23 research outputs found

    Intelligent lighting system with the ability to control the color temperature and light flow of the illuminators

    Get PDF
    Modern lighting products allow the creation of intelligent control systems with the ability to adjust many parameters of lighting devices (for example, luminous flux, color temperature, light color, etc.). The presence on the market of relatively cheap lighting sensors (for illuminance, for color temperature, for light color, for movement, etc.) allows the monitoring of many parameters of the environment and, accordingly, more precise regulation of various parameters. The report presents a concept for the realization of an intelligent lighting system, which, depending on the external conditions of the environment, can regulate the parameters of an internal lighting system. Regulation is carried out according to external illumination, external color temperature, presence in the room, set algorithm of work, etc. Modern LED light sources with a variable color temperature and the possibility of dimming are planned to be used in the implementation of the system. A structural diagram of such a system, the element base and the control algorithm is presented

    Adaptive Fuzzy-PID Controller for Liquid Flow Control in the Heating Tank System

    Get PDF
    Liquid flow control systems are often used in some industrial processes. One of the problems is the existence of disturbance that can cause the flow response to become unstable. Thus, it is necessary to re-tuning the controller when the disturbance occurs. This study aims to design and implement an Adaptive Fuzzy-PID (AF-PID) controller for the liquid flow control in the heating tank system. We develop an industrial plant prototype of a heating tank process to test the designed controller on a laboratory scale. AF-PID controller is used to controlling the flow rate when the disturbance occurs. The nominal PID controller constants will adjust by additional PID constants when there is a disturbance based on the Mamdani type fuzzy logic rule. The hardware experimental result shows that the designed controller can maintain the stability of the liquid flow when given 50% and 100% pipe leakages with maximum undershot by 3.33% and 24% respectively

    Sentiment Analysis for E-Commerce Products Using Natural Language Processing

    Get PDF
    Sentiment analysis is one of the ways to evaluate the attitude of consumers towards products and services. E-commerce businesses have grown to a larger level in recent years. Customers' opinions and preferences are collected to analyze them further to boost online businesses. Collecting real-time structured and unstructured data and performing sentiment analysis on them are challenging and need to be addressed. We have used PySpark, and resilient distributed dataset (RDD) based sentiment analysis using Spark NLP to address scalability and availability issues in sentiment analysis on the e-commerce platform. We have also used FLASK-based Restful APIs and Scrapy for web scrapping to collect useful data from an e-commerce site. Our findings indicate that the proposed method of Natural Language Processing (NLP) for e-commerce products in real-time has enhanced efficiency in terms of scalability, availability, and faster data collectio

    Analyzing evolution of rare events through social media data

    Get PDF
    Recently, some researchers have attempted to find a relationship between the evolution of rare events and temporal-spatial patterns of social media activities. Their studies verify that the relationship exists in both time and spatial domains. However, few of those studies can accurately deduce a time point when social media activities are most highly affected by a rare event because producing an accurate temporal pattern of social media during the evolution of a rare event is very difficult. This work expands the current studies along three directions. Firstly, we focus on the intensity of information volume and propose an innovative clustering algorithm-based data processing method to characterize the evolution of a rare event by analyzing social media data. Secondly, novel feature extraction and fuzzy logic-based classification methods are proposed to distinguish and classify event-related and unrelated messages. Lastly, since many messages do not have ground truth, we execute four existing ground-truth inference algorithms to deduce the ground truth and compare their performances. Then, an Adaptive Majority Voting (Adaptive MV) method is proposed and compared with two of the existing algorithms based on a set containing manually-labeled social media data. Our case studies focus on Hurricane Sandy in 2012 and Hurricane Maria in 2017. Twitter data collected around them are used to verify the effectiveness of the proposed methods. Firstly, the results of the proposed data processing method not only verify that a rare event and social media activities have strong correlations, but also reveal that they have some time difference. Thus, it is conducive to investigate the temporal pattern of social media activities. Secondly, fuzzy logic-based feature extraction and classification methods are effective in identifying event-related and unrelated messages. Lastly, the Adaptive MV method deduces the ground truth well and performs better on datasets with noisy labels than other two methods, Positive Label Frequency Threshold and Majority Voting

    Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

    Get PDF
    [Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the case of blockchain, such characteristics are provided through public-key cryptography and hash functions. However, the fast progress of quantum computing has opened the possibility of performing attacks based on Grover's and Shor's algorithms in the near future. Such algorithms threaten both public-key cryptography and hash functions, forcing to redesign blockchains to make use of cryptosystems that withstand quantum attacks, thus creating which are known as post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. For such a purpose, this article first studies current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs. Moreover, the most relevant post-quantum blockchain systems are studied, as well as their main challenges. Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains. Thus, this article seeks to provide a broad view and useful guidelines on post-quantum blockchain security to future blockchain researchers and developers.10.13039/501100010801-Xunta de Galicia (Grant Number: ED431G2019/01) 10.13039/501100011033-Agencia Estatal de Investigación (Grant Number: TEC2016-75067-C4-1-R and RED2018-102668-T) 10.13039/501100008530-European Regional Development FundXunta de Galicia; ED431G2019/0

