835 results on '"User defined"'
Search Results
2. Adaptive Preamble Embedding With MIMO to Support User-Defined Functionalities in WLANs
- Author
-
Marwan Krunz, Zhengguang Zhang, and Hanif Rahbari
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Orthogonal frequency-division multiplexing ,MIMO ,Mobile computing ,0805 Distributed Computing, 0906 Electrical and Electronic Engineering, 1005 Communications Technologies ,User defined ,Mimo communication ,Preamble ,Embedding ,Electrical and Electronic Engineering ,Networking & Telecommunications ,business ,Software ,Computer network - Abstract
As the Wi-Fi technology transitions into its sixth generation (Wi-Fi 6), there is a growing consensus on the need to support security and coordination functions at the Physical (PHY) layer. In contrast to the costly approach of extending the PHY-layer header to support new functions (e.g., Spatial Reuse field in the 802.11ax-based Wi-Fi frame), we propose to turn specific parts of the frame preamble into a reliable data field while maintaining its primary functions. Specifically, in this paper, we develop a scheme called extensible preamble modulation (eP-Mod) for 802.11n/ac/ax protocols that are built on multiple-input-multiple-output (MIMO) and orthogonal frequency-division multiplexing (OFDM). For each frame, eP-Mod can embed up to 144 user bits into the 802.11ac preamble of an 8×8 MIMO 40MHz transmission. The proposed scheme is adaptive to channel conditions and enables several promising PHY-layer services, such as PHY-layer encryption and channel/device authentication, and PHY-layer signaling. At the same time, it allows legacy (eP-Mod-unaware) devices to continue to process the received preamble as normal by guaranteeing that the proposed preamble waveforms satisfy the structural properties of a standardized preamble. Through numerical analysis, extensive simulations, and hardware experiments, we validate the practicality and reliability ofeP-Mod.
- Published
- 2023
- Full Text
- View/download PDF
3. User-Defined Gestures with Physical Props in Virtual Reality
- Author
-
Mark Hancock, Oliver Schneider, and Marco Moran-Ledesma
- Subjects
InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer Networks and Communications ,Computer science ,User defined ,Virtual reality ,Referent ,Elicitation technique ,Human-Computer Interaction ,Rule-based machine translation ,Human–computer interaction ,Selection (linguistics) ,Mobile device ,Social Sciences (miscellaneous) ,Gesture - Abstract
When interacting with virtual reality (VR) applications like CAD and open-world games, people may want to use gestures as a means of leveraging their knowledge from the physical world. However, people may prefer physical props over handheld controllers to input gestures in VR. We present an elicitation study where 21 participants chose from 95 props to perform manipulative gestures for 20 CAD-like and open-world game-like referents. When analyzing this data, we found existing methods for elicitation studies were insufficient to describe gestures with props, or to measure agreement with prop selection (i.e., agreement between sets of items). We proceeded by describing gestures as context-free grammars, capturing how different props were used in similar roles in a given gesture. We present gesture and prop agreement scores using a generalized agreement score that we developed to compare multiple selections rather than a single selection. We found that props were selected based on their resemblance to virtual objects and the actions they afforded; that gesture and prop agreement depended on the referent, with some referents leading to similar gesture choices, while others led to similar prop choices; and that a small set of carefully chosen props can support multiple gestures.
- Published
- 2021
- Full Text
- View/download PDF
4. User Defined Features (UDF)
- Author
-
Michael Schabacker
- Subjects
Computer science ,User defined ,Humanities - Abstract
User Defined Features sind anwenderdefinierte Formelemente. UDF werden einmalig in einem Einzelteil erzeugt und sind dann in anderen Einzelteilen wiederverwendbar. Dazu werden UDF in Bibliotheken abgelegt und stehen somit einem oder mehreren Nutzern zur Verfugung. So lassen sich oft genutzte Features oder Gruppen von Features, die uber Parameter gesteuert werden, zusammenfassen und schnell aufrufen. Die Steuerparameter werden vom Nutzer definiert und erscheinen anschliesend in dem UDF-Dialog.
- Published
- 2023
- Full Text
- View/download PDF
5. AOI-shapes: An Efficient Footprint Algorithm to Support Visualization of User-defined Urban Areas of Interest
- Author
-
BaoZhifeng, SellisTimos, LiMingzhao, ChoudhuryFarhana, DuckhamMatt, and SametHanan
- Subjects
Human-Computer Interaction ,Footprint ,Artificial Intelligence ,Computer science ,ComputingMilieux_PERSONALCOMPUTING ,Incremental algorithm ,User defined ,Data mining ,Geovisualization ,computer.software_genre ,computer ,Visualization - Abstract
Understanding urban areas of interest (AOIs) is essential in many real-life scenarios, and such AOIs can be computed based on the geographic points that satisfy user queries. In this article, we study the problem of efficient and effective visualization of user-defined urban AOIs in an interactive manner. In particular, we first define the problem of user-defined AOI visualization based on a real estate data visualization scenario, and we illustrate why a novel footprint method is needed to support the visualization. After extensively reviewing existing “footprint” methods, we propose a parameter-free footprint method, named AOI-shapes, to capture the boundary information of a user-defined urban AOI. Next, to allow interactive query refinements by the user, we propose two efficient and scalable algorithms to incrementally generate urban AOIs by reusing existing visualization results. Finally, we conduct extensive experiments with both synthetic and real-world datasets to demonstrate the quality and efficiency of the proposed methods.
- Published
- 2021
- Full Text
- View/download PDF
6. Economic convergence among the world’s top-income economies
- Author
-
Evangelia Desli and Alexandra Gkoulgkoutsika
- Subjects
Economics and Econometrics ,050208 finance ,Economy ,0502 economics and business ,05 social sciences ,Financial crisis ,Economics ,Convergence (economics) ,User defined ,Pairwise comparison ,050207 economics ,Finance ,Period (music) - Abstract
As the world leading economies are changing, the paper studies the scarcely analyzed economies identified as the world’s top-income economies based on the World Bank classification, over the period 1980–2016, instead of the frequently used, but not uniformly defined and more importantly outdated, “developed” countries distinction, and shows that a new group of economies displays convergence. The analysis is performed from three different angles that act in a complementary way, namely, the beta-convergence approach with the ability to detect a deterministic trend and user defined clubs, the log(t) approach that can detect both deterministic and stochastic trends with automatically generated clubs, and finally the pairwise approach that seeks stochastic trends with user defined potential clubs. All methods indicate that the group of the world top-income economies are participating in an ongoing convergence process, though the financial crisis might have disturbed it. The convergence evidence tends to grow weaker when the assumption of the deterministic underlying trend is enriched with a stochastic trend and finally abandoned.
