1,153,987 research outputs found
CONTROL SYSTEMS IN OUR DAILY LIFE
This paper presents development and applications of Control Systems (CS). Several characteristics of CS can be linked to human behavior. CS can "think" in the sense that they can replace to some extent, human operation. CS can distinguish between open-loop and closed-loop CS and it is a concept or principle that seems to fundamental in nature and not necessarily peculiar to engineering. In human social and political organizations, for example, a leader remains the leader only as long as she is successful in realizing the desires of the group. CS theory can be discussed from four viewpoints as: an intellectual discipline within science and the philosophy of science, a part of engineering, with industrial applications and Social Systems (SS) of the present and the future. In global communication, developed countries and developing countries should build several attractive and sound symbiosis bridges, to prevent loss of universe balances. CS applications have social impacts not only in developed countries but also in developing countries. A new work force strategy without denying the existing of CS is established by retooling the work forces, thus the challenges of social impacts could be answers wisely and would be bright opportunities to improve human standards of living
Sparse Eigenmotions derived from daily life kinematics implemented on a dextrous robotic hand
Our hands are considered one of the most complex to control actuated systems, thus, emulating the manipulative skills of real hands is still an open challenge even in anthropomorphic robotic hand. While the action of the 4 long fingers and simple grasp motions through opposable thumbs have been successfully implemented in robotic designs, complex in-hand manipulation of objects was difficult to achieve. We take an approach grounded in data-driven extraction of control primitives from natural human behaviour to develop novel ways to understand the dexterity of hands. We collected hand kinematics datasets from natural, unconstrained human behaviour of daily life in 8 healthy in a studio flat environment. We then applied our Sparse Motion Decomposition approach to extract spatio-temporally localised modes of hand motion that are both time-scale and amplitude-scale invariant. These Sparse EigenMotions (SEMs)[1] form a sparse symbolic code that encodes continuous hand motions. We mechanically implemented the common SEMs on our novel dexterous robotic hand [2] in open-loop control. We report that without processing any feedback during grasp control, several of the SEMs resulted in stable grasps of different daily life objects. The finding that SEMs extracted from daily life implement stable grasps in open-loop control of dexterous hands, lends further support for our hypothesis the brain controls the hand using sparse control strategies
A Security Framework for IOT Based Smart Home Automation System
The Internet of Things (IOT) is a new platform for our technology. Though of IOT, we can control our daily life work such as home application, control and communication systems, easy communication systems, improve our digital services etc. The Internet of Things (IOT) is joining our daily contents information wisely to the internet to make communication between objects and people and among themselves. In this paper, we show an improved home automation by the help of IOT. For calculating response time of IOT, we need fog computing platform. Fog computing also known as fogging or edge computing which is built by Cisco and it is extended the version of cloud computing through a network. In our proposed system, we use motion sensor, SBC-PT which is a network access component and daily life component in home. We can monitor and control that equipment by the approach of IOT based system. The home automation system uses the portable devices as a user interface. They can connect with home automation network through an internet approach. The user will move straightly with the system via control interface whereas home apparatus are remotely controlled through sensor and server. The home automation system has an additional property that enhances the facet of defense from unauthorized accidents. The communication with the server consents the user to pick out the receivable device. This design proposed an efficient control of home automation system
Geometry-induced memory effects in isolated quantum systems: Observations and applications
Memory effects can lead to history-dependent behavior of a system, and they
are ubiquitous in our daily life and have broad applications. Here we explore
possibilities of generating memory effects in simple isolated quantum systems.
By utilizing geometrical effects from a class of lattices supporting flat-bands
consisting of localized states, memory effects could be observed in ultracold
atoms in optical lattices. As the optical lattice continuously transforms from
a triangular lattice into a kagome lattice with a flat band, history-dependent
density distributions manifest quantum memory effects even in noninteracting
systems, including fermionic as well as bosonic systems in the proper ranges of
temperatures. Rapid growth in ultracold technology predicts a bright future for
quantum memory-effect systems, and here two prototypical applications of
geometry-induced quantum memory effects are proposed: An accelerometer
recording the mechanical change rate in a coupled system and a rate-controlled
memvalve where the rate of ramping the lattice potential acts as a control of
the remnant density in the lattice.Comment: 13 pages, 11 figures, update figures and references. We provided one
more application - quantum memory effects atomic memory (QMEAM
Spaces Times and roles in the social control of everyday life
[EN] Social dynamics since the late seventeenth century have incorporated a series of
discursive systems that are the fruit of the process of constituting power and
control over public morals and safeguarding traditional religious values. The
Church, as a repressive agent and shaper of consciences, has exercised multiple
forms of control and surveillance that have been justified within the regime of
daily life so that control could be effective. It has additionally implemented a
system of domination. The general objective here is to describe and analyse the
daily conduct within the convent as a total institution. We do so via a
reconstruction that is based on descriptions of daily life and the tensions
between rules and lived experiences and between the given conditions, as well
as the way in which these appropriated the aforementioned descriptions. We
analyse the collected data from the perspectives of anthropology and sociology,
focusing primarily on Erving Goffman’s symbolic interactionism, as well as
from aspects of Foucault’s work in the form of his consideration of the body as a
social and cultural product and of the repertoire of inquiries that he undertakes on social practices of regulation and domination of bodies that have led to a
significant imbalance in perceptions of control over our bodies and our
sexuality. Our findings show that obedience is a basic requirement in the
construction of and domination over the other, since it is inscribed in a discourse
of power.S
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Exchanging data between different systems enables us to build new smart services and digitise various areas of our daily life. This digitalisation leads to more efficient usage of resources, and an increased monetary value. However, the connection of different systems also increases the number of potential vulnerabilities. The vulnerabilities on their own might be harmless, but attackers could build attack paths based on the combination of different vulnerabilities. Additionally, attackers might exploit existing access control policies to further propagate through the system. For analysing this dependency between vulnerabilities and access control policies, we extended an architecture description language (ADL) to model access control policies and specify vulnerabilities. We developed an attack propagation analysis operating on the extended ADL, which can help to determine confidentiality violations in a system. We evaluated our approach by analysing the accuracy and the effort compared to a manual analysis using different scenarios in three case studies. The results indicate that our analysis is capable of identifying attack paths and reducing the effort compared to manual detection
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Exchanging data between different systems enables us to build new smart services and digitise various areas of our daily life. This digitalisation leads to more efficient usage of resources, and an increased monetary value. However, the connection of different systems also increases the number of potential vulnerabilities. The vulnerabilities on their own might be harmless, but attackers could build attack paths based on the combination of different vulnerabilities. Additionally, attackers might exploit existing access control policies to further propagate through the system. For analysing this dependency between vulnerabilities and access control policies, we extended an architecture description language (ADL) to model access control policies and specify vulnerabilities. We developed an attack propagation analysis operating on the extended ADL, which can help to determine confidentiality violations in a system. We evaluated our approach by analysing the accuracy and the effort compared to a manual analysis using different scenarios in three case studies. The results indicate that our analysis is capable of identifying attack paths and reducing the effort compared to manual detection
- …