algorithm. The article
sequentially presents a solution of individual system components. Special attention is paid to
the exchange data format. The processing of the exchanged data is also described in detail.
The resulting solution was deployed and tested in a real production environment.
This is a power-point presentation prepared for the students who are studying SYSTEM ENGINEERING in Fourth Semester (CBCS) of the branches of colleges affiliated to RGPV, Bhopal (M.P.). In this presentation, topics of the fourth unit in the syllabus are covered. I hope it will be helpful to the students.
The document discusses system engineering concepts such as system building blocks and interfaces. It describes how systems can be broken down into hierarchical levels from the overall system level down to components, subcomponents, and individual parts. The roles and domains of system engineers and design specialists are also discussed. The document outlines various system engineering concepts such as system boundaries, context diagrams, and internal and external interfaces. It also discusses systems of systems and enterprise systems engineering.
USING SEMI-SUPERVISED CLASSIFIER TO FORECAST EXTREME CPU UTILIZATIONgerogepatton
A semi-supervised classifier is used in this paper is to investigate a model for forecasting unpredictable load on the IT systems and to predict extreme CPU utilization in a complex enterprise environment with large number of applications running concurrently. This proposed model forecasts the likelihood of a scenario where extreme load of web traffic impacts the IT systems and this model predicts the CPU utilization under extreme stress conditions. The enterprise IT environment consists of a large number of applications running in a real time system. Load features are extracted while analysing an envelope of the patterns of work-load traffic which are hidden in the transactional data of these applications. This method simulates and generates synthetic workload demand patterns, run use-case high priority scenarios in a test environment and use our model to predict the excessive CPU utilization under peak load conditions for validation. Expectation Maximization classifier with forced-learning, attempts to extract and analyse the parameters that can maximize the chances of the model after subsiding the unknown labels. As a result of this model, likelihood of an excessive CPU utilization can be predicted in short duration as compared to few days in a complex enterprise environment. Workload demand prediction and profiling has enormous potential in optimizing usages of IT resources with minimal risk.
USING SEMI-SUPERVISED CLASSIFIER TO FORECAST EXTREME CPU UTILIZATIONijaia
This document summarizes a research paper that uses a semi-supervised classifier to predict extreme CPU utilization in an enterprise IT environment. The paper extracts workload patterns from transactional data collected over a year. It then trains a semi-supervised classifier using this data to predict CPU utilization under high traffic loads. The model is validated in a test environment that simulates the complex, distributed production environment. The semi-supervised model can predict burst CPU utilization 3-4 hours in advance, compared to 1-2 weeks using previous methods, allowing IT teams to better optimize resources.
This document discusses various implementation issues in software development, including reuse, configuration management, and host-target development. It notes that modern software is often constructed through reuse and that configuration management is needed to track different software versions. Development usually occurs on a host system while execution is on a target system, which can have different architectures and platforms. The document provides details on different levels of reuse, configuration management activities, tools that aid development, and challenges that can arise with reuse and managing development across host-target systems.
Avanced process control enteprise management systemGyan Prakash
This document discusses how digital control systems have become more powerful over time due to advances in processor technology. While control system processors are now much faster than needed for basic control functions, this excess capacity is currently underutilized. The document proposes embedding asset management, performance monitoring, and other software applications within the control system itself to better leverage the processing power. This integrated approach within a single system could improve plant operations, decision making, and reduce IT overhead costs compared to current separate server-based systems.
This document summarizes four architectural patterns for context-aware systems: WCAM, Event-Control-Action, Action, and architectural pattern for context-based navigation. It discusses examples, problems addressed, solutions, structures, and benefits of each pattern. The patterns are examined to determine which can best overcome complexity and be more extensible for context-aware systems.
This document outlines an approach to designing management information systems that includes four major components: systems analysis, systems design, systems implementation, and system operation and support. The systems analysis phase involves assessing information needs, requirements analysis, and specification. Systems design includes synthesizing alternatives, selecting a preferred design, and detailed design. Systems implementation covers developing forms, procedures, software development, training, and testing. System operation and support provides for ongoing management, maintenance, and improvement. The approach emphasizes end-user involvement and a structured, iterative design process using modern software engineering techniques.
The document discusses different types of electrical meters used in data centers. It describes four levels of metering from the whole building level down to specific equipment. Meters can be either temporary or permanent depending on how long data needs to be collected. Common types of permanent meters use current transformers and potential transformers to measure attributes like power, energy, voltage, harmonics and power quality to provide insights into infrastructure operations and energy use.