- Published
- 2021
- Full Text
- View/download PDF
7. Stabilization of User-Defined Feedback Controllers in Teleoperation With Passive Coupling Reference
- Author
-
Christian Ott, Michael Panzirsch, Alin Albu-Schaeffer, Ribin Balachandran, Harsimran Singh, and Marco De Stefano
- Subjects
0209 industrial biotechnology ,Control and Optimization ,Adaptive control ,Computer science ,Control (management) ,Biomedical Engineering ,Stability (learning theory) ,User defined ,02 engineering and technology ,telerobotics ,020901 industrial engineering & automation ,haptics ,Artificial Intelligence ,Control theory ,teleoperation ,Coupling ,Mechanical Engineering ,Transparency (human–computer interaction) ,force control ,021001 nanoscience & nanotechnology ,Computer Science Applications ,Human-Computer Interaction ,Control and Systems Engineering ,Teleoperation ,Robot ,Computer Vision and Pattern Recognition ,0210 nano-technology - Abstract
Ensuring stability in time-delayed teleoperation can be difficult in some cases where the feedback forces need to be modified as defined by the user, to increase transparency. In the present letter, we propose an approach to ensure stability of any feedback controller selected by the user by considering a basic passive framework as reference. Stability properties of the proposed method are discussed and we apply it on different feedback controllers as examples. We present the results of hardware experiments, with performance comparison of three different control architectures stabilized with the proposed approach, with different delays and environment stiffnesses.
- Published
- 2021
- Full Text
- View/download PDF
8. User-Defined Gestures for Mid-Air Interaction: A Comparison of Upper Limb Muscle Activity, Wrist Kinematics, and Subjective Preference
- Author
-
Jinghua Huang, Mengyao Qi, Lujin Mao, Tiancheng Ji, Runze Han, and Ming An
- Subjects
medicine.medical_specialty ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer science ,Frequency ratio ,Upper limb muscle ,Human Factors and Ergonomics ,User defined ,Wrist kinematics ,Preference ,Computer Science Applications ,Human-Computer Interaction ,Physical medicine and rehabilitation ,medicine ,Gesture elicitation ,Gesture - Abstract
Traditional gesture elicitation studies generally adopted the frequency ratio to select popular gestures among users. However, the chosen gestures were not always optimal and might pose a potential...
- Published
- 2021
- Full Text
- View/download PDF
9. Extending the learning and communicating shout-ahead architecture with user-defined exception rules -- a case study for traffic light controls
- Author
-
Jörg Denzinger and Christian Roatis
- Subjects
Traffic signal ,Computer science ,business.industry ,User defined ,Architecture ,business ,Computer network - Abstract
We present an extension of the shout-ahead agent architecture that allows for adding human user-defined exception rules to the rules created by the hybrid learning approach for this architecture. The user-defined rules can be added after learning as reaction to weaknesses of the learned rules or learning can be performed with the user-defined rules already in place. We applied the extended shout-ahead architecture and the associated learning to a new application area, cooperating controllers for the traffic lights of intersections. In our experimental evaluations, adding user-defined exception rules to the learned rules for several traffic flow instances increased the efficiency of the resulting controllers substantially compared to just using the learned rules. Performing learning with user-defined exception rules already in place decreased the learning time substantially for all flows, but had mixed results with respect to efficiency. We also evaluated user-defined exception rules for a variant of the architecture that is not using communication and saw similar effects as for the variant with communication. For the communicating version, both variants of adding user-defined exception rules create controllers that are much more flexible than what using the original shout-ahead architecture with its learning is able to create as indicated by experiments with variations of flows.
- Published
- 2021
- Full Text
- View/download PDF
10. PoreMS: a software tool for generating silica pore models with user-defined surface functionalisation and pore dimensions
- Author
-
Nicole Trebel, Niels Hansen, Ulrich Tallarek, Hamzeh Kraus, Julia Rybka, and Alexandra Höltzel
- Subjects
Surface (mathematics) ,Mass transport ,Materials science ,010304 chemical physics ,General Chemical Engineering ,Software tool ,User defined ,02 engineering and technology ,General Chemistry ,Mesoporous silica ,021001 nanoscience & nanotechnology ,Condensed Matter Physics ,Heterogeneous catalysis ,01 natural sciences ,Catalysis ,Adsorption ,Chemical engineering ,Modeling and Simulation ,0103 physical sciences ,General Materials Science ,0210 nano-technology ,Information Systems - Abstract
Mass transport under confinement is at the heart of all processes employing functionalised mesoporous silica materials, such as liquid chromatography, heterogeneous catalysis, and gas adsorption. M...
- Published
- 2021
- Full Text
- View/download PDF
11. Viola: a structural variant signature extractor with user-defined classifications
- Author
-
Hiroki Dobashi, Shohei Matsuyama, Shumpei Ishikawa, Daisuke Komura, and Itsuki Sugita
- Subjects
Statistics and Probability ,Source code ,AcademicSubjects/SCI01060 ,Computer science ,media_common.quotation_subject ,User defined ,computer.software_genre ,Biochemistry ,Extractor ,Annotation ,Molecular Biology ,media_common ,Viola (butterfly) ,computer.programming_language ,biology ,business.industry ,Structural variant ,Pattern recognition ,Python (programming language) ,biology.organism_classification ,Genome Analysis ,Applications Notes ,Signature (logic) ,Computer Science Applications ,Computational Mathematics ,Computational Theory and Mathematics ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Summary Here, we present Viola, a Python package that provides structural variant (SV; large scale genome DNA variations that can result in disease, e.g. cancer) signature analytical functions and utilities for custom SV classification, merging multi-SV-caller output files and SV annotation. We demonstrate that Viola can extract biologically meaningful SV signatures from publicly available SV data for cancer and we evaluate the computational time necessary for annotation of the data. Availability and implementation Viola is available on pip (https://pypi.org/project/Viola-SV/) and the source code is on GitHub (https://github.com/dermasugita/Viola-SV). Supplementary information Supplementary data are available at Bioinformatics online.
- Published
- 2021
12. ABOUT AN ALGORITHM FOR PROCESSING DIGITAL IMAGES THAT PRODUCES UNIFORM DEFORMATION OF USER-DEFINED INTERVALS OF THE BRIGHTNESS HISTOGRAM
- Author
-
I.Y. Kuznetsov and A.B. Raukhvarger
- Subjects
Digital image ,Brightness ,business.industry ,Computer science ,Histogram ,Computer vision ,User defined ,Artificial intelligence ,Deformation (meteorology) ,business - Published
- 2021
- Full Text
- View/download PDF
13. Unforgettable User Defined Seed Phrase for Cryptocurrency Wallets
- Author
-
Cheman Shaik
- Subjects
World Wide Web ,Cryptocurrency ,Phrase ,Computer science ,User defined - Abstract
In this paper I have discussed a new method of enabling a cryptocurrency wallet user to define his own unforgettable seed phrase. An algorithm named SEEPT (Seed Phrase Transformation) is provided and illustrated with a real user defined seed phrase as input and a BIP39 standard seed phrase generated as output through cryptographic transformations. Discussed in detail is how an unforgettable seed phrase can be generatedfrom a set of names or words that are specific to a user’s personal life. Explained in detail as to how a wallet user can reconstruct his seed phrase on demand without depending on any storage, thereby relieving him from the burden of memorizing it frequently or storing it digitally on a computer hardware or physically on a paper or metal media.
