96 research outputs found

    Road Vehicle Following System With Adaptive Controller Gain Using Model Reference Adaptive Control Method

    Get PDF
    In order to maintain stability and satisfy operating constraints, the control system on the following vehicle needs information about the motion of preceding vehicle. A one-vehicle look-ahead control strategy is proposed and will be investigated for this operation. A mathematical model for this control strategy is obtained and simulated. This paper describes the process of designing an adaptive controller gain for a road vehicle following system. This is done through simulations and is further discussed to find the effectiveness of the method

    A Model of Virus Infection Dynamics in Mobile Personal Area Network

    Get PDF
    In this paper, the authors explore the mobile network security focused on the virus threat. Firstly, the authors explain the importance of mobile network security which sometimes not really takes into considerations by users. This paper then explains the virus threat of mobile devices virus where it explains how the viruses spread. The threats can be in three major forms namely the virus spreading via mobile personal area network, virus spreading via internet access and virus spreading via messaging. Lastly a model explains the dynamics of the infection on Mobile Network is introduced

    A Note on Redesign Material Substitution and Topology Optimization in a Lightweight Robotic Gripper

    Get PDF
    The gripper is required because it is the portion of the robot that makes direct contact with the object being grasped. It should weigh as little as possible without compromising functionality or its performance. This study aims to reconsider the construction of a lightweight robotic gripper by modifying the gripper's materials and topology. Using the finite element (FE) method, several types of gripper materials were evaluated for static stress. On the basis of the results of the FE analysis, the optimal material candidate was chosen using the weighted objective method. Using the Fusion 360 software, the topology of the selected material was then optimized in an effort to achieve the 40% weight reduction’s objective. In addition, the suggested optimized geometry is then fine-tuned so that it can be manufactured as efficiently as possible. The final step in the validation of the robotic gripper's design was stress static analysis. The revised gripper design has a mass of 0.08 kg, a reduction of 94% from the original mass, and a safety factor of 3.67%, which satisfies the desired level of performance for the robotic gripper. Utilizing different materials and optimizing the gripper's topology can significantly reduce the overall mass of a robotic gripper. &nbsp

    In situ synthesis of hydroxyapatite-grafted titanium nanotube composite

    Get PDF
    The present study is an investigation to demonstrate the effectiveness of insitu approach in the synthesis of hydroxyapatite-grafted titanium nanotube composite (HA-TNT). This method involves combining the process of HA sol–gel and rapid breakdown anodisation of titanium in a novel solution consisting of NaCl and N3PO4. This new synthesis approach produced a uniform dispersion of Anatase and Rutile phases of TiO2 nanotubes with minimal agglomeration in the matrix of crystalline HA. The characterisation of homogenised HA-TNT composite was investigated via field emission scanning electron microscopy (FESEM), energy dispersive spectroscopy (EDS), transmission electron microscope (TEM) and X-ray diffraction (XRD). FESEM and TEM images indicated the nanostructure of composite with TiO2 nanotube diameter of approximately 10 nm. XRD and EDS analyses confirmed the formation of HA crystalline with the Ca/P ratio of 1.58 and formation of Anatase and Rutile phase of TiO2 nanotubes

    Cloud-Based In-Vehicle Air Quality Monitoring System with GSM Module

    Get PDF
    The purpose of this study is to develop a monitoring system that not limited to real-time vehicle tracking, but also with the ability to monitor in-vehicle air quality. In vehicle air quality is referred to indoor air quality (IAQ) inside the vehicle cabin which is lacked of awareness among driver nowadays. Previous research indicates that human spend up to 90% of their daily time inside the closed circulated air environment including, the vehicle. Prolonged use of air recirculation inside the vehicle cabin can lead to a gradual accumulation of carbon dioxide (CO2) which may occur the symptoms such as fatigue, headaches, and dizziness even deleterious effects on cognitive function towards the occupants. Vehicle cabin is an enclosed environment to prevent the outdoor air directly flow inside the vehicle cabin. However, when the vehicle speed increases the air pressure will be applied onto the joint of the car body and created some leakages then the outdoor air can flow into the cabin then may change the IAQ. A Global System for Mobile (GSM) communications module is utilised as a proxy to push the aggregated information such as real-time vehicle location, IAQ status and timestamps into the cloud database with an iteration of the 30s. The average time delayed for data to reach the cloud database is approximate 3.6s from the time it transmitted. Through the Android mobile application, the user can observe the in-vehicle air quality with the current location in two optional modes: real-time or historical data. The developed device and system were compared with off the shelf device (AeroQual). The Bland-Altman plot method was applied to validate the result of in-vehicle air quality system. The coefficient of determination (R2) value between these two devices is approximately 0.9. The in-vehicle air quality with vehicle tracking system has been successfully developed and provided a reliable result

    The influence of user mobility in mobile virus propagation: An enterprise mobile security perspective

