1,153,987 research outputs found

    CONTROL SYSTEMS IN OUR DAILY LIFE

    Get PDF
    This paper presents development and applications of Control Systems (CS). Several characteristics of CS can be linked to human behavior. CS can "think" in the sense that they can replace to some extent, human operation. CS can distinguish between open-loop and closed-loop CS and it is a concept or principle that seems to fundamental in nature and not necessarily peculiar to engineering. In human social and political organizations, for example, a leader remains the leader only as long as she is successful in realizing the desires of the group. CS theory can be discussed from four viewpoints as: an intellectual discipline within science and the philosophy of science, a part of engineering, with industrial applications and Social Systems (SS) of the present and the future. In global communication, developed countries and developing countries should build several attractive and sound symbiosis bridges, to prevent loss of universe balances. CS applications have social impacts not only in developed countries but also in developing countries. A new work force strategy without denying the existing of CS is established by retooling the work forces, thus the challenges of social impacts could be answers wisely and would be bright opportunities to improve human standards of living

    Sparse Eigenmotions derived from daily life kinematics implemented on a dextrous robotic hand

    No full text
    Our hands are considered one of the most complex to control actuated systems, thus, emulating the manipulative skills of real hands is still an open challenge even in anthropomorphic robotic hand. While the action of the 4 long fingers and simple grasp motions through opposable thumbs have been successfully implemented in robotic designs, complex in-hand manipulation of objects was difficult to achieve. We take an approach grounded in data-driven extraction of control primitives from natural human behaviour to develop novel ways to understand the dexterity of hands. We collected hand kinematics datasets from natural, unconstrained human behaviour of daily life in 8 healthy in a studio flat environment. We then applied our Sparse Motion Decomposition approach to extract spatio-temporally localised modes of hand motion that are both time-scale and amplitude-scale invariant. These Sparse EigenMotions (SEMs)[1] form a sparse symbolic code that encodes continuous hand motions. We mechanically implemented the common SEMs on our novel dexterous robotic hand [2] in open-loop control. We report that without processing any feedback during grasp control, several of the SEMs resulted in stable grasps of different daily life objects. The finding that SEMs extracted from daily life implement stable grasps in open-loop control of dexterous hands, lends further support for our hypothesis the brain controls the hand using sparse control strategies

    A Security Framework for IOT Based Smart Home Automation System

    Get PDF
    The Internet of Things (IOT) is a new platform for our technology. Though of IOT, we can control our daily life work such as home application, control and communication systems, easy communication systems, improve our digital services etc. The Internet of Things (IOT) is joining our daily contents information wisely to the internet to make communication between objects and people and among themselves. In this paper, we show an improved home automation by the help of IOT. For calculating response time of IOT, we need fog computing platform. Fog computing also known as fogging or edge computing which is built by Cisco and it is extended the version of cloud computing through a network. In our proposed system, we use motion sensor, SBC-PT which is a network access component and daily life component in home. We can monitor and control that equipment by the approach of IOT based system. The home automation system uses the portable devices as a user interface. They can connect with home automation network through an internet approach. The user will move straightly with the system via control interface whereas home apparatus are remotely controlled through sensor and server. The home automation system has an additional property that enhances the facet of defense from unauthorized accidents. The communication with the server consents the user to pick out the receivable device. This design proposed an efficient control of home automation system

    Geometry-induced memory effects in isolated quantum systems: Observations and applications

    Full text link
    Memory effects can lead to history-dependent behavior of a system, and they are ubiquitous in our daily life and have broad applications. Here we explore possibilities of generating memory effects in simple isolated quantum systems. By utilizing geometrical effects from a class of lattices supporting flat-bands consisting of localized states, memory effects could be observed in ultracold atoms in optical lattices. As the optical lattice continuously transforms from a triangular lattice into a kagome lattice with a flat band, history-dependent density distributions manifest quantum memory effects even in noninteracting systems, including fermionic as well as bosonic systems in the proper ranges of temperatures. Rapid growth in ultracold technology predicts a bright future for quantum memory-effect systems, and here two prototypical applications of geometry-induced quantum memory effects are proposed: An accelerometer recording the mechanical change rate in a coupled system and a rate-controlled memvalve where the rate of ramping the lattice potential acts as a control of the remnant density in the lattice.Comment: 13 pages, 11 figures, update figures and references. We provided one more application - quantum memory effects atomic memory (QMEAM

    Spaces Times and roles in the social control of everyday life

    Get PDF
    [EN] Social dynamics since the late seventeenth century have incorporated a series of discursive systems that are the fruit of the process of constituting power and control over public morals and safeguarding traditional religious values. The Church, as a repressive agent and shaper of consciences, has exercised multiple forms of control and surveillance that have been justified within the regime of daily life so that control could be effective. It has additionally implemented a system of domination. The general objective here is to describe and analyse the daily conduct within the convent as a total institution. We do so via a reconstruction that is based on descriptions of daily life and the tensions between rules and lived experiences and between the given conditions, as well as the way in which these appropriated the aforementioned descriptions. We analyse the collected data from the perspectives of anthropology and sociology, focusing primarily on Erving Goffman’s symbolic interactionism, as well as from aspects of Foucault’s work in the form of his consideration of the body as a social and cultural product and of the repertoire of inquiries that he undertakes on social practices of regulation and domination of bodies that have led to a significant imbalance in perceptions of control over our bodies and our sexuality. Our findings show that obedience is a basic requirement in the construction of and domination over the other, since it is inscribed in a discourse of power.S

    Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

    Get PDF
    Exchanging data between different systems enables us to build new smart services and digitise various areas of our daily life. This digitalisation leads to more efficient usage of resources, and an increased monetary value. However, the connection of different systems also increases the number of potential vulnerabilities. The vulnerabilities on their own might be harmless, but attackers could build attack paths based on the combination of different vulnerabilities. Additionally, attackers might exploit existing access control policies to further propagate through the system. For analysing this dependency between vulnerabilities and access control policies, we extended an architecture description language (ADL) to model access control policies and specify vulnerabilities. We developed an attack propagation analysis operating on the extended ADL, which can help to determine confidentiality violations in a system. We evaluated our approach by analysing the accuracy and the effort compared to a manual analysis using different scenarios in three case studies. The results indicate that our analysis is capable of identifying attack paths and reducing the effort compared to manual detection

    Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

    Get PDF
    Exchanging data between different systems enables us to build new smart services and digitise various areas of our daily life. This digitalisation leads to more efficient usage of resources, and an increased monetary value. However, the connection of different systems also increases the number of potential vulnerabilities. The vulnerabilities on their own might be harmless, but attackers could build attack paths based on the combination of different vulnerabilities. Additionally, attackers might exploit existing access control policies to further propagate through the system. For analysing this dependency between vulnerabilities and access control policies, we extended an architecture description language (ADL) to model access control policies and specify vulnerabilities. We developed an attack propagation analysis operating on the extended ADL, which can help to determine confidentiality violations in a system. We evaluated our approach by analysing the accuracy and the effort compared to a manual analysis using different scenarios in three case studies. The results indicate that our analysis is capable of identifying attack paths and reducing the effort compared to manual detection
    corecore