- Published
- 2020
- Full Text
- View/download PDF
14. Exploring User Defined Gestures for Ear-Based Interactions
- Author
-
Bing-Yu Chen, Yu-Chun Chen, Chia-Ying Liao, Da-Yuan Huang, and Shuo-wen Hsu
- Subjects
Human ear ,Computer Networks and Communications ,Computer science ,Interface (computing) ,05 social sciences ,Wearable computer ,020207 software engineering ,User defined ,02 engineering and technology ,Human-Computer Interaction ,Human–computer interaction ,Taxonomy (general) ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,Set (psychology) ,Think aloud protocol ,050107 human factors ,Social Sciences (miscellaneous) ,Gesture - Abstract
The human ear is highly sensitive and accessible, making it especially suitable for being used as an interface for interacting with smart earpieces or augmented glasses. However, previous works on ear-based input mainly address gesture sensing technology and researcher-designed gestures. This paper aims to bring more understandings of gesture design. Thus, for a user elicitation study, we recruited 28 participants, each of whom designed gestures for 31 smart device-related tasks. This resulted in a total of 868 gestures generated. Upon the basis of these gestures, we compiled a taxonomy and concluded the considerations underlying the participants' designs that also offer insights into their design rationales and preferences. Thereafter, based on these study results, we propose a set of user-defined gestures and share interesting findings. We hope this work can shed some light on not only sensing technologies of ear-based input, but also the interface design of future wearable interfaces.
- Published
- 2020
- Full Text
- View/download PDF
15. Optimizing the Design of Tall Buildings Using the Principle of Virtual Work: The Effect of Semi Rigid Connections
- Author
-
Johnnie Strydom and Alex Elvin
- Subjects
business.industry ,Stiffness ,020101 civil engineering ,User defined ,02 engineering and technology ,Structural engineering ,Eurocode ,0201 civil engineering ,020303 mechanical engineering & transports ,0203 mechanical engineering ,Building code ,Deflection (engineering) ,Steel frame ,Solid mechanics ,medicine ,Virtual work ,medicine.symptom ,business ,Civil and Structural Engineering ,Mathematics - Abstract
The Virtual Work Optimization Method (VWOM) is used to optimize tall buildings with semi rigid connections. The VWOM is an automated method that minimizes the mass of a structure with a given geometry, deflection criteria and load cases, while adhering to building code requirements. Members are selected from a user defined database to meet strength and stiffness criteria. The rotational stiffness of connections can be specified and varied, from rigid to pinned. The method is explained using an example of a two storey one bay steel frame with six members. Four case studies are presented: (i) a six storey two bay frame, (ii) a ten storey one bay steel building, (iii) a fifteen storey three bay steel frame and (iv) a twenty four storey three bay building. The examples are compared to results found in the literature. Structures were optimized for a range of connection rotational stiffnesses. The VWOM obtained results up to 44.6% lighter than published work. Optimized results showed that in most cases the semi rigid connection produced the same results as the rigid connections. This is due to the rapid plateauing of the optimized mass as the connection stiffness increases. Thus, the typical definition of semi rigid and rigid rotational stiffnesses (for example Eurocode 3) are both found on this plateau. If some members are lightly loaded, broad semi rigid and rigid bands can be produced. The effect in these cases is that structures with rigid connections are lighter than those with semi rigid connections as no compensation in the member stiffness is required to meet deflection criteria.
- Published
- 2020
- Full Text
- View/download PDF
16. Design of Garri Frying Machine with User-defined Temperature Regulation and Motion Control System
- Author
-
Uchenna Godswill Onu
- Subjects
Computer science ,Control engineering ,User defined ,Motion control - Published
- 2020
- Full Text
- View/download PDF
17. Discussion of user‐defined parameters for recursive subspace identification: Application to seismic response of building structures
- Author
-
Kenneth J. Loh, Chin-Hsiung Loh, Jun-Da Chen, and Shieh-Kung Huang
- Subjects
Identification (information) ,State-space representation ,Computer science ,Earth and Planetary Sciences (miscellaneous) ,Forgetting factor ,User defined ,Geotechnical Engineering and Engineering Geology ,Algorithm ,Subspace topology - Published
- 2020
- Full Text
- View/download PDF
18. Structural Optimization of 2D Auxetic Structures Having User-defined Poisson’s Ratio
- Author
-
Woongbeom Heogh, Gyung-Jin Park, and Joon B. Park
- Subjects
symbols.namesake ,Auxetics ,Mechanical Engineering ,Mathematical analysis ,symbols ,User defined ,Poisson's ratio ,Mathematics - Published
- 2020
- Full Text
- View/download PDF
19. Implementing User defined Attribute and Policy based Access Control
- Author
-
Jkr Sastry
- Subjects
business.industry ,Computer science ,General Engineering ,Access control ,User defined ,business ,Computer network - Published
- 2020
- Full Text
- View/download PDF
20. JointSearch: Efficient parametric detailing preparation through user-defined and property-based joint type filtering
- Author
-
John Haddal Mork and Marcin Luczkowski
- Subjects
Structure (mathematical logic) ,Engineering drawing ,Computer science ,Property (programming) ,020101 civil engineering ,User defined ,02 engineering and technology ,Building and Construction ,Type (model theory) ,Computer Graphics and Computer-Aided Design ,0201 civil engineering ,Computer Science Applications ,Geometric relations ,020303 mechanical engineering & transports ,0203 mechanical engineering ,Design process ,Joint (building) ,Parametric statistics - Abstract
Detailing joints are important when designing structures. In this design process, a structure is divided into different joint types. Digital fabrication and algorithmic aided design have changed the conceptions and requirements of joint detailing. However, parametric tools that can efficiently identify joint types based on the solution space are not available. This article presents a methodology that efficiently generates topological relations and enables the user to assign joint instances to joint types. A series of property-based search criteria components is applied to define the solution space of a joint type. Valid joints are coherently filtered, deconstructed and outputted for detailing. The article explains both the methodology and programming-related aspects of the joint type filtering. The article concludes that the developed methodology offers the desired flexibility and may be suitable for other materials and applications.