    Maximal good step graph methods for reducing the generation of the state space

    Get PDF
    This paper proposes an effective method based on the two main partial order techniques which are persistent sets and covering step graph techniques, to deal with the state explosion problem. First, we introduce a new definition of sound steps, the firing of which enables to extremely reduce the state space. Then, we propose a weaker sufficient condition about how to find the set of sound steps at each current marking. Next, we illustrate the relation between maximal sound steps and persistent sets, and propose a concept of good steps. Based on the maximal sound steps and good steps, a construction algorithm for generating a maximal good step graph (MGSG) of a Petri net (PN) is established. This algorithm first computes the maximal good step at each marking if there exists one, otherwise maximal sound steps are fired at the marking. Furthermore, we have proven that an MGSG can effectively preserve deadlocks of a Petri net. Finally, the change performance evaluation is made to demonstrate the superiority of our proposed method, compared with other related partial order techniques

    Overview of Machine Learning Methods for Lithium-Ion Battery Remaining Useful Lifetime Prediction

    Get PDF
    Lithium-ion batteries play an indispensable role, from portable electronic devices to electric vehicles and home storage systems. Even though they are characterized by superior performance than most other storage technologies, their lifetime is not unlimited and has to be predicted to ensure the economic viability of the battery application. Furthermore, to ensure the optimal battery system operation, the remaining useful lifetime (RUL) prediction has become an essential feature of modern battery management systems (BMSs). Thus, the prediction of RUL of Lithium-ion batteries has become a hot topic for both industry and academia. The purpose of this work is to review, classify, and compare different machine learning (ML)-based methods for the prediction of the RUL of Lithium-ion batteries. First, this article summarizes and classifies various Lithium-ion battery RUL estimation methods that have been proposed in recent years. Secondly, an innovative method was selected for evaluation and compared in terms of accuracy and complexity. DNN is more suitable for RUL prediction due to its strong independent learning ability and generalization ability. In addition, the challenges and prospects of BMS and RUL prediction research are also put forward. Finally, the development of various methods is summarized

    Cooperative multi-sensor tracking of vulnerable road users in the presence of missing detections

    Get PDF
    This paper presents a vulnerable road user (VRU) tracking algorithm capable of handling noisy and missing detections from heterogeneous sensors. We propose a cooperative fusion algorithm for matching and reinforcing of radar and camera detections using their proximity and positional uncertainty. The belief in the existence and position of objects is then maximized by temporal integration of fused detections by a multi-object tracker. By switching between observation models, the tracker adapts to the detection noise characteristics making it robust to individual sensor failures. The main novelty of this paper is an improved imputation sampling function for updating the state when detections are missing. The proposed function uses a likelihood without association that is conditioned on the sensor information instead of the sensor model. The benefits of the proposed solution are two-fold: firstly, particle updates become computationally tractable and secondly, the problem of imputing samples from a state which is predicted without an associated detection is bypassed. Experimental evaluation shows a significant improvement in both detection and tracking performance over multiple control algorithms. In low light situations, the cooperative fusion outperforms intermediate fusion by as much as 30%, while increases in tracking performance are most significant in complex traffic scenes

    IoT trust and reputation: a survey and taxonomy

    Get PDF
    IoT is one of the fastest-growing technologies and it is estimated that more than a billion devices would be utilized across the globe by the end of 2030. To maximize the capability of these connected entities, trust and reputation among IoT entities is essential. Several trust management models have been proposed in the IoT environment; however, these schemes have not fully addressed the IoT devices features, such as devices role, device type and its dynamic behavior in a smart environment. As a result, traditional trust and reputation models are insufficient to tackle these characteristics and uncertainty risks while connecting nodes to the network. Whilst continuous study has been carried out and various articles suggest promising solutions in constrained environments, research on trust and reputation is still at its infancy. In this paper, we carry out a comprehensive literature review on state-of-the-art research on the trust and reputation of IoT devices and systems. Specifically, we first propose a new structure, namely a new taxonomy, to organize the trust and reputation models based on the ways trust is managed. The proposed taxonomy comprises of traditional trust management-based systems and artificial intelligence-based systems, and combine both the classes which encourage the existing schemes to adapt these emerging concepts. This collaboration between the conventional mathematical and the advanced ML models result in design schemes that are more robust and efficient. Then we drill down to compare and analyse the methods and applications of these systems based on community-accepted performance metrics, e.g. scalability, delay, cooperativeness and efficiency. Finally, built upon the findings of the analysis, we identify and discuss open research issues and challenges, and further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin
    corecore