System engineering involves determining operational requirements and modeling relationships between elements like hardware, software, and people to accomplish goals. It can focus on business processes or product development. The engineering process follows a hierarchy from overall objectives to domain specifications to element implementations. It is iterative to adapt to changing needs. Business process engineering derives data, application, and technology architectures, while product engineering defines architectures and infrastructure for software, hardware, data, and people components.
The document describes a self-learning real-time expert system developed for fault diagnosis in power plants. It uses historic operational data and machine learning techniques to automatically generate new rules for the expert system's knowledge base. The key steps are: (1) preprocessing historical data, (2) applying an association algorithm (Tertius was found most suitable) to generate new rules, (3) validating and formatting new rules, and (4) updating the knowledge base. This allows the expert system to continuously improve its diagnostic ability by learning from plant operational data.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological advancements across various industries. Embedded systems, characterized by their integration into hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer electronics, and industrial automation. This article delves into the fundamental concepts of embedded systems, highlights their importance, discusses the challenges faced in their development, and explores the latest trends and innovations in embedded software. We are committed to using our findings from this exploration to help others in the embedded systems and software community. We believe that by sharing our knowledge, we can help to accelerate innovation in this field.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
The document discusses multi-agent systems (MAS) and their applications. It provides a literature survey on MAS system architecture, consensus algorithms like Paxos and average consensus, and MAS platforms. It also proposes a distributed under-frequency load shedding scheme using MAS for a case study. MAS provide a solution for distributed control of increasing distributed energy resources and devices by shifting computational burden to local controllers and handling decentralized ownership through local agent interactions.
This document presents a preliminary study on developing a Wide Area Protection Monitoring System (WAPMS) that would automatically collect and analyze data from protection devices. The proposed system would gather information through various communication protocols, analyze the data to determine fault types and locations, and generate reports with diagnoses for operators. This would provide operators a comprehensive overview of the power system's behavior during faults to help make better decisions. The system is currently being tested in Colombia and future work involves predictive analytics to identify potential protection device failures.
A resonable approach for manufacturing system based on supervisory control 2IAEME Publication
This document summarizes a research paper that proposes a novel approach for manufacturing system control using supervisory control and discrete event systems. It describes a testbed that was developed using this approach with three main hardware components: a personal computer, interface, and programmable logic controller. The paper discusses developing a model for the large, complex testbed manufacturing system by breaking it down into smaller, fundamental and interaction sub-models. It explains how the testbed model was implemented using clocked Moore synchronous state machines in programmable logic controller ladder logic programs.
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...IOSR Journals
This document discusses using interpretive structural modeling (ISM) to analyze the interrelationships between prospects of information and communication technology (ICT) enabled process control systems. Nine prospects were identified through expert interviews, including that ICT process control could be highly innovative, reduce costs by using fewer instruments, and allow remote control from one location using secret codes. ISM analysis included creating a structural self-interaction matrix, initial and final reachability matrices, and a diagraph. This identified that prospects like reduced costs and remote control have high driving power and dependence. An action plan was developed based on expert discussions to enhance important prospects like these. In conclusion, ISM provides an effective model for studying how to improve the potential of ICT process control
Flexible assembly system for hybrid micro systemsAndre Kuhn
This document summarizes a concept for an integrated and flexible assembly system for hybrid microsystems using combined machining and assembly processes. The key points are:
1) A superior control program connects a micro machining center and manipulation system to allow integrated process chains within one working space without needing to remeasure or rechuck parts between steps.
2) Installing the manipulation system inside the machining center working space allows using the precise position information from machining for assembly and avoids accuracy losses from transporting parts.
3) A six-axis articulated robot is proposed as the manipulation system to provide the necessary degrees of freedom and accuracy for microassembly within the limited working space.
An Efficient Approach Towards Mitigating Soft Errors Riskssipij
This document proposes a new approach to mitigate soft error risks in programs by detecting and recovering from errors in critical code blocks and variables. The approach has two phases: 1) It detects errors by computing critical blocks and variables twice and comparing the results. 2) If an error is detected, it recovers by replacing the erroneous block or variable with the original from a backup copy of the program stored in memory. This focused approach aims to reduce time and memory overhead compared to existing techniques that protect the entire program.
