8,564 research outputs found

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Integrating materials supply in strategic mine planning of underground coal mines

    Get PDF
    In July 2005 the Australian Coal Industry’s Research Program (ACARP) commissioned Gary Gibson to identify constraints that would prevent development production rates from achieving full capacity. A “TOP 5” constraint was “The logistics of supply transport distribution and handling of roof support consumables is an issue at older extensive mines immediately while the achievement of higher development rates will compound this issue at most mines.” Then in 2020, Walker, Harvey, Baafi, Kiridena, and Porter were commissioned by ACARP to investigate Australian best practice and progress made since Gibson’s 2005 report. This report was titled: - “Benchmarking study in underground coal mining logistics.” It found that even though logistics continue to be recognised as a critical constraint across many operations particularly at a tactical / day to day level, no strategic thought had been given to logistics in underground coal mines, rather it was always assumed that logistics could keep up with any future planned design and productivity. This subsequently meant that without estimating the impact of any logistical constraint in a life of mine plan, the risk of overvaluing a mining operation is high. This thesis attempts to rectify this shortfall and has developed a system to strategically identify logistics bottlenecks and the impacts that mine planning parameters might have on these at any point in time throughout a life of mine plan. By identifying any logistics constraints as early as possible, the best opportunity to rectify the problem at the least expense is realised. At the very worst if a logistics constraint was unsolvable then it could be understood, planned for, and reflected in the mine’s ongoing financial valuations. The system developed in this thesis, using a suite of unique algorithms, is designed to “bolt onto” existing mine plans in the XPAC mine scheduling software package, and identify at a strategic level the number of material delivery loads required to maintain planned productivity for a mining operation. Once an event was identified the system then drills down using FlexSim discrete event simulation to a tactical level to confirm the predicted impact and understand if a solution can be transferred back as a long-term solution. Most importantly the system developed in this thesis was designed to communicate to multiple non-technical stakeholders through simple graphical outputs if there is a risk to planned production levels due to a logistics constraint

    Architecture and Advanced Electronics Pathways Toward Highly Adaptive Energy- Efficient Computing

    Get PDF
    With the explosion of the number of compute nodes, the bottleneck of future computing systems lies in the network architecture connecting the nodes. Addressing the bottleneck requires replacing current backplane-based network topologies. We propose to revolutionize computing electronics by realizing embedded optical waveguides for onboard networking and wireless chip-to-chip links at 200-GHz carrier frequency connecting neighboring boards in a rack. The control of novel rate-adaptive optical and mm-wave transceivers needs tight interlinking with the system software for runtime resource management

    Adaptation of the human nervous system for self-aware secure mobile and IoT systems