- Published
- 2020
- Full Text
- View/download PDF
21. Implementasi Augmented Reality Furniture Dengan User-Defined Target Berbasis Android
- Author
-
Rizky Prabowo, Yudistira Fazri, Akmal Junaidi, and Admi Syarif
- Subjects
Software ,business.industry ,Computer science ,Computer graphics (images) ,Augmented reality ,User defined ,Android (operating system) ,business - Abstract
Furniture catalogs display items statically in 2-dimensional form only. Buyers often want to observe furniture in a real room. Home-View application in this study can display 3D furniture objects as they want. Home-View App has been developed with Augmented Reality technology. Application is developed using the Vuforia SDK library and User Defined Target (UDT) method in the Unity3D software. UDT is utilized to display 3D furniture on a target like magazine and book covers. Home-View application has two menus namely Marker Katalog and HomeView. Marker Katalog serves as a method to view 3D furniture in a small form in the furniture catalog. HomeView serves as a way to view 3D furniture in the desired room. This application has a positioning feature on the x and y axis and rotating feature on the z axis. The application can run by displaying 3D furniture to its actual size at the HomeView menu and successfully displaying 3D furniture as listed on the catalog at the Marker Katalog menu.
- Published
- 2020
- Full Text
- View/download PDF
22. Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks
- Author
-
Cheman Shaik
- Subjects
Password ,050101 languages & linguistics ,Authentication ,Public key certificate ,Dependency (UML) ,Computer science ,business.industry ,05 social sciences ,User defined ,02 engineering and technology ,Client ,Computer security ,computer.software_genre ,Phishing ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,0202 electrical engineering, electronic engineering, information engineering ,Web application ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,business ,computer - Abstract
A counter challenge authentication method is presented for authentication of online users of web applications. The authentication method involves a counter challenge from a user to a web application asking to provide certain information from one or more user details recorded at the time of registration. The user enters his password and logs into the web application only in case the correct answer is received from the web application. This advanced authentication method protects online application users from phishing attacks. An incorrect answer or inability of the web application to provide the correct answer to the challenge is a clear indication of a phishing attack, thereby alerting the user and stopping submission of password to phishers. The authentication method is computer independent and eliminates dependency on two-factor authentication, hardware tokens, client software installations, digital certificates, and user defined seals.
- Published
- 2020
- Full Text
- View/download PDF
23. Demystifying Unexpected Silicon Responses through User-Defined Fault Models (UDFM) and Failure Analysis
- Author
-
Lavakumar Ranganathan, Gaurav Bhargava, Subhadip Kundu, and Lesly Endrinal
- Subjects
Silicon ,chemistry ,Computer science ,chemistry.chemical_element ,User defined ,Fault (power engineering) ,Reliability engineering - Abstract
This paper presents a user-defined fault model (UDFM) that accounts for silicon behaviors that cannot be explained using traditional stuck-at and transition delay fault models. The new model targets cell-internal faults but does not require time-intensive SPICE simulations because it operates at the logic level. As added benefit, error logs collected using UDFM patterns (instead of traditional models) can be used to generate diagnostic callouts with improved resolution. A workflow that effectively achieves this is presented in the paper along with three case studies that demonstrate the usefulness of the proposed method.
- Published
- 2021
- Full Text
- View/download PDF
24. 3D Navigation by UAV using a mono-camera, for precise target tracking for contact inspection of critical infrastructures
- Author
-
Laura Bonde Holst, Tobias Skov, and Matteo Fumagalli
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Margin of error ,Estimator ,User defined ,Tracking (particle physics) ,Drone ,Computer vision ,Artificial intelligence ,User interface ,business ,Position control ,Monocular camera - Abstract
This paper proposes a novel approach for autonomous 3D tracking of targets and position control of a UAV, using a monocular camera to aim at positioning an end-effector probe on a vertical concrete surface. The proposed solution is based on features detection on a concrete surface, and aims to control the drone to a user defined target that is chosen via a user interface. To ensure 3D perception of the selected target, the approach is combined with a camera-based distance estimator, that uses laser pointers mounted on the drone. Experimental results show that the system is able to navigate towards the user-defined target and establish contact with it with a limited a margin of error.
- Published
- 2021
- Full Text
- View/download PDF
25. Improving Security in Smart Home Networks through user-defined device interaction rules
- Author
-
Manju Mohan Pillai and A.S.J. Helberg
- Subjects
Home automation ,business.industry ,Computer science ,User defined ,Use case ,Network intrusion detection ,User awareness ,Technical skills ,Computer security ,computer.software_genre ,business ,Internet of Things ,computer - Abstract
Internet of Things (IoT) devices and applications are growing for smart home use cases. Although various security risks have been identified in smart home devices, studies reveal that the majority of the smart home devices released in the market have multiple security vulnerabilities and, in many cases, no security mechanisms are implemented. These vulnerabilities of smart home networks are mostly attributed to user unawareness of security. Many users are not aware and do not have the technical skills or knowledge of what is happening on their devices in their smart home environment. When an intruder connects to their device or takes advantage of it, users are unaware of such a connection. This paper introduces a configuration tool that helps users to create device interaction rules that are added to an existing Network Intrusion Detection System (NIDS) in the smart home network. These rules generate alarms that alert the user if unwanted interaction takes place between their devices or from an external network, and in this way increases user awareness of the security of their smart home network.
- Published
- 2021
- Full Text
- View/download PDF
26. A Meta-Learning Approach for User-Defined Spoken Term Classification with Varying Classes and Examples
- Author
-
Jianping Wang, Yangbin Chen, and Tom Ko
- Subjects
Computer science ,business.industry ,Meta learning ,User defined ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing ,Term (time) - Published
- 2021
- Full Text
- View/download PDF
27. ALGORITHM MAMDANI AT DIAGNOSING VEHICLE MALFUNCTION WITH THE HEPL OF USER DEFINED SYMPTOMS
- Author
-
P.A. Bakulov, Llc «Pragmatics», and A.A. Kudryavtsev
- Subjects
Computer science ,User defined ,Data mining ,computer.software_genre ,computer - Published
- 2020
- Full Text
- View/download PDF
28. THERMAL PERFORMANCE ANALYSIS OF SENSIBLE AND PCM-INTEGRATED THERMAL INSULATION LAYERS TO IMPROVE THERMAL COMFORT IN BUILDING
- Author
-
Boumediene Touati, Joseph Virgone, and Nordine Kerroumi
- Subjects
Fluid Flow and Transfer Processes ,Brick ,Liquid fraction ,Materials science ,Thermal insulation ,business.industry ,Thermal ,Thermal comfort ,Mechanical engineering ,User defined ,Surfaces and Interfaces ,business - Published
- 2020
- Full Text
- View/download PDF
29. User-defined Type 3 fonts in LuaTeX
- Author
-
Hans Hagen
- Subjects
Programming language ,Computer science ,User defined ,Type (model theory) ,computer.software_genre ,computer - Published
- 2020
- Full Text
- View/download PDF
30. Parçacık Sürü Optimizasyonu Ayarlı Türev Etkisi Filtreli Bir PID Denetleyici için Hata Tabanlı ve Kullanıcı Tanımlı Amaç Fonksiyonlarının Performans Analizi
- Author
-
Mustafa Sinasi Ayas and Erdinc Sahin
- Subjects
0211 other engineering and technologies ,PID controller ,Particle swarm optimization ,User defined ,02 engineering and technology ,General Medicine ,Derivative ,010501 environmental sciences ,01 natural sciences ,Filter (video) ,Control theory ,021105 building & construction ,0105 earth and related environmental sciences ,Mathematics - Abstract
Bu calismada, hatanin karesinin integrali (HKI), zaman agirlikli hatanin karesinin integrali (ZAHKI), mutlak hatanin integrali (MHI) ve zaman agirlikli mutlak hatanin integrali (ZAMHI) gibi control sistemleri tasariminda sik kullanilan hata tabanli amac fonksiyonlari (HTAF) ile kullanici tanimli amac fonksiyonlarinin (KTAF) gecici ve kalici durum tepkilerinin performans analizi incelenmistir. Optimizasyon surecinde, parcacik surusu optimizasyonu (PSO) algoritmasi tarafindan ayarlanan turev etkisi filtreli oransal-integral-turevsel denetleyici, ikinci dereceden olu zamanli bir test sistemi icin kullanilmistir. Simulasyon sonuclari, KTAF'IN oturma zamani, asim ve alt asim degerlerindeki ustunlugunu gostermektedir.