Modeling the enablers for implementing ict enabled wireless control in industryIAEME Publication
This document discusses modeling the enablers for implementing ICT-enabled wireless control in industry using interpretive structural modeling (ISM). It identifies 11 key enablers for ICT-enabled wireless process control systems based on expert interviews. These enablers are analyzed using ISM to determine their relationships and relative importance. Structural matrices are developed and levels are partitioned to create a diagraph and final ISM model that can be used to prioritize actions to enhance high-impact enablers.
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipCSCJournals
Due to the complexity and the high performance requirement of multimedia applications, the design of embedded systems is the subject of different types of design constraints such as execution time, time to market, energy consumption, etc. Some approaches of joint software/hardware design (Co-design) were proposed in order to help the designer to seek an adequacy between applications and architecture that satisfies the different design constraints. This paper presents a new methodology for hardware/software partitioning on reconfigurable multimedia system on chip, based on dynamic and static steps. The first one uses the dynamic profiling and the second one uses the design trotter tools. The validation of our approach is made through 3D image synthesis.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes research on integrating safety critical systems in information technology. It discusses how modern information systems are increasingly safety critical as their failure can result in financial loss or loss of life. The document reviews literature on safety critical systems, including analyzing reliability and safety of parallel-series models. It also discusses modeling approaches for designing safety critical systems before hardware or software implementation. The goal is to reduce costs from design errors found later. Overall, the document examines how information technology is used in safety critical systems and approaches for analyzing and designing such systems.
This document describes modeling and verifying a telecommunication application called Depannage using Live Sequence Charts (LSCs) and the Play-Engine tool. Depannage allows users to call for help from emergency services. The application is complex due to its distributed architecture, time constraints, and evolving components.
The authors specify Depannage using LSCs to describe component behaviors and interactions. Key components include Search, which locates emergency providers, and Users, which models user states. Universal LSCs define mandatory component behaviors, while existential LSCs define possible behaviors. The Play-Engine tool is used to simulate, animate, and formally verify the LSC specification.
The methodology captures requirements at a high level using
This document describes a methodology for simulating heterogeneous embedded systems that include hardware, software, and electromechanical parts. Interfaces were developed to allow a VHDL simulator to communicate with a physical systems simulator and application programs. The interfaces use the C language links of the simulators to establish communication channels and exchange commands/parameter values between the simulated parts in a chained master/slave synchronization scheme. This unified simulation environment allows designers to validate the behavior of the entire system early in the design process before implementing any of its parts.
Power system and communication network co simulation for smart grid applicationsIndra S Wahyudi
This paper proposes a power system and communication network co-simulation framework that integrates a power system dynamics simulator (PSLF) and a network simulator (NS2). The framework uses a global scheduler to run the simulation in a discrete event-driven manner, eliminating errors from separate synchronization of the simulators. As a case study, an agent-based remote backup relay system is simulated using this co-simulation framework to demonstrate its effectiveness in evaluating smart grid applications involving interactions between power and communication systems.
Similar to Complex Measurement Systems in Medicine: from Synchronized Monotask Measuring Instruments to Cyber-Physical Systems (20)
Securing Cloud Computing Through IT GovernanceITIIIndustries
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers what the business needs and the business is able to deliver what the market needs. IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. Furthermore, as the use of cloud computing for delivering IT functions becomes pervasive, organizations using cloud computing must effectively apply IT governance to it. While cloud computing presents tremendous
opportunities, it comes with risks as well. Information security
is one of the top risks in cloud computing. Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security. This study advances knowledge by extending IT governance to cloud computing and information security governance.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This document describes the design of a cloud robotics testbed to be used as capstone projects for IT students at La Trobe University. It discusses the requirements for capstone subjects and outlines the five pillars of the IT curriculum. The testbed is proposed to provide authentic, real-world capstone projects that integrate elements from the different IT pillars. The testbed will include multiple robotic platforms and sensors connected to a cloud infrastructure, allowing students to take on sub-projects related to areas like programming, networking, databases, and more.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Image Matting via LLE/iLLE Manifold LearningITIIIndustries
Accurately extracting foreground objects is the problem of isolating the foreground in images and video, called image matting which has wide applications in digital photography. This problem is severely ill-posed in the sense that, at each pixel, one must estimate the foreground and background pixels and the so-called alpha value from only pixel information. The most recent work in natural image matting rely on local smoothness assumptions about foreground and background colours on which a cost function has been established. In this paper, we propose an extension to the class of affinity based matting techniques by incorporating local manifold structural
information to produce both a smoother matte based on the socalled improved Locally Linear Embedding. We illustrate our new algorithm using the standard benchmark images and very comparable results have been obtained.