    Get PDF
    IT systems have been deployed across several domains, such as hospitals and industries, for the management of information and operations. These systems will soon be ubiquitous in every field due to the transition towards the Internet of Things (IoT). The IoT brings devices with sensory functions into IT systems through the process of internetworking. The sensory functions of IoT enable them to generate and process information automatically, either without human contribution or having the least human interaction possible aside from the information and operations management tasks. Security is crucial as it prevents system exploitation. Security has been employed after system implementation, and has rarely been considered as a part of the system. In this dissertation, a novel solution based on a biological approach is presented to embed security as an inalienable part of the system. The proposed solution, in the form of a prototype of the system, is based on the functions of the human nervous system (HNS) in protecting its host from the impacts caused by external or internal changes. The contributions of this work are the derivation of a new system architecture from HNS functionalities and experiments that prove the implementation feasibility and efficiency of the proposed HNS-based architecture through prototype development and evaluation. The first contribution of this work is the adaptation of human nervous system functions to propose a new architecture for IT systems security. The major organs and functions of the HNS are investigated and critical areas are identified for the adaptation process. Several individual system components with similar functions to the HNS are created and grouped to form individual subsystems. The relationship between these components is established in a similar way as in the HNS, resulting in a new system architecture that includes security as a core component. The adapted HNS-based system architecture is employed in two the experiments prove its implementation capability, enhancement of security, and overall system operations. The second contribution is the implementation of the proposed HNS-based security solution in the IoT test-bed. A temperature-monitoring application with an intrusion detection system (IDS) based on the proposed HNS architecture is implemented as part of the test-bed experiment. Contiki OS is used for implementation, and the 6LoWPAN stack is modified during the development process. The application, together with the IDS, has a brain subsystem (BrSS), a spinal cord subsystem (SCSS), and other functions similar to the HNS whose names are changed. The HNS functions are shared between an edge router and resource-constrained devices (RCDs) during implementation. The experiment is evaluated in both test-bed and simulation environments. Zolertia Z1 nodes are used to form a 6LoWPAN network, and an edge router is created by combining Pandaboard and Z1 node for a test-bed setup. Two networks with different numbers of sensor nodes are used as simulation environments in the Cooja simulator. The third contribution of this dissertation is the implementation of the proposed HNS-based architecture in the mobile platform. In this phase, the Android operating system (OS) is selected for experimentation, and the proposed HNS-based architecture is specifically tailored for Android. A context-based dynamically reconfigurable access control system (CoDRA) is developed based on the principles of the refined HNS architecture. CoDRA is implemented through customization of Android OS and evaluated under real-time usage conditions in test-bed environments. During the evaluation, the implemented prototype mimicked the nature of the HNS in securing the application under threat with negligible resource requirements and solved the problems in existing approaches by embedding security within the system. Furthermore, the results of the experiments highlighted the retention of HNS functions after refinement for different IT application areas, especially the IoT, due to its resource-constrained nature, and the implementable capability of our proposed HNS architecture.--- IT-järjestelmiä hyödynnetään tiedon ja toimintojen hallinnassa useilla aloilla, kuten sairaaloissa ja teollisuudessa. Siirtyminen kohti esineiden Internetiä (Internet of Things, IoT) tuo tällaiset laitteet yhä kiinteämmäksi osaksi jokapäiväistä elämää. IT-järjestelmiin liitettyjen IoT-laitteiden sensoritoiminnot mahdollistavat tiedon automaattisen havainnoinnin ja käsittelyn osana suurempaa järjestelmää jopa täysin ilman ihmisen myötävaikutusta, poislukien mahdolliset ylläpito- ja hallintatoimenpiteet. Turvallisuus on ratkaisevan tärkeää IT-järjestelmien luvattoman käytön estämiseksi. Valitettavan usein järjestelmäsuunnittelussa turvallisuus ei ole osana ydinsuunnitteluprosessia, vaan otetaan huomioon vasta käyttöönoton jälkeen. Tässä väitöskirjassa esitellään uudenlainen biologiseen lähestymistapaan perustuva ratkaisu, jolla turvallisuus voidaan sisällyttää erottamattomaksi osaksi järjestelmää. Ehdotettu prototyyppiratkaisu perustuu ihmisen hermoston toimintaan tilanteessa, jossa se suojelee isäntäänsä ulkoisten tai sisäisten muutosten vaikutuksilta. Tämän työn keskeiset tulokset ovat uuden järjestelmäarkkitehtuurin johtaminen ihmisen hermoston toimintaperiaatteesta sekä tällaisen järjestelmän toteutettavuuden ja tehokkuuden arviointi kokeellisen prototyypin kehittämisen ja toiminnan arvioinnin avulla. Tämän väitöskirjan ensimmäinen kontribuutio on ihmisen hermoston toimintoihin perustuva IT-järjestelmäarkkitehtuuri. Tutkimuksessa arvioidaan ihmisen hermoston toimintaa ja tunnistetaan keskeiset toiminnot ja toiminnallisuudet, jotka mall-innetaan osaksi kehitettävää järjestelmää luomalla näitä vastaavat järjestelmäkomponentit. Nä-istä kootaan toiminnallisuudeltaan hermostoa vastaavat osajärjestelmät, joiden keskinäinen toiminta mallintaa ihmisen hermoston toimintaa. Näin luodaan arkkitehtuuri, jonka keskeisenä komponenttina on turvallisuus. Tämän pohjalta toteutetaan kaksi prototyyppijärjestelmää, joiden avulla arvioidaan arkkitehtuurin toteutuskelpoisuutta, turvallisuutta sekä toimintakykyä. Toinen kontribuutio on esitetyn hermostopohjaisen turvallisuusratkaisun toteuttaminen IoT-testialustalla. Kehitettyyn arkkitehtuuriin perustuva ja tunkeutumisen estojärjestelmän (intrusion detection system, IDS) sisältävä lämpötilan seurantasovellus toteutetaan käyttäen Contiki OS -käytöjärjestelmää. 6LoWPAN protokollapinoa muokataan tarpeen mukaan kehitysprosessin aikana. IDS:n lisäksi sovellukseen kuuluu aivo-osajärjestelmä (Brain subsystem, BrSS), selkäydinosajärjestelmä (Spinal cord subsystem, SCSS), sekä muita hermoston kaltaisia toimintoja. Nämä toiminnot jaetaan reunareitittimen ja resurssirajoitteisten laitteiden kesken. Tuloksia arvioidaan sekä simulaatioiden että testialustan tulosten perusteella. Testialustaa varten 6LoWPAN verkon toteutukseen valittiin Zolertia Z1 ja reunareititin on toteutettu Pandaboardin ja Z1:n yhdistelmällä. Cooja-simulaattorissa käytettiin mallinnukseen ymp-äristönä kahta erillistä ja erikokoisuta sensoriverkkoa. Kolmas tämän väitöskirjan kontribuutio on kehitetyn hermostopohjaisen arkkitehtuurin toteuttaminen mobiilialustassa. Toteutuksen alustaksi valitaan Android-käyttöjärjestelmä, ja kehitetty arkkitehtuuri räätälöidään Androidille. Tuloksena on kontekstipohjainen dynaamisesti uudelleen konfiguroitava pääsynvalvontajärjestelmä (context-based dynamically reconfigurable access control system, CoDRA). CoDRA toteutetaan mukauttamalla Androidin käyttöjärjestelmää ja toteutuksen toimivuutta arvioidaan reaaliaikaisissa käyttöolosuhteissa testialustaympäristöissä. Toteutusta arvioitaessa havaittiin, että kehitetty prototyyppi jäljitteli ihmishermoston toimintaa kohdesovelluksen suojaamisessa, suoriutui tehtävästään vähäisillä resurssivaatimuksilla ja onnistui sisällyttämään turvallisuuden järjestelmän ydintoimintoihin. Tulokset osoittivat, että tämän tyyppinen järjestelmä on toteutettavissa sekä sen, että järjestelmän hermostonkaltainen toiminnallisuus säilyy siirryttäessä sovellusalueelta toiselle, erityisesti resursseiltaan rajoittuneissa IoT-järjestelmissä