- Published
- 2019
- Full Text
- View/download PDF
31. Implementing user‐defined atlas‐based auto‐segmentation for a large multi‐centre organisation: the Australian Experience
- Author
-
Michelle Burr, Marcel Knesl, Paul Melnyk, Mikel Byrne, Richard Foster, Andrew Fong, Saul Williams, Amelia Thompson, Amy Teh, Yunfei Hu, Ben Archibald-Heeren, Kenton Thompson, Eve Tiong, Jiy Lim, Rylie Humble, Anna Hardy, Luke Moore, and Fiona Gordon
- Subjects
Male ,lcsh:Medical physics. Medical radiology. Nuclear medicine ,Engineering drawing ,Computer science ,lcsh:R895-920 ,User defined ,030218 nuclear medicine & medical imaging ,03 medical and health sciences ,0302 clinical medicine ,efficiency gain ,Humans ,Radiology, Nuclear Medicine and imaging ,multi‐centre organisation ,Multi centre ,Atlas‐based auto‐segmentation ,Head and neck ,radiotherapy ,Contouring ,Data collection ,Radiological and Ultrasound Technology ,contouring ,Atlas (topology) ,Auto segmentation ,Data Collection ,Radiotherapy Planning, Computer-Assisted ,Australia ,Original Articles ,Thoracic Neoplasms ,Head and Neck Neoplasms ,030220 oncology & carcinogenesis ,Original Article ,Female ,Selection method - Abstract
Introduction Contouring has become an increasingly important aspect of radiation therapy due to inverse planning, and yet is extremely time‐consuming. To improve contouring efficiency and reduce potential inter‐observer variation, the atlas‐based auto‐segmentation (ABAS) function in Velocity was introduced to ICON cancer centres (ICC) throughout Australia as a solution for automatic contouring. Methods This paper described the implementation process of the ABAS function and the construction of user‐defined atlas sets and compared the contouring efficiency before and after the introduction of ABAS. Results The results indicate that the main limitation to the ABAS performance was Velocity's sub‐optimal atlas selection method. Three user‐defined atlas sets were constructed. Results suggested that the introduction of the ABAS saved at least 5 minutes of manual contouring time (P, To improve contouring efficiency and reduce potential inter‐observer variation, the atlas‐based auto‐segmentation (ABAS) function was introduced to ICON cancer centres (ICC) throughout Australia. Three user‐defined atlas sets were constructed, which saved at least 5 minutes of manual contouring time.
- Published
- 2019
32. Meso-scopic model for progressive failure of resin impregnated yarns in composite overwrapped pressure vessels (COPVs)
- Author
-
Stuart Leigh Phoenix and Jiakun Liu
- Subjects
020301 aerospace & aeronautics ,Materials science ,Composite number ,Aerospace Engineering ,User defined ,02 engineering and technology ,01 natural sciences ,Pressure vessel ,Overwrap ,Stress (mechanics) ,0203 mechanical engineering ,Safe operation ,0103 physical sciences ,Fracture (geology) ,Composite material ,Safety, Risk, Reliability and Quality ,010303 astronomy & astrophysics ,Stress concentration - Abstract
Composite Overwrapped Pressure Vessels (COPVs) are widely used in space launch vehicles and the automotive industry. Due to the potential for catastrophic loss caused by failure of COPVs, improved understanding of its mechanical and damage growth behavior is necessary to ensure its safe operation. In this paper, we described a developed mesoscopic model with the capability of modeling tows/yarns with inserted, in-ply interface elements and interface layers as resin rich zones. Furthermore, the model realizes 1) arbitrary winding angle build-up of overwrap plies, 2) controllable detailed dimensions, and 3) user defined material behavior for all regions. These features are critical for potential studies of in-situ and parametric overwrap failure in COPVs. In the present work, stress profiles and progressive failure around a single tow break are shown by case studies involving various interface and damage evolution properties. The investigation indicates that the strength and damage evolution law of interface elements both have direct effect on the stress concentration factors and damage evolution around a tow break/fracture. Resulting physical phenomena and stress overload profile are discussed as well.
- Published
- 2019
- Full Text
- View/download PDF
33. The Design of Educational Tool for Jury's Stability Test
- Author
-
Metin Hatun and Fahri Vatansever
- Subjects
Engineering drawing ,Jury ,Stability test ,Computer science ,media_common.quotation_subject ,Software tool ,Interface (computing) ,Stability (learning theory) ,Table (database) ,User defined ,General Medicine ,media_common - Abstract
Stability analysis in systems is a very important topic. Many methods are available in this area. One of these is the Jury's stability test. In this study, a software tool that analyzes the stability of user defined systems according to Jury's stability test has been developed. Stability of the linear time-invariant discrete-time systems can be realized step by step (Jury table, stability test conditions, etc.) easily and effectively according to this criterion with the software tool which has user-friendly interface, including the topic description and can be used for educational purposes.