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...ITIIIndustries
1) The document discusses the development of a software to annotate retina fundus images for teaching and learning about diabetic retinopathy.
2) The authors collected 625 fundus images from Bangladesh and designed annotation software to store patient information, infection levels, and locations in the images. They introduced a K-nearest neighbor technique to accurately select regions of interest since it can be difficult for experts.
3) Once experts annotate the images using this software, it can be used by students for learning about diabetic retinopathy stages and symptoms. The dataset and software aim to address the lack of proper diabetic retinopathy datasets and aid medical education.
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...ITIIIndustries
This paper presents the application of microsimulation for traffic planning and forecasting, and proposes a new framework to model complex traffic conditions by calibrating and adjusting traffic parameters of a microsimulation model. By using an open source micro-simulator package, TRANSIMS, in this study, animated and numerical results were produced and analysed. The framework of traffic model calibration was evaluated for its usefulness and practicality. Finally, we discuss future applications such as providing end users with real time traffic information through Intelligent Transport System (ITS) integration.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
Programmatic detection of spatial behaviour in an agent-based modelITIIIndustries
The automated detection of aspects of spatial behaviour in an agent-based model is necessary for model testing and analysis. In this paper we compare four predictors of herding behaviour in a model of a grazing herbivore. We find that a) the mean number of neighbours adjusted to account for population variation and b) the mean Hamming distance between rows of the two-dimensional environment can be used to detect herding. Visual inspection of the model behaviour revealed that herding occurs when the herbivore mobility reaches a threshold level. Using this threshold we identify a limits for these predictors to use in the program code. These results apply only to one set of parameters and environment size; future research will involve a wider parameter space.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This paper describes the curriculum of the three year IT undergraduate program at La Trobe University, and the faculty requirements in designing a capstone subject, followed by the ACM’s recommended IT curriculum covering the five pillars of the IT discipline. Cloud robotics, a broad multidisciplinary research area, requiring expertise in all five pillars with mechatronics, is an ideal candidate to offer capstone experiences to IT students. Therefore, in this paper, we propose a long term master project in developing a cloud robotics testbed, with many capstone sub-projects spanning across the five IT pillars, to meet the objectives of capstone experience. This paper also describes the design and implementation of the testbed, and proposes potential capstone projects for students with different interests.
A Smart Fuzzing Approach for Integer Overflow DetectionITIIIndustries
Fuzzing is one of the most commonly used methods to detect software vulnerabilities, a major cause of information security incidents. Although it has advantages of simple design and low error report, its efficiency is usually poor. In this paper we present a smart fuzzing approach for integer overflow detection and a tool, SwordFuzzer, which implements this approach. Unlike standard fuzzing techniques, which randomly change parts of the input file with no information about the underlying syntactic structure of the file, SwordFuzzer uses online dynamic taint analysis to identify which bytes in the input file are used in security sensitive operations and then focuses on mutating such bytes. Thus, the generated inputs are more likely to trigger potential vulnerabilities. We evaluated SwordFuzzer with an example program and a number of real-world applications. The experimental results show that SwordFuzzer can accurately locate the key bytes of the input file and dramatically improve the effectiveness of fuzzing in detecting real-world vulnerabilities
The banking experience for many people today is fundamentally an application of technology to be able to carry out their financial tasks. While the need to visit a bank branch remains essential for a number of activities, increasingly the need to support mobile usage is becoming the central focus of many bank strategies. The core banking systems that process financial transactions must remain highly available and able to support large volumes of activity. These systems represent a long term investment for banks and when the need arises to modernize these large systems, the transformation initiative is often very expensive and of high risk. We present in this paper our experiences in bank modernization and transformation, and outline the strategies for rolling out these large programs. As banking institutions embark upon transformation programs to upgrade their banking channels and core banking systems, it is hoped that the insights presented here are useful as a framework to support these initiatives.