    History, Features, Challenges, and Critical Success Factors of Enterprise Resource Planning (ERP) in The Era of Industry 4.0

    Get PDF
    ERP has been adopting newer features over the last several decades and shaping global businesses with the advent of newer technologies. This research article uses a state-of-the-art review method with the purpose to review and synthesize the latest information on the possible integration of potential Industry 4.0 technologies into the future development of ERP. Different software that contributed to the development of the existing ERP is found to be Material Requirement Planning (MRP), Manufacturing Resource Planning (MRPII), and Computer Integrated Manufacturing (CIM). Potential disruptive Industry 4.0 technologies that are featured to be integrated into future ERP are artificial intelligence, business intelligence, the internet of things, big data, blockchain technology, and omnichannel strategy. Notable Critical Success Factors of ERP have been reported to be top management support, project team, IT infrastructure, communication, skilled staff, training & education, and monitoring & evaluation. Moreover, cybersecurity has been found to be the most challenging issue to overcome in future versions of ERP. This review article could help future ERP researchers and respective stakeholders contribute to integrating newer features in future versions of ERP

    Cyberbullying in educational context

    Get PDF
    Kustenmacher and Seiwert (2004) explain a man’s inclination to resort to technology in his interaction with the environment and society. Thus, the solution to the negative consequences of Cyberbullying in a technologically dominated society is represented by technology as part of the technological paradox (Tugui, 2009), in which man has a dual role, both slave and master, in the interaction with it. In this respect, it is noted that, notably after 2010, there have been many attempts to involve artificial intelligence (AI) to recognize, identify, limit or avoid the manifestation of aggressive behaviours of the CBB type. For an overview of the use of artificial intelligence in solving various problems related to CBB, we extracted works from the Scopus database that respond to the criterion of the existence of the words “cyberbullying” and “artificial intelligence” in the Title, Keywords and Abstract. These articles were the subject of the content analysis of the title and, subsequently, only those that are identified as a solution in the process of recognizing, identifying, limiting or avoiding the manifestation of CBB were kept in the following Table where we have these data synthesized and organized by years