- Published
- 2019
- Full Text
- View/download PDF
34. Predictive analysis of stitched aerospace structures for advanced aircraft
- Author
-
F. Collier, Javid Bayandor, Brandon Horton, Dawn C. Jegley, and Y. Song
- Subjects
Structure (mathematical logic) ,Computer science ,business.industry ,Aviation ,Aerospace Engineering ,User defined ,02 engineering and technology ,Experimental validation ,021001 nanoscience & nanotechnology ,Finite element method ,Numerical methodology ,020303 mechanical engineering & transports ,0203 mechanical engineering ,Fuselage ,Systems engineering ,0210 nano-technology ,Aerospace ,business ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
In recent years, the aviation industry has taken a leading role in the integration of composite structures to develop lighter and more fuel efficient aircraft. Among the leading concepts to achieve this goal is the Pultruded Rod Stitched Efficient Unitized Structure (PRSEUS) concept. The focus of most PRSEUS studies has been on developing an hybrid wing body structure, with only a few discussing the application of PRSEUS to a tube-wing fuselage structure. Additionally, the majority of investigations for PRSEUS have focused on experimental validation of anticipated benefits rather than developing a methodology to capture the behavior of stitched structure analytically. This paper presents an overview of a numerical methodology capable of accurately describing PRSEUS’ construction and how it may be implemented in a barrel fuselage platform resorting to high-fidelity mesoscale modeling techniques. The methodology benefits from fresh user defined strategies developed in a commercially available finite element analysis environment. It further proposes a new approach for improving the ability to predict deformation in stitched composites, allowing for a better understanding of the intricate behavior and subtleties of stitched aerospace structures.
- Published
- 2019
- Full Text
- View/download PDF
35. Effect of pitting defects on the buckling strength of thick-wall cylinder under axial compression
- Author
-
Haicheng Chen, Han Mengxue, Yang Yu, Zhaoyu Wang, Huakun Wang, Xu Weipeng, and Jianxing Yu
- Subjects
Materials science ,Physics::Instrumentation and Detectors ,0211 other engineering and technologies ,020101 civil engineering ,User defined ,02 engineering and technology ,Building and Construction ,Splash zone ,Mechanics ,Coordinate-measuring machine ,Thick wall ,0201 civil engineering ,Buckling ,Axial compression ,021105 building & construction ,Cylinder ,General Materials Science ,Civil and Structural Engineering ,Parametric statistics - Abstract
This paper is aimed at assessing the effects of uniformly and randomly distributed pitting defects on the collapse pressure (FCO) of thick-wall cylinder under axial compression, which is exposed to the marine splash zone. The buckling performance of locally corroded cylinder was experimental and numerical studied. The experimental program involved seamless stainless steel tubes (316L) with different size of pitting defects, which were simulated by cylindrical hole. The pitting defects were introduced into the outside surface of cylinder by milling and drilling, and then the buckling strength of such structure was obtained experimentally. The profile of cylinder was examined in details using RA7320 Portable Arm Coordinate Measuring Machine (PACMM), and the measured data was analyzed carefully. A novel shell model was also established by a user defined Python program, where both uniformly and randomly distributed pits can be considered and the computational efficiency was highly improved. After calibrated with the experiment results, the model was used to carry out a systematic parametric study. It indicated that the radial imperfection and out-of-straightness as well as pitting defects (pitting size, perforated or un-perforated and distribution pattern) are key parameters governing the collapse pressure of such cylinder, and the maximum cross sectional area loss or volume loss are good parameter to correlate the collapse pressure and pitting damage. For engineering practice, the uniformly distributed pits model is better due to the convenience and conservative point of view, and the computational cost is also lower. However, the randomly distributed pitting model is more realistic, and some special collapse mode can only be observed when the random nature was taken into account.
- Published
- 2019
- Full Text
- View/download PDF
36. Vague concept lattice reduction using granular computing and vague entropy
- Author
-
Prem Kumar Singh
- Subjects
Numerical Analysis ,General Computer Science ,Applied Mathematics ,Granular computing ,User defined ,010103 numerical & computational mathematics ,02 engineering and technology ,01 natural sciences ,Fuzzy logic ,Theoretical Computer Science ,Algebra ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Formal concept analysis ,Entropy (information theory) ,020201 artificial intelligence & image processing ,0101 mathematics ,Lattice reduction ,Mathematics - Abstract
Recently, the calculus of Formal Concept Analysis (FCA) in the fuzzy setting is prolonged in bipolar fuzzy space for precise analysis of fuzzy attributes. In this process it is addressed that the attributes like bald (or tadpole) or not bald (not tadpole) cannot be defined through a precise or sharp boundaries. To deal with them, some evidence to support (i.e. true t A membership-values) or reject (i.e. false f A membership-values) the attributes is required in the given boundary 0 ≤ t A + f A ≤ 1 . Hence, the proposed method tried to provide the mathematical algebra of vague concept lattice and its navigation at user defined granules with an illustrative example. In addition, the vague entropy measurement is also computed to validate the results.
- Published
- 2019
- Full Text
- View/download PDF
37. Rating investment projects of user-defined duration under regular redemption schedule: A new approach
- Author
-
Peter Brusov, Tatiana Filatova, Natali Orekhova, and V.L. Kulik
- Subjects
Schedule ,Computer science ,Operations management ,User defined ,Duration (project management) ,Investment (macroeconomics) - Published
- 2019
- Full Text
- View/download PDF
38. A CONSTITUTIVE MODEL FOR BOTH LOW AND HIGH STRAIN NONLINEARITIES IN HIGHLY FILLED ELASTOMERS AND IMPLEMENTATION WITH USER-DEFINED MATERIAL SUBROUTINES IN ABAQUS
- Author
-
Travis W. Hohenberger, Nicola M. Pugno, Richard J. Windslow, and James J. C. Busfield
- Subjects
Materials science ,Polymers and Plastics ,Tension (physics) ,Subroutine ,Constitutive equation ,User defined ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Elastomer ,Strain energy ,020303 mechanical engineering & transports ,Character (mathematics) ,0203 mechanical engineering ,Hyperelastic material ,Materials Chemistry ,Composite material ,0210 nano-technology - Abstract
Strain energy functions (SEFs) are used to model the hyperelastic behavior of rubberlike materials. In tension, the stress–strain response of these materials often exhibits three characteristics: (i) a decreasing modulus at low strains (200%). Fitting an SEF that works in each regime is challenging when multiple or nonhomogeneous deformation modes are considered. The difficulty increases with highly filled elastomers because the small strain nonlinearity increases and finite-extensibility occurs at lower strains. One can compromise by fitting an SEF to a limited range of strain, but this is not always appropriate. For example, rubber seals in oilfield packers can exhibit low global strains but high localized strains. The Davies–De–Thomas (DDT) SEF is a good candidate for modeling such materials. Additional improvements will be shown by combining concepts from the DDT and Yeoh SEFs to construct a more versatile SEF. The SEF is implemented with user-defined material subroutines in Abaqus/Standard (UHYPER) and Abaqus/Explicit (VUMAT) for a three-dimensional general strain problem, and an approach to overcome a mathematically indeterminate stress condition in the unstrained state is derived. The complete UHYPER and VUMAT subroutines are also presented.
