Intelligent Compressor Design in a Network-Centric Environment

Author(s):  
Peter J. Röhl ◽  
Raymond M. Kolonay ◽  
Michael J. Paradis ◽  
Michael W. Bailey

Abstract The concept of a federation of distributed devices on a network which enter the federation through a process of “discover and join”, by which they register with a service request broker and publish the services which they perform is applied to engineering software tools. A highly flexible computer architecture is developed, leveraging emerging web technologies like Sun Microsystems’ Jini™, RMI, JavaSpaces, in which engineering software tools like CAD, CAE, PDM, optimization, cost modeling, etc. act as distributed service providers and service requestors. The individual services communicate via so-called context models, which are abstractions of the master model data of a particular product. A human user interacts with the framework through a thin client like a web browser from anywhere in the world, where proper security measures to prevent unauthorized access to proprietary data is maintained. The paradigm of the CAD Master Model is extended with the introduction of the Intelligent Master Model (IMM), which, in addition to the what, captures the why and how of a design through the use of knowledge-based engineering tools. The framework is applied to the intelligent scaling and detailed finite element analysis of a compressor rotor and compressor blades. A KBE system scales the compressor rotor based on high-level information like mass flow and resulting flowpath geometry. The scaled geometry is validated through detailed high-fidelity stress analysis of critical features, which is associatively linked to the scaled master geometry.

Threats involve various risks and threats are associated with the embedded SIM technology, for instance, the Internet of things (IoT) identity. IoT refers to the working capabilities enabling the allocation of unique identifiers (UID) to effectively connect with the related devices thus enhancing communication. An e-SIM application cannot produce reliable and actual data used to obtain the subscriber’s anticipated outcome. The SIM technology does not provide some reliable data that can be employed by the user to formulate some serious productive outcomes. Failure by the technology to process and automatically provide the user with the notification suppose of any infringement or hacking. SIM-jacking is the other notable threats facing the embedded universal integrated connectivity card (e-UICC). Incompetent Log Rhythm Al Engine influences the fraudster hacking experience due to failure protections within the operational surrounding. The e-SIM technology system lacks timely threat, risk, and other various vital operations predictability to react to the experienced unbearable operations challenges induced by the fraudsters. Similarly, the embedded SIM incurs the insider threats whereby the service providers fail to secure the much-needed privacy concerning an individual’s vital information. The situations of personal data leakage are witnessed within the system operations.The e-SIM hijacking enables the fraudsters to secretly obtain the victim’s vital data of the subscriber, hijack, and receive the information intended to the individual to his/her personal phone. The process results to complete mobile account operations by the hacker resulting to further access to the victim’s bank information and transfer of cash. The other threat experienced by e-SIM users is the provision of false information. The SIM subscribers normally fall into traps of the fraudsters by receiving short messages (SMS) citing assistance kind of news from the service providers, thus drawing the victim’s bank amount. Identity fraud and device poisoning are other additional threats encountered in the application of e-SIM. Generally, the entire process of fraud invasion and victimization influence the victim’s business decisions of the affected individuals. Protections focuses on the embedded SIM provides greater security in addition to a re-programmable technological system, unlike the physical SIM card. The subscriber's personal information is not contained within the e-SIM but with the service providers, thus enhancing its effectiveness. An e-SIM enables the consumers to effectively shift carriers between the T-Mobile and Sprint without physical movement, thus supportive of security systems. Despite the security measures put into place, e-SIM like any other SIM card experiences information theft. Therefore, the service providers should encounter the emerging fraudster effects by proper monitoring of the network system to enable security restrictions. The system should induce strict conditions that enable the evaluation and differentiation between the IoT and the non-IoT devices during their operation.


2020 ◽  
Vol 15 (2) ◽  
Author(s):  
Sugunarani S ◽  
Santhosh V

This work deals with the analysis of heat generation and dissipation in the disc brake of a car during braking and the following release period by using computer-aided engineering software for three different materials of the rotor disc and brake pad. The objective of this work is to analyze the temperature distribution of rotor disc during operation using COMSOL Multiphysics. The work uses the finite element analysis techniques to calculate and predict the temperature distribution on the brake disc and to identify the critical temperature of the brake rotor disc. Conduction, convection and radiation of heat transfer have been analyzed. The results obtained from the analysis indicates that different material on the same retardation of the car during braking shows different temperature distribution. A comparative study was made between grey cast iron (GCI), Aluminium Metal Matrix Composite (AMMC), Alloy steel materials are used for brake disc and the best material for making brake disc based on the rate of heat dissipation have been suggested.


Land ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 273
Author(s):  
Mahsa Mesgar ◽  
Diego Ramirez-Lovering

Informal settlements represent a challenging operational context for local government service providers due to precarious contextual conditions. Location choice and land procurement for public infrastructure raise the complicated question: who has the right to occupy, control, and use a piece of land in informal settlements? There is currently a dearth of intelligence on how to identify well-located land for public infrastructure, spatially and with careful consideration for safeguarding the claimed rights and preventing conflicts. Drawing on a case study of green infrastructure retrofit in seven informal settlements in Makassar, Indonesia, we classify the informal settlers’ land rights into four types: ownership, use, control, and management. This exploratory study uses a typological approach to investigate the spatial dimension of land rights in informal settlements. We introduce non-registrable land interests and the partial, dynamic, and informal land use rights that impact the land procurement for infrastructure retrofit. We also create a simple spatial matrix describing the control/power, responsibilities and land interests of different stakeholders involved in the location decision making for public infrastructure. We argue that without sufficient understanding of non-formal land rights, land procurement proposals for the public infrastructure upgrades can be frustrated by the individual or group claims on the land, making the service provision impossible in informal settlements.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Oscar A. Mendoza Reales ◽  
Caterin Ocampo ◽  
Yhan Paul Arias Jaramillo ◽  
Juan Carlos Ochoa Botero ◽  
Jorge Hernán Quintero ◽  
...  