    Get PDF
    In this paper, the authors review the usage of mobile devices in the enterprise and also the major impact from the infected mobile devices.Then the authors highlight the virus threat to enterprise mobile security and how critical the problems are.The authors then discuss the mobile virus infection dynamics which are the Bluetooth infections, mobile emails infections and mobile internet infections which are the threats to the enterprise mobile security. Then the authors discuss on the influences of user mobility issue in spreading mobile viruses before concluded this article

    EMBEDDED INTRUSION PREVENTION SYSTEM(eIPS) ON LINUX-BASED SINGLE BOARD COMPUTER IN E- COMMERCE SECURITY

    Get PDF
    ABSTRACT Intrusion Prevention Systems(IPS) is a new type of security element that pervades the network and automatically protects organizations from a broad variety of attack types and from all potential points of attack inside out. This embedded system plays an important role in recent technology development. This IPS application will be develop and embed on the linux-based single board computer (SBC).SBC can handle several functions depend to their features even they has limitation in term of memory, capacity, control system and security. This paper will explain the concept of Embedded Intrusion Prevention System(eIPS) on a Linux-based Single Board Computer. The eIPS also is giving an idea described how network management software and extensible hardware can work together in order to protect the e-commerce applications. KEYWORDS Intrusion Prevention Systems, embedded system INTRODUCTION The tremendous increase in cyber attacks linked with the dependence of modern organization on the reliability and functionality of their IT structure has led to a change in mindset. As "IT downtime" is rising, the priorities are shifting. As recent surveys show, cyber attacks -especially targeted to the networks -are real, and no longer an unlikely incident that only occur to few exposed networks of organizations in the limelight. In the struggle to both maintain and implement any given IT security policy, professional IT security management is no longer able to ignore these issues, as attacks on networks become not only more frequent but also more devastating; in many organizations commercial success is directly related to the safe and reliable operation of their networks. The term Intrusion Prevention Systems (IPS) is relatively new, often pushed by the marketing departments to move the Intrusion Detection Systems (IDS) manufactures away from the negative image of IDS. They are essentially a combination of access control (firewall/router) and IDS, this alliance coming naturally as both technologies often use shared technologies. Nearly all modern commercial firewalls use "stateful" inspection and commercial IDS use signature recognition. Both technologies need to "look deep into the packet" before making an access decision in the case of a firewall or raise an alarm in the case of an IDS. To make this possible in an efficient manner, sufficient processing power is necessary, which has become more easily available in recent years. An IPS works like an in-line network IDS allowing for instant access control policy modifications. With the arrival of DDoS attacks such as the recent "W32.Blaster.Worm" the market trend is clearly focussing on IPS rather than IDS. Predominantly an IPS is not only found on security appliances, such as (ICoEC) 2006, 19th-20th September, Penang, Malaysia 114 certain firewalls, but also on stand alone appliances delivered. The idea to implement IPS here is driven by commercial as well as technical aspects. To-date IPS has had the most success with "flood" (i.e. DoS) type attacks. Proceedings of the International Conference on E-Commerce With the progress of technical sophistication in the hacker methods, especially modern DoS or DDoS attacks, attack signatures are not easily detected. Generically one may assume that an attack signature is derived from a stream of packets with a malicious content in both the packet header and the packet payload. INTRUSION PREVENTION SYSTEM(IPS) Definition of IPS An IPS can be defined as an in-line product that focuses on identifying and blocking malicious network activity in real time. In general, there are two categories: • rate-based products; and • content-based (also referred to as signature-and anomaly-based). The devices often look like firewalls and often have some basic firewall functionality. But firewalls block all traffic except that for which they have a reason to pass, whereas IPS pass all traffic except that for which they have a reason to block. Rate-based IPS Rate-based Intrusion Prevention Systems block traffic based on network load, for example, too many packets, or too many connects, or too many errors. In the presence of too much of anything, a rate-based IPS kicks in and blocks, throttles or otherwise mediates the traffic. Most useful rate-based IPS include a combination of powerful configuration options with range of response technologies. For example, limit queries to the Domain Name Server (DNS) server to 1000 per second and/or offer other simple rules covering bandwidth and connection limiting. A rate-based Intrusion Prevention System can set a threshold of maximum amount of traffic to be directed at a given port or service. If the threshold is exceeded, the IPS will block all further traffic of the source IP only, still allowing other users (source Internet Protocol (IP)s) to use that service. Disadvantages of rate-based IPS The biggest problem with deploying rate-based IPS products is deciding what constitutes an overload. For any rate-based IPS to work properly, the network owner needs to know not only what "normal" traffic levels are (on a host-by-host and port-by-port basis) but also other network details, such as how many connections their web servers can handle. However, most commercial products do not yet provide any help in establishing this base-line behaviour, but require the services of a "trained" product specific systems engineer who often spend hours on site setting-up the IPS. Because rate-based IPS require frequent tuning and adjustment, they will be most useful in very high-volume Web, application and mail server environments. Content-based products Content-base Intrusion Prevention Systems block traffic based on attack signatures and protocol anomalies; they are the natural evolution of the Intrusion Detection Systems and firewalls. They block the following: • Worms -(e.g. Blaster and MyDoom) that match a signature can be blocked. • Packets that do not comply with TCP/IP RFCs can be dropped. • Suspicious behaviour such as port scanning triggers the IPS to block future traffic from a single host