- Published
- 2019
- Full Text
- View/download PDF
39. Data model implementation in ITER data archiving system
- Author
-
R. Castro, J. Faig, Y. Makushok, Jesús Vega, and Lana Abadie
- Subjects
Computer science ,Mechanical Engineering ,User defined ,Plan (drawing) ,Dynamic resolution ,01 natural sciences ,Data type ,010305 fluids & plasmas ,Variety (cybernetics) ,Metadata ,Nuclear Energy and Engineering ,Data model ,0103 physical sciences ,Header ,Systems engineering ,General Materials Science ,010306 general physics ,Civil and Structural Engineering - Abstract
ITER’s CODAC archiving system currently manages three different sets of data: DAN, SDN and PON, that correspond with the three networks: Data Archiving Network, Synchronous Data Network, and Plan Operational Network. In this sense, ITER’s CODAC data archiving system has been implemented to manage a wide variety of complex types of data and to support multidimensionality, dynamic resolution, metadata embedded types with header and footer sections, or user defined composition of types. This work describes ITER archiving data model, how it is able to fulfill ITER data requirements and keys of its implementation.
- Published
- 2019
- Full Text
- View/download PDF
40. User-defined gesture interaction for in-vehicle information systems
- Author
-
Jiali Qiu, Yu Wang, Jiayi Liu, Xiaolong Zhang, and Huiyue Wu
- Subjects
InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer Networks and Communications ,Computer science ,020207 software engineering ,User defined ,02 engineering and technology ,Field (computer science) ,Hardware and Architecture ,Human–computer interaction ,Participatory design ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,In vehicle ,Information system ,Set (psychology) ,Software ,Gesture - Abstract
Gesture elicitation study, a technique emerging from the field of participatory design, has been extensively applied in emerging interaction and sensing technologies in recent years. However, traditional gesture elicitation study often suffers from the gesture disagreement and legacy bias problem and may not generate optimal gestures for a target system. This paper reports a research project on user-defined gestures for interacting with in-vehicle information systems. The main contribution of our research lies in a 3-stage, participatory design method we propose for deriving more reliable gestures than traditional gesture elicitation methods. Using this method, we generated a set of user-defined gestures for secondary tasks in an in-vehicle information system. Drawing on our research, we develop a set of design guidelines for freehand gesture design. We highlight the implications of this work for the gesture elicitation for all gestural interfaces.
- Published
- 2019
- Full Text
- View/download PDF
41. Development of cryostat integrated TL/OSL reader for its application in radiation dosimetry
- Author
-
D.R. Mishra, Debabrata Datta, Anuj Soni, S.S. Gaur, D.K. Koul, P. Sawant, and M. Uke
- Subjects
010302 applied physics ,Cryostat ,Physics ,Nuclear and High Energy Physics ,Optically stimulated luminescence ,business.industry ,User defined ,Phosphor ,Photoionization ,Radiation ,01 natural sciences ,Thermoluminescence ,030218 nuclear medicine & medical imaging ,03 medical and health sciences ,0302 clinical medicine ,Optics ,0103 physical sciences ,Dosimetry ,business ,Instrumentation - Abstract
A cryostat based integrated TL/OSL reader has been designed and developed to study the temperature dependence of photoionization cross-section at various low temperatures. The system has the facility to record thermoluminescence (TL) as well as optically stimulated luminescence (OSL) at various low temperatures from −150 to 250 ∘ C. It facilitates the measurement of OSL at various temperatures thus; temperature dependence of OSL at various low temperatures can be studied. A PID (Proportional–Integral–Derivative) based temperature controller has been designed and incorporated for generating and controlling user defined heating profiles for the TL measurements in the reader system. The reader system can measure the temperature of the planchet within ± 1 ∘ C precision. The optical stimulation unit consists of two high power LEDs fitted in two channels and optically focused on the sample. In the OSL operation, besides the conventional CW-OSL, LM-OSL modes a non-linear OSL (NL-OSL) method has been incorporated in the reader system. The sensitivity of the system is found to be comparable to that of commercial Riso reader system in OSL mode. The OSL grade α -Al2O3:C phosphor was used to test the reader system and investigate the temperature dependence of OSL in this phosphor at low temperature regime. We report the results of OSL experiments on α -Al2O3:C, and of generalized numerical simulations of potential OSL behaviour with temperature. The photoionization cross-section of shallow as well as dosimetric traps has been evaluated numerically as well as experimentally. The design concept of the reader system and the results of low temperature OSL are discussed.
- Published
- 2019
- Full Text
- View/download PDF
42. DESIGNING AN APPLICATION USING USER DEFINED ALGORITHM IN DATA MINING FOR IDENTIFYING FAKE PRODUCT REVIEWS IN LAZADA
- Author
-
Ada’ilu Tijjani Umar
- Subjects
Product reviews ,Computer science ,User defined ,Data mining ,computer.software_genre ,computer - Published
- 2019
- Full Text
- View/download PDF
43. Pulse-Width Modulation (PWM) Signal Simulation with User-Defined Sampling Frequency and Modulating Frequency Using MATLAB
- Author
-
Melissa B. Martin
- Subjects
Computer science ,business.industry ,Window (computing) ,User defined ,Signal ,Electronic engineering ,Nyquist–Shannon sampling theorem ,business ,MATLAB ,computer ,Pulse-width modulation ,Electronic circuit ,Graphical user interface ,computer.programming_language - Abstract
Pulse width modulation has many useful applications and so with this, a PWM signal simulation through MATLAB is presented that can be beneficial for analysis and model development. This paper aims to have a baseline how to present pulse width modulation graphically using MATLAB. The specific design has a graphical user interface window to display the generated pulse width modulation signal and modulating signal in which user can indicate sampling frequency to be used and the information signal. This module can be also later used for circuits or networks that need control or switching.
- Published
- 2021
- Full Text
- View/download PDF
44. User defined weight based budget and deadline constrained workflow scheduling in cloud
- Author
-
Ravi Shankar Singh, Umare D. Vasant, Swati Gupta, and Vijit Saxena
- Subjects
Computational Theory and Mathematics ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Workflow scheduling ,Cloud computing ,User defined ,business ,Weight based dosing ,Software ,Computer Science Applications ,Theoretical Computer Science - Published
- 2021
- Full Text
- View/download PDF
45. User-defined cloud
- Author
-
Yiying Zhang, Ardalan Amiri Sani, and Guoqing Harry Xu
- Subjects
Scheme (programming language) ,Resource (project management) ,Computer science ,business.industry ,Distributed computing ,User defined ,Cloud computing ,User needs ,business ,computer ,computer.programming_language ,System software - Abstract
Since its creation, cloud computing has always taken a provider-dictated approach, where cloud providers define and manage the cloud to accommodate the user needs they deem important. We propose "User-Defined Cloud", or UDC, a new cloud scheme that allows users to define their own "clouds", by defining hardware resource needs, system software features, and security requirements of their applications, and to do so without the need to build or manage low-level systems.