    Challenges Faced in Application of Fire and Life Safety Design in Current Canadian Building Code

    Get PDF
    In the interest of public safety, building designs and construction in Canada are regulated by local legislation which is typically a provincial, or as appropriate municipal, building code based on the National Building Code of Canada (NBCC). The current version of NBCC is an objective-based building code which allow code users to substitute prescribed building designs with a solution achieving the same level of performance defined by intent statements. These intent statements provide rationale behind prescriptive solutions including some degree of baseline as well as factors of safety for building design. However, due to its structure and for practical reasons, it does not and cannot envision every single design possibility in practice. In addition, its slow update cycle cannot keep up with technology advancements currently driven by concerns around energy efficiency, sustainability and development of new materials, and construction methods and climate change. These contribute to some of the challenges that may be faced in application of the NBCC which are investigated through the following five parameters: ‘History and Scientific Background’, ‘Reliability’, ‘Economic Impact’, ‘Design Practicality’ and ‘Guidance for Compliance’. In order to identify and assess the potential issues, three case studies involving atrium design, design for spatial separation of buildings, and finally, design of a building with exposed mass timber elements are presented. Through these three case studies, this thesis investigates technical challenges that exist in executing different design scenarios under the current NBCC. Further, the case studies identify several important factors that designers should be aware of to avoid inappropriate application of the prescriptive solutions specified by the code or, equally, inappropriate evaluations during assessment of an alternative solution through the performance-based approach to building design in the Canadian context. Results lead to identification of challenges encountered in utilizing the current NBCC, not only in terms of achieving the intended level of performance of a design, but also, if desired, in pursuing appropriate alternative design solutions. One of the reasons is that the appropriate level of performance for building design is found challenging to establish, as the intent prescribed in the building code is qualitative while the potential catastrophic events considered could have a low probability but a significant consequence. In addition, these prescribed building code provisions may have limited background information or scientific gaps, as well as outdated technology based on the state of art knowledge available at the time of establishment, some may be from as early as 1960s, leading to overly conservative or even inappropriate design decisions in the present building environment. Inconsistencies in recognizing the relative performance of modern technologies in these provisions are also identified, such as the approximately 90% effectiveness of sprinkler performance, which increases the complexity and uncertainty in building design and review, as they significantly impact the establishment of the baseline for compliant design as well. Further, some important considerations are not appropriately addressed in the current NBCC. In some designs, costs of the acceptable solutions are demonstrated to be 44 times more than alternative solutions. Similarly, building design performance in natural disasters such as earthquakes is not accounted for. This could result in potentially high consequences. Finally, the current NBCC does not recognize social implications, sustainability, and environmental costs that have become contributing factors to building design, material selections, and construction practices towards a cleaner environment. Lastly, limitations found in key aspects of design guidance can lead to inappropriate design when following prescriptive solutions specified by the code or, equally important, can lead to inappropriate evaluation during assessment of an alternative solution. Limited guidance and lack of quantitative assessment thresholds on how either the design team should generate, or how a local officer of the Authority Having Jurisdiction (AHJ) should review and evaluate these building design proposals in terms of their level of performance is provided in current building code. As a result, complex and sophisticated designs may require stakeholders to not only possess experience in industry, but also knowledge of modern research, technology, and fire and life safety risks and trade-offs. Such knowledge can only really be obtained through enhanced education which is limited in Canada currently. The existing level of the competence of both designers and reviewers may lead to inappropriate application of a code compliant fire safety solution, let alone an alternative solution to compliant design. Based on the foregoing, a new paradigm of building design and evaluation in Canada is required. However, with the current Canadian building code environment and challenges identified in this thesis, a long path lies ahead waiting for exploration
    corecore