    Study on adhesion strength of tin coated biomedical ti-13zr-13nb alloy

    Get PDF
    One of the crucial factors which determine the success of coated implantation and stability in the long run is the strength of adhesion between the coating and substrate. After implantation, a weakly adhered coating may delaminate and this might seriously restrict the implant’s effectiveness and longevity. Based on past studies, the quality of TiN coating is directly influenced by the process parameters. The objective of this research is to evaluate the effect of N2 gas flow rate on adhesion strength of biomedical grade Ti-13Zr-13Nb alloy. In this research, N2 gas flow rate of 100, 200 and 300 sccm were varied while the other parameters (substrate temperature and bias voltage) were fixed. The scratch testing method was used to examine the adhesion strength of the TiN coating. This research used the calibrated optical images to verify the total coating failures on the scratched coated samples. The results indicated that the micro droplet form on the TiN coating decreases as the flow rate of the N2 gas increases. In contrast, the TiN coating’s adhesion strength increases with the increase of N2 gas flow rate. It can be concluded that N2 gas flow rate was significant factor in improving the coating properties of TiN on Ti-13Zr-13Nb alloy

    Time-Dependent Fatigue Crack Propagation Behavior of Two Solid-Solution-Strengthened Ni-Based Superalloys—INCONEL 617 and HAYNES 230

    Full text link
    The fatigue crack propagation (FCP) as well as the sustained loading crack growth (SLCG) behavior of two solid-solution-strengthened Ni-based superalloys, INCONEL 617 (Special Metals Corporation Family of Companies) and HAYNES 230 (Haynes International, Inc., Kokomo, IN), were studied at increased temperatures in laboratory air under a constant stress-intensity- factor (K) condition. The crack propagation tests were conducted using a baseline cyclic triangular waveform with a frequency of 1 3 Hz. Various hold times were imposed at the maximum load of a fatigue cycle to study the hold time effect. The results show that a linear elastic fracture mechanics (LEFM) parameter, stress intensity factor (K), is sufficient to describe the FCP and SLCG behavior at the testing temperatures ranging from 873 K to 1073 K (600 C to 800 C). As observed in the precipitation-strengthened superalloys, both INCONEL 617 and HAYNES 230 exhibited the time-dependent FCP, steady SLCG behavior, and existence of a damage zone ahead of crack tip. A thermodynamic equation was adapted to correlate the SLCG rates to determine thermal activation energy. The fracture modes associated with crack propagation behavior were discussed, and the mechanism of time-dependent FCP as well as SLCG was identified. Compared with INCONEL 617, the lower crack propagation rates of HAYNES 230 under the time-dependent condition were ascribed to the different fracture mode and the presence of numerous W-rich M6C-type and Cr-rich M23C6-type carbides. Toward the end, a phenomenological model was employed to correlate the FCP rates at cycle/time-dependent FCP domain. All the results suggest that an environmental factor, the stress assisted grain boundary oxygen embrittlement (SAGBOE) mechanism, is mainly responsible for the accelerated time dependent FCP rates of INCONEL 617 and HAYNES 230

    Toxicity Testing in the 21st Century: Defining New Risk Assessment Approaches Based on Perturbation of Intracellular Toxicity Pathways

    Get PDF
    The approaches to quantitatively assessing the health risks of chemical exposure have not changed appreciably in the past 50 to 80 years, the focus remaining on high-dose studies that measure adverse outcomes in homogeneous animal populations. This expensive, low-throughput approach relies on conservative extrapolations to relate animal studies to much lower-dose human exposures and is of questionable relevance to predicting risks to humans at their typical low exposures. It makes little use of a mechanistic understanding of the mode of action by which chemicals perturb biological processes in human cells and tissues. An alternative vision, proposed by the U.S. National Research Council (NRC) report Toxicity Testing in the 21st Century: A Vision and a Strategy, called for moving away from traditional high-dose animal studies to an approach based on perturbation of cellular responses using well-designed in vitro assays. Central to this vision are (a) “toxicity pathways” (the innate cellular pathways that may be perturbed by chemicals) and (b) the determination of chemical concentration ranges where those perturbations are likely to be excessive, thereby leading to adverse health effects if present for a prolonged duration in an intact organism. In this paper we briefly review the original NRC report and responses to that report over the past 3 years, and discuss how the change in testing might be achieved in the U.S. and in the European Union (EU). EU initiatives in developing alternatives to animal testing of cosmetic ingredients have run very much in parallel with the NRC report. Moving from current practice to the NRC vision would require using prototype toxicity pathways to develop case studies showing the new vision in action. In this vein, we also discuss how the proposed strategy for toxicity testing might be applied to the toxicity pathways associated with DNA damage and repair
    • …
    corecore