- Published
- 2021
- Full Text
- View/download PDF
46. An Overview on Plant Disease Detection Algorithm Using Deep Learning
- Author
-
Usha Mittal, Venkata Reddy Challa, Manivarsh Adi, Yeshwanth Kumar, Pooja Rana, Harinath Reddy A, and Abhishek Kumar Singh
- Subjects
Disease detection ,business.industry ,Computer science ,Deep learning ,food and beverages ,User defined ,Key features ,Machine learning ,computer.software_genre ,Plant disease ,Residual neural network ,Leaf disease ,Artificial intelligence ,business ,computer - Abstract
Disease detection in plants is one of the major concerns for farmers nowadays. As many new techniques like Deep Learning capability to dive into deep analysis and computation made it one of the prominent techniques for plant leaf disease detection. Mobile applications with inbuilt deep learning models are helping farmers to detect and classify the disease throughout the world. It consists of disparate techniques like ANN and CNN to diagnose the disease in plant leaves. It uses key features of images to detect and diagnose the type of diseases present in leaves. Some pre-trained models like AlexNet, GoogleNet, LeNet, ResNet, VGGNET and Inception with a huge number of learnable parameters had shown classification or detection of disease in leaves. This paper focused on different architecture like predefined and user defined models that were used for detection of diseases in plant leaves.
- Published
- 2021
- Full Text
- View/download PDF
47. Network User Traffic Injection Based On Docker Container Technology
- Author
-
Yaqing Wu, Ke Wang, Ziqi He, Ziming Zeng, Xi Chen, and Keyao Zhang
- Subjects
Computer science ,business.industry ,Network data ,User defined ,Python (programming language) ,computer.software_genre ,High fidelity ,Virtual machine ,Container (abstract data type) ,Software-defined networking ,business ,Traffic generation model ,computer ,computer.programming_language ,Computer network - Abstract
In computer network research, it is often necessary to build running network application environments using simulations to perform network verification and investigate theoretical or engineering problems. With the development, software defined networking (SDN) can be combined with Docker container technology to build lightweight virtual networks with centralized control and high fidelity. Virtual networks built using Docker containers require fewer physical resources compared with virtual machine-based approaches, particularly for simulating large-scale network scenarios. There is an urgent requirement for a user traffic injection tool for Docker containerized virtual networks to facilitate experiments and performance evaluations for large-scale network data planes. Therefore, this paper proposes combining Python and Docker technology to build a network user traffic injection tool, to realize large-scale user traffic injection and user defined traffic generation, and implement effective traffic injection for Docker based virtual networks.
- Published
- 2021
- Full Text
- View/download PDF
48. Optimization of multi-site nicking mutagenesis for generation of large, user-defined combinatorial libraries
- Author
-
Timothy A. Whitehead, Zachary T Baumer, Angélica V Medina-Cucurella, and Monica B Kirby
- Subjects
0303 health sciences ,Computer science ,Oligonucleotide ,Multi site ,Mutagenesis (molecular biology technique) ,Bioengineering ,User defined ,Protein engineering ,Computational biology ,Protein Engineering ,Biochemistry ,Antibody fragments ,Deep sequencing ,03 medical and health sciences ,0302 clinical medicine ,Molecular evolution ,Mutagenesis ,Mutation ,Original Article ,Molecular Biology ,030217 neurology & neurosurgery ,030304 developmental biology ,Biotechnology ,Gene Library - Abstract
Generating combinatorial libraries of specific sets of mutations are essential for addressing protein engineering questions involving contingency in molecular evolution, epistatic relationships between mutations, as well as functional antibody and enzyme engineering. Here we present optimization of a combinatorial mutagenesis method involving template-based nicking mutagenesis, which allows for the generation of libraries with >99% coverage for tens of thousands of user-defined variants. The non-optimized method resulted in low library coverage, which could be rationalized by a model of oligonucleotide annealing bias resulting from the nucleotide mismatch free-energy difference between mutagenic oligo and template. The optimized method mitigated this thermodynamic bias using longer primer sets and faster annealing conditions. Our updated method, applied to two antibody fragments, delivered between 99.0% (32451/32768 library members) to >99.9% coverage (32757/32768) for our desired libraries in 2 days and at an approximate 140-fold sequencing depth of coverage.
- Published
- 2021
49. Unsupervised Online Anomaly Detection to Identify Cyber-Attacks on Internet Connected Photovoltaic System Inverters
- Author
-
Adam Summers, Nicholas Jacobs, Adrian R. Chavez, Brian Wright, Shamina Hossain-McKenzie, and C. Birk Jones
- Subjects
Artificial neural network ,Computer science ,business.industry ,Photovoltaic system ,020206 networking & telecommunications ,User defined ,02 engineering and technology ,Adversary ,computer.software_genre ,Set (abstract data type) ,Adaptive resonance theory ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Anomaly detection ,Data mining ,business ,computer - Abstract
Often machine learning applications rely on batch learning for training, but a complete set of network communications data may not be readily available. Therefore, this work evaluates the potential for an online learning and detection method that uses an Adaptive Resonance Theory (ART) artificial neural network to protect internet connected photovoltaic (PV) inverters. The methodology involves an initial anomaly detection step to see if the ART algorithm recognizes the behavior. If not, the distance between the nearest ART template (or memory category) is computed and compared with a user defined threshold. Distances that exceed the threshold are flagged while smaller distances designate the data as normal and thus included in the neural network training. It is evident, through experimental tests, that the proposed approach recognizes normal activity and appropriately identifies adversary reconnaissance and denial-of-service actions.
- Published
- 2021
- Full Text
- View/download PDF
50. Using Human Pose Estimation for User-Defined Indoor Location Sensing
- Author
-
Masahide Nakamura, Sachio Saiki, and Sinan Chen
- Subjects
Canvas element ,HTML5 ,Ubiquitous computing ,Computer science ,020208 electrical & electronic engineering ,010401 analytical chemistry ,Real-time computing ,User defined ,02 engineering and technology ,Space (commercial competition) ,01 natural sciences ,0104 chemical sciences ,Image (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Pose - Abstract
To implement indoor location sensing convenient and affordable for general households, this paper presents a novel method to simply realize user-defined indoor location sensing using fixed-point camera devices, human pose estimation technologies, and HTML canvas elements. Specifically, our method first captures images of a target space to the browser in real-time, then creates an HTML5 canvas element to draw the live image in the browser. Our key idea is to use the bounding-box-as-a-location (BBL) concept that users can define any rectangular area as a location in the live image with the computer mouse. Next, the coordinates of human joints in the live image are obtained using human pose estimation technologies. In this way, the system notifies the label of BBL, the sensing result of each body part ID, and the current time, as soon as the coordinates of human joints enter into any defined BBL. Users can develop various user-defined location-aware services using these notifications. Our method is possible to implement using inexpensive camera devices and normal computer browsers. Moreover, since all BBL is defined by each user freely, it does not require developers to perform any learning in each indoor environment. Therefore, general users can easily introduce it in the room. Using the proposed method, we conducted multiple experiments from one house to another. By performing the quantitative evaluation, the advantage and limitation are made explicit.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.