Decoupling the individual effects of multiwalled carbon nanotubes (MWCNTs) and surfactants when used as reinforcement materials in cement-based composites is aimed in this study. Powder MWCNTs were dispersed in deionized water using different types of surfactants as chemical dispersing agents and an ultrasonic tip processor. Cement pastes with carbon nanotubes additions of 0.15% by mass of cement were produced in two steps: first, the MWCNT/surfactant dispersions were combined with the mixing water, and then, cement was added and mixed until a homogeneous paste was obtained. Mechanical properties of the pastes cured at 7 days were measured, and their fracture behavior was characterized using the linear elastic finite element analysis. It was found that the reinforcing effect of MWCNT was masked by the negative effect of surfactants in the cement matrix; nevertheless, nanotubes were capable of increasing both stress and strain capacity of the composite by controlling the crack propagation process at the tip of the crack.


Author(s):  
Sofia Stavropoulos

The NDIS introduces changes to the level of control, choice and flexibility that persons with a disability can exercise over the services they require to support their individual needs. One of the main stays of NDIS is the ability for persons with a disability to utilise allocated funding how and with whom they choose to create a package of supports. Coinciding with the move towards the NDIS has been the introduction of the NSW WHS Act 2011. This Act introduces and broader new definitions relating to persons with responsibilities for ensuring health and safety at work. In some circumstances the individual person with a disability will be a direct employer, or an “other” in the workplace, and will take on responsibilities for health and safety for persons working in their home. For government organisations making funding decisions and allocating funds for the purchase of support services, there continues to be an obligation to ensure that services are conducted safely with risks to health adequately managed. NSW FACS can not “contract” out of their obligations. Instead we must work in partnership with all stakeholders to manage WHS risks as far as is reasonably practicable. Our role in government means we have the resources, experience, and must respond to the community expectation that we will support persons with a disability to understand and discharge their WHS obligations as far as is reasonably practicable. This is a way of operating presents the following questions: Do persons with disability understand the WHS obligations and risks associated with their care and supports? How to individuals with disability obtain sound advice and information on WHS risks that may be associated with their care arrangements? Can WHS information and resources that organisations like NSW Department of Family and Community Services (Ageing Disability and Home Care) have established be leverages to share with our “clients”? As Government partners in NDIS are we obligated to share our knowledge and information? What is the best way to bridge the gap in understanding and what types of information, tools and training can be made available on WHS for persons with a disability.A Joint WHS project currently underway within NSW FACS seeks to address the information and resources gap for all clients who participate in self directed funding arrangements (including NDIS). Our project will demonstrate how products and advice developed for internal staff use can be “reframed” and made accessible to persons with disability, their carers and individual service providers. The approach being applied within NSW FACS will potentially reduce costs in persons with disability being required to engage additional services to seek and develop WHS direct guidance and tools. The project being undertaken will deliver face to face training models, e-learning components and online information and tools to assist stakeholders in the NDIS and other Direct Funding Arrangements within NSW, to make informed decisions regarding WHS risk in the provision of care and support services. Guidance and information is provided on key risk areas utilising tested tools & WHS resources within the disability sector. E-learning solutions are made available to inform and train stakeholders of WHS obligations and potential risk management approaches. NSW FACS works with NGO stakeholders to ensure consistent advice and assistance is provided in the area of WHS obligations and performance expectations.


2013 ◽  
Vol 796 ◽  
pp. 513-518
Author(s):  
Rong Jin ◽  
Bing Fei Gu ◽  
Guo Lian Liu

In this paper 110 female undergraduates in Soochow University are measured by using 3D non-contact measurement system and manual measurement. 3D point cloud data of human body is taken as research objects by using anti-engineering software, and secondary development of point cloud data is done on the basis of optimizing point cloud data. In accordance with the definition of the human chest width points and other feature points, and in the operability of the three-dimensional point cloud data, the width, thickness, and length dimensions of the curve through the chest width point are measured. Classification of body type is done by choosing the ratio values as classification index which is the ratio between thickness and width of the curve. The generation rules of the chest curve are determined for each type by using linear regression method. Human arm model could be established by the computer automatically. Thereby the individual model of the female upper body mannequin modeling can be improved effectively.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
V. Devaraja Holla ◽  
S. S. Krishnan ◽  
B. Gurumoorthy

Abstract This paper describes an algorithm for the construction of solid model from measured point data using Convex Partitioning approach. Convex Partitioning approach is based on the idea that any non-convex body can be viewed as a combination of several convex pieces. The input constitutes a set or cluster of points, measured on each face of the object, which is obtained by scanning the part. Points in each cluster are used to fit a plane or a non-planar surface depending upon the type of face. Partitioning is done along the planes till one gets all the convex pieces. The individual convex pieces are then combined together to get the final model of the object. The definition of convex partition is relaxed for objects having curved faces, to be an object with all its edges convex. Apart from allowing the construction of solid model from measured point data, the output (convex pieces) obtained from this approach is useful in planning for rapid prototyping and feature suppression in finite element analysis.


Sign in / Sign up

Export Citation Format

Share Document