Detecting Fraud Using Transaction Frequency DataITIIIndustries
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. In this paper, we present a fraud detection method which detects irregular frequency of transaction usage in an Enterprise Resource Planning (ERP) system. We discuss the design, development and empirical evaluation of outlier detection and distance measuring techniques to detect frequency-based anomalies within an individual user’s profile, relative to other similar users. Primarily, we propose three automated techniques: a univariate method, called Boxplot which is based on the sample’s median; and two multivariate methods which use Euclidean distance, for detecting transaction frequency anomalies within each transaction profile. The two multivariate approaches detect potentially fraudulent activities by identifying: (1) users where the Euclidean distance between their transaction-type set is above a certain threshold and (2) users/data points that lie far apart from other users/clusters or represent a small cluster size, using k-means clustering. The proposed methodology allows an auditor to investigate the transaction frequency anomalies and adjust the different parameters, such as the outlier threshold and the Euclidean distance threshold values to tune the number of alerts. The novelty of the proposed technique lies in its ability to automatically trigger alerts from transaction profiles, based on transaction usage performed over a period of time. Experiments were conducted using a real dataset obtained from the production client of a large organization using SAP R/3 (presently the most predominant ERP system), to run its business. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
This paper describes the results of a theoretical mapping of the cybernetic principles of the Viable System Model (VSM) to an Enterprise Service Bus (ESB) model, with the aim to identify the management principles for the integration of services at all levels in the enterprise. This enrichment directly contributes to the viability of service-oriented systems and the justification of Business/IT alignment within enterprise. The model was identified to be suitable for further adaption in the industrial setting planned within Australian governmental departments.
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...ITIIIndustries
To achieve a natural interaction in augmented reality environment, we have suggested to use markerless visionbased two-handed gestures for the interaction; with an outstretched hand and a pointing hand used as virtual object registration plane and pointing device respectively. However, twohanded interaction always causes mutual occlusion which jeopardizes the hand gesture recognition. In this paper, we present a solution for two-hand occlusion by using watershed transform. The main idea is to start from a two-hand occlusion image in binary format, then form a grey-scale image based on the distance of each non-object pixel to object pixel. The watershed algorithm is applied to the negation of the grey scaled image to form watershed lines which separate the two hands. Fingertips are then identified and each hand is recognized based on the number of fingertips on each hand. The outstretched hand is assumed to contain 5 fingertips and the pointing device contains less than 5 fingertips. An example of applying our result in hand and virtual object interaction is displayed at the end of the paper.
Speech Feature Extraction and Data VisualisationITIIIndustries
—This paper presents a signal processing approach to analyse and identify accent discriminative features of four groups of English as a second language (ESL) speakers, including Chinese, Indian, Japanese, and Korean. The features used for speech recognition include pitch, stress, formant frequencies, the Mel frequency coefficient, log frequency coefficient, and the intensity and duration of vowels spoken. This paper presents our study using the Matlab Speech Analysis Toolbox, and highlights how data processing can be automated and results visualised. The proposed algorithm achieved an average success rate of 57.3% in identifying vowels spoken in a speech by the four nonnative English speaker groups.
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...ITIIIndustries
A real-world intelligent system consists of three basic modules: environment recognition, prediction (or estimation), and behavior planning. To obtain high quality results in these modules, high speed processing and real time adaptability on a case by case basis are required. In the environment recognition module many different algorithms and algorithm networks exist with varying performance. Thus, a mechanism that selects the best possible algorithm is required. To solve this problem we are using an algorithm selection approach to the problem of natural image understanding. This selection mechanism is based on machine learning; a bottom-up algorithm selection from real-world image features and a top-down algorithm selection using information obtained from a high level symbolic world description and algorithm suitability. The algorithm selection method iterates for each input image until the high-level description cannot be improved anymore. In this paper we present a method of iterative composition of the high level description. This step by step approach allows us to select the best result for each region of the image by evaluating all the intermediary representations and finally keep only the best one.
Instance Selection and Optimization of Neural NetworksITIIIndustries
Credit scoring is an important tool in financial institutions, which can be used in credit granting decision. Credit applications are marked by credit scoring models and those with high marks will be treated as “good”, while those with low marks will be regarded as “bad”. As data mining technique develops, automatic credit scoring systems are warmly welcomed for their high efficiency and objective judgments. Many machine learning algorithms have been applied in training credit scoring models, and ANN is one of them with good performance. This paper presents a higher accuracy credit scoring model based on MLP neural networks trained with back propagation algorithm. Our work focuses on enhancing credit scoring models in three aspects: optimize data distribution in datasets using a new method called Average Random Choosing; compare effects of training-validation-test instances numbers; and find the most suitable number of hidden units. Another contribution of this paper is summarizing the tendency of scoring accuracy of models when the number of hidden units increases. The experiment results show that our methods can achieve high credit scoring accuracy with imbalanced datasets. Thus, credit granting decision can be made by data mining methods using MLP neural networks.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling